University of Cape Town: Recent submissions

Now showing items 141-160 of 311

  • Force field comparison through computational analysis of capsular polysaccharides of Streptococcus pneumoniae serotypes 19A and F 

    Gordon, Marc Brian (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    Modern Molecular Dynamics force fields, such as the CHARMM36 and GLYCAM06carbohydrate force fields, are parametrised to reproduce behaviours for specific molecules under specific conditions in order to be able to predict ...

  • Designing an architecture for secure sharing of personal health records : a case of developing countries 

    Ssembatya, Richard (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...

  • Volumetric cloud generation using a Chinese brush calligraphy style 

    Wei, Chen (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    Clouds are an important feature of any real or simulated environment in which the sky is visible. Their amorphous, ever-changing and illuminated features make the sky vivid and beautiful. However, these features increase ...

  • Semi-automatic matching of semi-structured data updates 

    Forshaw,Gareth William (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    Data matching, also referred to as data linkage or field matching, is a technique used to combine multiple data sources into one data set. Data matching is used for data integration in a number of sectors and industries; ...

  • Multi-layered security in the Internet of the Things 

    Ngqakaza,Lutando (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...

  • Perceptions of cloud computing in the South African government 

    Chetty, Deenadayalan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    The South African government is unable to provide efficient Information Technology (IT) services to the citizens because of the fragmented approach in government where each department procures their own IT services and ...

  • An agent based layered framework to facilitate intelligent Wireless Sensor Networks 

    Scholtz, Andre (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2011)
    Wireless Sensor Networks (WSNs) are networks of small, typically low-cost hardware devices which are able to sense various physical phenomenon in their surrounding environments. These simple nodes are also able to perform ...

  • Extensibility in end-user network applications : a feature or a flaw? 

    Zimba, Brian Ackim (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2011)
    The rise in global connectivity driven by user-demand is bringing about a wave of end-user interconnectivity applications. This, coupled with the improvements in software security that have forced a shift from syntactic ...

  • An extension to optic flow analysis for the generation of computer animated images 

    Webb, Ian Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)
    This dissertation seeks to develop image based animation methods using the technique of optic flow analysis developed for a moving planar object. Image based rendering is presented as a class of algorithm using two dimensional ...

  • Evaluation of a multiprogramming time sharing system through simulation. 

    Kissemlis, Demetrios Nik (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1975)
    The thesis describes the design and implementation of a simulation model. The model is patterned after the EXEC-8 multiprogramming time sharing operating system on the UNIVAC 1106 computer at the computer centre of the ...

  • The effects of network factors on the performance of 3G UMTS applications 

    Jacobs, Fabian Mark (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)
    3G is the wireless network technology expected to allow wireless applications to perform on par with wired applications. However 3G has factors which limit its performance. These factors include both device factors such ...

  • Electronic text processing in the large South African life assurance companies 

    Marais, Stephanus Johannes (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1981)
    The use of computer technology and magnetic storage media for production typing led to a new term "word processing". In this research word processing is considered to be part only of a more comprehensive concept - electronic ...

  • Resolving the hydration of hexacyclic systems using ultrasonic interferometry and computer simulations 

    Boscaino, Annalisa (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)
    The major part of this thesis focuses on investigating dynamic hydration behaviour of a series of hexacycylic molecules in water, by using computational techniques validated through ultrasound interferometry experiments. ...

  • Meta-standardisation of interoperability protocols 

    Paihama, Jorgina Kaumbe do Rosario (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    The current medley of interoperability protocols is potentially problematic. Each protocol is designed by a different group, each provides a single service, and has its own syntax and vocabulary. Popular protocols such as ...

  • An architecture for secure searchable cloud storage 

    Koletka, Robert (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...

  • The design of a mobile user interface for an interest rate calculator 

    Swanepoel, Arie Willem (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    In our search towards an interactive mobile fixed rate calculator, in this dissertation, we are interested in the human-centred design and in particularly exploring the mobile user interface design and the user experience ...

  • Expert system adjudication of hospital data in HIV disease management 

    Joseph, Asma (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    HIV Disease Management Programs (DMP's) are comprehensive programs that are designed to manage the HIV infected patient's treatment in an integrated manner.

  • Usable authentication for mobile banking 

    Chong, Ming Ki (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN ...

  • Managing economic value and uncertainty on software projects : an empirical study with the CASSE framework 

    Balikuddembe, Joseph Kibombo (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    Lack of adaptive-predictor models in software development renders the decision-making process complex, principally when evaluating investment options. Prior work has presented various approaches which are still non-integrated, ...

  • Building heritage collections using games on social networks 

    Havenga, Michelle (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    An application on a social network may provide a means to avoid the cost, decrease time and increase scale of operation of heritage preservation by motivating users to supply and process the data. This project uses a ...