Browsing Masters Degrees (Computer Science) by Title
Now showing items 31-50 of 79
-
Face recognition with Eigenfaces : a detailed study.
(2012)With human society becoming increasingly computerised, the use of biometrics to automatically establish the identity of an individual is of great interest in a wide variety of applications. Facial appearance is an appealing ... -
Foundational ontology interchangeability with the Repository of Ontologies for MULltiple USes (ROMULUS).
(2013)The notion behind foundational ontologies is to have a single foundational ontology to serve as a basis for providing high-level entities and relations that are common between all ontologies in or- der to facilitate ... -
Fusion of face and iris biometrics in security verification systems.
(2016)Abstract available in PDF file. -
Gabor filter parameter optimization for multi-textured images : a case study on water body extraction from satellite imagery.
(2012)The analysis and identification of texture is a key area in image processing and computer vision. One of the most prominent texture analysis algorithms is the Gabor Filter. These filters are used by convolving an image ... -
Handwritten signature verification using locally optimized distance-based classification.
(2012)Although handwritten signature verification has been extensively researched, it has not achieved optimum accuracy rate. Therefore, efficient and accurate signature verification techniques are required since signatures are ... -
Hybrid component-based face recognition.
(2018)Facial recognition (FR) is the trusted biometric method for authentication. Compared to other biometrics such as signature; which can be compromised, facial recognition is non-intrusive and it can be apprehended at a ... -
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
(2014)Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ... -
An interpretive study of software risk management perspectives.
(2002)This dissertation addresses risk management in the software development context. The discussion commences with the risks in software development and the necessity for a software risk management process. The emergent discourse ... -
An investigation of multi-label classification techniques for predicting HIV drug resistance in resource-limited settings.
(2014)South Africa has one of the highest HIV infection rates in the world with more than 5.6 million infected people and consequently has the largest antiretroviral treatment program with more than 1.5 million people on ... -
Investigation of techniques for automatic polyphonic music transcription using wavelets.
(2009)It has been said (although sadly I have no source) that music is one of the most useful yet useless phenomena known to mankind. Useless in that it has, apparently, no tangible or immediately practical function in our lives, ... -
Irenbus - a real-time machine learning based public transport management system.
(2020)The era of Big Data and the Internet of Things is upon us, and it is time for developing countries to take advantage of and pragmatically apply these ideas to solve real-world problems. As the saying goes, "data is the ... -
Model and solutions to campus parking space allocation problem.
(2013)Parking is considered a major land use challenge in campus planning. The problem can be in terms of scarcity (few available spaces compared to demand) or management (ineffi cient usage of available facilities). Many ... -
Network intrusion detection using genetic programming.
(2018)Network intrusion detection is a real-world problem that involves detecting intrusions on a computer network. Detecting whether a network connection is intrusive or non-intrusive is essentially a binary classification ... -
Neural network assisted software engineered refractive fringe diagnostic of spherical shocks.
(1996)A shock is essentially a propagating variation in the pressure or density of a medium. If the medium is transparent, such as air, and the shock radially symmetric, the refractive fringe diagnostic can be used to examine ... -
On case representation and indexing in a case-based reasoning system for waste management.
(1997)Case-Based Reasoning is a fairly new Artificial Intelligence technique which makes use of past experience as the basis for solving new problems. Typically, a case-based reasoning system stores actual past problems and ... -
On common fixed points approximation of countable families of certain multi-valued maps in hilbert spaces.
(2017)Fixed point theory and its applications have been widely studied by many researchers. Di erent iterative algorithms have been used extensively to approximate solutions of xed point problems and other related problems ... -
On modeling and optimisation of air Traffic flow management problem with en-route capacities.
(2016)The air transportation industry in the past ten years witnessed an upsurge with the number of passengers swelling exponentially. This development has seen a high demand in airport and airspace usage, which consequently ... -
On the performance of metaheuristics for the blood platelet production and inventory problem.
(2016)Abstract available in PDF file.