Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set CCIS 2208-2209 constitutes revised selected papers from the refereed proceedings of the 18th Colombian Congress on Computing, CCC 2024, held in Manizales, Colombia, during September 4-6, 2024. The 50 full papers and 5 short papers included in this book were carefully reviewed and selected from 124 submissions. They were organized in topical sections as follows: Artificial Intelligence; Pattern recognition and computer vision; Computational statistics and formal methods; Cyber security and information security; Data, information and knowledge; ICT for education and…mehr
This two-volume set CCIS 2208-2209 constitutes revised selected papers from the refereed proceedings of the 18th Colombian Congress on Computing, CCC 2024, held in Manizales, Colombia, during September 4-6, 2024.
The 50 full papers and 5 short papers included in this book were carefully reviewed and selected from 124 submissions. They were organized in topical sections as follows: Artificial Intelligence; Pattern recognition and computer vision; Computational statistics and formal methods; Cyber security and information security; Data, information and knowledge; ICT for education and e-Learning; Industry 4.0 and digital transformation; Software engineering and automation.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
.- Artificial Intelligence. .- Neuropathic Pain Detection through Embedding Synergies of Deep Language and Image Models. .- Detection of depressive symptomatology in written narratives in Spanish using machine learning and semantic ontology. .- Unveiling Tourist Profiles in the Department of Sucre: A Text Analysis Approach. .- Ethical norms and literary visions: A comparative analysis of Artificial Intelligence in regulatory frameworks and science fiction. .- Application of Artificial Intelligence to Stock Market Investments: RSI Analysis with Genetic Algorithms and Neural Networks. .- A Study of U-Net-based Architectures for Segmenting COVID-19 Lung Lesions. .- Hyperparameter Optimization of Multi-Layer Perceptron-based Predictors. .- Emotional BDI Model (eBDI) of the Peasants Families WellProdSim Social Simulator. .- Pattern recognition and computer vision. .- Analysis of Pre-Trained Convolutional Neural Network Models in Diabetic Macular Edema Detection Through Retinal Fundus Images. .- Gaussian Mixture Connectivity with Alpha-Renyi Regularization for EEG-based MI Classification. .- Optimisation of User Interaction for the Calculation of the Cobb Angle in Lumbar Spine MR Images. .- Implementation of Convolutional Neural Networks for Automated Disease Detection in Cucumber Crops. .- Automatic Disease Detection in Physalis Peruviana Based on Image, a review systematic. .- Computational statistics and formal methods. .- On missing values and the imputation in learning neural networks. .- Formalisation of Hall's Theorem for Countable Infinite Graphs. .- Efficient Strategies for Finding the Minimum Information Partition in Integrated Information Theory 3.0. .- Decomposition models for agricultural commodity price time series: A comparative research. .- Cyber security and information security. .- Feature Selection in Machine Learning-Based IDS Performance. .- Exploring Advanced Deep Learning Methods for Image Steganography: New Approaches to Concealing Videos Within Videos. .- Automated Machine Learning Prototype for Detecting Phishing, Deepfakes, and Fraudulent Audio Patterns: A Systematic Literature Mapping. .- Entropy wall for symmetric cryptographic key generation through frame processing. .- Transparency and security in tourism: exploring the potential of blockchain technology. .- Vulnerability analysis of IoT devices (IP cameras) in Oca na Norte de Santander. .- Safeguarding Connected Autonomous Vehicles: A Cybersecurity Perspective.
.- Artificial Intelligence. .- Neuropathic Pain Detection through Embedding Synergies of Deep Language and Image Models. .- Detection of depressive symptomatology in written narratives in Spanish using machine learning and semantic ontology. .- Unveiling Tourist Profiles in the Department of Sucre: A Text Analysis Approach. .- Ethical norms and literary visions: A comparative analysis of Artificial Intelligence in regulatory frameworks and science fiction. .- Application of Artificial Intelligence to Stock Market Investments: RSI Analysis with Genetic Algorithms and Neural Networks. .- A Study of U-Net-based Architectures for Segmenting COVID-19 Lung Lesions. .- Hyperparameter Optimization of Multi-Layer Perceptron-based Predictors. .- Emotional BDI Model (eBDI) of the Peasants Families WellProdSim Social Simulator. .- Pattern recognition and computer vision. .- Analysis of Pre-Trained Convolutional Neural Network Models in Diabetic Macular Edema Detection Through Retinal Fundus Images. .- Gaussian Mixture Connectivity with Alpha-Renyi Regularization for EEG-based MI Classification. .- Optimisation of User Interaction for the Calculation of the Cobb Angle in Lumbar Spine MR Images. .- Implementation of Convolutional Neural Networks for Automated Disease Detection in Cucumber Crops. .- Automatic Disease Detection in Physalis Peruviana Based on Image, a review systematic. .- Computational statistics and formal methods. .- On missing values and the imputation in learning neural networks. .- Formalisation of Hall's Theorem for Countable Infinite Graphs. .- Efficient Strategies for Finding the Minimum Information Partition in Integrated Information Theory 3.0. .- Decomposition models for agricultural commodity price time series: A comparative research. .- Cyber security and information security. .- Feature Selection in Machine Learning-Based IDS Performance. .- Exploring Advanced Deep Learning Methods for Image Steganography: New Approaches to Concealing Videos Within Videos. .- Automated Machine Learning Prototype for Detecting Phishing, Deepfakes, and Fraudulent Audio Patterns: A Systematic Literature Mapping. .- Entropy wall for symmetric cryptographic key generation through frame processing. .- Transparency and security in tourism: exploring the potential of blockchain technology. .- Vulnerability analysis of IoT devices (IP cameras) in Oca na Norte de Santander. .- Safeguarding Connected Autonomous Vehicles: A Cybersecurity Perspective.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826