Recently added

Please be advised that the site will be down for maintenance on Sunday, September 1, 2024, from 08:00 to 18:00, and again on Monday, September 2, 2024, from 08:00 to 09:00. We apologize for any inconvenience this may cause.

Theses and Dissertations (Computer Science): Recent submissions

  • Bihina Bella, Madeleine (University of Pretoria, 2014)
    The increasing complexity of software applications can lead to operational failures that have disastrous consequences. In order to prevent the recurrence of such failures, a thorough post-mortem investigation is required ...
  • Langeveld, Joost (University of Pretoria, 2016)
    Particle swarm optimization (PSO) algorithms have been successfully applied to discrete-valued optimization problems. However, in many cases the algorithms have been tailored specifically for the problem at hand. This study ...
  • Duvenhage, Bernardt (University of Pretoria, 2015)
    Light beam tracing is an e cient rendering algorithm for simulating caustics, the envelopes of light that are scattered from shiny curved surfaces and focussed into lines or spots of concentrated light. Light beam tracing ...
  • Valjarevic, Aleksandar (University of Pretoria, 2015)
    Recent decades have seen a significant increase in the importance of the field of digital forensics as a result of the rapid development of information and communication technologies and their penetration into every ...
  • Kotze, Dirk J.J. (University of Pretoria, 2015)
    In the 21st century, our worlds are becoming increasingly digitised and the business world is no exception. Financial transactions and accounting data are stored electronically, allowing for sharing and electronic ...
  • Sibiya, Mhlupheki George (University of Pretoria, 2015)
    Cloud computing is a relatively new computing paradigm that builds upon virtualisation technologies to provide hardware, platforms and software as services over the Internet. The cloud can be deployed in four basic ...
  • van Wyk, Andrich Benjamin (University of Pretoria, 2014)
    The phenomenon of overfitting, where a feed-forward neural network (FFNN) over trains on training data at the cost of generalisation accuracy is known to be speci c to the training algorithm used. This study investigates ...
  • Kroeze, Christina J. (University of Pretoria, 2015)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or PINs. These authentication mechanisms are di cult to remember and often disabled, leaving the ...
  • Tewolde, Noh Teamrat (University of Pretoria, 2014)
    Semantic approaches have been used to facilitate interoperability in different fields of study. Current literature, however, shows that the semantic approach has not been used to facilitate the interoperability of addresses ...
  • Fouche, Mark-Anthony (University of Pretoria, 2014)
    With the advances in image manipulation software, it has become easier to manipulate digital images. These manipulations can be used to increase image quality, but can also be used to depict a scene that never occurred. ...
  • Stallmann, Christoph Frank (University of Pretoria, 2015)
    Gramophones were the main audio recording medium for more than seven decades and regained widespread popularity over the past few years. Being an analogue storage medium, gramophone records are subject to distortions caused ...
  • Rakitianskaia, A.S. (Anastassia Sergeevna) (University of Pretoria, 2015)
    Computers and the internet have become an integral part of our lives. People have grown accustomed to feeling constantly connected to the outside world, and in the past couple of decades online social networks and ...
  • Georgieva, Kristina Slavomirova (University of Pretoria, 2015)
    Temporal data is common in real-world datasets. Analysis of such data, for example by means of clustering algorithms, can be difficult due to its dynamic behaviour. There are various types of changes that may occur to ...
  • Adedayo, Oluwasola Mary (University of Pretoria, 2015)
    The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often ...
  • Pieterse, Heloise (University of Pretoria, 2014)
    Mobile devices have excelled in the 21st century due to the increasing popularity and continuous improvement of mobile technology. Today mobile devices have become all-in-one portable devices, providing inter-connectivity, ...
  • De Bruin, Jhani Adre (University of Pretoria, 2014)
    Usability is a critical aspect of the success of any application. It can be the deciding factor for which an application is chosen and can have a dramatic effect on the productivity of users. Eye tracking has been ...
  • Masombuka, Koos Themba (University of Pretoria, 2013)
    A tandem repeat is a sequence of adjacent repetitions of a nucleotide patternsignature, called its motif, in a DNA sequence. The repetitions may either be exact or approximate copies of the motif. A minisatellite is a ...
  • De Souza, Pedro (University of Pretoria, 2013)
    Digital Forensic investigations play a vital role in our technologically enhanced world, and it may incorporate a number of different types of evidence — ranging from digital to physical. During a Digital Forensics ...
  • Malan, Katherine Mary (University of Pretoria, 2014)
    Real-world optimisation problems are often very complex. Population-based metaheuristics, such as evolutionary algorithms and particle swarm optimisation (PSO) algorithms, have been successful in solving many of these ...
  • Marshall, Linda (University of Pretoria, 2014)
    The problem addressed in this thesis was identified in a real life context in which an attempt was made to re-constitute a BSc Computer Science degree programme. The curriculum was modelled on the ACM/IEEE Computing ...