語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Pattern analysis, intelligent securi...
~
Abraham, Ajith.
Pattern analysis, intelligent security and the internet of things[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
004
書名/作者:
Pattern analysis, intelligent security and the internet of things/ edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo.
其他作者:
Abraham, Ajith.
團體作者:
Clark Conference
出版者:
Cham : : Springer International Publishing :, 2015.
面頁冊數:
x, 359 p. : : ill., digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Computer science
標題:
Computer security
標題:
Big data - Congresses.
標題:
Internet of things - Congresses.
標題:
Engineering.
標題:
Computational Intelligence.
標題:
Complexity.
標題:
Artificial Intelligence (incl. Robotics)
ISBN:
9783319173986 (electronic bk.)
ISBN:
9783319173979 (paper)
內容註:
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
摘要、提要註:
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
電子資源:
http://dx.doi.org/10.1007/978-3-319-17398-6
Pattern analysis, intelligent security and the internet of things[electronic resource] /
Pattern analysis, intelligent security and the internet of things
[electronic resource] /edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo. - Cham :Springer International Publishing :2015. - x, 359 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.3552194-5357 ;. - Advances in intelligent systems and computing ;v.281..
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
ISBN: 9783319173986 (electronic bk.)
Standard No.: 10.1007/978-3-319-17398-6doiSubjects--Topical Terms:
149894
Computer science
LC Class. No.: QA75.5
Dewey Class. No.: 004
Pattern analysis, intelligent security and the internet of things[electronic resource] /
LDR
:04434nam a2200325 a 4500
001
439382
003
DE-He213
005
20160120144843.0
006
m d
007
cr nn 008maaau
008
160322s2015 gw s 0 eng d
020
$a
9783319173986 (electronic bk.)
020
$a
9783319173979 (paper)
024
7
$a
10.1007/978-3-319-17398-6
$2
doi
035
$a
978-3-319-17398-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA75.5
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
004
$2
23
090
$a
QA75.5
$b
.W927 2014
111
2
$a
Clark Conference
$d
(2005 :
$c
Sterling and Francine Clark Art Institute)
$3
347558
245
1 0
$a
Pattern analysis, intelligent security and the internet of things
$h
[electronic resource] /
$c
edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
x, 359 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.355
505
0
$a
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
520
$a
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
650
0
$a
Computer science
$3
149894
650
0
$a
Computer security
$3
158051
650
0
$a
Big data
$v
Congresses.
$3
511438
650
0
$a
Internet of things
$v
Congresses.
$3
589828
650
1 4
$a
Engineering.
$3
372756
650
2 4
$a
Computational Intelligence.
$3
463962
650
2 4
$a
Complexity.
$3
464233
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
463642
700
1
$a
Abraham, Ajith.
$3
466237
700
1
$a
Muda, Azah Kamilah.
$3
627252
700
1
$a
Choo, Yun-Huoy.
$3
627253
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
v.281.
$3
588653
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-17398-6
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-319-17398-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入