Browsing Masters Degrees (Computer Science) by Title
Now showing items 21-40 of 79
-
Data classification using genetic programming.
(2015)Genetic programming (GP), a field of artificial intelligence, is an evolutionary algorithm which evolves a population of trees which represent programs. These programs are used to solve problems. This dissertation ... -
Debugging and repair of description logic ontologies.
(2010)In logic-based Knowledge Representation and Reasoning (KRR), ontologies are used to represent knowledge about a particular domain of interest in a precise way. The building blocks of ontologies include concepts, relations ... -
The development of a behavioural video analysis system and a toolbox prototype.
(1996)Behavioural research studies often include a data acquisition process, during which subjects are observed, and the displayed behaviours recorded, and a subsequent analysis process, during which the observed behaviours ... -
The development of a swarm intelligent simulation tool for sugarcane transport logistics systems.
(2008)Transport logistics systems typically evolve as networks over time, which may result in system rigidity and cause changes to become expensive and time consuming. In this study a logistics model, named TranSwarm, was ... -
Devising a common vocabulary for a knowledge management university intranet.
(2003)For the past few years, the University of Natal has been using an HTML-driven InnerWeb as its intranet system. The advantages of database driven intranet technologies over static HTML pages are now well established. It was ... -
Discrete particle swarm optimization for combinatorial problems with innovative applications.
(2016)Abstract available in PDF file. -
Evaluation of a new online learning resource : the human computer interface design.
(2003)With the increasing demand for online learning, well-designed computer online learning resources are indispensable. User interfaces evaluation has become a critical quality attribute of interactive software intended ... -
An evaluation of depth camera-based hand pose recognition for virtual reality systems.
(2018)Camera-based hand gesture recognition for interaction in virtual reality systems promises to provide a more immersive and less distracting means of input than the usual hand-held controllers. It is unknown if a camera ... -
Executive information systems usage : the impact of web-based technologies.
(2002)Executive Information Systems (EIS) grew out ofthe information needs of top executives. The recent literature reports that EIS usage has spread throughout organisations. Web-based technologies are causing a revisit of ... -
Extending classical reasoning for classification queries over ontologies.
(2016)Ontologies are used within Knowledge Representation and Reasoning (KRR) to represent a domain of interest and to assert specific knowledge about the domain. This is done through a class hierarchy and explicit syntactic ... -
Face recognition with Eigenfaces : a detailed study.
(2012)With human society becoming increasingly computerised, the use of biometrics to automatically establish the identity of an individual is of great interest in a wide variety of applications. Facial appearance is an appealing ... -
Foundational ontology interchangeability with the Repository of Ontologies for MULltiple USes (ROMULUS).
(2013)The notion behind foundational ontologies is to have a single foundational ontology to serve as a basis for providing high-level entities and relations that are common between all ontologies in or- der to facilitate ... -
Fusion of face and iris biometrics in security verification systems.
(2016)Abstract available in PDF file. -
Gabor filter parameter optimization for multi-textured images : a case study on water body extraction from satellite imagery.
(2012)The analysis and identification of texture is a key area in image processing and computer vision. One of the most prominent texture analysis algorithms is the Gabor Filter. These filters are used by convolving an image ... -
Handwritten signature verification using locally optimized distance-based classification.
(2012)Although handwritten signature verification has been extensively researched, it has not achieved optimum accuracy rate. Therefore, efficient and accurate signature verification techniques are required since signatures are ... -
Hybrid component-based face recognition.
(2018)Facial recognition (FR) is the trusted biometric method for authentication. Compared to other biometrics such as signature; which can be compromised, facial recognition is non-intrusive and it can be apprehended at a ... -
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
(2014)Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ... -
An interpretive study of software risk management perspectives.
(2002)This dissertation addresses risk management in the software development context. The discussion commences with the risks in software development and the necessity for a software risk management process. The emergent discourse ... -
An investigation of multi-label classification techniques for predicting HIV drug resistance in resource-limited settings.
(2014)South Africa has one of the highest HIV infection rates in the world with more than 5.6 million infected people and consequently has the largest antiretroviral treatment program with more than 1.5 million people on ... -
Investigation of techniques for automatic polyphonic music transcription using wavelets.
(2009)It has been said (although sadly I have no source) that music is one of the most useful yet useless phenomena known to mankind. Useless in that it has, apparently, no tangible or immediately practical function in our lives, ...