


default search action
ICTAS 2018: Durban, South Africa
- 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, March 8-9, 2018. IEEE 2018, ISBN 978-1-5386-6562-6

- Samwel Dick Mwapwele

, Sumarie Roodt
:
Teacher's adoption and use of mobile devices outside the classroom for learning in Africa: A complementary case study of secondary school teachers in South Africa and Tanzania. 1-7 - Riaan Roos, Jan Carel Mentz:

Factors that influence enterprise architecture decision making. 1-6 - Brett van Niekerk

:
Information warfare as a continuation of politics: An analysis of cyber incidents. 1-6 - Kudzai Mapingire, Phil van Deventer, Alta van der Merwe:

Positioning the role of the enterprise architect: An independent study in a mobile telecommunications organisation. 1-6 - Joshua Magunduni

, Wallace Chigona:
Revisiting shadow IT research: What we already know, what we still need to know, and how do we get there? 1-6 - Kennedy Chengeta, Serestina Viriri

:
A survey on facial recognition based on local directional and local binary patterns. 1-6 - Judy van Biljon

, Ronell van der Merwe:
Trends, drivers and barriers influencing cloud computing services for mobile interactions in teaching and learning. 1-7 - Kudakwashe Zvarevashe

, Oludayo O. Olugbara:
A framework for sentiment analysis with opinion mining of hotel reviews. 1-4 - Bin Bin Ma, Simon Fong

, Richard C. Millham:
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms. 1-6 - Sheethal Liz Tom

, Noluntu Mpekoa
, James Swart:
Factors that affect the provision of visually impaired learners in higher education. 1-5 - Muyowa Mutemwa, Francois Mouton

:
Cyber security threats and mitigation techniques for multifunctional devices. 1-6 - Cynthia Sthembile Ntshangase, Meshack Bafana Shabalala:

Encryption using finger-code generated from fingerprints. 1-5 - Lanka Chris Sejaphala, Mthulisi Velempini:

Investigating high traffic rate distributed denial of service attacks detection mechanisms in software-defined networks. 1-6 - M. C. Phahlamohlaka, Marijke Coetzee:

CaseRank: Ranking case law using precedent and principal component analysis. 1-6 - Cuthbert Chidoori, Jean-Paul Van Belle:

Attitudes towards the uptake of open source software by small and medium enterprises in the Western Cape, South Africa. 1-6 - Salma Mohamed, Nahla Nour, Serestina Viriri

:
Gender identification from facial images using global features. 1-6 - Odirile O. Moja, Katherine M. Malan:

Issues and a proposal for automated retirement portfolio risk matching in South Africa. 1-6 - Anura Hiraman, Serestina Viriri

, Mandlenkosi Victor Gwetu:
Efficient 3D liver segmentation using enhanced image alignment. 1-8 - Craig Mills, Bertram Haskins:

Using mobile technology in an adventure sport. 1-6 - Areeg M. Osman, Serestina Viriri

:
Face verification across age progression: A survey of the state-of-the-art. 1-6 - Adam Hassan, Serestina Viriri

:
Invariant feature extraction for facial recognition: A survey of the state-of-the-art. 1-6 - Sewisha Lehong, Judy van Biljon

, Estelle de Kock:
Knowledge sharing platforms in ICT4D: Towards validated content requirements. 1-6 - Musa Chemisto

, Ulrike Rivett
:
Examining the adoption and usage of an e-government system in rural South Africa: Examining e-government system adoption. 1-6 - Maake Benard Magara, Sunday Olusegun Ojo

, Tranos Zuva:
A comparative analysis of text similarity measures and algorithms in research paper recommender systems. 1-5 - Issah Ngomane, Mthulisi Velempini, Sabelo Velemseni Dlamini:

The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks. 1-5 - Ima Okon Essiet

, Yanxia Sun
, Zenghui Wang:
A novel algorithm for optimizing the Pareto set in dynamic problem spaces. 1-6 - Siddig Gomha, Kibet Langat

:
On-chip 60 GHz transformers for next generation of wireless communication in a 0.13μ BiCMOS technology. 1-4 - Naomi Chimpeni, Jean-Paul Van Belle:

The role of country characteristics in ICT value realization in financial institutions: The case of Southern Africa least developing countries. 1-6 - Olakumbi A. Fadiran, Judy van Biljon

, Marthie A. Schoeman
:
How can visualisation principles be used to support knowledge transfer in teaching and learning? 1-6 - Vreda Pieterse, Mpho Leeu, Marko C. J. D. van Eekelen:

How personality diversity influences team performance in student software engineering teams. 1-6 - Temitope Mapayi, Jules-Raymond Tapamo

:
Performance comparison of supervised learning methods for retinal vessel tortuosity characterisation. 1-7 - Victor Oluwatobiloba Adeniji, Khulumani Sibanda:

Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks. 1-6 - Mayibongwe H. Bayana, Serestina Viriri

:
Gender classification based on fusion of facial components features. 1-5 - Adéle da Veiga

:
An online information privacy culture: A framework and validated instrument to measure consumer expectations and confidence. 1-6 - Muhammad Abrar

, Waleed Elahi Khan:
Digital filtering techniques for power-line interference removal from ECG signals. 1-6 - Andile M. Miaba, Mandlenkosi Victor Gwetu, Serestina Viriri

:
Online signature verification using hybrid transform features. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














