Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Engelbrecht, Andries P.; Li, Xiaodong; Epitropakis, Michael G.; Deb, Kalyanmoy (Institute of Electrical and Electronics Engineers, 2017-08)
    Multimodal optimization (MMO) aiming to locate multiple optimal (or near-optimal) solutions in a single simulation run has practical relevance to problem solving across many fields. Population-based meta-heuristics have ...
  • Stallmann, Christoph F.; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-06)
    Gramophone records were the main recording medium for more than seven decades and regained widespread popularity over the past several years. Being an analog storage medium, gramophone records are subject to distortions ...
  • Olivier, Martin S.; Pieterse, H.; Van Heerden, R.P. (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Adeyemi, Ikuesan Richard; Venter, Hein S.; Razak, Shukor Abd; Salleh, Mazleena (Public Library of Science, 2016-12-05)
    Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, ...
  • Pieterse, Vreda; Van Eekelen, Marko (Springer, 2016-10)
    This paper describes some technical and employability skills that are essential for our students to succeed in a career in software development. We conducted research aimed at understanding the students' problems when ...
  • Solms, Fritz; Pieterse, Vreda (Springer, 2016-10)
    The automated static and dynamic assessment of programs makes it practical to increase the learning opportunities of large student classes through the regular assessment of programming assignments. Automatic assessments ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Ras, D.J.; Venter, H.S. (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Kebande, Victor R.; Venter, Hein S. (Taylor and Francis, 2017-01)
    This paper examines the design and implementation of a feasible technique for performing Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs a modified obfuscated Non-Malicious Botnet ...
  • Olivier, Martin S.; Pieterse, Heloise (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Pieterse, Vreda; Haskins, Bertram (Independent Institute of Education, 2016)
    This paper investigates automated code plagiarism detection in the context of an introductory programming module. Three methods for detecting plagiarism are compared to determine whether these systems yield differing ...
  • Kroeze, Christina J.; Malan, Katherine Mary (Computer Society of South Africa, 2016-12-09)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, ...
  • Khan, S.A. (Salman Ahmad); Rehman, Shafiqur (MDPI Publishing, 2016-10-26)
    The emergence of wind energy as a potential alternative to traditional sources of fuel has prompted notable research in recent years. One primary factor contributing to efficient utilization of wind energy from a wind ...
  • Olivier, Martin S.; Pieterse, Heloise (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Kourie, Derrick G.; Musombuka, Themba K.; De Ridder, Corne; Iliopoulos, Costas S.; Mouchard, Laurent; Pissis, Solon P. (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...
  • Mohiuddin, Mohammad A.; Khan, S.A. (Salman Ahmad); Engelbrecht, Andries P. (Springer, 2016-10)
    The open shortest path first (OSPF) routing protocol is a well-known approach for routing packets from a source node to a destination node. The protocol assigns weights (or costs) to the links of a network. These ...
  • Kebande, Victor R.; Venter, Hein S. (Taylor and Francis, 2016-06)
    The need to perform digital investigations has over the years led to the exponential growth of the field of Digital Forensics (DF). However, quite a number of challenges face the act of proving – for purposes of Digital ...
  • Bella, M.A. Bihina; Eloff, Jan H.P. (Elsevier, 2016-02)
    Digital forensics has been proposed as a methodology for doing root-cause analysis of major software failures for quite a while. Despite this, similar software failures still occur repeatedly. A reason for this is the ...
  • Hauger, Werner K.; Olivier, Martin S. (South African Institute of Electrical Engineers, 2015-06)
    An aspect of database forensics that has not received much attention in the academic research community yet is the presence of database triggers. Database triggers and their implementations have not yet been thoroughly ...
  • Fouche, Mark-Anthony; Solms, Fritz; Tofan, Dan; Galster, Matthias; Lytra, Ioanna; Avgeriou, Paris; Zdun, Uwe; De Boer, Remco (Elsevier, 2016-04)
    CONTEXT : Many software architectural decisions are group decisions rather than decisions made by individuals. Consensus in a group of decision makers increases the acceptance of a decision among decision makers and their ...

View more