GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...