e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3-4, 2019, Proceedings

e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3-4, 2019, Proceedings

ISBN-10:
3030415929
ISBN-13:
9783030415921
Pub. Date:
02/14/2020
Publisher:
Springer International Publishing
ISBN-10:
3030415929
ISBN-13:
9783030415921
Pub. Date:
02/14/2020
Publisher:
Springer International Publishing
e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3-4, 2019, Proceedings

e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3-4, 2019, Proceedings

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2019, held in Porto-Novo, Benin, in December 2019. The 19 full papers were carefully selected from 46 submissions. The accepted papers provide a wide range of research topics including targeted infrastructures, Internet of Things (IoT), wireless and mobile networks, intelligent transportation systems (ITS), software and network security, cloud and virtualization, data analytics, and machine learning.


Product Details

ISBN-13: 9783030415921
Publisher: Springer International Publishing
Publication date: 02/14/2020
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , #311
Edition description: 1st ed. 2020
Pages: 255
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Analysis of the impact of permissions on the vulnerability of mobile applications.- On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things.- Analysis of Software Vulnerabilities Using Machine Learning Techniques.- Africa’s Multilateral Legal Framework on Personal Data Security: What Prospects for the Digital Environment?.- A LoRaWAN coverage testBed and a multi-optional communication architecture for smart city feasibility in developing countries.- Effective Management of Delays at Road Intersections using Smart Traffic Light System.- Binary Search Based PSO for Master Node Enumeration and Placement in a Smart Water Metering Network.- State of Internet Measurement in Africa - A Survey.- I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context.- A Hybrid Network Model embracing NB-IoT and D2D Communications : Shastic Geometry Analysis.- Data Management and IT Applications.- Laws and Regulations on Big Data Management: The Case of South Africa.- Big Data Processing Using Hadoop and Spark: The Case of Meteorology Data.- Mobile health applications future trends and challenges.- AmonAI: a students academic performances prediction system.- Factors Influencing the Adoption of M-Government: Perspectives from a Namibian Marginalised Community.- Recent Approaches to Drift Effects in Credit Rating Models.
From the B&N Reads Blog

Customer Reviews