Home > General > Computers and Information Processing Technologies I
Computers and Information Processing Technologies I

Computers and Information Processing Technologies I

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Collection of selected, peer reviewed papers from the International Conference on Computers and Information Processing Technologies (ICCIPT 2014), April 23-24, 2014, Shanghai, China. The 223 papers are grouped as follows: Chapter 1: Advanced Computing Technology and Mathematical Modeling, Chapter 2: Detection and Optimization Algorithms, Artificial Intelligence and Intelligent Systems, Chapter 3: Communications and Network, Chapter 4: Software Engineering, Chapter 5: Database Systems and Data Security, Chapter 6: Computer Vision and Image Processing, Chapter 7: Signal and Media Information Processing, Chapter 8: Modern Electronics, Photonics Science and Engineering, Chapter 9: Controller and Sensor Technology, Chapter 10: Mechanical Design and Engineering, Chapter 11: E-Commerce, E-Government, IOT and Management

Table of Contents:
Preface and Conference Organization Chapter 1: Advanced Computing Technology and Mathematical Modeling A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle A Large-Scale and Flexible BMS Design A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability Research on MapReduce Task Dynamic Balancing Strategy Based on File Label Researches on Data Privacy in Cloud Computing Based on Game Theory The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot Set Adaptive Congestion Control via Dynamic Output Feedback An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss RE-Based Weighted Distributed Equipment Layout Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix A Secret Sharing Scheme on Access Structure A Tag-Based Signature Scheme with Shorter Signature Length An Identity-Based Conditional Proxy Re-Encryption in Cloud Computing Environments Fine-Grained Access Control with Efficient Revocation in Cloud Storage Integrity and Fidelity Evaluation of Digital Evidence in Live Forensics MANET-Based Stable Clustering Algorithm and its Performance Analysis RETRACTED: Reinforcement Learning for Cloud Computing Digital Library Research on Audit Model of Users’ Operation Normalization Based on Graph Theory in Power System Research on Design and Construction Method of Bent Functions A Novelty Model for Reliability Assessment of Complex System A Multi-Attribute Decision-Making Method Based on SPAOWA Operator The Forecasting Research of Beijing Tourism Demand Based on the BP Neural Network A Class of Singular Volterra-Fredholm Type Difference Inequality in Engineering A Class of Volterra-Fredholm Difference Inequality with Weakly Singularity in Engineering Application Research of the Polynomial Fitting Model in Transformation of Plane Rectangular Coordinate Identification and Optimization of Soil Water Movement Model Based on GA under Drip-Irrigation Regression Analysis of Lower Extremity Injury Influencing Factors under Frontal Crash Setting of Academic Warning Based on Multivariate Copula Functions The Application of Iteration Learning Control in Silkworm Incubation Chamber System Chapter 2: Detection and Optimization Algorithms, Artificial Intelligence and Intelligent Systems Fault Diagnoses Using Inverse Fuzzy Model A Community Detection Method Based on Multi-Objective Optimization Method A High Precision Indoor Positioning System Based on VLC and Smart Handheld A Hybrid IGA-SA Algorithm for Optimization Problems in Fault Diagnosis Efficient Particle Swarm Optimization Algorithm Based on Affinity Propagation Estimation of Initial Field in the Bohai Sea with the Adjoint Method: A Comparative Study on Optimization Algorithms Fault Diagnosis of Transformer Based on RBF Neural Network Features Extraction for Lhasa Tibetan Speech Recognition FECG Extraction Algorithm Based on BSS Using Temporal Structure and DWT Fuzzy Clustering Segmentation Algorithm Research for Biomedical Image Based on Artificial Life Hourly Solar Radiation Forecast Based on k-NN Nonparametric Regression Model Influence Diffusion Model Based on Semantic Orientation and its Application in Opinion Leader Identification Multi-Thread Memory Particle Swarm Optimization for Dynamic Optimization Problems Recognizing Event in Short Text Based on Decision Tree Reliability Analysis Based on Markov Process for Repairable Systems Reverse Search Particle Swarm Optimization to Deal with Dynamic Optimization Problems Short-Term Prediction of Ship Motion Based on EMD-SVM Strategic Learning in Multiple Equilibria for Double Bargaining Mechanism by PSO The MacWilliams Identity of Linear Codes over Mn×s(Fp+uFp+vFp+uvFp) with Respect to RT Metric The Micro-Blog Information Personalized Recommendation Algorithm Based on Trust Relationship Tibetan Information Retrieval Technology Integrated with Morphological and Syntactic Cues The Optimization Algorithm Based on Vector Space Model to Determine the Influence of Microblogging Text Design of a Two-Wheel Self-Balanced Vehicle System Moving Target Detection and Tracking Control Simulation Platform New Research for Traffic State Identification Water Traffic Safety Evaluation Based on the Grey Correlation Grade Analysis Large Naval Ship Evaluation Method Attended by Multiple Experts Intelligent Vehicle Local Planning Based on Optimized Path Generation and Selection Fuzzy Comprehensive Evaluation Method of Experimental Teaching Quality Based on AHP Comprehensive Evaluation Study of Multiple Comfort for High-Speed Train A Mutual Fund Investment Method Using Fruit Fly Optimization Algorithm and Neural Network An Improved Path Tracking Algorithm for Intelligent Vehicle in Automatic Parking Conditions A Smart Recognition Method for Otological Drill Milling through a Bone Tissue Wall Answer Extraction Model Based on Named Entity Recognition Class Association Rule Mining Based on Incremental Construction of Lattice Causal Model Reconstruction of Complex Energy System Using Probabilistic Network Approach Chapter 3: Communications and Network A Network Selection Algorithm Based on Traffic Flow A Regulative Arithmetic on the Contingency Communication in the Damaged Military Communication Network A Short-Delay Multipath Mitigation Algorithm Based on Variable Step-Size LMS Adaptive Filtering Joint Resources Assignment Scheme Based on Graph Coloring Theory and Harmony Search Theory for Cognitive Radio Networks Locality-Route Pre-Configuration Mechanism for Latency Optimization in NoCs Multi-Level Complex Network Control System Based on Cloud Services Platform Petri Net-Based Modeling and Verification of Automatic Train Speed Control System The Study of Network Information System Security Strategy Based on Trusted Cloud Computing A Modeling Approach Based on Weighted LDA for Quality of Experience Measurement in Mobile Network Scenarios A Microblogging Opinion Leader Recognition Algorithm Based on MapReduce Access Control Management of Cloud Storage System Based on NSSC in Mobile Network An Algorithm Based on Optimal Routing Function in Mobile Ad Hoc Networks An IEEE 802.11n Based Multi-Channel MAC Protocol for Underground Metal Mine Wireless Network An Improved Method for Maintenance Scheme of an Inter-Zone Route Design and Implementation of ZigBee Gateway for Ethernet Mobile Wireless Network Management System Research of Mining High Power 802.11n Access Point The Modeling Method and Analysis of Online Top-Up System Based on Open Petri Net The Research of Auto After-Sales Service Personalized Recommendation Based on LBS A Pattern Matching Algorithm for Double-Type Characters Study on Design of Non-Uniform Energy Distribution Wireless Network Manipulation of Quantum Communication Channel via Two-Level Atom Interacting with Caving Fields Tourism Information Service Reliability under Unconventional Events Chapter 4: Software Engineering A Formal Method of Obligation Policy for Agent Interaction A Modeling Method of Equipment Systems Based on UPDM A Real-Time Log Analyzer Based on MongoDB Design and Implementation of Mobile Client for Passenger Dynamic Travel Information Enquiry in Urban Rail Transit Network Design of Coal Equipment Life Cycle Reliability Management System Design of Three Dimensional Simulation Training System for Marine Hydraulic Crane Evaluation Model for the E-Learning 2.0 System Research on the Programming of Transplanting the Entire DSP Program from On-Chip FLASH to RAM The Design and Application of Scientific Research Project Management System Using Time Reachability Tree Logic to Specifying and Verifying Temporal Behavior of Workflow-Net A Practical Method for Software Encryption Directed Fuzzing Based on Dynamic Taint Analysis for Binary Software Scheme Design of Mobile Phone Campus GIS System Basing on the Windows Phone Platform Software Vulnerabilities Detection Based on Random Programming Research on Tibetan Localization Based on Android The Selection and Study of HA Cluster Software Design Chapter 5: Database Systems and Data Security Efficiently Subtree Matching between XML and Probabilistic XML Documents Evaluation of B+-Tree and CSB+-Tree in Main Memory Database Oracle Database Security and Protection Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database Research on the Spatial Query Technology of Geospatial Database Study on Fair Definitions and Application Modes of Big Data Chapter 5: Database Systems and Data Security Combination of Data Masking and Data Encryption for Cloud Database Protecting Encrypted Data against Inference Attacks in Outsourced Databases System Security Monitoring Based on Complex Event Processing and Neural Network The Research of Interactions in Date Processing and Data Mining Incomplete Data Recovery Using Linear Regression Linear Random Model and its Application to Data Recovery Outlier Analysis in Large Sample and High Dimensional Data Based on Feature Weighting A Method of Reconstructing Data Sample with Monte Carlo Method and GM (1,1) Model Theory Chapter 6: Computer Vision and Image Processing A Mathematical Morphological Processing of Spectrograms for the Tone of Chinese Vowels Recognition A Novel Disparity Estimation Method Based on Multi-Block and Adaptive Window A View-Dependent and Physical Feature-Preservation Streamline Simplification Method for 3D Vector Field Visualization An Improved Moving Particle Semi-Implicit Method for Free Surface Flows Application of Digital Image Processing Techniques in the Vessel Flexure System Applied Study of Size Measurement Based on Image Automatic Eyeglasses Removal of Frontal Facial Images for Face Recognition Bilateral Filtering Algorithm Research Based on Improved Weight Values B-Spline Surface Approximation to Scanned Data Using Least Square Approximation Challenging the Recognition of Facial Expression via Deep Learning DRCH: A Method for 3D Convex Hull Enhanced MIL Visual Tracking via Distribution Fields Descriptor Extracting Geometric Edges from 3D Point Clouds Based on Normal Vector Change Hand Detection with Dominant Pose Recognition Using EOH and SVM Improved Face Recognition Using 2D-LDA with Weighted Covariance Scatter Inspection of Polymer Polaroid’s Visual Defects with Stripe Light Illumination Laser Active Image-Denoising Based on Principal Component Analysis with Local Pixel Grouping Pedestrian Detection Optimization Algorithm Based on Low-Altitude UAV Research on QR Code Black Line and White Line Defect Detection Algorithm Study on Application of CAD Used in Visual Advertising Design The Research of Ortho-Rectification to QuickBird Image with more Mountains Based on ERDAS10.0 Tomato Disease Image Retrieval Based on Composite Features Upper-Body Pose Recognition Using Cylinder Pattern Model Study of Slice Cell Counting System Food Submergence Calculation and Analysis Using Digital Elevation Model and Geographical Information System A Video Characteristics Watermarking Algorithm Based on Bees Evolutional Computation Rock Image Pore Identification Based on Fuzzy C-Means Clustering and Neural Networks An RFID-Assisted Digital Souvenir Generation System Research on Issues of across Border Area in Network Games An Electronic Image Stabilizition Algorithm Based on Gray Projection and Circle Projection Matching Dynamic Biomedical Image Segmentation Based on Wavelet Transform Fullbore Image Construction of Imaging Logging Based on the Improved Texture Inpainting Method Taxi Bidirectional Search System Based on Smart Phone Chapter 7: Signal and Media Information Processing Disparity Estimation of 3-D Mesh for Stereo Video Coding Simulation of Dynamic Light Scattering Signal Based on AR Model The EMD Analysis AE Signals of Rock Failure under Uniaxial Compression An Improved Unambiguous Tracking Technique for CBOC Signals Research and Realization the Method of Pronunciation Conversion for Speech Synthesis of the Lhasa Dialect of Tibetan Context-Assisted Fast Face Detection Transmission of Image Information in the Network Multimedia Teaching A Dual-DSP Sonobuoy Signal Processing System Chapter 8: Modern Electronics, Photonics Science and Engineering A 3 GHz Semi-Digital Delay Locked Loop with High Resolution A Distributed DC Power Devise Based on DSP A Flyback 25W Switching Power Supply for Electric Vehicle A Low Standby Power Consumption Control Circuit for Switching Power Supply A Novel Dead-Time Control Method for Double End Converter Analysis of Scattering Characteristics for 1D Electromagnetic Wave by Sudden Creation of a Plasma Slab Based on FDTD Current Zero Crossing Detection Circuit for Synchronous Rectification Model Buck Converter Design of Knowledge Reasoning Based Infrared Imagery Fault Detection System for Substation Equipments Dispersion Characteristic of the Symmetric Slab Waveguide with Chiral Negative Refractive Medium Dispersion Curves and Fields for a Chiral Negative Refraction Parallel-Plate Waveguide under PMC Boundary Key Technology of LCA on Small Wind Power Generation System Modeling and Simulation of Motor Discrete Variable Frequency Soft Starting Based on the Variable Reactance Modeling Hydraulic Power System with Surge Tank Optimization Design of Photovoltaic System MPPT Controller Passivity-Based Controller of Tri-State Boost Converter Research on 5V Internal Power Supply Circuit of Switching Power Supply Research on Design of Virtual Maintenance Training System for Electronic Equipment Research on the PCHD Control Strategy for Three-Phase Voltage Source PWM Rectifier under Unbalanced Supply Voltage Condition Stabilization of a Class of Chaotic Systems via Single-State Adaptive Feedback Controller Studies on the Ontology-Based Composable Modeling Technology of Radar Countermeasure Test Simulation The Design of Freeform Surface Fresnel Lens Used for LED Uniform Illumination The Intelligent Desk Lamp Designed for Special Populations The Study on Intelligent Insecticidal Lamp with LED The Theory and Experimental Study on the Long-External Cavity Semiconductor Lasers Theoretical Studies of Novel High Power Millimeter Generator Based on Vacuum Electron Devices Study on Passivity-Based Control of TNPC PV Grid-Connected Inverter Chapter 9: Controller and Sensor Technology A Trusted QoS Architecture for Wireless Multimedia Sensor Networks Design of Circuit for Alcohol Measurements Using Three-Electrode Biosensor Human Activity Recognition Using Smart-Phone Sensors Research on Static Game Theory Based Secure Routing Algorithm in WSN Smart Community Security System Based on Sensor Web An Improved ANN Controller on the Efficiency Optimization of Offshore Petroleum Platform Design of Wall-Mounted Boiler Remote Monitoring and Control System Based on the Ayla IOT Cloud Platform A New Cuk Converter with High Step-Down Ratio and its Control A Phase Anti-Ambiguity Method for USBL System Application Research of PBL Method in PLC Control Technology Real-Time Trajectory Control of Robots Omnidirectional Mobile Obstacle Avoidance Chapter 10: Mechanical Design and Engineering FEM Analysis of Sheet Incremental Forming Process Multidisciplinary Design Optimization for Small Vertical Wind Turbine Design Torque Converter Turboshaft Fracture Failure Analysis and Improvement Casting Process Solutions Optimization of LFC Forklift Box The Research of Robot Teleoperation Technology Based on Virtual Fixture Chapter 11: E-Commerce, E-Government, IOT and Management SWOT Analysis and Research on the Informatization Application Model of the Agricultural Industry Cluster A Study on Simulative System of Mobile Payment Application of Information Technology in the County Government Construction of XBRL Semantic Metamodel and Knowledge Base Based on Ontology E-Commerce Risk Analysis with Fuzzy Analytic Hierarchy Process Fuzzy Evaluating Model and Method of C2C Sellers Credit Based on Larsen Criterion Research on the Elements of E-Government Performance Evaluation Systematic Design of Individualized Customization of Home Textiles Based on Web Tax Administration Problem in the E-Business Environment Tax Revenue Loss under Electronic Commerce in China An Improved User Interest Model for Microblog Personalized Recommendation Analysis of User Influence Using User Behavior and Random Walk The Design and Realization of Management System Based on Java for College Graduation Practice A Robust and Efficient Password Authentication Scheme Using Smart Cards An Iot-Based Remote Health Monitoring and Management System The Internet of Things Technology Application and the Intelligent Library The Research on the Development of Smart Library Financial Market Risk Overflow Modeling and Inspection Based on Support Vector Machine The Planning System Based on the Postponement Manufacturing Theory Tibetan-Chinese Named Entity Extraction Based on Comparable Corpus


Best Sellers


Product Details
  • ISBN-13: 9783038265221
  • Publisher: Trans Tech Publications Ltd
  • Publisher Imprint: Trans Tech Publications Ltd
  • Language: English
  • ISBN-10: 3038265225
  • Publisher Date: 10 Jun 2014
  • Binding: Digital download and online
  • No of Pages: 1272


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Computers and Information Processing Technologies I
Trans Tech Publications Ltd -
Computers and Information Processing Technologies I
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computers and Information Processing Technologies I

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!