E-Books durchsuchen

Fourth International Congress on Information and Communication Technology [2019]

1
Wearable Device Technology in Healthcare—Exploring Constraining and Enabling Factors
2
Proposed System for Effective Adoption of E-government to Obtain Construction Permit in Egypt
3
Potential Use of Bitcoin in B2C E-commerce
4
Smart Cabin: A Semantic-Based Framework for Indoor Comfort Customization Inside a Cruise Cabin
5
Formal Modeling and Analysis of Probabilistic Real-Time Systems
6
Regional Agricultural Land Classification Based on Random Forest (RF), Decision Tree, and SVMs Techniques
7
On Hierarchical Classification Implicative and Cohesive <inline-formula><alternatives><tex-math>\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M_{GK}$$\end{document}</tex-math><inline-graphic></inline-graphic></alternatives></inline-formula>-Based: Application on Analysis of the Computing Curricula and Students Abilities According the Anglo-Saxon Model
8
A Modeling Environment for Dynamic and Adaptive Network Models Implemented in MATLAB
9
Face Authentication Using Image Signature Generated from Hyperspectral Inner Images
10
Unsupervised Learning of Image Data Using Generative Adversarial Network
11
Adaptive Message Embedding in Raw Images
12
Megapolis Tourism Development Strategic Planning with Cognitive Modelling Support
13
Design and Implementation of Ancient and Modern Cryptography Program for Documents Security
14
Methodology for Selecting Cameras and Its Positions for Surround Camera System in Large Vehicles
15
Fuzzy Models and System Technical Condition Estimation Criteria
16
Software Tools and Techniques for the Expert Systems Building
17
A Component-Based Method for Developing Cross-Platform User Interfaces for Mobile Applications
18
Improvement of Vehicles Production by Means of Creating Intelligent Information System for the Verification of Manufacturability of Design Documentation
19
Group Delay Function Followed by Dynamic Programming Versus Multiscale-Product for Glottal Closure Instant Detection
20
Activity Logging in a Bring Your Own Application Environment for Digital Forensics
21
Game Theory for Wireless Sensor Network Security
22
DSP Implementation of OQPSK Baseband Demodulator for Geosynchronous Multichannel TDMA Satellite Receiver
23
Textile Sensor-Based Exoskeleton Suits for the Disabled
24
A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters
25
q-LMF: Quantum Calculus-Based Least Mean Fourth Algorithm
26
Process Driven Access Control and Authorization Approach
27
Comprehensive Exploration of Game Reviews Extraction and Opinion Mining Using NLP Techniques
28
MHAD: Multi-Human Action Dataset
29
Machine Learning-Based Approaches for Location Based Dengue Prediction: Review
30
Critical Evaluation of Different Biomarkers and Machine-Learning-Based Approaches to Identify Dementia Disease in Early Stages
31
Interactive Visualization of Ontology-Based Conceptual Domain Models in Learning and Scientific Research
32
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server
33
Monetary Transaction Fraud Detection System Based on Machine Learning Strategies
34
The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop Scenario
35
A New Use of Doppler Spectrum for Action Recognition with the Help of Optical Flow
36
Meeting Challenges in IoT: Sensing, Energy Efficiency, and the Implementation
37
Small Cells Handover Performance in Centralized Heterogeneous Network
38
CRISP-DM/SMEs: A Data Analytics Methodology for Non-profit SMEs
39
Bridges Strengthening by Conversion to Tied-Arch Using Monarch Butterfly Optimization
40
Deep Learning Approach for IDS
41
Outlier Detection Method-Based KPCA for Water Pipeline in Wireless Sensor Networks
42
Data Extraction and Exploration Tools for Business Intelligence
43
Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a Blockchain
44
Closest Fit Approach Through Linear Interpolation to Recover Missing Values in Data Mining
Feedback