語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
查詢
薦購
讀者園地
我的帳戶
說明
簡單查詢
進階查詢
圖書館推薦圖書
讀者推薦圖書(公開)
教師指定參考書
借閱排行榜
預約排行榜
分類瀏覽
展示書
專題書單RSS
個人資料
個人檢索策略
個人薦購
借閱紀錄/續借/預約
個人評論
個人書籤
東區互惠借書
回首頁
切換:
標籤
|
MARC模式
|
ISBD
ITNG 2024 = 21st International Confe...
~
International Conference on Information Technology: New Generations (2024 :)
FindBook
Google Book
Amazon
博客來
ITNG 2024 = 21st International Conference on Information Technology-New Generations /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
ITNG 2024/ edited by Shahram Latifi.
其他題名:
21st International Conference on Information Technology-New Generations /
其他作者:
Latifi, Shahram.
團體作者:
International Conference on Information Technology: New Generations
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xiii, 536 p. :ill. (some col.), digital ;24 cm.
內容註:
Part I. AI and Robotics -- 1. Projecting Elliott patterns in different degrees of waves for analyzing financial market behavior -- 2. An Integration of Blockchain Web3 and Robotic Process Automation for Property Ownership Traceability -- 3. Early identification of conflicts in the Chilean fisheries and aquaculture sector using text mining and machine learning techniques -- 4. Enhanced AES for Securing Hand Written Signature using Residue Number System -- 5. Using GPT-4 to Tutor Technical Subjects in non-English Languages in Africa -- Part II. Cybersecurity -- 6. A Practical Survey of Data Carving from Non-Functional Android Phones Using Chip-Off Technique -- 7. Automated Semantic Role Mining using Intelligent Role Based Access Control in Globally Distributed Banking Environment -- 8. Software Bill of Materials (SBOM) Approach to IoT Security Vulnerability Assessment -- 9. AI-Assisted Pentesting Using ChatGPT-4 -- 10. Combining Cyber Security and Data Science: A Cutting-Edge Approach for Public Health Education Masters -- 11. Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation -- 12. Simulation Tests in Anti-phishing Training -- 13. Where is our data and how is it protected? -- 14. SIV-MAC: an efficient MAC scheme -- 15. Speeding up RSA signature verification -- 16. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems Over the NCC2 Dataset -- 17. Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication -- 18. SECURITY ANALYSIS OF DRONE COMMUNICATION METHODS -- 19. AI and Democracy: A Human Problem -- 20. Comparative study of the Clarity of Privacy Policies in Social Media -- 21. ClipSecure: Addressing Privacy and Security Concerns in Android Clipboard -- 22. Security Vulnerabilities in Facebook Data Breach -- 23. Intelligent Intrusion Detection Model with MapReduce and Deep Learning Model -- 24. Ethical Considerations in the Development and Use of AI WeaponSystems -- 25. Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models -- 26. Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication -- 27. Blockchain Based Identity Management For Secure Data Sharing -- Part III. Data Science -- 28. Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis -- 29. Strategic Software Modernization: Business-IT Convergence with Large Language Model -- 30. Feature Fusion Approach for Emotion Classification in EEG Signals -- 31. Household Discovery with Group Membership Graphs -- 32. Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System -- 33. A study on data quality and analysis in Business Intelligence -- 34. Exploring the Impact of Augmented Reality Applications on Student Engagement in Higher Education in South Africa: A Review -- Part IV. Human-Computer Interaction -- 35. TickTrax: A Mobile and Web-Based Application for Tick Monitoringand Analysis -- 36. Developing students' reflective skills to improve the learning of Human-Computer Interaction -- 37. Options Matter: Exploring VR Input Fatigue Reduction -- 38. Introductory Pathway to Virtual Reality by Developing Immersive Games of Skill -- 39. A User Study of Two Downstream single-cell Data Analysis Methods: Clustering and Trajectory Inference -- 40. Fostering Joint Innovation: A Global Online Platform for Idea Sharing and Collaboration -- 41. Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment -- Part V. Machine Learning: Theory & Applications -- 42. Offense Severity Prediction Under Partial Knowledge: Trigger Factor Detection Using Machine Learning and Network Science Methods -- 43. Exploring Deep Learning Techniques in the Prediction of Cancer Relapse using an Open Brazilian Tabular Database -- 44. A Review of the Use of Machine Learning for Pharmaceutical Formulations -- 45. A Method for Improving the Recognition Accuracy of Pattern Classification -- 46. An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data -- 47. GPU-accelerated neural networks and computational strategies to predict wave heights -- Part VII. Software Engineering -- 48. A method based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for verifying security requirements in critical software systems -- 49. JSON and XML schemas for WebSTAMP -- 50. Elements-Based Test Suite Reduction for Android Test Suites Generated by Reinforcement Learning -- 51. Towards Adopting a Digital Twin Framework (ISO 23247) for Battery Systems -- 52. Challenges and Success Factors in Large Scale Agile Transformation - A Systematic Literature Review -- 53. Integrating AIaaS into existing systems: the Gokind experience -- 54. A Novel Implementation of FHUQI-Miner, TKQ and FCHM Algorithms for High-Utility Itemset Mining to Predict User Behavior UsingSmartphone Context Events -- 55. Towards systematic and precise compilation of domain-specific modelling languages -- Part VI. Potpourri -- 56. A Detection Method for Circumferential Alignment of Diminutive Lesions Using Wavelet Transform Modulus Maxima and Higher-Order Local Autocorrelation -- 57. Impedance Analysis of Adaptive Distance Relays using Machine Learning -- 58. Employees' experiences of using a mobile health application: A qualitative study based on digital intervention -- 59. MicroSTAMP: microservices for steps 1 and 2 of the System-Theoretic Process Analysis (STPA) technique -- 60. The Disparate Impact of Distinct Background Music on Gameplay Experience: An Empirical Analysis -- 61. Triangulation Guided High Clearance Paths -- 62. Towards Visualizing the Status of Bug Reports -- 63. Quarantine Centrality: Principal Component Analysis of SIS Model Simulation Results to Quantify the Vulnerability of Nodes to Stay Infected in Complex Networks -- 64. A holistic approach for single-cell data trajectory inference using chromosome physical location and ensemble random walk -- 65. Graph partitioning algorithms: a comparative study -- 66. 3D Video Game Simulation Based on Colored Petri net and SIMIO.
Contained By:
Springer Nature eBook
標題:
Information technology - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-56599-1
ISBN:
9783031565991
ITNG 2024 = 21st International Conference on Information Technology-New Generations /
ITNG 2024
21st International Conference on Information Technology-New Generations /[electronic resource] :edited by Shahram Latifi. - Cham :Springer Nature Switzerland :2024. - xiii, 536 p. :ill. (some col.), digital ;24 cm. - Advances in intelligent systems and computing,v. 14562194-5365 ;. - Advances in intelligent systems and computing ;v. 1456..
Part I. AI and Robotics -- 1. Projecting Elliott patterns in different degrees of waves for analyzing financial market behavior -- 2. An Integration of Blockchain Web3 and Robotic Process Automation for Property Ownership Traceability -- 3. Early identification of conflicts in the Chilean fisheries and aquaculture sector using text mining and machine learning techniques -- 4. Enhanced AES for Securing Hand Written Signature using Residue Number System -- 5. Using GPT-4 to Tutor Technical Subjects in non-English Languages in Africa -- Part II. Cybersecurity -- 6. A Practical Survey of Data Carving from Non-Functional Android Phones Using Chip-Off Technique -- 7. Automated Semantic Role Mining using Intelligent Role Based Access Control in Globally Distributed Banking Environment -- 8. Software Bill of Materials (SBOM) Approach to IoT Security Vulnerability Assessment -- 9. AI-Assisted Pentesting Using ChatGPT-4 -- 10. Combining Cyber Security and Data Science: A Cutting-Edge Approach for Public Health Education Masters -- 11. Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation -- 12. Simulation Tests in Anti-phishing Training -- 13. Where is our data and how is it protected? -- 14. SIV-MAC: an efficient MAC scheme -- 15. Speeding up RSA signature verification -- 16. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems Over the NCC2 Dataset -- 17. Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication -- 18. SECURITY ANALYSIS OF DRONE COMMUNICATION METHODS -- 19. AI and Democracy: A Human Problem -- 20. Comparative study of the Clarity of Privacy Policies in Social Media -- 21. ClipSecure: Addressing Privacy and Security Concerns in Android Clipboard -- 22. Security Vulnerabilities in Facebook Data Breach -- 23. Intelligent Intrusion Detection Model with MapReduce and Deep Learning Model -- 24. Ethical Considerations in the Development and Use of AI WeaponSystems -- 25. Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models -- 26. Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication -- 27. Blockchain Based Identity Management For Secure Data Sharing -- Part III. Data Science -- 28. Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis -- 29. Strategic Software Modernization: Business-IT Convergence with Large Language Model -- 30. Feature Fusion Approach for Emotion Classification in EEG Signals -- 31. Household Discovery with Group Membership Graphs -- 32. Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System -- 33. A study on data quality and analysis in Business Intelligence -- 34. Exploring the Impact of Augmented Reality Applications on Student Engagement in Higher Education in South Africa: A Review -- Part IV. Human-Computer Interaction -- 35. TickTrax: A Mobile and Web-Based Application for Tick Monitoringand Analysis -- 36. Developing students' reflective skills to improve the learning of Human-Computer Interaction -- 37. Options Matter: Exploring VR Input Fatigue Reduction -- 38. Introductory Pathway to Virtual Reality by Developing Immersive Games of Skill -- 39. A User Study of Two Downstream single-cell Data Analysis Methods: Clustering and Trajectory Inference -- 40. Fostering Joint Innovation: A Global Online Platform for Idea Sharing and Collaboration -- 41. Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment -- Part V. Machine Learning: Theory & Applications -- 42. Offense Severity Prediction Under Partial Knowledge: Trigger Factor Detection Using Machine Learning and Network Science Methods -- 43. Exploring Deep Learning Techniques in the Prediction of Cancer Relapse using an Open Brazilian Tabular Database -- 44. A Review of the Use of Machine Learning for Pharmaceutical Formulations -- 45. A Method for Improving the Recognition Accuracy of Pattern Classification -- 46. An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data -- 47. GPU-accelerated neural networks and computational strategies to predict wave heights -- Part VII. Software Engineering -- 48. A method based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for verifying security requirements in critical software systems -- 49. JSON and XML schemas for WebSTAMP -- 50. Elements-Based Test Suite Reduction for Android Test Suites Generated by Reinforcement Learning -- 51. Towards Adopting a Digital Twin Framework (ISO 23247) for Battery Systems -- 52. Challenges and Success Factors in Large Scale Agile Transformation - A Systematic Literature Review -- 53. Integrating AIaaS into existing systems: the Gokind experience -- 54. A Novel Implementation of FHUQI-Miner, TKQ and FCHM Algorithms for High-Utility Itemset Mining to Predict User Behavior UsingSmartphone Context Events -- 55. Towards systematic and precise compilation of domain-specific modelling languages -- Part VI. Potpourri -- 56. A Detection Method for Circumferential Alignment of Diminutive Lesions Using Wavelet Transform Modulus Maxima and Higher-Order Local Autocorrelation -- 57. Impedance Analysis of Adaptive Distance Relays using Machine Learning -- 58. Employees' experiences of using a mobile health application: A qualitative study based on digital intervention -- 59. MicroSTAMP: microservices for steps 1 and 2 of the System-Theoretic Process Analysis (STPA) technique -- 60. The Disparate Impact of Distinct Background Music on Gameplay Experience: An Empirical Analysis -- 61. Triangulation Guided High Clearance Paths -- 62. Towards Visualizing the Status of Bug Reports -- 63. Quarantine Centrality: Principal Component Analysis of SIS Model Simulation Results to Quantify the Vulnerability of Nodes to Stay Infected in Complex Networks -- 64. A holistic approach for single-cell data trajectory inference using chromosome physical location and ensemble random walk -- 65. Graph partitioning algorithms: a comparative study -- 66. 3D Video Game Simulation Based on Colored Petri net and SIMIO.
This volume represents the 21st International Conference on Information Technology - New Generations (ITNG), 2024. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
ISBN: 9783031565991
Standard No.: 10.1007/978-3-031-56599-1doiSubjects--Topical Terms:
543170
Information technology
--Congresses.
LC Class. No.: T58.5
Dewey Class. No.: 004
ITNG 2024 = 21st International Conference on Information Technology-New Generations /
LDR
:08508nmm a2200337 a 4500
001
2374143
003
DE-He213
005
20240708125236.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031565991
$q
(electronic bk.)
020
$a
9783031565984
$q
(paper)
024
7
$a
10.1007/978-3-031-56599-1
$2
doi
035
$a
978-3-031-56599-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
T58.5
072
7
$a
UT
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UT
$2
thema
082
0 4
$a
004
$2
23
090
$a
T58.5
$b
.I61 2024
111
2
$a
International Conference on Information Technology: New Generations
$n
(21st :
$d
2024 :
$c
Las Vegas, Nev.)
$3
3722791
245
1 0
$a
ITNG 2024
$h
[electronic resource] :
$b
21st International Conference on Information Technology-New Generations /
$c
edited by Shahram Latifi.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xiii, 536 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5365 ;
$v
v. 1456
505
0
$a
Part I. AI and Robotics -- 1. Projecting Elliott patterns in different degrees of waves for analyzing financial market behavior -- 2. An Integration of Blockchain Web3 and Robotic Process Automation for Property Ownership Traceability -- 3. Early identification of conflicts in the Chilean fisheries and aquaculture sector using text mining and machine learning techniques -- 4. Enhanced AES for Securing Hand Written Signature using Residue Number System -- 5. Using GPT-4 to Tutor Technical Subjects in non-English Languages in Africa -- Part II. Cybersecurity -- 6. A Practical Survey of Data Carving from Non-Functional Android Phones Using Chip-Off Technique -- 7. Automated Semantic Role Mining using Intelligent Role Based Access Control in Globally Distributed Banking Environment -- 8. Software Bill of Materials (SBOM) Approach to IoT Security Vulnerability Assessment -- 9. AI-Assisted Pentesting Using ChatGPT-4 -- 10. Combining Cyber Security and Data Science: A Cutting-Edge Approach for Public Health Education Masters -- 11. Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation -- 12. Simulation Tests in Anti-phishing Training -- 13. Where is our data and how is it protected? -- 14. SIV-MAC: an efficient MAC scheme -- 15. Speeding up RSA signature verification -- 16. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems Over the NCC2 Dataset -- 17. Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication -- 18. SECURITY ANALYSIS OF DRONE COMMUNICATION METHODS -- 19. AI and Democracy: A Human Problem -- 20. Comparative study of the Clarity of Privacy Policies in Social Media -- 21. ClipSecure: Addressing Privacy and Security Concerns in Android Clipboard -- 22. Security Vulnerabilities in Facebook Data Breach -- 23. Intelligent Intrusion Detection Model with MapReduce and Deep Learning Model -- 24. Ethical Considerations in the Development and Use of AI WeaponSystems -- 25. Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models -- 26. Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication -- 27. Blockchain Based Identity Management For Secure Data Sharing -- Part III. Data Science -- 28. Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis -- 29. Strategic Software Modernization: Business-IT Convergence with Large Language Model -- 30. Feature Fusion Approach for Emotion Classification in EEG Signals -- 31. Household Discovery with Group Membership Graphs -- 32. Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System -- 33. A study on data quality and analysis in Business Intelligence -- 34. Exploring the Impact of Augmented Reality Applications on Student Engagement in Higher Education in South Africa: A Review -- Part IV. Human-Computer Interaction -- 35. TickTrax: A Mobile and Web-Based Application for Tick Monitoringand Analysis -- 36. Developing students' reflective skills to improve the learning of Human-Computer Interaction -- 37. Options Matter: Exploring VR Input Fatigue Reduction -- 38. Introductory Pathway to Virtual Reality by Developing Immersive Games of Skill -- 39. A User Study of Two Downstream single-cell Data Analysis Methods: Clustering and Trajectory Inference -- 40. Fostering Joint Innovation: A Global Online Platform for Idea Sharing and Collaboration -- 41. Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment -- Part V. Machine Learning: Theory & Applications -- 42. Offense Severity Prediction Under Partial Knowledge: Trigger Factor Detection Using Machine Learning and Network Science Methods -- 43. Exploring Deep Learning Techniques in the Prediction of Cancer Relapse using an Open Brazilian Tabular Database -- 44. A Review of the Use of Machine Learning for Pharmaceutical Formulations -- 45. A Method for Improving the Recognition Accuracy of Pattern Classification -- 46. An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data -- 47. GPU-accelerated neural networks and computational strategies to predict wave heights -- Part VII. Software Engineering -- 48. A method based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for verifying security requirements in critical software systems -- 49. JSON and XML schemas for WebSTAMP -- 50. Elements-Based Test Suite Reduction for Android Test Suites Generated by Reinforcement Learning -- 51. Towards Adopting a Digital Twin Framework (ISO 23247) for Battery Systems -- 52. Challenges and Success Factors in Large Scale Agile Transformation - A Systematic Literature Review -- 53. Integrating AIaaS into existing systems: the Gokind experience -- 54. A Novel Implementation of FHUQI-Miner, TKQ and FCHM Algorithms for High-Utility Itemset Mining to Predict User Behavior UsingSmartphone Context Events -- 55. Towards systematic and precise compilation of domain-specific modelling languages -- Part VI. Potpourri -- 56. A Detection Method for Circumferential Alignment of Diminutive Lesions Using Wavelet Transform Modulus Maxima and Higher-Order Local Autocorrelation -- 57. Impedance Analysis of Adaptive Distance Relays using Machine Learning -- 58. Employees' experiences of using a mobile health application: A qualitative study based on digital intervention -- 59. MicroSTAMP: microservices for steps 1 and 2 of the System-Theoretic Process Analysis (STPA) technique -- 60. The Disparate Impact of Distinct Background Music on Gameplay Experience: An Empirical Analysis -- 61. Triangulation Guided High Clearance Paths -- 62. Towards Visualizing the Status of Bug Reports -- 63. Quarantine Centrality: Principal Component Analysis of SIS Model Simulation Results to Quantify the Vulnerability of Nodes to Stay Infected in Complex Networks -- 64. A holistic approach for single-cell data trajectory inference using chromosome physical location and ensemble random walk -- 65. Graph partitioning algorithms: a comparative study -- 66. 3D Video Game Simulation Based on Colored Petri net and SIMIO.
520
$a
This volume represents the 21st International Conference on Information Technology - New Generations (ITNG), 2024. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
650
0
$a
Information technology
$v
Congresses.
$3
543170
650
0
$a
Digital communications
$x
Congresses.
$3
678614
650
1 4
$a
Internet of Things.
$3
3538511
650
2 4
$a
Software Engineering.
$3
890874
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Latifi, Shahram.
$3
2186799
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in intelligent systems and computing ;
$v
v. 1456.
$3
3722792
856
4 0
$u
https://doi.org/10.1007/978-3-031-56599-1
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494592
電子資源
11.線上閱覽_V
電子書
EB T58.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入