Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Omran, Mahamed G.H.; Engelbrecht, Andries P.; Salman, Ayed (Elsevier, 2008-07)
    The barebones differential evolution (BBDE) is a new, almost parameter-free optimization algorithm that is a hybrid of the barebones particle swarm optimizer and differential evolution. Differential evolution is used to ...
  • Helbig, Marde; Engelbrecht, Andries P. (Association for Computing, 2014-01)
    Algorithms that solve Dynamic Multi-Objective Optimisation Problems (DMOOPs) should be tested on benchmark functions to determine whether the algorithm can overcome specific difficulties that can occur in real-world problems. ...
  • Ventresca, Mario; Harrison, Kyle Robert; Ombuki-Berman, Beatrice M. (Elsevier, 2018-03)
    Identifying critical nodes in complex networks has become an important task across a variety of application domains. The Critical Node Detection Problem (CNDP) is an optimization problem that aims to minimize pairwise ...
  • Pieterse, Heloise; Olivier, Martin S. (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Kebande, Victor R.; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Malan, Katherine Mary; Engelbrecht, Andries P. (Springer, 2014-12)
    The focus of research in swarm intelligence has been largely on the algorithmic side with relatively little attention being paid to the study of problems and the behaviour of algorithms in relation to problems. When a ...
  • Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P. (Springer, 2012-03)
    The network theory in immunology inspired the modelling of network based artificial immune system (AIS) models for data clustering. Current network based AIS models determine the network connectivity between artificial ...
  • Nitschke, G.S.; Schut, M.C.; Eiben, A.E. (Springer, 2009-12)
    This article presents results from an evaluation of the collective neuro-evolution (CONE)controller design method. CONE solves collective behavior tasks, and increases task performance via facilitating emergent behavioral ...
  • Vural, Ickin; Venter, Hein S. (Graz University of Technology, 2012-03-28)
    Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS ...
  • Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S. (Elsevier, 2008-11)
    In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...
  • Valjarevic, Aleksandar; Venter, H.S. (Hein) (Wiley, 2015-11)
    Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors ...
  • Ahmad, Mushtag; Gruner, Stefan; Afzal, Muhammad Tanvir (Graz University of Technology, 2012-12-01)
    Medieval manuscripts or other written documents from that period contain valuable information about people, religion, and politics of the medieval period, making the study of medieval documents a necessary pre-requisite ...
  • Antoniou, Pavlos; Pitsillides, Andreas; Blackwell, Tim; Engelbrecht, Andries P.; Michael, Loizos (Elsevier, 2013)
    This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach ...
  • Van den Bergh, Frans; Engelbrecht, Andries P. (IOS Pres, 2010)
    The Particle Swarm Optimiser (PSO) is a population based stochastic optimisation algorithm, empirically shown to be efficient and robust. This paper provides a proof to show that the original PSO does not have guaranteed ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Leonard, Barend J.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2015-12)
    This article investigates various aspects of angle modulated particle swarm optimisers (AMPSO). Previous attempts at improving the algorithm have only been able to produce better results in a handful of test cases. With ...
  • Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G. (Operations Research Society of SA, 2011-03)
    Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...