<p><span>This book includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, which took place in Asan, Korea, on July 1â3, 2021. Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices
Complex, Intelligent and Software Intensive Systems: Proceedings of the 16th International Conference on Complex, Intelligent and Software Intensive ... (Lecture Notes in Networks and Systems, 497)
â Scribed by Leonard Barolli (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 609
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices, other software systems, and users. More and more domains are involved with software intensive systems, e.g., automotive, telecommunication systems, embedded systems in general, industrial automation systems, and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems.
Complex systems research is focused on the overall understanding of systems rather than its components. Complex systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions.
The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations, builds a fruitful impulse for both software intensive systems and complex systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences is a very important factor for the future development and innovation of software intensive and complex systems.
The aim of the book âComplex, Intelligent and Software Intensive Systemsâ is to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: software intensive systems, complex systems, and intelligent systems.
⌠Table of Contents
Welcome Message of CISIS-2022 International Conference Organizers
CISIS-2022 Organizing Committee
Honorary Chair
General Co-chairs
Program Committee Co-chairs
International Advisory Board
Award Co-chairs
International Liaison Co-chairs
Publicity Co-chairs
Finance Chair
Local Arrangement Co-chairs
Web Administrator Chairs
Steering Committee Chair
Track Areas and PC Members
1. Database and Data Mining Applications
Track Co-chairs
PC Members
2. Artificial Intelligence and Bio-Inspired Computing
Track Co-chairs
PC Members
3. Multimedia Systems and Virtual Reality
Track Co-chairs
PC Members
4. Next Generation Wireless Networks
Track Co-chairs
PC Members
5. Semantic Web and Web Services
Track Co-chairs
PC Members
6. Security and Trusted Computing
Track Co-chairs
PC Members
7. HPC & Cloud Computing Services and Orchestration Tools
Track Co-chairs
PC Members
8. Parallel, Distributed and Multicore Computing
Track Co-chairs
PC Members
9. Energy Aware Computing and Systems
Track Co-chairs
PC Members
10. Multi-agent Systems, SLA Cloud and Social Computing
Track Co-chairs
PC Members
11. Internet of Everything and Machine Learning
Track Co-chairs
PC Members
CISIS-2022 Reviewers
CISIS-2022 Keynote Talks
Design and Implementation Issues of Omnidirectional Robots and Their Applications for Different Environments
Is Privacy the Same as Security, or Are They Just Two Sides of the Aame Coin?
Contents
Unnecessary Maneuvers as a Determinant of Driver Impatience in VANETs: Implementation and Evaluation of a Fuzzy-based System
1 Introduction
2 Overview of VANETs
3 Proposed Fuzzy-Based System
4 Simulation Results
5 Conclusions
References
Performance Evaluation of a Drone-Based Data Replication Method in Urban Disaster Scenario
1 Introduction
2 DTN
3 Simulation Settings
4 Evaluation Results
5 Conclusions
References
A Fast Convergence RDVM for Router Placement in WMNs: Performance Comparison of FC-RDVM with RDVM by WMN-PSOHC Hybrid Intelligent System
1 Introduction
2 Intelligent Algorithms
2.1 Particle Swarm Optimization
2.2 Hill Climbing
3 Proposed WMN-PSOHC System
4 Simulation Results
5 Conclusions
References
Energy-Efficient Two-Phase Locking Protocol by Omitting Meaningless Read and Write Methods
1 Introduction
2 System Model
2.1 Object-Based Systems
2.2 Two-Phase Locking (2PL) Protocol
2.3 Data Access Model
2.4 Power Consumption Model of a Server
3 Improved EE2PL (IEE2PL) Protocol
3.1 Meaningless Read and Write Methods
3.2 IEE2PL Protocol
4 Evaluation
4.1 Environment
4.2 Total Processing Electric Energy Consumption
4.3 Average Execution Time of Each Transaction
5 Concluding Remarks
References
A New Method for Optimization of Number of Mesh Routers and Improving Cost Efficiency in Wireless Mesh Networks
1 Introduction
2 Mesh Router Placement Problem
3 Proposed Method
3.1 CCM for Mesh Router Placement Optimization
3.2 CCM-based SA for Mesh Router Placement Optimization
3.3 Delaunay Edge and CCM-based SA
3.4 Number of Mesh Routers Optimization Method
4 Simulation Results
5 Conclusions
References
A Wireless Sensor Network Testbed for Monitoring a Water Reservoir Tank: Experimental Results of Delay
1 Introduction
2 Proposed System for Water Reservoir Tank Monitoring
2.1 Sensors for Water Reservoir Tank Monitoring
2.2 Sensor Fusion of Measurement Data
3 Description of Wireless Sensor Network Testbed
3.1 Scenario Description
4 Experimental Results
5 Conclusions
References
Remote Medical Assistance Vehicle in Covid-19 Quarantine Areas: A Case Study in Vietnam
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Some Requirements for the System
3.2 Components for the Designed Vehicle
4 Experiments and Evaluation
4.1 Operating Principles
4.2 Evaluation
5 Conclusion
References
Dynamic Job Allocation on Federated Cloud-HPC Environments
1 Introduction
2 Related Work
3 Simulator Overview
3.1 Simulator Architecture and Design
3.2 Simulator Assessment
4 Service Implementation
5 Experimental Tests
6 Conclusion
References
Examination of Robot System Detecting Smoke Condition in the Event of a Fire
1 Introduction
2 Related Research
3 Proposed System
3.1 Overview
3.2 Application of SLAM in Proposal
3.3 Application of the Proposed Route Planning
3.4 Application of Stereo Cameras in the Proposed System
3.5 Principle of Stereo Distance Measurement
3.6 Smoke Height Determination
3.7 Smoke 3D Coordinate Acquisition
3.8 Proposed System Development in ROS
4 Experiment and Evaluation
4.1 Experimental Purpose
4.2 Simulation Environment Settings
4.3 Robot Settings
4.4 Content of Experiment 1
4.5 Result of Experiment 1
4.6 Content of Experiment 2
4.7 Result of Experiment 2
4.8 Evaluation
5 Conclusion
References
A Test Bed for Evaluating Graphene Filters in Indoor Environments
1 Introduction
2 Context
2.1 Air Quality Requirements
2.2 Graphene Filters
3 Test Bed Configuration
3.1 Clean and Dirty Rooms
3.2 Sensors Platforms and Data Collection
3.3 Filter Configurations
4 Test and Results
4.1 Test Plan
4.2 Results
4.3 Discussion
5 Conclusion
References
An Overview of Emotion Recognition from Body Movement
1 Introduction
2 Process of Emotion Recognition from Body Movement
3 Dataset
3.1 Data Acquisition Tools
3.2 Modality
3.3 Datasets
4 Conclusions
References
Experimental Analysis and Verification of a Multi-modal-Biometrics Identity Verification Framework Based on the Dempster-Shafer Theory
1 Introduction
2 Case Study: AÂ Multi-modal Biometric Identity Verification Architecture Over Big Data Settings
3 Supporting Identity Verification via a Multi-modal Biometrics Approach
4 An Innovative Weighted-Sum Data Fusion Algorithm for Supporting Multi-modal Biometrics Identity Verification
5 Experimental Assessment and Analysis
6 Conclusions and Future Work
References
Breast Ultrasound Image Classification Using EfficientNetV2 and Shallow Neural Network Architectures
1 Introduction
2 Related Work
3 Methods
3.1 Data Augmentation
3.2 Fully Connected Neural Network (FCN)
3.3 Convolutional Neural Networks (CNNs)
3.4 EfficientNetV2
4 Results
4.1 Data Description
4.2 Classification Results on Breast Ultrasound Images of Three considered Algorithms
5 Conclusion
References
Steganographic Approaches for Carrier Related Information Hiding
1 Introduction
2 Carrier Related Steganography
2.1 Pixels MSB Related Method
2.2 Pixels Indexes Method
2.3 Structural Elements Method
3 Conclusions
References
A Bi-objective Genetic Algorithm for Wireless Sensor Network Optimization
1 Introduction
2 Problem Formulation
3 Related Work
3.1 Disjoint Cover Sets
4 Bi-objective GA for WSN Optimization
5 Experiments
6 Conclusions
References
104 Fruits Classification Using Transfer Learning and DenseNet201 Fine-Tuning
1 Introduction
2 Related Work
3 Materials and Proposed Methods
3.1 CNN Architecture
3.2 DenseNet Architecture
3.3 Transfer Learning
3.4 Data Gathering
3.5 Data Preprocessing
3.6 Split Dataset
3.7 Proposed Methods - Recognition Model
3.8 Training Model
4 Result
4.1 Experiment 1: Identification of the Original Data Set
4.2 Experiment 2: Identification of the Processed Data Set
4.3 Evaluation of Test Results
5 Conclusion
References
Transfer Learning with Fine-Tuning on MobileNet and GRAD-CAM for Bones Abnormalities Diagnosis
1 Introduction
2 Related Work
3 Methods
3.1 Image Preprocessing
3.2 Bone Disease Identification Based on Transfer Learning Approach
4 Experiments
4.1 Data Description
4.2 Metrics for Comparison
4.3 Anomalies Identification in Bones on Three Parts Including WRIST, HUMERUS, and ELBOW
4.4 Results Comparison with State-of-the-art and Discussion
5 Conclusion
References
A Fuzzy-Based System for Handover in 5G Wireless Networks Considering Network Slicing Constraints
1 Introduction
2 Software-Defined Networks (SDNs)
3 5G Network Slicing
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions and Future Work
References
A Focused Beam Routing Protocol Considering Node Direction for Underwater Optical Wireless Communication in Delay Tolerant Networks
1 Introduction
2 Related Work
3 Proposed FBR Considering Node Direction Protocol on DTNs for UOWC
4 Implementation of FBR and FBRD in the ONE Simulator
5 Simulations
6 Conclusions and Future Work
References
Taming Multi-node Accelerated Analytics: An Experience in Porting MATLAB to Scale with Python
1 Introduction
2 Background
2.1 Analytics Pipeline
2.2 Available Tools
3 Proposed Methodology
3.1 Baseline Implementation
3.2 Dask Implementation
4 Results
5 Conclusion and Future Work
References
An Adaptive Resource Allocation Protocol for Dynamic Environments
1 Introduction
2 Related Work
3 Problem Definition
4 Proposed Protocol
4.1 Deliberate on Requesting
4.2 Deliberate on Offering
4.3 Deliberate on Confirming
5 Evaluation
6 Conclusions and Ongoing Work
References
FPGA Implementation of an Object Recognition System with Low Power Consumption Using a YOLOv3-tiny-based CNN
1 Introduction
2 Related Work
3 Proposed Network Architecture
3.1 Depthwise Separable Convolution
3.2 Proposed Network: YOLOv3-Tiny-Improved
3.3 Network Learning
3.4 Model Quantization
4 FPGA Design and Implementation of Inference Processing
4.1 Pointwise Convolution Module
4.2 Depthwise Convolution Module
5 Evaluation and Discussion of the Designed System
5.1 Evaluation of Resource Usage
5.2 Latency Evaluation
5.3 Power Consumption Evaluation
6 Conclusion
References
Achieving Sustainable Competitive Advantage Through Green Innovation; the Moderating Effect of Islamic Environmental Ethics and Islamic Business Ethics
1 Introduction
2 Literature Review Green Innovation
3 Sustainability Competitive Advantage
4 Relationship Between Green Innovation and Sustainability Competitive Advantage
5 Moderating Effect of IEE and IBE on Relationship Between Green Innovative and Sustainability Competitive Advantage
6 Methods
7 Result and Discussion
8 Conclusion
9 Limitation and Future Research
References
Digital Social Capital and Financial Inclusion for Small Medium Enterprises
1 Introduction
2 Literature Review
2.1 Financial Inclusion for Fashion SMEs
2.2 Financial Literacy and Financial Inclusion
2.3 Financial Technology and Financial Inclusion
2.4 Digital Social Capital, Financial Literacy, and Financial Inclusion
2.5 Digital Social Capital, Financial Technology, dan Financial Inclusion
3 Research Method
4 Results and Discussion
4.1 Respondents Profile
4.2 Instrument Quality Test Results
4.3 Classic Assumption Test Results
4.4 Descriptive Statistics Results
4.5 Hypothesis Test Results
5 Conclusion
References
Knowledge Absorptive Capacity Toward Sustainable Organizational Reputation in Digital Era
1 Introduction
2 Literature Review
2.1 Sustainable Organizational Reputation
2.2 Relational Capability and Knowledge Absorptive Capacity
2.3 ICT and Knowledge Absorptive Capacity
2.4 Relational Capability and Organizational Innovation
2.5 ICT and Organizational Innovation
2.6 Knowledge Absorptive Capacity and Organizational Innovation
2.7 Organizational Innovation and Sustainable Organizational Reputation
2.8 Relational Capability, Knowledge Absorptive Capability and Sustainable Organizational Reputation
2.9 ICT, Knowledge Absorptive Capability and Sustainable Organizational Reputation
3 Conclusion
References
The Role of Holistic Value Co-creation Capability in Improving Sustainable Relationship
1 Introduction
2 Literature Review
2.1 Sustainable Relationships
2.2 Holistic Value Co-Creation (HVCC)
3 Research Methods
3.1 Analysis Techniques
4 Finding
4.1 Reliability Dan Validity
4.2 Hypothesis Testing Results
5 Discussion
6 Conclusion
References
Conceptual Paper Tax Avoidance and Firm Value in Manufacturing Companies: A Case Study for Companies in Indonesia
1 Introduction
2 Literature Review
2.1 Signaling Theory
2.2 Firm Value
2.3 Capital Structure
2.4 Tax Avoidance
2.5 Dividend Policy
2.6 Profitability
3 Hypothesis Development
3.1 Capital Structure and Firm Value
3.2 Dividend Policy and Firm Value
3.3 Profitability and Firm Value
3.4 Tax Avoidance and Firm Value
4 Methods and Procedures
4.1 Population and Sample
4.2 Measurement Method
4.3 Research Period
4.4 Method of Collecting Data
4.5 Engineering Data Analysis Techniques
5 Conclusion
References
Customer Experience Management for ICT Industry Using SEM-PLS Analysis Technique
1 Introduction
2 Literature Review
2.1 Relationship Between Customer Experience Management and Marketing Performance
2.2 Relationship Between Customer Experience Management and Digital Business Innovation
2.3 Relationship Between Digital Business Innovation and Marketing Performance
3 Research Methodology
4 Results
4.1 Descriptive Analysis
4.2 Inferential Analysis
5 Discussion and Conclusion
References
Increasing Repurchase Intention Through Personal Selling Capability, Customer Engagement, and Brand Trust
1 Introduction
2 Literature Review
2.1 Repurchase Intention
2.2 Brand Trust
2.3 Customer Engagement
2.4 Customer Experience
2.5 Personal Selling Capability
2.6 Brand Reputation
3 Research Method
4 Finding
4.1 Reliability and Validity
4.2 Hypothesis Testing Results
5 Discussion and Conclusion
6 Limitation and Future Research Direction
References
E-Impulse Buying Improvement with Product Knowledge, Shopping Lifestyle, and Positive Emotion
1 Introduction
2 Literature Review
2.1 Product Knowledge
2.2 Shopping Lifestyle
2.3 E-Impulse Buying
2.4 Positive Emotion
3 Method
4 Result
5 Discussion
6 Conclusion
References
Transformational Performance of Police of the Republic of Indonesia Through Smart Working
1 Introduction
2 Literature Research
2.1 Police Personnel Performance
2.2 The Effect of Motivation on Smart Working and Hard Working
2.3 The Effect of Motivation on Smart Working and Hard Working
2.4 The Role of Hard Working on Personnel Performance Improvement
2.5 The Role of Smart Working on Personnel Performance Improvement
3 Research Method
4 Research Findings and Discsussion
5 Conclusion
6 Managerial Implication
7 Theoretical Implication
8 Research Limitation and Future Research Agenda
References
The Role of Tawhidic Paradigm in Knowledge Creation Process
1 Introduction
2 Literature Review
2.1 Knowledge Creation
2.2 Islamic Worldview
2.3 Tawhidic Paradigm
3 SECI and Tawhidic Paradigm
4 Conclusion and Future Research
References
Islamic Human Values for Career Adaptability and Career Success of Millennial Generation
1 Introduction
2 Literature Review
2.1 Career Adaptability
2.2 Career Success
2.3 Religious Personal Value
3 Conceptual Models
4 Methodology
5 Finding
6 Conclusion and Future Research
References
FAST: A Conceptual Framework for Reducing Fraud Financial Statement in Financial Business Practice
1 Introduction
2 Literature Review
2.1 Fraud Theory
2.2 Financial Statement Fraud
2.3 Siddiq
2.4 Amanah
2.5 Fathonah
2.6 Tabligh
3 Conceptual Framework
4 Conclusion and Future Research
References
Risk Management and Islamic Value: A Conceptual Development of Al-Adl Financing Risk Management
1 Introduction
2 Literature Review
2.1 Al-Adl Financing Risk Management
2.2 Repayment of Financing
2.3 Mudharabah Financing Performance
3 Methodology
4 Conclusion and Future Research Agenda
References
The Consumption Value and Value Congruity: A Conceptual Development of Hasanah Value Congruity
1 Introduction
2 Literature Review
2.1 Congruity Theory
2.2 The Theory of Consumption Value
2.3 Hasanah Value Congruity
2.4 Marketing Performance
3 Conclusion
4 Future Research
References
Resilience of Companies Listed in Jakarta Islamic Index (JII) During the Pandemic COVID-19
1 Introduction
2 Literature Review
2.1 COVID-19 Pandemic Impact on the Companyâs Financial Performance
2.2 Resource-Based Theory
2.3 Trends in the Performance of Companies Listed on the Sharia Stock Index
3 Method
4 Findings
4.1 Operating Profit Management (OPM)
5 Discussion
6 Conclusions
References
The Role of Institutional Investors in Lowering Information Asymmetry: Study on Mandatory Regulation of Integrated Reporting Implementation
1 Introduction
2 Literature Review
2.1 Integrated Reporting
2.2 Information Asymmetry
2.3 Integrated Reporting and Information Asymmetry
2.4 Institutional Investors and Information Asymmetry
2.5 The Role of Integrated Reporting and Institutional Investors in Lowering Information Asymmetry
3 Research Method
4 Result and Discussion
5 Discussion
6 Conclusion
References
Application of Business Process Semantic Annotation Techniques to Perform Pattern Recognition Activities Applied to the Generalized Civic Access
1 Introduction and Related Works
2 Semantic Annotations Methodology
3 Case Study
3.1 BPMN for Generalized Civic Process
3.2 Transparency Ontology
3.3 Semantic Annotations and Inferential Approach for Pattern Discovery
4 Conclusion and Future Works
References
A Semantic Representation for Public Calls Domain and Procedure: Housing Policies of Campania Region Case Study
1 Introduction and Related Works
2 Application of Semantic Representation Techniques to Model Domain and Administrative Process
2.1 BPMN Proposed
2.2 Public Calls Ontology Proposed
2.3 BPMN Semantic Enrichment
3 Conclusion and Future Works
References
Machine Learning, Big Data Analytics and Natural Language Processing Techniques with Application to Social Media Analysis for Energy Communities
1 Introduction
2 Goals and Workflow
3 Methodologies and Technologies Used for the System Realization
3.1 Data Ingestion
3.2 Recognition of Places, Dates and Events
3.3 Semantic Expansion
3.4 Sentiment Analysis
3.5 Ontology Population
3.6 Visualization
4 Conclusion and Future Works
References
Semantic Based Knowledge Management in e-Government Document Workflows: A Case Study for Judiciary Domain in Road Accident Trials
1 Introduction and Motivations
2 Methodology: Workflow Description and Ontology Population
2.1 Ontology Population with Natural Language Processing
3 Case Study - Request for Compensation for Road Traffic Damage
3.1 Semantic Representation
3.2 Application of Ontology Population
3.3 Application of Logical Inference
4 Conclusion and Future Work
References
Towards the Identification of Architectural Patterns in Component Diagrams Through Semantic Techniques*-6pt
1 Introduction
2 Background
3 Methodology
3.1 The Core Software Ontology (CSO)
3.2 Extension of the ODOL+OWLS
3.3 Component Diagram Ontology
4 A Case Study
5 Conclusion and Future Work
References
A Semantic Methodology for Security Controls Verification in Public Administration Business Processes
1 Introduction
2 State of the Art
3 Methodology
4 Case Study
5 Conclusion
References
Software Reuse Enabled by Machine Learning Based Source Code Analysis: A Case for Automated Classification of OpenSource Software with Respect to Requirements
1 Introduction
2 Related Work
3 Methodology
4 Implementation
4.1 Bert - Bidirectional Encoder Representations from Transformers
5 Results
5.1 Requirements Classification
5.2 Code Classification
6 Conclusions
References
Towards Machine Learning Enabled Analysis of Urban Mobility of Electric Motorbike: A Case Study for Improving Road Manteinance and Driver's Safety in La Coruna City
1 Introduction
2 Dataset Description
3 User Behaviour Analysis
4 Geographical Analysis
5 Conclusions
References
Towards Semantic Description of Symbology and Heraldry Using Ontologies
1 Introduction
2 Application Domain
3 Symbology and Heraldry: Semantic Description Through Ontologies
4 Conclusion
References
ECListener: A Platform for Monitoring Energy Communities
1 Introduction
2 The Architecture
3 The Physical Platform
4 Creating the Corpus
5 Creating the Ontology
6 Building the Ontology
7 Data Analysis
7.1 The Software Suite
8 Conclusion
References
Porting of Semantically Annotated and Geo-Located Images to an Interoperability Framework
1 Introduction
2 State of Art
3 The Case Study
3.1 The MARA Framework
3.2 The Cleopatra Project
4 Implementation
4.1 IIIF Semantic Annotation
4.2 Geo-localization in an IIIF Manifest
5 Conclusion
References
Efficient Content Sharing Using Dynamic Fog in Cloud-Fog-Edge Three-Tiered Network
1 Introduction
2 Basic Technologies and Related Works
2.1 Fog Computing
2.2 Edge Computing
2.3 Wi-Fi Direct
2.4 Bluetooth
2.5 Hybrid Peer-to-Peer Networking
2.6 Supernode Peer-to-Peer Networking
2.7 Conventional Systems and Their Problems
3 Proposed System
3.1 Overall Operation Procedure of the Proposed Scheme
3.2 Selection Procedure for Terminals Forming Dynamic Fog
3.3 Dynamic Fog Configuration Terminal Operation Procedure
3.4 Operation Procedure of Normal Terminal
3.5 Content Request Operation Procedure for Each Terminal
4 Evaluation
4.1 Condition of the Evaluation
4.2 Result of the Simulation
5 Conclusion
References
Study on the Comparison of Consumer Impression of E-commerce and Real Stores in the Fashion Tech Era, and the Effectiveness of VR Utilization
1 Introduction
2 Case Study of Digital Technology Utilization in E-commerce and Real Stores
2.1 Specific Use Cases in Japan
2.2 Comparison with Overseas Cases
3 Awareness Survey on E-commerce and Real Stores
3.1 Investigation Result
3.2 Discussion of Survey Results
4 Awareness Survey VR Utilization
5 Future Work
References
Introducing Speaker Vectors for Child Speech Synthesis in Neural Vocoders
1 Introduction
2 Neural Vocoder
2.1 Parallel WaveGAN
2.2 HiFi-GAN
3 Proposed Method
3.1 Speaker Embedding
3.2 Binary Vector
4 Evaluation Experiment
4.1 Experimental Conditions
5 Additional Experiment
5.1 Experimental Conditions
5.2 Experimental Results
6 Conclusion
References
Code Modification Problems for Multimedia Use in JavaScript-Based Web Client Programming
1 Introduction
2 Review of Code Modification Problem
2.1 Definition of Code Modification Problem
2.2 CMP Instance Generation Procedure
2.3 Example of CMP Instance Generation
2.4 Answer Interface
3 Code Modification Problem for Multimedia Use
3.1 CMP Instances for Multimedia Use
3.2 Solution Results
4 Conclusion
References
Design and Implementation of an Immersive Network Collaborative Environment Using OpenPose with 360VR Camera and WebXR
1 Introduction
2 Related Work
3 Research Outline
3.1 360VR Camera
3.2 OpenPose
3.3 Model Making
4 System Implementation and Experiments
4.1 System Implementation
4.2 Results
5 Conclusions
References
Dental Treatment Training System Using Haptic Device and Its User Evaluations
1 Introduction
2 Related Work
3 Preparation for Original System
3.1 IntelligentBox
3.2 Phantom Device
4 First System
4.1 Loop Subdivision
4.2 Collision Detection
4.3 Shape Deformation
5 Previous System After Solving Problems of First System
5.1 Problems and Solutions
5.2 Implementation Results
6 Latest System After Solving Problems of Previous System
6.1 Problems and Solutions
6.2 Additional Improvement
7 User Evaluations
8 Concluding Remarks
References
Author Index
đ SIMILAR VOLUMES
<p><p>This book gathers the proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), held on June 28âJune 30, 2017 in Torino, Italy.</p><p>Software Intensive Systems are characterized by their intensive interaction with other systems, sen
<p><p></p><p>This book presents scientific interactions between the three interwoven and challenging areas of research and development of future ICT-enabled applications: software, complex systems and intelligent systems.</p><p>Software intensive systems heavily interact with other systems, sensors,
<p><span>This book aims to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: software intensive systems, complex systems and intelligent systems.</span></p><p><span>Software intensive systems ar
<p></p><p>This book explores three interwoven and challenging areas of research and development for future ICT-enabled applications: software intensive systems, complex systems and intelligent systems. </p><p>Software intensive systems are systems that extensively interact with other systems, sensor
<p><p></p><p></p><p>This book provides a platform of scientific interaction between the three challenging and closely linked areas of ICT-enabled-application research and development: software intensive systems, complex systems and intelligent systems.</p><p>Software intensive systems strongly inter