• Statistical Downscaling of Global Climate Model MIROC_4h Outputs to Precipitation in Rwanda

  • Beyond Participation: Welfare Effects of Gender-Differentiated Group-Based Approaches Under Climate Change in Kenya

  • Climate Change Signals Over Senegal River Basin Using Regional Climate Models of the CORDEX Africa Simulations

  • Evaluation and Update of Two Regional Methods (ORSTOM and CIEH) for Estimations of Flow Used in Structural Design in West Africa

  • Basic Income Grant as Innovative Social Policy against Poverty in Côte d’Ivoire

  • Fostering Entrepreneurship Education in Africa: Presenting the Orchestration of a Pan-African University Alliance

  • MOTHER TONGUE USAGE IN PRIMARY SCHOOLS: A DESIDERATUM FOR ACTUALIZING EDUCATION FOR ALL IN EBONYI STATE; SOUTH EAST NIGERIA.

  • ANCIENT TECHNIQUES AND TRADITIONAL MEDICINE IN SUB-SAHARAN AFRICA : THE CASE OF FORGES OF OLD METALLURGY OF IRON

  • Optimization of proactive routing with latency minimization in SDN networks

  • Open Mathematics, Traditional Knowledge and Intellectual Property in the era of the fourth industrial revolution: Challenges and Opportunities in Niger.

  • Using Technological Innovation and Corporate Social Responsibility to Connect Africa’s Smallholder Farmers to the Global Sustainable Agriculture Economy

  • Entrepreneurship Hysteresis and Persistence in Higher Education A quasi-experiment on academic innovation

  • Information System Development in Resource Constraint Setting: A Case Study from Malawi

  • An innovative Model of Training and Collaboration in the Mining Sector

  • What drives scientific integration in Africa? Evidence from publications

  • Smart specialisation in Sub-Saharan Africa: opportunities and challenges

  • CYBERSECURITY AND LEGAL INNOVATIONS IN WEST AFRICA

  • Between Strategy and Sabotage: A Faux Pas, Technophobia, or Ghanaian Thing?

  • Integration of the Google Suite for Education in competency based ICT training for Bachelor students: Empirical findings from the IAG-CoRECE project

  • WIRELESS VOIP IMPLEMENTATION USING ASTERISK PBX AND OPEN SOURCE SOFTPHONE

  • IoT-F2CDM-LB: IoT Based Fog-to-Cloud and Data-in-Motion Architectures with Load Balancing

  • SAND: Smart and Adaptable Networking Design Using Virtual Slicing over Software-Defined Network

  • Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network

  • A User-Centric Decision Support Model for Cloud of Things Adoption Using Ellipsoidal Fuzzy Inference System

  • Comparative Analysis of Supervised Learning for Sentiment Classification

  • A Conceptual Model to Guide the Evaluation of E-Business Value in Small and Medium-Sized Enterprises in Botswana

  • An Empirical Study on the Adoption of Consumer-to-Consumer E-commerce: Integrating the UTAUT Model and the Initial Trust Model

  • Exploring E-Procurement Adoption in the Context of a Developing Country: The Case of Lesotho

  • Blockchain Consensus Protocols

  • Smartphone Usage Among Millennial in Finland and Implications for Marketing Segmentation Strategies: Lessons for Nigeria

  • Enhancing Business Decision Making Through Actionable Knowledge Discovery Using an Hybridized MCDM Model

  • SafeTransit: A Transit Safety Information Gathering Decision System

  • A Novel Mobile Phone Contact List Based on Social Relations

  • Towards a Persuasive Technology for Electricity Theft Reduction in Uganda

  • SV4D Architecture: Building Sustainable Villages for Developing Countries

  • Design and Implementation of a Smart Meter

  • Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries

  • The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE)

  • Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks

  • Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise

  • The State of e-Government Security in South Africa: Analysing the National Information Security Policy

  • A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia

  • Towards an Interoperability e-Government Framework for Uganda

  • Tackling the Issues of Powering Mobile IoT Sensors and Systems Using Off-Grid Sources of Energy, the Case of the Real-Time Web-Based Temperature Monitoring System in Malawi

  • Design of a Secure Public Accounts System for Enhanced War Against Corruption Using Intelligent Software Agent

  • Scheduling Cloud Workloads Using Carry-On Weighted Round Robin

  • A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks

  • Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes

  • 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services

  • Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks