𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer and Information Science (Studies in Computational Intelligence)

✍ Scribed by Roger Lee (editor)


Publisher
Springer
Year
2014
Tongue
English
Leaves
214
Series
Studies in Computational Intelligence
Edition
2015
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

The conference organizers selected the best papers from those papers accepted for presentation at the conference.Β  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

✦ Table of Contents


Foreword
Contents
Contributors
1 A New Method of Breakpoint Connection for Human Skeleton Image
1 Introduction
2 Image Preprocessing
3 Basic Elements
3.1 Neighborhood Layer
3.2 Upper Left Neighborhood and Lower Right Neighborhood
3.3 Breakpoint Type
3.4 Available Connection Point
4 Breakpoint Connection Function
4.1 Ξ”W = 0
4.2 Ξ”W neq 0
5 Procedure of Breakpoint Connection
5.1 Search Skeleton Breakpoint
5.2 Search Available Connection Point
5.3 Connect Breakpoint
6 Experimental Results
7 Conclusion
References
2 Insult Detection in Social Network Comments Using Possibilistic Based Fusion Approach
1 Introduction
2 Fusion Based on Possibilistic Context Extraction
3 Experiments
4 Conclusion
References
3 What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model
1 Introduction
2 Background
2.1 Software Historical Repositories
2.2 Topic Model
3 Approach
3.1 Extracting Related Information from Bug Repositories and Communication Archives
3.2 Extracting Related Information from Source Control Repositories
4 Evaluation
4.1 Empirical Setup
4.2 Empirical Results
5 Conclusion and Future Work
References
4 Evaluation Framework for the Dependability of Ubiquitous Learning Environment
1 Introduction
2 Ubiquitous Learning Scenario Challenges
3 What Can We Evaluate in Ubiquitous Learning Scenario?
4 Evaluation of Ubiquitous Learning Scenarios: Related Works and Issues
5 ReStart-Me: A Formal Evaluation Framework For U-Learning
5.1 ReStart-Me Challenges
5.2 Conceptual Framework
6 Experiment and Results
6.1 Case Study
6.2 Modelisation and Evaluation
6.3 Results and Discussion
7 Conclusion
References
5 Improving Content Recommendation in Social Streams via Interest Model
1 Introduction
2 Related Work
3 Multiaspect Similarity of Interest
3.1 Interest Model
3.2 Tie-Strength
3.3 Calculate Scores
4 Dataset and Experiment
5 Discuss
5.1 Followees Division
5.2 Interest Model and Tie-Strength
5.3 Stability of Algorithms
6 Conclusion and Future Work
References
6 Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks
1 Introduction
2 Related Work
3 Attacks on the AODV Routing Protocol
3.1 An Overview of AODV Routing Protocol
3.2 Classification of Attacks
4 Unsupervised Learning Techniques
4.1 Clustering Techniques
4.2 Principal Component Analysis
4.3 One-Class SVM
5 Experiments
5.1 Features Selection
5.2 Experiment Overview
5.3 Experiment Setup
5.4 Experimental Results
6 Conclusions
References
7 Live Migration Performance Modelling for Virtual Machines with Resizable Memory
1 Introduction
2 Related Works
3 Model of Live Migration
4 Live Migration on Xen
5 Performance Measurement and Discussion
5.1 Bounds on Live Migration
5.2 Live Migration Under Reading Access
5.3 Memory Resizing
6 Conclusion
References
8 A Heuristic Algorithm for Workflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources
1 Introduction
2 Basic Definitions and MLTH Problem
3 A Heuristic Algorithm for the MLTH Problem
3.1 Local Algorithm
3.2 Interconnect Algorithm
4 Evaluation
4.1 Simulation Setup
4.2 Result
5 Conclusion and Future Work
References
9 Novel Data Integrity Verification Schemes in Cloud Storage
1 Introduction
2 Related Work
3 The Novel Schemes
3.1 DIV-I Scheme
3.2 DIV-II Scheme
4 Experiment and Analysis
4.1 Experiment Environment and Assumptions
4.2 Results and Analysis
5 Conclusion and Future Work
References
10 Generation of Assurance Cases for Medical Devices
1 Introduction
2 Assurance Case and Its GSN Notation
3 Development Process for GIIP
4 Related Work
5 Conclusion and Future Work
References
11 A Survey on the Categories of Service Value/Quality/Satisfactory Factors
1 Introduction
2 Emprical Collection of Factors
3 Organization of the Categories
3.1 Classification According to Consistent'' VersusBalanced''
3.2 Under Consistent'' Category: Classification According toNormal Environment'' Versus (Plus) Service Network'' 3.3 UnderNormal Environment'' Category: Classification According to Content Related and Quality'' VersusExtension on Restrictions and Output''
3.4 Under Content Related and Quality'' Category: Classification According toService Set'' Versus Service System'' 3.5 UnderService System'' Category: Classification According to Information'' VersusFunctional''
3.6 Under Service Set'' Category: Classification According toService Content'' Versus Service Implementation'' 3.7 UnderService Content'' Category: Classification According to Basic'' VersusSupplement''
3.8 Under Basic'' Category: Classification According toDescription & Creation'' Versus Observation & Extension'' 3.9 UnderDescription & Creation'' Category: Classification According to Proactive'' VersusPassive''
4 Conclusion and Future Work
References
12 Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements
1 Introduction
2 Related Works
2.1 Software Product Line (SPL) for Mobile
2.2 Variability and Documentation
2.3 OVM, A Closer Look
3 Mobile Business Domain Modeling (MBDM)
3.1 MBDM Domain Definition
3.2 Domain Modeling
3.3 Domain Design
4 Conclusion and Future Work
References
13 A New Modified Elman Neural Network with Stable Learning Algorithms for Identification of Nonlinear Systems
1 Introduction
1.1 Literature Review
1.2 Contributions
1.3 Paper Organization
2 New Modified Elman Neural Network (OIFHO ENN)
3 Convergence of Output to Input Feedback, Hidden to Output Elman Neural Network (OIFHO ENN)
4 Simulation Results
4.1 Application to Model I
4.2 Application to Model II
4.3 Application to Model III
4.4 Application to Model IV
5 The Identification Error
6 Conclusion
References
14 A Simple Model for Evaluating Medical Treatment Options
1 Introduction
2 Conceptual Model for Evaluating Treatment Options
3 Formal Model
4 An Example
5 Model Behaviour
6 Alternative Approaches
7 Model Implementation in Psychiatry
8 Conclusion
References
Author Index


πŸ“œ SIMILAR VOLUMES


Intelligent Computing and Block Chain (C
✍ Wanling Gao πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the Second BenchCouncil International Federated Intelligent Computing and Block Chain Conferences, FICC 2020, held in Qingdao, China, in October/ November 2020.</span><p><span>The 32 full papers and 6 short papers presented were

Computer and Information Science (Studie
✍ Roger Lee (editor) πŸ“‚ Library πŸ“… 2013 πŸ› Springer 🌐 English

<p><span>This edited book presents scientific results of the 12</span><span><sup>th</sup></span><span> IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together

Computer and Information Science 2021―Su
✍ Roger Lee (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This edited book presents scientific results of the 20th IEEE/ACIS International Summer Semi-Virtual Conference on Computer and Information Science (ICIS 2021) held on June 23–25, 2021 in Shanghai, China. The aim of this conference was to bring together researchers and scientists, businessmen

Computer and Information Science 2021 -
✍ Roger Lee (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This edited book presents scientific results of the 21th IEEE/ACIS International Fall Virtual Conference on Computer and Information Science (ICIS 2021-Fall) held on October 13-15, 2021, in Xi’an China. The aim of this conference was to bring together researchers and scientists, businessmen an

Cyber Security in Intelligent Computing
✍ Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sa πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco

New Technologies, Artificial Intelligenc
✍ Mohamed Tabaa (editor), Hassan Badir (editor), Ladjel Bellatreche (editor), Azed πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>This volume constitutes selected papers presented at the 10th International Conference on Innovation and New Trends in Information Technology, INTIS 2022, held in Casablanca, Morocco, in May 2022, and 11th International Conference on Innovation and New Trends in Information Technology, INTIS 2