Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Nitschke, G.S.; Schut, M.C.; Eiben, A.E. (Springer, 2009-12)
    This article presents results from an evaluation of the collective neuro-evolution (CONE)controller design method. CONE solves collective behavior tasks, and increases task performance via facilitating emergent behavioral ...
  • Srikissoon, Trishanta; Marivate, Vukosi (Easychair, 2023)
    Automated hate speech detection is important to protecting people’s dignity, online experiences, and physical safety in Society 5.0. Transformers are sophisticated pre-trained language models that can be fine-tuned for ...
  • Vural, Ickin; Venter, H.S. (Hein) (Graz University of Technology, 2012-03-28)
    Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS ...
  • Kuranga, Cry; Pillay, Nelishia (Elsevier, 2022-03)
    Usually, real-world time-series forecasting problems are dynamic. If such time-series are characterized by mere concept shifts, a passive approach to learning become ideal to continuously adapt the model parameters whenever ...
  • Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S. (Elsevier, 2008-11)
    In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...
  • Valjarevic, Aleksandar; Venter, H.S. (Hein) (Wiley, 2015-11)
    Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors ...
  • Ahmad, Mushtag; Gruner, Stefan; Afzal, Muhammad Tanvir (Graz University of Technology, 2012-12-01)
    Medieval manuscripts or other written documents from that period contain valuable information about people, religion, and politics of the medieval period, making the study of medieval documents a necessary pre-requisite ...
  • Antoniou, Pavlos; Pitsillides, Andreas; Blackwell, Tim; Engelbrecht, Andries P.; Michael, Loizos (Elsevier, 2013)
    This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach ...
  • Van den Bergh, Frans; Engelbrecht, Andries P. (IOS Pres, 2010)
    The Particle Swarm Optimiser (PSO) is a population based stochastic optimisation algorithm, empirically shown to be efficient and robust. This paper provides a proof to show that the original PSO does not have guaranteed ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Leonard, Barend J.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2015-12)
    This article investigates various aspects of angle modulated particle swarm optimisers (AMPSO). Previous attempts at improving the algorithm have only been able to produce better results in a handful of test cases. With ...
  • Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G. (Operations Research Society of SA, 2011-03)
    Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Kraemer, Moritz U.G.; Scarpino, Samuel V.; Marivate, Vukosi; Gutierrez, Bernardo; Xu, Bo; Lee, Graham; Hawkins, Jared B.; Rivers, Caitlin; Pigott, David M.; Katz, Rebecca; Brownstein, John S. (Nature Research, 2021-01)
    Detailed, accurate data related to a disease outbreak enable informed public health decision making. Given the variety of data types available across different regions, global data curation and standardization efforts are ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
  • Gruner, Stefan; Steyn, T.J. (Elsevier, 2010-07)
    With the re-emergence of parallel computation for technical applications in these days also the classical concept of systolic arrays is becoming important again. However, for the sake of their operational safety, the ...
  • Adekoya, Adekunle Rotimi; Helbig, Marde (MDPI, 2023-10)
    Dynamic multi-objective optimization problems (DMOPs) are optimization problems where elements of the problems, such as the objective functions and/or constraints, change with time. These problems are characterized by two ...
  • Craze, Hamish A.; Pillay, Nelishia; Joubert, Fourie; Berger, David Kenneth (MDPI, 2022-07-26)
    Maize yields worldwide are limited by foliar diseases that could be fungal, oomycete, bacterial, or viral in origin. Correct disease identification is critical for farmers to apply the correct control measures, such as ...
  • Oldewage, E.T.; Engelbrecht, A.P.; Cleghorn, Christopher Wesley (Springer, 2019-12)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity in the particle ...
  • Panagiotou, Savvas; Bosman, Anna (Elsevier, 2024-12)
    Low-light image enhancement (LLIE) techniques attempt to increase the visibility of images captured in low-light scenarios. However, as a result of enhancement, a variety of image degradations such as noise and color bias ...