Atjaunināt sīkdatņu piekrišanu

E-grāmata: Recent Challenges in Intelligent Information and Database Systems: 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 1518, 2024.





The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are organized in topical sections as follows: 





Part One: AI-driven Cybersecurity Solutions; AI-driven Medical Analytics; Computational Intelligence; and Data Modelling and Information Systems.





Part Two: Image and Video Processing; Prediction and Recommendation Systems; and Text, Speech and Natural Language Processing.
.- AI-driven Cybersecurity Solutions.



.- Security aspects of digital identity.



.- Efficient Deep Learning Method For Detection Of Malware Attacks In
Internet Of Things Networks.



.- A Deep Neural Networks approach for Speaker Verification on Embedded
Devices.



.- Phishing Detection Using Ensemble of Classifiers.



.- An Effective Ensemble Classification Algorithm for Intrusion Detection
System.



.- Mean-Square Consensus of Second-Order Multi-Agent Systems with Semi-Markov
Switching for Non-periodic DoS attacks.



.- AI-driven Medical Analytics.



.- An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis
Patients Using Whole Slide Images.



.- A Deep Learning Approach to Diabetes Diagnosis.



.- A novel approach for Medical E-Consent: Leveraging Language Models for
Informed Consent Management.



.- Multi-scale and Multi-level Attention based on External knowledge in
EHRs.



.- Exploring XAI attention maps to investigate the effect of distance metric
and lesion-shaped border expansion size for effective

 content-based dermatological lesion retrieval.



.- D-MiQ: Deep Multimodal Interactive Healthcare Query expansion approach for
web search engines retrieval effectiveness.



.- Computational Intelligence.



.- Complexity of Transforming Decision Rule Systems into Decision Trees and
Acyclic Decision Graphs.



.- Depth of Deterministic and Nondeterministic Decision Trees for Decision
Tables with Many-valued Decisions from Closed Classes.



.- Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic
Gradient Descent.



.- Blockchain-based Educational Certification Systems Using A Modified Hash
Algorithm.



.- The Merged Longest Common Increasing Subsequence Problem.



.- Applying transformation to reduce model sizes for Constrained Optimization
Problems.



.- Multiple Traveling Salesman Problem with a Drone Station: Using
Multi-Package Payload Compartments.



.- Unveiling the power of hybrid balancing techniques and ensemble stacked
and blended classifiers for enhanced churn prediction.



.- Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning.



.- A structure based on B+trees to represent a large number of k-multisets
stored in non-volatile memory.



.- Optimizing Option Short Strangle Strategies through Genetic Algorithm.



.- Data modelling and information systems.



.- Optimizing Airline Pilots Training Plans: A Mixed Integer Linear
Programming Approach.



.- Towards an Ontological Approach for Verifying the Well-Formedness of
Training Programs.



.- Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the
Internet of Medical Things.



.- Functional test generation based on requirements defined at GUI level.



.- Penetration Testing and Security Assessment Model for Biomedical Devices.



.- Cooperative User Interface for AGV Proof of Concept.