Buch, Englisch, Band 587, 394 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 622 g
15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23-25, 2023, Proceedings, Part I
Buch, Englisch, Band 587, 394 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 622 g
ISBN: 978-3-031-81569-0
Verlag: Springer Nature Switzerland
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The 59 full papers presented in these two volumes were carefully reviewed and selected from 72 submissions.
The papers are organized in the following topical sections:
Part I: Digital economy, Digital transformation, e-Government and e-services; ICT infrastructures for critical environmental conditions; Wireless networks; E-health; Cybersecurity and Privacy.
Part II: Systems and cloud computing; Artificial Intelligence; Ontology and data preparation; Responsible Artificial Intelligence for Sustainable Development in Africa (workshop).
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
.- Digital economy, Digital transformation, e-Government and e-services.
.- Digital Identity Frameworks: A Review.
.- Cloud adoption in low resource settings: A case of higher education institutions in Uganda.
.- A Blueprint for South African Public Schools ICT Infrastructure.
.- Re-Thinking the Connectivity for Schools within the Public Education System in South Africa.
.- Deep Learning Approaches for Object Detection in Autonomous Driving: Smart Cities Perspective.
.- ICT infrastructures for critical environmental conditions.
.- Internet of Energy (IoE): A Comprehensive Review of Design, Principles, and Architectural. Frameworks
.- Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA.
.- Modelling of a solar photovoltaic power supply for a wireless access point in a rural area.
.- Wireless networks.
.- FSO Transmission Link Performance Analysis for Enhancing Internet Infrastructure on Côte D’Ivoire.
.- Lightweight authentication system for software-defined wireless sensor networks.
.- A K-means based approach for Optimal Gateway Deployment in LoRaWAN-SIM.
.- Assessing the Impact of Web Caching on Resource Utilization in Low-Capacity Networks.
.- Channel Allocation Based K-Medoids in a Wireless Mesh Network.
.- E-health.
.- Digitization of Patient Records in Maxillofacial and Stomatology Surgery: The Case of the Maxillofacial and Stomatology Surgery Unit at Sominé Dolo Hospital in Mopti, Mali.
.- Design of an Electronic Health Record Module in the Pediatrics Department of the Ouahigouya Regional University Hospital Center.
.- Emergency Severity Index (ESI), a more suitable system for emergencies in Burkina Faso.
.- Cybersecurity and Privacy.
.- The State of Data Breaches in the African Cyberspace: A Trend Analysis Using Social Media and Research Literature.
.- Advancing Mobile Money Payments Through Blockchain and Interoperability Protocols.
.- Blackhole attack detection and countermeasure solution in RPL.
.- Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts.
.- Proposal of honeypot - based datamining methods for discovering intrusions in big data databases.
.- Potential Cyber Threats to the National Elections in the Digital Age in Africa.
.- Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues.
.- Emerging Phishing Attack Trends: A South African Case Study.
.- 5G Network Security: Unraveling Vulnerabilities and Innovating Defense Mechanisms.