Browsing Research Articles (Computer Science) by Type "Article"

Browsing Research Articles (Computer Science) by Type "Article"

Sort by: Order: Results:

  • Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne (Elsevier, 2012-01)
    Next-generation sequencing technologies have redefined the way genome sequencing is performed. They are able to produce tens of millions of short sequences (reads), during a single experiment, and with a much lower cost ...
  • Ras, D.J.; Venter, H.S. (Hein) (AOSIS Open Journals, 2016)
    Cloud systems have to deal with massive amounts of distributed, volatile data which makes forensic investigations difficult. Using the NIST reference architecture, a system is devised to proactively capture forensic data ...
  • Kebande, Victor Rigworo; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Vural, Ickin; Venter, Hein S. (Graz University of Technology, 2012-03-28)
    Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS ...
  • Ahmad, Mushtag; Gruner, Stefan; Afzal, Muhammad Tanvir (Graz University of Technology, 2012-12-01)
    Medieval manuscripts or other written documents from that period contain valuable information about people, religion, and politics of the medieval period, making the study of medieval documents a necessary pre-requisite ...
  • Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G. (Operations Research Society of SA, 2011-03)
    Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Kigwana, Ivans; Venter, H.S. (Hein) (Computer Society of South Africa, 2018-07-10)
    Some institutions provide online courses to students to ease the courses’ workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Ibrahim, Zuwairie; Khalid, Noor Khafifah; Buyamin, Salinda; Ibrahim, Ismail; Mukred, Jameel Abdulla Ahmed; Yusof, Zulkifli Md.; Mohamad, Mohd Saberi; Mokhtar, N.; Saaid, Muhammad Faiz Mohamed; Engelbrecht, Andries P. (ICIC International, 2012-05)
    Deoxyribonucleic Acid (DNA) has certain unique properties such as self- assembly and self-complementary in hybridization, which are important in many DNA- based technologies. DNA computing, for example, uses these ...
  • Du Plessis, Susanna H.; Pieterse, Vreda (AOSIS Open Journals, 2017)
    Mathematics is an important cornerstone to most forms of tertiary education and the quality of mathematics education an important determinant for a nation’s economic progress. We propose a study to determine the effect ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Mouton, Francois; Nottingham, Alastair; Leenen, Louise; Venter, H.S. (Hein) (South African Institute of Electrical Engineers, 2018-06)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. Human operators are one of the weakest links in the security chain as they are ...
  • Marivate, Vukosi; Aghoghovwia, Philip; Ismail, Yaseera; Mahomed-Asmail, Faheema; Steenhuisen, Sandy-Lynn (Academy of Science of South Africa, 2021-05)
    The future of a country like South Africa is predicated upon policies; whether these policies are effective or ineffective is not primarily an issue. The prospects and realities of the Fourth Industrial Revolution (4IR) ...
  • Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...
  • Rehman, Shafiqur; Khan, Salman Ahmad (MDPI Publishing, 2016-10-26)
    The emergence of wind energy as a potential alternative to traditional sources of fuel has prompted notable research in recent years. One primary factor contributing to efficient utilization of wind energy from a wind ...
  • Cruz-Duarte, Jorge M.; Ortiz-Bayliss, Jose C.; Amaya, Ivan; Pillay, Nelishia (MDPI, 2021-06)
    Optimisation has been with us since before the first humans opened their eyes to natural phenomena that inspire technological progress. Nowadays, it is quite hard to find a solver from the overpopulation of metaheuristics ...