Search
Now showing items 61-70 of 148
Assessing the suitability of user centric design methods when applied in a developing world context
(2010)
The application of information and communication technologies to development (ICT4Dev) is widely believed to have the potential to improve livelihoods in developing regions. Within the field of HCI, it is recognised that ...
The effects of network factors on the performance of 3G UMTS applications
(2010)
3G is the wireless network technology expected to allow wireless applications to perform on par with wired applications. However 3G has factors which limit its performance. These factors include both device factors such ...
Extensibility in end-user network applications : a feature or a flaw?
(2011)
The rise in global connectivity driven by user-demand is bringing about a wave of end-user interconnectivity applications. This, coupled with the improvements in software security that have forced a shift from syntactic ...
Resolving the hydration of hexacyclic systems using ultrasonic interferometry and computer simulations
(2010)
The major part of this thesis focuses on investigating dynamic hydration behaviour of a series of hexacycylic molecules in water, by using computational techniques validated through ultrasound interferometry experiments. ...
An architecture for secure searchable cloud storage
(2012)
Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...
Meta-standardisation of interoperability protocols
(2012)
The current medley of interoperability protocols is potentially problematic. Each protocol is designed by a different group, each provides a single service, and has its own syntax and vocabulary. Popular protocols such as ...
The design of a mobile user interface for an interest rate calculator
(2012)
In our search towards an interactive mobile fixed rate calculator, in this dissertation, we are interested in the human-centred design and in particularly exploring the mobile user interface design and the user experience ...
Advancing security information and event management frameworks in managed enterprises using geolocation
(2015)
Security Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval ...
Acceleration of the noise suppression component of the DUCHAMP source-finder
(2015)
The next-generation of radio interferometer arrays - the proposed Square Kilometre Array (SKA) and its precursor instruments, The Karoo Array Telescope (MeerKAT) and Australian Square Kilometre Path finder (ASKAP) - will ...