Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book offers a broad range of ideas from CoMeSySo 2024, highlighting theory and practice in modern computing. Researchers from diverse backgrounds present their latest findings on systems design, software engineering, and innovative problem-solving. Topics include new methods to improve modeling, testing, and optimization across various fields. This book also shows how data-driven approaches and well-structured architectures can increase reliability. These proceedings foster meaningful teamwork and shared learning by bringing together experts from many areas. Readers will gain insights into advanced techniques that can be adapted to real-world situations. Industry specialists, academic researchers, and students will benefit from the breadth of approaches. Case studies reveal common hurdles and present workable solutions for upcoming challenges. With a clear focus on advancement, this resource is an essential guide to the next steps in computational development.
Model of Activity as a Logically Interconnected Set of Mechanisms.- Evaluation of Predictive Models in the Justice Sector: A Comparison between Random Forest and Gradient Boosting.- Designing an automated system to optimize warehouse operations.- Tests and Pentesting Methods for Identifying Vulnerabilities in IoT Devices: A Systematic Review.- Phishing Detection in IoT Networks using Machine Learning: A Systematic Review.- Promoting information privacy protection awareness for middle-aged mobile users.- Wafer-Level Root Cause Detection with Association Rule Mining Based on Recalculated Metrics and Interaction Effects.- Virtual Reality-Based Solutions for Teaching Mathematical Skills to Primary School Students: A Systematic Review.- Developing a Big Data Governance Model to Improve Service Delivery in the South African Public Sector.- Methodological aspects of using online survey services in sociological research.- Framework for User Behavior Analytics in Physical Access Control Systems.- Visual Analysis of Students' Academic Performance in E-learning.- Student Recognition Under Stress Using Machine Learning Techniques.- Designing architecture for long-running processes with microservices, event-driven architecture and websockets to enchance the user experience.- Prospects for using ensemble machine learning methods for predicting credit defaults.- Implementation of a B-learning Platform to Strengthen Distance Learning in Communication Courses in a Basic Education School.- Network-Oriented Computational Analysis of Cyber-Attacks.- Intrusion Detection Solutions in IoT Networks Using Honeypot: A Systematic Review.- UML-Based Design of Intelligence Job System in Smart Agricultural.- Investigation of Sensitivity of Composite Resonant Frequency Pressure Sensor.- Studying of Mechanical Parameters of Sensing Element of Composite Resonant Frequency Pressure Sensor.- Biometric Fingerprint Identification Using the Frustrated Total Internal Reflection Method.- Measurement of Electrical Parameters of a Photovoltaic Graetzel Cell with Silver Nanoparticles.- Optical and Structural Properties of the Polycrystalline Eu2+ Li2CaSiO4 and Li2SrxCa1-xSiO4:Eu0.002.- Anemia Detection Model for Pregnant Women in Peru using Machine Learning and Deep Learning.- Challenges of Implementing CRM Software in a Business Environment: A Case Study.- Ethics for Information and Communication Technology: Critical Insights into Building Social Harmony.- Digital technology system adaptation and adoption: Insights into Administrative Management Framework System.- Digital Information System for Knowledge Acquisition Design: Insights from Empirical Literature Analysis.- Virtual Reality-Oriented Design for Instruction Process: A Critical Review.- Artificial Intelligence-based Medium of Instruction Design: An Empirical Literature Review.- Resilient Intelligent Software for Self-Driving Cars via Heterogeneous Neural Redundancy.- Designing AWS Infrastructure to meet the demands of high-frequency workloads.- Optimizing Railcar Diagnostic Operations Using Machine Learning for Predictive Maintenance of Deterministic Failure Events.- Numerical Modeling of the Effects of Horizontal Turbulent Viscosity Coefficient on the Example of Spring Thermal Bar Development in Lake Dolgoye, Belarus.- Markov Regime-Switching Modeling of Passenger Flow in A Suburban Area Based On Anonymized Telecommunications Data.- Implementation of Augmented Reality in Social Networks for Mathematics Learning in Primary Education.- A hybrid variant of the Koch curve and islands using a vectorial approach with Mathematica.- Integrated Data Analytics and Machine Learning Approaches for Predictive Maintenance to Reduce Service Affective Failures in Rail Systems.- Exploring the Cybersecurity Scene in SMEs through a Systematic Review.- Sysematic Review - Innovations in Virtual Reality: Applications and Methods in Electronic Sports.- BashWatch: Monitoring Your Devices with Command-Line Clarity.- Method for Integrating Intelligent Sensors into Distributed Monitoring Systems Using Distributed Ledger Technology.- Fuzzy Prediction of Risk Management of Adaptive Learning Process in E-learning.- Automatic Control of the Combustion Chamber Temperature in a Circulating Fluidized Bed Boiler.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.