Computer Science

Computer Science

Recent Submissions

  • Gravell, Andy M.; Gruner, Stefan (Computer Society of South Africa, 2018-07)
    Half a century after the emergence of computer science (a.k.a. informatics) as an academic discipline, the notion of ‘computation’ is not yet ‘settled’. On the contrary: recent developments in the natural sciences, in ...
  • Malan, Katherine M.; Eloff, Jan H.P.; De Bruin, J.A. (Jhani) (Computer Society of South Africa, 2018-07-10)
    Usability of software is a crucial aspect of successful applications and could give one application a competitive edge over another. Eye tracking is a popular approach to usability evaluation, but is time consuming and ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...
  • Mouton, Francois; Nottingham, Alastair; Leenen, Louise; Venter, H.S. (Hein) (South African Institute of Electrical Engineers, 2018-06)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are ...
  • Hauger, W.K. (Werner); Olivier, Martin S. (South African Institute of Electrical Engineers, 2018-06)
    NoSQL databases have gained a lot of popularity over the last few years. They are now used in many new system implementations that work with vast amounts of data. Such data will typically also include sensitive information ...
  • Gruner, Stefan; Stallmann, Christoph (University of Cape Town, 2018)
    Many university students, especially first-year students, struggle to efficiently manage their study time which results in lower academic achievements. This paper empirically examines the effect that the number of ...
  • Singh, Avinash; Venter, H.S. (Hein); Ikuesan, A.R. (Adeyemi) (Taylor and Francis, 2018)
    The extraction of digital evidence from storage media is a growing concern in digital forensics, due to the time and space complexity in acquiring, preserving and analysing digital evidence. Microsoft Windows Registry is ...
  • Singh, Avinash; Ikuesan, A.R. (Adeyemi); Venter, H.S. (Hein) (Springer, 2019)
    Over the years there has been a significant increase in the exploitation of the security vulnerabilities of Windows operating systems, the most severe threat being malicious software (malware). Ransomware, a variant of ...
  • Mohiuddin, Aijaz (University of Pretoria, 2018)
    Very little guidance exists on the design of steel column base connections for biaxial flexure combined with axial compression. This study aims to develop a design method for designing these connections for combined ...
  • Pamparà, Gary; Engelbrecht, Andries P. (Springer, 2018-10)
    The quantum-inspired particle swarm optimization (QPSO) algorithm has been developed to find and track an optimum for dynamic optimization problems. Though QPSO has been shown to be effective, despite its simplicity, it ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity is unable to express ...
  • Cleghorn, Christopher Wesley; Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2018-10)
    At present particle swarm optimizers (PSO) designed for multi-objective optimization have undergone no form of theoretical stability analysis. This paper derives the sufficient and necessary conditions for order-1 and ...
  • Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Springer, 2018-10)
    This paper examines the position update equation of the particle swarm optimization (PSO) algorithm, leading to the proposal of a simplified position update based upon a Gaussian distribution. The proposed algorithm, ...
  • Rehman, S.; Ali, S.S.; Khan, Salman Ahmad (Taylor and Francis, 2018)
    Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Van Staden, Ruan Ruan (University of Pretoria, 2018)
    Email forensic investigations rely on the collection and analysis of digital forensic evidence collected from email systems. Problems arise when the digital forensic evidence needed for the email forensic investigation is ...

View more