ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information Technology - New Generations : 14th International Conference on Information Technology

دانلود کتاب فناوری اطلاعات - نسل های جدید: چهاردهمین کنفرانس بین المللی فناوری اطلاعات

Information Technology - New Generations : 14th International Conference on Information Technology

مشخصات کتاب

Information Technology - New Generations : 14th International Conference on Information Technology

ویرایش:  
نویسندگان:   
سری: Advances in Intelligent Systems and Computing 558 
ISBN (شابک) : 9783319549781, 9783319549774 
ناشر:  
سال نشر:  
تعداد صفحات: 932 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 52 مگابایت 

قیمت کتاب (تومان) : 56,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Information Technology - New Generations : 14th International Conference on Information Technology به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری اطلاعات - نسل های جدید: چهاردهمین کنفرانس بین المللی فناوری اطلاعات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Front Matter....Pages i-xix
Front Matter....Pages 1-1
Performance Enhancement of OMP Algorithm for Compressed Sensing Based Sparse Channel Estimation in OFDM Systems....Pages 3-8
CARduino: A Semi-automated Vehicle Prototype to Stimulate Cognitive Development in a Learning-Teaching Methodology....Pages 9-16
ICI Mitigation for High-Speed OFDM Communications in High-Mobility Vehicular Channels....Pages 17-22
Mobile Payment Protocol 3D (MPP 3D) by Using Cloud Messaging....Pages 23-31
Event-Based Anomalies in Big Data....Pages 33-42
ACO-Discreet: An Efficient Node Deployment Approach in Wireless Sensor Networks....Pages 43-48
Golden Linear Group Key Agreement Protocol....Pages 49-55
Implementing an In-Home Sensor Agent in Conjunction with an Elderly Monitoring Network....Pages 57-65
How Risk Tolerance Constrains Perceived Risk on Smartphone Users’ Risk Behavior....Pages 67-72
When Asteroids Attack the Moon: Design and Implementation of an STK-Based Satellite Communication Simulation for the NASA-Led Simulation Exploration Experience....Pages 73-79
Wireless Body Sensor Network for Monitoring and Evaluating Physical Activity....Pages 81-86
Techniques for Secure Data Transfer....Pages 87-93
Rate Adjustment Mechanism for Controlling Incast Congestion in Data Center Networks....Pages 95-100
Performance Analysis of Transport Protocols for Multimedia Traffic Over Mobile Wi-Max Network Under Nakagami Fading....Pages 101-110
Front Matter....Pages 111-111
CyberSecurity Education and Training in a Corporate Environment in South Africa Using Gamified Treasure Hunts....Pages 113-117
Router Security Penetration Testing in a Virtual Environment....Pages 119-124
Advanced Machine Language Approach to Detect DDoS Attack Using DBSCAN Clustering Technology with Entropy....Pages 125-131
A Novel Regular Format for X.509 Digital Certificates....Pages 133-139
A Software-Defined Networking (SDN) Approach to Mitigating DDoS Attacks....Pages 141-145
Integrated Methodology for Information Security Risk Assessment....Pages 147-150
Front Matter....Pages 111-111
Techniques for Detecting and Preventing Denial of Service Attacks (a Systematic Review Approach)....Pages 151-157
Open Source Intelligence: Performing Data Mining and Link Analysis to Track Terrorist Activities....Pages 159-163
A Description of External Penetration Testing in Networks....Pages 165-168
SCORS: Smart Cloud Optimal Resource Selection....Pages 169-178
Towards the Memory Forensics of MS Word Documents....Pages 179-185
Two Are Better than One: Software Optimizations for AES-GCM over Short Messages....Pages 187-191
BYOD Security Risks and Mitigations....Pages 193-197
Evaluation of Cybersecurity Threats on Smart Metering System....Pages 199-207
A Layered Model for Understanding and Enforcing Data Privacy....Pages 209-214
BYOD: A Security Policy Evaluation Model....Pages 215-220
A Novel Information Privacy Metric....Pages 221-226
An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications....Pages 227-234
Towards the Security of Big Data: Building a Scalable Hash Scheme for Big Graph....Pages 235-243
A Cluster Membership Protocol Based on Termination Detection Algorithm in Distributed Systems....Pages 245-249
Front Matter....Pages 251-251
An Adaptive Sensor Management System....Pages 253-256
A Cloud Service for Graphical User Interfaces Generation and Electronic Health Record Storage....Pages 257-263
A Petri Net Design and Verification Platform Based on The Scalable and Parallel Architecture: HiPS....Pages 265-273
Optimally Compressed Digital Content Delivery Using Short Message Service....Pages 275-280
The Method of Data Analysis from Social Networks using Apache Hadoop....Pages 281-288
Using Web Crawlers for Feature Extraction of Social Nets for Analysis....Pages 289-296
Front Matter....Pages 251-251
Detecting Change from Social Networks using Temporal Analysis of Email Data....Pages 297-304
The Organisational Constraints of Blending E-Learning Tools in Education: Lecturers’ Perceptions....Pages 305-310
A Rule-Based Relational XML Access Control Model in the Presence of Authorization Conflicts....Pages 311-319
Front Matter....Pages 321-321
A Practical Approach to Analyze Logical Thinking Development with Computer Aid....Pages 323-333
A Transversal Sustainability Analysis of the Teaching-Learning Process in Computer Students and Groups....Pages 335-342
Cloud Computing: A Paradigm Shift for Central University of Technology....Pages 343-347
Peer Music Education for Social Sounds in a CLIL Classroom....Pages 349-353
Teaching Distributed Systems Using Hadoop....Pages 355-362
MUSE: A Music Conducting Recognition System....Pages 363-369
Front Matter....Pages 371-371
Using Big Data, Internet of Things, and Agile for Crises Management....Pages 373-382
An Agile and Collaborative Model-Driven Development Framework for Web Applications....Pages 383-394
Generating Control Flow Graphs from NATURAL....Pages 395-402
Requirements Prioritization in Agile: Use of Planning Poker for Maximizing Return on Investment....Pages 403-409
EasyTest: An Approach for Automatic Test Cases Generation from UML Activity Diagrams....Pages 411-417
An Integrated Academic System Prototype Using Accidents and Crises Management as PBL....Pages 419-427
Agile Testing Quadrants on Problem-Based Learning Involving Agile Development, Big Data, and Cloud Computing....Pages 429-441
Integrating NoSQL, Relational Database, and the Hadoop Ecosystem in an Interdisciplinary Project involving Big Data and Credit Card Transactions....Pages 443-451
Enhancing Range Analysis in Software Design Models by Detecting Floating-Point Absorption and Cancellation....Pages 453-458
Requirements Prioritization Using Hierarchical Dependencies....Pages 459-464
Front Matter....Pages 465-465
An Optimized Data Mining Method to Support Solar Flare Forecast....Pages 467-474
Front Matter....Pages 465-465
A New Approach to Classify Sugarcane Fields Based on Association Rules....Pages 475-483
Visualizing the Document Pre-processing Effects in Text Mining Process....Pages 485-491
Complex-Network Tools to Understand the Behavior of Criminality in Urban Areas....Pages 493-500
Big Data: A Systematic Review....Pages 501-506
Evidences from the Literature on Database Migration to the Cloud....Pages 507-513
Improving Data Quality Through Deep Learning and Statistical Models....Pages 515-522
A Framework for Auditing XBRL Documents Based on the GRI Sustainability Guidelines....Pages 523-531
Front Matter....Pages 533-533
Mining Historical Information to Study Bug Fixes....Pages 535-543
An Empirical Study of Control Flow Graphs for Unit Testing....Pages 545-553
A New Approach to Evaluate the Complexity Function of Algorithms Based on Simulations of Hierarchical Colored Petri Net Models....Pages 555-564
Detection Strategies for Modularity Anomalies: An Evaluation with Software Product Lines....Pages 565-570
Randomized Event Sequence Generation Strategies for Automated Testing of Android Apps....Pages 571-578
Requirement Verification in SOA Models Based on Interorganizational WorkFlow Nets and Linear Logic....Pages 579-587
Cambuci: A Service-Oriented Reference Architecture for Software Asset Repositories....Pages 589-595
Extending Automotive Legacy Systems with Existing End-to-End Timing Constraints....Pages 597-605
Modeling of Vehicular Distributed Embedded Systems: Transition from Single-Core to Multi-core....Pages 607-611
On the Impact of Product Quality Attributes on Open Source Project Evolution....Pages 613-620
AD-Reputation: A Reputation-Based Approach to Support Effort Estimation....Pages 621-626
Pmbench: A Micro-Benchmark for Profiling Paging Performance on a System with Low-Latency SSDs....Pages 627-633
Design Observer: A Framework to Monitor Design Evolution....Pages 635-640
Front Matter....Pages 533-533
Generating Sequence Diagram and Call Graph Using Source Code Instrumentation....Pages 641-645
Front Matter....Pages 647-647
Data Retrieval and Parsing of Form 4 from the Edgar System using Multiple CPUs....Pages 649-658
A New Approach for STEM Teacher Scholarship Implementation....Pages 659-666
Improving the Performance of the CamShift Algorithm Using Dynamic Parallelism on GPU....Pages 667-675
Sumudu Transform for Automatic Mathematical Proof and Identity Generation....Pages 677-683
A Multiobjective Optimization Method for the SOC Test Time, TAM, and Power Optimization Using a Strength Pareto Evolutionary Algorithm....Pages 685-695
Front Matter....Pages 697-697
Handwritten Feature Descriptor Methods Applied to Fruit Classification....Pages 699-705
A No-Reference Quality Assessment Method of Color Image Based on Visual Characteristic....Pages 707-713
Approaches for Generating Empathy: A Systematic Mapping....Pages 715-722
Multi-camera Occlusion and Sudden-Appearance-Change Detection Using Hidden Markovian Chains....Pages 723-728
Store Separation Analysis Using Image Processing Techniques....Pages 729-737
Ballistic Impact Analysis Using Image Processing Techniques....Pages 739-748
iHelp HEMOCS Application for Helping Disabled People Communicate by Head Movement Control....Pages 749-756
Front Matter....Pages 757-757
Evaluation of Audio Denoising Algorithms for Application of Unmanned Aerial Vehicles in Wildlife Monitoring....Pages 759-766
Development of a Portable, Low-Cost System for Ground Control Station for Drones....Pages 767-771
Collision Avoidance Based on Reynolds Rules: A Case Study Using Quadrotors....Pages 773-780
PID Speed Control of a DC Motor Using Particle Swarm Optimization....Pages 781-789
Use of Intelligent Water Drops (IWD) for Intelligent Autonomous Force Deployment....Pages 791-801
Match-the-Sound CAPTCHA....Pages 803-808
Front Matter....Pages 809-809
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services....Pages 811-817
Front Matter....Pages 809-809
Testing Cloud Services Using the TestCast Tool....Pages 819-824
Evaluation of High-Fidelity Mannequins in Convulsion Simulation and Pediatric CPR....Pages 825-829
wCReF – A Web Server for the CReF Protein Structure Predictor....Pages 831-838
Automating Search Strings for Secondary Studies....Pages 839-848
Visual Approach to Boundary Detection of Clusters Projected in 2D Space....Pages 849-854
Opposition-Based Particle Swarm Optimization Algorithm with Self-adaptive Strategy....Pages 855-861
Front Matter....Pages 863-863
Recruitment Drive Application....Pages 865-870
Evaluating Assignments Using Grading App....Pages 871-875
A Heuristic for State Power Down Systems with Few States....Pages 877-882
Internet Addiction in Kuwait and Efforts to Control It....Pages 883-886
Approaches for Clustering Polygonal Obstacles....Pages 887-892
Front Matter....Pages 893-893
Usability in Computer Security Software....Pages 895-898
Techniques for Detecting, Preventing and Mitigating Distributed Denial of Service (DDoS) Attacks....Pages 899-904
Next-Generation Firewalls: Cisco ASA with FirePower Services....Pages 905-906
DDoS Attacks: Defending Cloud Environments....Pages 907-909
Cyber Security Policies for Hyperconnectivity and Internet of Things: A Process for Managing Connectivity....Pages 911-914
DDoS Countermeasures....Pages 915-919
Removal of Impulsive Noise From Long Term Evolution Handset....Pages 921-927
A Synchronization Rule Based on Linear Logic for Deadlock Prevention in Interorganizational WorkFlow Nets....Pages 929-934
Summary Report of Experimental Analysis of Stemming Algorithms Applied to Judicial Jurisprudence....Pages 935-937
Front Matter....Pages 893-893
Applying Collective Intelligence in the Evolution of a Project Architecture Using Agile Methods....Pages 939-942
Development of Human Faces Retrieval in a Big Photo Database with SCRUM: A Case Study....Pages 943-945
An Agile Developed Interdisciplinary Approach for Safety-Critical Embedded System....Pages 947-949
The Implementation of the Document Management System “DocMan” as an Advantage for the Acceleration of Administrative Work in Macedonia....Pages 951-954
Back Matter....Pages 955-985




نظرات کاربران