دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. نویسندگان: Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi سری: Advances in Intelligent Systems and Computing 1184 ISBN (شابک) : 9789811558580, 9789811558597 ناشر: Springer Singapore;Springer سال نشر: 2021 تعداد صفحات: 599 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 23 مگابایت
کلمات کلیدی مربوط به کتاب مجموعه مقالات پنجمین کنگره بین المللی فناوری اطلاعات و ارتباطات: ICICT 2020 ، لندن ، جلد 2: مهندسی، مهندسی ارتباطات، شبکه ها، شبکه های ارتباطی کامپیوتری، هوش محاسباتی
در صورت تبدیل فایل کتاب Proceedings of Fifth International Congress on Information and Communication Technology: ICICT 2020, London, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات پنجمین کنگره بین المللی فناوری اطلاعات و ارتباطات: ICICT 2020 ، لندن ، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالات پژوهشی با کیفیت بالا را گردآوری میکند که در
پنجمین کنگره بینالمللی فناوری اطلاعات و ارتباطات، که در
دانشگاه برونل، لندن، در 20 تا 21 فوریه 2020 برگزار شد، ارائه
شده است. فناوری اطلاعات و ارتباطات) برای کاربردهای مدیریتی،
حکومت الکترونیک، کشاورزی الکترونیک، آموزش الکترونیکی و
فناوریهای محاسباتی، اینترنت اشیا (IoT) و استخراج الکترونیکی.
این کتاب که توسط کارشناسان و محققان محترمی که در زمینه ICT
کار می کنند نوشته شده است، دارایی ارزشمندی را برای محققان
جوان درگیر در مطالعات پیشرفته ارائه می دهد.
This book gathers selected high-quality research papers
presented at the Fifth International Congress on Information
and Communication Technology, held at Brunel University,
London, on February 20–21, 2020. It discusses emerging topics
pertaining to information and communication technology (ICT)
for managerial applications, e-governance, e-agriculture,
e-education and computing technologies, the Internet of
Things (IoT) and e-mining. Written by respected experts and
researchers working on ICT, the book offers a valuable asset
for young researchers involved in advanced studies.
Front Matter ....Pages i-xiii
Novel Methods Based on CNN for Improved Bacteria Classification (Chahes Chopra, Rohit Verma)....Pages 1-16
Plasma Temperature Classification for Cancer Treatment Based on Hadron Therapy (Vala Mehryar Alviri, Sheida Asad Soleimani, Morteza Modarresi Asem)....Pages 17-36
On the Specific Role of Electronic Document and Record Management Systems in Enterprise Integration (Ingrid Pappel, Sidra Butt, Ingmar Pappel, Dirk Draheim)....Pages 37-51
Robotic Tool to Multi Time-Lapse Videos Creation (João Roberto de Toledo Quadros, Roberto de Castro Souza Pinto)....Pages 52-63
Accomplishment of Multimedia Ontology for the Tunisian Archaeology Field (Degachi Haifa, Yengui Ameni, Neji Mahmoud)....Pages 64-72
Ontology-Based Information Extraction Framework for Academic Knowledge Repository (Veena Jose, V. P. Jagathy Raj, Shine K. George)....Pages 73-80
PLS Approach to Measure the Impact of Digital Transformation on User Satisfaction: Case of Local Public Services in the Northern Region of Morocco (Fadoua Laghzaoui, Najoua El Abbas El Ghaleb, Mohcine Ben Sabih El Imrany)....Pages 81-90
SB-Spectral Clustering Algorithm for Clustering and Validating Sensor (Abdo M. Almajidi, V. P. Pawar)....Pages 91-102
Analysis of Precoding-Based Pilot Decontamination Methods in Massive MIMO Systems (Angelina Misso, Baraka Maiseli, Mussa Kissaka)....Pages 103-110
A Quantitative Assessment of the Television White Space in Tanzania: A Case of Coastal and Morogoro Regions (Moses Ismail, Mussa Kissaka)....Pages 111-118
Potentials of Digital Business Models in Tourism—Qualitative Study with German Experts (Ralf Härting, Raphael Kaim, Lisa Fleischer, Alexander Sprengel)....Pages 119-126
An Efficient and Secure User Authentication Protocol for Smart Card Users (Javed R. Shaikh)....Pages 127-135
Composite Routing Approach for Vehicular Delay-Tolerant Networks (Sudhakar Pandey, Sanjay Kumar, Vishakha Chourasia)....Pages 136-143
Emergency Detection with Environment Sound Using Deep Convolutional Neural Networks (Jivitesh Sharma, Ole-Christoffer Granmo, Morten Goodwin)....Pages 144-154
The Application of Finite Element Method to Analyze Passive Failure and Deformation Mechanisms of Soil in Front of Tunnel Face (Nguyen Anh Tuan)....Pages 155-163
The Working Capacity of Vietnamese Local Civil Servants (Ngo Sy Trung, Do Huu Hai, Vu Thi Yen Nga, Tran Thi Hanh)....Pages 164-175
AI-HI…The Technological Transgenders (AI-HI Techno-Trans) (Vijay Singh Rathore)....Pages 176-183
Reliability of the Kinovea bidimensional System for Measuring Buccal Movement in a Sample of Italian Adults (Giulia Rossi, Giovanni Galeoto, Antonio Amitrano, Elisa Leonetti, Livia Flammini, Marco Tofani et al.)....Pages 184-193
A Technique to Analyze a Cassandra Tombstone for Identification of Operations (Vinod Pachghare, Rupali Chopade)....Pages 194-201
Computer-Assisted Self-Training for Kyudo Posture Rectification Using Computer Vision Methods (Wardah Farrukh, Dustin van der Haar)....Pages 202-213
Accident Detection Using Time-Distributed Model in Videos (Garima Gupta, Ritwik Singh, Ashish Singh Patel, Muneendra Ojha)....Pages 214-223
Analysis of Traditional Computer Vision Techniques Used for Hemp Leaf Water Stress Detection and Classification (Waseem Shaikjee, Dustin van der Haar)....Pages 224-235
Active Surface Calculation Method Using Kinetic-Hydrodynamic Model (Yury Nikitchenko, Sergey Popov, Alena Tikhonovets)....Pages 236-244
A Three-Layer Architecture for Intelligent Intrusion Detection Using Deep Learning (Liu Zhiqiang, Lin Zhijun, Gong Ting, Shi Yucheng, Mohi-Ud-Din Ghulam)....Pages 245-255
Program Execution Comprehension Modelling for Algorithmic Languages Learning Using Ontology-Based Techniques (Mikhail Denisov, Anton Anikin, Oleg Sychev, Alexander Katyshev)....Pages 256-269
Multipathing Communication in Heterogeneous Ad Hoc Network (Chaimae Benjbara, Nada Mouchfiq, Ahmed Habbani)....Pages 270-278
Integration of Web-Scraped Data in CPM Tools: The Case of Project Sibilla (Alessio Bechini, Beatrice Lazzerini, Francesco Marcelloni, Alessandro Renda)....Pages 279-287
Security Issues in MANETs: A Survey (Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara)....Pages 288-295
Depression Detection Using Audio-Visual Data and Artificial Intelligence: A Systematic Mapping Study (José Balbuena, Hilda Samamé, Silvana Almeyda, Juan Mendoza, José Antonio Pow-Sang)....Pages 296-306
IT&C System Solution for Visually Impaired Romanian Teenagers (Isabela Todirițe, Corina Radu Frenţ, Mihaiela Iliescu)....Pages 307-315
A Survey on Named Entity Recognition Solutions Applied for Cybersecurity-Related Text Processing (Tiberiu-Marian Georgescu, Bogdan Iancu, Alin Zamfiroiu, Mihai Doinea, Catalin Emilian Boja, Cosmin Cartas)....Pages 316-325
URL’s Folder Name Length as a Phishing Detection Feature (Melad Mohamed Al-Daeef, Nurlida Basir, Madihah Mohd Saudi)....Pages 326-333
Future of Governance for Digital Platform Ecosystems (Meelis Kitsing, Johanna Vallistu)....Pages 334-341
Azimuth Tree-Based Self-organizing Protocol for Internet of Things (Veena Anand, Prerana Agrawal, Pothuri Surendra Varma, Sudhakar Pandey, Siddhant Kumar)....Pages 342-356
Evaluation of Confidentiality and Data Integrity Based on User Session for IoT Environment (Alwi Bamhdi, Omar Abdulgadir, Akram Kargar, Ahmed Patel, Bandar Al Ghamdi)....Pages 357-367
Quantales for Uncertainty in Design Engineering (Patrik Eklund)....Pages 368-376
Deciphering of the gpsOne File Format for Assisted GPS Service (Vladimir Vinnikov, Ekaterina Pshehotskaya)....Pages 377-386
Learning Effects of Different Learning Materials About Automated Driving Level 3: Evidence from a Propensity Score Matching Estimator (Maki Arame, Junko Handa, Yoshiko Goda, Masashi Toda, Ryuichi Matsuba, Huiping Zhou et al.)....Pages 387-394
A Health Decision Support Framework for the Prediction of Cognitive Ability in Older People (Hui Yang, Peter A. Bath)....Pages 395-405
Incorporating Stability Estimation into Quality of Service Routing in an SDN-Based Data Centre Network (Ayotuyi T. Akinola, Matthew O. Adigun, Pragasen Mudali)....Pages 406-416
Convergence Speed up Using Convolutional Neural Network Combining with Long Short-Term Memory for American Sign Language Alphabet Recognition (Busarakorn Supitchaya, Varin Chouvatut)....Pages 417-425
Pain Detection Using Deep Learning with Evaluation System (Kornprom Pikulkaew, Ekkarat Boonchieng, Waraporn Boonchieng, Varin Chouvatut)....Pages 426-435
Cooperative Location Acquisition of Mobile Nodes Without Direct Distance Measurement (Masaaki Namekata, Hiroaki Higaki)....Pages 436-444
E-Learning and Industry 4.0: A Chatbot for Training Employees (Fabio Clarizia, Massimo De Santo, Marco Lombardi, Domenico Santaniello)....Pages 445-453
A Secure Smart City Infrastructure Framework for E-Service Delivery Within a Developing Country: A Case of Windhoek in Namibia (Licky Richard Erastus, Nobert Rangarirai Jere, Fungai Bhunu Shava)....Pages 454-469
A Multigraph Approach for Supporting Computer Network Monitoring Systems (Francesco Colace, Muhammad Khan, Marco Lombardi, Domenico Santaniello)....Pages 470-477
Comparing Phonetic Reduction in Russian as First and Second Language: From Psycholinguistics to Natural Language Processing (Elena I. Riekhakaynen)....Pages 478-486
Ensuring Continued Use of Information Systems in an Organization (Mohd Zuhan Mohd Zain, Ab Razak Che Hussin)....Pages 487-494
A Cost-Effective 3D Acquisition and Visualization Framework for Cultural Heritage (Hosameldin Osman Ahmed, Abdelhak Belhi, Taha Alfaqheri, Abdelaziz Bouras, Abdul H. Sadka, Sebti Foufou)....Pages 495-503
Practical Vulnerability Analysis of Mouse Data According to Offensive Security Based on Machine Learning (Kyungroul Lee, Hoon Ko, Hyoungju Kim, Sun-Young Lee, Junho Choi)....Pages 504-510
Preliminary Study and Implementation of Chiang Mai Tourism Platform Based on DOSA (Vorada Panpeng, Miao Fang, Aniwat Phaphuangwittayakul, Tanarat Rattanadamrongaksorn)....Pages 511-521
Factors of Implementing Citizen-Centric e-Government in Developing Countries: Namibia (Karin Frohlich, Marko Nieminen, Antti Pinomaa)....Pages 522-532
Integration of Blockchain and Remote Database Access Protocol-Based Database (Muhammad Jafar Sadeq, S. Rayhan Kabir, Marjan Akter, Rokeya Forhat, Rafita Haque, Md. Akhtaruzzaman)....Pages 533-539
Crossing the Artificial Intelligence (AI) Chasm, Albeit Using Constrained IoT Edges and Tiny ML, for Creating a Sustainable Food Future (Chandrasekar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Raja Vuppalapati, Jaya Vuppalapati, Santosh Kedari)....Pages 540-553
Design and Development of System for Post-infection Attack Behavioral Analysis (Toivo Herman Kamati, Dharm Singh Jat, Saurabh Chamotra)....Pages 554-565
Multi-threaded Multilayer Neural Network for Character Recognition (Arun Vaishnav, Manju Mandot, Priyanka Soni)....Pages 566-574
Threat Detection in Social Media Images Using the Inception-v3 Model (Shatha AbdulAziz AlAjlan, Abdul Khader Jilani Saudagar)....Pages 575-582
Back Matter ....Pages 583-585