Information science and applications 2017 : ICISA 2017

This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most...

Full description

Saved in:
Bibliographic Details
Corporate Author: International Conference on Information Science and Applications Macau, China)
Other Authors: Kim, Kuinam J., (Editor), Joukov, Nikolai, (Editor)
Format: eBook
Language: English
Published: Singapore : Springer, 2017.
Series: Lecture notes in electrical engineering ; v. 424.
Subjects:
ISBN: 9789811041549
9789811041532
Physical Description: 1 online resource

Cover

Table of contents

LEADER 06538cam a2200565Ii 4500
001 99914
003 CZ-ZlUTB
005 20240914112346.0
006 m o d
007 cr cnu|||unuuu
008 170321s2017 si ob 101 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d GW5XE  |d N$T  |d EBLCP  |d OCLCF  |d YDX  |d UAB  |d NJR  |d IOG  |d AZU  |d UPM  |d MERER  |d ESU  |d OCLCQ  |d OCLCO  |d JBG  |d IAD  |d ICW  |d ICN  |d VT2  |d OTZ  |d OCLCQ  |d U3W  |d CAUOI  |d KSU  |d AU@  |d OCLCQ  |d WYU  |d UKMGB  |d UKAHL  |d OCLCQ  |d ERF  |d UKBTH  |d OCLCQ 
020 |a 9789811041549  |q (electronic bk.) 
020 |z 9789811041532  |q (print) 
024 7 |a 10.1007/978-981-10-4154-9  |2 doi 
035 |a (OCoLC)978248702  |z (OCoLC)984848363  |z (OCoLC)999418932  |z (OCoLC)1005756620  |z (OCoLC)1011955003  |z (OCoLC)1048177823  |z (OCoLC)1058325138  |z (OCoLC)1066628866  |z (OCoLC)1086530517  |z (OCoLC)1112549506  |z (OCoLC)1112864398  |z (OCoLC)1113012986 
111 2 |a International Conference on Information Science and Applications  |d (2017 :  |c Macau, China) 
245 1 0 |a Information science and applications 2017 :  |b ICISA 2017 /  |c Kuinam Kim, Nikolai Joukov, editors. 
246 3 |a ICISA 2017 
264 1 |a Singapore :  |b Springer,  |c 2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture notes in electrical engineering ;  |v volume 424 
500 |a Includes author index. 
505 0 |a Preface; Organization; General Chairs; Steering Committee; Publicity Chairs; Workshop Chair; Publication Chair; Program Chair; Financial Chairs; Organizers and Supporters ; Program Committee; Contents; Ubiquitous Computing; Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP; Abstract; 1 Introduction; 2 CoMP and Semi-smart Antennas; 3 Genetic Algorithm Configuration; 3.1 Encoding and Decoding; 3.2 Fitness Function; 3.3 Constraint Handling; 3.4 Simulation Parameters; 4 Simulation Result; 5 Conclusion; References. 
505 8 |a Privacy in Location Based Services: Protection Strategies, Attack Models and Open ChallengesAbstract; 1 Introduction; 1.1 Location Privacy and Its Need; 2 Privacy Protection Strategies and Mechanisms; 2.1 Regulatory Strategies; 2.2 Policy Based; 2.3 Location Obfuscation; 2.4 Data Transformation; 2.5 PIR Based Location Privacy; 3 Common Attacks and Challenges in Location Privacy; 4 Open Challenges and Future Research Directions; 5 Conclusion; References; An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks; 1 Introduction; 2 The Details of DUOR. 
505 8 |a 2.1 Every Node Updates Its Own Hop-Count2.2 The Sensor Node Sends the Packet; 2.3 The Intermediate Nodes Forward the Packet; 2.4 The Sink Node Receives the Packet; 3 Simulations and Discussions; References; A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors; Abstract; 1 Introduction; 2 The Mobile Online Vehicle Status Awareness System (MOVSAS); 2.1 Data Preprocessing; 2.2 Using PCA for Feature Selection; 2.3 Online Training Model; 3 Experiment and Results; 3.1 Experiment Environment; 3.2 Data Collection; 3.3 The Accuracy of Vehicle Status Awareness. 
505 8 |a 3.4 The Processing Time4 The Conclusion and Future Work; References; A Study on OPNET State Machine Model Based IoT Network Layer Test; Abstract; 1 Introduction; 2 OPNET Modelling for Test Case Generation; 2.1 IoT Network Layer and OPNET Simulation; 2.2 Network Layer State Machine for Test Case Generation; 3 Experiment Result and Analysis; 4 Conclusions; References; A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks; Abstract; 1 Introduction; 2 Confidence Constraint Based Secure Localization Algorithm. 
505 8 |a 2.1 Confidence Constraint of Reference Nodes2.2 Confidence Constraint Satisfaction Problem; 3 Performance Evaluation; Acknowledgment; References; Networks and Information Systems; Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network; Abstract; 1 Introduction; 2 Method; 2.1 Preliminaries; 2.2 Algorithm; 3 Result; 4 Conclusion; Acknowledgement; References; AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network; Abstract; 1 Introduction; 2 AMI Network Architecture; 3 The Design of AMI Network Simulator. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology. 
504 |a Includes bibliographical references at the end of each chapters and index. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Software engineering  |v Congresses. 
650 0 |a Multimedia systems  |v Congresses. 
650 0 |a Information technology  |v Congresses. 
650 0 |a Computer networks  |v Congresses. 
650 0 |a Ubiquitous computing  |v Congresses. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Kim, Kuinam J.,  |e editor. 
700 1 |a Joukov, Nikolai,  |e editor. 
776 0 8 |i Printed edition:  |z 9789811041532 
830 0 |a Lecture notes in electrical engineering ;  |v v. 424. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-4154-9  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99914  |d 99914 
993 |x NEPOSILAT  |y EIZ