Abstract is missing.
- Hybrid component-based face recognitionAndile M. Gumede, Serestina Viriri, Mandlenkosi Victor Gwetu. 1-6 [doi]
- Landmark localization approach for facial computingRaphael Angulu, Aderemi Oluyinka Adewumi, Jules-Raymond Tapamo. 1-6 [doi]
- Using a user experience evaluation framework for eModerationCornè Johandia van Staden, Judy A. van Biljon, Jan H. Kroeze. 1-6 [doi]
- Developing e-examination voice interface for visually impaired students in open and distance learning contextAmbrose A. Azeta, Itorobong A. Inam, Olawande Daramola. 1-6 [doi]
- Developing a cyber threat intelligence sharing platform for South African organisationsMuyowa Mutemwa, Jabu Mtsweni, Njabulo Mkhonto. 1-6 [doi]
- Consumer attitudes towards proximity sensors in the South African retail marketMarc Cordiglia, Jean-Paul Van Belle. 1-6 [doi]
- Comparative analysis and review of interactive voice response systemsItorobong A. Inam, Ambrose A. Azeta, Olawande Daramola. 1-6 [doi]
- Initiating a pipeline for the computer industry: Using scratch and LEGO roboticsRonald N. Beyers, Lorna van der Merwe. 1-7 [doi]
- Role multiplicity of FeesMustFall students: Role differentiation analysis of Twitter dataMarie Hattingh, Sunet Eybers, Bruce Liu. 1-6 [doi]
- Examining the evolution of mobile bully-victims across different schools located in low to high safety risk areas in Cape Town, South AfricaKedibone Charlotte Namane, Michael Kyobe. 1-5 [doi]
- Mobile on-board vehicle event recorder: MOVERLuke Kingsley Bell, Francois Mouton, Tommie Meyer. 1-7 [doi]
- Mobile search interfaces for isiXhosa speakers: A comparison between voice and textMorebodi Modise, Hussein Suleman. 1-6 [doi]
- Post cloud computing implementation benefits and challenges realised for a South African technology companyMichael Kudakwashe Chihande, John Andrew van der Poll. 1-6 [doi]
- Student perception of the contribution of Hackathon and collaborative learning approach on computer programming pass rateMhlongo Donald Sakhumuzi, Oyetade Kayode Emmanuel. 1-5 [doi]
- Improving the information security of personal electronic health records to protect a patient's health informationFloyd Els, Liezel Cilliers. 1-6 [doi]
- The playability of a selected computer game and its impact towards the improvement of English vocabulariesMatshafeni Lucas Lingwati. 1-7 [doi]
- Exploring energy harvesting technology for wireless charging of mobile device batteriesNeetu Ramsaroop, Oludayo O. Olugbara, Esther Joubert. 1-5 [doi]
- A distance-based approach to modelling reference signature for verificationA. S. P. Mlaba, Mandlenkosi Victor Gwetu, Serestina Viriri. 1-6 [doi]
- Semi-supervised probabilistics approach for normalising informal short text messagesAbiodun Modupe, Turgay Çelik, Vukosi Marivate, Melvin Diale. 1-8 [doi]
- A conceptual research framework for human resource information systems adoption and use in universitiesMampilo M. Phahlane, Raymond M. Kekwaletswe. 1-6 [doi]
- The changing nature of user involvement in information system development projectsJeanette W. Wing, Theo N. Andrew, Doncho Petkov. 1-6 [doi]
- Leveraging big data to combat terrorism in developing countriesTaiwo Kolajo, Olawande J. Daramola. 1-6 [doi]
- A comparison of two blockchain architectures for inspiring corporate excellence in South AfricaLaurie L. Butgereit, Chris Martinus. 1-6 [doi]
- A framework for assessing the socio-economic impact of e-governance projects in developing countriesSylvester Hatsu, Ernest Ketcha Ngassam. 1-7 [doi]
- Acceptance and usage of learning management system amongst academicsSizwe Dlalisa. 1-7 [doi]