𝔖 Scriptorium
✦   LIBER   ✦

📁

Computer and Information Science 2021 - Fall (Studies in Computational Intelligence, 1003)

✍ Scribed by Roger Lee (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
160
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This edited book presents scientific results of the 21th IEEE/ACIS International Fall Virtual Conference on Computer and Information Science (ICIS 2021-Fall) held on October 13-15, 2021, in Xi’an China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications, and tools) of computer and information science and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 13 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

✦ Table of Contents


Preface
Organization
International Committee
ICIS2021-Fall
General Chair
Conference Co-chairs
Program Co-chairs
Local Arrangement Chairs
Finance Chairs
Publicity Chairs
Registration Chairs
Program Committee Members
Contents
List of Contributors
Automatic Speech Recognition for Portuguese with Small Data Set
1 Introduction
2 System Design
3 Platform Selection
4 Portuguese ASR Implementation
5 Results and Discussions
6 Conclusion
Reference:s
Service Bursting Based on Binary PSO in Hybrid Cloud Environment
1 Introduction
2 Related Works
3 Applications Placement on Hybrid Cloud
3.1 Problem Formulation
3.2 Study Case
4 The Proposed BPSO Approach
5 Experimental Evaluation
5.1 IBM Dataset
6 The Reached Results
7 Conclusion and Potential Work Perspective
References
Profile Deviation Analysis of Global Firms’ Working Capital Management in the Automotive Industry During the Financial Crisis and Recovery Periods
1 Introduction
2 Literature Review and Theoretical Background
3 Research Design
4 Analysis and Discussion
4.1 Profile Deviation During the Global Financial Crisis Period (2008–2011)
4.2 Profile Deviation During the Global Financial Recovery Period (2012–2015)
4.3 Comparative Period Analysis
5 Conclusion
References
A Study on Strategic Plan for Convergence 6th Industry Policy
1 Introduction
2 Concept and Characteristics of the 6th Industry
3 Review of 6th Industry Prior Research
4 Analysis and Suggestions
4.1 Problems and Implications of the 6th Industry
4.2 Policy Support Strategy for the 6th Industry
5 Conclusion
References
Development of Air Pressure Measurement System of Suction Cups in a Vacuum Gripper
1 Introduction
2 Hardware Configuration for Condition Monitoring of Vacuum Gripper
3 The Developed Air Pressure Signal Acquisition System
4 Process Operation Deepening on Initial Pressure Value
5 Conclusion
References
Efficiency Assessment in Digital and Online Functions of University Libraries Using Data Envelopment Analysis
1 Introduction
2 Theoretical Background
2.1 Assessment of Service Efficiency
2.2 Data Envelopment Analysis
2.3 Input and Output Variables
3 Research Method
3.1 Data Collection
4 Data Analysis
5 DEA Result Analysis
6 Conclusions
References
A Study on Airport Service Improvement Using Service Design Process
1 Introduction
2 Theoretical Background
2.1 Trends in Non-face-to-face Services in the Aviation Industry
2.2 The Concept and Process of Service Design
3 Design Process of Airport Service
3.1 Change of Airport Service Environment
3.2 Persona Definition
3.3 Customer Journey Map
3.4 Service Concept and Improvement
4 Conclusion
References
Effect of Empirical Value of Untact Marketing on Consumer Satisfaction and Repurchase Intention: Centered on Service Application
1 Introduction
2 Theoretical Background and Hypotheses
2.1 Concept of Untact Marketing
2.2 Empirical Value
2.3 Consumer Satisfaction Level
2.4 Repurchase Intention
2.5 Research Model and Hypothesis
3 Plan for Investigation
4 Empirical Analysis
4.1 Descriptive Statistics and Reliability/Validity Analysis
4.2 Correlation Analysis Between Variables
4.3 Hypothesis Verification
5 Conclusions
References
A Study on the Influence on Intention to Use Blockchain-Based Copyright Contract
1 Introduction
2 Theoretical Background and Hypotheses
2.1 Digital Copyright Exchange
2.2 Copyright Integrated Management System (CIMS)
2.3 Blockchain Overview
2.4 Blockchain Structure
2.5 Digital Contents Market
2.6 Copyright Market
3 Research Method
3.1 Purpose of Research
3.2 Overview of Research Activities
3.3 Research Promotion Stage
3.4 Core Technology
4 Empirical Analysis
4.1 Contract Model Design Using Blockchain
4.2 Blockchain Contract Content Exposure Prevention Technology Research
4.3 Blockchain Contract-Based Copyright Contract Optimization Technology Research
5 Conclusions
References
A Study on the Direction of Beauty Tech Reflecting the Skin Characteristics of Koreans: Focused on Case Studies
1 Introduction
2 Theoretical Background
2.1 Definition and Characteristics of the 4th Industrial Revolution
2.2 Beauty Tech Industry
2.3 Skin Analysis and Skin Data
3 Research Method
3.1 Data Collection
3.2 Measurement
4 Result
4.1 Beauty Tech Case Analysis
4.2 FGI on Skin AI, Beauty Tech, Skin Evaluation Model Setting
4.3 Skin Types and Characteristics of Koreans Through Case Study
5 Conclusion
References
Technical Countermeasures Against Drone Communication Vulnerabilities
1 Introduction
2 Related Work
2.1 Jamming Attack
2.2 Spoofing Attack
2.3 Replay Attack
3 Drone Communication Vulnerability Anaysis
3.1 Drone Communication Vulnerability Attack Scenario
3.2 Basic Drone Communication Analysis
3.3 Drone Communication Vulnerability Verification
4 Drone Communication Vulnerability Response Plan
4.1 GPS Spoofing Attack
4.2 Account Exposure for FTP Communication
5 Conclusion
References
Localization in LoRa Networks Based on Time Difference of Arrival
1 Introduction
2 Related Work
3 Methodology
3.1 Localization Based on TDoA
4 Experimental Study
5 Conclusions
References
Author Index


📜 SIMILAR VOLUMES


Computer and Information Science 2021―Su
✍ Roger Lee (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This edited book presents scientific results of the 20th IEEE/ACIS International Summer Semi-Virtual Conference on Computer and Information Science (ICIS 2021) held on June 23–25, 2021 in Shanghai, China. The aim of this conference was to bring together researchers and scientists, businessmen

Cyber Security in Intelligent Computing
✍ Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sa 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco

Computer and Information Science (Studie
✍ Roger Lee (editor) 📂 Library 📅 2014 🏛 Springer 🌐 English

<p>This edited book presents scientific results of the 13<sup>th</sup> IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and e

Intelligent Computing and Block Chain (C
✍ Wanling Gao 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the Second BenchCouncil International Federated Intelligent Computing and Block Chain Conferences, FICC 2020, held in Qingdao, China, in October/ November 2020.</span><p><span>The 32 full papers and 6 short papers presented were

Computer and Information Science (Studie
✍ Roger Lee (editor) 📂 Library 📅 2013 🏛 Springer 🌐 English

<p><span>This edited book presents scientific results of the 12</span><span><sup>th</sup></span><span> IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together

Combating Fake News with Computational I
✍ Mohamed Lahby (editor), Al-Sakib Khan Pathan (editor), Yassine Maleh (editor), W 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book presents the latest cutting-edge research, theoretical methods, and novel applications in the field of computational intelligence techniques and methods for combating fake news.<b> </b>Fake news is everywhere. Despite the efforts of major social network players such as Facebook and Twit