Towards new e-Infrastructure and e-Services for Developing Countries
16th International Conference, AFRICOMM 2024, Abidjan, Côte d'Ivoire, November 27-29, 2024, Proceedings, Part II
Herausgegeben:koné, Tiémoman; Sere, Abdoulaye; Kouamé, Koffi Fernand
Towards new e-Infrastructure and e-Services for Developing Countries
16th International Conference, AFRICOMM 2024, Abidjan, Côte d'Ivoire, November 27-29, 2024, Proceedings, Part II
Herausgegeben:koné, Tiémoman; Sere, Abdoulaye; Kouamé, Koffi Fernand
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d Ivoire, in November 2024. The 52 full papers presented in this volume were carefully reviewed and selected from 130 submissions. They are organised in the following topics: Part I : E- Government AND E-Service; Emerging Network; and Cybersecurity. Part II : Big Data Analytic, Blockchain / Workshop - Emerging Tehnologies / PHD; Artificial Intelligence and Machine Learning Applications. …mehr
Andere Kunden interessierten sich auch für
- Adam NeuralIntroduction to Artificial Intelligence and Generative AI for Novice15,99 €
- John R. VaccaPublic Key Infrastructure77,99 €
- Bahae SamhanTowards A Unified Understanding of Technology Resistance and Avoidance46,99 €
- Ambuj AgrawalLLM Development and AI Ethics39,99 €
- Kai SinclairThe AI Playbook for Beginners16,99 €
- Navigating the Intersection of AI Policy, Technology, and Governance148,99 €
- Exploring the Fusion of Quantum Computing and Machine Learning176,99 €
-
-
-
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d Ivoire, in November 2024.
The 52 full papers presented in this volume were carefully reviewed and selected from 130 submissions. They are organised in the following topics:
Part I : E- Government AND E-Service; Emerging Network; and Cybersecurity.
Part II : Big Data Analytic, Blockchain / Workshop - Emerging Tehnologies / PHD; Artificial Intelligence and Machine Learning Applications.
The 52 full papers presented in this volume were carefully reviewed and selected from 130 submissions. They are organised in the following topics:
Part I : E- Government AND E-Service; Emerging Network; and Cybersecurity.
Part II : Big Data Analytic, Blockchain / Workshop - Emerging Tehnologies / PHD; Artificial Intelligence and Machine Learning Applications.
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 89559452, 978-3-032-01909-7
- Seitenzahl: 372
- Erscheinungstermin: 21. September 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783032019097
- ISBN-10: 3032019095
- Artikelnr.: 74821454
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 89559452, 978-3-032-01909-7
- Seitenzahl: 372
- Erscheinungstermin: 21. September 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783032019097
- ISBN-10: 3032019095
- Artikelnr.: 74821454
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- BIG DATA ANALYTIC, BLOCKCHAIN / WORKSHOP - EMERGING TECHNOLOGIES / PHD.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.
.- BIG DATA ANALYTIC, BLOCKCHAIN / WORKSHOP - EMERGING TECHNOLOGIES / PHD.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.