Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book presents a compilation of selected papers from the 2nd International Conference on Healthcare Science and Engineering (Healthcare 2018). The work focuses on novel computing, networking, and data analytics techniques for various issues in healthcare. The book is a valuable resource for academic researchers and practitioners working in the field.
Chase Q. Wu is currently an Associate Professor at the Department of Computer Science and the Director of the Center for Big Data at New Jersey Institute of Technology (NJIT). He joined NJIT in fall 2015 from the University of Memphis, where he was an Associate Professor at the Department of Computer Science. His research interests include big data, high-performance networking, parallel and distributed computing, sensor networks, scientific visualization, and cyber security. Dr. Wu's work has been supported by various funding agencies, including the U.S. National Science Foundation, Department of Energy, Department of Homeland Security, Office of Naval Research, and Oak Ridge National Laboratory, where he is a member of the research staff and works on a number of high-performance networking projects and big-data computational science projects.
Jaime Lloret received his B.Sc. and M.Sc. in Physics in 1997, his B.Sc.and M.Sc. in Electronic Engineering in 2003 and his Ph.D. in Telecommunication Engineering (Dr. Ing.) in 2006. He is a Cisco Certified Network Professional Instructor. He has worked as a network designer and administrator in several enterprises, and is currently an Associate Professor at the Polytechnic University of Valencia. His research interests include P2P networks, wireless local area networks, sensor networks and routing protocols. He also conducts research on educational approaches and strategies. He has authored 22 book chapters and has published more than 450 research papers at national and international conferences and in international journals (more than 200 with ISI Thomson JCR).
Xianxian Li is a Professor at the School of Computer Science and Information Technology, Guangxi Normal University. He is also a Distinguished Professor in national, high-level special support programs. He received his Ph.D. degree in Computer Software and Theory from Beihang University in 2002 and worked as a Professor at Beihang University from 2003 to 2010. His current research interests include big data, data privacy, and the security of distributed systems.
Viral Quasispecies Spectrum Reconstruction via Coloring the Vertex in the Weighted Read Conflict Graph.- Robust feature selection method of Radiomics for grading glioma.- Cardiovascular Disease Risk Prediction based on Random Forest.- ECG Beat Classification based on Deep Bi-directional Long Short-term Memory Recurrent Neural Network.- Deep Convolutional Neural Networks for Electrocardiogram Classification.- Transfer Learning based Behavior Task Decoding from Brain Activity.- Fine-tuning ResNet for Breast Cancer Classification from Mammography.- Lung Sounds Diagnosis with Deep Convolutional Neural Network and Two-Stage Pipeline Model.- An Improved Data Anonymization Algorithm for Incomplete Medical Dataset Publishing.- ECG Classification Based on Long Short-Term Memory Networks.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.