for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Sabinet Online Ltd   (Total: 188 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

Showing 1 - 188 of 188 Journals sorted alphabetically
ACCORD Occasional Paper     Open Access   (Followers: 4)
Acta Academica     Full-text available via subscription   (Followers: 5, SJR: 0.13, h-index: 4)
Acta Classica : Proceedings of the Classical Association of South Africa     Full-text available via subscription   (Followers: 6, SJR: 0.102, h-index: 2)
Acta Criminologica     Full-text available via subscription   (Followers: 1)
Acta Germanica : German Studies in Africa     Full-text available via subscription   (Followers: 1)
Acta Juridica     Full-text available via subscription   (Followers: 9)
Acta Patristica et Byzantina     Full-text available via subscription   (Followers: 9)
AFFRIKA J. of Politics, Economics and Society     Full-text available via subscription   (Followers: 1)
Africa Conflict Monitor     Full-text available via subscription   (Followers: 3)
Africa Insight     Full-text available via subscription   (Followers: 14)
Africa Institute Occasional Paper     Full-text available via subscription   (Followers: 2)
Africa J. of Nursing and Midwifery     Full-text available via subscription   (Followers: 10, SJR: 0.128, h-index: 4)
AfricaGrowth Agenda     Full-text available via subscription   (Followers: 1)
African Entomology     Full-text available via subscription   (Followers: 8, SJR: 0.295, h-index: 21)
African Finance J.     Full-text available via subscription   (Followers: 17, SJR: 0.168, h-index: 2)
African J. for Physical, Health Education, Recreation and Dance     Full-text available via subscription   (Followers: 6)
African J. of Business and Economic Research     Full-text available via subscription   (Followers: 1)
African J. of Democracy and Governance     Full-text available via subscription   (Followers: 4)
African J. of Herpetology     Full-text available via subscription   (Followers: 6, SJR: 0.327, h-index: 10)
African J. of Research in Mathematics, Science and Technology Education     Full-text available via subscription   (Followers: 8)
African J. of Rhetoric     Full-text available via subscription   (Followers: 2)
African J. of Wildlife Research     Full-text available via subscription   (Followers: 3)
African Plant Protection     Open Access   (Followers: 2)
African Renaissance     Full-text available via subscription   (Followers: 2)
African Safety Promotion     Full-text available via subscription   (Followers: 4)
African Yearbook of Rhetoric     Full-text available via subscription   (Followers: 1)
Africanus     Full-text available via subscription   (Followers: 2)
Agriprobe     Open Access  
Akroterion     Full-text available via subscription   (Followers: 4)
Annals of the Ditsong National Museum of Natural History     Full-text available via subscription   (Followers: 3)
Annual Survey of South African Law     Full-text available via subscription   (Followers: 5)
Ars Nova     Full-text available via subscription   (Followers: 1)
Article 40     Open Access   (Followers: 2)
BER : Architects and Quantity Surveyors' Survey     Full-text available via subscription   (Followers: 6)
BER : Building and Construction : Full Survey     Full-text available via subscription   (Followers: 10)
BER : Building Contractors' Survey     Full-text available via subscription   (Followers: 4)
BER : Building Sub-Contractors' Survey     Full-text available via subscription   (Followers: 3)
BER : Capital Goods Industries Survey     Full-text available via subscription   (Followers: 1)
BER : Consumer Confidence Survey     Full-text available via subscription   (Followers: 4)
BER : Consumer Goods Industries Survey     Full-text available via subscription  
BER : Economic Prospects : An Executive Summary     Full-text available via subscription  
BER : Economic Prospects : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Intermediate Goods Industries Survey     Full-text available via subscription   (Followers: 1)
BER : Manufacturing Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Motor Trade Survey     Full-text available via subscription   (Followers: 1)
BER : Retail Sector Survey     Full-text available via subscription   (Followers: 2)
BER : Retail Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Survey of Business Conditions in Building and Construction : An Executive Summary     Full-text available via subscription   (Followers: 4)
BER : Survey of Business Conditions in Manufacturing : An Executive Summary     Full-text available via subscription   (Followers: 3)
BER : Survey of Business Conditions in Retail : An Executive Summary     Full-text available via subscription   (Followers: 3)
BER : Trends : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Wholesale Sector Survey     Full-text available via subscription   (Followers: 1)
Building Women     Full-text available via subscription  
Bulletin of Statistics     Full-text available via subscription   (Followers: 4)
Business Tax and Company Law Quarterly     Full-text available via subscription   (Followers: 5)
Cabo     Full-text available via subscription  
Cardiovascular J. of Africa     Full-text available via subscription   (Followers: 4, SJR: 0.414, h-index: 22)
Cardiovascular J. of South Africa     Full-text available via subscription   (Followers: 1)
Child Abuse Research in South Africa     Full-text available via subscription   (Followers: 1)
Civil Engineering = Siviele Ingenieurswese     Full-text available via subscription   (Followers: 4)
Clean Air J.     Full-text available via subscription   (Followers: 2)
Clean Air J. = Tydskrif vir Skoon Lug     Full-text available via subscription  
Climate Summary of South Africa     Full-text available via subscription   (Followers: 1)
Commonwealth Youth and Development     Full-text available via subscription   (Followers: 4)
Communicare : J. for Communication Sciences in Southern Africa     Full-text available via subscription   (Followers: 5)
Comparative and Intl. Law J. of Southern Africa     Full-text available via subscription   (Followers: 1)
Conflict Trends     Full-text available via subscription   (Followers: 11)
Conspectus : The J. of the South African Theological Seminary     Open Access   (Followers: 3)
Current Allergy & Clinical Immunology     Open Access   (Followers: 8, SJR: 0.127, h-index: 6)
De Arte     Full-text available via subscription   (Followers: 4)
De Rebus     Full-text available via subscription   (Followers: 1)
Die Kerkblad     Full-text available via subscription  
Educare     Full-text available via subscription   (Followers: 1)
Emergency Services SA     Full-text available via subscription   (Followers: 2)
English in Africa     Full-text available via subscription   (Followers: 2)
Ergonomics SA : J. of the Ergonomics Society of South Africa     Full-text available via subscription   (Followers: 3)
ESR Review : Economic and Social Rights in South Africa     Open Access   (Followers: 4)
Evidence Based Summaries in Dentistry     Full-text available via subscription   (Followers: 1)
FarmBiz     Full-text available via subscription  
Farmer’s Weekly     Full-text available via subscription  
Farmlink Africa     Full-text available via subscription  
Food Manufacturing Africa     Full-text available via subscription  
French Studies in Southern Africa     Full-text available via subscription   (Followers: 1)
Fundamina : A J. of Legal History     Open Access   (Followers: 7)
Gender and Behaviour     Full-text available via subscription   (Followers: 10)
Gender Questions     Full-text available via subscription   (Followers: 1)
Ghanaian J. of Economics     Full-text available via subscription  
HR Future     Full-text available via subscription   (Followers: 2)
IFE Psychologia : An Intl. J.     Full-text available via subscription   (Followers: 1)
Image & Text : a J. for Design     Full-text available via subscription   (Followers: 16)
IMFO : Official J. of the Institute of Municipal Finance Officers     Full-text available via subscription   (Followers: 1)
IMIESA     Full-text available via subscription  
Indilinga African J. of Indigenous Knowledge Systems     Full-text available via subscription   (Followers: 4)
Inside Mining     Full-text available via subscription  
Institute for Security Studies Papers     Full-text available via subscription   (Followers: 5)
Interim : Interdisciplinary J.     Open Access   (Followers: 3)
Intl. J. for Religious Freedom     Full-text available via subscription  
J. for Christian Scholarship = Tydskrif vir Christelike Wetenskap     Full-text available via subscription   (Followers: 5)
J. for Contemporary History     Full-text available via subscription   (Followers: 17)
J. for Islamic Studies     Full-text available via subscription   (Followers: 15)
J. for Juridical Science     Full-text available via subscription  
J. for Language Teaching = Tydskrif vir Taalonderrig     Full-text available via subscription   (Followers: 3)
J. for New Generation Sciences     Open Access   (Followers: 2)
J. for Semitics     Full-text available via subscription   (Followers: 5)
J. of African Elections     Full-text available via subscription  
J. of African Foreign Affairs     Full-text available via subscription   (Followers: 2)
J. of African Union Studies     Full-text available via subscription  
J. of Contemporary Management     Full-text available via subscription  
J. of Gender, Information and Development in Africa     Full-text available via subscription   (Followers: 4)
J. of Minimum Intervention in Dentistry     Full-text available via subscription  
J. of Public Administration     Full-text available via subscription   (Followers: 25)
J. of Somali Studies     Full-text available via subscription  
J. of Strategic Studies : A J. of the Southern Bureau of Strategic Studies Trust     Full-text available via subscription  
Kleio     Full-text available via subscription   (Followers: 2)
Learning and Teaching Mathematics     Full-text available via subscription   (Followers: 4)
Litnet Akademies : 'n Joernaal vir die Geesteswetenskappe, Natuurwetenskappe, Regte en Godsdienswetenskappe     Open Access  
Management Dynamics : J. of the Southern African Institute for Management Scientists     Full-text available via subscription   (Followers: 2)
Medical Technology SA     Full-text available via subscription  
Meditari : Research J. of the School of Accounting Sciences     Full-text available via subscription   (Followers: 1)
MNASSA : Monthly Notes of the Astronomical Society of South Africa     Full-text available via subscription  
Monographs of the Transvaal Museum     Full-text available via subscription  
Musicus     Full-text available via subscription  
Neotestamentica     Full-text available via subscription   (Followers: 9, SJR: 0.212, h-index: 6)
New Coin Poetry     Full-text available via subscription   (Followers: 2)
New Voices in Psychology     Full-text available via subscription   (Followers: 2)
Obiter     Full-text available via subscription   (Followers: 1)
Obstetrics and Gynaecology Forum     Full-text available via subscription   (Followers: 3, SJR: 0.106, h-index: 2)
Occupational Health Southern Africa     Full-text available via subscription   (Followers: 1)
Old Testament Essays     Full-text available via subscription   (Followers: 14)
Personal Finance Newsletter     Full-text available via subscription   (Followers: 1)
Perspectives in Education     Full-text available via subscription   (Followers: 2, SJR: 0.228, h-index: 13)
Politeia     Full-text available via subscription   (Followers: 1)
Professional Accountant     Full-text available via subscription   (Followers: 1)
Professional Nursing Today     Full-text available via subscription   (Followers: 5)
Progressio     Full-text available via subscription   (Followers: 2)
Psycho-analytic Psychotherapy in South Africa     Full-text available via subscription   (Followers: 2)
Quest     Open Access  
ReSource     Full-text available via subscription  
Retail and Marketing Review     Full-text available via subscription   (Followers: 1)
Rostrum : Newsletter of the Entomological Society of Southern Africa     Open Access   (Followers: 1)
SA Irrigation = SA Besproeiing     Full-text available via subscription   (Followers: 1)
SA Mercantile Law J. = SA Tydskrif vir Handelsreg     Full-text available via subscription   (Followers: 1)
SABI Magazine - Tydskrif     Full-text available via subscription  
Scriptura : Intl. J. of Bible, Religion and Theology in Southern Africa     Open Access   (Followers: 9)
Scrutiny2     Full-text available via subscription  
Servamus Community-based Safety and Security Magazine     Full-text available via subscription  
Shakespeare in Southern Africa     Full-text available via subscription   (Followers: 3)
South African Actuarial J.     Full-text available via subscription  
South African Computer J.     Full-text available via subscription  
South African Food Review     Full-text available via subscription  
South African Gastroenterology Review     Full-text available via subscription   (Followers: 1, SJR: 0.102, h-index: 1)
South African Health Review     Open Access   (Followers: 2)
South African J. for Research in Sport, Physical Education and Recreation     Full-text available via subscription   (Followers: 5, SJR: 0.186, h-index: 7)
South African J. of Art History     Full-text available via subscription   (Followers: 2)
South African J. of Business Management     Full-text available via subscription   (Followers: 2, SJR: 0.194, h-index: 8)
South African J. of Chemistry     Open Access   (Followers: 2, SJR: 0.193, h-index: 14)
South African J. of Criminal Justice     Full-text available via subscription   (Followers: 1)
South African J. of Cultural History     Full-text available via subscription   (Followers: 1)
South African J. of Diabetes and Vascular Disease     Full-text available via subscription   (Followers: 1)
South African J. of Economic History     Full-text available via subscription   (Followers: 3)
South African J. of Education     Open Access   (Followers: 1, SJR: 0.335, h-index: 14)
South African J. of Higher Education     Full-text available via subscription   (Followers: 4)
South African J. of Labour Relations     Full-text available via subscription   (Followers: 2)
South African J. of Sports Medicine     Open Access   (Followers: 9)
South African J. of Wildlife Research     Open Access   (Followers: 1, SJR: 0.583, h-index: 24)
South African J. on Human Rights     Full-text available via subscription   (Followers: 12, SJR: 0.19, h-index: 7)
South African Music Studies : SAMUS     Full-text available via subscription   (Followers: 2)
South African Ophthalmology J.     Full-text available via subscription  
South African Pharmaceutical and Cosmetic Review     Full-text available via subscription  
South African Radiographer     Full-text available via subscription   (Followers: 1)
Southern African Business Review     Open Access   (Followers: 1)
Southern African Forestry J.     Full-text available via subscription   (Followers: 1)
Southern African Humanities     Full-text available via subscription   (Followers: 2, SJR: 0.409, h-index: 11)
Southern African J. of Accountability and Auditing Research     Full-text available via subscription  
Southern African Review of Education with Education with Production     Full-text available via subscription   (Followers: 2)
Stilet : Tydskrif van die Afrikaanse Letterkundevereniging     Full-text available via subscription   (Followers: 1)
Studies in Economics and Econometrics     Full-text available via subscription   (Followers: 5, SJR: 0.1, h-index: 6)
Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie     Open Access   (Followers: 1)
Tax Breaks Newsletter     Full-text available via subscription   (Followers: 4)
TAXtalk     Full-text available via subscription   (Followers: 4)
TD : The J. for Transdisciplinary Research in Southern Africa     Full-text available via subscription  
The Dairy Mail     Full-text available via subscription   (Followers: 3)
Transport World Africa     Full-text available via subscription   (Followers: 3)
Unisa Latin American Report     Full-text available via subscription  
Veld & Flora     Full-text available via subscription   (Followers: 2)
Water & Sanitation Africa     Full-text available via subscription   (Followers: 4)
Without Prejudice     Full-text available via subscription  
Word and Action = Woord en Daad     Full-text available via subscription  

              [Sort by number of followers]   [Restore default list]

Journal Cover South African Computer Journal
  [0 followers]  Follow
    
   Full-text available via subscription Subscription journal
   ISSN (Print) 1015-7999 - ISSN (Online) 2313-7835
   Published by Sabinet Online Ltd Homepage  [188 journals]
  • Increased visibility : editorial
    • Authors: Philip Machanick
      Abstract: As of 2016, SACJ has been added to the Scopus index, making papers easier to find, in line with out policy to raise our profile and to make SACJ papers easily findable. Previous steps include adding
      DOI s to our papers and being listed in Directory of Open Access Journals; papers in general are easy to find through search engines because of our open access policy. We will continue to do what we can to raise the profile of SACJ; if authors submit interesting work that attracts the notice of others (as measured by citations), that is the best way to grow our profile. We rely on voluntary work by our editors and reviewers to maintain the quality that makes SACJ the publication of choice for South African computer science and information systems work particularly that which has a local flavour, and we strongly encourage authors from the rest of Africa to submit to us as well.
      PubDate: 2016-01-01T00:00:00Z
       
  • Short-term initiatives for enhancing cyber-safety within South African
           schools : research
    • Authors: Elmarie Kritzinger
      Abstract: The rate of technological development across the globe is dramatic. The decreasing cost and increasing availability of ICT devices means that its users are no longer exclusively industry or government employees-they are now also home users. Home users integrate ICT in their daily lives for education, socialising and information gathering. However, using ICT is associated with risks and threats, such as identity theft and phishing scams. Most home users of ICT do not have the necessary information technology and Internet skills to protect themselves and their information. School learners, in particular, are not sufficiently educated on how to use technological devices safely, especially in developing countries such as South Africa. The national school curriculum in South Africa currently does not make provision for cyber-safety education, and the availability of supporting material and training for ICT teachers in South Africa is limited, resulting in a lack of knowledge and skills regarding cyber-safety. The research in hand focuses on the situation concerning cyber-safety awareness in schools and has adopted a short-term approach towards cyber-safety among teachers and school learners in South Africa until a formal long-term national approach has been implemented. This study takes a quantitative approach to investigating the current options of teachers to enhance cyber-safety among learners in their schools. The research proposes that short-term initiatives (e.g. posters) can increase learnersâ?? awareness of cyber-safety until formal cyber-safety awareness methods have been introduced.
      PubDate: 2016-01-01T00:00:00Z
       
  • Events that lead university students to change their major to Information
           Systems : a retroductive South African case : research
    • Authors: Lisa F. Seymour; Thabang Serumola
      Abstract: Shortage of computing skills is a global concern as it affects national development and business success. Yet, despite high job availability and high salaries in computing professions, insufficient numbers of students are choosing to study the various computing disciplines. This South African study looks at the Information Systems (IS) major which is misunderstood by high school students. This retroductive case study identifies the events which lead students to change their major to IS. The study confirms the importance of interest in a major as well as the perceived high value of a major, which feature as dominant factors in the literature. Yet these are not the initial events that lead to students changing their major to IS. Events that initiate the process include losing passion for a previous major, experiencing difficulty in a previous major as well as enjoying the introductory IS course. The paper has practical advice for IS Departments and argues for a generic first year for students as well as a focus on enjoyment and skills aligned to IS professional practice in introductory IS courses. These findings can be generalised to other majors and, hence, the theoretical contribution adds to the literature on career choice in general.
      PubDate: 2016-01-01T00:00:00Z
       
  • Publish or perish - but where?
    • Authors: Rossouw Von Solms; Basie Von Solms
      Abstract: 'Publish or perish' has been advocated amongst the academic fraternity for decades. As early as 1942, the term has been linked to academic and research contexts (Garfield, 1996). For the last decade, the term has regularly been associated with the pressures in academia to establish, maintain and enhance the career of an academic (Fanelli, 2010; Neill, 2008; Gad-el-Hak, 2004). Publishing research outputs is currently still one of the premier outlets to demonstrate academic success, both to the researchers and sponsoring institutions involved. Thus, it is non-debatable that modern academics are still pressurised to regularly publish their research outputs - otherwise their careers might suffer as a result. Although some academic debates strongly question this drive towards 'publish or perish',this paper does not venture into this topic, but focuses on the publishing of research outputs.
      PubDate: 2016-01-01T00:00:00Z
       
  • Looking fresh : editorial
    • Authors: Philip Machanick
      Abstract: New LookSACJ has had a layout designed for print up to now. For print, if you are trying to save paper count and therefore use a small font, it becomes difficult for the eye to follow a long line. That is why multiple columns were invented. Now that the journal is published online, there is no strong reason to maintain a layout designed for print with a small font and two columns. Two columns make for difficult reading on a small screen as you have to read to the bottom of a left-side column then scroll back up for the next column. Two-column layout also makes it hard to fit in decent-sized figures and tables, leading to a compromise of allowing them to run across both columns if necessary. Going to single-column layout removes all these problems.
      PubDate: 2015-12-01T00:00:00Z
       
  • Syllabification and parameter optimisation in Zulu to English machine
           translation : research article
    • Authors: Gideon Kotze; Friedel Wolff
      Abstract: We present a series of experiments involving the machine translation of Zulu to English using a well-known statistical software system. Due to morphological complexity and relative scarcity of resources, the case of Zulu is challenging. Against a selection of baseline models, we show that a relatively naive approach of dividing Zulu words into syllables leads to a surprising improvement. We further improve on this model through manual configuration changes. Our best model significantly outperforms the baseline models (BLEU measure, at p < 0.001) even when they are optimised to a similar degree, only falling short of the well-known Morfessor morphological analyser that makes use of relatively sophisticated algorithms. These experiments suggest that even a simple optimisation procedure can improve the quality of this approach to a significant degree. This is promising particularly because it improves on a mostly language independent approach at least within the same language family. Our work also drives the point home that sub-lexical alignment for Zulu is crucial for improved translation quality.
      PubDate: 2015-12-01T00:00:00Z
       
  • Upper bounds on the performance of discretisation in reinforcement
           learning : research article
    • Authors: Michael Mitchley
      Abstract: Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.
      PubDate: 2015-12-01T00:00:00Z
       
  • Virtual learning system usage in higher education - a study at two South
           African institutions : research article
    • Authors: Indira Padayachee; Alta Van der Merwe Paula Kotze
      Abstract: In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the 'content cluster' was used more than the other clusters. The average usage of the 'pedagogic cluster' for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the 'communication' and 'management' clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.
      PubDate: 2015-12-01T00:00:00Z
       
  • A study of computing doctorates in South Africa from 1978 to 2014 :
           research article
    • Authors: Ian D. Sanders; Patricia M. Alexander
      Abstract: This paper studies the output of South African universities in terms of computing-related doctorates in order to determine trends in numbers of doctorates awarded and to identify strong doctoral study research areas. Data collected from a variety of sources relating to Computing doctorates conferred since the late 1970s was used to compare the situation in Computing with that of all doctorates. The number of Computing doctorates awarded has increased considerably over the period of study. Nearly three times as many doctorates were awarded in the period 2010-2014 as in 2000-2004. The universities producing the most Computing doctorates were either previously "traditional" universities or comprehensive universities formed by amalgamating a traditional research university with a technikon. Universities of technology have not yet produced many doctorates as they do not have a strong research tradition. The analysis of topic keywords using ACM Computing classifications is preliminary but shows that professional issues are dominant in Information Systems, models are often built in Computer Science and several topics, including computing in education, are evident in both IS and CS. The relevant data is in the public domain but access is difficult as record keeping was generally inconsistent and incomplete. In addition, electronic databases at universities are not easily searchable and access to HEMIS data is limited. The database built for this paper is more inclusive in terms of discipline-related data than others.
      PubDate: 2015-12-01T00:00:00Z
       
  • Synchronous gesture manipulation for collaboration and coordination of
           co-located business process modelling : research article
    • Authors: Brenda Scholtz; Andre Calitz Irene Snyman
      Abstract: The purpose of this study was to investigate approaches (techniques and technologies) for the coordination of collaborative tasks using synchronous gesture manipulation. Business Process Modelling (BPM) tasks are often performed in teams of modellers who need to collaborate with each other in order to coordinate and integrate their individual contributions into the various process models in a co-located environment. These collaborative BPM tasks were used as a case study in order to develop the artifact (the BPM-Touch approach)as a proof of concept. The BPM-Touch approach allows for the coordination and collaboration of BPM tasks in co-located modelling teams using synchronous gesture manipulation approaches. The Design Science Research (DSR) methodology was used and several cycles of developing and evaluating the artifact took place. This paper reports on the last cycle and set of evaluations. The proposed approach was implemented in a BPM software package in order to provide empirical validation. Usability evaluations of the software were undertaken with both students and BPM professionals as participants. The empirical results of the evaluations revealed that the participants found the approach to be effective and rated the usability and satisfaction of the collaboration and gesture manipulation aspects of the software positively.
      PubDate: 2015-12-01T00:00:00Z
       
  • How General-Purpose can a GPU be? : viewpoint
    • Authors: Philip Machanick
      Abstract: The use of graphics processing units (GPUs) in general-purpose computation (GPGPU) is a growing field. GPU instruction sets, while implementing a graphics pipeline, draw from a range of single instruction multiple data stream (SIMD) architectures characteristic of the heyday of supercomputers. Yet only one of these SIMD instruction sets has been of application on a wide enough range of problems to survive the era when the full range of supercomputer design variants was being explored : vector instructions.
      PubDate: 2015-12-01T00:00:00Z
       
  • Belated comment to : 'What is Informatics?' (2007) : letter to the
           editor
    • Authors: Stefan Gruner
      Abstract: Letter to the Editor
      PubDate: 2015-12-01T00:00:00Z
       
  • Strong growth : editorial
    • Authors: Philip Machanick
      Abstract: In this issue, we announce a new editorial board. The previous members served for a long time, and it is time for new blood. The editorial board previously did not have a clearly-defined role. We have adapted the following from IEEE journal practice: The Editorial Board (EB) provides guidance to the Editor-in- Chief. It helps to identify new opportunities to attract authors, it promotes awareness of the journal, and nominates Associate Editors. The EB also serves in the role of Appeal Board in problematic review cases. EB members are encouraged to promote the concept of special issues, and to identify potential themes and guest editors. An EB member is appointed for 5 years with the option to be reappointed for an additional 5 year term.
      PubDate: 2015-07-01T00:00:00Z
       
  • MUUX-E, a framework of criteria for evaluating the usability, user
           experience and educational features of m-learning environments
    • Authors: Patricia Harpur; M.R. (Ruth) De Villiers
      Abstract: Higher education students use mobile phones, equipped for Internet access. Mobile technologies can offer effective, satisfying and accessible m-learning experiences. A contribution has been made to knowledge on evaluating m-learning environments and to mobile human-computer interaction (MHCI), with the innovative synthesis of the MUUX-E Framework, which fills a gap in the domain of m-learning. MUUX-E is a single comprehensive, multi-faceted instrument for evaluating m-learning environments, emphasising usability and user experience in mobile educational contexts. It was developed by extensive literature studies on each aspect, and has five categories, 31 criteria and numerous sub-criteria. Using a design-based research paradigm, MUUX-E was applied iteratively to evaluate and enhance successive versions of m-LR, a mobile application created for a Software Engineering module. Participants were students and expert evaluators. MUUX-E served well to identify problems and strengths. The students were more positive than the experts regarding the benefits of m-LR, yet insightfully reported more system problems.
      PubDate: 2015-07-01T00:00:00Z
       
  • Block RAM-based architecture for real-time reconfiguration using
           Xilinx® FPGAs
    • Authors: Rikus Le Roux; George Van Schoory Pieter Van Vuuren
      Abstract: Despite the advantages dynamic reconfiguration adds to a system, it only improves system performance if the execution time exceeds the configuration time. As a result, dynamic reconfiguration is only capable of improving the performance of quasi-static applications. In order to improve the performance of dynamic applications, researchers focus on improving the reconfiguration throughput. These approaches are mostly limited by the bus commonly used to connect the configuration controller to the memory, which contributes to the configuration time. A method proposed to ameliorate this overhead is an architecture utilizing localised block RAM (BRAM) connected to the configuration controller to store the configuration bitstream. The aim of this paper is to illustrate the advantages of the proposed architecture, especially for reconfiguring real-time applications. This is done by validating the throughput of the architecture and comparing this to the maximum theoretical throughput of the internal configuration access port (ICAP). It was found that the proposed architecture is capable of reconfiguring an application within a time-frame suitable for real-time reconfiguration. The drawback of this method is that the BRAM is extremely limited and only a discrete set of configurations can be stored. This paper also proposes a method on how this can be mitigated without affecting the throughput.
      PubDate: 2015-07-01T00:00:00Z
       
  • A social representations analysis of design science research
    • Authors: Rennie Naidoo; Alta Van der Merwe, Aurona Gerber, Aurona Gerber Alan Hevner
      Abstract: Compared to positivist survey and interpretive case study research, design science research (DSR) is a relatively novel and unfamiliar research paradigm within the computing field in South Africa. In light of recent interest in the DSR paradigm, this study sought to investigate how local computing researchers familiarise themselves with an unfamiliar paradigm and what their perspectives of DSR are. Key theoretical concepts from social representations theory (SRT), such as 'anchoring' and 'objectification', were used to explore how researchers constructed their understanding of DSR. A visual approach was used to administer drawing and association tasks to two focus groups; each focus group comprised around 25 participants ranging from doctoral students to experienced researchers. The focus group discussions invoked interesting complementary and distinctive associations about the process and content of DSR, specifically when anchored in dominant and conventional research practices. The results also illustrated several ways in which DSR is objectified in drawings and metaphorical constructions. This study concludes that SRT is useful for exploring beliefs about novel and relatively unfamiliar research practices. This study also contributes to an enhanced understanding of how computing researchers adapt to changing research practices. The findings are developed into recommendations for introducing changes to research practices. These recommendations can be used to direct efforts to more appropriately accommodate changing research practices within the computing community to broaden knowledge generation.
      PubDate: 2015-07-01T00:00:00Z
       
  • An Insider Threat Neutralisation Mitigation model predicated on Cognitive
           Dissonance (ITNMCD)
    • Authors: Keshnee Padayachee
      Abstract: The insider threat concern is a complex issue, as the problem domain intersects the social, technical and socio-technical dimensions. Consequently, counteracting the insider threat involves in influencing the insider's perceptions and behaviour in order to ensure compliance. When an individual's actions and beliefs are incongruent, this induces a phenomenon known as cognitive dissonance. In order to reduce this dissonance, individuals are self-motivated either to change their behaviours or beliefs, or to rationalize their behaviour. Neutralisation is a technique used by criminals to rationalize maleficence. In terms of the insider threat, it has been proposed that if the rationalisations for committing an offence are eliminated, then the insider is less likely to commit the offence. This process is known as neutralisation mitigation. The research reported on here proposes inducing cognitive dissonance in order to counter the resultant neutralisations that may ensue with neutralisation mitigation. To test these concepts, a pragmatic implementable solution, the Insider Threat Neutralisation Mitigation model predicated on Cognitive Dissonance (ITNMCD), is proposed. A proof-of-concept was developed and the model concept was evaluated using the design science method.
      PubDate: 2015-07-01T00:00:00Z
       
  • The factors that influence customer e-services adoption
    • Authors: Kamisha Persad; Keshnee Padayacheey
      Abstract: The aim of this paper is to provide an overview of the investigation into customer e-service adoption. The investigation includes a qualitative survey and observation of participants using e-services. E-services are used to attract customers and persuade them to transact online and the customer's perception of an e-service contributes greatly to e-service adoption or rejection. This paper describes the factors that influence customer perception towards e-services. Relationships between the identified factors were also considered in order to build a conceptual framework. Grounded theory was used for its flexibility, repetitive comparisons of data, and emergence of concepts and theories.
      PubDate: 2015-07-01T00:00:00Z
       
  • Intelligent system design using hyper-heuristics
    • Authors: Nelishia Pillay
      Abstract: Determining the most appropriate search method or artificial intelligence technique to solve a problem is not always evident and usually requires implementation of different approaches to ascertain this. In some instances a single approach may not be sufficient and hybridization of methods may be needed to find a solution. This process can be time consuming. The paper proposes the use of hyper-heuristics as a means of identifying which method or combination of approaches is needed to solve a problem. The research presented forms part of a larger initiative aimed at using hyper-heuristics to develop intelligent hybrid systems. As an initial step in this direction, this paper investigates this for classical artificial intelligence uninformed and informed search methods, namely depth first search, breadth first search, best first search, hill-climbing and the A* algorithm. The hyper-heuristic determines the search or combination of searches to use to solve the problem. An evolutionary algorithm hyper-heuristic is implemented for this purpose and its performance is evaluated in solving the 8-Puzzle, Towers of Hanoi and Blocks World problems. The hyper-heuristic employs a generational evolutionary algorithm which iteratively refines an initial population. On each iteration the evolutionary algorithm uses tournament selection to select parents. The mutation and crossover operators are applied to the chosen parents to produce offspring for the next generation. The hyper-heuristic was able to identify a search or combination of searches to produce solutions for the twenty 8-Puzzle, five Towers of Hanoi and five Blocks World problems. Furthermore, admissible solutions were produced for all problem instances. A different search or combination of searches was evolved for each problem instance. This study has highlighted the potential of hyper-heuristics for the automated design of intelligent systems. Given this success, future work will investigate the use of hyper-heuristics for the design of intelligent hybrid systems for high-level reasoning, which will combine genetic algorithms, tabu search, variable neighbourhood search and simulated annealing. The automated design of intelligent systems has long term benefits for the software industry as a means of reducing the man hours needed for system design.
      PubDate: 2015-07-01T00:00:00Z
       
  • Hardware genetic algorithm optimisation by critical path analysis using a
           custom VLSI architecture
    • Authors: Farouk Smith; Allan E. Van den Berg
      Abstract: This paper investigates optimisation of Evolutionary Hardware Systems (EHW) by means of digital circuit critical path analysis. A 2x2 digital multiplier and a Finite State Machine (FSM) control circuit were evolved using a target-independent Virtual Reconfigurable Circuit (VRC) architecture. An in-depth analysis of the phenotypes' Critical Paths (CP) was performed. Through analysing the CPs, it was shown that a great amount of insight can be gained into a phenotype's fitness. Particularly, the identification of the CP's dependence is valuable, since dependent CPs reduced the required net number of evolved Logic Elements (LE). Generally, in both the multiplier and state phenotypes, the CPs were evolved in ascending order of the net LEs. This suggests that evolution always favoured CPs with lower net numbers. However, we have seen that in one special case, if two independent CPs are used by a third CP, the resulting third CP has a lower net number than both independent CPs. The CP analysis also led to the development of the FitnessOverall fitness function, which had a distinctive way of not only rewarding correct output elements, but also encouraging more efficient evolution through sustaining evolved CPs, and further developing partially-evolved CPs. Finally, by using the optimized fitness function, we demonstrated the evolution of a FSM control circuit. The results verify that optimised GAs can find solutions quicker, and with fewer attempts.
      PubDate: 2015-07-01T00:00:00Z
       
  • Applying long short-term memory recurrent neural networks to intrusion
           detection
    • Authors: Ralf C. Staudemeyer
      Abstract: We claim that modelling network traffic as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA / KDD Cup '99 challenge.To identify suitable LSTM-RNN network parameters and structure we experimented with various network topologies. We found networks with four memory blocks containing two cells each offer a good compromise between computational cost and detection performance. We applied forget gates and shortcut connections respectively. A learning rate of 0.1 and up to 1,000 epochs showed good results.We tested the performance on all features and on extracted minimal feature sets respectively. We evaluated different feature sets for the detection of all attacks within one network and also to train networks specialised on individual attack classes. Our results show that the LSTM classifier provides superior performance in comparison to results previously published results of strong static classifiers. With 93.82% accuracy and 22.13 cost, LSTM outperforms the winning entries of the KDD Cup '99 challenge by far. This is due to the fact that LSTM learns to look back in time and correlate consecutive connection records. For the first time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.
      PubDate: 2015-07-01T00:00:00Z
       
  • User-centered applications : use of mobile information technologies to
           promote sustainable school healthcare services
    • Authors: Alida Veldsman; Darelle Van Greunen Job Mashapa
      Abstract: The youth, especially school going children, are the future of any society. It is therefore important that children should receive adequate healthcare support at an early age in order to strive to preserve and ensure better education and welfare of the children and continuity in societal success. Despite the strategic initiatives that aim at improving the general health of school going children, such as South Africa's Integrated School Health Policy, there still exist challenges in support programmes meant to alleviate the barriers to effective healthcare towards improved education for the school children. Advances in ICT enable a fundamental redesign of healthcare processes based on the use and integration of electronic communication at all levels. New communication technologies can support a transition from institution centric to user-centric applications. This paper defines key principles and challenges for designers, policy makers, and evaluators of user-centred technologies for healthcare in schools. The paper employs the User Experience Management Model (UXM2) to review the current and emerging trends, and highlights challenges related to the design of a typical m-ICT application that supports delivery of healthcare in schools. The paper reaches conclusions for next steps that will advance the domain.
      PubDate: 2015-07-01T00:00:00Z
       
  • Burning money with firewalls
    • Authors: Ralf C. Staudemeyer; James Connany
      Abstract: Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to be constantly vigilant against intruders on their networks and groups or individuals that seek to intercept their communications.Companies turn to firewall and intrusion detection system vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic.Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but do not adequately take into consideration.
      PubDate: 2015-07-01T00:00:00Z
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.162.166.214
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016