Information science and applications 2017 : ICISA 2017
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Singapore :
Springer,
2017.
|
Series: | Lecture notes in electrical engineering ;
v. 424. |
Subjects: | |
ISBN: | 9789811041549 9789811041532 |
Physical Description: | 1 online resource |
LEADER | 06538cam a2200565Ii 4500 | ||
---|---|---|---|
001 | 99914 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112346.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170321s2017 si ob 101 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d GW5XE |d N$T |d EBLCP |d OCLCF |d YDX |d UAB |d NJR |d IOG |d AZU |d UPM |d MERER |d ESU |d OCLCQ |d OCLCO |d JBG |d IAD |d ICW |d ICN |d VT2 |d OTZ |d OCLCQ |d U3W |d CAUOI |d KSU |d AU@ |d OCLCQ |d WYU |d UKMGB |d UKAHL |d OCLCQ |d ERF |d UKBTH |d OCLCQ | ||
020 | |a 9789811041549 |q (electronic bk.) | ||
020 | |z 9789811041532 |q (print) | ||
024 | 7 | |a 10.1007/978-981-10-4154-9 |2 doi | |
035 | |a (OCoLC)978248702 |z (OCoLC)984848363 |z (OCoLC)999418932 |z (OCoLC)1005756620 |z (OCoLC)1011955003 |z (OCoLC)1048177823 |z (OCoLC)1058325138 |z (OCoLC)1066628866 |z (OCoLC)1086530517 |z (OCoLC)1112549506 |z (OCoLC)1112864398 |z (OCoLC)1113012986 | ||
111 | 2 | |a International Conference on Information Science and Applications |d (2017 : |c Macau, China) | |
245 | 1 | 0 | |a Information science and applications 2017 : |b ICISA 2017 / |c Kuinam Kim, Nikolai Joukov, editors. |
246 | 3 | |a ICISA 2017 | |
264 | 1 | |a Singapore : |b Springer, |c 2017. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in electrical engineering ; |v volume 424 | |
500 | |a Includes author index. | ||
505 | 0 | |a Preface; Organization; General Chairs; Steering Committee; Publicity Chairs; Workshop Chair; Publication Chair; Program Chair; Financial Chairs; Organizers and Supporters ; Program Committee; Contents; Ubiquitous Computing; Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP; Abstract; 1 Introduction; 2 CoMP and Semi-smart Antennas; 3 Genetic Algorithm Configuration; 3.1 Encoding and Decoding; 3.2 Fitness Function; 3.3 Constraint Handling; 3.4 Simulation Parameters; 4 Simulation Result; 5 Conclusion; References. | |
505 | 8 | |a Privacy in Location Based Services: Protection Strategies, Attack Models and Open ChallengesAbstract; 1 Introduction; 1.1 Location Privacy and Its Need; 2 Privacy Protection Strategies and Mechanisms; 2.1 Regulatory Strategies; 2.2 Policy Based; 2.3 Location Obfuscation; 2.4 Data Transformation; 2.5 PIR Based Location Privacy; 3 Common Attacks and Challenges in Location Privacy; 4 Open Challenges and Future Research Directions; 5 Conclusion; References; An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks; 1 Introduction; 2 The Details of DUOR. | |
505 | 8 | |a 2.1 Every Node Updates Its Own Hop-Count2.2 The Sensor Node Sends the Packet; 2.3 The Intermediate Nodes Forward the Packet; 2.4 The Sink Node Receives the Packet; 3 Simulations and Discussions; References; A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors; Abstract; 1 Introduction; 2 The Mobile Online Vehicle Status Awareness System (MOVSAS); 2.1 Data Preprocessing; 2.2 Using PCA for Feature Selection; 2.3 Online Training Model; 3 Experiment and Results; 3.1 Experiment Environment; 3.2 Data Collection; 3.3 The Accuracy of Vehicle Status Awareness. | |
505 | 8 | |a 3.4 The Processing Time4 The Conclusion and Future Work; References; A Study on OPNET State Machine Model Based IoT Network Layer Test; Abstract; 1 Introduction; 2 OPNET Modelling for Test Case Generation; 2.1 IoT Network Layer and OPNET Simulation; 2.2 Network Layer State Machine for Test Case Generation; 3 Experiment Result and Analysis; 4 Conclusions; References; A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks; Abstract; 1 Introduction; 2 Confidence Constraint Based Secure Localization Algorithm. | |
505 | 8 | |a 2.1 Confidence Constraint of Reference Nodes2.2 Confidence Constraint Satisfaction Problem; 3 Performance Evaluation; Acknowledgment; References; Networks and Information Systems; Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network; Abstract; 1 Introduction; 2 Method; 2.1 Preliminaries; 2.2 Algorithm; 3 Result; 4 Conclusion; Acknowledgement; References; AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network; Abstract; 1 Introduction; 2 AMI Network Architecture; 3 The Design of AMI Network Simulator. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology. | ||
504 | |a Includes bibliographical references at the end of each chapters and index. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Software engineering |v Congresses. | |
650 | 0 | |a Multimedia systems |v Congresses. | |
650 | 0 | |a Information technology |v Congresses. | |
650 | 0 | |a Computer networks |v Congresses. | |
650 | 0 | |a Ubiquitous computing |v Congresses. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Kim, Kuinam J., |e editor. | |
700 | 1 | |a Joukov, Nikolai, |e editor. | |
776 | 0 | 8 | |i Printed edition: |z 9789811041532 |
830 | 0 | |a Lecture notes in electrical engineering ; |v v. 424. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-4154-9 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99914 |d 99914 | ||
993 | |x NEPOSILAT |y EIZ |