• WIRELESS VOIP IMPLEMENTATION USING ASTERISK PBX AND OPEN SOURCE SOFTPHONE

  • IoT-F2CDM-LB: IoT Based Fog-to-Cloud and Data-in-Motion Architectures with Load Balancing

  • SAND: Smart and Adaptable Networking Design Using Virtual Slicing over Software-Defined Network

  • Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network

  • A User-Centric Decision Support Model for Cloud of Things Adoption Using Ellipsoidal Fuzzy Inference System

  • Comparative Analysis of Supervised Learning for Sentiment Classification

  • A Conceptual Model to Guide the Evaluation of E-Business Value in Small and Medium-Sized Enterprises in Botswana

  • An Empirical Study on the Adoption of Consumer-to-Consumer E-commerce: Integrating the UTAUT Model and the Initial Trust Model

  • Exploring E-Procurement Adoption in the Context of a Developing Country: The Case of Lesotho

  • Blockchain Consensus Protocols

  • Smartphone Usage Among Millennial in Finland and Implications for Marketing Segmentation Strategies: Lessons for Nigeria

  • Enhancing Business Decision Making Through Actionable Knowledge Discovery Using an Hybridized MCDM Model

  • SafeTransit: A Transit Safety Information Gathering Decision System

  • A Novel Mobile Phone Contact List Based on Social Relations

  • Towards a Persuasive Technology for Electricity Theft Reduction in Uganda

  • SV4D Architecture: Building Sustainable Villages for Developing Countries

  • Design and Implementation of a Smart Meter

  • Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries

  • The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE)

  • Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks

  • Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise

  • The State of e-Government Security in South Africa: Analysing the National Information Security Policy

  • A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia

  • Towards an Interoperability e-Government Framework for Uganda

  • Tackling the Issues of Powering Mobile IoT Sensors and Systems Using Off-Grid Sources of Energy, the Case of the Real-Time Web-Based Temperature Monitoring System in Malawi