Software Engineering Methods in Intelligent Algorithms
Proceedings of 8th Computer Science On-line Conference 2019, Vol. 1
Herausgegeben:Silhavy, Radek
Software Engineering Methods in Intelligent Algorithms
Proceedings of 8th Computer Science On-line Conference 2019, Vol. 1
Herausgegeben:Silhavy, Radek
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents software engineering methods in the context of the intelligent systems. It discusses real-world problems and exploratory research describing novel approaches and applications of software engineering, software design and algorithms.
The book constitutes the refereed proceedings of the Software Engineering Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.
Andere Kunden interessierten sich auch für
- Cybernetics and Automation Control Theory Methods in Intelligent Algorithms110,99 €
- Intelligent Algorithms in Software Engineering110,99 €
- Artificial Intelligence Methods in Intelligent Algorithms110,99 €
- Software Engineering and Algorithms110,99 €
- Artificial Intelligence in Intelligent Systems125,99 €
- Cybernetics and Algorithms in Intelligent Systems110,99 €
- Informatics and Cybernetics in Intelligent Systems110,99 €
-
-
-
This book presents software engineering methods in the context of the intelligent systems. It discusses real-world problems and exploratory research describing novel approaches and applications of software engineering, software design and algorithms.
The book constitutes the refereed proceedings of the Software Engineering Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.
The book constitutes the refereed proceedings of the Software Engineering Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.
Produktdetails
- Produktdetails
- Advances in Intelligent Systems and Computing 984
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-19806-0
- 1st ed. 2019
- Seitenzahl: 484
- Erscheinungstermin: 8. Mai 2019
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 734g
- ISBN-13: 9783030198060
- ISBN-10: 3030198065
- Artikelnr.: 56129786
- Advances in Intelligent Systems and Computing 984
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-19806-0
- 1st ed. 2019
- Seitenzahl: 484
- Erscheinungstermin: 8. Mai 2019
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 734g
- ISBN-13: 9783030198060
- ISBN-10: 3030198065
- Artikelnr.: 56129786
Literature Review on Database Design Testing Techniques.- Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things.- S-DWF:An Integrated Schema for Secure Digital Image Watermarking.- Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set.- Analysis of behaviour patterns of the residents of a smart house.- Combined Method of Monitoring of Hazardous Phenomena and Predicting of Hazardous Processes and Security of Coastal Infrastructure and Population.- Analysis of Existing Concepts of Optimization of ETL-Processes.- Multiagent Distribution of Roles in Communities with Limited Communications.- Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement.- Comparison Two of Different Technologies for Outdoor Positioning.- An Effective Hardware-based Bidirectional Security Aware M-Payment System by using Biometric Authentication.- A Study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks.
Literature Review on Database Design Testing Techniques.- Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things.- S-DWF:An Integrated Schema for Secure Digital Image Watermarking.- Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set.- Analysis of behaviour patterns of the residents of a smart house.- Combined Method of Monitoring of Hazardous Phenomena and Predicting of Hazardous Processes and Security of Coastal Infrastructure and Population.- Analysis of Existing Concepts of Optimization of ETL-Processes.- Multiagent Distribution of Roles in Communities with Limited Communications.- Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement.- Comparison Two of Different Technologies for Outdoor Positioning.- An Effective Hardware-based Bidirectional Security Aware M-Payment System by using Biometric Authentication.- A Study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks.
Literature Review on Database Design Testing Techniques.- Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things.- S-DWF:An Integrated Schema for Secure Digital Image Watermarking.- Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set.- Analysis of behaviour patterns of the residents of a smart house.- Combined Method of Monitoring of Hazardous Phenomena and Predicting of Hazardous Processes and Security of Coastal Infrastructure and Population.- Analysis of Existing Concepts of Optimization of ETL-Processes.- Multiagent Distribution of Roles in Communities with Limited Communications.- Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement.- Comparison Two of Different Technologies for Outdoor Positioning.- An Effective Hardware-based Bidirectional Security Aware M-Payment System by using Biometric Authentication.- A Study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks.
Literature Review on Database Design Testing Techniques.- Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things.- S-DWF:An Integrated Schema for Secure Digital Image Watermarking.- Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set.- Analysis of behaviour patterns of the residents of a smart house.- Combined Method of Monitoring of Hazardous Phenomena and Predicting of Hazardous Processes and Security of Coastal Infrastructure and Population.- Analysis of Existing Concepts of Optimization of ETL-Processes.- Multiagent Distribution of Roles in Communities with Limited Communications.- Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement.- Comparison Two of Different Technologies for Outdoor Positioning.- An Effective Hardware-based Bidirectional Security Aware M-Payment System by using Biometric Authentication.- A Study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks.