Search
Now showing items 111-120 of 151
Internet of things : least interference beaconing algorithms
(2014)
The emerging sensor networking applications are predicting the deployment of sensor devices in thousands of computing elements into multi-technology and multi-protocol platforms. Access to information will be available not ...
Perceptions of cloud computing in the South African government
(2014)
The South African government is unable to provide efficient Information Technology (IT) services to the citizens because of the fragmented approach in government where each department procures their own IT services and ...
Semi-automatic matching of semi-structured data updates
(2014)
Data matching, also referred to as data linkage or field matching, is a technique used to combine multiple data sources into one data set. Data matching is used for data integration in a number of sectors and industries; ...
Volumetric cloud generation using a Chinese brush calligraphy style
(2014)
Clouds are an important feature of any real or simulated environment in which the sky is visible. Their amorphous, ever-changing and illuminated features make the sky vivid and beautiful. However, these features increase ...
Designing an architecture for secure sharing of personal health records : a case of developing countries
(2014)
While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...
Force field comparison through computational analysis of capsular polysaccharides of Streptococcus pneumoniae serotypes 19A and F
(2014)
Modern Molecular Dynamics force fields, such as the CHARMM36 and GLYCAM06carbohydrate force fields, are parametrised to reproduce behaviours for specific molecules under specific conditions in order to be able to predict ...
Multi-layered security in the Internet of the Things
(2014)
It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...
Towards communication and information access for deaf people
(South African Computer Society, 2014)
In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African ...
Reliability-Aware Optimization of Approximate Computational Kernels with Rely
(2014-01-09)
Emerging high-performance architectures are anticipated to contain unreliable components (e.g., ALUs) that offer low power consumption at the expense of soft errors. Some applications (such as multimedia processing, machine ...
Motion Compatibility for Indoor Localization
(2014-08-26)
Indoor localization -- a device's ability to determine its location within an extended indoor environment -- is a fundamental enabling capability for mobile context-aware applications. Many proposed applications assume ...