Advances on P2P, Parallel, Grid, Cloud and Internet Computing

Proceedings of the 12th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2017)
 
 
Springer (Verlag)
  • erschienen am 2. November 2017
  • |
  • L, 855 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-69835-9 (ISBN)
 

This book presents the latest, innovative research findings on P2P, Parallel, Grid, Cloud, and Internet Computing. It gathers the Proceedings of the 12th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, held on November 8-10, 2017 in Barcelona, Spain. These computing technologies have rapidly established themselves as breakthrough paradigms for solving complex problems by enabling the aggregation and sharing of an increasing variety of distributed computational resources at large scale.

Grid Computing originated as a paradigm for high-performance computing, offering an alternative to expensive supercomputers through different forms of large-scale distributed computing, while P2P Computing emerged as a new paradigm after client-server and web-based computing and has shown to be useful in the development of social networking, B2B (Business to Business), B2C (Business to Consumer), B2G (Business to Government), B2E (Business to Employee), and so on. Cloud Computing has been defined as a "computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits". Cloud computing has quickly been adopted in a broad range of application domains and provides utility computing at large scale. Lastly, Internet Computing is the basis of any large-scale distributed computing paradigm; it has very rapidly developed into a flourishing field with an enormous impact on today's information societies, serving as a universal platform comprising a large variety of computing forms such as Grid, P2P, Cloud and Mobile computing.

The aim of the book "Advances on P2P, Parallel, Grid, Cloud and Internet Computing" is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives, and to reveal synergies between these large-scale computing paradigms.

1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 100
  • |
  • 392 s/w Abbildungen, 100 farbige Tabellen
  • |
  • 392 schwarz-weiße Abbildungen, 100 farbige Tabellen, Bibliographie
  • 112,63 MB
978-3-319-69835-9 (9783319698359)
3319698354 (3319698354)
10.1007/978-3-319-69835-9
weitere Ausgaben werden ermittelt
  • Intro
  • Welcome Message from 3PGCIC-2017 Organizing Committee
  • Welcome Message from 3PGCIC-2017 Workshops Chairs
  • 3PGCIC-2017 Organizing Committee
  • Honorary Chairs
  • General Co-chairs
  • Program Committee Co-chairs
  • Workshop Co-chairs
  • Web Administrator Chairs
  • Local Organizing Co-chairs
  • Steering Committee Co-chairs
  • Track Areas
  • 1. Data Intensive Computing, Data Mining, Semantic Web and Information Retrieval
  • Chairs
  • PC Members
  • 2. Data Storage in Distributed Computation and Cloud Systems
  • Chairs
  • PC Members
  • 3. Secure Technology for Distributed Computation and Sensor Networks
  • Chairs
  • PC Members
  • 4. High Performance and Scalable Computing
  • Chairs
  • PC Members
  • 5. Distributed Algorithms and Models for P2P, Grid, Cloud and Internet Computing
  • Chairs
  • PC Members
  • 6. Bio-inspired Computing and Pattern Recognition
  • Chairs
  • PC Members
  • 7. Cognitive Systems
  • Chairs
  • Sec29
  • 8. Adaptive Web-Based, Distributed and Ubiquitous eLearning Systems
  • Chairs
  • PC Members
  • 9. Knowledge-Based Stream Processing and Analytics
  • Chairs
  • PC Members
  • 10. IoT Computing Systems
  • Chairs
  • PC Members
  • 3PGCIC-2017 Reviewers
  • Welcome Message from SMECS-2017 Workshop Organizer
  • SMECS-2017 Program Committee
  • Workshop Organizer
  • PC Chair
  • PC Members
  • Welcome Message from MDMS-2017 Workshop Organizers
  • SMDMS-2017 Program Committee
  • Workshop Chair
  • International Liaison Chair
  • Program Committee Members
  • Welcome Message from MWVRTA-2017 Workshop Organizers
  • MWRTA-2017 Program Committee
  • Workshop Co-chairs
  • Program Committee Members
  • Welcome Message from ALICE-2017 Workshop Organizers
  • ALICE-2017 Program Committee
  • Workshop Organizers
  • PC Members
  • Welcome Message from CADSA-2017 Workshop Organizer
  • CADSA-2017 Program Committee
  • Workshop Chair
  • Program Committee Members
  • Welcome Message from DEM-2017 Workshop Organizers
  • DEM-2017 Program Committee
  • Workshop Chair
  • Program Committee Members
  • Welcome Message from SiPML-2017 Workshop Organizers
  • SiPML-2017 Program Committee
  • Workshop Chairs
  • Program Committee
  • 3PGCIC-2017 Keynote Talks
  • InterCloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization
  • Advancements in Internet of Things (IoT)
  • Design Challenges and Importance of Fog Computing over Cloud Computing
  • Intelligent Virtual Agents for Education and Training
  • Contents
  • The 12th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2017)
  • Home Energy Management by Differential Evolution and Enhanced Differential Evolution in Smart Grid Environment
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Statement
  • 4 System Model
  • 4.1 Optimization Techniques
  • 5 Simulations and Discussions
  • 6 Conclusion and Future Work
  • References
  • Demand Side Optimization in Smart Grid Using Harmony Search Algorithm and Social Spider Algorithm
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Statement
  • 4 Proposed Scheme
  • 4.1 Classification
  • 4.2 Pricing Scheme
  • 4.3 Techniques
  • 5 Simulations and Results
  • 6 Conclusion
  • References
  • Home Energy Management Using Social Spider and Bacterial Foraging Algorithm
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Statement
  • 4 System Model
  • 4.1 Harmony Search Algorithm
  • 4.2 Firefly Algorithm
  • 5 Simulations and Discussions
  • 6 Conclusion
  • References
  • Optimization of Home Energy Management System Through Application of Tabu Search
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System
  • 3.1 HSA
  • 3.2 TS
  • 3.3 Electricity Consumption Pattern
  • 3.4 Proposed System
  • 4 Performance Evaluation and Analysis
  • 5 Conclusion and Future Work
  • References
  • Load Scheduling in Home Energy Management System Using Meta-Heuristic Techniques and Critical Peak Pricing Tariff
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System Model
  • 3.1 System Description
  • 3.2 Energy Consumption Model
  • 3.3 Classification of Appliances
  • 3.4 Pricing Scheme Model
  • 3.5 Problem Formulation
  • 3.6 HSA
  • 3.7 FPA
  • 4 Simulations and Results
  • 5 Conclusion
  • References
  • Energy Efficiency Using Genetic and Crow Search Algorithms in Smart Grid
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Statement
  • 4 Proposed Scheme
  • 4.1 Categorization of Appliances
  • 4.2 Techniques
  • 4.3 Pricing Scheme
  • 5 Results and Simulations
  • 6 Conclusion and Future Work
  • References
  • Residential Demand Side Management in Smart Grid Using Meta-Heuristic Techniques
  • 1 Introduction
  • 2 Related Work
  • 2.1 Hybrid Techniques
  • 2.2 Dynamic Programming Techniques
  • 2.3 Evolutionary Techniques
  • 2.4 Linear and Fractional Programming Techniques
  • 2.5 Other Techniques
  • 3 Proposed System Model
  • 4 Proposed Methodology
  • 4.1 Genetic Algorithm
  • 4.2 Crow Search Algorithm
  • 5 Results and Discussion
  • 6 Conclusion and Future Work
  • References
  • A Machine Learning Approach for Ranking in Question Answering
  • 1 Introduction
  • 2 Related Work
  • 3 General Approach
  • 3.1 Random Forest
  • 3.2 Multi-Layer Perceptron (MLP)
  • 3.3 Support Vector Machine
  • 3.4 Logistic Regression
  • 3.5 Experimental Results
  • 4 Conclusions
  • References
  • Detecting Malware Based on Opcode N-Gram and Machine Learning
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 System Architecture
  • 4 Opcode N-Gram Extraction and Feature Selection
  • 4.1 Representing Executables Using Opcode
  • 4.2 Feature Selection
  • 5 SVM Classifier for Malware Prediction
  • 6 Evaluation
  • 6.1 Research Questions
  • 6.2 Evaluation Measures
  • 7 Experimental Result and Analysis
  • 7.1 Opcode N-Gram Size
  • 7.2 Feature Selection
  • 7.3 Malicious Files Percentage
  • 8 Conclusion and Future Work
  • Acknowledgments
  • References
  • Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Constriction and Linearly Decreasing Vmax Methods
  • 1 Introduction
  • 2 Node Placement Problem in WMNs
  • 3 Proposed and Implemented Simulation System
  • 3.1 PSO Algorithm
  • 3.2 Simulated Annealing
  • 4 Simulation Results
  • 5 Conclusions
  • References
  • Characterizing User Influence Within Twitter
  • 1 Introduction
  • 2 Related Work
  • 3 Our Proposed Approach
  • 4 Performance Evaluation
  • 5 Conclusion and Future Work
  • References
  • Routing in a DTN: Performance Evaluation for Random Waypoint and Steady State Random Waypoint Using NS3 Simulator
  • 1 Introduction
  • 2 DTNs and Routing Protocols
  • 2.1 DTN Overview
  • 2.2 Routing Protocols
  • 3 Simulation System Design
  • 3.1 NS3
  • 3.2 Simulated Scenarios
  • 4 Simulation Results
  • 5 Conclusions
  • References
  • Optimal Residential Load Scheduling Under Utility and Rooftop Photovoltaic Units
  • 1 Introduction
  • 2 Related Work and Motivation
  • 3 System Model
  • 4 Simulation Results and Discussion
  • 4.1 Energy Consumption Behavior of Appliances
  • 4.2 Electricity Cost per Timeslot Analysis
  • 4.3 PAR Analysis
  • 4.4 Total Cost Analysis
  • 5 Conclusion
  • References
  • A Hybrid Genetic Based on Harmony Search Method to Schedule Electric Tasks in Smart Home
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System Model
  • 4 Proposed Scheduling Algorithm
  • 4.1 Genetic Algorithm
  • 4.2 Harmony Search Algorithm
  • 4.3 A Hybrid Genetic Based on Harmony Search
  • 5 Simulations and Discussions
  • 6 Conclusion
  • References
  • An Efficient Home Energy Management Scheme Using Cuckoo Search
  • 1 Introduction
  • 2 Related Work
  • 3 System Model
  • 3.1 Assortment of Load
  • 4 Proposed Schemes
  • 4.1 GA
  • 4.2 Cuckoo Search
  • 5 Simulations and Discussions
  • 6 Conclusion
  • References
  • Phonetics-Based Parallel Privacy Preserving Record Linkage
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Formulation and Background
  • 3.1 Problem Formulation
  • 3.2 Phonetic Algorithms for Matching
  • 3.3 Apache Spark
  • 4 A Parallel Privacy Preserving Phonetics Matching Protocol
  • 4.1 Protocol Operation
  • 4.2 Privacy Discussion
  • 5 Empirical Evaluation
  • 5.1 Experimental Setup
  • 5.2 Experimental Results
  • 6 Conclusions and Future Work
  • References
  • Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 2.1 RBF
  • 2.2 Improved Ant Colony Radial Basis Model
  • 3 Empirical Results
  • 4 Conclusions
  • Acknowledgement
  • References
  • RBF Model Based on the KECDBN
  • Abstract
  • 1 Introduction
  • 2 CDBN and KECDBN
  • 2.1 CDBN
  • 2.2 KECDBN
  • 2.3 The Radial Basis Function Neural Network
  • 3 The Empirical Study
  • 3.1 The Determination of the Structure of KECDBN
  • 3.2 The Empirical Results
  • 4 Conclusions
  • Acknowledgement
  • References
  • Design of a S-box for SMS4 Based on Threshold Implementation
  • Abstract
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 SMS4 Block Cipher
  • 2.2 DPA
  • 3 Threshold Implementation of the SMS4 S-Box
  • 3.1 TI Resists DPA Attack Principle
  • 3.2 Implementation Scheme of S-Box SM4
  • 4 Conclusion
  • References
  • The Prediction Model of Online Social Networks' Evolution Based on the Similarity of Community
  • Abstract
  • 1 Introduction
  • 2 Related Knowledge
  • 2.1 Overlapping Community
  • 2.2 Dynamic Network
  • 2.3 Community Similarity
  • 2.4 WS Small-World Network
  • 3 Model Building
  • 3.1 Formation
  • 3.2 Dissolve
  • 3.3 Merging
  • 3.4 Splitting
  • 4 Experimental Results and Analysis
  • 4.1 Experiments Settings
  • 4.2 The Comparison of the Number of Events
  • 5 Conclusion
  • References
  • A Game Model of APT Attack for Distributed Network
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Model Initialization
  • 3.1 The Attack Step of APT
  • 3.2 Characteristic of Distributed Network
  • 3.3 Building the Network Defense Framework
  • 4 Establishing the Game Model
  • 4.1 Model Definition
  • 4.2 Network Attack-Defense Game
  • 5 Application of the Model
  • 6 Conclusion
  • References
  • Quality CloudCrowd: A Crowdsourcing Platform for QoS Assessment of SaaS Services
  • 1 Introduction
  • 2 Related Work
  • 3 QCC Framework
  • 4 Prototype Implementation
  • 5 Conclusion
  • References
  • Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 3 Methodology
  • 4 Conclusion
  • References
  • A Policy Based Framework for Software Defined Optical Networks
  • Abstract
  • 1 Introduction
  • 1.1 Related Work
  • 2 Policy Based Management for SDN
  • 2.1 Policy Based Management
  • 3 The Proposed Policy Based Monitoring Framework
  • 3.1 SDN Framework with MIB
  • 3.2 The Policy Architecture
  • 4 Use Cases and Experiment Results
  • 4.1 Experiment Setup
  • 4.2 Configuration Details and Results for SDN Using MIB
  • 4.3 The Use Case Scenario
  • 5 Conclusion and Future Work
  • Acknowledgments
  • References
  • Application of Genetic Algorithm and Simulated Annealing to Ensemble Classifier Training on Data Streams
  • 1 Introduction
  • 2 Ensemble Classifier Model
  • 3 Training Algorithms
  • 3.1 Simulated Annealing
  • 3.2 Genetic Algorithm
  • 4 Evaluation
  • 4.1 Experimental Set Up
  • 4.2 Results
  • 5 Conclusion
  • References
  • Security and Understanding Techniques for Visual CAPTCHA Interpretation
  • Abstract
  • 1 Introduction
  • 2 Recognition Process in CAPTCHA Analysis
  • 3 Examples of CAPTCHAS
  • 4 Example of New Visual CAPTCHA
  • 5 Conclusion
  • Acknowledgments
  • References
  • Convergence Analysis of PSO for Hyper-Parameter Selection in Deep Neural Networks
  • 1 Introduction
  • 1.1 Contribution
  • 1.2 Paper Structure
  • 2 Related Literature
  • 3 PSO for Hyper-Parameter Selection in DNNs
  • 4 Convergence Analysis of PSO
  • 5 Experiments
  • 5.1 Analysis and Discussion
  • 6 Conclusions
  • References
  • Embedding Strategies in Multi-secret Steganography
  • Abstract
  • 1 Introduction
  • 2 Multi-secret Steganography
  • 3 Multiply Secrets Embedding Strategies
  • 4 Conclusions
  • Acknowledgments
  • References
  • Query Expansion Based on WordNet and Word2vec for Italian Question Answering Systems
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 The Proposed Hybrid QE Approach
  • 4 Experimental Evaluation
  • 5 Conclusion
  • References
  • Tuning SyntaxNet for POS Tagging Italian Sentences
  • Abstract
  • 1 Introduction
  • 2 Background and Related Work
  • 3 Forward Selection for Assessing Performance of SyntaxNet Model
  • 4 Improvement of SyntaxNet Model for Tagging Enclitics
  • 5 Conclusions and Future Works
  • References
  • ECT: A Novel Architecture for Evidence Collection in Forensic Investigation
  • 1 Introduction
  • 2 Digital Investigations and Digital Evidences
  • 3 Methodology
  • 4 System Architecture
  • 5 Related Work
  • 6 Conclusions and Future Work
  • References
  • Modeling Instability for Large Scale Processing Tasks Within HEP Distributed Computing Environments
  • 1 Introduction
  • 2 ALICE Software Workflow
  • 3 Event State Modeling
  • 4 Results
  • 5 Conclusions
  • References
  • An Algorithm for Migration and Resource Planning in Cloud Technologies
  • 1 Introduction
  • 1.1 Virtualization
  • 1.2 Resource Virtualizations and Allocations
  • 1.3 Resource Variables
  • 1.4 Effective Migration
  • 1.5 Offline and Live Migration
  • 2 Problem Definition
  • 3 Related Works and Commercial Solutions
  • 3.1 Microsoft Hyper-V and VMware vSphere
  • 3.2 OpenStack
  • 4 Solution Desing
  • 4.1 Components
  • 4.2 Load Evaluation
  • 4.3 Manual Migration Workflow
  • 4.4 Automatic Migration Workflow
  • 5 Conclusions
  • References
  • Multi-level Orchestration of Cloud Services in OrCS
  • 1 Introduction
  • 2 OrCS Architecture
  • 3 Orchestration in OrCS
  • 4 A Case Study
  • 5 Conclusions and Future Works
  • References
  • Performance Analysis of AIN-PT, AIN-SLT and SIIT Network-Based Translators
  • Abstract
  • 1 Introduction
  • 2 The AIN-PT, AIN-SLT and SIIT Mechanisms
  • 2.1 The AIN-PT Mechanism
  • 2.2 The AIN-SLT Technique
  • 2.3 Stateless IP/ICMP Translation Mechanism
  • 3 Considerations of Deploying AIN-PT and AIN-SLT Protocols
  • 4 Limitations of AIN-PT and AIN-SLT Protocols
  • 5 Performance Analysis
  • 5.1 End-to-End Delay (EED)
  • 6 Conclusions
  • References
  • Hiring Doctors in E-Healthcare with Zero Budget
  • 1 Introduction
  • 2 System Model and Problem Formulation
  • 3 Proposed Mechanisms
  • 3.1 Random Pick-Assign Mechanism (RanPAM)
  • 3.2 Truthful Optimal Allocation Mechanism (TOAM)
  • 4 More General Setting
  • 4.1 TOAM-IComP
  • 5 Experimental Findings
  • 5.1 Simulation Set-Up
  • 5.2 Performance Metrics
  • 5.3 Simulation Directions
  • 5.4 Result Analysis
  • 6 Conclusions and Future Works
  • References
  • Metric Based Cloud Infrastructure Monitoring
  • 1 Monitoring Overview
  • 1.1 Metrics
  • 1.2 Events
  • 1.3 Alarms
  • 2 Monitoring Comparison
  • 2.1 Push Versus Pull
  • 3 Monitoring Solution Architecure
  • 3.1 Collectoring Data
  • 3.2 Storing Data
  • 3.3 Visualising Data
  • 4 Advanced Monitoring Features
  • 4.1 Monitoring Correlation
  • 4.2 Monitoring Trends
  • 4.3 Root Cause Analysis
  • 5 Conclusion
  • References
  • A Short Review for Ransomware: Pros and Cons
  • Abstract
  • 1 Introduction
  • 2 Intensive Review of Ransomware
  • 3 Current Security Solution Against Ransomware
  • 4 Conclusion and Future Work
  • References
  • The 10th International Workshop on Simulation and Modelling of Engineering and Computational Systems (SMECS-2017)
  • Power Management in Smart Grid for Residential Consumers
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Statement
  • 4 System Model
  • 4.1 Fish Swarm Optimization
  • 4.2 Genetic Algorithm
  • 5 Simulations
  • 6 Conclusion
  • References
  • Demand Side Management in Smart Grid by Using Flower Pollination Algorithm and Genetic Algorithm
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed System Model
  • 3.1 Classification Model
  • 3.2 Energy Consumption Model
  • 3.3 Load Categorization Model
  • 3.4 Price Model
  • 3.5 Heuristic Algorithms
  • 4 Results and Simulations
  • 5 Conclusion
  • References
  • Using Meta-Heuristic and Numerical Algorithm Inspired by Evolution Differential Equation and Strawberry Plant for Demand Side Management in Smart Grid
  • 1 Introduction
  • 2 Related Work
  • 2.1 Classification
  • 3 Problem Statement
  • 4 System Model
  • 5 Simulations and Discussions
  • 6 Conclusion
  • References
  • Genetic Algorithm and Earthworm Optimization Algorithm for Energy Management in Smart Grid
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Model
  • 3.1 Optimization Techniques
  • 4 Simulation Results and Discussion
  • 4.1 Cost
  • 4.2 Load
  • 4.3 Peak to Average Ratio
  • 4.4 User Comfort
  • 5 Conclusion
  • References
  • Clinical Pathway Pattern Mining: Cleft Lip and Cleft Palate Case Studies
  • Abstract
  • 1 Introduction
  • 2 Basic Definitions
  • 3 Proposed Approach
  • 4 Experiment
  • 4.1 Comparison Between Closed and Maximal Pattern Mining
  • 4.2 Clinical Pathway Pattern Result Evaluation Score
  • 5 Conclusion and Future Work
  • Acknowledgement
  • References
  • The 8th International Workshop on Streaming Media Delivery and Management Systems (SMDMS-2017)
  • Design and Implementation of Division-Based Broadcasting Using NS-3
  • 1 Introduction
  • 2 Division-Based Broadcasting System
  • 2.1 Waiting Times in VoD and Broadcasting Systems
  • 3 Related Works
  • 4 NS-3 Network Simulator
  • 4.1 Outline
  • 4.2 Scenario
  • 4.3 Example of Making Scenario
  • 5 Evaluation
  • 5.1 Evaluation Environment
  • 5.2 Waiting Time
  • 6 Conclusion
  • References
  • A Rare Piece Diffusion Method Using Rateless Coding on BitTorrent-Like Distribution System
  • 1 Introduction
  • 2 Related Work
  • 3 Rarest Piece Diffusion with Multi-piece Rateless Coding
  • 3.1 Encoding Policy
  • 3.2 Example of Proposed Piece Diffusion
  • 3.3 Selection of Encoding Candidate Based on Piece Rarity
  • 3.4 Piece Encoding Considering Rarity
  • 3.5 Avoidance of Duplicate Reception of Encoded Blocks
  • 4 Performance Evaluation
  • 4.1 Simulation Environment
  • 4.2 Simulation Results
  • 5 Conclusion
  • References
  • Models for Stream Data Distribution with Progressive Quality Improvement
  • 1 Introduction
  • 2 Related Work
  • 3 Proposed Models
  • 3.1 System Architecture
  • 3.2 Progressive Quality Improvement
  • 3.3 Data Set Reception Models
  • 3.4 Data Transmission Model and Methods
  • 4 Performance Evaluation
  • 4.1 Evaluation Environment
  • 4.2 Evaluation Results
  • 5 Conclusion
  • References
  • A Skip Graph-Based Collection System for Sensor Data Streams Considering Phase Differences
  • 1 Introduction
  • 2 Problems Addressed
  • 2.1 Assumed Environment
  • 2.2 Input Setting
  • 2.3 Objective Function
  • 2.4 Definition of a Load
  • 3 Skip Graph-Based Collection System Considering Phase Differences
  • 3.1 Skip Graphs
  • 3.2 Phase Differences
  • 4 Evaluation
  • 4.1 Simulation Environments
  • 4.2 Simulation Results
  • 5 Conclusion
  • References
  • The 7th International Workshop on Multimedia, Web and Virtual Reality Technologies (MWVRTA-2017)
  • Proposal of an Open Data Visualization System for Disaster Prevention and Disaster Reduction
  • Abstract
  • 1 Introduction
  • 2 Purpose of Research
  • 3 System Configuration
  • 4 System Architecture
  • 5 Prototype System
  • 5.1 Designated Shelter Information Screen at Normal Times
  • 5.2 Population Density Map Screen at Normal Times
  • 5.3 Lifeline Information (Water) Screen at Emergencies
  • 5.4 Temporary Shelter Information Screen at Emergencies
  • 6 Conclusion
  • Acknowledgments
  • References
  • A Conceptual Framework for Developing an Information Retrieval for Healthcare Services
  • Abstract
  • 1 Introduction
  • 2 IRHS Framework
  • 3 Document Indexing
  • 3.1 Word Segmentation
  • 3.2 Stemming
  • 3.3 Stop-Word Removal
  • 4 Query Formulation and Query Reformulation
  • 5 Matching
  • 6 Result Filtering
  • 7 Conclusions and Future Work
  • Acknowledgments
  • References
  • Adaptive Array Antenna Systems with Machine Learning Based Image Recognitions for Vehicular Delay To ...
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 The Proposed Methods
  • 4 Implementations and Experiments
  • 5 The Conclusion and Future Study
  • References
  • Evaluation of Multimedia Contents for Supporting Different Types of Self-learning
  • Abstract
  • 1 Introduction
  • 2 Educational Multimedia Contents
  • 3 Construction Flow for Educational Multimedia Contents
  • 4 Implementation
  • 5 Preliminary Evaluation
  • 6 Conclusions
  • References
  • The 7th International Workshop on Adaptive Learning via Interactive, Cognitive and Emotional Approaches (ALICE-2017)
  • Application of Fuzzy Ordinal Peer Assessment in Formative Evaluation
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 The Defined Model
  • 3.1 Ordinal Peer Assessment
  • 3.2 Fuzzy Ordinal Peer Assessment (FOPA)
  • 4 Experiment and Evaluation
  • 4.1 Experimental Setting
  • 4.2 Data Collection
  • 4.3 Evaluating Peer Assessment Models
  • 4.4 Additional Experiments
  • 5 Final Remarks
  • References
  • How RU? Finding Out When to Help Students
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 2.1 Human-Computer Educational Support
  • 2.2 Human-Computer Emotional Support
  • 3 Methodology
  • 4 Discussion
  • 5 Conclusion, Limitations and Future Work
  • References
  • Principles for an Effort-Aware System
  • Abstract
  • 1 Introduction
  • 2 Effort-Based Timestamping
  • 2.1 Real-Time Monitoring
  • 2.2 Deferred Monitoring
  • 2.3 Learner-Aware Model
  • 2.4 Pitfalls of the Model
  • 3 Effort-Aware System
  • 4 Study Case: Effort-Aware Intelligent Tutoring System
  • 5 Findings
  • 6 Conclusions and Future Work
  • Acknowledgments
  • References
  • Applications of Distributed and High Performance Computing to Enhance Online Education
  • Abstract
  • 1 Introduction
  • 2 Background
  • 2.1 Engaging eLearning Strategies
  • 2.2 Distributed Computing for eLearning
  • 3 Research Methodology
  • 3.1 Real-Time User Modelling in a Virtual Campus (Cluster Computing)
  • 3.1.1 Motivation
  • 3.1.2 Approach
  • 3.1.3 Results
  • 3.2 Security in Online Learning Based on Trustworthiness
  • 3.2.1 Motivation
  • 3.2.2 Approach
  • 3.2.3 Results
  • 4 Conclusions and Future Work
  • Acknowledgements
  • References
  • Student Engagement Value (SEV): Adapting Customer Lifetime Value (CLV) for a Learning Environment
  • Abstract
  • 1 Introduction
  • 2 Customer Lifetime Value (CLV) and Associated Factors
  • 3 Defining Factors for Student Engagement Value (SEV)
  • 4 Data for Student Engagement Value
  • 5 Calculating the SEV
  • 6 Conclusions
  • Acknowledgment
  • References
  • Learning Resources Based on Analysis of Digital Newspaper Data
  • Abstract
  • 1 Introduction
  • 2 The Problem of the Extraction of Information
  • 3 Sentimental Analysis
  • 4 Requirements of the Application
  • 5 Functionality of the Application
  • 6 Conclusions and Future Work
  • Acknowledgments
  • References
  • An Adaptive Learning Approach Using a Full Engagement Educational Framework
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Framework Proposal
  • 3.1 Case Study
  • 3.2 The FEEF Concept
  • 3.3 The Components of the FEEF
  • 3.4 The FEEF Expected Results
  • 4 Framework Validation and First Results
  • 5 Conclusions and Future Work
  • Acknowledgments
  • References
  • Design of a Microlevel Student Engagement Data Capture System
  • Abstract
  • 1 Introduction
  • 2 Measurement of Student Engagement
  • 3 Designing a Microlevel Data Capture of Engagement
  • 3.1 Identifying Components of the Learning Environment
  • 3.2 Defining Engagement Micro-Surveys
  • 3.3 Creating Templates
  • 3.4 Data Capture Module Design
  • 4 Discussion, Limitations and Future Work
  • 5 Conclusions
  • References
  • The 5th International Workshop on Cloud and Distributed System Applications (CADSA-2017)
  • Voting in Distributed Revision Control Systems
  • 1 Introduction
  • 2 Related Work
  • 3 Attacker Model
  • 4 Assumptions
  • 4.1 PKI
  • 4.2 Graph-Based dRCS
  • 5 Vote Counting Properties
  • 6 Vote Counting Algorithms
  • 6.1 Recursive Algorithm
  • 6.2 Other Approaches
  • 7 Implementation
  • 8 Conclusion and Future Work
  • References
  • Analysis of Frameworks for Building IaaS Cloud Using by Cloud Computing Providers
  • Abstract
  • 1 Introduction
  • 1.1 Cloud Computing
  • 1.2 Infrastructure as a Service
  • 2 Problem Definitions
  • 3 Frameworks for Infrastructure as a Service Cloud
  • 4 Windows Azure Pack
  • 5 VMware
  • 6 OpenStack
  • 7 Comparison and Collaboration
  • 8 Conclusion
  • Acknowledgment
  • References
  • Orchestration and Automation of NVF
  • 1 Introduction
  • 2 The Need for NFV
  • 3 Requirements for NFV
  • 4 Test Cases for VNF
  • 4.1 LBaaS Scenario
  • 4.2 FWaaS Scenario
  • 5 Implementing VNF
  • 5.1 Implementing FWaaS
  • 5.2 Management of Fortigate VM
  • 6 Conclusion
  • References
  • NoC-Based Thread Synchronization in a Custom Manycore System
  • 1 Introduction
  • 2 Related Work
  • 3 Architecture
  • 4 Implementation
  • 5 Evaluation
  • 6 Conclusions
  • References
  • A Methodology for Social Networks Analysis and Mining
  • 1 Introduction
  • 1.1 Text Mining Procedures
  • 2 A Social Network Analysis Methodology
  • 2.1 Text Analysis Tools
  • 2.2 The Methodology
  • 3 Experimental Campaign
  • 3.1 TaLTac Analysis
  • 3.2 GATE Analysis
  • 4 Experimental Results
  • 5 Conclusions
  • References
  • DGP Application for Support Traffic Information Systems in Indoor and Outdoor Environments
  • Abstract
  • 1 Introduction
  • 2 Proposed System
  • 3 Related Works
  • 4 Distances Matrix Symmetrization
  • 5 Study Case
  • 6 Conclusions and Future Work
  • References
  • LoDGP: A Framework for Support Traffic Information Systems Based on Logic Paradigm
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Framework Configuration
  • 3.1 Clusterization
  • 3.2 Vehicles Classification
  • 3.3 Use of Distance Geometry Problem
  • 3.4 Graph Creation
  • 3.5 Logic Algorithm
  • 4 Conclusions
  • References
  • The 4th International Workshop on Distributed Embedded Systems (DEM-2017)
  • Cost and Energy Efficient Indoor and Outdoor Localization of Rail Cars in a Confined Maintenance Site
  • 1 Introduction
  • 2 Localization Methods and Technology
  • 3 Proposed Solution
  • 4 Test Results
  • 5 Conclusions and Future Work
  • References
  • Wireless Surface Electromyography
  • 1 Introduction
  • 2 State of the Art
  • 3 Proof of Concept
  • 4 Data Evaluation
  • 5 Conclusion
  • References
  • Context-Aware Optimization of Distributed Resources in Internet of Things Using Key Performance Indicators
  • 1 Introduction
  • 2 State of the Art
  • 3 Proposed Methodology
  • 3.1 IoT Architecture
  • 3.2 Cost Estimation
  • 3.3 Dynamic Reconfiguration
  • 4 Use Case Scenario
  • 5 Conclusions and Future Work
  • References
  • Acsim: Towards Hyper-scalable Internet of Things Simulation
  • 1 Introduction
  • 2 Related Work
  • 3 Acsim - Architecture Decisions
  • 3.1 Demonstrator
  • 4 Conclusion and Future Work
  • References
  • Automatic Reverse Engineering of CAN Bus Data Using Machine Learning Techniques
  • 1 Introduction
  • 2 Controller Area Network
  • 3 Reverse Engineering
  • 4 Automating the Process
  • 5 Results
  • 6 Conclusion
  • References
  • The 3rd Workshop on Signal Processing and Machine Learning (SiPML- 2017)
  • Estimation Model of Food Texture Considering Sound and Load by Neural Network and Fuzzy Logic
  • Abstract
  • 1 Introduction
  • 2 Overview of the Proposed System
  • 3 Data Acquisition and Signal Processing
  • 3.1 Data Extraction
  • 3.2 Load Data Processing
  • 3.3 FFT of Sound Data and Conversion to Characteristic Values
  • 4 Experiment for Data Acquisition
  • 4.1 Radish
  • 4.2 Cucumber
  • 4.3 Characteristic Values of Samples
  • 5 Neural Network Model
  • 5.1 Training of Neural Network
  • 6 Fuzzy Inference
  • 7 Conclusion
  • References
  • Adaptive Threshold, Wavelet and Hilbert Transform for QRS Detection in Electrocardiogram Signals
  • Abstract
  • 1 Introduction
  • 2 Materials and Methods
  • 2.1 Pre-processing
  • 2.2 Wavelet Transform
  • 2.3 Hilbert Transform
  • 2.4 Adaptive Threshold
  • 2.5 True QRS Locator
  • 3 Results and Discussion
  • 4 Conclusions
  • Acknowledgments
  • References
  • Prediction of Highly Non-stationary Time Series Using Higher-Order Neural Units
  • Abstract
  • 1 Introduction
  • 2 Materials and Methods
  • 2.1 Neural Network Predictive Model
  • 2.2 Quadratic Neural Unit
  • 2.3 Sliding Window Technique
  • 2.3.1 Batch Optimization
  • 3 Results and Discussion
  • 4 Conclusions
  • Acknowledgements
  • References
  • Predicting the Short-Term Exchange Rate Between United State Dollar and Czech Koruna Using Hilbert-Huang Transform and Fuzzy Logic
  • Abstract
  • 1 Introduction
  • 2 Materials and Methods
  • 2.1 Hilbert-Huang Transform
  • 2.2 Fuzzy Logic System Uses a Table Lookup Scheme for Time Series Prediction
  • 2.3 Finding the Embedding Dimension of the Time Series
  • 3 Principles of Our Proposal
  • 4 Experiments
  • 5 Conclusions
  • Acknowledgments
  • References
  • Non Linear Fitting Methods for Machine Learning
  • 1 Introduction
  • 2 Exponential and Polynomial Regression
  • 3 Nonlinear Interpolation
  • 4 Splines Fitting
  • 5 Trigonometric Functions
  • 6 Taylor Series
  • 7 Multivariate Non-linear Functions
  • 8 Multi-layer Artificial Neural Networks
  • 9 Conclusion and Results
  • References
  • Stability Analysis of Routing Strategies for the Maximum Lifetime Problem in One-Dimensional Ad-Hoc Wireless Networks
  • 1 Introduction
  • 2 Formulation of the Problem
  • 3 Solution of the Maximum Network Lifetime Problem for LN
  • 4 Solution Stability Under Modification of Node Location
  • 5 Conclusions
  • References
  • Analysis of Mastication Sound for Development of Food Texture Inference System
  • Abstract
  • 1 Introduction
  • 2 Experiment of Mastication by Human
  • 3 FFT Result and Characteristic Value
  • 3.1 Bone Conduction Sound
  • 3.2 Air Conduction Sound
  • 3.3 Summary and Discussion
  • 4 Neural Network Model
  • 4.1 Training and Evaluating Neural Network
  • 5 Conclusion
  • References
  • Physical-Parameter Identification of Structures From Seismic Responses via Maximum Likelihood Estimation
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 3 Numerical Verification
  • 4 Conclusions
  • Acknowledgments
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

308,21 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

308,21 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung des WebShops erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok