Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Hassan, Ahmed; Pillay, Nelishia (Elsevier, 2019-09)
    Hybrid metaheuristics have proven to be effective at solving complex real-world problems. However, designing hybrid metaheuristics is extremely time consuming and requires expert knowledge of the different metaheuristics ...
  • Oldewage, E.T.; Engelbrecht, A.P.; Cleghorn, Christopher Wesley (Springer, 2019-06)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity in the particle ...
  • Omeleze, Stacey; Venter, H.S. (Hein) (Taylor and Francis, 2019)
    The requirement to identify the cause of an incident, following the trail of events preceding an incident, as well as proving the consistency of the potential evidence recovered from the alleged incident, ultimately demand ...
  • Abdulkarim, Salihu Aish; Engelbrecht, Andries P. (Springer, 2019-06)
    Artificial neural networks (NNs) are widely used in modeling and forecasting time series. Since most practical time series are non-stationary, NN forecasters are often implemented using recurrent/delayed connections to ...
  • Ventresca, Mario; Harrison, Kyle Robert; Ombuki-Berman, Beatrice M. (Elsevier, 2018-03)
    Identifying critical nodes in complex networks has become an important task across a variety of application domains. The Critical Node Detection Problem (CNDP) is an optimization problem that aims to minimize pairwise ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Elsevier, 2018-03)
    Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change ...
  • Gravell, Andy M.; Gruner, Stefan (Computer Society of South Africa, 2018-07)
    Half a century after the emergence of computer science (a.k.a. informatics) as an academic discipline, the notion of ‘computation’ is not yet ‘settled’. On the contrary: recent developments in the natural sciences, in ...
  • Malan, Katherine M.; Eloff, Jan H.P.; De Bruin, J.A. (Jhani) (Computer Society of South Africa, 2018-07-10)
    Usability of software is a crucial aspect of successful applications and could give one application a competitive edge over another. Eye tracking is a popular approach to usability evaluation, but is time consuming and ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...
  • Mouton, Francois; Nottingham, Alastair; Leenen, Louise; Venter, H.S. (Hein) (South African Institute of Electrical Engineers, 2018-06)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are ...
  • Hauger, W.K. (Werner); Olivier, Martin S. (South African Institute of Electrical Engineers, 2018-06)
    NoSQL databases have gained a lot of popularity over the last few years. They are now used in many new system implementations that work with vast amounts of data. Such data will typically also include sensitive information ...
  • Singh, Avinash; Venter, H.S. (Hein); Ikuesan, A.R. (Adeyemi) (Taylor and Francis, 2018)
    The extraction of digital evidence from storage media is a growing concern in digital forensics, due to the time and space complexity in acquiring, preserving and analysing digital evidence. Microsoft Windows Registry is ...
  • Singh, Avinash; Ikuesan, A.R. (Adeyemi); Venter, H.S. (Hein) (Springer, 2019)
    Over the years there has been a significant increase in the exploitation of the security vulnerabilities of Windows operating systems, the most severe threat being malicious software (malware). Ransomware, a variant of ...
  • Pamparà, Gary; Engelbrecht, Andries P. (Springer, 2018-10)
    The quantum-inspired particle swarm optimization (QPSO) algorithm has been developed to find and track an optimum for dynamic optimization problems. Though QPSO has been shown to be effective, despite its simplicity, it ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity is unable to express ...
  • Cleghorn, Christopher Wesley; Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2018-10)
    At present particle swarm optimizers (PSO) designed for multi-objective optimization have undergone no form of theoretical stability analysis. This paper derives the sufficient and necessary conditions for order-1 and ...
  • Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Springer, 2018-10)
    This paper examines the position update equation of the particle swarm optimization (PSO) algorithm, leading to the proposal of a simplified position update based upon a Gaussian distribution. The proposed algorithm, ...
  • Rehman, S.; Ali, S.S.; Khan, Salman Ahmad (Taylor and Francis, 2018)
    Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...

View more