Indonesia is a country that is rich in cultural heritage, both tangible and intangible objects. Among the valuable legacies are the Banten Grand Mosque and the Baduy tribal house located in Banten Province. As part of...
详细信息
This book presents the proceedings of the 3rdinternationalconference of Reliable Information and Communication Technology 2018 (IRICT 2018), which was held in Kuala Lumpur, Malaysia, on July 2324, 2018. The main the...
ISBN:
(纸本)9783319990064
This book presents the proceedings of the 3rdinternationalconference of Reliable Information and Communication Technology 2018 (IRICT 2018), which was held in Kuala Lumpur, Malaysia, on July 2324, 2018. The main theme of the conference was Data Science, AI and IoT Trends for the Fourth Industrial Revolution. A total of 158 papers were submitted to the conference, of which 103 were accepted and considered for publication in this book. Several hot research topics are covered, including Advances in Data Science and Big Data Analytics, Artificial Intelligence and Soft computing, Business Intelligence, Internet of Things (IoT) Technologies and Applications, Intelligent Communication Systems, Advances in Computer Vision, Health informatics, Reliable Cloud computing Environments, Recent Trends in Knowledge Management, Security Issues in the Cyber World, and Advances in Information Systems Research, Theories and Methods.
Cloud computing technology is widely used in the field of medical information, providing strong technical support for the information construction of medical and health institutions, but at the same time it also bring...
详细信息
Cloud computing technology is widely used in the field of medical information, providing strong technical support for the information construction of medical and health institutions, but at the same time it also brings privacy disclosure of medical data and hidden dangers of medical information insecurity. Control is one of the key technologies in the privacy and security protection of medical data in cloud services. This paper aims at the limitations of the RBAC model applied to the SaaS model, improves it, and proposes a Service-Oriented Multi-tenant Access Control (SMTAC) strategy to meet the needs of the software rental service to provide security for multiple healthcare organizations in the region at the SaaS model.
Augmented Reality is a technology that allows users to see the real world, with virtual objects placed on it or combined with the real world. Augmented Reality itself can be applied to various things, including as an ...
详细信息
Beef color is an important indicator in determining the quality of beef. Unfortunately, currently there is no quantitative and standardized method for classifying and analyzing the color of beef. In the SNI 3932: 2008...
详细信息
Text classification is a task to assign text documents according to its content to one or more classes automatically. Recently character-level models using deep neural networks have been developed to do classification...
详细信息
The development of online motorcycle taxis in Malang has increased especially GO-JEK. This raises competition among motorcycle taxis online, which affects online ojek service providers, especially service providers of...
详细信息
With the growing popularity of smartphone and network technology increasingly perfect, the function of the mobile phone is also growing intelligent. Smart phones with various APP have been applied throughout all aspec...
详细信息
ISBN:
(纸本)9781538643013
With the growing popularity of smartphone and network technology increasingly perfect, the function of the mobile phone is also growing intelligent. Smart phones with various APP have been applied throughout all aspects of life. Near Field Communication (NFC) is a short-range communication technology, the using of which on the smart phone is of great development potential. Currently, although the application of NFC technology in ERP system is relatively rare, NFC tag is of great value as a next generation of information carrier, which combines its data stream with ERP system on the phone. Firstly, this paper use the cross platform tool called Unity3D to develop the NFC tag reading and writing APP for Android system. Then, based on Android soft keyboard application, NFC input application is developed. The application aims to input NFC stream in anywhere soft keyboard could use on the phone. Finally, the NFC data encryption and data protection functions are realized in the application, which ensures the security of the NFC data. It will be integrated with the ERP system-Odoo.
The opinion features can be used to improve the quality of product recommendations. There are some previous researches that try to compare products using opinion features. They compare products using the weight of the...
详细信息
Proposed system does analysis and prediction of with Regression Analysis. Conceptually the Intelligence is a combination of technologies and processing (i.e. Virtualization, Cloud computing, and Machine Learning etc.)...
详细信息
ISBN:
(纸本)9781538647653
Proposed system does analysis and prediction of with Regression Analysis. Conceptually the Intelligence is a combination of technologies and processing (i.e. Virtualization, Cloud computing, and Machine Learning etc.). Now a day Machine learning (ML) is one of the fastest growing fields in computer science and health care informatics. ML's goal is to develop algorithm which can learn as time passes and improve also and can be used for prediction algorithm that can interact with agent and can optimize their learning behavior through these interactions where the agent can also be a human. This paper discusses about working Application of Pseudo intelligence using health care. The result of pseudo intelligence improves the efficiency in providing better survivability of people. Intelligence system is helpful to find out need requirement of a particular health care. Simple linear multivariate regression technique is used for prediction. Dataset is taken from UCI repository. We have achieved maximum accuracy using regression. Aggregation is used to convert uncertain probabilistic data into a certain data. Data mining is used for future power requirement analysis.
暂无评论