Browsing by Title

Now showing items 4572-4591 of 4789

  • Upstream Petroleum Industry Performance Evaluation using Data Envelopment Analytic Approach 

    Idowu, Adekunle Joseph (2019-06-23)
    Nigeria ranks among the top ten petroleum producers in the world with over eighty petroleum Investors in its upstream sector. This creates an enormous challenge for the upstream institutions’ managers especially in the ...

  • Uptake induced swelling and thermal expansion of CFRP tendons 

    Scott, P; Lees, Janet Marillyn (Institute of Civil EngineersProceedings of ICE, Structures and Buildings, 2009)
    Carbon-fibre-reinforced polymer (CFRP) tendons can be used as a corrosion-resistant alternative to steel for reinforcing or prestressing concrete in aggressive marine environments. The design lives of many civil marine ...

  • Usability heuristics for fast crime data anonymization in resource-constrained contexts 

    Sakpere, Aderonke Busayo (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2018)
    This thesis considers the case of mobile crime-reporting systems that have emerged as an effective and efficient data collection method in low and middle-income countries. Analyzing the data, can be helpful in addressing ...

  • Usable authentication for mobile banking 

    Chong, Ming Ki (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN ...

  • Use of Analogy to Achieve New Expertise 

    Unknown author (1977-04-01)
    We will take the view that the end result of problem solving in some world should be increased expertness. In the context of computers, increasing expertness means writing programs. This thesis is about a process, ...

  • The Use of Censors for Nonmonotonic Reasoning and Analogy in Medical Desicion-Making 

    Unknown author (1985-11-01)
    A patient rarely has a single, isolated disease. The situation is usually much more complex since the different parts of the human organism and metabolism interact with each other and follow several feedback patterns. ...

  • The Use of Dependency Relationships in the Control of Reasoning 

    Unknown author (MIT Artificial Intelligence Laboratory, 1976-11)
    Several recent problem-solving programs have indicated improved methods for controlling program actions. Some of these methods operate by analyzing the time-independent antecedent-consequent dependency relationships between ...

  • The Use of Equality in Deduction and Knowledge Representation 

    Unknown author (1980-01-01)
    This report describes a system which maintains canonical expressions for designators under a set of equalities. Substitution is used to maintain all knowledge in terms of these canonical expressions. A partial order ...

  • The Use of Grouping in Visual Object Recognition. 

    Unknown author (1988-01-01)
    The report describes a recognition system called GROPER, which performs grouping by using distance and relative orientation constraints that estimate the likelihood of different edges in an image coming from the same ...

  • Use of MACDMP 

    Unknown author (1965-07-01)
    MACIMP is a PDP-6 program which can load from DECtape to core memory, dump core onto DECtape, or verify a previously dumped filel against memory. Normally, just before it loads, it clears all of memory to 0 (except itself ...

  • The Use of Parallelism to Implement a Heuristic Search 

    Unknown author (1981-03-01)
    The role of parallel processing in heuristic search is examined by means of an example (cryptarithmetic addition). A problem solver is constructed that combines the metaphors of constraint propagation and hypothesize-and-test. ...

  • The Use of Thread Memory in Amnesic Aphasia and Concept Learning.(note 0) 

    Unknown author (MIT Artificial Intelligence Laboratory, 1979-09-05)
    We propose a new type of semantic memory, called thread memory. The primitives of this memory are threads, defined as keyed multilink, loop-free chains, which link semantic nodes. All links run from superordinate categories ...

  • A Useful Algebraic Property of Robinson's Unification Algorithm 

    Unknown author (1965-11-01)
    This memo presupposes some acquaintance with "A Machine Oriented Logic Based on the Resolution Principle", J.A. Robinson, JACM Jan65. The reader unfamiliar with this paper should be able to get a general idea of the ...

  • A Useful Homomorphic Encryption Method 

    Unknown author (2009-06-15)

  • User perception of gaming element effectiveness in a corporate learning application 

    Arnold, Henry (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    This Conversion Masters in Information Technology thesis gathered users' perceptions about eight gaming elements to determine their effectiveness on aspects of playability, enjoyment and intrinsic motivation needed in a ...

  • A User Study Comparing 3D Modeling with Silhouettes and Google SketchUp 

    Unknown author (2010-05-05)
    We describe a user study comparing 3D Modeling with Silhouettes and Google SketchUp. In the user study, ten users were asked to create 3D models of three different objects, using either 3D Modeling with Silhouettes or ...

  • A User's Guide to the A.I. Group LISCOM LISP Complier: Interim Report 

    Unknown author (1970-12-01)
    The LISCOM version of the AI group PDP/6 LISP compiler is a descendant of the original Greenblatt-Nelson compiler, and is a friendly sibling to the COMPLR version maintained by Jon L. White. The compiler operates in two ...

  • A User's Guide to the AI Lab: Getting Started at Tech Square 

    Unknown author (MIT Artificial Intelligence Laboratory, 1991-08-18)

  • Uses of Technology to Enhance Education 

    Unknown author (1973-06-01)
    Section 1: Schematic outline of project and what we want. Hardly any intellectual content. Section 2: Statement of our goals in general terms. This statement is intended to have serious intellectual content but lacks meaty ...

  • Using access information in the dynamic visualisation of web sites 

    Wong, Bryan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2004)
    Log file analysis provides a cost-effective means to detennine web site usage. However, current methods of displaying log analysis results tend to be limited in that they either contain no reference to a web site's structure, ...