Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...
  • Harrison, Kyle Robert; Engelbrecht, A.P.; Ombuki-Berman, Beatrice M. (Elsevier, 2018-01)
    The particle swarm optimization (PSO) algorithm is a stochastic search technique based on the social dynamics of a flock of birds. It has been established that the performance of the PSO algorithm is sensitive to the values ...
  • Timm, Nils; Gruner, Stefan; Sibanda, Prince (Springer, 2017-10)
    An established approach to software verification is SAT-based bounded model checking where a state space model is encoded as a Boolean formula and the exploration is performed via SAT solving. Most existing approaches in ...
  • Cleghorn, Christopher Wesley; Engelbrecht, Andries P. (Springer, 2018-03)
    This paper presents an extension of the state of the art theoretical model utilized for understanding the stability criteria of the particles in particle swarm optimization algorithms. Conditions for order-1 and order-2 ...
  • Pillay, Nelishia; Özcan, Ender (Springer, 2017-09)
    Construction heuristics play an important role in solving combinatorial optimization problems. These heuristics are usually used to create an initial solution to the problem which is improved using optimization techniques ...
  • Li, Xiaodong; Epitropakis, Michael G.; Deb, Kalyanmoy; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-08)
    Multimodal optimization (MMO) aiming to locate multiple optimal (or near-optimal) solutions in a single simulation run has practical relevance to problem solving across many fields. Population-based meta-heuristics have ...
  • Stallmann, Christoph F.; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-06)
    Gramophone records were the main recording medium for more than seven decades and regained widespread popularity over the past several years. Being an analog storage medium, gramophone records are subject to distortions ...
  • Pieterse, H.; Olivier, Martin S.; Van Heerden, R.P. (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Adeyemi, Ikuesan Richard; Razak, Shukor Abd; Salleh, Mazleena; Venter, Hein S. (Public Library of Science, 2016-12-05)
    Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, ...
  • Pieterse, Vreda; Van Eekelen, Marko (Springer, 2016-10)
    This paper describes some technical and employability skills that are essential for our students to succeed in a career in software development. We conducted research aimed at understanding the students' problems when ...
  • Solms, Fritz; Pieterse, Vreda (Springer, 2016-10)
    The automated static and dynamic assessment of programs makes it practical to increase the learning opportunities of large student classes through the regular assessment of programming assignments. Automatic assessments ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Ras, D.J.; Venter, H.S. (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Kebande, Victor R.; Venter, Hein S. (Taylor and Francis, 2017-01)
    This paper examines the design and implementation of a feasible technique for performing Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs a modified obfuscated Non-Malicious Botnet ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Haskins, Bertram; Pieterse, Vreda (Independent Institute of Education, 2016)
    This paper investigates automated code plagiarism detection in the context of an introductory programming module. Three methods for detecting plagiarism are compared to determine whether these systems yield differing ...
  • Kroeze, Christina J.; Malan, Katherine Mary (Computer Society of South Africa, 2016-12-09)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, ...
  • Rehman, Shafiqur; Khan, S.A. (Salman Ahmad) (MDPI Publishing, 2016-10-26)
    The emergence of wind energy as a potential alternative to traditional sources of fuel has prompted notable research in recent years. One primary factor contributing to efficient utilization of wind energy from a wind ...
  • Pieterse, Heloise; Olivier, Martin S. (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...

View more