GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 11
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Electronic data processing--Distributed processing. ; Electronic books.
    Beschreibung / Inhaltsverzeichnis: Event-based distributed systems are playing an increasingly important role in a broad range of application domains. This book presents a thorough review of reasoning in event-based distributed systems. It also contains new research and extensive references.
    Materialart: Online-Ressource
    Seiten: 1 online resource (317 pages)
    Ausgabe: 1st ed.
    ISBN: 9783642197246
    Serie: Studies in Computational Intelligence Series ; v.347
    Sprache: Englisch
    Anmerkung: Title -- Preface -- Contents -- Introduction to Reasoning in Event-Based Distributed Systems -- Event-Based Distributed Systems -- Reasoning in Event-Based Distributed Systems -- Overview of the Book -- Concluding Remarks -- References -- Distributed Architectures for Event-Based Systems -- Introduction and Motivation -- Background -- Event-Driven Distributed System Architectures -- Complex Events Detection -- Classes of Event-Driven Distributed Architectures -- Event-Driven SOA -- Event-Driven Collaboration -- Event-Driven Grids -- P2P Systems -- Agent Systems -- Conclusions and Future Work -- References -- A CEP Babelfish: Languages for Complex Event Processing and Querying Surveyed -- Introduction -- Terminology -- Identification of Language Styles -- Composition Operators -- General Idea -- Sensor Network Use Case -- Summary -- Data Stream Query Languages -- General Idea -- Sensor Network Use Case -- Summary -- Production Rules -- General Idea -- Sensor Network Use Case -- Summary -- Timed State Machines -- General Idea -- Sensor Network Use Case -- Summary -- Logic Languages -- General Idea -- Sensor Network Use Case -- Summary -- Application Areas of the Language Styles -- Combination of Different Language Styles -- Conclusion -- References -- Two Semantics for CEP, no Double Talk: Complex Event Relational Algebra (CERA) and Its Application to XChange^EQ -- Introduction -- CEP Examples -- CERA: An Operational Semantics for Event Query Languages -- Purpose and Desiderata -- CERA: Complex Event Relational Algebra -- Translation into CERA -- Incremental Evaluation -- A Declarative Semantics for Event Query La -- Purpose, Necessity and Desiderata -- Model Theory and Fixpoint Theory -- Two Semantics, no Double Talk -- Conclusion and Outlook -- References -- ETALIS: Rule-Based Reasoning in Event Processing -- Introduction -- Problem Statement. , Syntax -- Declarative Semantics -- Operational Semantics -- Event Consumption Policies -- Consumption Policies Defined on Time Points -- Consumption Policies Defined on Time Intervals -- Implementation and Experimental Results -- Related Work -- Conclusions and Future Work -- References -- GINSENG Data Processing Framework -- Introduction and Motivation -- System Architecture -- Core Components -- Core Technology -- Data Processing Framework -- Business Rules Engine -- BRM and Publish/Subscribe -- BRE and ESP -- Domain Specific Languages for Rule Definitions -- Performance Control in Data Processing Framework -- Performance Monitoring Infrastructure -- Performance and Data Quality Algebra -- Performance Improvement -- Related Work -- Middleware Technology -- Publish/Subscribe Communication -- Event Stream Processing -- Business Rules Engines -- Summary -- References -- Security Policy and Information Sharing in Distributed Event-Based Systems -- Introduction -- Integrating Access Control into Event-Based Systems -- Event Type Specification and Ownership in a Single Domain -- Event Communication: Advertise, Publish and Subscribe -- Role-Based Access Control -- OASIS Role-Based Access Control -- Access Control Policy for Publish/Subscribe Clients -- Multi-domain Security Architecture -- Management of Event Names, Types and Policies -- Inter-domain Communication Control -- End-to-End Security with Information Flow Control -- Distributed Information Flow Control -- Event Security with DIFC -- Enforcing OASIS Security with DIFC -- Reasoning about Event Security -- Policy-Based Reasoning -- Event Security Reasoning with DIFC Labels -- Conclusions -- References -- Generalization of Events and Rules to Support Advanced Applications -- Introduction -- Alternative Actions -- Event Generalization -- Interval-Based Semantics -- Generalization of Events. , Potentialvs.ActualEvents -- Event Detection Modes -- Binary Event Operator Semantics -- Ternary Event Operator Semantics -- ECAA Rule Specification -- Event Detection Graph Extensions -- Extended Event Detection Graph -- Distributed Event Processing and Reasoning -- Distributed Event Processing -- Reasoning -- Conclusions -- References -- Pattern Detection in Extremely Resource-Constrained Devices -- Introduction -- Objectives, Motivation and Contributions -- Review ofWork in Pattern Detection inWSAN Data -- Spacecraft and Telemetry Data -- Environmental Pattern Detection -- Spatial Structure Pattern Detection -- Data Centre Monitoring and Context-Aware Computing -- Network Monitoring and Intrusion Detection -- Symbolic and Stochastic Pattern Detection -- Temporal Pattern Detection Using a Symbolic Representation -- Spatial Pattern Detection and Source Location Estimation -- Conclusions -- References -- Smart Patient Care -- Introduction -- Contributions -- Chapter Outline -- The Technology -- Oracle Database -- Other Technologies -- Architecture -- Implementation -- Event Triggering -- Rules Evaluation -- Rules Customization -- Rules Composability -- Data Mining Integration -- Alternatives -- State ofWork -- Conclusions and Future Work -- References -- The Principle of Immanence in Event-Based Distributed Systems -- Introduction -- The Principle of Immanence -- Immanence on the Web -- Background -- Virtual Collaborative Environments on GRID -- VO Management Models -- GRID and MAS Convergence -- Discussion -- About AGORA -- AGORA Conceptual Model -- Persistent Core Services -- Four Interaction Mechanisms -- Experimentation on AGORA -- Conclusion -- References -- Context-Based Event Processing Systems -- Introduction: Context in Event Processing Modeling -- Temporal Context -- Fixed Temporal Interval -- Event Interval -- Sliding Fixed Interval. , Sliding Event Interval -- Spatial Context -- Fixed Location -- Entity Distance Location -- Event Distance Location -- Segmentation Oriented Context -- State-Oriented Context -- Context Composition -- Context Realization within Current Event Processing Products -- Stream Base StreamSQL -- Oracle EPL -- RuleCore Reakt -- Sybase Aleri -Coral8 and CCL -- IBM Websphere Business Events -- Conclusion -- References -- Event Processing over Uncertain Data -- Introduction -- Preliminaries -- Event Processing -- Uncertainty Management Mechanisms -- Taxonomy of Event Uncertainty -- Dimensions of Event Uncertainty -- Causes of Event Uncertainty -- Handling Uncertainty at the Source -- Probability Theory-Based Representation -- Fuzzy Set Theory-Based Representation -- Handling Inference Uncertainty -- Event Inferencing Using Probability Theory -- Event Inferencing Using Fuzzy Set Theory -- Algorithms for Uncertain Inferencing -- Inference Example -- Conclusions -- References -- Index.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Swarm intelligence. ; Electronic books.
    Beschreibung / Inhaltsverzeichnis: This book covers the combination of technologies which enables the transformation of everyday objects into smart objects, creating a paradigm that connects the real world with the digital world. Discusses progress made thus far, and emerging innovations.
    Materialart: Online-Ressource
    Seiten: 1 online resource (444 pages)
    Ausgabe: 1st ed.
    ISBN: 9783642350160
    Serie: Studies in Computational Intelligence Series ; v.495
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgments -- Contents -- Contributors -- 1 Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks -- Abstract -- 1…Introduction -- 1.1 Internet of Things Challenges -- 2…Artificial Intelligence for Intelligent Sensing -- 3…Social Networks and the Internet of Intelligent Things -- 4…Pervasive Intelligent Robots -- 4.1 IoT and Urban Technologies -- 4.2 IoT Platforms for Home Automation/Ambient Intelligence -- 4.3 Smart Devices -- 5…Intelligent Large Scale Sensing -- 5.1 People-Centric Sensing -- 5.2 Ubiquitous Sensing -- 5.3 Location-Aware Sensing -- 5.4 OpportunisticOpportunistic Sensing and Participatory Sensing -- 5.5 Contextual Sensing -- 5.6 Machine Learning for Large-Scale Sensing -- 5.7 Sensing Architectures -- 6…The Cloud and the Internet of Intelligent Things -- 6.1 Wireless Sensor Networks Backend Infrastructures -- 6.2 Wireless Sensor Networks and Health Care -- 6.3 Machine-to-Machine (M2M) CommunicationsMachine-to-Machine Communications in the Cloud -- 6.4 Cloud Robotics -- 7…Conclusions -- References -- 2 Cloud Computing: Paradigms and Technologies -- Abstract -- 1…Introduction -- 2…Anatomy of Cloud Computing -- 2.1 Definition -- 2.2 Characteristics -- 2.3 Affects -- 2.4 Architecture -- 2.5 Technologies behind Cloud Computing -- 2.6 Advantages of the Use of Cloud Technology -- 3…Classifying Clouds and Vendors -- 3.1 Deployment Models -- 3.2 Service Models -- 3.2.1 Infrastructure-as-a-Service -- 3.2.2 Platform-as-a-Service -- 3.2.3 Software-as-a-Service -- 3.2.4 Data-as-a-Service -- 3.3 Cloud Vendors -- 4…Cloud Computing Aspects -- 4.1 Cost and Pricing -- 4.2 Service Level Agreement -- 4.3 Security -- 5…Cloud Computing and Distributed Computing Paradigms -- 5.1 Utility Computing Utility Computing Versus Cloud Computing. , 5.2 Volunteer Computing Volunteer Computing Versus Cloud Computing -- 5.3 Grid Computing Grid Computing Versus Cloud Computing -- 6…The Road Ahead -- 6.1 Lessons Learned in Cloud Adoption -- 6.2 Challenges and Future Research Directions -- 7…Conclusion -- References -- 3 A Comparison of Two Different Approaches to Cloud Monitoring -- Abstract -- 1…Introduction -- 2…Monitoring IaaS Cloud!IaaS Clouds -- 3…Related Work -- 4…Cloud Experience in European Research Projects -- 4.1 VISION VISIONCloud -- 4.2 mOSAIC -- 5…Monitoring in the VISION VISIONCloud platform -- 5.1 Overall Architecture and Requirements -- 5.2 Monitoring Architecture -- 5.3 Implementation Details -- 5.4 Event and Rulemonitoring!rules Format -- 6…Cloud AgencyCloud Agency -- 6.1 Monitoring Architecture -- 6.2 MeteringCloud Agency!metering the Cloud -- 6.3 Monitoring the Cloud -- 6.4 Implementation Details -- 7…Critical Analysis -- 8…Conclusion -- Acknowledgments -- References -- 4 Intuitive User Interfaces to Help Boost Adoption of Internet-of-Things and Internet-of-Content Services for All Disaster Management -- Abstract -- 1…Introduction -- 2…The Technology Supply Quest -- 3…Accessibility Matters: Opening Service Access to All -- 4…Setting up a Solution -- 4.1 The IOTC4ALL Service Model -- 4.2 Enhancing Services Components to Enrich Their Accessibility -- 4.3 The IOTC4ALL Marketplace -- 4.4 Smart Devices UI -- 4.4.1 Intelligent and Adaptive HCI -- 4.4.2 Ubiquitous Computing and Ambient Intelligence -- 4.4.3 From Unimodal to Multimodal Interfaces -- 4.4.4 Smart Devices Today -- 5…Conclusions and Future Work -- References -- 5 Intelligent Context: The Realization of Decision Support Under Uncertainty -- Abstract -- 1…Introduction -- 2…The Complexity of Context -- 3…Intelligent Context ProcessingContext!Intelligent context processing -- 3.1 The Context-Processing Algorithm. , 3.2 The Extended Context Processing AlgorithmContext!Extended context processing algorithm -- 3.2.1 Implementation -- 4…The Distribution Function -- 4.1 The Design of the Distribution Function -- 4.2 The Decision Boundary Proximity Issue -- 4.3 Partitioning and the Euclidean Distance Adjustment Analysis -- 4.3.1 An Analysis -- 4.4 Analysis Conclusions and Observations -- 5…Context Processing under UncertaintyContext!Uncertainty -- 6…Results and Discussion -- 6.1 Situational AwarenessContext!Situational awareness -- 7…Concluding Observations -- References -- 6 Autonomous Evolution of Access to Information in Institutional Decision-Support Systems Using Agent and Semantic Web Technologies -- Abstract -- 1…Introduction -- 2…Agent-Oriented Semantic Access -- 2.1 The generic system -- 2.2 The Legacy RDB System -- 2.3 The Semantic Query Access System -- 2.4 Decomposition of SQAS Use Cases -- 3…The SQAS Architecture -- 3.1 The High-Level Architecture of SQAS -- 3.2 The Roles of User Interface Agent -- 3.3 The Roles of Database Interface Agent -- 4…Agent-Oriented Middleware for Server Subsystems -- 4.1 The Database Interface Environment -- 4.2 A Note on Implementation Strategy -- 4.3 A Scenario for Agent-Assisted Ontology Development -- 5…Agent-Oriented Middleware for Client Subsystems -- 5.1 The User Interface Environment -- 5.2 A Scenario for Agent-Assisted Semantic Access -- 6…Closing Remarks -- 7…Conclusions -- References -- 7 A Research Survey on Large XML Data: Streaming, Selectivity Estimation and Parallelism -- Abstract -- 1…Introduction -- 1.1 Preliminaries -- 2…Selectivity Estimation -- 2.1 Properties of Selectivity Estimation Techniques -- 2.2 Path/Twig Selectivity Estimation Techniques -- 2.2.1 Synopsis-Based Estimation Techniques -- 2.2.2 Histogram-Based Estimation Techniques -- 3…Stream-Processing Approaches -- 3.1 Stream-Filtering Algorithms. , 3.2 Stream-Querying Algorithms -- 4…Parallel Query Processing -- 4.1 General Research on Decidability and Complexity -- 4.2 Data Distribution -- 4.3 Distribution and Parallel XPath Query Processing -- 4.4 Low-Level Implementation Techniques -- 4.5 DBMS and Join-Based Implementations -- 4.6 Map-Reduce, Hadoop Implementations -- 5…Conclusion -- References -- 8 Techniques and Applications to Analyze Mobility Data -- Abstract -- 1…Introduction -- 2…Collectingtrace collection Inter-cooperative Mobilitymobility Data -- 2.1 The HaggleHaggle Project -- 2.2 CRAWDADCRAWDAD -- 2.3 Socialsocial Tracer and HYCCUPS -- 2.3.1 Socialsocial Tracer -- 2.3.2 HYCCUPS -- 2.4 Benefits and Limitations -- 3…Techniques for Data Analysisdata analysis -- 3.1 Contact Timescontact time Distribution and Time of Day Dependence -- 3.2 Contact Predictabilitypredictability -- 3.3 Predictabilitypredictability of Interacting with Wirelesswireless Access Pointsaccess point -- 4…Experimental Results -- 4.1 Contact Timescontact time Distribution and Time of Day Dependence -- 4.1.1 UPB 2011 -- 4.1.2 UPB 2012 -- 4.2 Contact Predictabilitypredictability -- 4.3 Predictabilitypredictability of Interacting with Wireless Access Pointsaccess point -- 4.3.1 Rice -- 4.3.2 Nodobo -- 5…Conclusions and Future Work -- References -- 9 Memory Support Through Pervasive and Mobile Systems -- Abstract -- 1…Introduction -- 1.1 Evolution of Memory Prosthetics Devices -- 2…Context Aware Systems -- 3…Application Contextualization in Memory Support Systems -- 3.1 The Introduction of Time Context -- 3.2 The Introduction of Location Context -- 3.3 Web IntegrationWeb Integration -- 3.4 Integration of Time and Location ContextIntegration of Time and Location Context -- 3.5 Toward a New Generation of Memory Prosthetic DevicesMemory Prosthetic Devices -- 4…The Architecture of Our System -- 4.1 Server Side. , 4.1.1 A Three Tier ArchitectureThree Tier Architecture -- 4.1.2 Reasoning Engine -- 4.2 Client Side -- 5…ExperimentsExperiments and Users' FeedbacksUsers' Feedbacks -- 6…Ontology Management and Enrichment -- 7…Conclusions -- References -- 10 Viable Service Business Models Towards Inter-cooperative Strategies: Conceptual Evolutionary Considerations -- Abstract -- 1…Chronological Development of S-D Logic Model -- 2…The Role of Intangibility-Heterogeneity-Inseparability-Perishability Framework in the Separation of G-D and S-D Logics -- 2.1 IHIP Characteristics and Its Critics -- 2.2 Implications for the Definition of Services -- 3…Service Science Perspectives: Service-Dominant versus Goods-Dominant logic -- 3.1 Resource-Based Definition of Service Logic -- 3.2 S-D Logic and General Theory -- 4…Case Studies of Empirical Applications of S-D Logic -- 4.1 S-D Logic, Branding and Networks -- 4.2 S-D Logic and Discontinuous Innovations -- 4.3 S-D Logic and Co-Produced Knowledge -- 4.4 S-D Logic and Social Construction TheoriesSocial Construction Theories -- 4.5 S-D Logic and Logistics Service ValueLogistics Service Value -- 4.6 S-D Logic and ProcurementProcurement -- 4.7 S-D Logic and Service Experience -- 4.8 S-D Logic and Competitive AdvantageCompetitive Advantage -- 4.9 Cloud ComputingCloud computing as an Illustrative Example of S-D Logic -- 5…Conclusions and Future Work -- References -- 11 Discovering the Hidden Semantics in Enterprise Resource Planning Data Through Formal Concept Analysis -- Abstract -- 1…Introduction -- 1.1 Enterprise Resource Planning Systems -- 1.2 Rationale -- 2…Overview of Analysis -- 2.1 Data Preparation -- 2.2 Analysing Transactional ActivityAnalysis!Transactional Activity -- 2.3 Analysing Transactional Activity with DescriptionsAnalysis!Transactional Activity with Descriptions. , 2.4 Analysing Transactional Activity with Multiple AttributesAnalysis!Multiple Attributes.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Schlagwort(e): Information networks-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1396 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030150327
    Serie: Advances in Intelligent Systems and Computing Series ; v.926
    DDC: 004.6
    Sprache: Englisch
    Anmerkung: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops' Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec14 -- Sec15 -- 2. Next Generation Wireless Networks -- Sec17 -- Sec18 -- 3. Multimedia Systems and Applications -- Sec20 -- Sec21 -- 4. Pervasive and Ubiquitous Computing -- Sec23 -- Sec24 -- 5. Internet Computing and E-Learning -- Sec26 -- Sec27 -- 6. Distributed Systems Database and Data Mining -- Sec29 -- Sec30 -- 7. Grid, P2P, and Scalable Computing -- Sec32 -- Sec33 -- 8. Agents, Semantics and Intelligent Computing -- Sec35 -- Sec36 -- 9. Cloud, Data Centers, and Services Computing -- Sec38 -- Sec39 -- 10. Internet of Things and Social Networking -- Sec41 -- Sec42 -- 11. Security, Privacy, and Trust Computing -- Sec44 -- Sec45 -- 12. Cognitive and Neural Computing with Application -- Sec47 -- Sec48 -- AINA-2019 Reviewers -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications Markus Aleksy ABB AG Corporate Research Center, Ladenburg, Germany -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search Naohiro Hayashibara Kyoto Sangyo University, Kyoto, Japan -- Contents -- Electricity Load Forecasting in Smart Grids Using Support Vector Machine -- 1 Introduction -- 2 Contributions -- 3 System Model -- 3.1 Preprocessing Data. , 3.2 Training and Forecasting of Data -- 3.3 Proposed Model -- 4 Simulations -- 4.1 Feature Selection Using XGBoost and DTC -- 4.2 Load Forecasting -- 4.3 Performance Evaluation -- 5 Conclusions and Future Work -- References -- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Proposed Scheme -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 5 Optimization Techniques -- 5.1 FPA -- 5.2 Jaya Algorithm -- 5.3 User Comfort Maximization -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- Towards Efficient Energy Management in a Smart Home Using Updated Population -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 System Model -- 5 Optimization Algorithms -- 5.1 GWO -- 5.2 Jaya Algorithm -- 5.3 Updated Population -- 6 Pseudo Code of the Proposed Scheme -- 7 Simulation and Reasoning -- 8 Conclusion -- References -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Appliances Classification -- 4.2 Price Tariff -- 5 Meta-heuristic Algorithms -- 5.1 CSA -- 5.2 GWO -- 5.3 MUHS -- 6 Simulation and Reasoning -- 7 Conclusion -- References -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Scheduling Techniques -- 5.1 Bat Algorithm (BA) -- 5.2 Jaya Algorithm. , 5.3 Candidate Solution Updation Algorithm (CSUA) -- 6 Simulation Results and Reasoning -- 7 Conclusion -- References -- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 CSA -- 5.2 Jaya -- 5.3 BCS -- 6 Simulation Results and Discussion -- 6.1 RTP Tariff -- 7 Conclusion -- References -- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 RESs Uncertainty Model -- 3.1 Wind Generator Power Model -- 3.2 Solar Photovoltaic Power Model -- 3.3 Hydro Generation Power Model -- 4 Objective Function -- 5 Algorithms -- 6 Application and Results -- 7 Conclusion -- References -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- 1 Introduction -- 2 System Model -- 2.1 P2PPSO Model -- 2.2 Information Flow -- 3 Protocols to Prevent Illegal Information Flow -- 3.1 TOBSCO Protocol -- 3.2 ETOBSCO (Efficient TOBSCO) Protocol -- 4 Evaluation -- 5 Concluding Remarks -- References -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses -- Abstract -- 1 Introduction -- 2 Optimal Power Flow -- 3 Intelligent Algorithms -- 3.1 Particle Swarm Optimization (PSO) Algorithm -- 3.2 Imperialist Competitive Algorithm (ICA) -- 4 FACTS Devices -- 5 Simulation Results -- 6 Conclusions -- References -- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model -- 1 Introduction -- 2 System Model -- 2.1 Tree Structure of Fog Nodes -- 2.2 Energy Consumption of Fog Nodes -- 3 A Modified Fault-Tolerant Tree-Based Fog Computing (MFTBFC) Model -- 4 Evaluation -- 5 Concluding Remarks. , References -- Energy-Efficient Group Migration of Virtual Machines in a Cluster -- 1 Introduction -- 2 System Model -- 3 Estimation of Energy Consumption -- 4 A Dynamic Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic -- 1 Introduction -- 2 VANETs -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusions -- References -- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 A Terminal Access Data Anomaly Detection Model Based on Random Forest for Power User Electric Energy Data Acquisition System -- 3.1 The Framework of Access Data Anomaly Detection -- 3.2 Feature Extraction -- 3.3 Random Forest Basics -- 4 Performance Evaluation -- 4.1 Introduction to the Dataset -- 4.2 Model Selection Method -- 4.3 Model Evaluation Indexes -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Multi-level Authentication Protocols Using Scientific Expertise Approach -- Abstract -- 1 Introduction -- 2 Multi-level Authentication Based on Expert Knowledge -- 3 Security Features of Multi-level Protocols -- 4 Conclusions -- Acknowledgments -- References -- Biometric-Based Linguistic Solutions for Data Encryption and Sharing -- Abstract -- 1 Introduction -- 2 New Classes of Biometric-Based Threshold Schemes -- 3 Example of Application of Biometric-Based Threshold Schemes -- 4 Conclusions -- Acknowledgments -- References -- Dependability Analysis for On-Demand Computing Based Transaction Processing System -- 1 Introduction -- 2 Model Description -- 2.1 The Exponential Model of Goel and Okumoto -- 2.2 Delayed S-shaped Model -- 2.3 Inflected S-shaped Model -- 2.4 Weibull Model -- 2.5 Jump Diffusion Modeling. , 3 Parameter Estimation -- 3.1 Method of Maximum-Likelihood -- 3.2 Estimation of the Jump Diffusion Parameters -- 4 Dependability Assessment Measures -- 4.1 Reliability in Transaction Processing System -- 4.2 Performability -- 5 Optimal Maintenance Problem -- References -- A Comparative Analysis of Trust Requirements in Decentralized Identity Management -- 1 Introduction -- 2 Related Work -- 3 Analysing Trust in Identity Management -- 3.1 The Notion of Trust -- 3.2 Trust Domains and Requirements -- 3.3 Objective and Evaluation Methodology -- 4 Trust Requirements in Decentralized Identity Management -- 4.1 Decentralization Characteristics -- 4.2 Decentralized Identity Management Based on Blockchain -- 4.3 Decentralized Identity Management Patterns -- 4.4 Comparison to Trust Requirements in Traditional Models -- 5 Conclusion -- References -- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Outlier Detection in Wireless Sensor Networks -- 4 Data Reduction Techniques -- 4.1 Kernel Fisher Discriminant Analysis Technique (KFDA) -- 4.2 Support Vectors Machine Technique (SVM) -- 5 Experimental Results -- 6 Conclusion -- References -- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 The IEEQS-EMM Algorithm -- 3.1 Quorum Selection -- 3.2 IEEQS-EMM Algorithm -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 4.4 Average Number of Aborted Transaction Instances -- 5 Concluding Remarks -- References. , A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (902 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319690964
    Serie: Advances in Intelligent Systems and Computing Series ; v.686
    DDC: 006.3 23
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- Autonomous Systems -- Prediction of Rolling Force Based on a Fusion of Extreme Learning Machine and Self Learning Model of Rolling Force -- Abstract -- 1 Introduction -- 2 ELM Algorithm -- 3 Rolling Force Mathematical Model -- 4 Rolling Force Model Self Learning of Finishing Mill -- 5 Forecasting Experiment and Result Based on Rolling Force of ELM -- 6 Conclusion -- References -- User Behavior Profiles Establishment in Electric Power Industry -- Abstract -- 1 Introduction -- 2 Related Work -- 3 User Label System of Electric Power Industry -- 3.1 Behavior Label -- 3.2 Behavior Description Label -- 3.3 Behavior Prediction and User Classification Label -- 4 Label Generation Technique -- 4.1 Label Generation Technique Based on Clustering Algorithm -- 5 Experiment and Analysis -- 5.1 Generate the Behavior Label -- 5.2 Generate the Behavior Description Label -- 5.3 Generate the Behavior Prediction Label and User Classification Label -- 6 Conclusion -- References -- The Optimal Pan for Baking Brownie -- Abstract -- 1 Introduction -- 2 The Distribution of Heat for Pan -- 2.1 Finite Element Analysis -- 2.2 Edge Cutting Model -- 3 Conclusion -- Acknowledgements -- References -- Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- Abstract -- 1 Introduction -- 2 Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- 2.1 Merchant Ship Maneuvering Motion Equation -- 2.2 Merchant Ship Intelligent Steering Control -- 2.3 Acquisition of Collision Avoidance Elements -- 3 Application -- 3.1 Simulation Object and Conditions Setting -- 3.2 Simulation Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- Dynamical Analysis of Fractional-Order Hyper-chaotic System -- Abstract. , 1 Introduction -- 2 Related Work -- 2.1 Fractional-Order Hyper-chaotic Complex System -- 2.2 Dynamic Behavior Analysis of the System -- 2.2.1 System Equilibrium Point -- 2.2.2 The Influence of System Order Variation on the System -- 2.2.3 The Influence of System Parameter Change on the System -- 3 Conclusion -- References -- Evaluating the Performance of the Logistics Parks: A State-of-the-Art Review -- Abstract -- 1 Introduction -- 2 Review on the Evaluation Index System -- 2.1 Establishment of the Evaluation Index System -- 2.2 Discussion on the Evaluation Index System -- 3 Review on the Evaluation Models -- 3.1 Analysis on the Evaluation Models -- 3.2 Discussion on the Evaluation Models -- 4 Conclusions -- Acknowledgements -- References -- A Tabu Search Algorithm for Loading Containers on Double-Stack Cars -- Abstract -- 1 Introduction -- 2 Problem Description -- 2.1 Background Information -- 2.2 Optimization Strategy -- 3 Tabu Search Algorithm for the Container Loading Problem -- 3.1 Introduction to the Algorithm -- 3.2 Tabu Search Algorithm Design -- 4 Numerical Cases -- 5 Conclusions -- Acknowledgements -- References -- Optimization Model Under Grouping Batch for Prefabricated Components Production Cost -- Abstract -- 1 Introduction -- 2 Problem Description and Variables Defining -- 2.1 Problem Description -- 2.2 Variables Defining -- 3 Model Establishing -- 4 Application Instance and Comparative Analysis -- 4.1 Application Instance -- 4.2 Comparative Analysis -- 5 Conclusion -- Acknowledgements -- References -- Air Quality Evaluation System Based on Stacked Auto-Encoder -- Abstract -- 1 Introduction -- 2 The Methods -- 2.1 Introduction to Traditional Method -- 2.2 AQES-SAE System -- 3 The Experiments -- 3.1 Classification with Improved K-means Algorithm -- 3.2 Identification with the SAE Model -- 4 The Results -- 4.1 Clustering Analysis. , 4.2 Superiority of the AQES-SAE System -- 5 Summary -- References -- Pattern Recognition and Vision Systems -- Urban-Rural Difference of the Coupling Between Social-Economic Development and Landscape Pattern in Chengdu Plain -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Study Area and Data Source -- 2.2 Coupling Model -- 3 Results -- 3.1 Urban-Rural Differences in Landscape Pattern -- 3.2 Urban-Rural Coupling Differences Between the Landscape Pattern and the Social-economic Development -- Acknowledgments -- References -- A New Model and Algorithm for Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 New Model of Clustering -- 2.2 Compact Homogenizing of Class -- 2.2.1 The Establishment of Similar Graph Matrix -- 2.2.2 The Establishment of Compact Homogenizing Between Class -- 2.3 Size Similarity Between Class -- 2.4 Cluster Model -- 3 Algorithm -- References -- Gibbs Phenomenon for Bi-orthogonal Wavelets -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Gibbs Phenomenon of Biorthogonal Wavelet Expansion -- 4 Conclusion -- Acknowledgments -- References -- {{\varvec \upalpha}} -Convergence Theory -- Abstract -- 1 Introduction -- 2 {{\varvec \upalpha}} -Adherence Dots and {{\varvec \upalpha}} -Accumulation Dots -- 3 {{\varvec \upalpha}} -Convergence of Nets -- 4 {{\varvec \upalpha}} -Convergence of Ideals -- 5 {{\varvec \upalpha}} -Convergence of Filters -- 6 Relations Among Nets, Ideals, Filters -- 7 Applications of {{\varvec \upalpha}} -Convergence Theory of Nets -- References -- Feature Selection Optimization Based on Atomic Set and Genetic Algorithm in Software Product Line -- Abstract -- 1 Introduction -- 2 Basic Concept -- 2.1 Feature Models -- 2.2 Atomic Sets -- 3 Atomic Sets Computation -- 4 Genetic Algorithm for Feature Selection Optimization -- 4.1 Initial Population -- 4.2 Fitness Function. , 4.3 Crossover Operation -- 4.4 Selection Operation -- 4.5 Mutation Operation -- 4.6 The Flow Diagram of Genetic Algorithm -- 5 Experiment and Analysis -- 5.1 Test Model -- 5.2 Experiment Result and Analysis -- 5.2.1 The Simulation Results of Atomic Set -- 5.2.2 The Simulation Results of Genetic Algorithm -- 6 Related Work -- 7 Conclusion -- Acknowledgments -- References -- Product Configuration based on Feature Model -- Abstract -- 1 Introduction -- 2 Configuration Architecture Model -- 3 Feature Modeling -- 3.1 Feature Diagram -- 3.1.1 Basic Feature Diagram -- 3.1.2 Cardinality-Based Feature Diagram -- 3.2 Constraints -- 3.2.1 Boolean Constraints -- 3.2.2 Non-Boolean Constraints -- 4 Automated Support -- 4.1 SAT -- 4.2 BDD -- 4.3 CSP -- 5 Feature Selection -- 5.1 Non-collaborative Configuration -- 5.2 Collaborative Configuration -- 6 Conclusion -- Acknowledgments -- References -- Research on Fast Browsing for Massive Image -- Abstract -- 1 Introduction -- 2 Distributed Computing and Image Pyramid -- 2.1 Distributed Computing -- 2.2 MapReduce -- 2.3 Image Pyramid -- 3 MapReduce Model for Massive Image -- 3.1 Data Blocking Prepared for MapReduce -- 3.2 MapReduce Image Model -- 4 Experiment -- 4.1 Experimental Data and Equipment -- 4.2 Experimental Result -- Acknowledgments -- References -- RVM for Recognition of QRS Complexes in Electrocardiogram -- Abstract -- 1 Introduction -- 2 RVM Classifier -- 3 QRS Detection -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- Acknowledgments -- The Architecture of the RFID-Based Intelligent Parking System -- Abstract -- 1 Introduction -- 2 The Research Status of the Intelligent Parking System -- 3 The Overall Configuration of the System -- 3.1 The Basic Flow of the Intelligent Parking System -- 3.1.1 The Parking Process of the Vehicle with Legal e-tag. , 3.1.2 The Parking Process of the Vehicle Without Legal e-tag -- 3.1.3 The Parking Process of the Vehicle Without Enough Electronic Balance -- 3.2 The Design of the Intelligent Parking Management System -- 3.3 The Basic Requirements for the Intelligent Parking System -- 4 Summary -- References -- A Review of Cognitive Psychology Applied in Robotics -- Abstract -- 1 Introduction -- 2 Robot Affective Computing and Interaction -- 2.1 Emotion Recognition -- 2.2 Affective Modeling -- 2.3 Emotion Expression -- 3 Application of Robot Cognition -- 3.1 Robot Autism Intervention -- 3.2 Robot Education -- 3.3 Household and Nursing Robot -- 4 Conclusion and Prospect -- Acknowledgments -- References -- Robot Vision Navigation Based on Improved ORB Algorithm -- Abstract -- 1 Introduction -- 2 Improved ORB Algorithm -- 2.1 Extreme Points in Scale Space Detection -- 2.2 Extract Stable Feature Points -- 3 Visual Navigation Method -- 4 Experimental Results -- 5 Conclusion -- References -- An Improved Multi-label Relief Feature Selection Algorithm for Unbalanced Datasets -- Abstract -- 1 Introduction -- 2 ReliefF Algorithm -- 3 UBML-ReliefF Algorithm -- 4 Experiment -- 4.1 Datasets -- 4.2 Performance Evaluation Index -- 4.3 Experiment and Results Analysis -- 5 Conclusion -- Acknowledgements -- References -- Area Topic Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Area-LDA Topic Model -- 3.1 Overall Design of Area-LDA -- 3.2 Process of Estimator -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiment Settings -- 4.3 Experimental Restuls -- 5 Conclusions -- References -- Predicting Popularity of Topic Based on Similarity Relation and Co-occurrence Relation -- Abstract -- 1 Introduction -- 2 The SCW Method for Prediction of Topic Popularity -- 2.1 Definition -- 2.2 The Description of Topic Popularity -- 2.3 The Analysis of Similarity Relation. , 2.4 The Analysis of Co-occurrence Relation.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Swarm intelligence. ; Electronic books.
    Beschreibung / Inhaltsverzeichnis: This book discusses the theories, practices and concepts of utilising inter-operable and inter-cooperative next generation computational technologies. Coverage includes mobile and the emerging e-infrastructures of Web 2.0, SOA, P2P, Grids and Clouds.
    Materialart: Online-Ressource
    Seiten: 1 online resource (475 pages)
    Ausgabe: 1st ed.
    ISBN: 9783642349522
    Serie: Studies in Computational Intelligence Series
    DDC: 006
    Sprache: Englisch
    Anmerkung: Title -- Foreword -- Preface -- Acknowledgements -- Contents -- The Web of Things - Challenges and Enabling Technologies -- The Web - An Application Platform for Real-World Things -- Towards the Web of Things -- Technologies Driving the Web of Things -- Web of Things Architecture -- Integrating Things on the Web -- Frameworks for the Web of Things -- Building 'Web of Things Applications -- The AJAX Technique -- Mashups - Composing Things on the Web -- Event Driven Approach -- Case Studies of Ambient Spaces -- Ambient Classrooms -- Ambient Meter -- Research Directions -- Conclusion -- References -- Context-Aware Environments for the Internet of Things -- Introduction to Internet of Things Infrastructure and Services -- Context Aware Internet of Things Infrastructure -- Situational Awareness -- Other Representation Approaches -- Architectural Issues -- CAPIM Infrastructure -- CAPIM Context Model -- Use Case -- Future Trends and Research Directions in Internet of Things Infrastructure and Services -- Conclusions and Remarks -- References -- Service Interoperability in the Internet of Things -- Introduction -- Background -- An Interoperability Framework -- Assessing Current Interoperability Technologies -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Rethinking Interoperability -- An IoT Case Study Scenario -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Assessing the New Approach -- Contrasting SIL and Related Technologies -- Implementation -- Migration Path -- Conclusions and Future Work -- References -- The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments -- Introduction -- Classification of Ad Hoc Networks -- Mobile Ad Hoc Networks (MANETs) -- Vehicular Ad Hoc Networks (VANETs). , Wireless Sensor Networks (WSNs) -- Radio Frequency Identification (RFID) -- Near Field Communications (NFC) -- Routing Protocols for the IoT -- Towards an IoT Smart Environment -- The "thereuGO" Case Scenario -- A "thereuGO" IoT Model Architecture -- Conclusions -- References -- Challenges in Efficient Realtime Mobile Sharing -- Heterogeneous Networks -- IP Networks -- Wireless Sensor and Actuator Networks -- Multimedia Sessions -- Session Control -- Multimedia Session Mobility -- Multimedia Session Mobility versus MobileIP -- Federated Service Platforms -- Functionalities -- Mobility Management -- Pervasive Service Platforms -- Service Concept -- Session Concept -- Mobility -- Sharing of Content and Context -- Research Challenges and Progress -- Mobility and Sharing in Heterogeneous Networks -- Mobility and Sharing of WSANs -- Mobility and Sharing of Multimedia Sessions -- Service Platforms -- Pervasive Service Platforms -- Conclusion -- References -- Malware Detection and Prevention in RFID Systems -- Introduction -- SQL Injection Attacks -- Malware in RFID Systems -- Differences in Web Based and RFID SQLIA -- Related Work -- Policy Based RFID Malware Detection and Prevention -- Approach Overview -- Static Analysis -- Runtime Monitoring -- Query Structure Creation and Comparison -- Query Tokenization -- Query Structure Policy Generation -- Runtime Query Matching -- Security Evaluations -- RFID Tag Data Cleaning -- Query Structure Matching -- Conclusions and Future Work -- References -- Conceptual Model of Business Services Availability vs. Interoperability on Collaborative IoT-enabled eBusiness Platforms -- Introduction -- Contemporary Concepts, Architectures and Technologies to Support Effective IoT-enabled Business Services Delivery -- Enabling High Services Availability on SDP. , Hypothetical Model to Increase Service Availability on Distributed SDPs -- Numerical Patterns of the Model -- Literature Case Studies - Business Services Availability in the Collaborative Mobile Environment -- Conclusions -- References -- Organizational Control Reconfigurations for a Robust Smart Power Grid -- Introduction -- Dynamic I/O Binding Reconfigurations -- Application Scenarios -- Dynamic Load-Balancing of Power Lines -- Dynamic Switching of Power Flow -- Dynamic Allocation of Operating Reserves -- Dynamic Restoration After Blackout -- Discussion -- Conclusions and Future Work -- References -- Homesick L\'{e}vy Walk and Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters -- Introduction -- Existing Mobility Models and Homesick L´evy Walk -- Random Walk -- Random Waypoint -- L´evy Flight and L´evy Walk -- Homesick L´evy Walk -- Routing Protocols in Delay Tolerant Networks -- Epidemic Routing -- Spray and Wait -- PRoPHET -- MaxProp -- Optimal Forwarding Criterion for Utility-Based Routing under Sequential Encounters -- Optimal Stopping Theory -- Proposed Routing Method -- Performance Evaluation -- Evaluation Measures -- Simulation Setup -- Simulation Results -- Conclusion -- Open Issues -- References -- Hybrid Cloud Architecture for VANET Simulations -- Introduction -- The Internet of Things and Cloud Computing -- Simulation of Ubiquitous Networks Over Cloud: Topicality in the IoT Paradigm -- VANET Networks: Characteristics and Scalability Issues -- Scalability of Simulations -- Cloud Computing: Elasticity Model -- Design of Scalable Cloud Architectures -- Elasticity and Scalability -- VANET Simulations Over Cloud -- Learning Phase -- Proposed Architecture -- Overview of the Cloud Infrastructure -- Public Cloud Platform with Amazon EC2 -- Scheduling Algorithms -- Performance Analysis. , Effectiveness of the Scheduling Algorithm -- Scheduling Algorithm Optimization - Resource Usage -- Scheduling Algorithm Optimization - Memory Usage -- Conclusions -- References -- Constructing Large Scale CooperativeMulti-Agent Systems from Semantic P2PNetworks -- Introduction -- Large Scale Multi Agent System Architecture Based on Semantic P2P Network -- Formal Definitions -- Theorems Related to VIRGO -- Construction and Maintenance of VIRGO Agent -- Formal Definition of Large Scale Cooperative Multi-Agent Systems Based on Semantic P2P Networks -- Distributed Action for Large Scale Cooperative Multi-Agent Systems -- Case Applications -- Simulation of Social Society Based on Semantic P2P Network -- Semantic P2P Network for e-Business -- Conclusion -- References -- An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks -- Introduction -- Related Work -- General Searching Schemes in P2P Networks -- Secure Searching Schemes in P2P Networks -- Privacy-Preserving Searching Schemes in P2PNetworks -- The Secure and Privacy-Aware Searching Protocol -- The Network Environment -- The Proposed Search Protocol -- Privacy-Preservation in Searching -- Performance Metrics for the Proposed Protocol -- Performance Evaluation of the Proposed Protocol -- Conclusion -- References -- The Tailored Fabric of Intelligent Environments -- Introduction -- State of the Art -- Internet of Things -- Intelligent Environments -- TheWorldView -- Enabling Technology for IoT and IE convergence -- Middleware -- Agents, Applications and Virtual Appliances -- Case Study: The Essex iSpace -- FollowMe -- HotSpot -- Conclusions and Future Challenges -- References -- Generalized World Entities as an Unifying IoT Framework: A Case for the GENIUS Project -- Introduction -- The GWE Paradigm -- General Context -- A First Example. , The GENIUS' Procedures Implementing the GWE Paradigm -- Identification and Low-Level Description of the GWEs -- Conceptual Representation of the World -- Full Recognition and Categorization of the GWEs -- Reasoning Based on the Full Recognition of an Existing Situation -- An "Assisted Living" Real-Life Scenario -- Conclusion -- References -- Plugging Text Processing and Mining in a Cloud Computing Framework -- Introduction -- Cloud Computing -- Service Delivery Models -- Deployment Models -- Information Retrieval and Text Mining -- Information Retrieval -- Albanian Language Processing and Stemming -- Apache Hadoop -- General Framework -- Analysis, Design and Implementation of the Plugin -- Analysis -- Design and Implementation -- Running the Plugin in the Hadoop Cluster -- Evaluation -- Experimental Setting and Cluster Creation -- Dataset -- Evaluation Setting and Experimental Results -- Analysis and Interpretation of Results -- Conclusion and Future Work -- References -- A Recommendation System for Browsing of Multimedia Collections in the Internet of Things -- Introduction -- Related Work -- System Overview -- The Recommendation Model -- Modelling the Context -- The Recommendation Process -- System Customization in the Cultural Heritage Domain -- Preliminary Experimental Results -- User Satisfaction -- Conclusions and Future Work -- References -- From Patient Information Services to Patient Guidance Services-The iCare Approach -- Introduction -- Semantic Interoperability for e-Health -- Healthcare System Integration issues and State of the Art -- Current State-of-the-Art in Integration with Personal Care Devices -- Current State-of-the-Art in Security and Privacy of Citizen Context and Electronic Health Records (EHRs) -- Semantic Web Technologies -- Semantic Web Services -- The iCare PGS Model -- The iCare PGS Semantic Service Platform. , PGS and Data Collection as Interoperability Components.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    San Diego :Elsevier Science & Technology,
    Schlagwort(e): Machine learning. ; Medical informatics. ; Artificial intelligence-Medical applications. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (460 pages)
    Ausgabe: 1st ed.
    ISBN: 9780128217818
    Serie: Intelligent Data-Centric Systems Series
    DDC: 610.28563
    Sprache: Englisch
    Anmerkung: Intro -- Machine Learning, Big Data, and IoT for Medical Informatics -- Copyright -- Contents -- Contributors -- Preface -- Outline of the book and chapter synopses -- Special acknowledgments -- Chapter 1: Predictive analytics and machine learning for medical informatics: A survey of tasks and techniques -- 1. Introduction: Predictive analytics for medical informatics -- 1.1. Overview: Goals of machine learning -- 1.2. Current state of practice -- 1.3. Key task definitions -- 1.3.1. Diagnosis -- 1.3.2. Predictive analytics -- 1.3.3. Therapy recommendation -- 1.3.4. Automation of treatment -- 1.3.5. Other tasks in integrative medicine -- 1.4. Open research problems -- 1.4.1. Learning for classification and regression -- 1.4.2. Learning to act: Control and planning -- 1.4.3. Toward greater autonomy: Active learning and self-supervision -- 2. Background -- 2.1. Diagnosis -- 2.1.1. Diagnostic classification and regression tasks -- 2.1.2. Diagnostic policy-learning tasks -- 2.1.3. Active, transfer, and self-supervised learning -- 2.2. Predictive analytics -- 2.2.1. Prediction by classification and regression -- 2.2.2. Learning to predict from reinforcements and by supervision -- 2.2.3. Transfer learning in prediction -- 2.3. Therapy recommendation -- 2.3.1. Supervised therapy recommender systems -- 2.4. Automation of treatment -- 2.4.1. Classification and regression-based tasks -- 2.4.2. RL for automation -- 2.4.3. Active learning in automation -- 2.5. Integrating medical informatics and health informatics -- 2.5.1. Classification and regression tasks in HMI -- 2.5.2. Reinforcement learning for HMI -- 2.5.3. Self-supervised, transfer, and active learning in HMI -- 3. Techniques for machine learning -- 3.1. Supervised, unsupervised, and semisupervised learning -- 3.1.1. Shallow -- 3.1.2. Deep -- 3.2. Reinforcement learning -- 3.2.1. Traditional. , 3.2.2. Deep RL -- 3.3. Self-supervised, transfer, and active learning -- 3.3.1. Traditional -- 3.3.2. Deep -- 4. Applications -- 4.1. Test beds for diagnosis and prognosis -- 4.1.1. New test beds -- 4.2. Test beds for therapy recommendation and automation -- 4.2.1. Prescriptions -- 4.2.2. Surgery -- 5. Experimental results -- 5.1. Test bed -- 5.2. Results and discussion -- 6. Conclusion: Machine learning for computational medicine -- 6.1. Frontiers: Preclinical, translational, and clinical -- 6.2. Toward the future: Learning and medical automation -- References -- Chapter 2: Geolocation-aware IoT and cloud-fog-based solutions for healthcare -- 1. Introduction -- 2. Related work -- 2.1. Health monitoring system with cloud computing -- 2.2. Health monitoring system with fog computing -- 2.3. Health monitoring system with cloud-fog computing -- 3. Proposed framework -- 3.1. Health data analysis -- 3.2. Geospatial analysis for medical facility -- 3.2.1. Overlay analysis to obtain nearest medical facilities -- 3.2.2. Shortest path to reach nearest medical centers -- 3.3. Delay and power consumption calculation -- 4. Performance evaluation -- 5. Conclusion and future work -- References -- Chapter 3: Machine learning vulnerability in medical imaging -- 1. Introduction -- 2. Computer vision -- 3. Adversarial computer vision -- 4. Methods to produce adversarial examples -- 5. Adversarial attacks -- 6. Adversarial defensive methods -- 7. Adversarial computer vision in medical imaging -- 8. Adversarial examples: How to generate? -- 9. Conclusion -- Acknowledgment -- References -- Chapter 4: Skull stripping and tumor detection using 3D U-Net -- 1. Introduction -- 1.1. Previous work -- 2. Overview of U-net architecture -- 2.1. 3D U-net -- 2.1.1. Batch normalization -- 2.1.2. Activation function -- 2.1.3. Pooling -- 2.1.4. Padding -- 2.1.5. Optimizer. , 3. Materials and methods -- 3.1. Dataset -- 3.2. Implementation -- 4. Results -- 4.1. Experimental result -- 4.1.1. Dice coefficient -- 4.1.2. Accuracy -- 4.1.3. Intersection over Union (IoU) -- 4.2. Quantitative result -- 4.3. Qualitative result -- 5. Conclusion -- References -- Chapter 5: Cross color dominant deep autoencoder for quality enhancement of laparoscopic video: A hybrid deep learning an -- 1. Introduction -- 2. Range-domain filtering -- 3. Cross color dominant deep autoencoder (C2D2A) leveraging color spareness and saliency -- 3.1. Evolution of DCM through C2D2A -- 3.2. Inclusion of DCM into principal flow of bilateral filtering -- 4. Experimental results -- 5. Conclusion -- Acknowledgments -- References -- Chapter 6: Estimating the respiratory rate from ECG and PPG using machine learning techniques -- 1. Introduction -- 1.1. Motivation -- 1.2. Background -- 2. Related work -- 3. Methods -- 3.1. Data -- 3.2. Steps -- 3.3. RR signal extraction -- 3.4. Machine learning -- 4. Experimental results -- 5. Discussion and conclusion -- Acknowledgments -- References -- Chapter 7: Machine learning-enabled Internet of Things for medical informatics -- 1. Introduction -- 1.1. Healthcare Internet of Things -- 1.1.1. H-IoT architecture -- 1.1.2. Three-tier H-IoT architecture -- 2. Applications and challenges of H-IoT -- 2.1. Applications of H-IoT -- 2.1.1. Fitness tracking -- 2.1.2. Neurological disorders -- 2.1.3. Cardio vascular disorders -- 2.1.4. Ambient-assisted living -- 2.2. Challenges of H-IoT system -- 2.2.1. QoS improvement -- 2.2.2. Scalability challenges -- 3. Machine learning -- 3.1. Machine learning advancements at the application level of H-IoT -- 3.2. Machine learning advancements at network level of H-IoT -- 4. Future research directions -- 4.1. Novel applications of ML in H-IoT -- 4.1.1. Real-time monitoring and treatment. , 4.1.2. Training for professionals -- 4.1.3. Advanced prosthetics -- 4.2. Research opportunities in network management -- 4.2.1. Channel access -- 4.2.2. Dynamic data management -- 4.2.3. Fully autonomous operation -- 4.2.4. Security -- 5. Conclusion -- References -- Chapter 8: Edge detection-based segmentation for detecting skin lesions -- 1. Introduction -- 2. Previous works -- 3. Materials and methods -- 3.1. Elitist-Jaya algorithm -- 3.2. Otsus method -- 4. Proposed method -- 4.1. Image preprocessing -- 4.2. Edge detection -- 5. Experiment and results -- 5.1. Dataset -- 5.2. Evaluation metrics -- 5.3. Results and discussion -- 5.4. Statistical analysis -- 6. Conclusion -- References -- Chapter 9: A review of deep learning approaches in glove-based gesture classification -- 1. Introduction -- 2. Data gloves -- 2.1. Early and commercial data gloves -- 2.2. Sensing mechanism in data gloves -- 2.2.1. Fiber-optic sensors -- 2.2.2. Conductive strain sensors -- 2.2.3. Inertial sensors -- 3. Gesture taxonomies -- 4. Gesture classification -- 4.1. Classical machine learning algorithms -- 4.1.1. K-nearest neighbor -- 4.1.2. Support vector machine (SVM) -- 4.1.3. Decision tree -- 4.1.4. Artificial neural network (ANN) -- 4.1.5. Probabilistic neural network (PNN) -- 4.2. Glove-based gesture classification with classical machine learning algorithms -- 4.3. Deep learning -- 4.3.1. Convolutional neural network (CNN) -- 4.3.2. Recurrent neural network (RNN) -- 4.4. Glove-based gesture classification using deep learning -- 5. Discussion and future trends -- 6. Conclusion -- References -- Chapter 10: An ensemble approach for evaluating the cognitive performance of human population at high altitude -- 1. Introduction -- 2. Methodology -- 2.1. Data collection -- 2.2. Data processing and feature selection -- 2.3. Differential expression analyses. , 2.4. Association rule mining -- 2.5. Experimental set-up -- 3. Results and discussion -- 3.1. Differential analyses-Cognitive and clinical features -- 3.2. Discovered associative rules -- 3.3. Discussion -- 4. Future opportunities -- 5. Conclusions -- Acknowledgment -- References -- Chapter 11: Machine learning in expert systems for disease diagnostics in human healthcare -- 1. Introduction -- 2. Types of expert systems -- 3. Components of an expert system -- 4. Techniques used in expert systems of medical diagnosis -- 5. Existing expert systems -- 6. Case studies -- 6.1. Cancer diagnosis using rule-based expert system -- 6.2. Alzheimers diagnosis using fuzzy-based expert systems -- 6.2.1. Algorithm of fuzzy inference system -- 7. Significance and novelty of expert systems -- 8. Limitations of expert systems -- 9. Conclusion -- Acknowledgment -- References -- Chapter 12: An entropy-based hybrid feature selection approach for medical datasets -- 1. Introduction -- 1.1. Deficiencies of the existing models -- 1.2. Chapter organization -- 2. Background of the present research -- 2.1. Feature selection (FS) -- 3. Methodology -- 3.1. The entropy based feature selection approach -- 3.1.1. Equi-class distribution of instances -- 3.1.2. Splitting the dataset D into subsets: D1, D2, and D3 -- 4. Experiment and experimental results -- 4.1. Experiment using suggested feature selection approach -- 5. Discussion -- 5.1. Performance analysis of the suggested feature selection approach -- 6. Conclusions and future works -- Conflict of interest -- Appendix A -- A.1. Explanation on entropy-based feature extraction approach -- References -- Chapter 13: Machine learning for optimizing healthcare resources -- 1. Introduction -- 2. The state of the art -- 2.1. Resource management -- 2.2. Impact on peoples health -- 2.3. Exit strategies. , 3. Machine learning for health data analysis.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Data structures (Computer science). ; Electronic books.
    Beschreibung / Inhaltsverzeichnis: This book covers the latest advances in structure inference in heterogeneous collections of documents and data, offering a comprehensive view of the state of the art, and identifying challenges and opportunities for further research agenda and developments.
    Materialart: Online-Ressource
    Seiten: 1 online resource (448 pages)
    Ausgabe: 1st ed.
    ISBN: 9783642229138
    Serie: Studies in Computational Intelligence Series ; v.375
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Title Page -- Foreword -- Preface by Editors -- Contents -- List of Contributors -- Learning Structure and Schemas from Heterogeneous Domains in Networked Systems Surveyed -- Introduction -- Learning Patterns in Sensor Networks -- Learning Structures in Biological Domains -- Learning in Distributed Automation and Control Systems -- Learning Structures in Social Networks -- Learning Structures in Peer-to-Peer Networks -- Learning and Privacy-Preserving in Distributed Environments -- Conclusion -- References -- Handling Hierarchically Structured Resources Addressing Interoperability Issues in Digital Libraries -- Introduction and Motivation -- Objectives and Contributions -- The Background Context and Technologies -- Archives and Archival Descriptions -- EAD: Encoded Archival Description -- OAI-PMH and Dublin Core -- The NESTOR Model -- The NESTOR Algebra -- The NESTOR Prototype: Addressing Interoperability for Digital Archives -- How to Represent an Archive through the NESTOR Model -- Analysis of the Requirements -- Retaining Archival Hierarchy and Context throughout an XML Tree -- Encoding, Accessing and Sharing an Archive through Sets -- Conclusions and Future Work -- References -- Administrative Document Analysis and Structure -- Introduction -- Case-Based Reasoning -- CBR Terminology -- Problem Elaboration -- Similar Case Search -- Adaptation -- Learning -- CBR for Document Image Analysis: CBRDIA -- The Proposed Approach -- Document Structures -- Problem Representation -- Problem Solving -- Experiments -- Experiments on CBRDIA -- Experiments on Administrative Documents -- Conclusion -- References -- Automatic Document Layout Analysis through Relational Machine Learning -- Introduction -- Related Work -- Preliminaries -- Learning Layout Correction Theories -- From Manual to Automatic Improvement of the Layout Correction -- Tool Architecture. , The Learning System -- Description Language -- Experiments -- Conclusions -- References -- Dataspaces: Where Structure and Schema Meet -- Introduction -- Data Structuring -- Data Integration: The Story so Far -- Schema Mapping -- Keyword-Driven Queries -- The Web of Data -- Dataspaces -- Dataspace Dimensions -- Dataspace Profiling -- Querying and Searching -- Application Domain -- A Roundup of Existing Projects on Managing Structured Data -- Google BigTable -- Apache Cassandra -- Apache Hadoop -- Apache CouchDB -- DHT-Based Data Management Systems -- Google Fusion Tables -- WebTables -- Yahoo! SearchMonkey -- iMeMex -- Conclusions and Future Work -- References -- Transductive Learning of Logical Structures from Document Images -- Introduction -- Motivation and Problem Definition -- Related Work -- Extracting Emerging Patterns with SPADA -- Document Description -- The Mining Step -- Transductive Classification -- Experiments -- Conclusions -- References -- Progressive Filtering on the Web: The Press Reviews Case Study -- Introduction and Motivation -- Mission -- Related Work -- Hierarchical Text Categorization -- The Input Imbalance Problem -- Agents and Information Retrieval -- Progressive Filtering in Text Categorization -- The Approach -- The Threshold Selection Algorithm -- A Case Study: NEWS.MAS -- The Implemented System -- Experimental Results -- Conclusions -- References -- A Hybrid Binarization Technique for Document Images -- Introduction -- Related Work -- Algorithm Description -- Application of Iterative Global Thresholding -- Noisy Area Detection -- Re-application of IGT (Local Thresholding) -- Experimental Results -- Discussion - Future work -- Conclusion -- References -- Digital Libraries and Document Image Retrieval Techniques: A Survey -- Introduction -- Retrieval Paradigms -- Features -- Pixel Level -- Column Level -- Sliding Window. , Stroke and Primitive Level -- Connected-Component Level -- Word Level -- Line and Page Level -- Shape Descriptor -- Representation -- Similarity Measure -- Clustering -- Matching -- Conclusions -- References -- Mining Biomedical Text towards Building a Quantitative Food-Disease-Gene Network -- Introduction and Motivation -- Related Work -- Named Entity Recognition (NER) in Biomedical Text -- Relationship Extraction -- Polarity and Strength Analysis -- Relationship Integration and Visualization -- Named Entity Recognition -- Improving the Performance of Food Recognition -- Abbreviations and Co-reference Recognition -- Verb-Centric Relationship Extraction -- Relationship Polarity and Strength Analysis -- Feature Space Design -- Feature Selection -- Relationship Integration and Visualization -- Evaluation -- Evaluation of the Named Entity Recognition Module -- Evaluation of the Relationship Extraction Algorithm -- Evaluation of Relationship Polarity and Strength Analysis -- Discussions and Conclusion -- References -- Mining Tinnitus Data Based on Clustering and New Temporal Features -- Introduction -- TRT Background -- TRT Data Collection -- Information Retrieval -- Mining Text Data -- Temporal Feature Design for Continuous Data -- Temporal Feature Design or Categorical Data -- System Overview -- Experiments and Results -- Experiment Type I -- Two-Bin Clustering -- Experiment Type II -- Experiment Type III -- Conclusion -- References -- DTW-GO Based Microarray Time Series DataAnalysis for Gene-Gene Regulation Prediction -- Introduction -- What Is Microarray? -- Importance of Microarray Technology -- Microarray Data Processing -- Microarray and Gene Ontology -- Research Issues in Microarray Time-Series Data -- Missing Value Imputation -- Gene Regulation Prediction -- Gene Clustering and Statistical Operations -- DTW-GO Based Microarray Data Analysis. , Dynamic Time Warping -- Gene Ontology -- DTW-GO Based Microarray Data Analysis -- Datasets and Performance Assessment -- Real Microarray Dataset -- Assessment of Imputation Accuracy -- Accuracy of Gene Regulation Prediction -- Experimental Results and Discussion -- Design of Experiments -- Results and Discussion -- Conclusions -- References -- Integrating Content and Structure into a Comprehensive Framework for XML Document Similarity Represented in 3D Space -- Introduction -- Problem Statement -- XML Background -- Problem Definition -- Similarity Metric Overview -- Similarity Metric -- Structural Encoding -- Content Encoding -- Nested Content Encoding -- Difference Operator -- Visual Representation and Experiments -- MS Word Incremental Saves -- Random News Documents -- Conclusions and Future Work -- References -- Modelling User Behaviour on Page Content and Layout in Recommender Systems -- Introduction -- Personalization and Browsing Behaviour -- Motivation and Objectives -- Literature Review and Survey -- Browsing Behaviour: Action -- Browsing Behaviour: Visual -- A Recommender System Based on Browsing Behaviour -- Recommender System Architecture -- Recommender Implementation -- Structure, Layout, and Schema Learning -- Profiling Layout and Design -- Formalizing Layout and Design -- Layout and Design Learning -- Layout and Design Matching -- Conclusions -- References -- MANENT: An Infrastructure for Integrating, Structuring and Searching Digital Libraries -- Motivation -- Background -- Standards for Digital Library Access and Description -- Ontologies and Related Languages and Tools -- WordNet Domains and the WordNet Domains Ontology -- Text Semantic Similarity -- MANENT -- The MANENT Architecture -- Metadata Classification According to the WordNet Domains Ontology -- Experiments and Results -- Related Work. , Related Work on Digital Libraries Infrastructures -- Related Work on WordNet Domains -- Conclusions and Future Work -- References -- Low-Level Document Image Analysis and Description: From Appearance to Structure -- Introduction -- Motivation, Objectives and Contributions -- Background -- Modeling the Appearance of an Ancient Document -- Extracting Pattern Information from Low-Level Processing -- Linear Instantaneous Case -- Linear Convolutional Case -- A Metadata Schema to Describe Data, Procedures, and Results -- Experimental Evaluation -- Conclusions and Future Work -- References -- Model Learning from Published Aggregated Data -- Introduction -- Mission, Objectives, and Contributions -- Related Work -- Aggregated Data -- Attributional Rules as Knowledge Representation -- Rule Induction -- AQ Algorithm -- Rule Induction from Aggregated Data -- Calculating Coverage -- Evaluation -- Discussion -- Conclusion -- References -- Data De-duplication: A Review -- Introduction -- Problem Description -- Supervised Approaches to De-duplication -- Relational Data De-duplication Approaches -- Multidimensional Data De-duplication Approaches -- Data-Mining Data/Results De-duplication Approaches -- Linked and XML Data De-duplication Approaches -- Streaming Data De-duplication Approaches -- Unsupervised Approaches to De-duplication -- De-duplication Based on Clustering -- De-duplication Based on (dis)Similarity-Search in Metric Spaces -- De-duplication Based on Locality-Sensitive Hashing -- Conclusions and Further Research -- Efficiency and Scalability -- Systematic Assessment of De-duplication Performance -- Ethical, Legal and Anonymity Aspects -- Uncertainty -- References -- A Survey on Integrating Data in Bioinformatics -- Introduction -- Mission -- Background -- Linked-Based Integration -- Data Warehousing Integration -- Mediator-Based Integration. , Federated Databases.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Schlagwort(e): Computer networks-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1217 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030150358
    Serie: Advances in Intelligent Systems and Computing Series ; v.927
    DDC: 004.6
    Sprache: Englisch
    Anmerkung: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshop Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Welcome Message from FINA-2019 Symposium Co-chairs -- FINA-2019 Organizing Committee -- FINA-2019 Symposium Co-chairs -- Program Committee Members -- Welcome Message from HWISE-2019 International Workshop Co-chairs -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from MAW-2019 International Symposium Co-chairs -- MAW-2019 Organizing Committee -- Symposium Organizers -- Program Committee Members -- Welcome Message from BICom-2019 International Workshop Co-chairs -- BICom-2019 Organizing Committee -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from TeNAS-2019 Workshop Organizers -- TeNAS-2019 Organizing Committee -- Steering Committee Chair -- General Co-chairs -- Program Co-chairs -- Program Committee Members -- Welcome Message from IWDENS-2019 Workshop Organizers -- IWDENS-2019 Organizing Committee -- Program Co-chairs -- Program Committee Members -- Welcome Message from COLLABES-2019 International Workshop Organizer -- COLLABES-2019 Organizing Committee -- Workshop Organizer -- Program Committee Members -- Welcome Message from INTRICATE-SEC-2019 Workshop Chair -- INTRICATE-SEC-2019 Organizing Committee -- Workshop Chair. , Program Committee Members -- Welcome Message from E3WSN-2019 International Workshop Co-chairs -- E3WSN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from WITIN-2019 International Workshop Organizers -- WITIN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from BOSON-2019 International Workshop Chair -- BOSON-2019 Organizing Committee -- Workshop Chair -- Workshop Program Committee Co-chairs -- Program Committee Members -- Welcome Message from IOEMLA-2019 International Workshop Co-chair -- IOEMLA-2019 Organizing Committee -- Workshop Co-chair -- Program Committee Members -- Welcome Message from M2EC-2019 Workshop Organizers -- General Co-chairs -- Publicity Chairs -- Program Committee Members -- Welcome Message from AIMAL-2019 Workshop Chair -- AIMAL-2019 Organizing Committee -- Workshop Chair -- Program Committee Members -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search -- Contents -- The 15th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2019) -- Adaptive Waveform Design of Polarimetric Radar for Extended Targets in Signal-Dependent Clutter -- 1 Introduction -- 2 System Model -- 3 Problem Formulation -- 4 Transmit Code and Receive Filter Design -- 4.1 Receive Filter Optimization: Solution to Problem Pw(m) -- 4.2 Radar Code Optimization: Solution to Problem Ps(m) -- 4.3 Transmit-Receive System Design: Optimization Procedure -- 5 Numerical Results -- 5.1 Monotonic Property of the Proposed Method -- 5.2 SINR Behavior vs. TAA Uncertainty Interval -- 6 Conclusions -- References -- CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology -- Abstract -- 1 Introduction. , 2 System Structure -- 3 Description of CRAWL Algorithm -- 3.1 Algorithmic Process -- 3.2 Path Blocking and Recovery -- 4 CDM Algorithm -- 5 Experimental Results and Analysis -- 5.1 Method Realization -- 5.2 Parameter Settings -- 5.3 Routing Message Overhead -- 5.4 Content Matching Overhead -- 6 Conclusion -- References -- Design and Implementation of IoT Based Class Attendance Monitoring System Using Computer Vision and Embedded Linux Platform -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Proposed Approach -- 5 Hardware Requirements -- 5.1 Raspberry Pi 3 Model B -- 5.2 Pi Camera -- 6 Software and Algorithm -- 6.1 OpenCV -- 6.2 Haar Cascade Classifier Algorithm -- 6.3 Python -- 6.4 Numpy -- 6.5 Flask Framework -- 6.6 HTML and Bootstrap -- 7 Experimental Result -- 8 Conclusion -- Acknowledgement -- References -- An Indoor 3D Positioning Technology Based on NB-IoT -- Abstract -- 1 Introduction -- 2 The Advantages and Deployment of NB-IoT -- 2.1 The Advantages of NB-IoT -- 2.2 NB-IoT Deployment Method -- 2.3 NB-IoT Physical Layer Frame Structure -- 3 Location Algorithm -- 3.1 Delay Estimation -- 3.1.1 Calculation of Arrival Time -- 3.1.2 Cycle Estimation -- 3.2 Non-Line-of-Sight Error Optimization -- 3.2.1 Original CLS Algorithm -- 3.2.2 CLS Algorithm for Lagrange Multiplier [9] -- 3.3 Height Estimation -- 4 Conclusion -- Acknowledgements -- References -- Consideration of Implementation Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain -- Abstract -- 1 Introduction -- 2 Motivation and Related Research -- 3 Existing DACS SCHEME and wDACS System -- 3.1 Basic Principle of the DACS Scheme -- 3.2 Communication Control on Client -- 3.3 Security Mechanism of the DACS Scheme -- 3.4 The Cloud Type Virtual PBNM for the Common Use Between Plural Organizations. , 4 Consideration of Implementation Method for the Scheme to Manage the Specific Domain -- 4.1 Concept of the Scheme to Manage the Specific Domain -- 4.2 Implementation Method for the Scheme to Manage the Specific Domain -- 5 Conclusion -- Acknowledgments -- References -- A Model of Virtual Machines to Support Storage Processes -- 1 Introduction -- 2 System Model -- 2.1 Virtual Machines -- 2.2 Clones -- 3 Experiments -- 4 A Model of Storage Applications on Virtual Machines -- 5 Concluding Remarks -- References -- Energy Efficient Scheduling of Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 4.1 Appliances Categories -- 4.2 Problem Formulation -- 5 Scheduling Techniques -- 5.1 Strawberry Algorithm (SA) -- 5.2 Salp Swarm Algorithm (SSA) -- 5.3 IAPR -- 6 Simulation Results and Discussions -- 7 Conclusion and Future Work -- References -- Minimizing Daily Cost and Maximizing User Comfort Using a New Metaheuristic Technique -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 SBA -- 5.2 EWA -- 5.3 Proposed -- 6 Simulation Results and Discussion -- 6.1 Pricing Tariff -- 7 Conclusion -- References -- Efficiency Analysis of TFHE Fully Homomorphic Encryption Software Library Based on GPU -- Abstract -- 1 Introduction -- 2 Preliminary -- 2.1 Algorithm -- 2.2 GPU Parallel Computing -- 3 TFHE Library Debug and Analysis -- 3.1 TFHE Library -- 3.2 TFHE Library Installation and Debugging -- 3.3 TFHE Library Debug Process -- 4 cuFHE Library Debugging and Analysis -- 4.1 cuFHE Library -- 4.2 cuFHE Library Installation and Debugging -- 4.3 cuFHE Library Debug Process -- 5 Performance Analysis -- 6 Conclusion -- References -- NADEEM: A Novel Reliable Data Delivery Routing Protocol for Underwater WSNs -- 1 Introduction. , 2 Related Work and Problem Statement -- 3 Proposed System Model -- 3.1 UWSNs Propagation Model -- 4 Proposed Work -- 4.1 Dissemination of Beacon Message -- 4.2 The FA-NADEEM -- 4.3 The TA-NADEEM -- 5 Simulation Results and Discussion -- 5.1 Performance Control Parameters -- 5.2 Fraction of Local Maximum Nodes -- 5.3 Packet Delivery Ratio -- 5.4 Energy Consumption -- 6 Conclusion -- References -- An Architecture for Distributed Ledger-Based M2M Auditing for Electric Autonomous Vehicles -- 1 Introduction -- 2 Platform Architecture -- 2.1 Physical Layer -- 2.2 Network Layer -- 2.3 Services Layer -- 3 Unmanned EAV Charging -- 4 Research Challenges -- 5 Threat Model -- 6 Conclusions -- References -- Is QUIC Quicker Than TCP? -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Work -- 3 Background -- 3.1 Transport Control Protocol (TCP) -- 3.2 Quick UDP Internet Connections (QUIC) -- 4 Methodology -- 5 Analysis -- 5.1 Generate Raw Data -- 5.2 Data Analysis -- 5.3 Visualization -- 6 Conclusions -- 7 Future Work -- References -- PRAN: A Provenance Based Model and Prototype to Strengthen Authentication -- Abstract -- 1 Introduction -- 1.1 Motivation and Contributions -- 2 Problem Statement -- 3 Related Work -- 4 Provenance Based Authentication Model -- 4.1 Authentication Provenance -- 4.2 Policy Model -- 5 Prototype -- 5.1 Authentication Validation Point (AVP) -- 5.2 Authentication Server -- 5.3 Authentication Policy Specification -- 5.4 Policy Engine -- 5.5 Provenance Mechanism -- 6 Prototype Evaluation -- 6.1 Primary Detection -- 6.2 Secondary Detection -- 6.3 Evaluation Results -- 7 Limitations and Challenges -- 8 Conclusions and Future Directions -- References -- The Deepest Vertex First Reboot: Rebooting Network Edge Switches in a Campus Network -- 1 Introduction -- 2 Deepest Vertex First Reboot -- 2.1 Pre-condition. , 2.2 Campus Network in Graph Theory.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Schlagwort(e): Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (571 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319985572
    Serie: Lecture Notes on Data Engineering and Communications Technologies Series ; v.23
    Sprache: Englisch
    Anmerkung: Intro -- Welcome Message from the INCoS-2018 Organizing Committee -- General Co-chairs -- Program Co-chairs -- Message from the INCoS-2018 Workshops Chairs -- INCoS-2018 Workshops Co-chairs -- Honorary Chair -- General Co-chairs -- Program Co-chairs -- Workshops Co-chairs -- International Advisory Committee -- International Liaison Co-chairs -- Award Co-chairs -- Web Administrators -- Local Arrangement Co-chairs -- Steering Committee -- Track 1: Data Mining, Machine Learning and Collective Intelligence -- Track Co-chairs -- TPC Members -- Track 2: Fuzzy Systems and Knowledge Management -- Track Co-chairs -- TPC Members -- Track 3: Grid and P2P Distributed Infrastructure for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 4: Nature's Inspired Parallel Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 5: Security, Organization, Management and Autonomic Computing for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 6: Software Engineering, Semantics and Ontologies for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 7: Wireless and Sensor Systems for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 8: Service-Based Systems for Enterprise Activities Planning and Management -- Track Co-chairs -- TPC Members -- Track 9: Next-Generation Secure Network Protocols and Components -- Track Co-chairs -- TPC Members -- Track 10: Big Data Analytics for Learning, Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 11: Cloud Computing: Services, Storage, Security and Privacy -- Track Co-chairs -- TPC Members -- Track 12: Intelligent Collaborative Systems for Work and Learning, Virtual Organization and Campuses -- Track Co-chairs -- TPC Members. , Track 13: Social Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 14: Intelligent and Collaborative Systems for e-Health -- Track Co-chairs -- TPC Members -- Track 15: Low Power Wan: Ad Hoc Networks, Energy Harvesting -- Track Co-chairs -- TPC Members -- INCoS-2018 Reviewers -- Welcome Message from WIND-2018 Workshop Organizers -- WIND-2018 Workshop Co-chairs -- WIND-2018 Organizing Committee -- WIND-2018 Workshop Co-chairs -- Program Committee -- Welcome Message from ALICE-2018 Workshop Organizers -- ALICE-2018 Workshop Organizers -- ALICE-2018 Organizing Committee -- Workshop Organizers -- Program Committee -- Welcome Message from FINCoS-2018 Workshop Organizer -- FINCoS-2018 Workshop Organizer -- FINCoS-2018 Organizing Committee -- Workshop Organizer -- Program Committee -- Welcome Message from BDS-2018 Workshop Organizers -- Workshop Organisers -- BDS-2018 Organizing Committee -- Workshop Organisers -- Workshop PC Members -- Welcome Message from MaLICS-2018 International Workshop Organizer -- MaLICS-2018 Workshop Organizer -- INCoS-2018 Keynote Talks -- IoT and CPS Two Worlds Growing Together: The Embedded Software Point of View -- SAP Leonardo, Your Digital Innovation System -- Centralized e-Health National Wide Concept to Reduce the Complexity of Integration -- Contents -- 10th International Conference on International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018) -- Findings from a Success Factor Analysis for SaaS Usage -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Success Factor Analysis -- 2.2 Success Factors for Cloud Services -- 2.3 Data Collection and Sample Description -- 3 Empirical Results -- 4 Discussion -- 5 Limitations and Conclusion -- References -- Distributed Computation for Protein Structure Analysis -- 1 Introduction -- 2 Protein Analysis. , 3 Distributing Method -- 3.1 Design -- 3.2 Feasibility -- 4 Practical Techniques and Result -- 4.1 Disconnect Nonresponsive Clients -- 4.2 Waiting Time Without Task -- 4.3 Task Assignment -- 4.4 Result -- 5 Conclusion -- References -- Solutions for Secure Collaboration, Selection of Methodology, Implementation and Case Studies for Their Use -- Abstract -- 1 Introduction -- 2 Research Objectives and Data Processing Methodology -- 3 Solutions for Secure Communication -- 3.1 Selecting Suitable Services -- 3.2 Selection Criteria -- 3.3 Selecting Suitable Services -- 3.4 Results from Comparison -- 4 Practical Case Studies -- 4.1 Customer Projects Based on Tresorit and Types of Protection -- 4.1.1 Basic Protection -- 4.1.2 Enhanced DRM Protection -- 4.2 Practical Recommendations and Implementation of Solutions -- 5 Conclusion -- References -- Cuckoo Optimization Algorithm Based Job Scheduling Using Cloud and Fog Computing in Smart Grid -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Model -- 4.1 Problem Formulation -- 4.2 Cuckoo Optimization Algorithm -- 4.3 Throttled -- 4.4 Round Robin -- 5 Simulation Results -- 5.1 Average Response Time -- 5.2 Average Processing Time -- 5.3 Cost Optimization -- 6 Conclusion -- References -- Detection of Defects on SiC Substrate by SEM and Classification Using Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Method for Detection of Defects on SiC Substrate by SEM and Classification Using Deep Learning -- 3.1 System Architecture -- 3.2 Tile Combining Method -- 3.3 Method of Detecting and Classifying Defects -- 4 Performance Evaluation -- 5 Conclusions -- References -- Semantic Analysis of Social Data Streams -- 1 Introduction -- 1.1 Text Mining Procedures -- 2 A Social Network Analysis Methodology -- 2.1 Text Analysis Tools -- 2.2 The Methodology -- 3 Experimental Design -- 3.1 TaLTac Analysis. , 3.2 GATE Analysis -- 4 Computational Results -- 4.1 TaLTac Results -- 4.2 GATE Results -- 5 Conclusions -- References -- Exploring User Feedback Data via a Hybrid Fuzzy Clustering Model Combining Variations of FCM and Density-Based Clustering -- Abstract -- 1 Introduction -- 2 The Fuzzy C-Means and Gustafson-Kessel Algorithms -- 3 Density-Based Clustering and the DBSCAN Algorithm -- 4 The Hybrid Fuzzy Clustering Model -- 5 Case Studies: Analysis and Interpretation of Results -- 6 Conclusions and Future Work -- References -- Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications -- Abstract -- 1 Introduction -- 2 CAPTCHA for Knowledge-Based Authentication Protocols -- 3 Cloud Applications -- 4 Conclusions -- Acknowledgments -- References -- Train Global, Test Local: Privacy-Preserving Learning of Cost-Effectiveness in Decentralized Systems -- 1 Introduction -- 2 Cost-Effectiveness Optimization in Decentralized Systems -- 3 Machine Learning vs. Self-adaptive Optimization Strategies -- 3.1 Machine Learning Optimization Strategies -- 3.2 Self-adaptive Strategies -- 4 Applicability on Decentralized Sensing -- 4.1 Optimization Stratagies in Decentralized Sensing -- 5 Experimental Evaluation -- 5.1 Experimental Results -- 6 Conclusion and Future Work -- References -- Performance Evaluation of WMNs for Normal and Uniform Distribution of Mesh Clients Using WMN-PSOSA Simulation System -- 1 Introduction -- 2 Node Placement Problem in WMNs -- 3 Proposed and Implemented Simulation System -- 3.1 PSO Algorithm -- 3.2 Simulated Annealing -- 3.3 WMN-PSOSA Hybrid Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- An Evaluation of Cooperative Communication in Cognitive Radio as Applied to Autonomous Vehicles -- Abstract -- 1 Introduction -- 2 Intelligent Cooperative Communications in AV Networks. , 2.1 Search-Update Strategy -- 3 Evaluation of the Cognitive Radio Approach -- 4 Conclusion -- Acknowledgement -- References -- Method of Generating Computer Graphics Animation Synchronizing Motion and Sound of Multiple Musical Instruments -- 1 Introduction -- 2 Related Works -- 3 Method for Generation of CG Animation Synchronizing Motion and Sound of Multiple Instruments -- 3.1 Method for Synchronization of Sound of Multiple Instruments -- 3.2 Method for Synchronization of Motion -- 4 Performance Evaluation -- 5 Conclusions -- References -- Spectrum Trading in Wireless Communication for Tertiary Market -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 4 Required Definitions -- 5 Proposed Mechanism: STOM-OSM -- 5.1 Analysis of STOM-OSM -- 5.2 Illustrative Example -- 5.3 Properties -- 6 Enhanced Allocation System -- 6.1 Proposed Mechanism: STOM-TSM -- 6.2 Analysis of STOM-TSM -- 6.3 Illustrative Example -- 6.4 Properties -- 7 Experiments and Evaluation -- 7.1 Performance Metrics -- 7.2 Analysis of the Results -- 8 Conclusion and Future Works -- References -- Collaborative All-Optical Alignment System for Free Space Optics Communication -- Abstract -- 1 Introduction -- 2 Active Free Space Optics System -- 2.1 Design of Active Free Space Optics System -- 2.2 Fundamental Features of Active Free Space Optics System -- 3 Alignment Strategy of Active Free Space Optics System -- 3.1 Collaborative Alignment System -- 3.2 Coarse Laser Beam Localization -- 4 Conclusion -- Acknowledgments -- References -- Three-Dimensional Motion Tracking System for Extracting Spatial Movement Pattern of Small Fishes -- 1 Introduction -- 2 Method for Three-Dimensional Motion Tracking for Extracting Spatial Movement Pattern of Small Fishes -- 3 Experiments -- 3.1 Performance Evaluation of Motion Tracking Method -- 3.2 Analysis of Spatial Movement Pattern of Small Fish. , 4 Conclusions.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Schlagwort(e): Computational intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1180 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030028046
    Serie: Advances in Intelligent Systems and Computing Series ; v.885
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- Intelligent Systems -- An Android-Based Remote Monitoring System -- Abstract -- 1 Introduction -- 2 Requirement Analysis and Overall Design -- 2.1 Requirement Analysis -- 2.2 Overall Design -- 2.2.1 Monitoring Side -- 2.2.2 Viewing Side -- 2.2.3 Server -- 3 Detailed Design -- 3.1 System Structure -- 3.2 Process Design of the Monitoring System -- 3.3 Collection and Display of Image -- 3.4 Login Process of the Client -- 3.5 Database Design -- 3.5.1 User -- 3.5.2 Monitoring Device -- 3.5.3 Matched Information -- 3.6 Live Server -- 4 Experiment and Analysis -- 5 Conclusion -- References -- An Intelligent Registration Management System for Freshmen -- Abstract -- 1 Introduction -- 1.1 Disadvantages of the Traditional Registration Mode -- 1.2 Purpose of Constructing an Intelligent Registration Management System -- 2 Construction of the Intelligent Registration Management System -- 2.1 Functional Structure of the Intelligent Registration Management System -- 2.2 Identity Authentication of the Intelligent Registration Management System -- 2.3 Data Integration of the Intelligent Registration Management System -- 3 Results -- 4 Conclusions -- References -- Investigation of Wireless Sensor Network of the Internet of Things -- Abstract -- 1 Introduction -- 2 Method -- 3 Results and Discussion -- 4 Conclusion -- Acknowledgments -- References -- A Remote Phase Change System for Low-Voltage Power Distribution Area -- Abstract -- 1 Introduction -- 2 The Structure of System -- 3 Intelligent Phase-Change Unit -- 3.1 Permanent Magnet Relay -- 3.2 AC Zero-Crossing Phase Change Control Strategy -- 3.3 Anti-phase Short Circuit Protection -- 4 Communication Network Unit -- 5 System Control Unit -- 5.1 Software Design for the Intelligent Phase Change Switch -- 5.2 Software Design for the Mater Control Terminal. , 6 Experiments and Results -- 6.1 Synchronous Phase Change Switching Experiment -- 6.2 ZigBee Network Reliability Experiment -- 7 Conclusion -- Acknowledgments -- References -- Design and Implement of Speech Interaction with Indoor Substation Inspection Robot -- Abstract -- 1 Introduction -- 2 Function and Performance Requirements -- 3 Process Design -- 4 Design of Speech Interaction System -- 4.1 Development Mode -- 4.2 Detailed Design -- 5 Conclusion -- Acknowledgments -- References -- Speech Recognition Algorithm of Substation Inspection Robot Based on Improved DTW -- Abstract -- 1 Introduction -- 2 Feature Extraction -- 2.1 Mel-Frequency Cepstrum Coefficients -- 2.2 Endpoint Detection -- 3 Pattern Recognition -- 4 Simulation Experiment -- 5 Conclusion -- Acknowledgments -- References -- The Design of High Accuracy Pedometer Based on an Adaptive and Dynamic Low-Pass Filtering Algorithm -- Abstract -- 1 Introduction -- 2 System Principle -- 3 Waveform Acquisition and Synthesis -- 4 Waveform Analysis -- 5 Calculation and Simulation -- 6 Test and Result -- 7 Conclusion -- Acknowledgments -- References -- Research on Multi-sensor and Multi-target Data Association Problem -- Abstract -- 1 Introduction -- 2 Ant Colony Algorithm and Its Application Principle -- 2.1 Ant Colony Algorithm -- 2.2 Classic TSP Problems -- 3 Occurrence to Multi-target and Multi-sensor Data Association Problems -- 4 Bionic Algorithm -- 4.1 Path Size -- 4.2 Individual Ant -- 4.3 Pheromone Model -- 4.4 Implementation of Algorithm -- 5 Summary -- References -- A Detecting System for Wheel Balancer Based on the Effect Coefficient Method -- Abstract -- 1 Introduction -- 2 The Balance Principle of Effect Coefficient Method -- 3 The Overall Design Scheme and Software Flow of the System -- 4 Examples of Wheel Test -- 5 Conclusion -- Acknowledgements -- Acknowledgements -- References. , Study of Substation Inspection Robot Voice Recognition Algorithm Based on Wavelet Transform -- Abstract -- 1 Introduction -- 2 An Overview of the Algorithm -- 2.1 Wavelet Decomposition -- 2.2 Vector Quantization -- 2.3 Codebook Acquisition -- 2.4 LBG Algorithm -- 3 Simulation Experiment -- 4 Conclusion -- Acknowledgments -- References -- Research on the Development of Intelligent Industrial Control -- Abstract -- 1 Introduction -- 2 Industrial SCADA System -- 2.1 Electric Power SCADA System -- 2.2 Pipeline SCADA System -- 3 Smart Grids -- 4 Intelligent Refining and Chemical Refining -- 5 Conclusion -- References -- Toward Human Motion Sensing: Design and Performance Evaluation of a Minimized Wearable Platform Using Inertial and TOA Sensors -- Abstract -- 1 Introduction -- 2 Hardware Design -- 2.1 Platform Overview -- 2.2 Platform Realization -- 3 Platform Evaluation -- 3.1 Error Definition -- 3.2 Performance Evaluation -- 3.3 Results Analysis -- 4 Conclusion -- Acknowledgments -- References -- Deep Learning of Intelligent Speech Recognition in Power Dispatching -- Abstract -- 1 Introduction -- 2 Power Dispatching Speech Recognition Based on LSTM-CTC -- 2.1 The Framework of Speech Recognition Based on LSTM-CTC -- 2.2 LSTM Neural Network Model -- 2.3 Connectionist Temporal Classification (CTC) Training -- 3 Experimental Analysis -- 4 Conclusions -- Acknowledgement -- References -- An Improved Multi-factor Dimensionality Reduction Approach to Identify Gene-Gene Interactions -- Abstract -- 1 Introduction -- 2 Methods -- 2.1 Multifactor-Dimensionality Reduction (MDR) -- 2.2 Improved Multifactor-Dimensionality Reduction (IMDR) -- 3 Results and Discussions -- 4 Conclusions -- Findings -- References -- Nonlocal Estimation and BM3D Based Face Illumination Normalization -- Abstract -- 1 Introduction -- 2 Non-local Illumination Normalization Algorithm. , 3 BM3D Image De-noising and Enhancement -- 3.1 BM3D Image Denoising [13] -- 3.2 BM3D Image Enhancement [18] -- 4 Experimental Results -- 5 Conclusion -- Acknowledgments -- References -- Design of Rice Traceability System Based on WSN and RFID -- Abstract -- 1 Introduction -- 2 Overall Design Framework of System -- 3 Each Link Design of System -- 4 Design of Data Acquisition Terminal System -- 4.1 Terminal Node Circuit Design -- 4.2 Coordinator Module Design -- 4.3 Router Module Design -- 4.4 Interface Circuit Design -- 4.5 WSN Networking Design -- 4.6 Protocol Stack Workflow -- 4.7 Sensor Data Acquisition Node Program Design -- 4.8 Coordinator Data Sending and Receiving Program Design -- 4.9 Radio Frequency Identification Module Programming -- 5 Phone-End Traceability Software Design -- 5.1 Functional Requirements and Framework Technical Analysis -- 5.2 Main Page Design -- 5.3 Background Design -- 5.4 Database Design -- 6 System Testing and Conclusion -- Acknowledgments -- References -- Design of Stereoscopic Garage System Based on PLC Control -- Abstract -- 1 Introduction -- 2 General Description of a Three-Dimensional Garage -- 3 Stereo Garage Hardware Design -- 3.1 PLC Control Module Design -- 3.2 Stepping Drive Module Design -- 3.3 Screw Driver Module Design -- 4 Dimensional Garage Software Design -- 4.1 HMI Design of a Stereo Garage -- 4.2 PLC Program Design -- 4.2.1 How to Establish Downstream Channels -- 4.2.2 Design of Truck Shifting Program -- 5 Conclusion -- Acknowledgment -- References -- Intelligent Scenario Computing Workflow Fusion Design Technology for Power Mobile Operations -- Abstract -- 1 Introduction -- 2 Workflow Integration Design and Implementation for Power Mobile Operations -- 3 Design and Implementation of Workflow Task-Driven Workflow Function -- 4 Summary -- References. , New Human-Computer Interaction Solution for Next-Generation Power Grid Dispatching System -- Abstract -- 1 Introduction -- 2 New Human-Computer Interaction Research Needs -- 3 Research Foundation and Principle -- 3.1 Research Foundation -- 3.2 Principles -- 4 Implementation Plan -- Acknowledgments -- References -- Towards a Framework for Agent-Based Healthcare Monitoring -- Abstract -- 1 Introduction -- 2 Related Work -- 3 A Framework for Agent-Based Healthcare Monitoring -- 3.1 Agent Roles -- 3.2 System Architecture Modelling -- 3.3 DataAnalysis Agent -- 4 Prototype Implementation and Usage Scenario -- 5 Conclusion and Future Work -- References -- Design and Implementation of Network Traffic Capture Prober Based on General PC -- Abstract -- 1 Introduction -- 2 Network Traffic Measurement Scheme -- 3 Crucial Technology of Prober Implementation -- 3.1 Packet Capture -- 3.2 Prober Management -- 4 Probe Performance Analysis -- 4.1 Traffic Capture Performance -- 4.2 Traffic Sample Performance -- 5 Conclusions -- Acknowledgments -- References -- PAPR Reduction of FBMC-OQAM Signals Using Particle Swam Optimization Algorithm Based on MBJO-PTS -- Abstract -- 1 Introduction -- 2 FBMC-OQAM System -- 2.1 \hbox{OQAM} Pre-post Processing Scheme -- 2.2 Synthesis and Analysis Filter Banks -- 2.3 Prototype Filter Design -- 3 PAPR Reduction for FBMC - OQAM Signals -- 3.1 FBMC - OQAM Signals -- 3.2 Model of MBJO-PTS Scheme -- 3.3 Proposed PSOA for Optimal Solutions Reducing PAPR of FBMC-OQAM System -- 4 Results and Discussion -- 5 Conclusions -- Acknowledgments -- References -- On Abelian Tensor Decomposition and Gradient-Descent Algorithm -- 1 Introduction -- 2 Standard Tensor Decompositions -- 3 Abelian Tensor -- 4 Algorithm for Abelian Tensor Decomposition -- 4.1 Gradient-Descent Algorithm -- 4.2 Lyapunov Method in Analysis of Stability -- References. , Collision Avoidance Method for UAV Using A* Search Algorithm.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...