Search
Now showing items 11-19 of 19
Designing an architecture for secure sharing of personal health records : a case of developing countries
(2014)
While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...
Force field comparison through computational analysis of capsular polysaccharides of Streptococcus pneumoniae serotypes 19A and F
(2014)
Modern Molecular Dynamics force fields, such as the CHARMM36 and GLYCAM06carbohydrate force fields, are parametrised to reproduce behaviours for specific molecules under specific conditions in order to be able to predict ...
Multi-layered security in the Internet of the Things
(2014)
It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...
Towards communication and information access for deaf people
(South African Computer Society, 2014)
In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African ...
Scalable attack modelling in support of security information and event management
(2014)
While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...
Lattice Boltzmann liquid simulations on graphics hardware
(2014)
Fluid simulation is widely used in the visual effects industry. The high level of detail required to produce realistic visual effects requires significant computation. Usually, expensive computer clusters are used in order ...
Supporting NGO intermediation with internet systems : comparing mobile and web examples for reaching low income urban youth of Cape Town
(2014)
Intermediaries are necessary to overcome challenges of Internet use for many users in the developing world. However the need for co-presence with intermediaries can be inconvenient for beneficiaries, and the process is ...
A parallel multidimensional weighted histogram analysis method
(2014)
The Weighted Histogram Analysis Method (WHAM) is a technique used to calculate free energy from molecular simulation data. WHAM recombines biased distributions of samples from multiple Umbrella Sampling simulations to yield ...
Participatory cloud computing : the community cloud management protocol
(2014)
This thesis work takes an investigative approach into developing a middleware solution for managing services in a community cloud computing infrastructure pre-dominantly made of interconnected low power wireless devices. ...