Fr. 124.00

Artificial Intelligence and Machine Learning - 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.
The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:
Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.
Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.

Sommario

.- Software Engineering.
.- Access Control Mechanisms in Java Applications.
.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.
.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.
.- Model based approach for building dynamic UI with SPA.
.- Scheduling User Acceptance Tests from A Process Perspective.
.- Software Development Process Analysis - Ishikawa Diagram - Case Study.
.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.
.- Computer Security and Privacy.
.- A Review of a Website Phishing Detection Taxonomy.
.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.
.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.
.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.
.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.
.- Performance Comparison of Programming Interfaces for Microservices Architecture.
.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.
.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.
.- Use of the System Event Register to Assess the Security Level of The IT System.

Dettagli sul prodotto

Con la collaborazione di Khalid S Soliman (Editore), Khalid S. Soliman (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 04.01.2025
 
EAN 9783031790850
ISBN 978-3-0-3179085-0
Pagine 454
Dimensioni 155 mm x 25 mm x 235 mm
Peso 710 g
Illustrazioni XV, 454 p. 259 illus., 201 illus. in color.
Serie Communications in Computer and Information Science
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Virtual Reality, machine learning, Software Engineering, Artificial Intelligence, Blockchain, software development, Cybersecurity, Data Privacy, cryptography, Natural Language Processing, Access Control, Large Language Models, genetic algorithms, Usability Testing, recommendation systems, Java Spring Boot, Deepfake Detection, Phishing Detection, Query Expansion, Graph Representation

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.