ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science)

دانلود کتاب فناوری های اطلاعات و نرم افزار: بیست و نهمین کنفرانس بین المللی، ICIST 2023، کاوناس، لیتوانی، 12 تا 14 اکتبر 2023، مجموعه مقالات (ارتباطات در علوم کامپیوتر و اطلاعات)

Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science)

مشخصات کتاب

Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science)

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3031489802, 9783031489808 
ناشر: Springer 
سال نشر: 2024 
تعداد صفحات: 356
[348] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 29 Mb 

قیمت کتاب (تومان) : 28,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری های اطلاعات و نرم افزار: بیست و نهمین کنفرانس بین المللی، ICIST 2023، کاوناس، لیتوانی، 12 تا 14 اکتبر 2023، مجموعه مقالات (ارتباطات در علوم کامپیوتر و اطلاعات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Organization
Contents
Intelligent Systems and Software Engineering Advances
A Deep Learning Algorithm for the Development of Meaningful Learning in the Harmonization of a Musical Melody
	1 Introduction
	2 Harmonization and Significant Learning
	3 Methodology for Melody Harmonization
	4 Results and Evaluation
	5 Discussion and Conclusions
	References
Investigation of the Statistical Properties of the CTR Mode of the Block Cipher Based on MPF
	1 Introduction
	2 Preliminaries
	3 Symmetric Block Cipher
	4 Investigation of the Avalanche Effect of Our Cipher
	5 Modification of Our Block Cipher
	6 Analysis of the Collisions for Our Cipher
	7 Conclusion
	References
Online PID Tuning of a 3-DoF Robotic Arm Using a Metaheuristic Optimisation Algorithm: A Comparative Analysis
	1 Introduction
		1.1 Literature Review
		1.2 Contributions and Paper Organisation
	2 Proposed Methodology
		2.1 Robotic Arm
		2.2 War Strategy Optimisation Algorithm (WSO)
		2.3 PID Controller for Robotic Manipulator
		2.4 WSO Based PID Tuning
	3 Results and Discussion
		3.1 Simulation Model
		3.2 PID Tuning Error Comparison
		3.3 Step Response Comparison
	4 Conclusion
	References
Multivariate Bitcoin Price Prediction Based on Tuned Bidirectional Long Short-Term Memory Network and Enhanced Reptile Search Algorithm
	1 Introduction
	2 Background
		2.1 Bidirectional Long Short-Term Memory Network
		2.2 Metaheuristic Optimization
	3 Methods
		3.1 Original Reptile Search Algorithm
		3.2 Hybrid Adaptive RSA (HARSA)
	4 Experiments and Comparative Analysis
		4.1 Simulation Setup
		4.2 Results and Discussion
	5 Conclusion
	References
Android Malware Detection Using Artificial Intelligence
	1 Introduction
	2 Related Works
	3 Machine Learning Algorithms
		3.1 K-Nest Neighbour(KNN)
		3.2 Decision Tree (DT)
		3.3 Random Forest (RF)
		3.4 Extra Tree (ET)
		3.5 Ensemble Learning
		3.6 Voting Classifier
		3.7 Bagging
		3.8 Boosting
		3.9 Gradient Tree Boosting
	4 Methodology
		4.1 Metrics
		4.2 Dataset
		4.3 Machine Learning Algorithms
		4.4 Experiments and Results
	5 Conclusion
	References
Intelligent Methods for Data Analysis and Computer Aided Soft-ware Engineering
Autoencoder as Feature Extraction Technique for Financial Distress Classification
	1 Introduction
	2 Review of Research for Features Extraction for Financial Distress Classification
		2.1 Autoencoder
	3 Data
		3.1 Features
		3.2 Data Preparation
	4 Methodology
		4.1 Methods for Classification
		4.2 Evaluation Matrix
	5 Results
	6 Conclusion
	References
Scope Assessment Methodology for Agile Projects Using Automated Requirements Gathering from Models
	1 Introduction
	2 Literature
		2.1 Methodologies for Project Scope Estimation
		2.2 UML in Agile Projects
	3 Methodology for the Assessment of the Project Scope
		3.1 Algorithm of the Methodology
		3.2 Requirements Gathering
		3.3 Principles of Project Scope’s Estimation
	4 Experiments
	5 Conclusions and Directions for Future Research
	References
User Interaction and Response-Based Knowledge Discovery Framework
	1 Introduction
	2 Knowledge Discovery Systems
		2.1 Technologies
		2.2 Legislations
	3 Conceptual Framework
		3.1 Technology Layer
		3.2 Public and Private Applications
		3.3 Machine Learning
		3.4 UIS-KDF
	4 Conclusions
	References
Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins
	1 Introduction
	2 Related Work
		2.1 Threats from User-Generated Content
		2.2 Digital Twins in the Privacy Context
		2.3 Named Entity Recognition for Digital Twin Enrichment
	3 Data Acquisition and Data Processing
	4 NER Models and Evaluation
	5 Discussion
	6 Conclusion and Future Work
	References
Application of Machine Learning in Energy Storage: A Scientometric Research of a Decade
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discussion
		4.1 Publication Trends
		4.2 Top Cited Articles (TCA)
		4.3 Top Authors
		4.4 Top Affiliations
		4.5 Top Active Countries
	5 Conclusion
	References
Access Control Approach for Controller Management Platforms
	1 Introduction
	2 Security Threats to Controller Management Platforms
		2.1 Security Threats to IoT Infrastructure and Platforms
	3 Proposed Access Control Method
		3.1 Calculation of the Risk Score
		3.2 Detailed Decision-Making Process for the Access Method
	4 Prototype Implementation and Research on the Access Control Approach for Controller Management Platforms
		4.1 Prototype Hardware
		4.2 Controller Management Platform
	5 Research Scenarios and Results
	6 Conclusions
	References
Leveraging Semantic Search and LLMs for Domain-Adaptive Information Retrieval
	1 Introduction
	2 Related Work
		2.1 Large Language Models
		2.2 Semantic Search
	3 Domain-Adaptive Question-Answering Framework
		3.1 Semantic Search Pipeline
		3.2 Conversational Question-Answering System
	4 Experiments
		4.1 Data Acquisition and Implementation
		4.2 Evaluation
		4.3 Results
	5 Discussion
	6 Conclusion and Future Work
	References
Synergizing Reinforcement Learning for Cognitive Medical Decision-Making in Sepsis Detection
	1 Introduction
	2 Background and Motivation
		2.1 SERA Algorithm
		2.2 Algorithms for the Early Detection of Sepsis SERA Algorithm
		2.3 Reinforcement Learning in Medicine
	3 Dataset
	4 Hardware/Software Requirements
	5 Research Methodology
		5.1 Action Space
		5.2 Reward Function
		5.3 Model-Used
		5.4 RL Algorithm
	6 Result
	7 Conclusion
	References
Towards Data Integration for Hybrid Energy System Decision-Making Processes: Challenges and Architecture
	1 Introduction
	2 Challenges of Decision-Making Processes in Hybrid Energy Systems
		2.1 Interaction Layers of Hybrid Energy Systems
		2.2 Diversity of Tasks in Hybrid Energy Management
	3 Analysis of Data Flow
	4 Conclusions
	References
Modelling Normative Financial Processes with Process Mining
	1 Introduction
	2 Related Work
	3 Types of Financial Processes
	4 Multidimensional Financial Space for PM Project Specification
	5 Process Mining Application Example: Expenditure Cycle
	6 Conclusions
	References
Language Technologies and Smart e-Learning Applications
Sentiment Analysis of Lithuanian Youth Subcultures Zines Using Automatic Machine Translation
	1 Introduction
	2 The Dataset
	3 The Experimental Evaluation
	4 Conclusions
	References
Chatbots Scenarios for Education
	1 First Section
	2 Methodology
	3 Theoretical Background
		3.1 Previous Literature Review Findings
		3.2 Chatbot Design
	4 Results and Discussion
	5 Chatbots Scenarios for Educational Purposes
	6 Conclusions
	References
Understanding User Perspectives on an Educational Game for Civic and Social Inclusion
	1 Introduction
	2 Games for Personal and Societal Growth
	3 Expectations for Game Design
	4 User Experience with the INGAME
	5 Conclusions
	References
Using Quantum Natural Language Processing for Sentiment Classification and Next-Word Prediction in Sentences Without Fixed Syntactic Structure
	1 Introduction and State of the Art
	2 QNLP Proofs of Concept
		2.1 QNLP for Sentiment Classification
		2.2 QNLP for Next Word Prediction in Sentences with Previously Unknown Syntactic Structure
	3 Conclusions and Future Lines
	References
AI-Based IT Solutions
Analyzing the Impact of Principal Component Analysis on k-Nearest Neighbors and Naive Bayes Classification Algorithms
	1 Introduction
	2 Methodology
		2.1 Dataset
		2.2 Data Normalization
		2.3 Data Preparations Algorithms
		2.4 kNN and Naive Bayes Algorithms
		2.5 PCA in kNN and Naive Bayes Algorithms
	3 Experiments
	4 Conclusion
	References
Comparison of kNN Classifier and Simple Neural Network in Handwritten Digit Recognition Using MNIST Database
	1 Introduction
	2 Methodology
		2.1 Algorithm kNN
		2.2 Artificial Neural Networks
	3 Experiment
		3.1 MNIST Database
		3.2 Results of Digit Recognition Research by kNN
		3.3 Results of Digit Recognition with Simple Neural Network
	4 Conclusion
	References
Comparison of Support Vector Machine, Naive Bayes, and K-Nearest Neighbors Algorithms for Classifying Heart Disease
	1 Introduction
	2 Methodology
		2.1 Stages of Research
		2.2 kNN
		2.3 Naive Bayes
		2.4 SVM
	3 Experiments
	4 Conclusion
	5 Online Resources
	References
Iterative Method of Adjusting Parameters in kNN via Minkowski Metric
	1 Introduction
	2 Methodology
	3 Experiments
	4 Conclusion
	5 Online Resources
	References
Predicting Diabetes Risk in Correlation with Cigarette Smoking
	1 Introduction
		1.1 Assumptions of the Project
		1.2 Description
	2 Methodology
		2.1 Steps in the Implementation of the Task
		2.2 Description of Operation
	3 Data Analysis
		3.1 Libraries Used
		3.2 Database Analysis
	4 Implementation
		4.1 Including Necessary Packages
		4.2 Downloading the Dataset, Pre-analysis and Deletion of Irrelevant Elements
		4.3 Converting Word Values into Numerical Values and Re-Analyzing the Data
		4.4 Data Normalization, Shuffling and Splitting
		4.5 Naive Bayes Algorithm
	5 Experiments
	6 Results
	7 Conclusions
	8 Summary
	References
Soft Inference as a Voting Mechanism in k-Nearest Neighbors Clustering Algorithm
	1 Introduction
	2 Mathematical Model
		2.1 k-NN Algorithm
		2.2 Soft Sets
		2.3 k-NN + Soft Set Algorithm
	3 Methodology
		3.1 Using Soft Sets to Vote in k-NN Algorithm
	4 Experiments
	5 Conclusions
	References
The BLDC Motor Efficiency Improvement by Electronical Correction of the Power States Indications
	1 Introduction
	2 Technical Description
		2.1 The Power System
	3 Hall Effect Sequence States Signals Correction
	4 Conclusions
	References
The Impact of Entropy Weighting Technique on MCDM-Based Rankings on Patients Using Ambiguous medical Data
	1 Introduction
	2 Proposed Methodology
		2.1 Creating Multi-criteria Patient Database
		2.2 Criteria Weighting Methods
		2.3 MCDM Methods
	3 Experiments
		3.1 Data
		3.2 Convolution Neural Network Models
		3.3 Creating Database of Artificial Patients
	4 Results
		4.1 Calculated Weights
		4.2 Metrics
	5 Conclusion
	References
Author Index




نظرات کاربران