ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Future Information Technologies. FutureTech 2013

دانلود کتاب فناوری اطلاعات آینده FutureTech 2013

Future Information Technologies. FutureTech 2013

مشخصات کتاب

Future Information Technologies. FutureTech 2013

دسته بندی: کامپیوتر
ویرایش:  
نویسندگان: , , ,   
سری:  
 
ناشر:  
سال نشر:  
تعداد صفحات: 479 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 6 مگابایت 

قیمت کتاب (تومان) : 30,000



کلمات کلیدی مربوط به کتاب فناوری اطلاعات آینده FutureTech 2013: مهندسی انفورماتیک و کامپیوتر، فناوری اطلاعات



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Future Information Technologies. FutureTech 2013 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری اطلاعات آینده FutureTech 2013 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی

Издательство Springer, 2014, -470 pp.
FutureTech 2013 is the FTRA 8th event of the series of international scientific conference. This conference take place September 4–6, 2013, in Gwangju Korea. The aim of the FutureTech 2013 was to provide an international forum for scientific research in the technologies and application of information technologies. It was organized by the Korea Information Technology Convergence Society in cooperation with Korea Information Processing Society. FutureTech 2013 is the next edition of FutureTech 2012 (Vancouver, Canada), FutureTech 2011 (Loutraki, Greece), FutureTech 2010 (Busan, Korea, May 2010) which was the next event in a series of highly successful the International Symposium on Ubiquitous Applications & Security Services (UASS-09, USA, Jan. 2009), previously held as UASS-08 (Okinawa, Japan, Mar. 2008), UASS-07 (Kuala Lumpur, Malaysia, August, 2007), and UASS-06 (Glasgow, Scotland, UK, May, 2006).
The papers included in the proceedings cover the following topics: Hybrid Information Technology High Performance Computing, Cloud and Cluster Computing, Ubiquitous Networks and Wireless Communications Digital Convergence, Multimedia Convergence, Intelligent and Pervasive Applications, Security and Trust Computing, IT Management and Service Bioinformatics and Bio-Inspired Computing, Database and Data Mining, Knowledge System and Intelligent Agent, Game and Graphics Human-centric Computing and Social Networks, Advanced Mechanical Engineering, Computer Aided Machine Design, Control and Automations & Simulation. Accepted and presented papers highlight new trends and challenges of future and information technology. The presenters showed how new research could lead to novel and innovative applications. We hope you will find these results useful and inspiring for your future research.
Hybrid Information Technology
Dedicated Smart Software System for Mobile X-Ray
Real-Time Intuitive Terrain Modeling by Mapping Video Images onto a Texture Database
The RIP for Random Matrices with Complex Gaussian Entries
Evolving Mobile App Recommender Systems: An Incremental Multi-objective Approach
Project Proposals Ranking
A Stereo Micro Image Fusion Algorithm Based on Expectation-Maximization Technique
High Performance Computing
Moldable Job Scheduling for HPC as a Service
MapReduce Example with HBase for Association Rule
Cloud and Cluster Computing
Service Level Agreement Renegotiation Framework for Trusted Cloud-Based System
A Cross-IdP Single Sign-On Method in SAML-Based Architecture
Live Virtual Machine Migration with Optimized Three-Stage Memory Copy
Ubiquitous Networks and Wireless Communications
Performances of New Chaotic Interleaver Design in OFDM-IDMA System
Intelligent and Pervasive Applications
Application of an Artificial Intelligence Method for Diagnosing Acute Appendicitis: The Support Vector Machine
On Extracting Important User Preferences
Object Retrieval Scheme Using Color Features in Surveillance System
Multi Criteria Decision Making Related to Services
Security and Trust Computing
Keyword Searchable Encryption with Access Control from a Certain Identity-Based Encryption
Attribute-Based Encryption with Attribute Revocation and Grant Function Using Proxy Re-encryption and Attribute Key for Updating
Research on Stereo Image Authentication Watermarking with Self-recovery
Fine-Grained Access Control in Object-Oriented Databases
Doubly Encrypted Identity-Based Encryption for File Transfer Service
Toward a Honeypot Solution for Proactive Security in Vehicular Ad Hoc Networks
IT Management and Service
DWL Tool for Creating a Customized Web-Based System Generator
The Task-Oriented Circulation Planning
Database and Data Mining
A Framework for Selecting the Optimal Technique Suitable for Application in a Data Mining Task
Discovery of Closed Consensus Temporal Patterns by Group Decision Making
A Collaborative Filtering Recommendation Algorithm Based on Tag Clustering
BSTree: An Incremental Indexing Structure for Similarity Search and Real Time Monitoring of Data Streams
Knowledge System and Intelligent Agent
Learning Teaching in Teaching: Online Reinforcement Learning for Intelligent Tutoring
Minimax Self Playing Game Alquerque
Game and Graphics
Fractal Based Hardware Accelerated Technique for Graphical Rendering
Topics on Public Game Art Using Media Faёcade
A Physical Interactive Game for Learning English of Children
Using Multiple Verifiers to Detect Sybils in a Social Network Graph
The Impact of Addiction to Twitter among University Students
Design and Prototype Implementation of Smart-Phone Voice Locker Using Voice Recognition
Digital Forensics and Information Security
Extended RBAC Model with Task-Constraint Rules
Historical Data Recovery from Android Devices
A Static Semantic Model for Trusted Forensics Using OCL
A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things
An Efficient Computer Forensics Selective Imaging Model
Cloud Computing Risk Assessment: A Systematic Literature Review
Security Requirements Specification Framework for Cloud Users
Digital Evidence Bag Selection for P2P Network Investigation
A Research for Partition Restoration Techniques
Definition of Evaluation Index Model for Network Management System
Investigating and Measuring Capabilities of the Forensics File Carving Techniques
Application for Reversible Information Hiding in Multilpe Secret Images Sharing Based on Shamir’s Scheme
The Arm Strength Training Machine with Biofeedback
Privacy Breach Investigations of Incident Response to Personal Information Protection Act
Measuring Digital Crime Investigation Capacity to Guide International Crime Prevention Strategies
Management of Future Convergence Technology
Study on the Growth Strategy to Become a Global Logistics Company, through the Expansion of the Domestic Logistics Companies in China
A Dynamic Model of Technological Innovation in 3D TV Industry: Case of LG Electronics
The U-Work Utilization Analysis Using Groupware on Non-profit Organization
Analysis of the Risks of Overseas Advancement by Logistics Companies Applying AHP
Development of an Operating System for Optimization of the Container Terminal by Using the Tandem-Lift Quay Crane
Knowledge Sharing and the Forms of R&D Collaboration
Global Supply Chain Management Using Business Risk Re-alignment via the Change of the Transfer Pricing Methodology
Advanced Technology and Computer
Research of Touchscreen Terminals Gesture Operation Error Based on Kansei Engineering
Heart Sound Feature Extraction Based on Wavelet Singular Entropy
Research on MTMP Structure Chlorine Dosing Decoupling Control
Social Computing, Network, and Services
The Research on Electronic Data Forensic Institutions Equipment Configuration Standards
Design of an RDFizer for Online Social Network Services
Cloud Enhanced Information Fusion
A Holistic Cloud-Enabled Robotics System for Real-Time Video Tracking Application
Improving Network Health Monitoring Accuracy Based on Data Fusion for Software Defined Networking
Improving Diagnostic Accuracy Using Multiparameter Patient Monitoring Based on Data Fusion in the Cloud




نظرات کاربران