Search
Now showing items 1321-1330 of 1850
Internet of things : least interference beaconing algorithms
(2014)
The emerging sensor networking applications are predicting the deployment of sensor devices in thousands of computing elements into multi-technology and multi-protocol platforms. Access to information will be available not ...
Perceptions of cloud computing in the South African government
(2014)
The South African government is unable to provide efficient Information Technology (IT) services to the citizens because of the fragmented approach in government where each department procures their own IT services and ...
Semi-automatic matching of semi-structured data updates
(2014)
Data matching, also referred to as data linkage or field matching, is a technique used to combine multiple data sources into one data set. Data matching is used for data integration in a number of sectors and industries; ...
Volumetric cloud generation using a Chinese brush calligraphy style
(2014)
Clouds are an important feature of any real or simulated environment in which the sky is visible. Their amorphous, ever-changing and illuminated features make the sky vivid and beautiful. However, these features increase ...
Designing an architecture for secure sharing of personal health records : a case of developing countries
(2014)
While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...
Force field comparison through computational analysis of capsular polysaccharides of Streptococcus pneumoniae serotypes 19A and F
(2014)
Modern Molecular Dynamics force fields, such as the CHARMM36 and GLYCAM06carbohydrate force fields, are parametrised to reproduce behaviours for specific molecules under specific conditions in order to be able to predict ...
An agent based layered framework to facilitate intelligent Wireless Sensor Networks
(2011)
Wireless Sensor Networks (WSNs) are networks of small, typically low-cost hardware devices which are able to sense various physical phenomenon in their surrounding environments. These simple nodes are also able to perform ...
Multi-layered security in the Internet of the Things
(2014)
It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...
A Heuristic Image Search Algorithm for Active Shape Model Segmentation of the Caudate Nucleus and Hippocampus in Brain MR Images of Children with FASD
(South African Institute of Computer Scientists and Information Technologists, 2012)
Magnetic Resonance Imaging provides a non-invasive means to study the neural correlates of Fetal Alcohol Spectrum Disorder (FASD) - the most common form of preventable mental retardation worldwide. One approach aims to ...
Access and information flow control to secure mobile web service compositions in resource constrained environments
(2015)
The growing use of mobile web services such as electronic health records systems and applications like twitter, Facebook has increased interest in robust mechanisms for ensuring security for such information sharing services. ...