default search action
ICTAS 2018: Durban, South Africa
- 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, March 8-9, 2018. IEEE 2018, ISBN 978-1-5386-6562-6
- Samwel Dick Mwapwele, Sumarie Roodt:
Teacher's adoption and use of mobile devices outside the classroom for learning in Africa: A complementary case study of secondary school teachers in South Africa and Tanzania. 1-7 - Riaan Roos, Jan Carel Mentz:
Factors that influence enterprise architecture decision making. 1-6 - Brett van Niekerk:
Information warfare as a continuation of politics: An analysis of cyber incidents. 1-6 - Kudzai Mapingire, Phil van Deventer, Alta van der Merwe:
Positioning the role of the enterprise architect: An independent study in a mobile telecommunications organisation. 1-6 - Joshua Magunduni, Wallace Chigona:
Revisiting shadow IT research: What we already know, what we still need to know, and how do we get there? 1-6 - Kennedy Chengeta, Serestina Viriri:
A survey on facial recognition based on local directional and local binary patterns. 1-6 - Judy van Biljon, Ronell van der Merwe:
Trends, drivers and barriers influencing cloud computing services for mobile interactions in teaching and learning. 1-7 - Kudakwashe Zvarevashe, Oludayo O. Olugbara:
A framework for sentiment analysis with opinion mining of hotel reviews. 1-4 - Bin Bin Ma, Simon Fong, Richard C. Millham:
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms. 1-6 - Sheethal Liz Tom, Noluntu Mpekoa, James Swart:
Factors that affect the provision of visually impaired learners in higher education. 1-5 - Muyowa Mutemwa, Francois Mouton:
Cyber security threats and mitigation techniques for multifunctional devices. 1-6 - Cynthia Sthembile Ntshangase, Meshack Bafana Shabalala:
Encryption using finger-code generated from fingerprints. 1-5 - Lanka Chris Sejaphala, Mthulisi Velempini:
Investigating high traffic rate distributed denial of service attacks detection mechanisms in software-defined networks. 1-6 - M. C. Phahlamohlaka, Marijke Coetzee:
CaseRank: Ranking case law using precedent and principal component analysis. 1-6 - Cuthbert Chidoori, Jean-Paul Van Belle:
Attitudes towards the uptake of open source software by small and medium enterprises in the Western Cape, South Africa. 1-6 - Salma Mohamed, Nahla Nour, Serestina Viriri:
Gender identification from facial images using global features. 1-6 - Odirile O. Moja, Katherine M. Malan:
Issues and a proposal for automated retirement portfolio risk matching in South Africa. 1-6 - Anura Hiraman, Serestina Viriri, Mandlenkosi Victor Gwetu:
Efficient 3D liver segmentation using enhanced image alignment. 1-8 - Craig Mills, Bertram Haskins:
Using mobile technology in an adventure sport. 1-6 - Areeg M. Osman, Serestina Viriri:
Face verification across age progression: A survey of the state-of-the-art. 1-6 - Adam Hassan, Serestina Viriri:
Invariant feature extraction for facial recognition: A survey of the state-of-the-art. 1-6 - Sewisha Lehong, Judy van Biljon, Estelle de Kock:
Knowledge sharing platforms in ICT4D: Towards validated content requirements. 1-6 - Musa Chemisto, Ulrike Rivett:
Examining the adoption and usage of an e-government system in rural South Africa: Examining e-government system adoption. 1-6 - Maake Benard Magara, Sunday Olusegun Ojo, Tranos Zuva:
A comparative analysis of text similarity measures and algorithms in research paper recommender systems. 1-5 - Issah Ngomane, Mthulisi Velempini, Sabelo Velemseni Dlamini:
The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks. 1-5 - Ima Okon Essiet, Yanxia Sun, Zenghui Wang:
A novel algorithm for optimizing the Pareto set in dynamic problem spaces. 1-6 - Siddig Gomha, Kibet Langat:
On-chip 60 GHz transformers for next generation of wireless communication in a 0.13μ BiCMOS technology. 1-4 - Naomi Chimpeni, Jean-Paul Van Belle:
The role of country characteristics in ICT value realization in financial institutions: The case of Southern Africa least developing countries. 1-6 - Olakumbi A. Fadiran, Judy van Biljon, Marthie A. Schoeman:
How can visualisation principles be used to support knowledge transfer in teaching and learning? 1-6 - Vreda Pieterse, Mpho Leeu, Marko C. J. D. van Eekelen:
How personality diversity influences team performance in student software engineering teams. 1-6 - Temitope Mapayi, Jules-Raymond Tapamo:
Performance comparison of supervised learning methods for retinal vessel tortuosity characterisation. 1-7 - Victor Oluwatobiloba Adeniji, Khulumani Sibanda:
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks. 1-6 - Mayibongwe H. Bayana, Serestina Viriri:
Gender classification based on fusion of facial components features. 1-5 - Adéle da Veiga:
An online information privacy culture: A framework and validated instrument to measure consumer expectations and confidence. 1-6 - Muhammad Abrar, Waleed Elahi Khan:
Digital filtering techniques for power-line interference removal from ECG signals. 1-6 - Andile M. Miaba, Mandlenkosi Victor Gwetu, Serestina Viriri:
Online signature verification using hybrid transform features. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.