• Login
    Search 
    •   ResearchSpace Home
    • College of Agriculture, Engineering and Science
    • School Mathematics, Statistics and Computer Science
    • Computer Science
    • Search
    •   ResearchSpace Home
    • College of Agriculture, Engineering and Science
    • School Mathematics, Statistics and Computer Science
    • Computer Science
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 89

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Techniques and countermeasures of TCP/IP OS fingerprinting on Linux Systems 

    Stopforth, Riaan. (2007)
    Port scanning is the first activity an attacker pursues when attempting to compromise a target system on a network. The aim is to gather information that will result in identifying one or more vulnerabilities in that system. ...
    Thumbnail

    Artificial neural networks for image recognition : a study of feature extraction methods and an implementation for handwritten character recognition. 

    Moodley, Deshendran. (1996)
    The use of computers for digital image recognition has become quite widespread. Applications include face recognition, handwriting interpretation and fmgerprint analysis. A feature vector whose dimension is much lower ...
    Thumbnail

    RAT online : design, delivery and evaluation of constructivist computer supported martial arts learning environments. 

    Yates, Steven. (2011)
    This thesis describes the evaluation of several computer supported martial arts learning environments. These learning environments were designed, developed and implemented for practitioners of Rough and Tumble (RAT), a ...
    Thumbnail

    Qualitative and structural analysis of video sequences. 

    Brits, Alessio. (2013-10-17)
    This thesis analyses videos in two distinct ways so as to improve both human understanding and the computer description of events that unfold in video sequences. Qualitative analysis can be used to understand a scene in ...
    Thumbnail

    The development of a swarm intelligent simulation tool for sugarcane transport logistics systems. 

    McDonald, Brendon Clyde. (2013-11-14)
    Transport logistics systems typically evolve as networks over time, which may result in system rigidity and cause changes to become expensive and time consuming. In this study a logistics model, named TranSwarm, was ...
    Thumbnail

    Application of genetic algorithms to the travelling salesperson problem. 

    McKenzie, Peter John Campbell. (1996)
    Genetic Algorithms (GAs) can be easily applied to many different problems since they make few assumptions about the application domain and perform relatively well. They can also be modified with some success for handling ...
    Thumbnail

    A real time, system independent, secure, Internet based auctioning system. 

    Brown, Cuan. (2000)
    This thesis outlines the creation of a secure, real time, system independent, Internet based auctioning application. The system has been developed to meet the needs of today's stringent reqUirements on secure Internet ...
    Thumbnail

    The investigation into an algorithm based on wavelet basis functions for the spatial and frequency decomposition of arbitrary signals. 

    Goldstein, Hilton. (1994)
    The research was directed toward the viability of an O(n) algorithm which could decompose an arbitrary signal (sound, vibration etc.) into its time-frequency space. The well known Fourier Transform uses sine and cosine ...
    Thumbnail

    An interpretive study of software risk management perspectives. 

    Padayachee, Keshnee. (2002)
    This dissertation addresses risk management in the software development context. The discussion commences with the risks in software development and the necessity for a software risk management process. The emergent discourse ...
    Thumbnail

    Neural network assisted software engineered refractive fringe diagnostic of spherical shocks. 

    Kistan, Trevor. (1996)
    A shock is essentially a propagating variation in the pressure or density of a medium. If the medium is transparent, such as air, and the shock radially symmetric, the refractive fringe diagnostic can be used to examine ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 9

    DSpace software copyright © 2002-2013  Duraspace
    Contact Us | Send Feedback
    Theme by 
    @mire NV
     

     

    Browse

    All of ResearchSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsAdvisorsTypeThis CommunityBy Issue DateAuthorsTitlesSubjectsAdvisorsType

    My Account

    LoginRegister

    Discover

    AuthorMoodley, Deshendran. (2)Pillay, Nelishia. (2)Adeleke, Jude Adekunle. (1)Ajibola, Ariyo Sunday. (1)Akinyelu, Ayobami Andronicus. (1)Alochukwu, Alex Somto Arinze. (1)Andronicus, Ayobami Akinyelu. (1)Angulu, Raphael. (1)Anuoluwapo, Abass Hammed. (1)Asiru, Omotayo Fausat. (1)... View MoreSubjectTheses--Computer science. (54)Theses - Computer Science. (18)Algorithms. (8)Computer vision. (5)Artificial intelligence. (4)Combinatorial optimization. (4)Biometric identification. (3)Computer-assisted instruction. (3)Genetic algorithms. (3)Genetic programming (Computer science) (3)... View MoreDate Issued2010 - 2018 (53)2000 - 2009 (21)1990 - 1999 (15)Has File(s)
    true (89)

    DSpace software copyright © 2002-2013  Duraspace
    Contact Us | Send Feedback
    Theme by 
    @mire NV