000 08272nam a22006255i 4500
001 978-3-662-45237-0
003 DE-He213
005 20240730194847.0
007 cr nn 008mamaa
008 141025s2014 gw | s |||| 0|eng d
020 _a9783662452370
_9978-3-662-45237-0
024 7 _a10.1007/978-3-662-45237-0
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aComputer Information Systems and Industrial Management
_h[electronic resource] :
_b13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings /
_cedited by Khalid Saeed, Václav Snášel.
250 _a1st ed. 2014.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXVIII, 702 p. 313 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v8838
505 0 _aProcessing Collective Knowledge - Conflict Resolution and Integration Aspects -- How to Store and Process Big Data: Are Today's Databases Sufficient -- A New Contention Management Technique for Obstruction Free Transactional Memory -- Evolutionary Algorithm for Decision Tree Induction -- A New Method for Mining High Average Utility Itemsets -- Spectral Clustering Based on Analysis of Eigenvector Properties -- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River -- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem -- Improving Rule Selection from Robot Soccer Strategy with Sub strategies -- Novel Ranking Methods Applied to Complex Membership Determination Problems -- Combination of Self Organizing Maps and Growing Neural Gas -- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud -- On the Comparison of the Keystroke Dynamics Databases -- Influence of Eye Diseases on the Retina Pattern Recognition -- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices -- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions -- Dynamic Centrality for Directed Co-author Network with Context -- Towards a Conceptual Search for Vietnamese Legal Text -- A Vietnamese Question Answering System in Vietnam's Legal Documents -- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design -- Movie Recommendation Using OLAP and Multidimensional Data Model -- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection -- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System -- Vietnamese Sentence Similarity Based on Concepts -- Materialized View Construction Based on Clustering Technique -- Big Data Spectra Analysis UsingAnalytical Programming and Random Decision Forests -- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification -- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways -- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization -- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study -- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse -- Abbreviation Method for Some Jointed Relations in Displaying Genealogy -- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems -- Agent-Based Context Management for Service-Oriented Environments -- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem -- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach -- Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling -- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights -- An Effective Initialization for ASM-Based Methods -- A Multiple Refinement Approach in Abstraction Model Checking -- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation - An Initial Study -- Chaos Powered Grammatical Evolution -- Network Anomaly Detection Using Parameterized Entropy -- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts -- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service -- Application of PIL Approach for Automated Transportation Center -- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring -- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter -- Multi-criteriaRoute Planning in Bus Network -- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set -- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves -- Subspaces Clustering Approach to Lossy Image Compression -- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining -- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature -- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology -- Hardware Approach for Generating b-detectors by Immune-Based Algorithms -- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges -- Protection Profile for Secure Sensitive Information System on Mobile Devices -- Implicit and Explicit Certificates-Based Encryption Scheme -- Malware Behavior Modeling with Colored Petri Nets -- A Proposal of Algorithm for Web Applications Cyber Attack Detection -- Semantic Set Analysis for Malware Detection.
520 _aThis book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_9158259
650 0 _aPattern recognition systems.
_93953
650 0 _aSoftware engineering.
_94138
650 0 _aAlgorithms.
_93390
650 0 _aInformation storage and retrieval systems.
_922213
650 1 4 _aComputer Communication Networks.
_9158260
650 2 4 _aComputer and Information Systems Applications.
_9158261
650 2 4 _aAutomated Pattern Recognition.
_931568
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aAlgorithms.
_93390
650 2 4 _aInformation Storage and Retrieval.
_923927
700 1 _aSaeed, Khalid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158262
700 1 _aSnášel, Václav.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158263
710 2 _aSpringerLink (Online service)
_9158264
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783662452363
776 0 8 _iPrinted edition:
_z9783662452387
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v8838
_9158265
856 4 0 _uhttps://doi.org/10.1007/978-3-662-45237-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95359
_d95359