用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications; First EAI Internatio Franklin Tchakounte,Marcellin Atemkeng,Raje

[复制链接]
查看: 41172|回复: 57
发表于 2025-3-21 17:01:55 | 显示全部楼层 |阅读模式
书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
副标题First EAI Internatio
编辑Franklin Tchakounte,Marcellin Atemkeng,Rajeswari P
视频video
丛书名称Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi
图书封面Titlebook: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications; First EAI Internatio Franklin Tchakounte,Marcellin Atemkeng,Raje
描述This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023.  .The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews..
出版日期Conference proceedings 2024
关键词artificial intelligence; internet of things; biases correction; discrimination removal; invasion of priv
版次1
doihttps://doi.org/10.1007/978-3-031-56396-6
isbn_softcover978-3-031-56395-9
isbn_ebook978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X
issn_series 1867-8211
copyrightICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024
1 Front Matter
Abstract
2
Abstract
3 Examining Potential Harms of Large Language Models (LLMs) in Africa Rehema Baguma,Hajarah Namuwaya,Joyce Nakatumba-Nabende,Qazi Mamunur Rashid
Abstract
4 The Legal Framework of Artificial Intelligence in Cameroon Job Nzoh Sangong
Abstract
5
Abstract
6 A Gamification Architecture to Enhance Phishing Awareness Jean Emmanuel Ntsama,Claude Fachkha,Philippe Brice Owomo,Adrian Chickagwe Focho
Abstract
7 Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Sidoine Djimnaibeye,Aminata Ngom,Igor Tchappi,Borgou Mahamat Hassan,Amro Najjar
Abstract
8 DIDOR: A Decentralized Identifier Based Onion Routing Protocol Saha Fobougong Pierre,Mohamed Mejri
Abstract
9 Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm Roger Yiran Mawoh,Franklin Tchakounte,Joan Beri Ali,Claude Fachkha
Abstract
10 Feature Engineering Considerations in IoT: A Case Study Jean-Marie Kuate Fotso,Ismael Abbo,Franklin Tchakounté,William Shu,Claude Fachkha
Abstract
11 Correlation Clustering Adapted for Cell Site Management of Mobile Networks in Developing Countries Ado Adamou Abba Ari,Yekoniya Ndjekiltemai,Jocelyn Edinio Zacko Gbadouissa,Arouna Ndam Njoya,Lyse Nao
Abstract
12 A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Mounirah Djam-Doudou,Ado Adamou Abba Ari,Hortense Boudjou Tchapgnouo,Abdelhak Mourad Gueroui,Alidou
Abstract
13
Abstract
14 Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters o Patrick Njionou Sadjang,Nelson Issondj Banta Jr
Abstract
15 Advancing High-Resolution Weather Prediction Through Machine Learning and GNSS Techniques Robert Galatiya Suya
Abstract
16 French-Fulfulde Textless and Cascading Speech Translation: Towards a Dual Architecture Tala Metalom Diane Carole,Yenke Blaise Omer,Fendji Kedieng Ebongue Jean Louis
Abstract
17 Assessment of Thermal Comfort Using PMV, aPMV, ePMV and TSV Indices in a Naturally Ventilated Buildi Tsague Cathy,Medjo Astrid,Jean Seutche,Tchinda Rene
Abstract
18 Classification Analysis of Some Cancer Types Using Machine Learning Scott Ulrich Jemea Ebolo,Olusola Samuel Makinde,Berthine Nyunga Mpinda
Abstract
19 Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon Tse Sparthan Azoh,Wolfgang Nzie,Bertin Sohfotsing,Tibi Beda
Abstract
20 Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Moskolaï Ngossaha Justin,Ynsufu Ali,Batouré Bamana Apollinaire,Djeumen Rodrigue,Bowong Tsakou Samuel
Abstract
书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:52:12 | 显示全部楼层
发表于 2025-3-22 00:59:30 | 显示全部楼层
978-3-031-56395-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024
发表于 2025-3-22 06:59:24 | 显示全部楼层
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X
发表于 2025-3-22 09:31:39 | 显示全部楼层
Examining Potential Harms of Large Language Models (LLMs) in Africatural language data for training inclusive language models. This paper examines the potential harms of LLMs in Africa, covering harms already documented for the African context; harms studied and documented for the Western context, but previously unapplied to Africa; and novel potential harms based
发表于 2025-3-22 15:27:15 | 显示全部楼层
A Gamification Architecture to Enhance Phishing Awarenessotivation, and consideration of a learner’s profile. Subsequently, the problem of the best didactic means is posed with openness to the integration of artificial intelligence, the choice of the type of gamification, and the technologies that can contribute to ensuring that everyone is competent to e
发表于 2025-3-22 20:54:59 | 显示全部楼层
DIDOR: A Decentralized Identifier Based Onion Routing Protocolintains low communication overhead and latency, and does not require directory servers on which most existing protocols rely. We finally analyze the security of our protocol and demonstrate how it can withstand the denial of service attack on DID documents. Overall, this protocol represents a promis
发表于 2025-3-22 23:32:32 | 显示全部楼层
发表于 2025-3-23 03:51:28 | 显示全部楼层
Correlation Clustering Adapted for Cell Site Management of Mobile Networks in Developing Countriesity parameter. This approach makes it possible to determine the optimal number of cells to allocate to a technician to make his interventions efficient; this will minimize Operational Expenditure (OpEx) and cell downtime due to breakdowns and maximize the quality of service offered to customers.
发表于 2025-3-23 07:04:19 | 显示全部楼层
A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit ertificates, from which symmetric keys for communication between nodes are derived. We then implement the solution using TelosB sensors in the TOSSIM simulator with an AVL Tree. We evaluate the security and resilience of our proposed scheme through informal analysis and a formal model. The informal
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-18 04:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表