Browsing Research Articles (Computer Science) by Title
Now showing items 49-68 of 170
-
Empowerment of rural farmers through information sharing using inexpensive technologies
(ACM, 2011)This paper discusses how to empower rural farmers to do business by means of inexpensive mobile technologies. In particular, the aim is to take advantage of the inexpensive features of low-end mobile phones to access market ... -
Engaging ICTs as a “Tool” for eHealth prioritization on human development and poverty reduction in the African region
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2011)The association connecting information and communication technologies (ICTs) and well-being or poverty remains vague and research today has resulted to divergent conclusions. This paper defines ICTs as “tools” that facilitate ... -
Ensuring the security and privacy of information in mobile health-care communication systems
(Academy of Science of South Africa, 2011)The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data ... -
Ethics and mono-disciplinarity: positivism, informed consent and informed participation
(Elsevier, 2005)There are a number of pressures on researchers in academia and industry to behave unethically or compromise their ethical standards, for instance in order to obtain funding or publish frequently. In this paper a case study ... -
Evaluating energy consumption on low-end smartphones
(2015)The relationship between battery consumption in smartphones and the usage statistics of a phone is direct. Modern smartphones, even low-end, are equipped with multiple wireless technologies, e.g. GSM, 3G, WiFi and ... -
Evaluating SMS parsing using automated testing software
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological ... -
Evaluating the relevance of the “Real Access” criteria as a framework for rural HCI research
(ACM, 2006)Developing ICT software that is useful and usable in a rural context poses many problems. One of the major difficulties is understanding the real needs of the target users and the constraints imposed by the rural environment. ... -
Experiences, challenges and lessons from rolling out a rural WiFi mesh network
(ACM, 2013)The DEV community knows that technology interventions involve consideration of social and environmental factors as much as technical ones. This is particularly true for the introduction of communications infrastructure in ... -
Exploration of Deaf people’s health information sources and techniques for information delivery in Cape Town: A qualitative study for the design and development of a mobile health application
(JMIR Publications, 2016)BACKGROUND: Many cultural and linguistic Deaf people in South Africa face disparity when accessing health information because of social and language barriers. The number of certified South African Sign Language interpreters ... -
Fast tracking students from disadvantaged backgrounds into main stream Computer Science
(Computer Society of South Africa, 2000)A computer-based training (CBT) system was used to teach Computer Literacy to full-time students at the University of the Western Cape. This approach was successful in creating computer literate students as well as creating ... -
FHMIPv6-based handover for wireless mesh networks
(Telkom, 2012)This paper shows that mobility management protocols for infrastructure Internet may be used in a wireless mesh network environment. Mesh topology tends to be an unplanned graph and routes change dynamically and in this ... -
Floor control arbitration for a hybrid voice/text web-board
(Telkom, 2003)We have built a hybrid voice/text web–board that utilizes floor control for handling resources such as microphone and interface events. The aim of this research is to determine the most appropriate floor control mechanism ... -
A framework and toolkit for the collection and analysis of QoS statistics for voice traffic in Next Generation Networks
(Telkom, 2000)The multi-service, multi-architecture nature of NGNs is so complex that the management of services, in addition to networks, emerges as a research challenge. Despite QoS limitations, VoIP (as opposed to VoATM), dominates ... -
A framework and toolkit for the collection and analysis of QoS statistics for voice traffic in Next Generation Networks
(Telkom, 2000)The multi-service, multi-architecture nature of NGNs is so complex that the management of services, in addition to networks, emerges as a research challenge. Despite QoS limitations, VoIP (as opposed to VoATM), dominates ... -
Gender and participation: critical reflection on Zenzeleni Networks in Mankosi, South Africa
(ACM, 2016-11-25)This paper unveils the complexity of gender dynamics by reflecting on lessons learned in Zenzeleni Networks and provides a different perspective to notions of “participation” by asking “who participates and how?” The paper ... -
Generalization of tooltips: An assistive technology extension
(Springer, 2017)Software applications use tooltips to assist users to improve their understanding of icons. When hovering over an icon with the cursor, a short text description of the icon appears. Text-based tooltips are helpful for users ... -
Government facilitated access to ICTs: adoption, use and impact on the well-being of indigent South Africans
(IIMC International Information Management Corporation, 2018)This paper presents preliminary results of an assessment of the impact of a government facilitated ICT access programme on the well-being of poor citizens. It examines South African government efforts in the application ... -
Grafting an ATM network onto an existing ethernet network
(Telkom, 1998)Grafting an ATM network onto an existing Ethernet network is a non-trivial exercise in network configuration. The process of mating ATM technology to an Ethernet network without tampering the underlying backbone and network ... -
Granny gets smarter but junior hardly notices
(College of Communication and Information, 2016)To ensure that university computing students are sensitized to the needs of diverse user groups, a course project was designed to allow students to get a realistic understanding of the needs and abilities of the older ... -
Groundwater prediction using machine-learning tools
(MPDI, 2020)Predicting groundwater availability is important to water sustainability and drought mitigation. Machine-learning tools have the potential to improve groundwater prediction, thus enabling resource planners to: (1) anticipate ...