Arama Sonuçları - Management Information series.

Sonuçları Daraltın
  1. 1

    Industry 4.0: Managing The Digital Transformation Yazar: Ustundag, Alp, Cevikcan, Emre

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  2. 2

    Time Series Analysis Methods and Applications for Flight Data Yazar: Zhang, Jianye, Zhang, Peng

    Baskı/Yayın Bilgisi Springer Berlin Heidelberg : Imprint: Springer, 2017.
    Full-text access
    e-Kitap
  3. 3

    Information and Decision Sciences Proceedings of the 6th International Conference on FICTA /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  4. 4

    Teknolojiyi stratejiyle bağdaştırmak/

    Baskı/Yayın Bilgisi MESS yayınları, 2012.
    Kitap
  5. 5

    Business Models and ICT Technologies for the Fashion Supply Chain Proceedings of IT4Fashion 2017 and IT4Fashion 2018 /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  6. 6

    Data warehouse project management / Yazar: Adelman, Sid

    Baskı/Yayın Bilgisi Addison-Wesley, 2000.
    Kitap
  7. 7

    Information Technology - New Generations 15th International Conference on Information Technology /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    İçindekiler: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    e-Kitap
  8. 8

    Business Models and ICT Technologies for the Fashion Supply Chain Proceedings of IT4Fashion 2016 /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    Full-text access
    e-Kitap
  9. 9

    Imprecision and Uncertainty in Information Representation and Processing New Tools Based on Intuitionistic Fuzzy Sets and Generalized Nets /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2016.
    Full-text access
    e-Kitap
  10. 10

    Social Manufacturing: Fundamentals and Applications Yazar: Jiang, Pingyu

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  11. 11

    Public value management, measurement and reporting

    Baskı/Yayın Bilgisi Emerald, 2014.
    Full-text access
    e-Kitap
  12. 12

    Industrial Internet of Things Cybermanufacturing Systems /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    Full-text access
    e-Kitap
  13. 13

    Recent Developments in Data Science and Intelligent Analysis of Information Proceedings of the XVIII International Conference on Data Science and Intelligent Analysis of Informatio...

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  14. 14

    Proceedings of the 5th China High Resolution Earth Observation Conference (CHREOC 2018)

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  15. 15

    Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    Full-text access
    e-Kitap
  16. 16

    Wireless World in 2050 and Beyond: A Window into the Future!

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2016.
    Full-text access
    e-Kitap
  17. 17

    Highlighting the Importance of Big Data Management and Analysis for Various Applications

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    İçindekiler: “…Extracting Relevant Information from Big Data to Anticipate Forced Migration -- Chapter 7. …”
    Full-text access
    e-Kitap
  18. 18

    Proceedings of the 7th International Conference on Emerging Databases Technologies, Applications, and Theory /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  19. 19

    Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  20. 20

    Proceedings of the Third International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'18) Volume 2 /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Computer-Aided Event Tree Synthesis on the Basis of Case-Based Reasoning -- Security of Information Processes in Supply Chains -- External consistency maintenance algorithm for chain and stellate structures of algebraic Bayesian networks: statistical experiments for running time analysis -- Perspectives of Fast Clustering Techniques -- Impact of Security Aspects at the IOTA protocol -- Cryptographic Protocol Security Verification Of The Electronic Voting System Based On Blinded Intermediaries -- Learning Bayesian Network Structure for Risky Behavior Modelling -- On continuous user authentication via hidden free-text based monitoring -- Synthesis and Learning of Socially Significant Behavior Model with Hidden Variables -- Adaptation of the nonlinear stochastic filter on the basis of irregular exact measurements -- Visual analysis of information dissemination channels in social network for protection against inappropriate content -- The problem of the anomaly detection in time series collections for dynamic objects -- Prediction and Detection of User Emotions Based on Neuro-Fuzzy Neural Networks in Social Networks -- Deep Learning in Vehicle Pose Recognition on Two-Dimensional Images -- Feature extraction of high-frequency patterns with the a priori unknown parameters in noised electrograms using spectral entropy -- Results of using neural networks to automatically creation musical compositions based on color image -- Intelligent integrated system for computer-aided design and complex technical objects' training -- Methods of Conceptual Modeling of Intelligent Decision Support Systems for Managing Complex Objects at All Stages of Its Life Cycle -- About the integration of learning and decision-making models in intelligent systems of real-time -- Intelligent planning and control of integrated expert system construction.…”
    Full-text access
    e-Kitap