Towards New e-Infrastructure and e-Services for Developing Countries (eBook, PDF)
16th International Conference, AFRICOMM 2024, Abidjan, Côte d'Ivoire, November 27-29, 2024, Proceedings, Part II
Redaktion: Koné, Tiémoman; Kouamé, Koffi Fernand; Sere, Abdoulaye
Alle Infos zum eBook verschenken
Towards New e-Infrastructure and e-Services for Developing Countries (eBook, PDF)
16th International Conference, AFRICOMM 2024, Abidjan, Côte d'Ivoire, November 27-29, 2024, Proceedings, Part II
Redaktion: Koné, Tiémoman; Kouamé, Koffi Fernand; Sere, Abdoulaye
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d'Ivoire, in November 2024. The 52 full papers presented in this volume were carefully reviewed and selected from 130 submissions. They are organised in the following topics: Part I : E- Government AND E-Service; Emerging Network; and Cybersecurity. Part II : Big Data Analytic, Blockchain / Workshop - Emerging Tehnologies / PHD; Artificial Intelligence and Machine Learning Applications.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 56.72MB
Towards New e-Infrastructure and e-Services for Developing Countries (eBook, PDF)72,95 €
Towards new e-Infrastructure and e-Services for Developing Countries (eBook, PDF)56,95 €
Towards new e-Infrastructure and e-Services for Developing Countries (eBook, PDF)60,95 €
Towards new e-Infrastructure and e-Services for Developing Countries (eBook, PDF)72,95 €
e-Infrastructure and e-Services for Developing Countries (eBook, PDF)40,95 €
e-Infrastructure and e-Services for Developing Countries (eBook, PDF)40,95 €
e-Infrastructure and e-Services for Developing Countries (eBook, PDF)40,95 €-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 377
- Erscheinungstermin: 22. Oktober 2025
- Englisch
- ISBN-13: 9783032019103
- Artikelnr.: 75731825
- Verlag: Springer International Publishing
- Seitenzahl: 377
- Erscheinungstermin: 22. Oktober 2025
- Englisch
- ISBN-13: 9783032019103
- Artikelnr.: 75731825
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.
.- A New Approach to Matching Big Data Sources in a Semi-structured Data Warehouse Context.
.- Web Scraping for Competitive Intelligence: State of the Art and Case Study.
.- Financial Cost sensitive Feature Selection Method based on Association rule applied to credit scoring.
.- Blockchain as an Alternative for Transparency and Optimal Handling of Microcredits in the Democratic Republic of Congo.
.- Improving smart contract security using sequential models.
.- The limit of direct modulation in an FTTH/GPO architecture.
.- ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML) APPLICATIONS.
.- Impact of climate in modeling the evolution of COVID-19 cases in Côte d Ivoire.
.- Preventing Typosquatting with IDN Conversion: A Siamese Neural Network Approach.
.- Enhancing LoRaWAN Network Performance with Reinforcement Learning: Mitigating Collisions and Reducing Energy Consumption.
.- Detection and Treatment of Various Rice Diseases in Benin Using AI: From Bibliometric Analysis to Survey.
.- An Edge-AI-Based Monitoring of Rift Valley Fever Vectors Using Deep Learning.
.- Detection of malicious Android applications based on verification of indicators of compromise and Machine Learning techniques.
.- Two Phases Feature Selection Method based on Association Rules.
.- Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security.
.- Exploring Human personality traits in Phishing Success: Contextual Cybersecurity Study.
.- Optimizing Real-time Video Analytics for Resource Constrained Environments.
.- A New Convolutional Neural Network Approach for Image Classification.
.- Text-to-OWL: Automated Ontology Construction for Tuberculosis Treatment Recommendation using Generative AI.
.- Using A Bidirectional Decoder Model with Attention Mechanisms for Biomedical Named Entity Recognition.
.- Detection of COVID-19 using machine learning techniques.
.- Text mining-based approach for extracting thematic keywords from a corpus of French-language documents in order to enrich a lexicon related to food security.
.- Improving web user tracking systems through browser fingerprinting.
.- Monitoring the Compliance and Response to the COVID-19 Lockdown in South Africa, and Analysing the Impact thereof.
.- Regression Model-based energy prediction approach for IoT Oriented system.







