Computer Science

Computer Science

Recent Submissions

  • Gruner, Stefan (Computer Society of South Africa, 2019-12)
    On the 5th of October 2019 I browsed the ACM-DL's database with the search key 'South Africa' in the 'conference location' field such as to obtain all ACM-DL-listed conference papers which were at any time presented in ...
  • Kebande, Victor R.; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Cleghorn, Christopher Wesley (Springer, 2019-03)
    This paper’s primary aim is to provide clarity on which guarantees about particle stability can actually be made. The particle swarm optimization algorithm has undergone a considerable amount of theoretical analysis. ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Pillay, Nelishia (Springer, 2020)
    Since its inception genetic programming, and later variations such as grammar-based genetic programming and grammatical evolution, have contributed to various domains such as classification, image processing, search-based ...
  • Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Elsevier, 2019-09)
    The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Springer, 2019-01-25)
    Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Burger, Divan Desmond (University of Pretoria, 2018)
    This dissertation examines several methods of relief mapping, such as parallax mapping and cone step mapping, as well as methods for soft shadowing and ambient occlusion of relief maps. Ambient occlusion is an approximation ...
  • Hauger, Werner Karl (University of Pretoria, 2018)
    An aspect of database forensics that has not yet received much attention in the academic research community is the attribution of actions performed in a database. When forensic attribution is performed for actions executed ...
  • van der Berg, Johan Sarel (University of Pretoria, 2018)
    Structured Object Orientated Formal Language (SOFL) is a formal method design methodology that combines data flows diagrams and predicates in order to describe processes that can be refined. This methodology creates a very ...
  • Oldewage, Elre T.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Elsevier, 2020-02)
    Please read abstract in the article.
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...
  • Gruner, Stefan (College of Science, Engineering and Technology: University of South Africa (UNISA), 2019)
    This short-paper offers an experience report about a successful way of giving an introductory compiler construction course to 3rd-year undergraduate students. Because the in-depth-presentation of compiler construction has ...
  • Bosman, Phlippie Rudolph (University of Pretoria, 2019)
    Fitness landscapes facilitate the analysis of optimisation problems in a detailed, yet intuitive manner. Such an analysis can be used to select an appropriate algorithm to solve the problem, based on the strengths and ...
  • Hauger, Werner Karl (University of Pretoria, 2018)
    An aspect of database forensics that has not yet received much attention in the academic research community is the attribution of actions performed in a database. When forensic attribution is performed for actions executed ...
  • Burger, Divan Desmond (University of Pretoria, 2018)
    This dissertation examines several methods of relief mapping, such as parallax mapping and cone step mapping, as well as methods for soft shadowing and ambient occlusion of relief maps. Ambient occlusion is an approximation ...
  • van der Berg, Johan Sarel (University of Pretoria, 2018)
    Structured Object Orientated Formal Language (SOFL) is a formal method design methodology that combines data flows diagrams and predicates in order to describe processes that can be refined. This methodology creates a very ...
  • Shukla, Amit K.; Janmaijaya, Manvendra; Abraham, Ajith; Muhuri, Pranab K. (Elsevier, 2019-10)
    The Engineering Applications of Artificial Intelligence (EAAI) is a journal of very high repute in the domain of Engineering and Computer Science. This paper gives a broad view of the publications in EAAI from 1988–2018, ...
  • Kundu, Soumyadeep; Paul, Sayantan; Bera, Suman Kumar; Abraham, Ajith; Sarkar, Ram (Elsevier, 2020-02)
    Text-line extraction (TLE) from unconstrained handwritten document images is still considered an open research problem. Literature survey reveals that use of various rule-based methods is commonplace in this regard. But ...
  • Ojha, Varun; Abraham, Ajith; Snasel, Vaclav (Elsevier, 2019-10)
    This paper provides an in-depth review of the optimal design of type-1 and type-2 fuzzy inference systems (FIS) using five well known computational frameworks: genetic-fuzzy systems (GFS), neuro-fuzzy systems (NFS), ...

View more