Li | Information Technology and Applications | E-Book | sack.de
E-Book

E-Book, Englisch, 400 Seiten

Li Information Technology and Applications

Proceedings of the 2014 International Conference on Information technology and Applications (ITA 2014), Xian, China, 8-9 August 2014
Erscheinungsjahr 2015
ISBN: 978-1-315-68721-6
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Proceedings of the 2014 International Conference on Information technology and Applications (ITA 2014), Xian, China, 8-9 August 2014

E-Book, Englisch, 400 Seiten

ISBN: 978-1-315-68721-6
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. IT has become one of the most fundamental technologies in today’s social life, and there are many unsolved issues related to IT and its applications.

This edited volume on the broad area of IT covers information processing methods and techniques, information theories, information systems, information retrieval, information storage, computer networks, algorithms, databases and the Internet of Things. Information Technology and Applications will be a valuable source of information to academics and professional involved and/or interested in IT.

Li Information Technology and Applications jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Preface

I Information theory, information processing methods and information systems

Consumption intent analysis in Chinese microblog
J.-K. Mao & T.-F. Yao

Analysis of the micro-lecture construction of mechanical engineering network education
L. Xu

Construction and design of network database system of wild flowers of Beijing
K. Huang, Q. Zhao, Z.H. Chen & Z.J. Liu

A research on the construction of the E-learning platform in art and design teaching
J. Shi

Query processing with knowledge association context
Y.-G. Yao, X.-Y. Ma, H. Liu, J. Yi, H.-Q. Chen & X.-H. Zhao

A new type of optimization method based on benchmark learning
A.-S. Xie

The establishment of public opinion forecasting and early-warning through the methods of grey forecasting and pattern recognition
H. Fu, X.-G. Ren, H. Li & Z.-T. Du

The development of the anti-plagiarism software and its application in the teaching practice
Z. Xie & W. Song

Analysis and design method of the Cyber-Physical Systems based on SCADE
L.C. Zhang & T. Peng

Performance of incremental-best-relay technique for two-way relaying systems
J. Guo, C.-X. Pei & H. Yang

The explore of teaching model in mobile learning environment
X.-H. Guan & Y.-G. Qian

Empirical study on the reasons of IPO underpricing
P. Zhang

Simulation model of micro-blogging opinion dissemination under sudden natural disasters
H.-L. Wang & J. Wang

The performance evaluation of IT industry: Based on exploratory factor analysis
Y. Wu & Y.-J. Tang

An empirical study on relationships between intangible assets and profitability of IT industry
Y.Q. Shi & W.-L. Gu

The research on growth evaluation of Chinese IT listed companies
Y.-J. Fu

Case study on EIT industry-university-research collaborative innovation platform
J. Wang & H.-L. Wang

Empirical study on relationship between equity incentive and R&D expenditure of information technology listed companies
Y.-X. Yin & W.-L. Gu

Empirical research on capital structure and corporate performance of listed companies in information technology industry
D.-D. Zhang

Ecosystem health assessment of Japanese larch in Liaodong area based on grey relation projection method
Q. Liu, S.-R. Hui, C. Wei, L. Fang, C. Liang & H. Liu

Research on mean-variance approach and CAPM approach for determining the expected risk and return
L.-F. Zhang & J.-F. Leng

Research on the impact of IM technology on college students’ intimacy
X.R. Chen, J.R. Sha & S.L. Lv

Research on accounting conservatism and investment efficiency of IT enterprises: A perspective of impairment of assets
C.-Y. Yu & J.-X. Xu

Information technology security patent application analysis in China
Y.-G. Yao, X.-Y. Ma, X.-H. Zhao, R.-P. Wu, L. Liu & Y.-Z. Liu

Ownership concentration, balance degree and corporate performance: An empirical study on Chinese listed companies of IT industries
H.R. Lu

A novel Redundant Inertial Measurement Unit and error compensation technology
K.-P. He, Y.-P. Shao, X.-X. Wang & C.-Y. Wang

Study of Coke Dry Quenching control system based on PROFIBUS Fieldbus
Z.-S. Chen, Y.-X. Lan & J.-Z. Song

Development of a wireless monitoring system based on ZigBee in chiller measurements
Y.-H. Zheng

U.S. foreign aid management system and its inspiration for China
J.M. Hu, Y.C. Hua & J.M. Guo

A kind of characters segmentation method for text-based CAPTCHA attacking
Z. Wang & X. Li

Predict drug-gene interactions based on collaborative filtering
L.-X. Ma & Y. Li

Predict NBA players’ career performance based on SVM
Y. Li & L.-X. Ma

Fish-eye lens rectification based on equidistant model
C.-Q. Xu & X.-F. Peng

Emotional intelligence system for smart education in ubiquitous learning
X. Zhou, S. Huang, Y.-S. Chen & W.-H. Dai

Emotion expression and affective computing on international cyber languages
X. Zhou, S. Huang, X.-E. Yu, Z.-Y. Yang & W.-H. Dai

Matching multi-sensor images based on Haar Binary Coding feature
Z. Li, X. Zhou, G.-Y. Tu & W.-J. Li

Applications of ICT for participatory sustainable rural development: A case study of Iran
A. Khatoonabadi

II Computer science

An improved Apriori algorithm based on Hash table for borrowing data of library
Y. Feng, M. Kang, X.-X. Liu, H.-Y. Xu, L. Gao & H.-M. Zhou

Two-phase-precoding design for STBC MIMO systems
M.-Y. Ju, Y.-H. Li, G.-P. Tan, P. Huang, J. Qian & Z. Lu

Research on designing and developing the “Computer Platform” course website aiming at interactive learning
X.-Y. Wang, P. Li, X.-J. Liu, J.-Q. Huang, Y.-A. Zhang & T.-F. Cao

A secure multi-party protocol of association rules mining in vertically distributed environment
L. Song

Cryptanalysis of a one-time two-factor authentication and key agreement scheme using smart card
J. Ling & G.Q. Zhao

Low complexity adaptive robust algorithm for nonlinear Active Noise Control
B. Wang & Z.Z. Tan

Stochastic Network Calculus based delay analysis for Window Flow Controller
B.L. Li, W.H. Dou & J. Zhao

Design and simulation of wearable RFID tag antenna
S.-D. Zhou & H.-T. Chang

Attribute weighted fuzzy clustering algorithm for incomplete datasets
D. Li, C.-Q. Zhong & Z.-J. Chen

Semantic automatic image annotation based on Non-Abstract Visual Keywords
X. Ke & G.-L. Chen

JVM based traffic simulation oriented computer language framework
Y. Bin, Z. Xiaoqing, W. Weiyang & W. Yanqing

A novel pattern recognition algorithm
X.-Q. Guan, B.-L. Han, Z. Ge & K. Niu

Cancellation of loop-interference in full-duplex MIMO relays
M.-M. Wang & X.-Y. Rui

Improved interleaving PAPR reduction scheme of OFDM signals with BPSK inputs
L.-Y. Wang & X.-H. Yang

CssQoS: A load balancing mechanism for cloud serving systems
W.K. Hsieh, W.H. Hsieh, J.L. Chen & P.J. Yang

Dynamically Adjusted Detection Node Algorithm for Wireless Sensor Networks
Q. Yu, Y.-G. Liu & J.-L. Wang

A cross-layer energy saving routing finding method for Underwater Wireless Sensor Network
C.-B. Huang, X.-W. Zheng, G.-S. Yang, C.-Y. Chen & L. Gao

A fast algorithm of double-scalar multiplication on Koblitz curves
Q. Yu, C. Lin & J.-L. Wang

On minimal separation axioms in generalized topological spaces
H.-M. Guan & S.-Z. Bai

Analytical study on the vulnerability scanning and tools
N.-F. Zhu, Y. Zhou, L. Lou & W. Wang

Research of multi-user traffic identification technology on mobile Internet
R. Li & Z.-Z. Zhang

Performance analysis of two-way AF cooperative networks with relay selection over Nakagami-m fading channels
C.-H. Yao, C.-X. Pei & J. Guo

Changes in cortical network topology with brain aging
L. Lin, C. Jin, X. Xu & S. Wu

Research of the measure method of identity trustworthiness based on software code homology detection
X.-H. Zhao, H. Liu, M.G. Zou, L. Liu, L. Zhang & Y.F. Huang

Learning hierarchical feature representation for RGB-D object recognition
S.-Q. Tu, Y.-G. Xue, X. Zhang, X.-L. Huang & H.-K. Lin

An image registration algorithm based on FAST, RANSAC and SURF
W.-S. An, R.-M. Yu & Y.-L. Wu

The light source system for star simulator with multi-color temperature and multi-magnitude
X.-N. Li, C.-G. Wu, Z.-H. Lu & L.-Y. Xie

Real-time moving detection algorithm based on YUV color space
Q. Ke, F.-Y. Zhang & F.-X. Xiao

Research on frequent itemsets mining algorithms based on MapReduce in cloud computing environment
Y. Zhang & Z.G. Zhang

Energy-saving optimization in data center based on computing resource scheduling
S.-L. Ruan, C.-W. Lu & Y.-J. Guan

Joint sink mobility and node deployment for prolonging lifetime in wireless sensor networks
J.-G. Dai & H.-Y. Yuan

A remote sensing image fusion method based on wavelet transform
L. Han & D.-W. Liu

A Network-on-Chip based homogeneous many-core Digital Signal Processor framework with distributed shared memory
Q.-H. Zhang, F. Wang & Z.-L. Li

Research and design of Network Intrusion Detection System based on Multi-Core Tilera64
L. Zhang, P.y. Shen, L.b. Dong, J. Song, Y. Feng, Q.q. Liu, K. Yi, L.k. Zhi & W.t. Zhao

The research and realization of the shortest path planning algorithms in map navigation area
S.-H. Wen, G.-Z. Feng, J.-Y. Zhan & M. Sun

Research of message queues stream processing method based on cloud services
X.-H. Zhao, L. Liu, Y.-G. Yao, L. Zhang & J. Li

Author index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.