Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Elsevier, 2019-09)
    The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication ...
  • Omeleze, Stacey; Venter, H.S. (Hein) (Taylor and Francis, 2019)
    The requirement to identify the cause of an incident, following the trail of events preceding an incident, as well as proving the consistency of the potential evidence recovered from the alleged incident, ultimately demand ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...
  • Singh, Avinash; Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Springer, 2019)
    Over the years there has been a significant increase in the exploitation of the security vulnerabilities of Windows operating systems, the most severe threat being malicious software (malware). Ransomware, a variant of ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Olivier, Martin S. (Springer, 2020-08)
    Constructions of science that slowly change over time are deemed to be the basis of the reliability with which scientific knowledge is regarded. A potential paradigm shift based on big data is looming – many researchers ...
  • Ngejane, C.H. (Hombakazi); Eloff, Jan H.P.; Sefara, T.J.; Marivate, Vukosi (Elsevier, 2021-03)
    Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of ...
  • Mokoatle, Mpho; Mapiye, Darlington; Marivate, Vukosi; Hayes, Vanessa M.; Bornman, Maria S. (Riana) (Public Library of Science, 2022-06-09)
    One of the most precise methods to detect prostate cancer is by evaluation of a stained biopsy by a pathologist under a microscope. Regions of the tissue are assessed and graded according to the observed histological ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Bosman, Phlippie; Engelbrecht, Andries P. (Springer, 2014)
    The diversity of a particle swarm can reflect the swarm's explorative/exploitative behaviour at a given time step. This paper pro- poses a diversity rate of change measure to quantify the rate at which particle swarms ...
  • Ibrahim, Zuwairie; Khalid, Noor Khafifah; Buyamin, Salinda; Ibrahim, Ismail; Mukred, Jameel Abdulla Ahmed; Yusof, Zulkifli Md.; Mohamad, Mohd Saberi; Mokhtar, N.; Saaid, Muhammad Faiz Mohamed; Engelbrecht, Andries P. (ICIC International, 2012-05)
    Deoxyribonucleic Acid (DNA) has certain unique properties such as self- assembly and self-complementary in hybridization, which are important in many DNA- based technologies. DNA computing, for example, uses these ...
  • Mcuba, Mvelo; Singh, Avinash; Ikuesan, Richard Adeyemi; Venter, H.S. (Hein) (Elsevier, 2023)
    Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice cloning systems are smart enough to learn speech characteristics from a few samples and ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Tofan, Dan; Galster, Matthias; Lytra, Ioanna; Avgeriou, Paris; Zdun, Uwe; Fouche, Mark-Anthony; De Boer, Remco; Solms, Fritz (Elsevier, 2016-04)
    CONTEXT : Many software architectural decisions are group decisions rather than decisions made by individuals. Consensus in a group of decision makers increases the acceptance of a decision among decision makers and their ...
  • Shukla, Amit K.; Janmaijaya, Manvendra; Abraham, Ajith; Muhuri, Pranab K. (Elsevier, 2019-10)
    The Engineering Applications of Artificial Intelligence (EAAI) is a journal of very high repute in the domain of Engineering and Computer Science. This paper gives a broad view of the publications in EAAI from 1988–2018, ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Nitschke, G.S.; Schut, M.C.; Eiben, A.E. (Elsevier, 2012-02)
    This article comparatively tests three cooperative co-evolution methods for automated controller design in simulated robot teams. Collective Neuro- Evolution (CONE) co-evolves multiple robot controllers using emergent ...
  • Mwaura, Jonathan; Keedwell, Ed (Springer, 2015-05)
    Many approaches to AI in robotics use a multi-layered approach to determine levels of behaviour from basic operations to goal-directed behaviour, the most well-known of which is the subsumption architecture. In this ...
  • Duvenhage, B.; Bouatouch, K.; Kourie, Derrick G. (Wiley-Blackwell, 2011)
    Backward polygon beam tracing methods, that is beam tracing from the light source (L), are well suited to gather path coherency from specular (S) scattering surfaces. These methods are useful for modelling and efficiently ...
  • Mbona, Innocent; Eloff, Jan H.P. (Elsevier, 2022-01)
    The increased amount of high-dimensional imbalanced data in online social networks challenges existing feature selection methods. Although feature selection methods such as principal component analysis (PCA) are effective ...