Information and Software Technologies
Springer International Publishing (Verlag)
9783032168078 (ISBN)
- Noch nicht erschienen - erscheint am 17.02.2026
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 16 17, 2025.
The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
.- Intelligent Methods for Data Analysis and Computer-Aided Software Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in the Cybersecurity of Financial Organizations: Concepts, Strategies & Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the Reality Virtuality Continuum: A Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security Vulnerabilities and Code Quality Issues.
| Erscheint lt. Verlag | 17.2.2026 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XX, 430 p. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Weitere Themen ► Hardware |
| Schlagworte | Blockchain technologies • data management systems • Digital transformation • e-learning technologies • Language technologies • machine learning • Natural Language Processing • software development |
| ISBN-13 | 9783032168078 / 9783032168078 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich