Computer Information Systems and Industrial Management: 13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings

Author:   Khalid Saeed ,  Václav Snášel
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2014 ed.
Volume:   8838
ISBN:  

9783662452363


Pages:   702
Publication Date:   09 October 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $194.04 Quantity:  
Add to Cart

Share |

Computer Information Systems and Industrial Management: 13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.

Full Product Details

Author:   Khalid Saeed ,  Václav Snášel
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2014 ed.
Volume:   8838
Dimensions:   Width: 15.50cm , Height: 3.70cm , Length: 23.50cm
Weight:   1.086kg
ISBN:  

9783662452363


ISBN 10:   3662452367
Pages:   702
Publication Date:   09 October 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Processing Collective Knowledge – Conflict Resolution and Integration Aspects.- How to Store and Process Big Data: Are Today’s Databases Sufficient.- A New Contention Management Technique for Obstruction Free Transactional Memory.- Evolutionary Algorithm for Decision Tree Induction.- A New Method for Mining High Average Utility Itemsets.- Spectral Clustering Based on Analysis of Eigenvector Properties.- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River.- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem.- Improving Rule Selection from Robot Soccer Strategy with Sub strategies.- Novel Ranking Methods Applied to Complex Membership Determination Problems.- Combination of Self Organizing Maps and Growing Neural Gas.- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud.- On the Comparison of the Keystroke Dynamics Databases.- Influence of Eye Diseases on the Retina Pattern Recognition.- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices.- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions.- Dynamic Centrality for Directed Co-author Network with Context.- Towards a Conceptual Search for Vietnamese Legal Text.- A Vietnamese Question Answering System in Vietnam’s Legal Documents.- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design.- Movie Recommendation Using OLAP and Multidimensional Data Model.- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection.- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System.- Vietnamese Sentence Similarity Based on Concepts.- Materialized View Construction Based on Clustering Technique.- Big Data Spectra Analysis UsingAnalytical Programming and Random Decision Forests.- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification.- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways.- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization.- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study.- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse.- Abbreviation Method for Some Jointed Relations in Displaying Genealogy.- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems.- Agent-Based Context Management for Service-Oriented Environments.- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem.- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach.- Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling.- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights.- An Effective Initialization for ASM-Based Methods.- A Multiple Refinement Approach in Abstraction Model Checking.- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study.- Chaos Powered Grammatical Evolution.- Network Anomaly Detection Using Parameterized Entropy.- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts.- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service.- Application of PIL Approach for Automated Transportation Center.- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring.- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter.- Multi–criteriaRoute Planning in Bus Network.- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set.- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves.- Subspaces Clustering Approach to Lossy Image Compression.- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining.- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature.- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology.- Hardware Approach for Generating b-detectors by Immune-Based Algorithms.- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.- Protection Profile for Secure Sensitive Information System on Mobile Devices.- Implicit and Explicit Certificates-Based Encryption Scheme.- Malware Behavior Modeling with Colored Petri Nets.- A Proposal of Algorithm for Web Applications Cyber Attack Detection.- Semantic Set Analysis for Malware Detection.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List