top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Iran University of Science and Technology, Tehran, Iran, Dec. 22nd, 2017 / / IEEE
2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Iran University of Science and Technology, Tehran, Iran, Dec. 22nd, 2017 / / IEEE
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2017
Descrizione fisica 1 online resource (vi, 564 pages)
Disciplina 620
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-5386-2640-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996279525103316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Iran University of Science and Technology, Tehran, Iran, Dec. 22nd, 2017 / / IEEE
2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Iran University of Science and Technology, Tehran, Iran, Dec. 22nd, 2017 / / IEEE
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2017
Descrizione fisica 1 online resource (vi, 564 pages)
Disciplina 620
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-5386-2640-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910265159303321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AIKE 2018 : 2018 first IEEE International Conference on Artificial Intelligence and Knowledge Engineering : proceedings : 26-28 September 2018, Laguna Hills, California, USA / / IEEE Computer Society
AIKE 2018 : 2018 first IEEE International Conference on Artificial Intelligence and Knowledge Engineering : proceedings : 26-28 September 2018, Laguna Hills, California, USA / / IEEE Computer Society
Pubbl/distr/stampa Los Alamitos, California : , : IEEE Computer Society, , 2018
Descrizione fisica 1 online resource (262 pages)
Disciplina 006.3
Soggetto topico Artificial intelligence
Knowledge management - Data processing
ISBN 1-5386-9555-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280361203316
Los Alamitos, California : , : IEEE Computer Society, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
AIKE 2018 : 2018 first IEEE International Conference on Artificial Intelligence and Knowledge Engineering : proceedings : 26-28 September 2018, Laguna Hills, California, USA / / IEEE Computer Society
AIKE 2018 : 2018 first IEEE International Conference on Artificial Intelligence and Knowledge Engineering : proceedings : 26-28 September 2018, Laguna Hills, California, USA / / IEEE Computer Society
Pubbl/distr/stampa Los Alamitos, California : , : IEEE Computer Society, , 2018
Descrizione fisica 1 online resource (262 pages)
Disciplina 006.3
Soggetto topico Artificial intelligence
Knowledge management - Data processing
ISBN 1-5386-9555-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910293156803321
Los Alamitos, California : , : IEEE Computer Society, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Tehran, Iran, Nov. 5-6th, 2015, Iran University of Science and Technology / / Behzad Moshiri, conference chair
Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Tehran, Iran, Nov. 5-6th, 2015, Iran University of Science and Technology / / Behzad Moshiri, conference chair
Autore Moshiri Behzad
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , [2015]
Descrizione fisica 1 online resource (1207 pages) : illustrations
Disciplina 658.4038
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-4673-6506-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1-Decomposed Fuzzy PID Controller for Power Inverters Regulation: An Overview -- 2-Electrical Energy Consumption Forecasting for Turkey using Grey Forecasting Technics with Rolling Mechanism -- 3-A high dynamic range CMOS image sensor with a novel pixel-level logarithmic counter memory -- 4-Adoption of e-Procurement Systems in Developing Countries: A Nigerian Public Sector Perspective -- 5-Bad data detection and identification in power system state estimation with network parameters uncertainty -- 6-Design and Simulation of A Low Power RF Front- End for Short Range Outdoor Applications -- 7-An FPGA-based Technique for Linearizing RF Power Amplifiers -- 8-Real time eye detection using edge detection and euclidean distance -- 9-Using Risk Management to Balance Agile Methods -- 10-Knowledge uncertainty supervision in automatic control and measurements -- 11-Absorptive capacity: a hub of Blue Ocean and red ocean strategies and capability transformation in innovative business environments -- 12-Impedance Matching Networks for Current Output Integrated Circuits -- 13-SDD: A Skin Detection Dataset for Training and Assessment of Human Skin Classifiers -- 14-Using micro-blogging to dismantle knowledge hierarchies in product development teams -- 15-Developing a Teaching Framework to support software inspection -- 16-Distributed Wideband Power Amplifier Using Reactive Coupled Line Feedback Structure -- 17-Performance Analysis of Microsystems in the Presence of Pull-In Instability -- 18-Chattering Analysis of Second Order Sliding Mode Algorithms for Linear Plants with Disturbance -- 19-A semi-blind watermarking algorithm for color images using chaotic maps -- 20-PSWG: An Automatic Stop-word List Generator for Persian Information Retrieval Systems Based on Similarity Function & POS Information -- 21-Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks -- 22-A supervisory control strategy for visibility maintenance in the leader-follower formation -- 23-Synchronization of Chaotic Gyroscopes via an Adaptive Robust Controller -- 24-Investigation of problems related to open-innovation in research organizations -- 25-A trust model for resource selection in cloud computing environment -- 26-A novel LBP method for invariant texture classification -- 27-A novel CMC based method for MRI brain image segmentation -- 28-Estimation of project completion time using proper fuzzy combination of regression methods -- 29-Cloud-based load testing method for web services with VMs management -- 30-A Image Steganography Scheme Based On Discrete Wavelet Transform Using Lattice Vector Quantization And Reed-Solomon Encoding -- 31-An Assessment of the Effect of e-service quality management on the organizational performance -- 32-A conceptual model on customers lifestyles and purchase from the virtual stores -- 33-A new robust and non-blind digital image watermarking scheme based on integer wavelet transform -- 34-AdjusƟng the Electric Field and Voltage DistribuƟon Along a 400 kV Transmission Line Composite Insulator Using Corona Ring -- 35-A Query Ontology to Facilitate Web Service Discovery -- 36-Automatic MRI Image Threshold using Fuzzy Support Vector Machines -- 37-An overview of some of the QoS routing protocols in wireless sensor networks -- 38-A fault-tolerant rouƟng algorithm in 3D topology manycore processors -- 39-Automatic MRI Image Segmentation using Water Flow like Algorithm and Fuzzy Entropy -- 40-Design of a Control System for Dual-buck Inverters Used in Grid-connection Applications -- 41-Developing a hybrid method for solving optimal control problems of the musculoskeletal system of the human body: Combination of linear and angular actuators -- 42-Real Time Earthquake Prediction Using Cross-Correlation Analysis & Transfer Function Model -- 43-An Intelligent Interactive Marketing System based-on Internet of Things (IoT) -- 44-fMRI Brain Decoding of Facial Expressions Based on Multi-voxel Pattern Analysis -- 45-PTokenizer: POS Tagger Tokenizer -- 46-An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's Law -- 47-Trust Prediction in Multiplex Networks -- 48-A hybrid method based on neural networks and a metaheuristic bat algorithm for stock price prediction -- 49-Twisting control algorithm for the yaw and pitch tracking of a Twin rotor UAV -- 50-Motion Planning for an Autonomous Underwater Vehicle -- 51-A new system for discovering usage profiles -- 52-An Analytical Method to Optimal Allocation of Wind based-DG Considering Time-Varying Load Model in Radial Distribution Systems -- 53-Optimal Allocation of Wind-based DG based on Analytical Expression With Time-Varying Combined Generation-Load Models in Distribution Networks -- 54-Breast Cancer Diagnosis Using , Grey-level Cooccurrence Matrices , Decision Tree Classification and Evolutionary Feature Selection -- 55-Chaos Control of Permanent Magnet Synchronous Motors using Single Feedback Control -- 56-A Component-Based Content Distribution Network Architecture in Cloud Environments -- 57-PI control method based storage to control the microgrid in a state separated from the main network -- 58-Smart way to verify the identity of the sound, based on neural network technique Identification by Voice -- 59-The Impact of Shunt-FACTS Devices on Distance Relay Performance -- 60-Effect of Unbalanced Load on the Performance of Islanding Detection Methods -- 61-A Novel Fake Color Scheme Based on Depth Protection for MR Passive/Optical Sensors -- 62-Outage Study of Cognitive Relay Network with Multiple Primary Users and Outdated CSI -- 63-Design of a Fully Differential Current Buffer (FDCB) based on a new Common Mode Feedforward (CMFF) based Common Mode Separation Technique -- 64-The Combination of Load Shedding and Removal of Capacitors in Under Frequency Situations -- 65-A Proposed Architecture for Soft Computing in Smart Grid as a Cloud-based Service -- 66-Enhancing LDA-based Discrimination of Left and Right Hand Motor Imagery: Outperforming the Winner of BCI Competition II -- 67-Multi-User Searchable Encryption Scheme with General Access Structure -- 68-Transient modeling of transmission lines components with respect to corona phenomenon and grounding system to reduce the transient voltages caused by lightning Impulse -- 69-Cuckoo Search Algorithm and Its Application for Secondary Protein Structure Prediction -- 70-A Low-Voltage High-Speed High-Linearity MOSFET-Only Analog Bootstrapped Switch for Sample-and-Hold Circuits -- 71-Control of the Blood Glucose Level in Diabetic Patient Using Predictive Controller and delay differential equation -- 72-Investigation of Very Fast Transient over Voltages in Gas Insulated Substations -- 73-Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images -- 74-Optimal the added Relay node placement using GELS to increase the lifetime of wireless sensor network -- 75-Design and fabrication of a robot for neurorehabilitation;Smart RoboWrist -- 76-Performance evaluaƟon of the OFDM modulaƟon in IEEE 802.11-based wireless industrial networks -- 77-Outage Constrained Multi-hope Spectrum Sharing System with Co-Channel Interference -- 78-Novel Voltage Control Method in Distribution Networks with DG resources -- 79-A Survey on Bone Metastasis by Finite Difference Method -- 80-Adaptive control of human posture in a specific movement -- 81-A new multi-focus image fusion technique based on variance in DCT domain -- 82-Enhancement Lifetime of Wireless Sensor Networks with Mobile Sink Managed and Improved Routing and Control Power Consumption -- 83-New Method for Management of Moving Objects Trajectories in Intelligent Transportation Systems -- 84-Improving Routing in Wireless Sensor Networks having Mobile Sinks through Fuzzy Algorithm -- 85-A Modified Ant Colony Based Approach to Digital Image Edge Detection -- 86-Enhancing Path-Oriented Test Data Generation
Using Adaptive Random Testing Techniques -- 87-A novel delay based scheduling algorithm for video traffic in LTE -- 88-On the performance evaluation of hybrid decodeamplify-forward relaying protocol with adaptive M-QAM modulation over Rayleigh fading channels -- 89-Implementation of indirect rotor-flux-oriented control in induction machine using fuzzy logic based on TLBO -- 90-New Hybrid Evolutionary Biclustring Algorithm Based on Transposed Virtual Error -- 91-Service composition with knowledge.
of quality in the cloud Environment using the cuckoo optimization and artificial bee colony algorithms -- 92-Variable step size modified clipped LMS algorithm -- 93-A new local distace-based outlier detection approach for fuzzy data by vertex metric -- 94-Compromise between economic dispatching and improvement of voltage profile using PSO algorithm in IEEE standard network -- 95-Using patient's speech signal for vocal ford disorders detection based on lifting scheme -- 96-Parallel genetic algorithm based on GPU for solving quadratic assignment problem -- 97-Determining the window size based on modiĮed 45o rotation skeleton-based region method -- 98-Classification of Radar Clutters With Artificial Neural Network -- 99-State feedback time-optimal controller for linear systems with input delay -- 100-Wideband noise Įgure low noise ampliĮer design for 3.5-4.5 GHz -- 101-Estimating the time of a change in Poisson rate parameter with a genetic algorithm -- 102-An investigation on length variation and its effect on positioning of the linkages of a robot mechanical manipulator (RRT) using direct dynamic method -- 103-Energy-aware method in connected asymmetrical point Coverage wireless sensor network using ant colony Algorithm -- 104-Manifold Based Persian Digit Recognition Using the Modified Locally Linear Embedding and Linear Discriminative Analysis -- 105-A novel dynamic multi-hop Clustering Protocol based on Renewable Energy for Energy Harvesting wireless sensor networks -- 106-Image Segmentation Using a Modified Fuzzy C-Means Clustering -- 107-Multi-focus image fusion in DCT domain based on correlation coefficient -- 108-Fuzzy Based Controller Design for Parallel Hybrid Electric Vehicle -- An Approach to Fuel Consumption and Emission Reduction -- 109-Modeling and Transient analysis of Overhead Transmission Lines Considering Corona Phenomenon and Skin Effect -- 110-Controller Placement in Software-Defined WAN Using Multi Objective Genetic Algorithm -- 111-A Hybrid NSGA-II for Solving MultiObjective Controller Placement in SDN -- 112-Sensor Localization for Cooperative Spectrum Sensing in the Network with Random Geometric primary -- 113-Fault tolerant control system design by using adaptive observer, case study: civilian aircraft -- 114-Influence of Stone Wales defect on magnetic resistance of zigzag graphene nanoribbons -- 115-Algorithm to improve job scheduling problem in cloud computing environment -- 116-Simulation of DAC-based truncated sinc excitation pulse generator -- 117-Smart on-board UAV system: Using computer vision system to find a movable and stationary target -- 118-An approach to reduce cold start in compound recommender systems using semantic technology and social -- 119-Using salt and pepper noise detection and removal based on neighbor pixels in gray-scale images -- 120-The comparison of two approaches Jiles-Atherton and Preisach in simulating hysteresis cycle -- 121-Optimization of Hybrid PV-Battery Storage System Using New Hunting Search Algorithm with considering reliability -- 122-Automatic loop detection in the Sequence of system calls -- 123-Comparison of the accuracy of effort estimation methods -- 124-Scaled Consensus of Multi-agent Systems Under Time-varying Delay -- 125-A Framework for Improving Find Best Marketing Targets Using a Hybrid Genetic Algorithm and Neural Networks -- 126-Improving resource management of IaaS Providers in Cloud Federation -- 127-LARFH: provisioning dynamic approach based on learning automata for data fault-tolerance in the cloud storage -- 128-Formal Verification of UML Statecharts using the LOTOS Formal Language -- 129-Automatic Identification of chromosomal abnormalities in metaphase karyotype Using paired images in human chromosomes -- 130-A MapReduce-based online Image Retrieval System using Bag-of-Words Model -- 131-Analysis of the dynamic behavior of induction motors by changing the parameters of feedback linearization strategy -- 132-A recommender system by using classification based on frequent paƩern mining and J48 algorithm -- 133-A Genesio-Tesi Chaotic Control Using An Adaptive-Neural Observer Based RISE Controller -- 134-Wing rock suppression via backstepping controller -- 135-Automatic verification of uml state chart by bogor model checking tool -- Automatic formal verification of network and distributed systems -- 136-Channel estimation with adaptive incremental strategy over distributed sensor networks -- 137-Comparative approach to web application firewalls -- 138-A Novel Control Strategy Based on Fuzzy Logic for Switched Reluctance Machine in Battery Charging Mode -- 139-SystemaƟc literature review in the area of Enterprise Architecture during past 10 years -- 140-Studying the deficiencies and problems of different architecture in developing distributed systems and analyze the existing solution -- 141-Deadline-constrained workflow scheduling using imperialist competitive algorithm on infrastructure as a service clouds -- 142-A new algorithm for mining frequent patterns in Can Tree -- 143-Brain extraction using isodata clustering algorithm aided by histogram analysis -- 144-Query or Spam: Detecting fraudulent web requests using stream clustering -- 145-Towards automatic generation of formal specifications for UML consistency verification -- 146-Applying of PID, FPID, TID and ITID controllers on AVR system using particle swarm optimization (PSO) -- 147-Task priority and self-organization mechanism in holarchy architecture -- 148-Robust Speed Control of Induction Machine Using Synergetic Controller -- 149-Artificial Real Time Digital Control of Asynchronous Machine -- 150-A Neural-Network based gender detection algorithm on full-face photograph -- 151-Segmentation of Breast Images to find the Lesions using the Decreased Neighborhood Graph algorithm -- 152-Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs -- 153-A 2.8-10.6GHz Low-Power Low-Noise Amplifier for Ultra-Wideband Receivers -- 154-Comparison between Performance of Conventional,Fuzzy and Fractional Order PID Controllers in Practical Speed Control of Induction Motor -- 155-An Adaptive Search Engine Considering User's Community -- 156-Breast cancer detection in mammograms using Wavelet and Contourlet transformations -- 157-Fuel Oil leak Detection in Power Plant with Recurrent Neural Network and Execute in Programmable Logic Controller -- 158-Sensor-less Control of Nonlinear Systems in Brunovsky Form Using Super-twisting Differentiator -- 159-Adaptive and Distributed TDMA Scheduling Protocol for mobile ad hoc networks (MANET) -- 160-Combining wireless sensor networks and cloud computing: security perspective -- 161-Numerical investigation of water drop movement within a microchannel under electrowetting phenomenon -- 162-An Improvement on LEACH Protocol (EZ-LEACH) -- 163-Energy Efficient Spherical Divisions for VBF-based Routing in Dense UWSNs -- 164-A powerful novel method for ECG signal de-noising using different thresholding and Dual Tree Complex Wavelet Transform -- 165-A new method for solving the open shop scheduling using imperialist competitive algorithm and tabu search with regard to maintenance of machine -- 166-Image Processing Techniques for Classification of Linear Welding Defects -- 167-A New Approach to Improve Load Balancing for Increasing Fault Tolerance and Decreasing Energy Consumption in Cloud Computing -- 168-A Robust Image Watermarking Scheme Based on Discrete Wavelet Transforms -- 169-A New Method to Enhance the Efficiency of peer-to-peer Vehicular Networks -- 170-A New Inexpensive System For SHM Of Bridge Decks Using Wireless Sensor Networks Based On Measurements Of Temperature And Humidity -- 171-E-Mail Spam Detection Based on Part of Speech Tagging -- 172-Web Content Extraction Using Contextual Rules -- Sirjan University of Technology, Sirjan, Iran -- 173-Game Theoretic Approaches In Modeling and Solving Smart Grid Issues -- 174-IPv6 Based RouƟng in
Building AutomaƟon Network -- 175-Designing and implementation of Fuzzy Expert system for diagnosis of Herpes Zoster -- 176-Design of a System for Enhancing Web Page Readability -- 177-Low-rate False Alarm Intrustion Detection System with Genetic Algorithm Approach -- 178-Evaluation of the Algorithms of Face Identification -- 179-Using of Emotion Mining Techniques for Opinions Analysis on the Issue of Hijab -- 180-The XMLization of a Dependency Treebank in CoNLL Format for Evaluating.
Linguistic Queries using XQuery -- 181-A Machine Vision System for Defect Detection of a Traveling Grate Conveyor -- 182-A Modified Digital to Digital Encoding Method to Improve the Wireless Body Area Network (WBAN) Transmission -- Young Researchers and Elite Club, Ashtian Branch, Islamic Azad University, Ashtian, Iran -- 183-A Method for Securing Username and Password gainst the KeyLogger Software Using the Logistic Map Chaos Function -- 184-Image Splicing Forgery Detection using Local Binary Pattern and Discrete Wavelet Transform -- 185-Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection -- 186-Investigating NFC technology from the perspective of security, analysis of attacks and existing risk -- 187-New Approaches to Fingerprint Authentication Using Software Methods Based on Fingerprint Texture -- 188-Network Security Metric Based on Attack Duration -- Islamic Azad University, South Tehran Branch, Tehran, Iran -- 189-Intelligent Rescuer Robot for Detecting Victims Accurately in Natural Disasters -- 190-Increasing energy efficiency through maximizing channel capacity with a minimum power allocation in the Femtocell network -- 191-Classification of Persian Handwritten Digits Using Spiking Neural Networks -- 192-An efficient modeling algorithm for intrusion detecƟon systems using C5.0 and Bayesian Network structures -- 193-Web Data Extraction Using Textual Anchors -- 194-Using WBAN as an intelligent adviser gadget -- 195-Hydrogen gas detection using Metal-Oxide-Semiconductor capacitor with Ni/SiO2/Si structure -- 196-Measuring electron density, electric field and temperature of a micro-discharge air plasma jet using optical emission spectroscopy -- 197-Optimizing NAO humanoid walking using ABC algorithm -- 198-Improving wireless sensor network lifetime using layering in hierarchical routing -- 199-Implementing UTM based on PfSense platform -- 200-Survey on Sequential Pattern Mining Algorithms -- 201-A two-phase Sampling Algorithm for Social Networks -- 202-An Suggested method to University Courses Presentation Based on Cart Algorithm to Pun Universities -- 203-Eīect of Doping on OpƟcal ProperƟes of In2S3 Produced Nano Layers;Chemical DeposiƟon,Kramers-Kronig Method -- 204-Effect of Doping on Optoelectronic Properties of Tin Dioxide Layers Produced by Chemical Deposition -- 205-A review of gender separation of moving faces -- 206-A Low-Phase-Noise Millimeter Wave Quadrature VCO in 180nm CMOS Process -- 207-Noisy Image Restoration Based on Optimized Cellular Neural Network -- 208-Clustering and optimal routing in wireless sensor networks using Harmony Search Algorithm -- 209-Intelligent image watermarking robust against cropping attack -- 210-Performance Evaluation of PIDD Controller for Automatic Generation Control in Interconnected Thermal System with Reheat Turbine in Deregulated Environment.
Altri titoli varianti 2015 2nd International Conference on Knowledge-Based Engineering and Innovation
Record Nr. UNINA-9910136368203321
Moshiri Behzad  
Piscataway, NJ : , : IEEE, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Tehran, Iran, Nov. 5-6th, 2015, Iran University of Science and Technology / / Behzad Moshiri, conference chair
Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Tehran, Iran, Nov. 5-6th, 2015, Iran University of Science and Technology / / Behzad Moshiri, conference chair
Autore Moshiri Behzad
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , [2015]
Descrizione fisica 1 online resource (1207 pages) : illustrations
Disciplina 658.4038
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-4673-6506-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1-Decomposed Fuzzy PID Controller for Power Inverters Regulation: An Overview -- 2-Electrical Energy Consumption Forecasting for Turkey using Grey Forecasting Technics with Rolling Mechanism -- 3-A high dynamic range CMOS image sensor with a novel pixel-level logarithmic counter memory -- 4-Adoption of e-Procurement Systems in Developing Countries: A Nigerian Public Sector Perspective -- 5-Bad data detection and identification in power system state estimation with network parameters uncertainty -- 6-Design and Simulation of A Low Power RF Front- End for Short Range Outdoor Applications -- 7-An FPGA-based Technique for Linearizing RF Power Amplifiers -- 8-Real time eye detection using edge detection and euclidean distance -- 9-Using Risk Management to Balance Agile Methods -- 10-Knowledge uncertainty supervision in automatic control and measurements -- 11-Absorptive capacity: a hub of Blue Ocean and red ocean strategies and capability transformation in innovative business environments -- 12-Impedance Matching Networks for Current Output Integrated Circuits -- 13-SDD: A Skin Detection Dataset for Training and Assessment of Human Skin Classifiers -- 14-Using micro-blogging to dismantle knowledge hierarchies in product development teams -- 15-Developing a Teaching Framework to support software inspection -- 16-Distributed Wideband Power Amplifier Using Reactive Coupled Line Feedback Structure -- 17-Performance Analysis of Microsystems in the Presence of Pull-In Instability -- 18-Chattering Analysis of Second Order Sliding Mode Algorithms for Linear Plants with Disturbance -- 19-A semi-blind watermarking algorithm for color images using chaotic maps -- 20-PSWG: An Automatic Stop-word List Generator for Persian Information Retrieval Systems Based on Similarity Function & POS Information -- 21-Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks -- 22-A supervisory control strategy for visibility maintenance in the leader-follower formation -- 23-Synchronization of Chaotic Gyroscopes via an Adaptive Robust Controller -- 24-Investigation of problems related to open-innovation in research organizations -- 25-A trust model for resource selection in cloud computing environment -- 26-A novel LBP method for invariant texture classification -- 27-A novel CMC based method for MRI brain image segmentation -- 28-Estimation of project completion time using proper fuzzy combination of regression methods -- 29-Cloud-based load testing method for web services with VMs management -- 30-A Image Steganography Scheme Based On Discrete Wavelet Transform Using Lattice Vector Quantization And Reed-Solomon Encoding -- 31-An Assessment of the Effect of e-service quality management on the organizational performance -- 32-A conceptual model on customers lifestyles and purchase from the virtual stores -- 33-A new robust and non-blind digital image watermarking scheme based on integer wavelet transform -- 34-AdjusƟng the Electric Field and Voltage DistribuƟon Along a 400 kV Transmission Line Composite Insulator Using Corona Ring -- 35-A Query Ontology to Facilitate Web Service Discovery -- 36-Automatic MRI Image Threshold using Fuzzy Support Vector Machines -- 37-An overview of some of the QoS routing protocols in wireless sensor networks -- 38-A fault-tolerant rouƟng algorithm in 3D topology manycore processors -- 39-Automatic MRI Image Segmentation using Water Flow like Algorithm and Fuzzy Entropy -- 40-Design of a Control System for Dual-buck Inverters Used in Grid-connection Applications -- 41-Developing a hybrid method for solving optimal control problems of the musculoskeletal system of the human body: Combination of linear and angular actuators -- 42-Real Time Earthquake Prediction Using Cross-Correlation Analysis & Transfer Function Model -- 43-An Intelligent Interactive Marketing System based-on Internet of Things (IoT) -- 44-fMRI Brain Decoding of Facial Expressions Based on Multi-voxel Pattern Analysis -- 45-PTokenizer: POS Tagger Tokenizer -- 46-An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's Law -- 47-Trust Prediction in Multiplex Networks -- 48-A hybrid method based on neural networks and a metaheuristic bat algorithm for stock price prediction -- 49-Twisting control algorithm for the yaw and pitch tracking of a Twin rotor UAV -- 50-Motion Planning for an Autonomous Underwater Vehicle -- 51-A new system for discovering usage profiles -- 52-An Analytical Method to Optimal Allocation of Wind based-DG Considering Time-Varying Load Model in Radial Distribution Systems -- 53-Optimal Allocation of Wind-based DG based on Analytical Expression With Time-Varying Combined Generation-Load Models in Distribution Networks -- 54-Breast Cancer Diagnosis Using , Grey-level Cooccurrence Matrices , Decision Tree Classification and Evolutionary Feature Selection -- 55-Chaos Control of Permanent Magnet Synchronous Motors using Single Feedback Control -- 56-A Component-Based Content Distribution Network Architecture in Cloud Environments -- 57-PI control method based storage to control the microgrid in a state separated from the main network -- 58-Smart way to verify the identity of the sound, based on neural network technique Identification by Voice -- 59-The Impact of Shunt-FACTS Devices on Distance Relay Performance -- 60-Effect of Unbalanced Load on the Performance of Islanding Detection Methods -- 61-A Novel Fake Color Scheme Based on Depth Protection for MR Passive/Optical Sensors -- 62-Outage Study of Cognitive Relay Network with Multiple Primary Users and Outdated CSI -- 63-Design of a Fully Differential Current Buffer (FDCB) based on a new Common Mode Feedforward (CMFF) based Common Mode Separation Technique -- 64-The Combination of Load Shedding and Removal of Capacitors in Under Frequency Situations -- 65-A Proposed Architecture for Soft Computing in Smart Grid as a Cloud-based Service -- 66-Enhancing LDA-based Discrimination of Left and Right Hand Motor Imagery: Outperforming the Winner of BCI Competition II -- 67-Multi-User Searchable Encryption Scheme with General Access Structure -- 68-Transient modeling of transmission lines components with respect to corona phenomenon and grounding system to reduce the transient voltages caused by lightning Impulse -- 69-Cuckoo Search Algorithm and Its Application for Secondary Protein Structure Prediction -- 70-A Low-Voltage High-Speed High-Linearity MOSFET-Only Analog Bootstrapped Switch for Sample-and-Hold Circuits -- 71-Control of the Blood Glucose Level in Diabetic Patient Using Predictive Controller and delay differential equation -- 72-Investigation of Very Fast Transient over Voltages in Gas Insulated Substations -- 73-Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images -- 74-Optimal the added Relay node placement using GELS to increase the lifetime of wireless sensor network -- 75-Design and fabrication of a robot for neurorehabilitation;Smart RoboWrist -- 76-Performance evaluaƟon of the OFDM modulaƟon in IEEE 802.11-based wireless industrial networks -- 77-Outage Constrained Multi-hope Spectrum Sharing System with Co-Channel Interference -- 78-Novel Voltage Control Method in Distribution Networks with DG resources -- 79-A Survey on Bone Metastasis by Finite Difference Method -- 80-Adaptive control of human posture in a specific movement -- 81-A new multi-focus image fusion technique based on variance in DCT domain -- 82-Enhancement Lifetime of Wireless Sensor Networks with Mobile Sink Managed and Improved Routing and Control Power Consumption -- 83-New Method for Management of Moving Objects Trajectories in Intelligent Transportation Systems -- 84-Improving Routing in Wireless Sensor Networks having Mobile Sinks through Fuzzy Algorithm -- 85-A Modified Ant Colony Based Approach to Digital Image Edge Detection -- 86-Enhancing Path-Oriented Test Data Generation
Using Adaptive Random Testing Techniques -- 87-A novel delay based scheduling algorithm for video traffic in LTE -- 88-On the performance evaluation of hybrid decodeamplify-forward relaying protocol with adaptive M-QAM modulation over Rayleigh fading channels -- 89-Implementation of indirect rotor-flux-oriented control in induction machine using fuzzy logic based on TLBO -- 90-New Hybrid Evolutionary Biclustring Algorithm Based on Transposed Virtual Error -- 91-Service composition with knowledge.
of quality in the cloud Environment using the cuckoo optimization and artificial bee colony algorithms -- 92-Variable step size modified clipped LMS algorithm -- 93-A new local distace-based outlier detection approach for fuzzy data by vertex metric -- 94-Compromise between economic dispatching and improvement of voltage profile using PSO algorithm in IEEE standard network -- 95-Using patient's speech signal for vocal ford disorders detection based on lifting scheme -- 96-Parallel genetic algorithm based on GPU for solving quadratic assignment problem -- 97-Determining the window size based on modiĮed 45o rotation skeleton-based region method -- 98-Classification of Radar Clutters With Artificial Neural Network -- 99-State feedback time-optimal controller for linear systems with input delay -- 100-Wideband noise Įgure low noise ampliĮer design for 3.5-4.5 GHz -- 101-Estimating the time of a change in Poisson rate parameter with a genetic algorithm -- 102-An investigation on length variation and its effect on positioning of the linkages of a robot mechanical manipulator (RRT) using direct dynamic method -- 103-Energy-aware method in connected asymmetrical point Coverage wireless sensor network using ant colony Algorithm -- 104-Manifold Based Persian Digit Recognition Using the Modified Locally Linear Embedding and Linear Discriminative Analysis -- 105-A novel dynamic multi-hop Clustering Protocol based on Renewable Energy for Energy Harvesting wireless sensor networks -- 106-Image Segmentation Using a Modified Fuzzy C-Means Clustering -- 107-Multi-focus image fusion in DCT domain based on correlation coefficient -- 108-Fuzzy Based Controller Design for Parallel Hybrid Electric Vehicle -- An Approach to Fuel Consumption and Emission Reduction -- 109-Modeling and Transient analysis of Overhead Transmission Lines Considering Corona Phenomenon and Skin Effect -- 110-Controller Placement in Software-Defined WAN Using Multi Objective Genetic Algorithm -- 111-A Hybrid NSGA-II for Solving MultiObjective Controller Placement in SDN -- 112-Sensor Localization for Cooperative Spectrum Sensing in the Network with Random Geometric primary -- 113-Fault tolerant control system design by using adaptive observer, case study: civilian aircraft -- 114-Influence of Stone Wales defect on magnetic resistance of zigzag graphene nanoribbons -- 115-Algorithm to improve job scheduling problem in cloud computing environment -- 116-Simulation of DAC-based truncated sinc excitation pulse generator -- 117-Smart on-board UAV system: Using computer vision system to find a movable and stationary target -- 118-An approach to reduce cold start in compound recommender systems using semantic technology and social -- 119-Using salt and pepper noise detection and removal based on neighbor pixels in gray-scale images -- 120-The comparison of two approaches Jiles-Atherton and Preisach in simulating hysteresis cycle -- 121-Optimization of Hybrid PV-Battery Storage System Using New Hunting Search Algorithm with considering reliability -- 122-Automatic loop detection in the Sequence of system calls -- 123-Comparison of the accuracy of effort estimation methods -- 124-Scaled Consensus of Multi-agent Systems Under Time-varying Delay -- 125-A Framework for Improving Find Best Marketing Targets Using a Hybrid Genetic Algorithm and Neural Networks -- 126-Improving resource management of IaaS Providers in Cloud Federation -- 127-LARFH: provisioning dynamic approach based on learning automata for data fault-tolerance in the cloud storage -- 128-Formal Verification of UML Statecharts using the LOTOS Formal Language -- 129-Automatic Identification of chromosomal abnormalities in metaphase karyotype Using paired images in human chromosomes -- 130-A MapReduce-based online Image Retrieval System using Bag-of-Words Model -- 131-Analysis of the dynamic behavior of induction motors by changing the parameters of feedback linearization strategy -- 132-A recommender system by using classification based on frequent paƩern mining and J48 algorithm -- 133-A Genesio-Tesi Chaotic Control Using An Adaptive-Neural Observer Based RISE Controller -- 134-Wing rock suppression via backstepping controller -- 135-Automatic verification of uml state chart by bogor model checking tool -- Automatic formal verification of network and distributed systems -- 136-Channel estimation with adaptive incremental strategy over distributed sensor networks -- 137-Comparative approach to web application firewalls -- 138-A Novel Control Strategy Based on Fuzzy Logic for Switched Reluctance Machine in Battery Charging Mode -- 139-SystemaƟc literature review in the area of Enterprise Architecture during past 10 years -- 140-Studying the deficiencies and problems of different architecture in developing distributed systems and analyze the existing solution -- 141-Deadline-constrained workflow scheduling using imperialist competitive algorithm on infrastructure as a service clouds -- 142-A new algorithm for mining frequent patterns in Can Tree -- 143-Brain extraction using isodata clustering algorithm aided by histogram analysis -- 144-Query or Spam: Detecting fraudulent web requests using stream clustering -- 145-Towards automatic generation of formal specifications for UML consistency verification -- 146-Applying of PID, FPID, TID and ITID controllers on AVR system using particle swarm optimization (PSO) -- 147-Task priority and self-organization mechanism in holarchy architecture -- 148-Robust Speed Control of Induction Machine Using Synergetic Controller -- 149-Artificial Real Time Digital Control of Asynchronous Machine -- 150-A Neural-Network based gender detection algorithm on full-face photograph -- 151-Segmentation of Breast Images to find the Lesions using the Decreased Neighborhood Graph algorithm -- 152-Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs -- 153-A 2.8-10.6GHz Low-Power Low-Noise Amplifier for Ultra-Wideband Receivers -- 154-Comparison between Performance of Conventional,Fuzzy and Fractional Order PID Controllers in Practical Speed Control of Induction Motor -- 155-An Adaptive Search Engine Considering User's Community -- 156-Breast cancer detection in mammograms using Wavelet and Contourlet transformations -- 157-Fuel Oil leak Detection in Power Plant with Recurrent Neural Network and Execute in Programmable Logic Controller -- 158-Sensor-less Control of Nonlinear Systems in Brunovsky Form Using Super-twisting Differentiator -- 159-Adaptive and Distributed TDMA Scheduling Protocol for mobile ad hoc networks (MANET) -- 160-Combining wireless sensor networks and cloud computing: security perspective -- 161-Numerical investigation of water drop movement within a microchannel under electrowetting phenomenon -- 162-An Improvement on LEACH Protocol (EZ-LEACH) -- 163-Energy Efficient Spherical Divisions for VBF-based Routing in Dense UWSNs -- 164-A powerful novel method for ECG signal de-noising using different thresholding and Dual Tree Complex Wavelet Transform -- 165-A new method for solving the open shop scheduling using imperialist competitive algorithm and tabu search with regard to maintenance of machine -- 166-Image Processing Techniques for Classification of Linear Welding Defects -- 167-A New Approach to Improve Load Balancing for Increasing Fault Tolerance and Decreasing Energy Consumption in Cloud Computing -- 168-A Robust Image Watermarking Scheme Based on Discrete Wavelet Transforms -- 169-A New Method to Enhance the Efficiency of peer-to-peer Vehicular Networks -- 170-A New Inexpensive System For SHM Of Bridge Decks Using Wireless Sensor Networks Based On Measurements Of Temperature And Humidity -- 171-E-Mail Spam Detection Based on Part of Speech Tagging -- 172-Web Content Extraction Using Contextual Rules -- Sirjan University of Technology, Sirjan, Iran -- 173-Game Theoretic Approaches In Modeling and Solving Smart Grid Issues -- 174-IPv6 Based RouƟng in
Building AutomaƟon Network -- 175-Designing and implementation of Fuzzy Expert system for diagnosis of Herpes Zoster -- 176-Design of a System for Enhancing Web Page Readability -- 177-Low-rate False Alarm Intrustion Detection System with Genetic Algorithm Approach -- 178-Evaluation of the Algorithms of Face Identification -- 179-Using of Emotion Mining Techniques for Opinions Analysis on the Issue of Hijab -- 180-The XMLization of a Dependency Treebank in CoNLL Format for Evaluating.
Linguistic Queries using XQuery -- 181-A Machine Vision System for Defect Detection of a Traveling Grate Conveyor -- 182-A Modified Digital to Digital Encoding Method to Improve the Wireless Body Area Network (WBAN) Transmission -- Young Researchers and Elite Club, Ashtian Branch, Islamic Azad University, Ashtian, Iran -- 183-A Method for Securing Username and Password gainst the KeyLogger Software Using the Logistic Map Chaos Function -- 184-Image Splicing Forgery Detection using Local Binary Pattern and Discrete Wavelet Transform -- 185-Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection -- 186-Investigating NFC technology from the perspective of security, analysis of attacks and existing risk -- 187-New Approaches to Fingerprint Authentication Using Software Methods Based on Fingerprint Texture -- 188-Network Security Metric Based on Attack Duration -- Islamic Azad University, South Tehran Branch, Tehran, Iran -- 189-Intelligent Rescuer Robot for Detecting Victims Accurately in Natural Disasters -- 190-Increasing energy efficiency through maximizing channel capacity with a minimum power allocation in the Femtocell network -- 191-Classification of Persian Handwritten Digits Using Spiking Neural Networks -- 192-An efficient modeling algorithm for intrusion detecƟon systems using C5.0 and Bayesian Network structures -- 193-Web Data Extraction Using Textual Anchors -- 194-Using WBAN as an intelligent adviser gadget -- 195-Hydrogen gas detection using Metal-Oxide-Semiconductor capacitor with Ni/SiO2/Si structure -- 196-Measuring electron density, electric field and temperature of a micro-discharge air plasma jet using optical emission spectroscopy -- 197-Optimizing NAO humanoid walking using ABC algorithm -- 198-Improving wireless sensor network lifetime using layering in hierarchical routing -- 199-Implementing UTM based on PfSense platform -- 200-Survey on Sequential Pattern Mining Algorithms -- 201-A two-phase Sampling Algorithm for Social Networks -- 202-An Suggested method to University Courses Presentation Based on Cart Algorithm to Pun Universities -- 203-Eīect of Doping on OpƟcal ProperƟes of In2S3 Produced Nano Layers;Chemical DeposiƟon,Kramers-Kronig Method -- 204-Effect of Doping on Optoelectronic Properties of Tin Dioxide Layers Produced by Chemical Deposition -- 205-A review of gender separation of moving faces -- 206-A Low-Phase-Noise Millimeter Wave Quadrature VCO in 180nm CMOS Process -- 207-Noisy Image Restoration Based on Optimized Cellular Neural Network -- 208-Clustering and optimal routing in wireless sensor networks using Harmony Search Algorithm -- 209-Intelligent image watermarking robust against cropping attack -- 210-Performance Evaluation of PIDD Controller for Automatic Generation Control in Interconnected Thermal System with Reheat Turbine in Deregulated Environment.
Altri titoli varianti 2015 2nd International Conference on Knowledge-Based Engineering and Innovation
Record Nr. UNISA-996280071803316
Moshiri Behzad  
Piscataway, NJ : , : IEEE, , [2015]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Developments in information and knowledge management for business applications . Volume 4 / / Natalia Kryvinska and Michal Gregus
Developments in information and knowledge management for business applications . Volume 4 / / Natalia Kryvinska and Michal Gregus
Autore Kryvinska Natalia
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (623 pages)
Disciplina 005.8
Collana Studies in Systems, Decision and Control
Soggetto topico Information technology - Security measures
Knowledge management - Data processing
ISBN 3-030-95813-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Implementation of eProcurement and eBusiness in Supply Chain Management -- 1 Introduction -- 1.1 Analysis -- 1.2 Keywords -- 1.3 Search Terms -- 2 Analysis -- 2.1 Year -- 2.2 Type of Publication -- 2.3 Authors -- 2.4 Publisher -- 2.5 Digital Libraries -- 2.6 Keywords Hits -- 3 Conclusion -- References -- IoT Project: Smart Parking -- 1 Introduction -- 1.1 What is a Smart City and a Smart Parking -- 1.2 The Need of Smart Cities -- 1.3 How Can IoT Improve Life in Smart Cities -- 1.4 Example of Smart Cities Around the World -- 1.5 IoT Security Threats Concerning Smart Parking -- 2 Goal of the Project -- 3 Categorisation of Parking Systems -- 4 Smart Parking Algorithms in the Literature -- 4.1 Car Parking System Based on Vehicular Sensor Networks -- 4.2 Cloud Based Parking System with Reduced Customer Waiting Time -- 4.3 Smart Parking as an Off-Line Problem -- 4.4 Smart Parking with Distributed Intelligent Transportation Systems (ITS) -- 5 The Technology Stack -- 6 Tests -- 6.1 Software Tests -- 6.2 Hardware Tests -- 6.3 End-To-End Tests -- 7 Comparative Analysis of Existing Algorithms -- 8 Conclusions -- References -- Effects of Theft on the Critical Path of Construction Projects -- 1 Introduction -- 1.1 Relevance and Problem -- 1.2 The Research Question (Simplified) -- 2 Background -- 2.1 The Critical Path (CP) -- 2.2 Sudden Changes Versus Disruption Resp. Delay -- 2.3 Collapse of the Municipal Archive of Cologne City (Extreme Example) -- 2.4 Damages not Only to the Subcontractor -- 2.5 Known and Unknown Measures to Prevent Theft and Burglary -- 3 Research Methodology -- 3.1 The Applicable Research Methodology -- 3.2 Literature Review -- 3.3 Qualitative Data -- 3.4 Quantitative Data -- 4 Conclusion -- 4.1 Summary -- 4.2 Further Research and Limitation -- References -- Cloud in the Wallet -- 1 Introduction.
2 Literature Review -- 2.1 Existing Solutions -- 3 Method and Application -- 3.1 OwnCloud-Technology Details -- 3.2 The Proposed Model -- 3.3 Implementation of the Proposed Model -- 4 Evaluation and Results -- 4.1 Testing -- 4.2 Security Options of OwnCloud -- 5 Conclusion -- References -- Internet of Things & -- Waste Management -- 1 Introduction -- 1.1 Relevance -- 1.2 Goals and Objectives -- 2 Introduction to IoT -- 3 IoT Architecture -- 3.1 Sensors, Actuators and the Edge -- 3.2 Connectivity, Network Communication and the Fog -- 3.3 Applications, Analytics and the Cloud -- 3.4 OneM2M IoT Standardized Architecture -- 3.5 IoT World Forum Standardized Architecture -- 4 Networks -- 4.1 Proximity -- 4.2 Cellular -- 4.3 Low-Power Wide-Area (LPWA) Networks -- 4.4 Wireless Personal Area Networks (WPAN) -- 5 IoT Applications -- 5.1 Smart Cities -- 5.2 Smart Waste Management -- 6 Smart Waste Management System Functionalities -- 6.1 Fill Level Prediction-Kalman Filtering -- 6.2 Route Optimization-Vehicle Routing Problem -- 7 Conclusion -- 7.1 Synopsis -- 7.2 Further Research -- References -- The Influence of the eBusiness on the Airline Revenue Management -- 1 Introduction -- 1.1 Airline Revenue Management -- 1.2 Keywords -- 2 Hits Per Search Term -- 2.1 Hits Per Search Term with the Combination of Two Keywords -- 2.2 Hits Per Search Time with the Combination of Three Keywords -- 2.3 Hits Per Search Term with the Combination of Four Keywords -- 2.4 Hits Per Search with the Combination of All Five Keywords -- 2.5 Section Summary -- 3 Relevant Sources After Search Term -- 3.1 Classification of the Sources -- 3.2 Origin of Sources -- 3.3 Information About the Publisher -- 3.4 Information About the Journals -- 3.5 Information About the Conferences -- 3.6 Information About the Authors -- 3.7 Section Summary -- 4 Keywords -- 4.1 Relevant Keywords.
4.2 Keyword Hits of Relevant Sources -- 4.3 Keyword Hits by Publisher -- 4.4 Section Summary -- 5 Conclusion -- References -- Information Technology Architects in Agile Organizations -- 1 Introduction -- 2 Aims and Methods -- 3 Architects in Traditional and Scalable Agile Methods -- 3.1 Position and Role of Architects -- 3.2 Activities, Responsibilities and Challenges for Architects -- 3.3 Relationship Between Enterprise Architect and Product Owner -- 4 Discussion -- 5 Conclusion -- References -- Challenges and Perspectives of Effective Land Consolidation: The Case of Slovak Republic -- 1 Introduction -- 2 Land Treatment as Subject to Regulation -- 2.1 Land Treatment and Public Interest -- 2.2 Public Interest as a Legally Vague Concept -- 3 Public Participation in Environmental Protection -- 3.1 International Legislation on Environmental Protection -- 3.2 National Legislation on Environmental Protection and Access to Information on the State of the Environment -- 3.3 Assessment of the Environmental Impact of Strategy Papers and Proposed Actions -- 4 Public Participation in the Protection of the Environment in the Land Consolidation Procedure -- 4.1 Sea -- 4.2 EIA -- 5 Land Consolidation Procedure, Strategy Papers and Environmental Impact Assessment -- 5.1 Preparation, Discussion and Approval of Initial Documents -- 5.2 Developing Principles for the Location of New Plots -- 5.3 Development of Land Consolidation Project -- 5.4 Strategy Papers and Proposed Activities Assessed in Administrative Procedures Prior to Land Consolidation Under Special Regulations -- 6 Conclusion -- References -- COVID-19 Initiated Regulation Approach-A Certification Engine About Prophylactic and Current Crisis Management for Industries -- 1 Introduction -- 1.1 Relevance -- 1.2 Goals and Objectives -- 2 Theoretical and Conceptual Background.
2.1 Empowerment of the Governments-the IHR -- 2.2 Usage of Artificial Intelligence (AI) -- 2.3 Basics for Certification Framework -- 3 Conclusion -- 3.1 Synopsis -- 3.2 Further Research -- References -- Cryptocurrencies, Electronic Securities, Security Token Offerings, Non Fungible Tokens: New Legal Regulations for "Crypto Securities" and Implications for Issuers and Investor and Consumer Protection -- 1 Introduction -- 2 Theoretical Background -- 3 Cryptocurrencies -- 3.1 Cryptocurrencies as New Asset Class and as a New Alternative to Fiat Money -- 3.2 Negative Impact of Cryptocurrencies/Assets on Investor Protection -- 4 Initial Coin Offerings -- 4.1 Initial Coin Offerings (ICOs) as a New Financing Model on the Blockchain -- 4.2 Initial Coin Offerings from the Investor and Consumer Perspective -- 4.3 Stronger Future Regulation of Initial Coin Offerings Through the MICA Regulation -- 5 Security Token Offerings as a Further Development of ICOs -- 6 Electronic Securities as a Current Financing Option on the Blockchain -- 7 Non Fungible Tokens as a New Asset Class on the Blockchain -- 8 Advantages and Disadvantages of the New Models on the Blockchain for Investor and Consumer Protection -- 8.1 Greater Protection for Investors with Electronic Securities/Security Token Offerings -- 8.2 Non Fungible Tokens from the Investor's Perspective -- 9 Conclusion -- References -- The Efficiency of Transport-Management in the E-logistics Marketplace -- 1 Introduction -- 2 Analysis -- 2.1 Search Terms Table -- 2.2 Excel Table -- 3 Conclusion -- References -- Application of Latent Class Analysis in Automotive Project Management -- 1 Introduction -- 1.1 Relevance -- 2 Theoretical and Conceptual Background -- 2.1 Projects and Project Management -- 2.2 Latent Class Analysis -- 3 Application Part -- 4 Results -- 5 Discussion -- 6 Conclusion -- References.
Inter-Municipal Cooperation: A Logical Justification -- 1 Introduction -- 2 Local Government in the Global Era -- 2.1 Changing the Boundaries of Public Administration -- 2.2 Collaborative Management -- 3 Theoretical and Practical Justification of Local Self-government Reform in Terms of Inter-Municipal Cooperation -- 3.1 How Local Government Reform Can Best Serve the People -- 3.2 Size, Shape and Number of Local Governments -- 3.3 Finance and Local Government Reform -- 3.4 Professionalism and Responsibility of Local Government -- 4 Diversity in Arrangements Between Municipalities: Nature, Theory and Citizens -- 4.1 Differences in the Nature of Cooperation -- 4.2 Actors Involved in Cooperation -- 4.3 Forms of Inter-Municipal Cooperation -- 4.4 Competition and Cooperation: A Complementary Approach -- 5 Conclusion -- References -- Cohesion Policy in the Service of European Integration: The Example of Slovakia -- 1 Introduction -- 2 Brief History: From Regional Policy to Cohesion Policy -- 3 The Persistence of Regional Disparities Within the Member States of the European Union -- 3.1 A Necessary and Indispensable Policy -- 3.2 A Policy Responding to the Challenges of Tomorrow -- 4 The Challenges of Regional Policy in Slovakia -- 4.1 The Importance of Regional Policy for the Economic Development of Slovakia but the Maintenance of Significant Territorial Disparities -- 4.2 Successes and Difficulties in the Implementation of Cohesion Policy During the Period 2014-2020 -- 4.3 The Importance of Cohesion Policy in Slovakia -- 5 Conclusion -- References -- Project Patterns and Antipatterns Expert System -- 1 Introduction -- 2 IT Project Management -- 2.1 Project Life Cycle -- 2.2 Planning a Development Project -- 2.3 Risk Management -- 2.4 Critical Success Factors -- 2.5 Reasons for Failure of IT Projects -- 2.6 Patterns and Antipatterns.
2.7 Medical Notation of Patterns and Antipatterns.
Record Nr. UNINA-9910556892903321
Kryvinska Natalia  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
KBEI 2019 : 2019 IEEE 5th Conference on Knowledge Based Engineering and Innovation : February 28th & March 1st, Iran University of Science and Technology, Tehran, Iran / / Institute of Electrical and Electronics Engineers ; sponsored by Institute of Electrical and Electronics Engineers. Iran Section [and four others]
KBEI 2019 : 2019 IEEE 5th Conference on Knowledge Based Engineering and Innovation : February 28th & March 1st, Iran University of Science and Technology, Tehran, Iran / / Institute of Electrical and Electronics Engineers ; sponsored by Institute of Electrical and Electronics Engineers. Iran Section [and four others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Descrizione fisica 1 online resource (930 pages)
Disciplina 620
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-7281-0872-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910326658903321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
KBEI 2019 : 2019 IEEE 5th Conference on Knowledge Based Engineering and Innovation : February 28th & March 1st, Iran University of Science and Technology, Tehran, Iran / / Institute of Electrical and Electronics Engineers ; sponsored by Institute of Electrical and Electronics Engineers. Iran Section [and four others]
KBEI 2019 : 2019 IEEE 5th Conference on Knowledge Based Engineering and Innovation : February 28th & March 1st, Iran University of Science and Technology, Tehran, Iran / / Institute of Electrical and Electronics Engineers ; sponsored by Institute of Electrical and Electronics Engineers. Iran Section [and four others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Descrizione fisica 1 online resource (930 pages)
Disciplina 620
Soggetto topico Engineering - Technological innovations
Knowledge management - Data processing
ISBN 1-7281-0872-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996577966903316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Knowledge management in organisations : 16th International Conference, KMO 2022, Hagen, Germany, July 11-14, 2022, proceedings / / Lorna Uden, I-Hsien Ting, and Birgit Feldmann, editors
Knowledge management in organisations : 16th International Conference, KMO 2022, Hagen, Germany, July 11-14, 2022, proceedings / / Lorna Uden, I-Hsien Ting, and Birgit Feldmann, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (397 pages)
Disciplina 658.4038
Collana Communications in Computer and Information Science
Soggetto topico Knowledge management
Knowledge management - Data processing
ISBN 3-031-07920-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483157403316
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui