| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Computers and their applications/ edited by Ajay Bandi, Mohammad Hossain. |
| Reminder of title: |
40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025 : proceedings / |
| remainder title: |
CATA 2025 |
| other author: |
Bandi, Ajay. |
| corporate name: |
International Conference on Computers and Their Applications |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xi, 252 p. :ill. (chiefly color), digital ;24 cm. |
| [NT 15003449]: |
ALGORITHMS AND AI -- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures -- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting -- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs -- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention -- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology -- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges -- Automated Test Case Generation for Software Testing Using Generative AI -- Ensemble Machine Learning Approach to Phishing Website Detection -- Human Activity Recognition using an Ensemble Learning Approach -- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions -- Design Process of a New Pseudorandom Binary Generator Model -- MACHINE LEARNING AND DATA MINING -- Machine Learning for Real World Water Consumption Forecasting -- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART -- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs -- Using Machine Learning Techniques to Detect Network Intrusions -- SECURITY AND NETWORKING -- A Novel Feature Selection Method for Classification Against Email Phishing -- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks -- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks -- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer science - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-031-92178-0 |
| ISBN: |
9783031921780 |