- Table View
- List View
ICT Education
by Stefan GrunerThis book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.
ICT Education
by Janet Liebenberg Stefan GrunerThis book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.
ICT Education: 45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers (Communications in Computer and Information Science #642)
by Salah Kabanda Hussein Suleman Stefan Gruner45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers
ICT for Promoting Human Development and Protecting the Environment
by Francisco J. Mata Ana PontThis book constitutes the refereed proceedings of the 6th IFIP World Information Technology Forum, WITFOR 2016, San Jos#65533;, Costa Rica, in September 2016. The 16 full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. Within the general theme ICT for Promoting Human Development and Protecting the Environment the papers are organized in the following topical sections encompassing the Sustainable Development Goals (SDGs) recently adopted by the United Nations: ICT and cross-cutting development issues; ICT and environmental problems: ICT and human development problems; and ICT and economic development problems.
ICT in Education
by Maria José Marcelino Antonió José Mendes Maria Cristina Azevedo GomesThis book presents a peer reviewed selection of extended versions of ten original papers that were presented at the 15th International Symposium on Computers in Education (SIIE 2013) held in Viseu, Portugal. The book provide a representative view of current Information and Communications Technology (ICT) educational research approaches in the Ibero-American context as well as internationally. It includes studies that range from elementary to higher education, from traditional to distance learning settings. It considers special needs and other inclusive issues, across a range of disciplines, using multiple and diverse perspectives and technologies to furnish detailed information on the latest trends in ICT and education globally. Design, development and evaluation of educational software; ICT use and evaluation methodologies; social web and collaborative systems; and learning communities are some of the topics covered.
ICT in Education in Global Context
by Jon K. Price Kinshuk Ronghuai HuangThis book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.
ICT in Education in Global Context
by Jinbao Zhang Junfeng Yang Maiga Chang Tingwen ChangIntended to promote the innovative use of technology in education and promote educational advances all over the world, this volume brings together 16 best-practice cases on technology-enhanced educational innovations. Experts from Turkey, Tunisia, Cyprus, Italy, Malaysia, China, India and Finland have contributed to these cases, highlighting the current state-of-the-art in the use of technology in education in their respective counties. Topics include best practices for designing smart classrooms, effective use of tablets and interactive whiteboards, virtual learning environments, digital learning spaces, game-based learning, synchronous cyber classrooms, micro-courses, among others. The book offers an essential resource on emerging technologies and the educational approaches currently being pursued in different countries to foster effective learning.
ICT in Education in Global Context
by Ronghuai Huang Kinshuk Jon K. PriceThis book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.
ICT Systems Security and Privacy Protection
by Jaap-Henk Hoepman Stefan KatzenbeisserThis book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.
ICTs in Developing Countries: Research, Practices and Policy Implications
by Bidit Dey Karim Sorour Raffaele FilieriICTs in Developing Countries is a collection of conceptual and empirical works on the adoption and impacts of ICT use in developing societies. Bringing together a wide range of disciplines and contributors, it offers a rich examination of digital divide and ICT for development both in terms of contextual information and disciplinary perspectives.
Identity and Data Security for Web Development: Best Practices
by Jonathan Leblanc Tim MesserschmidtDevelopers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity--without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security todayDesign security password encryption, and combat password attack vectorsCreate digital fingerprints to identify users through browser, device, and paired device detectionBuild secure data transmission systems through OAuth and OpenID ConnectUse alternate methods of identification for a second factor of authenticationHarden your web applications against attackCreate a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography
Identity, Authentication, and Access Management in OpenStack
by Henry Nash Brad Topol Steve MartinelliKeystone--OpenStack's Identity service--provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer--as well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features--support for federated identity
Image Analysis and Recognition
by Aurélio Campilho Fakhri KarrayThis book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016. The 79 revised full papers and 10 short papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in the following topical sections: Advances in Data Analytics and Pattern Recognition with Applications, Image Enhancement and Restoration, Image Quality Assessment, Image Segmentation, Pattern Analysis and Recognition, Feature Extraction, Detection and Recognition, Matching, Motion and Tracking, 3D Computer Vision, RGB-D Camera Applications, Visual Perception in Robotics, Biometrics, Biomedical Imaging, Brain Imaging, Cardiovascular Image Analysis, Image Analysis in Ophthalmology, Document Analysis, Applications, and Obituaries. "
Image and Signal Processing
by Alamin Mansouri Fathallah Nouboud Alain Chalifour Driss Mammass Jean Meunier Abderrahim ElmoatazThis book constitutes the refereed proceedings of the 7th International Conference, ICISP 2016, held in May/June 2016 in Trois-Rivières, QC, Canada. The 40 revised full papers were carefully reviewed and selected from 83 submissions. The contributions are organized in topical sections on features extraction, computer vision, and pattern recognition; multispectral and color imaging; image filtering, segmentation, and super-resolution; signal processing; biomedical imaging; geoscience and remote sensing; watermarking, authentication and coding; and 3d acquisition, processing, and applications.
Image and Video Technology
by Thomas Bräunl Brendan Mccane Mariano Rivera Xinguo YuThisbook constitutes the thoroughly refereed post-conference proceedings of the 7thPacific Rim Symposium on Image and Video Technology, PSIVT 2015, held in Auckland,New Zealand, in November 2015. Thetotal of 61 revised papers was carefully reviewed and selected from 133submissions. The papers are organized in topical sections on color and motion,image/video coding and transmission, computational photography and arts, computervision and applications, image segmentation and classification, videosurveillance, biomedical image processing and analysis, object and patternrecognition, computer vision and pattern recognition, image/video processingand analysis, and pattern recognition.
Image and Video Technology - PSIVT 2015 Workshops
by Fay Huang Akihiro SugimotoThis book constitutes the thoroughly refereedpost-conference proceedings of six international workshops held in theframework of the 7th Pacific-Rim Symposium on Image and Video Technology, PSIVT2015, during November 23-24, 2015, in Auckland, New Zealand. The 29 revised full papers presented werecarefully selected from 58 submissions. Their topics diversely ranged fromwell-established areas to novel current trends: robot vision, RV 2015; 2D and3D geometric properties from incomplete data, GPID 2015; vision meets graphics,VG 2015; passive and active electro-optical sensors for aerial and spaceimaging, EO4AS 2015; mathematical and computational methods in biomedicalimaging and image analysis, MCBMIIA 2015; and video surveillance, VSWS 2015.
Image Feature Detectors and Descriptors
by Ali Ismail Awad Mahmoud HassaballahThis bookprovides readers with a selection of high-quality chapters that cover boththeoretical concepts and practical applications of image feature detectors anddescriptors. It serves as reference for researchers and practitioners byfeaturing survey chapters and research contributions on image feature detectorsand descriptors. Additionally, it emphasizes several keywords in boththeoretical and practical aspects of image feature extraction. The keywordsinclude acceleration of feature detection and extraction, hardwareimplantations, image segmentation, evolutionary algorithm, ordinal measures, aswell as visual speech recognition.
Image Processing and Communications Challenges 7
by Ryszard S. ChoraśThis book contains papers accepted for IP&C 2015, the International Conference on Image Processing and Communications, held at UTP University of Science and Technology, Bydgoszcz, Poland, September 9-11, 2015. This conference was the eighth edition in the IP&C series of annual conferences. This book and the conference have the aim to bring together researchers and scientists in the broad fields of image processing and communications, addressing recent advances in theory, methodology and applications. The book will be of interest to a large group of researchers, engineers and practitioners in image processing and communications.
Image Processing in Diabetic Related Causes
by Amit Kumar Fahimuddin ShaikThis book is a collection of all the experimental results and analysis carried out on medical images of diabetic related causes. The experimental investigations have been carried out on images starting from very basic image processing techniques such as image enhancement to sophisticated image segmentation methods. This book is intended to create an awareness on diabetes and its related causes and image processing methods used to detect and forecast in a very simple way. This book is useful to researchers, Engineers, Medical Doctors and Bioinformatics researchers.
Immersive Learning Research Network
by Colin Allison Leonel Morgado Johanna Pirker Dennis Beck Jonathon Richter Christian GütlThis book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.
Immersive Learning Research Network: Third International Conference, iLRN 2017, Coimbra, Portugal, June 26–29, 2017. Proceedings (Communications in Computer and Information Science #725)
by Dennis Beck Colin Allison Leonel Morgado Johanna Pirker Foaad Khosmood Jonathon Richter Christian GütlThis book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.
The Impact of ICT on Work
by Jungwoo LeeThis edited volume presents current perspectives on the innovative use of Information and Communication Technologies (ICT) as an integral part of the changing nature of work. The individual chapters address a number of key concepts such as telecommuting, alternative work arrangements, job crafting, gamification and new work skills, supplemented by a range of examples and supporting case studies. The Impact of ICT on Work offers a valuable resource for business practitioners and academics in the areas of information systems, as well as for human resources managers. The book will also be useful in advanced graduate classes dealing with the social and business impacts of information and communication technologies.
Implementando el método GTD con Evernote
by Maria Jose Balbontin Jonathan BakerAprende cómo sacarle el máximo provecho al método GTD y a Evernote. Getting Things Done®, o GTD®, es un método de gestión de tiempo creado por el consultor de productividad David Allen. GTD es una de las técnicas más efectivas y populares que puedes usar para tomar las riendas de tu lista de tareas e incrementar tu productividad. El método GTD no sólo te ayuda a completar las tareas y proyectos inmediatos, sino que también te ayuda a avanzar hacia las metas más grandes en tu vida. Evernote® es un programa que originalmente fue creado para tomar y archivar notas. Estas notas pueden ser de texto, páginas web, mensajes de voz, fotos, y más. Evernote es estupendo para guardar todo tipo de información, y te hace fácil organizar y encontrar tu información. Con los consejos que ofrece este libro podrás combinar Evernote y GTD para crear un poderoso sistema para mejorar tu productividad. Usar el método GTD con Evernote te permitirá organizar tu vida personal y profesional en formato electrónico. Ya que Evernote está disponible como aplicación web y en dispositivos móviles, siempre puedes tener acceso a tus tareas, proyectos, metas y notas cuando y donde las necesites.
Implementation and Application of Automata
by Yo-Sub Han Kai SalomaaThis book constitutes the refereed proceedings of the 21st InternationalConference on Implementation and Application of Automata, CIAA 2016, held in Seoul, South Korea, in July 2016. The 26 revised full papers presented were carefully reviewed and selected from49 submissions. The papers cover a wide range of topics including characterizations of automata, computing distances between strings and languages, implementations ofautomata and experiments, enhanced regular expressions, and complexity analysis.
Implementing DirectAccess with Windows Server 2016
by Richard M. HicksLearn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner. DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets. Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book: Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performance What you ll learn A high-level understanding of the various remote access technologies included in Windows Server 2016. Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highly available manner. Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices. Who This Book Is For IT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title. "