Browsing Computer Science by Type "Thesis"

Browsing Computer Science by Type "Thesis"

Sort by: Order: Results:

  • Antwi-Boasiako, Albert (University of Pretoria, 2018)
    Riding on the tide of the current development in computing and internet technologies, criminals have transitioned to the use of computer systems and digital channels to commit crimes. This transformation of crime requires ...
  • Du Plessis, M.C. (Mathys Cornelius) (University of Pretoria, 2012-09-27)
    Dynamic optimisation problems are problems where the search space does not remain constant over time. Evolutionary algorithms aimed at static optimisation problems often fail to effectively optimise dynamic problems. The ...
  • Coetzee, Serena Martha (University of Pretoria, 2009-10-08)
    The concept of grid computing has permeated all areas of distributed computing, changing the way in which distributed systems are designed, developed and implemented. At the same time ‘geobrowsers’, such as Google Earth, ...
  • Harrison, Kyle Robert (University of Pretoria, 2018-07)
    The particle swarm optimization (PSO) algorithm is a stochastic, population-based optimization technique influenced by social dynamics. It has been shown that the performance of the PSO algorithm can be greatly improved ...
  • Van den Bergh, Frans (University of Pretoria, 2007-05-19)
    Many scientific, engineering and economic problems involve the optimisation of a set of parameters. These problems include examples like minimising the losses in a power grid by finding the optimal configuration of the ...
  • Constantinou, Demetrakis (University of Pretoria, 2010)
    A mobile ad hoc network (MANET) is an infrastructure-less multi-hop network where each node communicates with other nodes directly or indirectly through intermediate nodes. Thus, all nodes in a MANET basically function as ...
  • Padayachee, Keshnee (University of Pretoria, 2010-09-16)
    With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis is on "people, not processes". Likewise, access control ...
  • De Ridder, Corne (University of Pretoria, 2019)
    This work is a significant extension of earlier research that was conducted in fulfilment of the requirements of an MSc degree in Computer Science at the University of Pretoria. The MSc research verified the hypothesis: ...
  • Sanders, Ian Douglas (University of Pretoria, 2005-10-17)
    Visibility, guarding and polygon decomposition are problems in the field of compu¬tational geometry which have roots in real world applications. These problems have been the focus of much research over a number of years. ...
  • Loock, Marianne (University of Pretoria, 2012)
    Organisations that seek a competitive advantage cannot afford to compromise their brand reputation or expose it to disrepute. When employees leek information, it is not only the breach of confidentiality that is a problem, ...
  • Malan, Katherine Mary (University of Pretoria, 2014)
    Real-world optimisation problems are often very complex. Population-based metaheuristics, such as evolutionary algorithms and particle swarm optimisation (PSO) algorithms, have been successful in solving many of these ...
  • Dlamini, Moses Thandokuhle (University of Pretoria, 2020)
    The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their ...
  • Valjarevic, Aleksandar (University of Pretoria, 2015)
    Recent decades have seen a significant increase in the importance of the field of digital forensics as a result of the rapid development of information and communication technologies and their penetration into every ...
  • Watson, Bruce William (University of Pretoria, 2010)
    This thesis is submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Ph.D) in the FASTAR group of the Department of Computer Science, University of Pretoria, South Africa. I present ...
  • Da Veiga, Adele (University of Pretoria, 2009-04-24)
    The manner in which employees perceive and interact (behave) with controls implemented to protect information assets is one of the main threats to the protection of such assets and the effective use of information security ...
  • Lutu, Patricia Elizabeth Nalwoga (University of Pretoria, 2010-11-15)
    Data mining has become a commonly used method for the analysis of organisational data, for purposes of summarizing data in useful ways and identifying non-trivial patterns and relationships in the data. Given the large ...
  • Khan, S.A. (Salman Ahmad) (University of Pretoria, 2009-10-08)
    Topology design of distributed local area networks (DLANs) can be classified as an NP-hard problem. Intelligent algorithms, such as evolutionary and swarm intelligence techniques, are candidate approaches to address this ...
  • Sibiya, Mhlupheki George (University of Pretoria, 2015)
    Cloud computing is a relatively new computing paradigm that builds upon virtualisation technologies to provide hardware, platforms and software as services over the Internet. The cloud can be deployed in four basic ...
  • Rautenbach, Helperus Ritzema (University of Pretoria, 2012-09-26)
    This thesis focuses on 3D computer graphics and the continuous maximisation of rendering quality and performance. Its main focus is the critical analysis of numerous real-time rendering algorithms and the construction of ...
  • Mohiuddin, Mohammed Aijaz (University of Pretoria, 2018-04)
    In the thesis of “Mohammed Aijaz Mohiuddin”, Engineering Nature-Inspired Heuristics for the Open Shortest Path First Weight Setting Problem, nature inspired heuristics were developed. Besides the existing two objectives, ...