University of Cape Town: Recent submissions

Now showing items 21-40 of 311

  • Accelerating point cloud cleaning 

    Mulder, Rickert (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    Capturing the geometry of a large heritage site via laser scanning can produce thousands of high resolution range scans. These must be cleaned to remove unwanted artefacts. We identified three areas that can be improved ...

  • Investigating the potential for a user-driven electricity monitoring application to provide useful electricity consumption patterns 

    Mantel, Jessica Kirsten (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    Conventional electricity usage monitoring involves complex data collection via costly and intrusive hardware installation. There is a perceived need for a simple and affordable tool that provides users with feedback about ...

  • A highly accessible application for detection and classification of maize foliar diseases from leaf images 

    Khethisa, Joang Adolf (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    Crop diseases are a major impediment to food security in the developing world. The development of cheap and accurate crop diagnosis software would thus be of great benefit to the farming community. A number of previous ...

  • Ubiquitous intelligence for smart cities: a public safety approach 

    Isafiade, Omowunmi Elizabeth (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    Citizen-centered safety enhancement is an integral component of public safety and a top priority for decision makers in a smart city development. However, public safety agencies are constantly faced with the challenge of ...

  • Augmenting security event information with contextual data to improve the detection capabilities of a SIEM 

    Bissict, Jason (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    The increasing number of cyber security breaches have revealed a need for proper cyber security measures. The emergence of the internet and the increase in overall connectivity means that data is more easily accessible and ...

  • High fidelity compression of irregularly sampled height fields 

    Marais, Patrick (University of Cape TownFaculty of ScienceDept. of Computer Science, 2007)
    This paper presents a method to compress irregularly sampled height-fields based on a multi-resolution framework. Unlike many other height-field compression techniques, no resampling is required so the original height-field ...

  • X-Switch: An Efficient Multi-User Multi-Language Web Application Server. 

    Nyirenda, Mayumbo (University of Cape TownFaculty of ScienceDept. of Computer Science, 2010)
    Web applications are usually installed on and accessed through a Web server. For security reasons, these Web servers generally provide very few privileges to Web applications, defaulting to executing them in the realm of ...

  • A Balanced Approach to IT Project Management 

    Smith, Derek (University of Cape TownFaculty of CommerceDept. of Information Systems, 2007)
    The primary objectives of this study were to identify how IT projects can be managed using the Balanced Scorecard approach. Although the research is positioned to have potential application within international project ...

  • Inclination of scholars to major in information systems or computer science 

    Seymour, Lisa (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2005)
    This paper describes a survey of 497 final year scholars at schools in the Western Cape, South Africa. They were asked about their inclination to study information systems (IS) or computer science (CS), their knowledge of ...

  • Investigating image processing algorithms for provision of information in rock art sites using mobile devices 

    Olojede, Ayodeji (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    The term cultural heritage spaces incorporates places, objects and practices of cultural and historical significance. Examples include the Southern African rock art heritage sites. Rock art is an archaeological term used ...

  • An automatic marker for vector graphics drawing tasks 

    Bunn, Tristan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    In recent years, the SVG file format has grown increasingly popular, largely due to its widespread adoption as the standard image format for vector graphics on the World Wide Web. However, vector graphics predate the modern ...

  • Investigating prediction modelling of academic performance for students in rural schools in Kenya 

    Mgala, Mvurya (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Academic performance prediction modelling provides an opportunity for learners' probable outcomes to be known early, before they sit for final examinations. This would be particularly useful for education stakeholders to ...

  • Natural language interface to relational database: a simplified customization approach 

    Mvumbi, Tresor (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Natural language interfaces to databases (NLIDB) allow end-users with no knowledge of a formal language like SQL to query databases. One of the main open problems currently investigated is the development of NLIDB systems ...

  • Design and optimisation of a low cost Cognitive Mesh Network 

    Nleya, Sindiso M (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Wireless Mesh Networks (WMNs) have been touted as the most promising wireless technology in providing high-bandwidth Internet access to rural, remote and under-served areas, with relatively lower investment cost as compared ...

  • Accelerated deconvolution of radio interferometric images using orthogonal matching pursuit and graphics hardware 

    Van Belle, Jonathan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Deconvolution of native radio interferometric images constitutes a major computational component of the radio astronomy imaging process. An efficient and robust deconvolution operation is essential for reconstruction of ...

  • Understanding merchant adoption of m-payments in South Africa 

    Kalan, Anesh (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Despite the proliferation of mobile communication technology and smartphone adoption, a number of barriers, most notably trust and security, and the lack of critical mass, have slowed the uptake of mobile payments (m-payments). ...

  • Parallelisation of algorithms 

    Schuilenburg, Alexander Marius (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1990)
    Most numerical software involves performing an extremely large volume of algebraic computations. This is both costly and time consuming in respect of computer resources and, for large problems, often super-computer power ...

  • Attack analysis of cryptographic protocols using strand spaces 

    Lukell, S A (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...

  • Determining the optimal protocols for transfer of large data files 

    van Rooyen, Andrew (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    The transfer of large data files remains a necessity for scientific research, including Bioinformatics, despite alternate solutions like cloud computing. When transferring large files, there are many transfer protocols to ...

  • An empirical evaluation of evolutionary controller design methods for collective gathering task 

    Jang, Jae (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    This research aims to evaluate the performance of evolutionary controller design methods for developing a collective behaviour for a team of robots. The methods tested in this research are NEAT which is capable of finding ...