- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This two-volume set CCIS 2747-2748 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12-15, 2025.
The 67 full papers included in this book were carefully reviewed and selected from 290 submissions. The papers are organized in the following topical sections:
Part I: Collective Intelligence and Collective Decision-Making; Cooperative Strategies for Decision Making and Optimization; Computational Intelligence for Digital Content Understanding; Data Fusion and Application for Industry 4.0; and Natural Language Processing.
Part II: Deep Learning Techniques; Social Networks and Intelligent Systems; Computational Intelligence in Medical Applications; Data Mining and Machine Learning; and Cybersecurity Blockchain Technology and Internet of Things.
Contents
.- Deep Learning Techniques.
.- AERNN4RP: An Attention-Enriched Recurrent Neural Network for Rainfall Prediction.
.- Drone-based Autonomous Navigation and Victim Detection Using Deep Learning Technique for Non-GPS In-Building Environments.
.- Defensive Strategy for Explainability in Deep Neural Networks Under Adversarial Attacks.
.- Balancing Water Quality using Efficient Deep Learning Configuration for Aquaponics Application.
.- Comparative Analysis of CNN Architectures for Boxing Punch Detection.
.- ResNet-Based Pandemic Keyword Spotting in Continuous Multilingual Speech: A Study in UNESCO's Audio Messages for Rapid Health Response.
.- SignBart - New approach with the skeleton sequence for Isolated Sign language Recognition.
.- Semantic Communication with Transformer and Knowledge Distillation for Language Translation.
.- Social Networks and Intelligent Systems.
.- Will they spread it or unmask it? Designing a method for questionnaire specific data characterisation - study case on users' reactance to fake news.
.- Temporal Dynamic Networks in Infectious Disease Modeling: A review of Methods and Applications.
.- GeeSanBhava: Sentiment Tagged Sinhala Music Video Comment Data Set.
.- Natural Language Processing with Disaster Tweets: Predicting Crisis Events with Social Media Using Machine Learning.
.- Large Language Model-Driven Approach for Automated Competency Knowledge Graph Construction in IT Domain.
.- Computational Intelligence in Medical Applications.
.- An Efficient Deep Learning-Based Pneumonia Detection Using Chest X-Ray Image Augmentation.
.- Deep Neural Network for Early Parkinson's Disease Detection from Offline Hand-drawing.
.- Pathomic Signature for Stratification of Metastasis Risk in Colon Cancer.
.- A Novel Hybrid Deep Learning Framework for Automated Malaria Parasite Detection in Microscopic Blood Smear Images.
.- An Explainable AI-Based Breast Cancer Classification Combining Rule Sets and Deep Neural Networks.
.- Data Mining and Machine Learning.
.- Prediction of Real Estate Prices in 15 Largest Polish Cities Using Machine Learning.
.- Automated Stock Trading With Q-Learning Algorithm.
.- EpiPredict: A Smart Solution for Real-Time Epileptic Seizure Prediction and Alerts based on Machine Learning Models.
.- Using Closed Frequent Itemsets To Explain Classification Tasks.
.- Measuring Causal Effects of Online Medical Records on Medical Decision Making Using Causal Machine Learning.
.- Machine learning-based Chat Bot for Diagnosing Depression: A Mental Disorder Illness.
.- LogiDRS: Logical Reasoning using Discourse Relation Sense.
.- From Networks to Circuits: A Structured Approach to AI Interpretability.
.- Cybersecurity, Blockchain Technology and Internet of Things
.- IVFDT: An Improved Very Fast Decision Tree Approach for Blockchain Data Stream Classification.
.- HEMA - IDS: A Hybrid Multi Architecture Ensemble IDS for prediction of malicious network traffic.
.- Secure IoT Healthcare: Federated Learning and Blockchain for Privacy-Preserving AI.
.- Payload Image-Based Model for Automotive Intrusion Detection on STM32 Platform.
.- WleAtNet: A Lightweight Deep Learning Model and Data Framework for Wireless Link Estimation in Resource-Constrained Internet of Things.
.- Assessing the Performance Overhead of Firewall-based Intrusion Detection Systems on Home Computers.
.- Stylometric and Embedding Synergy for Smishing Detection.
.- Anomaly Detection in Industrial Ovens Using XGBoost and IoT Data.