<p>This edited book presents scientific results of the 13<sup>th</sup> IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and e
Computer and Information Science (Studies in Computational Intelligence, 493)
β Scribed by Roger Lee (editor)
- Publisher
- Springer
- Year
- 2013
- Tongue
- English
- Leaves
- 282
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them
The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.
Β
Β
β¦ Table of Contents
Preface
Contents
List of Contributors
Driversβ Behaviour Modelling for Virtual Worlds
1 Introduction
2 Road Rage
3 Driver Behaviour Modelling: Influencing Factors
3.1 Personality
3.2 Emotions
3.3 Social and Personal Attributes
3.4 Cognitive Reactions
4 Proposed Emotional Model
4.1 Architecture of the Model
4.2 Computation of the Intensities
4.3 Scenarios
5 Modelling the Behaviour
6 Conclusion and Future Work
References
Making Existing Reactive Systems Anticipatory
1 Introduction
2 Feasibility Analysis
3 Methodology
3.1 Target System
3.2 Phases
4 Case Study: Emergency Elevator Evacuation Systems
5 Case Study: Runway Incursion Prevention Systems
6 Case Study: Computing Services
7 Discussion
8 Concluding Remarks
References
Observations on Software Testing and Its Optimization
1 Introduction
2 Literature Review
2.1 Testing Should be Proactive, But Not Passive
2.2 Human Intelligence vs. Machine Automation
2.3 Automatic Augment
2.4 More Is Better
2.5 Test Reduction
2.6 Testing Interacting Artifacts
2.7 Exceptions and Consequences
2.8 Test Data/Input
2.9 Tests Refactoring
3 Discussion
3.1 Different Tests Are Required by Different Programs
3.2 Stateful
3.3 Test Evolution and Decay
3.4 Testing Has to Be Team Work
3.5 Testing Should Be Semi-Automatic
3.6 Code to Debugging/Testing
3.7 Testing is a Dynamic Multi-objective Optimization Problem
4 Conclusion and Future Work
References
Semantic Specialization in Graph-Based Data Model
1 Introduction
2 Directed Recursive Hypergraph Data Model
2.1 Fundamental Structure of DRHM
2.2 Specialization and Generalization
2.3 Semantic Generalization
3 Semantic Specialization
3.1 Description of Semantic Specialization
3.2 Fundamental Semantic Specialization
3.3 Improving Usability of Semantic Specialization
4 Considerations
5 Conclusion
References
Wearable Context Recognition for Distance Learning Systems: A Case Study in Extracting User Interests
1 Introduction
2 Context Recognition System
2.1 Image Enhancement
2.2 Geometric Feature Matching
2.3 Evaluation of User Interests
3 Experimental Results
4 Conclusion
References
An IDS Visualization System for Anomalous Warning Events
1 Introduction
2 Related Work
2.1 Works on Log Analysis
2.2 Work on Visualization
3 Visualization System Considering Order Relation of IP Addresses That Emphasize the Anomalous Warning Events
3.1 Log Analysis Method Using the Coefficient of Variance
3.2 Methods of Improved UnEqual Scaling Alert Matrix
4 Evaluation of Proposal Methods
4.1 Experiment Condition
4.2 Evaluation of the Number of Anomalous Warning Events
5 Conclusion
References
Affective Core-Banking Services for Microfinance
1 Introduction
2 Background
2.1 Empowering the Poor: Microfinance and Microenterprise
2.2 Mobile Banking
3 Core Banking System for Microfinance
3.1 MSDL: Microfinance Service Definition Language
3.2 Well-Behaved Banking Service Interface
3.3 ACMB Prototype Design for Evaluation
4 Implementation of the Prototype
5 Evaluation of ACMB Prototype
5.1 Findings
6 Conclusion
References
Shadow Detection Method Based on Shadow Model with Normalized Vector Distance and Edge
1 Introduction
2 Shadow Model
2.1 Shadow Model by Color Information
2.2 Shadow Model by Edge Information
3 Shadow Detection
3.1 Shadow Detection by Using Shadow Model
3.2 Refining Shadow Detection Result
4 Updating Shadow Model by Color Information
4.1 Obtaining Learning Data
4.2 Obtaining Initial Parameters for DPEM Algorithm
5 Experiments
6 Conclusion
References
Defect Classification of Electronic Board Using Multiple Classifiers and Grid Search of SVM Parameters
1 Introduction
2 Defect Classification Using Multiple Classifiers and Grid Search of Parameters
2.1 Definition of Class in Defect of Electronic Board
2.2 Detection of Defect Candidate Region
2.3 Feature Extraction and Selection
2.4 Co-occurrence Matrix
2.5 Classification into Multiple Classes
2.6 Grid Search
3 Experiment
3.1 Extraction of Defect Candidate Region
3.2 Classification Result
3.3 Incorrect Classification
4 Conclusion
References
Speeding Up Statistical Tests to Detect Recurring Concept Drifts
1 Introduction
2 Background
3 Parallel RCD
4 Experiments Configuration
5 Results
6 Conclusion
6.1 Future Work
References
A Concurrent Tuple Set Architecture for Call Level Interfaces
1 Introduction
2 Background
3 Related Work
4 Concurrent Tuple Set Architecture
4.1 CTSA Presentation
4.2 Proof of Concept
5 CTSA Assessment
6 Conclusions
References
Analog Learning Neural Network Using Two-Stage Mode by Multiple and Sample Hold Circuits
1 Introduction
1.1 Analog Neural Network
1.2 Pulsed Neural Network
1.3 Overview
2 SPICE
3 Three Layers Neural Network
4 Dynamical Learning Model
5 Conclusion
References
An Efficient Classification for Single Nucleotide Polymorphism (SNP) Dataset
1 Introduction
2 Related Work
2.1 Feature Selection
2.2 Classifiers
2.3 Feature Fusion Method (FFM)
3 Methods and Datasets
3.1 Datasets
3.2 Methods
4 Results
4.1 GSE16619 Series
4.2 GSE13117 series
5 Discussion and Conclusion
References
Construction Technique of Large Operational Profiles for Statistical Software Testing
1 Introduction
2 Technique Overview
2.1 Conventional Operational Profiles
2.2 Product Operational Profiles
2.3 Behavioral Constraints among Components
2.4 Generation Algorithm of Product Operational Profiles
3 Case Study
4 Related Work
5 Conclusion and Future Work
References
Intelligent Web Based on Mathematic Theory
1 Introduction
2 Background
2.1 Related Works
2.2 Basic Features
3 Composition of Web Service
3.1 Simple Services Composition Example
3.2 Infinite Loop Example
4 Distributed Global Service Compiler (DGSC)
4.1 Extraction of Service Grammar
4.2 Detect Cycle by DFS
4.3 Distributed Compiler Concept
4.4 Steps of DGSC Simulation
5 Conclusion and Future Works
References
Straightening 3-D Surface Scans of Curved Natural History Specimens for Taxonomic Research
1 Introduction
1.1 Medial Axis Estimators
1.2 Ridge Detectors
1.3 Paper Organization
2 The Spatial Depth Formulation
2.1 Selecting the Right Ο
3 Ridge Detection in 3D Space
4 Implementing Cannyβs Edge Detector in 3D
5 The Complete Algorithm
6 Experimental Result
7 Conclusions
References
Pipelined Multi-GPU MapReduce for Big-Data Processing
1 Introduction
2 Background
2.1 Big Data
2.2 Multi-GPU Architecture
2.3 MapReduce Programming Model
3 PMGMR System Design
3.1 Challenges of Big Data and Our Approach
3.2 Pipelined Multi-GPU Utilization
3.3 Fermi Pipelining Schemes
3.4 Kepler Pipelining Scheme
3.5 Runtime Tuning and Load Balancing
4 Experimental Results
4.1 Pipelining Scheme
4.2 Overall Performance
4.3 Runtime Optimization
5 Related Work
6 Conclusions and Future Work
References
A Study of Risk Management in Hybrid Cloud Configuration
1 Introduction
2 Hybrid Cloud Configuration
2.1 Reference Model of Cloud Computing
2.2 Hybrid Cloud
3 Risk Assessment in Hybrid Cloud Configuration
3.1 Extraction of Risk Factors
3.2 Risk Analysis in Hybrid Cloud Configuration
4 Risk Management in Hybrid Cloud Configuration
4.1 Risk Mitigation
4.2 Risk Transference
4.3 Risk Acceptance
4.4 Risk Avoidance
4.5 Summary of Risk Management Analysis Results
5 Conclusion
References
Agent-Based Social Simulation to Investigate the Occurrence of Pareto Principal in Human Society
1 Introduction
2 Backgrounds
2.1 Agent and Agent-Based Modeling
2.2 Pareto Principal
3 Building the Simulation Model
3.1 Human-Agent Model
3.2 Simulation Environment
3.3 Object-Oriented Implementation
3.4 Simulation
4 Results
5 Conclusions
References
Modeling Value Evaluation of Semantics Aided Secondary Language Acquisition as Model Driven Knowledge Management
1 Introduction
2 Discussion on Solution Strategy
2.1 Model Driven Based Strategy on Resolving Complexity
2.2 Value Based Analysis on Knowledge Management Model
2.3 Evolutionary Modeling from Conceptualization
3 Hypotheses on Secondary Language Learning
4 Modeling the General Learning Process
4.1 Fundamental Questions
4.2 Modeling the General Learning from Cognitive Perspective
5 Modeling and Evaluation on Learning Efficiency Change
5.1 Modeling and Conceptualization on Multiple Semantics
5.2 Justify the Activity of Semantics Based Approaches
5.3 Value Based Cost Modeling at the Level of Reuse
5.4 Analyzing L2 Learning According to Cognitive Model
6 Stages of a General Implementation
7 Related Work
8 Conclusion and Future Directions
References
Author Index
π SIMILAR VOLUMES
<span>This book constitutes the refereed post-conference proceedings of the Second BenchCouncil International Federated Intelligent Computing and Block Chain Conferences, FICC 2020, held in Qingdao, China, in October/ November 2020.</span><p><span>The 32 full papers and 6 short papers presented were
<span>This edited book presents scientific results of the 20th IEEE/ACIS International Summer Semi-Virtual Conference on Computer and Information Science (ICIS 2021) held on June 23β25, 2021 in Shanghai, China. The aim of this conference was to bring together researchers and scientists, businessmen
<span>This edited book presents scientific results of the 21th IEEE/ACIS International Fall Virtual Conference on Computer and Information Science (ICIS 2021-Fall) held on October 13-15, 2021, in Xiβan China. The aim of this conference was to bring together researchers and scientists, businessmen an
<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco
<span>This volume constitutes selected papers presented at the 10th International Conference on Innovation and New Trends in Information Technology, INTIS 2022, held in Casablanca, Morocco, in May 2022, and 11th International Conference on Innovation and New Trends in Information Technology, INTIS 2