GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783319495682
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.541
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Autonomous Systems -- Testing Paper Optimization Based on Improved Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Background and Relative Researches -- 3 Testing Paper Optimization -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Parameter Initialization -- 3.3 Evaluation Function of the TPOPSO -- 3.4 The Global and Local Optimum -- 4 Experiment and Discussion -- 4.1 Examination Question Database -- 4.2 The Performance of the TPOPSO -- 5 Conclusion -- References -- The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- Abstract -- 1 Introduction -- 2 The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- 3 Experiment Result and Analysis -- 4 Summary -- Acknowledgement -- References -- Parameters Estimation of Regression Model Based on the Improved AFSA -- Abstract -- 1 Introduction -- 2 Multiple Linear Regression Model -- 3 AFSA -- 4 The Improved AFSA -- 4.1 The Improvement of Algorithm Parameters -- 4.2 The Improved Swarming Behavior -- 4.3 The Definition of Artificial Fish Individuals and Fitness Function -- 4.4 The Process of the Improved AFSA -- 5 Results and Conclusion -- Acknowledgment -- References -- Research on Hysteresis Modeling for Piezoelectric Displacement Actuators -- Abstract -- 1 Introduction -- 2 The Symmetry and Features of Hysteretic Loop Curves for a PZT Patch -- 2.1 Hysteretic Loop and Central Symmetry -- 2.2 Foldback Point and Centrosymmetric Center -- 2.3 The Variation of Loops, Their Upgrading/Degrading and Emerging/Vanishing -- 3 Mathematic Model -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- An Iterative Method for the Least Squares Anti-bisymmetric Solution of the Matrix Equation -- Abstract -- 1 Introduction -- 2 An Iterative Method for Solving Problem I. , 3 The Solution for Problem II -- References -- Parallelization of the Conical Area Evolutionary Algorithm on Message-Passing Clusters -- Abstract -- 1 Introduction -- 2 Partially Evolved Parallelization of CAEA -- 2.1 Partially Evolved Island Model -- 2.2 Elitist Migration Among Islands -- 2.3 Dynamic Directional Migration Topology -- 2.4 Procedure of PeCAEA -- 3 Experimental Results and Analysis -- 4 Conclusions -- Acknowledgments -- References -- Design of Heat Preservation Bathtub with Water Saving -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 The Model -- 3.1 Analysis of Bath Process -- 3.2 Analysis of Heat Gain and Loss -- 3.3 A Double Multi-objective Optimization Model -- 3.4 Effect of Bubble Bath Agent -- 4 Sensitivity Analysis -- 5 Conclusion -- References -- A Label-Correlated Multi-label Classification Algorithm Based on Spearman Rank Correlation Coefficient -- Abstract -- 1 Introduction -- 2 An Introduction to Related Algorithms -- 2.1 Spearman Rank Correlation Coefficient -- 2.2 Confidence and Confidence Interval -- 2.3 Multi-label Classification Strategy of Adaboost-SVM -- 3 Label-Correlated Multi-label Classification Model Algorithm (LC-ASVM) -- 3.1 General Design -- 3.2 Correlation Analysis of Characteristics -- 3.3 Confidence Form Multi-label SVM -- 3.4 Build LC-ASVM Model -- 4 Experiment and Analysis -- 4.1 Experimental Datasets -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- Effect of Film Thickness on Load-Carrying Property of Seawater Dynamic-Hydrostatic Hybrid Thrust Bearing -- Abstract -- 1 Introduction -- 2 Brief of Seawater-Lubricated Hydrostatic-Dynamic Thrust Bearing -- 2.1 Lubricate Flow Through the Channel in the Sector Opposed Supporting Ladder-Cavity -- 2.2 Supporting Mechanism for Opposed Supporting Ladder-Cavity -- 2.3 Initial Design Parameters of the Thrust Bearing. , 3 Property Index of the Thrust Bearing -- 3.1 Static Property Index -- 3.2 Dynamic Property Index -- 3.3 Vibration Property Index -- 4 Influence of Shallow Cavity Depth on Static Performance -- 5 Influence of Film Thickness on Dynamic Property Index -- 6 Influence of Film Thickness on Vibration Property Index -- 7 Conclusion -- Acknowledgement -- References -- Research on Static Performance of Water-Lubricated Hybrid Bearing with Constant Flow Supply -- Abstract -- 1 Introduction -- 2 Static Performance Analysis -- 2.1 Flow Condition -- 2.2 Bearing Force Calculation -- 2.3 Static Performance Indexes -- 2.4 Influence of Parameter on Static Index -- 3 Conclusion -- Acknowledgement -- References -- A New Method for Desiccant Package Quality Check -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Correct the Captured Image -- 2.2 Wipe Out the Contaminated Samples -- 2.3 Detect the Integrity of the Packaging -- 3 Experiment Result -- 4 Conclusion -- Acknowledgments -- References -- A Novel Algorithm for Laser Spot Detection Based on Quaternion Discrete Cosine Transform -- Abstract -- 1 Introduction -- 2 The Quaternion Discrete Cosine Transform Based Laser Spot Detection -- 2.1 Quaternion Discrete Cosine Transform -- 2.2 Image Moment Method (IMM) -- 3 Experiment -- 4 Conclusions -- References -- Natural Frequency Modification Using Frequency-Shift Combined Approximations Algorithm -- Abstract -- 1 Introduction -- 2 Formulation and Solution -- 2.1 Natural Frequency Sensitivity Analysis Using FSCA Method -- 2.2 Natural Frequency Modification Based on Taylor Series Expansion -- 3 Numerical Example -- 4 Conclusion -- Acknowledgements -- References -- Adaptive Stochastic Ranking Schemes for Constrained Evolutionary Optimization -- Abstract -- 1 Introduction -- 2 Theoretical Analysis and Proposed Approach -- 3 Experimental Results -- 4 Conclusion. , Acknowledgments -- References -- A Case-Based Reasoning Method with Relative Entropy and TOPSIS Integration -- Abstract -- 1 Introduction -- 2 Related Work -- 3 CBR Framwork with Relative Entropy and TOPSIS -- 3.1 Similarity Measure -- 3.2 A New Ensemble Measure -- 4 RTCBR Algorithm -- 5 Experiment Study and Analysis -- 5.1 Experiment Design -- 5.2 Result Analysis -- 6 Conclusion -- Acknowledgment -- References -- An Algorithm Design for Electrical Impedance Tomography Based on Levenberg Method -- Abstract -- 1 Introduction -- 2 Levenberg-Marpuardt Algorithm (L-Algorithm) -- 3 Construct Differential Matrix in L-Algorithm -- 4 Construction of Improved Algorithm for Electrical Impedance Tomography -- 5 Proposed Algorithm and Further Considerations -- 6 Conclusion -- References -- A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph -- Abstract -- 1 Introduction -- 2 System Design -- 3 Property Graph Representation for Binary Software -- 3.1 Intermediate Representation -- 3.2 Static Analysis Based on Intermediate Representation -- 3.3 Property Graph Generation -- 4 Vulnerability Model and Detect Based on Property Graph -- 4.1 Vulnerability Model -- 4.2 Vulnerability Detection -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Summary -- References -- GA Based Optimization of Sign Regressor FLANN Model for Channel Equalization -- Abstract -- 1 Introduction -- 2 Channel Equalization Model -- 2.1 FLANN Model -- 2.2 Optimization Using GA -- 3 Result and Discussion -- 4 Conclusion -- References -- Research of Chemical Fabric Style Prediction System Based on Integrated Neural Network -- Abstract -- 1 Introduction -- 2 Processing of the Samples Data -- 2.1 Preprocessing of Fabric Structure Parameters -- 2.2 Introduction of Fabric Structure Complexity Factor -- 2.3 Method for Dividing Fabric Subset. , 3 Comparison of Two Predictive Methods -- 3.1 Single BP Neural Network Prediction -- 3.2 Integrated Neural Network Prediction -- 4 Conclusion -- Acknowledgements -- References -- Internet and Cloud Computing -- The Influencing Factor Analysis of Micro-blog User Adding Attend Object -- Abstract -- 1 Introduction -- 2 Relationship Between User Intimacy and Attended Objects -- 2.1 Influence Factors of Intimacy and the Representation -- 2.1.1 Basic Factors -- 2.1.2 Considering Factors -- 2.1.3 Influent Factors -- 2.2 The Definition and Computation of Intimation -- 2.3 The Relationship Between User Intimacy and the Attended Object -- 3 The Relationship Between User's Interest Degree and Attended Object -- 3.1 Interest Similarity Calculation -- 3.2 Recommendation Based on Interest Similarity Relationship -- 4 Experiment and Analyzing -- 4.1 Experimental Environment -- 4.2 Evalution Index of Result -- 4.3 Experimental Results -- 5 Conclusion -- Acknowledgement -- References -- History Path Reconstruction Analysis of Topic Diffusion on Microblog -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 2.1 Basic Definition -- 2.2 Topic Detection -- 2.3 Probabilistic Score Based Diffusion Model -- 3 Experiment Results and Discussion -- 3.1 Experiment Realization -- 3.2 Experimental Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- A Novel Session Identification Scheme with Tabbed Browsing -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Browsing and Tabbed Browsing -- 2.2 Survey of Users' Browsing Modes -- 2.3 Tabbed Browsing and Session Identification -- 3 Fixed Threshold Session Identification Scheme -- 4 Novel Session Identification Scheme -- 5 Experiment and Evaluation -- 5.1 Date Preprocessing -- 5.2 Metrics -- 5.3 Performance Evaluation -- 6 Conclusion -- Acknowledgement -- References. , Research of Optimizing the System Partition in Android System.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Intelligent agents (Computer software)-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1108 pages)
    Edition: 1st ed.
    ISBN: 9783319759289
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.17
    Language: English
    Note: Intro -- Welcome Message of EIDWT-2018 International Conference Organizers -- EIDWT-2018 International Conference Organizers -- EIDWT-2018 Steering Committee Co-chairs -- EIDWT-2018 General Co-chairs -- EIDWT-2018 Program Committee Co-chairs -- EIDWT-2018 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Co-chairs -- International Advisory Committee -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Organizing Co-chairs -- Web Administrators -- Finance Chair -- Steering Committee Co-chairs -- Track Area Chairs -- 1. Databases, Knowledge Discovery, Semantics, and Mining -- Track Chairs -- PC Members -- 2. Ontologies, Metadata Representation, and Digital Libraries -- Track Chairs -- PC Members -- 3. P2P, Grid, and Cloud Computing -- Track Chairs -- PC Members -- 4. Parallel and Distributed Systems -- Track Chairs -- PC Members -- 5. Networked Data Centers, IT Virtualization Technologies, and Clouds -- Track Chairs -- PC Members -- 6. Network Protocols, Modeling, Optimization and Performance Evaluation -- Track Chairs -- PC Members -- 7. Data Security, Trust and Reputation -- Track Chairs -- PC Members -- 8. Web Science, Learning and Business Intelligence -- Track Chairs -- PC Members -- 9. Data Analytics for Learning and Virtual Organisations -- Track Chairs -- PC Members -- 10. Data Management and Information Retrieval -- Track Chairs -- PC Members -- 11. Massive Processing and Machine Learning on Large Data Sets -- Track Chairs -- PC Members -- 12. Data Modeling, Visualization and Representation Tools -- Track Chairs -- PC Members -- 13. IoT and Fog Computing -- Track Chairs -- PC Members -- 14. Mobile and Wireless Networks -- Track Chairs -- PC Members -- 15. Big Data Management and Scalable Storage Technologies -- Track Chairs -- PC Members -- 16. Energy-Aware and Green Computing Systems -- Track Chairs. , PC Members -- 17. Multimedia Networking and Medical Applications -- Track Chairs -- PC Members -- 18. Applied Cryptography and Cloud Security -- Track Chairs -- PC Members -- EIDWT-2018 Reviewers -- EIDWT-2018 Keynote Talks -- Smart Cities and Safe Cities by Situational Awareness and Computational Intelligence -- Cyber-Human Partnerships-Toward a Resilient Ecosystem in Smart Cities -- Contents -- Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage System -- 1 Introduction -- 2 CSMA/CA -- 3 Application of Fuzzy Logic for Control -- 3.1 FC -- 3.2 FC Rules -- 3.3 Control Knowledge Base -- 3.4 Defuzzification Methods -- 4 Implemented Testbed -- 4.1 FACS -- 4.2 Testbed Structure -- 4.3 CCM -- 4.4 Congestion Process Phases -- 5 Experimental Results -- 6 Conclusions -- References -- A Web-Based English Listening System for Learning Different Pronunciations in Various Countries -- Abstract -- 1 Introduction -- 2 Motivation -- 3 Proposed System -- 3.1 English Speech Database -- 3.2 A Function of Extracting Regions Based on Easiness in English Speech Hearing -- 4 Prototype System -- 4.1 A Function of Generating Cloze Tests -- 4.2 A Function of Calculating Correct Answer Rates -- 4.3 A Function of Calculating Correct Answer Rates for Regions -- 4.4 A Function of Balancing Number of Questions for Each Region -- 5 Experiment -- 6 Conclusion -- Acknowledgments -- References -- FOG Computing and Low Latency Context-Aware Health Monitoring in Smart Interconnected Environments -- 1 Background -- 2 Smart Environments -- 3 Latency -- 4 The FOG Health Monitoring Model -- 5 Communications and Networking -- 6 Illustrative Scenarios -- 7 Discussion and Concluding Observations -- References -- Application of Fuzzy Logic for Improving Human Sleeping Conditions in an Ambient Intelligence Testbed -- 1 Introduction -- 2 Ambient Intelligence (AmI). , 3 Application of Fuzzy Logic for Control -- 3.1 FC -- 3.2 Linguistic Variables -- 3.3 FC Rules -- 3.4 Control Knowledge Base -- 3.5 Defuzzification Methods -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions -- References -- Performance Evaluation of WMN-PSOSA Considering Four Different Replacement Methods -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 PSO Algorithm -- 3.2 Simulated Annealing -- 3.3 WMN-PSOSA Hybrid Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input Parameters -- 1 Introduction -- 2 Scenarios of Collaborative Teamwork -- 2.1 Collaborative Teamwork and Virtual Campuses -- 2.2 Mobile Ad hoc Networks (MANETs) -- 3 Group Activity Awareness Model -- 4 Application of Fuzzy Logic for Control -- 4.1 FC -- 4.2 Linguistic Variables -- 4.3 FC Rules -- 4.4 Control Knowledge Base -- 4.5 Defuzzification Methods -- 5 Proposed Fuzzy-Based System for Peer Task Accomplishment -- 6 Simulation Results -- 7 Conclusions and Future Work -- References -- Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic Algorithm -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 Particle Swarm Optimization -- 3.2 Distributed Genetic Algorithm -- 3.3 WMN-PSODGA Hybrid Simulation System -- 3.4 WMN-PSODGA Web GUI Tool and Pseudo Code -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters -- 1 Introduction -- 2 IoT -- 2.1 IoT Architecture -- 2.2 IoT Protocols -- 3 Opportunistic Networks. , 3.1 Opportunistic Networks Challenges -- 3.2 Opportunistic Networks Architectures -- 4 Proposed System -- 4.1 System Parameters -- 4.2 System Implementation -- 4.3 Description of FLC -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New Parameter -- 1 Introduction -- 2 WSAN -- 2.1 WSAN Challenges -- 2.2 WSAN Architecture -- 3 Proposed System Model -- 3.1 Problem Description -- 3.2 System Parameters -- 3.3 System Implementation -- 3.4 Description of FLC -- 4 Simulation Results -- 5 Conclusions and Future Work -- References -- Malicious Information Flow in P2PPS Systems -- 1 Introduction -- 2 Information Flow in the TBAC Model -- 2.1 TBAC Model -- 2.2 Information Flow Relations -- 3 Synchronization Protocols for Hidden Topics -- 4 Malicious Information Flow -- 5 Concluding Remarks -- References -- Eco Migration Algorithms of Processes with Virtual Machines in a Server Cluster -- 1 Introduction -- 2 System Model -- 3 Energy-Efficient Migration of Virtual Machines -- 3.1 Estimation Model -- 3.2 VM Selection (VMS) Algorithm -- 3.3 VM Migration (VMM) Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- Collision Avoidance for Omnidirectional Automated Transportation Robots Considering Entropy Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Omnidirectional Automated Transportation Robot -- 3.2 Kinematics -- 3.3 Control System of the Proposed Omnidirectional Automated Transportation Robot -- 3.4 Collision Avoidance Method Considering Position Entropy -- 4 Conclusions and Future Work -- References -- Performance Evaluation of an Active Learning System Using Smartphone: A Case Study for High Level Class -- Abstract -- 1 Introduction -- 2 Active Learning System with Interactive Lecture. , 3 Flow of Group Discussion for High Level Class -- 4 Performance Evaluation of ALS for High Level Class -- 5 Conclusions -- References -- Performance Evaluation of an Enhanced Message Suppression Controller Considering Delayed Ack Using Different Road Traffic Conditions -- 1 Introduction -- 2 DTN -- 3 Delayed Ack for EMSC -- 3.1 Overview -- 3.2 Control Messages -- 3.3 Message Suppression Time -- 4 System Design -- 4.1 Simulation Scenario -- 4.2 Application Setting -- 5 Simulation Results -- 6 Conclusions -- References -- Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Objects and Transactions -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Improved EEQS (IEEQS) Algorithm -- 3.1 Quorum Selection -- 3.2 Meaningless Methods -- 3.3 Omitting Meaningless Methods -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Execution Time of Each Transaction -- 4.3 Average Number of Aborted Transaction Instances -- 4.4 Average Total Energy Consumption of a Server Cluster -- 5 Concluding Remarks -- References -- Improving Data Loss Prevention Using Classification -- Abstract -- 1 Introduction -- 2 The Proposal Method -- 3 The Classification Criteria -- 4 Implementation of the Specific Rights -- 5 Conclusion -- References -- Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient -- 1 Introduction -- 2 Related Work -- 2.1 Wavelet Neural Network -- 2.2 Bootstrap Algorithm -- 3 SIM-PB-Wavelet Model -- 3.1 Most Similar Interpolation Algorithm -- 3.2 Weight of Each Model -- 3.3 Training of the Wavelet Neural Network -- 4 Modeling and Methods -- 4.1 SIM-Wavelet Model -- 4.2 SIM-P-Wavelet Model -- 4.3 SIM-PB-Wavelet Model -- 5 Experiments -- 5.1 Data. , 5.2 Results and Discussions.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Big data. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (524 pages)
    Edition: 1st ed.
    ISBN: 9783319091778
    Series Statement: Modeling and Optimization in Science and Technologies Series ; v.4
    DDC: 5.7
    Language: English
    Note: Intro -- Preface by Editors -- Contents -- List of Contributors -- Exploring the Hamming Distance in Distributed Infrastructures for Similarity Search -- 1 Introduction -- 2 Background -- 2.1 Vector Space Model -- 2.2 Random Hyperplane Hashing and Hamming Similarity -- 3 Literature Review -- 4 Similarity Search Based on Hamming Distance -- 4.1 Hamming DHT -- 4.2 HCube -- 5 Evaluations -- 5.1 Hamming Similarity -- 5.2 Hamming DHT -- 5.3 HCube -- 6 Conclusions and Further Research Issues -- References -- Data Modeling for Socially Based Routing in Opportunistic Networks -- 1 Introduction -- 2 Opportunistic Networks -- 2.1 Definition -- 2.2 Challenges -- 2.3 Use Cases -- 3 Data Routing and Dissemination -- 3.1 Basic Algorithms -- 3.2 Socially Based Algorithms -- 3.3 History-and Prediction-Based Algorithms -- 4 Potential Solutions -- 4.1 SPRINT -- 4.2 SENSE -- 5 Future Trends -- 6 Conclusions -- Decision Tree Induction Methods and Their Application to Big Data -- 1 Introduction -- 2 Preliminary Concepts and Background -- 3 Subtasks and Design Criteria for Decision Tree Induction -- 4 Attribute Selection Criteria -- 4.1 Information Gain Criterion and Gain Ratio -- 4.2 Gini Function -- 5 Discretization of Attribute Values -- 5.1 Binary Discretization -- 5.2 Multi-interval Discretization -- 5.3 Discretization of Categorical or Symbolical Attributes -- 6 Pruning -- 6.1 Overview about Pruning Methods -- 6.2 An Example of a Pruning Method - Cost-Complexity Pruning -- 7 Fitting Expert Knowledge into the Decision Tree Model, Improvement of Classification Performance, and Feature Subset Selection -- 8 How to Interpret a Learnt Decision Tree? -- 8.1 Quantitative Measures for the Quality of the Decision Tree Model -- 8.2 Comparison of Two Decision Trees -- 9 Conclusions -- References. , Sensory Data Gathering for Road Traffic Monitoring: Energy Efficiency, Reliability, and Fault Tolerance -- 1 Introduction -- 2 Literature Survey -- 3 Convergecast Tree Management Scheme -- 3.1 System Model and Assumptions -- 3.2 Initialization -- 3.3 Tree Maintenance -- 3.4 Convergecast Controller -- 4 Simulation Result -- 5 Conclusion and Future Directions of Research -- References -- Data Aggregation and Forwarding Route Control for Efficient Data Gathering in Dense Mobile Wireless Sensor Networks -- 1 Introduction -- 2 Assumptions -- 2.1 System Environment -- 2.2 Geo-Routing -- 3 Related Work -- 3.1 Location-Based DataManagement in Dense MANETs -- 3.2 Data Gathering Utilizing Correlation of Data in Wireless Sensor Networks -- 4 DGUMA: Our Previous Method -- 4.1 Mobile Agent -- 4.2 Deployment of Mobile Agents -- 4.3 Movement of Mobile Agent -- 4.4 Transmission of Sensor Data -- 5 DGUMA/DA: The Extended Method -- 5.1 Outline -- 5.2 Timer Setting -- 5.3 Transmission of Sensor Data -- 5.4 Forwarding Route Control -- 5.5 Restoring Sensor Readings at the Sink -- 6 Discussion -- 6.1 Overhead Generated by the Forwarding Route Control -- 6.2 Traffic for Data Gathering Using Lengthwise Tree in the Lengthwise Distribution -- 6.3 Traffic for Data Gathering Using Crosswise Tree in the Crosswise Distribution -- 6.4 Traffic Generated by Data Gathering Using Lengthwise Tree in the Crosswise Distribution -- 6.5 The Relation between the Performance Gain and the Overhead Generated by the Forwarding Route Control -- 7 Simulation Experiments -- 7.1 Simulation Model -- 7.2 Validation of the Discussion in Section 6 -- 7.3 Performance Evaluation of DGUMA/DA -- 8 Conclusion -- References -- P2P Data Replication: Techniques and Applications -- 1 Introduction -- 2 P2PSystems -- 3 Data Replication and Update Management in P2P Systems -- 3.1 Data Replication Update Management. , 3.2 Data Replication Techniques in P2P -- 4 Replication Requirements and Solutions for Different Applications -- 4.1 Consistency and Limits to Replication -- 4.2 Context and Uses of Data Replication -- 5 A Fuzzy-Based System for Evaluating Data Replication Factor -- 5.1 Fuzzy Logic -- 5.2 Proposed System -- 5.3 Simulation Results -- 6 Discussion and Analysis -- 6.1 Setting Up a Replication Plan -- 7 Conclusions -- References -- Leveraging High-Performance Computing Infrastructures to Web Data Analytic Applications by Means of Message-Passing Interface -- 1 Introduction -- 2 Data-Centric Parallelisation with MPI -- 3 OMPIJava - Java Bindings for Open MPI -- 4 OMPIJava Performance Evaluation -- 5 Parallelisation of Random Indexing with MPI -- 6 Performance Analysis Tools -- 7 Conclusion and Future Directions -- References -- ReHRS: A Hybrid Redundant System for Improving MapReduce Reliability and Availability -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 The Proposed System -- 3.1 Metadata -- 3.2 State/Metadata Synchronization -- 3.3 Periodical P-Metadata Backup/Update -- 3.4 Failure Detection -- 3.5 Dynamic Warmup Mechanism -- 3.6 Takeover Process -- 4 Performance Evaluation -- 4.1 Takeover Delays Evaluation -- 4.2 Warmup Performance Evaluation -- 5 Conclusion and Future Work -- References -- Analysis and Visualization of Large-Scale Time Series Network Data -- 1 Introduction -- 2 Big Data Applications -- 2.1 Environmental Sustainability -- 2.2 Data Mining for Trend Identification -- 2.3 Sensor Networks and Visualization -- 2.4 Network Application Design -- 2.5 Big Data Analysis for Environmental Sustainability -- 3 Visualization and Pattern Identification in Big Data -- 3.1 Large-Scale Data for Visualization -- 3.2 Time Series Data Analysis -- 3.3 Methodology -- 4 Preparing Big D Data for Analysis. , 5 RapidMiner vs. Weka vs. Orange -- 6 Mining the Data -- 7 Visual Inspectio on of Raw Data -- 8 Visualization an nd Presentation in Context -- 9 Conclusions -- References -- Parallel Coordinates Version of Time-Tunnel (PCTT) and Its Combinatorial Use for Macro to Micro Level Visual Analytics of Multidimensional Data -- 1 Introduction -- 2 Related Work -- 3 Essential Mechanisms of IntelligentBox -- 3.1 Model-Display Object (MD) Structure -- 3.2 Message-Sending Protocol for Slot-Connections -- 4 Time-Tunnel and Its Parallel Coordinates Version -- 4.1 System Configuration -- 4.2 Parallel Coordinates Version of Time-Tunnel (PCTT) -- 4.3 2Dto2D Visualization Functionality -- 5 Network Data Visualization Using PCTT with 2Dto2D Visualization -- 5.1 IP Packet Data -- 5.2 PCTT with 2Dto2D Visualization for IP Packet Data -- 5.3 Intrusion Detection -- 6 Combinatorial Use of PCTT for Macro Level to Micro Level Visual Analytics -- 7 Other Visualization Examples -- 8 Conclusion and Remarks -- References -- Towards a Big Data Analytics Framework for IoT and Smart City Applications -- 1 Introduction -- 2 Background: Big Data and the Internet of Things -- 2.1 The Various Faces of Big Data -- 2.2 Internet of Things -- 3 State of the Art -- 3.1 Big Data -- 3.2 Batch Processing -- 3.3 Real-Time Analytics -- 4 The Big Smart City Integration Challenges -- 4.1 Integration of Batch and Stream Processing -- 4.2 Integration of Heterogeneous Data Sources -- 4.3 Natural Text and Social Media Analysis -- 5 Case Study: Smart Grid Analytics -- 5.1 Power Quality Analytics -- 5.2 Real-Time Grid Monitoring -- 5.3 Forecasting Energy Demand -- 5.4 Lessons Learned -- 6 Unified Big Data Processing -- 6.1 Model Learning in the Batch Layer -- 6.2 Viewing Data Patterns in the Serving Layer -- 6.3 In-Stream Analytics in the Streaming Layer -- 6.4 Accessing the Data in the Application Layer. , 7 Further Research Directions -- 8 Conclusions -- References -- How the Big Data Is Leading the Evolution of ICT Technologies and Processes -- 1 Introduction -- 2 What Is the Big Data -- 2.1 Telecommunication Services -- 2.2 The Social Wave -- 2.3 Science and Research -- 2.4 Government and Public Sector -- 2.5 Internet of Things -- 2.6 Clouds -- 3 The Big Data Opportunity -- 3.1 Bringing Value -- 3.2 The Big Data Value across Sectors -- 4 The Impact of Big Data on Technologies -- 4.1 Big Data and Technologies -- 4.2 Storage Costs and Efficiency -- 5 Big Data Management and Analytics -- 5.1 Database Architectures for Big Data Processing -- 5.2 The MapReduce Paradigm -- 5.3 Hybrid Solutions -- 5.4 The Hadoop Processing Framework -- 5.5 Big Data Analytics -- 5.6 Results Visualization -- 6 Big Data Models -- 7 Conclusion -- References -- Big Data, Unstructured Data, and the Cloud: Perspectives on Internal Controls -- 1 Introduction -- 2 Preliminary Concepts and Definitions -- 3 State of the Art -- 3.1 The Advantages of Cloud Services -- 3.2 The Disadvantages of Cloud Services -- 3.3 Data Storage and the Cloud -- 3.4 The Use and Frequency of Unstructured Data -- 4 Problems, Issues, and Challenges -- 4.1 Self-performed Audit Procedures -- 4.2 Third-Party (Service) Audit Procedures -- 4.3 Other Procedures -- 4.4 Timescales and Logistical Concerns -- 5 Proposed Approach and Solutions -- 5.1 Background to the Survey -- 5.2 The Survey -- 5.3 Survey Results -- 5.4 Interpretation and Analysis of the Results -- 6 Summary Evaluations and Lessons Learned -- 7 Further Research Issues -- 8 Conclusion -- References -- Future Human-Centric Smart Environments -- 1 Introduction -- 2 Main Challenges for Achieving Livable Smart Cities -- 2.1 IoT Technologies -- 2.2 Trusted IoT -- 2.3 Smart City Management and Services -- 2.4 User Involvement -- 3 User Centric IoT Systems. , 3.1 Human Centered Perspective.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Ubiquitous computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (950 pages)
    Edition: 1st ed.
    ISBN: 9783030222635
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.994
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Distributed artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (197 pages)
    Edition: 1st ed.
    ISBN: 9783662490174
    Series Statement: Lecture Notes in Computer Science Series ; v.9380
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Transactions on Computational Collective Intelligence -- Contents -- Management and Computer Science Synergies: A Theoretical Framework for Context Sensitive Simulation Environment -- 1 Introduction -- 2 The Proposition of a Theoretical Model -- 2.1 A Review of the Literature -- 2.2 The Model and Research Hypotheses -- 3 Hypotheses Validation Methodology of the Proposed Model: SEM -- 4 Methodology to Build Context Sensitive Simulation Environment: Fuzzy Data Analysis -- 4.1 Fuzzy Clustering -- 4.2 Fuzzy Rules Extraction -- 5 The Simulation Environment -- 6 Related Works -- 7 Conclusions and Future Works -- References -- Improved Recommendation System Using Friend Relationship in SNS -- Abstract -- 1 Introduction -- 2 Recommended Types of Social Networks -- 2.1 The Representation and the Characteristics of Social Network Data -- 2.2 Recommended Items Based on Social Networks -- 2.3 Recommend of SNS Friends -- 3 Improved Recommendation of SNS Friends: Matrix Decomposition Model on Context -- 3.1 The Introduction of Matrix Decomposition Model -- 3.2 Improved Model -- 4 Experiment and Analysis -- 4.1 A Set of Training Data -- 4.2 Evaluation Standards -- 4.3 The Results of Experiment -- 5 Summary -- References -- Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language -- 1 Introduction -- 2 Reverse XSS Defect Detection Theory -- 2.1 Domains of XSS Defect Description -- 2.2 Relations of XSS Defect Detection -- 2.3 Reverse Semantic Analysis Rules of XSS Defect Detection -- 2.4 Bidirectional Taint Propagation Analysis Approach -- 3 Implementation of Reverse Static Detection on XSS Defect -- 3.1 Pre-processing Program -- 3.2 Call Information Analysis of the Source Code -- 3.3 Program Information Analysis -- 3.4 Defect Rules Matching Analysis -- 4 The Results and Analysis of Experiments. , 4.1 Comparing Results of Forward Analysis, Reverse Analysis and Bidirectional Analysis -- 5 Conclusion and Future Work -- References -- A Multilevel Security Model for Search Engine Over Integrated Data -- 1 Introduction -- 2 Related Work -- 2.1 Data Integration and Secure Search -- 2.2 Multi Level Security -- 2.3 Integration of Security Policies -- 3 Scenarios and Systems -- 3.1 Search Systems -- 3.2 The Integration Architecture -- 3.3 Formal Model -- 4 Access Policy Integration -- 4.1 Integration Sequence -- 4.2 Lattice Integration -- 4.3 Mapping Function Translation -- 4.4 Matrix Integration -- 5 Security Analysis and Proof -- 6 Conclusions -- 6.1 Work Summary -- 6.2 Contributions -- 6.3 Future Work -- References -- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Organization -- 2 Review of a Multi-use CCA-secure IBPRE Scheme -- 2.1 Definition and Security Model -- 2.2 The Wang et al.'s IBPRE Scheme -- 3 Our Attack -- 3.1 Attack I -- 3.2 Attack II -- 3.3 On Collusion Resistance -- 4 Review of Another IBPRE Scheme -- 4.1 Definition of Single-Hop Unidirectional IBPRE -- 4.2 Security Model for Single-Hop Unidirectional IBPRE -- 4.3 Luo et al.'s IBPRE Scheme -- 5 Security Analysis -- 5.1 Attack by Using the Insecure ReKeyGen Algorithm -- 5.2 On the Transitivity Property -- 6 Conclusion -- References -- Enabling Vehicular Data with Distributed Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Application of ML Algorithms on Traffic Data -- 4 Distributing k-Nearest Neighbors -- 5 Discussion -- 6 Conclusion -- References -- Adapting Distributed Evolutionary Algorithms to Heterogeneous Hardware -- 1 Introduction -- 2 Background -- 3 The HAPA Methodology -- 4 Experimental Setup -- 4.1 The Knapsack Problem -- 4.2 Parameters. , 5 HAPA Phase 1: Know Your Platform -- 5.1 Hardware Description -- 5.2 Ranking Using Standard Benchmark Software -- 5.3 Ranking Using Traditional dGAs -- 5.4 Mathematical Approximation of Running Times -- 6 HAPA Phase 2: Design Your Algorithm -- 6.1 DGA_HAPA: A First Algorithm Derived from HAPA -- 6.2 DGA_HAPA-FM: A Second dGA Derived from HAPA -- 7 HAPA Phase 3: Obtaining the Results -- 7.1 Hit Rate Analysis -- 7.2 Numerical Effort Analysis -- 7.3 Runtime Analysis -- 7.4 Search Diversity Analysis -- 8 Conclusions and Future Research -- References -- Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles -- 1 Introduction -- 1.1 5G Telecommunication Network and Autonomous Vehicle System -- 1.2 Attribute Based Encryption for Sharing Real-Time Traffic Information -- 1.3 Motivation and Contribution -- 1.4 Organization -- 2 Definition and Security Model for KP-ABE-SR -- 3 A Concrete KP-ABE-RS Scheme and Its Security Analysis -- 3.1 Access Tree -- 3.2 The Concrete KP-ABE-RS Scheme -- 3.3 Security Proof -- 4 The Eroca System -- 5 Performance Evaluation -- 6 Conclusion -- References -- Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Key Problems -- 1.3 Contributions -- 2 Preliminaries -- 2.1 Broadcast Encryption -- 2.2 Single-User Searchable Encryption -- 2.3 Multi-user Searchable Encryption -- 3 System Model -- 3.1 Basic Model -- 3.2 Data Flows -- 3.3 Coarse-Grained Access Control -- 4 Multi-user Searchable Encryption for Data Sharing -- 4.1 Our Construction -- 4.2 Security Analysis -- 4.3 Comparison -- 5 Implementation -- 5.1 Access Control Implementation -- 5.2 SUSE Scheme Supporting Two-Phase Operation -- 6 Conclusion -- References -- Quantum Information Splitting Based on Entangled States -- 1 Introduction -- 2 Preliminary. , 2.1 For the First MQIS Protocol -- 2.2 For the Second QIS Protocol -- 3 MQIS Protocol Based on ES of Bell States -- 3.1 (2,2) Protocol -- 3.2 (3,3) Protocol -- 3.3 (n,n) Protocol -- 4 QIS Protocol Based on Four-Particle Cluster States -- 5 Protocol Analysis -- 5.1 Security Analysis -- 5.2 Efficiency Analysis -- 6 Conclusion -- References -- Zero-Tree Wavelet Algorithm Joint with Huffman Encoding for Image Compression -- 1 Introduction -- 2 Description of EZW Algorithm -- 3 The Analysis of EZW Performance -- 4 EZW Joint with Huffman Coding Scheme -- 4.1 The Thought of Joint Coding -- 4.2 Joint Coding Simulation Results and Performance Analysis -- 5 Conclusions -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer-assisted instruction. ; Electronic books.
    Description / Table of Contents: Technology-enhanced systems and computer-aided tools that support scaffolding in collaborative learning are key goals in the education research sector. This book covers a number of approaches to fostering functional collaborative learning and working online.
    Type of Medium: Online Resource
    Pages: 1 online resource (319 pages)
    Edition: 1st ed.
    ISBN: 9783642198144
    Series Statement: Studies in Computational Intelligence Series ; v.350
    DDC: 371.360285
    Language: English
    Note: Title Page -- Preface -- Acknowledgements -- Contents -- User-Centred Evaluation and Organisational Acceptability of a Distributed Repository to Support Communities of Learners -- Introduction -- Background -- Context -- Related Work -- Introduction to EERN and DELTA -- Methodological Background -- EERN/DELTA Goals -- DELTA/EERN Architecture -- DELTA's User Interface -- Methods Used in Phase 1 and Phase 2 -- Phase 1: EERN Evaluation and Analysis -- Phase 2: UBERN Evaluation and Analysis -- Results and Discussion -- Phase 1: EERN -- Phase 2: UBERN -- Towards a Fully Decentralized Learning Repository -- Summative Evaluation and Conclusions -- Future Work -- References -- Facebook as a Collaborative Platform in Higher Education: The Case Study of the Universitat Oberta de Catalunya -- Introduction -- State of the Art -- Open Social Learning and 2.0 Social Networks -- Uses of Facebook in Higher Education: Background -- Objectives -- The Learning Methodology -- Assessment Methodologies -- Analysis of the Experience at a Quantitative Level -- Qualitative Approach: A Virtual Ethnography in the Facebook Context -- Results -- Conclusions -- References -- Development and Implementation of an Enterprise Learning Architecture for Collaborative Learning -- Introduction -- E-Warehouse: A Framework For Learning -- Implementation of Collaborative Environment -- Curriculum Development -- Pedagogical Materials and Data Warehouse -- Assessment of Student Learning -- Sample Learning Context -- Learning Pillars -- Description of the SCM Pillar -- Description of the PLM Pillar -- Integration with Other Learning Pillars: E-Warehouse Roof: SCM / PLM Integration -- Management Environment for E-Warehouse -- Design -- Creating a Learning Pillar Using AdminTool -- Future Work -- Conclusions -- References. , A Rational Framework for Student Interactions with Collaborative Educational Systems -- Introduction -- A Rational Model of Procrastination -- The Impact of Procrastination on Collaboration -- Data -- Measurement -- Results -- Increased Activity -- Diminished Performance -- Efforts to Overcome Low Performance -- A Few Illustrative Cases -- Discussion and Conclusions -- References -- Interaction Analysis as a Tool for Supporting Collaboration: An Overview -- Introduction -- Analysis and Evaluation for the Support of Collaborative Learning Activities -- A Framework for Interaction Analysis and Evaluation Techniques -- Top-Down Automatic Interaction Analysis Techniques -- Automated Interaction Analysis Based on Event Logs -- Automated Interaction Analysis Based on Event Logs and a Priori Annotations of Verbal Content -- Interaction Analysis Techniques with the Aid of Human Evaluators -- Coding schemes -- Rating schemes -- Trained Automatic Interaction Analysis Based on Human Evaluations -- Automated Interaction Analysis Trained on Coded Data -- Automated Interaction Analysis Trained on Rated Data -- Conclusions -- References -- CLFP Intrinsic Constraints-Based Group Management of Blended Learning Situations -- Introduction -- Flexible Solutions for Supporting CSCL Scripts -- Flexibility as Disjunction of Intrinsic and Extrinsic Constraints -- Limitations in Supporting Group Management in Collaborative Blended Learning Scenarios -- Considering the Intrinsic Constraints of Two IMS LD CLFPs -- Flexibility Constraints for TAPPS and Jigsaw -- Jigsaw and TAPPS CLFPs -- Representing the Intrinsic Constraints with IMS LD -- Supporting Flexibility for Group Management: A Web-Based Tool -- A Web-Based Application -- The Architecture -- Preliminary User Study Evaluation -- Description of the User Study -- Results -- Future Developments. , Conclusion and Future Work -- References -- A Pedagogical Approach for Collaborative Ontologies Building -- Introduction to Collaborative Learning Ontology -- About Collaborative Building of Ontologies -- Collaborative Ontology Authoring Tools -- Social Space for Ontology Maturing and Nurturing -- A CSCL Driven Model for Collaborative Ontology Construction and Maturing -- Top Down Approach for the Collaborative Ontology Construction: To Increase the Value of Teachers' Contribution -- Collaborative Ontology Construction Scenarios -- A Tool for the Collaborative Building of Ontologies -- Bottom Up Collaborative Ontologies Building: To Increase the Value of Students' Contribution -- Ontology Extraction and Validation from a Semantic Space -- Assessment of the Contribution Derived by Group Activities over Terms and Concepts Defined in Educational Ontology -- Text Analysis, Network Text Analysis and Ontology Comparison -- Conclusions -- References -- A Model-Based Approach to Designing Educational Multiplayer Video Games -- Introduction -- The VGSCL System -- Goals -- Tasks -- Interaction -- Modeling the VGSCL System -- Models of Educational Content -- Models for Recreational Content -- Model to Relate Educational and Recreational Contents: The General Tasks and Goals Model -- User Modeling -- Recording Information in the Models -- Conclusions and Further Work -- References -- A Framework to Foster Collaboration between Students through a Computer Supported Collaborative Learning Environment -- Introduction -- On Adapting Collaborative Frameworks -- Component-Based Adaptive Framework -- Adaptation to Foreseeable Situations -- Adaptation for Unforeseen Situations -- From the Framework to a Prototype -- Framework Components Mapping -- Implementation Details for the Prototype -- Formative Evaluation of the Prototype -- Experience Description. , Information Obtained from the Questionnaires -- Conclusions and Future Work -- References -- Apt to Adapt: Micro- and Macro-Level Adaptation in Educational Games -- Introduction -- Around an Inspiring Virtual Learning World -- Micro Level Assessment -- Micro Level Interventions -- Meta-cognitive Interventions -- Cognitive Interventions -- Motivational Interventions -- Adaptation by Interactive Storytelling -- Collaborative Learning -- Conclusions and Outlook -- References -- A Collaborative and Adaptive Design Pattern of the Jigsaw Method within Learning Design-Based E-Learning Systems -- Introduction -- The Rationale -- LAMS -- The Jigsaw Collaborative Method -- Adaptation -- Design of the Jigsaw Adaptive Online Learning Activity -- Summary and Future Research Plans -- References -- Recommendation of Learning Material through Students´ Collaboration and User Modeling in an Adaptive E-Learning Environment -- Introduction -- Related Works -- AdaptWeb® Environment -- Integrating Recommendation Mechanism to AdaptWeb® -- Multi-Criteria Ontology for Learning Materials -- The Collaboration Process -- Scenario of Use -- Conclusions -- References -- Modeling Adaptation Patterns in the Context of Collaborative Learning: Case Studies of IMS-LD Based Implementation -- Introduction -- Background -- Adaptation Patterns: Adaptivity in Systems for Collaborative Learning -- Modeling Adaptation Patterns -- The Basics of LD: Adaptivity Capabilities and Limitations -- IMS-LD and APs Case Studies: APs Expressed in IMS-LD -- Advance the Advanced -- Lack of Confidence -- Group Heterogeneity Based on Prior Domain Knowledge -- Discussion and Future Work -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (856 pages)
    Edition: 1st ed.
    ISBN: 9783030343873
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1084
    DDC: 006.3
    Language: English
    Note: Intro -- 4th International Conference on Intelligent and Interactive Systems and Applications (IISA2019) -- Editorial -- Acknowledgements -- Contents -- Intelligent Systems -- Recognition of Voiceprint Using Deep Neural Network Combined with Support Vector Machine -- Abstract -- 1 Introduction -- 2 Methods -- 3 Voiceprint Recognition Based on DBN-SVM -- 3.1 Experimental Procedures and Processes -- 3.2 Corpus Description and MFCC Extraction -- 3.3 DBN Training and Deep Feature Extraction -- 3.4 Experimental Result and Analysis -- 4 Conclusion -- Acknowledgments -- References -- Research on Intelligent Patent Classification Scheme Based on Title Analysis -- Abstract -- 1 Introduction -- 2 Topic-Based Patent Classification Scheme -- 2.1 The Process of Topic-Based Patent Classification Scheme -- 2.2 Results and Discussion -- 3 Title Word-Frequency-Based Patent Classification Scheme -- 3.1 The Process of Title Word-Frequency-based Patent Classification Scheme -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Study on Intelligent Recognition Matching and Fusion Interaction Technology of Electrical Equipment Model -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Purpose and Significance -- 1.3 Overseas Research Levels -- 1.4 Domestic Research Levels -- 2 Solutions and Key Technologies -- 2.1 Power Equipment Model Identification -- 2.2 Panoramic Model and Background Real-Time Monitoring Data Fusion Interaction -- 2.3 Physical Device Model Overlay and Virtual Integration -- 2.4 Model Control Interaction -- 3 Conclusion -- Acknowledgments -- References -- Deep Knowledge Tracing Based on Bayesian Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 BDKT -- 3.1 BDKT Input Data -- 3.2 BDKT Model Structure -- 3.3 BDKT Parameter Learning -- 4 Results and Discussion -- 4.1 BDKT Vs DKT. , 4.2 BDKT Parameter Randomness and Model Uncertainty -- 4.3 Relationship Between the Students' Behaviors -- 5 Conclusion -- Acknowledgment -- References -- Co-simulation of Sub-frame of the Intelligent Fire Truck Based on SolidWorks and ANSYS Workbench -- Abstract -- 1 Introduction -- 2 Main Technical Difficulties -- 2.1 The Connection Problem -- 2.2 Contact Settings -- 2.3 Meshing -- 3 Load Loading -- 4 Simulation Results -- 4.1 Static Simulation Without Impact Force -- 4.2 Static Simulation with Impact Force -- 4.3 Modal Analysis of the Overall Structure -- 5 Conclusion -- Acknowledgments -- References -- Design of Framework on Intelligent Simulation and Test Platform for High Power Microwave Sources -- Abstract -- 1 Introduction -- 2 Requirement Analyses -- 2.1 User Requirements -- 2.2 Functional Requirements -- 2.3 Interface Requirements -- 3 Frame Design -- 3.1 Development Language Selection -- 3.2 Design Model -- 3.3 Design Method -- 3.4 Computing Model -- 4 Technical Support -- Acknowledgments -- References -- Design of Intelligent Meter Life Cycle Management System Based on RFID -- Abstract -- 1 Introduction -- 2 Anti-collision Algorithm Processing of RFID Signal -- 3 Composition of the Life Cycle Management System -- 3.1 Cloud Platform Management System -- 3.2 RFID Intelligent Meter Storage System -- 3.3 RFID Smart Meter On-Site Data Copying System -- 4 Design of RFID Electronic Tag Antenna -- 5 Conclusion -- Acknowledgements -- References -- Design of Single-Phase Intelligent Meter Based on RFID Semi Active Technology -- Abstract -- 1 Introduction -- 2 Overall Design of Smart Meter -- 3 Hardware Design of Smart Meter -- 3.1 CPU Module -- 3.2 Metering Module -- 3.3 Communication Module -- 3.4 Clock and Storage Module -- 4 Software Design -- 4.1 Overall Structure of the Software -- 4.2 RFID Interface Design Based on Three-Tier Architecture. , 5 System Debugging -- 6 Conclusion -- Acknowledgements -- References -- Research on Anti-fall Algorithms of Substation Intelligent Inspection Robot -- Abstract -- 1 Introduction -- 2 Design of Inspection Platform -- 3 Ranging Principle of Binocular Camera -- 4 Application Principle of Anti-falling -- 5 Design and Analysis of Algorithms -- 6 Conclusion -- References -- Research and Application of Process Object Modeling Method Based on Deep Learning -- Abstract -- 1 Introduction -- 2 DNN Deep Learning Algorithms -- 3 Modeling of DNN Deep Learning Network -- 3.1 Open-Loop Modeling Method Based on Multiple Inertial Filters -- 3.2 Closed-Loop Modeling Method Based on Two DNN Models -- 4 Conclusion -- References -- Performance Assessment of Smart Electricity Meters Based on Max Margin Bayesian Classifiers -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Feature Selection Based on Genetic Algorithm -- 2.2 Learning Max-Margin Bayesian Classifiers Based on Bagging Ensemble -- 2.3 Selecting Max Margin Bayesian Classifiers Subset Based on Clustering Algorithm -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- References -- Operating Performance Assessment of Smart Meters Based on Bayesian Networks and Convex Evidence Theory -- Abstract -- 1 Introduction -- 2 The Proposed Methodology -- 2.1 Discretization -- 2.2 Training of Bayesian Networks from Historical Data of Smart Electricity Meters -- 2.3 Using the Convex Evidence Theory to Integrate the Assessment Results of Bayesian Networks -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- Acknowledgments -- References -- Research on Object-Oriented Design Defect Detection Method Based on Machine Learning -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Software Design Defects -- 2.1 Related Concepts -- 2.2 Related Definition. , 3 Design Defect Detection Method -- 3.1 Design Defect Detection -- 3.2 Feature Extraction -- 3.3 Design Defect Classifier Algorithms -- 3.4 Design Defect Detection Algorithms -- 4 Experiment and Evaluation -- 4.1 Experiment -- 4.2 Result Analysis -- Acknowledgments -- References -- Design of Electromagnetic Energy-Saving Intelligent Vehicle -- Abstract -- 1 Introduction -- 2 Principles of Operation -- 3 Test Results -- 4 Conclusion -- Acknowledgments -- References -- New Energy Vehicle Reliability Research by Large Data -- Abstract -- 1 Introduction -- 2 Reliability Analysis Theory -- 3 Acquisition of Automobile Fault Data -- 4 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 4.1 Establishing the Curve of Vehicle Type Changing with the Number of Mileage Faults -- 4.2 Classification of Fault Hazard Degree -- 4.3 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 5 Calculation of Reliability Evaluation Index of Vehicle Type -- 6 Establishment of Comprehensive Evaluation Model of Vehicle Type Reliability -- 7 Conclusion -- References -- One-Step Prediction for GM(1,1) with a Sliding Data Window -- Abstract -- 1 Introduction -- 2 The GM(1,1) Model -- 3 Introducing the Sliding Data Window to GM(1,1) -- 4 The Requirements of Data Samples for GM(1,1) -- 5 Experimental Results -- 6 Conclusions -- Acknowledgement -- References -- Evaluation on Well-Canal Combined Irrigation Modes for Cotton Fields in the South of Xinjiang, China Based on an Algorithm of Fuzzy Neutral Network -- Abstract -- 1 Background -- 2 Flow and Steps of the Algorithm -- 2.1 Flow of Algorithm for Fuzzy Neural Network -- 2.2 Steps of the Algorithm -- 3 Mathematical Principles of the Algorithm -- 3.1 Principles of Fuzzy Mathematics and FNN -- 3.2 Fuzzy Function and FNN -- 4 Empirical Analysis. , 4.1 Prediction Image of Training Data Based on FNN Algorithm -- 4.2 Results -- 5 Conclusions -- Acknowledgements -- References -- Grape Downy Mildew On-line Detection Based on Accurate Image Processing Method Preformed on Embedded Ambient Intelligence System -- Abstract -- 1 Introduction -- 2 Intelligent Image Processing -- 2.1 Holistic Methods Organization Chart -- 2.2 Image Processing -- 2.3 Decrease of Disturbance of Leaf Vein -- 3 System Design -- 4 GDM Diagnose, Grading and Preventive Measures -- 5 Conclusion -- Acknowledgments -- References -- An Improved Bisecting K-Means Text Clustering Method -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Processing -- 3.1 Corpus Acquisition -- 3.2 Data Extraction Using Word2Vec -- 3.3 Using TF-IDF to Select Feature Word Vector -- 4 The Improved Bisecting K-Means Text Clustering Method -- 4.1 Bisecting K-Means Clustering -- 4.2 Improved Bisecting K-Means Algorithm -- 5 Experimental Results Analysis -- 5.1 Experimental Process -- 5.2 Experimental Results -- 6 Conclusion -- Acknowledgements -- References -- PLC-Based Control System Design of Intelligent and Efficient Multiple Parking Device -- Abstract -- 1 Introduction -- 2 Structure and Principle of Intelligent and High Efficiency Multiple Parking Device -- 3 Design of Control System -- 4 Design of System Hardware -- 5 Design of System Software -- 5.1 The Initialization of System -- 5.2 The Procedure of Storage Car -- 5.3 The Rotation of Motor -- 6 Conclusion -- Acknowledgement -- References -- Sparse Acceleration Algorithm Based on Likelihood Upper Bound -- Abstract -- 1 Introduction -- 2 Acceleration Based on Likelihood Upper Bound Filtering -- 2.1 Sparse Expression Target Tracking -- 2.2 Observation Likelihood Upper Bound -- 2.3 Bounded Particle Resampling -- 3 Experimental Results and Analysis -- 3.1 Experimental Data and Algorithm Description. , 3.2 Evaluation Criteria.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Adaptive computing systems. ; Computer-assisted instruction. ; Artificial intelligence. ; Electronic books.
    Description / Table of Contents: This book reviews and analyzes new implementation perspectives for intelligent adaptive learning and collaborative systems, enabled by advances in scripting languages, IMS LD, educational modeling languages and learning activity management systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (343 pages)
    Edition: 1st ed.
    ISBN: 9783642285868
    Series Statement: Studies in Computational Intelligence Series ; v.408
    DDC: 371.360285
    Language: English
    Note: Title Page -- Preface -- Introduction -- Contents -- Part I: Design of Adaptive Learning Systems -- Reuse of Data Flow Designs in Complex and Adaptive CSCL Scripts: A Case Study -- Introduction -- Background -- The Data Flow Problem in Learning Design and the Composition-Based Approach -- Data Flow Approaches and the Reuse Dimension -- The LeadFlow4LD Design Methodology -- MOSAIC Case Study -- A LeadFlow4LD Implementation of MOSAIC Scenario -- Discussion -- An Abstract Workflow Template-Based Approach -- Conclusions and Future Work -- References -- System Orchestration Support for a Collaborative Blended Learning Flow -- Introduction -- Description of a Previous Experimental Study -- Description of the Experiment: Meeting the Campus Together -- Overview of the Results of the Experiment -- Limitations on the Orchestration Tasks -- System for the Scripted Orchestration -- Course Flow Management Technologies -- The Scripted Course Flow -- Technical Details of the Scripted Flow -- Results Analysis of the Solution: A Simulation -- Conclusions -- References -- Adaptive Collaboration Scripting with IMS LD -- Introduction -- CSCL Scripts - Theory and Adaptation -- Related Work -- Proposed Extensions to IMS LD -- Examples -- Modelling Group Work -- Groups -- Artefacts -- Sequencing- and Execution Flow- Specification -- Environments and Collaboration Contexts -- Services -- Service Selection -- Functions -- Permissions -- Monitoring Execution and Reacting to State Changes -- Run-Time Model -- Event Handling -- Exception Handling -- Adaptive Interventions -- Basic Adaptation Actions -- Advanced Adaptation Mechanisms -- Summary and Outlook -- References -- Extending IMS-LD Capabilities: A Review, a Proposed Framework and Implementation Cases -- Introduction -- Background -- AICLS Systems and Adaptation Patterns. , A Review of IMS-LD Based Adaptation Attempts -- AICLS Reference Framework: IRMO and MAPIS -- Requirements from an AICLS Framework -- MAPIS: Architecture for Implementing Adaptations with IMS-LD -- MAPIS Case Studies: Adaptations Expressed in IMS-LD -- Trigger Peer Interactions -- Discussion and Future Work -- References -- Prototype Tools for the Flexible Design of CSCL Activities Based on the Adaptation Pattern Perspective -- Introduction -- Supporting Collaboration -- Collaboration Scripts and the Need for Flexibility -- Adaptive Collaboration Support -- Research Motivation -- Adaptation Patterns -- The Nature of Adaptation Patterns -- The DeACS Methodology -- Adaptation Pattern Analysis -- The FlexCoLAB System -- Authoring Environment -- Student Environment -- PPR (Pyramid Peer Review) -- The Core Idea -- Design Analysis- The Design Axes -- System Architecture -- The Case Study -- Conclusions and Future Work -- References -- Adapting the Collaborative Strategy 'Students Team Achievement Divisions' in an Information Technology Work Place -- Introduction -- Background -- LAMS -- Student - Teams - Achievement - Divisions (STAD) -- Adaptation -- Design of an Adaptive STAD Online Learning Activity in LAMS -- Phase 1: Introduction to the Learning Activity -- Phase 2: Personal Assessment -- Phase 3: Adaptive Group Formation -- Phase 4: Adaptive Individual Learning and Group Collaboration -- Phase 5: Adaptive Collaborative Group Report Preparation -- Phase 6: Group Report Presentation -- Phase 7: Team Assessment -- Phase 8: Adaptive Individual Assessment -- Phase 9: Praise for Best Group Reports -- Implementing the 2nd Phase of the Adaptive Collaborative Method STAD: Determining Learners-Employees' Learning Styles within the Context of an IT Work Place -- Aims of the Approach -- The Framework of the Legal Council of the Hellenic State. , Research Tools and Methodology -- Presentation-Annotation of the Aggregate Results of the Survey -- Summary and Future Work -- References -- Part II: Interactive and IntelligentLearning Systems -- Examining the Interrelation between the Interaction Analysis and Adaptation Research Fields within Communication-Based Collaborative Learning Activities: Convergence, Divergence or Complementarity? -- Introduction -- Computer-Based Interaction Analysis (IA) -- State of the Art -- Adaptation in CSCL -- Flexibility and Interoperability of IA Tools -- Discussion -- References -- Making Adaptations of CSCL Scripts by Analyzing Learners' Online Behavior -- Introduction -- Interaction Analysis -- Interaction Analysis Indicators -- Interaction Analysis Tools -- An Example: Adapting a Learning Script Based on a TPS Strategy Using IA Techniques -- Concluding Remarks -- References -- Behavioural Prototyping©: Making Interactive and Intelligent Systems Meaningful for the User -- Background -- Psychological Perspectives -- Interactivity and Intelligence -- Problem Solving and Learning -- Affordances and the Nature of Perceived Use -- Shortcomings of Designs: The Importance of Behavioural Profiles -- Prototypes and Archetypes -- Inclusive Design -- Formalized Behavioural Prototyping© -- Conclusion: Strengths of the Framework -- References -- The Design of a Teacher-Driven Intelligent Agent System for Supervising Lessons in LAMS -- Introduction -- Monitoring and Supervising the Learning Process and the Collaboration in LMSs -- Related Work -- Supporting the Supervisor of a Lesson in LAMS -- An Agent-Based Architecture for Intelligent Monitoring and Supervising of Lessons in LAMS -- The Scheduler Agent -- The Monitoring Agent -- The User Notification Agent -- Examples of Rules Producing Feedback Messages -- Feedback Messages Taxonomy -- Alert Messages. , Awareness Messages -- Evaluation Reports and Messages for Learners and Activities -- Response of the Messaging System to a Learning Scenario -- An Evaluation Scenario -- Conclusions and Future Work -- References -- The Text-Based Computer-Mediated Communication in Distance Education Fora: A Modelling Approach Based on Formal Languages -- Introduction -- Theoretical Framework -- Generally -- The Complexity of Text Based Computer-Mediated Communication (CMC) -- Theoretical Approaches -- Methodological Framework -- HOU Fora and Choices Justification -- Modelling of HOU Distance Education Forum -- System Development -- Data Filtering -- Roots Files Storage -- String Output -- System Integration -- Exemplary Operation -- Input -- Output -- Experiments -- Phase A -- Phase B -- Discussion -- References -- Part III: Collaborative Learning Systems -- Antecedents of Collaborative Learning in Massively Multiplayer Online Games -- Introduction -- Theoretical Background: MMOGs and Collaborative Learning -- Research Methodology -- Data Collection -- Data Analysis -- Tasks, Groups and the Player Community -- Tasks and Activities -- Team Practices -- Community Practices and the Social Environment -- Discussion and Conclusions -- References -- Validating Empirically a Rating Approach for Quantifying the Quality of Collaboration -- Introduction -- Collaborative Setting -- Determining Relations between Dimensions of Collaboration Quality -- The Rating Approach -- Rating Scheme -- Rating Process -- Reliability of Ratings -- Relations between Dimensions of Collaboration Quality -- Multidimensional Scaling of Dimensions of Collaboration Quality -- Results and Internal Validation of the MDS Algorithm -- Interpretation of the MDS Results -- Conclusions and Further Research -- References. , Internet-Mediated Communities of Practice: Identifying a Typology of Critical Elements -- Introduction -- Conceptual Foundations -- Historical Overview and Theory of Communities of Practice -- Internet-Mediated Communities of Practice -- Research Framework -- Methodology -- Results -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Industrial engineering. ; Metaheuristics. ; Scheduling. ; Management science. ; Metaheuristik. ; Produktionsplanung. ; Reihenfolgeproblem. ; Electronic books.
    Description / Table of Contents: This volume presents meta-heuristics approaches for scheduling problems arising in industrial and manufacturing applications. The present volume is the first book on scheduling problems in Grid, P2P and other Emergent Computational Systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (362 pages)
    Edition: 1st ed.
    ISBN: 9783540789857
    Series Statement: Studies in Computational Intelligence Series ; v.128
    DDC: 620
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer networks. ; Electronic books.
    Description / Table of Contents: Social network analysis investigates the structure and dynamics of intelligent Web-based networking and collaborative systems. This volume covers the latest advances in the field that lead to competitive advantages in business and academia.
    Type of Medium: Online Resource
    Pages: 1 online resource (311 pages)
    Edition: 1st ed.
    ISBN: 9783642167935
    Series Statement: Studies in Computational Intelligence Series ; v.329
    Language: English
    Note: Intro -- Contents -- Wikipedia as a Source of Ontological Knowledge: State of the Art and Application -- Toward a Methodology of Collaborative Modeling and Simulation of Complex Systems -- Evolving Schedules of Independent Tasks by Differential Evolution -- A Multi-lane Double Auction for Economic- Based Service Management in the Cloud -- Monitoring and Performance Analysis of Workflow Applications in Large Scale Distributed Systems -- Scaling Relations of Data Gathering Times in an Epidemically Data Sharing System with Opportunistically Communicating Mobile Sensors -- Multilaterally Secure Ubiquitous Auditing -- A Round-Based Cover Traffic Algorithm for Anonymity Systems -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...