GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (63)
Document type
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Genetic engineering. ; Industrial microorganisms. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (290 pages)
    Edition: 1st ed.
    ISBN: 9781118433003
    DDC: 579/.163
    Language: English
    Note: Intro -- Title page -- Copyright page -- Contents -- Foreword -- Preface -- Contributors -- 1: Classical Strain Improvement -- 1.0 Introduction -- 1.1 The Approach Defined -- 1.2 Mutagenesis -- 1.2.1 Numerical Considerations in Screen Design -- 1.2.2 Random Genetic Drift -- 1.2.3 Forced Mutagenesis -- 1.2.4 Strain Mating -- 1.3 Genotypic Landscapes -- 1.4 Screening -- 1.4.1 Rational Screens -- 1.4.2 Random Screens -- 1.4.3 Screening Platforms -- 1.5 Conclusions -- References -- 2: Tracer-Based Analysis of Metabolic Flux Networks -- 2.0 Introduction -- 2.1 Setting Up a Stoichiometric Network Model -- 2.2 Small-Scale Models versus Genome Scale Models -- 2.3 Network Analysis: Maximum Theoretical Yield -- 2.4 (Stoichiometric) Metabolic Flux Analysis -- 2.5 Carrying Out a Labeling Experiment -- 2.6 MEASURING ISOTOPE LABELING PATTERNS -- 2.7 Tracer-Based MFA -- 2.8 Validating Metabolic Flux Networks -- 2.9 Conclusions -- Acknowledgments -- References -- 3: Integration of "Omics" Data with Genome-Scale Metabolic Models -- 3.0 Introduction -- 3.1 Genome-Scale Metabolic Networks -- 3.2 Constraint-Based Modeling Theory -- 3.3 Current Analysis of Omics Data -- 3.4 New Approaches to Developing Model Constraints -- 3.5 Use of Gene Expression Data in Metabolic Models -- 3.6 Use of Metabolomics Data in Metabolic Models: TMFA Example -- 3.7 Integration of Multiple Omics Data Sets -- 3.8 Future Directions and Applications to Strain Engineering -- References -- 4: Strain Improvement via Evolutionary Engineering -- 4.0 Introduction -- 4.1 Methodologies for Evolutionary Engineering -- 4.1.1 Adaptive Evolution -- 4.1.2 Genome Shuffling -- 4.1.3 Global Transcriptional Machinery Engineering -- 4.1.4 Transposon Insertion Mutagenesis -- 4.1.5 Multiplex Automated Genome Engineering -- 4.1.6 Tractable Multiplex Recombineering. , 4.1.7 Chemically Induced Chromosomal Evolution -- 4.1.8 Multiscale Analysis of Library Enrichment (SCALE) -- 4.1.9 Screening and Selection -- 4.2 Examples of Evolutionary Engineering -- 4.2.1 Enhancement of Product Yield and Productivity -- 4.2.2 Extension of Substrate Range -- 4.2.3 Improvement of Cellular Properties -- 4.3 Conclusions and Future Prospects -- Acknowledgments -- References -- 5: Rapid Fermentation Process Development and Optimization -- 5.0 Introduction -- 5.1 Overview of Classical Fermentation Process Development Methodology -- 5.1.1 Noninvasive Sensor Technologies -- 5.2 Fermentation Process Development and Optimization -- 5.2.1 Medium Design and Optimization -- 5.2.2 Optimization of Growth Conditions -- 5.3 Rapid Process Development and Optimization Using Conventional Fermentation System -- 5.3.1 Dynamic DO Control to Determine Optimal Feed Rate for Carbon Source-Limited Fermentation -- 5.3.2 Feed Forward Control for Carbon Source Excess Fermentation -- 5.4 Strain Evaluation and Process Optimization under Scale-Down Conditions -- 5.4.1 Identify Scale-Down Parameters -- 5.4.2 Scale-Down of Mixing Related Parameters -- 5.4.3 Oxygen Uptake Rate (OUR) Clipping -- 5.4.4 Dissolved CO2 -- 5.5 Control and Sensor Technologies for Minibioreactor -- 5.5.1 Temperature Sensing and Control -- 5.5.2 Mixing -- 5.5.3 DO -- 5.5.4 pH -- 5.5.5 Cell Concentration -- 5.5.6 Feeding -- 5.6 Commercial High-Throughput Fermentation Systems -- 5.6.1 Shaken Minibioreactors -- 5.6.2 Stirred Minibioreactor -- 5.6.3 Parallel Benchtop Fermentation System -- 5.7 Trends in Development of High the greata-Throughput Minibioreactor System -- 5.8 Case Studies of Fermentation Process Development and Optimization Using High-Throughput Minibioreactors -- 5.8.1 Case Study 1: Protein Production -- 5.8.2 Case Study 2: Antibody Fragment Expression. , 5.9 Conclusions and THE Path Forward -- References -- 6: The Clavulanic Acid Strain Improvement Program at DSM Anti-Infectives -- 6.0 Introduction -- 6.1 The Biosynthetic Pathway to Clavulanic Acid -- 6.2 The Strategy for Improvement of Multiple Complex Phenotypes -- 6.3 Results and Discussion -- 6.3.1 The Panlabs Years-Results from 1991 to 1999 -- 6.3.2 The DSM Years-Results from 1999 to 2006 -- 6.4 Future Perspectives -- Acknowledgments -- References -- 7: Metabolic Engineering of Recombinant E. coli for the Production of 3-Hydroxypropionate -- 7.0 Introduction to Biosynthesis of 3-Hydroxypropionic Acid -- 7.1 Organic Acid Toxicity -- 7.2 Understanding 3-HP Toxicity -- 7.2.1 Choosing an Approach for Evolving Tolerance -- 7.2.2 Selection Design for Evolving 3-HP Tolerance -- 7.2.3 Taking a Closer Look at Selection Design -- 7.2.4 Constructing the 3-HP Toleragenic Complex -- 7.3 Strain Design -- 7.3.1 Evaluation of the 3-HP-TGC -- 7.3.2 Complex Tolerant Phenotype: Metabolism of 3-HP to a Toxic Intermediate -- 7.4 Combining 3-HP Tolerance and 3-HP Production -- 7.5 Summary -- References -- 8: Complex System Engineering: A Case Study for an Unsequenced Microalga -- 8.0 Historical Perspective -- 8.1 Analysis of Algal Biomass Composition -- 8.1.1 Defining the Parameters of an "Ideal" Strain -- 8.1.2 Tool Development for the Analysis of Growth and Lipid Production -- 8.1.3 Selection and Characterization of a Promising C. vulgaris Strain -- 8.2 Development of Hypothesis-Driven Strain Improvement Strategies -- 8.2.1 Systems Biology Analysis in an Unsequenced Microalga -- 8.2.2 Transcriptome-to-Proteome Pipelining -- 8.2.3 Identification of Strain Engineering Targets -- 8.3 Implementation of Biological Tools I-Development of a Transformation System -- 8.3.1 Vector Construction -- 8.3.2 Protoplast Preparation and Transformation of C. vulgaris UTEX395. , 8.3.3 Stability Evaluation of Transformants -- 8.3.4 C. vulgaris Endogenous Promoter Identification and Characterization -- 8.4 Implementation of Biological Tools II-Development of a Self-Lysing, Oil-Producing Alga for Biofuels Production -- 8.4.1 Algal Lipid Extraction -- 8.4.2 Algal Cell Wall Complexity and Enzymatic Treatment Effects -- 8.4.3 High-Resolution Imaging of Enzymatic Treatment Effects -- 8.4.4 Production Strain Development -- 8.5 Concluding Remarks -- Acknowledgments -- References -- 9: Meiotic Recombination-Based Genome Shuffling of Saccharomyces cerevisiae and Schefferomyces stiptis for Increased Inhibitor Tolerance to Lignocellulosic Substrate Toxicity -- 9.0 Introduction -- 9.1 Methodology -- 9.1.1 Meiotic Recombination-Mediated Genome Shuffling -- 9.1.2 Inducing Genome Shuffling through Meiosis versus Protoplast Fusion -- 9.2 Results and Discussion of Strain Development -- 9.2.1 Generation of Mutant Pools -- 9.2.2 Screening and Selection of Mutant and Evolved Populations -- 9.2.3 Increasing HWSSL Tolerance through Genome Shuffling -- 9.2.4 Tolerance to HWSSL Leads to Increased Ethanol Production -- 9.2.5 Tolerance to HWSSL Leads to Cross-Tolerance to Multiple Inhibitors -- 9.2.6 Comparison between the S. stipitis and S. cerevisiae Genome Shuffling Studies -- 9.3 Conclusions and Future Directions -- References -- Index -- Supplemental Images.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Electronic data processing -- Distributed processing. ; Electronic books.
    Description / Table of Contents: This book examines leading research and developments in Internet technology, including contributions from academic researchers as well as industry experts discussing new paradigms in Software, Protocols, Supply Chain Management, Security and Cloud Computing.
    Type of Medium: Online Resource
    Pages: 1 online resource (83 pages)
    Edition: 1st ed.
    ISBN: 9783642354618
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.203
    Language: English
    Note: Title Page -- Preface -- Contents -- Enhanced Mobile Ad hoc Routing Protocol Using Cross Layer Design in Wireless Sensor Networks -- Introduction -- Theory -- IEEE 802.15.4 Standard -- Ad hoc On-Demand Distance Vector (AODV) Protocol -- Cross Layer Design -- Propose Energy Weigh - AODV Protocol -- The Simulation -- Result and Performance Analysis -- Conclusion -- References -- Decision Support in Supply Chain Management for Disaster Relief in Somalia -- Introduction -- The Importance of Disaster Management -- Somalia as a Case Study -- Literature Review -- Problem Variants -- Existing Solutions -- Preemptive Multiobjective Programming -- Research Methodology -- Preemptive Optimization -- Data Gathering -- Results and Findings -- Conclusion and Future Work -- References -- Challenges in Cloud Environment -- System Quality Attributes -- Portability -- Recoverability -- Maintainability -- Transparency and Control -- Security -- OS Support -- RHEL Migration on AWS Cloud - An Experience -- Amazon as-is Architecture -- Migration from DevPay to Hourly on Demand -- Infrastructure as Code -- Recommendations -- Manageability -- Configurability -- Maintainability -- Portability -- Conclusion -- Challenges on Amazon Cloud in Load Balancing, Performance Testing and Upgrading -- Hosting a Web Application on Cloud -- Issues with Traditional Infrastructure -- Typical Web Application Topology -- Web Application on AWS -- Components Used -- Learning and Recommendations -- Load Balancers -- Auto Discovery of EC2 Nodes -- Performance Testing Environment -- Application Setup -- Load Generation Strategy -- Measurable Parameters -- Test Results -- Observations -- Recommendation -- Learning -- Conclusion -- A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment -- Introduction -- Objectives -- Resource Manager -- Related Work. , Rule Based Resource Manager -- Experimental Evaluation -- Conclusion -- References -- Browser Based IDE to Code in the Cloud -- Introduction -- Cloud Computing -- Integrated Development Environment -- Browser Based Integrated Development Environment -- Real Time Collaboration -- Forums -- Technical Blogs -- Existing Browser Based Coding Environment -- Cloud9 IDE -- CodeRun Studio [7] -- Eclipse Orion [8] -- Ideone -- eXo Cloud IDE -- Proposed System -- Design -- Real Time Collaboration -- Integrated Forum -- Technical Blogs -- Conclusion -- Zero Knowledge Password Authentication Protocol -- Introduction -- Motivation -- Contribution -- Organization of Paper -- Notations and Definitions -- Notations -- Definitions -- Relevance to Prior Work -- Cryptographic Primitives -- The Proposed Security Protocol : Zero Knowledge Password Authentication Protocol (ZK-PAP) -- ZK-PAP with PKE -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Engineering-Data processing. ; Electronic books.
    Description / Table of Contents: This book details recent research on soft computing techniques in vision science. It presents basic research extending to visual perception and visual system, cognitive psychology and psychophysics.
    Type of Medium: Online Resource
    Pages: 1 online resource (208 pages)
    Edition: 1st ed.
    ISBN: 9783319046938
    Series Statement: Studies in Computational Intelligence Series ; v.543
    DDC: 620.00285
    Language: English
    Note: Intro -- Contents -- 1 Machine Vision Solutions in Automotive Industry -- Abstract -- 1…Introduction -- 2…Machine Vision -- 2.1 Basics of Machine Vision System -- 2.2 Camera, Lens and Illumination -- 2.2.1 Camera -- 2.2.2 Lens -- 2.2.3 Illumination -- 2.2.4 3-D Imaging System -- 2.3 Software -- 2.4 Interface to Production Environment -- 2.5 Interface to Management Information System -- 3…Applications -- 3.1 Application: Inspection of Spline Gear -- 3.2 Application: Inspection and Control of Flywheel Press System -- 4…Other Applications -- 5…Conclusions -- References -- 2 Kinect Quality Enhancement for Triangular Mesh Reconstruction with a Medical Image Application -- Abstract -- 1…Introduction -- 2…Methods -- 2.1 System Overview -- 2.2 A Background and the Characteristics of Microsoft Kinect -- 3…A Comprehensive Kinect Calibration Method -- 3.1 Calibration of RGB/Depth Camera -- 3.2 Calibration of Depth Sensor -- 3.3 Mapping Between RGB and Depth Image -- 4…The Tri-States Segmentation -- 5…Triangular Mesh Reconstruction -- 5.1 Average Filter -- 5.2 Marching Cubes Algorithm -- 5.3 Area Calculation -- 6…Experimental Result -- 7…Conclusion -- References -- 3 A Matlab GUI Package for Comparing Data Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 2.1 k-Means -- 2.2 Fuzzy c-Means -- 2.3 Hierarchical Clustering -- 2.4 Multiobjective Clustering with Support Vector Machine -- 3…Cluster Validity Index -- 3.1 Internal Validity Index -- 3.1.1 J Index -- 3.1.2 Davis-Bouldin Index -- 3.1.3 Dunn Index -- 3.1.4 Xie-Beni Index -- 3.1.5 I Index -- 3.1.6 Silhouette Index -- 3.2 External Validity Index -- 3.2.1 Minkowski Index -- 3.2.2 Adjusted Rand Index -- 3.2.3 Percentage of Correctly Classified Pairs -- 4…Demonstration of Cluster Package -- 4.1 Initial Window -- 4.2 k-Means Window -- 4.3 Fuzzy c-Means Window. , 4.4 Hierarchical Clustering Window -- 4.5 MocSvm Clustering -- 4.6 Report Table i.e. Result window -- 4.7 All Cluster Running Window -- 5…Conclusion -- References -- 4 Multi Objective Line Symmetry Based Evolutionary Clustering Approach -- Abstract -- 1…Introduction -- 2…Proposed Symmetry Based Distances -- 3…Multiple Randomized Kd Trees Based Nearest Neighbor Search -- 4…Multi Objective Line Symmetry Based Genetic Clustering Approach -- 4.1 Chromosome Representation -- 4.2 Fitness Computation -- 4.3 Genetic Operators -- 4.3.1 Selection -- 4.3.2 Crossover -- 4.3.3 Mutation -- 4.4 Termination Criterion -- 5…Data Sets and Experimental Results -- 5.1 Artificial Data Sets -- 5.2 Real Data Sets -- 6…Conclusion -- References -- 5 An Efficient Method for Contrast Enhancement of Digital Mammographic Images -- Abstract -- 1…Introduction -- 2…MIAS Database -- 3…Proposed Method -- 4…Simulation Results and Discussions -- 5…Conclusions -- References -- 6 Simulation of Obstacle Detection and Speed Control for Autonomous Robotic Vehicle -- Abstract -- 1…Introduction -- 2…Obstacle Detection and Avoidance -- 2.1 Image Processing Based Obstacle Detection -- 2.1.1 Stereo Vision -- 2.1.2 Monocular Vision -- 2.2 Proposed Method for Obstacle Avoidance -- 2.3 Digital Image Processing -- 2.3.1 Basic Relationships Between Pixels -- 2.3.2 Neighbours of a Pixel -- 2.3.3 Connectivity Between Pixels -- 2.3.4 Adjacency Between Pixels -- 2.3.5 Region -- 2.4 Algorithm for Obstacle Detection -- 2.4.1 Thresholding and Region Growing based Image Segmentation -- 3…Pid Controller Based Speed Control of PMDC Motor -- 3.1 PID Controller Overview -- 3.1.1 Proportional -- 3.1.2 Integral -- 3.1.3 Differential (Derivative) -- 3.2 Motor Parameters -- 3.3 Experimental Calculation of Motor Parameters -- 3.3.1 Electric Resistance and Inductance of Armature -- 3.3.2 Electromotive Force Constant. , 3.3.3 Moment of Inertia -- 3.3.4 Damping Ratio of the Mechanical System -- 3.4 PMDC Motor Equations -- 3.5 Tuning of Discrete PID Controller -- 3.5.1 Simulation Result -- 3.5.2 Computed Parameters -- 4…Matlab Simulink Based Image Processing for Obstacle Detection -- 4.1 MATLAB Simulink Model -- 4.1.1 RGB to Gray-Scale Conversion -- 4.1.2 Thresholding -- 4.2 Simulation Results -- 5…Results -- 5.1 PID Controller Module -- 5.2 Video Processing Module -- 6…Conclusion -- References -- 7 A Review of Global Path Planning Algorithms for Planar Navigation of Autonomous Underwater Robots -- Abstract -- 1…Introduction -- 2…Global Path Planning Algorithms -- 2.1 Breadth First Search (BFS) Algorithm -- 2.2 Depth First Search (DFS) Algorithm -- 2.3 A* Algorithm -- 2.4 Dijkstra's Algorithm -- 2.5 Wall Following Algorithm -- 3…Results and Discussion -- 3.1 Path Planning Through Randomly Located Obstacles -- 3.2 Maze Solving: A Comparison -- 3.3 Maze Solving by Wall Following Algorithm -- 3.4 Breadth First Search (BFS) and Depth First Search (DFS): A Comparison -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 8 Pseudo-Fractional Tap-Length Learning Based Applied Soft Computing for Structure Adaptation of LMS in High Noise Environment -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Existing Algorithms for Dynamic Tap-Length Selection -- 3.1 The Fractional Variable Tap-Length Learning Algorithm -- 4…The VT-VSLMS Algorithm -- 5…Dynamic Tap-Length Optimization -- 6…Proposed Pseudo-Fractional Tap-Length Optimization -- 7…Simulation Setup -- 8…Results and Discussion -- 9…Conclusion -- References -- 9 Medical Image Analysis Using Soft Computing Techniques -- Abstract -- 1…Introduction -- 2…Image Database -- 3…Methodology -- 3.1 Algorithms for Brain Image Segmentation -- 3.2 Algorithms for Retinal Image Classification. , 4…Experimental Results and Discussions -- 4.1 Result Analysis of Brain Image Segmentation -- 4.2 Result Analysis of Retinal Image Classification -- 5…Conclusion -- Acknowledgments -- References -- 10 Selection of Robotic Grippers Under MCDM Environment: An Optimized Trade Off Technique -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Problem Formulation -- 4…MCDM Methodologies -- 4.1 Analytic Hierarchy Process -- 4.2 TOPSIS -- 4.3 VIKOR -- 5…Solution Using AHP -- 6…Solution Using TOPSIS Methodology -- 7…Solution Using VIKOR Methodology -- 8…Conclusion -- References -- 11 Numerical Study of Viscous Flow in the Hydraulic System of Electro Optical Tracking System -- Abstract -- 1…Introduction -- 1.1 Description of the Hydraulic Systems -- 1.1.1 Oil Reservoir -- 1.1.2 Gear Pump -- 1.1.3 Manifold Block -- 1.1.4 Valves -- 1.1.5 Hydraulic Rotary Actuators -- 1.1.6 Electrical Panel -- 1.2 Selection of Fluid -- 2…Problem Formulation -- 2.1 Mathematical Modeling of Flow -- 2.2 Finite Difference Method for Solving the EOTS Pipeline Axial Flow -- 2.3 Problem Solving -- 3…Numerical Results and Analysis -- 3.1 Axial Velocity Distribution of EOTS Pipeline Axial Flow Field -- 3.2 Relationship Curve Between Axial Velocity and Cross Sectional Length of EOTS Pipeline Flow -- 3.3 Relationship Curve Between Wall Shear Stress and Cross Sectional Width and Height -- 3.4 Computation of f Re -- 4…Conclusion -- Acknowledgments -- A.x(118). Appendix: A -- A.x(118). Appendix: B -- References -- 12 Comparison of Edge Detection Algorithm for Part Identification in a Vision Guided Robotic Assembly System -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Structure -- 4…Edge Detection -- 4.1 Sobel Operator -- 4.2 Robert's Cross Operator -- 4.3 Prewitt's Operator -- 4.4 Laplacian of Gaussian Operator -- 4.5 Canny's Edge Detection Algorithm. , 5…Region Growing Algorithm -- 6…Shape Descriptor -- 7…Results and Discussion -- 7.1 Result of Canny's Operator -- 7.2 Result of LOG Operator -- 7.3 Result of Prewitt Operator -- 7.4 Result of Sobel Operator -- 7.5 Result of Roberts Operator -- 7.6 Comparision of Results -- 8…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Soft computing. ; Computer vision. ; Electronic books.
    Description / Table of Contents: Covering the latest research on soft computing techniques in the emerging field of vision science, this publication features contributions from leading experts and covers a range of topics including frequent pattern mining and 4D stereo camera systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (221 pages)
    Edition: 1st ed.
    ISBN: 9783642255076
    Series Statement: Studies in Computational Intelligence Series ; v.395
    DDC: 006.37
    Language: English
    Note: Title Page -- Foreword -- Preface -- Editorial -- Contents -- Genetic Algorithm Based Fuzzy Frequent Pattern Mining from Gene Expression Data -- Introduction -- Goal of the Paper -- Proposed Model -- Paper Layout -- Related Work -- Preliminaries -- Apriori Algorithm -- FP-Growth Algorithm -- Fuzzy FP-Growth Tree -- Genetic Algorithm -- Experimental Evaluation -- Conclusion and Future Work -- References -- Prediction of Protein Tertiary Structure Using Genetic Algorithm -- Introduction -- Related Work -- Proposed Scheme -- Protein Conformation Representation -- Energy Function -- The Algorithm -- Experiments and Results -- Conclusion and Future Work -- References -- Hybrid Image Mining Methods to Classify the Abnormality in Complete Field Image Mammograms Based on Normal Regions -- Introduction -- Full-Field Mammogram Analysis -- Mammogram Database -- Enhancement Based on H Representation -- Regional Feature Extraction -- A Cascading Classifier for Identifying Normal Regions -- Full-Field Analysis Using Overlapped Regions -- Results -- Conclusion -- References -- Handwritten Script Recognition Using DCT, Gabor Filter and Wavelet Features at Line Level -- Introduction -- Method Description -- Data Collection and Preprocessing -- Feature Extraction -- Script Recognition -- Experimental Results -- Conclusion -- References -- Character Recognition Using 2D View and Support Vector Machine -- Introduction -- Character Recognition System -- Image Acquisition -- Preprocessing -- Segmentation -- Feature Extraction -- Classification and Recognition Using Support Vector Machine -- Experimental Result -- Conclusion -- References -- Automatic Localization of Pupil Using Histogram Thresholding and Region Based Mask Filter -- Introduction -- Proposed Method -- Algorithm -- Experimental Results -- Conclusion and Future Work -- References. , A Comparative Analysis on Edge Detection of Colloid Cyst: A Medical Imaging Approach -- Introduction -- Review of Previous Work -- Edge Detection Operators -- Sobel Operator -- Robert's Cross Operator -- Prewitt's Operator -- Laplacian of Gaussian -- Canny's Edge Detection Algorithm -- Performance of Edge Detection Algorithms -- Morphological Analysis -- Implementation of the Method -- Analysis-1 -- Analysis 2 -- Results -- References -- Automatic Localization and Segmentation of Left Ventricle from Short Axis Cine MR Images: An Image Driven Method -- Introduction -- Materials -- Methodology -- Automatic Cropping -- LV Segmentation -- Level Set Method -- Implementation Details -- Experimental Results -- Conclusion -- References -- Performance Analysis of Neural Network and ANFIS in Brain MR Image Classification -- Introduction -- Medical Image Classification -- Block Diagram of the System -- Transformation of Image to Data Form -- Principal Component Analysis -- Adaptive Neuro Fuzzy Inference System -- Neuro Fuzzy Model -- ANFIS Architecture -- Learning Algorithm of ANFIS -- ANFIS Classifier -- Results -- Conclusion -- References -- Hybrid Algorithm Using Fuzzy C-Means and Local Binary Patterns for Image Indexing and Retrieval -- Introduction -- Motivation -- Related Work -- Main Contribution -- Fuzzy C-Means Algorithms -- Local Binary Patterns -- Proposed System Framework (FLBP) -- Similarity Measurement -- Experimental Results and Discussions -- Database DB1 -- Database DB2 -- Conclusions -- References -- Artificial Neural Network (ANN) Based Object Recognition Using Multiple Feature Sets -- Introduction -- Some of the Relevant Works -- System Model -- Input and Pre-processing -- Feature Extraction -- Artificial Neural Network (ANN) -- Experiential Results and Discussion -- Conclusion -- References. , Protein Structure Prediction Using Multiple Artificial Neural Network Classifier -- Introduction -- Basic Biological Concept -- Necessities of PSSP -- Basics of Artificial Neural Network -- Methodology -- System Model -- Results -- Conclusions -- References -- An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection -- Introduction -- Literature Survey -- Intelligent Agent Based Approach -- System Architecture -- Feature Selection Agent -- Fuzzy Rough Set Based Outlier Detection -- Fuzzy Rough Set Based Outlier Detection Algorithm -- Decision Manager -- Fuzzy Rough Set Based SVM (FRSVM) -- Results and Discussion -- Conclusion -- References -- Application of Ant Colony Algorithm for Classification and Rule Generation of Data -- Introduction -- Social Insects and Real Ant Colonies -- Ant Colony Optimization -- Ant-Miner.ACO Algorithm for Data Mining -- General Description of Ant-Miner -- Heuristic Function -- Rule Pruning -- Pheromone Updating -- Computational Results -- Dataset -- Test Setup -- Test Results -- Conclusion an Future Work -- References -- Immunised Navigational Controller for Mobile Robot Navigation -- Introduction -- Background -- The Primary and Secondary Response of the Immune System -- Antibodies -- Antibody-Antigen Binding -- Artifical Immune System for Robots -- System Architecture -- Immune Network Formulation -- Selection of Antibodies and Antigens -- Paratope and Idiotope Matrices -- Results and Discussion -- Reinforcement Learning -- Conclusion -- References -- Modified A* Algorithm for Mobile Robot Path Planning -- Introduction -- Related Works -- Proposed Approach -- Assumptions -- Algorithm of Path Planning -- Results and Discussions -- Case I: Obstacle Free Environment -- Case II: Obstacle Avoidance -- Conclusion -- References. , Artificial Immune System Based Path Planning of Mobile Robot -- Introduction -- Biological Immune System -- Concept of Immune System -- Idiotopic Network -- Path Planning Algorithm -- Defining Antibody and Antigen -- Mutual Action of Among Antibodies -- Mobile Robot Path Planning Algorithm Based on AIN -- The Proposed GA -- GA Operators -- Demonstrations -- Collision Free Movements in a Cluttered Environment -- Collision Free Movements in a Simple Environment -- Comparison between the Different Types of Fuzzy Controllers and Neuro-Fuzzy Controller -- Conclusion and Future Works -- References -- Facial Feature Extraction Using a 4D Stereo Camera System -- Introduction -- Face Acquisition -- The 4D Camera System and the Dimensional Imaging Software -- Obj File Format -- Facial Feature Extraction -- Detection of 'Tip of the Nose' -- Detection of the Point Where Nose Meets the Forehead -- Detection of Near Corners of the Two Eyes -- Results -- Future Work -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2011-05-13
    Description: Author(s): Paul S. Hsu, George R. Welch, James R. Gord, and Anil K. Patnaik We investigate theoretically and experimentally the propagation dynamics of a nonlinear cross-talk effect between two probe channels in a double-ladder system and show that an interplay between χ^{(1)} and χ^{(3)} processes leads to the control of cross-talk. We derive analytical solutions to desc... [Phys. Rev. A 83, 053819] Published Thu May 12, 2011
    Keywords: Quantum optics, physics of lasers, nonlinear optics, classical optics
    Print ISSN: 1050-2947
    Electronic ISSN: 1094-1622
    Topics: Physics
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...