標(biāo)題: Titlebook: e-Infrastructure and e-Services for Developing Countries; 11th EAI Internation Rafik Zitouni,Max Agueh,Hénoc Soude Conference proceedings 2 [打印本頁] 作者: 空格 時間: 2025-3-21 16:16
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡(luò)公開度
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋學(xué)科排名
作者: acheon 時間: 2025-3-21 21:41 作者: STERN 時間: 2025-3-22 03:57 作者: Optimum 時間: 2025-3-22 06:39 作者: rods366 時間: 2025-3-22 12:08
1867-8211 gent transportation systems (ITS), software and network security, cloud and virtualization, data analytics, and machine learning..978-3-030-41592-1978-3-030-41593-8Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 高談闊論 時間: 2025-3-22 16:08 作者: 高談闊論 時間: 2025-3-22 17:46
Conference proceedings 2020 provide a wide range of research topics including targeted infrastructures, Internet of Things (IoT), wireless and mobile networks, intelligent transportation systems (ITS), software and network security, cloud and virtualization, data analytics, and machine learning..作者: Cholecystokinin 時間: 2025-3-22 23:11
Conference proceedings 2020tries, AFRICOMM 2019, held in Porto-Novo, Benin, in December 2019. The 19 full papers were carefully selected from 46 submissions. The accepted papers provide a wide range of research topics including targeted infrastructures, Internet of Things (IoT), wireless and mobile networks, intelligent trans作者: Entrancing 時間: 2025-3-23 01:39
Normativit?t der Menschenbilder exploits of privileges that should be reduced. We have therefore proposed the need to coordinate resolution mechanisms to the administrators, developers, users to better guide the required permissions by benign apps on Android.作者: forebear 時間: 2025-3-23 07:34
Ulrich Ufer,Alexandra Haussteincle is: we developed a protocol and a business model of Peer-to-Peer (P2P) lending suitable to developing countries and accessible via mobile phone. The protocol integrates a service against the diversion of objectives which is based on smart contract.作者: 針葉類的樹 時間: 2025-3-23 11:48 作者: chassis 時間: 2025-3-23 15:04 作者: 系列 時間: 2025-3-23 21:05 作者: 試驗 時間: 2025-3-24 01:54 作者: Spangle 時間: 2025-3-24 04:51
Zusammenfassung und Diskussion,orresponding algorithms which are K-Means algorithms and decision trees. Thus we developed two classification models with each of these algorithms. The performance indicators of these models revealed different figures. We have concluded that one of these algorithms is more effective than the other in grouping our plants by similarity.作者: APRON 時間: 2025-3-24 09:37 作者: entail 時間: 2025-3-24 12:41 作者: 吼叫 時間: 2025-3-24 18:08
A LoRaWAN Coverage Testbed and a Multi-optional Communication Architecture for Smart City Feasibilitdata as a mini-server, on the other hand, will be proposed as proof of concept. From the node to the gateway, data will be compressed and sent securely. A user who connects to Wi-IoT will, then, be able to access his data.作者: 免除責(zé)任 時間: 2025-3-24 21:35
State of Internet Measurement in Africa - A Surveyat Internet measurements are not widely conducted in the region largely due to the inadequacy of deployed measurement platforms, the lack of awareness in the subject, and the lack of relevant skills to carry out the measurement tasks. We outlined some recommendations to remedy these issues.作者: 鳴叫 時間: 2025-3-25 01:03 作者: 惰性女人 時間: 2025-3-25 06:04 作者: Ige326 時間: 2025-3-25 07:55
Classification of Plant Species by Similarity Using Automatic Learningorresponding algorithms which are K-Means algorithms and decision trees. Thus we developed two classification models with each of these algorithms. The performance indicators of these models revealed different figures. We have concluded that one of these algorithms is more effective than the other in grouping our plants by similarity.作者: maladorit 時間: 2025-3-25 12:05
1867-8211 oping Countries, AFRICOMM 2019, held in Porto-Novo, Benin, in December 2019. The 19 full papers were carefully selected from 46 submissions. The accepted papers provide a wide range of research topics including targeted infrastructures, Internet of Things (IoT), wireless and mobile networks, intelli作者: Dna262 時間: 2025-3-25 18:03 作者: 搖擺 時間: 2025-3-25 21:39 作者: 浪費時間 時間: 2025-3-26 03:17
On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply av作者: ADORN 時間: 2025-3-26 05:56 作者: Interdict 時間: 2025-3-26 09:10
Africa’s Multilateral Legal Framework on Personal Data Security: What Prospects for the Digital Envis have been raised as regards the security risks related to critical ICT network infrastructures in the continent, as well as the safeguarding of the fundamental rights of Africans through the protection of their personal data, especially those shared online. One of such concerns is personal data se作者: Melodrama 時間: 2025-3-26 15:21 作者: assail 時間: 2025-3-26 18:38
A LoRaWAN Coverage Testbed and a Multi-optional Communication Architecture for Smart City Feasibilittation solutions can be used to fill the gaps. But since these difficulties may not affect everyone, then, affordable wireless communication, such as Wi-Fi, with direct access to Internet from the collection node, may be useful for data transmission. This article, first, discusses a coverage study b作者: Immortal 時間: 2025-3-27 00:18
Effective Management of Delays at Road Intersections Using Smart Traffic Light Systemtorists for transportation has risen. Unfortunately, infrastructural development has not been at par with vehicular growth thus resulting in congestion along major roads. Traffic lights have been used for years to manage traffic flow. While they serve a good purpose, their underlining principle of o作者: NICE 時間: 2025-3-27 01:13 作者: 半導(dǎo)體 時間: 2025-3-27 07:49 作者: Alcove 時間: 2025-3-27 11:21 作者: FLIT 時間: 2025-3-27 14:49
A Hybrid Network Model Embracing NB-IoT and D2D Communications: Stochastic Geometry AnalysisB-IoT) comes with low-cost devices characterized by extremely low power consumption, offering a battery life of more than 10 years, and broad radio coverage to target tens of kilometers, but on the cost of low data rate and higher end-to-end latency. NB-IoT can be deployed in three different modes o作者: 吸引人的花招 時間: 2025-3-27 18:50 作者: CAJ 時間: 2025-3-27 22:40
Big Data Processing Using Hadoop and Spark: The Case of Meteorology Data such as weather precipitation, cyclones, thunderstorms, climate change. It is a highly data-driven field that involves large datasets of images captured from both radar and satellite, thus requiring efficient technologies for storing, processing and data mining to find hidden patterns in these data作者: 有助于 時間: 2025-3-28 05:08 作者: 編輯才信任 時間: 2025-3-28 08:51
Mobile Health Applications Future Trends and Challenges phones offers amazing opportunities to improve healthcare system, in the way that physicians, patients and other health system actors are more interconnected than it is in the traditional healthcare system. The goal of this study is to present the current and future trends in the field of mobile he作者: defibrillator 時間: 2025-3-28 10:43
https://doi.org/10.1007/978-3-030-41593-8artificial intelligence; communication channels (information theory); communication systems; computer h作者: 泄露 時間: 2025-3-28 16:26
Normativit?t der Menschenbilderof personal data. More precisely, we focused on the mechanisms for managing risk permissions under Android to limit the impact of these permissions on vulnerability vectors. We analyzed a sample of forty (40) apps developed in Burkina Faso and identified abuses of dangerous authorizations in several作者: Working-Memory 時間: 2025-3-28 22:36
https://doi.org/10.1007/978-3-658-07410-4 which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply av作者: 搖晃 時間: 2025-3-29 01:22
Peter M. Kappeler,Claudia Fichteleir serious impacts, many different approaches have been proposed in recent decades to mitigate the damage caused by software vulnerabilities. Machine learning is also part of an approach to solve this problem. The main objective of this document is to provide three supervised machine to predict sof作者: 感染 時間: 2025-3-29 05:36
Interdisziplin?re Anthropologies have been raised as regards the security risks related to critical ICT network infrastructures in the continent, as well as the safeguarding of the fundamental rights of Africans through the protection of their personal data, especially those shared online. One of such concerns is personal data se作者: COMA 時間: 2025-3-29 11:04
Ulrich Ufer,Alexandra Hausstein to know how to realize these probables blockchain’s benefits. It presents a diversity of choices that impact on results in various ways. Studies have focused on fintech services business models such as P2P lending, others on the blockchain impact on finance, some even particularized in the case of 作者: SPER 時間: 2025-3-29 14:50 作者: 鋼筆尖 時間: 2025-3-29 17:08
https://doi.org/10.1007/978-3-663-14398-7torists for transportation has risen. Unfortunately, infrastructural development has not been at par with vehicular growth thus resulting in congestion along major roads. Traffic lights have been used for years to manage traffic flow. While they serve a good purpose, their underlining principle of o作者: 溫和女人 時間: 2025-3-29 21:45
Architektur und Formen ihres Wissenster Metering Network (SWMN). The merit of this proposal is that it can simultaneously optimize the number of MNs as well as their locations in the SWMN. The Binary Search (BS) Mechanism searches a pre-specified range of integers for the optimal number of MNs. This algorithm iteratively invokes the P作者: 令人作嘔 時間: 2025-3-30 03:06 作者: 壟斷 時間: 2025-3-30 05:59
Interdisziplin?re Jugendforschungraints about lightweight cryptography. Lightweight cryptography is of capital importance since IoT devices are qualified to be resource-constrained. To address these challenges, several Attribute-Based Credentials (ABC) schemes have been designed including I2PA, U-prove, and Idemix. Even though thes作者: Debark 時間: 2025-3-30 10:51
https://doi.org/10.1007/978-3-658-13857-8B-IoT) comes with low-cost devices characterized by extremely low power consumption, offering a battery life of more than 10 years, and broad radio coverage to target tens of kilometers, but on the cost of low data rate and higher end-to-end latency. NB-IoT can be deployed in three different modes o作者: contradict 時間: 2025-3-30 15:01
,Frühe postoperative Beschwerden,th information. The expectation is to improve the quality of health care, increase universal health coverage, and reduce both Legal Cases and healthcare costs in a changing world where data collected while providing healthcare produces big data sets which can provide useful insights for the advancem作者: BRUNT 時間: 2025-3-30 18:21 作者: medium 時間: 2025-3-30 21:55 作者: Spinal-Fusion 時間: 2025-3-31 01:32
Interdisziplin?re Palliativmedizin phones offers amazing opportunities to improve healthcare system, in the way that physicians, patients and other health system actors are more interconnected than it is in the traditional healthcare system. The goal of this study is to present the current and future trends in the field of mobile he