Now showing items 21-30 of 37
On modeling and optimisation of air Traffic flow management problem with en-route capacities.
The air transportation industry in the past ten years witnessed an upsurge with the number of passengers swelling exponentially. This development has seen a high demand in airport and airspace usage, which consequently ...
An analysis of approaches for developing national health information systems : a case study of two sub-Saharan African countries.
Health information systems in sub-Saharan African countries are currently characterized by significant fragmentation, duplication and limited interoperability. Incorporating these disparate systems into a coherent national ...
Fusion of face and iris biometrics in security verification systems.
Abstract available in PDF file.
A study of evoluntionary perturbative hyper-heuristics for the nurse rostering problem.
Hyper-heuristics are an emerging field of study for combinatorial optimization. The aim of a hyper-heuristic is to produce good results across a set of problems rather than producing the best results. There has been little ...
A study of genetic programming and grammatical evolution for automatic object-oriented programming.
Manual programming is time consuming and challenging for a complex problem. For efficiency of the manual programming process, human programmers adopt the object-oriented approach to programming. Yet, manual programming is ...
Application of artificial intelligence for detecting derived viruses.
A lot of new viruses are being created each and every day. However, some of these viruses are not completely new per se. Most of the supposedly ‘new’ viruses are not necessarily created from scratch with completely new ...
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ...
Q-Cog: a Q-Learning based cognitive agent architecture for complex 3D virtual worlds.
Intelligent cognitive agents should be able to autonomously gather new knowledge and learn from their own experiences in order to adapt to a changing environment. 3D virtual worlds provide complex environments in which ...
Handwritten signature verification using locally optimized distance-based classification.
Although handwritten signature verification has been extensively researched, it has not achieved optimum accuracy rate. Therefore, efficient and accurate signature verification techniques are required since signatures are ...
Unsupervised caries detection in non-standardized bitewing dental X-Rays.
In recent years dental image processing has become a useful tool in aiding healthcare professionals diagnose patients by reducing some of the problems inherent with dental radiographs. Despite advances in the eld, ...