


default search action
NextComp 2024: Mauritius
- International Conference on Next Generation Computing Applications, NextComp 2024, Mauritius, October 24-26, 2024. IEEE 2024, ISBN 979-8-3315-1740-3

- Ntshuxeko Makondo

, Errol Baloyi, Hlabishi I. Kobo, Topside E. Mathonsi:
A Review of PFCP Cyber Attacks in 5G Standalone for Robotic Telesurgery Services. 1-7 - Ryan Cassy, Girish Bekaroo:

Smart Fish Feeding in IoT-based Aquarium: A Comprehensive Approach Integrating Computer Vision, Machine Learning and Sensor Technology. 1-6 - Kousraj Ujoodha

, Baby Ashwin Gobin-Rahimbux, Nuzhah Gooda Sahib:
Training Tacotron 2 for Text-to-Speech Synthesis in Kreole Language: Methodology and Audio Processing. 1-6 - Mufaro Shoniwa, Karel Veerabudren, Mrinal Sharma

:
AI-based Malware Threat Prediction through CNN-SVM Ensemble. 1-6 - Rami Chahin, Ali Akyol, Jorge Marx Gómez:

Weed Detection in Smart Agriculture Application in the 5G Smart Country Project. 1-6 - Karabo Johannes Ntwaagae, Edwin Thuma

, Gontlafetse Mosweunyane:
Improving the Classification of Sentiments Towards Covid-19 Vaccines using Semantic Enrichment and Emojis. 1-6 - Dassen Sathan, Shakuntala Baichoo:

Drug Target Interaction prediction using Variational Quantum classifier. 1-7 - Isaac Munthali, Bennett Kankuzi:

Using Game Theory to Prioritize Goals in Requirements Engineering. 1-5 - Parlan Obeegadoo, Girish Bekaroo:

Effective Detection of Fileless Malware: A Review and Comparative Analysis of Detection Techniques. 1-7 - Laurie L. Butgereit, Helper Zhou:

Using GPT-4 to Tutor Python Programming in Shona and Ndebele in Zimbabwe. 1-5 - Shehzad Jaunbuccus, Roushdat Elaheebocus:

Promoting Physical Activity and Social Engagement in Older Adults through Immersive Exergaming: A Comprehensive Review. 1-8 - Johannes Schönböck, Josef Altmann, Birgit Pröll, Wieland Schwinger, Elisabeth Kapsammer, Werner Retschitzegger, Nikolas Goblirsch-Urban, Marianne Lechner, Christoph Angster:

Engagement by Goals - A Digital Platform for Goal-Oriented Volunteering. 1-8 - Vidushi Lukhoo, Raj Kishen Moloo:

A Carpooling System To Ease Traffic In Mauritius. 1-6 - Yaachna Rawoteea, Girish Bekaroo:

RXSS Protect: A Browser Extension for Detection of Reflected Cross-Site Scripting Attacks in Real-Time Using Machine Learning. 1-7 - Junaid Bin Asad Edoo, Roopesh Kevin Sungkur, Jorge Marx Gómez, Hauke Precht, Skady Rudolph:

Mauvote: A Novel Mobile Electronic Voting System Using Blockchain. 1-6 - Nirmal Rampersand, Oomesh Gukhool:

Enhanced Liner Shipping Network Design using Ant Colony Optimisation. 1-6 - Innocent Chilomo, Bennett Kankuzi:

Leveraging ML to Detect Fraudulent Customs Declaration: A Case of Logistic Regression and LightGBM Algorithms. 1-6 - Laurie L. Butgereit, Amar Kumar Seeam:

Characteristics of an AI Tutor to Prepare Students in Technical Subjects for the new Society 5.0. 1-6 - Bhavesh Hulloowan, Girish Bekaroo:

Defending Against XML External Entity (XXE) Attacks: A Review and Comparative Analysis of Prevention Mechanisms. 1-6 - Hanshee Fowdar, Girish Bekaroo:

Transformative Botanical Visualization: Exploring the Application of Augmented Reality to Visualize Flowers. 1-6 - Rakshita Ramdharee, Zahra Mungloo-Dilmohamud:

YOLO-Based Techniques for the Crown-of-Thorns Starfish Detection: A Comparative Study. 1-5 - Amar Seeam, Visham Ramsurrun:

Securing V2X-Enabled Unmanned Vehicles: A Comprehensive Taxonomy of Cyber Threats and Countermeasures. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














