Soliman | Artificial Intelligence and Machine Learning | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 2300, 454 Seiten, eBook

Reihe: Communications in Computer and Information Science

Soliman Artificial Intelligence and Machine Learning

43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-II
Erscheinungsjahr 2025
ISBN: 978-3-031-79086-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-II

E-Book, Englisch, Band 2300, 454 Seiten, eBook

Reihe: Communications in Computer and Information Science

ISBN: 978-3-031-79086-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26–27, 2024.

The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:

Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.

Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.

Soliman Artificial Intelligence and Machine Learning jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


.- Software Engineering.

.- Access Control Mechanisms in Java Applications.

.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.

.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.

.- Model based approach for building dynamic UI with SPA.

.- Scheduling User Acceptance Tests from A Process Perspective.

.- Software Development Process Analysis – Ishikawa Diagram – Case Study.

.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.

.- Computer Security and Privacy.

.- A Review of a Website Phishing Detection Taxonomy.

.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.

.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.

.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.

.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.

.- Performance Comparison of Programming Interfaces for Microservices Architecture.

.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.

.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.

.- Use of the System Event Register to Assess the Security Level of The IT System.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.