Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Artificial Neural Networks : A Comparative Study Of Implementations For Human Chromosome Classification, Nancy Akl Jan 2005

Artificial Neural Networks : A Comparative Study Of Implementations For Human Chromosome Classification, Nancy Akl

Theses : Honours

Artificial neural networks are a popular field of artificial intelligence and have commonly been applied to solve many prediction, classification and diagnostic tasks. One such task is the analysis of human chromosomes. This thesis investigates the use of artificial neural networks (ANNs) as automated chromosome classifiers. The investigation involves the thorough analysis of seven different implementation techniques. These include three techniques using artificial neural networks, two techniques using ANN s supported by another method and two techniques not using ANNs. These seven implementations are evaluated according to the classification accuracy achieved and according to their support of important system measures, …


End User Preference Of Customisable Features Within A Course Management System, Diana Taylor Jan 2005

End User Preference Of Customisable Features Within A Course Management System, Diana Taylor

Theses : Honours

Customisation is the means by which people alter and change various elements of their environment with the purpose of making it more suited to their immediate needs. This aids in creating a more personalised experience. People are extremely diverse in terms of age, gender, nationality, and with the dominant presence of technology people also have various levels of computer skills and experience. In the context of computer environments, customisation provides the ability to cater for a diverse user group, providing tools and options that assist with specific tasks, improve accessibility and achieve greater user satisfaction. Carter, MacLean, Lovstard & Moran …


Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones Jan 2005

Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones

Theses : Honours

A lack in end-user awareness in computer security issues provides the rationale for this investigation. The research considers whether or not the provision of an educational package addressing computer security issues will improve awareness and transform behaviour of end-users in assessing and enacting appropriate responses in computer security situations. A group of twenty participants was studied in detail using a mixed methods research approach. The participants were drawn from a cross section of computer end-users, from elementary to advanced levels of computer literacy. Outcomes include a positive response to the provision of material, however human factors were found to be …


An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake Jan 2005

An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake

Theses : Honours

Network Management (NM) is concerned with reducing complexity and managing cost. The traditional NM tools and techniques are based on the Open System Interconnection (OSI) NM model. However, several drawbacks have been identified when managing a network using traditional NM tools (Sarkar & Verma, 2001). Network security is a major issue when managing a network. Even though the technology assists to reduce security risks, unless properly managed, the security measures may not do the job as expected. The State Model (SM) diagram is a new method, which may assists in managing the network. This new method may provide functionality not …


Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown Jan 2005

Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown

Theses : Honours

The exponential growth of the Internet, and the subsequent reliance on the resources it connects, has exposed a clear need for an Internet identifier which remains accessible over time. Such identifiers have been dubbed persistent identifiers owing to the promise of reliability they imply. Persistent naming systems exist at present, however it is the resolution of these systems into what Kunze, (2003) calls "persistent actionable identifiers" which is the focus of this work. Actionable identifiers can be thought of as identifiers which are accessible in a simple fashion such as through a web browser or through a specific application. This …


2d-Barcode For Mobile Devices, Hiroko Kato Jan 2005

2d-Barcode For Mobile Devices, Hiroko Kato

Theses : Honours

2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink …


View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson Jan 2005

View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson

Theses : Honours

Today's 3D games consumers are expecting more and more quality in their games. To enable high quality graphics at interactive rates, games programmers employ a technique known as hidden surface removal (HSR) or polygon culling. HSR is not just applicable to games; it may also be applied to any application that requires quality and interactive rates, including medical, military and building applications. One such commonly used technique for HSR is the binary space partition (BSP) tree, which is used for 3D ‘walk-throughs’, otherwise known as 3D static environments or first person shooters. Recent developments in 3D accelerated hardware technology do …


Opto-Vlsi Processing For Reconfigurable Optical Devices, Chung-Kiak Poh Jan 2005

Opto-Vlsi Processing For Reconfigurable Optical Devices, Chung-Kiak Poh

Theses: Doctorates and Masters

The implementation of Wavelength Division Multiplexing system (WDM) optical fibre transmission systems has the potential to realise this high capacity data rate exceeding 10 Tb/s. The ability to reconfigure optical networks is a desirable attribute for future metro applications where light paths can be set up or taken down dynamically as required in the network. The use of microelectronics in conjunction with photonics enables intelligence to be added to the high-speed capability of photonics, thus realising reconfigurable optical devices which can revolutionise optical telecommunications and many more application areas. In this thesis, we investigate and demonstrate the capability of Opto-VLSI …