Abstract is missing.
- A Mobile System for Managing Personal Finances SynchronouslyJabulani S. Dlamini, Okuthe P. Kogeda. 3-13 [doi]
- Africa's Non-inclusion in Defining Fifth Generation Mobile NetworksGertjan van Stam. 14-25 [doi]
- Redesigning Mobile Phone Contact List to Integrate African Social PracticesPasteur Poda, A. Joëlle Compaoré, Borlli Michel Jonas Somé. 26-32 [doi]
- Analysis of the 2015 Presidential Campaign of Burkina Faso Expressed on FacebookFrédéric Tounwendyam Ouédraogo, Abdoulaye Séré, Evariste Rouamba, Soré Safiatou. 33-41 [doi]
- Towards Inclusive Social Networks for the Developing WorldChristian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch H. Glitho, Jules Degila. 42-52 [doi]
- Multi-diffusion Degree Centrality Measure to Maximize the Influence Spread in the Multilayer Social NetworksIbrahima Gaye, Gervais Mendy, Samuel Ouya, Idy Diop, Diaraf Seck. 53-65 [doi]
- Cloud Computing: Potential Risks and Security ApproachesHassen Ben Rebah, Hatem Ben Sta. 69-78 [doi]
- G-Cloud: Opportunities and Security Challenges for Burkina FasoDidier Bassolé, Frédéric Tounwendyam Ouedraogo, Oumarou Sie. 79-87 [doi]
- Mobile VPN Schemes: Technical Analysis and ExperimentsDaouda Ahmat, Mahamat Barka, Damien Magoni. 88-97 [doi]
- Proposals of Architecture for Adapting Cloud Computing Services to User's ContextKanga Koffi, Babri Michel, Goore Bi Tra, Brou Konan Marcelin. 98-110 [doi]
- SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay NetworkDaouda Ahmat, Mahamat Barka, Damien Magoni. 111-121 [doi]
- Xj-ASD: Towards a j-ASD DSL eXtension for Application Deployment in Cloud-Based EnvironmentKanga Koffi, Babri Michel, Brou Konan Marcelin, Goore Bi Tra. 122-132 [doi]
- WAZIUP: A Low-Cost Infrastructure for Deploying IoT in Developing CountriesCongDuc Pham, Abdur Rahim, Philippe Cousin. 135-144 [doi]
- Design and Implementation of an Internet of Things Communications System for Legacy Device Control and ManagementMartin Saint, Aminata A. Garba, Audace Byishimo, Rodrigue Gasore. 145-154 [doi]
- Classification of Water Pipeline Failure Consequence Index in High-Risk Zones: A Study of South African Dolomitic LandAchieng G. Ogutu, Okuthe P. Kogeda, Manoj Lall. 155-164 [doi]
- Exploring Crowdfunding Performance of Agricultural Ventures: Evidence from FlyingV in TaiwanWen-I Chang. 165-173 [doi]
- An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster ManagementQuist-Aphetsi Kester. 174-185 [doi]
- Head to Head Battle of TV White Space and WiFi for Connecting Developing RegionsDavid L. Johnson, Natasha Zlobinsky, Albert Lysko, Magdeline Lamola, Senka Hadzic, Richard Maliwatu, Melissa Densmore. 186-195 [doi]
- Comparison of Different Antenna Arrays with Various HeightChien-Hung Chen, Chi-Jie Hung, Chien-Ching Chiu, Shu-Han Liao. 199-205 [doi]
- A Priority-Based Service Discovery Model Using Swarm Intelligence in Wireless Mesh NetworksLungisani Ndlovu, Manoj Lall, Okuthe P. Kogeda. 206-216 [doi]
- Innovating Based on R tree and Artificial Neural Network for Hierarchical Clustering in Order to Make QoS Routes in MANETNguyen Thanh Long, Nguyen Duc Thuy, Pham Huy Hoang. 217-231 [doi]
- DNS Lame Delegations: A Case-Study of Public Reverse DNS Records in the African RegionAmreesh Phokeer, Alain Aina, David L. Johnson. 232-242 [doi]
- A Correlation Between RSSI and Height in UHF Band and Comparison of Geolocation Spectrum Database View of TVWS with Ground TruthRichard Maliwatu, Albert Lysko, David Johnson, Senka Hadzic. 243-250 [doi]
- Usage of Online Business Advisory by Micro-entrepreneurs: Case of Cloth Tailoring Enterprises in UgandaFatuma Namisango, Gorretti Byomire, Maria Miiro Kafuko, Asianzu Elizabeth. 253-262 [doi]
- GIS Initiatives in Health Management in Malawi: Opportunities to Share KnowledgePatrick Albert Chikumba, Patrick Naphini. 263-272 [doi]
- Eliminate the Delay Backlog in the Conduct of Pedagogical Activities by Distance LearningTiguiane Yélémou, Benjamin Sia, Théodore Njingang Mbadjoin, Alain Jaillet. 273-277 [doi]
- Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information SystemsQuist-Aphetsi Kester. 281-291 [doi]
- A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of ThingsQuist-Aphetsi Kester. 292-303 [doi]
- Modelization of Recipe in African Traditional Medicine with Visual Ontology Approach, Iconic SketchAppoh Kouamé, Jean-Baptiste Lamy, Konan Marcellin Brou, Moussa Lo. 304-312 [doi]
- Technological Initiatives to Promote Science Growth in MozambiqueMarangaze Munhepe Mulhanga, Venâncio Massingue, Solange Rito Lima. 313-324 [doi]
- The Shortcomings of Globalised Internet Technology in Southern AfricaDavid L. Johnson, Gertjan van Stam. 325-338 [doi]