Abstract is missing.
- Determining the Location of a Concealed Handgun on the Human Body using Marker-Less Gait Analysis and Machine LearningHenry Muchiri Muriithi, Ismail Ateya Lukandu, Gregory Wabuke Wanyembi. 1-6 [doi]
- Enabling the Disabled using mHealthVidharsh Chuckun, Ganeshwaree Coonjan, Leckraj Nagowah. 1-6 [doi]
- TangiNet: A Tangible User Interface System for Teaching the Properties of Network CablesDwijesh Gajadur, Girish Bekaroo. 1-6 [doi]
- Smart Campus Library SystemBibi Raissah Oderuth, Kosheta Ramkissoon, Roopesh Kevin Sungkur. 1-6 [doi]
- Generation of traversability maps based on 3D point-cloudsDomen Mongus, Simon Juric. 1-5 [doi]
- Software Defined Networks: Issues and ChallengesBhargava Sokappadu, Avishek Hardin, Avinash Mungur, Sheeba Armoogum. 1-5 [doi]
- Scrum Meeting Tool for Knowledge Capture and SharingMohammad Anass Korimbocus, Thaveer Singh Towokul, Soulakshmee D. Nagowah. 1-6 [doi]
- Computational Simulation Results in Power Systems Operation to Integrate Reliability in the Security Constrained Optimization ProblemMorteza Sheikh, Jamshid Aghaei, Ahmad Nikoobakht, Gerardo J. Osório, Miadreza Shafie-khah, Mohamed Lotfi, João P. S. Catalão. 1-6 [doi]
- DriveMU: A Real-time Road-Traffic Monitoring Android Application for MauritiusTirathraj Ramburn, Deevash Badoreea, Sudha Cheerkoot-Jalim. 1-8 [doi]
- Moodleboard: Dynamic and Interactive Indicators for Teachers and Pedagogical EngineersVéronique Sébastien, Didier Sébastien, Ilias Timol, Dominique Gay, Alain Cucchi, Christophe Porlier. 1-5 [doi]
- Categorising AWS Common Crawl Dataset using MapReduceAatish Chiniah, Ayaz Chummun, Zaïd Burkutally. 1-6 [doi]
- Hazard Perception Training and Assessment of Young Drivers in Mauritius: Investigating the Acceptance of the MauHazard ToolAditya Santokhee, Girish Bekaroo, Divesh Roopowa. 1-6 [doi]
- Smart Aquaponics with Disease DetectionRoysing Barosa, Sayed Issamuddine Sayed Hassen, Leckraj Nagowah. 1-6 [doi]
- Interoperability of Managing Knowledge and Learning Processes for Sustainable e-EducationUlrich Schmitt. 1-6 [doi]
- Building a Digital Health Innovation Ecosystem Framework through Design Science ResearchGloria Ejehiohen Iyawa, Marlien Herselman, Adele Botha. 1-6 [doi]
- Augmented Reality Intelligent Lighting Smart SpacesJannish Purmaissur, Amar Seeam, Shivanand Guness, Xavier J. A. Bellekens. 1-5 [doi]
- An Improved Reversible Data Hiding Scheme Through Novel EncryptionVazhora Malayil Manikandan, Vedhanayagam Masilamani. 1-5 [doi]
- Detection of Genome Sequence Outliers Across Pan-GenomesLakshmi Sujeeun, Shakuntala Baichoo, Zahra Mungloo-Dilmohamud, Yasmina Jaufeerally-Fakim. 1-6 [doi]
- Threat Modeling and Security Issues for the Internet of ThingsAmar Seeam, Ochanya S. Ogbeh, Shivanand Guness, Xavier J. A. Bellekens. 1-8 [doi]
- Smart Library Seat, Occupant and Occupancy Information System, using Pressure and RFID SensorsOkoronkwo Chinomso Daniel, Visham Ramsurrun, Amar Kumar Seeam. 1-5 [doi]
- Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security ConcernsAnass Bayaga, Jacques Ophoff. 1-7 [doi]
- Exploring the Use of Tangible User Interfaces for Teaching Basic Java Programming Concepts: A Usability StudyAmaan Nathoo, Tanveer Gangabissoon, Girish Bekaroo. 1-5 [doi]
- Using a Gamification Approach to teach ERP in Higher EducationPoorvasee Munogee, Hema Moctaram, Zarine Cadersaib. 1-6 [doi]
- Energy Autonomous and Smart Outdoor PV Module Characterisation FacilityYatindra Kumar Ramgolam, Heman Shamachurn, Jonathan Yannick Coret. 1-6 [doi]
- Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement IndexFahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, Sungyoung Lee. 1-6 [doi]
- Bytecode Heuristic Signatures for Detecting Malware BehaviorGheorghe Hajmasan, Alexandra Mondoc, Octavian Cret. 1-6 [doi]
- An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping ReviewKhangwelo Muronga, Marlien Herselman, Adele Botha, Adéle da Veiga. 1-6 [doi]
- A new Unequal Error Protection scheme for Coded MIMO systems using Hierarchical 4/M QAM modulationMussawir Ahmad Hosany, Girvana Ramanna. 1-6 [doi]
- Confronting Challenges Facing Enterprise Systems Education in AfricaGwamaka Mwalemba. 1-5 [doi]
- A Lightweight Version of National Performance Indicator Ontology (NPIonto)Oarabile Sebubi, Irina Zlotnikova, Hlomani Hlomani. 1-6 [doi]
- Innovative Architecture for Dynamic Solar Data Acquisition and Processing: A Case for Mauritius and Outer IslandsYatindra Kumar Ramgolam, Aatish Chiniah. 1-6 [doi]
- A Blockchain Based Framework for Fraud DetectionPankaj Joshi, Sachin Kumar, Divya Kumar, Anil Kumar Singh. 1-5 [doi]
- From Desktop to Mobile View: A Simplified Approach to Mobile Website DevelopmentPriyanca Jogoo, Ishrat Shagoofah Golamgous, Yasser Chuttur. 1-6 [doi]
- ERP Acceptance Model for SMEs based on CSFsUmeir Mayaram, Amrik Dussoye, Zarine Cadersaib. 1-6 [doi]
- Query Reduction for an Effective Japanese Statute Law RetrievalEdwin Thuma, Nkwebi Peace Motlogelwa, Tebo Leburu-Dingalo, Monkgogi Mudongo. 1-4 [doi]
- Mobile-Based Carbon Footprint Calculation: Insights from a Usability StudyGirish Bekaroo, Divesh Roopowa, Chandradeo Bokhoree. 1-6 [doi]
- A Crowdsourced Mobile App Architecture for Plotting User Rated Free WiFi HotspotsFurreedun Humairaa, Amreen Gokhool, Yasser Chuttur. 1-5 [doi]
- Framework for Personalised Online Education based on Learning Analytics through the use of Domain-Specific Modelling and Data AnalyticsSofia Meacham, Detlef Nauck, Han Zhao. 1-7 [doi]
- Using Neural Networks to Schedule Automated Testing in an Agile EnvironmentLaurie L. Butgereit. 1-4 [doi]
- Implementing Personalised Learning For Mixed Ability Students For Computer Programming In A Learning EnvironmentVijayprakash Chandreekant Ahku, Shireen Panchoo. 1-8 [doi]
- Challenges Ahead in Cyber Physical Systems: A Coding SurveyKingsley Igbokwe, Amar Seeam, Shivanand Guness, Praveer Towakel. 1-6 [doi]
- Pattern representation using Neuroevolution of the augmenting topology (NEAT) on Keystroke dynamics features in BiometricsPurvashi Baynath, K. M. S. Soyjaudah, Maleika Heenaye-Mamode Khan. 1-7 [doi]
- Securing Industrial Wireless Networks: Enhancing SDN with PhySecChristoph Lipps, Dennis Krummacker, Hans Dieter Schotten. 1-7 [doi]
- Machine Learning Algorithm on Keystroke dynamics Fused pattern in biometricsPurvashi Baynath, K. M. S. Soyjaudah, Maleika Heenaye-Mamode Khan. 1-6 [doi]
- Requirements for IoT ForensicsJaco-Louis Kruger, Hein S. Venter. 1-7 [doi]