GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book covers the combination of technologies which enables the transformation of everyday objects into smart objects, creating a paradigm that connects the real world with the digital world. Discusses progress made thus far, and emerging innovations.
    Type of Medium: Online Resource
    Pages: 1 online resource (444 pages)
    Edition: 1st ed.
    ISBN: 9783642350160
    Series Statement: Studies in Computational Intelligence Series ; v.495
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Contributors -- 1 Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks -- Abstract -- 1…Introduction -- 1.1 Internet of Things Challenges -- 2…Artificial Intelligence for Intelligent Sensing -- 3…Social Networks and the Internet of Intelligent Things -- 4…Pervasive Intelligent Robots -- 4.1 IoT and Urban Technologies -- 4.2 IoT Platforms for Home Automation/Ambient Intelligence -- 4.3 Smart Devices -- 5…Intelligent Large Scale Sensing -- 5.1 People-Centric Sensing -- 5.2 Ubiquitous Sensing -- 5.3 Location-Aware Sensing -- 5.4 OpportunisticOpportunistic Sensing and Participatory Sensing -- 5.5 Contextual Sensing -- 5.6 Machine Learning for Large-Scale Sensing -- 5.7 Sensing Architectures -- 6…The Cloud and the Internet of Intelligent Things -- 6.1 Wireless Sensor Networks Backend Infrastructures -- 6.2 Wireless Sensor Networks and Health Care -- 6.3 Machine-to-Machine (M2M) CommunicationsMachine-to-Machine Communications in the Cloud -- 6.4 Cloud Robotics -- 7…Conclusions -- References -- 2 Cloud Computing: Paradigms and Technologies -- Abstract -- 1…Introduction -- 2…Anatomy of Cloud Computing -- 2.1 Definition -- 2.2 Characteristics -- 2.3 Affects -- 2.4 Architecture -- 2.5 Technologies behind Cloud Computing -- 2.6 Advantages of the Use of Cloud Technology -- 3…Classifying Clouds and Vendors -- 3.1 Deployment Models -- 3.2 Service Models -- 3.2.1 Infrastructure-as-a-Service -- 3.2.2 Platform-as-a-Service -- 3.2.3 Software-as-a-Service -- 3.2.4 Data-as-a-Service -- 3.3 Cloud Vendors -- 4…Cloud Computing Aspects -- 4.1 Cost and Pricing -- 4.2 Service Level Agreement -- 4.3 Security -- 5…Cloud Computing and Distributed Computing Paradigms -- 5.1 Utility Computing Utility Computing Versus Cloud Computing. , 5.2 Volunteer Computing Volunteer Computing Versus Cloud Computing -- 5.3 Grid Computing Grid Computing Versus Cloud Computing -- 6…The Road Ahead -- 6.1 Lessons Learned in Cloud Adoption -- 6.2 Challenges and Future Research Directions -- 7…Conclusion -- References -- 3 A Comparison of Two Different Approaches to Cloud Monitoring -- Abstract -- 1…Introduction -- 2…Monitoring IaaS Cloud!IaaS Clouds -- 3…Related Work -- 4…Cloud Experience in European Research Projects -- 4.1 VISION VISIONCloud -- 4.2 mOSAIC -- 5…Monitoring in the VISION VISIONCloud platform -- 5.1 Overall Architecture and Requirements -- 5.2 Monitoring Architecture -- 5.3 Implementation Details -- 5.4 Event and Rulemonitoring!rules Format -- 6…Cloud AgencyCloud Agency -- 6.1 Monitoring Architecture -- 6.2 MeteringCloud Agency!metering the Cloud -- 6.3 Monitoring the Cloud -- 6.4 Implementation Details -- 7…Critical Analysis -- 8…Conclusion -- Acknowledgments -- References -- 4 Intuitive User Interfaces to Help Boost Adoption of Internet-of-Things and Internet-of-Content Services for All Disaster Management -- Abstract -- 1…Introduction -- 2…The Technology Supply Quest -- 3…Accessibility Matters: Opening Service Access to All -- 4…Setting up a Solution -- 4.1 The IOTC4ALL Service Model -- 4.2 Enhancing Services Components to Enrich Their Accessibility -- 4.3 The IOTC4ALL Marketplace -- 4.4 Smart Devices UI -- 4.4.1 Intelligent and Adaptive HCI -- 4.4.2 Ubiquitous Computing and Ambient Intelligence -- 4.4.3 From Unimodal to Multimodal Interfaces -- 4.4.4 Smart Devices Today -- 5…Conclusions and Future Work -- References -- 5 Intelligent Context: The Realization of Decision Support Under Uncertainty -- Abstract -- 1…Introduction -- 2…The Complexity of Context -- 3…Intelligent Context ProcessingContext!Intelligent context processing -- 3.1 The Context-Processing Algorithm. , 3.2 The Extended Context Processing AlgorithmContext!Extended context processing algorithm -- 3.2.1 Implementation -- 4…The Distribution Function -- 4.1 The Design of the Distribution Function -- 4.2 The Decision Boundary Proximity Issue -- 4.3 Partitioning and the Euclidean Distance Adjustment Analysis -- 4.3.1 An Analysis -- 4.4 Analysis Conclusions and Observations -- 5…Context Processing under UncertaintyContext!Uncertainty -- 6…Results and Discussion -- 6.1 Situational AwarenessContext!Situational awareness -- 7…Concluding Observations -- References -- 6 Autonomous Evolution of Access to Information in Institutional Decision-Support Systems Using Agent and Semantic Web Technologies -- Abstract -- 1…Introduction -- 2…Agent-Oriented Semantic Access -- 2.1 The generic system -- 2.2 The Legacy RDB System -- 2.3 The Semantic Query Access System -- 2.4 Decomposition of SQAS Use Cases -- 3…The SQAS Architecture -- 3.1 The High-Level Architecture of SQAS -- 3.2 The Roles of User Interface Agent -- 3.3 The Roles of Database Interface Agent -- 4…Agent-Oriented Middleware for Server Subsystems -- 4.1 The Database Interface Environment -- 4.2 A Note on Implementation Strategy -- 4.3 A Scenario for Agent-Assisted Ontology Development -- 5…Agent-Oriented Middleware for Client Subsystems -- 5.1 The User Interface Environment -- 5.2 A Scenario for Agent-Assisted Semantic Access -- 6…Closing Remarks -- 7…Conclusions -- References -- 7 A Research Survey on Large XML Data: Streaming, Selectivity Estimation and Parallelism -- Abstract -- 1…Introduction -- 1.1 Preliminaries -- 2…Selectivity Estimation -- 2.1 Properties of Selectivity Estimation Techniques -- 2.2 Path/Twig Selectivity Estimation Techniques -- 2.2.1 Synopsis-Based Estimation Techniques -- 2.2.2 Histogram-Based Estimation Techniques -- 3…Stream-Processing Approaches -- 3.1 Stream-Filtering Algorithms. , 3.2 Stream-Querying Algorithms -- 4…Parallel Query Processing -- 4.1 General Research on Decidability and Complexity -- 4.2 Data Distribution -- 4.3 Distribution and Parallel XPath Query Processing -- 4.4 Low-Level Implementation Techniques -- 4.5 DBMS and Join-Based Implementations -- 4.6 Map-Reduce, Hadoop Implementations -- 5…Conclusion -- References -- 8 Techniques and Applications to Analyze Mobility Data -- Abstract -- 1…Introduction -- 2…Collectingtrace collection Inter-cooperative Mobilitymobility Data -- 2.1 The HaggleHaggle Project -- 2.2 CRAWDADCRAWDAD -- 2.3 Socialsocial Tracer and HYCCUPS -- 2.3.1 Socialsocial Tracer -- 2.3.2 HYCCUPS -- 2.4 Benefits and Limitations -- 3…Techniques for Data Analysisdata analysis -- 3.1 Contact Timescontact time Distribution and Time of Day Dependence -- 3.2 Contact Predictabilitypredictability -- 3.3 Predictabilitypredictability of Interacting with Wirelesswireless Access Pointsaccess point -- 4…Experimental Results -- 4.1 Contact Timescontact time Distribution and Time of Day Dependence -- 4.1.1 UPB 2011 -- 4.1.2 UPB 2012 -- 4.2 Contact Predictabilitypredictability -- 4.3 Predictabilitypredictability of Interacting with Wireless Access Pointsaccess point -- 4.3.1 Rice -- 4.3.2 Nodobo -- 5…Conclusions and Future Work -- References -- 9 Memory Support Through Pervasive and Mobile Systems -- Abstract -- 1…Introduction -- 1.1 Evolution of Memory Prosthetics Devices -- 2…Context Aware Systems -- 3…Application Contextualization in Memory Support Systems -- 3.1 The Introduction of Time Context -- 3.2 The Introduction of Location Context -- 3.3 Web IntegrationWeb Integration -- 3.4 Integration of Time and Location ContextIntegration of Time and Location Context -- 3.5 Toward a New Generation of Memory Prosthetic DevicesMemory Prosthetic Devices -- 4…The Architecture of Our System -- 4.1 Server Side. , 4.1.1 A Three Tier ArchitectureThree Tier Architecture -- 4.1.2 Reasoning Engine -- 4.2 Client Side -- 5…ExperimentsExperiments and Users' FeedbacksUsers' Feedbacks -- 6…Ontology Management and Enrichment -- 7…Conclusions -- References -- 10 Viable Service Business Models Towards Inter-cooperative Strategies: Conceptual Evolutionary Considerations -- Abstract -- 1…Chronological Development of S-D Logic Model -- 2…The Role of Intangibility-Heterogeneity-Inseparability-Perishability Framework in the Separation of G-D and S-D Logics -- 2.1 IHIP Characteristics and Its Critics -- 2.2 Implications for the Definition of Services -- 3…Service Science Perspectives: Service-Dominant versus Goods-Dominant logic -- 3.1 Resource-Based Definition of Service Logic -- 3.2 S-D Logic and General Theory -- 4…Case Studies of Empirical Applications of S-D Logic -- 4.1 S-D Logic, Branding and Networks -- 4.2 S-D Logic and Discontinuous Innovations -- 4.3 S-D Logic and Co-Produced Knowledge -- 4.4 S-D Logic and Social Construction TheoriesSocial Construction Theories -- 4.5 S-D Logic and Logistics Service ValueLogistics Service Value -- 4.6 S-D Logic and ProcurementProcurement -- 4.7 S-D Logic and Service Experience -- 4.8 S-D Logic and Competitive AdvantageCompetitive Advantage -- 4.9 Cloud ComputingCloud computing as an Illustrative Example of S-D Logic -- 5…Conclusions and Future Work -- References -- 11 Discovering the Hidden Semantics in Enterprise Resource Planning Data Through Formal Concept Analysis -- Abstract -- 1…Introduction -- 1.1 Enterprise Resource Planning Systems -- 1.2 Rationale -- 2…Overview of Analysis -- 2.1 Data Preparation -- 2.2 Analysing Transactional ActivityAnalysis!Transactional Activity -- 2.3 Analysing Transactional Activity with DescriptionsAnalysis!Transactional Activity with Descriptions. , 2.4 Analysing Transactional Activity with Multiple AttributesAnalysis!Multiple Attributes.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book discusses the theories, practices and concepts of utilising inter-operable and inter-cooperative next generation computational technologies. Coverage includes mobile and the emerging e-infrastructures of Web 2.0, SOA, P2P, Grids and Clouds.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783642349522
    Series Statement: Studies in Computational Intelligence Series
    DDC: 006
    Language: English
    Note: Title -- Foreword -- Preface -- Acknowledgements -- Contents -- The Web of Things - Challenges and Enabling Technologies -- The Web - An Application Platform for Real-World Things -- Towards the Web of Things -- Technologies Driving the Web of Things -- Web of Things Architecture -- Integrating Things on the Web -- Frameworks for the Web of Things -- Building 'Web of Things Applications -- The AJAX Technique -- Mashups - Composing Things on the Web -- Event Driven Approach -- Case Studies of Ambient Spaces -- Ambient Classrooms -- Ambient Meter -- Research Directions -- Conclusion -- References -- Context-Aware Environments for the Internet of Things -- Introduction to Internet of Things Infrastructure and Services -- Context Aware Internet of Things Infrastructure -- Situational Awareness -- Other Representation Approaches -- Architectural Issues -- CAPIM Infrastructure -- CAPIM Context Model -- Use Case -- Future Trends and Research Directions in Internet of Things Infrastructure and Services -- Conclusions and Remarks -- References -- Service Interoperability in the Internet of Things -- Introduction -- Background -- An Interoperability Framework -- Assessing Current Interoperability Technologies -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Rethinking Interoperability -- An IoT Case Study Scenario -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Assessing the New Approach -- Contrasting SIL and Related Technologies -- Implementation -- Migration Path -- Conclusions and Future Work -- References -- The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments -- Introduction -- Classification of Ad Hoc Networks -- Mobile Ad Hoc Networks (MANETs) -- Vehicular Ad Hoc Networks (VANETs). , Wireless Sensor Networks (WSNs) -- Radio Frequency Identification (RFID) -- Near Field Communications (NFC) -- Routing Protocols for the IoT -- Towards an IoT Smart Environment -- The "thereuGO" Case Scenario -- A "thereuGO" IoT Model Architecture -- Conclusions -- References -- Challenges in Efficient Realtime Mobile Sharing -- Heterogeneous Networks -- IP Networks -- Wireless Sensor and Actuator Networks -- Multimedia Sessions -- Session Control -- Multimedia Session Mobility -- Multimedia Session Mobility versus MobileIP -- Federated Service Platforms -- Functionalities -- Mobility Management -- Pervasive Service Platforms -- Service Concept -- Session Concept -- Mobility -- Sharing of Content and Context -- Research Challenges and Progress -- Mobility and Sharing in Heterogeneous Networks -- Mobility and Sharing of WSANs -- Mobility and Sharing of Multimedia Sessions -- Service Platforms -- Pervasive Service Platforms -- Conclusion -- References -- Malware Detection and Prevention in RFID Systems -- Introduction -- SQL Injection Attacks -- Malware in RFID Systems -- Differences in Web Based and RFID SQLIA -- Related Work -- Policy Based RFID Malware Detection and Prevention -- Approach Overview -- Static Analysis -- Runtime Monitoring -- Query Structure Creation and Comparison -- Query Tokenization -- Query Structure Policy Generation -- Runtime Query Matching -- Security Evaluations -- RFID Tag Data Cleaning -- Query Structure Matching -- Conclusions and Future Work -- References -- Conceptual Model of Business Services Availability vs. Interoperability on Collaborative IoT-enabled eBusiness Platforms -- Introduction -- Contemporary Concepts, Architectures and Technologies to Support Effective IoT-enabled Business Services Delivery -- Enabling High Services Availability on SDP. , Hypothetical Model to Increase Service Availability on Distributed SDPs -- Numerical Patterns of the Model -- Literature Case Studies - Business Services Availability in the Collaborative Mobile Environment -- Conclusions -- References -- Organizational Control Reconfigurations for a Robust Smart Power Grid -- Introduction -- Dynamic I/O Binding Reconfigurations -- Application Scenarios -- Dynamic Load-Balancing of Power Lines -- Dynamic Switching of Power Flow -- Dynamic Allocation of Operating Reserves -- Dynamic Restoration After Blackout -- Discussion -- Conclusions and Future Work -- References -- Homesick L\'{e}vy Walk and Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters -- Introduction -- Existing Mobility Models and Homesick L´evy Walk -- Random Walk -- Random Waypoint -- L´evy Flight and L´evy Walk -- Homesick L´evy Walk -- Routing Protocols in Delay Tolerant Networks -- Epidemic Routing -- Spray and Wait -- PRoPHET -- MaxProp -- Optimal Forwarding Criterion for Utility-Based Routing under Sequential Encounters -- Optimal Stopping Theory -- Proposed Routing Method -- Performance Evaluation -- Evaluation Measures -- Simulation Setup -- Simulation Results -- Conclusion -- Open Issues -- References -- Hybrid Cloud Architecture for VANET Simulations -- Introduction -- The Internet of Things and Cloud Computing -- Simulation of Ubiquitous Networks Over Cloud: Topicality in the IoT Paradigm -- VANET Networks: Characteristics and Scalability Issues -- Scalability of Simulations -- Cloud Computing: Elasticity Model -- Design of Scalable Cloud Architectures -- Elasticity and Scalability -- VANET Simulations Over Cloud -- Learning Phase -- Proposed Architecture -- Overview of the Cloud Infrastructure -- Public Cloud Platform with Amazon EC2 -- Scheduling Algorithms -- Performance Analysis. , Effectiveness of the Scheduling Algorithm -- Scheduling Algorithm Optimization - Resource Usage -- Scheduling Algorithm Optimization - Memory Usage -- Conclusions -- References -- Constructing Large Scale CooperativeMulti-Agent Systems from Semantic P2PNetworks -- Introduction -- Large Scale Multi Agent System Architecture Based on Semantic P2P Network -- Formal Definitions -- Theorems Related to VIRGO -- Construction and Maintenance of VIRGO Agent -- Formal Definition of Large Scale Cooperative Multi-Agent Systems Based on Semantic P2P Networks -- Distributed Action for Large Scale Cooperative Multi-Agent Systems -- Case Applications -- Simulation of Social Society Based on Semantic P2P Network -- Semantic P2P Network for e-Business -- Conclusion -- References -- An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks -- Introduction -- Related Work -- General Searching Schemes in P2P Networks -- Secure Searching Schemes in P2P Networks -- Privacy-Preserving Searching Schemes in P2PNetworks -- The Secure and Privacy-Aware Searching Protocol -- The Network Environment -- The Proposed Search Protocol -- Privacy-Preservation in Searching -- Performance Metrics for the Proposed Protocol -- Performance Evaluation of the Proposed Protocol -- Conclusion -- References -- The Tailored Fabric of Intelligent Environments -- Introduction -- State of the Art -- Internet of Things -- Intelligent Environments -- TheWorldView -- Enabling Technology for IoT and IE convergence -- Middleware -- Agents, Applications and Virtual Appliances -- Case Study: The Essex iSpace -- FollowMe -- HotSpot -- Conclusions and Future Challenges -- References -- Generalized World Entities as an Unifying IoT Framework: A Case for the GENIUS Project -- Introduction -- The GWE Paradigm -- General Context -- A First Example. , The GENIUS' Procedures Implementing the GWE Paradigm -- Identification and Low-Level Description of the GWEs -- Conceptual Representation of the World -- Full Recognition and Categorization of the GWEs -- Reasoning Based on the Full Recognition of an Existing Situation -- An "Assisted Living" Real-Life Scenario -- Conclusion -- References -- Plugging Text Processing and Mining in a Cloud Computing Framework -- Introduction -- Cloud Computing -- Service Delivery Models -- Deployment Models -- Information Retrieval and Text Mining -- Information Retrieval -- Albanian Language Processing and Stemming -- Apache Hadoop -- General Framework -- Analysis, Design and Implementation of the Plugin -- Analysis -- Design and Implementation -- Running the Plugin in the Hadoop Cluster -- Evaluation -- Experimental Setting and Cluster Creation -- Dataset -- Evaluation Setting and Experimental Results -- Analysis and Interpretation of Results -- Conclusion and Future Work -- References -- A Recommendation System for Browsing of Multimedia Collections in the Internet of Things -- Introduction -- Related Work -- System Overview -- The Recommendation Model -- Modelling the Context -- The Recommendation Process -- System Customization in the Cultural Heritage Domain -- Preliminary Experimental Results -- User Satisfaction -- Conclusions and Future Work -- References -- From Patient Information Services to Patient Guidance Services-The iCare Approach -- Introduction -- Semantic Interoperability for e-Health -- Healthcare System Integration issues and State of the Art -- Current State-of-the-Art in Integration with Personal Care Devices -- Current State-of-the-Art in Security and Privacy of Citizen Context and Electronic Health Records (EHRs) -- Semantic Web Technologies -- Semantic Web Services -- The iCare PGS Model -- The iCare PGS Semantic Service Platform. , PGS and Data Collection as Interoperability Components.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Information networks-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1396 pages)
    Edition: 1st ed.
    ISBN: 9783030150327
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.926
    DDC: 004.6
    Language: English
    Note: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops' Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec14 -- Sec15 -- 2. Next Generation Wireless Networks -- Sec17 -- Sec18 -- 3. Multimedia Systems and Applications -- Sec20 -- Sec21 -- 4. Pervasive and Ubiquitous Computing -- Sec23 -- Sec24 -- 5. Internet Computing and E-Learning -- Sec26 -- Sec27 -- 6. Distributed Systems Database and Data Mining -- Sec29 -- Sec30 -- 7. Grid, P2P, and Scalable Computing -- Sec32 -- Sec33 -- 8. Agents, Semantics and Intelligent Computing -- Sec35 -- Sec36 -- 9. Cloud, Data Centers, and Services Computing -- Sec38 -- Sec39 -- 10. Internet of Things and Social Networking -- Sec41 -- Sec42 -- 11. Security, Privacy, and Trust Computing -- Sec44 -- Sec45 -- 12. Cognitive and Neural Computing with Application -- Sec47 -- Sec48 -- AINA-2019 Reviewers -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications Markus Aleksy ABB AG Corporate Research Center, Ladenburg, Germany -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search Naohiro Hayashibara Kyoto Sangyo University, Kyoto, Japan -- Contents -- Electricity Load Forecasting in Smart Grids Using Support Vector Machine -- 1 Introduction -- 2 Contributions -- 3 System Model -- 3.1 Preprocessing Data. , 3.2 Training and Forecasting of Data -- 3.3 Proposed Model -- 4 Simulations -- 4.1 Feature Selection Using XGBoost and DTC -- 4.2 Load Forecasting -- 4.3 Performance Evaluation -- 5 Conclusions and Future Work -- References -- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Proposed Scheme -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 5 Optimization Techniques -- 5.1 FPA -- 5.2 Jaya Algorithm -- 5.3 User Comfort Maximization -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- Towards Efficient Energy Management in a Smart Home Using Updated Population -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 System Model -- 5 Optimization Algorithms -- 5.1 GWO -- 5.2 Jaya Algorithm -- 5.3 Updated Population -- 6 Pseudo Code of the Proposed Scheme -- 7 Simulation and Reasoning -- 8 Conclusion -- References -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Appliances Classification -- 4.2 Price Tariff -- 5 Meta-heuristic Algorithms -- 5.1 CSA -- 5.2 GWO -- 5.3 MUHS -- 6 Simulation and Reasoning -- 7 Conclusion -- References -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Scheduling Techniques -- 5.1 Bat Algorithm (BA) -- 5.2 Jaya Algorithm. , 5.3 Candidate Solution Updation Algorithm (CSUA) -- 6 Simulation Results and Reasoning -- 7 Conclusion -- References -- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 CSA -- 5.2 Jaya -- 5.3 BCS -- 6 Simulation Results and Discussion -- 6.1 RTP Tariff -- 7 Conclusion -- References -- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 RESs Uncertainty Model -- 3.1 Wind Generator Power Model -- 3.2 Solar Photovoltaic Power Model -- 3.3 Hydro Generation Power Model -- 4 Objective Function -- 5 Algorithms -- 6 Application and Results -- 7 Conclusion -- References -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- 1 Introduction -- 2 System Model -- 2.1 P2PPSO Model -- 2.2 Information Flow -- 3 Protocols to Prevent Illegal Information Flow -- 3.1 TOBSCO Protocol -- 3.2 ETOBSCO (Efficient TOBSCO) Protocol -- 4 Evaluation -- 5 Concluding Remarks -- References -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses -- Abstract -- 1 Introduction -- 2 Optimal Power Flow -- 3 Intelligent Algorithms -- 3.1 Particle Swarm Optimization (PSO) Algorithm -- 3.2 Imperialist Competitive Algorithm (ICA) -- 4 FACTS Devices -- 5 Simulation Results -- 6 Conclusions -- References -- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model -- 1 Introduction -- 2 System Model -- 2.1 Tree Structure of Fog Nodes -- 2.2 Energy Consumption of Fog Nodes -- 3 A Modified Fault-Tolerant Tree-Based Fog Computing (MFTBFC) Model -- 4 Evaluation -- 5 Concluding Remarks. , References -- Energy-Efficient Group Migration of Virtual Machines in a Cluster -- 1 Introduction -- 2 System Model -- 3 Estimation of Energy Consumption -- 4 A Dynamic Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic -- 1 Introduction -- 2 VANETs -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusions -- References -- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 A Terminal Access Data Anomaly Detection Model Based on Random Forest for Power User Electric Energy Data Acquisition System -- 3.1 The Framework of Access Data Anomaly Detection -- 3.2 Feature Extraction -- 3.3 Random Forest Basics -- 4 Performance Evaluation -- 4.1 Introduction to the Dataset -- 4.2 Model Selection Method -- 4.3 Model Evaluation Indexes -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Multi-level Authentication Protocols Using Scientific Expertise Approach -- Abstract -- 1 Introduction -- 2 Multi-level Authentication Based on Expert Knowledge -- 3 Security Features of Multi-level Protocols -- 4 Conclusions -- Acknowledgments -- References -- Biometric-Based Linguistic Solutions for Data Encryption and Sharing -- Abstract -- 1 Introduction -- 2 New Classes of Biometric-Based Threshold Schemes -- 3 Example of Application of Biometric-Based Threshold Schemes -- 4 Conclusions -- Acknowledgments -- References -- Dependability Analysis for On-Demand Computing Based Transaction Processing System -- 1 Introduction -- 2 Model Description -- 2.1 The Exponential Model of Goel and Okumoto -- 2.2 Delayed S-shaped Model -- 2.3 Inflected S-shaped Model -- 2.4 Weibull Model -- 2.5 Jump Diffusion Modeling. , 3 Parameter Estimation -- 3.1 Method of Maximum-Likelihood -- 3.2 Estimation of the Jump Diffusion Parameters -- 4 Dependability Assessment Measures -- 4.1 Reliability in Transaction Processing System -- 4.2 Performability -- 5 Optimal Maintenance Problem -- References -- A Comparative Analysis of Trust Requirements in Decentralized Identity Management -- 1 Introduction -- 2 Related Work -- 3 Analysing Trust in Identity Management -- 3.1 The Notion of Trust -- 3.2 Trust Domains and Requirements -- 3.3 Objective and Evaluation Methodology -- 4 Trust Requirements in Decentralized Identity Management -- 4.1 Decentralization Characteristics -- 4.2 Decentralized Identity Management Based on Blockchain -- 4.3 Decentralized Identity Management Patterns -- 4.4 Comparison to Trust Requirements in Traditional Models -- 5 Conclusion -- References -- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Outlier Detection in Wireless Sensor Networks -- 4 Data Reduction Techniques -- 4.1 Kernel Fisher Discriminant Analysis Technique (KFDA) -- 4.2 Support Vectors Machine Technique (SVM) -- 5 Experimental Results -- 6 Conclusion -- References -- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 The IEEQS-EMM Algorithm -- 3.1 Quorum Selection -- 3.2 IEEQS-EMM Algorithm -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 4.4 Average Number of Aborted Transaction Instances -- 5 Concluding Remarks -- References. , A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer networks. ; Electronic books.
    Description / Table of Contents: Social network analysis investigates the structure and dynamics of intelligent Web-based networking and collaborative systems. This volume covers the latest advances in the field that lead to competitive advantages in business and academia.
    Type of Medium: Online Resource
    Pages: 1 online resource (311 pages)
    Edition: 1st ed.
    ISBN: 9783642167935
    Series Statement: Studies in Computational Intelligence Series ; v.329
    Language: English
    Note: Intro -- Contents -- Wikipedia as a Source of Ontological Knowledge: State of the Art and Application -- Toward a Methodology of Collaborative Modeling and Simulation of Complex Systems -- Evolving Schedules of Independent Tasks by Differential Evolution -- A Multi-lane Double Auction for Economic- Based Service Management in the Cloud -- Monitoring and Performance Analysis of Workflow Applications in Large Scale Distributed Systems -- Scaling Relations of Data Gathering Times in an Epidemically Data Sharing System with Opportunistically Communicating Mobile Sensors -- Multilaterally Secure Ubiquitous Auditing -- A Round-Based Cover Traffic Algorithm for Anonymity Systems -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Distributed artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (197 pages)
    Edition: 1st ed.
    ISBN: 9783662490174
    Series Statement: Lecture Notes in Computer Science Series ; v.9380
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Transactions on Computational Collective Intelligence -- Contents -- Management and Computer Science Synergies: A Theoretical Framework for Context Sensitive Simulation Environment -- 1 Introduction -- 2 The Proposition of a Theoretical Model -- 2.1 A Review of the Literature -- 2.2 The Model and Research Hypotheses -- 3 Hypotheses Validation Methodology of the Proposed Model: SEM -- 4 Methodology to Build Context Sensitive Simulation Environment: Fuzzy Data Analysis -- 4.1 Fuzzy Clustering -- 4.2 Fuzzy Rules Extraction -- 5 The Simulation Environment -- 6 Related Works -- 7 Conclusions and Future Works -- References -- Improved Recommendation System Using Friend Relationship in SNS -- Abstract -- 1 Introduction -- 2 Recommended Types of Social Networks -- 2.1 The Representation and the Characteristics of Social Network Data -- 2.2 Recommended Items Based on Social Networks -- 2.3 Recommend of SNS Friends -- 3 Improved Recommendation of SNS Friends: Matrix Decomposition Model on Context -- 3.1 The Introduction of Matrix Decomposition Model -- 3.2 Improved Model -- 4 Experiment and Analysis -- 4.1 A Set of Training Data -- 4.2 Evaluation Standards -- 4.3 The Results of Experiment -- 5 Summary -- References -- Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language -- 1 Introduction -- 2 Reverse XSS Defect Detection Theory -- 2.1 Domains of XSS Defect Description -- 2.2 Relations of XSS Defect Detection -- 2.3 Reverse Semantic Analysis Rules of XSS Defect Detection -- 2.4 Bidirectional Taint Propagation Analysis Approach -- 3 Implementation of Reverse Static Detection on XSS Defect -- 3.1 Pre-processing Program -- 3.2 Call Information Analysis of the Source Code -- 3.3 Program Information Analysis -- 3.4 Defect Rules Matching Analysis -- 4 The Results and Analysis of Experiments. , 4.1 Comparing Results of Forward Analysis, Reverse Analysis and Bidirectional Analysis -- 5 Conclusion and Future Work -- References -- A Multilevel Security Model for Search Engine Over Integrated Data -- 1 Introduction -- 2 Related Work -- 2.1 Data Integration and Secure Search -- 2.2 Multi Level Security -- 2.3 Integration of Security Policies -- 3 Scenarios and Systems -- 3.1 Search Systems -- 3.2 The Integration Architecture -- 3.3 Formal Model -- 4 Access Policy Integration -- 4.1 Integration Sequence -- 4.2 Lattice Integration -- 4.3 Mapping Function Translation -- 4.4 Matrix Integration -- 5 Security Analysis and Proof -- 6 Conclusions -- 6.1 Work Summary -- 6.2 Contributions -- 6.3 Future Work -- References -- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Organization -- 2 Review of a Multi-use CCA-secure IBPRE Scheme -- 2.1 Definition and Security Model -- 2.2 The Wang et al.'s IBPRE Scheme -- 3 Our Attack -- 3.1 Attack I -- 3.2 Attack II -- 3.3 On Collusion Resistance -- 4 Review of Another IBPRE Scheme -- 4.1 Definition of Single-Hop Unidirectional IBPRE -- 4.2 Security Model for Single-Hop Unidirectional IBPRE -- 4.3 Luo et al.'s IBPRE Scheme -- 5 Security Analysis -- 5.1 Attack by Using the Insecure ReKeyGen Algorithm -- 5.2 On the Transitivity Property -- 6 Conclusion -- References -- Enabling Vehicular Data with Distributed Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Application of ML Algorithms on Traffic Data -- 4 Distributing k-Nearest Neighbors -- 5 Discussion -- 6 Conclusion -- References -- Adapting Distributed Evolutionary Algorithms to Heterogeneous Hardware -- 1 Introduction -- 2 Background -- 3 The HAPA Methodology -- 4 Experimental Setup -- 4.1 The Knapsack Problem -- 4.2 Parameters. , 5 HAPA Phase 1: Know Your Platform -- 5.1 Hardware Description -- 5.2 Ranking Using Standard Benchmark Software -- 5.3 Ranking Using Traditional dGAs -- 5.4 Mathematical Approximation of Running Times -- 6 HAPA Phase 2: Design Your Algorithm -- 6.1 DGA_HAPA: A First Algorithm Derived from HAPA -- 6.2 DGA_HAPA-FM: A Second dGA Derived from HAPA -- 7 HAPA Phase 3: Obtaining the Results -- 7.1 Hit Rate Analysis -- 7.2 Numerical Effort Analysis -- 7.3 Runtime Analysis -- 7.4 Search Diversity Analysis -- 8 Conclusions and Future Research -- References -- Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles -- 1 Introduction -- 1.1 5G Telecommunication Network and Autonomous Vehicle System -- 1.2 Attribute Based Encryption for Sharing Real-Time Traffic Information -- 1.3 Motivation and Contribution -- 1.4 Organization -- 2 Definition and Security Model for KP-ABE-SR -- 3 A Concrete KP-ABE-RS Scheme and Its Security Analysis -- 3.1 Access Tree -- 3.2 The Concrete KP-ABE-RS Scheme -- 3.3 Security Proof -- 4 The Eroca System -- 5 Performance Evaluation -- 6 Conclusion -- References -- Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Key Problems -- 1.3 Contributions -- 2 Preliminaries -- 2.1 Broadcast Encryption -- 2.2 Single-User Searchable Encryption -- 2.3 Multi-user Searchable Encryption -- 3 System Model -- 3.1 Basic Model -- 3.2 Data Flows -- 3.3 Coarse-Grained Access Control -- 4 Multi-user Searchable Encryption for Data Sharing -- 4.1 Our Construction -- 4.2 Security Analysis -- 4.3 Comparison -- 5 Implementation -- 5.1 Access Control Implementation -- 5.2 SUSE Scheme Supporting Two-Phase Operation -- 6 Conclusion -- References -- Quantum Information Splitting Based on Entangled States -- 1 Introduction -- 2 Preliminary. , 2.1 For the First MQIS Protocol -- 2.2 For the Second QIS Protocol -- 3 MQIS Protocol Based on ES of Bell States -- 3.1 (2,2) Protocol -- 3.2 (3,3) Protocol -- 3.3 (n,n) Protocol -- 4 QIS Protocol Based on Four-Particle Cluster States -- 5 Protocol Analysis -- 5.1 Security Analysis -- 5.2 Efficiency Analysis -- 6 Conclusion -- References -- Zero-Tree Wavelet Algorithm Joint with Huffman Encoding for Image Compression -- 1 Introduction -- 2 Description of EZW Algorithm -- 3 The Analysis of EZW Performance -- 4 EZW Joint with Huffman Coding Scheme -- 4.1 The Thought of Joint Coding -- 4.2 Joint Coding Simulation Results and Performance Analysis -- 5 Conclusions -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Ubiquitous computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (950 pages)
    Edition: 1st ed.
    ISBN: 9783030222635
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.994
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Internet of things. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (147 pages)
    Edition: 1st ed.
    ISBN: 9783030933876
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.108
    DDC: 004.678
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- About the Authors -- List of Figures -- List of Tables -- 1 Introduction -- References -- 2 The Vision of the Healthcare Industry for Supporting the Aging Population -- 2.1 Healthcare Needs of the Ageing People -- 2.2 Elderly Healthcare System -- 2.2.1 Short-Term Healthcare Service -- 2.2.2 Long-Term Healthcare Service -- 2.3 Conclusion -- References -- 3 Building Long-Term Care Services Around the World -- 3.1 Introduction -- 3.2 Ageing Policies in Taiwan -- 3.3 Ageing Policies in Hong Kong -- 3.4 Ageing Policies in Japan -- 3.5 Ageing Policies in the United States -- 3.6 Conclusion -- References -- 4 IOT and Cloud Computing for Development of Systems for Elderly and eHealth -- 4.1 Integration of IoT Technologies and Cloud Computing in Health Monitoring -- 4.1.1 IoT Technologies and Cloud Computing in Health Monitoring -- 4.1.2 Application of Remote Health Monitoring -- 4.1.3 Benefits of Remote Health Monitoring -- 4.2 Health Information Management System and eHealth -- 4.2.1 Health Information System -- 4.2.2 eHealth -- 4.3 Challenges for Health Information System and eHealth -- 4.4 Conclusion -- References -- 5 New Generation of Healthcare Services Based on Internet of Medical Things, Edge and Cloud Computing Infrastructures -- 5.1 Introduction -- 5.2 Related Work, Internet of Medical Things and Stream Processing Engines -- 5.2.1 Offloading Computation from Cloud to Edge -- 5.2.2 The Intelligent Edge -- 5.2.3 Design of Wearables -- 5.2.4 Semantic Edge -- 5.2.5 Stream Processing Engines -- 5.3 A Generic Type Architecture of Healthcare Applications Based on IoMT, Edge and Cloud Computing -- 5.3.1 Sensing Layer -- 5.3.2 Pre-processing Layer -- 5.3.3 Cluster/Fog Processing Layer -- 5.3.4 Persistence Layer -- 5.3.5 Application Layer. , 5.4 IoMT Data Stream Processing for Anomaly Detection with Application to Heart Diseases and Real Data Sets -- 5.4.1 Hierarchical Temporal Memory Algorithm (HTM) -- 5.4.2 REALDISP Dataset -- 5.5 Conclusions and Prospects -- References -- 6 Artificial Intelligence and Data Mining Techniques for the Well-Being of Elderly -- 6.1 Introduction -- 6.2 Artificial Intelligence Techniques -- 6.2.1 Fuzzy Logic -- 6.2.2 Case-Based Reasoning -- 6.2.3 Genetic Algorithm -- 6.2.4 Analytic Hierarchy Process (AHP) -- 6.3 Data Mining Techniques -- 6.3.1 Clustering -- 6.3.2 Classification -- 6.3.3 Association Rule Mining -- 6.4 Conclusions -- References -- 7 Domesticating Homecare Services -- 7.1 Introduction -- 7.2 Research Methodology of Domesticating Homecare Services -- 7.2.1 Front-End Homecare Service Request Module -- 7.2.2 Back-End Homecare Service Planning Module -- 7.3 Case Study in a Local Domestic Homecare Service Center -- 7.3.1 Data Extraction and Data Processing -- 7.3.2 Development of the Genetic Algorithm Model for Work Plan Scheduling -- 7.4 Results and Discussion -- 7.5 Conclusions -- References -- 8 Case Study in Fall Prevention in Indoor Environments -- 8.1 Introduction -- 8.2 Research Methodology -- 8.2.1 Data Collection and Consultation Module -- 8.2.2 Balance Board Development Module -- 8.2.3 Health Platform Development Module -- 8.3 Case Study -- 8.3.1 Test -- 8.3.2 Training and Rehabilitation -- 8.3.3 Scores -- 8.4 Discussion -- 8.5 Conclusion -- References -- 9 Case Study in Elderly Consultancy Services -- 9.1 Introduction -- 9.2 Research Methodology -- 9.2.1 Cloud-Based Data Collection Module -- 9.2.2 Care Solution Generation Module -- 9.2.3 Solution Evaluation Module -- 9.3 Case Study -- 9.3.1 Problems in the Case Company -- 9.3.2 Implementation of the Proposed ICPS in the Case Company -- 9.4 Results and Discussion. , 9.4.1 Improvement in the Efficiency of Care Plan Formulation -- 9.4.2 Performance in Feedback Collection -- 9.4.3 Improvement in Service Satisfaction -- 9.5 Conclusion -- References -- 10 Case Study in Remote Diagnosis -- 10.1 Introduction -- 10.2 IoT Based Healthcare Platform -- 10.3 Case Study -- 10.4 Discussion -- 10.5 Conclusion -- References -- Conclusions and Future Directions of Research -- Acronyms and Glossary.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (902 pages)
    Edition: 1st ed.
    ISBN: 9783319690964
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.686
    DDC: 006.3 23
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Autonomous Systems -- Prediction of Rolling Force Based on a Fusion of Extreme Learning Machine and Self Learning Model of Rolling Force -- Abstract -- 1 Introduction -- 2 ELM Algorithm -- 3 Rolling Force Mathematical Model -- 4 Rolling Force Model Self Learning of Finishing Mill -- 5 Forecasting Experiment and Result Based on Rolling Force of ELM -- 6 Conclusion -- References -- User Behavior Profiles Establishment in Electric Power Industry -- Abstract -- 1 Introduction -- 2 Related Work -- 3 User Label System of Electric Power Industry -- 3.1 Behavior Label -- 3.2 Behavior Description Label -- 3.3 Behavior Prediction and User Classification Label -- 4 Label Generation Technique -- 4.1 Label Generation Technique Based on Clustering Algorithm -- 5 Experiment and Analysis -- 5.1 Generate the Behavior Label -- 5.2 Generate the Behavior Description Label -- 5.3 Generate the Behavior Prediction Label and User Classification Label -- 6 Conclusion -- References -- The Optimal Pan for Baking Brownie -- Abstract -- 1 Introduction -- 2 The Distribution of Heat for Pan -- 2.1 Finite Element Analysis -- 2.2 Edge Cutting Model -- 3 Conclusion -- Acknowledgements -- References -- Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- Abstract -- 1 Introduction -- 2 Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- 2.1 Merchant Ship Maneuvering Motion Equation -- 2.2 Merchant Ship Intelligent Steering Control -- 2.3 Acquisition of Collision Avoidance Elements -- 3 Application -- 3.1 Simulation Object and Conditions Setting -- 3.2 Simulation Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- Dynamical Analysis of Fractional-Order Hyper-chaotic System -- Abstract. , 1 Introduction -- 2 Related Work -- 2.1 Fractional-Order Hyper-chaotic Complex System -- 2.2 Dynamic Behavior Analysis of the System -- 2.2.1 System Equilibrium Point -- 2.2.2 The Influence of System Order Variation on the System -- 2.2.3 The Influence of System Parameter Change on the System -- 3 Conclusion -- References -- Evaluating the Performance of the Logistics Parks: A State-of-the-Art Review -- Abstract -- 1 Introduction -- 2 Review on the Evaluation Index System -- 2.1 Establishment of the Evaluation Index System -- 2.2 Discussion on the Evaluation Index System -- 3 Review on the Evaluation Models -- 3.1 Analysis on the Evaluation Models -- 3.2 Discussion on the Evaluation Models -- 4 Conclusions -- Acknowledgements -- References -- A Tabu Search Algorithm for Loading Containers on Double-Stack Cars -- Abstract -- 1 Introduction -- 2 Problem Description -- 2.1 Background Information -- 2.2 Optimization Strategy -- 3 Tabu Search Algorithm for the Container Loading Problem -- 3.1 Introduction to the Algorithm -- 3.2 Tabu Search Algorithm Design -- 4 Numerical Cases -- 5 Conclusions -- Acknowledgements -- References -- Optimization Model Under Grouping Batch for Prefabricated Components Production Cost -- Abstract -- 1 Introduction -- 2 Problem Description and Variables Defining -- 2.1 Problem Description -- 2.2 Variables Defining -- 3 Model Establishing -- 4 Application Instance and Comparative Analysis -- 4.1 Application Instance -- 4.2 Comparative Analysis -- 5 Conclusion -- Acknowledgements -- References -- Air Quality Evaluation System Based on Stacked Auto-Encoder -- Abstract -- 1 Introduction -- 2 The Methods -- 2.1 Introduction to Traditional Method -- 2.2 AQES-SAE System -- 3 The Experiments -- 3.1 Classification with Improved K-means Algorithm -- 3.2 Identification with the SAE Model -- 4 The Results -- 4.1 Clustering Analysis. , 4.2 Superiority of the AQES-SAE System -- 5 Summary -- References -- Pattern Recognition and Vision Systems -- Urban-Rural Difference of the Coupling Between Social-Economic Development and Landscape Pattern in Chengdu Plain -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Study Area and Data Source -- 2.2 Coupling Model -- 3 Results -- 3.1 Urban-Rural Differences in Landscape Pattern -- 3.2 Urban-Rural Coupling Differences Between the Landscape Pattern and the Social-economic Development -- Acknowledgments -- References -- A New Model and Algorithm for Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 New Model of Clustering -- 2.2 Compact Homogenizing of Class -- 2.2.1 The Establishment of Similar Graph Matrix -- 2.2.2 The Establishment of Compact Homogenizing Between Class -- 2.3 Size Similarity Between Class -- 2.4 Cluster Model -- 3 Algorithm -- References -- Gibbs Phenomenon for Bi-orthogonal Wavelets -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Gibbs Phenomenon of Biorthogonal Wavelet Expansion -- 4 Conclusion -- Acknowledgments -- References -- {{\varvec \upalpha}} -Convergence Theory -- Abstract -- 1 Introduction -- 2 {{\varvec \upalpha}} -Adherence Dots and {{\varvec \upalpha}} -Accumulation Dots -- 3 {{\varvec \upalpha}} -Convergence of Nets -- 4 {{\varvec \upalpha}} -Convergence of Ideals -- 5 {{\varvec \upalpha}} -Convergence of Filters -- 6 Relations Among Nets, Ideals, Filters -- 7 Applications of {{\varvec \upalpha}} -Convergence Theory of Nets -- References -- Feature Selection Optimization Based on Atomic Set and Genetic Algorithm in Software Product Line -- Abstract -- 1 Introduction -- 2 Basic Concept -- 2.1 Feature Models -- 2.2 Atomic Sets -- 3 Atomic Sets Computation -- 4 Genetic Algorithm for Feature Selection Optimization -- 4.1 Initial Population -- 4.2 Fitness Function. , 4.3 Crossover Operation -- 4.4 Selection Operation -- 4.5 Mutation Operation -- 4.6 The Flow Diagram of Genetic Algorithm -- 5 Experiment and Analysis -- 5.1 Test Model -- 5.2 Experiment Result and Analysis -- 5.2.1 The Simulation Results of Atomic Set -- 5.2.2 The Simulation Results of Genetic Algorithm -- 6 Related Work -- 7 Conclusion -- Acknowledgments -- References -- Product Configuration based on Feature Model -- Abstract -- 1 Introduction -- 2 Configuration Architecture Model -- 3 Feature Modeling -- 3.1 Feature Diagram -- 3.1.1 Basic Feature Diagram -- 3.1.2 Cardinality-Based Feature Diagram -- 3.2 Constraints -- 3.2.1 Boolean Constraints -- 3.2.2 Non-Boolean Constraints -- 4 Automated Support -- 4.1 SAT -- 4.2 BDD -- 4.3 CSP -- 5 Feature Selection -- 5.1 Non-collaborative Configuration -- 5.2 Collaborative Configuration -- 6 Conclusion -- Acknowledgments -- References -- Research on Fast Browsing for Massive Image -- Abstract -- 1 Introduction -- 2 Distributed Computing and Image Pyramid -- 2.1 Distributed Computing -- 2.2 MapReduce -- 2.3 Image Pyramid -- 3 MapReduce Model for Massive Image -- 3.1 Data Blocking Prepared for MapReduce -- 3.2 MapReduce Image Model -- 4 Experiment -- 4.1 Experimental Data and Equipment -- 4.2 Experimental Result -- Acknowledgments -- References -- RVM for Recognition of QRS Complexes in Electrocardiogram -- Abstract -- 1 Introduction -- 2 RVM Classifier -- 3 QRS Detection -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- Acknowledgments -- The Architecture of the RFID-Based Intelligent Parking System -- Abstract -- 1 Introduction -- 2 The Research Status of the Intelligent Parking System -- 3 The Overall Configuration of the System -- 3.1 The Basic Flow of the Intelligent Parking System -- 3.1.1 The Parking Process of the Vehicle with Legal e-tag. , 3.1.2 The Parking Process of the Vehicle Without Legal e-tag -- 3.1.3 The Parking Process of the Vehicle Without Enough Electronic Balance -- 3.2 The Design of the Intelligent Parking Management System -- 3.3 The Basic Requirements for the Intelligent Parking System -- 4 Summary -- References -- A Review of Cognitive Psychology Applied in Robotics -- Abstract -- 1 Introduction -- 2 Robot Affective Computing and Interaction -- 2.1 Emotion Recognition -- 2.2 Affective Modeling -- 2.3 Emotion Expression -- 3 Application of Robot Cognition -- 3.1 Robot Autism Intervention -- 3.2 Robot Education -- 3.3 Household and Nursing Robot -- 4 Conclusion and Prospect -- Acknowledgments -- References -- Robot Vision Navigation Based on Improved ORB Algorithm -- Abstract -- 1 Introduction -- 2 Improved ORB Algorithm -- 2.1 Extreme Points in Scale Space Detection -- 2.2 Extract Stable Feature Points -- 3 Visual Navigation Method -- 4 Experimental Results -- 5 Conclusion -- References -- An Improved Multi-label Relief Feature Selection Algorithm for Unbalanced Datasets -- Abstract -- 1 Introduction -- 2 ReliefF Algorithm -- 3 UBML-ReliefF Algorithm -- 4 Experiment -- 4.1 Datasets -- 4.2 Performance Evaluation Index -- 4.3 Experiment and Results Analysis -- 5 Conclusion -- Acknowledgements -- References -- Area Topic Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Area-LDA Topic Model -- 3.1 Overall Design of Area-LDA -- 3.2 Process of Estimator -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiment Settings -- 4.3 Experimental Restuls -- 5 Conclusions -- References -- Predicting Popularity of Topic Based on Similarity Relation and Co-occurrence Relation -- Abstract -- 1 Introduction -- 2 The SCW Method for Prediction of Topic Popularity -- 2.1 Definition -- 2.2 The Description of Topic Popularity -- 2.3 The Analysis of Similarity Relation. , 2.4 The Analysis of Co-occurrence Relation.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Data structures (Computer science). ; Electronic books.
    Description / Table of Contents: This book covers the latest advances in structure inference in heterogeneous collections of documents and data, offering a comprehensive view of the state of the art, and identifying challenges and opportunities for further research agenda and developments.
    Type of Medium: Online Resource
    Pages: 1 online resource (448 pages)
    Edition: 1st ed.
    ISBN: 9783642229138
    Series Statement: Studies in Computational Intelligence Series ; v.375
    DDC: 006.3
    Language: English
    Note: Title Page -- Foreword -- Preface by Editors -- Contents -- List of Contributors -- Learning Structure and Schemas from Heterogeneous Domains in Networked Systems Surveyed -- Introduction -- Learning Patterns in Sensor Networks -- Learning Structures in Biological Domains -- Learning in Distributed Automation and Control Systems -- Learning Structures in Social Networks -- Learning Structures in Peer-to-Peer Networks -- Learning and Privacy-Preserving in Distributed Environments -- Conclusion -- References -- Handling Hierarchically Structured Resources Addressing Interoperability Issues in Digital Libraries -- Introduction and Motivation -- Objectives and Contributions -- The Background Context and Technologies -- Archives and Archival Descriptions -- EAD: Encoded Archival Description -- OAI-PMH and Dublin Core -- The NESTOR Model -- The NESTOR Algebra -- The NESTOR Prototype: Addressing Interoperability for Digital Archives -- How to Represent an Archive through the NESTOR Model -- Analysis of the Requirements -- Retaining Archival Hierarchy and Context throughout an XML Tree -- Encoding, Accessing and Sharing an Archive through Sets -- Conclusions and Future Work -- References -- Administrative Document Analysis and Structure -- Introduction -- Case-Based Reasoning -- CBR Terminology -- Problem Elaboration -- Similar Case Search -- Adaptation -- Learning -- CBR for Document Image Analysis: CBRDIA -- The Proposed Approach -- Document Structures -- Problem Representation -- Problem Solving -- Experiments -- Experiments on CBRDIA -- Experiments on Administrative Documents -- Conclusion -- References -- Automatic Document Layout Analysis through Relational Machine Learning -- Introduction -- Related Work -- Preliminaries -- Learning Layout Correction Theories -- From Manual to Automatic Improvement of the Layout Correction -- Tool Architecture. , The Learning System -- Description Language -- Experiments -- Conclusions -- References -- Dataspaces: Where Structure and Schema Meet -- Introduction -- Data Structuring -- Data Integration: The Story so Far -- Schema Mapping -- Keyword-Driven Queries -- The Web of Data -- Dataspaces -- Dataspace Dimensions -- Dataspace Profiling -- Querying and Searching -- Application Domain -- A Roundup of Existing Projects on Managing Structured Data -- Google BigTable -- Apache Cassandra -- Apache Hadoop -- Apache CouchDB -- DHT-Based Data Management Systems -- Google Fusion Tables -- WebTables -- Yahoo! SearchMonkey -- iMeMex -- Conclusions and Future Work -- References -- Transductive Learning of Logical Structures from Document Images -- Introduction -- Motivation and Problem Definition -- Related Work -- Extracting Emerging Patterns with SPADA -- Document Description -- The Mining Step -- Transductive Classification -- Experiments -- Conclusions -- References -- Progressive Filtering on the Web: The Press Reviews Case Study -- Introduction and Motivation -- Mission -- Related Work -- Hierarchical Text Categorization -- The Input Imbalance Problem -- Agents and Information Retrieval -- Progressive Filtering in Text Categorization -- The Approach -- The Threshold Selection Algorithm -- A Case Study: NEWS.MAS -- The Implemented System -- Experimental Results -- Conclusions -- References -- A Hybrid Binarization Technique for Document Images -- Introduction -- Related Work -- Algorithm Description -- Application of Iterative Global Thresholding -- Noisy Area Detection -- Re-application of IGT (Local Thresholding) -- Experimental Results -- Discussion - Future work -- Conclusion -- References -- Digital Libraries and Document Image Retrieval Techniques: A Survey -- Introduction -- Retrieval Paradigms -- Features -- Pixel Level -- Column Level -- Sliding Window. , Stroke and Primitive Level -- Connected-Component Level -- Word Level -- Line and Page Level -- Shape Descriptor -- Representation -- Similarity Measure -- Clustering -- Matching -- Conclusions -- References -- Mining Biomedical Text towards Building a Quantitative Food-Disease-Gene Network -- Introduction and Motivation -- Related Work -- Named Entity Recognition (NER) in Biomedical Text -- Relationship Extraction -- Polarity and Strength Analysis -- Relationship Integration and Visualization -- Named Entity Recognition -- Improving the Performance of Food Recognition -- Abbreviations and Co-reference Recognition -- Verb-Centric Relationship Extraction -- Relationship Polarity and Strength Analysis -- Feature Space Design -- Feature Selection -- Relationship Integration and Visualization -- Evaluation -- Evaluation of the Named Entity Recognition Module -- Evaluation of the Relationship Extraction Algorithm -- Evaluation of Relationship Polarity and Strength Analysis -- Discussions and Conclusion -- References -- Mining Tinnitus Data Based on Clustering and New Temporal Features -- Introduction -- TRT Background -- TRT Data Collection -- Information Retrieval -- Mining Text Data -- Temporal Feature Design for Continuous Data -- Temporal Feature Design or Categorical Data -- System Overview -- Experiments and Results -- Experiment Type I -- Two-Bin Clustering -- Experiment Type II -- Experiment Type III -- Conclusion -- References -- DTW-GO Based Microarray Time Series DataAnalysis for Gene-Gene Regulation Prediction -- Introduction -- What Is Microarray? -- Importance of Microarray Technology -- Microarray Data Processing -- Microarray and Gene Ontology -- Research Issues in Microarray Time-Series Data -- Missing Value Imputation -- Gene Regulation Prediction -- Gene Clustering and Statistical Operations -- DTW-GO Based Microarray Data Analysis. , Dynamic Time Warping -- Gene Ontology -- DTW-GO Based Microarray Data Analysis -- Datasets and Performance Assessment -- Real Microarray Dataset -- Assessment of Imputation Accuracy -- Accuracy of Gene Regulation Prediction -- Experimental Results and Discussion -- Design of Experiments -- Results and Discussion -- Conclusions -- References -- Integrating Content and Structure into a Comprehensive Framework for XML Document Similarity Represented in 3D Space -- Introduction -- Problem Statement -- XML Background -- Problem Definition -- Similarity Metric Overview -- Similarity Metric -- Structural Encoding -- Content Encoding -- Nested Content Encoding -- Difference Operator -- Visual Representation and Experiments -- MS Word Incremental Saves -- Random News Documents -- Conclusions and Future Work -- References -- Modelling User Behaviour on Page Content and Layout in Recommender Systems -- Introduction -- Personalization and Browsing Behaviour -- Motivation and Objectives -- Literature Review and Survey -- Browsing Behaviour: Action -- Browsing Behaviour: Visual -- A Recommender System Based on Browsing Behaviour -- Recommender System Architecture -- Recommender Implementation -- Structure, Layout, and Schema Learning -- Profiling Layout and Design -- Formalizing Layout and Design -- Layout and Design Learning -- Layout and Design Matching -- Conclusions -- References -- MANENT: An Infrastructure for Integrating, Structuring and Searching Digital Libraries -- Motivation -- Background -- Standards for Digital Library Access and Description -- Ontologies and Related Languages and Tools -- WordNet Domains and the WordNet Domains Ontology -- Text Semantic Similarity -- MANENT -- The MANENT Architecture -- Metadata Classification According to the WordNet Domains Ontology -- Experiments and Results -- Related Work. , Related Work on Digital Libraries Infrastructures -- Related Work on WordNet Domains -- Conclusions and Future Work -- References -- Low-Level Document Image Analysis and Description: From Appearance to Structure -- Introduction -- Motivation, Objectives and Contributions -- Background -- Modeling the Appearance of an Ancient Document -- Extracting Pattern Information from Low-Level Processing -- Linear Instantaneous Case -- Linear Convolutional Case -- A Metadata Schema to Describe Data, Procedures, and Results -- Experimental Evaluation -- Conclusions and Future Work -- References -- Model Learning from Published Aggregated Data -- Introduction -- Mission, Objectives, and Contributions -- Related Work -- Aggregated Data -- Attributional Rules as Knowledge Representation -- Rule Induction -- AQ Algorithm -- Rule Induction from Aggregated Data -- Calculating Coverage -- Evaluation -- Discussion -- Conclusion -- References -- Data De-duplication: A Review -- Introduction -- Problem Description -- Supervised Approaches to De-duplication -- Relational Data De-duplication Approaches -- Multidimensional Data De-duplication Approaches -- Data-Mining Data/Results De-duplication Approaches -- Linked and XML Data De-duplication Approaches -- Streaming Data De-duplication Approaches -- Unsupervised Approaches to De-duplication -- De-duplication Based on Clustering -- De-duplication Based on (dis)Similarity-Search in Metric Spaces -- De-duplication Based on Locality-Sensitive Hashing -- Conclusions and Further Research -- Efficiency and Scalability -- Systematic Assessment of De-duplication Performance -- Ethical, Legal and Anonymity Aspects -- Uncertainty -- References -- A Survey on Integrating Data in Bioinformatics -- Introduction -- Mission -- Background -- Linked-Based Integration -- Data Warehousing Integration -- Mediator-Based Integration. , Federated Databases.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Peer-to-peer architecture (Computer networks)-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (889 pages)
    Edition: 1st ed.
    ISBN: 9783319698359
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.13
    DDC: 004.36
    Language: English
    Note: Intro -- Welcome Message from 3PGCIC-2017 Organizing Committee -- Welcome Message from 3PGCIC-2017 Workshops Chairs -- 3PGCIC-2017 Organizing Committee -- Honorary Chairs -- General Co-chairs -- Program Committee Co-chairs -- Workshop Co-chairs -- Web Administrator Chairs -- Local Organizing Co-chairs -- Steering Committee Co-chairs -- Track Areas -- 1. Data Intensive Computing, Data Mining, Semantic Web and Information Retrieval -- Chairs -- PC Members -- 2. Data Storage in Distributed Computation and Cloud Systems -- Chairs -- PC Members -- 3. Secure Technology for Distributed Computation and Sensor Networks -- Chairs -- PC Members -- 4. High Performance and Scalable Computing -- Chairs -- PC Members -- 5. Distributed Algorithms and Models for P2P, Grid, Cloud and Internet Computing -- Chairs -- PC Members -- 6. Bio-inspired Computing and Pattern Recognition -- Chairs -- PC Members -- 7. Cognitive Systems -- Chairs -- Sec29 -- 8. Adaptive Web-Based, Distributed and Ubiquitous eLearning Systems -- Chairs -- PC Members -- 9. Knowledge-Based Stream Processing and Analytics -- Chairs -- PC Members -- 10. IoT Computing Systems -- Chairs -- PC Members -- 3PGCIC-2017 Reviewers -- Welcome Message from SMECS-2017 Workshop Organizer -- SMECS-2017 Program Committee -- Workshop Organizer -- PC Chair -- PC Members -- Welcome Message from MDMS-2017 Workshop Organizers -- SMDMS-2017 Program Committee -- Workshop Chair -- International Liaison Chair -- Program Committee Members -- Welcome Message from MWVRTA-2017 Workshop Organizers -- MWRTA-2017 Program Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from ALICE-2017 Workshop Organizers -- ALICE-2017 Program Committee -- Workshop Organizers -- PC Members -- Welcome Message from CADSA-2017 Workshop Organizer -- CADSA-2017 Program Committee -- Workshop Chair. , Program Committee Members -- Welcome Message from DEM-2017 Workshop Organizers -- DEM-2017 Program Committee -- Workshop Chair -- Program Committee Members -- Welcome Message from SiPML-2017 Workshop Organizers -- SiPML-2017 Program Committee -- Workshop Chairs -- Program Committee -- 3PGCIC-2017 Keynote Talks -- InterCloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization -- Advancements in Internet of Things (IoT) -- Design Challenges and Importance of Fog Computing over Cloud Computing -- Intelligent Virtual Agents for Education and Training -- Contents -- The 12th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2017) -- Home Energy Management by Differential Evolution and Enhanced Differential Evolution in Smart Grid Environment -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Optimization Techniques -- 5 Simulations and Discussions -- 6 Conclusion and Future Work -- References -- Demand Side Optimization in Smart Grid Using Harmony Search Algorithm and Social Spider Algorithm -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Scheme -- 4.1 Classification -- 4.2 Pricing Scheme -- 4.3 Techniques -- 5 Simulations and Results -- 6 Conclusion -- References -- Home Energy Management Using Social Spider and Bacterial Foraging Algorithm -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Harmony Search Algorithm -- 4.2 Firefly Algorithm -- 5 Simulations and Discussions -- 6 Conclusion -- References -- Optimization of Home Energy Management System Through Application of Tabu Search -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 HSA -- 3.2 TS -- 3.3 Electricity Consumption Pattern -- 3.4 Proposed System -- 4 Performance Evaluation and Analysis. , 5 Conclusion and Future Work -- References -- Load Scheduling in Home Energy Management System Using Meta-Heuristic Techniques and Critical Peak Pricing Tariff -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 3.1 System Description -- 3.2 Energy Consumption Model -- 3.3 Classification of Appliances -- 3.4 Pricing Scheme Model -- 3.5 Problem Formulation -- 3.6 HSA -- 3.7 FPA -- 4 Simulations and Results -- 5 Conclusion -- References -- Energy Efficiency Using Genetic and Crow Search Algorithms in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Scheme -- 4.1 Categorization of Appliances -- 4.2 Techniques -- 4.3 Pricing Scheme -- 5 Results and Simulations -- 6 Conclusion and Future Work -- References -- Residential Demand Side Management in Smart Grid Using Meta-Heuristic Techniques -- 1 Introduction -- 2 Related Work -- 2.1 Hybrid Techniques -- 2.2 Dynamic Programming Techniques -- 2.3 Evolutionary Techniques -- 2.4 Linear and Fractional Programming Techniques -- 2.5 Other Techniques -- 3 Proposed System Model -- 4 Proposed Methodology -- 4.1 Genetic Algorithm -- 4.2 Crow Search Algorithm -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- A Machine Learning Approach for Ranking in Question Answering -- 1 Introduction -- 2 Related Work -- 3 General Approach -- 3.1 Random Forest -- 3.2 Multi-Layer Perceptron (MLP) -- 3.3 Support Vector Machine -- 3.4 Logistic Regression -- 3.5 Experimental Results -- 4 Conclusions -- References -- Detecting Malware Based on Opcode N-Gram and Machine Learning -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Opcode N-Gram Extraction and Feature Selection -- 4.1 Representing Executables Using Opcode -- 4.2 Feature Selection -- 5 SVM Classifier for Malware Prediction -- 6 Evaluation -- 6.1 Research Questions. , 6.2 Evaluation Measures -- 7 Experimental Result and Analysis -- 7.1 Opcode N-Gram Size -- 7.2 Feature Selection -- 7.3 Malicious Files Percentage -- 8 Conclusion and Future Work -- Acknowledgments -- References -- Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Constriction and Linearly Decreasing Vmax Methods -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 PSO Algorithm -- 3.2 Simulated Annealing -- 4 Simulation Results -- 5 Conclusions -- References -- Characterizing User Influence Within Twitter -- 1 Introduction -- 2 Related Work -- 3 Our Proposed Approach -- 4 Performance Evaluation -- 5 Conclusion and Future Work -- References -- Routing in a DTN: Performance Evaluation for Random Waypoint and Steady State Random Waypoint Using NS3 Simulator -- 1 Introduction -- 2 DTNs and Routing Protocols -- 2.1 DTN Overview -- 2.2 Routing Protocols -- 3 Simulation System Design -- 3.1 NS3 -- 3.2 Simulated Scenarios -- 4 Simulation Results -- 5 Conclusions -- References -- Optimal Residential Load Scheduling Under Utility and Rooftop Photovoltaic Units -- 1 Introduction -- 2 Related Work and Motivation -- 3 System Model -- 4 Simulation Results and Discussion -- 4.1 Energy Consumption Behavior of Appliances -- 4.2 Electricity Cost per Timeslot Analysis -- 4.3 PAR Analysis -- 4.4 Total Cost Analysis -- 5 Conclusion -- References -- A Hybrid Genetic Based on Harmony Search Method to Schedule Electric Tasks in Smart Home -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Proposed Scheduling Algorithm -- 4.1 Genetic Algorithm -- 4.2 Harmony Search Algorithm -- 4.3 A Hybrid Genetic Based on Harmony Search -- 5 Simulations and Discussions -- 6 Conclusion -- References -- An Efficient Home Energy Management Scheme Using Cuckoo Search -- 1 Introduction. , 2 Related Work -- 3 System Model -- 3.1 Assortment of Load -- 4 Proposed Schemes -- 4.1 GA -- 4.2 Cuckoo Search -- 5 Simulations and Discussions -- 6 Conclusion -- References -- Phonetics-Based Parallel Privacy Preserving Record Linkage -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation and Background -- 3.1 Problem Formulation -- 3.2 Phonetic Algorithms for Matching -- 3.3 Apache Spark -- 4 A Parallel Privacy Preserving Phonetics Matching Protocol -- 4.1 Protocol Operation -- 4.2 Privacy Discussion -- 5 Empirical Evaluation -- 5.1 Experimental Setup -- 5.2 Experimental Results -- 6 Conclusions and Future Work -- References -- Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 RBF -- 2.2 Improved Ant Colony Radial Basis Model -- 3 Empirical Results -- 4 Conclusions -- Acknowledgement -- References -- RBF Model Based on the KECDBN -- Abstract -- 1 Introduction -- 2 CDBN and KECDBN -- 2.1 CDBN -- 2.2 KECDBN -- 2.3 The Radial Basis Function Neural Network -- 3 The Empirical Study -- 3.1 The Determination of the Structure of KECDBN -- 3.2 The Empirical Results -- 4 Conclusions -- Acknowledgement -- References -- Design of a S-box for SMS4 Based on Threshold Implementation -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 SMS4 Block Cipher -- 2.2 DPA -- 3 Threshold Implementation of the SMS4 S-Box -- 3.1 TI Resists DPA Attack Principle -- 3.2 Implementation Scheme of S-Box SM4 -- 4 Conclusion -- References -- The Prediction Model of Online Social Networks' Evolution Based on the Similarity of Community -- Abstract -- 1 Introduction -- 2 Related Knowledge -- 2.1 Overlapping Community -- 2.2 Dynamic Network -- 2.3 Community Similarity -- 2.4 WS Small-World Network -- 3 Model Building -- 3.1 Formation -- 3.2 Dissolve -- 3.3 Merging -- 3.4 Splitting. , 4 Experimental Results and Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...