Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Du Plessis, Susanna H.; Pieterse, Vreda (Springer, 2017-11)
    The use of a well-designed and uniform notational system is imperative to improve communication and understanding. Currently, a fairly consistent notational system is used to notate the elements of sets, but the notations ...
  • Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth (Institute of Electrical and Electronics Engineers, 2018-05)
    The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...
  • Trenwith, Philip M.; Venter, Hein S. (Taylor and Francis, 2018-04)
    Cloud computing offers users access to information from anywhere by duplicating and distributing information to multiple data centres around the globe. The distribution of information in such a manner presents a significant ...
  • Ledwaba, Lehlogonolo P.I.; Hancke, Gerhard P.; Venter, Hein S.; Isaac, Sherrin J. (Institute of Electrical and Electronics Engineers, 2018)
    In past years, cryptography has been considered a dif cult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8- and 16-bit microcontroller units (MCUs). Previous ...
  • Maltese, Justin; Ombuki-Berman, Beatrice M.; Engelbrecht, A.P. (Institute of Electrical and Electronics Engineers, 2018-02)
    Over the past few decades, a plethora of computational intelligence algorithms designed to solve multiobjective problems have been proposed in the literature. Unfortunately, it has been shown that a large majority of these ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...
  • Harrison, Kyle Robert; Engelbrecht, A.P.; Ombuki-Berman, Beatrice M. (Elsevier, 2018-01)
    The particle swarm optimization (PSO) algorithm is a stochastic search technique based on the social dynamics of a flock of birds. It has been established that the performance of the PSO algorithm is sensitive to the values ...
  • Timm, Nils; Gruner, Stefan; Sibanda, Prince (Springer, 2017-10)
    An established approach to software verification is SAT-based bounded model checking where a state space model is encoded as a Boolean formula and the exploration is performed via SAT solving. Most existing approaches in ...
  • Cleghorn, Christopher Wesley; Engelbrecht, Andries P. (Springer, 2018-03)
    This paper presents an extension of the state of the art theoretical model utilized for understanding the stability criteria of the particles in particle swarm optimization algorithms. Conditions for order-1 and order-2 ...
  • Pillay, Nelishia; Özcan, Ender (Springer, 2017-09)
    Construction heuristics play an important role in solving combinatorial optimization problems. These heuristics are usually used to create an initial solution to the problem which is improved using optimization techniques ...
  • Li, Xiaodong; Epitropakis, Michael G.; Deb, Kalyanmoy; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-08)
    Multimodal optimization (MMO) aiming to locate multiple optimal (or near-optimal) solutions in a single simulation run has practical relevance to problem solving across many fields. Population-based meta-heuristics have ...
  • Stallmann, Christoph F.; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-06)
    Gramophone records were the main recording medium for more than seven decades and regained widespread popularity over the past several years. Being an analog storage medium, gramophone records are subject to distortions ...
  • Pieterse, H.; Olivier, Martin S.; Van Heerden, R.P. (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Adeyemi, Ikuesan Richard; Razak, Shukor Abd; Salleh, Mazleena; Venter, Hein S. (Public Library of Science, 2016-12-05)
    Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, ...
  • Pieterse, Vreda; Van Eekelen, Marko (Springer, 2016-10)
    This paper describes some technical and employability skills that are essential for our students to succeed in a career in software development. We conducted research aimed at understanding the students' problems when ...
  • Solms, Fritz; Pieterse, Vreda (Springer, 2016-10)
    The automated static and dynamic assessment of programs makes it practical to increase the learning opportunities of large student classes through the regular assessment of programming assignments. Automatic assessments ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Ras, D.J.; Venter, Hein S. (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Kebande, Victor R.; Venter, Hein S. (Taylor and Francis, 2017-01)
    This paper examines the design and implementation of a feasible technique for performing Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs a modified obfuscated Non-Malicious Botnet ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...

View more