Search

Your search keyword '"School of Information Technology"' showing total 2,704 results

Search Constraints

Start Over You searched for: Author "School of Information Technology" Remove constraint Author: "School of Information Technology"
2,704 results on '"School of Information Technology"'

Search Results

1. Development of an Adaptive Environmental Management System for Lejweleputswa District: A Participatory Approach through Fuzzy Cognitive Maps

2. A Cloud-based Intrusion Detection and Prevention System for Mobile Voting in South Africa

3. A Cloud-based Intrusion Detection and Prevention System for Mobile Voting in South Africa

4. Development of an Adaptive Environmental Management System for Lejweleputswa District: A Participatory Approach through Fuzzy Cognitive Maps

5. Epidemiological data mining of cardiovascular Bayesian networks

6. THE EFFECTIVE GOVERNMENT INFORMATION ACCESSIBILITY SYSTEM FOR A COMMUNITY IN THE REMOTE AREAS OF SOUTH AFRICA

7. THE EFFECTIVE GOVERNMENT INFORMATION ACCESSIBILITY SYSTEM FOR A COMMUNITY IN THE REMOTE AREAS OF SOUTH AFRICA

8. A cost effective school management system for disadvantaged schools in the Free State province using the software as a service (SaaS) delivery model

9. A cost effective school management system for disadvantaged schools in the Free State province using the software as a service (SaaS) delivery model

10. Real-time, open controller for reconfigurable manufacturing systems

11. Second Generation of Mass Estimation

12. Multi-Entity Bayesian Networks Learning in Predictive Situation Awareness

13. Real-time, open controller for reconfigurable manufacturing systems

14. Mass Estimation and Its Applications

15. Social Network Privacy: Overcoming Facebook Policies that put Users at Risk

16. U.S. Army Mobile Application Development: A Coder's Perspective

17. Using Formative Evaluations to Assess the Potential Value of Geospatial Decision Support Products During Development

18. Adaptive Anomaly Detection using Isolation Forest

19. Design of Adaptive Organizations for Effects Based Operations

20. Automatic mapping of ICPC-2 PLUS terms to the SNOMED CT terminology

21. Review of Existing Wormhole Attack Discovery Techniques

22. Privacy-Preserving Collaborative Sequential Pattern Mining

23. Background and Sensitivity Simulation of a Space Based Germanium Compton Telescope

24. Investigation of Hypothesis-Driven Constructive Induction in AQ17-HCI

25. Aiding the Human Decisionmaker through the Knowledge-Based Sciences.

26. Computer Based Intelligence Support: An Integrated Expert System and Decision Support Systems Approach

27. A Further Note on Generalized Hyperexponential Distributions

29. Synthesis and spectroscopic observation of dendrimer-encapsulated gold nanoclusters

30. Finite dimensional scattered posets

31. N-free extensions of posets.Note on a theorem of P.A.Grillet

33. Education and professional development of university mathematics teachers

34. Spectrally resolved point-spread-function engineering using a complex medium

35. Exploitation of the Properties of Communication Signals: From Non-circular Signal to Circular Signal

36. DNA polymerase α interacts with H3-H4 and facilitates the transfer of parental histones to lagging strands

39. The more things change : the role of the independent library in the 21st century

40. Agile heterogenenous computing : variable platform heterogeneous computing and its design flow

41. User privacy preservation on mobile devices : investigating the role of contextual integrity

42. Pd(II) complexes with N-heteroaromatic hydrazone ligands: Anticancer activity, in silico and experimental target identification

43. Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid

44. Lempel-Ziv complexity of the pNNx statistics – an application to neonatal stress

45. Multiple MCT particle detection and tracking for analysing cystic fibrosis treatments in synchrotron phase contrast x-ray imaging

46. Research on Evaluation of Soil Fertility Resource Space Based on Regional Hotspots and Clustering Method

47. Extracting insights from social media to predict, detect and summarize civil unrest

48. Detecting and deterring stalkers using technology

49. Weakening the faithfulness assumption in causal discovery

50. Developing computational methods for detecting signals of adverse drug events from healthcare data

Catalog

Books, media, physical & digital resources