Muutke küpsiste eelistusi

E-raamat: Recent Challenges in Intelligent Information and Database Systems: 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 1518, 2024.





The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows: 





Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.





Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing.
.- AI-driven Cybersecurity Solutions.



.- Security aspects of digital identity.



.- Efficient Deep Learning Method For Detection Of Malware Attacks In
Internet Of Things Networks.



.- A Deep Neural Networks approach for Speaker Verification on Embedded
Devices.



.- Phishing Detection Using Ensemble of Classifiers.



.- An Effective Ensemble Classification Algorithm for Intrusion Detection
System.



.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov
Switching for Non-periodic DoS attacks.



.- AI-driven Medical Analytics.



.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis
Patients Using Whole Slide Images.



.- A Deep Learning Approach to Diabetes Diagnosis.



.- A novel approach for Medical E-Consent: Leveraging Language Models for
Informed Consent Management.



.- Multi-scale and Multi-level Attention based on External knowledge in
EHRs.



.- Exploring XAI attention maps to investigate the effect of distance metric
and lesion-shaped border expansion size for effective

 content-based dermatological lesion retrieval.



.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for
web search engines retrieval effectiveness.



.- Computational Intelligence.



.- Complexity of Transforming Decision Rule Systems into Decision Trees and
Acyclic Decision Graphs.



.- Depth of Deterministic and Nondeterministic Decision Trees for Decision
Tables with Many-valued Decisions from Closed Classes.



.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic
Gradient Descent.



.- Blockchain-based Educational Certification Systems Using A Modified Hash
Algorithm.



.- The Merged Longest Common Increasing Subsequence Problem.



.- Applying transformation to reduce model sizes for Constrained Optimization
Problems.



.- Multiple Traveling Salesman Problem with a Drone Station: Using
Multi-Package Payload Compartments.



.- Unveiling the power of hybrid balancing techniques and ensemble stacked
and blended classifiers for enhanced churn prediction.



.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.



.- A structure based on B+trees to represent a large number of k-multisets
stored in non-volatile memory.



.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.



.- Data modelling and information systems.



.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear
Programming Approach.



.- Towards an Ontological Approach for Verifying the Well-Formedness of
Training Programs.



.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the
Internet of Medical Things.



.- Functional test generation based on requirements defined at GUI level.



.- Penetration Testing and Security Assessment Model for Biomedical Devices.



.- Cooperative User Interface for AGV Proof of Concept.