Search
Now showing items 21-30 of 82
Perceptions of cloud computing in the South African government
(2014)
The South African government is unable to provide efficient Information Technology (IT) services to the citizens because of the fragmented approach in government where each department procures their own IT services and ...
Volumetric cloud generation using a Chinese brush calligraphy style
(2014)
Clouds are an important feature of any real or simulated environment in which the sky is visible. Their amorphous, ever-changing and illuminated features make the sky vivid and beautiful. However, these features increase ...
Designing an architecture for secure sharing of personal health records : a case of developing countries
(2014)
While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...
An agent based layered framework to facilitate intelligent Wireless Sensor Networks
(2011)
Wireless Sensor Networks (WSNs) are networks of small, typically low-cost hardware devices which are able to sense various physical phenomenon in their surrounding environments. These simple nodes are also able to perform ...
Multi-layered security in the Internet of the Things
(2014)
It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...
Access and information flow control to secure mobile web service compositions in resource constrained environments
(2015)
The growing use of mobile web services such as electronic health records systems and applications like twitter, Facebook has increased interest in robust mechanisms for ensuring security for such information sharing services. ...
Designing mobile multi-touch drum sequencing applications
(2015)
Digital music software can limit the forms of music we create by using interfaces that directly copy those of the analogue instruments that came before. In this study we report on a new multi-touch interface that affords ...
Algorithms for efficiently and effectively matching agents in microsimulations of sexually transmitted infections
(2018)
Mathematical models of the HIV epidemic have been used to estimate incidence, prevalence and life-expectancy, as well the benefits and costs of public health interventions, such as the provision of antiretroviral treatment. ...
Neuro-evolution behavior transfer for collective behavior tasks
(2018)
The design of effective, robust and autonomous controllers for multi-agent and multi-robot systems is a long-standing problem in the fields of computational intelligence and robotics. Whilst nature-inspired problem-solving ...
Assessing the suitability of user centric design methods when applied in a developing world context
(2010)
The application of information and communication technologies to development (ICT4Dev) is widely believed to have the potential to improve livelihoods in developing regions. Within the field of HCI, it is recognised that ...