- |
- Randomised Detection Algorithm | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
- WSN Integrity | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
- WSN Safety and Security | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
- WSN Trustworthiness | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
3 |
3D Convolutional Neural Networks | Robust Anomaly Detection in CCTV Surveillance |
4 |
4K video post-processing | Low Resource, Post-processed Lecture Recording from 4K Video Streams |
a |
AI adoption | Understanding the Low Adoption of AI in South African Medium Sized Organisations |
anomaly detection | Robust Anomaly Detection in CCTV Surveillance |
Artificial Intelligence | Understanding the Low Adoption of AI in South African Medium Sized Organisations |
Artificial Intelligence adoption | Towards a socio-specific artificial intelligence adoption framework |
Atrous Spatial Pyramid Pooling | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation |
Automated Lecture Recording Systems | Low Resource, Post-processed Lecture Recording from 4K Video Streams |
b |
Barriers | Barriers to dynamic cybersecurity capabilities in healthcare software services |
Behaviour Cloning | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content |
BERT | Sentiment and intent classification of in-text citations using BERT |
Big Data Analytics | Big data analytics capabilities and value creation at the work-practice level: A South African case study |
Big Data Analytics Capabilities | Big data analytics capabilities and value creation at the work-practice level: A South African case study |
Business Value | Big data analytics capabilities and value creation at the work-practice level: A South African case study |
c |
case study | Barriers to dynamic cybersecurity capabilities in healthcare software services |
citation analysis | Sentiment and intent classification of in-text citations using BERT |
Cloud Computing | Barriers to dynamic cybersecurity capabilities in healthcare software services |
CNN | Robust Facial Recognition for Occlusions using Facial Landmarks |
Convolutional Neural Networks | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation |
Crop growth | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth |
crowd density estimation | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation |
Cyber Threats | Towards an African cybersecurity community of practice |
Cybersecurity | Barriers to dynamic cybersecurity capabilities in healthcare software services |
Cybersecurity Challenges | Towards an African cybersecurity community of practice |
Cybersecurity Community of Practice | Towards an African cybersecurity community of practice |
d |
deep learning | Automating Bird Detection Based on Webcam Captured Images using Deep Learning |
Design Science Research | Towards a socio-specific artificial intelligence adoption framework |
detection accuracy | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
dilated convolution | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation |
domain search | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa |
dynamic capabilities | Barriers to dynamic cybersecurity capabilities in healthcare software services |
e |
evolutionary search | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content |
f |
Facial Recognition | Robust Facial Recognition for Occlusions using Facial Landmarks |
Faster R-CNN | Automating Bird Detection Based on Webcam Captured Images using Deep Learning |
Fertilizer Management | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth |
Framework | Towards a socio-specific artificial intelligence adoption framework |
h |
Health Social Networks | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
Health social support | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
Healthcare | Barriers to dynamic cybersecurity capabilities in healthcare software services |
HSNs and healthcare | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
Human Computer Interaction | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa |
Human-centered AI | Towards a socio-specific artificial intelligence adoption framework |
i |
information seeking behaviour | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa |
information system | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa |
Internet measurement | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa |
Intrusion Detection | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
k |
knowledge | The impact of organisational culture on knowledge management: the case of an international multilateral organisation |
knowledge creation | The impact of organisational culture on knowledge management: the case of an international multilateral organisation |
Knowledge Management | The impact of organisational culture on knowledge management: the case of an international multilateral organisation |
m |
memory requirements | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
multiple instance learning | Robust Anomaly Detection in CCTV Surveillance |
n |
neural networks | Sentiment and intent classification of in-text citations using BERT |
Node Replication Attacks | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
o |
online health communities | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
online privacy | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes |
optical flow | Robust Anomaly Detection in CCTV Surveillance |
organizational culture | The impact of organisational culture on knowledge management: the case of an international multilateral organisation |
p |
Precision Agriculture | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth |
Presenter Tracking | Low Resource, Post-processed Lecture Recording from 4K Video Streams |
probabilistic finite automata | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
procedural content generation | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content |
q |
Quality of Experience | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa |
r |
Reinforcement Learning | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth |
research survey | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa |
ResNets | Automating Bird Detection Based on Webcam Captured Images using Deep Learning |
s |
SECI | The impact of organisational culture on knowledge management: the case of an international multilateral organisation |
Siamese Neural Networks | Robust Facial Recognition for Occlusions using Facial Landmarks |
Single Shot Detector | Automating Bird Detection Based on Webcam Captured Images using Deep Learning |
SMEs | Understanding the Low Adoption of AI in South African Medium Sized Organisations |
Social Challenges | Towards a socio-specific artificial intelligence adoption framework |
social media | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes |
Social media for health | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
Software as a Service | Barriers to dynamic cybersecurity capabilities in healthcare software services |
Systematic Literature Review | Influence of Health Social Networks on Healthcare: A Systematic Literature Review |
t |
text classification | Sentiment and intent classification of in-text citations using BERT |
Transfer Learning | Automating Bird Detection Based on Webcam Captured Images using Deep Learning |
u |
Usability | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa |
users’ information needs | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa |
v |
video segmentation | Low Resource, Post-processed Lecture Recording from 4K Video Streams |
Virtual Cameraman | Low Resource, Post-processed Lecture Recording from 4K Video Streams |
w |
WhatsApp | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes |
Wireless Sensor Networks | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |
work-practice level | Big data analytics capabilities and value creation at the work-practice level: A South African case study |
WSN reliability | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |