Search
Now showing items 71-80 of 108
Computational intelligent systems : evolving dynamic Bayesian networks
(2009)
In this thesis, a new class of temporal probabilistic modelling, called evolving dynamic Bayesian networks (EDBN), is proposed and demonstrated to make technology easier so as to accommodate both experts and non-experts, ...
Photo searching on small screen devices
(2007)
The aim of this thesis is to improve HCI (Human-Computer Interaction) knowledge in the design of the next generation of photo search tools on small display devices. Today, these devices have all the ingredients for a truly ...
Simulating raid storage systems for performance analysis
(2007)
Redundant Array of Independent Disks (RAID) provides an inexpensive, fault-tolerant storage solution using commodity hard-drives. RAID storage systems have recently surged in popularity amongst enterprise clients, as they ...
The design and evaluation of a Java image analysis tool for componentizing lines from digitial architectural floor plans
(2006)
This research set out to determine the feasibility of using Java to create a tool that could perform paper-to-electronic format conversion by vectorizing the lines in a raster image of an architectural floor plan. The tool ...
Peer-to-peer systems for simple and flexible information sharing
(2009)
Peer to peer computing (P2P) is an architecture that enables applications to access shared resources, with peers having similar capabilities and responsibilities. The ubiquity of P2P computing and its increasing adoption ...
Schema matching in a peer-to-peer database system
(2006)
Peer-to-peer or P2P systems are applications that allow a network of peers to share resources in a scalable and efficient manner. My research is concerned with the use of P2P systems for sharing databases. To allow data ...
Identification and reconstruction of bullets from multiple x-rays
(2004)
The 3D shape and position of objects inside the human body are commonly detected using Computed Tomography (CT) scanning. CT is an expensive diagnostic option in economically disadvantaged areas and the radiation dose ...
Intelligent detection of anomalies in telecommunications customer behaviour
(2006)
In this research, we present a modelling technique that can efficiently facilitate anomaly detection that will help call analysts and managers with adaptive decision-making. We developed and implemented a Data 'fransformation ...
A hardware testbed for measuring IEEE 802.11g DCF performance
(2009)
The Distributed Coordination Function (DCF) is the oldest and most widely-used IEEE 802.11 contention-based channel access control protocol. DCF adds a significant amount of overhead in the form of preambles, frame headers, ...