Search
Now showing items 61-70 of 81
Identification and reconstruction of bullets from multiple x-rays
(2004)
The 3D shape and position of objects inside the human body are commonly detected using Computed Tomography (CT) scanning. CT is an expensive diagnostic option in economically disadvantaged areas and the radiation dose ...
Intelligent detection of anomalies in telecommunications customer behaviour
(2006)
In this research, we present a modelling technique that can efficiently facilitate anomaly detection that will help call analysts and managers with adaptive decision-making. We developed and implemented a Data 'fransformation ...
A hardware testbed for measuring IEEE 802.11g DCF performance
(2009)
The Distributed Coordination Function (DCF) is the oldest and most widely-used IEEE 802.11 contention-based channel access control protocol. DCF adds a significant amount of overhead in the form of preambles, frame headers, ...
High-level control of agent-based crowds by means of general constraints
(2009)
The use of computer-generated crowds in visual effects has grown tremendously since the warring armies of virtual ores and elves were seen in The Lord of the Rings. These crowds are generated by agent-based simulations, ...
A transaction assurance framework for web services
(2007)
Trust assurances for customers of online transactions is an important, but not well implemented concept for the growth of confidence in electronic transactions. In an online world where customers do not personally know the ...
Fast and accurate visibility preprocessing
(2003)
Currently, the standard approach to visibility preprocessing algorithms is to use a form of approximate solution, known as conservative culling. Such algorithms over-estimate the set of visible polygons. This compromise ...
Learning in a virtual world : expanding activity theory for the design and evaluation of group praxis
(2008)
This text responds to the increasing demand for frameworks to support the design and evaluation of virtual worlds which are effective in their particular learning context by developing, a meta-theoretical framework for ...
The design of an intelligent parking system using wireless sensor networks and multi-protocol label switching
(2009)
The challenge of parking management has increasingly posed the need for smart solutions. Motorists in today's busy world seek the best option in locating available parking points. The need for an efficient parking system ...
Automated stock trading : a multi-agent, evolutionary approach
(2008)
Stock market trading has garnered much interest over the past few decades as it has been made easier for the general public to trade. It is certainly an avenue for wealth growth, but like all risky undertakings, it must ...
Co-present photo sharing on mobile devices
(2008)
This dissertation researches current approaches to photo sharing. We have found that most current methods of photo sharing are not as compelling as traditional photo sharing - with the increasing in popularity of digital ...