๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computational Science and Its Applications - ICCSA 2016, part 5


Publisher
Springer
Year
2016
Tongue
English
Leaves
662
Series
Springer Lecture notes in computer science 9790
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Preface......Page 6
Organization......Page 7
Contents โ€“ Part V......Page 23
1 Introduction......Page 28
2 Related Work......Page 29
3.1 Proposed Algorithm......Page 31
4 Implementations and Results......Page 32
4.1 Discussion......Page 36
References......Page 37
1 Introduction......Page 39
2 Related Work......Page 40
3.2 Sentiment Analysis of Tweet......Page 42
4 Implementation and Results......Page 43
4.2 Location Interest......Page 44
4.3 Comparison of Data of Different Countries......Page 46
4.4 Discussion......Page 48
References......Page 49
1 Introduction......Page 51
3 Proposed Mechanism for Agriculture Ontology Structure Maintenance......Page 53
3.1 Ontology Preliminaries......Page 54
3.2 Supported Structural Modifications......Page 55
3.3 Propagation Strategy for Modifications......Page 56
3.4 Consistency Maintenance and Knowledge Inference......Page 57
4 Implementation Overview......Page 58
4.2 T-Box Editing and Real-Time Consistency Check......Page 59
4.4 Feedback, Help and Support......Page 60
5.1 Evaluation Methodology......Page 61
5.2 Statistical Analysis Based on Task Completion Time......Page 62
5.3 Statistical Analysis Based on Questionnaires......Page 63
5.4 User Comments and Suggestions......Page 64
References......Page 65
1 Introduction......Page 67
2 The Software Project Scheduling Problem......Page 68
2.1 Model Description......Page 69
3 Firefly for Schedule Software Project......Page 71
4 Experimental Results......Page 73
4.1 Comparative Results with Other Techniques......Page 74
References......Page 75
1 Introduction......Page 77
2 Background......Page 79
3 The Baseline DSL for Code Generation......Page 80
References......Page 85
1 Introduction......Page 87
2 Related Work......Page 89
3 Methodology for Artist Ranking......Page 91
3.1 Developed Rankings......Page 93
4.1 Perennial Ranking......Page 95
4.3 Trend Ranking......Page 96
4.4 General Ranking......Page 98
4.5 Relationship Between Constructed Rankings and Industry Rankings Phonographic......Page 99
5 Conclusion......Page 101
References......Page 103
1 Introduction......Page 104
2 Manufacturing Cell Design Problem......Page 106
3.4 Metaheuristic Parameters......Page 107
3.5 The Algorithm......Page 108
4 Experimental Results......Page 109
5 Conclusions and Future Work......Page 111
References......Page 112
1 Introduction......Page 114
2 Review in Amin et al.'s Scheme......Page 115
2.2 Login Phase......Page 116
3 Security Analysis of Amin et al.'s Scheme......Page 117
3.3 User Impersonation Attack......Page 118
4.1 Registration Phase......Page 119
4.3 Authentication Phase......Page 120
4.4 Password Change Phase......Page 121
5 Security Analysis of Proposed Scheme......Page 122
References......Page 125
1 Introduction......Page 127
2 Syntax......Page 129
3 Semantics......Page 131
4 Literature Review......Page 137
References......Page 139
1 Introduction......Page 142
2 Langauge Model......Page 145
3 Type Systems......Page 147
4 Literature Review......Page 151
References......Page 153
1 Introduction......Page 156
2 The Weighted Set Cover Problem......Page 157
3.1 Initialization......Page 158
4 Binary Invasive Weed Optimization......Page 159
5.2 Computational Results......Page 161
References......Page 163
1 Introduction......Page 166
2.1 Characteristics (Aspects) from ISO/IEC 25010:25010......Page 167
3 Software Architectures......Page 168
4 Cathedral, Bazaar, or Town......Page 169
5 Software Confederations......Page 170
5.1 Encapsulation/Wrapping......Page 171
5.2 Towards a Town......Page 173
5.3 Access Points......Page 177
6 Confederations and Software Quality Aspects......Page 178
8 Conclusions......Page 180
References......Page 181
1 Introduction......Page 183
2 Related Works......Page 185
3 Tribes Optimization Algorithm......Page 186
4 The Proposed Localization Algorithm......Page 187
4.2 Initial Node Position......Page 188
4.3 Node Position Refinement......Page 189
5 Results......Page 191
6 Conclusion......Page 195
References......Page 196
1 Introduction......Page 198
2.1 The Diet Problem......Page 199
2.3 Evolutionary Algorithms......Page 200
2.4 Differential Evolution......Page 201
3 Caloric Restricted Diet Problem......Page 203
3.1 Food Database......Page 204
4.2 Penalty Function......Page 205
4.3 Population Initialization, Mutation, Crossing, and Evolution......Page 206
5.2 Results and Discussion......Page 207
5.3 Example Diets......Page 211
References......Page 212
1 Introduction......Page 214
2 State of Art......Page 215
3.2 Success Predictions......Page 218
4.1 Experiments - Phase 01......Page 220
4.2 Experiments - Phase 02......Page 222
5 Conclusions and Future Works......Page 224
References......Page 225
1 Introduction......Page 228
2 Related Work......Page 230
3 Revised E-CARGO Model......Page 231
4 Formalization of the Problem......Page 234
5.1 The Solution......Page 237
5.2 Simulations......Page 238
5.3 Performances......Page 239
6 Case Study......Page 241
References......Page 243
1 Introduction......Page 245
2 Related Works......Page 247
3 Solution's Architecture......Page 248
4 UFRN's Service API......Page 250
4.2 Applications......Page 251
5 Conclusion and Future Works......Page 253
References......Page 254
1 Introduction......Page 255
2 Problem Description......Page 256
3 Binary Cat Swarm Optimization......Page 257
3.2 Tracing Mode......Page 258
4.2 Transfer Functions......Page 259
5.1 Repair Operator......Page 260
5.2 Parameter Setting......Page 261
6 Results......Page 262
References......Page 265
1 Introduction......Page 268
2 Related Work......Page 269
3 Analytical Data Models for Business Processes......Page 272
4 Demonstration Case......Page 275
5 Conclusions......Page 281
References......Page 282
Abstract......Page 284
1 Introduction......Page 285
2 Related Work......Page 286
3.1 Working Algorithm of AVNM......Page 288
3.2 Descriptive AVNM......Page 290
4 Experimental Study......Page 293
4.1 Experimental Results Using UCI Datasets......Page 294
4.2 Experimental Results with Manual Dataset......Page 295
References......Page 296
1 Introduction......Page 298
2 Related Work......Page 299
3 Common Data Framework......Page 300
4 Data Cubes for Analytical Data Models......Page 301
5 Demonstration Case......Page 306
6 Discussion of Results and Conclusions......Page 312
References......Page 313
1 Introduction......Page 315
2 The Standard for Portfolio Management from PMI......Page 317
3.1 Elementary Dependency Analysis......Page 319
3.2 Portfolio Processes Dependencies......Page 320
3.3 Portfolio Processes Centric Dependency Analysis......Page 321
3.4 Process Groups Centric Dependency Analysis......Page 322
4 Conclusions and Future Work......Page 324
References......Page 327
1 Introduction......Page 328
2.1 The Concept of JEPD......Page 329
2.2 The Theory of RCC......Page 330
3 A New Theory Extended from RCC......Page 331
4 Reasoning with ERCC and OWL......Page 332
4.1 Ontology in OWL Based on ERCC......Page 333
4.2 Rule-Based Reasoning System with ERCC and OWL......Page 336
5 Conclusion......Page 337
References......Page 338
1 Introduction......Page 339
2.1 Non-word Errors......Page 340
3 Related Work......Page 341
4.1 System Architecture......Page 342
4.2 Prepared Data......Page 343
4.3 Our Approach......Page 344
5 Experimental Results......Page 345
References......Page 347
1 Geographic Information, Web 2.0 and Tourism......Page 350
2 The Role of Virtual Communities in the Production and Communication Systems of Tourist Information......Page 353
3 Experiences of Virtual Community to Comparison: For a Model of Social Interaction......Page 356
4 What Prospects in Key Geographical?......Page 360
References......Page 361
1 Introduction......Page 364
2.1 Spreading Processes......Page 365
2.2 Canonical Names......Page 367
3 Related Work......Page 368
4 Methodology......Page 369
5 Results and Discussion......Page 370
6 Conclusions and Future Work......Page 375
References......Page 376
1 Introduction......Page 377
2 Crucial Requirements......Page 378
4 SOA Enabling to Meet the Requirements......Page 379
5.1 Commodity Consumption Control......Page 383
5.3 Operation-Oriented User Interface......Page 384
5.4 Confederations in Action......Page 385
7 Further Research......Page 386
8 Conclusions......Page 387
References......Page 388
1 Introduction......Page 390
3 Analysis of Projects......Page 391
4 Results......Page 394
References......Page 401
1 Introduction......Page 402
1.1 Survey Organization......Page 403
2 State of Art Large Scale Datasets......Page 404
3 Literature Review on Large Scale Image Geocoding......Page 405
4 Discussing Performance Metrics......Page 407
5 Conclusions......Page 409
References......Page 410
1 Introduction......Page 413
2 How to Provide Personalization in E-Learning Systems with IEEE LOM Metadata Standard......Page 414
3.1 Learning Object Evaluation with IEEE LOM Metadata Standard......Page 418
3.2 Matching Learning Objects and Learners......Page 421
4 Discussion and Conclusion......Page 423
References......Page 424
1 Introduction......Page 425
3 Proposed Methodology......Page 426
4.3 Story and Story Diagram......Page 427
5.2 Stakeholder-Parameter Relevance......Page 429
6.1 Parameter Values and Ranges......Page 430
7.1 Parameter Ranks......Page 431
8 Design......Page 432
8.2 Combined Functionality Rank Diagram (CFRD)......Page 433
References......Page 434
1 Introduction......Page 437
2 Program Transformation Semantics......Page 438
2.2 AsyMp Semantics......Page 439
2.3 FAsyMp Syntax......Page 440
2.4 FAsyMp Semantics......Page 441
2.5 Transformation from AsyMp to FAsyMp syntax......Page 443
3 Literature Review......Page 445
5 Conclusion......Page 446
References......Page 447
1 Introduction......Page 449
2 The Scrum......Page 450
3.2 The Survey......Page 451
3.3 Case Study......Page 452
3.4 Assigning Weights to the Different Roles in the Team and to the Different Scrum Roles......Page 453
4.1 About the Sample......Page 454
4.2 Benefits/Constraints of Using Scrum......Page 455
4.3 Existence and Relevance of Scrum Roles: Product Owner and Scrum Master and the Artifact Scrum Board......Page 456
4.5 Events that Were Taken into Account......Page 457
4.8 Suggested Methodologies for the Replacement of Scrum......Page 458
4.9 Hypothesis Analysis......Page 459
4.10 Analysis of the Hypotheses with Weight Attribution to Variables......Page 460
5.1 Conclusion......Page 462
Acknowledgment......Page 463
References......Page 464
1 Introduction......Page 465
2.1 Average Confidence (CM)......Page 466
2.3 Chi-Square Coefficient (2)......Page 467
2.5 PMING Distance......Page 468
3 Clustering Algorithms......Page 470
3.1 Expectation-Maximization......Page 471
3.2 K-Means......Page 472
4.1 Data Sets Used for Experiments......Page 473
4.3 Experimental Tests and Clustering......Page 474
5 Conclusions......Page 477
References......Page 478
1 Introduction......Page 480
2.1 Recommender System......Page 481
2.2 Job Recommendation......Page 482
3 Rating Based Job Recommendation Framework......Page 483
3.1 Students Profiling and Similarity Matching......Page 484
3.2 Job Recommendation Based on Rating Prediction......Page 485
3.4 Job Recommendation Based on Interest Effectiveness......Page 486
4.1 Dataset......Page 487
4.3 Student Similarity Oriented Rating Prediction Based Job Recommendation......Page 488
4.4 Job Recommendation with Rating Support......Page 490
5 Conclusion......Page 491
References......Page 492
1 Introduction......Page 495
2.1 Telemedicine......Page 496
2.2 E-Health......Page 499
2.3 M-Health......Page 500
3 Our Solution......Page 501
4 Testing......Page 503
References......Page 505
1 Introduction......Page 507
2 Related Works......Page 508
3 Methodology......Page 509
3.2 The Concept......Page 510
3.4 The Lattice......Page 511
3.5 The Criminal Data and Environmental Data......Page 512
3.6 Obtaining the Dependencies......Page 514
4 Generating the Lattice......Page 515
5 Conclusions......Page 521
References......Page 522
1 Introduction......Page 524
2 Review of Existing Framework for Combating Cybercrime......Page 526
3.1.1 Survey of Cybercrimes in Nigeria......Page 528
3.1.3 Mathematical Model for the System......Page 530
3.2 The System Algorithm......Page 531
3.4 The Network Design Concept for the System......Page 532
3.5.1 The Users......Page 535
3.5.2 The Control Center......Page 536
5 Conclusion and Recommendations......Page 538
References......Page 539
1 Introduction......Page 540
2 Spectral Clustering......Page 541
3.1 Text Content......Page 544
3.3 Combined Representation......Page 545
4 Evaluation of Combined Representation......Page 547
5 Results Discussion......Page 550
References......Page 554
1 Introduction......Page 557
2.1 Repairs......Page 558
2.2 Repair Checking......Page 560
3.1 Inconsistency Reduction Checking by Integrity Checking......Page 562
3.3 The Main Theorems......Page 564
4.1 Computing Total Repair Checking......Page 565
4.2 Computing Naive Repair Checking......Page 566
4.3 Computing Repair Checking by Integrity Checking......Page 567
5 Related Work......Page 568
References......Page 569
1 Introduction......Page 571
2.1 Integrated Scenarios......Page 572
2.2 Temporal Queries......Page 574
2.3 TEMPORANA Architecture......Page 575
2.4 An Example of Advanced Temporal Scenario Query......Page 576
References......Page 577
1 Introduction......Page 579
2.1 Sentence Similarity Measures......Page 581
2.2 Sentence Similarity Datasets......Page 583
2.3 Sentence Similarity Measures Applications......Page 585
3 Rationale......Page 586
4.1 Semantic Word Error Rate......Page 587
4.2 Latent Semantic Analysis......Page 588
5 Experimental Analysis......Page 589
6 Conclusions and Future Work......Page 590
References......Page 591
1 Introduction......Page 594
2.2 Business Intelligence Systems in Vietnam......Page 596
2.3 Critical Success Factors......Page 597
3.1 Research Purpose......Page 598
3.2 Research Framework......Page 599
4.1 Sample Design......Page 600
4.3 Data Analysis......Page 601
5.1 Background to Implementing the BIS......Page 603
5.2 Case Analysis Based on Seven CSFs of Research Framework......Page 604
6.1 Summary of Main Findings......Page 605
6.2 Discussion and Implications......Page 607
6.3 Recommendations......Page 609
References......Page 610
1 Introduction......Page 612
2 Related Work......Page 613
3 Comparing and Contrasting GA and PSO......Page 614
4 Particle Swarm Optimization Based Test Data Generation Using Mutation Testing......Page 615
5 Results......Page 618
References......Page 619
1 Introduction......Page 622
2 Interdependencies and Traceability......Page 623
3.1 Dependency Analysis of Activities and Tasks......Page 625
3.2 Dependency Analysis of Work Products and Tasks......Page 628
Acknowledgments......Page 632
References......Page 633
1 Introduction......Page 635
2 The Culture of the Commons......Page 637
3 Networked Concepts: Exploring Meanings......Page 639
4 City and Citizenship......Page 641
5 City as Commons......Page 644
6 Conclusions......Page 647
References......Page 648
1 Introduction......Page 651
2.1 Study Area......Page 652
2.2.1 Land Surface Temperature......Page 653
3.1 The Fire Potential Index......Page 654
3.1.1 The Calculation the DFMC......Page 655
4 Results......Page 657
4.1 Model Validation......Page 658
References......Page 659
Author Index......Page 661


๐Ÿ“œ SIMILAR VOLUMES


Computational Science and Its Applicatio
โœ Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. To ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.<br> Apart from the general tracks, ICCSA 2018 also includes 34 international

Computational Science and Its Applicatio
โœ Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. To ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.<br> Apart from the general tracks, ICCSA 2018 also includes 34 international