Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Gruner, Stefan (Computer Society of South Africa, 2019-12)
    On the 5th of October 2019 I browsed the ACM-DL's database with the search key 'South Africa' in the 'conference location' field such as to obtain all ACM-DL-listed conference papers which were at any time presented in ...
  • Kebande, Victor R.; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Cleghorn, Christopher Wesley (Springer, 2019-03)
    This paper’s primary aim is to provide clarity on which guarantees about particle stability can actually be made. The particle swarm optimization algorithm has undergone a considerable amount of theoretical analysis. ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Pillay, Nelishia (Springer, 2020)
    Since its inception genetic programming, and later variations such as grammar-based genetic programming and grammatical evolution, have contributed to various domains such as classification, image processing, search-based ...
  • Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Elsevier, 2019-09)
    The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Springer, 2019-01-25)
    Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Oldewage, Elre T.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Elsevier, 2020-02)
    Please read abstract in the article.
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...
  • Shukla, Amit K.; Janmaijaya, Manvendra; Abraham, Ajith; Muhuri, Pranab K. (Elsevier, 2019-10)
    The Engineering Applications of Artificial Intelligence (EAAI) is a journal of very high repute in the domain of Engineering and Computer Science. This paper gives a broad view of the publications in EAAI from 1988–2018, ...
  • Kundu, Soumyadeep; Paul, Sayantan; Bera, Suman Kumar; Abraham, Ajith; Sarkar, Ram (Elsevier, 2020-02)
    Text-line extraction (TLE) from unconstrained handwritten document images is still considered an open research problem. Literature survey reveals that use of various rule-based methods is commonplace in this regard. But ...
  • Ojha, Varun; Abraham, Ajith; Snasel, Vaclav (Elsevier, 2019-10)
    This paper provides an in-depth review of the optimal design of type-1 and type-2 fuzzy inference systems (FIS) using five well known computational frameworks: genetic-fuzzy systems (GFS), neuro-fuzzy systems (NFS), ...
  • Ikuesan, Adeyemi Richard; Razak, Shukor Abd; Venter, H.S. (Hein); Salleh, Salleh M. (Springer, 2019-08)
    The proliferation of ubiquitous and pervasive computing devices has led to the emergence of research areas like Internet of things, and the Big-Data, which has seen a rise in obfuscation of online identity thus fueling an ...
  • Hassan, Ahmed; Pillay, Nelishia (Elsevier, 2019-09)
    Hybrid metaheuristics have proven to be effective at solving complex real-world problems. However, designing hybrid metaheuristics is extremely time consuming and requires expert knowledge of the different metaheuristics ...
  • Oldewage, E.T.; Engelbrecht, A.P.; Cleghorn, Christopher Wesley (Springer, 2019-12)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity in the particle ...
  • Omeleze, Stacey; Venter, H.S. (Hein) (Taylor and Francis, 2019)
    The requirement to identify the cause of an incident, following the trail of events preceding an incident, as well as proving the consistency of the potential evidence recovered from the alleged incident, ultimately demand ...
  • Abdulkarim, Salihu Aish; Engelbrecht, Andries P. (Springer, 2019-12)
    Artificial neural networks (NNs) are widely used in modeling and forecasting time series. Since most practical time series are non-stationary, NN forecasters are often implemented using recurrent/delayed connections to ...
  • Ventresca, Mario; Harrison, Kyle Robert; Ombuki-Berman, Beatrice M. (Elsevier, 2018-03)
    Identifying critical nodes in complex networks has become an important task across a variety of application domains. The Critical Node Detection Problem (CNDP) is an optimization problem that aims to minimize pairwise ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Elsevier, 2018-03)
    Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change ...
  • Gravell, Andy M.; Gruner, Stefan (Computer Society of South Africa, 2018-07)
    Half a century after the emergence of computer science (a.k.a. informatics) as an academic discipline, the notion of ‘computation’ is not yet ‘settled’. On the contrary: recent developments in the natural sciences, in ...

View more