Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bar coding -- Standards (1)
- Computer games -- Programming (1)
- Computer graphics -- Technique (1)
- Computer networks -- Security measures (1)
- Computer security (1)
-
- Computer security -- Study and teaching (1)
- Computer-assisted instruction -- Design (1)
- Human cytogenetics (1)
- Human-computer interaction (1)
- Internet searching (1)
- Neural networks (Computer science) (1)
- Optical character recognition devices (1)
- Three-dimensional imaging (1)
- Uniform Resource Identifiers (1)
- Universities and colleges -- Data processing (1)
- User interfaces (Computer systems) (1)
Articles 1 - 7 of 7
Full-Text Articles in Entire DC Network
Artificial Neural Networks : A Comparative Study Of Implementations For Human Chromosome Classification, Nancy Akl
Theses : Honours
Artificial neural networks are a popular field of artificial intelligence and have commonly been applied to solve many prediction, classification and diagnostic tasks. One such task is the analysis of human chromosomes. This thesis investigates the use of artificial neural networks (ANNs) as automated chromosome classifiers. The investigation involves the thorough analysis of seven different implementation techniques. These include three techniques using artificial neural networks, two techniques using ANN s supported by another method and two techniques not using ANNs. These seven implementations are evaluated according to the classification accuracy achieved and according to their support of important system measures, …
End User Preference Of Customisable Features Within A Course Management System, Diana Taylor
End User Preference Of Customisable Features Within A Course Management System, Diana Taylor
Theses : Honours
Customisation is the means by which people alter and change various elements of their environment with the purpose of making it more suited to their immediate needs. This aids in creating a more personalised experience. People are extremely diverse in terms of age, gender, nationality, and with the dominant presence of technology people also have various levels of computer skills and experience. In the context of computer environments, customisation provides the ability to cater for a diverse user group, providing tools and options that assist with specific tasks, improve accessibility and achieve greater user satisfaction. Carter, MacLean, Lovstard & Moran …
Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones
Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones
Theses : Honours
A lack in end-user awareness in computer security issues provides the rationale for this investigation. The research considers whether or not the provision of an educational package addressing computer security issues will improve awareness and transform behaviour of end-users in assessing and enacting appropriate responses in computer security situations. A group of twenty participants was studied in detail using a mixed methods research approach. The participants were drawn from a cross section of computer end-users, from elementary to advanced levels of computer literacy. Outcomes include a positive response to the provision of material, however human factors were found to be …
An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake
An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake
Theses : Honours
Network Management (NM) is concerned with reducing complexity and managing cost. The traditional NM tools and techniques are based on the Open System Interconnection (OSI) NM model. However, several drawbacks have been identified when managing a network using traditional NM tools (Sarkar & Verma, 2001). Network security is a major issue when managing a network. Even though the technology assists to reduce security risks, unless properly managed, the security measures may not do the job as expected. The State Model (SM) diagram is a new method, which may assists in managing the network. This new method may provide functionality not …
Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown
Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown
Theses : Honours
The exponential growth of the Internet, and the subsequent reliance on the resources it connects, has exposed a clear need for an Internet identifier which remains accessible over time. Such identifiers have been dubbed persistent identifiers owing to the promise of reliability they imply. Persistent naming systems exist at present, however it is the resolution of these systems into what Kunze, (2003) calls "persistent actionable identifiers" which is the focus of this work. Actionable identifiers can be thought of as identifiers which are accessible in a simple fashion such as through a web browser or through a specific application. This …
2d-Barcode For Mobile Devices, Hiroko Kato
2d-Barcode For Mobile Devices, Hiroko Kato
Theses : Honours
2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink …
View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson
View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson
Theses : Honours
Today's 3D games consumers are expecting more and more quality in their games. To enable high quality graphics at interactive rates, games programmers employ a technique known as hidden surface removal (HSR) or polygon culling. HSR is not just applicable to games; it may also be applied to any application that requires quality and interactive rates, including medical, military and building applications. One such commonly used technique for HSR is the binary space partition (BSP) tree, which is used for 3D ‘walk-throughs’, otherwise known as 3D static environments or first person shooters. Recent developments in 3D accelerated hardware technology do …