ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Computer Science and its Applications: CSA 2013

دانلود کتاب پیشرفت در علوم کامپیوتری و برنامه های کاربردی آن: CSA 2013

Advances in Computer Science and its Applications: CSA 2013

مشخصات کتاب

Advances in Computer Science and its Applications: CSA 2013

دسته بندی: کامپیوتر
ویرایش: 1 
نویسندگان: , , ,   
سری: Lecture Notes in Electrical Engineering 279 
ISBN (شابک) : 9783642416736, 9783642416743 
ناشر: Springer-Verlag Berlin Heidelberg 
سال نشر: 2014 
تعداد صفحات: 1415 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 56 مگابایت 

قیمت کتاب (تومان) : 58,000



کلمات کلیدی مربوط به کتاب پیشرفت در علوم کامپیوتری و برنامه های کاربردی آن: CSA 2013: نرم افزار ریاضیات/روش های محاسباتی مهندسی، علوم کامپیوتر، عمومی، مهندسی نرم افزار/برنامه نویسی و سیستم های عامل



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 17


در صورت تبدیل فایل کتاب Advances in Computer Science and its Applications: CSA 2013 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در علوم کامپیوتری و برنامه های کاربردی آن: CSA 2013 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در علوم کامپیوتری و برنامه های کاربردی آن: CSA 2013



این جلسات بر جنبه‌های مختلف علوم کامپیوتر و کاربردهای آن تمرکز دارد، بنابراین فرصتی را برای متخصصان دانشگاهی و صنعتی فراهم می‌کند تا در مورد آخرین مسائل و پیشرفت‌ها در این زمینه و حوزه‌های مرتبط بحث کنند. این کتاب شامل نظریه و کاربردهای مشابه است.


توضیحاتی درمورد کتاب به خارجی

These proceedings focus on various aspects of computer science and its applications, thus providing an opportunity for academic and industry professionals to discuss the latest issues and progress in this and related areas. The book includes theory and applications alike.



فهرست مطالب

Front Matter....Pages 1-42
Fast Mode Decision Algorithm Based on Adaptive Search Direction for Combined Scalability in Scalable Video Coding....Pages 1-6
Monitoring and Automatic Control for Heating System of the Plant....Pages 7-12
Distributed Sensor-Driven Web Applications through Multi-device Usage Patterns....Pages 13-18
Touch Logger Resistant Mobile Authentication Scheme Using Multimodal Sensors....Pages 19-26
Commodity Recommendation Algorithm Based on Social Network....Pages 27-33
A Layered View Model of Social Experience Design: Beyond Single-User User Experience....Pages 35-41
A New Schedule Strategy of Embedded Multi-core SoC....Pages 43-49
A Power-Aware Scheduler Exploiting All Slacks under EDF Scheduling....Pages 51-57
Network-Threatening Element Extraction and Quantification Framework....Pages 59-64
Document Clustering Based on a Weighted Exponential Measurement....Pages 65-70
A Robust Feature Selection Method for Classification of Cognitive States with fMRI Data....Pages 71-76
Adaptive Networking for Continuous and Reliable Data Delivery in Wireless Sensor Networks....Pages 77-82
Model Transformation for Cyber Physical Systems....Pages 83-87
Load Balancing Improvement Methods in Video Conferencing Based on H.323 Standard....Pages 89-94
A Combination of Clonal Selection Algorithm and Artificial Neural Networks for Virus Detection....Pages 95-100
Muti-dimensional Architecture Modeling  for Cyber Physical Systems....Pages 101-105
An Algorithm of Group Scheduling with Void Filling in OBS Core Nodes....Pages 107-114
A Fast TRW Algorithm Using Binary Pattern....Pages 115-123
Efficient Descriptor-Filtering Algorithm for Speeded Up Robust Features Matching....Pages 125-130
Towards Effective 3D Model Management on Hadoop....Pages 131-139
Double Hot/Cold Clustering for Solid State Drives....Pages 141-146
A Case Study for Cyber Physical System with Hybrid Relation Calculus....Pages 147-151
Optimizing Functional Link Neural Network Learning Using Modified Bee Colony on Multi-class Classifications....Pages 153-159
Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform....Pages 161-166
A Dual Approach of GeneralMatch in Time-Series Subsequence Matching....Pages 167-172
An Approximate Multi-step k -NN Search in Time-Series Databases....Pages 173-178
The Role of Graph Theory in Solving Euclidean Shortest Path Problems in 2D and 3D....Pages 179-184
Illumination-Robust Local Pattern Descriptor for Face Recognition....Pages 185-190
MAP: An Optimized Energy-Efficient Cluster Header Selection Technique for Wireless Sensor Networks....Pages 191-199
MRP-NEP: A Non-Equal-Probability Multicast Routing Protocol for Target Tracking in Wireless Sensor Networks....Pages 201-208
Predicting Osteoporosis by Analyzing Fracture Risk Factors and Trabecular Microarchitectures of the Proximal Femur from DXA Images....Pages 209-216
Malicious Web Page Detection: A Machine Learning Approach....Pages 217-224
Proposal for Virtual Web Browser by Using HTML5....Pages 225-232
Design and Implementation of Task Context-Aware E-mail Platform for Collaborative Tasks....Pages 233-239
Empirical Analysis on the Users’ Reply Behaviors of Online Forums....Pages 241-247
On Companding Transform Techniques for OFDM Visible Light Communication over Indoor Dispersive Channels....Pages 249-254
Head Pose Estimation Based on Random Forests with Binary Pattern Run Length Matrix....Pages 255-260
Triggers That Increase Co-Creation Risks: A Consumer Perspective....Pages 261-271
A New Lightweight Protection Method against Impersonation Attack on SIP....Pages 273-277
Measuring Syntactic Sugar Usage in Programming Languages: An Empirical Study of C# and Java Projects....Pages 279-284
Log Pre-processor for Security Visualization....Pages 285-291
Fast Coding Unit (CU) Depth Decision Algorithm for High Efficiency Video Coding (HEVC)....Pages 293-299
A Study on Using OWC with Battery Storage for Providing Power to Sensor Nodes in a Fish Farm....Pages 301-307
Location-Based Intelligent Robot Management Service Model Using RGPSi with AoA for Vertical Farm....Pages 309-314
Design and Implementation of Intelligent Video Surveillance System Using Dual Cameras....Pages 315-320
Context-Aware Control Service Model Based on Ontology for Greenhouse Environment....Pages 321-326
An OWL-Based Ontology Model for Intelligent Service in Vertical Farm....Pages 327-332
Parallel Genetic Algorithm for Solving the Multilayer Survivable Optical Network Design Problem....Pages 333-338
A Context-Aware Collaborative Filtering Algorithm through Identifying Similar Preference Trends in Different Contextual Information....Pages 339-344
Survivable Flows Routing in Large Scale Network Design Using Genetic Algorithm....Pages 345-351
Belief Propagation in Bayesian Network....Pages 353-361
A Method of Search Scope Compaction for Image Indexes....Pages 363-368
Efficient Locking Scheme with OPOF on Smart Devices....Pages 369-378
A Requirement Analysis of Awareness-Based Vessel Traffic Service System for Maritime Safety....Pages 379-384
Analysis of Open Interface Function in USN Service Middleware System....Pages 385-390
Security Controls Based on K-ISMS in Cloud Computing Service....Pages 391-404
Implementation of Smart Grid Educational Application....Pages 405-410
Development of Open Service Interface’s Instructional Design Model in USN Middleware Platform Environment....Pages 411-416
The Analysis of Case Result and Satisfaction of Digital Textbooks for Elementary School Students....Pages 417-422
Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card....Pages 423-428
The Development of Convergent STEAM Program Focused on Rube Goldberg for Improvement of Engineer Career Awareness of Elementary School Students....Pages 429-434
Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services....Pages 435-443
Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior....Pages 445-451
Design of an RDFizer for Online Social Network Services....Pages 453-458
A High Performance and Bandwidth Efficient IDMA Scheme with Large Receiver MIMO Technologies....Pages 459-465
Security Considerations for Smart Phone Smishing Attacks....Pages 467-473
Technology Venture Startup Invigoration Strategy for Building Infrastructures for the Business Startup Ecosystem....Pages 475-482
Smart-Contents Visualization of Vehicle Big Data Using Vehicle Navigation Status Information....Pages 483-488
A Model for Analyzing the Effectiveness of Smart Mobile Communication Quality Measurement....Pages 489-495
Characteristics Analysis and Library Development for Common Lamps by Using PSPICE Modeling....Pages 497-501
A Study on Brake Torque for Traction Motors by Using the Electric Brake....Pages 503-507
A Virtual Cluster Scheme Technology for Efficient Wireless Sensor Networks....Pages 509-514
Implementation of Wireless Electronic Acupuncture System....Pages 515-522
Network Based Intelligent Agent for Ubiquitous Environments....Pages 523-530
A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network....Pages 531-535
Design of User Access Authentication and Authorization System for VoIP Service....Pages 537-541
Approach of Secure Authentication System for Hybrid Cloud Service....Pages 543-550
Intelligent Inference System for Smart Electronic Acupuncture....Pages 551-558
Electric Braking Control System to Secure Braking Force in the Wide Speed Range of Traction Motor....Pages 559-564
Optimized Design of Charger for Electric Vehicles with Enabled Efficient CCCV Mode Movement....Pages 565-570
Ubiquitous Mobile Computing on Cloud Infrastructure....Pages 571-576
Identifying Invalid Data within Operating System for Higher Flash Utilization....Pages 577-581
Moving Human Detection Using Motion Depth in Depth Image Sequences....Pages 583-589
Microbial Fuel Cell for STEAM Teaching Tools and Method....Pages 591-596
Research on Educational Use of Smart-Phone Applications with Smart Clicker Technique....Pages 597-602
Hierarchical Customization Method for Ubiquitous Web Applications....Pages 603-608
PV System for Medical Devices in the Hospital....Pages 609-614
Color Image Retrieval Using Fuzzy Measure Hamming and S-Tree....Pages 615-620
Pipeline Verification via Closed-Loop Feedback....Pages 621-626
Fuzzy Rule-Based to Predict the Minimum Surface Roughness in the Laser Assisted Machining (LAM)....Pages 627-632
GRT-Multigraphs for Communication Networks: A Fuzzy Theoretical Model....Pages 633-641
Exploring the Key Determinants of Successful ICT Innovation Adoption: A Case Study of a Fishing Community in Thailand....Pages 643-648
Dynamic Bandwidth Allocation Algorithm for Ethernet Passive Optical Networks Based on Traffic Prediction....Pages 649-654
Game Based Learning for Teaching Electrical and Electronic Engineering....Pages 655-660
Mobile WiMAX Resource Allocation Design Goals: Key Features/Factors/Issues....Pages 661-667
Hybrid Trust Framework for Loss of Control in Cloud Computing....Pages 669-675
Secure Authorized Proxy Signature Scheme for Value-Added Service in Vehicular Ad Hoc Networks....Pages 677-684
The Computer-Aided System for Promoting Judgments of Umpires....Pages 685-693
A Distributed Model to Analyzed QoS Parameters Performance Improvement for Fixed WiMAX Networks....Pages 695-701
A Hybrid of Fixed-Size and Dynamic-Size Tile Algorithm for Panoramic View on Mobile Devices....Pages 703-708
A Relationship Strength-Aware Topic Model for Communities Discovery in Online Social Networks....Pages 709-715
Replication in Data Grid: Determining Important Resources....Pages 717-722
Backpropagation Neural Network for Sex Determination from Patella in Forensic Anthropology....Pages 723-728
Learning History Using Role-Playing Game (RPG) on Mobile Platform....Pages 729-734
Experiment on Modified Artificial Bee Colony for Better Global Optimisation....Pages 735-741
Ontology-Supported Development for Drug Analysis Laboratory Corresponding to the ISO/IEC 17025 Standard....Pages 743-749
Modeling the Natural Capital Investment on Tourism Industry Using a Predator-Prey Model....Pages 751-756
Study on Tracking Derivative Based Method for DC System Grounding Fault Detection....Pages 757-762
Towards a VLIW Architecture for the 32-Bit Digital Signal Processor Core....Pages 763-768
Application and Effectiveness of Cooperative Teaching Strategies in Entrepreneurship Education....Pages 769-774
Isarn Dharma Alphabets to Thai Language Translation by ATNs....Pages 775-782
Simulation and Analysis of Space Station Redocking....Pages 783-789
Campus Mobile Navigation System Based on Shortest-Path Algorithm and Users Collaborations....Pages 791-797
Tracking Multiple Fish in a Single Tank Using an Improved Particle Filter....Pages 799-804
Efficient 3D Model Visualization System of Design Drawing Based on Mobile Augmented Reality....Pages 805-810
A New Co-evolutionary Immune Algorithm for Flow Shop with Zero Wait....Pages 811-817
Design and Implementation of Safety Verification for Civil Aviation Processing System Based on BPMN....Pages 819-827
A Survey on Ontology Mapping Techniques....Pages 829-836
The Parametric Design and Automatic Assembly of Hydrostatic Rotary Table Based on Pro/Engineer....Pages 837-842
Modeling and Simulation of China’s Competition Strategy for Highly Educated Talents Based on System Dynamic....Pages 843-851
Kernelized-QEMU: A Study of System-Level Virtual Layer in Linux Kernel....Pages 853-861
A Multi-pattern Matching Algorithm Based on Double Array Trie....Pages 863-868
Lower Bound Estimation for Required Number of Nodes in the Opportunistic Communication – Based Wireless Sensor Network....Pages 869-875
Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks....Pages 877-883
To Practice Management Innovation and Reinforce the Foundation of Intellectual Property Strategy....Pages 885-892
Research of Intranet Security Audit in E-government Management Website Group Based on Multi-agents....Pages 893-899
Simulation of Three-Phase Voltage-Source PWM Rectifier with LCL Filter....Pages 901-909
The Research on the Computer Control Technology of Tobacco Production....Pages 911-917
A Study on the Application of Financial Engineering in Supply Chain Risk Management....Pages 919-927
Logical Symmetry Based K-means Algorithm with Self-adaptive Distance Metric....Pages 929-936
Modeling and Simulation of Network-Based C2 System Based on AOA....Pages 937-942
Application Study of Spatiotemporal Chaotic Sequence in Code Division Multiple Access Communication System....Pages 943-949
OPRF Secure Computation for Safety Neighbor Verification Protocols of Wireless Sensor Networks....Pages 951-955
Texture Terrain Based on Land Cover Distribution....Pages 957-965
Text Mining for Information Screen in Risk Assessment of Environmental Endocrine Disruptive Chemicals....Pages 967-972
The Choices of Issued Inventory Valuation Methods Based on Different Accounting Standards at Home and Abroad....Pages 973-979
Formal Constraints Research of Military Conceptual Model Elements....Pages 981-987
Leaf Lesion Detection Method Using Artificial Bee Colony Algorithm....Pages 989-995
The Accurate Positioning Method of Data Matrix Code Image Marked in Cylinder Glass....Pages 997-1005
Analysis of Urban Traffic Based on Taxi GPS Data....Pages 1007-1015
Research and Application of Embedded System Development Based on Petri Nets....Pages 1017-1021
CloStor: A Cloud Storage System for Fast Large-Scale Data I/O....Pages 1023-1030
Nonnegative Variable Weight Based Auto Parts Combination Demand Forecasting Model Research....Pages 1031-1038
A Data-Hiding Method Based on TCP/IP Checksum....Pages 1039-1044
A Parallel Full-System Emulator for Risc Architure Host....Pages 1045-1052
Density Based Active Self-training for Cross-Lingual Sentiment Classification....Pages 1053-1059
Constructing 3D Model Based on Panoramic Images....Pages 1061-1065
QoE Evaluation Model of Anti-Spam Allergy Problem Based on Fuzzy Entropy Method and Hidden Markov Model....Pages 1067-1072
Topic Identification Strategy for English Academic Resources....Pages 1073-1078
Performance Comparison between MLP Neural Network and Exponential Curve Fitting on Airwaves Data....Pages 1079-1087
A Private Cloud Storage System Based on Multithread Optimization....Pages 1089-1095
Cloud Storage-Based Medical Data Integration Technology....Pages 1097-1102
The Operation and Maintenance Management System of the Cloud Computing Data Center Based on ITIL....Pages 1103-1108
Underwater Object Detection by Combining the Spectral Residual and Three-Frame Algorithm....Pages 1109-1114
The Data Mining of Breast Cancer Based-on K-Means....Pages 1115-1120
Compositional Modeling for Underwater Warfare Simulation Based on HLA and Flames....Pages 1121-1127
Spot Electricity Price Dynamics of Indian Electricity Market....Pages 1129-1135
Guaranteed QoS for UDP and TCP Flows to Measure Throughput in VANETs....Pages 1137-1143
Detecting People Using Histogram of Oriented Gradients: A Step towards Abnormal Human Activity Detection....Pages 1145-1150
Research of Touchscreen Terminals Gesture Operation Error Based on Kansei Engineering....Pages 1151-1158
Heart Sound Feature Extraction Based on Wavelet Singular Entropy....Pages 1159-1163
Research on MTMP Structure Chlorine Dosing Decoupling Control....Pages 1165-1170
Development of Ontology for the Diseases of Spine....Pages 1171-1178
Implementation of Information Retrieval Service for Korean Spine Database with Degenerative Spinal Disease....Pages 1179-1184
Automatic Surface Mesh Intersection Algorithm of Spine and Implant FEM Models....Pages 1185-1193
Simulation Program Binding Technology Based on Supercomputing....Pages 1195-1200
Data Security in Cloud for Health Care Applications....Pages 1201-1209
Web Service Selection Using Decision Tree Analysis in a Risky Environment....Pages 1211-1217
An Enhanced e-Voting System in Cloud Using Fingerprint Authentication....Pages 1219-1224
Local Minima Jump PSO for Workflow Scheduling in Cloud Computing Environments....Pages 1225-1234
Respiratory Rate Estimation by Extracted PPG Signals from Embedded Smart Attire of Operation Strategists....Pages 1235-1240
The Assessment of Information and Communication Technology (ICT) Policy in South Korea....Pages 1241-1249
Computer Graphical Score and Music Education: Application to Music Animation Machine MIDI Player....Pages 1251-1257
A Newton’s Universal Gravitation Inspired Firefly Algorithm for Document Clustering....Pages 1259-1264
A Study on the Correlation between the Customers’ Perceived Risks and Online Shopping Tendencies....Pages 1265-1271
Model Checking Probabilistic Timed Systems against Timed Automata Specification....Pages 1273-1278
Particle Filter Parallel of Improved Algorithm Based on OpenMp....Pages 1279-1285
An E-commerce-System-Based Research on Trust Risk Assessment Models....Pages 1287-1294
An Analysis about the Security of the Operating System Trusted Platform....Pages 1295-1301
Technology Venture Startup Invigoration Strategy for Building Infrastructures for the Business Startup Ecosystem....Pages 1303-1309
Smart-Contents Visualization of Vehicle Big Data Using Vehicle Navigation Status Information....Pages 1311-1316
A Model for Analyzing the Effectiveness of Smart Mobile Communication Quality Measurement....Pages 1317-1323
Characteristics Analysis and Library Development for Common Lamps by Using PSPICE Modeling....Pages 1325-1329
A Study on Brake Torque for Traction Motors by Using the Electric Brake....Pages 1331-1335
FOLI Technique Algorithm for Real-Time Efficient Image Processing....Pages 1337-1342
Stabilization Inverse Optimal Control of Nonlinear Systems with Structural Uncertainty....Pages 1343-1348
Implementation of Wireless Electronic Acupuncture System....Pages 1349-1356
Network Based Intelligent Agent for Ubiquitous Environments....Pages 1357-1364
A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network....Pages 1365-1369
Design of User Access Authentication and Authorization System for VoIP Service....Pages 1371-1375
Approach of Secure Authentication System for Hybrid Cloud Service....Pages 1377-1384
Intelligent Inference System for Smart Electronic Acupuncture....Pages 1385-1392
Electric Braking Control System to Secure Braking Force in the Wide Speed Range of Traction Motor....Pages 1393-1398
Optimized Design of Charger for Electric Vehicles with Enabled Efficient CCCV Mode Movement....Pages 1399-1404
A Virtual Cluster Scheme Technology for Efficient Wireless Sensor Networks....Pages 1405-1410
An Intelligent e-Services Composition Platform for Ubiquitous Baby Care: The Case Study of Life and Commercial Support Services for Property Management....Pages 1411-1416
An Authoring System of Creating Graphic Map for Item Search Based on Library OPACs....Pages 1417-1422
Cloud-Based Traveling Video Editing System....Pages 1423-1428
Linked Data-Based Service Publication for Service Clustering....Pages 1429-1435
The Practical Quality Model for Cloud Learning System....Pages 1437-1442
Realizing the Right to Be Forgotten in an SNS Environment....Pages 1443-1449
Erratum: Security Considerations for Smart Phone Smishing Attacks....Pages E1-E1
Back Matter....Pages 1-6




نظرات کاربران