دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Barolli. Leonard, Wang. Xu An, Zhang. Mingwu سری: Lecture Notes on Data Engineering and Communications Technologies 6 ISBN (شابک) : 9783319594637, 9783319594620 ناشر: Springer سال نشر: 2018 تعداد صفحات: 806 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 75 مگابایت
کلمات کلیدی مربوط به کتاب پیشرفت در کار در اینترنت ، فناوری های داده و وب: پنجمین کنفرانس بین المللی ظهور اینترنت ، فناوری های داده و وب (EIDWT-2017): شبکه های کامپیوتری -- کنگره ها ، رایانش ابری -- کنگره ها ، اینترنت -- کنگره ها ، کامپیوتر / سواد کامپیوتر ، کامپیوتر / علوم کامپیوتر ، کامپیوتر / پردازش داده ها ، کامپیوتر / سخت افزار / عمومی ، کامپیوتر / فناوری اطلاعات ، کامپیوتر / تئوری ماشین ، کامپیوتر / مرجع، محاسبات ابری، شبکه های کامپیوتری، اینترنت
در صورت تبدیل فایل کتاب Advances in internetworking, data & web technologies : the 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT-2017) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب پیشرفت در کار در اینترنت ، فناوری های داده و وب: پنجمین کنفرانس بین المللی ظهور اینترنت ، فناوری های داده و وب (EIDWT-2017) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب آخرین یافتههای تحقیقاتی، نتایج تحقیقات نوآورانه، روشها و تکنیکهای توسعه را از منظر نظری و عملی در حوزههای نوظهور شبکههای اطلاعات، دادهها و فناوریهای وب برجسته میکند. این مقاله مقالاتی را که در پنجمین کنفرانس بینالمللی کار اینترنتی نوظهور، داده ارائه شده بود، جمعآوری میکند
This book highlights the latest research findings, innovative
research results, methods and development techniques, from both
theoretical and practical perspectives, in the emerging areas
of information networking, data and Web technologies. It
gathers papers originally presented at the 5th International
Conference on Emerging Internetworking, Data & Web Technologies
(EIDWT-2017) held 10?11 June 2017 in Wuhan, China. The conference is
dedicated to the dissemination of original contributions that
are related to the theories, practices and concepts of emerging
internetworking and data technologies ? and most importantly,
to how they can be applied in business and academia to achieve
a collective intelligence approach. Information networking,
data and Web technologies are currently undergoing a rapid
evolution. As a result, they are now expected to manage
increasing usage demand, provide support for a significant
number of services, consistently deliver Quality of Service
(QoS), and optimize network resources. Highlighting these
aspects, the book discusses methods and practices that combine
various internetworking and emerging data technologies to
capture, integrate, analyze, mine, annotate, and visualize
data, and make it available for various users and
applications. Read
more...
Abstract: This book highlights the latest research findings,
innovative research results, methods and development
techniques, from both theoretical and practical perspectives,
in the emerging areas of information networking, data and Web
technologies. It gathers papers originally presented at the 5th
International Conference on Emerging Internetworking, Data &
Web Technologies (EIDWT-2017) held 10?11 June 2017 in Wuhan,
China. The conference is dedicated to the dissemination of
original contributions that are related to the theories,
practices and concepts of emerging internetworking and data
technologies ? and most importantly, to how they can be applied
in business and academia to achieve a collective intelligence
approach. Information networking, data and Web technologies are
currently undergoing a rapid evolution. As a result, they are
now expected to manage increasing usage demand, provide support
for a significant number of services, consistently deliver
Quality of Service (QoS), and optimize network resources.
Highlighting these aspects, the book discusses methods and
practices that combine various internetworking and emerging
data technologies to capture, integrate, analyze, mine,
annotate, and visualize data, and make it available for various
users and applications
Front Matter....Pages i-xxix
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble....Pages 1-12
Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem....Pages 13-21
Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network....Pages 22-33
Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN Scenario....Pages 34-42
A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining....Pages 43-53
A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts....Pages 54-63
Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study....Pages 64-74
Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based Systems....Pages 75-88
A User Prediction and Identification System for Tor Networks Using ARIMA Model....Pages 89-97
Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition....Pages 98-106
Designing the Light Weight Rotation Boolean Permutation on Internet of Things....Pages 107-118
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering....Pages 119-125
Numerical Simulation for the Nonlinear Elliptic Problem....Pages 126-137
Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion....Pages 138-149
Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement....Pages 150-159
A Deep Network with Composite Residual Structure for Handwritten Character Recognition....Pages 160-166
An Ensemble Hashing Framework for Fast Image Retrieval....Pages 167-177
A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment....Pages 178-186
Automatic Kurdish Text Classification Using KDC 4007 Dataset....Pages 187-198
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm....Pages 199-211
A New Middleware Architecture for RFID Data Management....Pages 212-221
Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE....Pages 222-232
Design and Implementation of Simulated DME/P Beaconing System Based on FPGA....Pages 233-242
LDPC Codes Estimation Model of Decoding Parameter and Realization....Pages 243-252
A Novel Query Extension Method Based on LDA....Pages 253-261
Target Recognition Method Based on Multi-class SVM and Evidence Theory....Pages 262-272
Selective Ensemble Based on Probability PSO Algorithm....Pages 273-280
The Research of QoS Monitoring-Based Cloud Service Selection....Pages 281-288
Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny....Pages 289-297
Perception Mining of Network Protocol’s Dormant Behavior....Pages 298-307
Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation....Pages 308-313
Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual Classrooms....Pages 314-327
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation....Pages 328-339
A New Broadcast Encryption Scheme for Multi Sets....Pages 340-348
Key Encapsulation Mechanism from Multilinear Maps....Pages 349-357
An Multi-hop Broadcast Protocol for VANETs....Pages 358-366
DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark....Pages 367-377
Technique for Image Fusion Based on PCNN and Convolutional Neural Network....Pages 378-389
Fast Iterative Reconstruction Based on Condensed Hierarchy Tree....Pages 390-399
An Optimal Model of Web Cache Based on Improved K-Means Algorithm....Pages 400-411
Detecting Crowdsourcing Spammers in Community Question Answering Websites....Pages 412-423
A Spam Message Detection Model Based on Bayesian Classification....Pages 424-435
Spam Mail Filtering Method Based on Suffix Tree....Pages 436-447
MP3 Audio Watermarking Algorithm Based on Unipolar Quantization....Pages 448-456
Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System....Pages 457-466
An Unconstrained Face Detection Algorithm Based on Visual Saliency....Pages 467-474
Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image....Pages 475-488
Compressed Video Sensing with Multi-hypothesis Prediction....Pages 489-496
Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol....Pages 497-508
A Combined Security Scheme for Network Coding....Pages 509-517
Gaussian Scale Patch Group Sparse Representation for Image Restoration....Pages 518-523
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding....Pages 524-531
A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction....Pages 532-540
Building Real-Time Travel Itineraries Using ‘off-the-shelf’ Data from the Web....Pages 541-552
Energy Efficient Integration of Renewable Energy Sources in Smart Grid....Pages 553-562
Cost and Comfort Based Optimization of Residential Load in Smart Grid....Pages 563-572
Efficient Utilization of HEM Controller Using Heuristic Optimization Techniques....Pages 573-584
A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature....Pages 585-591
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment....Pages 592-602
Improved Online/Offline Attribute Based Encryption and More....Pages 603-610
On the Security of a Cloud Data Storage Auditing Protocol IPAD....Pages 611-617
LF-LDA: A Topic Model for Multi-label Classification....Pages 618-628
Data Analysis for Infant Formula Nutrients....Pages 629-636
A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise....Pages 637-644
A Model Profile for Pattern-Based Definition and Verification of Composite Cloud Services....Pages 645-656
A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks....Pages 657-666
Cyber-Attack Risks Analysis Based on Attack-Defense Trees....Pages 667-678
Multi-focus Image Fusion Method Based on NSST and IICM....Pages 679-689
Pilot Contamination Elimination in Massive MIMO Systems....Pages 690-701
Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm....Pages 702-711
A Kind of Improved Hidden Native Bayesian Classifier....Pages 712-720
Study of a Disaster Relief Troop’s Transportation Problem Based on Minimum Cost Maximum Flow....Pages 721-733
A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional Features....Pages 734-746
Multi-target Detection of FMCW Radar Based on Width Filtering....Pages 747-755
DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX....Pages 756-766
Research on CSER Rumor Spreading Model in Online Social Network....Pages 767-775
Back Matter....Pages 777-779