Fr. 124.00

Artificial Intelligence and Machine Learning - 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.
The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:
Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.
Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.

List of contents

.- Software Engineering.
.- Access Control Mechanisms in Java Applications.
.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.
.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.
.- Model based approach for building dynamic UI with SPA.
.- Scheduling User Acceptance Tests from A Process Perspective.
.- Software Development Process Analysis - Ishikawa Diagram - Case Study.
.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.
.- Computer Security and Privacy.
.- A Review of a Website Phishing Detection Taxonomy.
.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.
.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.
.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.
.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.
.- Performance Comparison of Programming Interfaces for Microservices Architecture.
.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.
.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.
.- Use of the System Event Register to Assess the Security Level of The IT System.

Product details

Assisted by Khalid S Soliman (Editor), Khalid S. Soliman (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 04.01.2025
 
EAN 9783031790850
ISBN 978-3-0-3179085-0
No. of pages 454
Dimensions 155 mm x 25 mm x 235 mm
Weight 710 g
Illustrations XV, 454 p. 259 illus., 201 illus. in color.
Series Communications in Computer and Information Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Virtual Reality, machine learning, Software Engineering, Artificial Intelligence, Blockchain, software development, Cybersecurity, Data Privacy, cryptography, Natural Language Processing, Access Control, Large Language Models, genetic algorithms, Usability Testing, recommendation systems, Java Spring Boot, Deepfake Detection, Phishing Detection, Query Expansion, Graph Representation

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.