Information Technology - New Generations
Home > Computing and Information Technology > Applied computing > Information Technology - New Generations: 15th International Conference on Information Technology
Information Technology - New Generations: 15th International Conference on Information Technology

Information Technology - New Generations: 15th International Conference on Information Technology

|
     0     
5
4
3
2
1




International Edition


About the Book

This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.

Table of Contents:
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed  Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT – Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual’s Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.


Best Sellers


Product Details
  • ISBN-13: 9783030083526
  • Publisher: Springer Nature Switzerland AG
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: 15th International Conference on Information Technology
  • ISBN-10: 3030083527
  • Publisher Date: 03 Jan 2019
  • Height: 279 mm
  • No of Pages: 818
  • Returnable: Y
  • Width: 210 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Technology - New Generations: 15th International Conference on Information Technology
Springer Nature Switzerland AG -
Information Technology - New Generations: 15th International Conference on Information Technology
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Technology - New Generations: 15th International Conference on Information Technology

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!