- Neu
Buch, Englisch, 430 Seiten, Format (B × H): 155 mm x 235 mm
31st International Conference, ICIST 2025, Kaunas, Lithuania, October 16–17, 2025, Proceedings
Buch, Englisch, 430 Seiten, Format (B × H): 155 mm x 235 mm
Reihe: Communications in Computer and Information Science
ISBN: 978-3-032-16807-8
Verlag: Springer
This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 16–17, 2025.
The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik
- Sozialwissenschaften Pädagogik Lehrerausbildung, Unterricht & Didaktik E-Learning, Bildungstechnologie
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Geistes- und Sozialwissenschaften
Weitere Infos & Material
.- Intelligent Methods for Data Analysis and Computer-Aided Software Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in the Cybersecurity of Financial Organizations: Concepts, Strategies & Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the Reality–Virtuality Continuum: A Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security Vulnerabilities and Code Quality Issues.




