語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
ITNG 2023 20th International Confere...
~
International Conference on Information Technology: New Generations (2023))
FindBook
Google Book
Amazon
博客來
ITNG 2023 20th International Conference on Information Technology-New Generations
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
ITNG 2023 20th International Conference on Information Technology-New Generations/ edited by Shahram Latifi.
其他作者:
Latifi, Shahram.
團體作者:
International Conference on Information Technology: New Generations
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
1 online resource (xiii, 457 p.) :ill., digital ;24 cm.
內容註:
Chapter 1. Loop Closure Detection in Visual SLAM Based on Convolutional Neural Network. Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. Chapter 3 -- Improved Significant Wave Height Prediction by an LSTM and EEMD Method. Chapter 4 -- A Deep Learning Approach for Sentiment and Emotional Analysis of Lebanese Arabizi Twitter Data. Chapter 5 -- A two-step approach to boost neural network generalizability in predicting defective software. Chapter 6 -- A Principal Component Analysis-based Scoring Mechanism to Quantify Crime Hot Spots in a City. Chapter 7 -- Tuning neural networks for superior accuracy on resource-constrained edge microcontrollers. Chapter 8 -- BigQuery Intersection Congestion Prediction. Chapter 9 -- A Detection Method for Stained Asbestos Based on Dyadic Wavelet Packet Transform and a Locally Adaptive Method of Edge Extraction. Chapter 10 -- Machine Learning - Fake Product Prediction System. Chapter 11 -- Ontology of Vulnerabilities and Attacks on VLAN Verifying X.509 Certificate Extensions. Chapter 12 -- Detecting Malicious Browser Extensions by Combining Machine Learning and Feature Selection. Chapter 13 -- A Lightweight Mutual Authentication and Key Generation Scheme in IoV Ecosystem. Chapter 14 -- To reject or not reject - that is the question, the case of BIKE post quantum KEM. Chapter 15 -- IoT forensics: Machine to Machine Embedded with SIM Card. Chapter 16 -- Streaming Platforms Based on Blockchain Technology: A Business Model Impact Analysis. Chapter 17 -- Digital Forensic Investigation Framework for Dashcam. Chapter 18 -- Conflicts between UX designers, front-end and back-end software developers: good or bad for productivity?. Chapter 19 -- Generalized EEG Data Acquisition and Processing System. Chapter 20 -- Supporting Technical Adaptation and Implementation of Digital Twins in Manufacturing. Chapter 21 -- Towards Specifying and Evaluating the Trustworthiness of an AI-enabled System. Chapter 22 -- Description and Consistency Checking of Distributed Algorithms in UML Models using Composite Structure and State Machine Diagrams. Chapter 23 -- Simulation and comparison of different scenarios of a Workflow net using Process Mining. Chapter 24 -- Making Sense of Failure Logs in an Industrial DevOps Environment. Chapter 25 -- Analysis of News Article various countries on a specific event using Semantic Network Analysis. Chapter 26 -- AN APPROACH TO ASSIST OPHTHALMOLOGISTS IN GLAUCOMA DETECTION USING DEEP LEARNING. Chapter 27 -- Multtestlib: An Approach to Unit Testing Using Parallel Processing in Python. Chapter 28 -- DEFD : Adapted decision tree ensemble for financial fraud detection. Chapter 29 -- Prediction of Bike Sharing Activities using Machine Learning and Data Analytics. Chapter 30 -- ICT: Attendance & Contact Tracing During a Pandemic. Chapter 31 -- Towards Cloud Teaching and Learning: A COVID 19 era in South Africa. Chapter 32 -- Learning Object as a Mediator in the User/Learner's Zone of Proximal Development. Chapter 33 -- Quality Assessment of Open Educational Resources based on Data Provenance. Chapter 34 -- Quality Assessment of Open Educational Resources: a systematic review. Chapter 35 -- Chapter 36 -- Predicting COVID-19 Occurrences from MDL-based Segmented Comorbidities and Logistic Regression. Chapter 37 -- Internet of Things Applications for Cold Chain Vaccine Tracking: A Systematic Literature Review. Chapter 38 -- GDPR and FAIR compliant decision support system design for triage and disease detection. Chapter 39 -- Truckfier - A multiclass vehicle detection and counting tool for real-world highway scenarios. Chapter 40 -- Explaining Multimodal Image Retrieval Using A Vision and Language Task Model. Chapter 41 -- A Process to Support Heuristic Evaluation and Tree Testing from a UX Integrated Perspective. Chapter 42 -- Description and Verification of Systolic Array Parallel Computation Model in Synchronous Circuit using LOTOS. Chapter 43 -- A Virtual Reality Mining Training Simulator for Proximity Detection. Chapter 44 -- A Performance Analysis of Different MongoDB Consistency Levels. Chapter 45 -- Information extraction and ontology population using car insurance reports. Chapter 46 -- Description of Restricted Object Reservation System using Specification and Description Language VDM++. Chapter 47 -- A Demographic Model to Predict Arrests by Race: An Exploratory Approach. Chapter 48 -- An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding. Chapter 49 -- Complex Network Analysis of the US Marine Highway Network. Chapter 50 -- Directed Acyclic Network and Turn Constraint Paths.
Contained By:
Springer Nature eBook
標題:
Information technology - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-28332-1
ISBN:
9783031283321
ITNG 2023 20th International Conference on Information Technology-New Generations
ITNG 2023 20th International Conference on Information Technology-New Generations
[electronic resource] /edited by Shahram Latifi. - Cham :Springer International Publishing :2023. - 1 online resource (xiii, 457 p.) :ill., digital ;24 cm. - Advances in intelligent systems and computing,v. 14452194-5365 ;. - Advances in intelligent systems and computing ;v. 1445..
Chapter 1. Loop Closure Detection in Visual SLAM Based on Convolutional Neural Network. Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. Chapter 3 -- Improved Significant Wave Height Prediction by an LSTM and EEMD Method. Chapter 4 -- A Deep Learning Approach for Sentiment and Emotional Analysis of Lebanese Arabizi Twitter Data. Chapter 5 -- A two-step approach to boost neural network generalizability in predicting defective software. Chapter 6 -- A Principal Component Analysis-based Scoring Mechanism to Quantify Crime Hot Spots in a City. Chapter 7 -- Tuning neural networks for superior accuracy on resource-constrained edge microcontrollers. Chapter 8 -- BigQuery Intersection Congestion Prediction. Chapter 9 -- A Detection Method for Stained Asbestos Based on Dyadic Wavelet Packet Transform and a Locally Adaptive Method of Edge Extraction. Chapter 10 -- Machine Learning - Fake Product Prediction System. Chapter 11 -- Ontology of Vulnerabilities and Attacks on VLAN Verifying X.509 Certificate Extensions. Chapter 12 -- Detecting Malicious Browser Extensions by Combining Machine Learning and Feature Selection. Chapter 13 -- A Lightweight Mutual Authentication and Key Generation Scheme in IoV Ecosystem. Chapter 14 -- To reject or not reject - that is the question, the case of BIKE post quantum KEM. Chapter 15 -- IoT forensics: Machine to Machine Embedded with SIM Card. Chapter 16 -- Streaming Platforms Based on Blockchain Technology: A Business Model Impact Analysis. Chapter 17 -- Digital Forensic Investigation Framework for Dashcam. Chapter 18 -- Conflicts between UX designers, front-end and back-end software developers: good or bad for productivity?. Chapter 19 -- Generalized EEG Data Acquisition and Processing System. Chapter 20 -- Supporting Technical Adaptation and Implementation of Digital Twins in Manufacturing. Chapter 21 -- Towards Specifying and Evaluating the Trustworthiness of an AI-enabled System. Chapter 22 -- Description and Consistency Checking of Distributed Algorithms in UML Models using Composite Structure and State Machine Diagrams. Chapter 23 -- Simulation and comparison of different scenarios of a Workflow net using Process Mining. Chapter 24 -- Making Sense of Failure Logs in an Industrial DevOps Environment. Chapter 25 -- Analysis of News Article various countries on a specific event using Semantic Network Analysis. Chapter 26 -- AN APPROACH TO ASSIST OPHTHALMOLOGISTS IN GLAUCOMA DETECTION USING DEEP LEARNING. Chapter 27 -- Multtestlib: An Approach to Unit Testing Using Parallel Processing in Python. Chapter 28 -- DEFD : Adapted decision tree ensemble for financial fraud detection. Chapter 29 -- Prediction of Bike Sharing Activities using Machine Learning and Data Analytics. Chapter 30 -- ICT: Attendance & Contact Tracing During a Pandemic. Chapter 31 -- Towards Cloud Teaching and Learning: A COVID 19 era in South Africa. Chapter 32 -- Learning Object as a Mediator in the User/Learner's Zone of Proximal Development. Chapter 33 -- Quality Assessment of Open Educational Resources based on Data Provenance. Chapter 34 -- Quality Assessment of Open Educational Resources: a systematic review. Chapter 35 -- Chapter 36 -- Predicting COVID-19 Occurrences from MDL-based Segmented Comorbidities and Logistic Regression. Chapter 37 -- Internet of Things Applications for Cold Chain Vaccine Tracking: A Systematic Literature Review. Chapter 38 -- GDPR and FAIR compliant decision support system design for triage and disease detection. Chapter 39 -- Truckfier - A multiclass vehicle detection and counting tool for real-world highway scenarios. Chapter 40 -- Explaining Multimodal Image Retrieval Using A Vision and Language Task Model. Chapter 41 -- A Process to Support Heuristic Evaluation and Tree Testing from a UX Integrated Perspective. Chapter 42 -- Description and Verification of Systolic Array Parallel Computation Model in Synchronous Circuit using LOTOS. Chapter 43 -- A Virtual Reality Mining Training Simulator for Proximity Detection. Chapter 44 -- A Performance Analysis of Different MongoDB Consistency Levels. Chapter 45 -- Information extraction and ontology population using car insurance reports. Chapter 46 -- Description of Restricted Object Reservation System using Specification and Description Language VDM++. Chapter 47 -- A Demographic Model to Predict Arrests by Race: An Exploratory Approach. Chapter 48 -- An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding. Chapter 49 -- Complex Network Analysis of the US Marine Highway Network. Chapter 50 -- Directed Acyclic Network and Turn Constraint Paths.
This volume represents the 18th International Conference on Information Technology - New Generations (ITNG), 2021. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
ISBN: 9783031283321
Standard No.: 10.1007/978-3-031-28332-1doiSubjects--Topical Terms:
543170
Information technology
--Congresses.
LC Class. No.: T58.5
Dewey Class. No.: 004
ITNG 2023 20th International Conference on Information Technology-New Generations
LDR
:06987nmm a2200361 a 4500
001
2318712
003
DE-He213
005
20230506181055.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031283321
$q
(electronic bk.)
020
$a
9783031283314
$q
(paper)
024
7
$a
10.1007/978-3-031-28332-1
$2
doi
035
$a
978-3-031-28332-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
T58.5
072
7
$a
UNF
$2
bicssc
072
7
$a
UYQE
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UYQE
$2
thema
082
0 4
$a
004
$2
23
090
$a
T58.5
$b
.I61 2023
111
2
$a
International Conference on Information Technology: New Generations
$n
(20th :
$d
2023)
$3
3633963
245
1 0
$a
ITNG 2023 20th International Conference on Information Technology-New Generations
$h
[electronic resource] /
$c
edited by Shahram Latifi.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
1 online resource (xiii, 457 p.) :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5365 ;
$v
v. 1445
505
0
$a
Chapter 1. Loop Closure Detection in Visual SLAM Based on Convolutional Neural Network. Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. Chapter 3 -- Improved Significant Wave Height Prediction by an LSTM and EEMD Method. Chapter 4 -- A Deep Learning Approach for Sentiment and Emotional Analysis of Lebanese Arabizi Twitter Data. Chapter 5 -- A two-step approach to boost neural network generalizability in predicting defective software. Chapter 6 -- A Principal Component Analysis-based Scoring Mechanism to Quantify Crime Hot Spots in a City. Chapter 7 -- Tuning neural networks for superior accuracy on resource-constrained edge microcontrollers. Chapter 8 -- BigQuery Intersection Congestion Prediction. Chapter 9 -- A Detection Method for Stained Asbestos Based on Dyadic Wavelet Packet Transform and a Locally Adaptive Method of Edge Extraction. Chapter 10 -- Machine Learning - Fake Product Prediction System. Chapter 11 -- Ontology of Vulnerabilities and Attacks on VLAN Verifying X.509 Certificate Extensions. Chapter 12 -- Detecting Malicious Browser Extensions by Combining Machine Learning and Feature Selection. Chapter 13 -- A Lightweight Mutual Authentication and Key Generation Scheme in IoV Ecosystem. Chapter 14 -- To reject or not reject - that is the question, the case of BIKE post quantum KEM. Chapter 15 -- IoT forensics: Machine to Machine Embedded with SIM Card. Chapter 16 -- Streaming Platforms Based on Blockchain Technology: A Business Model Impact Analysis. Chapter 17 -- Digital Forensic Investigation Framework for Dashcam. Chapter 18 -- Conflicts between UX designers, front-end and back-end software developers: good or bad for productivity?. Chapter 19 -- Generalized EEG Data Acquisition and Processing System. Chapter 20 -- Supporting Technical Adaptation and Implementation of Digital Twins in Manufacturing. Chapter 21 -- Towards Specifying and Evaluating the Trustworthiness of an AI-enabled System. Chapter 22 -- Description and Consistency Checking of Distributed Algorithms in UML Models using Composite Structure and State Machine Diagrams. Chapter 23 -- Simulation and comparison of different scenarios of a Workflow net using Process Mining. Chapter 24 -- Making Sense of Failure Logs in an Industrial DevOps Environment. Chapter 25 -- Analysis of News Article various countries on a specific event using Semantic Network Analysis. Chapter 26 -- AN APPROACH TO ASSIST OPHTHALMOLOGISTS IN GLAUCOMA DETECTION USING DEEP LEARNING. Chapter 27 -- Multtestlib: An Approach to Unit Testing Using Parallel Processing in Python. Chapter 28 -- DEFD : Adapted decision tree ensemble for financial fraud detection. Chapter 29 -- Prediction of Bike Sharing Activities using Machine Learning and Data Analytics. Chapter 30 -- ICT: Attendance & Contact Tracing During a Pandemic. Chapter 31 -- Towards Cloud Teaching and Learning: A COVID 19 era in South Africa. Chapter 32 -- Learning Object as a Mediator in the User/Learner's Zone of Proximal Development. Chapter 33 -- Quality Assessment of Open Educational Resources based on Data Provenance. Chapter 34 -- Quality Assessment of Open Educational Resources: a systematic review. Chapter 35 -- Chapter 36 -- Predicting COVID-19 Occurrences from MDL-based Segmented Comorbidities and Logistic Regression. Chapter 37 -- Internet of Things Applications for Cold Chain Vaccine Tracking: A Systematic Literature Review. Chapter 38 -- GDPR and FAIR compliant decision support system design for triage and disease detection. Chapter 39 -- Truckfier - A multiclass vehicle detection and counting tool for real-world highway scenarios. Chapter 40 -- Explaining Multimodal Image Retrieval Using A Vision and Language Task Model. Chapter 41 -- A Process to Support Heuristic Evaluation and Tree Testing from a UX Integrated Perspective. Chapter 42 -- Description and Verification of Systolic Array Parallel Computation Model in Synchronous Circuit using LOTOS. Chapter 43 -- A Virtual Reality Mining Training Simulator for Proximity Detection. Chapter 44 -- A Performance Analysis of Different MongoDB Consistency Levels. Chapter 45 -- Information extraction and ontology population using car insurance reports. Chapter 46 -- Description of Restricted Object Reservation System using Specification and Description Language VDM++. Chapter 47 -- A Demographic Model to Predict Arrests by Race: An Exploratory Approach. Chapter 48 -- An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding. Chapter 49 -- Complex Network Analysis of the US Marine Highway Network. Chapter 50 -- Directed Acyclic Network and Turn Constraint Paths.
520
$a
This volume represents the 18th International Conference on Information Technology - New Generations (ITNG), 2021. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
650
0
$a
Information technology
$v
Congresses.
$3
543170
650
0
$a
Digital communications
$x
Congresses.
$3
678614
650
1 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Information Storage and Retrieval.
$3
761906
650
2 4
$a
Software Engineering.
$3
890874
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Cloud Computing.
$3
3231328
700
1
$a
Latifi, Shahram.
$3
2186799
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in intelligent systems and computing ;
$v
v. 1445.
$3
3633964
856
4 0
$u
https://doi.org/10.1007/978-3-031-28332-1
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9454962
電子資源
11.線上閱覽_V
電子書
EB T58.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入