00996nam a2200253 i 4500991001411849707536 s2005 it 000 0 ita d8820737868b13368497-39ule_instDip. SSCita361.610945 Il malessere del Welfare /a cura di Giovanna VicarelliNapoli :Liguori,2005X, 326 p. ;24 cmProfiliTeorie & oggetti delle scienze sociali ;14Welfare StateItaliaVicarelli, Giovanna.b1336849723-05-0711-01-06991001411849707536LE021 DI9BISB8312021000122279le021Barrucci-E0.00-l- 01010.i1417533211-01-06LE023 361.6 VIC 1 1 12023000095225le023-E21.00-l- 01010.i1445997823-05-07Malessere del welfare736122UNISALENTOle021le02311-01-06m- -itait 3005639nam 22006975 450 991085198310332120240417124827.09783031563966303156396410.1007/978-3-031-56396-6(CKB)31801407900041(MiAaPQ)EBC31284514(Au-PeEL)EBL31284514(DE-He213)978-3-031-56396-6(MiAaPQ)EBC31574259(Au-PeEL)EBL31574259(OCoLC)1430685780(EXLCZ)993180140790004120240417d2024 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierSafe, Secure, Ethical, Responsible Technologies and Emerging Applications First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings /edited by Franklin Tchakounte, Marcellin Atemkeng, Rajeswari Pillai Rajagopalan1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (420 pages)Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;5669783031563959 3031563956 Regulations and Ethics of Artificial Intelligence -- Examining Potential Harms of Large Language Models(LLMs) in Africa -- The Legal Framework of Artificial Intelligence in Cameroon -- Resource-constrained Networks and Cybersecurity -- A Gamification Architecture to Enhance Phishing Awareness -- Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN -- DIDOR: A Decentralized Identifier Based Onion Routing protocol -- Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm -- Feature Engineering Considerations in IoT: A Case Study -- Correlation clustering adapted for cell site management of mobile networks in developing countries -- A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs -- Emerging Artificial Intelligence Applications -- Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters of a Turbojet Engine using Electric Power Transfer -- Advancing High-Resolution Weather Prediction through Machine Learning and GNSS Techniques -- French-Fulfulde Textless and cascading speech translation: towards a dual architecture -- Assessment of thermal comfort using PMV, aPMV, ePMV and TSV indices in a naturally ventilated building -- Classification Analysis of Some Cancer Types Using Machine Learning -- Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon -- Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Health Information Systems: Case of Cameroon -- Food recommender system based on artificial intelligence :the case of Sub-saharan Africa -- Detection and Recognition of Cough Sounds Using Deep Learning for Medical Monitoring -- DeepAF: A Multi-task deep learning model for Arrhythmias detection at Resource-Constrained Mobile Device -- Wine features importance and quality prediction: A comparative study of machine learning algorithms with unbalanced data -- Covid-19 Data Preprocessing Approach in Machine Learning for Prediction -- Evaluation of machine learning and deeplearning algorithms applied to earth observation data for change detection in polarimetric radar images -- Reviews -- Machine Learning Techniques for the management of Diseases: A paper Review -- Support to Interaction between Medical Practitioners and Patients: A Systematic Review. .This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023. The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;566Computer networksSecurity measuresApplication softwareData protectionComputer networksMobile and Network SecurityComputer and Information Systems ApplicationsData and Information SecurityComputer Communication NetworksComputer networksSecurity measures.Application software.Data protection.Computer networks.Mobile and Network Security.Computer and Information Systems Applications.Data and Information Security.Computer Communication Networks.005.8Tchakounte Franklin1765396Atemkeng Marcellin1765397Rajagopalan Rajeswari Pillai1764985MiAaPQMiAaPQMiAaPQBOOK9910851983103321Safe, Secure, Ethical, Responsible Technologies and Emerging Applications4207018UNINA