Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Antoniou, Pavlos; Pitsillides, Andreas; Blackwell, Tim; Engelbrecht, Andries P.; Michael, Loizos (Elsevier, 2013)
    This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach ...
  • Van den Bergh, Frans; Engelbrecht, Andries P. (IOS Pres, 2010)
    The Particle Swarm Optimiser (PSO) is a population based stochastic optimisation algorithm, empirically shown to be efficient and robust. This paper provides a proof to show that the original PSO does not have guaranteed ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Leonard, Barend J.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2015-12)
    This article investigates various aspects of angle modulated particle swarm optimisers (AMPSO). Previous attempts at improving the algorithm have only been able to produce better results in a handful of test cases. With ...
  • Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G. (Operations Research Society of SA, 2011-03)
    Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Kraemer, Moritz U.G.; Scarpino, Samuel V.; Marivate, Vukosi; Gutierrez, Bernardo; Xu, Bo; Lee, Graham; Hawkins, Jared B.; Rivers, Caitlin; Pigott, David M.; Katz, Rebecca; Brownstein, John S. (Nature Research, 2021-01)
    Detailed, accurate data related to a disease outbreak enable informed public health decision making. Given the variety of data types available across different regions, global data curation and standardization efforts are ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
  • Gruner, Stefan; Steyn, T.J. (Elsevier, 2010-07)
    With the re-emergence of parallel computation for technical applications in these days also the classical concept of systolic arrays is becoming important again. However, for the sake of their operational safety, the ...
  • Adekoya, Adekunle Rotimi; Helbig, Marde (MDPI, 2023-10)
    Dynamic multi-objective optimization problems (DMOPs) are optimization problems where elements of the problems, such as the objective functions and/or constraints, change with time. These problems are characterized by two ...
  • Craze, Hamish A.; Pillay, Nelishia; Joubert, Fourie; Berger, David Kenneth (MDPI, 2022-07-26)
    Maize yields worldwide are limited by foliar diseases that could be fungal, oomycete, bacterial, or viral in origin. Correct disease identification is critical for farmers to apply the correct control measures, such as ...
  • Oldewage, E.T.; Engelbrecht, A.P.; Cleghorn, Christopher Wesley (Springer, 2019-12)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity in the particle ...
  • Panagiotou, Savvas; Bosman, Anna (Elsevier, 2024-12)
    Low-light image enhancement (LLIE) techniques attempt to increase the visibility of images captured in low-light scenarios. However, as a result of enhancement, a variety of image degradations such as noise and color bias ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Springer, 2019-01-25)
    Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Mbona, Innocent; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2022-06-29)
    Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they ...
  • Du Plessis, M.C. (Mathys Cornelius); Engelbrecht, Andries P. (Springer, 2013-01)
    This paper investigates optimization in dynamic environments where the numbers of optima are unknown or fluctuating. The authors present a novel algorithm, Dynamic Population DifferentialEvolution (DynPopDE),which is ...
  • Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Elsevier, 2019-09)
    The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication ...
  • Omeleze, Stacey; Venter, H.S. (Hein) (Taylor and Francis, 2019)
    The requirement to identify the cause of an incident, following the trail of events preceding an incident, as well as proving the consistency of the potential evidence recovered from the alleged incident, ultimately demand ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...