libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

nguyen ngoc thanh (curatore); chbeir richard (curatore); manolopoulos yannis (curatore); fujita hamido (curatore); hong tzung-pei (curatore); nguyen le minh (curatore); wojtkiewicz krystian (curatore) - recent challenges in intelligent information and database systems
Zoom

Recent Challenges in Intelligent Information and Database Systems 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15–18, 2024, Proceedings, Part I

; ; ; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
81,98 €
NICEPRICE
77,88 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 08/2024
Edizione: 2024





Trama

This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 15–18, 2024.

The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows: 

Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.

Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing.





Sommario

.- AI-driven Cybersecurity Solutions.

.- Security aspects of digital identity.

.- Efficient Deep Learning Method For Detection Of Malware Attacks In Internet Of Things Networks.

.- A Deep Neural Networks approach for Speaker Verification on Embedded Devices.

.- Phishing Detection Using Ensemble of Classifiers.

.- An Effective Ensemble Classification Algorithm for Intrusion Detection System.

.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov Switching for Non-periodic DoS attacks.

.- AI-driven Medical Analytics.

.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images.

.- A Deep Learning Approach to Diabetes Diagnosis.

.- A novel approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management.

.- Multi-scale and Multi-level Attention based on External knowledge in EHRs.

.- Exploring XAI attention maps to investigate the effect of distance metric and lesion-shaped border expansion size for effective
 content-based dermatological lesion retrieval.

.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for web search engines retrieval effectiveness.

.- Computational Intelligence.

.- Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs.

.- Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-valued Decisions from Closed Classes.

.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent.

.- Blockchain-based Educational Certification Systems Using A Modified Hash Algorithm.

.- The Merged Longest Common Increasing Subsequence Problem.

.- Applying transformation to reduce model sizes for Constrained Optimization Problems.

.- Multiple Traveling Salesman Problem with a Drone Station: Using Multi-Package Payload Compartments.

.- Unveiling the power of hybrid balancing techniques and ensemble stacked and blended classifiers for enhanced churn prediction.

.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.

.- A structure based on B+trees to represent a large number of k-multisets stored in non-volatile memory.

.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.

.- Data modelling and information systems.

.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach.

.- Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs.

.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things.

.- Functional test generation based on requirements defined at GUI level.

.- Penetration Testing and Security Assessment Model for Biomedical Devices.

.- Cooperative User Interface for AGV – Proof of Concept.











Altre Informazioni

ISBN:

9789819759361

Condizione: Nuovo
Collana: Communications in Computer and Information Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XXX, 363 p. 120 illus., 86 illus. in color.
Pagine Arabe: 363
Pagine Romane: xxx


Dicono di noi