SALE ON NOW! PROMOTIONS

Close Notification

Your cart does not contain any items

Computers and Their Applications

40th International Conference, CATA 2025, San Francisco, CA, USA, March 17–18, 2025, Proceedings...

Ajay Bandi Mohammad Hossain

$211.95   $169.25

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer International Publishing AG
26 June 2025
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025. 

The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;

M machine learning and data mining; and security and networking.
Edited by:   ,
Imprint:   Springer International Publishing AG
Country of Publication:   Switzerland
Volume:   2435
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783031921773
ISBN 10:   3031921771
Series:   Communications in Computer and Information Science
Pages:   252
Publication Date:  
Audience:   Professional and scholarly ,  College/higher education ,  Undergraduate ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.

See Also