Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2

دانلود کتاب Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2

60000 تومان موجود

کتاب محاسبات هوشمند: مجموعه مقالات کنفرانس محاسبات 2018، جلد 2 نسخه زبان اصلی

دانلود کتاب محاسبات هوشمند: مجموعه مقالات کنفرانس محاسبات 2018، جلد 2 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2

نام کتاب : Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2
ویرایش : 1st ed.
عنوان ترجمه شده به فارسی : محاسبات هوشمند: مجموعه مقالات کنفرانس محاسبات 2018، جلد 2
سری : Advances in Intelligent Systems and Computing 857
نویسندگان : , ,
ناشر : Springer International Publishing
سال نشر : 2019
تعداد صفحات : 1405
ISBN (شابک) : 9783030011765 , 9783030011772
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 164 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :




این کتاب که مجموعه مقالات کنفرانس محاسباتی 2018 را گردآوری می‌کند، مجموعه‌ای قابل توجه از فصل‌ها را ارائه می‌کند که طیف وسیعی از موضوعات را در سیستم‌های هوشمند، محاسبات و کاربردهای واقعی آن‌ها پوشش می‌دهد. این کنفرانس در مجموع 568 مقاله ارسالی از محققان، دانشمندان، مهندسان صنایع و دانشجویان پیشگام از سراسر جهان را به خود جلب کرد. این موارد ارسالی تحت یک فرآیند بررسی همتایان دوسوکور قرار گرفتند. از این 568 ارسالی، 192 مقاله ارسالی (شامل 14 مقاله پوستر) برای درج در این روند انتخاب شدند. علیرغم تاریخچه نسبتاً کوتاه علوم کامپیوتر به عنوان یک رشته رسمی دانشگاهی، این علم تعدادی کمک اساسی به علم و جامعه داشته است – در واقع، همراه با الکترونیک، علم پایه گذار عصر کنونی تاریخ بشریت (عصر اطلاعات) است. ) و محرک اصلی انقلاب اطلاعات است. هدف این کنفرانس فراهم کردن بستری برای پژوهشگران برای ارائه مشارکت های اساسی و مکانی برتر برای دست اندرکاران دانشگاهی و صنعتی برای به اشتراک گذاشتن ایده های جدید و تجربیات توسعه است. این کتاب آخرین فصول را در مورد تمام جنبه های علوم کامپیوتر، از کلاسیک تا هوشمند، جمع آوری می کند. هم تئوری و هم کاربردهای جدیدترین فناوری‌ها و روش‌های کامپیوتری را پوشش می‌دهد. این کتاب با ارائه آخرین روش‌ها و تکنیک‌های هوشمند برای حل مسائل دنیای واقعی، همراه با چشم‌اندازی از تحقیقات آینده، برای خوانندگان گسترده جالب و ارزشمند خواهد بود.


فهرست مطالب :


Front Matter ....Pages i-xiv
Statistical Learning of Lattice Option Pricing and Traders’ Behavior Using Ising Spin Model for Asymmetric Information Transitions (Prabir Sen, Nang Laik Ma)....Pages 1-17
Deep Time Series Neural Networks and Fluorescence Data Stream Noise Detection (James Obert, Matthew Ferguson)....Pages 18-32
Controlled Under-Sampling with Majority Voting Ensemble Learning for Class Imbalance Problem (Riyaz Sikora, Sahil Raina)....Pages 33-39
Optimisation of Hadoop MapReduce Configuration Parameter Settings Using Genetic Algorithms (Ali Khaleel, H. S. Al-Raweshidy)....Pages 40-52
Fast Interpolation and Fourier Transform in High-Dimensional Spaces (Michael Hecht, Ivo F. Sbalzarini)....Pages 53-75
A Reconfigurable Architecture for Implementing Locally Connected Neural Arrays (J. E. G-H-Cater, C. T. Clarke, B. W. Metcalfe, P. R. Wilson)....Pages 76-92
Minimum Spanning Tree Problem with Single-Valued Trapezoidal Neutrosophic Numbers (Said Broumi, Mohamed Talea, Assia Bakali, Florentin Smarandache, Santanu Kumar Patro)....Pages 93-105
Hybrid Evolutionary Algorithm Based on PSOGA for ANFIS Designing in Prediction of No-Deposition Bed Load Sediment Transport in Sewer Pipe (Bahram Gharabaghi, Hossein Bonakdari, Isa Ebtehaj)....Pages 106-118
Extreme Learning Machines in Predicting the Velocity Distribution in Compound Narrow Channels (Hossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj)....Pages 119-128
Rice Classification Using Scale Conjugate Gradient (SCG) Backpropagation Model and Inception V3 Model (Zahida Parveen, Yumnah Hasan, Anzar Alam, Hafsa Abbas, Muhammad Umair Arif)....Pages 129-141
A Machine Learning Approach to Analyze and Reduce Features to a Significant Number for Employee’s Turn Over Prediction Model (Mirza Mohtashim Alam, Karishma Mohiuddin, Md. Kabirul Islam, Mehedi Hassan, Md. Arshad-Ul Hoque, Shaikh Muhammad Allayear)....Pages 142-159
Legal Document Retrieval Using Document Vector Embeddings and Deep Learning (Keet Sugathadasa, Buddhi Ayesha, Nisansa de Silva, Amal Shehan Perera, Vindula Jayawardana, Dimuthu Lakmal et al.)....Pages 160-175
Deep Learning Based Classification System for Identifying Weeds Using High-Resolution UAV Imagery (M. Dian Bah, Eric Dericquebourg, Adel Hafiane, Raphael Canals)....Pages 176-187
Recognition of Heart Murmur Based on Machine Learning and Visual Based Analysis of Phonocardiography (Magd Ahmed Kotb, Hesham Nabih Elmahdy, Fatma El Zahraa Mostafa, Christine William Shaker, Mohamed Ahmed Refaey, Khaled Waleed Younis Rjoob)....Pages 188-202
Activity Recognition from Multi-modal Sensor Data Using a Deep Convolutional Neural Network (Aboozar Taherkhani, Georgina Cosma, Ali A. Alani, T. M. McGinnity)....Pages 203-218
Quality Scale for Rubric Based Evaluation in Capstone Project of Computer Science (Zeeshan Haider Malik, Sabur Butt, Hanzla Sajid)....Pages 219-233
Transfer of Empirical Engineering Knowledge Under Technological Paradigm Shift (Xinyu Li, Zuhua Jiang, Yeqin Guan, Geng Li)....Pages 234-250
Role of Digital Fluency and Spatial Ability in Student Experience of Online Learning Environments (Tatiana Tchoubar, Thomas R. Sexton, Lori L. Scarlatos)....Pages 251-264
Identifying the Underlying Factors of Students’ Readiness for E-Learning in Studying English as a Foreign Language in Saudi Arabia: Students’ and Teachers’ Perspectives (Ibrahim M. Mutambik, John Lee, Yvonne Foley)....Pages 265-279
Using Cyber Competitions to Build a Cyber Security Talent Pipeline and Skilled Workforce (R. Cherinka)....Pages 280-289
Practical Security for Electronic Examinations on Students’ Devices (Bastian Küppers, Marius Politze, Richard Zameitat, Florian Kerber, Ulrik Schroeder)....Pages 290-306
Automating the Configuration Management and Assessment of Practical Outcomes in Computer Networking Laboratories (Neville Palmer, Warren Earle, Jomo Batola)....Pages 307-318
Designing the University’s Creative Environment: Structural-Functional Analysis (Alexander O. Karpov)....Pages 319-332
Birds Control in Farmland Using Swarm of UAVs: A Behavioural Model Approach (Chika O. Yinka-Banjo, Wahab A. Owolabi, Andrew O. Akala)....Pages 333-345
A Review of Path Smoothness Approaches for Non-holonomic Mobile Robots (Iram Noreen, Amna Khan, Zulfiqar Habib)....Pages 346-358
Design and Implementation of Bluetooth Controlled Painting Robot for Auto Industry (Bilal Ahmad, Ayesha Iqbal, Roshaan Saqib, Mohammad Mustafa Mirza, Atta ul Mohsin Lali)....Pages 359-367
A Survey on Trust in Autonomous Systems (Shervin Shahrdar, Luiza Menezes, Mehrdad Nojoumian)....Pages 368-386
An Energy Efficient Coverage Path Planning Approach for Mobile Robots (Amna Khan, Iram Noreen, Zulfiqar Habib)....Pages 387-397
SOAP-Based Web Service for Localization of Multi-robot System in Cloud (Tlijani Hayet, Jilani Knani)....Pages 398-410
Metrics for Real-Time Solutions Design (Khaldia Laredj, Mostefa Belarbi, Abou Elhassan Benyamina)....Pages 411-425
GGSE-Website Usability Evaluation Framework (Aiman Khan Nazir, Iqra Zafar, Asma Shaheen, Bilal Maqbool, Usman Qamar)....Pages 426-436
Measuring Application Stability Using Software Stability Assessment Technique (Bassey Asuquo Ekanem, Evans Woherem)....Pages 437-451
Automated Scenario-Based Evaluation of Embedded Software and System Architectures (Thomas Kuhn, Pablo Oliveira Antonino, Andreas Morgenstern)....Pages 452-469
Development Approaches for Mobile Applications: Comparative Analysis of Features (Lisandro Delia, Pablo Thomas, Leonardo Corbalan, Juan Fernandez Sosa, Alfonso Cuitiño, Germán Cáseres et al.)....Pages 470-484
Using Linked Data Resources to Generate Web Pages Based on a BBC Case Study (Leila Zemmouchi-Ghomari, Rania Sefsaf, Kahina Azni)....Pages 485-497
Trade-off Analysis Among Elicitation Techniques Using Simple Additive Weighting Method (Asif Ullah, Shah Nazir, Sara Shahzad)....Pages 498-514
Risk Management in Software Engineering: What Still Needs to Be Done (Tauqeer Hussain)....Pages 515-526
A Survey of Quality of Service (QoS) Protocols and Software-Defined Networks (SDN) (Ronak Al-Haddad, Erika Sanchez Velazquez)....Pages 527-545
Ambiguity Function Analysis of Frequency Diverse Array Radar Receivers (Jianbin Gao, Kwame Opuni-Boachie Obour Agyekum, Emmanuel Boateng Sifah, Qi Xia, Edward Agyemang-Duah)....Pages 546-557
WebNSM: A Novel Scalable WebRTC Signalling Mechanism for One-to-Many Bi-directional Video Conferencing (Naktal Moaid Edan, Ali Al-Sherbaz, Scott Turner)....Pages 558-568
Developing an Asynchronous Technique to Evaluate the Performance of SDN HP Aruba Switch and OVS (Ameer Mosa Al-Sadi, Ali Al-Sherbaz, James Xue, Scott Turner)....Pages 569-580
Energy Aware Cluster-Head Selection for Improving Network Life Time in Wireless Sensor Network (Faheem Khan, Toor Gul, Shujaat Ali, Abdur Rashid, Dilawar Shah, Samiullah Khan)....Pages 581-593
Small Cells Solution for Enhanced Traffic Handling in LTE-A Networks (Raid Sakat, Raed Saadoon, Maysam Abbod)....Pages 594-606
Differential Cooperative E-health System over Asymmetric Rayleigh-Weibull Fading Channels (Sara AlMaeeni)....Pages 607-616
Calculating Minimum Rotation Angle to Find Marked Geographical Locations Using Built-in Mobile Sensors (Naween Fonseka, Cassim Farook)....Pages 617-625
Performance Evaluation of Sending Location Update Packet to a Locator Identity Split Mapping Infrastructure (Avinash Mungur, Atish Foolchand, Avishan Gopaul)....Pages 626-635
Power Allocation Scheme Using PSO for Amplify and Forward Cooperative Relaying Network (Kamarul Ariffin Bin Noordin, Mhd Nour Hindia, Faizan Qamar, Kaharudin Dimyati)....Pages 636-647
Performance Evaluation of Resources Management in WebRTC for a Scalable Communication (Naktal Moaid Edan, Ali Al-Sherbaz, Scott Turner)....Pages 648-665
Barriers to Adopting Interoperability Standards for Cyber Threat Intelligence Sharing: An Exploratory Study (Nicole Gong)....Pages 666-684
qCB-MAC: QoS Aware Cluster-Based MAC Protocol for VANETs (A. F. M. Shahen Shah, Haci Ilhan, Ufuk Tureli)....Pages 685-695
Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks (Dhouha Kbaier Ben Ismail, Petros Karadimas, Gregory Epiphaniou, Haider M. Al-Khateeb)....Pages 696-704
Enumeration and Applications of Spanning Trees in Book Networks with Common Path (Raihana Mokhlissi, Dounia Lotfi, Joyati Debnath, Mohamed El Marraki)....Pages 705-718
Digital Chunk Processing with Orthogonal GFDM Doubles Wireless Channel Capacity (Mohammad R. Kadhum, Triantafyllos Kanakis, Ali Al-Sherbaz, Robin Crockett)....Pages 719-731
Model of Maturity of Communication Processes in Human Capital Management in an Organisation (Andrzej Sołtysik)....Pages 732-750
PD Controller for Resilient Packet Ring Networks (Fahd Alharbi)....Pages 751-763
Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (Saadullah Farooq Abbasi, Jawad Ahmad, Jan Sher Khan, Muazzam A. Khan, Shehzad Amin Sheikh)....Pages 764-773
Behavior of Organizational Agents on Managing Information Technology (Mark van der Pas, Rita Walczuch)....Pages 774-788
Expanded Algorithm for Inertial Navigation (P. M. Aksonenko, V. V. Avrutov, Yu. F. Lazarev, P. Henaff, L. Ciarletta)....Pages 789-800
In-Body Antenna for Wireless Capsule Endoscopy at MICS Band (Md. Rasedul Islam, Raja Rashidul Hasan, Md. Anamul Haque, Shamim Ahmad, Khondaker Abdul Mazed, Md. Rafikul Islam)....Pages 801-810
Classification and Analyses of Tendencies of Prior Published Research Studies on Unmanned Aerial Vehicles (Il-Kyu Ha)....Pages 811-822
Interference and Channel Quality Based Channel Assignment for Cognitive Radio Networks (Manish Wadhwa, Komalpreet Kaur)....Pages 823-833
Super Adaptive Routing Protocol for Mobile Ad Hoc Networks (Firas Sabah Al-Turaihi, Hamed S. Al-Raweshidy)....Pages 834-848
Multi-hop Hierarchical Routing Based on the Node Health Status in Wireless Sensor Network (A. Anhar, R. Nilavalan)....Pages 849-859
TCP-MAC Cross Layer Integration for Xor Network Coding (Khaled Alferaidi, Robert Piechocki)....Pages 860-875
Rotating Signal Point Shape Code (Janak Sodha)....Pages 876-880
Measuring the Effectiveness of TCP Technique for Event Sequence Test Cases (Johanna Ahmad, Salmi Baharom, Abdul Azim Abd Ghani, Hazura Zulzalil, Jamilah Din)....Pages 881-897
Ternary Computing to Strengthen Cybersecurity (Bertrand Cambou, Donald Telesca)....Pages 898-919
A Novel Spatial Domain Semi-fragile Steganography Algorithm and Authentication Method (Nikolaos G. Bakaoukas, Anastasios G. Bakaoukas)....Pages 920-950
Towards Personalised, DNA Signature Derived Music via the Short Tandem Repeats (STR) (Tirthankar Paul, Seppo Vainio, Juha Roning)....Pages 951-964
SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks (K. P. A. P. Pathirana, L. R. M. O. Lankarathne, N. H. A. D. A. Hangawaththa, K. Y. Abeywardena, N. Kuruwitaarachchi)....Pages 965-976
A Light Weight Cryptographic Solution for 6LoWPAN Protocol Stack (Sushil Khairnar, Gaurav Bansod, Vijay Dahiphale)....Pages 977-994
Forensics Data Recovery of Skype Communication from Physical Memory (Ahmad Ghafarian, Charlie Wood)....Pages 995-1009
Looking Through Your Smartphone Screen to Steal Your Pin Using a 3D Camera (Diksha Shukla, Vir V. Phoha, Saurav Prakash)....Pages 1010-1020
Cyber Physical Security Protection in Online Authentication Mechanisms for Banking Systems (Ahmed Yousuf Jama, Tansal Güçlüoğlu, Maheyzah Md Siraj)....Pages 1021-1031
The Impact of Social Networks on Students’ Electronic Privacy in Saudi Arabia Society (Nabih T. Abdelmajeed)....Pages 1032-1041
Comparison of Different Types of ANNs for Identification of Vulnerable Web Components (Mahmoud O. Elish)....Pages 1042-1055
E-Secure: An Automated Behavior Based Malware Detection System for Corporate E-Mail Traffic (K. Thebeyanthan, M. Achsuthan, S. Ashok, P. Vaikunthan, A. N. Senaratne, K. Y. Abeywardena)....Pages 1056-1071
An Intelligent Path Towards Fast and Accurate Attribution (Jim Q. Chen)....Pages 1072-1082
Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems (Teresa Nicole Brooks)....Pages 1083-1102
Managing Privacy Through Key Performance Indicators When Photos and Videos Are Shared via Social Media (Srinivas Madhisetty, Mary-Anne Williams)....Pages 1103-1117
Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm (M. Nojoumian, A. Golchubian, L. Njilla, K. Kwiat, C. Kamhoua)....Pages 1118-1134
A BI Solution to Identify Vulnerabilities and Detect Real-Time Cyber-Attacks for an Academic CSIRT (Francsico Reyes, Walter Fuertes, Freddy Tapia, Theofilos Toulkeridis, Hernán Aules, Ernesto Pérez)....Pages 1135-1153
Security Metrics for Ethical Hacking (Reem Al-Shiha, Sharifa Alghowinem)....Pages 1154-1165
Spanning Tree Protocol for Preventing Loops and Saving Energy in Software Defined Networks Along with Its Vulnerability and Threat Analyses (Aleena Rehman, Farhan A. Siddiqui, Jibran R. Khan, Muhammad Saeed)....Pages 1166-1180
Simulations for Deep Random Secrecy Protocol (Thibault de Valroger)....Pages 1181-1195
PREDECI Model: An Implementation Guide (Fernando Molina-Granja, Glen D. Rodríguez Rafael, Washington Luna, Raúl Lozada-Yanez, Fabián Vásconez, Juan Santillan-Lima et al.)....Pages 1196-1211
SAHCE: Strong Authentication Within the Hybrid Cloud Environment (Belbergui Chaimaa, Elkamoun Najib, Hilal Rachid)....Pages 1212-1230
A Blockchain-Based Decentralized System for Proper Handling of Temporary Employment Contracts (Andrea Pinna, Simona Ibba)....Pages 1231-1243
Poster: Password Input Method Using Simple Device (Reina Momose, Manabu Okamoto, Miyu Shibata)....Pages 1244-1252
Detection of Prolonged Stress in Smart Office (Elena Vildjiounaite, Ville Huotari, Johanna Kallio, Vesa Kyllönen, Satu-Marja Mäkelä, Georgy Gimel’farb)....Pages 1253-1261
An Efficient NTRU-Based Authentication Protocol in IoT Environment (SeongHa Jeong, KiSung Park, YoHan Park, YoungHo Park)....Pages 1262-1268
Pain Evaluation Using Analgesia Nociception Index During Surgical Operation (Jiann-Shing Shieh, Bhekumuzi Mathunjwa, Muammar Sadrawi, Maysam F. Abbod)....Pages 1269-1277
Automated Inner Limiting Membrane Segmentation in OCT Retinal Images for Glaucoma Detection (Aneeqa Ramzan, M. Usman Akram, Javeria Ramzan, Qurat-ul-Ain Mubarak, Anum Abdul Salam, Ubaid Ullah Yasin)....Pages 1278-1291
Kernel Matrix Regularization via Shrinkage Estimation (Tomer Lancewicki)....Pages 1292-1305
Single Image Based Random-Value Impulse Noise Level Estimation Algorithm (Long Bao, Karen Panetta, Sos Agaian)....Pages 1306-1318
Hybrid Vehicular Network System for the Malfunctioned Vehicles Over Highways (Weam Gahsim Mergani, Abo-Obyida Mohammed Alahssen, L. M. Ahmed, M. F. L. Abdullah)....Pages 1319-1327
International Cyber Attackers Eyeing Eastern India: Odisha - A Case Study (Bhaswati Sahoo, Rabindra Narayan Behera, Sanghamitra Mohanty)....Pages 1328-1339
Computer Graphics Based Approach as an Aid to Analyze Mechanics of the Replaced Knee (Ahmed Imran)....Pages 1340-1345
Efficient Set-Bit Driven Shift-Add Binary Multiplier (Alvernon Walker, Evelyn Sowells-Boone)....Pages 1346-1350
Estimation of Stress Condition of Children by Nasal Skin Temperature (Madoka Suzuki, Tomoaki Ohtsuki)....Pages 1351-1358
Private Collaborative Business Benchmarking in the Cloud (Somayeh Sobati-Moghadam, Amjad Fayoumi)....Pages 1359-1365
Mobile Phone Operations Just by Sight and Its Applications (Kohei Arai)....Pages 1366-1374
Music4D: Audio Solution for Virtual Reality (Shu-Nung Yao, Cheng-Yuan Yu)....Pages 1375-1379
c3d.io: Enabling STEAM (Science, Technology, Engineering, Arts, Mathematics) Education with Virtual Reality (Jason Madar)....Pages 1380-1386
Back Matter ....Pages 1387-1390

توضیحاتی در مورد کتاب به زبان اصلی :


This book, gathering the Proceedings of the 2018 Computing Conference, offers a remarkable collection of chapters covering a wide range of topics in intelligent systems, computing and their real-world applications. The Conference attracted a total of 568 submissions from pioneering researchers, scientists, industrial engineers, and students from all around the world. These submissions underwent a double-blind peer review process. Of those 568 submissions, 192 submissions (including 14 poster papers) were selected for inclusion in these proceedings. Despite computer science’s comparatively brief history as a formal academic discipline, it has made a number of fundamental contributions to science and society—in fact, along with electronics, it is a founding science of the current epoch of human history (‘the Information Age’) and a main driver of the Information Revolution. The goal of this conference is to provide a platform for researchers to present fundamental contributions, and to be a premier venue for academic and industry practitioners to share new ideas and development experiences. This book collects state of the art chapters on all aspects of Computer Science, from classical to intelligent. It covers both the theory and applications of the latest computer technologies and methodologies. Providing the state of the art in intelligent methods and techniques for solving real-world problems, along with a vision of future research, the book will be interesting and valuable for a broad readership.




پست ها تصادفی