Search Results - Computer networks Security measures Web _ development.
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 14
- Computational intelligence 14
- Artificial Intelligence 8
- Artificial intelligence 8
- Data Mining and Knowledge Discovery 7
- Data mining 7
- Communications Engineering, Networks 5
- Telecommunication 5
- Control engineering 3
- Management 3
- Signal processing 3
- Signal, Speech and Image Processing 3
- Automation 2
- Computer-Aided Engineering (CAD, CAE) and Design 2
- Computer-aided engineering 2
- Control and Systems Theory 2
- Control, Robotics, Automation 2
- Data and Information Security 2
- Data protection 2
- Innovation and Technology Management 2
- Robotics 2
- Technological innovations 2
- Algorithms 1
- Application software 1
- Applied Dynamical Systems 1
- Bilgisayar ağları 1
- Bioinformatics 1
- Biomedical Engineering and Bioengineering 1
- Biomedical engineering 1
- Biotechnology 1
Search alternatives:
- measures »
-
1
-
2
Recent Developments in Intelligent Computing, Communication and Devices Proceedings of ICCD 2017 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Full-text access
e-Book -
3
Proceedings of International Conference on Communication and Networks ComNet 2016 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…Chapter 1. A Novice Approach for Web Application Security -- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R' -- Chapter 3. …”
Full-text access
e-Book -
4
Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 1 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Table of Contents: “…AXSM : An Automated Tool for XML Schema Matching -- Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data -- Chapter 34. …”
Full-text access
e-Book -
5
Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 1 /
Published Springer India : Imprint: Springer, 2016.Full-text access
e-Book -
6
Advances in Intelligent Networking and Collaborative Systems The 10th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018) /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
7
Recent Developments and the New Direction in Soft-Computing Foundations and Applications Selected Papers from the 6th World Conference on Soft Computing, May 22-25, 2016, Berkeley,...
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
8
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 Applications and Techniques in Cyber Security and Intelligence /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System's Testing and Evaluation Methods -- NetworkSecurity Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code InjectionAttacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.…”
Full-text access
e-Book -
9
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Table of Contents: “…Uniqueness in User Behavior while Using the Web -- Chapter 25. Prediction of ERP Outcome Measurement and User Satisfaction by using Adaptive Neuro Fuzzy Inference System and SVM Classifiers Approach -- Chapter 26. …”
Full-text access
e-Book -
10
Information Technology - New Generations 15th International Conference on Information Technology /
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
Full-text access
e-Book -
11
Computer and Information Science 2015
Published Springer International Publishing : Imprint: Springer, 2016.Full-text access
e-Book -
12
Proceedings of the International Conference on Soft Computing Systems ICSCS 2015, Volume 2 /
Published Springer India : Imprint: Springer, 2016.Full-text access
e-Book -
13
Artificial Intelligence and Evolutionary Computations in Engineering Systems Proceedings of ICAIECES 2015 /
Published Springer India : Imprint: Springer, 2016.Table of Contents: “…Communication Network of Wide Area Measurement System for Real Time Data Collection on Smart Micro Grid -- Chapter 16. …”
Full-text access
e-Book -
14
Advances in Informatics and Computing in Civil and Construction Engineering Proceedings of the 35th CIB W78 2018 Conference: IT in Design, Construction, and Management /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Cyber-Physical-Systems -- Comparison Between Current Methods of Indoor Network Analysis for Emergency Response Through BIM-GIS Integration -- Instrumentation and Data Collection Methodology to Enhance Productivity in Construction Sites Using Embedded Systems and IoT Technologies -- A cyber-physical middleware platform for buildings in smart cities -- A Framework for CPS-based Real-time Mobile Crane Operations -- Drive towards real-time reasoning of building performance: Development of a live, cloud-based system -- Bayesian Network Modeling of Airport Runway Incursion Occurring Processes for Predictive Accident Control -- A Low Cost System For Monitoring Tower Crane Productivity Cycles Combining Inertial Measurement Units, Load Cells and Lora Networks -- The interface of a BIM-IoT prototype for Energy Consumption Monitoring -- Predicting Energy Consumption of Office Buildings: A Hybrid Machine Learning-Based Approach -- Part 6.…”
Full-text access
e-Book -
15
Proceedings of Fifth International Conference on Soft Computing for Problem Solving SocProS 2015, Volume 2 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Full-text access
e-Book -
16
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. …”
Full-text access
e-Book -
17
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB)
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…A Trio Approach Satisfying CIA Triad for Medical Image Security -- Chapter 20. A Novel Hybrid Method for Time Series Forecasting Using Soft Computing Approach -- Chapter 21. …”
Full-text access
e-Book -
18
Intelligent Interactive Multimedia Systems and Services 2016
Published Springer International Publishing : Imprint: Springer, 2016.Table of Contents: “…Analysis of Similarity Measurements in CBIR Using Clustered Tamura Features For Biomedical Images -- 2-Stripes Block-Circulant LDPC Codes for Single Bursts Correction -- Data Dictionary Extraction for Robust Emergency Detection -- SmartCARE - An ICT Platform in the Domain of Stroke Pathology To Manage Rehabilitation Treatment and Telemonitoring at Home -- Optimal Design of IPsec-based Mobile Virtual Private Networks for Secure Transfer of Multimedia Data -- Malicious Event Detecting in Twitter Communities -- Adopting Decision Tree Based Policy Enforcement Mechanism to Protect Reconfigurable Devices -- Arabic Named Entity Recognition: A Survey and Analysis -- Exploitation of Web Resources Towards Increased Conversions and Effectiveness -- How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs -- Fast Salient Object Detection in Non-Stationary Video Sequences Based on Spatial Saliency Maps -- Global Motion Estimation Using Saliency Maps in Non-Stationary Videos with Static Scenes -- SVM-Based Cancer Grading from Histopathological Images using Morphological and Topological Features of Glands and Nuclei.…”
Full-text access
e-Book -
19
Transactions on Engineering Technologies 25th World Congress on Engineering (WCE 2017) /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…AN INTRA-VEHICULAR WIRELESS SENSOR NETWORK BASED ON ANDROID MOBILE DEVICES AND BLUETOOTH LOW ENERGY -- 24. …”
Full-text access
e-Book -
20
Big Data Analytics Proceedings of CSI 2015 /
Published Springer Nature Singapore : Imprint: Springer, 2018.Full-text access
e-Book