Advanced Information Technology, Services and Systems

Proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) Held on April 14/15, 2017 in Tangier
 
 
Springer (Verlag)
  • erschienen am 10. November 2017
  • |
  • X, 518 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-69137-4 (ISBN)
 

This book includes the proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) held on April 14-15, 2017 in Tangier, Morocco. Presenting the latest research in the field, it stimulates debate, discusses new challenges and provides insights into the field in order to promote closer interaction and interdisciplinary collaboration between researchers and practitioners.

Intended for researchers and practitioners in advanced information technology/management and networking, the book is also of interest to those in emergent fields such as data science and analytics, big data, Internet of Things, smart networked systems, artificial intelligence and expert systems, pattern recognition, and cloud computing.

1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 218 s/w Abbildungen, 100 farbige Tabellen
  • |
  • 218 schwarz-weiße Abbildungen, 100 farbige Tabellen, Bibliographie
  • 81,75 MB
978-3-319-69137-4 (9783319691374)
3319691376 (3319691376)
10.1007/978-3-319-69137-4
weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Contents
  • Advances in Software Engineering
  • Factors Influencing the Adoption of Ambient Assisted Living Technologies by Healthcare Providers in ...
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 2.1 Healthcare in KSA
  • 2.2 Ageing Population in KSA
  • 2.3 Ambient Assisted Living Technologies
  • 3 Barriers Facing Healthcare in KSA
  • 4 Description of the CoP
  • 4.1 Concern 1
  • 4.2 Concern 2
  • 4.3 Concern 3
  • 4.4 Concern 4
  • 4.5 Concern 5
  • 5 Results of the CoP
  • 6 Discussion
  • 7 Conclusion and Future Work
  • References
  • Continuous Improvement of Strategic Alignment Model
  • Abstract
  • 1 Introduction
  • 2 Lean IT and Transformation in Organizations
  • 2.1 The Sustainable Lean Iceberg Model
  • 2.2 Lean Tools and Techniques
  • 2.3 The PDCA Method
  • 3 Lean Concept and Alignment Approach
  • 3.1 Strategic Management Alignment
  • 3.2 Structure of Strategic Alignment Model
  • 3.3 Building Blocks of Strategic Alignment Model
  • 4 PDCA Cycle Adapted to Strategic Alignment Model
  • 5 Recommendations for Good Implementation of Our Model
  • 6 Conclusion
  • References
  • A Comparative Simulation Study on the Performance of LDPC Codes and 3Dimensional Turbo Codes
  • Abstract
  • 1 Introduction
  • 2 LDPC Codes
  • 2.1 Construction of LDPC Codes
  • 2.2 Representations of LDPC Codes
  • 2.3 Classifications of LDPC Code
  • 2.4 Encoding Processes for LDPC Codes
  • 2.5 Decoding Processes for LDPC Codes
  • 3 3Dimensional Turbo-Code
  • 3.1 Coding Structure of 3 Dimensional Turbo Code
  • 3.2 Decoding of 3 Dimensional Turbo-Code
  • 4 Simulation
  • 5 Conclusion
  • References
  • Energy Efficiency Approach for Smart Building in Islanding Mode Based on Distributed Energy Resources
  • Abstract
  • 1 Introduction
  • 2 Literature and Definitions
  • 2.1 Cyber-Physical System
  • 2.2 Smart Building Concept
  • 2.3 Smart House Based on Smart Component
  • 2.4 Context Aware Definition
  • 2.5 Microgrid
  • 2.6 Islanding
  • 2.7 Hybrid Distributed Energy Renewable
  • 3 Smart Building Concept
  • 3.1 Smart CPS Architecture
  • 3.2 Smart Building Based DER
  • 3.3 Smart Home Architecture Based Controllers and Sensors
  • 4 Methodology
  • 4.1 Building Scheme Model
  • 5 Smart Distribution Approach
  • 5.1 Smart Distribution Based on Smart Selection Approach
  • 5.2 Import/Export Energy
  • 5.3 Entity Classification
  • 5.4 Selection Scheme Algorithm
  • 6 Simulation and Analyses
  • 6.1 Case of Study
  • 6.2 Simulation Results and Discussion
  • 7 Conclusion
  • References
  • Genetic Algorithm for Reusable Containers Management Problem
  • Abstract
  • 1 Introduction
  • 2 Paper Preparation
  • 2.1 Problem Definition
  • 2.2 Mathematical Model
  • 3 Hybrid Approach
  • 3.1 Solution Encoding
  • 3.2 Crossover
  • 3.3 Exact Resolution to Determine Quantities
  • 4 Result and Discussion
  • 4.1 Grouped According to the Number of Periods of the Planning Horizon
  • 4.2 Grouped According to the Number of Periods of the Planning Horizon
  • 4.3 Grouped According to the Number of Periods of the Planning Horizon
  • 5 Conclusion
  • References
  • Multi-agent Modeling of Resource Allocation Under Competence and Emergency Constraints in the Hospit ...
  • Abstract
  • 1 Introduction
  • 2 Motivation and Problematic
  • 3 Literature Review
  • 4 In Hospital Environment
  • 5 Description of the Proposed Approach
  • 5.1 Studied Health Care Process
  • 5.2 Simulations
  • 6 Hospital Performance Measurement
  • 6.1 Simulation Interface and Case Studies
  • 6.2 Simulation Tool and Case Study
  • 7 Conclusion and Perspectives
  • References
  • Context Awareness-Based Ontology Using Internet of Things for Multimedia Documents Adaptation
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Approach
  • 3.1 Ontology Modeling
  • 3.2 SPARQL Queries
  • 3.3 Reasoning Rules
  • 4 Experimentation
  • 5 Conclusion
  • References
  • Face Recognition Using Deep Features
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 The Proposed Method
  • 3.1 Data Augmentation
  • 3.2 Network Architecture and Training
  • 4 The Experiments and Tests
  • 4.1 Labeled Face in the Wild
  • 4.2 Results and Discussion
  • 5 PubFace Application
  • 6 Conclusion
  • References
  • Myface: Unconstrained Face Recognition
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 The Proposed Method
  • 3.1 Unconstrained Face Alignment
  • 3.2 Face Representation
  • 3.2.1 Gabor Filters Construction
  • 3.2.2 Feature Extraction Using Gabor Filters
  • 4 The Experiments and Tests
  • 4.1 FERET Dataset
  • 4.2 Results
  • 5 Conclusion
  • References
  • Content-Based Image Retrieval Using Gabor Filters and 2-D ESPRIT Method
  • Abstract
  • 1 Introduction
  • 2 The Proposed Method
  • 3 Experimental Results
  • 4 Conclusion and Perspectives
  • References
  • A Retirement Pension from a Supply Chain Side: Case of the Moroccan Retirement Pension
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 2.1 Pension Schemes
  • 2.2 Supply Chain Modelling
  • 3 Moroccan Pension Fund (MPF)
  • 3.1 MPF Presentation
  • 3.2 MPF Missions
  • 4 Modelling of the Retirement Pension Supply Chain
  • 4.1 The Used Modelling Methodology
  • 4.2 Strategic Level
  • 4.3 Tactical Level
  • 4.4 Operational Level
  • 5 Conclusion
  • References
  • Advances in Web Technologies, Semantics and Future Internet
  • Creating Multidimensional Views from RDF Sources
  • Abstract
  • 1 Introduction
  • 2 Overview of Related Works
  • 3 Architecture and Methodology
  • 4 Conclusion
  • References
  • An Ontology Based Approach to Organize Supplier and Transportation Provider Selection Negotiation in ...
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 3 Description of the Problem
  • 4 Agent-Based Negotiation
  • 5 Agent-Based Negotiation Model for Supplier and Transportation Provider Selection
  • 5.1 Multi-agent System Architecture
  • 5.2 Negotiation Protocol
  • 6 Multi Agent System Construction
  • 7 Conclusion
  • References
  • Deep Neural Networks Features for Arabic Handwriting Recognition
  • Abstract
  • 1 Introduction
  • 2 Method
  • 2.1 CNN Model
  • 2.2 HMM Modeling
  • 2.3 The Used Strategies
  • 3 Experiments and Results
  • 4 Conclusion and Perspectives
  • References
  • SCH-WSD: A Semantic-Conceptual Hybrid Approach for Web Services Discovery
  • Abstract
  • 1 Introduction
  • 2 Semantic-Conceptual Hybrid Approach for WSD
  • 2.1 Architecture
  • 2.2 Similarity Approaches
  • 3 Experiments and Discussion
  • 3.1 IOC-Matching
  • 3.2 IO-Matching
  • 4 Conclusion
  • Acknowledgments
  • References
  • Optimal Regulation of Energy Delivery for Community Microgrids Based on Constraint Satisfaction and ...
  • Abstract
  • 1 Introduction
  • 2 Motivation and Impact on Socio-Economic
  • 3 Sensors Control and Prevention System of Energy Production and Consumption Figures
  • 4 General Applicative Context and Proposed Solution
  • 5 General Overview of Related Research
  • 5.1 Wireless Sensors Network
  • 5.2 Multi Agents System and Simulation
  • 5.3 Data Integration
  • 5.4 Data Integration and Data Processing
  • 6 Functional Architecture
  • 6.1 Inter-node Architecture
  • 6.2 Intra-node Architecture
  • 7 Sources Classification and Constraints Satisfaction
  • 8 Conclusion
  • References
  • Using Image Segmentation in Content Based Image Retrieval Method
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 The Proposed Method
  • 3.1 K-Means Segmentation
  • 3.2 Classification
  • 3.3 Similarity Measure
  • 4 Experimental Results
  • 4.1 Datasets Used
  • 4.2 Performance Evaluation of CBIR
  • 4.3 Image Retrieval
  • 4.4 Response Time
  • 5 Discussion
  • 6 Conclusion
  • References
  • Alignment of IT Frameworks for Corporate Governance
  • Abstract
  • 1 Introduction
  • 2 Guide of Management for Enterprises Frame
  • 2.1 What's an Enterprise
  • 2.2 How the Workflow Is Handled
  • 3 Literature Review
  • 3.1 Management Side of View and Use
  • 3.2 A Call for Governance, a Specific One
  • 3.3 IT Governance and the Choice of Frameworks
  • 3.3.1 ITIL V3
  • 3.3.2 COBIT 5
  • 3.3.3 CMMI
  • 4 Compromising and Combining for a Better IT Governance
  • 4.1 Alignment Method
  • 4.2 Results of the Alignment Methods
  • 4.2.1 Manage the IT Strategy in the Business
  • 4.2.2 Manage the IT Configuration in the Business
  • 5 Conclusion
  • References
  • A Design Requirements Framework for Mobile Learning Environment
  • Abstract
  • 1 Introduction
  • 2 Mobile Learning
  • 3 Designing a Mobile Learning Framework
  • 3.1 Learning Theories
  • 3.2 Generic Mobile Environment
  • 3.3 M-learning Contexts
  • 3.4 Learning Objectives and Experiences
  • 3.5 Social Learning Strategy
  • 3.6 Discussion
  • 4 Conclusion
  • References
  • Knowledge Management in Business, A Multi-desciplinar Science and A State of Mind
  • Abstract
  • 1 Introduction
  • 2 Knowledge Management's Enigma
  • 3 Corporate Communication - A Right Setting of Values and Philosophy for a Strong Culture on Board
  • 4 Talent Management for a Global Competencies Model
  • 5 Information Technology's Share of the Knowledge of a Business
  • 6 Capture of the Future True Knowledge
  • 7 KPIs of Maturity of the Ongoing Operations
  • 8 Conclusion
  • References
  • Advances Networking and Sensor Networks
  • Survey of Security in Software-Defined Network
  • Abstract
  • 1 Introduction
  • 2 SDN Architecture
  • 2.1 Controller Layer
  • 2.2 Application Layer
  • 2.3 Infrastructure Layer
  • 3 Security Issues
  • 4 SDN Attacks
  • 4.1 Application Layer
  • 4.2 Controller Layer
  • 4.3 Infrastructure Layer
  • 5 Countermeasures of SDN Attacks
  • 6 Conclusion
  • Referernces
  • Weakness in Zhang et al.'s Authentication Protocol for Session Initiation Protocol
  • Abstract
  • 1 Introduction
  • 2 Original SIP Authentication Protocol
  • 3 Review of Zhang et al.'s Scheme
  • 3.1 System Setup Phase
  • 3.2 Registration Phase
  • 3.3 Authentication Phase
  • 4 Cryptanalysis of Zhang et al.'s Scheme
  • 5 Our Proposed Protocol
  • 5.1 System Setup Phase
  • 5.2 Registration Phase
  • 5.3 Authentication and Key Agreement Phase
  • 5.4 Password Changing Phase
  • 6 Security Analysis
  • 6.1 Mutual Authentication
  • 6.2 Session Key Secrecy
  • 6.3 Server Spoofing Attack
  • 6.4 User Impersonation Attack
  • 6.5 Denning-Sacco Attack
  • 6.6 Replay Attack
  • 6.7 Stolen Verifier Attack
  • 6.8 Offline Password Guessing Attack
  • 6.9 Man-in-the-Middle Attack
  • 7 Performance Comparison
  • 8 Conclusion
  • References
  • How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime
  • Abstract
  • 1 Introduction
  • 2 Applications Security in Casablanca Smart City
  • 3 Related Works
  • 3.1 Routing Driven Key Management (RECC)
  • 3.2 AVL-Headers and AVL-KDC
  • 4 Technical Methods Used in the Proposed Approach
  • 4.1 Key Management Based on the AVL Tree
  • 4.2 Cryptography Based on Elliptic Curves
  • 5 The Proposed Approach
  • 5.1 Assumptions and Requirements
  • 5.2 The Main Phases of the Mobile Approach
  • 6 Simulation
  • 6.1 Simulation Parameters and Metrics
  • 6.2 Comparison of Metrics
  • 6.3 Security Analysis
  • 7 Conclusion and Perspectives
  • References
  • A Novel Smart Distribution System for an Islanded Region
  • Abstract
  • 1 Introduction
  • 2 Islanding and Distributed Generations
  • 2.1 Power Outage
  • 2.2 Islanding Detection Methods
  • 2.3 Islanding Distributed Energy Resources
  • 3 Proposed Approach
  • 3.1 Smart Region Model
  • 3.2 Costumer Parameters
  • 3.3 Emergency Classification
  • 3.4 Layered Tree Selection Algorithm
  • 4 Simulation and Results
  • 4.1 Case of Study and Discussion Simulation Results
  • 5 Conclusion
  • References
  • Taxonomy of Routing Protocols in MANETs
  • Abstract
  • 1 Introduction
  • 2 History and Challenges
  • 2.1 Brief History
  • 2.2 Networking Challenges
  • 3 Taxonomy of Routing Protocols
  • 3.1 Routing in Wired Network
  • 3.1.1 Distance Victor Routing
  • 3.1.2 Link State Routing
  • 3.2 Routing in Wireless Ad Hoc Network
  • 3.3 Communication Model
  • 3.4 Network Structure
  • 3.5 Scheduling Model
  • 3.6 State Information
  • 3.7 Route Establishment
  • 3.8 Type of Cast
  • 3.9 Type of Path
  • 4 Conclusion
  • References
  • Cloud, Parallel, Distributed and High Performance Computing
  • Allocation Strategy for Cloud Datacenter Based on Multi Agent and CP Approach
  • Abstract
  • 1 Introduction
  • 2 Resource Management in Cloud Computing
  • 3 Literature Review
  • 4 Cloud Datacenter Architecture
  • 4.1 Agents Description
  • 5 Strategy of Allocation
  • 6 Conclusions
  • References
  • A Trusted Way for Encryption Key Management in Cloud Computing
  • Abstract
  • 1 Introduction
  • 2 Cryptographic Key Management System
  • 2.1 CKMS Presentation
  • 2.2 CKMS in the Cloud Computing
  • 2.3 CKMS_SecaaS's Security Challenges
  • 3 TPM Background
  • 3.1 The TPM and the Trust
  • 3.2 TPM's Components
  • 3.3 TPM's Keys Management Concept
  • 3.4 TPM's Key Related Tools
  • 3.5 TPM in Cloud Computing
  • 4 TPM Based CKMS_SecaaS Approach
  • 4.1 Deployment Approach
  • 4.2 TPM vs CKMS_SecaaS
  • 5 Conclusion
  • References
  • Use of Cloud Computing Technologies for Geographic Information Systems
  • Abstract
  • 1 Introduction
  • 2 Geographic Information Systems
  • 3 Cloud Computing
  • 3.1 Cloud Service Models
  • 3.1.1 Infrastructure as a Service (IaaS)
  • 3.1.2 Software as a Service (SaaS)
  • 3.1.3 Platform as a Service (PaaS)
  • 4 The Need for Gis Cloud
  • 4.1 Providing Applications Infrastructure
  • 4.2 Support Technology Infrastructure
  • 4.3 Implementation Cost Benefit
  • 4.4 Reducing Support and Maintenance
  • 4.5 Leveraging Data Command
  • 4.6 Data Conversion and Presentation
  • 4.7 Location Independent Resource- Pooling
  • 4.8 Cloud GIS Platforms
  • 5 Cloud Computing Architecture
  • 5.1 Architecture Basic
  • 5.2 Components and Layers
  • 5.2.1 Client Layer (CL)
  • 5.2.2 The Application Service Layer (ASL)
  • 5.2.3 GIS Platform Layer (GPL)
  • 5.2.4 GIS Cloud Storage Layer (CSL)
  • 5.2.5 Infrastructure Layer (IL)
  • 5.3 Implementation of Proposed System
  • 6 Conclusion
  • References
  • New Real Time Cloud Telemedicine Using Digital Signature Algorithm on Elliptic Curves
  • Abstract
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 Real Time Cloud
  • 2.2 Benefits of Cloud Based Telemedicine
  • 2.3 Elliptic Curve Cryptography (ECC)
  • 2.4 Digital Signature Algorithm Using Elliptic Curve (ECDSA)
  • 3 Framework of the Proposed Approach
  • 3.1 Proposed Scheme
  • 3.2 Initialization Phase
  • 3.3 New Patient Registration Phase
  • 3.4 New Doctor Registration Phase
  • 3.5 Authentication Phase
  • 3.6 Password Changing Phase
  • 4 Conclusion and Future Work
  • References
  • Scalable Lightweight ABAC Scheme for Secure Sharing PHR in Cloud Computing
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Preliminaries
  • 3.1 Elliptic Curve Cryptography
  • 3.2 Elliptic Curve Integrated Encryption Scheme
  • 3.3 Access Structure
  • 3.4 Secret Sharing Scheme
  • 4 Proposed Scheme
  • 4.1 Key-Policy Attribute Based Encryption Scheme
  • 4.2 System Model
  • 4.3 The Proposed Lightweight KP-ABE Scheme
  • 5 Security Analysis
  • 5.1 Security Model
  • 5.2 Security Analysis of LKP-ABE
  • 6 Performance Comparison of Our Scheme
  • 7 Conclusion
  • References
  • IR, Big Data, Business Intelligence, and Knowledge Management
  • Arabic Stemming Techniques as Feature Extraction Applied in Arabic Text Classification
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 2.1 Light-Stemming
  • 2.2 Stemming
  • 2.3 Light-Stemming/Stemming Comparison
  • 2.4 Stemming Models
  • 2.5 Arabic Text Classification
  • 3 KNN with Multiple Feature Selection Techniques
  • 4 Experimentation and Result Analysis
  • 4.1 Dataset Description
  • 4.2 Experiments
  • 4.3 Result Analysis
  • 5 Conclusions and Future Work
  • References
  • A Comparative Study of the Four Well-Known Classification Algorithms in Data Mining
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Methodology
  • 3.1 Dataset Description
  • 3.2 Tool Used
  • 3.3 Classification Algorithms
  • 3.3.1 Naive Bayes
  • 3.3.1 Naive Bayes
  • 3.3.2 Decision Tree C4.5
  • 3.3.3 Support Vector Machines (SVM)
  • 3.3.4 Neural Network (MLP)
  • 3.4 Criteria of Comparison
  • 4 Results
  • 5 Conclusion
  • References
  • Advanced SQL-to-SPARQL Query Transformation Approach
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Overview
  • 3.1 SQL Outer Join
  • 3.2 SPARQL Optional Operator
  • 3.3 Problematic and Motivation
  • 3.4 Optimization Rules
  • 4 Architecture and Algorithms
  • 4.1 Architecture Design
  • 4.2 Transformation Algorithm
  • 5 Conclusion
  • References
  • Migration from Relational Databases to HBase: A Feasibility Assessment
  • Abstract
  • 1 Introduction
  • 2 Basic Definitions
  • 2.1 NoSQL Databases
  • 2.2 HBase
  • 2.3 MapReduce
  • 3 Relational Algebra in Hbase
  • 3.1 Union Set
  • 3.2 Cartesian Product
  • 3.3 Intersection
  • 3.4 Selection
  • 3.5 Projection
  • 3.6 ?-Join and Equijoin
  • 3.7 Natural Join
  • 3.8 Division
  • 4 Operations of Hbase
  • 4.1 Get
  • 4.2 Group by
  • 4.3 Aggregate Function
  • 4.4 Join
  • 5 Conclusion and Future Work
  • References
  • Big Data and IoT: A Prime Opportunity for Banking Industry
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Internet of Things and Hadoop
  • 3.1 Internet of Things for Banking Domain
  • 3.2 Hadoop Framework to Process Big Data
  • 3.3 MapReduce Model
  • 3.3.1 Mapping Phase
  • 3.3.2 Reduce Phase
  • 4 Research Design and Methodology
  • 4.1 Overview
  • 4.2 Risk Management and Fraud Systems
  • 4.2.1 Existing Fraud Systems and Limitations
  • 4.2.2 Proposed Solution and Design
  • 5 Conclusion
  • References
  • Big Data Analytics Applied for Control Systems
  • Abstract
  • 1 Introduction
  • 2 Characteristics of Big Data
  • 2.1 Volume
  • 2.2 Speed
  • 2.3 Variety
  • 3 Characteristics of NoSQL Databases
  • 3.1 Principle of NoSQL Databases
  • 3.2 The Emergence of Big Data and NoSQL Databases
  • 4 Distributed Data Issue and Related Work
  • 5 Data Model Evaluation Criteria
  • 6 Proposal
  • 7 Preparation of Target CS Data
  • 8 Results and Discussion
  • 9 Conclusion
  • References
  • Detecting Network Intrusions Using Multi-class Logistic Regression and Correlation-Based Feature Selection
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Model
  • 3.1 NSL-KDD
  • 3.2 Preprocessing
  • 4 Experimental Results
  • 5 Conclusion and Outlook
  • References
  • The Optimization of Search Engines to Improve the Ranking to Detect User's Intent
  • Abstract
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 Related Work
  • 3 Proposed Work
  • 3.1 Calculate Our Keyword Efficiency Index (KEI)
  • 3.2 Our Proposition
  • 4 Experimentation
  • 5 Conclusion
  • References
  • Hybrid HMM/MLP Models for Recognizing Unconstrained Cursive Arabic Handwritten Text
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 3 Contribution
  • 3.1 Reference System [19]
  • 3.2 Hybrid Classifier
  • 4 Experimental Results
  • 4.1 HMM vs HMM/MLP Classification
  • 4.2 Comparison with Other Systems
  • 5 Conclusion and Perspectives
  • References
  • Reducing Crowding in Hospital Inpatient Unit Using Queuing Theory
  • Abstract
  • 1 Introduction
  • 2 Literature
  • 2.1 Emergency Department Presentation
  • 2.2 Inpatient Unit Load and Capacity
  • 2.3 Inpatient Unit Problems
  • 3 Our Approach Argumentation
  • 4 Our Approach to Reduce Inpatient Unit Crowding
  • 5 Conclusion and Perspectives
  • References
  • Hybrid Penguins Search Optimization Algorithm and Genetic Algorithm Solving Traveling Salesman Problem
  • Abstract
  • 1 Introduction
  • 2 The Travelling Salesman Problem
  • 3 Description of Metaheuristics
  • 3.1 The Genetic Algorithm
  • 3.2 Penguins Search Optimization Algorithm
  • 3.3 HPeSOA Algorithm
  • 4 Adaptation of HPeSOA to Solve TSP
  • 4.1 The GA Operators (Crossover - Mutation)
  • 4.2 The PeSOA Operators (Substraction -Multiplication-Addition)
  • 4.3 The Flowchart of the HPeSOA Algorithm
  • 5 Experimental Results
  • 6 Conclusion
  • References
  • The Particularities of the Counter Propagation Neural Network Application in Pattern Recognition Tasks
  • Abstract
  • 1 Introduction
  • 2 Architecture and Learning Strategy of Counter Propagation Neural Network
  • 2.1 The Structure of the Counter Propagation Neural Network
  • 2.2 The Learning Strategy of the Counter Propagation Network
  • 3 Investigation of the CPNN Abilities for Classification Tasks and the Detection of Data Ambiguities
  • 3.1 Examples of the Recognition Process by the Counter Propagation Network
  • 3.2 The Proposed Approach for Improving the Learning Process of the Counter Propagation Network
  • 4 The Improved Model of the Counter Propagation Network
  • 5 Experimental Results of the Pattern Recognition Tasks by the Improved CPNN
  • 6 Conclusion
  • References
  • Converting Temporal Relational Database into Temporal Object Relational Database
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Semantic Enrichment of Temporal Relational Database
  • 3.1 Definition of the New Valid Time Data Model
  • 3.2 Generation of the NVTM from TRDB
  • 4 Translating NVTM into TORDB Design Schema
  • 5 Translation of the TORDB Design Schema to an ORDB Query
  • 6 Conclusion
  • References
  • Implementing of a Binary Data Generator on a FPGA Card
  • Abstract
  • 1 Introduction
  • 2 Line Offset Register
  • 2.1 LFSR Shift Register
  • 2.2 Implementation of LFSR-Based PRNG
  • 3 Method for Generating a Binary Data Sequence
  • 3.1 Design of a 6-Bit Binary Generator on Matlab
  • 3.2 Design of an 8 Bit Data Generator
  • 3.3 Design of a 16 Bit Data Generator
  • 4 Architecture of a Binary Data Generator
  • 5 Implementation of a Binary Data Generator
  • 6 Simulation of a Binary Data Generator
  • 7 Conclusion
  • References
  • Towards a Hybrid Method of Construction of a Normalized Domain Ontology Used by Machine Teaching PERO2
  • Abstract
  • 1 Introduction
  • 2 Ontologies in the Design of Machine Teaching
  • 3 Brief Description of PERO2 Architecture
  • 4 Methodology to Create Normalized Ontology for PERO2
  • 4.1 The Extraction of the Initial Taxonomy of Our Ontology of Concepts
  • 4.2 Overview on Normalization of Our Domain Ontology
  • 5 Conclusion
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

296,31 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

296,31 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok