Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Information Technology - New Generations (eBook)

15th International Conference on Information Technology

Shahram Latifi (Herausgeber)

eBook Download: PDF
2018
XVII, 818 Seiten
Springer International Publishing (Verlag)
978-3-319-77028-4 (ISBN)

Lese- und Medienproben

Information Technology - New Generations -
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.



Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas

Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas

Part I Cybersecurity1. Safeguarding Personal Health Information: Case Study2. Cybersecurity as People Powered Perpetual Innovation3. Performance Study of the Impact of Security on 802.11ac Networks4. Training Neural Tensor Networks with the Never Ending Language Learner5. PERIA-Framework: A Prediction Extension Revision Image Annotation Framework6. The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan7. Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network8. A Virtual Animated Commentator Architecture for Cybersecurity Competitions9. Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features10. Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)11. A Self Proxy Signature Scheme over NTRU Lattices12. Towards an Ontology of Security Assessment: a core model proposal13. Integration of Mobile Forensic Tool Capabilities14. Deep Packet Inspection: A Key Issue for Network Security15. What Petya/NotPetya Ransomware is and What its Remidiations are16. Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform17. New Techniques for Public Key Encryption with Sender Recovery18. Cloud Intrusion Detection and Prevention system for M-voting application in South Africa19. Protecting Personal Data with Blockchain Technology20. The Role of CAE-CDE in Cybersecurity Education for Workforce Development21. Software Optimizations for DES Part II Networking and Wireless Communications22. Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment23. End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks24. Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges25. A Dual canister medicine IoT Dispenser26. Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks27. Denial of service attacks in wireless sensor networks with proposed countermeasuresPart III Education and Technology28. Internet-Based Education: A New Milestone for Formal Language and Automata Courses29. Teaching Communication Management in Software Projects through Serious Educational Games30. Gamification applied in the teaching of agile Scrum methodology31. An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework Part IV Agile Software Testing and Development32. Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects33. Alignment of Requirements and Testing in Agile: an Industrial Experience34. Health Care Information Systems: A Crisis Approach35. Using Correct-by-Construction Software Agile Development36. Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services  37. Improving Agile Software Development with Domain Ontologies38. A Stratified Sampling Algorithm for Artificial Neural NetworksPart V Data Mining/Machine Learning  39. Mining ENADE Data from the Ulbra Network Institution40. Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)41. Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise42. Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets43. Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series44. DeRis: Information system supporting the prediction of default risk in companies45. Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm46. Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics47. A model for hour-wise prediction of mobile device energy availability48. Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model49. A Traffic Light Recognition Device50. An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment51. Reproducible Research in Document Analysis and Recognition52. Music Genre Classification using Data Mining and Machine Learning 53. Improving word representations using Paraphrase dataset54. A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions55. Dual Long Short-Term Memory Networks for Sub-Character Representation Learning56. Business Intelligence Dashboard Application for Insurance Cross Selling 57. Speech Features Analysis for Tone Language Speaker Discrimination Systems58. Selection of Transformations of Continuous Predictors in Logistic RegressionPart VI Software Engineering 59. A Generic Approach to Efficiently Parallelize Legacy Sequential Software60. Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications61. A Timed Petri Net Model to Specify Scenarios of Video Games62. Survey of Biometric Techniques for Automotive Applications63. A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations64. Budget and User Feedback Control Strategy-based PRMS Scenario Web Application65. A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules66. An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games67. A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies68. Increasing the prediction quality of software defective modules with automatic feature engineeringPart VII High Performance Computing Architectures 69. NSF Noyce Recruitment and Mentorship70. Mining Associations between Two Categories using Unstructured Text Data in Cloud71. A Note on Computational Science Curriculum72. Development of a Local Cloud-Based Bioinformatics ArchitecturePart VIII73. A Computer Vision Based Algorithm for Obstacle Avoidance74. The ST-Vis tool for SpatioTemporal Visualization75. Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima76. Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network77. Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation78. Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC CountriesPart IX Health, Bioinformatics, Pattern Detection and Optimization 79. Benefits of Establishing Makerspaces in Distributed  Development Environment80. Semantic Description of Healthcare Devices to Enable Data Integration81. Applying transfer learning to QSAR regression models82. Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine83. A Complete Diabetes Management and Care System84. On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim MonitoringPart X Potpourri85. Smart Lighting Controlling System: Case Study of Yarmouk University Museum86. Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation87. Degree Aware Triangulation of Annular Regions88. Heuristic Approaches for the Open-Shop Scheduling Problem89. Continuous State Power-down Systems for Renewable Energy Management90. Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded SystemsPart XI Short Papers 91. Customer services management and satisfaction of Internet-related banking of First National Bank92. BIG IoT – Interconnecting IoT Platforms from different domains - First success story93. Cross-Cultural Perspective of E-Commerce Website Usability Requirements: Through the Lens of Individual’s Perception94. Methods of Ensuring the Reliability and Fault Tolerance of Information Systems95. Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise96. Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly97. A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company98. Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review99. Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)100. Method of Processing Big Data101. Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan102. Modified Human Code for Bandwidth Optimization through Lossless CompressionIndex

Erscheint lt. Verlag 12.4.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XVII, 818 p. 466 illus., 362 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Computer Vision, HCI and Image Processing/Analysis • cybersecurity • Data Mining • Health, Bioinformatics, Pattern Detection and Optimization • High Performance Computing Architectures • Information Technology • Networking and Wireless Communications • Software engineering
ISBN-10 3-319-77028-4 / 3319770284
ISBN-13 978-3-319-77028-4 / 9783319770284
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technische und organisatorische Schutzmaßnahmen gegen Datenverlust …

von Thomas H. Lenhard

eBook Download (2025)
Springer Vieweg (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 45,90
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 38,95