Pattern Analysis, Intelligent Security and the Internet of Things (eBook, PDF)
96,29 €
inkl. MwSt.
Sofort per Download lieferbar
Pattern Analysis, Intelligent Security and the Internet of Things (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing. …mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.89MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)341,33 €
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)213,99 €
- Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (eBook, PDF)213,99 €
- Theory and Engineering of Complex Systems and Dependability (eBook, PDF)149,79 €
- Advances onto the Internet of Things (eBook, PDF)149,79 €
- Advances in Dependability Engineering of Complex Systems (eBook, PDF)149,79 €
- Dependability Engineering and Complex Systems (eBook, PDF)149,79 €
-
-
-
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Erscheinungstermin: 20. Juni 2015
- Englisch
- ISBN-13: 9783319173986
- Artikelnr.: 43798934
- Verlag: Springer International Publishing
- Erscheinungstermin: 20. Juni 2015
- Englisch
- ISBN-13: 9783319173986
- Artikelnr.: 43798934
Dr. Ajith Abraham is Director of the Machine Intelligence Research (MIR) Labs, a global network of research laboratories with headquarters near Seattle, WA, USA. He is an author/co-author of more than 750 scientific publications. He is founding Chair of the International Conference of Computational Aspects of Social Networks (CASoN), Chair of IEEE Systems Man and Cybernetics Society Technical Committee on Soft Computing (since 2008), and a Distinguished Lecturer of the IEEE Computer Society representing Europe (since 2011).
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL).- Password Recovery Using Graphical Method.- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA.- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources.- A study on changes of supervision model in universities and fostering creative Ph.D. students in China.- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis.- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation.- Can Single- Sign-On Improve Password Management? A Focus Group Study.- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review.- Finding the Effectiveness of Software Team Members Using Decision Tree.- Data Completeness Measures.- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic.- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan.- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values.- The Impact of Knowledge Management in Pair Programming on Program Quality.- Social Networks Event Mining: A Systematic Literature Review.- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature.- Social Networks Content Analysis for Peacebuilding Application.- Tree-base Structure for Feature Selection in Writer Identification.- Factors That Affecting The Effective Online Collaborative Learning Environment.- Comparing Features Extraction Methods for Person Authentication using EEG Signals.- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles.- Modeling Cloud Computing Risk Assessment Using Ensemble Methods.- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites.- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings.- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves.- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.- Category-based Graphical User Authentication (CGUA) Scheme for Web Application.- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves.- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment.- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL).- Password Recovery Using Graphical Method.- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA.- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources.- A study on changes of supervision model in universities and fostering creative Ph.D. students in China.- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis.- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation.- Can Single- Sign-On Improve Password Management? A Focus Group Study.- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review.- Finding the Effectiveness of Software Team Members Using Decision Tree.- Data Completeness Measures.- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic.- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan.- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values.- The Impact of Knowledge Management in Pair Programming on Program Quality.- Social Networks Event Mining: A Systematic Literature Review.- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature.- Social Networks Content Analysis for Peacebuilding Application.- Tree-base Structure for Feature Selection in Writer Identification.- Factors That Affecting The Effective Online Collaborative Learning Environment.- Comparing Features Extraction Methods for Person Authentication using EEG Signals.- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles.- Modeling Cloud Computing Risk Assessment Using Ensemble Methods.- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites.- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings.- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves.- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.- Category-based Graphical User Authentication (CGUA) Scheme for Web Application.- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves.- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment.- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL).- Password Recovery Using Graphical Method.- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA.- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources.- A study on changes of supervision model in universities and fostering creative Ph.D. students in China.- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis.- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation.- Can Single- Sign-On Improve Password Management? A Focus Group Study.- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review.- Finding the Effectiveness of Software Team Members Using Decision Tree.- Data Completeness Measures.- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic.- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan.- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values.- The Impact of Knowledge Management in Pair Programming on Program Quality.- Social Networks Event Mining: A Systematic Literature Review.- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature.- Social Networks Content Analysis for Peacebuilding Application.- Tree-base Structure for Feature Selection in Writer Identification.- Factors That Affecting The Effective Online Collaborative Learning Environment.- Comparing Features Extraction Methods for Person Authentication using EEG Signals.- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles.- Modeling Cloud Computing Risk Assessment Using Ensemble Methods.- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites.- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings.- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves.- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.- Category-based Graphical User Authentication (CGUA) Scheme for Web Application.- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves.- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment.- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL).- Password Recovery Using Graphical Method.- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA.- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources.- A study on changes of supervision model in universities and fostering creative Ph.D. students in China.- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis.- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation.- Can Single- Sign-On Improve Password Management? A Focus Group Study.- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review.- Finding the Effectiveness of Software Team Members Using Decision Tree.- Data Completeness Measures.- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic.- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan.- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values.- The Impact of Knowledge Management in Pair Programming on Program Quality.- Social Networks Event Mining: A Systematic Literature Review.- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature.- Social Networks Content Analysis for Peacebuilding Application.- Tree-base Structure for Feature Selection in Writer Identification.- Factors That Affecting The Effective Online Collaborative Learning Environment.- Comparing Features Extraction Methods for Person Authentication using EEG Signals.- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles.- Modeling Cloud Computing Risk Assessment Using Ensemble Methods.- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites.- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings.- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves.- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.- Category-based Graphical User Authentication (CGUA) Scheme for Web Application.- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves.- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment.- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.