Information and Software Technologies
31st International Conference, ICIST 2025, Kaunas, Lithuania, October 16–17, 2025, Proceedings
Sorozatcím: Communications in Computer and Information Science;
-
12% KEDVEZMÉNY?
- Kiadói listaár EUR 80.24
-
31 341 Ft (29 849 Ft + 5% áfa)
Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.
- Kedvezmény(ek) 12% (cc. 3 761 Ft off)
- Kedvezményes ár 27 580 Ft (26 267 Ft + 5% áfa)
27 580 Ft
Beszerezhetőség
Még nem jelent meg, de rendelhető. A megjelenéstől számított néhány héten belül megérkezik.
Why don't you give exact delivery time?
A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.
A termék adatai:
- Kiadó Springer Nature Switzerland
- Megjelenés dátuma 2026. április 17.
- ISBN 9783032168078
- Kötéstípus Puhakötés
- Terjedelem430 oldal
- Méret 235x155 mm
- Nyelv angol
- Illusztrációk XIV, 430 p. 134 illus., 114 illus. in color. 700
Kategóriák
Hosszú leírás:
This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 16–17, 2025.
The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
Tartalomjegyzék:
.- Intelligent Methods for Data Analysis and Computer-Aided Software Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in the Cybersecurity of Financial Organizations: Concepts, Strategies & Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the Reality–Virtuality Continuum: A Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security Vulnerabilities and Code Quality Issues.