Artificial Intelligence and Machine Learning : 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II (Communications in Computer and Information Science)

個数:

Artificial Intelligence and Machine Learning : 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 454 p.
  • 言語 ENG
  • 商品コード 9783031790850

Full Description

The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.

The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:

Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.

Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.

Contents

.- Software Engineering.

.- Access Control Mechanisms in Java Applications.

.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.

.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.

.- Model based approach for building dynamic UI with SPA.

.- Scheduling User Acceptance Tests from A Process Perspective.

.- Software Development Process Analysis - Ishikawa Diagram - Case Study.

.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.

.- Computer Security and Privacy.

.- A Review of a Website Phishing Detection Taxonomy.

.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.

.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.

.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.

.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.

.- Performance Comparison of Programming Interfaces for Microservices Architecture.

.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.

.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.

.- Use of the System Event Register to Assess the Security Level of The IT System.

最近チェックした商品