標題: Titlebook: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications; First EAI Internatio Franklin Tchakounte,Marcellin Atemkeng,Raje [打印本頁] 作者: 使醉 時間: 2025-3-21 17:01
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影響因子(影響力)
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影響因子(影響力)學科排名
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications網(wǎng)絡公開度
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications網(wǎng)絡公開度學科排名
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引頻次
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引頻次學科排名
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用學科排名
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications讀者反饋
書目名稱Safe, Secure, Ethical, Responsible Technologies and Emerging Applications讀者反饋學科排名
作者: myelography 時間: 2025-3-21 20:52 作者: 熄滅 時間: 2025-3-22 00:59
978-3-031-56395-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024作者: stroke 時間: 2025-3-22 06:59
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 疾馳 時間: 2025-3-22 09:31
Examining Potential Harms of Large Language Models (LLMs) in Africatural language data for training inclusive language models. This paper examines the potential harms of LLMs in Africa, covering harms already documented for the African context; harms studied and documented for the Western context, but previously unapplied to Africa; and novel potential harms based 作者: 鴿子 時間: 2025-3-22 15:27
A Gamification Architecture to Enhance Phishing Awarenessotivation, and consideration of a learner’s profile. Subsequently, the problem of the best didactic means is posed with openness to the integration of artificial intelligence, the choice of the type of gamification, and the technologies that can contribute to ensuring that everyone is competent to e作者: 黃瓜 時間: 2025-3-22 20:54
DIDOR: A Decentralized Identifier Based Onion Routing Protocolintains low communication overhead and latency, and does not require directory servers on which most existing protocols rely. We finally analyze the security of our protocol and demonstrate how it can withstand the denial of service attack on DID documents. Overall, this protocol represents a promis作者: Decibel 時間: 2025-3-22 23:32 作者: 心痛 時間: 2025-3-23 03:51
Correlation Clustering Adapted for?Cell Site Management of?Mobile Networks in?Developing Countriesity parameter. This approach makes it possible to determine the optimal number of cells to allocate to a technician to make his interventions efficient; this will minimize Operational Expenditure (OpEx) and cell downtime due to breakdowns and maximize the quality of service offered to customers.作者: ASSET 時間: 2025-3-23 07:04
A Lightweight Authenticated Key Agreement Scheme for?Resource-Constrained Devices Based on?Implicit ertificates, from which symmetric keys for communication between nodes are derived. We then implement the solution using TelosB sensors in the TOSSIM simulator with an AVL Tree. We evaluate the security and resilience of our proposed scheme through informal analysis and a formal model. The informal 作者: Ligneous 時間: 2025-3-23 10:29 作者: 吵鬧 時間: 2025-3-23 14:26 作者: Myocarditis 時間: 2025-3-23 21:47 作者: 減震 時間: 2025-3-23 22:33 作者: Bereavement 時間: 2025-3-24 05:22 作者: 上漲 時間: 2025-3-24 09:38
Towards a Flexible Urbanization Based Approach for Integration and Interoperability in Heterogeneous diverse contexts, including inter-ministerial, decentralized state services, and non-governmental organizations. Case studies validate the approach, showcasing the benefits of a flexible and urbanized integration strategy. The Yaoundé Urban Information Systems Integration and Interoperability Platf作者: 聯(lián)想 時間: 2025-3-24 14:40
man–Computer Interaction has as its aim to encourage theoretical and empirical human science research to promote the design and evaluation of human-oriented ICT. Within TC13 there are different working groups concerned with different aspects of human– computer interaction. The flagship event of TC13作者: 樹膠 時間: 2025-3-24 18:28
Jean Emmanuel Ntsama,Claude Fachkha,Philippe Brice Owomo,Adrian Chickagwe Fochos, these fungi have to be able to overcome or hide from the residual immune system. In this respect, . and . species may have adapted more specifically to life within a host compared to . species. For example, . is able to escape attack from the complement cascade by binding the complement regulator作者: 看法等 時間: 2025-3-24 21:09 作者: heterodox 時間: 2025-3-25 00:58 作者: 沒有準備 時間: 2025-3-25 04:18 作者: 易彎曲 時間: 2025-3-25 10:21 作者: 取之不竭 時間: 2025-3-25 14:53 作者: HARD 時間: 2025-3-25 18:03 作者: 訓誡 時間: 2025-3-25 23:00
Patrick Njionou Sadjang,Nelson Issondj Banta Jrd performances. No dissociation between the conditions was found. The Strange Stories were associated with correct performances but we could not be sure that the algorithm had no prior knowledge of the test. In the second experiment, the most recent version of ChatGPT (4-0314) exhibited better perfo作者: 馬賽克 時間: 2025-3-26 01:19
Robert Galatiya Suya other two tasks, especially those in the experienced meditator group. These results suggest that microsaccades are indicators of sustained attention, and blinking of distraction, meaning that it may be possible to detect mind-wandering episodes versus states of mindfulness. Detection of this episod作者: NAIVE 時間: 2025-3-26 06:59 作者: Enteropathic 時間: 2025-3-26 09:26 作者: 種子 時間: 2025-3-26 13:04
Scott Ulrich Jemea Ebolo,Olusola Samuel Makinde,Berthine Nyunga Mpinda作者: 易于交談 時間: 2025-3-26 19:44
Tse Sparthan Azoh,Wolfgang Nzie,Bertin Sohfotsing,Tibi Beda作者: Irrigate 時間: 2025-3-26 21:05
Moskola? Ngossaha Justin,Ynsufu Ali,Batouré Bamana Apollinaire,Djeumen Rodrigue,Bowong Tsakou Samuel作者: averse 時間: 2025-3-27 03:25 作者: 確定的事 時間: 2025-3-27 06:17 作者: insidious 時間: 2025-3-27 12:17
l and empirical human science research to promote the design and evaluation of human-oriented ICT. Within TC13 there are different working groups concerned with different aspects of human– computer interaction. The flagship event of TC13978-3-642-11762-6Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: AGGER 時間: 2025-3-27 16:05 作者: Rheumatologist 時間: 2025-3-27 19:07 作者: sterilization 時間: 2025-3-28 01:38 作者: 參考書目 時間: 2025-3-28 04:56
Jean-Marie Kuate Fotso,Ismael Abbo,Franklin Tchakounté,William Shu,Claude Fachkhane: one enzyme hypothesis and to a second Nobel Prize for fungal research awarded to Beadle and Tatum in 1958. Fundamental research in biochemical genetics was 978-3-662-10373-9Series ISSN 2945-8048 Series E-ISSN 2945-8056 作者: blithe 時間: 2025-3-28 10:12
Conference proceedings 2024ng Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023.? .The 24 full papers were carefully reviewed and selected from 75 submissions.?They were organized in topical sections as follows:?Regulations and Ethics of Artificial Intelligence,?Resource-constrained Networks 作者: Spinal-Tap 時間: 2025-3-28 11:20
The Legal Framework of Artificial Intelligence in Cameroon utilization of AI. A central inquiry of this paper revolves around the relationship between artificial intelligence and the law. To address this inquiry, we examine the legal categories into which AI can be classified and, subsequently, the inevitable ramifications that follow such categorizations.作者: persistence 時間: 2025-3-28 17:22 作者: 氣候 時間: 2025-3-28 21:58
Improvement of?Cloud-Assisted Identity-Based Anonymous Authentication and?Key Agreement Protocol forer proposes an improvement to the IBAAKA protocol. We also present the resilience of the proposed scheme against various security attacks, as well as ensuring secure mutual authentication and anonymity.作者: 綠州 時間: 2025-3-29 00:18 作者: 中和 時間: 2025-3-29 05:58
Examining Potential Harms of Large Language Models (LLMs) in Africacial and economic inequalities. This is due to a number of factors, including limited technological advancement, historical injustice and marginalization, and underrepresentation of African languages, values, and norms in training data. Despite comprising nearly one-third of the world’s languages, m作者: indenture 時間: 2025-3-29 10:51 作者: 真實的你 時間: 2025-3-29 15:27 作者: CRAFT 時間: 2025-3-29 15:33
Improvement of?Cloud-Assisted Identity-Based Anonymous Authentication and?Key Agreement Protocol fored environment, which achieves mutual authentication and user anonymity and can resist known attacks. However, Rakeei and Moazami show that their scheme is subject to a traceability attack. As a result of this attack, the scheme does not allow secure authentication because an adversary can successfu作者: RLS898 時間: 2025-3-29 23:24 作者: BALE 時間: 2025-3-30 02:46 作者: Gleason-score 時間: 2025-3-30 04:23
Feature Engineering Considerations in IoT: A Case Studyuire special control and security from conception, as they can expose people through confidential data sharing and system attacks. To cope with this, Intrusion Detection Systems remain the best solution, despite the need for improvement and adaptation, since these technologies frequently monitor eno作者: 致敬 時間: 2025-3-30 10:08 作者: ARBOR 時間: 2025-3-30 15:52 作者: indigenous 時間: 2025-3-30 17:02 作者: 火花 時間: 2025-3-31 00:24 作者: Indigence 時間: 2025-3-31 01:28 作者: 外向者 時間: 2025-3-31 05:59
Assessment of Thermal Comfort Using PMV, aPMV, ePMV and TSV Indices in a Naturally Ventilated Buildimfort was carried out in a naturally ventilated building in the city of Yaoundé. Thermal comfort indices such as the predicted mean vote (PMV), the adaptive predicted mean vote (aPMV), the extended predicted mean vote (ePMV) and the thermal sensation vote (TSV) were used for this study by considerin作者: GRUEL 時間: 2025-3-31 09:44 作者: Ablation 時間: 2025-3-31 16:32
Development of an Intelligent Safety Monitoring Device for Train-Track System in Cameroone railway industries have flippantly registered series of accidents that accounted for economic and social deprivation. These accidents directly related to environmental changes, human mistakes and material damages, heavy speeding, overloading, absence of inspection before train departure has portra