Masters Degrees (Computer Science)
Recent Submissions
-
Network intrusion detection using genetic programming.
(2018)Network intrusion detection is a real-world problem that involves detecting intrusions on a computer network. Detecting whether a network connection is intrusive or non-intrusive is essentially a binary classification ... -
An evaluation of depth camera-based hand pose recognition for virtual reality systems.
(2018)Camera-based hand gesture recognition for interaction in virtual reality systems promises to provide a more immersive and less distracting means of input than the usual hand-held controllers. It is unknown if a camera ... -
Hybrid component-based face recognition.
(2018)Facial recognition (FR) is the trusted biometric method for authentication. Compared to other biometrics such as signature; which can be compromised, facial recognition is non-intrusive and it can be apprehended at a ... -
An analysis of algorithms to estimate the characteristics of the underlying population in Massively Parallel Pyrosequencing data.
(2011)Massively Parallel Pyrosequencing (MPP) is a next generation DNA sequencing technique that is becoming ubiquitous because it is considerably faster, cheaper and produces a higher throughput than long established ... -
Improved techniques for phishing email detection based on random forest and firefly-based support vector machine learning algorithms.
(2014)Electronic fraud is one of the major challenges faced by the vast majority of online internet users today. Curbing this menace is not an easy task, primarily because of the rapid rate at which fraudsters ... -
An analysis of approaches for developing national health information systems : a case study of two sub-Saharan African countries.
(2016)Health information systems in sub-Saharan African countries are currently characterized by significant fragmentation, duplication and limited interoperability. Incorporating these disparate systems into a coherent national ... -
Component-based ethnicity identification from facial images.
(2017)Abstract available in PDF file. -
On the performance of metaheuristics for the blood platelet production and inventory problem.
(2016)Abstract available in PDF file. -
On the sample consensus robust estimation paradigm: comprehensive survey and novel algorithms with applications.
(2016)This study begins with a comprehensive survey of existing variants of the Random Sample Consensus (RANSAC) algorithm. Then, five new ones are contributed. RANSAC, arguably the most popular robust estimation algorithm in ... -
Q-Cog: a Q-Learning based cognitive agent architecture for complex 3D virtual worlds.
(2017)Intelligent cognitive agents should be able to autonomously gather new knowledge and learn from their own experiences in order to adapt to a changing environment. 3D virtual worlds provide complex environments in which ... -
Fusion of face and iris biometrics in security verification systems.
(2016)Abstract available in PDF file. -
Application of artificial intelligence for detecting derived viruses.
(2017)A lot of new viruses are being created each and every day. However, some of these viruses are not completely new per se. Most of the supposedly ‘new’ viruses are not necessarily created from scratch with completely new ... -
On common fixed points approximation of countable families of certain multi-valued maps in hilbert spaces.
(2017)Fixed point theory and its applications have been widely studied by many researchers. Di erent iterative algorithms have been used extensively to approximate solutions of xed point problems and other related problems ... -
Discrete particle swarm optimization for combinatorial problems with innovative applications.
(2016)Abstract available in PDF file. -
Automatic lung segmentation using graph cut optimization.
(2015)Medical Imaging revolutionized the practice of diagnostic medicine by providing a means of visualizing the internal organs and structure of the body. Computer technologies have played an increasing role in the acquisition ... -
Client-side encryption and key management: enforcing data confidentiality in the cloud.
(2016)Cloud computing brings flexible, scalable and cost effective services. This is a computing paradigm whose services are driven by the concept of virtualization and multi-tenancy. These concepts bring various attractive ... -
On modeling and optimisation of air Traffic flow management problem with en-route capacities.
(2016)The air transportation industry in the past ten years witnessed an upsurge with the number of passengers swelling exponentially. This development has seen a high demand in airport and airspace usage, which consequently ... -
Satellite remote sensing of particulate matter and air quality assessment in the Western Cape, South Africa.
(2016)Particulate Matter (PM) is a health risk, even at low ambient concentrations in the atmosphere. The analysis of ambient PM is important in air quality management in South Africa in order to suggest recommendations for ... -
Extending classical reasoning for classification queries over ontologies.
(2016)Ontologies are used within Knowledge Representation and Reasoning (KRR) to represent a domain of interest and to assert specific knowledge about the domain. This is done through a class hierarchy and explicit syntactic ...