Arama Sonuçları - internet protocol site

Şunu mu demek istediniz:

  • Gösterilen 1 - 6 sonuçlar arası kayıtlar. 6
Sonuçları Daraltın
  1. 1

    Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.
    İçindekiler: “…Internet of Things & Wireless Physical Layer Security: A Survey -- Approach Towards increasing efficiency of communication protocol in wireless sensor network using modified routing protocol -- Privacy Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion Mining on Social Network Data -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks -- Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding -- EGRP: Enhanced Geographical Routing protocol for Vehicular Adhoc Networks -- PAPR Performance Analysis of Unitary transforms in SLM-OFDM for WLAN 802.11a Mobile terminals -- Optimal Sensing Time allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network -- Data Privacy in Online Shopping -- Design and Performance of Resonant Spacing Linear Patch Array with Quarter wave transformer feed Network for Wireless Applications -- Performance analysis of PUEA and SSDF attacks in Cognitive Radio Networks -- Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 µm CMOS -- A New Iterative Hybrid Edge Technique Using Image Mosaic -- Performance of Optimized Reversible Vedic Multipliers -- Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks -- Impact of Facebook’s Check-in Feature on Users of Social Networking Sites -- A Novel Congestion Control Scheme in VANET.…”
    Full-text access
    e-Kitap
  2. 2

    Guidelines for Failure Investigation. Yazar: Investigations, Committee on Forensic

    Baskı/Yayın Bilgisi American Society of Civil Engineers, 2018.
    İçindekiler: “…Intro -- Contents -- Preface -- Contributors -- Acknowledgments -- Introduction -- Chapter 1: Functions and Responsibilities of the Forensic Engineer -- 1.1 Introduction to Forensic Engineering -- 1.2 Need for Failure Investigations -- 1.3 The Forensic Engineering Investigative Process -- 1.4 The Principal Investigator -- 1.4.1 Knowledge of the Field of Expertise -- 1.4.2 Qualities of Character -- 1.5 The Legal Environment -- 1.6 Conclusion -- Chapter 2: Investigation Planning and Coordination -- 2.1 Introduction -- 2.2 Initial Project Planning -- 2.2.1 Conflict of Interest -- 2.2.2 Preliminary Research -- 2.2.3 Scope of Work and Staffing -- 2.2.4 Site Conditions and Life Safety Issues -- 2.2.5 Budget Estimates -- 2.3 Agreement -- 2.4 Initial Document Collection and Research -- 2.5 Initial Site Visit or Investigation -- 2.5.1 Initial Site Visit Preparation and Staffing -- 2.5.2 Information Gathering -- 2.5.3 Evaluation of Investigation Scope and Client Debriefing -- Chapter 3: Data Collection -- 3.1 Introduction -- 3.2 Field Investigation -- 3.2.1 Data Collection Methods -- 3.2.2 Laser Scanning and Drone Photography -- 3.2.3 Data Sampling -- 3.2.4 Data Collection for the Small Investigation -- 3.3 Types of Data -- 3.4 Preserving and Maintaining Data -- 3.5 Data from Documents -- 3.5.1 Contract Documents -- 3.5.2 Documents During and after Construction -- 3.6 Data from Independent Investigation and Research -- 3.6.1 Weather Records -- 3.6.2 Maintenance and Repair Records -- 3.6.3 Building Department Permits, Violations, and Public Documents -- 3.6.4 Internet Search -- 3.6.5 Historical Information and Visual Documentation -- 3.6.6 Literature Search -- 3.7 Eyewitness Accounts -- 3.8 Digital Records -- Chapter 4: Development of Testing Protocol -- 4.1 Evaluating the need to perform testing -- 4.2 Applicable standards for testing.…”
    Full-text access
    e-Kitap
  3. 3

    International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 Applications and Techniques in Cyber Security and Intelligence /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System's Testing and Evaluation Methods -- NetworkSecurity Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code InjectionAttacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.…”
    Full-text access
    e-Kitap
  4. 4

    Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.
    İçindekiler: “…Bang of Social Engineering in Social Networking Sites -- Chapter 37. Internet of Things (IoT): In a Way of Smart World -- Chapter 38. …”
    Full-text access
    e-Kitap
  5. 5

    Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 1 /

    Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.
    İçindekiler: “…Use of Global Positioning System to Track Movement of Mobile Node in Proxy Mobile Internet Protocol version 6 -- Chapter 12. Is Mobile Cloud Computing Efficient for E-Learning? …”
    Full-text access
    e-Kitap
  6. 6

    Artificial Intelligence and Evolutionary Computations in Engineering Systems Proceedings of ICAIECES 2015 /

    Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.
    İçindekiler: “…Privilege Based Scoring System Against Cross Site Scripting Using Machine Learning -- Chapter 55. …”
    Full-text access
    e-Kitap