دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Audrius Lopata (editor), Daina Gudonienė (editor), Rita Butkienė (editor) سری: ISBN (شابک) : 3031489802, 9783031489808 ناشر: Springer سال نشر: 2024 تعداد صفحات: 356 [348] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 29 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری های اطلاعات و نرم افزار: بیست و نهمین کنفرانس بین المللی، ICIST 2023، کاوناس، لیتوانی، 12 تا 14 اکتبر 2023، مجموعه مقالات (ارتباطات در علوم کامپیوتر و اطلاعات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Contents Intelligent Systems and Software Engineering Advances A Deep Learning Algorithm for the Development of Meaningful Learning in the Harmonization of a Musical Melody 1 Introduction 2 Harmonization and Significant Learning 3 Methodology for Melody Harmonization 4 Results and Evaluation 5 Discussion and Conclusions References Investigation of the Statistical Properties of the CTR Mode of the Block Cipher Based on MPF 1 Introduction 2 Preliminaries 3 Symmetric Block Cipher 4 Investigation of the Avalanche Effect of Our Cipher 5 Modification of Our Block Cipher 6 Analysis of the Collisions for Our Cipher 7 Conclusion References Online PID Tuning of a 3-DoF Robotic Arm Using a Metaheuristic Optimisation Algorithm: A Comparative Analysis 1 Introduction 1.1 Literature Review 1.2 Contributions and Paper Organisation 2 Proposed Methodology 2.1 Robotic Arm 2.2 War Strategy Optimisation Algorithm (WSO) 2.3 PID Controller for Robotic Manipulator 2.4 WSO Based PID Tuning 3 Results and Discussion 3.1 Simulation Model 3.2 PID Tuning Error Comparison 3.3 Step Response Comparison 4 Conclusion References Multivariate Bitcoin Price Prediction Based on Tuned Bidirectional Long Short-Term Memory Network and Enhanced Reptile Search Algorithm 1 Introduction 2 Background 2.1 Bidirectional Long Short-Term Memory Network 2.2 Metaheuristic Optimization 3 Methods 3.1 Original Reptile Search Algorithm 3.2 Hybrid Adaptive RSA (HARSA) 4 Experiments and Comparative Analysis 4.1 Simulation Setup 4.2 Results and Discussion 5 Conclusion References Android Malware Detection Using Artificial Intelligence 1 Introduction 2 Related Works 3 Machine Learning Algorithms 3.1 K-Nest Neighbour(KNN) 3.2 Decision Tree (DT) 3.3 Random Forest (RF) 3.4 Extra Tree (ET) 3.5 Ensemble Learning 3.6 Voting Classifier 3.7 Bagging 3.8 Boosting 3.9 Gradient Tree Boosting 4 Methodology 4.1 Metrics 4.2 Dataset 4.3 Machine Learning Algorithms 4.4 Experiments and Results 5 Conclusion References Intelligent Methods for Data Analysis and Computer Aided Soft-ware Engineering Autoencoder as Feature Extraction Technique for Financial Distress Classification 1 Introduction 2 Review of Research for Features Extraction for Financial Distress Classification 2.1 Autoencoder 3 Data 3.1 Features 3.2 Data Preparation 4 Methodology 4.1 Methods for Classification 4.2 Evaluation Matrix 5 Results 6 Conclusion References Scope Assessment Methodology for Agile Projects Using Automated Requirements Gathering from Models 1 Introduction 2 Literature 2.1 Methodologies for Project Scope Estimation 2.2 UML in Agile Projects 3 Methodology for the Assessment of the Project Scope 3.1 Algorithm of the Methodology 3.2 Requirements Gathering 3.3 Principles of Project Scope’s Estimation 4 Experiments 5 Conclusions and Directions for Future Research References User Interaction and Response-Based Knowledge Discovery Framework 1 Introduction 2 Knowledge Discovery Systems 2.1 Technologies 2.2 Legislations 3 Conceptual Framework 3.1 Technology Layer 3.2 Public and Private Applications 3.3 Machine Learning 3.4 UIS-KDF 4 Conclusions References Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins 1 Introduction 2 Related Work 2.1 Threats from User-Generated Content 2.2 Digital Twins in the Privacy Context 2.3 Named Entity Recognition for Digital Twin Enrichment 3 Data Acquisition and Data Processing 4 NER Models and Evaluation 5 Discussion 6 Conclusion and Future Work References Application of Machine Learning in Energy Storage: A Scientometric Research of a Decade 1 Introduction 2 Literature Review 3 Methodology 4 Results and Discussion 4.1 Publication Trends 4.2 Top Cited Articles (TCA) 4.3 Top Authors 4.4 Top Affiliations 4.5 Top Active Countries 5 Conclusion References Access Control Approach for Controller Management Platforms 1 Introduction 2 Security Threats to Controller Management Platforms 2.1 Security Threats to IoT Infrastructure and Platforms 3 Proposed Access Control Method 3.1 Calculation of the Risk Score 3.2 Detailed Decision-Making Process for the Access Method 4 Prototype Implementation and Research on the Access Control Approach for Controller Management Platforms 4.1 Prototype Hardware 4.2 Controller Management Platform 5 Research Scenarios and Results 6 Conclusions References Leveraging Semantic Search and LLMs for Domain-Adaptive Information Retrieval 1 Introduction 2 Related Work 2.1 Large Language Models 2.2 Semantic Search 3 Domain-Adaptive Question-Answering Framework 3.1 Semantic Search Pipeline 3.2 Conversational Question-Answering System 4 Experiments 4.1 Data Acquisition and Implementation 4.2 Evaluation 4.3 Results 5 Discussion 6 Conclusion and Future Work References Synergizing Reinforcement Learning for Cognitive Medical Decision-Making in Sepsis Detection 1 Introduction 2 Background and Motivation 2.1 SERA Algorithm 2.2 Algorithms for the Early Detection of Sepsis SERA Algorithm 2.3 Reinforcement Learning in Medicine 3 Dataset 4 Hardware/Software Requirements 5 Research Methodology 5.1 Action Space 5.2 Reward Function 5.3 Model-Used 5.4 RL Algorithm 6 Result 7 Conclusion References Towards Data Integration for Hybrid Energy System Decision-Making Processes: Challenges and Architecture 1 Introduction 2 Challenges of Decision-Making Processes in Hybrid Energy Systems 2.1 Interaction Layers of Hybrid Energy Systems 2.2 Diversity of Tasks in Hybrid Energy Management 3 Analysis of Data Flow 4 Conclusions References Modelling Normative Financial Processes with Process Mining 1 Introduction 2 Related Work 3 Types of Financial Processes 4 Multidimensional Financial Space for PM Project Specification 5 Process Mining Application Example: Expenditure Cycle 6 Conclusions References Language Technologies and Smart e-Learning Applications Sentiment Analysis of Lithuanian Youth Subcultures Zines Using Automatic Machine Translation 1 Introduction 2 The Dataset 3 The Experimental Evaluation 4 Conclusions References Chatbots Scenarios for Education 1 First Section 2 Methodology 3 Theoretical Background 3.1 Previous Literature Review Findings 3.2 Chatbot Design 4 Results and Discussion 5 Chatbots Scenarios for Educational Purposes 6 Conclusions References Understanding User Perspectives on an Educational Game for Civic and Social Inclusion 1 Introduction 2 Games for Personal and Societal Growth 3 Expectations for Game Design 4 User Experience with the INGAME 5 Conclusions References Using Quantum Natural Language Processing for Sentiment Classification and Next-Word Prediction in Sentences Without Fixed Syntactic Structure 1 Introduction and State of the Art 2 QNLP Proofs of Concept 2.1 QNLP for Sentiment Classification 2.2 QNLP for Next Word Prediction in Sentences with Previously Unknown Syntactic Structure 3 Conclusions and Future Lines References AI-Based IT Solutions Analyzing the Impact of Principal Component Analysis on k-Nearest Neighbors and Naive Bayes Classification Algorithms 1 Introduction 2 Methodology 2.1 Dataset 2.2 Data Normalization 2.3 Data Preparations Algorithms 2.4 kNN and Naive Bayes Algorithms 2.5 PCA in kNN and Naive Bayes Algorithms 3 Experiments 4 Conclusion References Comparison of kNN Classifier and Simple Neural Network in Handwritten Digit Recognition Using MNIST Database 1 Introduction 2 Methodology 2.1 Algorithm kNN 2.2 Artificial Neural Networks 3 Experiment 3.1 MNIST Database 3.2 Results of Digit Recognition Research by kNN 3.3 Results of Digit Recognition with Simple Neural Network 4 Conclusion References Comparison of Support Vector Machine, Naive Bayes, and K-Nearest Neighbors Algorithms for Classifying Heart Disease 1 Introduction 2 Methodology 2.1 Stages of Research 2.2 kNN 2.3 Naive Bayes 2.4 SVM 3 Experiments 4 Conclusion 5 Online Resources References Iterative Method of Adjusting Parameters in kNN via Minkowski Metric 1 Introduction 2 Methodology 3 Experiments 4 Conclusion 5 Online Resources References Predicting Diabetes Risk in Correlation with Cigarette Smoking 1 Introduction 1.1 Assumptions of the Project 1.2 Description 2 Methodology 2.1 Steps in the Implementation of the Task 2.2 Description of Operation 3 Data Analysis 3.1 Libraries Used 3.2 Database Analysis 4 Implementation 4.1 Including Necessary Packages 4.2 Downloading the Dataset, Pre-analysis and Deletion of Irrelevant Elements 4.3 Converting Word Values into Numerical Values and Re-Analyzing the Data 4.4 Data Normalization, Shuffling and Splitting 4.5 Naive Bayes Algorithm 5 Experiments 6 Results 7 Conclusions 8 Summary References Soft Inference as a Voting Mechanism in k-Nearest Neighbors Clustering Algorithm 1 Introduction 2 Mathematical Model 2.1 k-NN Algorithm 2.2 Soft Sets 2.3 k-NN + Soft Set Algorithm 3 Methodology 3.1 Using Soft Sets to Vote in k-NN Algorithm 4 Experiments 5 Conclusions References The BLDC Motor Efficiency Improvement by Electronical Correction of the Power States Indications 1 Introduction 2 Technical Description 2.1 The Power System 3 Hall Effect Sequence States Signals Correction 4 Conclusions References The Impact of Entropy Weighting Technique on MCDM-Based Rankings on Patients Using Ambiguous medical Data 1 Introduction 2 Proposed Methodology 2.1 Creating Multi-criteria Patient Database 2.2 Criteria Weighting Methods 2.3 MCDM Methods 3 Experiments 3.1 Data 3.2 Convolution Neural Network Models 3.3 Creating Database of Artificial Patients 4 Results 4.1 Calculated Weights 4.2 Metrics 5 Conclusion References Author Index