Towards new e-Infrastructure and e-Services for Developing Countries : 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23-25, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social

個数:
  • ポイントキャンペーン

Towards new e-Infrastructure and e-Services for Developing Countries : 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23-25, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 394 p.
  • 言語 ENG
  • 商品コード 9783031815690

Full Description

The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.

The 59 full papers  presented in these two volumes were carefully reviewed and selected from 72 submissions.

The papers are organized in the following topical sections:

Part I: Digital economy, Digital transformation, e-Government and e-services; ICT infrastructures for critical environmental conditions; Wireless networks; E-health; Cybersecurity and Privacy.

Part II: Systems and cloud computing; Artificial Intelligence; Ontology and data preparation; Responsible Artificial Intelligence for Sustainable Development in Africa (workshop).

Contents

.- Digital economy, Digital transformation, e-Government and e-services.

.- Digital Identity Frameworks: A Review.

.- Cloud adoption in low resource settings: A case of higher education institutions in Uganda.

.- A Blueprint for South African Public Schools ICT Infrastructure.

.- Re-Thinking the Connectivity for Schools within the Public Education System in South Africa.

.- Deep Learning Approaches for Object Detection in Autonomous Driving: Smart Cities Perspective.

.- ICT infrastructures for critical environmental conditions.

.- Internet of Energy (IoE): A Comprehensive Review of Design, Principles, and Architectural. Frameworks

.- Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA.

.- Modelling of a solar photovoltaic power supply for a wireless access point in a rural area.

.- Wireless networks.

.- FSO Transmission Link Performance Analysis for Enhancing Internet Infrastructure on Côte D'Ivoire.

.- Lightweight authentication system for software-defined wireless sensor networks.

.- A K-means based approach for Optimal Gateway Deployment in LoRaWAN-SIM.

.- Assessing the Impact of Web Caching on Resource Utilization in Low-Capacity Networks.

.- Channel Allocation Based K-Medoids in a Wireless Mesh Network.

.- E-health.

.- Digitization of Patient Records in Maxillofacial and Stomatology Surgery: The Case of the Maxillofacial and Stomatology Surgery Unit at Sominé Dolo Hospital in Mopti, Mali.

.- Design of an Electronic Health Record Module in the Pediatrics Department of the Ouahigouya Regional University Hospital Center.

.- Emergency Severity Index (ESI), a more suitable system for emergencies in Burkina Faso.

.- Cybersecurity and Privacy.

.- The State of Data Breaches in the African Cyberspace: A Trend Analysis Using Social Media and Research Literature.

.- Advancing Mobile Money Payments Through Blockchain and Interoperability Protocols.

.- Blackhole attack detection and countermeasure solution in RPL.

.- Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts.

.- Proposal of honeypot - based datamining methods for discovering intrusions in big data databases.

.- Potential Cyber Threats to the National Elections in the Digital Age in Africa.

.- Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues.

.- Emerging Phishing Attack Trends: A South African Case Study.

.- 5G Network Security: Unraveling Vulnerabilities and Innovating Defense Mechanisms.

最近チェックした商品