Big Data Technologies And Applications: 7th International Conference, Bdta 2016, Seoul, South Korea, November 17-18, 2016, Proceedings (lecture Notes ... And Telecommunications Engineering) 🔍
Jason J Jung; Pankoo Kim; International Conference on Big data Technologies and Applications; International Workshop on Internet of Things, Social Network, and Security in Big Data; International Workshop on Digital Humanity with Big Data
Springer International Publishing Imprint : Springer, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 194, 1, 2017
英语 [en] · PDF · 14.1MB · 2017 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform.
The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques big data analytics and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems®) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification.
The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.
The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques big data analytics and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems®) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification.
The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.
备用文件名
lgli/K:\!genesis\!repository9\spr\10.1007%2F978-3-319-58967-1.pdf
备用文件名
lgrsnf/K:\!genesis\!repository9\spr\10.1007%2F978-3-319-58967-1.pdf
备用文件名
nexusstc/Big Data Technologies and Applications/fff7ed89719f37f9b7470c6c7afe5d0b.pdf
备用文件名
scihub/10.1007/978-3-319-58967-1.pdf
备用文件名
zlib/Computers/Jason J. Jung, Pankoo Kim (eds.)/Big Data Technologies and Applications: 7th International Conference, BDTA 2016, Seoul, South Korea, November 17–18, 2016, Proceedings_2942222.pdf
备选标题
450512_Print.indd
备选作者
BDTA (Conference)
备选作者
0009172
备用出版商
Springer Nature Switzerland AG
备用版本
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 194, Cham, Switzerland, 2017
备用版本
Springer Nature, Cham, 2017
备用版本
Switzerland, Switzerland
备用版本
Jul 12, 2017
备用版本
2, 20170605
元数据中的注释
lg1699725
元数据中的注释
producers:
Acrobat Distiller 10.0.0 (Windows)
Acrobat Distiller 10.0.0 (Windows)
元数据中的注释
{"container_title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","content":{"parsed_at":1697792832,"source_extension":"epub"},"edition":"1","isbns":["3319589660","3319589679","9783319589664","9783319589671"],"issns":["1867-8211","1867-822X"],"publisher":"Springer","series":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 194"}
元数据中的注释
Source title: Big Data Technologies and Applications: 7th International Conference, BDTA 2016, Seoul, South Korea, November 17–18, 2016, Proceedings (Lecture Notes ... and Telecommunications Engineering)
备用描述
Preface 6
Organization 7
Contents 8
BDTA 10
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition 11
Abstract 11
1 Introduction 11
2 Various Approaches 11
3 Framework for Visualizing Mixed Attributed High-Dimensional Data 12
3.1 Dataset Preprocessing 13
3.2 Conversion of a Mixed Dataset into a Uniform Format 13
3.3 Extension of Algorithm to Entirely Categorical Dataset 15
3.4 Gridded Representation of High Dimensional Dataset 15
3.5 Dimensionality Reduction Methods 16
3.6 Visualization of Dataset Using Singular Value Decomposition 17
4 Research with Various Datasets 17
5 Conclusion 19
Acknowledgements 19
References 19
Max-flow Min-cut Algorithm in Spark with Application to Road Networks 20
1 Introduction 20
2 Background and Related Works 21
2.1 Overview of Pregel Programming Model 22
2.2 Other Related Works 22
3 Maximum Flow Algorithm 23
3.1 Overview of Max-flow Problem 23
4 Distributed Max-flow Model 24
5 Experimental Analysis 26
6 Application of Distributed Max-flow Min-cut Implementation 27
7 Conclusion 28
References 28
Association Between Regional Difference in Heart Rate Variability and Inter-prefecture Ranking of He ... 31
Abstract 31
1 Introduction 31
2 Methods 32
2.1 ECG Data 32
2.2 Analysis of HRV 32
2.3 Statistical Analysis 33
3 Results 33
4 Discussion 34
5 Conclusions 35
References 35
Allocation Four Neighbor Exclusive Channels to Polyhedron Clusters in Sensor Networks 37
Abstract 37
1 Introduction 37
2 The Concept of Exclusive Channel Allocation 39
3 Channel Allocation Algorithm 41
4 Network Operation 42
5 Experiment 42
6 Conclusions 46
Acknowledgements 46
References 46
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing ... 48
Abstract 48
1 Introduction 48
2 Methodology 49
3 Experimental 51
4 Conclusion 55
Acknowledgement 55
References 55
A Novel Method for Extracting Dynamic Character Network from Movie 56
1 Introduction 56
2 Dynamic Character Network 57
3 Results and Discussion 60
4 Conclusion 60
References 61
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles 62
Abstract 62
1 Introduction 62
2 Preliminaries on Clustering of Uncertain Data 63
3 A Case Study: Styles of Visit in an Art Show 64
4 Experimental Evaluation 66
4.1 Evaluation Methodology 66
4.2 Results 68
5 Conclusion 69
References 69
Using Geotagged Resources on Social Media for Cultural Tourism: A Case Study on Cultural Heritage Tourism 72
Abstract 72
1 Introduction 72
2 Related Works 73
3 Problem Definition 74
3.1 Problem 74
3.2 System Overview 74
4 Solution 75
4.1 Computation Distribution of Resources 75
4.2 Proposed Algorithm 76
5 Experiment 76
5.1 Dataset 76
5.2 Experimental Results 77
6 Conclusion and Future Work 79
6.1 Conclusion 79
6.2 Limitations 79
6.3 Future Work 79
Acknowledgment 79
References 79
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural ... 81
Abstract 81
1 Introduction 81
2 Proposed Algorithms 82
2.1 Characteristics of Stupa 82
2.2 Scale Invariant Feature Transforms (SIFT) Algorithms 84
2.3 Image Content Generator System 86
3 Experimental Results and Discussions 87
3.1 Experimental Setup 87
3.2 Performance Indexed 87
3.2.1 Confusion Matrix 87
3.2.2 Comparing Algorithms 88
4 Experimental Results and Discussions 88
4.1 Experimental Results 88
5 Conclusions 89
Acknowledgment 90
References 90
Correcting Misspelled Words in Twitter Text 91
Abstract 91
1 Introduction 91
2 Related Work 92
3 Correcting Method and Test Evaluation of Misspelled Word of Tweet Text 93
3.1 Extraction Method of Misspelled Words Within Twitter Text 93
3.2 Method of Generating Word Pairs to Correct Misspelled Word 95
4 Conclusion 96
Acknowledgments 97
References 97
Theoretical Concept of Inverse Kinematic Models to Determine Valid Work Areas Using Target Coordinates from NC-Programs 99
Abstract 99
1 Introduction 99
2 Research Project and Related Work of the Research Project 100
3 Concept of the System and Inverse Kinematic Models 101
3.1 System Concept 101
3.2 Concept of the Inverse Kinematic Models and Linked Research Issues 101
3.3 Model for Use Case 1: Combination of Rotation Matrix and Translation Vectors 103
3.4 Model for Use Case 2: Combination of Translation Vectors and Quaternions 105
4 Review Using Theoretical Scenarios 106
5 Conclusion and Outlook 108
Acknowledgments 108
References 108
ISSB 110
Ransomware-Prevention Technique Using Key Backup 111
Abstract 111
1 Introduction 111
2 Related Works 112
2.1 Overview of Ransomware 112
2.2 Previous Countermeasures 114
3 Proposed Prevention Technique 115
3.1 Concept and Structure 115
3.2 Assumption 115
3.3 Prevention Technique 117
4 Conclusion 119
Acknowledgment 119
References 119
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques 121
Abstract 121
1 Introduction 121
2 The Fundamentals of the System 122
2.1 Secret Sharing 122
2.2 Multi-secret Fuzzy Vault 122
2.3 Multi-level Steganography 123
3 Multi-level Fuzzy Vault System for Secret Sharing and Steganography 123
3.1 Hiding Phase 123
3.2 Reconstruction Phase 125
4 Conclusions 125
Acknowledgments 126
References 126
On Exploiting Static and Dynamic Features in Malware Classification 128
1 Introduction 128
2 Class Definitions and Dataset 129
3 Feature Extraction 129
3.1 Static Features 130
3.2 Dynamic Features 130
4 Classification 131
5 Evaluation 133
5.1 Experimental Setup 133
5.2 Results and Analyses 133
6 Conclusions 134
References 135
Distributed Compressive Sensing for Correlated Information Sources 136
Abstract 136
1 Introduction 136
2 Compressive Sensing 137
3 Iterative Signal Detection with Sequential Correlation Search 138
4 Simulation Results 141
5 Conclusions 143
Acknowledgement 143
References 143
MMSE Based Interference Cancellation and Beamforming Scheme for Signal Transmission in IoT 144
Abstract 144
1 Introduction 144
2 Problem Formulation 145
3 Proposed MMSE Based IoT Transmission Technique 145
3.1 MMSE Based Interference Cancellation 146
3.2 MMSE Based Receive Beamforming 146
4 Performance Evaluation 147
4.1 Simulation Parameters 147
4.2 Simulation Results 147
5 Conclusions 148
Acknowledgements 149
References 149
A Multi-user-collaboration Platform Concept for Managing Simulation-Based Optimization of Virtual To ... 150
Abstract 150
1 Introduction 150
2 Problem Description and Motivation 151
3 Related Work 152
3.1 Related Work of the Development Process of the Work Preparation Platform 152
3.2 Related Work to Collaborative Platforms and Conceptual Overview 153
4 Concept and System Architecture 154
4.1 System Architecture 154
4.2 Multi-user-agent and Interface Concept 155
4.3 Workflow as Online Solution to Define Simulation Jobs and Production Information in Order to Man ... 156
4.4 Online Solution Using Collaborative Platform 157
5 Conclusion and Outlook 158
References 158
Author Index 160
Organization 7
Contents 8
BDTA 10
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition 11
Abstract 11
1 Introduction 11
2 Various Approaches 11
3 Framework for Visualizing Mixed Attributed High-Dimensional Data 12
3.1 Dataset Preprocessing 13
3.2 Conversion of a Mixed Dataset into a Uniform Format 13
3.3 Extension of Algorithm to Entirely Categorical Dataset 15
3.4 Gridded Representation of High Dimensional Dataset 15
3.5 Dimensionality Reduction Methods 16
3.6 Visualization of Dataset Using Singular Value Decomposition 17
4 Research with Various Datasets 17
5 Conclusion 19
Acknowledgements 19
References 19
Max-flow Min-cut Algorithm in Spark with Application to Road Networks 20
1 Introduction 20
2 Background and Related Works 21
2.1 Overview of Pregel Programming Model 22
2.2 Other Related Works 22
3 Maximum Flow Algorithm 23
3.1 Overview of Max-flow Problem 23
4 Distributed Max-flow Model 24
5 Experimental Analysis 26
6 Application of Distributed Max-flow Min-cut Implementation 27
7 Conclusion 28
References 28
Association Between Regional Difference in Heart Rate Variability and Inter-prefecture Ranking of He ... 31
Abstract 31
1 Introduction 31
2 Methods 32
2.1 ECG Data 32
2.2 Analysis of HRV 32
2.3 Statistical Analysis 33
3 Results 33
4 Discussion 34
5 Conclusions 35
References 35
Allocation Four Neighbor Exclusive Channels to Polyhedron Clusters in Sensor Networks 37
Abstract 37
1 Introduction 37
2 The Concept of Exclusive Channel Allocation 39
3 Channel Allocation Algorithm 41
4 Network Operation 42
5 Experiment 42
6 Conclusions 46
Acknowledgements 46
References 46
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing ... 48
Abstract 48
1 Introduction 48
2 Methodology 49
3 Experimental 51
4 Conclusion 55
Acknowledgement 55
References 55
A Novel Method for Extracting Dynamic Character Network from Movie 56
1 Introduction 56
2 Dynamic Character Network 57
3 Results and Discussion 60
4 Conclusion 60
References 61
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles 62
Abstract 62
1 Introduction 62
2 Preliminaries on Clustering of Uncertain Data 63
3 A Case Study: Styles of Visit in an Art Show 64
4 Experimental Evaluation 66
4.1 Evaluation Methodology 66
4.2 Results 68
5 Conclusion 69
References 69
Using Geotagged Resources on Social Media for Cultural Tourism: A Case Study on Cultural Heritage Tourism 72
Abstract 72
1 Introduction 72
2 Related Works 73
3 Problem Definition 74
3.1 Problem 74
3.2 System Overview 74
4 Solution 75
4.1 Computation Distribution of Resources 75
4.2 Proposed Algorithm 76
5 Experiment 76
5.1 Dataset 76
5.2 Experimental Results 77
6 Conclusion and Future Work 79
6.1 Conclusion 79
6.2 Limitations 79
6.3 Future Work 79
Acknowledgment 79
References 79
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural ... 81
Abstract 81
1 Introduction 81
2 Proposed Algorithms 82
2.1 Characteristics of Stupa 82
2.2 Scale Invariant Feature Transforms (SIFT) Algorithms 84
2.3 Image Content Generator System 86
3 Experimental Results and Discussions 87
3.1 Experimental Setup 87
3.2 Performance Indexed 87
3.2.1 Confusion Matrix 87
3.2.2 Comparing Algorithms 88
4 Experimental Results and Discussions 88
4.1 Experimental Results 88
5 Conclusions 89
Acknowledgment 90
References 90
Correcting Misspelled Words in Twitter Text 91
Abstract 91
1 Introduction 91
2 Related Work 92
3 Correcting Method and Test Evaluation of Misspelled Word of Tweet Text 93
3.1 Extraction Method of Misspelled Words Within Twitter Text 93
3.2 Method of Generating Word Pairs to Correct Misspelled Word 95
4 Conclusion 96
Acknowledgments 97
References 97
Theoretical Concept of Inverse Kinematic Models to Determine Valid Work Areas Using Target Coordinates from NC-Programs 99
Abstract 99
1 Introduction 99
2 Research Project and Related Work of the Research Project 100
3 Concept of the System and Inverse Kinematic Models 101
3.1 System Concept 101
3.2 Concept of the Inverse Kinematic Models and Linked Research Issues 101
3.3 Model for Use Case 1: Combination of Rotation Matrix and Translation Vectors 103
3.4 Model for Use Case 2: Combination of Translation Vectors and Quaternions 105
4 Review Using Theoretical Scenarios 106
5 Conclusion and Outlook 108
Acknowledgments 108
References 108
ISSB 110
Ransomware-Prevention Technique Using Key Backup 111
Abstract 111
1 Introduction 111
2 Related Works 112
2.1 Overview of Ransomware 112
2.2 Previous Countermeasures 114
3 Proposed Prevention Technique 115
3.1 Concept and Structure 115
3.2 Assumption 115
3.3 Prevention Technique 117
4 Conclusion 119
Acknowledgment 119
References 119
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques 121
Abstract 121
1 Introduction 121
2 The Fundamentals of the System 122
2.1 Secret Sharing 122
2.2 Multi-secret Fuzzy Vault 122
2.3 Multi-level Steganography 123
3 Multi-level Fuzzy Vault System for Secret Sharing and Steganography 123
3.1 Hiding Phase 123
3.2 Reconstruction Phase 125
4 Conclusions 125
Acknowledgments 126
References 126
On Exploiting Static and Dynamic Features in Malware Classification 128
1 Introduction 128
2 Class Definitions and Dataset 129
3 Feature Extraction 129
3.1 Static Features 130
3.2 Dynamic Features 130
4 Classification 131
5 Evaluation 133
5.1 Experimental Setup 133
5.2 Results and Analyses 133
6 Conclusions 134
References 135
Distributed Compressive Sensing for Correlated Information Sources 136
Abstract 136
1 Introduction 136
2 Compressive Sensing 137
3 Iterative Signal Detection with Sequential Correlation Search 138
4 Simulation Results 141
5 Conclusions 143
Acknowledgement 143
References 143
MMSE Based Interference Cancellation and Beamforming Scheme for Signal Transmission in IoT 144
Abstract 144
1 Introduction 144
2 Problem Formulation 145
3 Proposed MMSE Based IoT Transmission Technique 145
3.1 MMSE Based Interference Cancellation 146
3.2 MMSE Based Receive Beamforming 146
4 Performance Evaluation 147
4.1 Simulation Parameters 147
4.2 Simulation Results 147
5 Conclusions 148
Acknowledgements 149
References 149
A Multi-user-collaboration Platform Concept for Managing Simulation-Based Optimization of Virtual To ... 150
Abstract 150
1 Introduction 150
2 Problem Description and Motivation 151
3 Related Work 152
3.1 Related Work of the Development Process of the Work Preparation Platform 152
3.2 Related Work to Collaborative Platforms and Conceptual Overview 153
4 Concept and System Architecture 154
4.1 System Architecture 154
4.2 Multi-user-agent and Interface Concept 155
4.3 Workflow as Online Solution to Define Simulation Jobs and Production Information in Order to Man ... 156
4.4 Online Solution Using Collaborative Platform 157
5 Conclusion and Outlook 158
References 158
Author Index 160
备用描述
Front Matter....Pages I-X
Front Matter....Pages 1-1
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition....Pages 3-11
Max-flow Min-cut Algorithm in Spark with Application to Road Networks....Pages 12-22
Association Between Regional Difference in Heart Rate Variability and Inter-prefecture Ranking of Healthy Life Expectancy: ALLSTAR Big Data Project in Japan....Pages 23-28
Allocation Four Neighbor Exclusive Channels to Polyhedron Clusters in Sensor Networks....Pages 29-39
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing Process....Pages 40-47
A Novel Method for Extracting Dynamic Character Network from Movie....Pages 48-53
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles....Pages 54-63
Using Geotagged Resources on Social Media for Cultural Tourism: A Case Study on Cultural Heritage Tourism....Pages 64-72
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural Network....Pages 73-82
Correcting Misspelled Words in Twitter Text....Pages 83-90
Theoretical Concept of Inverse Kinematic Models to Determine Valid Work Areas Using Target Coordinates from NC-Programs....Pages 91-101
Front Matter....Pages 103-103
Ransomware-Prevention Technique Using Key Backup....Pages 105-114
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques....Pages 115-121
On Exploiting Static and Dynamic Features in Malware Classification....Pages 122-129
Distributed Compressive Sensing for Correlated Information Sources....Pages 130-137
MMSE Based Interference Cancellation and Beamforming Scheme for Signal Transmission in IoT....Pages 138-143
A Multi-user-collaboration Platform Concept for Managing Simulation-Based Optimization of Virtual Tooling as Big Data Exchange Service....Pages 144-153
Back Matter....Pages 155-155
Front Matter....Pages 1-1
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition....Pages 3-11
Max-flow Min-cut Algorithm in Spark with Application to Road Networks....Pages 12-22
Association Between Regional Difference in Heart Rate Variability and Inter-prefecture Ranking of Healthy Life Expectancy: ALLSTAR Big Data Project in Japan....Pages 23-28
Allocation Four Neighbor Exclusive Channels to Polyhedron Clusters in Sensor Networks....Pages 29-39
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing Process....Pages 40-47
A Novel Method for Extracting Dynamic Character Network from Movie....Pages 48-53
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles....Pages 54-63
Using Geotagged Resources on Social Media for Cultural Tourism: A Case Study on Cultural Heritage Tourism....Pages 64-72
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural Network....Pages 73-82
Correcting Misspelled Words in Twitter Text....Pages 83-90
Theoretical Concept of Inverse Kinematic Models to Determine Valid Work Areas Using Target Coordinates from NC-Programs....Pages 91-101
Front Matter....Pages 103-103
Ransomware-Prevention Technique Using Key Backup....Pages 105-114
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques....Pages 115-121
On Exploiting Static and Dynamic Features in Malware Classification....Pages 122-129
Distributed Compressive Sensing for Correlated Information Sources....Pages 130-137
MMSE Based Interference Cancellation and Beamforming Scheme for Signal Transmission in IoT....Pages 138-143
A Multi-user-collaboration Platform Concept for Managing Simulation-Based Optimization of Virtual Tooling as Big Data Exchange Service....Pages 144-153
Back Matter....Pages 155-155
备用描述
This book constitutes the refereed post-conference proceedings of the 7th International Conference on Big data Technologies and Applications, BDTA 2016, held in Seoul, South Korea, in November 2016. BDTA 2016 was collocated with the First International Workshop on Internet of Things, Social Network, and Security in Big Data, ISSB 2016 and the First International Workshop on Digital Humanity with Big Data, DiHuBiDa 2016. The 17 revised full papers were carefully reviewed and selected from 25 submissions and handle theoretical foundations and practical applications which premise the new generation of data analytics and engineering.
开源日期
2017-06-25
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.