Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications

 
 
Springer (Verlag)
  • erschienen am 23. September 2017
  • |
  • XX, 396 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-68527-4 (ISBN)
 
This book highlights recent advances in intelligent data analysis, computational intelligence, signal processing, and all associated applications of artificial intelligence. It gathers papers presented at the ECC 2017, the Fourth Euro-China Conference on Intelligent Data Analysis and Applications. The aim of the ECC was to provide an internationally respected forum for scientific research in the broad areas of intelligent data analysis, computational intelligence, signal processing, and all associated applications of artificial intelligence (AI).

The fourth installment of the ECC was jointly organized by the University of Málaga, Spain; the VSB - Technical University of Ostrava, Czech Republic; and Fujian University of Technology, Fuzhou, China. The conference took place in Málaga, Spain on October 9-11, 2017.

  • Global Poetics
  • |
  • Literatur- und kulturwissenschaftliche Studien zur Globalisierung
  • |
  • 682
1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 210
  • |
  • 210 s/w Abbildungen
  • |
  • 210 schwarz-weiße Abbildungen, Bibliographie
  • 42,55 MB
978-3-319-68527-4 (9783319685274)
3319685279 (3319685279)
10.1007/978-3-319-68527-4
weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Organization
  • Honorary Chair
  • Advisory Committee Chair
  • Conference Chairs
  • Program Committee Chairs
  • Invited Session Chairs
  • Local Organizing Chairs
  • Publicity and Electronic Media Chair
  • Publication Chairs
  • International Program Committee
  • Sponsoring Institutions
  • Contents
  • Image Processing and Applications
  • Research on Eye Detection and Fatigue Early Warning Technologies
  • Abstract
  • 1 Introduction
  • 2 System Overviewfirst
  • 2.1 Research and Analytical
  • 2.2 Research Data
  • 3 Conclusion
  • References
  • Face Recognition Based on HOG and Fast PCA Algorithm
  • Abstract
  • 1 Introduction
  • 2 Raw Data Preprocessing
  • 2.1 Extract Raw Data
  • 2.2 Face Detection and Extraction
  • 3 HOG Feature Extraction and PCA Dimensionality Reduction
  • 3.1 HOG Feature Extraction
  • 3.2 PCA Dimensionality Reduction
  • 4 Face Recognition
  • 4.1 Data Normalization
  • 4.2 Face Recognition Based on SVM
  • 5 Experiment
  • 5.1 Experimental Environment
  • 5.2 Experimental Database
  • 5.3 Comparison and Analysis of Experimental Results
  • 6 Conclusions
  • Acknowledgements
  • References
  • Day and Night Image Stitching and Rendering
  • Abstract
  • 1 Introduction
  • 2 Image Stitching
  • 3 Time Lapse Rendering
  • 4 Experimental Results
  • 5 Conclusion
  • References
  • Application of Image Preprocessing in Soil Mesostructure
  • Abstract
  • 1 Introduction
  • 2 Image Processing of Soil Mesostructure
  • 2.1 Images Fusion Based on the Wavelet Transform
  • 2.2 Image Mosaic Based on the Module Matching
  • 3 Conclusions
  • Acknowledgments
  • References
  • Application of Image Proccessing in Soil's Shear Zone Mesostructure
  • Abstract
  • 1 Introduction
  • 2 Image Segmentation Based on Hue Separation
  • 2.1 The Method of Average Gray Value and the Method of Maximum Variance Automatic Threshold
  • 2.2 Image Segmentation Based on Hue Separation
  • 2.3 The Extraction Method of Mesostructure Quantization Characteristic Parameters
  • 3 Conclusion
  • Acknowledgments
  • References
  • Protocols for Data Security and Processing
  • An Improved Scheme of Secure Access and Detection of Cloud Front-End Device
  • Abstract
  • 1 Introduction
  • 2 Access of Device to Cloud Service
  • 2.1 Concept and Framework of Cloud Service
  • 2.2 Front-End Device Access Cloud Service
  • 2.3 Analysis of Security Problems
  • 3 Improved the Scheme of Accessing Using the Smart Card
  • 3.1 Preliminaries
  • 3.2 Identifier Generation
  • 3.3 Improved Process of Access Session
  • 3.4 Using ECC Algorithm to Achieve Authentication and Regular Detection
  • 4 Cipher-Text Transmission of AES
  • 4.1 AES Cryptography and the Session Shared Key
  • 4.2 Encryption and Decryption
  • 4.3 Updating the Session Shared Key
  • 5 Analysis of Security and Efficiency
  • 5.1 Analysis of Security
  • 5.2 Analysis of Efficiency
  • 6 Conclusions
  • Acknowledgements
  • References
  • The Order and Failure Estimation of Redundancy System Based on Cobweb Model
  • Abstract
  • 1 Introduction
  • 2 The Definition of the Main Indicators of Reliability
  • 3 Approximate Estimation of Order and Failure Rate of Redundancy System
  • 4 Conclusion
  • Acknowledgments
  • References
  • Comments on Yu et al's Shared Data Integrity Verification Protocol
  • 1 Introduction
  • 2 Review the SDIVIP2 Protocol
  • 2.1 Settings
  • 2.2 Preliminaries and Notation
  • 2.3 Description of the Protocol
  • 3 Cryptanalysis on SDIVIP2
  • 4 Possible Quick Fix
  • 5 Conclusion
  • References
  • Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards
  • 1 Introduction
  • 2 Security Weakness in the S2APA Protocols
  • 2.1 Review of the S2APA Protocol
  • 2.2 A Credential Forgery Attack
  • 3 The Proposed APAKE Protocol
  • 4 Security and Efficiency Analysis
  • 5 Conclusions
  • References
  • Digital Certificate Based Security Payment for QR Code Applications
  • 1 Introduction
  • 2 Problem Statement and Preliminaries
  • 3 Authenticated QR Code Based on Digital Signatures
  • 3.1 Digital Certificate Generation Phase
  • 3.2 Authenticated QR Code Generation Phase
  • 3.3 Authenticated QR Code Verification Phase
  • 4 Experimental Results
  • 5 Conclusions
  • References
  • New Methods for Intelligent Data Analysis
  • A Novel Region Selection Algorithm for Auto-focusing Method Based on Depth from Focus
  • Abstract
  • 1 Introduction
  • 2 Proposed Region Selection Algorithm
  • 2.1 Gradient Image Through Scharr Operator with Improved Templates
  • 2.2 Focusing Region Selection
  • 3 Experiment and Analysis
  • 3.1 Fixation of Region Size
  • 3.2 Performance of Global Searching with Fixed Step
  • 3.3 Comparison with Different Algorithms
  • 4 Conclusion
  • Acknowledgement
  • References
  • Graph Theory Modeling -- A Petri Nets Based Approach
  • 1 Introduction
  • 2 Problem Statement and Preliminaries
  • 2.1 Flow Networks and Flows
  • 2.2 Petri Nets
  • 3 Modeling of Maximum Flow Using Petri Nets
  • 3.1 Modeling for Flow Network
  • 3.2 Modeling of Residual Networks
  • 4 The Petri Nets Based Maximum Flow Solution
  • 5 Conclusion and Future Works
  • References
  • Sampling as a Method of Comparing Real and Generated Networks
  • 1 Introduction
  • 2 Related Work
  • 2.1 Network Sampling
  • 2.2 Network Models
  • 3 3-Lambda Model
  • 4 Experiments
  • 4.1 Data
  • 4.2 Measured Properties
  • 4.3 Sampling Methods
  • 4.4 Results
  • 5 Conclusion
  • References
  • The Relative Homogeneity Between-class Thresholding Method Based on Shape Measure
  • Abstract
  • 1 Introduction
  • 2 Thresholding Method Based on Relative Homogeneity Between-class
  • 2.1 Binarization Focusing on Objects
  • 2.2 Thresholding Based on Relative Homogeneity Between-class
  • 3 Relative Homogeneity Measure Method Based on Shape Measure
  • 3.1 Shape Measure Function
  • 3.2 Relative Homogeneity Thresholding Method Based on Shape Measure
  • 4 Results and Analysis
  • 4.1 Experimental Analysis
  • 4.2 Performance Evaluation
  • 5 Conclusion
  • Acknowledgements
  • References
  • Mining of Multiple Fuzzy Frequent Itemsets with Transaction Insertion
  • 1 Introduction
  • 2 Preliminaries and Problem Statement
  • 3 Proposed Incremental Algorithm
  • 4 Experimental Results
  • 4.1 Runtime
  • 5 Conclusion
  • References
  • Applications of Intelligent Data Analysis
  • Efficient Mobile Middleware for Seamless Communication of Prehospital Emergency Medicine
  • Abstract
  • 1 Introduction and Related Work
  • 2 Methods
  • 2.1 Channel Decision Algorithm
  • 2.2 Protocol
  • 2.3 Overall Architecture of the System
  • 3 Field Experiment Results
  • 4 Discussion
  • 5 Conclusion
  • References
  • A Method to Evaluate the Research Direction of University
  • Abstract
  • 1 Introduction
  • 2 Data Sources and Research Methods
  • 2.1 Data Collection and Cleaning
  • 2.2 Research Methods and Tools
  • 2.3 Research Process
  • 3 Analysis of the Results
  • 4 Conclusion and Discussion
  • Acknowledgements
  • References
  • Design and Implementation of a Course Selection System that Based on Node.js
  • Abstract
  • 1 Introduction
  • 2 System Requirements
  • 3 System Module Design
  • 3.1 The Function Design of Role Module
  • 3.2 Database Design
  • 4 System Design and Implementation
  • 4.1 The Utilization of Single-Threaded Concurrency
  • 4.2 System Implementation
  • 4.3 System Deployment
  • 5 Conclusion
  • Acknowledgements
  • References
  • A Prototype System for Three-Dimensional Cardiac Modeling and Printing with Clinical Computed Tomography Angiography
  • Abstract
  • 1 Introduction
  • 2 Working Flow of the Prototype System
  • 3 Format and Segmentation of CTA Data
  • 3.1 The Structure of DICOM File
  • 3.2 Read DICOM File Within Matlab
  • 3.3 Conversion of Data Format
  • 3.4 Image Segmentation with the Region Growing
  • 4 3-D Modeling and Volume Rendering
  • 4.1 3-D Modeling of Segmented Volume Images
  • 4.2 3-D Volume Rendering of Segmented Volume Images
  • 5 Generation of STL File
  • 5.1 Introduction of STL File
  • 5.2 The Rules Obeyed by STL File
  • 6 3-D Printing of Physical Model
  • 7 Design and Implementation of the System
  • 7.1 Analysis on Demand of System Design
  • 7.2 System GUI
  • 8 Discussions and Conclusions
  • Acknowledgments
  • References
  • Design of Wisdom Home System for the Aged Living Alone
  • Abstract
  • 1 Introduction
  • 2 System Architecture
  • 3 Designs and Implementation of Health Assistant Management Function
  • 4 Rule Self-learning Method
  • 5 Mobile Terminal Services
  • 6 Conclusion
  • Acknowledgement
  • References
  • Decision Support System in Orthopedics Using Methodology Based on a Combination of Machine Learning Methods
  • 1 Introduction
  • 2 Related Work
  • 3 Methodology and Tools
  • 3.1 Methodology
  • 4 Methodology Application
  • 4.1 Dataset
  • 4.2 Univariate Data Analysis
  • 4.3 Network Visualization
  • 4.4 Feature Selection
  • 4.5 Model of the System
  • 4.6 Classification
  • 4.7 Decision Support Tool
  • 5 Conclusion
  • References
  • Sensor Technology and Signal Processing
  • Wireless Sensor Network Routing Protocol Research for High Voltage Transmission Line Monitoring System
  • Abstract
  • 1 Introduction
  • 2 The Network Mode of Wireless Sensor Network Monitoring System
  • 3 Routing Algorithm for High Voltage Transmission Line Monitoring Network
  • 4 Network Energy Optimization
  • 5 Simulation
  • 6 Conclusion
  • References
  • Near/Far-Field Polarization-Dependent Responses from Plasmonic Nanoparticle Antennas
  • Abstract
  • 1 Introduction
  • 2 Control of Incident Polarization-Dependent Near-Field Enhancement
  • 3 Control of Emission Polarization
  • 4 Control of Polarization of Inelastic (Raman) Scattering
  • 5 Summary
  • Acknowledgements
  • References
  • Car Collision Warning System for Cornering on Mountain Roads
  • Abstract
  • 1 Background and Research Motivation
  • 2 System Operation Overview
  • 2.1 Operation of the Ultrasound Module
  • 2.2 Control Module
  • 2.3 LCD Module
  • 2.4 Main Program Flow and Principle
  • 3 System Test and Debugging Data
  • 4 Conclusion
  • References
  • Relay Node Selection Strategy for Wireless Sensor Network
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 GF_CENTER Implement
  • 3.1 The Annotation of Symbol
  • 3.2 The Process GF_CENTER
  • 3.3 Fitness Function
  • 4 Experiment Analysis
  • 5 Conclusion
  • Acknowledgment
  • References
  • Adaptive Signal Processing of Fetal PCG Recorded by Interferometric Sensor
  • Abstract
  • 1 Introduction
  • 2 Methods
  • 2.1 Non-invasive Interferometric Measurement Sensor
  • 3 Experimental Setup
  • 4 Conclusion
  • Acknowledgements
  • References
  • A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones
  • Abstract
  • 1 Introduction and Related Work
  • 2 Methods and Procedures
  • 2.1 Octave Equivalence
  • 2.2 Data Embedding Procedure
  • 2.3 Data Extracting Procedure
  • 3 Experiments and Results
  • 4 Discussion
  • 5 Conclusion
  • Acknowledgment
  • References
  • Energy Control and Management
  • Sensor Data Mining for Gas Station Online Monitoring
  • Abstract
  • 1 Introduction
  • 2 Gas Station Remote Online Monitoring System Construction
  • 2.1 Data Acquisition and Transmission Architecture of Gas Station Based on Sensor Network
  • 2.2 Online Monitoring System Based on B/S Architecture
  • 3 Abnormal State Monitoring Based on Data Mining
  • 3.1 Abnormal State Monitoring and Alarming
  • 3.2 Oil Tank Monitoring Based on Cumulative Temperature Variation
  • 3.3 Refueling Gun Abnormal Monitoring Based on Sensor Group
  • 4 The Experimental Results and Analysis
  • 5 Conclusion
  • Acknowledgments
  • References
  • Research on Energy Consumption of Building Electricity Based on Decision Tree Algorithm
  • Abstract
  • 1 Introduction
  • 2 The Principle of Decision Tree Algorithm
  • 3 Introduction and Basic Principle of ID3 Algorithm
  • 4 Modeling and Analysis
  • 4.1 Energy Consumption Data Analysis
  • 4.2 Constructing Energy Consumption Decision-Tree Model
  • 5 Summary
  • Acknowledgments
  • References
  • The Optimal Reactive Power Compensation of Feeders by Using Fuzzy Method
  • Abstract
  • 1 Introduction
  • 2 Load Variation of Distribution Feeder
  • 3 Fuzzy System Architecture
  • 3.1 System Architecture
  • 4 Fuzzy Logic Applied to Power Factor Improvement
  • 5 Examples of Discussion
  • 6 Conclusion
  • References
  • Finite Element Analysis for No-Load and Rated Load of Low-Speed Permanent Magnet Hydro-Generator
  • Abstract
  • 1 Introduction
  • 2 Structure and Electromagnetic Design of Low-Speed PMSG
  • 2.1 Structure of Low-Speed PMSG
  • 2.2 Design and Construction
  • 3 Transient Magnetic Field Analysis Without Load
  • 4 The Runtime Transient Magnetic Field Analysis with Rated Load
  • 5 Conclusion
  • Acknowledgement
  • References
  • Design and Implementation of Intelligent Outlet System Based on Android and Wifi
  • Abstract
  • 1 Introduction of Smart Home
  • 1.1 Research Status of Smart Home
  • 1.2 Research Status of Intelligent Outlet System
  • 2 Key Technologies of Intelligent Outlet
  • 2.1 Wireless Communication Technology
  • 2.2 Android Technology
  • 3 The Proposed Intelligent Outlet Architecture in Smart Home
  • 3.1 The Architecture of Smart Home System Based on Wifi Technology
  • 3.2 Hardware Design
  • 3.3 Software Programming
  • 4 Results and Discussion
  • 5 Conclusion
  • Acknowledgement
  • References
  • Intelligent Methods for Optimization and Learning
  • Design and Performance Simulation of Direct Drive Hub Motor Based on Improved Genetic Algorithm
  • Abstract
  • 1 Introduction
  • 2 Improved Genetic Algorithm
  • 2.1 Improved Genetic Algorithm
  • 2.2 Overall Electromagnetic Structure Design
  • 2.3 Stator Winding Design
  • 2.4 Measures to Reduce the Cogging Torque
  • 2.4.1 Inner Stator Chute
  • 2.4.2 Optimizing z/2p
  • 2.5 Optimum Design Result
  • 3 Finite Element Analysis of Magnetic Field
  • 3.1 Grid Subdivision
  • 3.2 Analysis of the Hub Motor Internal Electromagnetic Field
  • 4 Performance Calculation and Simulation
  • 4.1 Electric Motive Force (EMF)
  • 4.2 Torque Characteristics
  • 4.3 Input Voltage and Input Current Characteristics
  • 4.4 Efficiency Characteristics
  • 5 Conclusion
  • Acknowledgment
  • References
  • QUATRE Algorithm with Sort Strategy for Global Optimization in Comparison with DE and PSO Variants
  • 1 Introduction
  • 2 QUATRE Algorithm with Sort Strategy (S-QUATRE)
  • 3 Experiment Analysis of S-QUATRE Algorithm
  • 3.1 Test Environment Description
  • 3.2 Experiment Comparisons Between S-QUATRE and Other Algorithms
  • 4 Conclusion
  • References
  • The QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: An Overview
  • 1 Introduction
  • 2 QUATRE Variants Mentioned in Literature
  • 2.1 The Canonical QUATRE Algorithm
  • 2.2 Competitive QUATRE (C-QUATRE) Algorithm
  • 2.3 QUATRE Algorithm with Sort Strategy (S-QUATRE)
  • 2.4 QUATRE with External Archive (QUATRE-EAR)
  • 3 Benchmark Functions and Experiment Analysis
  • 4 Conclusion
  • References
  • A Hybrid Central Force Optimization Algorithm for Optimizing Ontology Alignment
  • 1 Introduction
  • 2 Ontology Matching Problem
  • 3 Hybrid Central Force Optimization Algorithm Based Ontology Matching
  • 3.1 Chromosome Encoding Mechanism
  • 3.2 Fitness Function and Elitism
  • 4 Experimental Studies and Analysis
  • 4.1 Testing Cases and Experimental Configuration
  • 4.2 Results and Analysis
  • 5 Conclusion
  • References
  • A Hybrid BPSO-GA Algorithm for 0-1 Knapsack Problems
  • 1 Introduction
  • 2 Background
  • 2.1 0-1 Knapsack Problems
  • 2.2 Genetic Algorithm
  • 2.3 Binary Particle Swarm Optimization
  • 3 Methodology
  • 4 Experimental Study
  • 5 Conclusions
  • References
  • Nearest Neighbor Search Techniques Applied in the Nearest Feature Line Classifier
  • Abstract
  • 1 Introduction
  • 2 Nearest Feature Line Classifier
  • 3 Nearest Neighbor Search
  • 3.1 Partial Distortion Search
  • 3.2 Absolute Error Inequality Search
  • 3.3 Equal-Average Nearest Neighbor Search
  • 4 Experimental Results
  • 5 Conclusions
  • Acknowledgment
  • References
  • The Redundancy Problem in Composition of Parallel Finite Automata and Its Optimization Method
  • Abstract
  • 1 Introduction
  • 2 Parallel Finite Automata
  • 2.1 The Syntax and Semantics of Parallel Finite Automata
  • 2.2 The Split-Join Composition Rule of PFA
  • 3 Redundant Transfer and Optimization Algorithm
  • 3.1 Redundant Parallel/Synchronous Transfer
  • 4 The Equivalence of Parallel Finite Automata and Finite Automata
  • 5 Summary
  • Acknowledgment
  • References
  • An Intelligent Data Analysis of the Structure of NP Problems for Efficient Solution: The Vehicle Routing Case
  • 1 Introduction
  • 2 Analysis and Operational Proposal
  • 2.1 Original Partition Crossover for the Travelling Salesman Problem
  • 2.2 Modifications in the PX Operator to Fit CVRP Constraints
  • 2.3 Application of the Modified PX Operator to the CVRP
  • 2.4 Generation of Initial Solutions
  • 2.5 Improving the Recombination Rate Using Node Shifting
  • 2.6 Application of the Modified PX Operator to the CVRP
  • 3 Results and Discussion
  • 3.1 Petal Structure Comparison
  • 3.2 Recombinations and Tunnels as a Function of the Shift
  • 4 Conclusions
  • References
  • Evaluation of Traveling Salesman Problem Instance Hardness by Clustering
  • 1 Introduction
  • 2 Traveling Salesman Problem
  • 2.1 TSP Complexity
  • 3 Cluster Analysis
  • 3.1 DBSCAN
  • 4 Computational Experiments
  • 5 Conclusions
  • References
  • Real-Time Path Planning Based on Dynamic Traffic Information
  • 1 Introduction
  • 2 Related Works
  • 3 The Road Network Model Design
  • 4 Performance Evaluations
  • 5 Conclusions
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

202,29 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

202,29 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung des WebShops erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok