Please note that UPSpace will be unavailable from Friday, 2 May at 18:00 (South African Time) until Sunday, 4 May at 20:00 due to scheduled system upgrades. We apologise for any inconvenience this may cause and appreciate your understanding.
Browsing Research Articles (Computer Science) by Type "Article"
-
Kebande, Victor Rigworo; Karie, Nickson M.; Venter, H.S. (Hein)
(Indonesian Society for Knowledge and Human Development, 2018)
The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet
of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
-
Mushtaq, Muhammad Umer; Venter, H.S. (Hein); Singh, Avinash; Owais, Muhammad
(MDPI, 2025-03)
Energy harvesting wireless sensor networks (EH-WSNs) appear as the fundamental backbone of research that attempts to expand the lifespan and efficiency of sensor
networks positioned in resource-constrained environments. ...
-
Iliopoulos, Costas S.; Kourie, Derrick G.; Mouchard, Laurent; Musombuka, Themba K.; Pissis, Solon P.; De Ridder, Corne
(Elsevier, 2012-01)
Next-generation sequencing technologies have redefined the way genome sequencing is
performed. They are able to produce tens of millions of short sequences (reads), during
a single experiment, and with a much lower cost ...
-
Wekwete, Takura Asael; Kufakunesu, Rodwell; Van Zyl, A.J. (Gusti)
(Elsevier, 2023-11)
Asset Liability Management (ALM) is an essential risk management technique in Quantitative Finance and
Actuarial Science. It aims to maximise a risk-taker’s ability to fulfil future liabilities. ALM is especially critical
in ...
-
Ras, D.J.; Venter, H.S. (Hein)
(AOSIS Open Journals, 2016)
Cloud systems have to deal with massive amounts of distributed, volatile data which
makes forensic investigations difficult. Using the NIST reference architecture, a system is
devised to proactively capture forensic data ...
-
Gerber, Mia; Pillay, Nelishia
(MDPI, 2022-11-29)
Deep neural networks have proven to be effective in various domains, especially in natural
language processing and image processing. However, one of the challenges associated with using
deep neural networks includes the ...
-
Kebande, Victor Rigworo; Venter, H.S. (Hein)
(NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
-
Mathebula, Miehleketo; Modupe, Abiodun; Marivate, Vukosi
(Institute of Electrical and Electronics Engineers, 2024-09)
Social media platforms play a significant role in analyzing customer perceptions of financial
products and services in today’s culture. These platforms facilitate the immediate and in-depth sharing of
thoughts and ...
-
Mbona, Innocent; Eloff, Jan H.P.
(Oxford University Press, 2023)
Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and social bots (referred to as bots) are highly prevalent. State-of-the-art research demonstrates that bots can be broadly categorized ...
-
Mushtaq, Muhammad Umer; Venter, H.S. (Hein); Muhammad, Owais; Shafique, Tamoor; Awwad, Fuad A.; Ismail, Emad A.A.
(Elsevier, 2025-03)
Many sectors in aerial transportation use unmanned aircraft vehicles (UAVs) extensively. This becomes even more challenging in complex environments where not only it is required to avoid obstacles, but it also must be ...
-
Srikissoon, Trishanta; Marivate, Vukosi
(Easychair, 2023)
Automated hate speech detection is important to protecting people’s dignity, online experiences, and physical safety in Society 5.0. Transformers are sophisticated pre-trained language models that can be fine-tuned for ...
-
Vural, Ickin; Venter, H.S. (Hein)
(Graz University of Technology, 2012-03-28)
Malicious software (malware) infects large numbers of mobile devices. Once
infected these mobile devices may be involved in many kinds of online criminal activity,
including identity theft, unsolicited commercial SMS ...
-
Ahmad, Mushtag; Gruner, Stefan; Afzal, Muhammad Tanvir
(Graz University of Technology, 2012-12-01)
Medieval manuscripts or other written documents from that period contain
valuable information about people, religion, and politics of the medieval period, making
the study of medieval documents a necessary pre-requisite ...
-
Mphahlele, M.I.; Olugbara, O.O.; Ojo, S.O.; Kourie, Derrick G.
(Operations Research Society of SA, 2011-03)
Cross-impact analysis relies on decision makers to provide marginal probability estimates of interdependent events. Generally, these have to be revised in order to ensure overall system coherency. This paper describes ...
-
Klopper, Christiaan; Eloff, Jan H.P.
(Institute of Electrical and Electronics Engineers, 2024-10)
Artificial intelligence (AI)-assisted cyber-attacks have evolved to become increasingly
successful in every aspect of the cyber-defence life cycle. For example, in the reconnaissance phase, AI-enhanced tools such as MalGAN ...
-
Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P.
(Computer Society of South Africa, 2014-12)
The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not
re
ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
-
Adekoya, Adekunle Rotimi; Helbig, Marde
(MDPI, 2023-10)
Dynamic multi-objective optimization problems (DMOPs) are optimization problems where elements of the problems, such as the objective functions and/or constraints, change with time. These problems are characterized by two ...
-
Craze, Hamish A.; Pillay, Nelishia; Joubert, Fourie; Berger, David Kenneth
(MDPI, 2022-07-26)
Maize yields worldwide are limited by foliar diseases that could be fungal, oomycete,
bacterial, or viral in origin. Correct disease identification is critical for farmers to apply the correct
control measures, such as ...
-
Panagiotou, Savvas; Bosman, Anna
(Elsevier, 2024-12)
Low-light image enhancement (LLIE) techniques attempt to increase the visibility of images captured in low-light scenarios. However, as a result of enhancement, a variety of image degradations such as noise and color bias ...
-
Pieterse, Heloise; Olivier, Martin S.
(Journal of Information Warfare, 2013)
The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...