Information Technology New Generations 13th International Conference on Information Technology 1st Edition by Shahram Latifi – Ebook PDF Instant Download/Delivery: 9783319324661, 3319324667
Full download Information Technology New Generations 13th International Conference on Information Technology 1st Edition after payment
Product details:
ISBN 10: 3319324667
ISBN 13: 9783319324661
Author: Shahram Latifi
This book collects articles presented at the 13th International Conference on Information Technology- New Generations, April, 2016, in Las Vegas, NV USA. It includes over 100 chapters on critical areas of IT including Web Technology, Communications, Security, and Data Mining.
Table of contents:
1. Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model
2. Cognitive Spectrum Decision via Machine Learning in CRN
3. Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks
4. An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem
5. Airborne Networks with Multi-beam Smart Antennas: Towards a QOS-Supported, Mobility-Predictive MAC
6. CR Based Video Communication Testbed with Robust Spectrum Sensing / Handoff
7. A Control-Message Quenching Algorithm in Openflow-Based Wireless Mesh Networks with Dynamic Spectrum Access
8. SINR Maximization in Relay-Assisted Multi-user Wireless Networks
9. A Hybrid MAC for Long-Distance Mesh Network with Multi-beam Antennas
10. Future Approach to Find Business Model Orientation for Technological Businesses
11. Social Media Coverage of Public Health Issues in China: A Content Analysis of Weibo News Posts
12. Advertisement Through the Most Popular Twitter Users Based on Followers in Saudi Arabia
13. Sentiment Analysis for Arabic Reviews in Social Networks Using Machine Learning
14. An Interactive Model for Creating Awareness and Consequences of Cyber-crime in People with Limited Technology Skills
15. Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon
16. Perpetuating Biometrics for Authentication
17. Certificate-Based IP Multimedia Subsystem Authentication and Key Agreement
18. Software Optimizations of NTRUEncrypt for Modern Processor Architectures
19. Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System
20. Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns
21. Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs
22. Speed Records for Multi-prime RSA Using AVX2 Architectures
23. Privacy Preservation of Source Location Using Phantom Nodes
24. Implementing a Bitcoin Exchange with Enhanced Security
25. REST-Based Semantic Annotation of Web Services
26. Synthetical QoE-Driven Anomalous Cell Pattern Detection with a Hybrid Algorithm
27. A Mobile Group Tour Tracking and Gathering System
28. Model Based Evaluation of Cybersecurity Implementations
29. Accelerating the Critical Line Algorithm for Portfolio Optimization Using GPUs
30. Maximum Clique Solver Using Bitsets on GPUs
31. CUDA Implementation of Computer Go Game Tree Search
32. Negotiation and Collaboration Protocol Based on EbXML Intended to Optimize Port Processes
33. Reversible Data Hiding Scheme Using the Difference Between the Maximum and Minimum Values
34. The Design, Data Flow Architecture, and Methodologies for a Newly Researched Comprehensive Hybrid Model for the Detection of DDoS Attacks on Cloud Computing Environment
35. Educational Gaming: Improved Integration Using Standard Gaming Genres
36. Designing a Web-Based Graphical Interface for Virtual Machine Management
37. Towards Providing Resource Management in a Local IaaS Cloud Architecture
38. Integration of Assistive Technologies into 3D Simulations: An Exploratory Study
39. Data Profiling Technology of Data Governance Regarding Big Data: Review and Rethinking
40. Understanding the Service Model of Mobile Social Network in Live 4G Network: A Case Study of WeChat Moments
41. Applying Scrum in an Interdisciplinary Project for Fraud Detection in Credit Card Transactions
42. The Visual Representation of Numerical Solution for a Non-stationary Deformation in a Solid Body
43. Developing Usability Heuristics for Grid Computing Applications: Lessons Learned
44. Refining Timing Requirements in Extended Models of Legacy Vehicular Embedded Systems Using Early End-to-end Timing Analysis
45. Integrated Metrics Handling in Open Source Software Quality Management Platforms
46. Supporting the Development of User-Driven Service Composition Applications
47. Mining Source Code Clones in a Corporate Environment
48. Fuzzy Resource-Constrained Time Workflow Nets
49. Performance Indicators Analysis in Software Processes Using Semi-supervised Learning with Information Visualization
50. Techniques for the Identification of Crosscutting Concerns: A Systematic Literature Review
51. ValiPar Service: Structural Testing of Concurrent Programs as a Web Service Composition
52. A Model-Driven Solution for Automatic Software Deployment in the Cloud
53. Software Process Improvement in Small and Medium Enterprises: A Systematic Literature Review
54. Investigating Reputation in Collaborative Software Maintenance: A Study Based on Systematic Mapping
55. A 2-Layer Component-Based Architecture for Heterogeneous CPU-GPU Embedded Systems
56. Block-Based Approach to 2-D Wavelet Transform on GPUs
57. Deriving CGM Based-Parallel Algorithms for the Optimal Binary Search-Tree Problem
58. Experimental Evaluations of MapReduce in Biomedical Text Mining
59. Algorithmic Approaches for a Dependable Smart Grid
60. Performance Evaluation of Data Migration Methods Between the Host and the Device in CUDA-Based Programming
61. Design of a Deadlock-Free XY-YX Router for Network-on-Chip
62. An FPGA Based Compression Accelerator for Forex Trading System
63. An Academic Case Study Using Scrum
64. Distributed Systems Performance for Big Data
65. Towards Earlier Fault Detection by Value-Driven Prioritization of Test Cases Using Fuzzy TOPSIS
66. Experimenting with a Load-Aware Communication Middleware for CPS Domains
67. Adaptive Message Restructuring Using Model-Driven Engineering
68. Towards Modular Language Design Using Language Fragments: The Hybrid Systems Case Study
69. Data Clustering Using Improved Fire Fly Algorithm
70. Intelligent Mobile App for You-Tube Video Selection
71. An Application of GEP Algorithm for Prime Time Detection in Online Social Network
72. Transport Logistic Application: Train’s Adherence Evolution and Prediction Based on Decision Tree and Markov Models
73. A Method for Match Key Blocking in Probabilistic Matching
74. Accuracy Assessment on Prediction Models for Fetal Weight Based on Maternal Fundal Height
75. Ensemble Noise Filtering for Streaming Data Using Poisson Bootstrap Model Filtering
76. Mining Persistent and Dynamic Spatio-Temporal Change in Global Climate Data
77. Open Source Data Quality Tools: Revisited
78. Some Outflow Boundary Conditions for the Navier-Stokes Equations
79. Successive Projection with B-spline
80. Computer-Aided Diagnosis Method for Detecting Early Esophageal Cancer from Endoscopic Image by Using Dyadic Wavelet Transform and Fractal Dimension
81. Daubechies Wavelet-Based Method for Early Esophageal Cancer Detection from Flexible Spectral Imaging Color Enhancement Image
82. A Refined Method for Estimating the Global Hölder Exponent
83. A New Wavelet-Based Mode Decomposition for Oscillating Signals and Comparison with the Empirical Mode Decomposition
84. Short Boundary Detection Using Spatial-Temporal Features
85. A Set of Usability Heuristics and Design Recommendations for u-Learning Applications
86. Computer Input Just by Sight and Its Applications in Particular for Disable Persons
87. User Impressions About Distinct Approaches to Layout Design of Personalized Content
88. Video Compression Using Variable Block Size Motion Compensation with Selective Subpixel Accuracy in Redundant Wavelet Transform
89. PPMark: An Architecture to Generate Privacy Labels Using TF-IDF Techniques and the Rabin Karp Algorithm
90. RGB and Hue Color in Pornography Detection
91. Sociology Study Using Email Data and Social Network Analysis
92. Evaluation of Usability Heuristics for Transactional Web Sites: A Comparative Study
93. Algorithm for Gaussian Integer Exponentiation
94. Dynamic Simulation of the Flight Behavior of a Rotary-Wing Aircraft
95. Origami Guru: An Augmented Reality Application to Assist Paper Folding
96. Augmented Reality Approach for Knowledge Visualization and Production (ARAKVP) in Educational and Academic Management System for Courses Based on Active Learning Methodologies (EAMS–CBALM)
97. Designing Schedulers for Hard Real-Time Tasks
98. An Autonomous Stair Climbing Algorithm with EZ-Robots
99. Toward Indoor Autonomous Flight Using a Multi-rotor Vehicle
100. Using Tweets for Rainfall Monitoring
101. Algorithms Performance Evaluation in Hybrid Systems
102. An Efficient Method for the Open-Shop Scheduling Problem Using Simulated Annealing
103. Schematizing Heidegger
104. Constrained Triangulation of 2D Shapes
105. Software Project and Analysis of a Training Screen Based System for Healthcare Professionals Working in the NICU in Brazil
106. A Self-configuration Web-API for the Internet of Things
107. Automated Behavioral Malware Analysis System
108. A Message Efficient Group Membership Protocol in Synchronous Distributed Systems
109. Ontology-Driven Metamodel Validation in Cyber-Physical Systems
110. Developing Software in the Academic Environment
111. Automatic Reverse Engineering of Classes’ Relationships
112. Developing Predictable Vehicular Distributed Embedded Systems on Multi-core
113. Formalizing the Process of Usability Heuristics Development
114. Analysis of a Training Platform for the Digital Battlefield, Based on Semiotics and Simulation
115. Usability Heuristics and Design Recommendations for Driving Simulators
116. Model for Describing Bioprinting Projects in STL
117. The Fractal Nature of Mars Topography Analyzed via the Wavelet Leaders Method
118. Privacy Enhancement in E-Mail Clients
People also search for:
international conference on information technology new generations
what are the next generation technologies
what is the newest form of technology
information technology in the next 10 years
information on new technology
Tags: Shahram Latifi, Information Technology, New Generations, International Conference