Recent Challenges in Intelligent Information and Database Systems
16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings, Part I
Herausgegeben:Nguyen, Ngoc Thanh; Chbeir, Richard; Manolopoulos, Yannis; Fujita, Hamido; Hong, Tzung-Pei; Nguyen, Le Minh; Wojtkiewicz, Krystian
Recent Challenges in Intelligent Information and Database Systems
16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings, Part I
Herausgegeben:Nguyen, Ngoc Thanh; Chbeir, Richard; Manolopoulos, Yannis; Fujita, Hamido; Hong, Tzung-Pei; Nguyen, Le Minh; Wojtkiewicz, Krystian
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 15-18, 2024.
The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows:
Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.
Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing. …mehr
Andere Kunden interessierten sich auch für
- Recent Challenges in Intelligent Information and Database Systems58,99 €
- Intelligent Information and Database Systems51,99 €
- Intelligent Information and Database Systems57,99 €
- Intelligent Information and Database Systems85,99 €
- Intelligent Information and Database Systems85,99 €
- Recent Challenges in Intelligent Information and Database Systems131,99 €
- Computational Collective Intelligence51,99 €
-
-
-
This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 15-18, 2024.
The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows:
Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.
Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing.
The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows:
Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.
Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2144
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5936-1
- 2024
- Seitenzahl: 396
- Erscheinungstermin: 13. August 2024
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 599g
- ISBN-13: 9789819759361
- ISBN-10: 9819759366
- Artikelnr.: 71171479
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2144
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5936-1
- 2024
- Seitenzahl: 396
- Erscheinungstermin: 13. August 2024
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 599g
- ISBN-13: 9789819759361
- ISBN-10: 9819759366
- Artikelnr.: 71171479
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- AI-driven Cybersecurity Solutions.
.- Security aspects of digital identity.
.- Efficient Deep Learning Method For Detection Of Malware Attacks In Internet Of Things Networks.
.- A Deep Neural Networks approach for Speaker Verification on Embedded Devices.
.- Phishing Detection Using Ensemble of Classifiers.
.- An Effective Ensemble Classification Algorithm for Intrusion Detection System.
.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov Switching for Non-periodic DoS attacks.
.- AI-driven Medical Analytics.
.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images.
.- A Deep Learning Approach to Diabetes Diagnosis.
.- A novel approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management.
.- Multi-scale and Multi-level Attention based on External knowledge in EHRs.
.- Exploring XAI attention maps to investigate the effect of distance metric and lesion-shaped border expansion size for effective
content-based dermatological lesion retrieval.
.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for web search engines retrieval effectiveness.
.- Computational Intelligence.
.- Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs.
.- Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-valued Decisions from Closed Classes.
.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent.
.- Blockchain-based Educational Certification Systems Using A Modified Hash Algorithm.
.- The Merged Longest Common Increasing Subsequence Problem.
.- Applying transformation to reduce model sizes for Constrained Optimization Problems.
.- Multiple Traveling Salesman Problem with a Drone Station: Using Multi-Package Payload Compartments.
.- Unveiling the power of hybrid balancing techniques and ensemble stacked and blended classifiers for enhanced churn prediction.
.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.
.- A structure based on B+trees to represent a large number of k-multisets stored in non-volatile memory.
.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.
.- Data modelling and information systems.
.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach.
.- Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs.
.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things.
.- Functional test generation based on requirements defined at GUI level.
.- Penetration Testing and Security Assessment Model for Biomedical Devices.
.- Cooperative User Interface for AGV - Proof of Concept.
.- Security aspects of digital identity.
.- Efficient Deep Learning Method For Detection Of Malware Attacks In Internet Of Things Networks.
.- A Deep Neural Networks approach for Speaker Verification on Embedded Devices.
.- Phishing Detection Using Ensemble of Classifiers.
.- An Effective Ensemble Classification Algorithm for Intrusion Detection System.
.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov Switching for Non-periodic DoS attacks.
.- AI-driven Medical Analytics.
.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images.
.- A Deep Learning Approach to Diabetes Diagnosis.
.- A novel approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management.
.- Multi-scale and Multi-level Attention based on External knowledge in EHRs.
.- Exploring XAI attention maps to investigate the effect of distance metric and lesion-shaped border expansion size for effective
content-based dermatological lesion retrieval.
.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for web search engines retrieval effectiveness.
.- Computational Intelligence.
.- Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs.
.- Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-valued Decisions from Closed Classes.
.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent.
.- Blockchain-based Educational Certification Systems Using A Modified Hash Algorithm.
.- The Merged Longest Common Increasing Subsequence Problem.
.- Applying transformation to reduce model sizes for Constrained Optimization Problems.
.- Multiple Traveling Salesman Problem with a Drone Station: Using Multi-Package Payload Compartments.
.- Unveiling the power of hybrid balancing techniques and ensemble stacked and blended classifiers for enhanced churn prediction.
.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.
.- A structure based on B+trees to represent a large number of k-multisets stored in non-volatile memory.
.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.
.- Data modelling and information systems.
.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach.
.- Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs.
.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things.
.- Functional test generation based on requirements defined at GUI level.
.- Penetration Testing and Security Assessment Model for Biomedical Devices.
.- Cooperative User Interface for AGV - Proof of Concept.
.- AI-driven Cybersecurity Solutions.
.- Security aspects of digital identity.
.- Efficient Deep Learning Method For Detection Of Malware Attacks In Internet Of Things Networks.
.- A Deep Neural Networks approach for Speaker Verification on Embedded Devices.
.- Phishing Detection Using Ensemble of Classifiers.
.- An Effective Ensemble Classification Algorithm for Intrusion Detection System.
.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov Switching for Non-periodic DoS attacks.
.- AI-driven Medical Analytics.
.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images.
.- A Deep Learning Approach to Diabetes Diagnosis.
.- A novel approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management.
.- Multi-scale and Multi-level Attention based on External knowledge in EHRs.
.- Exploring XAI attention maps to investigate the effect of distance metric and lesion-shaped border expansion size for effective
content-based dermatological lesion retrieval.
.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for web search engines retrieval effectiveness.
.- Computational Intelligence.
.- Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs.
.- Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-valued Decisions from Closed Classes.
.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent.
.- Blockchain-based Educational Certification Systems Using A Modified Hash Algorithm.
.- The Merged Longest Common Increasing Subsequence Problem.
.- Applying transformation to reduce model sizes for Constrained Optimization Problems.
.- Multiple Traveling Salesman Problem with a Drone Station: Using Multi-Package Payload Compartments.
.- Unveiling the power of hybrid balancing techniques and ensemble stacked and blended classifiers for enhanced churn prediction.
.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.
.- A structure based on B+trees to represent a large number of k-multisets stored in non-volatile memory.
.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.
.- Data modelling and information systems.
.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach.
.- Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs.
.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things.
.- Functional test generation based on requirements defined at GUI level.
.- Penetration Testing and Security Assessment Model for Biomedical Devices.
.- Cooperative User Interface for AGV - Proof of Concept.
.- Security aspects of digital identity.
.- Efficient Deep Learning Method For Detection Of Malware Attacks In Internet Of Things Networks.
.- A Deep Neural Networks approach for Speaker Verification on Embedded Devices.
.- Phishing Detection Using Ensemble of Classifiers.
.- An Effective Ensemble Classification Algorithm for Intrusion Detection System.
.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov Switching for Non-periodic DoS attacks.
.- AI-driven Medical Analytics.
.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images.
.- A Deep Learning Approach to Diabetes Diagnosis.
.- A novel approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management.
.- Multi-scale and Multi-level Attention based on External knowledge in EHRs.
.- Exploring XAI attention maps to investigate the effect of distance metric and lesion-shaped border expansion size for effective
content-based dermatological lesion retrieval.
.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for web search engines retrieval effectiveness.
.- Computational Intelligence.
.- Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs.
.- Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-valued Decisions from Closed Classes.
.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent.
.- Blockchain-based Educational Certification Systems Using A Modified Hash Algorithm.
.- The Merged Longest Common Increasing Subsequence Problem.
.- Applying transformation to reduce model sizes for Constrained Optimization Problems.
.- Multiple Traveling Salesman Problem with a Drone Station: Using Multi-Package Payload Compartments.
.- Unveiling the power of hybrid balancing techniques and ensemble stacked and blended classifiers for enhanced churn prediction.
.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.
.- A structure based on B+trees to represent a large number of k-multisets stored in non-volatile memory.
.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.
.- Data modelling and information systems.
.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach.
.- Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs.
.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things.
.- Functional test generation based on requirements defined at GUI level.
.- Penetration Testing and Security Assessment Model for Biomedical Devices.
.- Cooperative User Interface for AGV - Proof of Concept.