Pattern analysis, intelligent security and the internet of things. ([2015])
- Record Type:
- Book
- Title:
- Pattern analysis, intelligent security and the internet of things. ([2015])
- Main Title:
- Pattern analysis, intelligent security and the internet of things
- Further Information:
- Note: Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo, editors.
- Editors:
- Abraham, Ajith, 1968-
Muda, Azah Kamilah
Choo, Yun-Huoy - Other Names:
- World Congress on Information and Communication Technologies, 4th
- Contents:
- Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph. D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- SocialBridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph. D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins. … (more)
- Publisher Details:
- Cham New York : Springer
- Publication Date:
- 2015
- Copyright Date:
- 2015
- Extent:
- 1 online resource (x, 359 pages), illustrations (some color)
- Subjects:
- 004
Engineering
Computer science -- Congresses
Computer security -- Congresses
Big data -- Congresses
Internet of things -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Big data
Computer science
Computer security
Internet of things
Engineering
Computational Intelligence
Complexity
Artificial Intelligence (incl. Robotics)
Technology & Engineering -- General
Computers -- Intelligence (AI) & Semantics
Cybernetics & systems theory
Artificial intelligence
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319173986
3319173987
3319173979
9783319173979 - Related ISBNs:
- 9783319173979
- Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (SpringerLink, viewed June 24, 2015). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.369786
- Ingest File:
- 01_354.xml