ITNG 2024 = 21st International Confe...
International Conference on Information Technology: New Generations (2024 :)

FindBook      Google Book      Amazon      博客來     
  • ITNG 2024 = 21st International Conference on Information Technology-New Generations /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: ITNG 2024/ edited by Shahram Latifi.
    其他題名: 21st International Conference on Information Technology-New Generations /
    其他作者: Latifi, Shahram.
    團體作者: International Conference on Information Technology: New Generations
    出版者: Cham :Springer Nature Switzerland : : 2024.,
    面頁冊數: xiii, 536 p. :ill. (some col.), digital ;24 cm.
    內容註: Part I. AI and Robotics -- 1. Projecting Elliott patterns in different degrees of waves for analyzing financial market behavior -- 2. An Integration of Blockchain Web3 and Robotic Process Automation for Property Ownership Traceability -- 3. Early identification of conflicts in the Chilean fisheries and aquaculture sector using text mining and machine learning techniques -- 4. Enhanced AES for Securing Hand Written Signature using Residue Number System -- 5. Using GPT-4 to Tutor Technical Subjects in non-English Languages in Africa -- Part II. Cybersecurity -- 6. A Practical Survey of Data Carving from Non-Functional Android Phones Using Chip-Off Technique -- 7. Automated Semantic Role Mining using Intelligent Role Based Access Control in Globally Distributed Banking Environment -- 8. Software Bill of Materials (SBOM) Approach to IoT Security Vulnerability Assessment -- 9. AI-Assisted Pentesting Using ChatGPT-4 -- 10. Combining Cyber Security and Data Science: A Cutting-Edge Approach for Public Health Education Masters -- 11. Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation -- 12. Simulation Tests in Anti-phishing Training -- 13. Where is our data and how is it protected? -- 14. SIV-MAC: an efficient MAC scheme -- 15. Speeding up RSA signature verification -- 16. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems Over the NCC2 Dataset -- 17. Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication -- 18. SECURITY ANALYSIS OF DRONE COMMUNICATION METHODS -- 19. AI and Democracy: A Human Problem -- 20. Comparative study of the Clarity of Privacy Policies in Social Media -- 21. ClipSecure: Addressing Privacy and Security Concerns in Android Clipboard -- 22. Security Vulnerabilities in Facebook Data Breach -- 23. Intelligent Intrusion Detection Model with MapReduce and Deep Learning Model -- 24. Ethical Considerations in the Development and Use of AI WeaponSystems -- 25. Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models -- 26. Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication -- 27. Blockchain Based Identity Management For Secure Data Sharing -- Part III. Data Science -- 28. Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis -- 29. Strategic Software Modernization: Business-IT Convergence with Large Language Model -- 30. Feature Fusion Approach for Emotion Classification in EEG Signals -- 31. Household Discovery with Group Membership Graphs -- 32. Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System -- 33. A study on data quality and analysis in Business Intelligence -- 34. Exploring the Impact of Augmented Reality Applications on Student Engagement in Higher Education in South Africa: A Review -- Part IV. Human-Computer Interaction -- 35. TickTrax: A Mobile and Web-Based Application for Tick Monitoringand Analysis -- 36. Developing students' reflective skills to improve the learning of Human-Computer Interaction -- 37. Options Matter: Exploring VR Input Fatigue Reduction -- 38. Introductory Pathway to Virtual Reality by Developing Immersive Games of Skill -- 39. A User Study of Two Downstream single-cell Data Analysis Methods: Clustering and Trajectory Inference -- 40. Fostering Joint Innovation: A Global Online Platform for Idea Sharing and Collaboration -- 41. Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment -- Part V. Machine Learning: Theory & Applications -- 42. Offense Severity Prediction Under Partial Knowledge: Trigger Factor Detection Using Machine Learning and Network Science Methods -- 43. Exploring Deep Learning Techniques in the Prediction of Cancer Relapse using an Open Brazilian Tabular Database -- 44. A Review of the Use of Machine Learning for Pharmaceutical Formulations -- 45. A Method for Improving the Recognition Accuracy of Pattern Classification -- 46. An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data -- 47. GPU-accelerated neural networks and computational strategies to predict wave heights -- Part VII. Software Engineering -- 48. A method based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for verifying security requirements in critical software systems -- 49. JSON and XML schemas for WebSTAMP -- 50. Elements-Based Test Suite Reduction for Android Test Suites Generated by Reinforcement Learning -- 51. Towards Adopting a Digital Twin Framework (ISO 23247) for Battery Systems -- 52. Challenges and Success Factors in Large Scale Agile Transformation - A Systematic Literature Review -- 53. Integrating AIaaS into existing systems: the Gokind experience -- 54. A Novel Implementation of FHUQI-Miner, TKQ and FCHM Algorithms for High-Utility Itemset Mining to Predict User Behavior UsingSmartphone Context Events -- 55. Towards systematic and precise compilation of domain-specific modelling languages -- Part VI. Potpourri -- 56. A Detection Method for Circumferential Alignment of Diminutive Lesions Using Wavelet Transform Modulus Maxima and Higher-Order Local Autocorrelation -- 57. Impedance Analysis of Adaptive Distance Relays using Machine Learning -- 58. Employees' experiences of using a mobile health application: A qualitative study based on digital intervention -- 59. MicroSTAMP: microservices for steps 1 and 2 of the System-Theoretic Process Analysis (STPA) technique -- 60. The Disparate Impact of Distinct Background Music on Gameplay Experience: An Empirical Analysis -- 61. Triangulation Guided High Clearance Paths -- 62. Towards Visualizing the Status of Bug Reports -- 63. Quarantine Centrality: Principal Component Analysis of SIS Model Simulation Results to Quantify the Vulnerability of Nodes to Stay Infected in Complex Networks -- 64. A holistic approach for single-cell data trajectory inference using chromosome physical location and ensemble random walk -- 65. Graph partitioning algorithms: a comparative study -- 66. 3D Video Game Simulation Based on Colored Petri net and SIMIO.
    Contained By: Springer Nature eBook
    標題: Information technology - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-56599-1
    ISBN: 9783031565991
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入