Soft Computing and Its Engineering Applications : 7th International Conference, icSoftComp 2025, Hanoi, Vietnam, December 9-11, 2025, Proceedings, Part II (Communications in Computer and Information Science)

個数:
  • 予約

Soft Computing and Its Engineering Applications : 7th International Conference, icSoftComp 2025, Hanoi, Vietnam, December 9-11, 2025, Proceedings, Part II (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032220615

Full Description

This three-volume set CCIS 2873-2875 constitutes the revised selected papers of the 7th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2025, held in Hanoi, Vietnam, during December 9-11, 2025.

The 105 full papers and 7 Short papers included in these volumes were carefully reviewed and selected from 710 submissions. They were organized in topical sections as follows:

Part I: Theory and Methods.
Part II: Theory and Methods; Systems and Applications.
Part III: Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.

Contents

.- Theory and Methods.
 
.- Toward Human-Level Task Automation with Large Action Models.
.- Efficient LLM Framework Using LORA Based Fine Tuning to Analyse Textual Astronomical Data. 
.- ChipClaude: A Framework for Natural Language-Based Hardware Design Using LLM Distillation.
.- FactFrame-X: A Self-Attention-Enhanced NLP Model with XAI for Classifying Hyperpartisan News in Online Media.
.- Linguistic Variations in WhatsApp Chats of Multilingual South Karnataka Natives: A Case Study on Chats Generated by Engineering Student Groups.
.- LLM-Based Vulnerability Detection in Decompiled Binary Code for Automated Reverse Engineering.
.- Collaborative Multi-Agent LLMs for Autonomous Portfolio Management: An Empirical Study of Distributed AI Decision-Making in Financial Markets.
.- Analyzing Library Borrowing Patterns and Predicting Circulation Trends Using Data-Driven Approaches.
.- Automated Segregation, Quality Prediction, and Disease Detection of Pomegranates Using Deep Learning.
.- Discovering the significance of LLM's in Medi-cal Science for Disease Detection.
.- PSKA-UAV: A Pre-Shared Key-Based Authentication Protocol for Secure and Efficient Communication between UAV and GCS.
.- Signature-Based Anomaly-Aware DAG Execution for Efficient Real-Time Data Quality Remediation.
.- Adversarial Robustness in AI-Driven Bioinformatics Pipelines A Cyber-Biosecurity Perspective.
.- SECAT: A Lightweight Image Encryption Scheme using Cellular Automata Rules and Tinkerbell Map for IoT Devices.
.- Lightweight Real-Time Anomaly Detection on IoT Edge Devices Using Machine Learning.
.- Defeating Evasion Attack- An Adversarially Trained Ensemble for Phishing URL Detection.
.- Evaluating an ELiPS-Based CP-ABE Enhancement on Server and IoT Platforms.
.- HAD-IDS: A Hybrid Adversarial Defense Framework for Intrusion Detection Systems.
.- FORMAL-IoT:Formal Models and Adaptive Defense Methodology Against Optical and BLE Side-Channel Attacks on Smart IoT Devices.
.- AI-Powered intelligent assistant for predictive maintenance decision support and automated operational processes: a self-learning approach.
.- An Efficient Scheduling Method for Taxi Ridesharing.
.- A Framework for Prompt-Driven Deep Reinforcement Learning in Modern Predictive Maintenance.
 
.- Systems and Applications.
 
.- A Hybrid AI-Based Model for Secure Image Encryption in Cloud Storage Systems.
.- HERMES: Design and Deployment of a Hybrid AI/ML Network Security System on ARM Clusters for Edge Environments.
.- Enhancing Fake Review Detection with Transformer-Based Embeddings and Behavioral Features.
.- Multiclass Classification of Rice Plant Leaf Diseases Using Image Processing and Vision Transformer (ViT) Deep Neural Network.
.- Performance Evaluation of Clustering Algorithms Applied to Web Services.
.- Rule Based Transliteration System: An Extensive Study.
.- Temporal-Aware Machine and Deep Learning Models for Intrusion Detection Using Engineered Features and UNSW-NB15 Dataset.
.- Cyberbullying Detection Using Machine and Deep Learning Models on a YouTube Dataset.
.- CL-PPIIMS: A Cognitive Load-Based Privacy-Preserving Intelligent Interruption Management System.
.- An Ensemble Machine Learning Based Cyber Attack Detection Framework for IoMT Networks.
.- Enhanced Anomaly Detection in IoT Networks Using Machine Learning and Deep Learning Approaches.
.- Privacy-Preserving ETL Pipelines for Sensitive AI Systems: A Dual-Domain Evaluation Using Differential Privacy.
.- A Robust Parametric Watermarking Framework for Deep Neural Network Ownership Verification.
.- Formal Specification and Verification of Smart Contract Access Control Policies.
.- From Taste to Text: Fine-Tuning ASR for Vietnamese Sensory Evaluation Domain.
.- Morphological and Contour-Based Handwritten English Word Segmentation on IAM Dataset.

最近チェックした商品