دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino (eds.) سری: Information Systems and Applications, incl. Internet/Web, and HCI 10602 ISBN (شابک) : 9783319685045, 9783319685052 ناشر: Springer International Publishing سال نشر: 2017 تعداد صفحات: 581 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 51 مگابایت
در صورت تبدیل فایل کتاب Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ابر رایانه و امنیت: سومین کنفرانس بین المللی، ICCCS 2017، نانجینگ، چین، 16-18 ژوئن، 2017، مقالات منتخب تجدید نظر، قسمت اول نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این مجموعه دو جلدی LNCS 10602 و LNCS 10603 مجموعه مقالات پس از کنفرانس کاملاً
ارجاعی شده از سومین کنفرانس بین المللی
Cloud Computing و امنیت، ICCCS 2017 را تشکیل می دهد. ، در نانجینگ،
چین، در ژوئن 2017 برگزار شد.
116 مقاله کامل و 11 مقاله کوتاه از این مجلدها با دقت انجام شد
< p> بررسی و از بین 391 مورد ارسالی انتخاب شد. مقالاتدر بخش های موضوعی مانند: پنهان کردن اطلاعات سازماندهی شده اند. پردازش ابری؛ برنامه های IOT
; امنیت اطلاعات؛ برنامه های چند رسانه ای؛ بهینه سازی
و طبقه بندی.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly
refereed post-conference proceedings of the Third International
Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing,
China, in June 2017.
The 116 full papers and 11 short papers of these volumes were carefully
reviewed and selected from 391 submissions. The papers are organized
in topical sections such as: information hiding; cloud computing; IOT
applications; information security; multimedia applications; optimization
and classification.
Front Matter ....Pages I-XXI
Front Matter ....Pages 1-1
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling (Fei Peng, Shuai-ping Wang, Gang Luo, Min Long)....Pages 3-15
A New Universal Quantum Gates and Its Simulation on GPGPU (Huimin Luo, Jiabin Yuan, Wenjing Dai)....Pages 16-27
Data Hiding-Based Video Error Concealment Method Using Compressed Sensing (Yanli Chen, Hongxia Wang, Hanzhou Wu)....Pages 28-38
A Novel Robust Reversible Watermarking Scheme Based on IWT (Shuang Yu, Jian Li, Jinwei Wang)....Pages 39-48
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images (Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel)....Pages 49-60
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points (Yong Liu, Hong-Xia Wang, Han-Zhou Wu, Yi Chen)....Pages 61-73
Improved CMD Adaptive Image Steganography Method (Yingbo Yu, Xin Liao)....Pages 74-84
Quantum Computer Simulation on GPU Cluster Incorporating Data Locality (Zhen Li, Jiabin Yuan)....Pages 85-97
Tampering Detection in Oral History Video Using Watermarking (Jianfeng Lu, Peng Gao, Shanqing Zhang, Li Li, Wenqiang Yuan, Qili Zhou)....Pages 98-109
Steganalysis with CNN Using Multi-channels Filtered Residuals (Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng)....Pages 110-120
Coverless Text Information Hiding Method Using the Frequent Words Distance (Jianjun Zhang, Yicheng Xie, Lucai Wang, Haijun Lin)....Pages 121-132
Improved STDM Watermarking Using Semantic Information-Based JND Model (Chunxing Wang, Teng Zhang, Wenbo Wan, Jiande Sun, Jing Li, Meiling Xu)....Pages 133-142
The Categories of Quantum Information Hiding Protocol (Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu)....Pages 143-152
Coverless Information Hiding Technology Research Based on News Aggregation (Conghua Liu, Gang Luo, Zuwei Tian)....Pages 153-163
Front Matter ....Pages 165-165
SIEM Based on Big Data Analysis (Tianmu Li, Leiming Yan)....Pages 167-175
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System (Hongjie Zhang, Guansheng Shu, Shasha Liao, Xi Fu, Jing Li)....Pages 176-188
Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application (Longchang Zhang, Yanhong Yang, Decai Sun)....Pages 189-200
A Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in Cloud Computing Systems (Jun-qing Li, Yu-yan Han, Cun-gang Wang)....Pages 201-213
A Group-Based Replica Consistency Schema for Cloud Storage (Guoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen)....Pages 214-225
A Multi-objective Optimization Scheduling Method Based on the Improved Differential Evolution Algorithm in Cloud Computing (Zhe Zheng, Kun Xie, Shiming He, Jun Deng)....Pages 226-238
A Network Calculus Analysis for the Baseband Processing Capacity in Cloud Radio Access Network (Muzhou Xiong, Haixin Liu, Deze Zeng)....Pages 239-250
Live Migration Among CloudBased on MOOSE Address (Yubing Mao, Zhengyou Xia)....Pages 251-261
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications (Yuanyuan Zhang, Jinbo Xiong, Mingwei Lin, Lili Wang, Xuan Li)....Pages 262-274
Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model (Jieren Cheng, Kuanqi Cai, Boyi Liu, Xiangyan Tang)....Pages 275-287
An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Environment Using Emoticons (Kyle Morton, Yanzhen Qu, Marilyn Carroll)....Pages 288-299
Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey (Micheal Ernest Taylor, Jian Shen)....Pages 300-309
Front Matter ....Pages 311-311
Design and Deployment of Wireless Sensor Networks for Flood Detection in Indonesia (Irfan Dwiguna Sumitra, Rongtao Hou, Sri Supatmi)....Pages 313-325
An Android App Recommendation Approach by Merging Network Traffic Cost (Xin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong)....Pages 326-338
A Virtual Grid-Based Routing Protocol for Mobile Sink-Based WSNs (Qi Liu, Weixin Bu, Kai Zhang, Xiaodong Liu, Nigel Linge)....Pages 339-348
Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition (Yating Hou, Feng Xu, Ruilin Ding)....Pages 349-360
Power Consuming Activity Recognition in Home Environment (Xiaodong Liu, Qi Liu)....Pages 361-372
A Pre-partition Based Uneven Clustering Multi-hop Routing Protocol (Yating Hou, Feng Xu, Mingming Su, Kaibo Yu)....Pages 373-384
A Credibility Evaluation Method in Opportunistic Networks (Jinxia Dou, Wenbin Yao, Dongbin Wang)....Pages 385-397
Unsupervised Energy Disaggregation of Home Appliances (Kondwani M. Kamoto, Qi Liu, Xiaodong Liu)....Pages 398-409
Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision (Yang Guo, Zheng Xiao, Hui Chen, Ling Huang)....Pages 410-421
Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey (Zichun Wang, Meng Feng, Tiantian Miao, Wei Jiang, Jian Shen)....Pages 422-429
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs (Jin Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim)....Pages 430-437
A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network (Zhi Zhao, Peng Pin, WeiYu Yu)....Pages 438-449
An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs (Xiaodong Liu, Qi Liu)....Pages 450-459
Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular Networks (Xiaoxiao Guan, Xiangping Zhai, Jiabin Yuan, Hu Liu)....Pages 460-471
Virtual Machine Placement Based on Metaheuristic for IoT Cloud (Shih-Yun Huang, Chen-Chi Liao, Yao-Chung Chang, Han-Chieh Chao)....Pages 472-482
A Novel Kalman Filter Based NLOS Localization Method for Wireless Sensor Networks (Long Cheng, Yuchao Shao, Yan Wang)....Pages 483-494
An Improved Localization Algorithm for Anisotropic Sensor Networks (Xiaoyong Yan, Zhong Yang, Yu Liu, Zhong Su, Huijun Li)....Pages 495-507
Further Results on Finite-Time Stability of Switched Static Neural Networks (Zhihua Diao, Chunying Diao, Xiaoliang Qian, Yuanyuan Wu)....Pages 508-518
An Improved Artificial Immune Network Based on the Secondary Immune Mechanism for Data Clustering (Yangyang Li, Xiaoju Hou, Licheng Jiao, Yu Xue)....Pages 519-530
Analysis of User’s Abnormal Behavior Based on Behavior Sequence in Enterprise Network (Haichao Guan, Huakang Li, Guozi Sun)....Pages 531-541
An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing (Yunqi Dou, Chuangui Ma, Yanbin Li, Fushan Wei)....Pages 542-551
Consensus of Multi-agent Systems with State Constraints (Qingling Wang)....Pages 552-560
Back Matter ....Pages 561-565