Computer Science

Computer Science

Recent Submissions

  • Kuranga, Cry; Pillay, Nelishia (Springer, 2021-05)
    Various machine learning techniques exist to perform regression on temporal data with concept drift occurring. However, there are numerous nonstationary environments where these techniques may fail to either track or detect ...
  • Takada, Shingo; Cuadros-Vargas, Ernesto; Impagliazzo, John; Gordon, Steven; Marshall, Linda; Topi, Heikki; Van der Veer, Gerrit; Waguespack, Leslie (Springer, 2020-09)
    Various computing subdisciplines, such as computer science and software engineering, each have their own curricular guidelines. They can be very difficult to understand and compare for people such as prospective students, ...
  • Atiah, Frederick Ditliac (University of Pretoria, 2019)
    The foreign exchange (Forex) market has over 5 trillion USD turnover per day. In addition, it is one of the most volatile and dynamic markets in the world. Market conditions continue to change every second. Algorithmic ...
  • Ngejane, C.H. (Hombakazi); Eloff, Jan H.P.; Sefara, T.J.; Marivate, Vukosi (Elsevier, 2021-03)
    Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of ...
  • Kebande, Victor R.; Baror, S.O. (Stacey); Parizi, Reza M.; Choo, Kim-Kwang Raymond; Venter, H.S. (Hein) (Elsevier, 2020-12)
    A potential security incident may go unsolved if standardized forensic approaches are not applied during lawful investigations. This paper highlights the importance of mapping the digital forensic application requirement ...
  • Baror, S.O. (Stacey); Venter, H.S. (Hein); Adeyemi, Richard (Taylor and Francis, 2021)
    Currently, about half of all global enterprises are adopting and using some form of cloud computing services. In cloud computing, potential digital evidence is distributed across multiple isolated virtual machine instances. ...
  • Jordaan, Martina; Pieterse, Vreda (Higher Education South Africa, 2020-07)
    The article examines the value of using photovoice to assist reflection in a service learning module. Students were required to complete a reflective assignment in order to facilitate critical reflection on experiences ...
  • Marivate, Vukosi; Sefara, Tshephisho (Springer, 2020-08)
    We study the effect of different approaches to text augmentation. To do this we use three datasets that include social media and formal text in the form of news articles. Our goal is to provide insights for practitioners ...
  • Timm, Nils; Gruner, Stefan (Elsevier, 2019-04)
    We present a technique for verifying concurrent software systems via SAT-based three-valued bounded model checking. It is based on a direct transfer of the system to be analysed and a temporal logic property into a ...
  • Ellis, Mathys (University of Pretoria, 2020)
    Streamed data classification problems (SDCPs) require classifiers with the ability to learn and to adjust to the underlying relationships in data streams, in real-time. This requirement poses a challenge to classifiers, ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Singh, Avinash (University of Pretoria, 2019)
    Computers play a vital role in the automation of tedious tasks in our everyday lives. With the adoption of the advances in technology, there is a significant increase in the exploitation of security vulnerabilities, ...
  • Ismaila, Idris.; Legbo, Victor Y.; Ikuesan, Adeyemi Richard; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J.; Baba, Meshach. (Blue Eyes Intelligence Engineering and Sciences Publication, 2019-05)
    Technology-assisted living is a growing trend in most developing nations, particularly for young-aged demographic countries, as it presents a platform for personal development and knowledge management. However, this ...
  • Gruner, Stefan (Computer Society of South Africa, 2019-12)
    On the 5th of October 2019 I browsed the ACM-DL's database with the search key 'South Africa' in the 'conference location' field such as to obtain all ACM-DL-listed conference papers which were at any time presented in ...
  • Kebande, Victor Rigworo; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Cleghorn, Christopher Wesley (Springer, 2019-03)
    This paper’s primary aim is to provide clarity on which guarantees about particle stability can actually be made. The particle swarm optimization algorithm has undergone a considerable amount of theoretical analysis. ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Thulo, Motlatsi Isaac (University of Pretoria, 2019)
    The rapidly increasing dependency on use of clouds results in Cloud Service Providers (CSPs) having to deal with high cloud services demands. To meet these demands, CSPs take advantage of virtualization technology to provide ...
  • Kruger, Jaco-Louis (University of Pretoria, 2019)
    The Internet of Things (IoT) has evolved to be an important part of modern society. IoT devices can be found in several environments such as smart homes, transportation, the health sector, smart cities and even facilitates ...
  • Dlamini, Moses Thandokuhle (University of Pretoria, 2020)
    The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their ...

View more