Masters Degrees (Computer Science)
Recent Submissions
-
A patch-based convolutional neural network for localized MRI brain segmentation.
(2020)Accurate segmentation of the brain is an important prerequisite for effective diagnosis, treatment planning, and patient monitoring. The use of manual Magnetic Resonance Imaging (MRI) segmentation in treating brain medical ... -
Irenbus - a real-time machine learning based public transport management system.
(2020)The era of Big Data and the Internet of Things is upon us, and it is time for developing countries to take advantage of and pragmatically apply these ideas to solve real-world problems. As the saying goes, "data is the ... -
Optimized deep learning model for early detection and classification of lung cancer on CT images.
(2022)Recently, researchers have shown an increased interest in the early diagnosis and detection of lung cancer using the characteristics of computed tomography (CT) images. The accurate classification of lung cancer assists ... -
Possible Models Diagrams - a new approach to teaching propositional logic.
(1994)Abstract available in PDF. -
Addressing traffic congestion and throughput through optimization.
(2021)Traffic congestion experienced in port precincts have become prevalent in recent years for South Africa and internationally [1, 2, 3]. In addition to the environmental impacts of air pollution due to this challenge, ... -
Network intrusion detection using genetic programming.
(2018)Network intrusion detection is a real-world problem that involves detecting intrusions on a computer network. Detecting whether a network connection is intrusive or non-intrusive is essentially a binary classification ... -
An evaluation of depth camera-based hand pose recognition for virtual reality systems.
(2018)Camera-based hand gesture recognition for interaction in virtual reality systems promises to provide a more immersive and less distracting means of input than the usual hand-held controllers. It is unknown if a camera ... -
Hybrid component-based face recognition.
(2018)Facial recognition (FR) is the trusted biometric method for authentication. Compared to other biometrics such as signature; which can be compromised, facial recognition is non-intrusive and it can be apprehended at a ... -
An analysis of algorithms to estimate the characteristics of the underlying population in Massively Parallel Pyrosequencing data.
(2011)Massively Parallel Pyrosequencing (MPP) is a next generation DNA sequencing technique that is becoming ubiquitous because it is considerably faster, cheaper and produces a higher throughput than long established ... -
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
(2014)Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ... -
An analysis of approaches for developing national health information systems : a case study of two sub-Saharan African countries.
(2016)Health information systems in sub-Saharan African countries are currently characterized by significant fragmentation, duplication and limited interoperability. Incorporating these disparate systems into a coherent national ... -
Component-based ethnicity identification from facial images.
(2017)Abstract available in PDF file. -
On the performance of metaheuristics for the blood platelet production and inventory problem.
(2016)Abstract available in PDF file. -
On the sample consensus robust estimation paradigm: comprehensive survey and novel algorithms with applications.
(2016)This study begins with a comprehensive survey of existing variants of the Random Sample Consensus (RANSAC) algorithm. Then, five new ones are contributed. RANSAC, arguably the most popular robust estimation algorithm in ... -
Q-Cog: a Q-Learning based cognitive agent architecture for complex 3D virtual worlds.
(2017)Intelligent cognitive agents should be able to autonomously gather new knowledge and learn from their own experiences in order to adapt to a changing environment. 3D virtual worlds provide complex environments in which ... -
Fusion of face and iris biometrics in security verification systems.
(2016)Abstract available in PDF file. -
Application of artificial intelligence for detecting derived viruses.
(2017)A lot of new viruses are being created each and every day. However, some of these viruses are not completely new per se. Most of the supposedly ‘new’ viruses are not necessarily created from scratch with completely new ... -
On common fixed points approximation of countable families of certain multi-valued maps in hilbert spaces.
(2017)Fixed point theory and its applications have been widely studied by many researchers. Di erent iterative algorithms have been used extensively to approximate solutions of xed point problems and other related problems ... -
Discrete particle swarm optimization for combinatorial problems with innovative applications.
(2016)Abstract available in PDF file.