Information Science and Applications
Home > Computing and Information Technology > Computer science > Artificial intelligence > Information Science and Applications: (339 Lecture Notes in Electrical Engineering)
Information Science and Applications: (339 Lecture Notes in Electrical Engineering)

Information Science and Applications: (339 Lecture Notes in Electrical Engineering)


     0     
5
4
3
2
1



International Edition


X
About the Book

This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.  It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.   The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques.  Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security. The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology. 

Table of Contents:
Part 1.- QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network; S.H.Mohammad, et al.- Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico -Cellular Networks; D.C.Lee, et al.- A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process; S.Salim, et al.- A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network; B.NDIBANJE, et al.- A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed; S.H.Cho, S.Cho.- A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks; Z.Che-aron, et al.- Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders; C.Natpratan, N.Cooharojananone.- Indoor WIFI localization on embedded systems; A.Apavatjrut, E.Boonyasiwapong.- Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks; M.Abdul Azim, et al.- Part 2.- Maintaining a trajectory data warehouse under schema changes with the mobile agent view adaptation technique; W.Oueslati, J.Akaichi.- Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV; K.Mizutani, et al.- Evaluation Method of MANET over Next Generation Optical Wireless Access Network; M.A.Wong, et al.- A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol; L.Cen, et al.- Operational Analysis of Arrival Rate-based Queuing Management Mechanism for High-speed Networks; M.M.Kadhum, S.Manickam.- E-Government project enquiry framework for a continuous improvement process, A case study in Malaysia and Comoros; S.A.Mfoihaya, M.Mohd Yusof.- Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods; S.Valaisathien, V.Vanijja.- A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-peer Media Streaming Systems; V.II Romero, C.A.Festin.- A transmission method to improve quality of multimedia in Hybrid Broadcast/ Mobile Networks; H.-Y.Seo, et al.- A Failureless Pipelined Aho-Corasick Algorithm for FPGA-based Parallel String Matching Engine; H.Kim.- Revised P2P Data Sharing Scheme over Distributed Cloud Networks; W.Lee, et al.- LQDV Routing Protocol Implementation Design in Arduino Platform and Xbee module; S.K.HO, M.Kyun Kim.- A Virtualization and Management Architecture of Micro-Datacenter; B.Park, et al.- Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks; B.Hamza Khudayer, et al.- Passive Network Monitoring using REAMS;  A.Azodi, et al.- Low Latency Video Transmission Device; C.Park, H.Kim.- Part 3.- Comparative Investigation of Biomedical Contents using Desktop and Tabletop Technologies; T.M.Madni Ikram, et al.- Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment; T.Pham.- An Algorithm for Rock Pore Image Segmentation; Z.Jiqun, et al.- Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences; G.LU, et al.- P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions; K.Rujirakul, Chakchai So-In.- Flight Simulator for Serious Gaming; A.Nisansala, et al.- Potential Z-Fighting Conflict Detection System in 3D Level Design Tools; P.Setthawong.- Efficient Motion Vector Algorithms for Faster Implementation of HEVC/H.265 Video Coding; E.Jaja, et al.- A Synthesis of 2D Mammographic Image Using Super-Resolution Technique: A Phantom Study; S.Kantharak, et al.- Using complex events to represent domain concepts in graphs; R.Tipton Perry, et al.- Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model; D.H.Kim, et al.- An Approximate MatchingPreprocessing for Efficient Phase-Only Correlation-Based Image Retrieval; H.Wang, M.Aritsugi.- Pixel Art Color Palette Synthesis; Mi.-R.Huang, R.-R.Lee.- Introducing a New Radiation Detecting Device Calibration Method and Estimating 3D Distance to Radiation Sources; P.Rathnayaka, et al.- Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images; P.Yospanya, Y. Limpiyakorn.- Detecting and extracting text in video via sparse representation based classification method; B.Sun, et al.- Part 4.- A Cost Model for Client-Side CaaS; C.Sriwiroj, T.Banditwattanawong.- A Reliability Analysis of Cascaded TMR Systems; H.J.Yi, et al.- Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs; S.Koo, et al.- A Recovery Model for Improving Reliability of PCM WL-Reviver System; T.Roh, et al.- Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients; J.-Y.Jung, et al.- Part 5.- Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho; K.Somsuk.- Network Security Situation Assessment: A Review and Discussion; Y.B.Leau, S.Manickam.- Protecting Binary Files from Stack-Based Buffer Overflow; S.Alouneh, et al.- Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT; Y.Igarashi, et al.- Nonintrusive SSL/TLS Proxy with JSON-Based Policy; S.Mohd Jawi, et al.- Secure Problem Solving Scheme by Encrypted Computing; H.Yamaguchi, et al.- Anomaly Detection from Log Files Using Data Mining Techniques; J.Breier, J.Branisova.- Improved Remote User Trust Evaluation Scheme to apply to Social Network Services; Y.Kim, et al.- Threat assessment model for mobile malware; T.van Do, et al.- Performance Evaluation of System Resources Utilization with Sandboxing Applications; T.Helmy, et al.-Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment; Y.Sil Lee, et al.- Pseudoinverse Matrix over Finite Field and Its Applications; V.Dang, T.Nguyen.- Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks; A.Olabelurin, et al.- Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis; H.H.Kim, et al.- Exploring Bad Behaviors from Email Logs; S.Kanchanapokin, S.Boonkrong.- Using PKI to Provide Credential Delegation in non-Web-based Federations; D.Kouril, et al.- Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication; H.H.Kim, et al.- A Method for Web Security Context Patterns Development from User Interface Guidelines based on Structural and Textual Analysis; P.Singpant, N.Prompoon.- A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography; M.Salem Atoum.- Review of Digital Investigation Frameworks; R.Agarwal, S.Kothari.- Part 6.- Knowledge Discovery in Dynamic Data Using Neural Networks; E.Volna, et al.- Data Mining for Industrial System Identification: A Turning Process; K.Kandananond.- Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection using Scale Invariant Feature Transform Image Descriptor; S.Y.Kim, K.-A.Sohn.- Features extraction for classification of focal and non-focal EEG signals; K.Rai, et al.- Relations on Intuitionistic Fuzzy Soft Multi Sets; A.Mukherjee, A.Das.- Towards Automatically Retrieving Discoveries and Generating Ontologies; K.Cosh.- Improving process models discovery using AXOR Clustering Algorithm; H.Ariouat, et al.- Simple approaches of sentiment analysis via ensemble learning; T.Chalothorn, J.Ellman.- Effective Trajectory Similarity Measure for Moving Objects in Real-world Scene; M.Ra, et al.- A Prediction of Engineering Students Performance from Core Engineering Course using Classification; N.Rachburee, et al.- Evolutionary Circular-ELM for the reduced-reference assessment of perceived image quality; S.Atsawaraungsuk, P.Horata.- Enhanced Web page Cleaning for Constructing Social Media Text Corpora; M.Neunerdt, et al.- Finding Knee Solutions in Multi-objective Optimization using Extended Angle Dominance Approach; S.Sudeng, N.Wattanapongsakorn.- Affective Learning Analysis of Children in a Card Sorting Game; M.Othman, et al.- Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal; S.Thongpanja, et al.- A study of Big Data solution using Hadoop to process Connected vehicle's Diagnostics data; L.Nkenyereye, J.-W.Jang.- Wiki SaGa: an Interactive Timeline to Visualize Historical Documents; D.Tan, et al.- Discovering genomic associations on cancer datasets by applying sparse regression methods; R.R.Vangimalla, K.A.Sohn.- The Adaptive Dynamic Clustering of Neuro-Fuzzy System for Classification; P.Napook, N.Eiamkanitchat.- A Hybrid Approach of Neural Network and Level-2 Fuzzy set; J.Teyakome, N.Eiamkanitchat.- Developing Term Weighting Scheme based on  Term Occurrence Ratio for Sentiment Analysis; N.Chirawichitchai.- A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand; A.Na-udom, J.Rungrattanaubol.- Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment; G.-e.Kim, B.-w.Kim.- Vehicle Position Estimation using Tire Model; J.-w.Yoon, B.-w.Kim.- I know when you are happy - Emotion Detection; A.Singh Kilak, N.Mittal.- Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm; S.Saadah, G.Septiana Wulandari.-Classification Prediction of the Foot Disease Pattern Using Decision Tree Model; J.-K.Choi, et al.- Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem; T.Sooktip, et al.- A Combined AdaBoost and NEWFM Technique for Medical Data Classification; K.A.Abuhasel, et al.- On sentence length distribution as an authorship attribute; M.Lehtonen.- Learning models for activity recognition in smart homes; L.G.Fahad, et al.- Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm; N.O.Al Abdouli, et al.- Part 7.- Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards; J.Jaafar, et al.- Validating Reusability of Software Projects using Object-Oriented Design Metrics; Z.Che Ani, et al.- Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development; S.Ramingwong, L.Ramingwong.- Understanding of Agile Project Manager Competencies; K.Sutling, et al.- Design IP Camera for Android-Based system using the Around-View; G.-H.Kim, J.-W.Jang.- Identification of Opportunities for Move Method Refactoring Using Decision Theory; S.Boonkwan, P.Muenchaisri.- Requirements Engineering for Cloud Computing in University Using iStar Hierarchy Method; S.Sandfreni, et al.- Power Consumption Profiling Method based on Android Application Usage; H.Furusho, et al.- Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model; J.Yahaya, et al.- A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service; S.Liu, J.Chai.- An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators; A.Orenyi Bajeh, et al.- Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine; T.Choeikiwong, P.Vateekul.- Evaluation of Separated Concerns in Web-based Delivery of User Interfaces; T.Cerny, et al.- Separating out Platform-independent Particles of User Interface; T.Cerny, M.Donahoo.- Implementing Personal Software Process in Undergraduate Course to Improve  Model-View-Controller Software Construction; W.Nachiengmai, S.Ramingwong.- Part 8.- Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL; B.Hempho, et al.- An Experimental Study for Neighbor Selection in Collaborative Filtering; S.Lee.- Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance - The anoGov-PEPPOL Project; J.Martins, et al.- Analzying Developer Behevior and Community Structure In Software Crowdsourcing; H.Zhang, et al.- A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer's Algorithm and Ontology; C.Nuntawong, et al.- Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Application; D.Adianto, et al.- Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors; J.Guo, et al.- The Competition-based Information Propagation in Online Social Networks; L.Sun, et al.- e-Learning Recommender System for Teachers using Opinion Mining; A.Shanker Tewari, et al.- Part 9: ICWCIA.- Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs; M.Becker, et al.- Part 10: IWICT.- Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image; J.-W.Lee, et al.- Service Protection mechanism Using VPN GW Hiding Techniques; P.K.Park, et al.- Networking Service Availability Analysis of 2N Redundancy Model with Non-Stop Forwarding; D.-H.Kim, et al.- Property Analysis of Classifiers for Sleep Snoring Detection; T.L.Nguyen, etal.- An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs; S.Park, et al.- Part 11: IWSATA.- Road Weather Information transmission method for digital multimedia broadcasting; S.W.Lee.- Color Overlapping Method of Projection System on LEDs; Y.Chi, et al.- A System Design for Audio Level Measurement based on ITU-R BS.1770-3; S.Woon Lee, et al.- A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices; C.Ghil Kim, D.S.Park.

About the Author :
Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association. His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards.  He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is  Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).


Best Sellers


Product Details
  • ISBN-13: 9783662465776
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
  • Publisher Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Height: 235 mm
  • No of Pages: 1112
  • Returnable: Y
  • Width: 155 mm
  • ISBN-10: 3662465779
  • Publisher Date: 28 Apr 2015
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Series Title: 339 Lecture Notes in Electrical Engineering


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Science and Applications: (339 Lecture Notes in Electrical Engineering)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG -
Information Science and Applications: (339 Lecture Notes in Electrical Engineering)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Science and Applications: (339 Lecture Notes in Electrical Engineering)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!