Emerging trends in computing, informatics, systems sciences, and engineering /

Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networkin...

Full description

Saved in:
Bibliographic Details
Corporate Authors: International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering Bridgeport, Conn.); SpringerLink (Online service)
Group Author: Sobh, Tarek M.; Elleithy, Khaled
Published: Springer,
Publisher Address: New York, NY :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture notes in electrical engineering, v.151
Subjects:
Online Access: http://dx.doi.org/10.1007/978-1-4614-3558-7
Summary: Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning. This book includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2010). The proceedings are a set of rigorously reviewed world-class manuscripts presenting the state of international practice in Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications.
Item Description: International conference proceedings.
Includes index.
Carrier Form: 1 online resource.
ISBN: 9781461435587 (electronic bk.)
1461435587 (electronic bk.)
Index Number: TK7885
CLC: TP3-532
Contents: Customized Opinion Mining using Intelligent Algorithms /
Information Security Measurement Roles and Responsibilities /
Service and Information Security Improvement by Collaborative Business Process Management /
Software Design for Dynamic Stitching of Multi-Spectral Images of Field Crops /
Teaching Robotics to Students with Mixed Interests /
An Initial Study Identifying Trends in Test Cases /
Providing Strategies for Education in Engineering for Virtual Team Development /
New Automated Assembly Model Based on Automated Route Card Scheme /
On Using a Semiotic Quality Framework to Evaluate the Quality of Conceptual Database Schemas /
Pareto Front Investigation of Multivariable Control Systems /
Multi-objective Performance Evaluation of Controllers for a Thermal Process /
Design Considerations for Generalized Predictive Controllers and Systems with Fractional Dead Time /
R-Mesh Simulator Using C++ /
Image Pre-Compensation for Visually Impaired Computer Users with Variable Pupil Size /
Digital Filtering of the Pupil Diameter Signal for Affective Assessment of a Computer User /
TCCT: A GUI Table Comparison Computer Tool /
Information Management for Holistic, Collaborative Information Security Management /
Towards Passive Walking for the Fully-Actuated Biped Robot Nao /
The Multi GPU Accelerated Waveform Inversion in Distributed OpenCL Environment /
The Analysis of the Efficiency of Parallelization of Existing Serial Code on the Basis of Seismic Migration /
A Cluster Analysis for Determining the Effects of Codes of Conduct in the Business Administration /
Playing with Numbers: Development Issues and Evaluation Results of a Computer Game for Primary School Students /
Reverse Auctions: How Electronic Auctions Can Aid Governments in Significantly Cutting Their Procurement Spending and Introduce Greater Competition in Public Sector Contracting /
Models for Some Smart Toys and Extensions /
Matrix-Based Methods for Supporting Logic Planning of IT Projects /
From Three Dimensional Document Circulation Diagram into UML Diagrams /
Operating System for Wireless Embedded Systems Powered by Energy Harvesters /
Data Transformation and Data Transitive Techniques for Protecting Sensitive Data in Privacy Preserving Data Mining /
Handling Maintenance Projects with Matrix-Based Methods /
Computer Aided Diagnostic Methods to Forecast Condition-Based Maintenance Tasks /
On Numerical Approach to Stochastic Systems Modelling /
An Advanced DSS for Classification of Multiple-Sclerosis Lesions in MR Images /
E-Learning Software for Students with Autism /
Steganography and Steganalysis: Current Status and Future Directions /
Validation of System Architectures Against Requirements /
A Few Reflections Regarding Assessment in an E-Learning Environment /
Methods to Ensure Higher Variability of Knowledge Tests in the Moodle LMS Environment /
The Use of Virtualization and Thin Clients Within the Infrastructure of Computer Labs /
Testing Mobile Agents on the Azul Platform /
Support of Relational Algebra Knowledge Assessment /
On Synergy of Motivational Projects and Agile Software Development Practices /
Expert System as the Tool for Information Asymmetry Reduction on RCBS Market in EU /
Instructional Design for Building Entrepreneurial Competency in Romania: First Stage Research Framework and Results /
Security Requirements for Internet Voting Systems /
A Multi-Algorithm, High Reliability Steganalyzer Based on Services Oriented Architecture /
A Quality Model of Metamodeling Systems /
Selection of Appropriate Data Storage for Wavelet Transform Coefficients /
Drug Delivery by Electroporation: Review /
Wine Maturation Using High Electric Field /
A Computational Intelligence Approach for Forecasting Telecommunications Time Series /
Designing a Networking Tool for Automatic Domain Zone Updating /
Open Source Software Development: Exploring Research Perspectives /
Informal Instructional Design to Engage and Retain Students in Engineering /
TCP with Advanced Window Scaling Option /
Implementation of the Handheld Decision Support System for Agriculture and Home Gardening /
A Low-Overhead BIST Architecture for Digital Data Processing Circuits /
Dynamic Web Service Composition with MDE Approaches and Ontologies /
An Approach Based on Z Language for Formalization of Model Transformation Definition /
Intrusion Detection System for Botnet Attacks in Wireless Networks Using Hybrid Detection Method Based on DNS /
Parallelization of Closed-Form Stiffness Matrix Generation for Tetrahedral Finite Elements /
Metrics in Assessing the Quality and Evolution of jEdit /
Customising a BBVC for Asterisk VoIP Services /
An Exploratory Empirical Study of Internal Quality Attributes of Open Source Software Systems /
An Approach to Information Technologies for Solving Mathematical Physics Problems /
Multiple Software Watchdog Timers in the Linux OS /
An Ontology-Based Fuzzy Approach for Alert Verification and Correlation in RFID Systems /
XML Database Storage for Web based Application /
Towards C# Application Development Using UML State Machines: A Case Study /
Visualization of Verilog Digital Systems Models /
Expert System Aided Power System Reinforcement with Reliability and Voltage Sag Consideration /
A TSK Fuzzy Approach to Channel Estimation for 802.11a WLANs /
Comparison of Bootstrapping and Finite State Machine Simulations of a Scheduling Benchmark /
Low Power 8-Bit Baugh-Wooley Multiplier Based on Wallace Tree Architecture /
Rapid Prototyping and CAD/CAM in Building Design Education: A Very Early Introduction to Mass Customization /
Design and Implementation of Nonlinear Control Strategies: A Tutorial /
Using PRINCE2 Project Management Methodology to Develop SOA Based Applications /
Logical Circuits Design Education Based on Virtual Verification Panel /
Extending LR Parsing to Implement Rewriting Semantics in Extensible Programming Languages /
Neuro-Fuzzy Model Related To Job Assignation /
Time-Based Location Prediction Technique for Wireless Cellular Networks /
Computer Simulation Applied to the Design of Urban Public Spaces: Day Lighting in the Squares /
Some Results in Automatic Functional Test Design for Processors /
Enhanced Classroom Presenter /
A Textual Domain Specific Language for User Interface Modelling /
Vehicle Detection Even in Poor Visibility Conditions Using Infrared Thermal Images and Its Application to Road Traffic Flow Monitoring /
Using Data Mining Techniques for Diagnostic of Virtual Systems Under Control of KVM /
C# Based Media Center /
An Efficient Intrusion Detection System for Mobile Ad Hoc Networks /
The Academic Rating Criteria for Knowledge Web-Based in Thailand /
Traditional and Modern MCQ Methods as In-class Formative Assessment /
Evaluating the Impact of Various Modulation Schemes on WiMAX Quality of Service /
Estimation of Depth Map Using Image Focus: A Scale-Space Approach for Shape Recovery /
Applying Intelligent Agents in Traffic Control for Traffic Intersection Groups /
Energy Saving in Advanced Absorption Heat Pump with Object Oriented Programming /
Application of Artificial Neural Networks in Chosen Glass Laminates Properties Prediction /
Archaeology, Incas, Shape Grammars and Virtual Reconstruction /
Strategic Design of a Financial Model /
Numerical Analysis of Electromagnetic Field Coupled with the Thermal Field in Induction Heating Process /
Process Deployment: A Taxonomy of Critical Success Factors /