ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information Science and Applications 2018

دانلود کتاب علم اطلاعات و کاربردها 2018

Information Science and Applications 2018

مشخصات کتاب

Information Science and Applications 2018

ویرایش: 1st ed. 
نویسندگان: ,   
سری: Lecture Notes in Electrical Engineering 514 
ISBN (شابک) : 9789811310553, 9789811310560 
ناشر: Springer Singapore 
سال نشر: 2019 
تعداد صفحات: 656 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 24 مگابایت 

قیمت کتاب (تومان) : 47,000



کلمات کلیدی مربوط به کتاب علم اطلاعات و کاربردها 2018: مهندسی، مهندسی ارتباطات، شبکه ها، سیستم ها و امنیت داده ها، هوش محاسباتی



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Information Science and Applications 2018 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علم اطلاعات و کاربردها 2018 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
A Study of Wireless Communication Technologies for Vehicular Communication (Afizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak, Kirbana Jai Raman, Mohd Fikri Azli Abdullah et al.)....Pages 3-13
A New Fractional Binary-to-Decimal Number Conversion for Errorless Calculation (Jinhyuck Kim, Hyun Jin Kim)....Pages 15-21
Development of Distraction Limit Estimation Index Using Posture Change Monitoring System (Yun-Hong Noh, Ji-Yun Seo, Do-Un Jeong)....Pages 23-29
Implementation of Rehabilitation Assistant System Based on Movement and Muscle Activity Information (Ji-Yun Seo, Yun-Hong Noh, Do-Un Jeong)....Pages 31-37
Front Matter ....Pages 39-39
NUPT ST-Data Miner: An Spatio-Temporal Data Analysis and Visualization System (Zhiqiang Zou, Junjie Xiong, Xu He, Haihong Dai)....Pages 41-51
Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach (Feng-Hsiag Hsiao, Po-Han Lin)....Pages 53-66
A Framework for Performance Analysis of Various Load Balancing Techniques in a Software-Defined Networking Environment (Patrick Von Angelo V. Atienza, William Emmanuel S. Yu)....Pages 67-74
Inferring Social Relationships Through Network: A Systematic Literature Review (Fauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra)....Pages 75-87
Extended Flow Detection Scheme Using Simple Processor Trace (PT) (Hyuncheol Kim)....Pages 89-95
The Effect of Wearing the Customized Insole on the Coordination of the Right and Left Wrists Measured by Wearables During Golf Swing (Kyungock Yi, Hyeonjung Oh)....Pages 97-108
A Study on Development of Application for Management of Obesity in Children with Intellectual Disabilities (SeungAe Kang)....Pages 109-114
A New Paradigm for Spectator Sports in Application of Media (Minkyu Kim, Soojung Park, ByoungKwon Park)....Pages 115-121
Physical Activity Intervention Platform for the Elderly with Mild Cognitive Impairment (SunYoung Kang, SeungAe Kang)....Pages 123-128
Front Matter ....Pages 129-129
A Simplified Emulation Scheme for OpenGL SC 2.0 Rendering over OpenGL Embedded Systems 2.0 (Nakhoon Baek)....Pages 131-135
Robust Sound Localization Algorithm for Intelligent Acoustic Surveillance System (Kyusik Park)....Pages 137-147
A Multiple Optical Vision System of Virtual Display (Yongseok Chi)....Pages 149-155
Real Time Driver Anger Detection (Afizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah et al.)....Pages 157-167
Debug Output Features for OpenGL SC 2.0 Safety Critical Profile (Woosuk Shin, Nakhoon Baek)....Pages 169-173
Eigennose: Assessing Nose-Based Principal Component Analysis for Achieving Access Control with Occluded Faces (Zibusiso Bhango, Dustin van der Haar)....Pages 175-183
Front Matter ....Pages 185-185
Implementation of a Monitoring System for the Measurement of Temperature, Flow Rate, and Fluid Pressure of Cooling Systems (Cheol-Hong Moon)....Pages 187-197
Front Matter ....Pages 199-199
A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems (Kudzaishe Mhou, Dustin van der Haar)....Pages 201-209
Performance Comparison of Some Addition Chain Methods Based on Integer Family (M. F. A. Kadir, M. A. Mohamed, R. Mohamad, M. Mamat, A. Muhammed)....Pages 211-218
Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication (Kennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John et al.)....Pages 219-228
Fingerprint Biometric Authentication Based Point of Sale Terminal (Kennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John et al.)....Pages 229-237
A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns (Imano Williams, Xiaohong Yuan)....Pages 239-249
An Efficient and Anonymous KP-ABE Scheme with Keyword Search (Tao Feng, Xiaoyu Yin, Chunyan Liu)....Pages 251-258
A DNS RPZ Firewall and Current American DNS Practice (Norman Wilde, Lauren Jones, Robert Lopez, Travis Vaughn)....Pages 259-265
SNMP-Based Detection of VLAN Hopping Attack Risk (Kwangjun Kim, Manhee Lee)....Pages 267-272
Improving Hidden Message Extraction Using LSB Steganalysis Techniques (Nikhil Mewalal, Wai Sze Leung)....Pages 273-284
Secrecy Analysis in the AF Mode Cooperative Communication System (Hsin-Ying Liang, Cheng-Ying Yang, Min-Shiang Hwang)....Pages 285-293
An Improved Hou-Wang’s User Authentication Scheme (Min-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang)....Pages 295-301
Developing a Testing Framework for Intrusion Detection Algorithms Using Software Defined Networking (Anton Miguel Suba, Kurt Vincent Bautista, Julio Carlos Tomas Ledesma, William Emmanuel Yu)....Pages 303-313
Front Matter ....Pages 315-315
Ballet Pose Recognition: A Bag-of-Words Support Vector Machine Model for the Dance Training Environment (Margaux Fourie, Dustin van der Haar)....Pages 317-325
Pronunciation Detection for Foreign Language Learning Using MFCC and SVM (Jihyun Byun, Dustin van der Haar)....Pages 327-335
OpinionSeer: Text Visualization on Hotel Customer Reviews of Services and Physical Environment (Angela Siew Hoong Lee, Ka Leong Daniel Chong, Nicholas Chan Khin Whai)....Pages 337-349
Comparisons in Drinking Water Systems Using K-Means and A-Priori to Find Pathogenic Bacteria Genera (Tevin Moodley, Dustin van der Haar)....Pages 351-359
Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoT (Jongmun Jeong, Larsson Bajracharya, Mintae Hwang)....Pages 361-367
Improving an Evolutionary Approach to Sudoku Puzzles by Intermediate Optimization of the Population (Matthias Becker, Sinan Balci)....Pages 369-375
Saturated Flow Method for Traffic Optimization in Ostrava City (Martin Kotyrba, Eva Volna, Jakub Gaj)....Pages 377-387
Adaptive Control of EV3 Robot Using Mobile Devices and Fuzzy Logic (Jan Konvicka, Martin Kotyrba, Eva Volna, Hashim Habiballa, Vladimir Bradac)....Pages 389-399
Improving Medical Short Text Classification with Semantic Expansion Using Word-Cluster Embedding (Ying Shen, Qiang Zhang, Jin Zhang, Jiyue Huang, Yuming Lu, Kai Lei)....Pages 401-411
A Deep Learning Approach to Mining the Relationship of Depression Symptoms and Treatments for Prediction and Recommendation (Juntian Lin, Guan Luo, Zhu Zhan, Xiaoyao Guan)....Pages 413-422
A Bayesian Network Approach for Discovering Variables Affecting Youth Depression (Euihyun Jung)....Pages 423-430
Forecasting Macao GDP Using Different Artificial Neural Networks (Xu Yang, Zheqi Zhang, Laurie Cuthbert, Yapeng Wang)....Pages 431-442
Edge Detection and Symmetry Method for Cleft Lip and Palate Children Using Image Processing (Nutthisara Choolikhit, Wararat Songpan, Monlica Wattana, Ngamnij Arch-in)....Pages 443-455
An Effective Envelope Analysis Using Gaussian Windows for Evaluation of Fault Severity in Bearing (Nguyen Ngoc Hung, Jaeyoung Kim, Jong-Myon Kim)....Pages 457-464
Event Extraction from Streaming System Logs (Shuting Guo, Zheng Liu, Wenyan Chen, Tao Li)....Pages 465-474
Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm (Fokrul Alom Mazarbhuiya, Mohammed Y. AlZahrani, Lilia Georgieva)....Pages 475-484
User Identification on Social Networks Through Text Mining Techniques: A Systematic Literature Review (Kinza Zahra, Farooque Azam, Wasi Haider Butt, Fauqia Ilyas)....Pages 485-498
Automated Analysis of Eye-Tracker-Based Human-Human Interaction Studies (Timothy Callemein, Kristof Van Beeck, Geert Brône, Toon Goedemé)....Pages 499-509
Front Matter ....Pages 511-511
Survey on Compromise-Defensive System Design (Tomas Cerny, Michael Jeff Donahoo)....Pages 513-521
A Study on Cost-Effective and Eco-friendly Bicycle Sharing System for Developing Countries (Larsson Bajracharya, Tirta Mulya, Ayi Purbasari, Mintae Hwang)....Pages 523-531
An Approach to Modeling Microservice Solutions (Zhiyi Ma, Jinyang Liu, Xiao He)....Pages 533-542
A Comprehensive Investigation of BPMN Models Generation from Textual Requirements—Techniques, Tools and Trends (Bilal Maqbool, Farooque Azam, Muhammad Waseem Anwar, Wasi Haider Butt, Jahan Zeb, Iqra Zafar et al.)....Pages 543-557
A Culture-Based Profile Model of Software Evaluators (Khaled Hamdan, Boumediene Belkhouche, Peter Smith)....Pages 559-570
Transforming JavaScript-Based Web Application to Cross-Platform Desktop with Electron (Kitti Kredpattanakul, Yachai Limpiyakorn)....Pages 571-579
Degree of Similarity of Root Trees (Jiri Sebek, Petr Vondrus, Tomas Cerny)....Pages 581-591
Front Matter ....Pages 593-593
Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid (Seung-Mo Je, Jun-Ho Huh)....Pages 595-606
Affordances for the Sharing of Domain-Specific Knowledge on Enterprise Social Media (L. G. Pee)....Pages 607-613
Front Matter ....Pages 615-615
Development of an IoT-Based Construction Site Safety Management System (Seung Ho Kim, Han Guk Ryu, Chang Soon Kang)....Pages 617-624
Internet of Things: Current Challenges in the Quality Assurance and Testing Methods (Miroslav Bures, Tomas Cerny, Bestoun S. Ahmed)....Pages 625-634
Using Wi-Fi Enabled Internet of Things Devices for Context-Aware Authentication (Michal Trnka, Filip Rysavy, Tomas Cerny, Nathaniel Stickney)....Pages 635-642
A Hybrid Deep Q-Network for the SVM Lagrangian (Chayoung Kim, Hye-young Kim)....Pages 643-651
An Actor-Critic Algorithm for SVM Hyperparameters (Chayoung Kim, Jung-min Park, Hye-young Kim)....Pages 653-661
Design of the Manufacturing Facility Maintenance Systems Based on Internet of Things (Jin-uk Jung, A. M. Ilham, Min-tae Hwang, Kyo-hong Jin)....Pages 663-673
Implementation of an Edge Computing Architecture Using OpenStack and Kubernetes (Endah Kristiani, Chao-Tung Yang, Yuan Ting Wang, Chin-Yin Huang)....Pages 675-685
Enabling Cross-Domain IoT Interoperability Based on Open Framework (Lei Hang, Do-Hyeun Kim)....Pages 687-691




نظرات کاربران