Relevance Newest First Oldest First
previous Page of 10,150
and
  1. No Access

    Book Series

    Lecture Notes on Data Engineering and Communications Technologies
  2. No Access

    Book Series

    Progress in IS
  3. No Access

    Book

    Online Intermediaries for Co-Creation

    Online Intermediaries for Co-Creation

    An Explorative Study in Healthcare

    Christoph W. Künne in Progress in IS (2018)

  4. No Access

    Book and Conference Proceedings

    Advances in Internetworking, Data & Web Technologies

    Advances in Internetworking, Data & Web Technologies

    The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT-2017)

    Leonard Barolli, Mingwu Zhang in Lecture Notes on Data Engineering and Communications Technologies (2018)

  5. No Access

    Chapter and Conference Paper

    Building Real-Time Travel Itineraries Using ‘off-the-shelf’ Data from the Web

    Existing travel related systems and commonly used websites have some major limitations which cause efforts to be made by the traveler before going out on vacation. Some of these sites allow users to write thei...

    Ayushi Gupta, Sharmistha Rai, Himali Singal in Advances in Internetworking, Data & Web Te… (2018)

  6. No Access

    Chapter and Conference Paper

    An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble

    In order to enhance the detection rate of ensemble classifiers in steganalysis, concern the problems that the accuracy of basic classifier is low and the kind of basic classifier is single in typical ensemble...

    Zhen Cao, Minqing Zhang, Xiaolong Chen in Advances in Internetworking, Data & Web Te… (2018)

  7. No Access

    Chapter and Conference Paper

    An Ensemble Hashing Framework for Fast Image Retrieval

    Binary hashing has been widely used for efficient similarity search due to its query and storage efficiency. In this paper, we attempt to exploit ensemble approaches to tackle hashing problem. A flexible ensem...

    Huanyu Li, Yunqiang Li in Advances in Internetworking, Data & Web Technologies (2018)

  8. No Access

    Chapter and Conference Paper

    A New Middleware Architecture for RFID Data Management

    With the developments of RFID Technology, the unreliability of RFID devices result in a large number of tag data’s redundancy data, and the reliability of RFID source data is gradually harder to get the safegu...

    Weiwei Shen, Han Wu, He Xu, Peng Li in Advances in Internetworking, Data & Web Technologies (2018)

  9. No Access

    Chapter and Conference Paper

    Cost and Comfort Based Optimization of Residential Load in Smart Grid

    In smart grid, several optimization techniques are developed for residential load scheduling purpose. Preliminary all the conventional techniques aimed at minimizing the electricity consumption cost. This pape...

    Fahim Ahmed, Nadeem Javaid, Awais Manzoor in Advances in Internetworking, Data & Web Te… (2018)

  10. No Access

    Chapter and Conference Paper

    Improved Online/Offline Attribute Based Encryption and More

    Attribute based encryption is a very useful primitive for scalable access control on the ciphertexts and has found broad applications, such as secure cloud storage etc. When this primitive is used by mobile ph...

    Jindan Zhang, Baocang Wang, Xu An Wang in Advances in Internetworking, Data & Web Te… (2018)

  11. No Access

    Chapter and Conference Paper

    Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network

    This paper proposes an innovated approach of risk assessment of borrowers based on the BP neutral network model. Specifically, firstly, referring to the empirical data published by the website ‘peer-to-peer le...

    Zhengnan Yuan, Zihao Wang, He Xu in Advances in Internetworking, Data & Web Technologies (2018)

  12. No Access

    Chapter and Conference Paper

    Automatic Kurdish Text Classification Using KDC 4007 Dataset

    Due to the large volume of text documents uploaded on the Internet daily. The quantity of Kurdish documents which can be obtained via the web increases drastically with each passing day. Considering news appe...

    Tarik A. Rashid, Arazo M. Mustafa in Advances in Internetworking, Data & Web Te… (2018)

  13. No Access

    Chapter and Conference Paper

    Design and Implementation of Simulated DME/P Beaconing System Based on FPGA

    Distance Measuring Equipment/Precision (DME/P) provides precisely distance for the approaching plane. The Simulated DME/P Beaconing System is designed for testing the performances index of airborne facility a...

    Ye Sun, Jingyi Zhang, Xin Xiang, Kechu Yi in Advances in Internetworking, Data & Web Te… (2018)

  14. No Access

    Chapter

    Theoretical Framework

    To guide the empirical studies to be conducted, the present chapter derives the theoretical framework. It aims at clarifying the conceptual components that are used throughout the remainder of this research. T...

    Christoph W. Künne in Online Intermediaries for Co-Creation (2018)

  15. No Access

    Chapter and Conference Paper

    A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature

    In order to improve the accuracy of the detection and tracking task in the intelligent surveillance system, we propose a shadow elimination algorithm based on HSV spatial feature and texture feature. In this p...

    Ranran Song, Min Liu, Minghu Wu, Juan Wang in Advances in Internetworking, Data & Web Te… (2018)

  16. No Access

    Chapter and Conference Paper

    LF-LDA: A Topic Model for Multi-label Classification

    The textual data grows explosively with the advent of the era of big data, a significant portion of textual data is text documents labeled with multi-label such as the papers with keywords. Multi-label classi...

    Yongjun Zhang, Jialin Ma, Zijian Wang in Advances in Internetworking, Data & Web Te… (2018)

  17. No Access

    Chapter and Conference Paper

    A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining

    In this research, the primary focus is on privacy preservation in data mining. In particular, the problem of privacy preservation is addressed when the data is to be provided for applications or association ru...

    Hufsa Mohsin in Advances in Internetworking, Data & Web Technologies (2018)

  18. No Access

    Chapter and Conference Paper

    A Novel Query Extension Method Based on LDA

    Information retrieval (IR) is a major technology helping people to retrieve the information they are interesting in. One of challenge in IR is that the input query consists of very few words so that IR c...

    Yongjun Zhang, Jialin Ma, Zhijian Wang in Advances in Internetworking, Data & Web Te… (2018)

  19. No Access

    Chapter

    Empirical Study II: Exploring Online Innovation Intermediaries in Healthcare

    Chapter 4 deals with the second empirical study that builds on the findings from the previous chapter. It identifies the need to understand the agency of OIIs in greater detail and how they contribute to consu...

    Christoph W. Künne in Online Intermediaries for Co-Creation (2018)

  20. No Access

    Chapter and Conference Paper

    A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise

    As the integration of informatization and industrialization goes deeper in State Grid Jiangsu Electric Power Company, the lean management of O&M (operation and maintenance) of information system plays a more i...

    Chong Wang, Qi Wang, Qian Huang, Feng Ye in Advances in Internetworking, Data & Web Te… (2018)

previous Page of 10,150