Browsing Dept. of Computer Science by Title

Now showing items 11-30 of 311

  • Adapting a novel public display system for an educational context 

    Pedzai, Calvin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)
    Universities in developing nations are viewed as gateways to global knowledge and as the source of human capital for their countries' economies (Juma, 2008). However, these universities face challenges in accessing educational ...

  • An adaptive agent architecture for exogenous data sales forecasting 

    Jedeikin, Jonathan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    In a world of unpredictability and complexity, sales forecasting is becoming recognised as essential to operations planning in business and industry. With increased globalisation and higher competition, more products are ...

  • Adaptive Bayesian Agents: Enabling distributed social networks 

    Potgieter, A (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    This article brings together two views of organisations: resource-based theories (RBT) and social network analysis (SNA). Resource-based theories stress the importance of tangible assets, as well as less tangible ones, ...

  • An Adjectival Interface for procedural content generation 

    Hultquist, Carl (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2008)
    In this thesis, a new interface for the generation of procedural content is proposed, in which the user describes the content that they wish to create by using adjectives. Procedural models are typically controlled by ...

  • Adoption of a visual model for temporal database representation 

    Shunmugam, Tamindran (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2016)
    Today, in the world of information technology, conceptual model representation of database schemas is challenging for users both in the Software Development Life Cycle (SDLC) and the Human-Computer Interaction (HCI) domain. ...

  • Advancing security information and event management frameworks in managed enterprises using geolocation 

    Khan, Herah Anwar (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    Security Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval ...

  • An agent based layered framework to facilitate intelligent Wireless Sensor Networks 

    Scholtz, Andre (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2011)
    Wireless Sensor Networks (WSNs) are networks of small, typically low-cost hardware devices which are able to sense various physical phenomenon in their surrounding environments. These simple nodes are also able to perform ...

  • Algorithms for efficiently and effectively matching agents in microsimulations of sexually transmitted infections 

    Geffen, Nathan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2018)
    Mathematical models of the HIV epidemic have been used to estimate incidence, prevalence and life-expectancy, as well the benefits and costs of public health interventions, such as the provision of antiretroviral treatment. ...

  • An empirical evaluation of evolutionary controller design methods for collective gathering task 

    Jang, Jae (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    This research aims to evaluate the performance of evolutionary controller design methods for developing a collective behaviour for a team of robots. The methods tested in this research are NEAT which is capable of finding ...

  • Analytical differentiation by computer using a Symmetrical List Processor 

    Lichtman, Barry Martin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1972)
    The Symmetrical List Processor SLIP; developed by Professor Joseph Weizenbaum of MIT, was implemented with considerable modifications and additions on the University of Cape Town computer. A package to perform automated ...

  • Analytical performance evaluation of concurrent communicating systems using SLD and stochastic Petri nets 

    Kabutz, Heinz Max (University of Cape TownFaculty of ScienceDepartment of Computer Science, 1997)
    In this thesis, the performance analysis of SDL with a new type of stochastic Petri net is described. This new net is called SDL-net. The Concurrent Communicating System is described, and the need for qualitative and ...

  • Analyzing storage system workloads 

    Sikalinda, Paul (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2006)
    Analysis of storage system workloads is important for a number of reasons. The analysis might be performed to understand the usage patterns of existing storage systems. It is very important for the architects to understand ...

  • Analyzing the impact of mobile technology on mobile-centric youth in South Africa 

    Allen, Sena Lee (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Our research documents the successful development of a system for stakeholders in the low-income urban environment, to facilitate the dissemination of information through enhanced mobile technology. The research project ...

  • Anomaly detection and prediction of human actions in a video surveillance environment 

    Spasic, Nemanja (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2007)
    World wide focus has over the years been shifting towards security issues, not in least due to recent world wide terrorist activities. Several researchers have proposed state of the art surveillance systems to help with ...

  • APIC: A method for automated pattern identification and classification 

    Goss, Ryan Gavin (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    Machine Learning (ML) is a transformative technology at the forefront of many modern research endeavours. The technology is generating a tremendous amount of attention from researchers and practitioners, providing new ...

  • An application of brain-based education principles with ICT as a cognitive tool: a case study of grade 6 decimal instruction at Sunlands Primary School 

    Le Roux, Zelda Joy (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2015)
    The larger population of South African learners do not learn effectively and struggle with low academic achievements currently. This can be attributed to various factors such as frequent changes in the curriculum, ...

  • An architecture for secure searchable cloud storage 

    Koletka, Robert (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...

  • Assessing the suitability of user centric design methods when applied in a developing world context 

    Maunder, Andrew James (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2010)
    The application of information and communication technologies to development (ICT4Dev) is widely believed to have the potential to improve livelihoods in developing regions. Within the field of HCI, it is recognised that ...

  • Attack analysis of cryptographic protocols using strand spaces 

    Lukell, S A (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2003)
    Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...

  • Augmenting security event information with contextual data to improve the detection capabilities of a SIEM 

    Bissict, Jason (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2017)
    The increasing number of cyber security breaches have revealed a need for proper cyber security measures. The emergence of the internet and the increase in overall connectivity means that data is more easily accessible and ...