- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Computer & Internet
- > hardware
Full Description
This book constitutes the refereed proceedings of the 31st International Conference on Information and Software Technologies, ICIST 2025, held in Kaunas, Lithuania, during October 16-17, 2025.
The 34 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections as follows:Intelligent Methods for Data Analysis and Computer-Aided Software Engineering; Intelligent Systems and Software Engineering Advances; E-Learning Methods and Technologies; E-Health Information Systems; and Cyber Security.
Contents
.- Intelligent Methods for Data Analysis and Computer-Aided Software Engineering
.- Novel Pinch Strategy Using Flexo/Extensor Tendons For A Robotic Scrub Nurse Gripper: A Preliminary Study.
.- A Case Study of Detecting Nutrient Deficiencies in Corn Using Multispectral Satellite Imagery.
.- Suspicious Model Detection to Improve Model-Based System Development.
.- Model-Driven Framework for Embedded Systems Design Automation using Natural Language Processing and Large Language Models.
.- Intelligent Systems and Software Engineering Advances
.- Emotional Speech Synthesis Approach Using Prosody-Based Clustering.
.- Taxonomic Classification of Gene Sequences Using Deep Learning.
.- Improving the Performance of the Ada-DF Framework on Regular and Small Datasets.
.- Deep Generative Models as the Probability Transformation Function.
.- Optimizing SQL-on-Hadoop Engines for Scalable Data Analytics: A Hybrid Approach to Resource Allocation and Performance Tuning.
.- Modern AI Methods Comparison for HeLa Cell Segmentation.
.- Investigation of Provable Data Possession Method for Virtual Machine File System.
.- A Descent-Ascent Principle Based Heuristic Algorithm for the Quadratic Assignment Problem.
.- Optimizing Echo-State Networks for Unemployment Forecasting Using a Modified Metaheuristic.
.- Impact of Smaller Datasets on Training and Fine-Tuning for Novel View Synthesis and 3D Reconstruction.
.- Comparison of a Metaheuristic Algorithm and Enhanced Hybrid Algorithms for Inverse Problem in Computed Tomography.
.- Dynamic Injection of LoRA Adapters via Prompt Semantics for Modular Stylization in Diffusion Models.
.- Enhancing Artificial Bee Colony Performance with Nelder-Mead Method.
.- E-Learning Methods and Technologies
.- Artificial Intelligence and Inclusive Education: What is the Teacher's Vision for the Future?.
.- An Interdisciplinary Approach to Tackling the Field of Human Factors in the Cybersecurity of Financial Organizations: Concepts, Strategies & Recommendations.
.- The Practices of Applying Artificial Intelligence in Engineering Education.
.- E-Health Information Systems
.- Detecting Stressful Driving Situations of Drivers Using Wearable PPG Sensors: A Case Study.
.- Virtual Reality During Wound Dressing Changes and Injections Among Children in Community Nursing: Implementation in Practice.
.- Application of Information Technologies in Healthcare Education, Research and Practice: Lithuanian Case.
.- Structuring Immersion Levels in the Reality-Virtuality Continuum: A Multi-Sensory Approach.
.- Cyber Security
.- A Quantitative Security Framework for Evaluating Cyber Resilience and Energy Efficiency of IoT MQTT Protocol.
.- Data Protection Standards in the Quantum Era.
.- KG-AndroidDefender: Knowledge Graph Embedding for Explainable Malware Family Classification.
.- A Privacy and Security Focused System for Customer Data Management in E-Commerce.
.- Cybersecurity Certification Based Program, for Hardware Security Systems.
.- The Impact of Threats in Cyberspace on the Process of Internet Fragmentation.
.- Deep Neural Network-Based Framework for Enhanced Malware Variant Detection.
.- Strengthening KPI Correlation Analysis with Machine Learning for Deeper Financial Insights.
.- Comparative Analysis of Generative AI Model Efficiency in Chief Information Security Officer (CISO) Tasks.
.- Enhancing Static Code Analysis with AI-Assisted Detection of Security Vulnerabilities and Code Quality Issues.



