Browse Results

Showing 24,351 through 24,375 of 54,258 results

Proceedings of the 2nd International Conference on Healthcare Science and Engineering (Lecture Notes in Electrical Engineering #536)

by Chase Q. Wu Ming-Chien Chyu Jaime Lloret Xianxian Li

This book presents a compilation of selected papers from the 2nd International Conference on Healthcare Science and Engineering (Healthcare 2018). The work focuses on novel computing, networking, and data analytics techniques for various issues in healthcare. The book is a valuable resource for academic researchers and practitioners working in the field.

Engineering in Dependability of Computer Systems and Networks: Proceedings of the Fourteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, July 1–5, 2019, Brunów, Poland (Advances in Intelligent Systems and Computing #987)

by Wojciech Zamojski Jacek Mazurkiewicz Jarosław Sugier Tomasz Walkowiak Janusz Kacprzyk

This book presents papers on various problems of dependability in computer systems and networks that were discussed at the 14th DepCoS-RELCOMEX conference, in Brunów, Poland, from 1st to 5th July 2019. Discussing new ideas, research results and developments in the design, implementation, maintenance and analysis of complex computer systems, it is of interest to researchers and practitioners who are dealing with dependability issues in such systems. Dependability analysis came as a response to new challenges in the evaluation of contemporary complex systems, which should be considered as systems of people – with their needs and behaviours –interacting with technical communication channels (such as mobile activities, iCloud, Internet of Everything) and online applications, often operating in hostile environments. The diversity of topics covered, illustrates the variety of methods used in this area, often with the help of the latest results in artificial and computational intelligence.

Environmental Modeling Using Satellite Imaging and Dataset Re-processing (Studies in Big Data #54)

by Moses Eterigho Emetere

This book introduces methods of re-processing images to extract numerical information that can be used to quantify the observables in environmental modelling. Experiments or procedures that yield large images can be statistically or parametrically examined. Through the use of open source libraries, the book shows how ‘big data’ in the form of images or datasets can be comparatively analysed along same defined procedures or standards. This book helps to solve the challenges of discarding datasets that are relevant directly or indirectly to the research. The habit of screening datasets leads to the discard of over 90% of the original dataset or images generated in the experiments or procedure. If the images or datasets are generated under the same principles or conditions, then each measurement may be the narrative of unique events. The focus of this book is to enlighten researchers on how to analyse measurements with the aim of ensuring 100% utilization.

Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (OSINF) (SpringerBriefs in Cybersecurity)

by Samer Al-khateeb Nitin Agarwal

This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social network analysis and cyber forensic concepts and tools in order to identify and study information competitors. Through cyber forensic analysis, metadata associated with propaganda-riddled websites are extracted. This metadata assists in extracting social network information such as friends and followers along with communication network information such as networks depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks. Through computational social network analysis, the authors identify influential actors and powerful groups coordinating the disinformation campaign. A blended social cyber forensic approach allows them to study cross-media affiliations of the information competitors. For instance, narratives are framed on blogs and YouTube videos, and then Twitter and Reddit, for instance, will be used to disseminate the message. Social cyber forensic methodologies enable researchers to study the role of modern information and communication technologies (ICTs) in the evolution of information campaign and coordination. In addition to the concepts and methodologies pertaining to social cyber forensics, this book also offers a collection of resources for readers including several datasets that were collected during case studies, up-to-date reference and literature surveys in the domain, and a suite of tools that students, researchers, and practitioners alike can utilize. Most importantly, the book demands a dialogue between information science researchers, public affairs officers, and policy makers to prepare our society to deal with the lawless “wild west” of modern social information systems triggering debates and studies on cyber diplomacy.

Syntactic n-grams in Computational Linguistics (SpringerBriefs in Computer Science)

by Grigori Sidorov

This book is about a new approach in the field of computational linguistics related to the idea of constructing n-grams in non-linear manner, while the traditional approach consists in using the data from the surface structure of texts, i.e., the linear structure.In this book, we propose and systematize the concept of syntactic n-grams, which allows using syntactic information within the automatic text processing methods related to classification or clustering. It is a very interesting example of application of linguistic information in the automatic (computational) methods. Roughly speaking, the suggestion is to follow syntactic trees and construct n-grams based on paths in these trees. There are several types of non-linear n-grams; future work should determine, which types of n-grams are more useful in which natural language processing (NLP) tasks. This book is intended for specialists in the field of computational linguistics. However, we made an effort to explain in a clear manner how to use n-grams; we provide a large number of examples, and therefore we believe that the book is also useful for graduate students who already have some previous background in the field.

Human Centered Computing: 4th International Conference, HCC 2018, Mérida, Mexico, December, 5–7, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11354)

by Yong Tang Qiaohong Zu José G. Rodríguez García

This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018. The 50 full and 18 short papers presented in this volume were carefully reviewed and selected from a total of 146 submissions. They focus on a "hyper-connected world", dealing with new developments in artificial intelligence, deep learning, brain-computing, etc.

The Complete Privacy Security Desk Reference: Volume One: Digital

by Michael Bazzell Justin Carroll

This textbook, at nearly 500 pages, will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security. When taken to the extreme, you will be impossible to compromise.

Programming Ecto: Build Database Apps in Elixir for Scalability and Performance

by Darin Wilson Eric Meadows-Jonsson

Languages may come and go, but the relational database endures. Learn how to use Ecto, the premier database library for Elixir, to connect your Elixir and Phoenix apps to databases. Get a firm handle on Ecto fundamentals with a module-by-module tour of the critical parts of Ecto. Then move on to more advanced topics and advice on best practices with a series of recipes that provide clear, step-by-step instructions on scenarios commonly encountered by app developers. Co-authored by the creator of Ecto, this title provides all the essentials you need to use Ecto effectively. Elixir and Phoenix are taking the application development world by storm, and Ecto, the database library that ships with Phoenix, is going right along with them. There are plenty of examples that show you the basics, but to use Ecto to its full potential, you need to learn the library from the ground up. This definitive guide starts with a tour of the core features of Ecto - repos, queries, schemas, changesets, transactions - gradually building your knowledge with tasks of ever-increasing complexity. Along the way, you'll be learning by doing - a sample application handles all the boilerplate so you can focus on getting Ecto into your fingers. Build on that core knowledge with a series of recipes featuring more advanced topics. Change your pooling strategy to maximize your database's efficiency. Use nested associations to handle complex table relationships. Add streams to handle large result sets with ease. Based on questions from Ecto users, these recipes cover the most common situations developers run into. Whether you're new to Ecto, or already have an app in production, this title will give you a deeper understanding of how Ecto works, and help make your database code cleaner and more efficient. What You Need: To follow along with the book, you should have Erlang/OTP 19+ and Elixir 1.4+ installed. The book will guide you through setting up a sample application that integrates Ecto.

Guía No Oficial de Dragon Mania Legends

by Carlos A. Valenti García Joshua Abbott

*GUÍA NO OFICIAL* Consejos Avanzados & Guía de Estrategias.Esta es la guía más completa y detallada que encontrarás en lína. Disponible para descargar en tu dispositivo móvil, celular, lector de Ebooks, o en forma física. Con el éxito de mis cientos de guías escritas y estrategias he escrito otra avanzada guía profesional para jugadores nuevos y veteranos. ¡Contiene estrategias y consejos específicos para progresar en el juego y vencer a tus ponentes, adquirir más monedas, y muchas cosas más! - Consejos y Estrategias Profesionales. - Trucos. - ¡Secretos, Consejos, Trucos, Desbloquables, y Estrategias Usadas Por Profesionales! - Cómo Obtener Tonaladas de Monedas. - ¡Y MUCHO MÁS! Todas las versiones de esta guía incluyen capturas de pantalla para ayudarte a entender mejor el juego. No existe guía más completa y avanzada que esta. Disclaimer: Este producto no está asociado, afiliado, endosado, certificado, o patrocinado por el Acreedor Original de Derechos de Autor.

Left to Their Own Devices: How Digital Natives Are Reshaping the American Dream

by Julie M. Albright

A sociologist explores the many ways that digital natives' interaction with technology has changed their relationship with people, places, jobs, and other stabilizing structures and created a new way of life that is at odds with the American Dream of past generations.Digital natives are hacking the American Dream. Young people brought up with the Internet, smartphones, and social media are quickly rendering old habits, values, behaviors, and norms a distant memory--creating the greatest generation gap in history. In this eye-opening book, digital sociologist Julie M. Albright looks at the many ways in which younger people, facilitated by technology, are coming "untethered" from traditional aspirations and ideals, and asks: What are the effects of being disconnected from traditional, stabilizing social structures like churches, marriage, political parties, and long-term employment? What does it mean to be human when one's ties to people, places, jobs, and societal institutions are weakened or broken, displaced by digital hyper-connectivity? Albright sees both positives and negatives. On the one hand, mobile connectivity has given digital nomads the unprecedented opportunity to work or live anywhere. But, new threats to well-being are emerging, including increased isolation, anxiety, and loneliness, decreased physical exercise, ephemeral relationships, fragmented attention spans, and detachment from the calm of nature.In this time of rapid, global, technologically driven change, this book offers fresh insights into the unintended societal and psychological implications of lives exclusively lived in a digital world.

Fundamentals of Image Data Mining: Analysis, Features, Classification and Retrieval (Texts in Computer Science)

by Dengsheng Zhang

This reader-friendly textbook presents a comprehensive review of the essentials of image data mining, and the latest cutting-edge techniques used in the field. The coverage spans all aspects of image analysis and understanding, offering deep insights into areas of feature extraction, machine learning, and image retrieval. The theoretical coverage is supported by practical mathematical models and algorithms, utilizing data from real-world examples and experiments.Topics and features: describes the essential tools for image mining, covering Fourier transforms, Gabor filters, and contemporary wavelet transforms; reviews a varied range of state-of-the-art models, algorithms, and procedures for image mining; emphasizes how to deal with real image data for practical image mining; highlights how such features as color, texture, and shape can be mined or extracted from images for image representation; presents four powerful approaches for classifying image data, namely, Bayesian classification, Support Vector Machines, Neural Networks, and Decision Trees; discusses techniques for indexing, image ranking, and image presentation, along with image database visualization methods; provides self-test exercises with instructions or Matlab code, as well as review summaries at the end of each chapter.This easy-to-follow work illuminates how concepts from fundamental and advanced mathematics can be applied to solve a broad range of image data mining problems encountered by students and researchers of computer science. Students of mathematics and other scientific disciplines will also benefit from the applications and solutions described in the text, together with the hands-on exercises that enable the reader to gain first-hand experience of computing.

Digital Image Forensics: Theory and Implementation (Studies in Computational Intelligence #755)

by Aniket Roy Rahul Dixit Ruchira Naskar Rajat Subhra Chakraborty

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.

Keras to Kubernetes: The Journey of a Machine Learning Model to Production

by Dattaraj Rao

Build a Keras model to scale and deploy on a Kubernetes cluster We have seen an exponential growth in the use of Artificial Intelligence (AI) over last few years. AI is becoming the new electricity and is touching every industry from retail to manufacturing to healthcare to entertainment. Within AI, we're seeing a particular growth in Machine Learning (ML) and Deep Learning (DL) applications. ML is all about learning relationships from labeled (Supervised) or unlabeled data (Unsupervised). DL has many layers of learning and can extract patterns from unstructured data like images, video, audio, etc. Keras to Kubernetes: The Journey of a Machine Learning Model to Production takes you through real-world examples of building DL models in Keras for recognizing product logos in images and extracting sentiment from text. You will then take that trained model and package it as a web application container before learning how to deploy this model at scale on a Kubernetes cluster. You will understand the different practical steps involved in real-world ML implementations which go beyond the algorithms. • Find hands-on learning examples • Learn to uses Keras and Kubernetes to deploy Machine Learning models • Discover new ways to collect and manage your image and text data with Machine Learning • Reuse examples as-is to deploy your models • Understand the ML model development lifecycle and deployment to production If you're ready to learn about one of the most popular DL frameworks and build production applications with it, you've come to the right place!

Megaphone Bureaucracy: Speaking Truth to Power in the Age of the New Normal

by Dennis C. Grube

A revealing look at how today’s bureaucrats are finding their public voice in the era of 24-hour mediaOnce relegated to the anonymous back rooms of democratic debate, our bureaucratic leaders are increasingly having to govern under the scrutiny of a 24-hour news cycle, hyperpartisan political oversight, and a restless populace that is increasingly distrustful of the people who govern them. Megaphone Bureaucracy reveals how today’s civil servants are finding a voice of their own as they join elected politicians on the public stage and jockey for advantage in the persuasion game of modern governance.In this timely and incisive book, Dennis Grube draws on in-depth interviews and compelling case studies from the United States, the United Kingdom, Australia, Canada, and New Zealand to describe how senior bureaucrats are finding themselves drawn into political debates they could once avoid. Faced with a political climate where polarization and media spin are at an all-time high, these modern mandarins negotiate blame games and manage contradictory expectations in the glare of an unforgiving spotlight. Grube argues that in this fiercely divided public square a new style of bureaucratic leadership is emerging, one that marries the robust independence of Washington agency heads with the prudent political neutrality of Westminster civil servants. These “Washminster” leaders do not avoid the public gaze, nor do they overtly court political controversy. Rather, they use their increasingly public pulpits to exert their own brand of persuasive power.Megaphone Bureaucracy shows how today’s senior bureaucrats are making their voices heard by embracing a new style of communication that brings with it great danger but also great opportunity.

Industry 4.0: Developments towards the Fourth Industrial Revolution (SpringerBriefs in Applied Sciences and Technology)

by Kaushik Kumar Divya Zindani J. Paulo Davim

This book provides an overview of the burgeoning next generation of industry- Industry 4.0, which promises to increase flexibility in manufacturing in tandem with mass communication, improved productivity and better quality. This volume provides a comprehensive and holistic overview of intelligent manufacturing, process planning, assessment of product development opportunities, aspects of risk management, education and qualification requirements, socio-technical considerations and the sustainability of business models. This volume will be of interest to engineers, entrepreneurs, academics and students working in these fields.

Financially Forward: How to Use Today's Digital Tools to Earn More, Save Better, and Spend Smarter

by Alexa von Tobel

Chief digital officer at Northwestern Mutual, founder/CEO of LearnVest, and New York Times bestelling author shows how to use the simple tools of the digital age to get more out of our money.We live in a new financial world. Our wallets--like every other aspect of our lives--have gone fully digital. From mobile pay to on-demand everything to cryptocurrencies, technology is rewriting the rules for how we earn, save, spend and invest. Technology has made virtually every aspect of our lives cheaper and more convenient. Shouldn't it do the same when it comes to managing our finances?Von Tobel says that it can. In this straightforward and jargon-free guide, she shows us how to use the simple tools found on any smartphone to put more money back into our wallets. Readers will learn: Six new trends that are impacting our finances - and how to optimize them How to navigate the world of mobile pay, and cash in by going cash-free How to save time and money by putting your savings--and spending--on autopilot Best practices for keeping your identity and financial accounts ultra-secure How to talk to digital natives - ie your kids - about financial planning What the Bitcoin hype is all about and how to prepare for the future of digital moneyPreparing ourselves for the financial future gives us the security and freedom to live our richest lives. It's time to move Financially Forward...or get left behind.

AutoCAD For Dummies

by Bill Fane

Simple steps for creating AutoCAD drawings AutoCAD is the ubiquitous tool used by engineers, architects, designers, and urban planners to put their ideas on paper. It takes some AutoCAD know-how to go from a brilliant idea to a drawing that properly explains how brilliant your idea is. AutoCAD For Dummies helps you de-mystify the handy software and put the tools in AutoCAD to use. Written by an experienced AutoCAD engineer and mechanical design instructor, it assumes no previous computer-aided drafting experience as it walks you through the basics of starting projects and drawing straight lines all the way up through 3D modeling. Conquer the first steps in creating an AutoCAD project Tackle drawing basics including straight lines and curves Add advanced skills including 3D drawing and modeling Set up a project and move into 3D It's true that AutoCAD is tough, but with the friendly instruction in this hands-on guide, you'll find everything you need to start creating marvelous models—without losing your cool.

Sh*tshow!: The Country's Collapsing . . . and the Ratings Are Great

by Charlie LeDuff

A daring, firsthand, and utterly-unscripted account of crisis in America, from Ferguson to Flint to Cliven Bundy's ranch to Donald Trump's unstoppable campaign for President--at every turn, Pulitzer-prize winner and bestselling author of Detroit: An American Autopsy, Charlie LeDuff was thereIn the Fall of 2013, long before any sane person had seriously considered the possibility of a Trump presidency, Charlie LeDuff sat in the office of then-Fox News CEO Roger Ailes, and made a simple but prophetic claim: The whole country is bankrupt and on high boil. It’s a shitshow out there. No one in the bubbles of Washington, DC., New York, or Los Angles was talking about it--least of all the media. LeDuff wanted to go to the heart of the country to report what was really going on. Ailes baulked. Could the hard-living and straight-shooting LeDuff be controlled? But, then, perhaps on a whim, he agreed. And so LeDuff set out to record a TV series called, "The Americans," and, along the way, ended up bearing witness to the ever-quickening unraveling of The American Dream.For three years, LeDuff travelled the width and breadth of the country with his team of production irregulars, ending up on the Mexican border crossing the Rio Grande on a yellow rubber kayak alongside undocumented immigrants; in the middle of Ferguson as the city burned; and watching the children of Flint get sick from undrinkable water. Racial, political, social, and economic tensions were escalating by the day. The inexorable effects of technological change and globalization were being felt more and more acutely, at the same time as wages stagnated and the price of housing, education, and healthcare went through the roof. The American people felt defeated and abandoned by their politicians, and those politicians seemed incapable of rising to the occasion. The old way of life was slipping away, replaced only by social media, part-time work, and opioid addiction.Sh*tshow! is that true, tragic, and distinctively American story, told from the parts of the country hurting the most. A soul-baring, irreverent, and iconoclastic writer, LeDuff speaks the language of everyday Americans, and is unafraid of getting his hands dirty. He scrambles the tired-old political, social, and racial categories, taking no sides--or prisoners. Old-school, gonzo-style reporting, this is both a necessary confrontation with the darkest parts of the American psyche and a desperately-needed reminder of the country's best instincts.

Dave Gorman's Googlewhack! Adventure

by Dave Gorman

A “hilarious” tale of procrastination, obsession, search engines, and worldwide travel, based on the award-winning one-man comedy show (Booklist). “When he turned 31, British stand-up comic Gorman decided he wanted to be taken seriously, so he landed a contract to write a novel. He took novel writing so seriously he grew a beard. But no matter how he tried, Gorman couldn’t actually write anything. One of his procrastination methods was googlewhacking—a game in which the ‘whacker’ types two different words into Google and tries to get exactly one hit. His first googlewhack, ‘Dork Turnspit,’ led him to a site featuring photographs of women with dogs. Gorman found the site so fascinating that he met its owner and then asked the women-and-dogs fellow to find him another googlewhack. And so begins one of history’s greatest ventures in procrastination. Over the next weeks, Gorman traveled tens of thousands of miles, everywhere from Columbus, Ohio, to Beijing, China, meeting googlewhacks, trying to string together 10 in a row by getting two new googlewhacks from each person he met . . . Gorman’s self-deprecating wit and irrational dedication to his quest make this a hilarious travelogue.” —Booklist “Fresh, funny and entertaining.” —The Daily Mail “An onslaught of amusing anecdotes and digressive detours.” —Publishers Weekly

Network Slicing for 5G and Beyond Networks

by S. M. Kazmi Latif U. Khan Nguyen H. Tran Choong Seon Hong

This book provides a comprehensive guide to the emerging field of network slicing and its importance to bringing novel 5G applications into fruition. The authors discuss the current trends, novel enabling technologies, and current challenges imposed on the cellular networks. Resource management aspects of network slicing are also discussed by summarizing and comparing traditional game theoretic and optimization based solutions. Finally, the book presents some use cases of network slicing and applications for vertical industries. Topics include 5G deliverables, Radio Access Network (RAN) resources, and Core Network (CN) resources. Discusses the 5G network requirements and the challenges therein and how network slicing offers a solutionFeatures the enabling technologies of future networks and how network slicing will play a rolePresents the role of machine learning and data analytics for future cellular networks along with summarizing the machine learning approaches for 5G and beyond networks

Project Management Methodologies, Governance and Success: Insight from Traditional and Transformative Research (Best Practices and Advances in Program Management)

by Robert Joslin

Project management methodologies, practices, and guidelines are the only explicit information that project managers have and, when properly maintained, should reflect the most current knowledge and guidance to achieve repeatable successful project outcomes. Despite more than 50 years of research in the field of project management, project success r

Internet Video Culture in China: YouTube, Youku, and the Space in Between (Routledge Contemporary China Series)

by Marc L Moskowitz

Examining Internet culture in the People’s Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.

Protecting Information Assets and IT Infrastructure in the Cloud

by Ravi Das Preston de Guise

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.

Robotics and Well-Being: The Role Of Ethics And Standardization (Intelligent Systems, Control and Automation: Science and Engineering #95)

by Maria Isabel Aldinhas Ferreira João Silva Sequeira Gurvinder Singh Virk Mohammad Osman Tokhi Endre E. Kadar

This book highlights some of the most pressing safety, ethical, legal and societal issues related to the diverse contexts in which robotic technologies apply. Focusing on the essential concept of well-being, it addresses topics that are fundamental not only for research, but also for industry and end-users, discussing the challenges in a wide variety of applications, including domestic robots, autonomous manufacturing, personal care robots and drones.

Information and Communication Technologies for Ageing Well and e-Health: 4th International Conference, ICT4AWE 2018, Funchal, Madeira, Portugal, March 22–23, 2018, Revised Selected Papers (Communications in Computer and Information Science #982)

by Panagiotis D. Bamidis Martina Ziefle Leszek A. Maciaszek

This book constitutes the thoroughly refereed proceedings of the third International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AWE 2018, held in Funchal, Madeira, Portugal in March 2018.The 10 full papers presented were carefully reviewed and selected from 32 submissions. The papers aim at contributing to the understanding of relevant trends of current research on ICT for Ageing Well and eHealth including the ambient assisted living.

Refine Search

Showing 24,351 through 24,375 of 54,258 results