Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/information-technology-and-applications/descriptif_4089988
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4089988

Information Technology and Applications Proceedings of the 2014 International Conference on Information technology and Applications (ITA 2014), Xian, China, 8-9 August 2014

Langue : Anglais

Coordonnateur : Li Xiaolong

Couverture de l’ouvrage Information Technology and Applications

Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. IT has become one of the most fundamental technologies in today?s social life, and there are many unsolved issues related to IT and its applications.

This edited volume on the broad area of IT covers information processing methods and techniques, information theories, information systems, information retrieval, information storage, computer networks, algorithms, databases and the Internet of Things. Information Technology and Applications will be a valuable source of information to academics and professional involved and/or interested in IT.

Preface; I Information theory, information processing methods and information systems Consumption intent analysis in Chinese microblog; Analysis of the micro-lecture construction of mechanical engineering network education; Construction and design of network database system of wild flowers of Beijing; A research on the construction of the E-learning platform in art and design teaching; Query processing with knowledge association context; A new type of optimization method based on benchmark learning; The establishment of public opinion forecasting and early-warning through the methods of grey forecasting and pattern recognition; The development of the anti-plagiarism software and its application in the teaching practice; Analysis and design method of the Cyber-Physical Systems based on SCADE; Performance of incremental-best-relay technique for two-way relaying systems; The explore of teaching model in mobile learning environment; Empirical study on the reasons of IPO underpricing; Simulation model of micro-blogging opinion dissemination under sudden natural disasters; The performance evaluation of IT industry: Based on exploratory factor analysis; An empirical study on relationships between intangible assets and profitability of IT industry; The research on growth evaluation of Chinese IT listed companies; Case study on EIT industry-university-research collaborative innovation platform; Empirical study on relationship between equity incentive and R&D expenditure of information technology listed companies; Epirical research on capital structure and corporate performance of listed companies in information technology industry; Ecosystem health assessment of Japanese larch in Liaodong area based on grey relation projection method; Research on mean-variance approach and CAPM approach for determining the expected risk and return; Research on the impact of IM technology on college students’ intimacy; Research on accounting conservatism and investment efficiency of IT enterprises: A perspective of impairment of assets; Information technology security patent application analysis in China; Ownership concentration, balance degree and corporate performance: An empirical study on Chinese listed companies of IT industries; A novel Redundant Inertial Measurement Unit and error compensation technology; Study of Coke Dry Quenching control system based on PROFIBUS Fieldbus; Development of a wireless monitoring system based on ZigBee in chiller measurements; U.S. foreign aid management system and its inspiration for China; A kind of characters segmentation method for text-based CAPTCHA attacking; Predict drug-gene interactions based on collaborative filtering; Predict NBA players’ career performance based on SVM; Fish-eye lens rectification based on equidistant model; Emotional intelligence system for smart education in ubiquitous learning; Emotion expression and affective computing on international cyber languages; Matching multi-sensor images based on Haar Binary Coding feature; Applications of ICT for participatory sustainable rural development: A case study of Iran; II Computer science; An improved Apriori algorithm based on Hash table for borrowing data of library; Two-phase-precoding design for STBC MIMO systems; Research on designing and developing the “Computer Platform” course website aiming at interactive learning; A secure multi-party protocol of association rules mining in vertically distributed environment; Cryptanalysis of a one-time two-factor authentication and key agreement scheme using smart card; Low complexity adaptive robust algorithm for nonlinear Active Noise Control; Stochastic Network Calculus based delay analysis for Window Flow Controller; Design and simulation of wearable RFID tag antenna; Attribute weighted fuzzy clustering algorithm for incomplete datasets; Semantic automatic image annotation based on Non-Abstract Visual Keywords; JVM based traffic simulation oriented computer language framework; A novel pattern recognition algorithm; Cancellation of loop-interference in full-duplex MIMO relays; Improved interleaving PAPR reduction scheme of OFDM signals with BPSK inputs; CssQoS: A load balancing mechanism for cloud serving systems; Dynamically Adjusted Detection Node Algorithm for Wireless Sensor Networks; A cross-layer energy saving routing finding method for Underwater Wireless Sensor Network; A fast algorithm of double-scalar multiplication on Koblitz curves; On minimal separation axioms in generalized topological spaces; Analytical study on the vulnerability scanning and tools; Research of multi-user traffic identification technology on mobile Internet; Performance analysis of two-way AF cooperative networks with relay selection over Nakagami-m fading channels; Changes in cortical network topology with brain aging; Research of the measure method of identity trustworthiness based on software code homology; Detection; Learning hierarchical feature representation for RGB-D object recognition; An image registration algorithm based on FAST, RANSAC and SURF; The light source system for star simulator with multi-color temperature and multi-magnitude; Real-time moving detection algorithm based on YUV color space; Research on frequent itemsets mining algorithms based on MapReduce in cloud computing environment; Energy-saving optimization in data center based on computing resource scheduling; Joint sink mobility and node deployment for prolonging lifetime in wireless sensor networks; A remote sensing image fusion method based on wavelet transform; A Network-on-Chip based homogeneous many-core Digital Signal Processor framework with distributed shared memory; Research and design of Network Intrusion Detection System based on Multi-Core Tilera64; The research and realization of the shortest path planning algorithms in map navigation area; Research of message queues stream processing method based on cloud services

Postgraduate and Professional
Xiaolong Li, College of Technology, Indiana State University, Terre Haute, Indiana, USA.

Date de parution :

17.4x24.6 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

395,67 €

Ajouter au panier