Muutke küpsiste eelistusi

E-raamat: Information and Software Technologies: 31st International Conference, ICIST 2025, Kaunas, Lithuania, October 16-17, 2025, Proceedings

Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 1617, 2025.

The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
.- Intelligent Methods for Data Analysis and Computer-Aided Software
Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub
Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using
Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using
Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small
Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid
Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File
System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic
Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a
Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View
Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for
Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular
Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's
Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in
the Cybersecurity of Financial Organizations: Concepts, Strategies &
Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering
Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG
Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among
Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research
and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the RealityVirtuality Continuum: A
Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and
Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware
Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in
E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet
Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant
Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper
Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief
Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security
Vulnerabilities and Code Quality Issues.