UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • Jordaan, Jacoba Frederica (1998)
    This dissertation comprises an in-depth investigation into the domain of computer vision, with specific reference to the textile industry. The study consists of three main sections. In the first section, the computer-vision ...
  • Du Toit, J. Jurgens (2007)
    The aim of this dissertation is to identify and evaluate current security issues related to eassessment systems, to identify current technologies used to mitigate the risks associated with these issues, and to propose a ...
  • Boshoff, Willem Hendrik (2006)
    Researchers in artificial intelligence and agent technologies are presented with a massive array of various technologies that they might use for their research projects. It is difficult for researchers to test their theories ...
  • Toko, Guy Roger (2010)
    This research endeavour offers a holistic approach to software systems adoption within the higher education (HE) systems of developing countries at a time when the cost of licensing fees seems to be negatively affecting ...
  • Van der Merwe, Isak Pieter (1993)
    The aim of this study is to introduce a model that can be used to manage the security profiles by using a role oriented approach. In chapter 1 the addressed problem and the aim of the study, are introduced. In chapter ...
  • Pedroncelli, Antony (2002)
    A message can be communicated to other people using a combination of pictures, sounds, and actions. Ensuring that the message is understood as intended often depends on the presentation of these forms of multimedia. In ...
  • Ellefsen, Ian David (2009)
    This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between the hidden and non-hidden data. This will ensure the ...
  • Boshoff, Paul Marthinus (1998)
    Using the Internet for communication purposes constitutes a high risk, considering the security of such information. The protocol suite used on the Internet is the TCP/IP protocol suite, which consists of the Transmission ...
  • Nembambula, Malindi (1997)
    "For better for worse, most computer systems are not in that way today. Security is in general, a trade-off with convenience of remote access via networks to their computers. Inevitably, they suffer from some loss of ...
  • Tolnai, Annette (2012)
    Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware, better responsiveness to changing business conditions and ...
  • Mokgosi, Letlhogonolo (2012)
    Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. ...
  • Louwrens, Cecil Petrus (1996)
    The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO) in heterogeneous computing environments and to provide guidelines and reference frameworks ...
  • Gerber, E. (2000)
    The domain of computer graphics has undergone phenomenal changes and improvements over the past decade, to the extent that photorealistic renderings have now become possible. Evidence of the vast potential of such ...
  • Bothma, Hendrik Jacobus (2007)
    A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on ...
  • Pike, Justin Richard (2008)
    The dissertation investigates trust and reputation as a specialisation of agent technology. The research presented herein aims to establish and demonstrate how it is possible for one rational agent to trust another entity. ...
  • Ferreira, Chantelle Saraiva (2007)
    The evolutionary nature of humans requires agent systems to be continuously replaced due to their inability to meet or adapt to our changing needs. Therefore, to eliminate the need for a human to continuously adapt an ...
  • Barnard, Andries (1997)
    In this thesis we undertake a study of formal three-dimensional representational and acceptor methods. In lieu hereof then, we give a short overview of such strategies existing in the literature. Graph and graph grammar ...
  • Tew, Arthur William (1989)
    In this thesis a study is made of graphs, graph grammars as well as grammars which represent structures in three dimensions. Structure graphs are defined for the first time in this thesis. The definition thereof is based ...
  • Bester, Morné (1999)
    The manufacturing sector has produced a wide variety of techniques in its attempts to find the ultimate solution for the manufacturing process, with these techniques ranging from material requirements planning, just-in-time ...

Search UJDigispace


Browse

My Account