Cover image for Pattern Analysis, Intelligent Security and the Internet of Things
Title:
Pattern Analysis, Intelligent Security and the Internet of Things
Author:
Abraham, Ajith. editor.
ISBN:
9783319173986
Edition:
1st ed. 2015.
Physical Description:
X, 359 p. 67 illus. online resource.
Series:
Advances in Intelligent Systems and Computing, 355
Contents:
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
Added Corporate Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 530158-1001 ONLINE
Searching...

On Order