Information Technology - New Generations -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreSoyez informé(e) par e-mail dès l'arrivée de cet article
Créer une alerte prix- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Information Technology - New Generations Format Broché - Livre Littérature Générale
0 avis sur Information Technology - New Generations Format Broché - Livre Littérature Générale
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Information Technology - New Generations Format Broché
- Livre Littérature Générale
Résumé :
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Ser...
Biographie: Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and?Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas
Sommaire: Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and?Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas