Browse Results

Showing 21,276 through 21,300 of 54,430 results

ICT Education

by Stefan Gruner

This book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.

ICT Education

by Janet Liebenberg Stefan Gruner

This book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.

ICT Education: 45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers (Communications in Computer and Information Science #642)

by Salah Kabanda Hussein Suleman Stefan Gruner

45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers

ICT for Promoting Human Development and Protecting the Environment

by Francisco J. Mata Ana Pont

This book constitutes the refereed proceedings of the 6th IFIP World Information Technology Forum, WITFOR 2016, San Jos#65533;, Costa Rica, in September 2016. The 16 full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. Within the general theme ICT for Promoting Human Development and Protecting the Environment the papers are organized in the following topical sections encompassing the Sustainable Development Goals (SDGs) recently adopted by the United Nations: ICT and cross-cutting development issues; ICT and environmental problems: ICT and human development problems; and ICT and economic development problems.

ICT in Education

by Maria José Marcelino Antonió José Mendes Maria Cristina Azevedo Gomes

This book presents a peer reviewed selection of extended versions of ten original papers that were presented at the 15th International Symposium on Computers in Education (SIIE 2013) held in Viseu, Portugal. The book provide a representative view of current Information and Communications Technology (ICT) educational research approaches in the Ibero-American context as well as internationally. It includes studies that range from elementary to higher education, from traditional to distance learning settings. It considers special needs and other inclusive issues, across a range of disciplines, using multiple and diverse perspectives and technologies to furnish detailed information on the latest trends in ICT and education globally. Design, development and evaluation of educational software; ICT use and evaluation methodologies; social web and collaborative systems; and learning communities are some of the topics covered.

ICT in Education in Global Context

by Jon K. Price Kinshuk Ronghuai Huang

This book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.

ICT in Education in Global Context

by Jinbao Zhang Junfeng Yang Maiga Chang Tingwen Chang

Intended to promote the innovative use of technology in education and promote educational advances all over the world, this volume brings together 16 best-practice cases on technology-enhanced educational innovations. Experts from Turkey, Tunisia, Cyprus, Italy, Malaysia, China, India and Finland have contributed to these cases, highlighting the current state-of-the-art in the use of technology in education in their respective counties. Topics include best practices for designing smart classrooms, effective use of tablets and interactive whiteboards, virtual learning environments, digital learning spaces, game-based learning, synchronous cyber classrooms, micro-courses, among others. The book offers an essential resource on emerging technologies and the educational approaches currently being pursued in different countries to foster effective learning.

ICT in Education in Global Context

by Ronghuai Huang Kinshuk Jon K. Price

This book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.

ICT Systems Security and Privacy Protection

by Jaap-Henk Hoepman Stefan Katzenbeisser

This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.

ICTs in Developing Countries: Research, Practices and Policy Implications

by Bidit Dey Karim Sorour Raffaele Filieri

ICTs in Developing Countries is a collection of conceptual and empirical works on the adoption and impacts of ICT use in developing societies. Bringing together a wide range of disciplines and contributors, it offers a rich examination of digital divide and ICT for development both in terms of contextual information and disciplinary perspectives.

Identity and Data Security for Web Development: Best Practices

by Jonathan Leblanc Tim Messerschmidt

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity--without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security todayDesign security password encryption, and combat password attack vectorsCreate digital fingerprints to identify users through browser, device, and paired device detectionBuild secure data transmission systems through OAuth and OpenID ConnectUse alternate methods of identification for a second factor of authenticationHarden your web applications against attackCreate a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography

Identity, Authentication, and Access Management in OpenStack

by Henry Nash Brad Topol Steve Martinelli

Keystone--OpenStack's Identity service--provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer--as well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features--support for federated identity

Image Analysis and Recognition

by Aurélio Campilho Fakhri Karray

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016. The 79 revised full papers and 10 short papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in the following topical sections: Advances in Data Analytics and Pattern Recognition with Applications, Image Enhancement and Restoration, Image Quality Assessment, Image Segmentation, Pattern Analysis and Recognition, Feature Extraction, Detection and Recognition, Matching, Motion and Tracking, 3D Computer Vision, RGB-D Camera Applications, Visual Perception in Robotics, Biometrics, Biomedical Imaging, Brain Imaging, Cardiovascular Image Analysis, Image Analysis in Ophthalmology, Document Analysis, Applications, and Obituaries. "

Image and Signal Processing

by Alamin Mansouri Fathallah Nouboud Alain Chalifour Driss Mammass Jean Meunier Abderrahim Elmoataz

This book constitutes the refereed proceedings of the 7th International Conference, ICISP 2016, held in May/June 2016 in Trois-Rivières, QC, Canada. The 40 revised full papers were carefully reviewed and selected from 83 submissions. The contributions are organized in topical sections on features extraction, computer vision, and pattern recognition; multispectral and color imaging; image filtering, segmentation, and super-resolution; signal processing; biomedical imaging; geoscience and remote sensing; watermarking, authentication and coding; and 3d acquisition, processing, and applications.

Image and Video Technology

by Thomas Bräunl Brendan Mccane Mariano Rivera Xinguo Yu

Thisbook constitutes the thoroughly refereed post-conference proceedings of the 7thPacific Rim Symposium on Image and Video Technology, PSIVT 2015, held in Auckland,New Zealand, in November 2015. Thetotal of 61 revised papers was carefully reviewed and selected from 133submissions. The papers are organized in topical sections on color and motion,image/video coding and transmission, computational photography and arts, computervision and applications, image segmentation and classification, videosurveillance, biomedical image processing and analysis, object and patternrecognition, computer vision and pattern recognition, image/video processingand analysis, and pattern recognition.

Image and Video Technology - PSIVT 2015 Workshops

by Fay Huang Akihiro Sugimoto

This book constitutes the thoroughly refereedpost-conference proceedings of six international workshops held in theframework of the 7th Pacific-Rim Symposium on Image and Video Technology, PSIVT2015, during November 23-24, 2015, in Auckland, New Zealand. The 29 revised full papers presented werecarefully selected from 58 submissions. Their topics diversely ranged fromwell-established areas to novel current trends: robot vision, RV 2015; 2D and3D geometric properties from incomplete data, GPID 2015; vision meets graphics,VG 2015; passive and active electro-optical sensors for aerial and spaceimaging, EO4AS 2015; mathematical and computational methods in biomedicalimaging and image analysis, MCBMIIA 2015; and video surveillance, VSWS 2015.

Image Feature Detectors and Descriptors

by Ali Ismail Awad Mahmoud Hassaballah

This bookprovides readers with a selection of high-quality chapters that cover boththeoretical concepts and practical applications of image feature detectors anddescriptors. It serves as reference for researchers and practitioners byfeaturing survey chapters and research contributions on image feature detectorsand descriptors. Additionally, it emphasizes several keywords in boththeoretical and practical aspects of image feature extraction. The keywordsinclude acceleration of feature detection and extraction, hardwareimplantations, image segmentation, evolutionary algorithm, ordinal measures, aswell as visual speech recognition.

Image Processing and Communications Challenges 7

by Ryszard S. Choraś

This book contains papers accepted for IP&C 2015, the International Conference on Image Processing and Communications, held at UTP University of Science and Technology, Bydgoszcz, Poland, September 9-11, 2015. This conference was the eighth edition in the IP&C series of annual conferences. This book and the conference have the aim to bring together researchers and scientists in the broad fields of image processing and communications, addressing recent advances in theory, methodology and applications. The book will be of interest to a large group of researchers, engineers and practitioners in image processing and communications.

Image Processing in Diabetic Related Causes

by Amit Kumar Fahimuddin Shaik

This book is a collection of all the experimental results and analysis carried out on medical images of diabetic related causes. The experimental investigations have been carried out on images starting from very basic image processing techniques such as image enhancement to sophisticated image segmentation methods. This book is intended to create an awareness on diabetes and its related causes and image processing methods used to detect and forecast in a very simple way. This book is useful to researchers, Engineers, Medical Doctors and Bioinformatics researchers.

Immersive Learning Research Network

by Colin Allison Leonel Morgado Johanna Pirker Dennis Beck Jonathon Richter Christian Gütl

This book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.

Immersive Learning Research Network: Third International Conference, iLRN 2017, Coimbra, Portugal, June 26–29, 2017. Proceedings (Communications in Computer and Information Science #725)

by Dennis Beck Colin Allison Leonel Morgado Johanna Pirker Foaad Khosmood Jonathon Richter Christian Gütl

This book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.

The Impact of ICT on Work

by Jungwoo Lee

This edited volume presents current perspectives on the innovative use of Information and Communication Technologies (ICT) as an integral part of the changing nature of work. The individual chapters address a number of key concepts such as telecommuting, alternative work arrangements, job crafting, gamification and new work skills, supplemented by a range of examples and supporting case studies. The Impact of ICT on Work offers a valuable resource for business practitioners and academics in the areas of information systems, as well as for human resources managers. The book will also be useful in advanced graduate classes dealing with the social and business impacts of information and communication technologies.

Implementando el método GTD con Evernote

by Maria Jose Balbontin Jonathan Baker

Aprende cómo sacarle el máximo provecho al método GTD y a Evernote. Getting Things Done®, o GTD®, es un método de gestión de tiempo creado por el consultor de productividad David Allen. GTD es una de las técnicas más efectivas y populares que puedes usar para tomar las riendas de tu lista de tareas e incrementar tu productividad. El método GTD no sólo te ayuda a completar las tareas y proyectos inmediatos, sino que también te ayuda a avanzar hacia las metas más grandes en tu vida. Evernote® es un programa que originalmente fue creado para tomar y archivar notas. Estas notas pueden ser de texto, páginas web, mensajes de voz, fotos, y más. Evernote es estupendo para guardar todo tipo de información, y te hace fácil organizar y encontrar tu información. Con los consejos que ofrece este libro podrás combinar Evernote y GTD para crear un poderoso sistema para mejorar tu productividad. Usar el método GTD con Evernote te permitirá organizar tu vida personal y profesional en formato electrónico. Ya que Evernote está disponible como aplicación web y en dispositivos móviles, siempre puedes tener acceso a tus tareas, proyectos, metas y notas cuando y donde las necesites.

Implementation and Application of Automata

by Yo-Sub Han Kai Salomaa

This book constitutes the refereed proceedings of the 21st InternationalConference on Implementation and Application of Automata, CIAA 2016, held in Seoul, South Korea, in July 2016. The 26 revised full papers presented were carefully reviewed and selected from49 submissions. The papers cover a wide range of topics including characterizations of automata, computing distances between strings and languages, implementations ofautomata and experiments, enhanced regular expressions, and complexity analysis.

Implementing DirectAccess with Windows Server 2016

by Richard M. Hicks

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner. DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets. Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book: Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performance What you ll learn A high-level understanding of the various remote access technologies included in Windows Server 2016. Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highly available manner. Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices. Who This Book Is For IT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title. "

Refine Search

Showing 21,276 through 21,300 of 54,430 results