Abstract is missing.
- Facial Expression Recognition: A Review of Methods, Performances and LimitationsOlufisayo Ekundayo, Serestina Viriri. 1-6 [doi]
- A Twitter knowledge sharing model based on small businesses in the Western CapeWiaan Heyns, Sheryl Buckley. 1-5 [doi]
- A Smart Home Energy Management System using Smart PlugsProgress Mtshali, Freedom Khubia. 1-5 [doi]
- Local Descriptors Parameter characterization with Fisher vectors for remote sensing imagesRonald Tombe, Serestina Viriri. 1-5 [doi]
- Video Relay Service for Deaf people using WebRTCAndre J. Henney, William D. Tucker. 1-6 [doi]
- Building a National Network through peered community area networks: realising ICTs within developing countriesMax Mitchell, Ingrid Siebörger. 1-5 [doi]
- A conceptual model of information security compliant behaviour based on the self-determination theoryYotamu Gangire, Adéle da Veiga, Marlien Herselman. 1-6 [doi]
- Efficient Region of Interest Detection for Liver Segmentation using 3D CT ScansAnura Hiraman, Serestina Viriri, Mandlenkosi Victor Gwetu. 1-6 [doi]
- Foresight: Real Time Facial Detection and Recognition Using WebAssembly and Localized Deep Neural NetworksPrashaan Pillay, Serestina Viriri. 1-6 [doi]
- Developing a framework towards improving business analysis of integrated public e-service systemsShivani Naicker, Alveen Singh. 1-6 [doi]
- Visualization Criteria: supporting knowledge transfer in Incident Management SystemsQuintus van Wyk, Judy van Biljon, Marthie A. Schoeman. 1-6 [doi]
- A Smart City Stakeholder Classification ModelAnthea van der Hoogen, Brenda Scholtz, André P. Calitz. 1-6 [doi]
- Guidelines for Secure Cloud-Based Personal Health RecordsAvuya Mxoli, Nicky Mostert, Mariana Gerber. 1-7 [doi]
- Comparison of students using electronic learning website of University of South AfricaMotlhabane Jacobus Maboe, Mariki M. Eloff, Marthie Schoeman. 1-6 [doi]
- Reducing Zapping Delay in Internet Protocol Television Using a Hybrid Modular MethodTimothy T. Adeliyi, Oludayo O. Olugbara. 1-4 [doi]
- Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}Tapiwa Gundu, Stephen Flowerday, Karen Renaud. 1-6 [doi]
- Retail banking service quality measurement: SERVQUAL gap analysisMathias Mujinga. 1-6 [doi]
- Agile UX: Integrating good UX development practices in AgileNarendren Pillay, Jeanette Wing. 1-6 [doi]
- A Smart Home Appliance Control System for Physically Disabled PeopleProgress Mtshali, Freedom Khubisa. 1-5 [doi]
- The potential use of Tablet Computers to support Teaching and Learning activities in South African SchoolsKristen Theunissen, Ingrid Siebörger. 1-6 [doi]
- Reliable Internet of Things Network Architecture Based on High Altitude PlatformsS. Sibiya, Oludayo O. Olugbara. 1-4 [doi]
- Improved Resource Allocation and Network Connectivity in CRSN Based Smart Grid for Efficient Grid AutomationEmmanuel U. Ogbodo, David G. Dorrell, Adnan M. Abu-Mahfouz. 1-6 [doi]
- Analysis of the Narrow Band Internet of Things (NB-IoT) TechnologyKishor Krishnan Nair, Adnan M. Abu-Mahfouz, Samuel Lefophane. 1-6 [doi]
- A Review of Local, Holistic and Deep Learning Approaches in Facial Expressions RecognitionKennedy Chengeta, Serestina Viriri. 1-7 [doi]
- Adoption of an Integrated Cloud-Based Electronic Medical Record System at Public Healthcare Facilities in Free-State, South AfricaNomabhongo Masana, Gerald Maina Muriithi. 1-6 [doi]
- Generating Narrations of Nested SQL Queries Using Context-free GrammarsGeorge Obaido, Abejide Ade-Ibijola, Hima Vadapalli. 1-6 [doi]
- Image Quality Assessment for Iris Biometrics for MinorsNorman Nelufule, Antonie de Kock, Gugulethu Mabuza-Hocquet, Yaseen Moolla. 1-6 [doi]
- Examining Factors that Impede Internal Auditors from Leveraging Information Technology for Continuous AuditingMotekoa Mokhitli, Michael Kyobe. 1-6 [doi]
- The Four I-s of E-skillsSubashnie Soobramoney, Delene Heukelman. 1-6 [doi]
- Identifying Students At-Risk with an Ensemble of Machine Learning AlgorithmsRanjin Soobramoney, Alveen Singh. 1-6 [doi]
- An SDN Solution for Performance Improvement in Dedicated Wide-Area NetworksThemba Shozi, Sabelo Dlamini, Pragasen Mudali, Matthew O. Adigun. 1-6 [doi]
- Skin Cancer Detection from Macroscopic ImagesVerosha Pillay, Serestina Viriri. 1-9 [doi]
- Using Machine Learning to Prioritize Automated Testing in an Agile EnvironmentLaurie L. Butgereit. 1-6 [doi]
- Cyber security awareness for small, medium and micro enterprises (SMMEs) in South AfricaTebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock. 1-6 [doi]
- A conceptual privacy governance frameworkPaulus Swartz, Adéle da Veiga, Nico Martins. 1-6 [doi]
- Multi-hop PSO based routing protocol for Wireless Sensor Networks with Energy HarvestingTlholiso W. Tukisi, Tebello N. D. Mathaba, Marcel Ohanga Odhiambo. 1-6 [doi]
- Implementation of Current Capacitance Resonant Circuit to Monitor Telecommunication and Utility Cable TamperingPatrick Mabadie, Marcel Ohanga Odhiambo. 1-6 [doi]
- Open-distance electronic learning environments: Supervisors' views on usabilitySewisha Lehong, Judy van Biljon, Ian Sanders. 1-7 [doi]