UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • Scarcella, Vincenzo (2002)
    The automated fabrication of a prototype three-dimensional part from a three-dimensional drawing can be regarded as rapid prototyping. There are two basic types of rapid prototyping: subtractive fabrication and additive ...
  • Janse van Vuuren, Hendrika Francina (1995)
    This study was conducted with the purpose of finding a thorough understanding, within the framework of business management, the integrating of the Information System strategy and Information Technology strategy, into the ...
  • De Bruin, Ludwig (2014)
    Data is generated at an ever-increasing rate and it has become difficult to process or analyse it in its raw form. The most data is generated by processes or measuring equipment, resulting in very large volumes of data ...
  • Van Niekerk, G.J. (2000)
    Layered Manufacturing (LM), also known as "Rapid Prototyping", is that process in terms of which a computer-designed model is created layer by layer with the aid of specific LM hardware. Telemanufacturing constitutes an ...
  • O'Reilly, Grant Blaise (2002)
    Knowledge in organizations today is considered as one of the most important assets the organization possesses. A considerable part of this knowledge is the knowledge possessed by the individuals employed by the organization. ...
  • Zhang, Xiaomei (2003)
    The present research study will be dedicated to expounding an integrated event-based scheduling model, which model will, in turn, be based on an object-oriented method and a knowledge-based methodology. In order to complete ...
  • Hodgkinson, Warren (2005)
    One of the fastest developing areas in the entertainment industry is digital animation. Television programmes and movies frequently use 3D animations to enhance or replace actors and scenery. With the increase in computing ...
  • Andrade, Christopher Grant (2007)
    Determining the identity of a person has become vital in today’s world. Emphasis on security has become increasingly more common in the last few decades, not only in Information Technology, but across all industries. One ...
  • Tolnai, Annette (2008)
    The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a part of our daily lives, the more we expose ourselves and our ...
  • Hattingh, Pieter (2012)
  • Grobler, Martha Maria (2009)
  • Bosch, Johannes Brits (1994)
    This dissertation examines the field of computer vision, with special attention given to the recognition of alpha numeric characters on video images using OCR software. The study may be broadly divided into four ...
  • Du Preez, Johan Frederik (2006)
    The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and ...
  • Grimm, Nicholas Justin (2014)
    This research has the aim of creating a low-cost, contactless, micro-payment framework to support micro-payments for the informal taxi industry in South Africa. The informal taxi industry is a prime example of an industry ...
  • Langerman, Josef Jacobus (1997)
    This thesis investigates how intelligent agents can be used to solve airline scheduling problems. It is divided into three parts. The first states what airline scheduling consists of; the second discusses the results of ...
  • Kersten, Karin (1998)
    This dissertation is devoted to an investigation into the network-management environment, with special emphasis on the security aspects and the provision of a reference framework when choosing a network-management product. The ...
  • Klut, Johannes Pieter (1992)
    Please refer to full text to view abstract
  • Gouws, Gerard (2008)
    Grid computing is a technology concerned with harvesting idle resources of geographically distributed and interconnected computers. It solves problems regarded as too complex or large to be solved by a single computer. ...
  • Ngoss, Ngue Baha Djob (2006)
    New wireless communication technology standards are being released every year. Wireless technologies merely differ from one another by their range and speed and can each be selected according to the type of application ...
  • Lessing, Martha Maria (2006)
    To ensure the likely success of an organisation’s Information Security Governance, discipline leaders recommend that organisations follow the guidelines as set out in Information Security Governance best practice documents. ...

Search UJDigispace


Browse

My Account