Computers and Their Applications
Springer International Publishing (Verlag)
978-3-031-92177-3 (ISBN)
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.
| Erscheinungsdatum | 26.06.2025 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XI, 252 p. 100 illus., 87 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Grafik / Design ► Digitale Bildverarbeitung |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Schlagworte | Ad-Hoc Networks • binary generator • Blockchain • Conversational AI • cybersecurity • digital ledger technology • ensemble learning • Feature Selection • Gaussian Splatting • generative AI for testing • Generative AI (GenAI) • Human Activity Recognition (HAR) • Intrusion Detection Systems • Large Language Model (LLM) • LFSR • machine learning • Natural Language Processing (NLP) • Ontology • phishing detection • sentiment analysis |
| ISBN-10 | 3-031-92177-1 / 3031921771 |
| ISBN-13 | 978-3-031-92177-3 / 9783031921773 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich