Research Articles (Computer Science)

Research Articles (Computer Science)

 

Recent Submissions

  • Pamparà, Gary; Engelbrecht, Andries P. (Springer, 2018-10)
    The quantum-inspired particle swarm optimization (QPSO) algorithm has been developed to find and track an optimum for dynamic optimization problems. Though QPSO has been shown to be effective, despite its simplicity, it ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity is unable to express ...
  • Cleghorn, Christopher Wesley; Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2018-10)
    At present particle swarm optimizers (PSO) designed for multi-objective optimization have undergone no form of theoretical stability analysis. This paper derives the sufficient and necessary conditions for order-1 and ...
  • Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Springer, 2018-10)
    This paper examines the position update equation of the particle swarm optimization (PSO) algorithm, leading to the proposal of a simplified position update based upon a Gaussian distribution. The proposed algorithm, ...
  • Rehman, S.; Ali, S.S.; Khan, Salman Ahmad (Taylor and Francis, 2018)
    Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Harrison, Kyle Robert; Engelbrecht, Andries P.; Ombuki-Berman, Beatrice M. (Springer, 2018-09)
    Particle swarm optimization (PSO) is a population-based, stochastic search algorithm inspired by the flocking behaviour of birds. The PSO algorithm has been shown to be rather sensitive to its control parameters, and thus, ...
  • Adeyemi, Ikuesan Richard; Abd Razak, Shukor; Salleh, Mazleena; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2017)
    User attribution, the process of identifying a human in a digital medium, is a research area that has received significant attention in information security research areas, with a little research focus on digital forensics. ...
  • Gruner, Stefan (Cosmos and History Publishing Co-op, 2017)
    Long before Alan Turing laid the foundations of the ongoing artificial intelligence project with all its computer-scientific and philosophical consequences and side effects, we can find in a short but intellectually dense ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (Springer, 2017-11)
    The use of a well-designed and uniform notational system is imperative to improve communication and understanding. Currently, a fairly consistent notational system is used to notate the elements of sets, but the notations ...
  • Pillay, Nelishia; Qu, Rong; Srinivasan, Dipti; Hammer, Barbara; Sorensen, Kenneth (Institute of Electrical and Electronics Engineers, 2018-05)
    The three articles in this special section focus on the development of automated design of machine learning and search algorithms. There is a demand, especially from industry and business, to automate the design of machine ...
  • Trenwith, Philip M.; Venter, H.S. (Hein) (Taylor and Francis, 2018-04)
    Cloud computing offers users access to information from anywhere by duplicating and distributing information to multiple data centres around the globe. The distribution of information in such a manner presents a significant ...
  • Ledwaba, Lehlogonolo P.I.; Hancke, Gerhard P.; Venter, H.S. (Hein); Isaac, Sherrin J. (Institute of Electrical and Electronics Engineers, 2018)
    In past years, cryptography has been considered a dif cult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8- and 16-bit microcontroller units (MCUs). Previous ...
  • Maltese, Justin; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2018-02)
    Over the past few decades, a plethora of computational intelligence algorithms designed to solve multiobjective problems have been proposed in the literature. Unfortunately, it has been shown that a large majority of these ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...

View more