Browsing Research Articles (Computer Science) by Type "Article"

Browsing Research Articles (Computer Science) by Type "Article"

Sort by: Order: Results:

  • Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...
  • Wekwete, Takura Asael; Kufakunesu, Rodwell; Van Zyl, A.J. (Gusti) (Elsevier, 2023-11)
    Asset Liability Management (ALM) is an essential risk management technique in Quantitative Finance and Actuarial Science. It aims to maximise a risk-taker’s ability to fulfil future liabilities. ALM is especially critical in ...
  • Ras, D.J.; Venter, H.S. (Hein) (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Kebande, Victor Rigworo; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Vural, Ickin; Venter, H.S. (Hein) (Graz University of Technology, 2012-03-28)
    Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS ...
  • Ahmad, Mushtag; Gruner, Stefan; Afzal, Muhammad Tanvir (Graz University of Technology, 2012-12-01)
    Medieval manuscripts or other written documents from that period contain valuable information about people, religion, and politics of the medieval period, making the study of medieval documents a necessary pre-requisite ...
  • Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G. (Operations Research Society of SA, 2011-03)
    Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
  • Adekoya, Adekunle Rotimi; Helbig, Marde (MDPI, 2023-10)
    Dynamic multi-objective optimization problems (DMOPs) are optimization problems where elements of the problems, such as the objective functions and/or constraints, change with time. These problems are characterized by two ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Mokoatle, Mpho; Mapiye, Darlington; Marivate, Vukosi; Hayes, Vanessa M.; Bornman, Maria S. (Riana) (Public Library of Science, 2022-06-09)
    One of the most precise methods to detect prostate cancer is by evaluation of a stained biopsy by a pathologist under a microscope. Regions of the tissue are assessed and graded according to the observed histological ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Ibrahim, Zuwairie; Khalid, Noor Khafifah; Buyamin, Salinda; Ibrahim, Ismail; Mukred, Jameel Abdulla Ahmed; Yusof, Zulkifli Md.; Mohamad, Mohd Saberi; Mokhtar, N.; Saaid, Muhammad Faiz Mohamed; Engelbrecht, Andries P. (ICIC International, 2012-05)
    Deoxyribonucleic Acid (DNA) has certain unique properties such as self- assembly and self-complementary in hybridization, which are important in many DNA- based technologies. DNA computing, for example, uses these ...
  • Mcuba, Mvelo; Singh, Avinash; Ikuesan, Richard Adeyemi; Venter, H.S. (Hein) (Elsevier, 2023)
    Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice cloning systems are smart enough to learn speech characteristics from a few samples and ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Mouton, Francois; Nottingham, Alastair; Leenen, Louise; Venter, H.S. (Hein) (South African Institute of Electrical Engineers, 2018-06)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are ...