University of Cape Town: Recent submissions

Now showing items 181-200 of 311

  • Evaluation of the usability and usefulness of automatic speech recognition among users in South Africa 

    Florence, Idowu Modupeola (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2011)
    An automatic speech recognition (ASR) system is a software application which recognizes human speech, processes it as input, and displays a text version of the speech as output or uses the input as commands for another ...

  • Performance benchmarking physical and virtual linux envrionments 

    Fisher, Mario (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Virtualisation is a method of partitioning one physical computer into multiple "virtual" computers, giving each the appearance and capabilities of running on its own dedicated hardware. Each virtual system functions as a ...

  • Drivable region detection for autonomous robots applied to South African underground mining 

    Falola, Omowunmi Elizabeth (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    This dissertation focuses on enhancing autonomous robots' capability to identify drivable regions in underground terrains. A system model that compares the drivability analysis of underground terrains using the entropy ...

  • Active shape model segmentation of Brain structures in MR images of subjects with fetal alcohol spectrum disorder 

    Eicher, Anton (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)
    Fetal Alcohol Spectrum Disorder (FASD) is the most common form of preventable mental retardation worldwide. This condition affects children whose mothers excessively consume alcohol whilst pregnant. FASD can be identified ...

  • Voxel-space shape grammars 

    Crumley, Zacharia (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    The field of Procedural Generation is being increasingly used in modern content generation for its ability to significantly decrease the cost and time involved. One such area of Procedural Generation is Shape Grammars, a ...

  • Analyzing the impact of mobile technology on mobile-centric youth in South Africa 

    Allen, Sena Lee (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Our research documents the successful development of a system for stakeholders in the low-income urban environment, to facilitate the dissemination of information through enhanced mobile technology. The research project ...

  • Viaduct : an interactive, very-high-level data manipulation language for a microcomputer-based database system. 

    Wood, Peter Theodore (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1982)
    A very-high-level data manipulation language for a database system is one in which the user specifies in non-procedural terms the operations that are to be performed on the data stored in the database; the actual method ...

  • Facilitating the modelling and automated analysis of cryptographic protocols 

    Saul, Elton (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence ...

  • Investigating cost effective communication alternatives for geographically hostile regions 

    Yavwa, Yakomba (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2001)
    The lack of communication facilities in developing countries is a constraint to social, political and economic empowerment of the people. However, advances in technology promise to deliver voice, video and data communication ...

  • Bisimulation as a verification and validation technique for message sequence charts 

    Wall, Philip Gerhard (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)
    The complexity of determining whether a system meets the requirements of its designers has increased with the widespread use of real time concurrent systems. This testing process has however been simplified with the emergence ...

  • Distributed analysis of Markov chains 

    Mestern, Mark Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)
    This thesis examines how parallel and distributed algorithms can increase the power of techniques for correctness and performance analysis of concurrent systems. The systems in question are state transition systems from ...

  • A GPU-Based level of detail system for the real-time simulation and rendering of large-scale granular terrain 

    Leach, Craig (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    Real-time computer games and simulations often contain large virtual outdoor environments. Terrain forms an important part of these environments. This terrain may consist of various granular materials, such as sand, rubble ...

  • Bottom-up evaluation of HiLog in the context of deductive database systems 

    Luppnow, Andrew James (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)
    HiLog is a logic-based language which boasts the expressiveness of a higher-order syntax while retaining the simplicity of a first-order semantics. This work examines the suitability of Horn-clause HiLog as a query language ...

  • Pattern recognition and the nondeterminable affine parameter problem 

    Geffen, Nathan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)
    This thesis reports on the process of implementing pattern recognition systems using classification models such as artificial neural networks (ANNs) and algorithms whose theoretical foundations come from statistics. The ...

  • Distributed shared memory for virtual environments 

    Godfrey, Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1997)
    This work investigated making virtual environments easier to program, by designing a suitable distributed shared memory system. To be usable, the system must keep latency to a minimum, as virtual environments are very ...

  • High-level control of agent-based crowds by means of general constraints 

    Jacka, David (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    The use of computer-generated crowds in visual effects has grown tremendously since the warring armies of virtual ores and elves were seen in The Lord of the Rings. These crowds are generated by agent-based simulations, ...

  • Visualizing the memory performance of parallel programs with Chiron 

    Polzin, Dieter Wilhelm (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1996)
    This thesis describes Chiron, visualization system which helps programmers detect memory system bottlenecks in their shared-memory parallel applications. Chiron is different from most other performance debugging tools in ...

  • A hardware testbed for measuring IEEE 802.11g DCF performance 

    Symington, Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    The Distributed Coordination Function (DCF) is the oldest and most widely-used IEEE 802.11 contention-based channel access control protocol. DCF adds a significant amount of overhead in the form of preambles, frame headers, ...

  • Lattice Boltzmann liquid simulations on graphics hardware 

    Clough, Duncan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    Fluid simulation is widely used in the visual effects industry. The high level of detail required to produce realistic visual effects requires significant computation. Usually, expensive computer clusters are used in order ...

  • Scalable attack modelling in support of security information and event management 

    Dennie, Keiran (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...