Browsing Dept. of Computer Science by Title
Now showing items 21-40 of 311
-
Analytical performance evaluation of concurrent communicating systems using SLD and stochastic Petri nets
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 1997)In this thesis, the performance analysis of SDL with a new type of stochastic Petri net is described. This new net is called SDL-net. The Concurrent Communicating System is described, and the need for qualitative and ...
-
Analyzing storage system workloads
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)Analysis of storage system workloads is important for a number of reasons. The analysis might be performed to understand the usage patterns of existing storage systems. It is very important for the architects to understand ...
-
Analyzing the impact of mobile technology on mobile-centric youth in South Africa
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)Our research documents the successful development of a system for stakeholders in the low-income urban environment, to facilitate the dissemination of information through enhanced mobile technology. The research project ...
-
Anomaly detection and prediction of human actions in a video surveillance environment
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)World wide focus has over the years been shifting towards security issues, not in least due to recent world wide terrorist activities. Several researchers have proposed state of the art surveillance systems to help with ...
-
APIC: A method for automated pattern identification and classification
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)Machine Learning (ML) is a transformative technology at the forefront of many modern research endeavours. The technology is generating a tremendous amount of attention from researchers and practitioners, providing new ...
-
An application of brain-based education principles with ICT as a cognitive tool: a case study of grade 6 decimal instruction at Sunlands Primary School
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)The larger population of South African learners do not learn effectively and struggle with low academic achievements currently. This can be attributed to various factors such as frequent changes in the curriculum, ...
-
An architecture for secure searchable cloud storage
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...
-
Assessing the suitability of user centric design methods when applied in a developing world context
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)The application of information and communication technologies to development (ICT4Dev) is widely believed to have the potential to improve livelihoods in developing regions. Within the field of HCI, it is recognised that ...
-
Attack analysis of cryptographic protocols using strand spaces
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...
-
Augmenting security event information with contextual data to improve the detection capabilities of a SIEM
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)The increasing number of cyber security breaches have revealed a need for proper cyber security measures. The emergence of the internet and the increase in overall connectivity means that data is more easily accessible and ...
-
Automated stock trading : a multi-agent, evolutionary approach
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2008)Stock market trading has garnered much interest over the past few decades as it has been made easier for the general public to trade. It is certainly an avenue for wealth growth, but like all risky undertakings, it must ...
-
An automatic marker for vector graphics drawing tasks
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)In recent years, the SVG file format has grown increasingly popular, largely due to its widespread adoption as the standard image format for vector graphics on the World Wide Web. However, vector graphics predate the modern ...
-
Automating user privacy policy recommendations in social media
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)Most Social Media Platforms (SMPs) implement privacy policies that enable users to protect their sensitive information against privacy violations. However, observations indicate that users find these privacy policies ...
-
Bisimulation as a verification and validation technique for message sequence charts
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)The complexity of determining whether a system meets the requirements of its designers has increased with the widespread use of real time concurrent systems. This testing process has however been simplified with the emergence ...
-
Bottom-up evaluation of HiLog in the context of deductive database systems
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 1998)HiLog is a logic-based language which boasts the expressiveness of a higher-order syntax while retaining the simplicity of a first-order semantics. This work examines the suitability of Horn-clause HiLog as a query language ...
-
Bridging the digital divide in African post-conflict countries : a case study of the DRC cities of Kinshasa and Kananga
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)The digital divide is largely seen as the main problem that developing economies and societies must overcome to gain economic productivity and social welfare. In this document we state that modern western perception of the ...
-
Bridging the digital divide in African post-conflict countries: a case study of the DRC cities in Kinshasa and Kananga
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)The digital divide is largely seen as the main problem that developing economies and societies must overcome to gain economic productivity and social welfare. In this document we state that modern western perception of the ...
-
Building heritage collections using games on social networks
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)An application on a social network may provide a means to avoid the cost, decrease time and increase scale of operation of heritage preservation by motivating users to supply and process the data. This project uses a ...
-
Can health workers capture data using a generic mobile phone with sufficient accuracy for Capture at Source to be used for clinical research purposes?
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)Objective: To determine the accuracy, measured by error rate, with which Clinical Research Workers (CRWs), with minimal experience in data entry, could capture data on a feature phone during an interview using two different ...
-
A capacity limited, cognitive constructionist model of virtual presence
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)The capacity Limited, Cognitive Constructionist (CLCC) model of presence is proposed as an information processing model of presence, which is demonstrated to have more theoretical power than extant models. The CLCC model ...