Networked Digital Technologies, Part II: Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010 Proceedings

Overview

This book constitutes the proceedings of the Second International Conference on Networked Digital Technologies, held in Prague, Czech Republic, in July 2010.

Read More Show Less
... See more details below
Paperback (2010)
$151.08
BN.com price
(Save 27%)$209.00 List Price
Other sellers (Paperback)
  • All (6) from $151.49   
  • New (5) from $151.49   
  • Used (1) from $190.93   
Sending request ...

Overview

This book constitutes the proceedings of the Second International Conference on Networked Digital Technologies, held in Prague, Czech Republic, in July 2010.

Read More Show Less

Product Details

Table of Contents

Information and Data Management

A New Approach for Fingerprint Matching Using Logic Synthesis Celal Karaca Karaca, Celal 1

Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions Dong-Kun Shin Shin, Dong-Kun 7

Distributed Data-Mining in the LISp-Miner System Using Techila Grid Teppo Tammisto Tammisto, Teppo 15

Non-negative Matrix Factorization on GPU Vaclav Snasel Snasel, Vaclav 21

Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language Jasni Mohamad Zain Zain, Jasni Mohamad 31

Handwritten Digits Recognition Based on Swarm Optimization Methods Abdellah Boukerram Boukerram, Abdellah 45

A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique Jasni Mohd Zain Zain, Jasni Mohd 55

An Efficient Indexing and Compressing Scheme for XML Query Processing Yu-Lin Chen Chen, Yu-Lin 70

Development of a New Compression Scheme Mohammad Al-Towiq Al-Towiq, Mohammad 85

Compression of Layered Documents Bruno Carpentieri Carpentieri, Bruno 91

Classifier Hypothesis Generation Using Visual Analysis Methods Michael Granitzer Granitzer, Michael 98

Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager Hamid Shahnasser Shahnasser, Hamid 112

A Framework for In-House Prediction Markets Nenad Jukic Jukic, Nenad 120

Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection Tao Hai Tao, Hai 128

Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police Saeed Rouhani Rouhani, Saeed 135

Copyright Protection of Relational Database Systems Shadi Masadeh Masadeh, Shadi 143

Resolving Semantic Interoperability Challenges in XML Schema Matching Razali Yaakob Yaakob, Razali 151

Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras M. Kuchaki Rafsanjani Rafsanjani, M. Kuchaki 163

Security

The Effect of Attentiveness on Information Security Adeeb M. Alhomoud Alhomoud, Adeeb M. 169

A Secured Mobile Payment Model for Developing Markets Rose Tinabo Tinabo, Rose 175

Security Mapping to Enhance Matching Fine-Grained Security Policies Mohamed Jmaiel Jmaiel, Mohamed 183

Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor Masato Tsuru Tsuru, Masato 197

On the Algebraic Expression of the AES S-Box Like S-Boxes Osman Karaahmetoglu Karaahmetoglu, Osman 213

Student's Polls for Teaching Quality Evaluation as an Electronic Voting System Marcin Kucharczyk Kucharczyk, Marcin 228

An Improved Estimation of the RSA Quantum Breaking Success Rate Piotr Zawadzki Zawadzki, Piotr 234

Mining Bluetooth Attacks in Smart Phones Hadi Naseri Naseri, Hadi 241

Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model Mumtaz Kamala Kamala, Mumtaz 254

Two Dirrfensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism Jaroslav Jancek Jancek, Jaroslav 259

A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks Po-Chin Lee Lee, Po-Chin 273

Human Authentication Using FingerIris Algorithm Based on Statistical Approach Ahmed B. Elmadani Elmadani, Ahmed B. 288

Aerial Threat Perception Architecture Using Data Mining Shoab A. Khan Khan, Shoab A. 297

Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography K. Negrat Negrat, K. 306

An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization Qin Hongwu Qin, Hongwu 314

Genetic Cryptanalysis Iman Maharmeh Maharmeh, Iman 321

Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques Azizah A. Manaf Manaf, Azizah A. 333

Modeling and Analysis of Reconfigurable Systems Using Flexible Nets Karim Djouani Djouani, Karim 343

Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing Z. Chen Chen, Z. 358

Social Networks

Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities Mircea-F. Vaida Vaida, Mircea-F. 369

A Collaborative Social Decision Model for Digital Content Credibility Improvement Yuan-Chu Hwang Hwang, Yuan-Chu 383

Improving Similarity-Based Methods for Information Propagation on Social Networks Gianluca Lax Lax, Gianluca 391

Approaches to Privacy Protection in Location-Based Services Jouni Markkula Markkula, Jouni 402

Social Media as Means for Company Communication and Service Design Jouni Markkula Markkula, Jouni 410

A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems Thierry Condamines Condamines, Thierry 420

Bridging the Gap between Web 2.0 Technologies and Social Computing Principles Marco Spruit Spruit, Marco 430

Ontology

Using Similarity Values for Ontology Matching in the Grid Axel Tenschert Tenschert, Axel 444

Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework James Hanna Hanna, James 451

Incorpoarting Semantics into an Intelligent Clothes Search System Using Ontology Li-Ting Chen Chen, Li-Ting 467

SPPODL: Semantic Peer Profile Based on Ontology and Description Logic Zizette Boufaida Boufaida, Zizette 473

Ontology Based Tracking and Propagation of Provenance Metadata Vojtech Svatek Svatek, Vojtech 489

Real Time Biometric Solutions for Networked Society

A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer V. Jara Vera Vera, V. Jara 497

On-Demand Biometric Authentication of Computer Users Using Brain Waves Chisei Miyamoto Miyamoto, Chisei 504

Encrypting Fingerprint Minutiae Templates by Random Quantization Patrick Bours Bours, Patrick 515

Web Applications

Method for Countering Social Bookmarking Pollution using User Similarities Hiroyuki Hisamatsu Hisamatsu, Hiroyuki 523

A Human Readable Platform Independent Domain Specific Language for WSDL Balazs Goldschmidt Goldschmidt, Balazs 529

A Human Readable Platform Independent Domain Specific Language for BPEL Karoly Kondorosi Kondorosi, Karoly 537

Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler Shusaburo Motoyama Motoyama, Shusaburo 545

Assessing the LCC Websites Quality Vaclav Snasel Snasel, Vaclav 556

Expediency Heuristic in University Conference Webpage Mohd Helmy Abd Wahab Wahab, Mohd Helmy Abd 566

Author Index 577

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)