menu
{ "item_title" : "Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering", "item_author" : [" Tarek Sobh", "Khaled Elleithy "], "item_description" : "Customized Opinion Mining using Intelligent Algorithms.- Information Security Measurement Roles and Responsibilities.- Service and Information Security Improvement by Collaborative Business Process Management.- Software Design for Dynamic Stitching of Multi-spectral Images of Field Crops.- Teaching Robotics to Students with Mixed Interests.- An Initial Study Identifying Trends in Test Case Selection.- Providing Strategies for Education in Engineering for Virtual Team Development.- New Automated Assembly Model Based On Automated Rout Card Scheme.- On Using a Semiotic Quality Framework to Evaluate the Quality of Conceptual Database Schemas.- Pareto Front Investigation of Multivariable Control Systems.- Multi-objective Performance Evaluation of Controllers for a Thermal Process.- Design Considerations for Generalized Predictive Controllers and Systems with Fractional Dead Time.- R-Mesh Simulator Using C++.- Image Pre-compensation for Visually Impaired Computer Users with Variable Pupil Size.- Digital Filtering of the Pupil Diameter Signal for Affective Assessment of a Computer User.- TCCT: A GUI Table Comparison Computer Tool.- Information Management for Holistic, Collaborative Information Security Management.- Towards Passive Walking for the Fully-actuated Bi-ped Robot Nao.- The Multi GPU Accelerated Waveform Inversion in Distributed OpenCL Environment.- The Analysis of the Efficiency of Parallelization of Existing Serial Code on the Basis of Seismic Migration.- A Cluster Analysis for Determining the Effects of Codes of Conduct in the Business Administration.- Playing With Numbers: Development Issues and Evaluation Results of a Computer Game for Primary School Students.- Reverse Auctions: How Electronic Auctions Can Aid Governments in Significantly Cutting Their Procurement Spending and Introduce Greater Competition in Public Sector Contracting.-Models for Some Smart Toys and Extensions.- Matrix-based Methods for Supporting Logic Planning of IT Projects.-From Three Dimensional Document Circulation Diagram into UML Diagrams.- Operating System for Wireless Embedded Systems Powered by Energy Harvesters.- Data Transformation and Data Transitive Techniques for Protecting Sensitive Data in Privacy Preserving Data Mining.- Handling Maintenance Projects with Matrix-based Methods.- Computer Aided Diagnostic Methods to Forecast Condition-based Maintenance Tasks.- On Numerical Approach to Stochastic Systems Modeling.- An Advanced DSS for Classification of Multiple-Sclerosis Lesions in MR Images.- E-learning Software for Students with Autism.- Steganography and Steganalysis: Current Status and Future Directions.- Validation Of System Architectures Against Requirements.- A Few Reflections Regarding Assessment in an E-learning Environment.- Methods to Ensure Higher Variability of Knowledge Tests in the Moodle LMS Environment.- The Use of Virtualization and Thin Clients within the Infrastructure of Computer Labs.- Testing Mobile Agents on the Azul Platform.- Support of Relational Algebra Knowledge Assessment.- On Synergy of Motivational Projects and Agile Software Development Practices.- Expert System as the Tool for Information Asymmetry Reduction on RCBS Market in EU.- Instructional Design for Building Entrepreneurial Competency in Romania: First Stage Research Framework and Results.- Security Requirements for Internet Voting Systems.- A Multi-Algorithm, High Reliability Steganalyzer Based on Services Oriented Architecture.- A Quality Model of Metamodeling Systems.- Selection of Appropriate Data Storage for Wavelet Transform Coefficients.- Drug Delivery by Electroporation: Review.- Wine Maturation using Electric Field.- A Computational Intelligence Approach for Forecasting Telecommunications Time Series.- Designing a Networking Tool for Automatic Domain Zone Updating.- Open Source Software Development: Exploring Research Perspectives.- Informal Instructional Design to Engage and Retain Students in Engineering.- TCP with Advanced Window", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/1/46/143/557/1461435579_b.jpg", "price_data" : { "retail_price" : "219.99", "online_price" : "219.99", "our_price" : "219.99", "club_price" : "219.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering|Tarek Sobh

Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Customized Opinion Mining using Intelligent Algorithms.- Information Security Measurement Roles and Responsibilities.- Service and Information Security Improvement by Collaborative Business Process Management.- Software Design for Dynamic Stitching of Multi-spectral Images of Field Crops.- Teaching Robotics to Students with Mixed Interests.- An Initial Study Identifying Trends in Test Case Selection.- Providing Strategies for Education in Engineering for Virtual Team Development.- New Automated Assembly Model Based On Automated Rout Card Scheme.- On Using a Semiotic Quality Framework to Evaluate the Quality of Conceptual Database Schemas.- Pareto Front Investigation of Multivariable Control Systems.- Multi-objective Performance Evaluation of Controllers for a Thermal Process.- Design Considerations for Generalized Predictive Controllers and Systems with Fractional Dead Time.- R-Mesh Simulator Using C++.- Image Pre-compensation for Visually Impaired Computer Users with Variable Pupil Size.- Digital Filtering of the Pupil Diameter Signal for Affective Assessment of a Computer User.- TCCT: A GUI Table Comparison Computer Tool.- Information Management for Holistic, Collaborative Information Security Management.- Towards Passive Walking for the Fully-actuated Bi-ped Robot Nao.- The Multi GPU Accelerated Waveform Inversion in Distributed OpenCL Environment.- The Analysis of the Efficiency of Parallelization of Existing Serial Code on the Basis of Seismic Migration.- A Cluster Analysis for Determining the Effects of Codes of Conduct in the Business Administration.- Playing With Numbers: Development Issues and Evaluation Results of a Computer Game for Primary School Students.- Reverse Auctions: How Electronic Auctions Can Aid Governments in Significantly Cutting Their Procurement Spending and Introduce Greater Competition in Public Sector Contracting.-Models for Some Smart Toys and Extensions.- Matrix-based Methods for Supporting Logic Planning of IT Projects.-From Three Dimensional Document Circulation Diagram into UML Diagrams.- Operating System for Wireless Embedded Systems Powered by Energy Harvesters.- Data Transformation and Data Transitive Techniques for Protecting Sensitive Data in Privacy Preserving Data Mining.- Handling Maintenance Projects with Matrix-based Methods.- Computer Aided Diagnostic Methods to Forecast Condition-based Maintenance Tasks.- On Numerical Approach to Stochastic Systems Modeling.- An Advanced DSS for Classification of Multiple-Sclerosis Lesions in MR Images.- E-learning Software for Students with Autism.- Steganography and Steganalysis: Current Status and Future Directions.- Validation Of System Architectures Against Requirements.- A Few Reflections Regarding Assessment in an E-learning Environment.- Methods to Ensure Higher Variability of Knowledge Tests in the Moodle LMS Environment.- The Use of Virtualization and Thin Clients within the Infrastructure of Computer Labs.- Testing Mobile Agents on the Azul Platform.- Support of Relational Algebra Knowledge Assessment.- On Synergy of Motivational Projects and Agile Software Development Practices.- Expert System as the Tool for Information Asymmetry Reduction on RCBS Market in EU.- Instructional Design for Building Entrepreneurial Competency in Romania: First Stage Research Framework and Results.- Security Requirements for Internet Voting Systems.- A Multi-Algorithm, High Reliability Steganalyzer Based on Services Oriented Architecture.- A Quality Model of Metamodeling Systems.- Selection of Appropriate Data Storage for Wavelet Transform Coefficients.- Drug Delivery by Electroporation: Review.- Wine Maturation using Electric Field.- A Computational Intelligence Approach for Forecasting Telecommunications Time Series.- Designing a Networking Tool for Automatic Domain Zone Updating.- Open Source Software Development: Exploring Research Perspectives.- Informal Instructional Design to Engage and Retain Students in Engineering.- TCP with Advanced Window

This item is Non-Returnable

Details

  • ISBN-13: 9781461435570
  • ISBN-10: 1461435579
  • Publisher: Springer
  • Publish Date: August 2012
  • Dimensions: 9.21 x 6.14 x 2.38 inches
  • Shipping Weight: 4.01 pounds
  • Page Count: 1169

Related Categories

You May Also Like...

    1

BAM Customer Reviews