Browsing by Title
Now showing items 4572-4591 of 4789
-
Upstream Petroleum Industry Performance Evaluation using Data Envelopment Analytic Approach
(2019-06-23)Nigeria ranks among the top ten petroleum producers in the world with over eighty petroleum Investors in its upstream sector. This creates an enormous challenge for the upstream institutions’ managers especially in the ...
-
Uptake induced swelling and thermal expansion of CFRP tendons
(Institute of Civil EngineersProceedings of ICE, Structures and Buildings, 2009)Carbon-fibre-reinforced polymer (CFRP) tendons can be used as a corrosion-resistant alternative to steel for reinforcing or prestressing concrete in aggressive marine environments. The design lives of many civil marine ...
-
Usability heuristics for fast crime data anonymization in resource-constrained contexts
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2018)This thesis considers the case of mobile crime-reporting systems that have emerged as an effective and efficient data collection method in low and middle-income countries. Analyzing the data, can be helpful in addressing ...
-
Usable authentication for mobile banking
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN ...
-
Use of Analogy to Achieve New Expertise
(1977-04-01)We will take the view that the end result of problem solving in some world should be increased expertness. In the context of computers, increasing expertness means writing programs. This thesis is about a process, ...
-
The Use of Censors for Nonmonotonic Reasoning and Analogy in Medical Desicion-Making
(1985-11-01)A patient rarely has a single, isolated disease. The situation is usually much more complex since the different parts of the human organism and metabolism interact with each other and follow several feedback patterns. ...
-
The Use of Dependency Relationships in the Control of Reasoning
(MIT Artificial Intelligence Laboratory, 1976-11)Several recent problem-solving programs have indicated improved methods for controlling program actions. Some of these methods operate by analyzing the time-independent antecedent-consequent dependency relationships between ...
-
The Use of Equality in Deduction and Knowledge Representation
(1980-01-01)This report describes a system which maintains canonical expressions for designators under a set of equalities. Substitution is used to maintain all knowledge in terms of these canonical expressions. A partial order ...
-
The Use of Grouping in Visual Object Recognition.
(1988-01-01)The report describes a recognition system called GROPER, which performs grouping by using distance and relative orientation constraints that estimate the likelihood of different edges in an image coming from the same ...
-
Use of MACDMP
(1965-07-01)MACIMP is a PDP-6 program which can load from DECtape to core memory, dump core onto DECtape, or verify a previously dumped filel against memory. Normally, just before it loads, it clears all of memory to 0 (except itself ...
-
The Use of Parallelism to Implement a Heuristic Search
(1981-03-01)The role of parallel processing in heuristic search is examined by means of an example (cryptarithmetic addition). A problem solver is constructed that combines the metaphors of constraint propagation and hypothesize-and-test. ...
-
The Use of Thread Memory in Amnesic Aphasia and Concept Learning.(note 0)
(MIT Artificial Intelligence Laboratory, 1979-09-05)We propose a new type of semantic memory, called thread memory. The primitives of this memory are threads, defined as keyed multilink, loop-free chains, which link semantic nodes. All links run from superordinate categories ...
-
A Useful Algebraic Property of Robinson's Unification Algorithm
(1965-11-01)This memo presupposes some acquaintance with "A Machine Oriented Logic Based on the Resolution Principle", J.A. Robinson, JACM Jan65. The reader unfamiliar with this paper should be able to get a general idea of the ...
-
A Useful Homomorphic Encryption Method
(2009-06-15)
-
User perception of gaming element effectiveness in a corporate learning application
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)This Conversion Masters in Information Technology thesis gathered users' perceptions about eight gaming elements to determine their effectiveness on aspects of playability, enjoyment and intrinsic motivation needed in a ...
-
A User Study Comparing 3D Modeling with Silhouettes and Google SketchUp
(2010-05-05)We describe a user study comparing 3D Modeling with Silhouettes and Google SketchUp. In the user study, ten users were asked to create 3D models of three different objects, using either 3D Modeling with Silhouettes or ...
-
A User's Guide to the A.I. Group LISCOM LISP Complier: Interim Report
(1970-12-01)The LISCOM version of the AI group PDP/6 LISP compiler is a descendant of the original Greenblatt-Nelson compiler, and is a friendly sibling to the COMPLR version maintained by Jon L. White. The compiler operates in two ...
-
A User's Guide to the AI Lab: Getting Started at Tech Square
(MIT Artificial Intelligence Laboratory, 1991-08-18)
-
Uses of Technology to Enhance Education
(1973-06-01)Section 1: Schematic outline of project and what we want. Hardly any intellectual content. Section 2: Statement of our goals in general terms. This statement is intended to have serious intellectual content but lacks meaty ...
-
Using access information in the dynamic visualisation of web sites
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)Log file analysis provides a cost-effective means to detennine web site usage. However, current methods of displaying log analysis results tend to be limited in that they either contain no reference to a web site's structure, ...