Advances in Intelligent Systems and Computing II

Selected Papers from the International Conference on Computer Science and Information Technologies, CSIT 2017, September 5-8 Lviv, Ukraine
 
 
Springer (Verlag)
  • erschienen am 20. November 2017
  • |
  • XI, 670 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-70581-1 (ISBN)
 

This book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issues in big data and cloud computing, computation linguistics, and cyber-physical systems. It also reports on data mining and knowledge extraction technologies, as well as central issues in intelligent information management.

Written by active researchers, the respective chapters are based on papers presented at the International Conference on Computer Science and Information Technologies (CSIT 2017), held on September 5-8, 2017, in Lviv, Ukraine; and at two workshops accompanying the conference: one on inductive modeling, jointly organized by the Lviv Polytechnic National University and the National Academy of Science of Ukraine; and another on project management, which was jointly organized by the Lviv Polytechnic National University, the International Project Management Association, the Ukrainian Project Management Association, the Kazakhstan Project Management Association, and Nazarbayev University.

Given its breadth of coverage, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and is sure to foster new discussions and collaborations among different groups.

  • Global Poetics
  • |
  • Literatur- und kulturwissenschaftliche Studien zur Globalisierung
  • |
  • 689
1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 309 s/w Abbildungen
  • |
  • 309 schwarz-weiße Abbildungen, Bibliographie
  • 107,91 MB
978-3-319-70581-1 (9783319705811)
3319705814 (3319705814)
10.1007/978-3-319-70581-1
weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Contents
  • GMDH-Based Learning System for Mobile Robot Navigation in Heterogeneous Environment
  • Abstract
  • 1 Introduction
  • 2 The Advantages of GMDH for Finding Dependencies Based on the Analysis of Sensor Readings
  • 3 Navigation Learning System
  • 3.1 Description of the System
  • 3.2 The Models Training Algorithm
  • 3.3 Forming Sets of Input Variables for Models Training
  • 4 Results of Experiments
  • 4.1 Results of Models Training
  • 4.2 Results of Testing the Trained Models During the Robot Movement in a Heterogeneous Environment
  • 5 Conclusion
  • References
  • Model of the Objective Clustering Inductive Technology of Gene Expression Profiles Based on SOTA and DBSCAN Clustering Algorithms
  • 1 Introduction
  • 2 Problem Statement
  • 3 Criteria to Estimate the Gene Expression Sequences Proximity and Clustering Quality
  • 3.1 Internal and External Clustering Quality Criteria
  • 3.2 Complex Balance Clustering Quality Criterion
  • 4 Implementation of SOTA Clustering Algorithm Within the Framework of the Objective Clustering Inductive Technology
  • 5 Implementation of DBSCAN Clustering Algorithm Within the Framework of the Objective Clustering Inductive Technology
  • 6 Experiment, Results and Discussion
  • 7 Conclusion
  • References
  • From Close the Door to Do not Click and Back. Security by Design for Older Adults
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 2.1 Older Adults and On-line Security
  • 2.2 Older Adults and Real Life Safety
  • 2.3 User Participation and Interaction
  • 2.4 Volunteering of Older Adults
  • 3 LivingLab PJAIT Insights
  • 3.1 About LivingLab PJAIT
  • 3.2 Older Adults and Security
  • 4 Case Study
  • 4.1 Case Study Context
  • 4.2 Platform Architecture
  • 4.3 Functionality
  • 4.4 Security Related Features
  • 5 Conclusions and Future Work
  • Acknowledgments
  • References
  • The Popularization Problem of Websites and Analysis of Competitors
  • Abstract
  • 1 Introduction
  • 1.1 Relation of Highlighted Issue to Scientific and Practical Tasks
  • 1.2 Analysis of Recent Researches and Publications
  • 2 The Main Objectives of the Research and Their Meaning
  • 2.1 Features of Search Mechanisms
  • 2.2 Analysis of Competitors' Resources
  • 3 Conclusion
  • References
  • Analysis of Uncertainty Types for Model Building and Forecasting Dynamic Processes
  • Abstract
  • 1 Introduction
  • 2 Problem Formulation
  • 3 Coping with Uncertainties
  • 3.1 Processing Some Types of Stochastic Uncertainties
  • 3.2 Processing Data with Missing Observations (Data Are in the Form of Time Series)
  • 3.3 Coping with Uncertainties of Model Parameters Estimates
  • 3.4 Dealing with Model Structure Uncertainties
  • 3.5 Coping with Uncertainties of a Level (Amplitude) Type
  • 3.6 Processing Probabilistic Uncertainties
  • 4 Data, Model and Forecasts Quality Criteria
  • 5 Conclusions
  • References
  • Dynamic Inertia Weight in Particle Swarm Optimization
  • Abstract
  • 1 Introduction
  • 2 The PSO Method
  • 3 The Proposed DWPSO Algorithm
  • 4 Results
  • 5 Summary
  • References
  • Mathematical Method of Translation into Ukrainian Sign Language Based on Ontologies
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Main Part
  • 3.1 Architecture and Components of the Developed System
  • 3.2 The Algorithm for Parsing Sentences
  • 3.3 Extending the Set of Productions with Ontology Relations
  • 4 Results
  • 5 Conclusion
  • References
  • Method of Parametric Identification for Interval Discrete Dynamic Models and the Computational Scheme of Its Implementation
  • Abstract
  • 1 Introduction
  • 2 Statement of the Problem
  • 3 Method of Parametric Identification of IDDM Based on a Random Search Procedure Using a Director Cone
  • 4 Scheme of Computational Implementation of the Method of Parametric Identification of IDDM
  • 5 Experimental Research
  • 6 Conclusion
  • References
  • Mechanisms to Enhance the Efficiency of Maritime Container Traffic Through "Odessa" and "Chernomorsk" Ports in the Balancing of Portfolios
  • Abstract
  • 1 Introduction
  • 1.1 Relation of Highlighted Issue to Scientific and Practical Tasks
  • 1.2 Analysis of Recent Researches and Publications
  • 2 The Main Objectives of the Research and Their Meaning
  • 3 Conclusion
  • References
  • Porting a Real-Time Objected Oriented Dependable Operating System (RODOS) on a Customizable System-o ...
  • Abstract
  • 1 Introduction
  • 2 Designing a Programmable Hardware
  • 2.1 Setting the Clock Speed
  • 2.2 Programming the FPGA
  • 3 RODOS
  • 3.1 RODOS Internal Directory Structure
  • 4 Porting RODOS on Smart-Fusion
  • 4.1 C++ Support of Compiler
  • 4.2 Hard and Soft Initialization at Startup
  • 4.3 RODOS Timing Interface
  • 4.4 Context Switching
  • 4.5 Serial Console (for Debugging)
  • 5 Hardware Setup
  • 6 Execution of Test Cases
  • 6.1 Threads and Time
  • 6.2 Preemption
  • 6.3 Local Communication
  • 6.4 Stack Usage
  • 7 Conclusion
  • Acknowledgment
  • References
  • A General Game-Theoretic Approach to Harmonization the Values of Project Stakeholders
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 3 The Purpose of the Study
  • 4 The Research Method
  • 5 Main Research Material
  • 6 Conclusions
  • References
  • Information Technology for Assurance of Veracity of Quality Information in the Software Requirements ...
  • Abstract
  • 1 Introduction
  • 2 Information Technology of Evaluating the Sufficiency of Quality Information in Software Requiremen ...
  • 3 Subsystem of Evaluating the Sufficiency of Software Requirements Specification Information for Sof ...
  • 4 Experiments: Evaluating the Sufficiency of the Information of the SRS of Automated System for Larg ...
  • 5 Conclusions
  • References
  • A Multidimensional Adaptive Growing Neuro-Fuzzy System and Its Online Learning Procedure
  • Abstract
  • 1 Introduction
  • 2 An Architecture of the Hybrid Growing System
  • 3 Output Signals' Optimization of the Multidimensional Neo-fuzzy Neuron Ensemble
  • 4 Experimental Results
  • 5 Conclusion
  • Acknowledgment
  • References
  • Method of Integration and Content Management of the Information Resources Network
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Our Method of Integration and Content Management
  • 4 Experiments and Results
  • 5 Conclusions and Future Work
  • References
  • Geoinformation Technology for Analysis and Visualisation of High Spatial Resolution Greenhouse Gas E ...
  • Abstract
  • 1 Introduction
  • 2 Specifics of Spatial Data Used
  • 3 GIS Technology
  • 3.1 Structure of Technology
  • 3.2 Main Components
  • 4 Practical Implementation of Gridded Emissions
  • 5 Statistical Analysis of Gridded Emissions
  • 6 Conclusions
  • References
  • Comparative Analysis of Conversion Series Forecasting in E-commerce Tasks
  • Abstract
  • 1 Introduction
  • 2 Input Data
  • 3 Forecasting Methods
  • 3.1 Decision Tree Method
  • 4 Software Implementation of Machine Learning Methods
  • 5 Research Results
  • 6 Conclusion
  • References
  • Performance Analysis of Open Source Machine Learning Frameworks for Various Parameters in Single-Thr ...
  • Abstract
  • 1 Introduction
  • 2 State of the Art
  • 2.1 Deep Learning4j
  • 2.2 TensorFlow
  • 2.3 H2O
  • 2.4 Parameters of Machine Learning
  • 2.5 Comparative Analysis
  • 3 Performance Tests
  • 4 Discussion
  • 5 Conclusions
  • Acknowledgements
  • References
  • On Scalability of Predictive Ensembles and Tradeoff Between Their Training Time and Accuracy
  • 1 Introduction
  • 2 Base Algorithms and Ensembling Strategies
  • 2.1 Base Algorithms
  • 2.2 Ensembling Algorithms
  • 3 Meta-learning Templates
  • 4 Discovering Templates
  • 5 Templates at Scale
  • 5.1 Experiments
  • 6 Conclusions
  • References
  • Agent DEVS Simulation of the Evacuation Process from a Commercial Building During a Fire
  • Abstract
  • 1 Introduction
  • 2 Specifying the Simulation Environment
  • 3 Tools Used
  • 4 Program Algorithm
  • 4.1 Decision Agent Model
  • 4.2 Simulation Process
  • 5 Application Implementation
  • 5.1 Creating the Environment Project
  • 5.2 Evacuation Simulation
  • 6 Testing the Simulation
  • 6.1 Motion Systems
  • 6.2 Simulation Scenarios
  • 7 Summary
  • References
  • The Alpha-Procedure as an Inductive Approach to Pattern Recognition and Its Connection with Lorentz Transformation
  • Abstract
  • 1 Introduction
  • 2 Common Characterization of the Pattern Recognition Task
  • 3 Short Survey of Problems and Different Ideas in the Development of the Theory of Reconstructing Generative Functions or Rather Regularities
  • 4 The Recognizing Algorithm of Alpha-Procedure and the Lorentz Transformation
  • 5 On Numerical Examples
  • 6 Summary and Further Investigations
  • References
  • Analyzing Project Team Members' Expectations
  • Abstract
  • 1 Introduction
  • 2 Team Common Goal
  • 3 Expectation Mapping
  • 4 Formal Analysis of Expectation Map
  • 4.1 Unmet Expectation
  • 4.2 Missed Objective
  • 4.3 Conflicting Expectations
  • 5 The Process of the Expectation Map Analysis
  • 6 Case Study
  • 7 Conclusion
  • References
  • The Contextual Search Method Based on Domain Thesaurus
  • Abstract
  • 1 Introduction
  • 2 Previous Research
  • 3 Thesaurus-Based Search Enhancement Method
  • 4 Conclusion
  • References
  • Optimizing Wind Farm Structure Control
  • Abstract
  • 1 Introduction
  • 2 Description of the Data
  • 3 Data Processing
  • 4 Conclusion
  • References
  • Model of the System of Personalized Analysis of Financial Condition of the Enterprise
  • Abstract
  • 1 Introduction
  • 2 Formulation of the Problem
  • 3 Comparative Analysis of Existing Methods of Personalized Approach
  • 3.1 Methods of Correlation-Regression Analysis
  • 3.2 Methods of the Mathematical Programming
  • 3.3 Matrix Methods and Model of Economic Analysis
  • 3.4 Method with Using the Game Theory
  • 3.5 Method of Operations Research
  • 3.6 Methods of Artificial Intelligence
  • 4 Search for Solutions for Analysing the Enterprises Financial Condition
  • 4.1 Evaluation of the Financial Success of the Enterprise
  • 4.2 Characteristics of the Main Factors of the Analysis of Enterprise Success
  • 4.3 Financial Model of the Investigated Enterprise
  • 5 Conclusions
  • References
  • Hybrid Sorting-Out Algorithm COMBI-GA with Evolutionary Growth of Model Complexity
  • Abstract
  • 1 Introduction
  • 2 Sorting-Out GMDH Algorithms
  • 3 Genetic Algorithm and Its Operators for Generating Offspring
  • 4 Hybrid COMBI-GA Algorithm
  • 5 Main Ideas of Numerical Experiments
  • 6 Results of the Computational Experiments
  • 7 Real-World Data Example
  • 8 Conclusion
  • References
  • Development of Combined Information Technology for Time Series Prediction
  • Abstract
  • 1 Introduction
  • 2 Forecasting Problem
  • 3 The Mathematical Model for the Prediction Problem
  • 4 An Applying of Predictive Scheme Based on the Basic Forecasting Models for Solving the Problem of Time Series Forecasting
  • 5 The Way of Use the Fuzzy Models and Methods of Determination the Numerical Evaluations of Object to the Problem of Time Series Forecasting
  • 6 Models and Methods for Determining the Coefficients of Experts' Competence
  • 7 Designing of the Information-Analytical System for the Time Series Forecasting
  • 8 Summary and Conclusion
  • References
  • Keyphrase Extraction Using Extended List of Stop Words with Automated Updating of Stop Words List
  • 1 Introduction and State-of-the-Art
  • 2 Approach
  • 3 Quality Evaluation
  • 4 Test Collections
  • 5 Experiment Description
  • 5.1 Creation of Extended Lists of Stop Words
  • 5.2 Updating the Extended List of Stop Words
  • 5.3 Texts Pre-processing
  • 6 Experiment Results and Discussion
  • 7 Conclusions
  • References
  • Innovative Concept of the Strict Line Hypergraph as the Basis for Specifying the Duality Relation Between the Vertex Separators and Cuts
  • Abstract
  • 1 Introduction
  • 2 Dual Graphs and Their Application for Establishing the Correspondence Between the Cycles and Cuts
  • 3 Analysis of the Mathematical Structures Providing the Edge-Focused Representation of Graphs
  • 4 Adaptation of the Connected Component, Cut, and Vertex Separator Concepts for Hypergraphs with Loose Hyperedges
  • 5 Concept of the Strict Line Hypergraph
  • 6 Construction of the Duality Relation Between the Vertex Separators and Cuts
  • 7 Conclusions
  • References
  • Involutory Parametric Orthogonal Transforms of Cosine-Walsh Type with Application to Data Encryption
  • Abstract
  • 1 Introduction
  • 2 Discrete Parametric Cosine-Walsh Transform
  • 3 Involutory Discrete Cosine-Walsh Transform
  • 4 Experimental Study
  • 5 Selected Aspects of Mass-Parallel Realizations
  • 6 Summary
  • References
  • On the Asymptotic Methods of the Mathematical Models of Strongly Nonlinear Physical Systems
  • Abstract
  • 1 Introduction
  • 2 The Mathematical Models of the Strong Nonlinear Single-Degree Physical Systems
  • 3 Resonance Phenomena in the Strong Nonlinear Physical Systems with the Discrete Structure
  • 4 The Mathematical Models and Resonance Phenomena in Strong Nonlinear Physical Oscillation Multi-degree Systems
  • 5 The Examples of the Application of the Developed Methods for the Investigation of the Mathematical Models of the Strong Nonlinear Vibro-Protection Systems. The Numerical Simulation
  • 6 Conclusions
  • References
  • Solution of the Discrete Ill-Posed Problem on the Basis of Singular Value Decomposition and Random Projection
  • Abstract
  • 1 Introduction
  • 2 Solution of DIP Using the Methods of Truncated Singular Value Decomposition and Random Projection
  • 3 The Model Selection Criterion for the DIP Solution Based on Singular Value Decomposition
  • 4 The Model Selection Criterion for the DIP Solution Based on Random Projection
  • 5 Error Averaging Over Random Matrices
  • 6 Connection Between the Errors of the Truncated SVD and RP Methods
  • 7 Experimental Study
  • 8 Conclusions
  • Acknowledgment
  • References
  • Methodology of Research the Library Information Services: The Case of USA University Libraries
  • Abstract
  • 1 Introduction
  • 2 Background
  • 3 An Own Approach to the Benchmarking Research of Library Information Services
  • 4 The Research of Remote Information Services of USA University Libraries
  • 5 Summarizing the Results of the Research with the Benchmarking Methodology
  • 6 Verification of the Results Using the Saati Pairwise Comparisons Method
  • 7 Conclusions
  • References
  • The Method of Big Data Processing for Distance Educational System
  • Abstract
  • 1 Introduction
  • 2 Analysis of the Information Resources
  • 3 The Information Model of Big Data
  • 3.1 The Method of Relational Data Conversion in to XML-Database Using Model "Entity-Characteristic"
  • 3.2 The Structure of the Remote Education Resource Center
  • 3.3 The Results Analysis
  • 4 Conclusions
  • References
  • Developments and Prospects of GMDH-Based Inductive Modeling
  • Abstract
  • 1 Introduction
  • 2 Main Features of the Inductive Approach to Model Building
  • 3 Brief Historical Information About the Development of Inductive Modeling as a Scientific Area
  • 4 Main Results of GMDH Theoretical Studies
  • 5 General Characteristics of the Inductive Modeling Task
  • 6 Basic Components of the GMDH Algorithms
  • 6.1 Model Classes Used in GMDH Algorithms
  • 6.2 Basic Generators of Model Structures
  • 6.3 External Criteria of Models Quality
  • 7 Up-to-Date Trends in the Development of Algorithms for Self-organization of Models
  • 8 Specialization and Results of ITIM Department
  • 8.1 Main Scientific Results of ITIM Department
  • 8.2 Technologies Developed in the Department
  • 8.3 Basic Applied Results
  • 9 Prospects of the Research Development
  • 10 Conclusion
  • References
  • Construction and Research of the Generalized Iterative GMDH Algorithm with Active Neurons
  • Abstract
  • 1 Introduction
  • 2 GMDH as an Inductive Method of Model Building
  • 3 Main Historical Types and Modifications of GMDH Iterative Algorithms
  • 4 Current Trends of GMDH Development
  • 5 Constructing the Generalized Hybrid GMDH Algorithm
  • 5.1 GIA GMDH Algorithm Description
  • 5.2 Main Particular Cases of the GIA GMDH Architecture
  • 5.3 The Ordered Coding of the Iterative GMDH Algorithms Structure
  • 6 Experimental Research of the Algorithms Effectiveness in the Task of True Model Structure Construction
  • 6.1 Integrated Technique for Analysis of the Effectiveness of Iterative GMDH Algorithms Using Computational Experiments
  • 6.2 Effectiveness of Iterative Algorithms in Detecting True Model, the Case of Quadratic Dependence
  • 6.3 Effectiveness of Iterative Algorithms Under Conditions of Noisy Data
  • 6.4 Effectiveness Investigation of Constructing an Essentially Nonlinear Dependence in Case of a Small Number of Arguments
  • 6.5 Verification of Internal Convergence of Iterative GMDH Algorithms
  • 7 Modeling the Ukraine Black Sea Economic Region GRP Dependence on Socio-Economic Indicators
  • 8 Conclusion
  • References
  • The Fast Fourier Transform Partitioning Scheme for GPU's Computation Effectiveness Improvement
  • Abstract
  • 1 Introduction
  • 2 Decimation in Time Fast Fourier Transform Algorithm
  • 3 Partitioning Scheme for the Effective GPU FFT Computation
  • 4 Results of the Experimental Research
  • 5 Conclusions
  • References
  • Consolidation of Virtual Machines Using Stochastic Local Search
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 The System Model
  • 4 Problem Formulation
  • 5 VM Placement Modeling
  • 6 Evaluation
  • 7 Conclusion
  • References
  • Architecture and Models for System-Level Computer-Aided Design of the Management System of Energy Efficiency of Technological Processes at the Enterprise
  • Abstract
  • 1 Introduction
  • 2 Model of MMSEETP System Architecture
  • 2.1 Tasks of MMSEETP
  • 2.2 Requirements and Design Principles of MMSEETP
  • 2.3 Development of MMSEETP Structure
  • 3 Levels Design of MMSEETP
  • 3.1 The Level of Data Collection and Management of Executive Mechanisms
  • 3.2 The Level of Control and Management of Technological Process
  • 3.3 The Level of Operator Control and Forming of Management Decisions
  • 4 Development of Petri Net Models
  • 5 Conclusions
  • References
  • Basic Components of Neuronetworks with Parallel Vertical Group Data Real-Time Processing
  • Abstract
  • 1 Formulation of the Problem
  • 2 Analysis of Recent Research and Publications
  • 3 Purpose and Tasks of the Research
  • 4 The Main Results of the Research
  • 5 Methods and Structures of Basic Components Implementation
  • 6 Calculation Component of Maximum and Minimum Numbers
  • 7 Conclusions
  • References
  • Recommendation Systems as an Information and Technology Tool for Virtual Research Teams
  • Abstract
  • 1 ?ntroduction
  • 2 Analysis of Recent Researches and Publications
  • 3 E-Science and Virtual Scientific Teams
  • 4 Information Assistant of a Scientist
  • 4.1 Recommender Systems
  • 4.2 Consolidated Information Resources of the Scientific Project
  • 4.3 Formation of User Profiles
  • 4.4 Generation of Recommendations
  • 4.5 The Main Characteristics of the System
  • 5 Conclusion
  • References
  • Analytical Model for Availability Assessment of IoT Service Data Transmission Subsystem
  • Abstract
  • 1 Introduction
  • 2 Typical IoT Systems and Their Usage
  • 3 An Approach to Development of the Availability Model for IoT Services
  • 4 Forecasting of Software Failure and Failure Rate for IoT Transmission Subsystem
  • 5 Availability Model for IoT Services
  • 5.1 A Set of Events for the IoT Services
  • 5.2 Components of the State's Vector for the IoT Services
  • 5.3 Sets of Parameters Which Describe the IoT Services
  • 5.4 Structural-Automated Model of the IoT Services for the Markovian Chain Development
  • 6 Conclusion
  • References
  • Building Vector Autoregressive Models Using COMBI GMDH with Recurrent-and-Parallel Computations
  • Abstract
  • 1 Introduction
  • 2 Vector Autoregressive Modelling
  • 3 Procedure of Structural and Parametric Identification of VAR Models
  • 4 Recurrent-and-Parallel Computing
  • 5 Combınatorial GMDH Algorithm with Recurrent Parameters Estimation
  • 6 Paralleling of COMBI Algorithm with Standard Binary Counter
  • 7 Paralleling of COMBI Algorithm with Sequential Binary Counter
  • 8 Testing the Efficiency of the Algorithm Paralleling
  • 9 Modelling and Prediction of Indices of Ukraine Energy Sphere
  • 10 Conclusion
  • References
  • Adaptive Enhancement of Monochrome Images with Low Contrast and Non-uniform Illumination
  • Abstract
  • 1 Introduction
  • 2 Image Contrast Enhancement
  • 3 Proposed Method
  • 4 Research
  • 5 Discussion
  • 6 Conclusion
  • References
  • Secure Routing in Reliable Networks: Proactive and Reactive Approach
  • Abstract
  • 1 Introduction
  • 2 Method of Secure Routing of Messages Using Non-overlapping Paths: Proactive Approach
  • 3 Method of Secure Routing of Messages Using Overlapping Paths: Proactive Approach
  • 4 Numerical Analysis of the Proposed Method for Secure Routing of Messages Using Overlapping Paths
  • 4.1 Numerical Study of Using the Unique Composite Path
  • 4.2 Numerical Study of Using the Two Different Types of Non-overlapping Paths
  • 5 Method of Secure Fast ReRouting of Messages Over Composite Paths: Proactive and Reactive Approaches
  • 6 Numerical Study of Secure Fast ReRouting
  • 7 Conclusion
  • References
  • Linguistic Comparison Quality Evaluation of Web-Site Content with Tourism Documentation Objects
  • Abstract
  • 1 Introduction
  • 2 State-of-the-Art
  • 3 Tourism Documentation Structure
  • 3.1 General Structure of Tourism Documentation
  • 3.2 Eligibility of Tourism Documentation Content
  • 4 Tourism Documentation Quality Indices
  • 4.1 Appropriateness Recognisability
  • 4.2 Helpfulness
  • 4.3 Attractiveness
  • 5 Tourism Documentation Quality Monitoring
  • 6 Conclusions
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

308,21 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

308,21 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok