Cybernetics Approaches in Intelligent Systems

Computational Methods in Systems and Software 2017, vol. 1
 
 
Springer (Verlag)
  • erschienen am 4. September 2017
  • |
  • XIV, 392 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-67618-0 (ISBN)
 

This book discusses new approaches and methods in the cybernetics, algorithms and software engineering in the scope of the intelligent systems.

It brings new approaches and methods to real-world problems and exploratory research that describes novel approaches in the cybernetics, algorithms and software engineering in the scope of the intelligent systems.

This book constitutes the refereed proceedings of the Computational Methods in Systems and Software 2017, a conference that provided an international forum for the discussion of the latest high-quality research results in all areas related to computational methods, statistics, cybernetics and software engineering.

  • Global Poetics
  • |
  • Literatur- und kulturwissenschaftliche Studien zur Globalisierung
  • |
  • 661
1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 157 s/w Abbildungen
  • |
  • 157 schwarz-weiße Abbildungen, Bibliographie
  • 50,01 MB
978-3-319-67618-0 (9783319676180)
3319676180 (3319676180)
10.1007/978-3-319-67618-0
weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Organization
  • Program Committee
  • Program Committee Chairs
  • International Program Committee Members
  • Organizing Committee Chair
  • Conference Organizer (Production)
  • Conference Website, Call for Papers
  • Contents
  • Description and Analysis of Systems with Unstructured Additive Uncertainty
  • Abstract
  • 1 Introduction
  • 2 Additive Uncertainty
  • 3 Robust Stability Investigation
  • 4 Example
  • 5 Conclusion
  • Acknowledgments
  • References
  • Interactive Control Systems for Mobile Cranes
  • 1 Innovative Smart Control Systems
  • 2 Safety Systems for Mobile Loader Cranes
  • 3 Interactive Control Systems for Mobile Cranes
  • 4 Conclusions and Perspectives
  • References
  • A Harmony Search Algorithm to Solve the Manufacturing Cell Design Problem
  • 1 Introduction
  • 2 Related Work
  • 3 Manufacturing Cell Design Problem
  • 3.1 Problem Statement
  • 3.2 Problem Representation
  • 4 Harmony Search
  • 4.1 Harmony Memory
  • 4.2 HS Behavior
  • 5 Experimental Results
  • 6 Conclusion and Future Work
  • References
  • Decomposition Algorithms for Mathematical Programming and Generalization of the Dantzig-Wolfe Method
  • Abstract
  • 1 Introduction
  • 2 Methods
  • 3 Results
  • 4 Discussions
  • References
  • Controllability of Evolution Differential Inclusion with Nonlocal Condition in Banach Space
  • Abstract
  • References
  • Lower Bounds on Linear Complexity of Digital Sequences Products of LRS and Matrix LRS over Galois Ring
  • 1 Introduction
  • 2 Low Estimates of Isolated Digital Sequence of MP LRS over Galois Ring with Number of Special Form
  • 3 Properties of Design3
  • 4 Properties of Design 4
  • 5 Conclusions
  • References
  • Geometric Algebra, Extended Cross-Product and Laplace Transform for Multidimensional Dynamical Systems
  • Abstract
  • 1 Introduction
  • 2 Laplace Transformation
  • 3 Geometric Algebra
  • 4 Euclidean and Projective Spaces
  • 5 Extended Cross-Product
  • 6 Duality
  • 7 Solution of Linear Systems
  • 8 Laplace Transform with Simple Examples
  • 9 Symbolic Manipulations and Transformations
  • 10 Conclusion
  • Acknowledgment
  • References
  • Balloon Based Communication to Improve Performance in Vehicular Delay Tolerant Network
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Work
  • 4 Results and Discussion
  • 5 Conclusion
  • References
  • Flow-Based Process Modeling: Application in BPMN and Process-Oriented Software Systems
  • Abstract
  • 1 Introduction
  • 2 Flowthing Model
  • 3 Mapping BPMN
  • 3.1 Product Order Process
  • 3.2 Product Order Process
  • 4 Mapping to YAWL
  • 5 Conclusions
  • References
  • Reliability Assessment of Safety Critical Intelligent Systems: Issues and Challenges
  • Abstract
  • 1 Introduction
  • 2 Research Questions and Problematic Issues
  • 3 Existing Strategies and Their Issues
  • 4 Some of the Used Techniques and Standards
  • 5 Reliability Assessment of Software Components
  • 6 Reliability Assessment of Electronic Components
  • 7 System Reliability Assessment
  • 8 Conclusion
  • Acknowledgements
  • References
  • Multiple Feature Extraction and Multiple Classifier Systems in Face Recognition
  • Abstract
  • 1 Introduction
  • 1.1 A Subsection Sample
  • 2 Review of the Research Literature
  • 3 The Proposed Method
  • 3.1 Pre-processing
  • 3.2 Segmentation
  • 3.3 Classification
  • 3.4 Feature Extraction
  • 3.5 Hierarchical Hybrid System
  • 4 Simulation Results
  • 4.1 The First Phase - Image Recalling
  • 4.2 The Second Phase - Classifiers Implementation
  • 4.3 The Third Phase - Features Investigation
  • 5 Conclusion
  • References
  • High-Level Control System for a Path-Planning Teaching Aid
  • 1 Introduction
  • 2 Background of the Practical Work
  • 2.1 Objective of the Practical Work
  • 2.2 Teaching Aid
  • 3 Design of the High-Level Control System
  • 3.1 Analysis of the Problem
  • 3.2 Design of the GUI
  • 3.3 Workflow of Activities
  • 4 Testing the Proposed Solution
  • 4.1 Test Scenarios
  • 4.2 Evaluation Results
  • 5 Conclusion
  • References
  • FIPA-Based Semi-centralized Protocol for Negotiation
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 2.1 Contract Net Protocol
  • 2.2 Recruiting Interaction Protocol
  • 3 Proposed Work: Semi-centralized Negotiation Protocol
  • 3.1 The External Agent Behavior
  • 3.2 The Proposed Internal Agent Structures
  • 4 Implementation and Results
  • 5 Conclusion
  • References
  • Modelling and Analysis of Distributed Asynchronous Actor Systems Using Theatre
  • Abstract
  • 1 Introduction
  • 2 Modelling with Theatre
  • 2.1 Asynchronous Leader Election
  • 2.2 Multi Flight Booking
  • 3 Mapping Theatre onto Uppaal SMC
  • 4 Experimental Results
  • 4.1 Asynchronous Leader Election
  • 4.2 Multi Flight Booking
  • 5 Conclusions
  • References
  • Influence of Information and Communication Technology Development on Personal Information Environment
  • Abstract
  • 1 Introduction
  • 2 Information Management in Organization
  • 3 Personal Information Environment
  • 4 Information Fragmentation
  • 5 Discussion
  • References
  • Sizing of Wind, Solar and Storage Facilities Associated to a Desalination Plant Using Stochastic Optimization
  • 1 Introduction
  • 2 Materials and Methods
  • 3 Calculation
  • 3.1 Desalination Plant Model
  • 3.2 Water Deposit Model
  • 3.3 Wind Plant Model
  • 3.4 Solar Plant Model
  • 3.5 Storage Plant Model
  • 3.6 Economic Analysis
  • 3.7 Combined Model
  • 3.8 Optimization Model
  • 4 Results
  • 4.1 Optimal: All Solar
  • 4.2 Conservative Solution: Combination of Wind and Solar
  • 5 Discussion
  • 6 Conclusion
  • References
  • Event-Based Methodology for Real-Time Data Analysis in Cyber Physical Systems
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 3 Results
  • 3.1 Sensors in the Signal Space
  • 3.2 Sensors in the Event Space for Short Term Movement Characterization
  • 3.3 Sensors in the Event Space for Long-Term Movement Characterization
  • 3.4 Use-Cases
  • 4 Discussion
  • Acknowledgements
  • References
  • Agent-Based Approach to Distributed Information and Control System Reconfiguration
  • Abstract
  • 1 Introduction
  • 2 The Layout of the DICS Dependability Problem
  • 3 Performance Redundancy and Reconfiguration Procedure
  • 4 Agent-Based Approach to the Reconfiguration
  • 5 Conclusions and Future Work
  • Acknowledgements
  • References
  • A Multicriteria Model Applied to the Choice of a Competitive Strategy for the Printed Newspaper
  • Abstract
  • 1 Introduction
  • 2 Justifications
  • 3 Theoretical Reference
  • 4 Methodology
  • 5 Application of ZAPROS III-i Method
  • 6 Definition of Criteria
  • 7 Results
  • 8 Conclusion and Future Works
  • Acknowledgement
  • References
  • Overview and Comparison of Machine Learning Methods to Build Classification Model for Prediction of Categorical Outcome Based on Medical Data
  • Abstract
  • 1 Introduction
  • 2 Background and Methods
  • 2.1 Selection of Appropriate Methods for the Classification Model
  • 2.2 Identification of Problems in Data Collection
  • 2.3 Selection of an Appropriate Methods to Remove Errors in the Dataset
  • 3 Classification Methods
  • 3.1 Classification and Regression Trees
  • 3.2 Neural Networks
  • 3.3 Support Vector Machines
  • 4 Conclusion
  • Acknowledgements
  • References
  • Increasing the Efficiency of Logistics in Warehouse Using the Combination of Simple Optimization Methods
  • Abstract
  • 1 Introduction
  • 2 Problem Formulation
  • 3 Analysis and Simulations
  • 3.1 Random Solution - Small Truck - First Step of Two Steps
  • 3.2 All Combinations Algorithm - Small Truck
  • 3.3 Random Solution - Standard Truck
  • 3.4 All Combinations Algorithm - Standard Truck
  • 3.5 Random Solution - Jumbo Truck
  • 3.6 All Combinations Algorithm - Jumbo Truck
  • 4 Summary of Results
  • 5 Conclusion
  • Acknowledgment
  • References
  • AgileRE: Agile Requirements Management Tool
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 3 Related Work
  • 3.1 Tool Comparison
  • 4 Survey on Tools
  • 4.1 Survey Analysis
  • 5 Requirements Formation for "AgileRE" Tool
  • 6 "AgileRE" Tool
  • 6.1 "AgileRE" Tool Features
  • 6.1.1 Create and Manage User Roles and Access
  • 6.1.2 Create and Manage Epics Within a Project
  • 6.1.3 Create and Manage User Stories Within Epic
  • 6.1.4 Create and Manage User Persona
  • 6.1.5 User Story Status Workflow
  • 6.1.6 Customer Signoff Functionality
  • 6.1.7 Internal Feedback
  • 6.1.8 Project Dashboard
  • 6.1.9 Project Reports
  • 7 Discussion
  • 8 Conclusion
  • References
  • An Overview on Data Security in Cloud Computing
  • Abstract
  • 1 Introduction
  • 2 Data Security Issues Classification
  • 2.1 Data Issues According to Cloud Characteristics
  • 2.2 Data Issues According to Cloud Data Life Cycle
  • 2.3 Data Issues According to Data Security Attributes
  • 3 Data Security Issues Solutions
  • 4 Conclusions
  • References
  • A New Framework of Authentication Over Cloud Computing
  • Abstract
  • 1 Introduction
  • 2 Cloud Computing Overview
  • 3 Security Identification of Treats
  • 4 Related Works
  • 5 Proposed Security Model
  • 6 Conclusion and Future Works
  • References
  • Towards the Adoption of Software Engineering Principles for Assessing and Ensuring the Reliability of Digital Forensic Tools
  • Abstract
  • 1 Introduction
  • 2 Motivation from Related Works
  • 3 Overview of Software Engineering Methodologies
  • 4 Software Engineering Principles
  • 4.1 Maintainability
  • 4.2 Simplicity
  • 4.3 Modularity
  • 4.4 Availability
  • 4.5 Security
  • 4.6 Accuracy
  • 4.7 Reliability
  • 4.8 Abstraction
  • 4.9 Survivability
  • 4.10 Reparability
  • 4.11 People Management
  • 4.12 End User Valuation and Communication
  • 4.13 Documentation and Support
  • 4.14 Redundancy and Diversity
  • 5 Future Work
  • 6 Conclusion
  • References
  • A Study on the Intention to Use the Wearable Device in Taiwan: A Case Study on Xiaomi Mi Band
  • Abstract
  • 1 Introduction
  • 1.1 The Smart Devices: Xiaomi Mi Band
  • 1.2 Theoretical Model: The Technology Acceptance Model 3
  • 2 Method
  • 2.1 Sample
  • 2.2 Measures
  • 2.3 Data Analysis
  • 3 Results
  • 3.1 Measurement Model
  • 3.2 Structural Model
  • 4 Discussion and Conclusion
  • References
  • N-version Software Module Requirements to Grant the Software Execution Fault-Tolerance
  • 1 Introduction
  • 2 Requirements for Design and Development of N-version Software
  • 2.1 Dynamic Connection of the Program Modules
  • 2.2 Encapsulation Requirement
  • 2.3 Inter-module Access (Protection)
  • 2.4 Independence of the Program Modules from the Programming Language
  • 3 Results and Discussion
  • 4 Conclusion
  • References
  • A Rough-Fuzzy Inference System for Selecting Team Leader for Software Development Teams
  • Abstract
  • 1 Introduction
  • 2 Rough-Fuzzy Classification Model
  • 3 Methodology
  • 4 Results and Discussion
  • 4.1 FIS Controller in Simulink
  • 4.2 Performance Evaluation of Rough-Fuzzy System
  • 5 Conclusion
  • References
  • Multicriteria-Based Analysis and Evaluation of Business Processes Executed in Multi-Cloud Environment
  • Abstract
  • 1 Introduction
  • 2 Overview of the Proposed Approach
  • 2.1 A Meta-model for BPO in the Cloud
  • 2.2 Contribution of the BI-based Approach in Business Process Life Cycle
  • 3 A Decision-Making Support for BPO to the Cloud
  • 3.1 Data Warehouse Design
  • 3.2 Structuring of Data in a Multidimensional Form
  • 3.3 Knowledge Extraction from Business Process Executions
  • 4 Some Implementation Aspects
  • 5 Related Work
  • 6 Conclusion and Perspectives
  • References
  • Testing of Perceptual Discriminability in Workflow Diagrams by Eye-Tracking Method
  • Abstract
  • 1 Introduction
  • 2 Methods and Materials
  • 2.1 Eye-Tracking Experiment
  • 2.2 Experimental Workflow Diagrams
  • 2.3 Statistical Evaluations of Eye-Tracking Metrics
  • 3 Results
  • Acknowledgment
  • References
  • A New Thermodynamic Equilibrium-Based Metaheuristic
  • 1 Introduction
  • 2 Related Works
  • 3 The Thermodynamic Equilibrium as Inspiration Source
  • 3.1 Variable Nomenclature
  • 3.2 Fundamental Equations
  • 3.3 Mathematical Models for the Bubble Point Calculation and the Dew Point Calculation
  • 4 Algorithm
  • 4.1 Movement Operators
  • 4.2 Parameters
  • 4.3 Characterization of Chemical Especies
  • 4.4 Inputs and Outputs
  • 4.5 Algorithm
  • 5 Experimental Results
  • 5.1 Benchmark Functions
  • 5.2 Results
  • 6 Conclusions and Future Work
  • References
  • Internet of Things Location Services with Multi-platform Mobile Applications
  • 1 Introduction
  • 2 State of the Art
  • 3 Motivation and Research Environment
  • 4 Experimental Results
  • 5 Conclusions
  • References
  • Designing a Tool for Evaluating the Quality of the Teaching-Learning Workflow of Distance Learning Universities
  • Abstract
  • 1 Introduction
  • 2 Evaluating on Line Courses: A Brief State-of-the-Art
  • 3 Problem Formulation
  • 4 Problem Solution
  • 4.1 User Roles and Use Case Model
  • 4.2 Evaluating Quality of Learning Using Expert System
  • 5 Conclusion
  • Acknowledgment
  • References
  • A DaaS Based Framework for IoT Data Provisioning
  • Abstract
  • 1 Introduction
  • 2 Quality of Data in IoT
  • 3 Data Brokerage
  • 4 Architecture for IoT Data Acquisition
  • 4.1 The Sensing Layer
  • 4.2 Edge Computing and IoT Data Aggregation Layer
  • 4.3 Cloud-Based DaaS Services Layer
  • 4.4 Data Brokerage Layer
  • 5 Algorithm for QoD-Driven Ranking of DaaS Providers' Offerings
  • 6 Conclusion
  • References
  • Smart Grid Communication Protocols in Intelligent Service for Household Energy Use
  • Abstract
  • 1 Introduction
  • 2 Characteristics and Parameters in Smart Grid System
  • 2.1 Power Generation from Renewable Energy Sources
  • 2.2 Designing and Standards in Smart Grid System
  • 3 Communication Technologies for Smart Grid Systems
  • 3.1 ZigBee
  • 3.2 Wireless Mesh
  • 3.3 Cellular Network Communication
  • 3.4 Long Term Evolution
  • 3.5 Powerline Communication
  • 4 Intelligent Service for Household Energy Use - ISHEU
  • 5 Conclusion
  • References
  • Erratum to: Sizing of Wind, Solar and Storage Facilities Associated to a Desalination Plant Using Stochastic Optimization
  • Erratum to: Chapter "Sizing of Wind, Solar and Storage Facilities Associated to a Desalination Plant Using Stochastic Optimization" in: R. Silhavy et al. (eds.), Cybernetics Approaches in Intelligent Systems, Advances in Intelligent Systems and Computing 661, https://doi.org/10.1007/978-3-319-67618-0_16
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

202,29 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

202,29 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok