Masters Degrees (Computer Engineering)
Recent Submissions
-
A new automatic repeat request protocol based on Alamouti space-time block code over Rayleigh fading channels.
(2020)Spatial and multiplexing diversity of multiple-input multiple-output (MIMO) schemes improves link reliability and data rates of wireless networks. MIMO-based space-time block codes (STBCs) improve wireless network reliability ... -
Investigating machine and deep-learning model combinations for a two-stage IDS for IoT networks.
(2021)By 2025, there will be upwards of 75 billion IoT devices connected to the internet. Notable security incidents have shown that many IoT devices are insecure or misconfigured, leaving them vulnerable, often with devastating ... -
Machine learning approach to thermite weld defects detection and classification.
(2021)The defects formed during the thermite welding process between two sections of rails require the welded joints to be inspected for quality purpose. The commonly used non-destructive method for inspection is Radiography ... -
Enhanced spectral efficiency schemes for space-time block coded spatial modulation.
(2019)The ever-growing demand for high data rate, low latency and energy efficient transmission schemes has seen an increasing popularity of multiple-input multiple-output (MIMO) scheme. One such scheme is the orthogonal space-time ... -
Smart attendance monitoring system using computer vision.
(2019)Monitoring of student’s attendance remains the fundamental and vital part of any educational institution. The attendance of students to classes can have an impact on their academic performance. With the gradual increase ... -
Error performance analysis of n-ary Alamouti scheme with signal space diversity.
(2018)In this dissertation, a high-rate Alamouti scheme with Signal Space Diversity is developed to improve both the spectral efficiency and overall error performance in wireless communication links. This scheme uses high ... -
Gaussian mixture model classifiers for detection and tracking in UAV video streams.
(2017)Manual visual surveillance systems are subject to a high degree of human-error and operator fatigue. The automation of such systems often employs detectors, trackers and classifiers as fundamental building blocks. Detection, ... -
Hybrid generalized non-orthogonal multiple access for the 5G wireless networks.
(2018)The deployment of 5G networks will lead to an increase in capacity, spectral efficiency, low latency and massive connectivity for wireless networks. They will still face the challenges of resource and power optimization, ... -
Facial expression recognition using covariance matrix descriptors and local texture patterns.
(2017)Facial expression recognition (FER) is a powerful tool that is emerging rapidly due to increased computational power in current technologies. It has many applications in the fields of human-computer interaction, psychological ... -
Hybrid generalized non-orthogonal multiple access for the 5G wireless networks.
(2018)The deployment of 5G networks will lead to an increase in capacity, spectral efficiency, low latency and massive connectivity for wireless networks. They will still face the challenges of resource and power optimization, ... -
Using facial expression recognition for crowd monitoring.
(2017)In recent years, Crowd Monitoring techniques have attracted emerging interest in the eld of computer vision due to their ability to monitor groups of people in crowded areas, where conventional image processing methods ... -
Flat fingerprint classification using a rule-based technique, based on directional patterns and similar points.
(2016)Abstract available in PDF file. -
Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.
(2016)In recent years, there has been a rapid increase in Internet usage, which has in turn led to a rise in malicious network activity. Network Intrusion Detection Systems (NIDS) are tools that monitor network traffic with ... -
Parallel patch-based volumetric reconstruction from images.
(2014)Three Dimensional (3D) reconstruction relates to the creating of 3D computer models from sets of Two Dimensional (2D) images. 3D reconstruction algorithms tend to have long execution times, meaning they are ill suited ... -
Fusion of time of flight (ToF) camera's ego-motion and inertial navigation.
(2013)For mobile robots to navigate autonomously, one of the most important and challenging task is localisation. Localisation refers to the process whereby a robot locates itself within a map of a known environment or with ... -
Granting privacy and authentication in mobile ad hoc networks.
(2012)The topic of the research is granting privacy and authentication in Mobile Ad Hoc Networks (MANETs) that are under the authority of a certificate authority (CA) that is often not available. Privacy is implemented in the ... -
Fingerprint identification using distributed computing.
(2012)Biometric systems such as face, palm and fingerprint recognition are very computationally expensive. The ever growing biometric database sizes have posed a need for faster search algorithms. High resolution images are ... -
Volumetric reconstruction of rigid objects from image sequences.
(2012)Live video communications over bandwidth constrained ad-hoc radio networks necessitates high compression rates. To this end, a model based video communication system that incorporates flexible and accurate 3D modelling ... -
Investigation of virtual learning behaviour in an Eastern Cape high school biology course.
(2003)Transformation in education over the decades has failed to keep abreast of the rapidly advancing technological environment of modern society. This implies that curricula, learning paradigms and tools employed by educational ...