Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Elsevier, 2018-03)
    Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change ...
  • Lo, Johnny Li-Chang; Bishop, Judith; Eloff, Jan H.P. (Elsevier, 2008-10)
    Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and ...
  • Mouton, Francois; Leenen, Louise; Venter, H.S. (Hein) (Elsevier, 2016-06)
    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the ...
  • Gruner, Stefan (Computer Society of South Africa, 2011-07)
    Small software companies make for the majority of software companies around the world, but their software development processes are often not as clearly de ned and structured as in their larger counterparts. Especially the ...
  • Kourie, Derrick G. (Royal Society of South Africa, 2010-06)
    The South African Computer Journal (SACJ), as the successor of the Quæstiones Informaticæ journal founded by Derek Henderson, is part of his heritage to South Africa. This brief historical sketch of SACJ outlines the ...
  • Cleghorn, Christopher Wesley; Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2018-10)
    At present particle swarm optimizers (PSO) designed for multi-objective optimization have undergone no form of theoretical stability analysis. This paper derives the sufficient and necessary conditions for order-1 and ...
  • Malan, Katherine Mary; Engelbrecht, Andries P. (Elsevier, 2013-08)
    Real-world optimisation problems are often very complex. Metaheuristics have been successful in solving many of these problems, but the difficulty in choosing the best approach can be a huge challenge for practitioners. ...
  • Karie, Nickson M.; Venter, Hein S. (Wiley, 2015-07)
    Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital ...
  • Pieterse, Vreda; Du Toit, Cecilia Magdalena (Unisa Press, 2008)
    A major challenge to the efficacy of student team learning projects occurs when some members of a group are unable to contribute effectively to the collaborative endeavour due to their academic deficits. A graded benchmark ...
  • Kundu, Soumyadeep; Paul, Sayantan; Bera, Suman Kumar; Abraham, Ajith; Sarkar, Ram (Elsevier, 2020-02)
    Text-line extraction (TLE) from unconstrained handwritten document images is still considered an open research problem. Literature survey reveals that use of various rule-based methods is commonplace in this regard. But ...
  • Timm, Nils; Gruner, Stefan (Elsevier, 2019-04)
    We present a technique for verifying concurrent software systems via SAT-based three-valued bounded model checking. It is based on a direct transfer of the system to be analysed and a temporal logic property into a ...
  • Abdulkarim, Salihu Aish; Engelbrecht, Andries P. (Springer, 2019-12)
    Artificial neural networks (NNs) are widely used in modeling and forecasting time series. Since most practical time series are non-stationary, NN forecasters are often implemented using recurrent/delayed connections to ...
  • Gruner, Stefan; Mosbah, Mohamed; Bauderon, Michel (2001)
    We present a tool for the visualization of distributed computations. Special attention is payed to certain distributed algorithms which have been coded as rewriting systems. In order to study the behaviour of algorithms ...
  • Karie, Nickson M.; Venter, Hein S. (Wiley-Blackwell, 2014-09)
    Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different ...
  • Ismaila, Idris.; Legbo, Victor Y.; Ikuesan, Adeyemi Richard; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J.; Baba, Meshach. (Blue Eyes Intelligence Engineering and Sciences Publication, 2019-05)
    Technology-assisted living is a growing trend in most developing nations, particularly for young-aged demographic countries, as it presents a platform for personal development and knowledge management. However, this ...
  • Solms, Fritz; Pieterse, Vreda (Springer, 2016-10)
    The automated static and dynamic assessment of programs makes it practical to increase the learning opportunities of large student classes through the regular assessment of programming assignments. Automatic assessments ...
  • Northover, Mandy; Kourie, Derrick G.; Boake, Andrew B.; Gruner, Stefan; Northover, Alan (Springer, 2008-08)
    Over the past four decades, software engineering has emerged as a discipline in its own right, though it has roots both in computer science and in classical engineering. Its philosophical foundations and premises are not ...
  • Rakitianskaia, A.S. (Anastassia Sergeevna); Engelbrecht, Andries P. (Springer, 2012-09)
    Particle swarm optimisation has been successfully applied to train feedforward neural networks in static environments.Many real-world problems to which neural networks are applied are dynamic in the sense that the ...
  • Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2016-02)
    A new competitive coevolutionary team-based particle swarm optimiser (CCPSO(t)) algorithm is developed to train multi-agent teams from zero knowledge. The CCPSO(t) algorithm is applied to train a team of agents to play ...
  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...