Linked e-resources
Details
Table of Contents
Intro; Preface; Organization; Program Committee; Program Committee Chairs; Program Committee Members; Technical Program Committee Members; Organizing Committee Chair; Conference Organizer (Production); Conference Web site, Call for Papers; Contents; Literature Review on Database Design Testing Techniques; Abstract; 1 Introduction; 2 Research Method; 2.1 Research Questions; 2.2 Literature Sources; 2.3 Study Selection; 3 Results; 3.1 Software Testing Techniques; 3.2 SQL and NoSQL Database Testing; 4 Results and Discussion; 4.1 SQL Database Testing Techniques
4.2 NoSQL Database Testing Techniques5 Findings and Recommendations; 6 Conclusion and Future Focus; Acknowledgment; References; Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT); Abstract; 1 Introduction; 2 Evolution of Artificial Intelligence Algorithms; 3 AI Algorithms in Network Intrusion Detection; 4 System Model; 5 Results Discussion; 6 Conclusion; References; S-DWF: An Integrated Schema for Secure Digital Image Watermarking; Abstract; 1 Introduction; 2 Problem Description; 3 Related Work
4 Formulation of Proposed Methodology5 Design Analysis of S-DWF; 6 Results Discussion; 7 Conclusion; References; Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Subsumption Relation; 3.2 Similarity Relation; 3.3 Co-occurrence Relation; 3.4 Equivalence Relation; 4 Experimental Results and Discussions; 4.1 Experimental Datasets; 4.2 Results; 4.2.1 Evaluation of Semantic Depth; 5 Summary and Conclusion; References; Analysis of Behaviour Patterns of the Residents of a Smart House; Abstract
1 Introduction to the Problem2 Behaviour Patterns Analysis; 3 Creation of Behaviour Patterns Database; 4 Conclusions; Acknowledgment; References; Combined Method of Monitoring and Predicting of Hazardous Phenomena; Abstract; 1 Introduction; 2 Methods and Facilities for Monitoring and Predicting of Hazardous Phenomena; 3 Conclusions; References; Analysis of Existing Concepts of Optimization of ETL-Processes; Abstract; 1 Introduction; 2 Definition ETL-Process; 3 Existing Concepts of Optimization of ETL-Processes; 3.1 State-Space Optimization; 3.2 Fault Tolerance; 3.3 Addition of Sorters
3.4 Shared Caching and Parallelization3.5 Cost Based Optimization; 4 Conclusion; References; Multiagent Distribution of Roles in Communities with Limited Communications; Abstract; 1 Introduction; 2 The Problem Statement; 3 The Proposed Method; 4 Simulation; 5 Conclusions and Future Work; Acknowledgement; References; Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement; 1 Introduction; 2 Numerical Methods; 2.1 Upwind Scheme; 2.2 Mac-Cormack's Scheme; 3 Results and Discussion; 4 Conclusion; References
4.2 NoSQL Database Testing Techniques5 Findings and Recommendations; 6 Conclusion and Future Focus; Acknowledgment; References; Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT); Abstract; 1 Introduction; 2 Evolution of Artificial Intelligence Algorithms; 3 AI Algorithms in Network Intrusion Detection; 4 System Model; 5 Results Discussion; 6 Conclusion; References; S-DWF: An Integrated Schema for Secure Digital Image Watermarking; Abstract; 1 Introduction; 2 Problem Description; 3 Related Work
4 Formulation of Proposed Methodology5 Design Analysis of S-DWF; 6 Results Discussion; 7 Conclusion; References; Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Subsumption Relation; 3.2 Similarity Relation; 3.3 Co-occurrence Relation; 3.4 Equivalence Relation; 4 Experimental Results and Discussions; 4.1 Experimental Datasets; 4.2 Results; 4.2.1 Evaluation of Semantic Depth; 5 Summary and Conclusion; References; Analysis of Behaviour Patterns of the Residents of a Smart House; Abstract
1 Introduction to the Problem2 Behaviour Patterns Analysis; 3 Creation of Behaviour Patterns Database; 4 Conclusions; Acknowledgment; References; Combined Method of Monitoring and Predicting of Hazardous Phenomena; Abstract; 1 Introduction; 2 Methods and Facilities for Monitoring and Predicting of Hazardous Phenomena; 3 Conclusions; References; Analysis of Existing Concepts of Optimization of ETL-Processes; Abstract; 1 Introduction; 2 Definition ETL-Process; 3 Existing Concepts of Optimization of ETL-Processes; 3.1 State-Space Optimization; 3.2 Fault Tolerance; 3.3 Addition of Sorters
3.4 Shared Caching and Parallelization3.5 Cost Based Optimization; 4 Conclusion; References; Multiagent Distribution of Roles in Communities with Limited Communications; Abstract; 1 Introduction; 2 The Problem Statement; 3 The Proposed Method; 4 Simulation; 5 Conclusions and Future Work; Acknowledgement; References; Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement; 1 Introduction; 2 Numerical Methods; 2.1 Upwind Scheme; 2.2 Mac-Cormack's Scheme; 3 Results and Discussion; 4 Conclusion; References