<p><p>This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2017, held in November 2017 in Tam Ky City, Vietnam.<br> The 23 revised full papers presented were carefully selected from 31 submissions. The papers of ICCASA cover a wide spectrum
Context-Aware Systems and Applications, and Nature of Computation and Communication (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)
✍ Scribed by Phan Cong Vinh (editor), Abdur Rakib (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 348
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2020, held in November 2020 in Thai Nguyen, Vietnam.
The 27 revised full papers presented were carefully selected from 68 submissions. The papers of ICCASA cover a wide spectrum in the area of context-aware-systems. CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection used to dynamically control computing and networking functions. The papers of ICTCC cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
✦ Table of Contents
Preface
Conference Committees for ICCASA and ICTCC 2020
Contents
Context Aware Systems and Applications
Formal Verification of Multi-agent Plans for Vehicle Platooning
1 Introduction
2 Related Work
3 Multi-mode System
4 A Language for Cooperative InteractiveAgents
4.1 ALICA Syntax
4.2 ALICA Semantics
5 Uppaal Model and Platooning Verification
5.1 Uppaal Model
5.2 Platooning Verification
6 Conclusion and Future Work
References
Contextual Defeasible Reasoning Framework for Heterogeneous Systems
1 Introduction
2 Preliminaries
2.1 Multi-Context System
2.2 Contextual Defeasible Logic (CDL)
3 Contextualizing Semantic Knowledge Sources
4 Contextual Defeasible Reasoning Based Multi-agent Formalism
5 Case Study: Prototypal Implementation of the System
6 Related Work
7 Conclusion
References
Abnormality Bone Detection in X-Ray Images Using Convolutional Neural Network
1 Introduction
2 Related Work
3 Deep Learning Architecture for Detecting Abnormalities in Bone Images
3.1 Data Preprocessing and Normalizing
3.2 The Proposed Convolutional Neural Network Architecture
3.3 Tools
4 Experiments
4.1 Dataset Description
4.2 Evaluation Metrics
4.3 Experimental Scenarios
5 Conclusion
5.1 Results
5.2 Discussion
References
Statistical Properties and Modelling of DDoS Attacks
Abstract
1 Introduction
2 DDoS Attacks Detection
2.1 TCP SYN Flooding Attack
2.2 DDoS Attack Detection Using IP Address
3 DDoS Attack Modelling
3.1 Datasets Used for Modelling
3.2 Probability Distribution Functions for DDoS Attack Detection (Modelling)
3.3 Synthetic Network Traffic Modelling
4 Implementation Results and Discussions
5 Conclusion and Future Work
References
Estimating Land Surface Temperature from Landsat-8 Images Based on a Cloud-Based Automated Processing Service
1 Introduction
2 Study Area and Method
2.1 Study Area
2.2 Landsat Images
2.3 Derivation of LST from Landsat Images
3 Cloud-Based Service for Estimating LST and Emissivity in HCMC
3.1 Overview of the Remote Image Processing Service
3.2 Design and Implementation
4 Experimental Results
5 Conclusion
References
A Comparison Between Stacked Auto-Encoder and Deep Belief Network in River Run-Off Prediction
1 Introduction
2 Theoretical Background
2.1 Deep Belief Network
2.2 Stacked Auto-Encoder
3 Two Model Architectures
3.1 Deep Belief Network
3.2 Stacked Auto-Encoder
3.3 Sliding Window Technique
3.4 Performance Evaluation
4 Experimental and Evaluation
4.1 Study Area
4.2 Experimental Results
5 Conclusion and Future Work
References
Developing Data Model Managing Residents by Space and Time in Three-Dimensional Geographic Space
Abstract
1 Introduction
2 Related Works
2.1 The Data Models Based on the Boundary Representation Method
2.2 The Data Models Based on Voxel Elements
2.3 The Data Models Based on the 3D Block Composite Method
2.4 Comments and Recommendations for the Data Model
3 Spatial-Temporal-Residential Data Model Managing Residents
3.1 Temporal Data Class
3.2 Residential Data Class
3.3 Spatial Data Class
3.4 Combining Spatial, Temporal and Residential Data Class to Build New Model
3.5 Querying in Residential Data Management
3.6 Recursive Query Techniques in Residential Data Management
4 Experiment
5 Conclusion
References
Trigger2B: A Tool Generating Event-B Models from Database Triggers
1 Introduction
2 Background
2.1 Database Triggers and ANTLR
2.2 Event-B and Rodin
3 Translating Triggers to Event-B
4 Architecture and Design
4.1 Architecture
4.2 Component Design
5 Implementation and Results
6 Related Work
7 Conclusions and Future Work
References
Predicting the Level of Hypertension Using Machine Learning
Abstract
1 Introduction
2 Related Works
3 Select and Build Data to Test the Diagnosis of Hypertension
4 Test Data Set Developed Using Weka
5 Conclusion
References
Can Blockchain Fly the Silver Fern?
1 Introduction
2 Blockchain and the Primary Industries of New Zealand
2.1 Opportunities
2.2 Challenges
3 Economic Opportunity of Blockchain in New Zealand
4 Total Addressable Market for Primary Industries in New Zealand
4.1 Building End User Profile
4.2 Calculating TAM
5 Conclusion
References
Design and Implementation of a Real-Time Web Service for Monitoring Soil Moisture and Landslide in Lai Chau Province, Viet Nam
1 Introduction
2 Technologies and Study Area
2.1 Node.Js
2.2 Data Technologies
2.3 Socket.io
2.4 Study Area
3 Methodologies
3.1 The System Design
3.2 Functionalities
4 System Implementation and Results
4.1 Implementation
4.2 Results
5 Related Work
6 Conclusions and Future Work
References
Optimizing the Operational Time of IoT Devices in Cloud-Fog Systems
Abstract
1 Introduction
2 Linear Programming Model for Optimizing the Operational Time of IoT Devices with Multiple Fog Nodes (Fns)
3 Proposed Heuristic Algorithm
4 Simulation Results
5 Conclusion
References
Proposing Spatial - Temporal - Semantic Data Model Managing Genealogy and Space Evolution History of Objects in 3D Geographical Space
Abstract
1 Introduction
2 Related Works
2.1 Overview of Data Model Types
2.2 Comment and Recommendation Data Models
3 Spatial – Temporal – Semantic Data Model
3.1 Time Class
3.2 Semantic Class
3.3 Combine Spatial, Temporal and Semantic Class into STSDM
3.4 Building Some Spatial Queries Over Time and Semantics
3.5 Designing Algorithms Find Ancestors and Descendants (ASA and DSA)
4 Experiment
4.1 Query Spatial Evolutionary History Over Time and Semantics of Object 2-2.5D
4.2 Query Space Over Time and Semantics of 3D Objects
4.3 Query Each Generation of Descendant Houses of a Father House
5 Conclusion
References
Modelling Situation-Aware Formalism Using BDI Reasoning Agents
1 Introduction
2 Preliminaries
2.1 BDI (Belief, Desire, Intention)
2.2 NetLogo
3 BDI Agents Based Situation-Aware Formalism
4 BDI Agents Modelling and Simulation Using NetLogo
5 Conclusion
References
Using Empathy Mapping in Design Thinking Process for Personas Discovering
Abstract
1 Persona Concept
2 Empathy in Design Thinking
3 Conclusion
References
Taiwanese Stock Market Forecasting with a Shallow Long Short-Term Memory Architecture
1 Introduction
2 Related Work
3 Random Forest, Support Vector Regression and Long Short-Term Memory Models for Stock Market Prediction
3.1 The Random Forest Model
3.2 The Support Vector Regression Model
3.3 The Long Short-Term Memory Model
4 Experimental Results
4.1 The TAIEX Dataset
4.2 The Metrics for Evaluating the Performance
4.3 The Performance of Random Forest Model
4.4 The Performance of Support Vector Regression Model
4.5 The Performance of Long Short-Term Memory Model
4.6 The Comparison Between the Learning Models
5 Conclusion
References
A Convolutional Neural Network on X-Ray Images for Pneumonia Diagnosis
1 Introduction
2 Related Work
3 Theoretical Modeling
4 Tool
5 Experimental Results
5.1 Dataset
5.2 Scenario 1
5.3 Scenario 2
5.4 Scenario 3
6 Conclusion
References
Counterbalancing Asymmetric Information: A Process Driven Systems Thinking Approach to Information Sharing of Decentralized Databases
1 Introduction
2 Problems and Solutions
3 A Hypothetical Case Study
3.1 Customer, Suppliers and Partners
3.2 Industry Analysis
3.3 Strategy
4 Value Chain and Business Processes
4.1 Receiving Data
4.2 Data Architecture
4.3 Creating Reports
5 Counterbalancing Information Asymmetry in the Age of Disruption
5.1 Procedural Response
5.2 Technological Response
6 Conclusion
References
Nature of Computation and Communication
Towards Service Co-evolution in SOA Environments: A Survey
1 Introduction
2 Foundation
2.1 Software Evolution
2.2 Service Evolution
2.3 Definitions
3 Proposed Change Taxonomy
4 Positioning Approaches
4.1 Support Service Evolution
4.2 Support Service Co-evolution
5 Outlook
6 Conclusions
References
Analysis of a HIPS Solution Use in Power Systems
1 Introduction
2 Methods of the HIPS Solution Analysis
3 Comparative Analysis of Selected HIPS Solutions
4 Conclusion
References
Behavioral Analysis of SIEM Solutions for Energy Technology Systems
1 The Issue of Technological Power Systems Safety
2 User Behavioral Analysis Utilization to Ensure Energy Technology Systems Safety
3 UEBA Implementation in Selected SIEM Solutions
3.1 AlienVault OSSIM
3.2 IBM Security QRadar
3.3 LogRhythm NextGen SIEM
4 UEBA Modules
4.1 Incorrect Authentication
4.2 Permission Delegation
5 Conclusion
References
Threads Efficiency Analysis of Selected Operating Systems
Abstract
1 Introduction
1.1 Introduction to Threads Principles
2 Testing Methodology
2.1 Presentation of Conducted Tests
3 Testing Results and Discussion
3.1 7-Zip 18.05 Test
3.2 Test WinRAR 5.60
3.3 Test CPU-Z 1.85.0 64-Bit
3.4 Test Cinebench R15.038_RC184115
3.5 Test AIDA64 CPU Tests
4 Conclusion
Acknowledgment
References
An Architecture for Intelligent e-Learning Platform for Student's Lab Deployment
1 Introduction
2 Problem Definition
2.1 Subjects and Areas
2.2 Cloud Computing Solution
2.3 Cloud Based Educational Companies and Institutions
3 Related Works
4 System Inputs and Requirements
5 System Architecture
5.1 Components
5.2 User Deployment Workflow
5.3 Another Workflows and Functions
6 Proof of Concept Lab Deployment System
7 Conclusion
References
Improved Packet Delivery for Wireless Sensor Networks Using Local Automate Based Autonomic Network Architecture in a ZigBee Environment
1 Introduction
2 Related Work
3 Problem Definition
4 System and Mathematical Model
4.1 Mathematical Model
5 Implementation
6 Simulation and Performance Evaluation
6.1 Simulation Environment
6.2 Performance Analysis
7 Conclusions
References
Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search
1 Introduction
1.1 Motivation
1.2 Contribution
1.3 Organization
2 Related Work
3 Problem Definition
3.1 Problem Statement
3.2 Objectives
3.3 Assumptions
4 Implementation
4.1 Embedding Process
4.2 Decryption Process
5 Performance Analysis
6 Conclusions
References
Design and Testing a Single-Passenger Eco-Vehicle
Abstract
1 Introduction
2 Solutions and Design Method
2.1 Solution on Engine
2.2 Solution on Technology
2.3 Solution on Electricity System
2.4 Design Method
3 Testing Results and Discussion
3.1 Test at University
3.2 Performance at the EMC 2019
4 Conclusion
Acknowledgement
References
A Study on the Methology of Increasing Safety for Cometto MSPE System
Abstract
1 Introduction
2 The Proposed Method for the Cometto MSPE
2.1 The Basic Cometto MSPE
2.1.1 The Power Pack Unit
2.1.2 Modules
2.2 The Proposed Method
3 The Evaluation of Proposed Method
4 Conclusion
Conflict of Interest
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed post-conference proceedings of the 13</span><span><sup>th</sup></span><span> International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16</span><span><sup>th</sup></span><span> International Conference on Tools for Design, Im
<p><span>This book constitutes the refereed post-conference proceedings of the 16</span><span><sup>th</sup></span><span> International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2021, held in December 2021, and the 14th International Conference on Wireless Internet, WiCON 202
This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, model
<p><span>This book presents emerging trends in intelligent computing and informatics. This book presents the papers included in the proceedings of the 6th International Conference of Reliable Information and Communication Technology 2021 (IRICT 2021) that was held virtually, on Dec. 22-23, 2021. The
<p><span>This book constitutes the refereed proceedings of the 21st IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2021, held in Valletta, Malta, in June 2021, as part of the 16th International Federated Conference on Distributed Computing Techniques