دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Kuinam J. Kim (eds.)
سری: Lecture Notes in Electrical Engineering 339
ISBN (شابک) : 9783662465776, 9783662465783
ناشر: Springer-Verlag Berlin Heidelberg
سال نشر: 2015
تعداد صفحات: 1086
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 61 مگابایت
کلمات کلیدی مربوط به کتاب علم اطلاعات و برنامه های کاربردی: هوش محاسباتی، سیستم های اطلاعاتی و خدمات ارتباطی، هوش مصنوعی (شامل رباتیک)
در صورت تبدیل فایل کتاب Information Science and Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علم اطلاعات و برنامه های کاربردی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این جلد گزارش تصویری از آخرین مسائلی که در همگرایی فنی و همگرایی فناوری امنیتی با آن مواجه میشوند، ارائه میکند. این مقاله به بررسی این موضوع میپردازد که چگونه علم اطلاعات هسته اصلی اکثر فعالیتهای تحقیقاتی، صنعتی و تجاری فعلی است و شامل مشارکتهایی است که موضوعاتی از جمله محاسبات همه جا حاضر، شبکهها و سیستمهای اطلاعاتی، چند رسانهای و تجسم، میانافزار و سیستمهای عامل، امنیت و حریم خصوصی، دادهکاوی و هوش مصنوعی را پوشش میدهد. مهندسی نرم افزار و فناوری وب این روند، جدیدترین فناوری اطلاعات و ایدهها، برنامهها و مشکلات مربوط به همگرایی فناوری را معرفی میکند که از طریق مطالعات موردی، و بررسی تکنیکهای امنیتی موجود همگرا نشان داده شده است. از طریق این جلد، خوانندگان درک درستی از آخرین هنر در استراتژیهای اطلاعاتی و فناوریهای امنیت همگرایی به دست خواهند آورد.
خوانندگان مورد نظر پژوهشگران دانشگاهی هستند. صنعت و سایر مؤسسات تحقیقاتی با تمرکز بر علم و فناوری اطلاعات.
This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security.
The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology.
Front Matter....Pages i-xviii
Front Matter....Pages 1-1
QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network....Pages 3-9
Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico-Cellular Networks....Pages 11-20
A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process....Pages 21-25
A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network....Pages 27-34
A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed....Pages 35-42
A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks....Pages 43-50
Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders....Pages 51-58
Indoor WIFI localization on embedded systems....Pages 59-66
Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks....Pages 67-76
Front Matter....Pages 77-77
Maintaining a Trajectory Data Warehouse Under Schema Changes with the Mobile Agent View Adaptation Technique....Pages 79-83
Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV....Pages 85-92
Evaluation Method of MANET over Next Generation Optical Wireless Access Network....Pages 93-101
A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol....Pages 103-110
Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks....Pages 111-124
E-Government project enquiry framework for a continuous improvement process, status in Malaysia and Comoros....Pages 125-133
Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods....Pages 135-142
A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-Peer Media Streaming Systems....Pages 143-150
A Transmission Method to Improve the Quality of Multimedia in Hybrid Broadcast/Mobile Networks....Pages 151-155
A Failureless Pipelined Aho-Corasick Algorithm for FPGA-based Parallel String Matching Engine....Pages 157-164
Revised P2P Data Sharing Scheme over Distributed Cloud Networks....Pages 165-171
Front Matter....Pages 77-77
LQDV Routing Protocol Implementation on Arduino Platform and Xbee module....Pages 173-180
A Virtualization and Management Architecture of Micro-Datacenter....Pages 181-187
Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks....Pages 189-204
Passive Network Monitoring using REAMS....Pages 205-215
Low Latency Video Transmission Device....Pages 217-222
Front Matter....Pages 223-223
Comparative Investigation of Medical Contents using Desktop and Tabletop Technologies....Pages 225-233
Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment....Pages 235-241
An Algorithm for Rock Pore Image Segmentation....Pages 243-250
Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences....Pages 251-258
P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions....Pages 259-266
Flight Simulator for Serious Gaming....Pages 267-277
Potential Z-Fighting Conflict Detection System in 3D Level Design Tools....Pages 279-285
Efficient Motion Estimation Algorithms for HEVC/H.265 Video Coding....Pages 287-294
A Synthesis of 2D Mammographic Image Using Super- Resolution Technique: A Phantom Study....Pages 295-302
Using complex events to represent domain concepts in graphs....Pages 303-311
Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model....Pages 313-318
An Approximate Matching Preprocessing for Efficient Phase-Only Correlation-Based Image Retrieval....Pages 319-326
Pixel Art Color Palette Synthesis....Pages 327-334
Introducing a New Radiation Detection Device Calibration Method and Estimating 3D Distance to Radiation Sources....Pages 335-342
Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images....Pages 343-350
Front Matter....Pages 223-223
Detecting and extracting text in video via sparse representation based classification method....Pages 351-358
Front Matter....Pages 359-359
A Cost Model for Client-Side CaaS....Pages 361-368
A Reliability Analysis of Cascaded TMR Systems....Pages 369-376
Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs....Pages 377-384
A Recovery Model for Improving Reliability of PCM WL-Reviver System....Pages 385-390
Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients....Pages 391-396
Front Matter....Pages 397-397
Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho....Pages 399-405
Network Security Situation Assessment: A Review and Discussion....Pages 407-414
Protecting Binary Files from Stack-Based Buffer Overflow....Pages 415-422
Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT....Pages 423-429
Nonintrusive SSL/TLS Proxy with JSON-Based Policy....Pages 431-438
Secure Problem Solving by Encrypted Computing....Pages 439-448
Anomaly Detection from Log Files Using Data Mining Techniques....Pages 449-457
Improved Remote User Trust Evaluation Scheme to apply to Social Network Services....Pages 459-466
Threat assessment model for mobile malware....Pages 467-474
Performance Evaluation of System Resources Utilization with Sandboxing Applications....Pages 475-482
Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment....Pages 483-490
Pseudoinverse Matrix over Finite Field and Its Applications....Pages 491-498
Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks....Pages 499-507
Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis....Pages 509-516
Front Matter....Pages 397-397
Exploring Bad Behaviors from Email Logs....Pages 517-524
Using PKI to Provide Credential Delegation in non Web-based Federations....Pages 525-532
Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication....Pages 533-540
A Method for Web Security Context Patterns Development from User Interface Guidelines Based on Structural and Textual Analysis....Pages 541-550
A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography....Pages 551-560
Review of Digital Forensic Investigation Frameworks....Pages 561-571
Front Matter....Pages 573-573
Knowledge Discovery in Dynamic Data Using Neural Networks....Pages 575-582
Data Mining for Industrial System Identification: A Turning Process....Pages 583-590
Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection Using Scale Invariant Feature Transform Image Descriptor....Pages 591-598
Features extraction for classification of focal and non-focal EEG signals....Pages 599-605
Relations on Intuitionistic Fuzzy Soft Multi Sets....Pages 607-614
Towards Automatically Retrieving Discoveries and Generating Ontologies....Pages 615-622
Improving process models discovery using AXOR clustering algorithm....Pages 623-629
Simple Approaches of Sentiment Analysis via Ensemble Learning....Pages 631-639
Effective Trajectory Similarity Measure for Moving Objects in Real-World Scene....Pages 641-648
A Prediction of Engineering Students Performance from Core Engineering Course Using Classification....Pages 649-656
Evolutionary Circular-ELM for the Reduced-Reference Assessment of Perceived Image Quality....Pages 657-664
Enhanced Web Page Cleaning for Constructing Social Media Text Corpora....Pages 665-672
Finding Knee Solutions in Multi-Objective Optimization Using Extended Angle Dominance Approach....Pages 673-679
Affective Learning Analysis of Children in a Card Sorting Game....Pages 681-688
Front Matter....Pages 573-573
Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal....Pages 689-696
A Study of Big Data Solution Using Hadoop to Process Connected Vehicle’s Diagnostics Data....Pages 697-704
Wiki SaGa: An Interactive Timeline to Visualize Historical Documents....Pages 705-712
Discovering genomic associations on cancer datasets by applying sparse regression methods....Pages 713-720
The Adaptive Dynamic Clustering Neuro-Fuzzy System for Classification....Pages 721-728
A Hybrid Approach of Neural Network and Level-2 Fuzzy set....Pages 729-736
Developing Term Weighting Scheme Based on Term Occurrence Ratio for Sentiment Analysis....Pages 737-744
A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand....Pages 745-752
Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment....Pages 753-760
Vehicle Position Estimation using Tire Model....Pages 761-768
I know when you are happy - Emotion Detection....Pages 769-776
Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm....Pages 777-784
Classification Prediction of the Foot Disease Pattern Using Decision Tree Model....Pages 785-791
Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem....Pages 793-800
A Combined AdaBoost and NEWFM Technique for Medical Data Classification....Pages 801-809
On sentence length distribution as an authorship attribute....Pages 811-818
Learning models for activity recognition in smart homes....Pages 819-826
Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm....Pages 827-834
Front Matter....Pages 835-835
Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards....Pages 837-844
Validating Reusability of Software Projects using Object-Oriented Design Metrics....Pages 845-850
Front Matter....Pages 835-835
Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development....Pages 851-858
Understanding of Project Manager Competency in Agile Software Development Project: The Taxonomy....Pages 859-868
The Design and Implementation of Around-View System using Android-based Image Processing....Pages 869-876
Identification of Opportunities for Move Method Refactoring Using Decision Theory....Pages 877-884
Requirements Engineering for Cloud Computing in University Using i*(iStar) Hierarchy Method....Pages 885-890
Power Consumption Profiling Method based on Android Application Usage....Pages 891-898
Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model....Pages 899-906
A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service....Pages 907-914
An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators....Pages 915-922
Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine....Pages 923-931
Evaluation of Separated Concerns in Web-based Delivery of User Interfaces....Pages 933-940
Separating out Platform-independent Particles of User Interfaces....Pages 941-948
Implementing Personal Software Process in Undergraduate Course to Improve Model-View-Controller Software Construction....Pages 949-956
Front Matter....Pages 957-957
Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL....Pages 959-966
An Experimental Study for Neighbor Selection in Collaborative Filtering....Pages 967-972
Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance....Pages 973-980
Analyzing Developer Behavior and Community Structure in Software Crowdsourcing....Pages 981-988
A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer’s Algorithm and Ontology....Pages 989-996
Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Applications....Pages 997-1004
Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors....Pages 1005-1012
Front Matter....Pages 957-957
The Competition-based Information Propagation in Online Social Networks....Pages 1013-1020
e-Learning Recommender System for Teachers using Opinion Mining....Pages 1021-1029
Front Matter....Pages 1031-1031
Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs....Pages 1033-1041
Front Matter....Pages 1043-1043
Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image....Pages 1045-1052
A Service Protection mechanism Using VPN GW Hiding Techniques....Pages 1053-1062
Networking Service Availability Analysis of 2N Redundancy Model with Non-stop Forwarding....Pages 1063-1069
Property Analysis of Classifiers for Sleep Snoring Detection....Pages 1071-1077
An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs....Pages 1079-1083
Front Matter....Pages 1085-1085
Road Weather Information transmission method for digital multimedia broadcasting....Pages 1087-1093
Color Overlapping Method of Projection System on LEDs....Pages 1095-1099
A System Design for Audio Level Measurement based on ITU-R BS.1770-3....Pages 1101-1105
A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices....Pages 1107-1112