Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Springer, 2018-10)
    This paper examines the position update equation of the particle swarm optimization (PSO) algorithm, leading to the proposal of a simplified position update based upon a Gaussian distribution. The proposed algorithm, ...
  • Cleghorn, Christopher Wesley; Engelbrecht, Andries P. (Springer, 2014-03)
    A number of theoretical studies of particle swarm optimization (PSO) have been done to gain a better understanding of the dynamics of the algorithm and the behavior of the particles under different conditions. These ...
  • Kuranga, Cry; Pillay, Nelishia (Springer, 2021-09)
    Various machine learning techniques exist to perform regression on temporal data with concept drift occurring. However, there are numerous nonstationary environments where these techniques may fail to either track or detect ...
  • Cruz-Duarte, Jorge M.; Ortiz-Bayliss, Jose C.; Amaya, Ivan; Pillay, Nelishia (MDPI, 2021-06)
    Optimisation has been with us since before the first humans opened their eyes to natural phenomena that inspire technological progress. Nowadays, it is quite hard to find a solver from the overpopulation of metaheuristics ...
  • Stallmann, Christoph F.; Engelbrecht, Andries P. (Institute of Electrical and Electronics Engineers, 2017-06)
    Gramophone records were the main recording medium for more than seven decades and regained widespread popularity over the past several years. Being an analog storage medium, gramophone records are subject to distortions ...
  • Gruner, Stefan (Cosmos and History Publishing Co-op, 2017)
    Long before Alan Turing laid the foundations of the ongoing artificial intelligence project with all its computer-scientific and philosophical consequences and side effects, we can find in a short but intellectually dense ...
  • Ojha, Varun; Abraham, Ajith; Snasel, Vaclav (Elsevier, 2019-10)
    This paper provides an in-depth review of the optimal design of type-1 and type-2 fuzzy inference systems (FIS) using five well known computational frameworks: genetic-fuzzy systems (GFS), neuro-fuzzy systems (NFS), ...
  • Gruner, Stefan (Computer Society of South Africa, 2007-06)
    If you follow the recent IT-related discussions in South Africa with open ears, you will certainly have heard voices complaining about a shortage of skilled staff in the IT industry and a too low output of MSc-Graduates ...
  • Hassan, Ahmed; Pillay, Nelishia (Elsevier, 2019-09)
    Hybrid metaheuristics have proven to be effective at solving complex real-world problems. However, designing hybrid metaheuristics is extremely time consuming and requires expert knowledge of the different metaheuristics ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...
  • Pillay, Nelishia (Springer, 2020-06)
    Since its inception genetic programming, and later variations such as grammar-based genetic programming and grammatical evolution, have contributed to various domains such as classification, image processing, search-based ...
  • Hauger, W.K. (Werner); Olivier, Martin S. (South African Institute of Electrical Engineers, 2015-06)
    An aspect of database forensics that has not received much attention in the academic research community yet is the presence of database triggers. Database triggers and their implementations have not yet been thoroughly ...
  • Ludwig, Byron; Coetzee, Serena Martha (Springer, 2012)
    Cloud computing is an emerging computing paradigm aimed at running services over the internet to provide scalability and flexibility. The advantages in using the cloud for start‐up and small businesses that lack ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity is unable to express ...
  • Motjolopane, Refiloe; Lutu, Patricia Elizabeth Nalwoga (City University of Hong Kong, 2012)
    The importance of effective supervision of banking institutions in developing countries cannot be over-emphasised. Central banks are responsible for the supervision of the banking institutions of a country. In order to ...
  • Marivate, Vukosi; Sefara, Tshephisho (Springer, 2020-08)
    We study the effect of different approaches to text augmentation. To do this we use three datasets that include social media and formal text in the form of news articles. Our goal is to provide insights for practitioners ...
  • Burkard, Benjamin; Vogeler, Georg; Gruner, Stefan (Graz University of Technology, 2008)
    This article is a revised and extended version of [VBG, 07]. We conjecture that the digitalization of historical text documents as a basis of data mining and information retrieval for the purpose of progress in the history ...
  • Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Eloff, M.M. (Elsevier, 2009)
    Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; ...
  • Da Veiga, A.; Martins, Nico; Eloff, Jan H.P. (College of Economic and Management Sciences, University of South Africa, 2007-04)
    Organisations need to ensure that the interaction among people, as well as between people and information technology (IT) systems, contributes to the protection of information assets. Organisations therefore need to assess ...
  • Kohn, Michael Donovan; Eloff, M.M.; Eloff, Jan H.P. (Elsevier, 2013-10)
    Digital forensics is an established research and application field. Various process models exist describing the steps and processes to follow during digital forensic investigations. During such investigations, it is not ...