Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
Springer International Publishing (Verlag)
978-3-031-56395-9 (ISBN)
The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews.
Regulations and Ethics of Artificial Intelligence.- Examining Potential Harms of Large Language Models(LLMs) in Africa.- The Legal Framework of Artificial Intelligence in Cameroon.- Resource-constrained Networks and Cybersecurity.- A Gamification Architecture to Enhance Phishing Awareness.- Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN.- DIDOR: A Decentralized Identifier Based Onion Routing protocol.- Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm.- Feature Engineering Considerations in IoT: A Case Study.- Correlation clustering adapted for cell site management of mobile networks in developing countries.- A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs.- Emerging Artificial Intelligence Applications.- Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters of a Turbojet Engine using Electric Power Transfer.- Advancing High-Resolution Weather Prediction through Machine Learning and GNSS Techniques.- French-Fulfulde Textless and cascading speech translation: towards a dual architecture.- Assessment of thermal comfort using PMV, aPMV, ePMV and TSV indices in a naturally ventilated building.- Classification Analysis of Some Cancer Types Using Machine Learning.- Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon.- Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Health Information Systems: Case of Cameroon.- Food recommender system based on artificial intelligence :the case of Sub-saharan Africa.- Detection and Recognition of Cough Sounds Using Deep Learning for Medical Monitoring.- DeepAF: A Multi-task deep learning model for Arrhythmias detection at Resource-Constrained Mobile Device.- Wine features importance and quality prediction: A comparative study of machine learning algorithms with unbalanced data.- Covid-19 Data Preprocessing Approach in Machine Learning for Prediction.- Evaluation of machine learning and deeplearning algorithms applied to earth observation data for change detection in polarimetric radar images.- Reviews.- Machine Learning Techniques for the management of Diseases: A paper Review.- Support to Interaction between Medical Practitioners and Patients: A Systematic Review.
Erscheinungsdatum | 18.04.2024 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XV, 410 p. 172 illus., 144 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | 5G, 6G, RFID & IoT security • Artificial Intelligence • attacks dissection • authentication • biases correction • Cryptographic Systems • cyber-crime • cyber security • discrimination removal • document identification systems • fake information • Forensics • internet of things • invasion of privacy detection • Phishing • prevention mechanisms • privacy management • risk and compliance management • Safety management • Trust |
ISBN-10 | 3-031-56395-6 / 3031563956 |
ISBN-13 | 978-3-031-56395-9 / 9783031563959 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich