000 | 05653nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-56396-6 | ||
003 | DE-He213 | ||
005 | 20240730171905.0 | ||
007 | cr nn 008mamaa | ||
008 | 240417s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031563966 _9978-3-031-56396-6 |
||
024 | 7 |
_a10.1007/978-3-031-56396-6 _2doi |
|
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications _h[electronic resource] : _bFirst EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings / _cedited by Franklin Tchakounte, Marcellin Atemkeng, Rajeswari Pillai Rajagopalan. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXV, 410 p. 172 illus., 144 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v566 |
|
505 | 0 | _aRegulations and Ethics of Artificial Intelligence -- Examining Potential Harms of Large Language Models(LLMs) in Africa -- The Legal Framework of Artificial Intelligence in Cameroon -- Resource-constrained Networks and Cybersecurity -- A Gamification Architecture to Enhance Phishing Awareness -- Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN -- DIDOR: A Decentralized Identifier Based Onion Routing protocol -- Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm -- Feature Engineering Considerations in IoT: A Case Study -- Correlation clustering adapted for cell site management of mobile networks in developing countries -- A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs -- Emerging Artificial Intelligence Applications -- Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters of a Turbojet Engine using Electric Power Transfer -- Advancing High-Resolution Weather Prediction through Machine Learning and GNSS Techniques -- French-Fulfulde Textless and cascading speech translation: towards a dual architecture -- Assessment of thermal comfort using PMV, aPMV, ePMV and TSV indices in a naturally ventilated building -- Classification Analysis of Some Cancer Types Using Machine Learning -- Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon -- Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Health Information Systems: Case of Cameroon -- Food recommender system based on artificial intelligence :the case of Sub-saharan Africa -- Detection and Recognition of Cough Sounds Using Deep Learning for Medical Monitoring -- DeepAF: A Multi-task deep learning model for Arrhythmias detection at Resource-Constrained Mobile Device -- Wine features importance and quality prediction: A comparative study of machine learning algorithms with unbalanced data -- Covid-19 Data Preprocessing Approach in Machine Learning for Prediction -- Evaluation of machine learning and deeplearning algorithms applied to earth observation data for change detection in polarimetric radar images -- Reviews -- Machine Learning Techniques for the management of Diseases: A paper Review -- Support to Interaction between Medical Practitioners and Patients: A Systematic Review. . | |
520 | _aThis book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023. The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aApplication software. _9100798 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9100800 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9100802 |
700 | 1 |
_aTchakounte, Franklin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100803 |
|
700 | 1 |
_aAtemkeng, Marcellin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100805 |
|
700 | 1 |
_aRajagopalan, Rajeswari Pillai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100806 |
|
710 | 2 |
_aSpringerLink (Online service) _9100808 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031563959 |
776 | 0 | 8 |
_iPrinted edition: _z9783031563973 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v566 _9100810 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-56396-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cEBK | ||
999 |
_c87871 _d87871 |