Soft Computing and Its Engineering Applications : 7th International Conference, icSoftComp 2025, Hanoi, Vietnam, December 9-11, 2025, Proceedings, Part II (Communications in Computer and Information Science)

個数:
  • 予約
  • ポイントキャンペーン

Soft Computing and Its Engineering Applications : 7th International Conference, icSoftComp 2025, Hanoi, Vietnam, December 9-11, 2025, Proceedings, Part II (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032220615

Description

This three-volume set CCIS 2873-2875 constitutes the revised selected papers of the 7th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2025, held in Hanoi, Vietnam, during December 9 11, 2025.

The 105 full papers and 7 Short papers included in these volumes were carefully reviewed and selected from 710 submissions. They were organized in topical sections as follows:

Part I: Theory and Methods.
Part II: Theory and Methods; Systems and Applications.
Part III: Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.

.- Theory and Methods. .- Toward Human-Level Task Automation with Large Action Models..- Efficient LLM Framework Using LORA Based Fine Tuning to Analyse Textual Astronomical Data. .- ChipClaude: A Framework for Natural Language-Based Hardware Design Using LLM Distillation..- FactFrame-X: A Self-Attention-Enhanced NLP Model with XAI for Classifying Hyperpartisan News in Online Media..- Linguistic Variations in WhatsApp Chats of Multilingual South Karnataka Natives: A Case Study on Chats Generated by Engineering Student Groups..- LLM-Based Vulnerability Detection in Decompiled Binary Code for Automated Reverse Engineering..- Collaborative Multi-Agent LLMs for Autonomous Portfolio Management: An Empirical Study of Distributed AI Decision-Making in Financial Markets..- Analyzing Library Borrowing Patterns and Predicting Circulation Trends Using Data-Driven Approaches..- Automated Segregation, Quality Prediction, and Disease Detection of Pomegranates Using Deep Learning..- Discovering the significance of LLM s in Medi-cal Science for Disease Detection..- PSKA-UAV: A Pre-Shared Key-Based Authentication Protocol for Secure and Efficient Communication between UAV and GCS..- Signature-Based Anomaly-Aware DAG Execution for Efficient Real-Time Data Quality Remediation..- Adversarial Robustness in AI-Driven Bioinformatics Pipelines A Cyber-Biosecurity Perspective..- SECAT: A Lightweight Image Encryption Scheme using Cellular Automata Rules and Tinkerbell Map for IoT Devices..- Lightweight Real-Time Anomaly Detection on IoT Edge Devices Using Machine Learning..- Defeating Evasion Attack- An Adversarially Trained Ensemble for Phishing URL Detection..- Evaluating an ELiPS-Based CP-ABE Enhancement on Server and IoT Platforms..- HAD-IDS: A Hybrid Adversarial Defense Framework for Intrusion Detection Systems..- FORMAL-IoT:Formal Models and Adaptive Defense Methodology Against Optical and BLE Side-Channel Attacks on Smart IoT Devices..- AI-Powered intelligent assistant for predictive maintenance decision support and automated operational processes: a self-learning approach..- An Efficient Scheduling Method for Taxi Ridesharing..- A Framework for Prompt-Driven Deep Reinforcement Learning in Modern Predictive Maintenance. .- Systems and Applications. .- A Hybrid AI-Based Model for Secure Image Encryption in Cloud Storage Systems..- HERMES: Design and Deployment of a Hybrid AI/ML Network Security System on ARM Clusters for Edge Environments..- Enhancing Fake Review Detection with Transformer-Based Embeddings and Behavioral Features..- Multiclass Classification of Rice Plant Leaf Diseases Using Image Processing and Vision Transformer (ViT) Deep Neural Network..- Performance Evaluation of Clustering Algorithms Applied to Web Services..- Rule Based Transliteration System: An Extensive Study..- Temporal-Aware Machine and Deep Learning Models for Intrusion Detection Using Engineered Features and UNSW-NB15 Dataset..- Cyberbullying Detection Using Machine and Deep Learning Models on a YouTube Dataset..- CL-PPIIMS: A Cognitive Load-Based Privacy-Preserving Intelligent Interruption Management System..- An Ensemble Machine Learning Based Cyber Attack Detection Framework for IoMT Networks..- Enhanced Anomaly Detection in IoT Networks Using Machine Learning and Deep Learning Approaches..- Privacy-Preserving ETL Pipelines for Sensitive AI Systems: A Dual-Domain Evaluation Using Differential Privacy..- A Robust Parametric Watermarking Framework for Deep Neural Network Owne

最近チェックした商品