ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information Science and Applications (ICISA) 2016

دانلود کتاب علم اطلاعات و کاربردها (ICISA) 2016

Information Science and Applications (ICISA) 2016

مشخصات کتاب

Information Science and Applications (ICISA) 2016

ویرایش: 1 
نویسندگان: ,   
سری: Lecture Notes in Electrical Engineering 376 
ISBN (شابک) : 9789811005565, 9789811005572 
ناشر: Springer Singapore 
سال نشر: 2016 
تعداد صفحات: 1435 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 75 مگابایت 

قیمت کتاب (تومان) : 42,000



کلمات کلیدی مربوط به کتاب علم اطلاعات و کاربردها (ICISA) 2016: مهندسی ارتباطات، شبکه‌ها، سیستم‌ها و امنیت داده‌ها، هوش محاسباتی، هوش مصنوعی (شامل رباتیک)، ساختارهای داده، رمزنگاری و تئوری اطلاعات



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 13


در صورت تبدیل فایل کتاب Information Science and Applications (ICISA) 2016 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علم اطلاعات و کاربردها (ICISA) 2016 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب علم اطلاعات و کاربردها (ICISA) 2016



این کتاب حاوی مقالات منتخب از 7امین کنفرانس بین‌المللی علوم و کاربردهای اطلاعات (ICISA 2016) است و تصویری از آخرین مسائلی که در همگرایی فنی و همگرایی‌های فناوری امنیتی با آن مواجه شده‌اند ارائه می‌کند. . این مقاله به بررسی این موضوع می‌پردازد که چگونه علم اطلاعات هسته اصلی اکثر فعالیت‌های تحقیقاتی، صنعتی و تجاری فعلی است و شامل مشارکت‌هایی است که موضوعاتی از جمله محاسبات همه جا حاضر، شبکه‌ها و سیستم‌های اطلاعاتی، چند رسانه‌ای و تجسم، میان‌افزار و سیستم‌های عامل، امنیت و حریم خصوصی، داده‌کاوی و هوش مصنوعی را پوشش می‌دهد. مهندسی نرم‌افزار و فناوری وب.

این مشارکت‌ها آخرین پیشرفت‌ها در فناوری اطلاعات و ایده‌ها، برنامه‌ها و مشکلات مربوط به همگرایی فناوری را توصیف می‌کنند که از طریق مطالعات موردی، و بررسی‌های همگرا نشان داده شده است. تکنیک های امنیتی موجود از طریق این جلد، خوانندگان درک درستی از استراتژی‌های اطلاعاتی پیشرفته و فناوری‌های امنیت همگرایی کسب خواهند کرد. خوانندگان مورد نظر محققان دانشگاهی، صنعتی و سایر مؤسسات تحقیقاتی با تمرکز بر علم و فناوری اطلاعات هستند.


توضیحاتی درمورد کتاب به خارجی

This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.

The contributions describe the most recent developments in information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readers are researchers in academia, industry and other research institutes focusing on information science and technology.



فهرست مطالب

Front Matter....Pages i-xxi
Front Matter....Pages 1-1
Jamming-Resilient Adaptive Network Protocol in Wireless Networks....Pages 3-9
A Framework on Cloud Based Connected Car Services....Pages 11-20
Possibilities of Control and Optimization of Traffic at Crossroads Using Petri Nets....Pages 21-29
Delay-Energy Aware Clustering Multi-hop Routing in Wireless Sensor Networks....Pages 31-40
Front Matter....Pages 41-41
The Application of IC Ticketing System in Clinic Fees Payment in Taiwan....Pages 43-52
User Acceptance of SaaS ERP Considering Perceived Risk, System Performance and Cost....Pages 53-63
A Content Analysis on Top Risks in Social Networking....Pages 65-74
Simulation of Scheduled Traffic for the IEEE 802.1 Time Sensitive Networking....Pages 75-83
Adopting Multi-radio Channel Approach in TCP Congestion Control Mechanisms to Mitigate Starvation in Wireless Mesh Networks....Pages 85-95
An Information System to Support the Anti-doping Process....Pages 97-107
Research on 3D Directional Sensing Model....Pages 109-114
Live Migration Destination Selecting Method Using Weather Information and Emergency Alerts for e-Learning Environment....Pages 115-125
OPNET-Based Performance Analysis of a Multi-agent Architecture for Managing the Mobile Content Delivery Process....Pages 127-137
Data Prefetching Scheme Based on Data Relevancy for Peer-to-Peer Networks....Pages 139-147
Sustainability of Big Data Servers Under Rapid Changes of Technology....Pages 149-159
An Adaptive, Fault Protected Improvisation of ACO Based MANET Routing....Pages 161-170
Recipe-Transition Graph Based on Asymmetric Entropy Difference....Pages 171-180
The Significance of e-CALLISTO System and Construction of Log Periodic Dipole Antenna (LPDA) and CALLISTO System for Solar Radio Burst Study....Pages 181-188
WARP: Web-Based Adaptive Remote-Desktop Protocol for VDI....Pages 189-194
An Automated System for Signal Detection of Solar Radio Burst Type II Due to Coronal Mass Ejections Phenomena....Pages 195-205
Front Matter....Pages 41-41
Optimization Downlink Power Utilization via Dual Beam Antenna in the Live UMTS Network....Pages 207-217
Design and Implementation of Drone for Wideband Communication and Long-range in Maritime....Pages 219-225
Communications-Based Technology for Smart Grid Test Bed Using OPNET Simulations....Pages 227-233
Factors Influencing Cloud Enterprise Resource Planning Adoption in SMEs....Pages 235-245
Scaling Distributed All-Pairs Algorithms....Pages 247-257
Dynamic TDMA for Networked Embedded Systems....Pages 259-267
Driver Fatigue Detection....Pages 269-278
Cooperative Caching Strategies for Mobile Peer-to-Peer Networks: A Survey....Pages 279-287
Analysis of Chemical Plant Process Safety Information Integration Model from Information System Perspective....Pages 289-298
Cooperative Robust Output Regulation for Linear Uncertain Time-Delay Multi-agent Systems....Pages 299-307
The International Cooperation of Solar Radio Burst Project Using e-Callisto System Network....Pages 309-317
A Performance Study of Hidden Markov Model and Random Forest in Internet Traffic Classification....Pages 319-329
Design and Configuration of Avoidance Technique for Worst Situation in Zigbee Communications Using OPNET....Pages 331-336
Front Matter....Pages 337-337
Automated Segmentation of Microtubules in Cryo-EM Images with Excessive White Noise....Pages 339-348
The SI-LBP: A New Framework for Obtaining 3D Local Binary Patterns from Shape-Index....Pages 349-360
Implementation of Autonomous Unmanned Aerial Vehicle with Moving-Object Detection and Face Recognition....Pages 361-370
Robust Visual Communication System in Mobile Environments....Pages 371-377
Medical Image Segmentation Using Improved Chan-Vese Model....Pages 379-389
Study of Point Spread Function of Astronomical Object Imaging....Pages 391-398
Big Data Visualization:....Pages 399-408
Front Matter....Pages 337-337
A Comparative Study on Hough Transform Segmentation Approach for Outlier Iris Image....Pages 409-419
Exploring Multi-feature Based Action Recognition Using Multi-dimensional Dynamic Time Warping....Pages 421-429
A Dropout Distribution Model on Deep Transfer Learning Networks....Pages 431-439
Convolutional Neural Network Models for Facial Expression Recognition Using BU-3DFE Database....Pages 441-450
Non-rigid Object Tracking Using Modified Mean-Shift Method....Pages 451-458
Extended Gaussian Mixture Model Enhanced by Hole Filling Algorithm (GMMHF) Utilize GPU Acceleration....Pages 459-469
AVM Auto-Calibration for Driving Vehicle Images....Pages 471-480
An Object-Oriented Programming Interface for Low-Tier Text-Based Windowing Systems....Pages 481-487
Front Matter....Pages 489-489
Scheduling Algorithms for Cache Effect Optimisationin Partitioned Systems....Pages 491-500
HYFLUR: Recovery for Power-off Failure in Flash Memory Storage Systems Using HYbrid FLUsh Recovery....Pages 501-510
Static Scheduling Generation for Multicore Partitioned Systems....Pages 511-522
Improve Dynamic Sandbox on the Cloud with Non-QEMU Based OS Through Hooks and Mocks Techniques....Pages 523-531
Exploring the Platform for Expressing SystemVerilog Assertions in Model Based System Engineering....Pages 533-544
Enhanced Cloud Data Placement Strategy for Multiple Cloud Storage Services on Mobile Devices....Pages 545-553
Over the Air Programming Method for Learning Wireless Sensor Networks....Pages 555-566
Design of Multimedia File Similarity Evaluation Scheme Using Fingerprinting....Pages 567-574
Front Matter....Pages 575-575
Privacy Preservation Based on Full-Domain Generalization for Incremental Data Publishing....Pages 577-588
Creating Snort-IDS Rules for Detection Behavior Using Multi-sensors in Private Cloud....Pages 589-601
Review of Security Vulnerabilities in the IPv6 Neighbor Discovery Protocol....Pages 603-612
A New Probabilistic Digital Signature Scheme Based on Integer Factorization Problem....Pages 613-621
Front Matter....Pages 575-575
Android Mobile Application for Privacy Data Access in MANET Emergency Services....Pages 623-631
Attack on a Nonlinear Inter-Pixel Computing and Swapping Based Permutation Approach....Pages 633-639
The Capacity of Undetectable On/Off Covert Channel....Pages 641-650
Quality Analysis of Logging System Components in the Cloud....Pages 651-662
Copy-Move Forgery Detection Using on Locality Sensitive Hashing and k-means Clustering....Pages 663-672
Development of Android Security Permission Application....Pages 673-678
A Complete Fingerprint Matching Algorithm on GPU for a Large Scale Identification System....Pages 679-688
Android Security Analysis Based on Inter-application Relationships....Pages 689-700
An Analysis of IT Assessment Security Maturity in Higher Education Institution....Pages 701-713
Detection of SPAM Attacks in the Remote Triggered WSN Experiments....Pages 715-727
Secret Outflow Cause Symptom Analysis Through Scenario Assessment....Pages 729-737
Synflood Spoof Source DDoS Attack Defence Based on Packet ID Anomaly Detection - PIDAD....Pages 739-751
Range Image Derivatives for GRCM on 2.5D Face Recognition....Pages 753-763
Improving Intrusion Detection on Snort Rules for Botnets Detection....Pages 765-779
Front Matter....Pages 781-781
Development of Power Quality Index Using Ideal Analytic Hierarchy Process....Pages 783-793
An Improved Algorithm for Calculating Flow Paths of Injection-Production in Single Sand Body in Old Oilfields Under the Background of Big Data....Pages 795-804
Modeling Promotion Factors Using Bayesian Networks and Video Games....Pages 805-815
A Computational Agent Model for Stress Reaction in Natural Disaster Victims....Pages 817-827
Kalman Filter-Based Aggressive Behaviour Detection for Indoor Environment....Pages 829-837
Effectiveness Comparison of Range Estimator for Battery Electric Vehicles....Pages 839-849
Front Matter....Pages 781-781
Design of Maritime Meteorological Information Data Model Based on S-100....Pages 851-859
Administrative Divisions of Addresses Matching Algorithm Based on Moving Window Algorithm for Maximal Matching....Pages 861-872
Application of Fuzzy C-Mean Clustering Base Tree for Measuring the Effectiveness of Corporate....Pages 873-883
Extending the Socio-Economic Status (SES) Prediction System Based on the Thailand Marketing Research Society (TMRS) Standardized SES Classification for Thai Upcountry Urban Subjects....Pages 885-894
Intelligent and Adaptive Test System....Pages 895-902
A New Extraction Algorithm for Hierarchical Keyword Using Text Social Network....Pages 903-912
Layer-Wise Relevance Propagation for Deep Neural Network Architectures....Pages 913-922
Building a Hybrid Method for Analyzing the Risk by Integrating the Fuzzy Logic and the Improved Fuzzy Clustering Algorithm FCM-R....Pages 923-932
Meta Learning on Small Biomedical Datasets....Pages 933-939
Challenges in the Data Collection for Diagnostics of Smart Buildings....Pages 941-951
A Case Based Reasoning View of School Dropout Screening....Pages 953-964
A Modified Shuffled Frog Leaping Algorithm Using Truncated Gaussian Distribution in Frog’s Position Updating Process....Pages 965-974
A Surveillance System Using CNN for Face Recognition with Object, Human and Face Detection....Pages 975-984
Automated Disease Outbreak Detection and Analysis....Pages 985-993
Hierarchical Time Series Forecast in Electrical Grids....Pages 995-1005
Data Pre-processing of Student e-Learning Logs....Pages 1007-1012
Generating Point of Interest Description with Geo-tagged Web Photos....Pages 1013-1023
Association Rule Discovery for Rosewood Crime Arrest Planning....Pages 1025-1032
Front Matter....Pages 1033-1033
Translating Basic Metric Temporal Logic Formulas into Promela....Pages 1035-1043
A Propose Model for Shared Understanding of Software Requirements (SUSRs)....Pages 1045-1056
Front Matter....Pages 1033-1033
Mathematical Concept of Programming in Graphs....Pages 1057-1067
Islamic New Moon Software: Current Status....Pages 1069-1079
A Study on Decoupling Flow Engines Toward Cross-Platform Interoperability....Pages 1081-1091
Information System Design Based on the Result of Organization Goal-Oriented Requirements Engineering Process....Pages 1093-1103
Estimation of Fault Reparation Time in Software Maintenance Phase....Pages 1105-1116
Generation of Java Code from UML Sequence and Class Diagrams....Pages 1117-1125
Visualization of Gaps Between Sheet Parts for Watertightness of Automobiles....Pages 1127-1132
Conceptual Design Model of iCAL4LA: A Review and Critical Analysis of Computer Assisted Learning Concept in Determining the Core Segments and Their Components....Pages 1133-1143
Front Matter....Pages 1145-1145
Sentiment Analysis and User Similarity for Social Recommender System: An Experimental Study....Pages 1147-1156
Adaptive Polling for Responsive Web Applications....Pages 1157-1167
A Framework of Incorporating Thai Social Networking Data in Online Marketing Survey....Pages 1169-1177
Recommender Systems: Issues, Challenges, and Research Opportunities....Pages 1179-1189
Preserving Dynamic XML Keys....Pages 1191-1198
Ontology Based Adaptive, Semantic E-Learning Framework (OASEF)....Pages 1199-1212
Planning in Dynamic, Distributed and Non-automatized Production Systems....Pages 1213-1222
Decision Support for the Stocks Trading Using MLP and Data Mining Techniques....Pages 1223-1233
Front Matter....Pages 1235-1235
A Survey of Security Aspects for Internet of Things in Healthcare....Pages 1237-1247
Influence of Intentional Electromagnetic Interference on the Functioning of the Terrestrial Segment of Flying Ubiquitous Sensor Network....Pages 1249-1259
Analysis of Routes in the Network Based on a Swarm of UAVs....Pages 1261-1271
Extension of OneM2M Protocol Binding Considering Service Mapping....Pages 1273-1281
Front Matter....Pages 1235-1235
Enterprise Modelling for the Internet of Things: The ComVantage Method....Pages 1283-1293
A Conceptual Framework for the Design of an Urban Flood Early-Warning System Using a Context-Awareness Approach in Internet-of-Things Platform....Pages 1295-1305
A Study on the IoT Based Smart Door Lock System....Pages 1307-1318
Front Matter....Pages 1319-1319
Optimized Data Transmission Method for Multimedia Services Based on OpenStack....Pages 1321-1329
Load Balancing Methodology for Efficient Real-Time Streaming Service Based on WebRTC....Pages 1331-1337
A New Virtualized Environment for Application Deployment Based on Docker and AWS....Pages 1339-1349
Implementation of Chinese Cabbage of Origin Discrimination Software....Pages 1351-1360
The Smart Armband: Expanding Wearable Interface Area and Suggesting Interaction Scenarios....Pages 1361-1365
Cost-Effective Multicast Routing with Multi-gateway in Wireless Mesh Networks....Pages 1367-1374
Frequency Features Selection Using Decision Tree for Classification of Sleep Breathing Sound....Pages 1375-1380
Architecture Design with Coordinating Live Streaming and VOD Sharing for Media Content Distribution....Pages 1381-1389
CTA-Aware Dynamic Scheduling Scheme for Streaming Multiprocessors in High-Performance GPUs....Pages 1391-1399
Design of Adaptive Integrated Fast Image Enhancement System for General, Haze, Low Light, Back-Light Condition....Pages 1401-1408
A New Prefetch Policy for Data Filter Cache in Energy-Aware Embedded Systems....Pages 1409-1418
User-Assisted OCR on Outdoor Images for Approximate Positioning....Pages 1419-1429
Front Matter....Pages 1431-1431
The Application of Digital Health Content Using Mobile Device....Pages 1433-1438
Review Paper on Nutritional Information Using Mobile Augmented Reality Technology....Pages 1439-1445
The Applications of Convergence Technology for Physical Activity in the Disabled....Pages 1447-1452
Personalized Exercise Prescription Utilizing Virtual Fitness....Pages 1453-1458
Network Function Virtualization (NFV) Platform for Wellness in High-Speed Network....Pages 1459-1464
Front Matter....Pages 1431-1431
Review of the Role of Modern Computational Technologies in the Detection of Dyslexia....Pages 1465-1475
A New Paradigm for the Spread Sport Leisure Culture Focusing on the IT-Based Convergence Interactive System....Pages 1477-1485
Transmission Optimization of Healthcare Information for Multi-channel Cloud Networks....Pages 1487-1493
The ICT Technology for Geriatric Diseases Healthcare....Pages 1495-1500
Back Matter....Pages 1501-1505




نظرات کاربران