Computer Science
Collections in this community
Recent Submissions
-
Addressing traffic congestion and throughput through optimization.
(2021)Traffic congestion experienced in port precincts have become prevalent in recent years for South Africa and internationally [1, 2, 3]. In addition to the environmental impacts of air pollution due to this challenge, ... -
Automatic dental caries detection in bitewing radiographs.
(2022)Dental Caries is one of the most prevalent chronic disease around the globe. Distinguishing carious lesions has been a challenging task. Conventional computer aided diagnosis and detection methods in the past have heavily ... -
Facial expression recognition and intensity estimation.
(2022)Facial Expression is one of the profound non-verbal channels through which human emotion state is inferred from the deformation or movement of face components when facial muscles are activated. Facial Expression Recognition ... -
Possible models diagrams: a new approach to teaching propositional logic.
(1994)Abstract available in PDF. -
The adoption of Web 2.0 tools in teaching and learning by in-service secondary school teachers: the Mauritian context.
(2018)With the current rapid increase in use of Web 2.0 tools by students, it is becoming necessary for teachers to understand what is happening in this social networking phenomenon, so that they can better understand the new ... -
Network intrusion detection using genetic programming.
(2018)Network intrusion detection is a real-world problem that involves detecting intrusions on a computer network. Detecting whether a network connection is intrusive or non-intrusive is essentially a binary classification ... -
Automated design of genetic programming of classification algorithms.
(2018)Over the past decades, there has been an increase in the use of evolutionary algorithms (EAs) for data mining and knowledge discovery in a wide range of application domains. Data classification, a real-world application ... -
An evaluation of depth camera-based hand pose recognition for virtual reality systems.
(2018)Camera-based hand gesture recognition for interaction in virtual reality systems promises to provide a more immersive and less distracting means of input than the usual hand-held controllers. It is unknown if a camera ... -
Hybrid component-based face recognition.
(2018)Facial recognition (FR) is the trusted biometric method for authentication. Compared to other biometrics such as signature; which can be compromised, facial recognition is non-intrusive and it can be apprehended at a ... -
An analysis of algorithms to estimate the characteristics of the underlying population in Massively Parallel Pyrosequencing data.
(2011)Massively Parallel Pyrosequencing (MPP) is a next generation DNA sequencing technique that is becoming ubiquitous because it is considerably faster, cheaper and produces a higher throughput than long established ... -
The enhanced best performance algorithm for global optimization with applications.
(2016)Abstract available in PDF file. -
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
(2014)Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ... -
An analysis of approaches for developing national health information systems : a case study of two sub-Saharan African countries.
(2016)Health information systems in sub-Saharan African countries are currently characterized by significant fragmentation, duplication and limited interoperability. Incorporating these disparate systems into a coherent national ... -
Component-based ethnicity identification from facial images.
(2017)Abstract available in PDF file. -
On the performance of metaheuristics for the blood platelet production and inventory problem.
(2016)Abstract available in PDF file. -
On the sample consensus robust estimation paradigm: comprehensive survey and novel algorithms with applications.
(2016)This study begins with a comprehensive survey of existing variants of the Random Sample Consensus (RANSAC) algorithm. Then, five new ones are contributed. RANSAC, arguably the most popular robust estimation algorithm in ... -
Leaf recognition for accurate plant classification.
(2017)Plants are the most important living organisms on our planet because they are sources of energy and protect our planet against global warming. Botanists were the first scientist to design techniques for plant species ... -
Q-Cog: a Q-Learning based cognitive agent architecture for complex 3D virtual worlds.
(2017)Intelligent cognitive agents should be able to autonomously gather new knowledge and learn from their own experiences in order to adapt to a changing environment. 3D virtual worlds provide complex environments in which ... -
A semantic sensor web framework for proactive environmental monitoring and control.
(2017)Observing and monitoring of the natural and built environments is crucial for main- taining and preserving human life. Environmental monitoring applications typically incorporate some sensor technology to continually ...