We are excited to announce that the repository will soon undergo an upgrade, featuring a new look and feel along with several enhanced features to improve your experience. Please be on the lookout for further updates and announcements regarding the launch date. We appreciate your support and look forward to unveiling the improved platform soon.
Research Articles (Computer Science)
Recent Submissions
-
Rananga, Seani; Modupe, Abiodun; Isong, Abiodun; Marivate, Vukosi
(Universitas Bina Darma, 2024-12)
The rapid spread of misinformation on platforms like Twitter, and Facebook, and in news
headlines highlights the urgent need for effective ways to detect it. Currently, researchers
are increasingly using machine learning ...
-
Muhammad, Owais; Jiang, Hong; Bilal, Muhammad; Mushtaq, Muhammad Umer
(PeerJ Inc., 2025-02)
The rapid evolution of wireless technologies within the 5G network brings significant challenges in managing the increased connectivity and traffic of mobile devices. This enhanced connectivity brings challenges for base ...
-
Mushtaq, Muhammad Umer; Venter, H.S. (Hein); Singh, Avinash; Owais, Muhammad
(MDPI, 2025-03)
Energy harvesting wireless sensor networks (EH-WSNs) appear as the fundamental backbone of research that attempts to expand the lifespan and efficiency of sensor
networks positioned in resource-constrained environments. ...
-
Mushtaq, Muhammad Umer; Venter, H.S. (Hein); Muhammad, Owais; Shafique, Tamoor; Awwad, Fuad A.; Ismail, Emad A.A.
(Elsevier, 2025-03)
Many sectors in aerial transportation use unmanned aircraft vehicles (UAVs) extensively. This becomes even more challenging in complex environments where not only it is required to avoid obstacles, but it also must be ...
-
Adedayo, Oluwasola Mary; Olivier, Martin S.
(Wiley, 2025-03)
With the increasing trend of digitization of business processes and personal communication across the globe, digital documents of intrinsic value continue to be created. Whereas the questioned document examination (QDE) ...
-
Booysen, Reinhard; Bosman, Anna
(Springer, 2024-06-18)
Artificial neural network (NN) architecture design is a nontrivial and time-consuming task
that often requires a high level of human expertise. Neural architecture search (NAS) serves
to automate the design of NN ...
-
Klopper, Christiaan; Eloff, Jan H.P.
(Institute of Electrical and Electronics Engineers, 2024-10)
Artificial intelligence (AI)-assisted cyber-attacks have evolved to become increasingly
successful in every aspect of the cyber-defence life cycle. For example, in the reconnaissance phase, AI-enhanced tools such as MalGAN ...
-
Mathebula, Miehleketo; Modupe, Abiodun; Marivate, Vukosi
(MDPI, 2024-12)
Sentiment analysis is a well-known task that has been used to analyse customer feedback
reviews and media headlines to detect the sentimental personality or polarisation of a given text.
With the growth of social media ...
-
Schreuder, Arné; Bosman, Anna Sergeevna; Engelbrecht, Andries P.; Cleghorn, Christopher W.
(Elsevier, 2025-01)
The process of training feedforward neural networks (FFNNs) can benefit from an automated process where the best heuristic to train the network is sought out automatically by means of a high-level probabilistic-based ...
-
Mathebula, Miehleketo; Modupe, Abiodun; Marivate, Vukosi
(Institute of Electrical and Electronics Engineers, 2024-09)
Social media platforms play a significant role in analyzing customer perceptions of financial
products and services in today’s culture. These platforms facilitate the immediate and in-depth sharing of
thoughts and ...
-
Wang, Wanying; Wang, Ge; Marivate, Vukosi; Hufton, Andrew L.
(Cell Press, 2023-07)
As large AI models demonstrate increasingly human-like performance
on complex tasks, many scientists are developing
or adapting these models to empower their research and
applications. Because of the substantial costs ...
-
Panagiotou, Savvas; Bosman, Anna
(Elsevier, 2024-12)
Low-light image enhancement (LLIE) techniques attempt to increase the visibility of images captured in low-light scenarios. However, as a result of enhancement, a variety of image degradations such as noise and color bias ...
-
Ramazhamba, T.P.; Venter, H.S. (Hein)
(Springer, 2023-03-09)
The South African Local Government (SALG)
uses the tendering system to procure goods and services.
Some of these tendering projects are aimed at promoting
socio-economic and industrial policies. Hence, the tendering
system ...
-
Kekere, Temitope; Marivate, Vukosi; Hattingh, Maria J. (Marie)
(Learning Information Networking and Knowledge (LINK) Centre, Graduate School of Public and Development, 2023)
The narratives shared on social media during a health crisis such as COVID-19
reflect public perceptions of the crisis. This article provides findings from a study of
the perceptions of South African citizens regarding ...
-
Pretorius, Kyle; Pillay, Nelishia
(Springer, 2024-06)
The use of genetic algorithms (GAs) to evolve neural network (NN) weights has risen in popularity in recent years, particularly when used together with gradient descent as a mutation operator. However, crossover operators ...
-
Kapoor, Rahul; Pillay, Nelishia
(Springer, 2024-03)
Neural architecture search (NAS) is a rapidly growing field which focuses on the automated design of neural network architectures. Genetic algorithms (GAs) have been predominantly used for evolving neural network architectures. ...
-
Srikissoon, Trishanta; Marivate, Vukosi
(Easychair, 2023)
Automated hate speech detection is important to protecting people’s dignity, online experiences, and physical safety in Society 5.0. Transformers are sophisticated pre-trained language models that can be fine-tuned for ...
-
Ellis, Mathys; Bosman, Anna Sergeevna; Engelbrecht, Andries P.
(Elsevier, 2024-07)
Streamed data classification problems (SDCPs) require classifiers to not just find the optimal decision boundaries that describe the relationships within a data stream, but also to adapt to changes in the decision boundaries ...
-
Wekwete, Takura Asael; Kufakunesu, Rodwell; Van Zyl, A.J. (Gusti)
(Elsevier, 2023-11)
Asset Liability Management (ALM) is an essential risk management technique in Quantitative Finance and
Actuarial Science. It aims to maximise a risk-taker’s ability to fulfil future liabilities. ALM is especially critical
in ...
-
Combrink, Herkulaas MvE; Marivate, Vukosi; Masikisiki, Baphumelele
(MDPI, 2023-04-24)
The objective of this paper was to scope the challenges associated with data-sharing governance
for machine learning applications in education research (MLER) within the South African
context. Machine learning applications ...
View more