Information Technology - New Generations

Information Technology - New Generations

15th International Conference on Information Technology

Latifi, Shahram

Springer International Publishing AG

04/2018

818

Dura

Inglês

9783319770277

15 a 20 dias

2353

Descrição não disponível.
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT - Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual's Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Information Technology;Networking and Wireless Communications;Cybersecurity;Data Mining;Software Engineering;High Performance Computing Architectures;Computer Vision, HCI and Image Processing/Analysis;Health, Bioinformatics, Pattern Detection and Optimization