Keywords:
Intelligent agents (Computer software)-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (1108 pages)
Edition:
1st ed.
ISBN:
9783319759289
Series Statement:
Lecture Notes on Data Engineering and Communications Technologies Series ; v.17
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=5311269
Language:
English
Note:
Intro -- Welcome Message of EIDWT-2018 International Conference Organizers -- EIDWT-2018 International Conference Organizers -- EIDWT-2018 Steering Committee Co-chairs -- EIDWT-2018 General Co-chairs -- EIDWT-2018 Program Committee Co-chairs -- EIDWT-2018 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Co-chairs -- International Advisory Committee -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Organizing Co-chairs -- Web Administrators -- Finance Chair -- Steering Committee Co-chairs -- Track Area Chairs -- 1. Databases, Knowledge Discovery, Semantics, and Mining -- Track Chairs -- PC Members -- 2. Ontologies, Metadata Representation, and Digital Libraries -- Track Chairs -- PC Members -- 3. P2P, Grid, and Cloud Computing -- Track Chairs -- PC Members -- 4. Parallel and Distributed Systems -- Track Chairs -- PC Members -- 5. Networked Data Centers, IT Virtualization Technologies, and Clouds -- Track Chairs -- PC Members -- 6. Network Protocols, Modeling, Optimization and Performance Evaluation -- Track Chairs -- PC Members -- 7. Data Security, Trust and Reputation -- Track Chairs -- PC Members -- 8. Web Science, Learning and Business Intelligence -- Track Chairs -- PC Members -- 9. Data Analytics for Learning and Virtual Organisations -- Track Chairs -- PC Members -- 10. Data Management and Information Retrieval -- Track Chairs -- PC Members -- 11. Massive Processing and Machine Learning on Large Data Sets -- Track Chairs -- PC Members -- 12. Data Modeling, Visualization and Representation Tools -- Track Chairs -- PC Members -- 13. IoT and Fog Computing -- Track Chairs -- PC Members -- 14. Mobile and Wireless Networks -- Track Chairs -- PC Members -- 15. Big Data Management and Scalable Storage Technologies -- Track Chairs -- PC Members -- 16. Energy-Aware and Green Computing Systems -- Track Chairs.
,
PC Members -- 17. Multimedia Networking and Medical Applications -- Track Chairs -- PC Members -- 18. Applied Cryptography and Cloud Security -- Track Chairs -- PC Members -- EIDWT-2018 Reviewers -- EIDWT-2018 Keynote Talks -- Smart Cities and Safe Cities by Situational Awareness and Computational Intelligence -- Cyber-Human Partnerships-Toward a Resilient Ecosystem in Smart Cities -- Contents -- Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage System -- 1 Introduction -- 2 CSMA/CA -- 3 Application of Fuzzy Logic for Control -- 3.1 FC -- 3.2 FC Rules -- 3.3 Control Knowledge Base -- 3.4 Defuzzification Methods -- 4 Implemented Testbed -- 4.1 FACS -- 4.2 Testbed Structure -- 4.3 CCM -- 4.4 Congestion Process Phases -- 5 Experimental Results -- 6 Conclusions -- References -- A Web-Based English Listening System for Learning Different Pronunciations in Various Countries -- Abstract -- 1 Introduction -- 2 Motivation -- 3 Proposed System -- 3.1 English Speech Database -- 3.2 A Function of Extracting Regions Based on Easiness in English Speech Hearing -- 4 Prototype System -- 4.1 A Function of Generating Cloze Tests -- 4.2 A Function of Calculating Correct Answer Rates -- 4.3 A Function of Calculating Correct Answer Rates for Regions -- 4.4 A Function of Balancing Number of Questions for Each Region -- 5 Experiment -- 6 Conclusion -- Acknowledgments -- References -- FOG Computing and Low Latency Context-Aware Health Monitoring in Smart Interconnected Environments -- 1 Background -- 2 Smart Environments -- 3 Latency -- 4 The FOG Health Monitoring Model -- 5 Communications and Networking -- 6 Illustrative Scenarios -- 7 Discussion and Concluding Observations -- References -- Application of Fuzzy Logic for Improving Human Sleeping Conditions in an Ambient Intelligence Testbed -- 1 Introduction -- 2 Ambient Intelligence (AmI).
,
3 Application of Fuzzy Logic for Control -- 3.1 FC -- 3.2 Linguistic Variables -- 3.3 FC Rules -- 3.4 Control Knowledge Base -- 3.5 Defuzzification Methods -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions -- References -- Performance Evaluation of WMN-PSOSA Considering Four Different Replacement Methods -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 PSO Algorithm -- 3.2 Simulated Annealing -- 3.3 WMN-PSOSA Hybrid Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input Parameters -- 1 Introduction -- 2 Scenarios of Collaborative Teamwork -- 2.1 Collaborative Teamwork and Virtual Campuses -- 2.2 Mobile Ad hoc Networks (MANETs) -- 3 Group Activity Awareness Model -- 4 Application of Fuzzy Logic for Control -- 4.1 FC -- 4.2 Linguistic Variables -- 4.3 FC Rules -- 4.4 Control Knowledge Base -- 4.5 Defuzzification Methods -- 5 Proposed Fuzzy-Based System for Peer Task Accomplishment -- 6 Simulation Results -- 7 Conclusions and Future Work -- References -- Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic Algorithm -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 Particle Swarm Optimization -- 3.2 Distributed Genetic Algorithm -- 3.3 WMN-PSODGA Hybrid Simulation System -- 3.4 WMN-PSODGA Web GUI Tool and Pseudo Code -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters -- 1 Introduction -- 2 IoT -- 2.1 IoT Architecture -- 2.2 IoT Protocols -- 3 Opportunistic Networks.
,
3.1 Opportunistic Networks Challenges -- 3.2 Opportunistic Networks Architectures -- 4 Proposed System -- 4.1 System Parameters -- 4.2 System Implementation -- 4.3 Description of FLC -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New Parameter -- 1 Introduction -- 2 WSAN -- 2.1 WSAN Challenges -- 2.2 WSAN Architecture -- 3 Proposed System Model -- 3.1 Problem Description -- 3.2 System Parameters -- 3.3 System Implementation -- 3.4 Description of FLC -- 4 Simulation Results -- 5 Conclusions and Future Work -- References -- Malicious Information Flow in P2PPS Systems -- 1 Introduction -- 2 Information Flow in the TBAC Model -- 2.1 TBAC Model -- 2.2 Information Flow Relations -- 3 Synchronization Protocols for Hidden Topics -- 4 Malicious Information Flow -- 5 Concluding Remarks -- References -- Eco Migration Algorithms of Processes with Virtual Machines in a Server Cluster -- 1 Introduction -- 2 System Model -- 3 Energy-Efficient Migration of Virtual Machines -- 3.1 Estimation Model -- 3.2 VM Selection (VMS) Algorithm -- 3.3 VM Migration (VMM) Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- Collision Avoidance for Omnidirectional Automated Transportation Robots Considering Entropy Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Omnidirectional Automated Transportation Robot -- 3.2 Kinematics -- 3.3 Control System of the Proposed Omnidirectional Automated Transportation Robot -- 3.4 Collision Avoidance Method Considering Position Entropy -- 4 Conclusions and Future Work -- References -- Performance Evaluation of an Active Learning System Using Smartphone: A Case Study for High Level Class -- Abstract -- 1 Introduction -- 2 Active Learning System with Interactive Lecture.
,
3 Flow of Group Discussion for High Level Class -- 4 Performance Evaluation of ALS for High Level Class -- 5 Conclusions -- References -- Performance Evaluation of an Enhanced Message Suppression Controller Considering Delayed Ack Using Different Road Traffic Conditions -- 1 Introduction -- 2 DTN -- 3 Delayed Ack for EMSC -- 3.1 Overview -- 3.2 Control Messages -- 3.3 Message Suppression Time -- 4 System Design -- 4.1 Simulation Scenario -- 4.2 Application Setting -- 5 Simulation Results -- 6 Conclusions -- References -- Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Objects and Transactions -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Improved EEQS (IEEQS) Algorithm -- 3.1 Quorum Selection -- 3.2 Meaningless Methods -- 3.3 Omitting Meaningless Methods -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Execution Time of Each Transaction -- 4.3 Average Number of Aborted Transaction Instances -- 4.4 Average Total Energy Consumption of a Server Cluster -- 5 Concluding Remarks -- References -- Improving Data Loss Prevention Using Classification -- Abstract -- 1 Introduction -- 2 The Proposal Method -- 3 The Classification Criteria -- 4 Implementation of the Specific Rights -- 5 Conclusion -- References -- Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient -- 1 Introduction -- 2 Related Work -- 2.1 Wavelet Neural Network -- 2.2 Bootstrap Algorithm -- 3 SIM-PB-Wavelet Model -- 3.1 Most Similar Interpolation Algorithm -- 3.2 Weight of Each Model -- 3.3 Training of the Wavelet Neural Network -- 4 Modeling and Methods -- 4.1 SIM-Wavelet Model -- 4.2 SIM-P-Wavelet Model -- 4.3 SIM-PB-Wavelet Model -- 5 Experiments -- 5.1 Data.
,
5.2 Results and Discussions.
Permalink