Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Mokoatle, Mpho; Mapiye, Darlington; Marivate, Vukosi; Hayes, Vanessa M.; Bornman, Maria S. (Riana) (Public Library of Science, 2022-06-09)
    One of the most precise methods to detect prostate cancer is by evaluation of a stained biopsy by a pathologist under a microscope. Regions of the tissue are assessed and graded according to the observed histological ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Bosman, Phlippie; Engelbrecht, Andries P. (Springer, 2014)
    The diversity of a particle swarm can reflect the swarm's explorative/exploitative behaviour at a given time step. This paper pro- poses a diversity rate of change measure to quantify the rate at which particle swarms ...
  • Ibrahim, Zuwairie; Khalid, Noor Khafifah; Buyamin, Salinda; Ibrahim, Ismail; Mukred, Jameel Abdulla Ahmed; Yusof, Zulkifli Md.; Mohamad, Mohd Saberi; Mokhtar, N.; Saaid, Muhammad Faiz Mohamed; Engelbrecht, Andries P. (ICIC International, 2012-05)
    Deoxyribonucleic Acid (DNA) has certain unique properties such as self- assembly and self-complementary in hybridization, which are important in many DNA- based technologies. DNA computing, for example, uses these ...
  • Mcuba, Mvelo; Singh, Avinash; Ikuesan, Richard Adeyemi; Venter, H.S. (Hein) (Elsevier, 2023)
    Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice cloning systems are smart enough to learn speech characteristics from a few samples and ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Tofan, Dan; Galster, Matthias; Lytra, Ioanna; Avgeriou, Paris; Zdun, Uwe; Fouche, Mark-Anthony; De Boer, Remco; Solms, Fritz (Elsevier, 2016-04)
    CONTEXT : Many software architectural decisions are group decisions rather than decisions made by individuals. Consensus in a group of decision makers increases the acceptance of a decision among decision makers and their ...
  • Shukla, Amit K.; Janmaijaya, Manvendra; Abraham, Ajith; Muhuri, Pranab K. (Elsevier, 2019-10)
    The Engineering Applications of Artificial Intelligence (EAAI) is a journal of very high repute in the domain of Engineering and Computer Science. This paper gives a broad view of the publications in EAAI from 1988–2018, ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Nitschke, G.S.; Schut, M.C.; Eiben, A.E. (Elsevier, 2012-02)
    This article comparatively tests three cooperative co-evolution methods for automated controller design in simulated robot teams. Collective Neuro- Evolution (CONE) co-evolves multiple robot controllers using emergent ...
  • Mwaura, Jonathan; Keedwell, Ed (Springer, 2015-05)
    Many approaches to AI in robotics use a multi-layered approach to determine levels of behaviour from basic operations to goal-directed behaviour, the most well-known of which is the subsumption architecture. In this ...
  • Duvenhage, B.; Bouatouch, K.; Kourie, Derrick G. (Wiley-Blackwell, 2011)
    Backward polygon beam tracing methods, that is beam tracing from the light source (L), are well suited to gather path coherency from specular (S) scattering surfaces. These methods are useful for modelling and efficiently ...
  • Mbona, Innocent; Eloff, Jan H.P. (Elsevier, 2022-01)
    The increased amount of high-dimensional imbalanced data in online social networks challenges existing feature selection methods. Although feature selection methods such as principal component analysis (PCA) are effective ...
  • Mouton, Francois; Nottingham, Alastair; Leenen, Louise; Venter, H.S. (Hein) (South African Institute of Electrical Engineers, 2018-06)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are ...
  • Gruner, Stefan (Springer, 2010-12)
    This workshop aimed at bringing two orthogonal viewpoints about development methods in software engineering together.We were seeking new contributions towards making formal software development faster, and rapid software ...
  • Marivate, Vukosi; Aghoghovwia, Philip; Ismail, Yaseera; Mahomed-Asmail, Faheema; Steenhuisen, Sandy-Lynn (Academy of Science of South Africa, 2021-05)
    The future of a country like South Africa is predicated upon policies; whether these policies are effective or ineffective is not primarily an issue. The prospects and realities of the Fourth Industrial Revolution (4IR) ...
  • Bihina Bella, M.A. (Madeleine Adrienne); Eloff, Jan H.P.; Olivier, Martin S. (Elsevier, 2009)
    This paper proposes an original architecture for a fraud management system (FMS) for convergent. Nextgeneration networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy ...
  • Trenwith, Philip M.; Venter, H.S. (Hein) (Taylor and Francis, 2019)
    Cloud computing offers users access to information from anywhere by duplicating and distributing information to multiple data centres around the globe. The distribution of information in such a manner presents a significant ...
  • Gruner, Stefan (Springer-Verlag, 2008)
    In "use cases considered harmful", Simons has analyzed the logical weaknesses of the UML use case notation and has recommended to “fix the faulty notion of dependency” (Simons: Use cases considered harmful. 29th Conference ...
  • Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...