Information Technology - New Generations 15th International Conference on Information Technology /
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mini...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Σειρά: | Advances in Intelligent Systems and Computing,
738 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Part I Cybersecurity
- Safeguarding Personal Health Information: Case Study
- Cybersecurity as People Powered Perpetual Innovation
- Performance Study of the Impact of Security on 802.11ac Networks
- Training Neural Tensor Networks with the Never Ending Language Learner
- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework
- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan
- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network
- A Virtual Animated Commentator Architecture for Cybersecurity Competitions
- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features
- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)
- A Self Proxy Signature Scheme over NTRU Lattices
- Towards an Ontology of Security Assessment: a core model proposal
- Integration of Mobile Forensic Tool Capabilities
- Deep Packet Inspection: A Key Issue for Network Security
- What Petya/NotPetya Ransomware is and What its Remidiations are
- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform
- New Techniques for Public Key Encryption with Sender Recovery
- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa
- Protecting Personal Data with Blockchain Technology
- The Role of CAE-CDE in Cybersecurity Education for Workforce Development
- Software Optimizations for DES
- Part II Networking and Wireless Communications
- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment
- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks
- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges
- A Dual canister medicine IoT Dispenser
- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks
- Denial of service attacks in wireless sensor networks with proposed countermeasures
- Part III Education and Technology
- Internet-Based Education: A New Milestone for Formal Language and Automata Courses
- Teaching Communication Management in Software Projects through Serious Educational Games
- Gamification applied in the teaching of agile Scrum methodology
- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework
- Part IV Agile Software Testing and Development
- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects
- Alignment of Requirements and Testing in Agile: an Industrial Experience
- Health Care Information Systems: A Crisis Approach
- Using Correct-by-Construction Software Agile Development
- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services
- Improving Agile Software Development with Domain Ontologies
- A Stratified Sampling Algorithm for Artificial Neural Networks
- Part V Data Mining/Machine Learning
- Mining ENADE Data from the Ulbra Network Institution
- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise
- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets
- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series
- DeRis: Information system supporting the prediction of default risk in companies
- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm
- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics
- A model for hour-wise prediction of mobile device energy availability
- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model
- A Traffic Light Recognition Device
- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment
- Reproducible Research in Document Analysis and Recognition
- Music Genre Classification using Data Mining and Machine Learning
- Improving word representations using Paraphrase dataset
- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions
- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning
- Business Intelligence Dashboard Application for Insurance Cross Selling
- Speech Features Analysis for Tone Language Speaker Discrimination Systems
- Selection of Transformations of Continuous Predictors in Logistic Regression
- Part VI Software Engineering
- A Generic Approach to Efficiently Parallelize Legacy Sequential Software
- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications
- A Timed Petri Net Model to Specify Scenarios of Video Games
- Survey of Biometric Techniques for Automotive Applications
- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations
- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application
- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules
- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games
- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies
- Increasing the prediction quality of software defective modules with automatic feature engineering
- Part VII High Performance Computing Architectures
- NSF Noyce Recruitment and Mentorship
- Mining Associations between Two Categories using Unstructured Text Data in Cloud
- A Note on Computational Science Curriculum
- Development of a Local Cloud-Based Bioinformatics Architecture
- Part VIII Computer Vision, Image Processing/Analysis
- A Computer Vision Based Algorithm for Obstacle Avoidance
- The ST-Vis tool for SpatioTemporal Visualization
- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima
- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network
- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation
- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries
- Part IX Health, Bioinformatics, Pattern Detection and Optimization
- Benefits of Establishing Makerspaces in Distributed Development Environment
- Semantic Description of Healthcare Devices to Enable Data Integration
- Applying transfer learning to QSAR regression models
- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine
- A Complete Diabetes Management and Care System
- On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring
- Part X Potpourri
- Smart Lighting Controlling System: Case Study of Yarmouk University Museum
- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation
- Degree Aware Triangulation of Annular Regions
- Heuristic Approaches for the Open-Shop Scheduling Problem
- Continuous State Power-down Systems for Renewable Energy Management
- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems
- Part XI Short Papers
- Customer services management and satisfaction of Internet-related banking of First National Bank
- BIG IoT - Interconnecting IoT Platforms from different domains - First success story
- Cross-Cultural Perspective of E-Commerce
- Website Usability Requirements: Through the Lens of Individual's Perception
- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems
- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise
- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly
- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company
- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review
- Operating System Security
- Management and Ease of Implementation (Passwords, Firewalls and Antivirus)
- Method of Processing Big Data
- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan
- Modified Human Code for Bandwidth Optimization through Lossless Compression
- Index.