<span>The book presents advancements in computational intelligence in perception with healthcare applications. Besides, the concepts, theory, and applications in various domains of healthcare systems including decision making in healthcare management, disease diagnosis, and electronic health records
Computational Science/Intelligence & Applied Informatics (Studies in Computational Intelligence, 787)
â Scribed by Roger Lee (editor)
- Publisher
- Springer
- Year
- 2018
- Tongue
- English
- Leaves
- 191
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book presents the outcomes of the 5th ACIS International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2018), which was held on July 10â12, 2018 in Yonago, Japan. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, to share their experiences, and to exchange new ideas and information in a meaningful way. All aspects (theory, applications and tools) of computer and information science, the practical challenges encountered along the way, and the solutions adopted to solve them are all explored here.
The conference organizers selected the best papers from among those accepted for presentation. The papers were chosen on the basis of review scores submitted by members of the program committee and subsequently underwent further rigorous review. Following this second round of review, 13 of theconferenceâs most promising papers were selected for this Springer (SCI) book. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.
⊠Table of Contents
Foreword
Contents
Contributors
GUI Testing for Introductory Object-Oriented Programming Exercises
1 Introduction
2 Related Work
3 JavaFX
4 Perquisites on Exercises
5 Proposed Method and Implementation
5.1 AUT and Tester
5.2 Testing Method
5.3 Scoring Method
5.4 Limitations
6 Evaluation
6.1 Developing Testers
6.2 Executing Testers
7 Conclusion
References
Python Deserialization Denial of Services Attacks and Their Mitigations
1 Introduction
2 Related Researches
2.1 Java Deserialization Vulnerabilities
2.2 Python Deserialization Vulnerabilities
3 Background
3.1 Pickle Module Warning
3.2 Pickle Protocols
3.3 Pickle Virtual Machine's Overview
3.4 Process of Unpickling
4 DoS Attacks Using Unpickling
4.1 A DoS Attack
4.2 Memory Consumption of Python Objects in the Stack
4.3 Impact
4.4 Mitigations
5 Conclusion
References
A Branch-and-Bound Based Exact Algorithm for the Maximum Edge-Weight Clique Problem
1 Introduction
2 Formulations in Mathematical Programming
2.1 Quadratic Programming
2.2 Integer Programming
2.3 Mixed Integer Programming
3 Branch-and-Bound for MWCP
3.1 ĂstergĂ„rd's Algorithm
3.2 Longest Path Method
4 Our Algorithm EWCLIQUE
4.1 Branch-and-Bound for MEWCP
4.2 Outline of EWCLIQUE
4.3 Main Routine
4.4 Subroutine EXPAND
4.5 Upper Bound Calculation
4.6 Vertex Renumbering
5 Numerical Experiments
5.1 Random Graphs
5.2 DIMACS Benchmark Graphs
6 Conclusion
References
A Software Model for Precision Agriculture Framework Based on Smart Farming System and Application of IoT Gateway
1 Introduction
2 Framework
2.1 Objectives of IoT Platform in Farm
2.2 Objectives of IoT Platform in Farm
2.3 Design Decision
3 Agriculture
3.1 IoT Gateway
3.2 Precision Farming
3.3 Concept of Cloud Service
4 Result and Evaluation
4.1 UAV Flight Planning
4.2 IoT Gateway Implementation
4.3 Assessment
5 Conclusion
References
Components of Mobile Integration in Social Business and E-commerce Application
1 Introduction
2 Background of the Study
2.1 Software Reuse
2.2 Component Based Development
2.3 Social Business Systems
2.4 Business and Finance
3 Social Business System Modeling
3.1 Component Identification
3.2 Component Interaction
3.3 Component Specification
4 Mobile Integration in Social Business and E-commerce Application
4.1 UML Modeling Technique
4.2 Implementation
5 Conclusion
References
Design and Evaluation of a MMO Game Server
1 Introduction
2 Related Works
2.1 Structure of Game Server
2.2 Packet Design and Processing
2.3 Optimization and Synchronization
3 Implementation of a MMO Game Server
4 Performance Evaluation Using Stress Test
4.1 Hotspot Simulation
4.2 Simulation of Maximum Concurrent Connection
4.3 Simulation of Maximum Concurrent Connection Except Visual Field Processing
5 Conclusion
References
A Study on the Characteristics of Electroencephalography (EEG) by Listening Location of OLED Flat TV Speaker
1 Introduction
2 Related Works and Background Principal
2.1 Speakers and Sound
2.2 Electroencephalography (EEG) Test
3 Proposed Direct Drive Plat Panel Speaker
4 Experiment and Result
5 Conclusion
References
A Study on the Design of Efficient Private Blockchain
1 Introduction
2 Theoretical Backgrounds
2.1 Definition of Blockchain
2.2 Features of Blockchain
2.3 Structure of Blockchain
2.4 Principle of Blockchain
3 Precedent Studies
3.1 Types and Features of Blockchain
3.2 Problems with Private Blockchain
3.3 Considerations upon the Design of Private Blockchain
4 Study Direction and Results
4.1 Hyperledger Fabric of IBM
4.2 Corda of R3 REV
4.3 Nexledger of Samsung SDS
4.4 Loopchain of Theloop
4.5 Comparison and Implication of Representative Private Blockchain
5 Improvement of Effective Private Blockchain Design
5.1 Consensus Algorithm
5.2 Strengthen Security Vulnerabilities and Speed up Processing
5.3 Software Vulnerability Validation and Service Performance Measurement Test
5.4 Critical Perspective on Private Blockchain
5.5 Application Example and Trend of New Blockchain and Technology
6 Conclusion and Future Research
References
Designing System Model to Detect Malfunction of Gas Sensor in Laboratory Environment
1 Introduction
2 Related Work
2.1 Internet of Things (IoT)
2.2 R
2.3 Correlation Regression Analysis
2.4 Decision Tree
3 System Model and Methods
3.1 System Model
3.2 Data Collection and Purification
3.3 Correlation Regression Analysis
3.4 Decision Tree
4 Conclusion and Discussion
References
Design of Device Mutual Authentication Protocol in Smart Home Environment
1 Introduction
2 Related Works
2.1 Security Threats of Smart Home
2.2 Device Authentication Technology
2.3 Block Chain Technology
3 Design of Device Mutual Authenticaion
3.1 Device Registration Process
3.2 Device Authentication Process
4 Mutual Authentication Experiment
5 Conclusion
References
A Study of Groupthink in Online Community
1 Introduction
2 Literature Review
2.1 Historical Research of Groupthink
2.2 Groupthink in Online Communities
3 Research Model and Hypothesis
4 Research Method and Analysis Results
4.1 Demographic
4.2 Reliabilities Analysis
4.3 Factor Analysis
4.4 Confirmatory Factor Analysis
4.5 Hypothesis Testing
5 Conclusion
5.1 Limitation
5.2 Future Research
References
Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment
1 Introduction
2 Related Work
3 Design of Unidirectional Security Gateway
3.1 Design of Unidirectional Security Gateway Hardware
3.2 Design of DB Replication Using CDC in Unidirectional Security Gateway
3.3 Design of the Retransmission Techniques for Non-transport DB Queries
4 Experimental Result
4.1 Verification for Unidirectional Tx/Rx Dedicated NIC
4.2 Verification for Unidirectional Transmit/Receive TCP Proxy
4.3 Verification CDC-Based DB Replication Transmission Proxy Module
5 Conclusions
References
Design and Implementation of Security Threat Detection and Access Control System for Connected Car
1 Introduction
2 Automotive Connectivity
3 Security Vulnerability
4 Whitelist-Based Access Control Mechanism
4.1 Access Control Mechanism
5 Conclusions
References
Author Index
đ SIMILAR VOLUMES
<p>This book gathers the outcomes of the 6th ACIS International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2019), which was held on May 29â31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researchers and scientists, businesspeople and en
1 online resource (xiii, 232 pages) :
<span>The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informa
<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco