|
Showing 1 - 21 of
21 matches in All Departments
This book presents original results on the leading edge of computer
science research. The first chapter begins by presenting several
supervised machine learning methods and their applications in
analysing microarray and genotyping data to classify and predict
sample phenotypes. Chapter two presents the design and
implementation of the EstiNet cloud, and evaluates its performance.
Chapter three proposes a simple high switching power supply
designed especially for large battery charging. Chapter four
studies the constant control of temperature, with the
microcontroller PIC, by iterative adjustments of the temperature on
a thermal sensor from the heat source. Chapter five proposes two
types of pinning control protocols to ensure group consensus
regardless of the magnitude of the coupling strengths among the
agents. Chapter six describes how point clouds are constructed, and
provides a brief discussion on the currently available software
that is used for the processing of point clouds. The final chapter
reviews the metamodels used to approximate computationally
expensive simulations.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include weighted fusion of shape
descriptor for robust shape classification; metaheuristics for
curve and surface reconstruction; stream-based parallel computing
methodology and development environment for high performance many
core accelerators; h-infinity recursive wiener fixed-interval
smoother based on innovation approach in linear discrete-time
stochastic systems; and virtual supercomputers as the basis of
scientific computing.
In this compilation, the values for the website features, such as
number of errors in HTML code, content readability score, page load
time, bounce rate, etc. were collected with a specially developed
web intelligence miner from available linked open data sources, the
accuracy of which was investigated. Usability and similarity
evaluations were obtained from 100+ international users interacting
with 21 websites of selected German and Russian universities. Next,
the authors discuss the application of data mining and machine
learning methods in basic research, clinical diagnosis, and
treatment of ALS, hoping that this chapter will provide useful
resources for people who are interested in applying big data
analysis of human disease research. The authors also introduce the
Network-on-Chip paradigm to effectively communicate between on-chip
cores, providing a basic introduction to WiNoC architectures and a
comprehensive review of recent research efforts. A systematic
methodology for modeling and control of flexible manufacturing
networks for mass customization is presented, especially focusing
on formal representation and control synthesis aspects.
Manufacturing networks are formed out of complex interconnections
amongst various manufacturing and service facilities, from supply
chains located in geographically different places, in a global
manufacturing and distribution communication network to machine
control systems in a factory. Following this, a study was conducted
on agricultural land use planning in Guangdong Province, which aims
to make agricultural land use planning and management of
information in Guangdong Province scientific and systematic.
Specific studies include: basic concepts of geographic information
systems and agricultural planning studies; exploration of the space
content digitizing method; building the relevant geographic
information database; and agricultural land use planning GIS. The
authors give a brief overview of ArcGIS and elaborates on the
survey study for GIS technology at home and abroad, as well as its
purpose and significance. Using ArcGIS, they conduct and edit the
geographic information, construct an electronic map, and build up a
meteorological system database using SQL Server. After that, the
meteorological information system of Guangdong Province is
developed with inquiry and display functions. The final chapter
presents a detailed faults/defects analysis and an effcient
reliability assessment method to approximate the lifetime
reliability of a NoC system. Also, this chapter presents an
architecture and hardware design of a fault-tolerant TSV based
3D-NoC system which can handle major failures (i.e., hard-faults,
soft-errors and TSV-defects) that can occur in TSV-based 3D-NoC
systems.
In the first chapter of this book, Jose M. Chaves-Gonzalez
discusses DNA sequence design and proposes a multi-objective
approach using swarm intelligence to solve optimisation issues. In
the second chapter, Alina Andreica suggests the significance of
using systematically applied mathematical algorithms to design and
implement software. Additionally, she proposes specific
mathematical models of problems of equivalence and simplification.
Next, Galina M. Antonova provides a supplement of findings
presented in the book Pattern Recognition: Practices, Perspectives
and Challenges (D B Vincent; Nova Science Publishers Inc, 2013) in
the third chapter. In the fourth chapter, Mohammed Blej and Mostafa
Azizi propose the use of fuzzy logic in order to efficiently
schedule in real-time systems. Following this, in the fifth chapter
Jose F L Naranjo, Julio C B Torres, and Roberto A Tenenbaum explore
an advantageous configuration for spatial interpolation of Head
Related Impulse Responses, or HRIRs, through artificial neural
networks, making this appropriate for auralisation systems. Marcia
Horn, Sandro Sawicki, Fabricia Roos-Frantz, Rafael Z Frantz, and
Igor G Haugg examine the performance of application integration
solutions through the development of formal models of simulation
established on Markov chains in the sixth chapter. Next, the
seventh chapter by Alexsandro Q Lencina, Roberto S Cargnin,
Fabricia Roos-Frantz, Rafael Z Frantz, and Sandro Sawicki presents
a case study on an integration solution to a real-world problem of
integration in managing research results. Following this, the
eighth chapter by Seiichi Nakamori explores continual temperature
regulation in a closed space using the Arduino program. In the
ninth and final chapter, Jonghoek Kim discusses the building of an
information (sensor) network through numerous robots setting out
information nodes.
This book presents original results on the leading edge of computer
science research. Chapter One reviews a framework for
high-dimensional optimization problems. Chapter Two proposes the
use of Stable Logical Infrastructures (SLI) for the effective and
strategic reuse of architectural designs. Chapter Three discusses
the control system design problems for autonomous intelligent robot
systems from the viewpoint of a Petri net approach. Chapter Four
studies predation tactics on grouping prey via individual-based
computational models. Chapter Five defines a rating contribution
ratio and quantifies it from the perspective of a collaborative
filtering algorithm; discusses a method of efficiently improving
the recommendation accuracy by performing several simulations
experiments; and defines and formulates the rating contribution
ratio based on a user-based collaborative filtering algorithm.
Chapter Six proposes a conceptual bilateral Cloud
Forensic-as-a-Service model where both consumers and providers can
independently collect, verify the equity of the forensic analysis
process and try to resolve potential disputes emerging from the
independently collected results. Chapter Seven develops a cellular
and iridium network based blood pressure and body temperature
remote measurement platform for mobile healthcare education.
This book presents original results on the leading edge of computer
science research. Chapter One discusses motion planning for robots
with rigid bodies. Chapter Two provides an overview of
handheld/mobile computing devices, pathology applications, social
media in the context of pathology, and novel mobile-driven
technologies like wearables and mixed reality tech, and discusses
their potential impact in pathology. Chapter Three focuses on
reliability and accessibility issues of a distributed cloud service
based on Semi-Markov modeling. Chapter Four examines parallel
dynamic programming for large-scale date applications. Chapter Five
presents the ensemble of both texture and color features for
reliable person re-identification. Chapter Six provides an overview
of common techniques and commercial products used in tracking
people and objects within indoor environments. Chapter Seven
analyses quadratic programming formulation for controlling the
emissions of air pollution point sources.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include telecommunication network
security; application of cloud computing in preclinical radiation
treatment planning; computational cryptography based on phase
encoding and intensity pattern superposition via optics theory; an
agent-based optimised cloud service discovery system; computing
network reliability with diameter constraints; a survey on the open
source tools for modelling and implementing enterprise application
integration solutions; a technology proposal to realise enterprise
application integration.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include coverage and intrusion detection
in wireless sensor networks; computer networks, the internet, and
green IT; security in wireless sensor networks; performance of a
tree routing topology for wireless sensor networks using different
platforms; location estimation in modern mobile computing
environments; towards a gender-focused programming performance
model; methodologies and processes language for the software
industry; design of Luria memory test for older adults on mobile
devices; synchronizing nods of a computer-generated character and a
speaker using thermal image processing; evaluation of effective
parameters of energy consumption in wireless sensor networks;
computer aided-thermal module design; and a high performance hybrid
FAT32 file system.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include the deformation of materials
from macro- to nanoscale and numerical modeling; enabling
end-to-end QoS guarantees in the next generation internet with
service overlay networks; neuro-fuzzy systems for autonomous mobile
robots; semantic technologies to model and control the
composability of complex systems; load-distribution algorithm for
grid computing with heterogeneous tasks; a hybrid approach for
robot policy adaptation; using mobile web applications as a
multi-platform mechanism to communicate users with embedded
devices; genetic programming as a solver to challenging
reinforcement learning problems; design and implementation of a
system for interactive high-dimensional vector field visualization;
and Routley-Star and informational interpretation.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include online impairment aware routing
and wavelength assignment in WDM optical networks; data fusion in
ad-hoc networks; NCTUns distributed network emulator; wireless mesh
sensor networks and fully adaptive wormhole router design for
network-on-chips.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed in this compilation include contemporary
DRAM memories using predictors; database management in risk
analysis for nuclear reactors; simulating load balancing in a
distributed service architecture; ViER and VaSER analyses of logic
circuits in advanced CMOS processes; VLSI circuit design for fuzzy
C-means algorithm in reconfigurable hardware; scheduling in WiMAX
mesh networks and performance evaluation of configurable
multiprocessors.
This compilation opens with a review of the applications of several
anomaly-based methods under the computational intelligence umbrella
for the detection of DDoS attacks. Following this, a study is
carried out to reveal the effects of a device developed to enable
visually-impaired people to read any document in the Braille
alphabet. The performance of the Artificial Bee Colony (ABC)
algorithm on CEC2010 benchmark problems is also studied, with the
goal of increasing the performance of the algorithm changes
presented in large-scale optimization problems. Later, the
opportunities and limitations of present waste management
techniques are highlighted, and some future research proposals are
discussed. The authors provide an overview of the field of motion
capture focusing on methods, systems, and applications. More
information about the motion processing and motion reconstruction
technologies applied in the most prevalent optical and inertial
systems is presented. In closing, a partially-manual method for
using images to measure body poses is presented and discussed.
Horizons in Computer Science Research. Volume 18 first discusses
intermittently connected networks, a form of the delay tolerant
network, where there never exists a complete end-to-end path
between two nodes wishing to communicate. The authors provide an
overview of the current algorithms (both analytic and iterative)
for the generation of tomographic images, including comparisons of
the basic characteristics of image quality. An intelligent
scheduling framework is proposed to alleviate the problems
encountered in modern job scheduling. The challenges of high
performance computing scheduling and state-of-art scheduling
methods to overcome these challenges are investigated. The state of
art developments in quantum cryptography are presented, as well as
the fundamental laws of quantum physics that quantum key
distribution is based on. Subsequently, three main protocols of key
distribution are introduced which enable users to share a secret
between them. Three iterative methods for dose reconstruction in
protoacoustics are discussed, including: gradient-descent
algorithm, SART and MLEM, which are widely used in other medical
imaging modalities such as PET, SPECT and CT. Additionally, the
authors evaluate the behaviour of the concurrent execution of tasks
in different implementations by Java virtual machines. The
performance measurements were analysed by rigorous statistical
techniques: analysis of Variance and HSD comparison test of Tukey
averages. A mathematical model for finding the distribution of
threads in local pools that minimises the makespan in integration
processes is also presented. Makespan is a metric that calculates
the average time a message takes to be executed by an integration
process. In closing, varied knowledge sources for aspect clustering
are explored a new method, OpCluster-PT, is proposed. To support
this research, annotated corpora and some related resources that
are publicly available to the interested reader have been included.
This compilation opens with a study wherein state of the art
publications on Big Data Analytics are analyzed in order to create
an updated classification scheme with several orthogonal dimensions
of classification. These dimensions include stages of application,
challenges, solution origins, specialization of technologies,
purpose, ownership, data processing, data types applied and
intended user types. The authors propose that we need an effective
data extraction method to gather required data and present it in a
meaningful form for further analysis. Next generation interactive
data analysis with real time responses requires scalable complex
data processing methods to generate meaningful insights. Thus,
powerful visualization methods should be designed to allow users to
generate reports based on various parameters in a comprehensible
way. The authors also outline highly modular framework for the
generation and realization of multimodal natural communication
incorporating embodied conversational agents, male or female. The
personification of the machine responses is achieved through
automatic generation and visualization of co-verbal behavior, based
on the behavior generation engine, and the physical realization via
behavior realization engines based on Unity Game engines core. When
a designer is confronted with multi-stakeholders scenarios of use
in which the needs of one user group may clash with, compete or be
orthogonal to others, the responsibility of sorting, prioritising
and including user needs in the user interface solely remains
within designers domain. As such, this collection proposes that in
an integrated technology ecosystem, user interface designers must
have the ability to to uncover user needs that may make an impact
on peoples digital experience. The following paper analyzes the
basic forms of the legal protection of graphical user interfaces in
the European Union, describing the basic principles of protecting
registered community designs. The authors deal with the copyright
protection of graphical user interfaces, highlighting the
advantages and disadvantages of such regimes of protection and
their possible overlap. The penultimate chapter outlines the need,
terminology, features, types, architecture, uses, and security
tools available for data warehouse. The importance of security
tools for data warehouse is greater than ever before, so the
strategies, and economics of security measures are discussed and
the types and effectiveness of security measures are evaluated.
Lastly, the authors consider the problem of auto speed scaling
scheme optimization for elastic cloud computing platforms. It is
observed that there is a tradeoff between performance and cost,
i.e., the highest performance and the lowest cost cannot be
achieved simultaneously. To analyze this, a queueing model to study
a vertically scalable cloud platform, i.e., a multiserver system
with variable speed, where both the performance and cost can be
characterized effectively.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed include e-science machine learning and
knowledge discovery in databases; intuitive human-robot
interaction; virtual laboratories in physics education; linear
dimensionality reduction and feature selection for visual object
recognition; and a distributed infrastructure for monitoring
network resources.
This book presents original research results on the leading edge of
computer science research. Each article has been carefully selected
in an attempt to present substantial research results across a
broad spectrum.
This volume presents original research results on the leading edge
of computer science research. Each article has been carefully
selected in an attempt to present substantial research results
across a broad spectrum.
This book presents original research results on the leading edge of
computer science research. Each article has been carefully selected
in an attempt to present substantial research results across a
broad spectrum.
This book presents original results on the leading edge of computer
science research. Each article has been carefully selected in an
attempt to present substantial research results across a broad
spectrum. Topics discussed in this compilation include multi-path
routing protocols for ad hoc networks; development of software to
characterise particulate matter in air pollution; web-based
software infrastructure for service-oriented science; clinical
applications of wearable monitoring systems; distributed computing;
and, encryption software and computer science firewalls.
Volume 19 first describes the principles, materials and processes
in 2.5D printing and post-press enhancement based on the authors'
research. This compilation goes on to discuss Hadoop, a pioneering
open source framework that has revolutionized the big data world
due to its ability to process vast amounts of unstructured and
semi-structured data by distributing a massive amount of data
across clusters. A new tool that uses general and query-based
summarization to analyze students' log files at the Academic Center
for Tutoring at Columbus State University, a small state university
in Georgia, USA, is introduced. The concept of a Vehicle Accident
Prediction System is presented using accident datasets based on
actual vehicle accident data extracted from open-source datasets.
The current problem of rapid data increase throughout the year is
discussed, along with the available options for gaining useful
insight from World Wide Web created data. A review of different
methods for Audio-Visual Speech Recognition using Random Forest is
presented, and a strategy based on the combination of Wavelet
multiresolution analysis and Random Forest is proposed. The authors
review six recent applications of autoencoders in cryo-EM and
cryo-ET data analysis, discussing the autoencoders' strength and
weaknesses to provide potential directions for future research. In
closing, an algorithm is presented which uses ensembles of
metamodels and classifiers to predict which candidate designs for
computer simulations are expected to cause failures and to divert
the search accordingly.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|