Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Computers and Their Applications -

Computers and Their Applications

40th International Conference, CATA 2025, San Francisco, CA, USA, March 17–18, 2025, Proceedings

Ajay Bandi, Mohammad Hossain (Herausgeber)

Buch | Softcover
XI, 252 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-92177-3 (ISBN)
CHF 112,30 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025. 

The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.

ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XI, 252 p. 100 illus., 87 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Grafik / Design Digitale Bildverarbeitung
Informatik Netzwerke Sicherheit / Firewall
Schlagworte Ad-Hoc Networks • binary generator • Blockchain • Conversational AI • cybersecurity • digital ledger technology • ensemble learning • Feature Selection • Gaussian Splatting • generative AI for testing • Generative AI (GenAI) • Human Activity Recognition (HAR) • Intrusion Detection Systems • Large Language Model (LLM) • LFSR • machine learning • Natural Language Processing (NLP) • Ontology • phishing detection • sentiment analysis
ISBN-10 3-031-92177-1 / 3031921771
ISBN-13 978-3-031-92177-3 / 9783031921773
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Jürgen Wolf

Buch | Hardcover (2025)
Rheinwerk (Verlag)
CHF 69,85