libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

park james j. (jong hyuk) (curatore); chao han-chieh (curatore); arabnia hamid (curatore); yen neil y. (curatore) - advanced multimedia and ubiquitous engineering

Advanced Multimedia and Ubiquitous Engineering Future Information Technology Volume 2

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
216,98 €
NICEPRICE
206,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 07/2015
Edizione: 1st ed. 2016





Trama

This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas.

Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions. 





Sommario

The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secure Navigational Networks; Kwangil Lee, MoonSub Song.- A Design and Implementation of lightweight ENC for Android App; Moonsub Song, et al.- Study of Censorship in Named Data Networking; Xingmin Cui, et al.- Research on Design of LTE-based High-Speed Railway Networks in Korea: Current and emerging issues; Jin-Kyu Choi, et al.- Alternative way to manage the research documents; Jeong Ah Kim, et al.- R&D Project Management using Context in Document: Research Descriptor; Jong-Won Ko, et al.- Research Descriptor based Project Management Approach for R&D Projects; Jong-Won Ko, et al.- Attributes for Characterizing Java Methods; Illo Lee, et al.- A study on Real Time Circular Motion in Robots using Kalman Filters; Malrey Lee, et al.- A Study on Traceability Between Documents of a Software R&D Project; Suntae Kim, et al.- Path Planning for Avoiding Obstacles for Unmanned Ground Vehicles; Gyoungeun Kim, et al.- Improved AEB Performance at Intersections with Diverse Road Surface Conditions Based on V2V Communication; Sangduck Jeon, et al.- Integrated Information Retrieval for Distributed Heterogeneous Ontology System; Sang-Won Hwang, et al.- hFractal: A Cloud-assisted Simulator of Virtual Plants for Digital Agriculture; Fei Hao, et al.- Proposal and Validation of AEB System Algorithm for Various Slope Environments; Ming Lin, et al.- A Study on the Performance Analysis of a V2V-Communication-Based Autonomous Emergency Braking System for High-Speed Driving under Various Road Surface Conditions; Hyeonggeun Mun, Byeongwoo Kim.- Implementation of power off recovery scheme for block mapping FTL; Ji-Hwan Chung, Tae-Sun Chung.- PLC Monitoring and Protection for SCADA Framework; Ahmed AlShemeili, et al.- Modeling Of Smart Supply Chain For Sustainability; Kyeongrim Ahn, et al.- Human Action Classification Using Multidimensional Functional Data Analysis Method; Wanhyun Cho, et al.- Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments; Sung-Wook Park, Im-Yeong Lee.- Model of CPU-intensive Applications in Cloud Computing; Junjie Peng, et al.- A Study of Effects of UTAUT-Based Factors on Acceptance of Smart Health Care Services; Yoo-Jin Moon , Young-Ho Hwang.- Detection and recognition of road markings for advanced driver assistance system; JongBae Kim.- Color and depth image correspondence for Kinect v2; Changhee Kim, et al.- Equivalent Test Model of Wireless Optical Communication System for Automotive Environment; Sangyub Lee, et al.- Feasibility Study of Non-linear Apodization for IVUS B-mode Imaging; Jin Ho Sung, et al.- An Empirial Study of Impacts of User Intention for Smart Wearable Devieces and Use Behavior; Yoojin Moon, et al.- Lightweight Context-aware Activity Recognition; Byung Gill Go, et al.- Efficient Sliding Window Join in Data Stream Processing; Hyeon Gyu Kim.- The Effect of the User Interface Design of Smartphone Applications on Users’ Individual Experiences of Performance; Wonjin Jung.- Data Hiding for H.264/AVC Based on the Motion Vector of 16 Grids; Cheng-Hsing Yang, et al.- Idle-Time Processing in Time-Slide Window; Join               Hyeon Gyu Kim.- A Large-scale Object-based Active Storage Platform for Data Analytics in the Internet of Things; Quanqing Xu, et al.- Concurrent Regeneration Code with Local Reconstruction in Distributed Storage Systems; Quanqing Xu, et al.- A Technique for Streaming Multiple Video Parts in Parallel Based on Dash.js; Jo Yew Tham.- Prioritized Medical Image Forwarding over DTN in a Volcano Disaster; Muhammad Ashar, et al.- A Framework of Personal Data Analytics for Well-Being Oriented Life Support; Seiji Kasuya, et al.- Secure Initial Attach based on Challenge-Response Method in LTE Conforming to LTE Standards; Jungho Kang.- A Design and Development of Secure-Coding Check System Based on CVE and CWE; Hyungjoo Kim, Moonseog Jun.- Lightweight Encryption Technique for Content Security in Open IPTV Environment; Jaewoo Kim, et al.- Lightweight mutual authentication routing protocols design based on LEACH in sensor network environment; Jaeseung Lee, et al.- Method research for safe authentication in cloud environment; Jaeseung Lee, et al.- A Design of Dual Encryption Based On Data Obfuscation and Mutual Authentication in the Smart-Grid Environment; Wonkyu Choi, et al.- A Study on Realtime Detecting Smishing on Cloud Computing Environments; Ayoung Lee, et al.- Application of Data Mining for Crime Analysis; Aziz Nasridinov, et al.- Graph-based Motor Primitive Generation Method of UAVs based on Demonstration-based Learning; The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Ahmed Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secu




Autore

Professor James J. (Jong Hyuk) Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea.

Professor Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering. He also serves as the Dean of the College of Electrical Engineering & Computer Science for National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education on September 2009 as well.

Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. Arabnia is currently a Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, supercomputing, Big Data Analytics and applications in medical imaging, knowledge engineering, security and surveillance systems and other computational intensive problems.

Professor Neil Y. Yen received doctorates in Human Sciences at Waseda University, Japan, and in Engineering at Tamkang University, Taiwan in 2012. His doctorate in Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. He joins The University of Aizu, Japan as an associate professor since April 2012.











Altre Informazioni

ISBN:

9783662478943

Condizione: Nuovo
Collana: Lecture Notes in Electrical Engineering
Dimensioni: 235 x 155 mm Ø 969 gr
Formato: Copertina rigida
Illustration Notes:XXVI, 513 p. 233 illus.
Pagine Arabe: 513
Pagine Romane: xxvi


Dicono di noi