The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601387
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601462
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601424
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of intelligentcomputing: theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The rapid growth of the Internet of Things (IoT) has created a pressing need for efficient service allocation methods to manage the multitude of connected devices. Edge computing has become essential to fulfill the lo...
详细信息
ISBN:
(纸本)9783031814037;9783031814044
The rapid growth of the Internet of Things (IoT) has created a pressing need for efficient service allocation methods to manage the multitude of connected devices. Edge computing has become essential to fulfill the low-latency and high-bandwidth demands of IoT applications. This paper investigates the use of game theory as a framework for optimizing service allocation in edge computing environments. By treating the interactions between IoT devices and edge servers as a strategic game, we propose strategies to achieve optimal allocation and resource utilization. Our approach tackles key challenges such as minimizing latency, improving energy efficiency, and balancing load. Experimental results indicate that game-theoretic methods greatly improve the performance and scalability of IoT systems in edge computing, positioning them a promising solution for future applications.
The proceedings contain 21 papers. The special focus in this conference is on Distributed computing and intelligent Technology. The topics include: Invited Paper: Application of Physics-Based and Data-Driven...
ISBN:
(纸本)9783031814037
The proceedings contain 21 papers. The special focus in this conference is on Distributed computing and intelligent Technology. The topics include: Invited Paper: Application of Physics-Based and Data-Driven Approaches for Drug-Like Property Prediction;invited Paper: Distributed Computability: A Few Results Masters Students Should Know;ioT-Based Service Allocation in Edge computing Using Game theory;Exploring Hidden Behaviors in OpenMP Multi-threaded applications for Anomaly Detection in HPC Environments;a "Symbolic" Representation of Object-Nets;optimal Dispersion in Triangular Grids: Achieving Efficiency Without Prior Knowledge;mobile Agents on Chordal Graphs: Maximum Independent Set and Beyond;faster Leader Election and Its applications for Mobile Agents with Parameter Advice;a Novel Protocol for Mitigating Wormhole Attack in Multi-hop Payment Channels;unleashing Multicore Strength for Efficient Execution of Blockchain Transactions;Enhancing QR Decomposition: A GPU-Based Approach to Parallelizing the Householder Algorithm with CUDA Streams;source Sets in Temporal Graphs;team Formation Based on the Degree Distribution of the Social Networks;invideo Search: Scene Description Clustering and Integrating Image and Audio Captioning for Enhanced video Search;does Data Balancing Impact Stutter Detection and Classification?;deep Learning-Driven Person Re-identification: Leveraging Color Space Transformations;an Ensembled Parking Space Classifier Across Diverse Weather Conditions;classification of Impacted Teeth from Panoramic Radiography Using Deep Learning;HJCFL: Hashcash and Jaya-Based Communication Efficient Federated Learning.
The proceedings contain 86 papers. The special focus in this conference is on Advances in Information Communication Technology and computing. The topics include: Universal Representation theory—Rigour II;revolutioniz...
ISBN:
(纸本)9789819761050
The proceedings contain 86 papers. The special focus in this conference is on Advances in Information Communication Technology and computing. The topics include: Universal Representation theory—Rigour II;revolutionizing Smart Cities: A Data-Driven Traffic Monitoring System for Real-Time Traffic Density Estimation and visualization;Assessing the Influence of Self-service Technology on WOM: The Role of Customer Satisfaction;Universal Representation theory—applications II;enhancing Performance of Machine Learning Models in Healthcare: An Analytical Framework for Assessing and Improving Data Quality;evaluating the Enhancement of Cognitive Skills and Acquisition of New Skills in an Environment of Different video Game Genres;hySeg-Net: A Robust Interactive Hybrid Technique for Image Segmentation and Classification in Hand Gesture Recognition;web Vulnerability Scanner;digitalization of Educational Resources in Pre-tertiary Education in Ghana: Assessing Impact, Challenges, and Opportunities in Enhancing Learning Outcomes;interconnected Through Robotic System in English Foreign Language Education;transferability Cybersocialization as a Digital Civility Through Artificial Intelligence-Based Design Thinking Mindset to Modern Pedagogy;fog computing in Healthcare: Enhancing Recommendations and Real-Time Monitoring;enhancing Bank Consumer Retention: A Comprehensive Analysis of Churn Prediction Using Machine-Learning and Deep Learning Techniques;a Contemporary Model of Kazakh National Pedagogy in the Era of Technology: theory-Based Design Framework;the Future of Post-harvest Logistics: The Cold Chain Practices with Blockchain, IoT, and FinTech;diagnosing Sexually Transmitted Disease in Females: Leveraging Dimensionality Reduction and Machine Learning;a Systematic Review of Optimal Task Scheduling Methods Using Machine Learning in Cloud computing Environments;intelligent Urban Futures: Exploring AI and Machine Learning applications in Smart Cities.
This paper examines security concerns in Android applications arising from violations to the principle of least privilege. Using mobile security framework (MobSF), static and dynamic analysis techniques were used in e...
详细信息
Low-latency communication is critical for effectively functioning Internet of Things (IoT) systems, including applications in healthcare monitoring, industrial automation, and smart cities. However, the vast number of...
详细信息
The effectiveness of traditional employee training methods is limited by engagement and skill development. This paper explores the growing trend of game-based employee training, comparing its application in business a...
详细信息
Triangle counting is a critical problem in graph theory and network analysis, with widespread applications in social network analysis, network science, and bioinformatics. Dynamic graphs are extensively utilized in va...
详细信息
暂无评论