Muutke küpsiste eelistusi

Information and Software Technologies: 31st International Conference, ICIST 2025, Kaunas, Lithuania, October 1617, 2025, Proceedings [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 430 pages, kõrgus x laius: 235x155 mm, 114 Illustrations, color; 20 Illustrations, black and white
  • Sari: Communications in Computer and Information Science
  • Ilmumisaeg: 17-Apr-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032168074
  • ISBN-13: 9783032168078
  • Pehme köide
  • Hind: 63,55 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 84,74 €
  • Säästad 25%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 430 pages, kõrgus x laius: 235x155 mm, 114 Illustrations, color; 20 Illustrations, black and white
  • Sari: Communications in Computer and Information Science
  • Ilmumisaeg: 17-Apr-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032168074
  • ISBN-13: 9783032168078
This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 1617, 2025.

The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
.- Intelligent Methods for Data Analysis and Computer-Aided Software
Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub
Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using
Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using
Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small
Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid
Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File
System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic
Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a
Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View
Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for
Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular
Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's
Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in
the Cybersecurity of Financial Organizations: Concepts, Strategies &
Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering
Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG
Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among
Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research
and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the RealityVirtuality Continuum: A
Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and
Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware
Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in
E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet
Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant
Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper
Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief
Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security
Vulnerabilities and Code Quality Issues.