Limit search to available items
Book Cover
E-book
Author International Conference on Computer Science and Its Applications (5th : 2013 : Đà Nã̆ng, Vietnam)

Title Advanced in Computer Science and Its Applications : CSA 2013 / Mohammad S. Obaidat ; edited by Hwa Young Jeong, Neil Y. Yen, James J. (Jong Hyuk) Park, Editors
Published Heidelberg : Springer, 2014

Copies

Description 1 online resource (xliv, 1456 pages) : illustrations
Series Lecture Notes in Electrical Engineering, 1876-1100 ; volume 279
Lecture notes in electrical engineering ; v. 279. 1876-1100
Contents Fast Mode Decision Algorithm Based on Adaptive Search Direction for Combined Scalability in Scalable Video Coding -- Monitoring and Automatic Control for Heating System of the Plant -- Distributed Sensor-Driven Web Applications through Multi-device Usage Patterns -- Touch Logger Resistant Mobile Authentication Scheme Using Multimodal Sensors -- Commodity Recommendation Algorithm Based on Social Network -- A Layered View Model of Social Experience Design: Beyond Single-User User Experience -- A New Schedule Strategy of Embedded Multi-core SoC -- A Power-Aware Scheduler Exploiting All Slacks under EDF Scheduling -- Network-Threatening Element Extraction and Quantification Framework -- Document Clustering Based on a Weighted Exponential Measurement -- A Robust Feature Selection Method for Classification of Cognitive States with fMRI Data -- Adaptive Networking for Continuous and Reliable Data Delivery in Wireless Sensor Networks -- Model Transformation for Cyber Physical Systems -- Load Balancing Improvement Methods in Video Conferencing Based on H.323 Standard -- A Combination of Clonal Selection Algorithm and Artificial Neural Networks for Virus Detection -- Muti-dimensional Architecture Modeling for Cyber Physical Systems -- An Algorithm of Group Scheduling with Void Filling in OBS Core Nodes -- A Fast TRW Algorithm Using Binary Pattern -- Efficient Descriptor-Filtering Algorithm for Speeded Up Robust Features Matching -- Towards Effective 3D Model Management on Hadoop -- Double Hot/Cold Clustering for Solid State Drives -- A Case Study for Cyber Physical System with Hybrid Relation Calculus -- Optimizing Functional Link Neural Network Learning Using Modified Bee Colony on Multi-class Classifications -- Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform -- A Dual Approach of GeneralMatch in Time-Series Subsequence Matching -- An Approximate Multi-step k -NN Search in Time-Series Databases
The Role of Graph Theory in Solving Euclidean Shortest Path Problems in 2D and 3D -- Illumination-Robust Local Pattern Descriptor for Face Recognition -- MAP: An Optimized Energy-Efficient Cluster Header Selection Technique for Wireless Sensor Networks -- MRP-NEP: A Non-Equal-Probability Multicast Routing Protocol for Target Tracking in Wireless Sensor Networks -- Predicting Osteoporosis by Analyzing Fracture Risk Factors and Trabecular Microarchitectures of the Proximal Femur from DXA Images -- Malicious Web Page Detection: A Machine Learning Approach -- Proposal for Virtual Web Browser by Using HTML5 -- Design and Implementation of Task Context-Aware E-mail Platform for Collaborative Tasks -- Empirical Analysis on the Users' Reply Behaviors of Online Forums -- On Companding Transform Techniques for OFDM Visible Light Communication over Indoor Dispersive Channels -- Head Pose Estimation Based on Random Forests with Binary Pattern Run Length Matrix -- Triggers That Increase Co-Creation Risks: A Consumer Perspective -- A New Lightweight Protection Method against Impersonation Attack on SIP -- Measuring Syntactic Sugar Usage in Programming Languages: An Empirical Study of C♯ and Java Projects -- Log Pre-processor for Security Visualization -- Fast Coding Unit (CU) Depth Decision Algorithm for High Efficiency Video Coding (HEVC) -- A Study on Using OWC with Battery Storage for Providing Power to Sensor Nodes in a Fish Farm -- Location-Based Intelligent Robot Management Service Model Using RGPSi with AoA for Vertical Farm -- Design and Implementation of Intelligent Video Surveillance System Using Dual Cameras -- Context-Aware Control Service Model Based on Ontology for Greenhouse Environment -- An OWL-Based Ontology Model for Intelligent Service in Vertical Farm -- Parallel Genetic Algorithm for Solving the Multilayer Survivable Optical Network Design Problem -- A Context-Aware Collaborative Filtering Algorithm through Identifying Similar Preference Trends in Different Contextual Information
Survivable Flows Routing in Large Scale Network Design Using Genetic Algorithm -- Belief Propagation in Bayesian Network -- A Method of Search Scope Compaction for Image Indexes -- Efficient Locking Scheme with OPOF on Smart Devices -- A Requirement Analysis of Awareness-Based Vessel Traffic Service System for Maritime Safety -- Analysis of Open Interface Function in USN Service Middleware System -- Security Controls Based on K-ISMS in Cloud Computing Service -- Implementation of Smart Grid Educational Application -- Development of Open Service Interface's Instructional Design Model in USN Middleware Platform Environment -- The Analysis of Case Result and Satisfaction of Digital Textbooks for Elementary School Students -- Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card -- Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services -- Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior -- Design of an RDFizer for Online Social Network Services -- A High Performance and Bandwidth Efficient IDMA Scheme with Large Receiver MIMO Technologies -- Security Considerations for Smart Phone Smishing Attacks -- Technology Venture Startup Invigoration Strategy for Building Infrastructures for the Business Startup Ecosystem -- Smart-Contents Visualization of Vehicle Big Data Using Vehicle Navigation Status Information -- A Model for Analyzing the Effectiveness of Smart Mobile Communication Quality Measurement -- Characteristics Analysis and Library Development for Common Lamps by Using PSPICE Modeling -- A Study on Brake Torque for Traction Motors by Using the Electric Brake -- A Virtual Cluster Scheme Technology for Efficient Wireless Sensor Networks -- Implementation of Wireless Electronic Acupuncture System -- Network Based Intelligent Agent for Ubiquitous Environments -- A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network
Design of User Access Authentication and Authorization System for VoIP Service -- Approach of Secure Authentication System for Hybrid Cloud Service -- Intelligent Inference System for Smart Electronic Acupuncture -- Electric Braking Control System to Secure Braking Force in the Wide Speed Range of Traction Motor -- Optimized Design of Charger for Electric Vehicles with Enabled Efficient CCCV Mode Movement -- Identifying Invalid Data within Operating System for Higher Flash Utilization -- Moving Human Detection Using Motion Depth in Depth Image Sequences -- Microbial Fuel Cell for STEAM Teaching Tools and Method -- Research on Educational Use of Smart-Phone Applications with Smart Clicker Technique -- Hierarchical Customization Method for Ubiquitous Web Applications -- PV System for Medical Devices in the Hospital -- Color Image Retrieval Using Fuzzy Measure Hamming and S-Tree -- Pipeline Verification via Closed-Loop Feedback -- Fuzzy Rule-Based to Predict the Minimum Surface Roughness in the Laser Assisted Machining (LAM) -- GRT-Multigraphs for Communication Networks: A Fuzzy Theoretical Model -- Exploring the Key Determinants of Successful ICT Innovation Adoption: A Case Study of a Fishing Community in Thailand -- Dynamic Bandwidth Allocation Algorithm for Ethernet Passive Optical Networks Based on Traffic Prediction -- Game Based Learning for Teaching Electrical and Electronic Engineering -- Mobile WiMAX Resource Allocation Design Goals: Key Features/Factors/Issues -- Hybrid Trust Framework for Loss of Control in Cloud Computing -- Secure Authorized Proxy Signature Scheme for Value-Added Service in Vehicular Ad Hoc Networks -- The Computer-Aided System for Promoting Judgments of Umpires -- A Distributed Model to Analyzed QoS Parameters Performance Improvement for Fixed WiMAX Networks -- A Hybrid of Fixed-Size and Dynamic-Size Tile Algorithm for Panoramic View on Mobile Devices
A Relationship Strength-Aware Topic Model for Communities Discovery in Online Social Networks -- Replication in Data Grid: Determining Important Resources -- Backpropagation Neural Network for Sex Determination from Patella in Forensic Anthropology -- Learning History Using Role-Playing Game (RPG) on Mobile Platform -- Experiment on Modified Artificial Bee Colony for Better Global Optimisation -- Ontology-Supported Development for Drug Analysis Laboratory Corresponding to the ISO/IEC 17025 Standard -- Modeling the Natural Capital Investment on Tourism Industry Using a Predator-Prey Model -- Study on Tracking Derivative Based Method for DC System Grounding Fault Detection -- Towards a VLIW Architecture for the 32-Bit Digital Signal Processor Core -- Application and Effectiveness of Cooperative Teaching Strategies in Entrepreneurship Education -- Isarn Dharma Alphabets to Thai Language Translation by ATNs -- Simulation and Analysis of Space Station Redocking -- Campus Mobile Navigation System Based on Shortest-Path Algorithm and Users Collaborations -- Tracking Multiple Fish in a Single Tank Using an Improved Particle Filter -- Efficient 3D Model Visualization System of Design Drawing Based on Mobile Augmented Reality -- A New Co-evolutionary Immune Algorithm for Flow Shop with Zero Wait -- Design and Implementation of Safety Verification for Civil Aviation Processing System Based on BPMN -- A Survey on Ontology Mapping Techniques -- The Parametric Design and Automatic Assembly of Hydrostatic Rotary Table Based on Pro/Engineer -- Modeling and Simulation of China's Competition Strategy for Highly Educated Talents Based on System Dynamic -- Kernelized-QEMU: A Study of System-Level Virtual Layer in Linux Kernel -- A Multi-pattern Matching Algorithm Based on Double Array Trie -- Lower Bound Estimation for Required Number of Nodes in the Opportunistic Communication -- Based Wireless Sensor Network -- Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks
To Practice Management Innovation and Reinforce the Foundation of Intellectual Property Strategy -- Research of Intranet Security Audit in E-government Management Website Group Based on Multi-agents -- Simulation of Three-Phase Voltage-Source PWM Rectifier with LCL Filter -- The Research on the Computer Control Technology of Tobacco Production -- A Study on the Application of Financial Engineering in Supply Chain Risk Management -- Logical Symmetry Based K-means Algorithm with Self-adaptive Distance Metric -- Modeling and Simulation of Network-Based C2 System Based on AOA -- Application Study of Spatiotemporal Chaotic Sequence in Code Division Multiple Access Communication System -- OPRF Secure Computation for Safety Neighbor Verification Protocols of Wireless Sensor Networks -- Texture Terrain Based on Land Cover Distribution -- Text Mining for Information Screen in Risk Assessment of Environmental Endocrine Disruptive Chemicals -- The Choices of Issued Inventory Valuation Methods Based on Different Accounting Standards at Home and Abroad -- Formal Constraints Research of Military Conceptual Model Elements -- Leaf Lesion Detection Method Using Artificial Bee Colony Algorithm -- The Accurate Positioning Method of Data Matrix Code Image Marked in Cylinder Glass -- Analysis of Urban Traffic Based on Taxi GPS Data -- CloStor: A Cloud Storage System for Fast Large-Scale Data I/O -- Nonnegative Variable Weight Based Auto Parts Combination Demand Forecasting Model Research -- A Data-Hiding Method Based on TCP/IP Checksum -- A Parallel Full-System Emulator for Risc Architure Host -- Density Based Active Self-training for Cross-Lingual Sentiment Classification -- Constructing 3D Model Based on Panoramic Images -- QoE Evaluation Model of Anti-Spam Allergy Problem Based on Fuzzy Entropy Method and Hidden Markov Model -- Topic Identification Strategy for English Academic Resources -- Performance Comparison between MLP Neural Network and Exponential Curve Fitting on Airwaves Data
A Private Cloud Storage System Based on Multithread Optimization -- Cloud Storage-Based Medical Data Integration Technology -- The Operation and Maintenance Management System of the Cloud Computing Data Center Based on ITIL -- Underwater Object Detection by Combining the Spectral Residual and Three-Frame Algorithm -- The Data Mining of Breast Cancer Based-on K-Means -- Compositional Modeling for Underwater Warfare Simulation Based on HLA and Flames -- Spot Electricity Price Dynamics of Indian Electricity Market -- Guaranteed QoS for UDP and TCP Flows to Measure Throughput in VANETs -- Detecting People Using Histogram of Oriented Gradients: A Step towards Abnormal Human Activity Detection -- Research of Touchscreen Terminals Gesture Operation Error Based on Kansei Engineering -- Research on MTMP Structure Chlorine Dosing Decoupling Control -- Development of Ontology for the Diseases of Spine -- Implementation of Information Retrieval Service for Korean Spine Database with Degenerative Spinal Disease -- Automatic Surface Mesh Intersection Algorithm of Spine and Implant FEM Models -- Simulation Program Binding Technology Based on Supercomputing -- Data Security in Cloud for Health Care Applications -- Web Service Selection Using Decision Tree Analysis in a Risky Environment -- An Enhanced e-Voting System in Cloud Using Fingerprint Authentication -- Local Minima Jump PSO for Workflow Scheduling in Cloud Computing Environments -- Respiratory Rate Estimation by Extracted PPG Signals from Embedded Smart Attire of Operation Strategists -- The Assessment of Information and Communication Technology (ICT) Policy in South Korea -- Computer Graphical Score and Music Education: Application to Music Animation Machine MIDI Player -- A Newton's Universal Gravitation Inspired Firefly Algorithm for Document Clustering -- A Study on the Correlation between the Customers' Perceived Risks and Online Shopping Tendencies
Model Checking Probabilistic Timed Systems against Timed Automata Specification -- Particle Filter Parallel of Improved Algorithm Based on OpenMp -- An E-commerce-System-Based Research on Trust Risk Assessment Models -- An Analysis about the Security of the Operating System Trusted Platform -- Technology Venture Startup Invigoration Strategy for Building Infrastructures for the Business Startup Ecosystem -- A Model for Analyzing the Effectiveness of Smart Mobile Communication Quality Measurement -- Characteristics Analysis and Library Development for Common Lamps by Using PSPICE Modeling -- A Study on Brake Torque for Traction Motors by Using the Electric Brake -- FOLI Technique Algorithm for Real-Time Efficient Image Processing -- Stabilization Inverse Optimal Control of Nonlinear Systems with Structural Uncertainty -- Implementation of Wireless Electronic Acupuncture System -- Network Based Intelligent Agent for Ubiquitous Environments -- A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network -- Design of User Access Authentication and Authorization System for VoIP Service -- Approach of Secure Authentication System for Hybrid Cloud Service -- Intelligent Inference System for Smart Electronic Acupuncture -- Electric Braking Control System to Secure Braking Force in the Wide Speed Range of Traction Motor -- Optimized Design of Charger for Electric Vehicles with Enabled Efficient CCCV Mode Movement -- A Virtual Cluster Scheme Technology for Efficient Wireless Sensor Networks -- An Intelligent e-Services Composition Platform for Ubiquitous Baby Care: The Case Study of Life and Commercial Support Services for Property Management -- An Authoring System of Creating Graphic Map for Item Search Based on Library OPACs -- Cloud-Based Traveling Video Editing System -- Linked Data-Based Service Publication for Service Clustering -- The Practical Quality Model for Cloud Learning System -- Erratum: Security Considerations for Smart Phone Smishing Attacks
Volume 1 -- Volume 2
Summary The theme of CSA is focused on the various aspects of computer science and its applications for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of computer science and its applications. Therefore this book will be include the various theories and practical applications in computer science and its applications
Analysis engineering
toegepaste wiskunde
applied mathematics
computational science
computerwetenschappen
computer sciences
software engineering
operating systems
Engineering (General)
Techniek (algemeen)
Notes Includes author index
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (SpringerLink, viewed November 25, 2013)
Subject Computer science -- Congresses
Ingénierie.
Computer science
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.
ISBN 9783642416743
3642416748
Other Titles Advances in Computer Science and its Applications
CSA 2013