Browsing Magister Scientiae - MSc (Computer Science) by Title
Now showing items 43-62 of 94
-
Internet-Of-Things for Cyber Healthcare (L0t4c): Information Dissemination, systems' Interoperability and security
(University of the Western Cape, 2017)Cyber Healthcare is becoming one of the fastest growing industries in the world due to an increasing elderly population and a more health conscious word population. On the other hand, IoT devices are emerging from niche ... -
An investigation into the appropriateness of using agile processes to build an educational management information system
(University of the Western Cape, 2010)Since there was a need for an Educational Management Information System (EMIS) in the Ministry of Education in Afghanistan, we designed and implemented a prototype for use in the ministry and investigated the appropriateness ... -
An investigation of the best-practices for implementing an Ecommerce software engineering project comparing two common methodologies, viz. Agile and Traditional.
(University of the Western Cape, 2020)In a world where technology is advancing at a very rapid pace, global competition has significantly increased, and this is putting pressure on software companies to produce quality software. It has therefore become critically ... -
KernTune: self-tuning Linux kernel performance using support vector machines
(University of the Western Cape, 2006)Self-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system ... -
KernTune: Self-tuning Linux Kernel Performance Using Support Vector Machines
(University of the Western Cape, 2006)Self-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system ... -
Long short-term memory recurrent neural networks for signature verification
(UWC, 2003)Handwritten signature verification is defined as the classification process that strives to learn the manner in which an individual makes use of the muscular memory of their hands, fingers, and wrist to reproduce a signature. ... -
Metric of trust for mobile ad hoc networks using source routing algorithms
(University of the Western Cape, 2006)This thesis proposed and presented technical details of new probabilistic metrics of trust in the links wireless ad hoc networks for unobservable communications. In covert communication networks, only the end nodes are ... -
A Mobile Deaf-to-hearing communication aid for medical diagnosis
(University of the Western Cape, 2011)Many South African Deaf people use their mobile phones for communication with SMSs yet they would prefer to converse in South African Sign Language. Deaf people with a capital `D' are different from deaf or hard of hearing ... -
A mobile design of an emergency service system for deaf people
(University of Western Cape, 2021)The importance of mobile technology in improving the quality of life is not restricted to only a Hearing person, and the use of mobile devices among Deaf people is no longer limited, due to the advancements in technology ... -
Mobile presentations with interactive chat for m-Learning
(University of the Western Cape, 2010)Using presentations in an m-Learning environment enables delivery of rich content to a mobile phone learner. This study investigated how to prepare and stream presentations from a desktop computer to a mobile phone in ... -
Mobility management for Wi-Fi infrastructure and mesh networks
(University of the Western Cape, 2012)This thesis shows that mobility management protocols for infrastructure Internet may be used in a wireless mesh network environment. In this research Mobile IPv6 and Fast Handover for Hierarchical Mobile IPv6 are successfully ... -
Models and applications of wireless networks in rural environments
(University of the Western Cape, 2005)With the unprecedented growth of the communication industry that the world is experiencing, the demand from rural inhabitants for high quality communications at an economically affordable cost is growing. However, rural ... -
Numerical Methods for Mathematical Models on Warrant Pricing
(University of the Western Cape, 2010)Warrant pricing has become very crucial in the present market scenario. See, for example, M. Hanke and K. Potzelberger, Consistent pricing of warrants and traded options, Review Financial Economics 11(1) (2002) 63-77 where ... -
On the efficacy of enhanced feature selection methods for supervised crime prediction
(University of the Western Cape, 2023)The challenge of crime across the globe has necessitated several considerations for crime preventive measures. There exist a variety of crime prevention strategies, such as the use of necessary weapons or tools to respond ... -
Packet aggregation for voice over internet protocol on wireless mesh networks
(University of the Western Cape, 2012)This thesis validates that packet aggregation is a viable technique to increase call capacity for Voice over Internet Protocol over wireless mesh networks. Wireless mesh networks are attractive ways to provide voice services ... -
Packet aggregation for voice over internet protocol on wireless mesh networks
(University of the Western Cape, 2012)This thesis validates that packet aggregation is a viable technique to increase call ca-pacity for Voice over Internet Protocol over wireless mesh networks. Wireless mesh networks are attractive ways to provide voice ... -
Performance estimation of wireless networks using traffic generation and monitoring on a mobile device.
(University of the Western Cape, 2015)In this study, a traffic generator software package namely MTGawn was developed to run packet generation and evaluation on a mobile device. The call generating software system is able to: simulate voice over Internet ... -
Policy based network management of legacy network elements in next generation networks for voice services
(University of the Western Cape, 2002)Telecommunication companies, service providers and large companies are now adapting converged multi-service Next Generation Networks (NGNs). Network management is shifting from managing Network Elements (NE) to managing ... -
Remote surveillance and face tracking with mobile phones (smart eyes)
(University of the Western Cape, 2005)This thesis addresses analysis, evaluation and simulation of low complexity face detection algorithms and tracking that could be used on mobile phones. Network access control using face recognition increases the user-friendliness ... -
Rendering an avatar from sign writing notation for sign language animation
(University of the Western Cape, 2010)This thesis presents an approach for automatically generating signing animations from a sign language notation. An avatar endowed with expressive gestures, as subtle as changes in facial expression, is used to render the ...