Atjaunināt sīkdatņu piekrišanu

Information Technology - New Generations: 15th International Conference on Information Technology 2018 ed. [Hardback]

Edited by
  • Formāts: Hardback, 818 pages, height x width: 279x210 mm, weight: 2353 g, 362 Illustrations, color; 104 Illustrations, black and white; XVII, 818 p. 466 illus., 362 illus. in color., 1 Hardback
  • Sērija : Advances in Intelligent Systems and Computing 738
  • Izdošanas datums: 13-Apr-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319770276
  • ISBN-13: 9783319770277
  • Hardback
  • Cena: 136,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 160,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 818 pages, height x width: 279x210 mm, weight: 2353 g, 362 Illustrations, color; 104 Illustrations, black and white; XVII, 818 p. 466 illus., 362 illus. in color., 1 Hardback
  • Sērija : Advances in Intelligent Systems and Computing 738
  • Izdošanas datums: 13-Apr-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319770276
  • ISBN-13: 9783319770277

This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.

Part I Cybersecurity.- Safeguarding Personal Health Information: Case
Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance
Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor
Networks with the Never Ending Language Learner.- PERIA-Framework: A
Prediction Extension Revision Image Annotation Framework.- The Modern State
and the Further Development Prospects of Information Security in the Republic
of Kazakhstan.- Evaluating Cyber Threats to the United Kingdoms National
Health Service (NHS) Spine Network.- A Virtual Animated Commentator
Architecture for Cybersecurity Competitions.- Malicious Software
Classification using VGG16 Deep Neural Networks Bottleneck Features.-
Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A
Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of
Security Assessment: a core model proposal.- Integration of Mobile Forensic
Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network
Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.-
Analysis of Security Vulnerability and Analytics of Internet of Things (IOT)
Platform.- New Techniques for Public Key Encryption with Sender Recovery.-
Cloud Intrusion Detection and Prevention system for M-voting application in
South Africa.- Protecting Personal Data with Blockchain Technology.- The Role
of CAE-CDE in Cybersecurity Education for Workforce Development.- Software
Optimizations for DES.- Part II Networking and Wireless Communications.-
Design and Development of VXLAN based Cloud Overlay Network Monitoring System
and Environment.- End to End Delay Analysis in a Two Tier Cluster
Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to
the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT
Dispenser.- Local Clock Synchronization without Transmission Delay Estimation
of Control Messages in Wireless Sensor Networks.- Denial of service attacks
inwireless sensor networks with proposed countermeasures.- Part III Education
and Technology.- Internet-Based Education: A New Milestone for Formal
Language and Automata Courses.- Teaching Communication Management in Software
Projects through Serious Educational Games.- Gamification applied in the
teaching of agile Scrum methodology.- An Experience of Using a Board Serious
Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software
Testing and Development.- Teaching Scrum by Doing Scrum in Internships in
South Africa to Prepare Interns for Agile Projects.- Alignment of
Requirements and Testing in Agile: an Industrial Experience.- Health Care
Information Systems: A Crisis Approach.- Using Correct-by-Construction
Software Agile Development.- Service-Centered Operation Methodology (MOCA)
application supported by computer science to improve continuously care
quality in public services .- Improving Agile Software Development with
Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural
Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the
Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical
monitoring using an Artificial Neural Network Input Gain Measurement
Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit
Granting on a Brazilian Retail Enterprise.- Cross-language approach for
sentiment classification in Brazilian Portuguese with ConvNets.- Thematic
Spatiotemporal Association Rules to Track the Evolving of Visual Features and
their Meaning in Satellite Image Time Series.- DeRis: Information system
supporting the prediction of default risk in companies.- Taking a Steppe
towards optimizing Note-Taking Software by creation of a Note Classification
Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of
a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile
device energy availability.- Enhancing Lipstick Try-On with Augmented Reality
and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach
to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive
Environment.- Reproducible Research in Document Analysis and Recognition.-
Music Genre Classification using Data Mining and Machine Learning.- Improving
word representations using Paraphrase dataset.- A Initial Experimental
Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy
of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character
Representation Learning.- Business Intelligence Dashboard Application for
Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker
Discrimination Systems.- Selection of Transformations of Continuous
Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic
Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering
and Combinatorial Methods for Test Suite Prioritization of GUI and Web
Applications.- A Timed Petri NetModel to Specify Scenarios of Video
Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey
on adoption Good Practices for ICT Governance at Enhanced Organizations.-
Budget and User Feedback Control Strategy-based PRMS Scenario Web
Application.- A Controlled Natural Language Editor for Semantic of Business
Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to
Model Multiplayer Video Games.- A Requirements Engineering-based Approach for
evaluating Security Requirements Engineering Methodologies.- Increasing the
prediction quality of software defective modules with automatic feature
engineering.- Part VII High Performance Computing Architectures.- NSF Noyce
Recruitment and Mentorship.- Mining Associations between Two Categories using
Unstructured Text Data in Cloud.- A Note on Computational Science
Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.-
Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based
Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal
Visualization.- Detection of early gastric cancer from endoscopic images
using Wavelet Transform Modulus Maxima.- Detection method of early esophageal
cancer from endoscopic image using dyadic wavelet transform and four-layer
neural network.- Study of Specific Location of Exhaustive Matching in Order
to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a
Case Study for Ground Change Detection in BRIC Countries.- Part IX Health,
Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing
Makerspaces in Distributed  Development Environment.- Semantic Description of
Healthcare Devices to Enable Data Integration.- Applying transfer learning to
QSAR regression models.- Investigating the Recognition of Non-Articulatory
Sounds by using Statistical Tests and Support Vector Machine.- A Complete
Diabetes Management and Care System.- On the use of van der PauwTechnique to
Monitor Skin Burning in Patients Undergoing Interferential Current Therapy
(IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart
Lighting Controlling System: Case Study of Yarmouk University Museum.-
Incremental Topology Generated for ANN A Case Study on a Helicopters Flight
Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic
Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down
Systems for Renewable Energy Management.- Extracting Timing Models from
Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short
Papers.- Customer services management and satisfaction of Internet-related
banking of First National Bank.- BIG IoT Interconnecting IoT Platforms from
different domains - First success story.- Cross-Cultural Perspective of
E-Commerce.- Website Usability Requirements: Through the Lens of Individuals
Perception.- Methods of Ensuring the Reliability and Fault Tolerance of
Information Systems.- Applying a Method for Credit Limit Reviews in a
Brazilian Retail Enterprise.- Application of an Effective Methodology for
Analysis of Fragility and Its Components in the Elderly.- A Classifier
Evaluation for Payments Default Predictions in a Brazilian Retail Company.-
Confidentiality, Integrity & Availability in Electronic Health Records:An
Integrative Review.- Operating System Security Management and Ease of
Implementation (Passwords, Firewalls and Antivirus).- Method of Processing
Big Data.- Software Architecture for In-House Development of a Student Web
Portal for Higher Education Institution in Kazakhstan.- Modified Human Code
for Bandwidth Optimization through Lossless Compression.- Index.
Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas