Advances in Internet, Data & Web Technologies (eBook)
XXXII, 1076 Seiten
Springer International Publishing (Verlag)
9783319759289 (ISBN)
This book presents original contributions on the theories and practices of emerging Internet, data and Web technologies and their applicability in businesses, engineering and academia, focusing on advances in the life-cycle exploitation of data generated from the digital ecosystem data technologies that create value, e.g. for businesses, toward a collective intelligence approach.
The Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two of the most prominent paradigms and are found in a variety of forms, such as data centers, cloud computing, mobile cloud, and mobile Web services. These technologies together create a digital ecosystem whose cornerstone is the data cycle, from capturing to processing, analyzing and visualizing. The investigation of various research and development issues in this digital ecosystem are made more pressing by the ever-increasing requirements of real-world applications that are based on storing and processing large amounts of data.
The book is a valuable resource for researchers, software developers, practitioners and students interested in the field of data and web technologies.
Welcome Message of EIDWT-2018 International Conference Organizers 6
EIDWT-2018 International Conference Organizers 7
EIDWT-2018 Steering Committee Co-chairs 7
EIDWT-2018 General Co-chairs 7
EIDWT-2018 Program Committee Co-chairs 7
EIDWT-2018 Organizing Committee 8
Honorary Chair 8
General Co-chairs 8
Program Co-chairs 8
International Advisory Committee 8
Publicity Co-chairs 8
International Liaison Co-chairs 9
Local Organizing Co-chairs 9
Web Administrators 9
Finance Chair 9
Steering Committee Co-chairs 9
Track Area Chairs 9
1. Databases, Knowledge Discovery, Semantics, and Mining 9
Track Chairs 9
PC Members 10
2. Ontologies, Metadata Representation, and Digital Libraries 10
Track Chairs 10
PC Members 10
3. P2P, Grid, and Cloud Computing 10
Track Chairs 10
PC Members 11
4. Parallel and Distributed Systems 11
Track Chairs 11
PC Members 11
5. Networked Data Centers, IT Virtualization Technologies, and Clouds 11
Track Chairs 11
PC Members 12
6. Network Protocols, Modeling, Optimization and Performance Evaluation 12
Track Chairs 12
PC Members 12
7. Data Security, Trust and Reputation 13
Track Chairs 13
PC Members 13
8. Web Science, Learning and Business Intelligence 13
Track Chairs 13
PC Members 13
9. Data Analytics for Learning and Virtual Organisations 13
Track Chairs 13
PC Members 14
10. Data Management and Information Retrieval 14
Track Chairs 14
PC Members 14
11. Massive Processing and Machine Learning on Large Data Sets 14
Track Chairs 14
PC Members 15
12. Data Modeling, Visualization and Representation Tools 15
Track Chairs 15
PC Members 15
13. IoT and Fog Computing 15
Track Chairs 15
PC Members 15
14. Mobile and Wireless Networks 16
Track Chairs 16
PC Members 16
15. Big Data Management and Scalable Storage Technologies 16
Track Chairs 16
PC Members 16
16. Energy-Aware and Green Computing Systems 17
Track Chairs 17
PC Members 17
17. Multimedia Networking and Medical Applications 17
Track Chairs 17
PC Members 17
18. Applied Cryptography and Cloud Security 18
Track Chairs 18
PC Members 18
EIDWT-2018 Reviewers 18
EIDWT-2018 Keynote Talks 20
Smart Cities and Safe Cities by Situational Awareness and Computational Intelligence 21
Cyber-Human Partnerships—Toward a Resilient Ecosystem in Smart Cities 22
Contents 23
Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage System 33
1 Introduction 33
2 CSMA/CA 34
3 Application of Fuzzy Logic for Control 35
3.1 FC 35
3.2 FC Rules 35
3.3 Control Knowledge Base 36
3.4 Defuzzification Methods 36
4 Implemented Testbed 37
4.1 FACS 37
4.2 Testbed Structure 39
4.3 CCM 41
4.4 Congestion Process Phases 44
5 Experimental Results 44
6 Conclusions 47
References 47
A Web-Based English Listening System for Learning Different Pronunciations in Various Countries 50
Abstract 50
1 Introduction 50
2 Motivation 51
3 Proposed System 53
3.1 English Speech Database 53
3.2 A Function of Extracting Regions Based on Easiness in English Speech Hearing 54
4 Prototype System 55
4.1 A Function of Generating Cloze Tests 57
4.2 A Function of Calculating Correct Answer Rates 57
4.3 A Function of Calculating Correct Answer Rates for Regions 57
4.4 A Function of Balancing Number of Questions for Each Region 57
5 Experiment 58
6 Conclusion 60
Acknowledgments 60
References 60
FOG Computing and Low Latency Context-Aware Health Monitoring in Smart Interconnected Environments 61
1 Background 61
2 Smart Environments 62
3 Latency 63
4 The FOG Health Monitoring Model 65
5 Communications and Networking 66
6 Illustrative Scenarios 67
7 Discussion and Concluding Observations 69
References 70
Application of Fuzzy Logic for Improving Human Sleeping Conditions in an Ambient Intelligence Testbed 73
1 Introduction 73
2 Ambient Intelligence (AmI) 74
3 Application of Fuzzy Logic for Control 75
3.1 FC 75
3.2 Linguistic Variables 76
3.3 FC Rules 76
3.4 Control Knowledge Base 76
3.5 Defuzzification Methods 77
4 Proposed Fuzzy-Based System 77
5 Simulation Results 80
6 Conclusions 81
References 81
Performance Evaluation of WMN-PSOSA Considering Four Different Replacement Methods 83
1 Introduction 83
2 Node Placement Problem in WMNs 85
3 Proposed and Implemented Simulation System 85
3.1 PSO Algorithm 85
3.2 Simulated Annealing 86
3.3 WMN-PSOSA Hybrid Simulation System 87
4 Simulation Results 91
5 Conclusions 93
References 94
Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input Parameters 97
1 Introduction 97
2 Scenarios of Collaborative Teamwork 99
2.1 Collaborative Teamwork and Virtual Campuses 99
2.2 Mobile Ad hoc Networks (MANETs) 100
3 Group Activity Awareness Model 101
4 Application of Fuzzy Logic for Control 102
4.1 FC 102
4.2 Linguistic Variables 102
4.3 FC Rules 103
4.4 Control Knowledge Base 103
4.5 Defuzzification Methods 103
5 Proposed Fuzzy-Based System for Peer Task Accomplishment 104
6 Simulation Results 107
7 Conclusions and Future Work 108
References 109
Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic Algorithm 111
1 Introduction 111
2 Node Placement Problem in WMNs 112
3 Proposed and Implemented Simulation System 113
3.1 Particle Swarm Optimization 113
3.2 Distributed Genetic Algorithm 114
3.3 WMN-PSODGA Hybrid Simulation System 116
3.4 WMN-PSODGA Web GUI Tool and Pseudo Code 118
4 Simulation Results 119
5 Conclusions 122
References 123
A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters 126
1 Introduction 126
2 IoT 128
2.1 IoT Architecture 128
2.2 IoT Protocols 129
3 Opportunistic Networks 129
3.1 Opportunistic Networks Challenges 129
3.2 Opportunistic Networks Architectures 130
4 Proposed System 131
4.1 System Parameters 131
4.2 System Implementation 132
4.3 Description of FLC 132
5 Simulation Results 134
6 Conclusions and Future Work 135
References 136
Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New Parameter 138
1 Introduction 138
2 WSAN 140
2.1 WSAN Challenges 140
2.2 WSAN Architecture 140
3 Proposed System Model 141
3.1 Problem Description 141
3.2 System Parameters 142
3.3 System Implementation 142
3.4 Description of FLC 143
4 Simulation Results 146
5 Conclusions and Future Work 148
References 149
Malicious Information Flow in P2PPS Systems 151
1 Introduction 151
2 Information Flow in the TBAC Model 152
2.1 TBAC Model 152
2.2 Information Flow Relations 153
3 Synchronization Protocols for Hidden Topics 155
4 Malicious Information Flow 156
5 Concluding Remarks 159
References 160
Eco Migration Algorithms of Processes with Virtual Machines in a Server Cluster 162
1 Introduction 162
2 System Model 163
3 Energy-Efficient Migration of Virtual Machines 164
3.1 Estimation Model 164
3.2 VM Selection (VMS) Algorithm 167
3.3 VM Migration (VMM) Algorithm 168
4 Evaluation 168
5 Concluding Remarks 172
References 172
Collision Avoidance for Omnidirectional Automated Transportation Robots Considering Entropy Approach 174
1 Introduction 174
2 Related Work 175
3 Proposed System 175
3.1 Omnidirectional Automated Transportation Robot 175
3.2 Kinematics 176
3.3 Control System of the Proposed Omnidirectional Automated Transportation Robot 178
3.4 Collision Avoidance Method Considering Position Entropy 179
4 Conclusions and Future Work 182
References 182
Performance Evaluation of an Active Learning System Using Smartphone: A Case Study for High Level Class 184
Abstract 184
1 Introduction 184
2 Active Learning System with Interactive Lecture 186
3 Flow of Group Discussion for High Level Class 187
4 Performance Evaluation of ALS for High Level Class 188
5 Conclusions 190
References 191
Performance Evaluation of an Enhanced Message Suppression Controller Considering Delayed Ack Using Different Road Traffic Conditions 193
1 Introduction 193
2 DTN 194
3 Delayed Ack for EMSC 195
3.1 Overview 195
3.2 Control Messages 195
3.3 Message Suppression Time 197
4 System Design 197
4.1 Simulation Scenario 197
4.2 Application Setting 198
5 Simulation Results 198
6 Conclusions 200
References 201
Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless Methods 203
1 Introduction 203
2 System Model 204
2.1 Objects and Transactions 204
2.2 Quorum-Based Locking Protocol 205
2.3 Data Access Model 206
2.4 Power Consumption Model of a Server 207
3 Improved EEQS (IEEQS) Algorithm 208
3.1 Quorum Selection 208
3.2 Meaningless Methods 208
3.3 Omitting Meaningless Methods 209
4 Evaluation 211
4.1 Environment 211
4.2 Average Execution Time of Each Transaction 212
4.3 Average Number of Aborted Transaction Instances 212
4.4 Average Total Energy Consumption of a Server Cluster 213
5 Concluding Remarks 214
References 214
Improving Data Loss Prevention Using Classification 215
Abstract 215
1 Introduction 215
2 The Proposal Method 218
3 The Classification Criteria 219
4 Implementation of the Specific Rights 219
5 Conclusion 220
References 220
Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient 222
1 Introduction 222
2 Related Work 223
2.1 Wavelet Neural Network 223
2.2 Bootstrap Algorithm 224
3 SIM-PB-Wavelet Model 224
3.1 Most Similar Interpolation Algorithm 225
3.2 Weight of Each Model 225
3.3 Training of the Wavelet Neural Network 226
4 Modeling and Methods 226
4.1 SIM-Wavelet Model 226
4.2 SIM-P-Wavelet Model 227
4.3 SIM-PB-Wavelet Model 228
5 Experiments 228
5.1 Data 228
5.2 Results and Discussions 228
6 Conclusions 231
References 232
Stochastic Power Management in Microgrid with Efficient Energy Storage 234
1 Introduction 234
2 Literature Review 235
3 Proposed System Model 237
4 Problem Formulation 237
4.1 Photo Voltaic 237
4.2 Wind Turbine 238
4.3 Micro Turbine 238
4.4 Diesel Engine 239
4.5 Fuel Cells 239
4.6 Energy Storage System 239
4.7 Macrogrid Exchange 240
4.8 Chance Constrained Optimization 240
4.9 Branch and Bound Method 240
5 Simulation Results and Discussion 241
6 Conclusion 243
References 244
A Metaheuristic Scheduling of Home Energy Management System 246
1 Introduction 246
2 Literature Review 247
3 Problem Formulation 248
3.1 Energy Consumption 249
3.2 Electricity Cost and Price Signal 249
3.3 PAR 250
3.4 User Comfort 250
4 System Architecture 250
4.1 System Model 250
4.2 Optimization Technique 251
5 Simulation Results and Discussion 252
5.1 Energy Consumption 252
5.2 Electricity Cost 253
5.3 PAR 254
5.4 Performance Trade-off Between Electricity Cost and User Comfort 254
6 Conclusion 255
References 256
Void Hole and Collision Avoidance in Geographic and Opportunistic Routing in Underwater Wireless Sensor Networks 257
1 Introduction 257
2 Related Work 259
3 Problem Statement 261
4 System Model 261
4.1 Proposed Schemes 261
5 Energy Minimization 262
6 Performance Evaluation 264
7 Conclusion 267
References 268
Optimized Energy Management Strategy for Home and Office 269
1 Introduction 269
2 State of the Art Work 270
3 System Model 272
4 Problem Formulation 273
5 Simulation Results 273
5.1 Scenario 1: Single Home 274
5.2 Scenario 2: Single Office 275
6 Conclusion 277
References 277
Energy Balanced Load Distribution Through Energy Gradation in UWSNs 279
1 Introduction 279
2 Related Work 280
3 Problem Statement 283
4 Proposed Scheme 284
4.1 Network Model 284
4.2 Energy Gradation 285
5 Simulation Results 285
5.1 Performance Metrics 285
6 Conclusion and Future Work 288
References 289
Routing Protocol with Minimized Load Distribution for UASNs 290
1 Introduction 290
2 Related Work 291
3 Problem Statement 293
4 Proposed Network Model 293
4.1 RP-MLD 295
5 Simulation Results 297
6 Conclusion 300
References 301
Transmission Range Adjustment for Void Hole Avoidance in UWSNs 302
1 Introduction 302
2 Related Work 303
3 Problem Statement 306
4 Proposed Network Model 307
4.1 MGEDAR 308
5 Simulation 309
6 Conclusion 311
References 312
Exploiting Meta-heuristic Technique for Optimal Operation of Microgrid 313
1 Introduction 313
2 Related Work 314
3 System Model 315
3.1 Modeling the System Components of MG 316
4 Problem Formulation 318
5 Simulation Results 318
6 Conclusion 322
References 322
Appliances Scheduling Using State-of-the-Art Algorithms for Residential Demand Response 324
1 Introduction 324
2 Related Work 326
3 Problem Statement 327
4 Simulation Results and Discussion 329
4.1 Feasible Region 331
5 Conclusion 333
References 333
Optimal Energy Management in Microgrids Using Meta-heuristic Technique 335
1 Introduction 335
2 Literature Review 336
3 Problem Statement 338
4 Proposed System Model 339
4.1 PV System 339
4.2 WT 340
4.3 FC 340
4.4 ESS 341
5 Simulation Results 341
6 Conclusion 344
References 345
Usage Optimization of Mobile Devices Resources in Mobile Web 347
Abstract 347
1 Introduction 347
2 Related Work 348
3 Web Services for Mobile Applications 349
3.1 Mobile Applications 349
3.2 Web Services 351
4 Prototype Application (Case Study) 352
5 Analysis and Discussion 354
5.1 Performances 354
5.2 Privacy and Security 355
5.3 Development Methodology and Efforts 355
6 Conclusion 356
References 356
The Performance Comparison for Low and Medium Earth Orbiting Satellite Search and Rescue Services 358
Abstract 358
1 Introduction 358
2 Satellite Coverage Geometry 360
3 Simulated Performance Analysis 363
3.1 Visibility and Availability 363
3.2 Coverage 365
3.3 Experimental MEOSAR versus LEO/GEOSAR Performance Comparison 366
4 Conclusions 369
References 369
An Integrated System Considering WLAN and DTN for Improving Network Performance: Evaluation for Different Scenarios and Parameters 371
1 Introduction 371
2 DTNs and Routing Protocols 372
2.1 DTN Overview 372
2.2 Routing Protocols 373
3 Simulation System Design 374
4 Simulation Results 376
5 Conclusions 378
References 379
An Efficient Algorithm to Energy Savings for Application to the Wireless Multimedia Sensor Networks 381
Abstract 381
1 Introduction 381
2 Related Works 382
3 Proposed Algorithm 384
4 Results and Discussions 388
5 Conclusion 389
References 389
Endowing IoT Devices with Intelligent Services 391
1 Introduction 391
2 Smart-IoT Service System Built on AI Platform 392
2.1 Use Case: The Time to Return Home 394
2.2 Use Case: Automatic Alarm Setting 396
2.3 The Artificial Neural Network 396
3 Evaluation of IoT Service of Artificial Neural Networks with Back Propagation 398
4 Conclusions and Future Works 401
References 401
VM Deployment Methods for DaaS Model in Clouds 403
1 Introduction 403
2 Related Work 405
3 Virtual Machine Deployment 406
3.1 VM Migration 410
3.2 Performance and Availability 411
4 Conclusions and Future Works 412
References 412
A Capability and Compatibility Approach to Modelling of Information Reuse and Integration for Innovation 415
Abstract 415
1 Introduction 415
2 Key Issues in Innovation 416
2.1 The Nature of Innovation 416
2.2 Innovation: Methodologies and Information Reuse and Integration 417
2.3 Information Management vs. Knowledge Management in Innovation 418
2.4 Data Mining vs. Information Reuse and Integration 419
2.5 The Need for Formal Modelling of Information Reuse and Integration 419
3 Profile Theory: Brief Introduction 420
3.1 Profile Definition 420
4 Information Modelling 421
4.1 Information Profile Space as a Metric Space 422
5 Conclusion 423
References 424
Vehicle Insurance Payment System Based on IoT 426
Abstract 426
1 Introduction 426
2 Devices Used in the System 428
3 Implementation of the System and Simulations 431
4 Conclusions 434
References 434
Software as a Service (SaaS) Service Selection Based on Measuring the Shortest Distance to the Consumer’s Preferences 435
Abstract 435
1 Introduction 435
2 Related Works 436
3 Find SaaS Framework 438
3.1 Consumer’s Preference Processor 439
3.2 Services Registry Repository 439
3.3 SaaS Selection Processor 440
4 Case Study 442
5 Results and Discussion 446
6 Conclusion 446
Acknowledgement 447
References 447
Efficient Content Sharing with File Splitting and Differences Between Versions in Hybrid Peer-to-Peer Networks 448
1 Introduction 448
2 Related Work 449
3 Assumed Environment and Problem to Be Solved 450
4 Proposed Method 450
5 Evaluation 455
5.1 Methods to Be Compared 455
5.2 Simulation Conditions 455
5.3 Simulation Results and Discussions 457
6 Conclusion 459
References 460
Improving Security with Cognitive Workflows 461
Abstract 461
1 Introduction 461
2 DIME, DNA and Self-managing Workflows 462
3 IDS 463
4 Case Study: Dynamic Security Management 464
5 Conclusions 467
References 468
Threshold Model Based on Relative Influence Weight of User 469
Abstract 469
1 Introduction 469
2 Related Concepts and Definitions 470
2.1 Mode of Transmission 470
2.2 Influence 470
2.3 Sensitivity 470
2.4 Measurement of Influence 471
2.5 Model of Maximizing Influence 471
2.5.1 Linear Threshold Model 472
2.5.2 Improved Weights in HPG Algorithm 472
3 Threshold Model URLT Based on Relative Influence Weight of User 473
3.1 Sensitivity of Information P 473
3.2 Node Specificity Threshold ? 473
3.3 Algorithm Definition 473
3.3.1 Algorithm Description 473
3.3.2 Instance Analysis 474
3.4 URLT Model 475
4 Simulation Experiment Analysis 476
4.1 Propagation Contrast in Different Networks 476
4.2 Comparison of Different Sensitivity Information 477
4.3 Contrast in Different Thresholds 477
5 Conclusion 479
Acknowledgement 479
References 479
Design of a Low-Power Cold Chain Logistics Internet of Things System 481
Abstract 481
1 Introduction 481
2 System Scheme Design 483
2.1 System General Description 483
2.2 System Requirement Analysis 483
2.3 Overall Plan 484
2.3.1 Overview of the Scheme 484
2.3.2 Hardware Overall Design 484
2.3.3 General Design of Program 484
2.4 Low Power Design Scheme 485
2.4.1 Based Low Power Design Based on WOR 485
2.4.2 Based Scenario Based Low Power Design 487
2.4.3 Function Call Optimization 488
3 Communication Protocol Establishment 489
4 Experimental Results 490
5 Conclusion 492
Acknowledgments 492
References 492
Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting 494
Abstract 494
1 Introduction 494
2 System Model 495
3 Algorithm Formulation 496
4 Security Definition 496
5 Our Construction 496
5.1 The Concrete Scheme of 1-norm 497
5.2 The Concrete Scheme of 2-norm 497
6 Security Analysis 498
7 Evaluation 500
7.1 Storage 500
7.2 Computation 500
8 Conclusion 500
Acknowledgments 501
References 501
Evaluation of Techniques for Improving Performance and Security in Relational Databases 502
1 Introduction 502
2 Database Optimization Techniques 503
2.1 TempDB 504
2.2 Cache 504
2.3 Index Fragmentation 506
3 Database Security Aspects 507
3.1 Availability Types 508
3.2 Database Encryption 508
3.3 Well Defined Privileges 510
4 Conclusions 510
References 510
E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Edu ... 511
Abstract 511
1 Introduction 511
2 Related Work 512
3 Linked Data of IoT Security Information 514
3.1 Design of RDF Store for IoT Security Information 514
3.2 Implementation of RDF Store for IoT Security Information 515
3.3 Authoring Tool for Educational Materials of IoT Security 516
4 E-learning Material Development Framework Supporting VR/AR 518
5 E-learning Material Supporting VR/AR for IoT Security Education 519
6 Conclusions 522
Acknowledgements 522
References 522
Automatic Test Case Generation Method for Large Scale Communication Node Software 524
1 Introduction 524
2 Related Work 526
3 Proposed Method 526
3.1 Tags for Structuring Requirements Specifications 527
3.2 Automatic Test Case Generation System 528
3.3 Tagging Check and Test Case Extraction 530
4 Evaluation 530
4.1 Effect of Template Arrangement 531
4.2 Efficacy of Test Case Extraction from Requirements Specification 532
5 Conclusion 534
References 535
Big Data in Cloud Computing: A Review of Key Technologies and Open Issues 536
Abstract 536
1 Introduction 536
2 Methodology 537
3 Literature Review: Quantitative Results and Analysis 537
4 Literature Review: Topics-Related Analysis 539
4.1 Frameworks 539
4.2 Databases and Data Processing Techniques 541
4.3 Programming Languages 542
5 Challenges and Open Research Issues 542
6 Conclusion 543
References 543
A Novel Question Answering System for Albanian Language 546
Abstract 546
1 Introduction 546
2 Background and Related Works 547
3 Albanian Language Structure 549
4 Algorithmic Approach and System Design 549
4.1 System Architecture 550
4.2 General Assumptions and Additional Resources 550
4.3 Document Preprocessing 550
4.4 Question Analysis 551
4.5 Passage Retrieval and Answer Extraction 552
5 Performance Evaluation 553
6 Conclusions and Future Work 554
References 555
A Thorough Experimental Evaluation of Algorithms for Opinion Mining in Albanian 557
Abstract 557
1 Introduction 557
2 Background and Related Work 558
3 Methodology for Opinion Classification 560
3.1 Data Collection 560
3.2 Preprocessing 560
3.3 Experiment Settings 561
4 The Classifiers 561
4.1 Probabilistic and Naïve Bayes Classifiers 562
4.2 Rule-Based Classifiers 562
4.3 Proximity-Based Classifiers 562
4.4 Linear Classifiers 562
4.5 Decision Tree Classifiers 563
5 Experiment Results 563
6 Conclusions and Future Work 566
References 567
Performance Evaluation of Text Categorization Algorithms Using an Albanian Corpus 569
Abstract 569
1 Introduction 569
2 Background and Related Works 570
3 Albanian Language Structure 571
4 Data Collection and Preprocessing 572
5 Classifier Selection 573
5.1 Logistic Regression 573
5.2 Naïve Bayes 573
5.3 K-Nearest Neighbor 574
5.4 Decision Tree (C4.5) 574
5.5 Neural Network with Back Propagation 574
5.6 Support Vector Machines 574
5.7 Random Forest 575
6 Experiments 575
7 Conclusions and Future Work 577
References 578
Battery Size Impact in Green Coverage of Datacenters Powered by Renewable Energy: A Latitude Comparison 580
1 Introduction 580
2 Related Work 582
3 Solar Energy Analysis 583
4 Battery Simulator Tool 584
4.1 Battery as a Finite State Machine 585
4.2 Implementation 585
5 Experiments and Results 587
5.1 Experimental Scenarios 587
5.2 Results and Interpretations 587
6 Conclusions and Future Work 590
References 590
A Comparison of Data Fragmentation Techniques in Cloud Servers 592
Abstract 592
1 Introduction 592
2 Methods 593
2.1 Simple Fragmentation 593
2.2 Permutation 595
2.3 Simple Encryption AES 256 598
2.4 Random Pattern Fragmentation with Additional Encryption AES 256 599
3 Comparison 600
4 Conclusion 602
References 603
SimpleCloud: A Simple Simulator for Modeling Resource Allocations in Cloud Computing 604
1 Introduction 604
2 Related Work 605
3 Cloud Infrastructure 606
4 SimpleCloud Design and Implementation 608
5 Experimental Evaluation 610
5.1 SimpleCloud Efficiency 611
5.2 Dynamic Resource Allocation Case Study 612
6 Conclusions 614
References 614
Multimodal Attention Agents in Visual Conversation 616
Abstract 616
1 Introduction 616
2 Related Work 617
3 Multimodal Attention Model 618
4 Evaluation Results and Discussion 620
4.1 Model Setup, Implementation Details, Hyper-parameters, Hardware 620
4.2 Dataset and Evaluation Metrics 621
4.3 Results and Analysis 621
4.4 Qualitative Error Analysis 625
5 Conclusions 626
References 626
Data Interpretation Using Mobile Uncalibrated Sensor for Urban Environmental Monitoring 629
Abstract 629
1 Introduction 629
2 Overall System Architecture 630
3 Data Processing Module 631
4 Experimental Results 633
5 Conclusions and Future Work 636
References 637
Reducing Excess Traffic in Urban Areas with Microscopic Traffic Modeling in SUMO 638
Abstract 638
1 Introduction 638
2 Related Works 639
3 Urban Traffic Modelling 639
3.1 Simulation Environment 639
3.2 Mode Transfer Procedure 640
4 Proposed Method 641
5 Results and Discussion 643
5.1 Scenario 1: Normal/Average Traffic 644
5.2 Scenario 2: Heavy Traffic 645
6 Conclusion 645
References 646
An Empirical Evaluation of Sequential Pattern Mining Algorithms 647
1 Introduction 647
2 Background and Basics 648
3 Approaches for Sequential Pattern Mining 649
4 Empirical Evaluation 652
5 Conclusions 657
References 657
Towards Internet of Things and Cloud Computing for Management of Cars Network 659
1 Introduction 659
2 Internet of Things and Cloud Computing in the Cars Field 660
2.1 Purpose of IoT Integration Inside Cars – Functional View and Benefits 662
2.2 Main Challenges for the Internet of Vehicles 662
3 Management of Cars Network with Use of Cloud Computing and Internet of Things 663
3.1 Server Application 663
3.2 Client Application 665
3.3 Main Features of ConnectYourCar solution 667
4 Conclusions 669
References 669
An Edge Computer Based Driver Monitoring System for Assisting Safety Driving 671
Abstract 671
1 Introduction 671
2 Related Work 673
3 System Design 675
3.1 Sensors of the Edge Computer 675
3.2 Processing Flow of the System 677
3.3 Methods of the Controller and the Learning Server 677
4 System Implementation 678
4.1 Edge Computer for Driver’s Vital Sign Sensing 678
4.2 Edge Computer for Car’s Movement Sensing 678
4.3 Edge Computer for Car’s Environment Sensing 679
5 Preliminary Experiments 680
6 Conclusions 681
Acknowledgments 681
References 681
A Mobile Wireless Network Visualizer for Assisting Administrators 683
Abstract 683
1 Introduction 683
2 Related Work 685
3 System Implementation 685
3.1 Publisher-Subscriber Communication Model 685
3.2 System Organization 686
3.3 Scalable Communication Based on MQTT Protocol 687
3.4 Software Architecture and Processing Flow 688
4 Visualization Functions 690
5 Preliminary Evaluations 691
6 Conclusions 693
Acknowledgments 693
References 694
C++ Memory Detection Tool Based on Dynamic Instrumentation 695
Abstract 695
1 Introduction 695
2 Related Works 696
2.1 Introduction of C++ Memory Management Defects 696
2.2 Introduction of Pin 697
2.3 Shadow Memory 697
3 Design and Implementation of MemDetect 699
3.1 Framework of MemDetect 699
3.2 Design of Defect Detection Module 700
4 Experimental Analysis 703
5 Conclusion 705
Acknowledgment 705
References 705
Flying Ad Hoc Network for Emergency Applications Connected to a Fog System 707
1 Introduction 707
2 Related Works 708
2.1 Internet of Things and Fog Computing 708
2.2 Flying Ad Hoc Networks 710
2.3 Routing Protocols 710
3 System Design 711
4 System Evaluation 714
4.1 Simulation Scenario 714
4.2 Simulation Results 714
5 Conclusion and Future Work 716
References 716
An Improved Informative Test Code Approach for Code Writing Problem in Java Programming Learning Assistant System 719
1 Introduction 719
2 Test-Driven Development Method 721
3 Informative Test Code Approach 722
3.1 Goal of Informative Test Code 722
3.2 Assignment Generation with Informative Test Code 722
3.3 Drawbacks of Previous Approach 723
4 Proposal of Improved Informative Test Code 723
4.1 Handling of Standard Input/Output in Test Code 723
4.2 Requirements in Source Code 724
4.3 Requirements in Test Code 726
5 Evaluation 729
6 Conclusion 730
References 730
Tourism Support System Using AR for Tourists’ Migratory Behaviors 731
Abstract 731
1 Introduction 731
2 Related Work 732
3 Proposed System and Prototyping as Mobile Application 732
3.1 User Interface 733
3.2 Bluetooth Beacon Notice 735
3.3 AR View 735
3.4 Message 736
3.5 Database 737
4 Experiments 737
4.1 Experiment Outline 737
4.2 Experiment Environment 737
4.3 Experiment Method 738
4.4 Evaluation Content 738
4.5 Results 738
4.6 Discussion 739
5 Conclusions 740
Acknowledgments 741
References 742
Some Improvements in VCP for Data Traffic Reduction in WSN 743
Abstract 743
1 Introduction 743
2 VCP Description 744
2.1 The Virtual Cord 744
2.2 Routing 745
2.3 Related Work to VCP 745
2.4 Comparisons with VCP 746
3 Some Improvements to VCP 746
3.1 The Need for MAC Layer Control Mechanisms 746
3.2 Improvement of the Cord 747
3.3 Congestion Handling 748
3.4 The Hash Function for Generating the Keys 748
4 Simulations and Evaluations 749
4.1 Case 1 749
4.2 Case 2 750
4.3 Case 3 751
4.4 Case 4 752
5 Conclusions 752
References 753
Indoor Self Localization Method for Connected Wheelchair Based on LED Optical Frequency Modulation 755
1 Introduction 755
2 Experimental Apparatus 756
2.1 LED Luminescence Device 756
2.2 Experimental Setup 758
3 Signal Processing 758
3.1 Image Processing 758
3.2 FFT 760
4 Experimental Result 760
5 Conclusions 763
References 763
An Auction Framework for DaaS in Cloud Computing 764
1 Introduction 764
2 Related Work 765
3 System Model and Problem Formulation 766
4 Proposed Mechanism 767
5 Analysis of the Proposed Method 770
5.1 Time Complexity 770
5.2 Correctness of the Proposed Algorithm 770
6 Conclusion and Future Works 771
References 771
A Fingerprint Enhancement Algorithm in Spatial and Wavelet Domain 774
Abstract 774
1 Introduction 774
2 Noise in Fingerprint Images 775
3 Image Enhancement 775
3.1 Image Adjustment 776
3.2 Adaptive Histogram Equalization 776
3.3 Deblurring the Image Using Lucy-Richardson Algorithm 776
3.3.1 Deconvolution with Lucy-Richardson Algorithm 777
3.3.2 Lucy-Richardson Algorithm to Handle the Camera Read-Out Noise 777
3.4 Gabor Filters 778
3.5 Wavelet Transform 778
3.6 Wavelet Thresholding 781
4 Fingerprint De-noising 782
5 Algorithm 782
6 Experimental Results 783
7 Conclusions 785
References 785
Android OS Stack Power Management Capabilities 786
Abstract 786
1 Introduction 786
2 Android Power Management Concept 788
3 Pre-measurements Setup and Results 790
4 State of Art 791
5 Android Networking Stack and Netlink 792
6 Implementations on Android 795
7 Conclusion 795
References 796
Signal Routing by Cavities in Photonic Crystal Waveguide 797
1 Introduction 797
2 Measurement of Photonic Crystal Waveguide 798
3 Measurement of T-Shaped Branch Waveguide with Filters 802
4 Conclusion 803
References 804
Image Semantic Segmentation Algorithm Based on Self-learning Super-Pixel Feature Extraction 805
Abstract 805
1 Introduction 805
2 Work Process 806
3 SLIC Superpixel Segmentation of the Original Image 807
4 Training a Stacked Deconvolution Neural Network (SDN) 809
4.1 Overview 810
4.2 Deconvolutional Network 810
4.3 Work Details 812
5 SDN for Image Semantic Segmentation 812
6 Conclusion 812
Acknowledgments 813
References 813
Research and Implementation of Indoor Positioning Algorithm for Personnel Based on Deep Learning 814
Abstract 814
1 Introduction 814
2 Indoor Positioning Algorithm for Personnel Based on HOG + SVM 815
3 Indoor Positioning Algorithm for Personnel Based on Deep CNN 816
3.1 Data Preprocessing 817
3.2 Deep Convolution Neural Network with Multi-layer Sparse Automatic Encoder 818
3.3 Softmax Regression Classification 820
3.4 Face Recognition 820
4 Experiment and Analysis 821
5 Conclusion 822
Acknowledgments 822
References 823
Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size 824
Abstract 824
1 Introduction 824
2 Paper Preparation 825
2.1 Bilinear Maps 825
2.2 Linear Secret-Sharing Schemes(LSSS) 826
3 The Scheme Model and Security Model 826
3.1 Outsourced ABE Model 826
3.2 Security Model 827
4 Verifiable Outsourcing Data Encryption Scheme with Fixed Key Size 828
5 Analysis of Our Scheme 829
5.1 Security Analysis 829
5.2 Performance Analysis 830
6 Conclusions 831
Acknowledgments 831
References 831
Subjective Annoyance Caused by Low Frequency Noise 833
Abstract 833
1 Introduction 833
2 Experiment 834
2.1 Experimental Materials and Methods 834
2.2 Experimental Methods 835
2.3 Experimental Procedure 836
3 Results 836
3.1 Equal Loudness Subjective Annoying Pure Tone Experiment 836
3.2 Actual Noise and Synthetic Noise Subjective Worry Comparison Experiment 837
4 Conclusion 840
References 840
The Relationship Between Personality Traits and Aggressive Behavior in People with Long Term Noise 842
Abstract 842
1 Introduction 842
2 Affected by the Long-Term Impact of Airport Noise on the Population 843
2.1 Method 843
2.2 By the Long-Term Impact of Airport Noise on the Personality Characteristics of the Results of th ... 843
3 Correlation Analysis Between Personality and Aggression in Long-Term Affected Airport Noise 844
4 Regression Analysis on Personality Traits and Aggressive Behaviors of Persons Affected by Airport ... 847
5 Results 847
References 848
Efficient Expanded Mixed Finite Element Method for the Forchheimer Model 850
1 Introudction 850
2 Weak Formulation 851
3 Existence and Uniqueness 852
4 Error Estimates 854
5 Numerical Experiments 856
6 Conclusion 858
References 858
Research on Indoor Location Method Based on WLAN Signal Location Fingerprints 860
Abstract 860
1 Introduction 860
2 Location Fingerprint Localization Algorithm 861
3 Filtering Processing of Sampled Signals 863
4 Clustering of Databases 863
4.1 Clustering Algorithm 863
4.2 Application of K-Means Algorithm 864
5 Algorithm for Determining Position Coordinates 865
6 Fuzzy Logic Algorithm of Weighted Coefficients 866
7 Simulation Experiment and Result Analysis 869
8 Conclusion 871
Acknowledgments 872
References 872
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree 873
Abstract 873
1 Introduction 873
2 Preliminares 874
2.1 Bilinear Map 874
2.2 Labeled Program 874
2.3 Homomorphic Authenticator Scheme 875
2.4 Rank-Based Merkle Hash Tree 875
2.5 Limited Extensibility Coding 875
2.6 The Instance Model of Homomorphic Authentication Based on Rank-Based Merkle Hash Tree 876
3 Homomorphic Authentication Based on Rank-Based Merkle Hash Tree 876
4 Analysis of Our Proposal 878
4.1 Security Analysis 878
4.2 Performance Analysis 879
5 Conclusion 879
Acknowledgement 879
References 880
Behavioral Security in Cloud and Fog Computing 881
Abstract 881
1 Introduction 881
2 Fog and Cloud Computing Infrastructures 882
3 Behavioral Patterns in Security Protocols 883
4 Security Features of Behavioral Cryptographic Solutions 884
5 Conclusions 885
Acknowledgments 885
References 885
Voice Quality Testing Using VoIP Applications over 4G Mobile Networks 887
Abstract 887
1 Introduction 887
2 Analysis of the Experimental System and Testing Scenarios 888
3 Results and Discussion 890
4 Conclusions and Future Work 893
References 893
Service Management Protocols in Cloud Computing 895
Abstract 895
1 Introduction 895
2 Cognitive Service Management Protocols 896
3 Cognitive Service Management Protocols in the Cloud 898
4 Conclusions 900
Acknowledgments 900
References 900
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks 902
1 Introduction 902
2 Relay Attack 903
3 Design and Implementation of Proposed CAPTCHA 904
4 Security of the Proposed CAPTCHA Scheme 905
4.1 Attack Using Difference Between Consecutive Frame Images 905
4.2 Attack by Tracking with MeanShift Algorithm 906
5 Validation for Relay Attack Resistance 908
6 Experimental Results 909
7 Conclusion 910
References 911
A Data Sharing Method Using WebRTC for Web-Based Virtual World 912
1 Introduction 912
2 Key Technologies 913
3 Literature Survey 914
4 System Overview 915
4.1 Signaling Process 915
4.2 WebRTC Messaging Process 917
5 Experimental Result 918
6 Conclusion 919
References 920
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG 921
1 Introduction 921
2 Characteristics of Authentication Method for Mobile Devices 922
3 Surface Electromyogram Signals 923
4 Propsed Method 924
4.1 User Authentication System Using S-EMG 924
4.2 User Authentication Method Using S-EMG 925
4.3 Introduction of Dynamic Time Warping 926
5 Experiments 927
5.1 Objectives 927
5.2 Conditions 928
5.3 Idendification of Gestures 928
5.4 Authentication of Passwords 929
5.5 Discussion 930
6 Conclusion 931
References 931
The Analysis of MATE Attack in SDN Based on STRIDE Model 933
1 Introduction 933
1.1 SDN Related Threats 934
1.2 Vulnerabilities and Threats in SDN Controller 934
2 Related Work 936
2.1 Preventing Techniques Against MATE 936
2.2 Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege (STRIDE) Model 937
3 Proposed Method 938
4 Discussion 939
5 Conclusion 941
References 941
Performance Evaluation of Lévy Walk on Message Dissemination in Unit Disk Graphs 943
1 Introduction 943
2 Related Work 944
3 System Model and Problem Description 945
3.1 Problem Description 945
4 Lévy Walk on Unit Disk Graphs 946
4.1 Lévy Walk Algorithm 946
5 Performance Evaluation on Message Dissemination 947
5.1 Environment 948
5.2 Parameters 948
5.3 Simulation Results 949
6 Conclusion 951
References 951
Human vs. Automatic Annotation Regarding the Task of Relevance Detection in Social Networks 954
1 Introduction 954
2 Related Work 955
3 Data Acquisition Methodology 955
3.1 Posts Retrieval 956
3.2 Crowdflower HIT 956
3.3 Crowdflower User Filtering 957
3.4 Automatic Assessment 959
4 Feature Extraction 960
5 Results 962
6 Conclusion and Future Work 963
References 964
Performance Evaluation of Support Vector Machine and Convolutional Neural Network Algorithms in Real ... 966
Abstract 966
1 Introduction 966
2 Related Works 967
3 Vehicle Detection and Classification 969
3.1 Support Vector Machines 969
3.2 Convolutional Neural Networks 969
4 Experimental Analysis 970
4.1 Building TPSdataset 970
4.2 Experimental Setup and Performance Metrics 971
4.3 Tests on BIT-Vehicle Dataset 971
4.4 Tests on TPSdataset 972
5 Conclusion 973
Acknowledgments 974
References 974
Cloud Orchestration with ORCS and OpenStack 976
1 Introduction 976
2 The OrCS Architecture 978
3 Orchestration in the OrCS and OpenStack Heat Wrapper 979
3.1 Heat and HOT Template 980
3.2 OFL and HOT 980
4 An Application Example 982
5 Conclusions and Future Works 986
References 986
Improving Results of Forensics Analysis by Semantic-Based Suggestion System 988
1 Introduction 988
2 Digital Investigations and Digital Evidences 990
3 Semantic Approach Advantages 991
4 Methodology 992
5 System Architecture 993
6 Experimentation and Results 995
7 Related Work 996
8 Conclusions and Future Work 997
References 997
Modeling of Radio Base Stations with the Numerical FDTD Method, for the Electromagnetic Field Evaluation 1000
Abstract 1000
1 Scope 1000
2 Introduction 1000
3 Simulation of Antenna Characteristics for the Proposed Calculation Model 1001
4 Evaluation of the Proposed Model with the Numerical FDTD Method 1005
5 Analysis of the Experimental Study and Discussion of the Results 1006
6 Conclusions 1008
References 1009
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance 1010
Abstract 1010
1 Introduction 1010
2 Related Work 1011
3 Mouse Authentication Method 1012
4 Implementation 1014
4.1 Pattern Method 1014
4.2 Variations of the Proposed Method 1016
5 Evaluation 1017
5.1 Usability Test 1017
5.2 Shoulder Surfing Resistance Test 1019
5.3 Comparison with Other Methods 1020
6 Conclusion 1020
Acknowledgments 1021
References 1021
Phishing Detection Research Based on PSO-BP Neural Network 1022
Abstract 1022
1 Introduction 1022
2 URL Feature Extraction and Analysis 1023
2.1 Uniform Resource Locator Standard Format 1023
2.2 Extract the Features of the Uniform Resource Locator 1023
3 Algorithm Model 1024
3.1 Particle Swarm Optimization Algorithm 1024
3.2 PSO-BP Neural Network 1025
3.3 Performance Evaluation 1026
4 Experimental Methods 1028
5 Conclusion and Discussion 1028
Acknowledgments 1029
References 1029
Evaluation of Index Poisoning Method in Large Scale Winny Network 1031
1 Introduction 1031
2 Overview of the Winny Network 1032
2.1 How to Distribute Files 1033
2.2 Clustering Mechanism 1033
3 Index Poisoning 1034
4 Proposed Method 1034
4.1 Overview of the System 1034
4.2 Process of Index Poisoning 1035
5 Evaluation 1035
5.1 Simulation Environment 1035
5.2 Simulation Results 1036
6 Discussion and Conclusions 1038
References 1038
A Hybrid Technique for Residential Load Scheduling in Smart Grids Demand Side Management 1039
1 Introduction 1039
2 Related Work 1040
3 Proposed Scheme 1042
3.1 BFA 1043
3.2 HSA 1044
3.3 HBH 1044
4 Simulations and Discussions 1045
5 Conclusion and Future Work 1048
References 1049
Modeling Research on Time-Varying Impulse Resistance of Grounding Grid 1050
Abstract 1050
1 Introduction 1050
2 Preliminaries 1051
3 Grounding System Models 1052
4 Example Simulations 1054
5 Conclusions 1056
Acknowledgments 1057
References 1057
Research on Intelligent Parking Area Division and Path Planning 1059
Abstract 1059
1 Introduction 1059
2 The Status of Parking Guidance System 1059
3 Overall Design of Intelligent Parking System 1060
4 Parking Lot Modeling Method 1061
5 Parking Area Division 1063
6 Research on Path Planning Algorithm 1064
6.1 Improvement of Dijkstra Algorithm 1064
6.2 Application of Dijkstra Fan Limited Algorithm in Parking Area Path Planning 1067
7 Conclusion 1067
Acknowledgments 1068
References 1068
Moving Applications to an On-demand, Software-as-a-Service Model in the Albanian Government Cloud 1069
Abstract 1069
1 Introduction 1069
2 Government Cloud Framework in Albania 1071
2.1 What’s in Cloud 1071
2.2 Deployment Model 1072
2.3 Service Model and Overall Deployment 1073
3 SaaS Implementation in Gov Cloud Albania 1074
3.1 Moving Services Towards the SaaS Model 1075
3.2 Benefits in SaaS Model 1076
3.3 What Should We Consider When Moving the SaaS Cloud Model? 1077
3.4 Security from the Usability Perspective 1078
4 Conclusions 1079
References 1079
Performance Evaluation of an IoT-Based E-learning Testbed Considering Meditation Parameter 1081
1 Introduction 1081
2 Overview of IoT and ULE 1082
2.1 Internet of Things (IoT) 1082
2.2 Ubiquitous Learning Environment (ULE) 1083
2.3 Role of IoT in ULE 1083
3 Mean-Shift Clustering Algorithm 1084
4 Testbed Description 1085
4.1 MWM 1086
4.2 EEG 1086
4.3 SmartBox Description 1087
5 Experiment and Simulation Results 1088
6 Conclusions and Future Work 1089
References 1091
Towards Integrating Conversational Agents and Learning Analytics in MOOCs 1093
Abstract 1093
1 Introduction 1094
2 Background 1095
3 Project Methodology 1096
3.1 Project Aims and Objectives 1096
3.2 Starting Point 1097
3.3 Work Plan 1099
4 Project Outcomes 1100
4.1 Expected Benefits 1100
4.2 Target Groups 1101
5 Conclusions 1102
Acknowledgements 1103
References 1103
Author Index 1105
| Erscheint lt. Verlag | 23.2.2018 |
|---|---|
| Reihe/Serie | Lecture Notes on Data Engineering and Communications Technologies | Lecture Notes on Data Engineering and Communications Technologies |
| Zusatzinfo | XXXII, 1076 p. 540 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Themenwelt | Technik ► Nachrichtentechnik |
| Schlagworte | Big Data And Cloud Computing • Databases and Data Warehouses • Data Centers and IT Virtualization Technologies • Data Management and Information Retrieval • Data Security, Trust and Reputation • Data Sensing • Data Visualization and Representation Tools • Engineering of Data Sets • Integration and Querying Systems and Interfaces • Repositories and Digital Infrastructures |
| ISBN-13 | 9783319759289 / 9783319759289 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich