Theses and Dissertations (Computer Science)

Theses and Dissertations (Computer Science)

 

Recent Submissions

  • Pieterse, Vreda (University of Pretoria, 2017)
    The need for storing and retrieving knowledge about algorithms is addressed by creating a specialised information management scheme. This scheme is operationalised in terms of a topic map of algorithms. Metadata are ...
  • Cooper, A.K. (Antony Kyle) (University of Pretoria, 2016)
    This thesis presents an analysis of the nature of volunteered geographical information (VGI) and on its applicability for use in a spatial data infrastructure (SDI) to supplement official and commercial sources, particularly ...
  • Ngobeni, Sipho Josia (University of Pretoria, 2016)
    Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, ...
  • Nxumalo, Madoda (University of Pretoria, 2016)
    A Failure Deterministic Finite Automaton (FDFA) o ers a deterministic and a compact representation of an automaton that is used by various algorithms to solve pattern matching problems e ciently. An abstract, concept lattice ...
  • Chuang, Cheng-Hui (University of Pretoria, 2016)
    Enterprise architecture (EA) has gained increasing dominance in organisations as a strategic enabler to manage complexity. However, most organisations are still finding it challenging to materialise the full benefits of ...
  • Bihina Bella, Madeleine (University of Pretoria, 2016)
    The increasing complexity of software applications can lead to operational failures that have disastrous consequences. In order to prevent the recurrence of such failures, a thorough post-mortem investigation is required ...
  • Langeveld, Joost (University of Pretoria, 2016)
    Particle swarm optimization (PSO) algorithms have been successfully applied to discrete-valued optimization problems. However, in many cases the algorithms have been tailored specifically for the problem at hand. This study ...
  • Duvenhage, Bernardt (University of Pretoria, 2015)
    Light beam tracing is an e cient rendering algorithm for simulating caustics, the envelopes of light that are scattered from shiny curved surfaces and focussed into lines or spots of concentrated light. Light beam tracing ...
  • Valjarevic, Aleksandar (University of Pretoria, 2015)
    Recent decades have seen a significant increase in the importance of the field of digital forensics as a result of the rapid development of information and communication technologies and their penetration into every ...
  • Kotze, Dirk J.J. (University of Pretoria, 2015)
    In the 21st century, our worlds are becoming increasingly digitised and the business world is no exception. Financial transactions and accounting data are stored electronically, allowing for sharing and electronic ...
  • Sibiya, Mhlupheki George (University of Pretoria, 2015)
    Cloud computing is a relatively new computing paradigm that builds upon virtualisation technologies to provide hardware, platforms and software as services over the Internet. The cloud can be deployed in four basic ...
  • van Wyk, Andrich Benjamin (University of Pretoria, 2015)
    The phenomenon of overfitting, where a feed-forward neural network (FFNN) over trains on training data at the cost of generalisation accuracy is known to be speci c to the training algorithm used. This study investigates ...
  • Tewolde, Noh Teamrat (University of Pretoria, 2015)
    Semantic approaches have been used to facilitate interoperability in different fields of study. Current literature, however, shows that the semantic approach has not been used to facilitate the interoperability of addresses ...
  • Kroeze, Christina J. (University of Pretoria, 2015)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or PINs. These authentication mechanisms are di cult to remember and often disabled, leaving the ...
  • Fouche, Mark-Anthony (University of Pretoria, 2015)
    With the advances in image manipulation software, it has become easier to manipulate digital images. These manipulations can be used to increase image quality, but can also be used to depict a scene that never occurred. ...
  • Stallmann, Christoph Frank (University of Pretoria, 2015)
    Gramophones were the main audio recording medium for more than seven decades and regained widespread popularity over the past few years. Being an analogue storage medium, gramophone records are subject to distortions caused ...
  • Rakitianskaia, A.S. (Anastassia Sergeevna) (University of Pretoria, 2015)
    Computers and the internet have become an integral part of our lives. People have grown accustomed to feeling constantly connected to the outside world, and in the past couple of decades online social networks and ...
  • Georgieva, Kristina Slavomirova (University of Pretoria, 2015)
    Temporal data is common in real-world datasets. Analysis of such data, for example by means of clustering algorithms, can be difficult due to its dynamic behaviour. There are various types of changes that may occur to ...
  • Adedayo, Oluwasola Mary (University of Pretoria, 2015)
    The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often ...
  • Pieterse, Heloise (University of Pretoria, 2014)
    Mobile devices have excelled in the 21st century due to the increasing popularity and continuous improvement of mobile technology. Today mobile devices have become all-in-one portable devices, providing inter-connectivity, ...

View more