DAY 1 - 6 DECEMBER 2016
08:30 Registration Opens
9:00 - 9:15 Conference Opening
9:15 - 10:15 Keynote Session
10:15 - 10:30 Coffee Break
10:30 - 12:30 Mobile and Social Networks
· A mobile system for managing personal finances synchronously - 20 min
· Africa's Non-inclusion in Defining Fifth Generation Mobile Networks - 20 min
· Redesigning Mobile Phone Contact List to Integrate African Social Practices - 20 min
· Analysis of the 2015 Presidential Campaign of Burkina Faso Expressed on Facebook - 20 min
· Towards Inclusive Social Networks for the Developing World - 20 min
· Multi-diffusion degree centrality measure to maximize the influence spread in the multilayer social networks - 20 min
12:30 - 13:30 Lunch
13:30 - 15:30 Cloud, VPN and Overlays
· Cloud Computing: Potential Risks and Security Approaches - 20 min
· G-Cloud : Opportunities and security challenges for Burkina Faso - 20 min
· Mobile VPN Schemes: Technical Analysis and Experiments - 20 min
· Proposals of architecture for adapting cloud computing services to user's context - 20 min
· SEMOS: A Middleware for Providing Secure and Mobility-aware Sessions over a P2P Overlay Network - 20 min
· Xj-ASD : Towards a j-ASD DSL eXtension for application deployment in cloud-based environment - 20 min
15:30 - 15:45 Coffee Break
15:45 - 17:45 IoT, Water, Land, Agriculture
· Deploying Low-cost IoT for Developing Countries - 20 min
· Design and Implementation of an Internet of Things Communications System for Legacy Device Control and Management - 20 min
· Classification of Water Pipeline Failure Consequence Index in High-Risk Zones: A Study of South African Dolomitic Land - 20 min
· Exploring Crowdfunding Performance of Agricultural Ventures: Evidence from FlyingV in Taiwan - 20 min
· An Integrated RoIP Communication Network for Effective Collaboration during Emergency and Disaster Management - 20 min
· Head to head battle of TV White Space and WiFi for connecting developing regions - 20 min
18:30 Gala Dinner
DAY 2 - 7 DECEMBER 2016
08:30 Registration Opens
9:00 - 10:40 Networks, TVWS
· Comparison of Different Antenna Arrays with Various Height (POSTER) - 10min
· Visual Cryptography in Action: The Pay-with-a-Selfie Demo (POSTER) - 10 min
· A Priority-based Service Discovery Model Using Swarm Intelligence in Wireless Mesh Networks - 20 min
· Innovating R Tree And Artificial Neural Network To Make Qos Multiple Paths For Service Based Routing - 20 min
· DNS Lame delegations: A case-study of public reverse DNS records in the African Region - 20 min
· A correlation between RSSI and height in UHF band and comparison of geolocation spectrum database view of TVWS with ground truth - 20 min
10:40 - 11:00 Coffee Break
11:00 - 12:20 Learning
· Usage of Online Business Advisory by Micro-Entrepreneurs: Case of Cloth Tailoring Enterprises in Uganda - 20 min
· GIS Initiatives in Health Management in Malawi: Opportunities to Share Knowledge - 20 min
· Eliminate the delay backlog in the conduct of pedagogic activities by distance learning - 20 min
· Examining Attitudes toward Virtual Professional Counseling in College Students. - 20 min
12:20 - 13:20 Lunch
13:20 - 15:00 Crypto and Services
· Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud based Health Information Systems - 20 min
· A Hybrid lossy compression using 2-D discrete cosine transform and Visual Cryptographic Technique for security of multimedia image data communications in Internet of Things - 20 min
· Modelization of recipe in African traditional medicine with visual ontology approach, iconic sketch - 20 min
· Technological Initiatives to Promote Science Growth in Mozambique - 20 min
· The Shortcomings of Globalised Internet Technology in Southern Africa - 20 min
15:00 Coffee Break & Conference Close