Shortcuts
 
PageMenu- Hauptmenü-
Page content

Kategorienanzeige

MAB

¬The¬ 9th International Conference on Computing and InformationTechnology (IC2IT2013) 9th-10th May 2013 King Mongkut's University of Technology North Bangkok
Kategorie Beschreibung
036aXA-DE
037beng
077a386987572 Buchausg. u.d.T.: ‡¬The¬ 9th International Conference on Computing and Information Technology (IC2IT2013)
087q978-3-642-37370-1
100 Meesad, Phayung
104bUnger, Herwig
108bBoonkrong, Sirapat
331 ¬The¬ 9th International Conference on Computing and InformationTechnology (IC2IT2013)
335 9th-10th May 2013 King Mongkut's University of Technology North Bangkok
410 Berlin ; Heidelberg
412 Springer
425 2013
425a2013
433 Online-Ressource (XIV, 312 p. 134 illus, digital)
451 Advances in Intelligent Systems and Computing ; 209
501 Includes author index
517 Title; Preface; Organization; Contents; Keynote Speakers; Session I: Data Network/Communication; Session II: Data Mining/Machine Learning; Session III: Human Computer Interface/Image Processing; Bipolarity in Judgments and Assessments: Towards More Realistic and Implementable Human Centric Systems; Critical Issues and Information Security and Managing Risk; Visualising the Data: Now I Understand; Improved Computational Intelligence through High Performance Distributed Computing; Lying in Group-Communication in El-Farol-Games Patterns of Successful Manipulation; Introduction and Motivation. Extending the Simulation FrameworkDecision-Making with Group Communication and Reflection; When to Lie or Not to Lie; Algorithms for Reflecting the Individual Decision; Results and Discussions; Introduction; Environmental Settings of the Simulation; Results; Conclusions and Future Work; References; Identifying Limbic Characteristics on Twitter; Introduction; Fundamentals of Limbic Type Identification; Functionality of Twitter and Its Potential for Data Analysis; The Approach of Limbic Characteristics and Limbic Types; Classification of Limbic Types on Twitter. Detecting Specific Behavior on TwitterDetecting the Limbic Type; Identified Limbic Type on Twitter; Conclusions and Future Work; References; Mobile Agent Administrator for Computers over Network (MAACN): Using the Concept of Keyboard Buffer; Introduction; System Administrator Activities; Mobile Agents; Related Work; Proposed System; Use of Keyboard Buffer by the Agents; Conclusion; Future Work; References; Impact of Multi-services over Service Provider's Local Network Measured by Passive and Active Measurements Techniques; Introduction; Related Work; Passive Measurement Techniques. Active Measurement TechniquesLocal Network Topology; Probes Installation and System Setup; Evaluation; Local Network Performance (Active Mode); Broadcast Analysis (Passive Mode); Conclusion and Future Work; References; Performance Evaluation of LEACH on Cluster Head Selection Techniques in Wireless Sensor Networks; Introduction; LEACH (Low Energy Adaptive Clustering Hierarchy); LEACH Optimization on Cluster Head Selection Techniques; LEACH with Moving Energy Window Average; Performance Evaluation; Simulation Setup; Simulation Results; Conclusions; References. Outbound Call Route Selection on IP-PBX Using Unstructured Supplementary Service DataIntroduction; IP-PBX Background Knowledge; IP-PBX; Outbound Call Routing in IP-PBX; Experimental Tools; Data Samples; Tools; Communication between USSD and GSM Network; Network Diagram of the System; IP-PBX with SIM3000CZ and USSD Technique; Results; Conclusion and Future Work; References; Using Routing Table Flag to Improve Performance of AODV Routing Protocol for VANETs Environment; Introduction; Related Works; Proposed Solution; Simulation and Evaluation; Discussion and R Result; Conclusion; References. Wireless Sensor Network Planning for Fingerprint Based Indoor Localization Using ZigBee: Empirical Study. Bipolarity in judgments and assessments: towards more realistic and implementable human centric systems -- Critical Issues and Information Security and Managing Risk -- Visualising the data: now I understand -- Improved Computational Intelligence through High Performance Distributed Computing -- Lying in group-communication in El-Farol-Games Patterns of successful manipulation -- Identifying Limbic Characteristics on Twitter -- Mobile Agent Administrator for Computers over Network (MAACN): using the concept of Keyboard Buffer Identifying Limbic Characteristics on Twitter -- Impact of Multi-Services over Service Provider's Local Network Measured by Passive and Active Measurements Techniques.
527 Buchausg. u.d.T.: ‡¬The¬ 9th International Conference on Computing and Information Technology (IC2IT2013)
540aISBN 978-3-642-37371-8
700 |UYQ
700 |COM004000
700b|004
700b|006.3
700c|Q342
700g1271119005 ST 300
750 This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.
902s 208968547 Informationstechnik
902s 208994688 Kommunikationstechnik
902s 20889196X Datennetz
902f |Kongress
907s 212347217 Data Mining
907s 21008944X Maschinelles Lernen
907s 212619101 Soft Computing
012 381118657
081 Meesad, Phayung: ¬The¬ 9th International Conference on Computing and InformationTechnology (IC2IT2013)
100 Springer E-Book
125aElektronischer Volltext - Campuslizenz
655e$uhttp://dx.doi.org/10.1007/978-3-642-37371-8
Schnellsuche