Computational Intelligence in Engineering Science
First International Conference, ICCIES 2025, Ho Chi Minh City, Vietnam, July 23-25, 2025, Proceedings, Part III
Herausgegeben:Nguyen, Ngoc Thanh; Pham, Van Huy; Tran, Trong Dao; Hong, Tzung-Pei; Manolopoulos, Yannis; Le Khac, Nhien An; Tin, Phu Tran
Computational Intelligence in Engineering Science
First International Conference, ICCIES 2025, Ho Chi Minh City, Vietnam, July 23-25, 2025, Proceedings, Part III
Herausgegeben:Nguyen, Ngoc Thanh; Pham, Van Huy; Tran, Trong Dao; Hong, Tzung-Pei; Manolopoulos, Yannis; Le Khac, Nhien An; Tin, Phu Tran
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This four-volume set constitutes the refereed proceedings of the First International Conference on on Computational Intelligence in Engineering Science, ICCIES 2025, in Ho Chi Minh City, Vietnam, during July 23 25, 2025.
The 115 full papers presented in these proceedings were carefully reviewed and selected from 210 submissions. The papers are organized in the following topical sections:
Part I: Machine Learning; Wireless Networks (6G)
Part II: Computer Vision; Natural Language Processing
Part III: Intelligent Systems; Internet of Things
Part IV: Machine Learning; Control Systems …mehr
Andere Kunden interessierten sich auch für
- Statistical Atlases and Computational Models of the Heart. Regular and CMRxMotion Challenge Papers67,99 €
- New Developments and Environmental Applications of Drones104,99 €
- Image and Vision Computing67,99 €
- Statistical Atlases and Computational Models of the Heart. Regular and CMRxRecon Challenge Papers52,99 €
- Artificial Intelligence over Infrared Images for Medical Applications and Medical Image Assisted Biomarker Discovery41,99 €
- Machine Learning in Medical Imaging44,99 €
- Computational Mathematics Modeling in Cancer Analysis41,99 €
-
-
-
This four-volume set constitutes the refereed proceedings of the First International Conference on on Computational Intelligence in Engineering Science, ICCIES 2025, in Ho Chi Minh City, Vietnam, during July 23 25, 2025.
The 115 full papers presented in these proceedings were carefully reviewed and selected from 210 submissions. The papers are organized in the following topical sections:
Part I: Machine Learning; Wireless Networks (6G)
Part II: Computer Vision; Natural Language Processing
Part III: Intelligent Systems; Internet of Things
Part IV: Machine Learning; Control Systems
The 115 full papers presented in these proceedings were carefully reviewed and selected from 210 submissions. The papers are organized in the following topical sections:
Part I: Machine Learning; Wireless Networks (6G)
Part II: Computer Vision; Natural Language Processing
Part III: Intelligent Systems; Internet of Things
Part IV: Machine Learning; Control Systems
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2586
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-98166-1
- Seitenzahl: 341
- Erscheinungstermin: August 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031981661
- Artikelnr.: 74340755
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2586
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-98166-1
- Seitenzahl: 341
- Erscheinungstermin: August 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031981661
- Artikelnr.: 74340755
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Intelligent Systems.
.- Skeleton-based action recognition based on dynamic adaptive spatial graph convolution neural network.
.- Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect.
.- A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY.
.- Improved Greedy Algorithms for the Set Covering Problem.
.- Blockchain-Based Detection of Unauthorized Data Modification in Database.
.- A Secure Identity-based Schnorr Multi-Signature Scheme.
.- An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing.
.- Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo.
.- Game Theory Approaches for Pok´emon AI Battle Simulation.
.- LOC-based Instruction Selection for Statistical Root Cause Analysis.
.- A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems.
.- Digital document signing solution without PKI infrastructure for small and medium enterprises.
.- Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis.
.- Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises.
.- Option pricing problems in the Heston Model using Discretization and Neural Networks.
.- Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective.
.- Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction.
.- Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models.
.- Internet of Things.
.- Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted
Edge Content Delivery Networks.
.- A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks.
.- Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81.
.- BiAS: Transforming Cyber Defense - A Deep Learning Approach for APT Detection.
.- Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor.
.- Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform.
.- Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment.
.- Skeleton-based action recognition based on dynamic adaptive spatial graph convolution neural network.
.- Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect.
.- A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY.
.- Improved Greedy Algorithms for the Set Covering Problem.
.- Blockchain-Based Detection of Unauthorized Data Modification in Database.
.- A Secure Identity-based Schnorr Multi-Signature Scheme.
.- An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing.
.- Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo.
.- Game Theory Approaches for Pok´emon AI Battle Simulation.
.- LOC-based Instruction Selection for Statistical Root Cause Analysis.
.- A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems.
.- Digital document signing solution without PKI infrastructure for small and medium enterprises.
.- Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis.
.- Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises.
.- Option pricing problems in the Heston Model using Discretization and Neural Networks.
.- Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective.
.- Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction.
.- Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models.
.- Internet of Things.
.- Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted
Edge Content Delivery Networks.
.- A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks.
.- Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81.
.- BiAS: Transforming Cyber Defense - A Deep Learning Approach for APT Detection.
.- Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor.
.- Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform.
.- Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment.
.- Intelligent Systems.
.- Skeleton-based action recognition based on dynamic adaptive spatial graph convolution neural network.
.- Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect.
.- A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY.
.- Improved Greedy Algorithms for the Set Covering Problem.
.- Blockchain-Based Detection of Unauthorized Data Modification in Database.
.- A Secure Identity-based Schnorr Multi-Signature Scheme.
.- An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing.
.- Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo.
.- Game Theory Approaches for Pok´emon AI Battle Simulation.
.- LOC-based Instruction Selection for Statistical Root Cause Analysis.
.- A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems.
.- Digital document signing solution without PKI infrastructure for small and medium enterprises.
.- Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis.
.- Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises.
.- Option pricing problems in the Heston Model using Discretization and Neural Networks.
.- Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective.
.- Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction.
.- Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models.
.- Internet of Things.
.- Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted
Edge Content Delivery Networks.
.- A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks.
.- Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81.
.- BiAS: Transforming Cyber Defense - A Deep Learning Approach for APT Detection.
.- Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor.
.- Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform.
.- Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment.
.- Skeleton-based action recognition based on dynamic adaptive spatial graph convolution neural network.
.- Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect.
.- A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY.
.- Improved Greedy Algorithms for the Set Covering Problem.
.- Blockchain-Based Detection of Unauthorized Data Modification in Database.
.- A Secure Identity-based Schnorr Multi-Signature Scheme.
.- An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing.
.- Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo.
.- Game Theory Approaches for Pok´emon AI Battle Simulation.
.- LOC-based Instruction Selection for Statistical Root Cause Analysis.
.- A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems.
.- Digital document signing solution without PKI infrastructure for small and medium enterprises.
.- Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis.
.- Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises.
.- Option pricing problems in the Heston Model using Discretization and Neural Networks.
.- Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective.
.- Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction.
.- Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models.
.- Internet of Things.
.- Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted
Edge Content Delivery Networks.
.- A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks.
.- Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81.
.- BiAS: Transforming Cyber Defense - A Deep Learning Approach for APT Detection.
.- Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor.
.- Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform.
.- Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment.