LEADER 05639nam 22006975 450 001 9910851983103321 005 20240417124827.0 010 $a9783031563966 010 $a3031563964 024 7 $a10.1007/978-3-031-56396-6 035 $a(CKB)31801407900041 035 $a(MiAaPQ)EBC31284514 035 $a(Au-PeEL)EBL31284514 035 $a(DE-He213)978-3-031-56396-6 035 $a(MiAaPQ)EBC31574259 035 $a(Au-PeEL)EBL31574259 035 $a(OCoLC)1430685780 035 $a(EXLCZ)9931801407900041 100 $a20240417d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications $eFirst EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings /$fedited by Franklin Tchakounte, Marcellin Atemkeng, Rajeswari Pillai Rajagopalan 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (420 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v566 311 08$a9783031563959 311 08$a3031563956 327 $aRegulations and Ethics of Artificial Intelligence -- Examining Potential Harms of Large Language Models(LLMs) in Africa -- The Legal Framework of Artificial Intelligence in Cameroon -- Resource-constrained Networks and Cybersecurity -- A Gamification Architecture to Enhance Phishing Awareness -- Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN -- DIDOR: A Decentralized Identifier Based Onion Routing protocol -- Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm -- Feature Engineering Considerations in IoT: A Case Study -- Correlation clustering adapted for cell site management of mobile networks in developing countries -- A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs -- Emerging Artificial Intelligence Applications -- Machine and Deep Learning Models for the Prediction of Performance and Speed Regulation Parameters of a Turbojet Engine using Electric Power Transfer -- Advancing High-Resolution Weather Prediction through Machine Learning and GNSS Techniques -- French-Fulfulde Textless and cascading speech translation: towards a dual architecture -- Assessment of thermal comfort using PMV, aPMV, ePMV and TSV indices in a naturally ventilated building -- Classification Analysis of Some Cancer Types Using Machine Learning -- Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroon -- Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous Health Information Systems: Case of Cameroon -- Food recommender system based on artificial intelligence :the case of Sub-saharan Africa -- Detection and Recognition of Cough Sounds Using Deep Learning for Medical Monitoring -- DeepAF: A Multi-task deep learning model for Arrhythmias detection at Resource-Constrained Mobile Device -- Wine features importance and quality prediction: A comparative study of machine learning algorithms with unbalanced data -- Covid-19 Data Preprocessing Approach in Machine Learning for Prediction -- Evaluation of machine learning and deeplearning algorithms applied to earth observation data for change detection in polarimetric radar images -- Reviews -- Machine Learning Techniques for the management of Diseases: A paper Review -- Support to Interaction between Medical Practitioners and Patients: A Systematic Review. . 330 $aThis book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023. The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v566 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aData protection 606 $aComputer networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aComputer Communication Networks 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks. 615 14$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aTchakounte$b Franklin$01765396 701 $aAtemkeng$b Marcellin$01765397 701 $aRajagopalan$b Rajeswari Pillai$01764985 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910851983103321 996 $aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications$94207018 997 $aUNINA