Complex, Intelligent, and Software Intensive Systems

Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017)
 
 
Springer (Verlag)
  • erschienen am 4. Juli 2017
  • |
  • XLVIII, 1048 Seiten
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-61566-0 (ISBN)
 

This book gathers the proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), held on June 28-June 30, 2017 in Torino, Italy.

Software Intensive Systems are characterized by their intensive interaction with other systems, sensors, actuators, devices, and users. Further, they are now being used in more and more domains, e.g. the automotive sector, telecommunication systems, embedded systems in general, industrial automation systems and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems.

Complex Systems research is focused on the understanding of a system as a whole rather than its components. Complex Systems are very much shaped by the changing environments in which they operate, and by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions.

The development of Intelligent Systems and agents, which invariably involves the use of ontologies and their logical foundations, offers a fruitful impulse for both Software Intensive Systems and Complex Systems. Recent research in the fields of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences is essential to the future development of and innovations in software intensive and complex systems.

The aim of the volume "Complex, Intelligent and Software Intensive Systems" is to provide a platform of scientific interaction between the three interwoven and challenging areas of research and development of future Information and Communications Technology (ICT)-enabled applications: Software Intensive Systems, Complex systems and Intelligent Systems.

1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 517 s/w Abbildungen
  • |
  • 517 schwarz-weiße Abbildungen, Bibliographie
  • 132,50 MB
978-3-319-61566-0 (9783319615660)
10.1007/978-3-319-61566-0
weitere Ausgaben werden ermittelt
  • Intro
  • Welcome Message of CISIS-2017 International Conference Organizers
  • Welcome Message from CISIS-2017 Workshops Co-chairs
  • Welcome Message from ECDS-2017 International Workshop Co-chairs
  • Welcome Message from ePaMuS-2017 International Workshop Chair
  • Message from IINIC-2017 International Workshop Organizers
  • Message from FCISIS-2017 International Workshop Organizers
  • Message from VENOA-2017 International Workshop Organizers
  • Message from SWISM-2017 International Workshop Organizers
  • Message from ICLS-2017 International Workshop Chair
  • Welcome Message from EASyCoSe-2017 International Workshop Co-chairs
  • CISIS-2017 Keynote Talks
  • Raspberries on the Edge
  • The Future of IT Technologies
  • Contents
  • The 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017)
  • A Delay-Aware Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks
  • 1 Introduction
  • 2 IoT
  • 2.1 IoT Architecture
  • 2.2 IoT Protocols
  • 3 Opportunistic Networks
  • 3.1 Opportunistic Networks Challenges
  • 3.2 Opportunistic Networks Architectures
  • 4 Proposed System
  • 4.1 System Parameters
  • 4.2 System Implementation
  • 5 Simulation Results
  • 6 Conclusions and Future Work
  • References
  • A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Weibull Distribution, HWMP and TCP Protocols
  • 1 Introduction
  • 2 Architectures of WMNs
  • 3 Overview of HWMP Routing Protocol
  • 4 Simulation System Description and Design
  • 4.1 Positioning of Mesh Routers by WMN-GA System
  • 4.2 Simulation Description
  • 4.3 NS-3
  • 5 Simulation Results
  • 6 Conclusions
  • References
  • Performance Evaluation of a Vegetable Recognition System Using Caffe and Chainer
  • 1 Introduction
  • 2 Neural Networks
  • 2.1 Deep Neural Network (DNN)
  • 2.2 Convolutional Neural Network (CNN)
  • 3 Vegetable Recognition System
  • 4 Evaluation Results
  • 5 Conclusions
  • References
  • Energy-Efficient Quorum Selection Algorithm for Distributed Object-Based Systems
  • 1 Introduction
  • 2 System Model
  • 2.1 Objects and Transactions
  • 2.2 Quorum-Based Locking Protocol
  • 2.3 Data Access Model
  • 2.4 Power Consumption Model of a Server
  • 3 Quorum Selection Algorithm
  • 4 Evaluation
  • 4.1 Environment
  • 4.2 Average Execution Time of Each Transaction
  • 4.3 Average Number of Aborted Transaction Instances
  • 4.4 Average Total Energy Consumption of a Server Cluster
  • 5 Concluding Remarks
  • References
  • Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy-Based System Considering Packet Error Rate as a New Parameter
  • 1 Introduction
  • 2 WSAN
  • 2.1 WSAN Challenges
  • 2.2 WSAN Architecture
  • 3 Proposed System Model
  • 3.1 Problem Description
  • 3.2 System Parameters
  • 3.3 System Implementation
  • 3.4 Description of FLC
  • 4 Simulation Results
  • 5 Conclusions and Future Work
  • References
  • A Fuzzy-Based Approach for Improving Team Collaboration in MobilePeerDroid Mobile System
  • 1 Introduction
  • 2 Scenarios of Collaborative Teamwork
  • 2.1 Collaborative Teamwork and Virtual Campuses
  • 2.2 Mobile Ad Hoc Networks (MANETs)
  • 3 Vote Weights
  • 3.1 Votes with Embedded Weight
  • 3.2 Voting Score
  • 4 Application of Fuzzy Logic for Control
  • 4.1 FC
  • 4.2 Linguistic Variables
  • 4.3 FC Rules
  • 4.4 Control Knowledge Base
  • 4.5 Defuzzification Methods
  • 5 Proposed Fuzzy-Based Peer Voting Score System
  • 6 Simulation Results
  • 7 Conclusions and Future Work
  • References
  • Energy-Aware Dynamic Migration of Virtual Machines in a Server Cluster
  • 1 Introduction
  • 2 System Model
  • 3 Power Consumption and Computation Models
  • 3.1 MLPCM Model
  • 3.2 MLC Model
  • 4 Estimation Model
  • 5 A Virtual Machine Migration (VMM) Algorithm
  • 5.1 Virtual Machine Selection
  • 5.2 Virtual Machine Migration
  • 6 Evaluation
  • 7 Concluding Remarks
  • References
  • Flexible Synchronization Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
  • 1 Introduction
  • 2 Information Flow in TBAC Model
  • 2.1 TBAC Model
  • 2.2 Information Flow Relations
  • 3 Synchronization Protocols
  • 3.1 Protocols for the Hidden Topics
  • 3.2 Flexible Synchronization (FS) Protocol for the Forgotten Topics
  • 4 Evaluation
  • 5 Concluding Remarks
  • References
  • An Energy-Efficient Migration Algorithm of Virtual Machines in Server Clusters
  • 1 Introduction
  • 2 System Model
  • 3 Power Consumption and Computation Models
  • 3.1 MLPCM Model
  • 3.2 MLCM Model
  • 4 Estimation Model
  • 5 Energy-Efficient Migration of Virtual Machines
  • 5.1 VM Selection (VMS) Algorithm
  • 5.2 VM Migration (VMM) Algorithm
  • 6 Evaluation
  • 7 Concluding Remarks
  • References
  • Using the Web of Data in Semantic Sensor Networks
  • 1 Introduction
  • 2 State of the Art
  • 3 Methodology
  • 4 Semantic Annotations and Descriptions
  • 4.1 SSN Knowledge Base
  • 4.2 Embedding Semantics Annotations Within Devices
  • 4.3 From Semantic Annotations to Descriptions
  • 5 Conclusions
  • References
  • A Communication Method for Wireless Mesh Networks Suitable to IoT Communication Environment
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 2.1 Hybrid Wireless Mesh Protocol
  • 2.2 Packet Filling Method
  • 2.3 Problems of Related Works
  • 3 Proposed Method
  • 3.1 Outline
  • 3.2 Packet Integration Method
  • 3.3 Route Reconstruction Method
  • 4 Performance Evaluation
  • 4.1 Evaluation Way
  • 4.2 Simulation Results and Considerations
  • 5 Conclusions
  • References
  • Influences of ILS Localizer Signal over Complicated Terrain
  • 1 Introduction
  • 2 ILS Localizer
  • 2.1 Radiation Pattern of LOC Antenna
  • 2.2 DDM
  • 3 Numerical Method
  • 4 Numerical Example
  • 5 Conclusion
  • References
  • Evaluation of Never Die Network System for Disaster Prevention Based on Cognitive Wireless Technologys
  • Abstract
  • 1 Introduction
  • 2 Purpose
  • 3 System Architecture
  • 4 Problems to Be Solved for the NDN System
  • 5 The Proposed Method
  • 5.1 The Network Performance Measurement Method in NDN
  • 5.2 Link Selection Method
  • 6 Prototype and Performance Evaluation
  • 7 Conclusion and Discussion
  • Acknowledgements
  • References
  • Monitoring Health of Large Scale Software Systems Using Drift Detection Techniques
  • 1 Introduction
  • 2 Related Work
  • 2.1 Root Cause Analysis
  • 2.2 Drift Detection
  • 2.3 Techniques and Methodology
  • 2.4 Change Detection Meta Algorithm
  • 2.5 Fixed Cumulative Window Model
  • 2.6 Page Hinkley Test
  • 3 Evaluation
  • 3.1 Dataset Generation
  • 3.2 Experimental Results
  • 4 Conclusion
  • References
  • An Efficient Scheduling of Electrical Appliance in Micro Grid Based on Heuristic Techniques
  • 1 Introduction
  • 2 Related Work
  • 3 System Model
  • 3.1 Load Categorization
  • 3.2 Energy Consumption Model
  • 3.3 PAR
  • 3.4 Waiting Time
  • 3.5 Objective Function
  • 4 Simulations and Discussion
  • 4.1 Electricity Demand
  • 4.2 Electricity Cost
  • 4.3 PAR
  • 4.4 User Discomfort
  • 5 Conclusion
  • References
  • Personal Data in Cyber Systems Security
  • Abstract
  • 1 Introduction
  • 2 Extraction of Personal Patterns for Security Purposes
  • 3 Biometric and Cognitive Keys for Cryptographic Protocols
  • 4 Behavioral Features for Security Applications
  • 5 Visual Perception Features for Security Applications
  • 6 Conclusions
  • Acknowledgments
  • References
  • Performance Measurement of Energy Management Controller Using Heuristic Techniques
  • 1 Introduction
  • 2 Related Work and Motivation
  • 3 Problem Description
  • 4 Simulation Results and Discussion
  • 4.1 Clothes Dryer
  • 4.2 Dishwasher
  • 4.3 Refrigerator
  • 5 Conclusion
  • References
  • Managing Energy in Smart Homes Using Binary Particle Swarm Optimization
  • 1 Introduction
  • 2 Literature Review
  • 3 Problem Statement and Proposed Solution
  • 4 BPSO
  • 5 Results and Discussions
  • 6 Conclusion
  • References
  • Single Hop Selection Based Forwarding in WDFAD-DBR for Under Water Wireless Sensor Networks
  • 1 Introduction
  • 2 Related Work
  • 3 Network Architecture
  • 3.1 Computing Holding Time and Data Communication Phase
  • 4 Performance Parameters
  • 4.1 PDR Comparison
  • 4.2 Energy Tax Comparison
  • 5 Conclusion
  • References
  • A Framework for Ranking of Software Design Patterns
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Brief Description of Text Categorization
  • 4 Overview of Proposed Approach
  • 4.1 Preprocessing
  • 4.2 Learning Phase
  • 4.3 Ranking Phase
  • 4.4 Design Pattern Groups
  • 4.5 Design Pattern Groups
  • 5 Evaluation Model for Proposed Approach
  • 6 Evaluation Results
  • 7 Evaluation Results
  • 8 Conclusion and Future Work
  • Acknowledgments
  • References
  • Real-Time Body Gestures Recognition Using Training Set Constrained Reduction
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 System Description
  • 3.1 Gesture Recognition Module
  • 3.2 Training Set Reduction Module
  • 4 Experimental Assessment
  • 5 Conclusions
  • References
  • Towards Better Population Sizing for Differential Evolution Through Active Population Analysis with Complex Network
  • Abstract
  • 1 Introduction
  • 2 Differential Evolution
  • 2.1 Initialization
  • 2.2 Mutation
  • 2.3 Crossover
  • 2.4 Selection
  • 3 Success-History Based Adaptive Differential Evolution
  • 3.1 Initialization
  • 3.2 Mutation
  • 3.3 Crossover
  • 3.4 Historical Memory Updates
  • 4 Network Creation
  • 5 Experimental Setting
  • 6 Results and Discussion
  • 7 Conclusion
  • Acknowledgements
  • References
  • WORDY: A Semi-automatic Methodology Aimed at the Creation of Neologisms Based on a Semantic Network and Blending Devices
  • 1 Introduction
  • 2 WORDY System Description
  • 2.1 Selection of Words
  • 2.2 Blending Words
  • 2.3 Ranking Neologisms
  • 3 Experimental Results
  • 4 Discussion
  • 5 Conclusions
  • References
  • Conveying Audience Emotions Through Humanoid Robot Gestures to an Orchestra During a Live Musical Exhibition
  • 1 Introduction
  • 2 Related Works
  • 2.1 Emotion Representation
  • 2.2 Robotics in Music
  • 3 System Description
  • 3.1 Use Case
  • 3.2 Emotion Recognizer
  • 3.3 Emotional Mobile Interface
  • 3.4 Database
  • 3.5 AI Director
  • 3.6 Robotic Controller
  • 4 Evaluation
  • 5 Conclusion and Future Works
  • References
  • A Kernel Support Vector Machine Based Technique for Crohn's Disease Classification in Human Patients
  • 1 Introduction
  • 2 Materials
  • 2.1 University of Palermo Policlinico Hospital Dataset
  • 3 Method
  • 3.1 Features Extraction
  • 3.2 Kernel SVM
  • 3.3 The Proposed Technique
  • 4 Results and Discussions
  • 5 Conclusions
  • References
  • On the Design of a System to Predict Student's Success
  • Abstract
  • 1 Introduction
  • 2 Previous Work
  • 3 Prediction System Prototype
  • 4 Core System Implementation Details
  • 4.1 Operation to Gather Evidences
  • 4.2 Operation to Update the Model Data Information
  • 4.3 Operation to Create a Model
  • 4.4 Operation to Generate a Prediction
  • 5 Experimental Results
  • 5.1 Configuration of the System
  • 5.2 Analysis of the Experimental Results in Computer Structure
  • 6 Conclusions and Future Work
  • Acknowledgments
  • References
  • DoppioGioco. Playing with the Audience in an Interactive Storytelling Platform
  • 1 Introduction
  • 2 Background and Motivations
  • 3 DoppioGioco
  • 4 Bringing the Audience into Play
  • 4.1 Narrative Model
  • 4.2 Annotating Emotions
  • 4.3 System Architecture
  • 5 The System at Work
  • 6 Discussion and Conclusion
  • References
  • BioGrakn: A Knowledge Graph-Based Semantic Database for Biomedical Sciences
  • 1 Introduction
  • 2 GRAKN.AI
  • 2.1 Grakn
  • 2.2 Graql
  • 3 Data Sources
  • 4 BioGrakn
  • 4.1 The Ontology
  • 4.2 Data Import
  • 5 Results
  • 5.1 Search for Genes Linked to a Particular Gene Ontology Annotation
  • 5.2 Search for Pathways Linked to a Particular Gene
  • 5.3 Differentially Expressed miRNAs Having SNPs in Cancer
  • 5.4 Reasoning on Our Biological Data
  • 6 Conclusions and Future Works
  • References
  • Security Infrastructure for Service Oriented Architectures at the Tactical Edge
  • 1 Introduction
  • 2 TACTICS Security Architecture
  • 2.1 Security Handling Service
  • 2.2 Policy Management Service
  • 2.3 Policy Decision Point Service
  • 2.4 Metadata Handling Service
  • 2.5 Contextual Monitoring Service
  • 2.6 Policy Enforcement Point Service
  • 2.7 Functional Security Services
  • 3 Test Case Based Validation
  • 4 Conclusions
  • References
  • An Application Using a BLE Beacon Model Combined with Fully Autonomous Wheelchair Control
  • Abstract
  • 1 Introduction
  • 2 Background
  • 3 Proposed Autonomous Wheelchair Control
  • 3.1 Description of the Beacon Model
  • 3.1.1 Beacon Attributes
  • 3.1.2 Beacon Model Using Machine Learning
  • 3.2 Architecture of Autonomous Wheelchair Control
  • 3.2.1 The Motorized Wheelchair
  • 3.2.2 The Behavioral Planning of Autonomous Wheelchair Control
  • 3.3 Beacon Model as MPC
  • 3.3.1 Smooth Locomotion by Penalized Beacon Model
  • 4 Low Current Consumption (LCC) with Beacon Model
  • 5 Conclusion
  • Acknowledgments
  • References
  • UnipaBCI a Novel General Software Framework for Brain Computer Interface
  • 1 Introduction
  • 2 State of the Art
  • 3 The UnipaBCI Framework
  • 3.1 The Acquisition Module
  • 3.2 The Signal Processing Module
  • 3.3 The User Application Module
  • 3.4 The Control Application
  • 3.5 The Flash Optimization Module
  • 3.6 The Device Controller Module
  • 4 Online Evaluation and Validation
  • 4.1 The Precision of the System
  • 4.2 The Speedup Factor
  • 4.3 Questionnaire Analysis
  • 4.4 Real Time Capabilities of the UnipaBCI
  • 5 Discussion
  • 6 Conclusion
  • References
  • XML-VM: An XML-Based Grid Computing Middleware
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 System Architecture
  • 4 The Fork/Join Linguistic Framework
  • 5 The Language XML-VM
  • 5.1 Parsing and Interpretation
  • 6 Experimental Results
  • 7 Conclusions and Final Remarks
  • References
  • Intelligent Sensor Data Fusion for Supporting Advanced Smart Health Processes
  • Abstract
  • 1 Introduction
  • 2 Proposed Methodology
  • 2.1 Case Study
  • 2.2 Activating Healthcare Resources Based on Multiple Sensor Data and Processes Modelling
  • 2.2.1 Identification of Anomalies
  • 2.2.2 Assessment of Anomalies
  • 2.2.3 Management of Anomalies
  • 3 Experimental Results
  • 4 Conclusions and Future Work
  • References
  • Hardware Design of a Smart Meter Communication Interface for Smart Grids
  • Abstract
  • 1 Introduction
  • 2 Smart Grid Conceptual Model
  • 2.1 Advanced Metering Infrastructure
  • 2.2 Communication Architecture for Smart Metering
  • 2.3 Communication Technologies for Last Mile
  • 3 Project Testing Scenario
  • 4 Project Development
  • 4.1 Project Requirements
  • 4.2 Hardware Architecture
  • 4.3 Test Requirements
  • 5 Test Results
  • 6 Conclusions
  • References
  • Performance Analysis of WRF Simulations in a Public Cloud and HPC Environment
  • 1 Introduction
  • 2 Testing Environment
  • 2.1 Cluster HPC Deployment
  • 2.2 Cloud Deployment
  • 3 Experimental Tests
  • 3.1 Cluster HPC Tests
  • 4 Conclusions and Future Work
  • References
  • HyperLoom Possibilities for Executing Scientific Workflows on the Cloud
  • 1 Introduction
  • 2 Scientific Workflows
  • 2.1 Workflow Properties
  • 3 HyperLoom
  • 3.1 Architecture
  • 4 Virtualization
  • 4.1 Motivation for HyperLoom Virtualization
  • 4.2 Virtualization Solutions
  • 4.3 HyperLoom Virtualization
  • 5 Performance Evaluation
  • 5.1 Testbed Description
  • 5.2 Methodology and Metrics
  • 5.3 Test Scenarios
  • 5.4 Experiments
  • 6 Conclusion
  • References
  • A Scalable and Low-Power FPGA-Aware Network-on-Chip Architecture
  • 1 Introduction
  • 2 Background
  • 3 System Architecture
  • 3.1 Mesh Router Microarchitecture
  • 3.2 Ring Switch Microarchitecture
  • 4 Reconfigurability
  • 5 Evaluation
  • 5.1 Area Cost and Power Consumption
  • 6 Conclusion
  • References
  • Design of a Control System Card for Frequency Inverter in FPGA
  • Abstract
  • 1 Introduction
  • 2 Main Concepts
  • 2.1 FPGA
  • 2.2 Microblaze Software Processor
  • 2.3 Frequency Inverters
  • 2.4 Main Functionalities
  • 3 Hardware Card Design
  • 4 Project Validation
  • 5 Conclusions and Further Work
  • References
  • Ising-Model Optimizer with Parallel-Trial Bit-Sieve Engine
  • Abstract
  • 1 Introduction
  • 2 Operating Principle
  • 3 Engine Implementation
  • 4 Benchmark Results
  • 5 Conclusion
  • References
  • An FPGA Based Heterogeneous Redundant Control System Using Controller Virtualization
  • Abstract
  • 1 Introduction
  • 2 Problem of Conventional Method
  • 2.1 Redundant Control System
  • 2.2 Problem of Conventional Cloud Control System
  • 3 Heterogeneous Redundant Control System Using Controller Virtualization
  • 3.1 Basic Concept of Controller Virtualization
  • 3.2 Heterogeneous Redundant Control System
  • 3.3 Architecture of VCU and FPGA Based Controller
  • 4 Simulation and Results
  • 4.1 Simulation Method
  • 4.2 Simulation Results
  • 5 Discussion and Future Work
  • 6 Conclusion
  • References
  • Power Performance Analysis of FPGA-Based Particle Filtering for Realtime Object Tracking
  • 1 Introduction
  • 2 Particle Filter Algorithm
  • 2.1 Particle Filter
  • 2.2 FPGA Optimized Resampling (FO-resampling)
  • 3 Implementation
  • 3.1 Overview of the System
  • 3.2 Prediction
  • 3.3 Virtual Particle Arrangement
  • 3.4 Weight Calculation
  • 3.5 Weight Comparison
  • 3.6 Center of Gravity Calculation
  • 4 Evaluation and Discussion
  • 5 Conclusion
  • References
  • HLS-Based FPGA Acceleration of Building-Cube Stencil Computation
  • 1 Introduction
  • 2 Building Cube Method (BCM)
  • 3 MaxCompiler
  • 4 Design and Implementation of BCM Framework
  • 4.1 Interpolation of Halos
  • 4.2 Generation of DRAM Access Commands
  • 5 Application for Evaluation
  • 6 Evaluation and Discussions
  • 6.1 Overhead in FPGA Resources
  • 6.2 Performance Overhead
  • 6.3 Characteristic of Halo Data Processing
  • 7 Conclusion
  • References
  • Enriching Remote Control Applications with Fog Computing
  • 1 Introduction
  • 2 A Primer on Fog Computing
  • 3 Resource Allocation in the Fog Platform
  • 4 Performance Evaluation
  • 4.1 Numerical Results
  • 5 Conclusion
  • References
  • The 11th International Workshop on Engineering Complex Distributed Systems (ECDS-2017)
  • Dynamic MAC Protocol Designed for UAV Collision Avoidance System
  • Abstract
  • 1 Introduction
  • 2 The System Model
  • 2.1 Network and Mobility Model
  • 2.2 Collision Avoidance Model
  • 3 System Overview
  • 3.1 The Dynamic Slots Allocation Scheme
  • 3.2 The Dynamic Slots Allocation Scheme
  • 4 Simulation Results
  • 5 Conclusions and Future Work
  • References
  • A Method for Estimating the Camera Parameters Based on Vanishing Points
  • Abstract
  • 1 Introduction
  • 2 Related Research
  • 3 MMVD Algorithm
  • 3.1 Construction of Line Subset and Vanishing Point Model Hypothesis
  • 3.2 Correlation Matrix
  • 3.3 Line Segments Clustering and Vanishing Point Estimation
  • 3.4 EM Optimization
  • 4 Experiment
  • 4.1 Efficiency of Vanishing Point Estimation
  • 4.2 Accuracy of Vanishing Point Estimation
  • 5 Summary
  • Acknowledgement
  • References
  • Research and Construction of the Full-Service IP High-Speed Intelligent Bearer Network for the Digital Oil Field
  • Abstract
  • 1 Introduction
  • 2 Main Body
  • 2.1 Research Object
  • 2.2 Ideas and Content
  • 2.3 Research Result
  • 3 Conclusions
  • Verification Using Multi-agent Simulation for Evacuation Guidance with Robots
  • 1 Introduction
  • 2 Proposed Method
  • 2.1 Scenario 1 -- Discovery of Fire and Call for Evacuation
  • 2.2 Scenario 2 -- Evacuation Guidance Considering Visitors
  • 2.3 Modeling Evacuation Behavior
  • 3 Evaluation Experiment
  • 3.1 Scenario 1
  • 3.2 Scenario 2
  • 4 Conclusion
  • References
  • Development Support Mechanism for Deep Learning Agent on DASH Agent Framework
  • 1 Introduction
  • 2 DASH Agent Framework
  • 2.1 Outline
  • 2.2 Agent in DASH
  • 3 Proposed Method
  • 3.1 Introduction of Deep Learning
  • 3.2 Development Support Functions
  • 4 Experiment
  • 4.1 Experiment A
  • 4.2 Experiment B
  • 5 Conclusion
  • References
  • The 10th International Workshop on Engineering Parallel and Multi-Core Systems (ePaMus-2017)
  • A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform
  • Abstract
  • 1 Introduction
  • 2 Optimized VFDT Algorithm
  • 2.1 Moderated VFDT Algorithm
  • 2.2 Improving Moderated VFDT Algorithm Based on Bayes Classification
  • 3 Distributed Computing Scheme for OVFDT Algorithm
  • 3.1 Parallelization Scheme of OVFDT Algorithm
  • 3.2 Implementation Scheme of OVFDT Algorithm in MapReduce Environment
  • 4 The Implementation Scheme of OVFDT on Storm Cluster
  • 4.1 Implemental Hoeffding Decision Tree Construction Module
  • 4.2 Classification Module
  • 5 Experiment on Storm
  • 5.1 Experimental Methodology
  • 5.2 Comparison of Performance of Three Algorithms
  • 6 Conclusion
  • Acknowledgments
  • References
  • Congestion Aware Routing for On-Chip Communication in NoC Systems
  • Abstract
  • 1 Introduction
  • 2 Overview and Motivation
  • 3 Congestion Aware NoC Routing
  • 3.1 VC/Switch Allocation
  • 3.2 Congestion Aware Adaptive Router Micro-Architecture
  • 4 Experimental Results
  • 5 Conclusions
  • Acknowledgments
  • References
  • Data Locality Aware Algorithm for Task Execution on Distributed, Cloud Based Environments
  • 1 Introduction
  • 2 Related Work
  • 3 Workflow Description and Task Model
  • 4 Cost Model
  • 5 Breadth First Search Clustering Algorithm
  • 6 Stoer Wagner Based Clustering
  • 7 Testing the BFS Clustering
  • 8 Testing the SW Clustering Method
  • 9 Conclusions
  • References
  • Asynchronous Page-Rank Computation in Spark
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 2.1 Graphx and RDD
  • 2.2 Asynchronous Iteration
  • 2.3 RDD-Based Asynchronous Communication
  • 3 Implementation
  • 3.1 Asynchronous RDD-Based Iterative Computation
  • 3.2 State Updating in Vertex RDD
  • 4 Evaluation
  • 4.1 Preparation
  • 4.2 Experiment Results
  • 5 Conclusions
  • Acknowledgments
  • References
  • The 10th International Workshop on Intelligent Informatics and Natural Inspired Computing (IINIC- 2017)
  • Energy-Aware Routing in A4SDN
  • 1 Introduction
  • 2 Related Work
  • 3 Background
  • 3.1 SDN and Openflow
  • 3.2 Energy Model
  • 4 eA4SDN
  • 4.1 Ant Colony Optimisation Solutions
  • 4.2 From AAA to eA4SDN
  • 4.3 Algorithms, Testbed and Settings
  • 4.4 Performance Evaluations
  • 5 Conclusion
  • References
  • Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Define of the Data Density Correlation Degree
  • 3.1 Formula of Data Density Correlation Degree
  • 3.2 Pearson Correlation Coefficient
  • 3.3 Physical Location of the Nodes
  • 3.4 Number of Neighbor Nodes
  • 4 Data Fusion Algorithm Based on Data Density Correlation
  • 4.1 Classification of Nodes
  • 4.2 Implement Process of PCCDNCD Algorithm
  • 5 Simulation and Analysis
  • 5.1 Simulation Environment and Parameter Settings
  • 5.2 Fusion Performance Index and Comparison
  • 5.2.1 Fusion Algorithm Performance Index
  • 5.2.2 Fusion Effect
  • 5.3 Energy Consumption Analysis of Fusion Algorithm
  • 6 Conclusion
  • Acknowledgments
  • References
  • Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS
  • Abstract
  • 1 Introduction
  • 2 RFID System Architecture
  • 3 Review of Localization Algorithm
  • 4 Design of Vehicle Positioning System
  • 5 Implementation and Test
  • 6 Conclusions
  • Acknowledgments
  • References
  • Radio Spectrum Management for Cognitive Radio Based on Fuzzy Neural Methodology
  • Abstract
  • 1 Introduction
  • 2 The Capability Structure of CR
  • 3 Fuzzy Neural Network
  • 3.1 The Structure of Fuzzy Neural Network
  • 3.2 The Strengthened Learning of FNN
  • 4 The Analysis and Results of Simulations
  • 4.1 Input/Output Relationship
  • 4.2 The Curve of Strengthened Learning
  • 5 Conclusion
  • References
  • Optimized Energy Efficient Routing Using Dynamic Clustering in Wireless Sensor Networks
  • 1 Introduction
  • 2 Motivation
  • 2.1 Problem Statement
  • 3 EERDC: The Proposed Protocol
  • 3.1 Detailed Description of EERDC
  • 3.2 Initialization Section
  • 3.3 Data Transmission Phase
  • 4 Simulation Results
  • 4.1 Number of Dead Nodes
  • 4.2 Network Throughput
  • 5 Conclusions
  • References
  • Quantitative Deliberation Model and the Method of Consensus Building
  • Abstract
  • 1 Introduction
  • 2 IBIS: Issue-Based Information System
  • 3 Quantitative Deliberation Model
  • 4 Calculation of Consensus Values in QuDM
  • 4.1 Credibility of Argument's Conclusion
  • 4.2 Credibility Synthesis Algorithm
  • 5 Example Analysis
  • 6 Conclusion
  • Acknowledgments
  • References
  • The 8th International Workshop on Frontiers on Complex, Intelligent and Software Intensive Systems (FCISIS-2017)
  • Distinguishing Property for Full Round KECCAK-f Permutation
  • Abstract
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 Sponge Function
  • 2.2 Description of {\hbox{K}}{\textsc{eccak}} -f Permutation
  • 2.3 Zero-Sum Partitions
  • 3 A New Bound on the Degree of {\hbox{K}}{\textsc{eccak}} -f Permutation
  • 4 Improved Distinguishing Properties for Full Round {\hbox{K}}{\textsc{eccak}} -f
  • 5 Conclusion
  • Acknowledgments
  • References
  • Optimal Control of Carrier-Based Aircraft Steam Launching Valve
  • Abstract
  • 1 Introduction
  • 2 Steam Catapult System
  • 2.1 Steam Storage Cylinder
  • 2.2 Cylinder
  • 2.3 Launching Value
  • 3 Carrier-Based Aircraft Catapult Taking Off Simulation
  • 3.1 Modeling of Carrier-Based Aircraft Catapult Taking Off
  • 3.2 Simulation and Result Analysis
  • 4 Optimal Control of Launching Valve
  • 4.1 Selection of Steam Launching Valve Opening Degree Curves
  • 4.2 Construction of Launching Valve Control System
  • 4.3 Analysis of Steam Launching Valve Control System Results
  • 5 Conclusions
  • Acknowledgement
  • References
  • Design and Implementation of Food Safety Traceability System Based on RFID Technology
  • Abstract
  • 1 Introduction
  • 2 RFID Anti-counterfeiting Technology
  • 3 Design of RFID Based Food Safety System
  • 4 Implementation
  • 5 Conclusion
  • Acknowledgments
  • References
  • PaEffExtr: A Method to Extract Effect Statements Automatically from Patents
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Characteristics of Patent Abstracts
  • 4 Multi-features Fused Scoring Algorithm
  • 4.1 Calculation of Distribution Score
  • 4.2 Calculation of Morphological Score
  • 4.3 Algorithm PaEffExtr
  • 4.4 Evaluation of Algorithm
  • 5 Experiments
  • 5.1 Clue Words
  • 5.2 Comparative Experiments
  • 5.3 Runtime
  • 6 Conclusion and Future Work
  • Acknowledgments
  • References
  • An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 System Model
  • 2.2 Chinese Remainder Theorem
  • 2.3 Paillier PKE Scheme
  • 3 Proposed Scheme
  • 3.1 Setup
  • 3.2 Reporting
  • 3.3 Aggregation
  • 3.4 Obtain Group Readings
  • 4 Security Analysis
  • 5 Communication Overheads
  • 6 Conclusion
  • References
  • A Hot Area Mobility Model for Ad Hoc Networks Based on Mining Real Traces of Human
  • Abstract
  • 1 Introduction
  • 2 Mining Human Mobility in Location-Based Social Networks
  • 2.1 The Distribution Law of the Human Mobility
  • 2.2 The Stability of the Human Mobile
  • 2.3 The Correlation Detection Between User Hot Spots and Social Relationships
  • 3 Hot Area Mobility Model Design and Evaluation
  • 4 Conclusion
  • Acknowledgments
  • References
  • The 8th International Workshop on Virtual Environment and Network-Oriented Applications (VENOA 2017)
  • A Parameter Optimization Tool and Its Application to Throughput Estimation Model for Wireless LAN
  • 1 Introduction
  • 2 Parameter Optimization Tool
  • 3 Parameter Optimization Algorithm
  • 4 Application to Throughput Estimation Model for WLAN
  • 4.1 Overview of Throughput Estimation Model
  • 4.2 Input and Output Files
  • 4.3 Throughput Estimation Procedure
  • 4.4 Application of Tool
  • 5 Conclusion
  • References
  • Virtual IP Network Practice System with Software Agent
  • Abstract
  • 1 Introduction
  • 2 NetPowerLab Overview
  • 3 Software Agent for Network Practice
  • 4 Using the System
  • 5 Conclusions
  • Acknowledgments
  • References
  • Creating Learning Materials by Learners Themselves Using Partial Bookmarking for Web Curation
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Creating Learning Materials by Partial Bookmarking
  • 3.1 Partial Bookmarking
  • 3.2 The Enhanced Web Browser
  • 4 Case Study
  • 4.1 Task
  • 4.2 Data Analysis
  • 5 Design Patterns in Creating Learning Materials
  • 5.1 Design Patterns
  • 5.2 Design Intentions
  • 6 Conclusions
  • References
  • Autonomous Decentralized System for Knowledge Refinement of Contents Published over Networks
  • 1 Introduction
  • 2 Assumed Environment
  • 3 Proposed System
  • 3.1 Proposed System Architecture
  • 3.2 Algorithm of DB Behavior
  • 3.3 Content Code Management
  • 4 Evaluation
  • 4.1 Evaluation Method
  • 4.2 Systems to Be Compared
  • 4.3 Simulation Conditions
  • 4.4 Simulation Results and Discussions
  • 5 Conclusions
  • References
  • A Device Status Visualization System Based on Mobile Markerless AR Technology
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 System Implementation
  • 3.1 Extend the Target Device for Visualization
  • 3.2 Introduction of Inexpensive Monitoring Agent Device
  • 4 Preliminary Experiments
  • 5 Conclusions
  • Acknowledgments
  • References
  • A Color Scheme Explorer Based on a Practical Color Design Framework
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 System Implementation
  • 3.1 Practical Color Co-ordinate System
  • 3.2 Color Scheme Design Flow
  • 3.3 System GUI
  • 4 Preliminary Experiments
  • 5 Conclusions
  • Acknowledgments
  • References
  • Performance Testing of Mass Distributed Abyss Storage Prototype for SMB
  • Abstract
  • 1 Introduction
  • 2 Design and Implementation of Mass Abyss Storage Prototype
  • 3 Performance Testing of Abyss Storage Prototype
  • 3.1 Disk Media Test of Abyss Storage
  • 3.2 Network Acceleration by Bonding
  • 3.3 International Network Traffic Test
  • 4 Conclusions
  • Acknowledgments
  • References
  • 3D Model Generation of Cattle Using Multiple Depth-Maps for ICT Agriculture
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System of 6 Kinect Sensors
  • 4 3D Model Generation by 6 Kinect Sensors System
  • 4.1 (A) Taking Kinect Sensor Calibration Images
  • 4.2 (B) Taking Depth-Maps for Each Cow
  • 4.3 (C) 3D Model Data Generation for Each Cow
  • 4.4 Integration of PCD
  • 5 Conclusions
  • References
  • The Ubiquitous Greenhouse for Technology Education in Junior High School
  • Abstract
  • 1 Introduction
  • 2 The Ubiquitous Greenhouse
  • 2.1 Overview
  • 2.2 Solid-State Relay
  • 2.3 Measurement of Temperature and Humidity in the Ubiquitous Greenhouse
  • 2.4 Acquisition of Temperature and Humidity Data of Remote Places
  • 2.5 Control Home Appliances
  • 3 The Plant Grow Experiments
  • 4 Conclusion
  • Acknowledgement
  • References
  • Log Data Visualization and Analysis for Supporting Medical Image Diagnosis
  • 1 Introduction
  • 2 Operation Log Data
  • 2.1 Data Acquisition
  • 2.2 Operation Log Data
  • 2.3 Log Data Visualization
  • 3 Operation Analysis
  • 3.1 Comparison Between Experienced and Inexperienced
  • 3.2 Analysis of Image View Operations
  • 4 Discussion
  • 5 Conclusion
  • References
  • Study on Data Utilization of Regional Industry in Cross-Cutting and Systematic Regional Community Networks
  • Abstract
  • 1 Introduction
  • 2 Background
  • 2.1 IoT Promotion Consortium
  • 2.2 Regional Promotion of IoT Implementation Task Force
  • 2.3 IoT Promotion Laboratory
  • 3 Social Experiment for Regional Implementation
  • 3.1 IoT Utilization in the Nursing Care Industry
  • 3.2 IoT Utilization in Kunisaki Peninsula Area of Oita Prefecture
  • 4 Future Works
  • References
  • Photo Alive!: Elderly Oriented Social Communication Service
  • Abstract
  • 1 Introduction
  • 2 Related Work and Previous Approaches
  • 3 Photo Alive! Architecture
  • 4 Photo-Based Services for Seniors
  • 5 Features and Services
  • 5.1 Elderly Friendly Interface
  • 5.2 Photos and Voice Balloon
  • 5.3 EasyFace
  • 5.4 Photo Alive! App
  • 6 Preliminary Evaluation
  • 7 Conclusion and Future Work
  • Acknowledgements
  • References
  • Realizing Diverse Services Over Hyper-converged Boxes with SmartX Automation Framework
  • Abstract
  • 1 Introduction
  • 2 Diverse SaaS-Leveraged Services with Hyper-converged Boxes
  • 3 SmartX Automation Software Framework
  • 4 Conclusion
  • Acknowledgments
  • References
  • The 7th Semantic Web/Cloud Information and Services Discovery and Management (SWISM-2017)
  • A Target Driven Approach Supporting Data Diversified Generation in IoT Applications
  • Abstract
  • 1 Introduction
  • 2 Background and Related Works
  • 3 The Proposed Approach
  • 4 Conclusion and Future Directions
  • References
  • Smart Communities of Intelligent Software Agents for Collaborating and Semantically Interoperable Micro-Grids
  • 1 Introduction
  • 2 Architecture
  • 3 Results and Achievements
  • 3.1 Platform
  • 3.2 Semantic Interoperability
  • 3.3 Learning Capability
  • 3.4 Optimization Model
  • 3.5 Trials and Data
  • 3.6 Simulation and Emulation Tools
  • 4 Conclusion
  • References
  • A Simulation Approach for the Optimization of Solar Powered Smart Migro-Grids
  • 1 Introduction
  • 2 The CoSSMic Scenario and Limitations
  • 3 Simulator Design
  • 4 Experimental Results
  • 5 Conclusion
  • References
  • A Security Metric Catalogue for Cloud Applications
  • 1 Introduction
  • 2 Background on Security Metrics
  • 3 The Reference Security SLA Model
  • 4 The Security Metric Catalogue
  • 5 Conclusions
  • References
  • Providing Sensor Services by Data Correlation: The #SmartME Approach
  • 1 Introduction
  • 2 Related Work
  • 3 Semantic Integration
  • 4 Sensors Correlation Analysis
  • 5 Conclusion and Future Work
  • References
  • A Fuzzy Prolog and Ontology Driven Framework for Medical Diagnosis Using IoT Devices
  • 1 Introduction
  • 2 Related Work
  • 3 Architecture Overview
  • 3.1 Smart Wearable Sensors
  • 3.2 Knowledge Base
  • 4 The Processing
  • 5 Conclusions
  • References
  • Plug'n'play IoT Devices: An Approach for Dynamic Data Acquisition from Unknown Heterogeneous Devices
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Approach
  • 4 Conclusions
  • Acknowledgments
  • References
  • Automatising Mashup of Cloud Services with QoS Requirements
  • 1 Introduction
  • 2 Abstract Worflow Composition and Service Selection
  • 3 A Mashup Application Example
  • 3.1 Abstract Workflow Generation
  • 3.2 Negotiation for Service Selection
  • 4 Related Works
  • 5 Conclusions
  • References
  • Towards Osmotic Computing: Looking at Basic Principles and Technologies
  • 1 Introduction
  • 2 Osmotic Computing at a Glance
  • 3 How Osmotic Computing Fits the Current Scenario
  • 4 Development of Future Internet Services
  • 4.1 Mime the Chemical Solution: Osmotic MELS
  • 4.2 Infrastructures for Hosting MELS
  • 5 Conclusion and Future Work
  • References
  • Towards the Integration of a HPC Build System in the Cloud Ecosystem
  • 1 Introduction
  • 2 Background Information and Related Work
  • 3 Requirements for a Cloud Service Description Language
  • 3.1 The CloudLightning Approach
  • 3.2 CL-SDL Requirements
  • 3.3 The CloudLightning use-cases
  • 3.4 Transition to Self Compiling
  • 4 The CloudLightning mechanisms
  • 4.1 Enabling HPC Applications with EasyBuild
  • 5 Conclusions
  • References
  • The 7th International Workshop on Intelligent Computing In Large-Scale Systems (ICLS-2017)
  • On Context-Aware Evidence-Based Data Driven Development of Diagnostic Scales for Depression
  • 1 Background
  • 2 Collaborative Design and Development
  • 3 Context-Aware Systems
  • 4 Data-Driven Interventional Informatics
  • 4.1 Data Processing
  • 5 Diagnostic Scales and Depression
  • 6 Depressive States
  • 7 Collaborative Systems Development
  • 7.1 Stage One: Research Design and Development
  • 7.2 Stage Two: Translational Research
  • 7.3 Experimental Examples
  • 8 Discussion
  • 9 Concluding Observations
  • References
  • Simulation of Upward Underwater Image Distortion Correction
  • Abstract
  • 1 Introduction
  • 2 Research Status
  • 3 Principle of Upward Underwater Imaging
  • 3.1 The Refraction Issue of Wavy Sea Surface
  • 3.2 Snell Window of Underwater Imaging
  • 4 Simulation and Analysis
  • 4.1 Simulation of Sea Surface Wave
  • 4.2 Simulation of Reverse Ray Tracing
  • 4.3 A Simulator for Image Distortion Due to the Fluctuating Water Surface
  • 4.4 Analysis of Simulation Result
  • 5 Conclusion
  • Acknowledgement
  • References
  • Survey of Big Data Platform Based on Cloud Computing Container Technology
  • Abstract
  • 1 Introduction
  • 2 Relationship Between Big Data and Cloud Computing
  • 3 Data Collection and Preprocessing of Container-Based Cloud Platform
  • 3.1 Container Technology
  • 3.2 Collection Technology for Big Data and Big Data Preprocessing
  • 4 Adaptive Processing of Big Data Platform
  • 4.1 Big Data Analysis and Processing Technology
  • 4.2 Virtualization Technology of Big Data Platform Container
  • 4.3 Stream Computing Based on Container Virtualization
  • 5 Optimization of the Platform
  • 5.1 Reduce the Execution Time for Batch Data
  • 5.1.1 Parallelism of Data Reception
  • 5.1.2 Parallelism of Data Processing
  • 5.2 Set the Correct Batch Size
  • 6 Conclusion
  • Acknowledgments
  • References
  • A Planner for Supporting Countermeasures in Large Scale Cyber Attacks
  • 1 Introduction and Related Works
  • 2 Multi Agent Based Planning
  • 2.1 Agent Based Planning Problem
  • 3 Attack and Countermeasures Modeling
  • 4 Plan Generation
  • 5 Conclusions
  • References
  • Randomizing Greedy Ensemble Outlier Detection with GRASP
  • Abstract
  • 1 Introduction
  • 2 Outlier Detection
  • 2.1 Ensemble-Based Outlier Detection
  • 2.2 Greedy Ensemble
  • 3 Stochastic Local Search and GRASP
  • 4 Randomized Greedy Ensemble with GRASP
  • 5 Experiments and Results
  • 5.1 Combining Various Scores and Algorithms
  • 5.2 Combining Various Algorithms with the Same Neighborhood K
  • 5.3 Combing LOOP Algorithms with Varying Neighborhood Size K with the Same Distance Function Manhattan (L1 Metric)
  • 6 Conclusions
  • References
  • The 4th International WorkShop on Energy-Aware Systems, Communications and Security (EASyCoSe-2017)
  • Energy Efficient System for Environment Observation
  • 1 Introduction
  • 2 System Design and Architecture
  • 2.1 Power Management
  • 2.2 Data Management
  • 2.3 Communications
  • 3 Experimental Results
  • 3.1 Communication Performance
  • 4 Conclusions and Perspectives
  • References
  • Balancing Demand and Supply of Energy for Smart Homes
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System Model
  • 3.1 Load Categorization
  • 4 Proposed Scheme
  • 4.1 Hybrid HSDE Algorithm
  • 5 Simulation and Discussion
  • 6 Conclusion
  • References
  • EENET: Energy Efficient Detection of NETwork Changes Using a Wireless Sensor Network
  • 1 Introduction
  • 2 Related Works
  • 3 Wireless Fingerprinting Based Systems
  • 3.1 Wireless Fingerprinting Quality Evaluation
  • 4 Model Description
  • 4.1 Sensors Network
  • 4.2 EENET Deployment
  • 4.3 Sentinels Choice
  • 5 System Performances Evaluation
  • 6 Conclusions and Future Work
  • References
  • Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications
  • Abstract
  • 1 Introduction
  • 2 Background and Our Methodology
  • 3 Discussion and Simulation Results
  • 4 Conclusions and Future Work
  • References
  • Design and Deployment of Identity Recognition Systems
  • 1 Introduction
  • 2 Identity Recognition Systems Design
  • 2.1 Composition of Elementary Recognition Services
  • 3 Identity Recognition Systems Deployment
  • 4 Conclusions
  • References
  • The Safety of Your Own App with App Inventor
  • Abstract
  • 1 Introduction
  • 2 The Building of App Security: Steps and Methods
  • 2.1 Designing the Components
  • 2.2 Adding Behaviors to the Components. Screen 1
  • 2.3 TinyDB Components
  • 2.4 Variations
  • 3 Conclusions
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

362,73 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen

362,73 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen