Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Katherine Mary Malan"'
Autor:
Katherine Mary Malan
Publikováno v:
South African Computer Journal, Vol 35, Iss 1 (2023)
Externí odkaz:
https://doaj.org/article/c339c5d29d4f4cd182668ccc327f9e48
Publikováno v:
South African Computer Journal, Vol 32, Iss 2 (2020)
Reinforcement learning has recently experienced increased prominence in the machine learning community. There are many approaches to solving reinforcement learning problems with new techniques developed constantly. When solving problems using reinfor
Externí odkaz:
https://doaj.org/article/2df81990985541d69c64cb88c19959d3
Publikováno v:
South African Computer Journal, Vol 32, Iss 1 (2020)
Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of
Externí odkaz:
https://doaj.org/article/3f9d329d4a0144b18fd8462e57a4b0f8
Autor:
Katherine Mary Malan
Publikováno v:
Algorithms, Vol 14, Iss 2, p 40 (2021)
Fitness landscapes were proposed in 1932 as an abstract notion for understanding biological evolution and were later used to explain evolutionary algorithm behaviour. The last ten years has seen the field of fitness landscape analysis develop from a
Externí odkaz:
https://doaj.org/article/5895cd86967a4d6a9dadf097edeeb260
Publikováno v:
South African Computer Journal, Vol 30, Iss 1 (2018)
Usability of software is a crucial aspect of successful applications and could give one application a competitive edge over another. Eye tracking is a popular approach to usability evaluation, but is time consuming and requires expert analysis. This
Externí odkaz:
https://doaj.org/article/0a78276ecd5941888a654698d5d54974
Publikováno v:
South African Computer Journal, Vol 28, Iss 2 (2016)
Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnera
Externí odkaz:
https://doaj.org/article/aa203b471e8640faa52782a3277b8bcd
Autor:
Katherine Mary Malan
Publikováno v:
South African Computer Journal. 34