000 05653nam a22005895i 4500
001 978-3-031-56396-6
003 DE-He213
005 20240730171905.0
007 cr nn 008mamaa
008 240417s2024 sz | s |||| 0|eng d
020 _a9783031563966
_9978-3-031-56396-6
024 7 _a10.1007/978-3-031-56396-6
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications
_h[electronic resource] :
_bFirst EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings /
_cedited by Franklin Tchakounte, Marcellin Atemkeng, Rajeswari Pillai Rajagopalan.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXV, 410 p. 172 illus., 144 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v566
505 0 _aRegulations and Ethics of Artificial Intelligence -- Examining Potential Harms of Large Language Models(LLMs) in Africa -- The Legal Framework of Artificial Intelligence in Cameroon -- Resource-constrained Networks and Cybersecurity -- A Gamification Architecture to Enhance Phishing Awareness -- Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN -- DIDOR: A Decentralized Identifier Based Onion Routing protocol -- Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm -- Feature Engineering Considerations in IoT: A Case Study -- Correlation clustering adapted for cell site management of mobile networks in developing countries -- A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs -- Emerging Artificial Intelligence Applications -- Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters of a Turbojet Engine using Electric Power Transfer -- Advancing High-Resolution Weather Prediction through Machine Learning and GNSS Techniques -- French-Fulfulde Textless and cascading speech translation: towards a dual architecture -- Assessment of thermal comfort using PMV, aPMV, ePMV and TSV indices in a naturally ventilated building -- Classification Analysis of Some Cancer Types Using Machine Learning -- Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon -- Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Health Information Systems: Case of Cameroon -- Food recommender system based on artificial intelligence :the case of Sub-saharan Africa -- Detection and Recognition of Cough Sounds Using Deep Learning for Medical Monitoring -- DeepAF: A Multi-task deep learning model for Arrhythmias detection at Resource-Constrained Mobile Device -- Wine features importance and quality prediction: A comparative study of machine learning algorithms with unbalanced data -- Covid-19 Data Preprocessing Approach in Machine Learning for Prediction -- Evaluation of machine learning and deeplearning algorithms applied to earth observation data for change detection in polarimetric radar images -- Reviews -- Machine Learning Techniques for the management of Diseases: A paper Review -- Support to Interaction between Medical Practitioners and Patients: A Systematic Review. .
520 _aThis book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023. The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews.
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aApplication software.
_9100798
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 1 4 _aMobile and Network Security.
_933624
650 2 4 _aComputer and Information Systems Applications.
_9100800
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9100802
700 1 _aTchakounte, Franklin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100803
700 1 _aAtemkeng, Marcellin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100805
700 1 _aRajagopalan, Rajeswari Pillai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100806
710 2 _aSpringerLink (Online service)
_9100808
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031563959
776 0 8 _iPrinted edition:
_z9783031563973
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v566
_9100810
856 4 0 _uhttps://doi.org/10.1007/978-3-031-56396-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNS
942 _cEBK
999 _c87871
_d87871