GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...