Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Frontier Computing -

Frontier Computing (eBook)

Theory, Technologies and Applications
eBook Download: PDF
2016 | 1st ed. 2016
XXII, 1252 Seiten
Springer Singapore (Verlag)
978-981-10-0539-8 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This volume contains the proceedings of the 4th International Conference on Frontier Computing (FC 2015), Bangkok, Thailand, September 9-11, 2015, and brings together state-of-the-art results covering many aspects of emerging computer science and information technology from international academic and industrial researchers.   FC 2015 aimed at providing an open forum to reach a comprehensive understanding of the recent advances and developing trends in information technology, computer science and engineering, with themes under the scope of communication networks, business intelligence and knowledge management, web intelligence, and any related fields that prompt the development of information technology.  Contributions cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers have shown great academic potential and value, and in addition indicate promising directions of research in the focused realm of this conference series.

Readers, including students, researchers, and industry professionals, will benefit from the results presented in this book, and it provides indicators for emerging trends for those starting their research careers.  



Dr. Jason C. Hung is an Associate Professor of Department of Information Management at Overseas Chinese University, Taiwan, ROC. His research interests include Multimedia Computing and Networking, Distance Learning, E-Commerce, and Agent Technology. From 1999 to date, he was a part time faculty of the Computer Science and Information Engineering Department at Tamkang University. Dr. Hung received his BS and MS degrees in Computer Science and Information Engineering from Tamkang University, in 1996 and 1998, respectively. He also received his Ph.D. in Computer Science and Information Engineering from Tamkang University in 2001. Dr. Hung has published over 110 papers and book chapters, as well as participated in many international academic activities, including the organization of many international conferences. He is the founder and Workshop chair of International Workshop on Mobile Systems, E-commerce, and Agent Technology. He is also the Associate Editor of the International Journal of Distance Education Technologies, published by Idea Group Publishing, USA.

 

Dr. Neil Y. Yen is an Associate Professor at the University of Aizu, Japan. Dr. Yen received doctorates in Human Sciences (major in Human Informatics) at Waseda University, Japan, and in Engineering (major in Computer Science) at Tamkang University, Taiwan in March and June 2012 respectively. His doctor degree at Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. Dr. Yen has actively involved himself in the international activities, including editorial works in journals and books, society services in academic conferences sponsored by IEEE/ACM, etc., and devoted himself to discover advanced and interesting research directions. Dr. Yen has been engaged in the interdisciplinary realms of research, and his research interests are now primarily in the scope of human-centered computing and big data.


This volume contains the proceedings of the 4th InternationalConference on Frontier Computing (FC 2015), Bangkok, Thailand, September9-11, 2015, and brings together state-of-the-art results covering many aspectsof emerging computer science and information technology from internationalacademic and industrial researchers.   FC 2015 aimed at providing an open forum to reach acomprehensive understanding of the recent advances and developing trends ininformation technology, computer science and engineering, with themes under thescope of communication networks, business intelligence and knowledge management,web intelligence, and any related fields that prompt the development ofinformation technology.  Contributions cover a wide spectrum of topics:database and data mining, networking and communications, web and internet ofthings, embedded system, soft computing, social network analysis, security andprivacy, optics communication, and ubiquitous/pervasive computing. Many papershave shown great academic potential and value, and in addition indicatepromising directions of research in the focused realm of this conferenceseries.Readers, including students,researchers, and industry professionals, will benefit from the resultspresented in this book, and it provides indicators for emerging trends forthose starting their research careers.  

Dr. Jason C. Hung is an Associate Professor of Department of Information Management at Overseas Chinese University, Taiwan, ROC. His research interests include Multimedia Computing and Networking, Distance Learning, E-Commerce, and Agent Technology. From 1999 to date, he was a part time faculty of the Computer Science and Information Engineering Department at Tamkang University. Dr. Hung received his BS and MS degrees in Computer Science and Information Engineering from Tamkang University, in 1996 and 1998, respectively. He also received his Ph.D. in Computer Science and Information Engineering from Tamkang University in 2001. Dr. Hung has published over 110 papers and book chapters, as well as participated in many international academic activities, including the organization of many international conferences. He is the founder and Workshop chair of International Workshop on Mobile Systems, E-commerce, and Agent Technology. He is also the Associate Editor of the International Journal of Distance Education Technologies, published by Idea Group Publishing, USA.  Dr. Neil Y. Yen is an Associate Professor at the University of Aizu, Japan. Dr. Yen received doctorates in Human Sciences (major in Human Informatics) at Waseda University, Japan, and in Engineering (major in Computer Science) at Tamkang University, Taiwan in March and June 2012 respectively. His doctor degree at Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. Dr. Yen has actively involved himself in the international activities, including editorial works in journals and books, society services in academic conferences sponsored by IEEE/ACM, etc., and devoted himself to discover advanced and interesting research directions. Dr. Yen has been engaged in the interdisciplinary realms of research, and his research interests are now primarily in the scope of human-centered computing and big data.

Preface 6
Organization 8
Steering Chairs 8
General Chairs 8
Vice General Chairs 8
Program Chairs 8
Vice Program Chairs 9
Workshop Chairs 9
Publicity Chairs 9
International Advisory Committees 9
Contents 11
1 Cloud and Crowd Based Learning 23
Abstract 23
1 Introduction 24
2 Related Works 25
3 Cloud and Crowd Based Learning Module 25
4 Conclusions and Future Work 27
References 28
2 Artificial Neural Network Based Evaluation Method of Urban Public Security 29
Abstract 29
1 Introduction 30
2 Related Work 31
3 Basic Methodology 31
4 Urban Public Security Management Network Platform 33
5 Conclusions 34
Acknowledgments 34
References 34
3 Building the Search Pattern of Social Media User Based on Cyber Individual Model 36
Abstract 36
1 Introduction 37
2 Related Work 38
3 The Search Pattern 38
4 The Basic Data for Social Media Profile 39
5 Conclusions 41
Acknowledgments 41
References 41
4 Design of Health Supervision System Base on WBAN 43
Abstract 43
1 Introduction 43
2 Systematic Design 44
3 Physical Channel Design 45
3.1 Wireless Connection 45
3.2 Antenna Connection 46
3.3 Power and Protection 46
4 Design of MAC Layer 46
5 Network Topology 47
6 Choice of Sensor 48
7 Security Design 50
8 Conclusion 51
References 51
5 The Analysis of Hot Topics and Frontiers of Financial Engineering Based on Visualization Analysis 52
Abstract 52
1 Introduction 52
2 Data and Research Methods 53
2.1 Data Retrieval 53
2.2 Research Methods 54
2.3 Data Pre-processing 54
3 Result Analysis 55
3.1 Analysis of Intellective Base of Research Frontier 55
3.2 Analysis of Research Hotspot 56
3.3 Research Frontier and Trends Analysis 58
4 Conclusions 60
Acknowledgements 60
References 60
6 An Efficient ACL Segmentation Method 62
Abstract 62
1 Introduction 63
2 The Proposed Method 64
3 Experiments and Analysis 67
4 Conclusion 69
Acknowledgment 71
References 71
7 Image Haze Removal of Optimized Contrast Enhancement Based on GPU 72
Abstract 72
1 Introduction 73
2 Background 74
2.1 Haze Formation Model 74
2.2 Image Haze Removal 75
2.3 CUDA Programming Model 76
3 Method 76
3.1 Parallelism Analysis 77
3.2 Dynamic Parallelism 77
3.3 Shared Memory Optimization 78
4 Experimental Result 79
4.1 Haze Removal Effect 79
4.2 Performance Optimization 79
4.3 Performance Comparison 79
5 Conclusion 81
Acknowledgment 81
References 81
8 Research of Thunderstorm Warning System Based on Credit Scoring Model 83
Abstract 83
1 Introduction 83
2 Credit Scoring Model 84
3 Data Sources: Thunderstorm Monitoring System 85
4 Modeling Process 86
4.1 Data Preprocessing 86
4.2 The Definition of Variables 87
4.3 Sampling 88
4.4 Binning 88
4.5 Logistic Regression or Neural Network 90
4.5.1 The Basic Principle of Logistic 90
4.5.2 Neural Networks 90
4.6 Model Checking 90
4.6.1 The Result of Logistic Regression by Using WOE Instead of Variable Values 90
4.6.2 The Results of Neural Networks 93
4.6.3 Comparison Results 93
5 Conclusion 94
References 94
9 Cloud-Based Marketing: Does Cloud Applications for Marketing Bring Positive Identification and Post-purchase Evaluation? 95
Abstract 95
1 Introduction 95
2 Literatures and Hypotheses Development 96
2.1 Cloud Applications for Marketing—Facebook 96
2.2 Consumer-Community Identification 96
2.3 Consumer-Company Identification 97
2.4 Consumer-Company Identification 98
3 Research Method and Results 98
4 Discussions and Conclusions 99
References 100
10 Decision Analyses of Medical Resources for Disabled Elderly Home Care: The Hyper Aged District in Taiwan 102
Abstract 102
1 Introduction 102
2 Literature Review 103
3 Scenario 105
3.1 Assumptions 105
3.2 Concept of Operations 105
4 Modeling 106
4.1 Definition 106
4.2 Objective Function and Constraints 107
5 Analysis 108
5.1 Analysis of Medical Distribution Under Concept of Hospital Cluster 108
5.2 The Current Demand-Supply Analysis 109
5.3 Analysis of Finding the Optimized Solution 110
6 Conclusions 111
Acknowledgments 111
References 111
11 The Research About Vehicle Recognition of Parallel Computing Based on GPU 113
Abstract 113
1 Introduction 113
2 The Introduction the Vehicle Identification Technology 114
3 The Study of Vehicle Recognition Algorithm 115
4 The Realization on Gpu Parallel 116
4.1 The Development Board and Environment Built 116
4.2 The Algorithm Parallel 117
5 The Peroration 117
Acknowledgment 117
References 117
12 Pseudo Nearest Centroid Neighbor Classification 119
Abstract 119
1 Introduction 120
2 Pseudo Nearest Centroid Neighbor Classification 121
2.1 Nearest Centroid Neighborhood 121
2.2 The Proposed PNCN Classifier 122
2.3 The PNCN Algorithm 123
3 Experiments 125
3.1 Data Sets 126
3.2 Experimental Results 126
4 Conclusions 130
Acknowledgment 130
References 130
13 Recommended System for Cognitive Assessment Evaluation Based on Two-Phase Blue-Red Tree of Rule-Space Model: A Case Study of MTA Course 132
Abstract 132
1 Introduction 133
1.1 Knowledge Space Model 133
1.2 Recommendation System 134
2 Rule-Space Model Analysis 135
3 MTA Course Planning of Two Phases Blue-Red Trees 136
4 Inference of the Best Learning Path Based on Rule-Space Model 140
5 Recommendation System with Learning Performance Analysis from Online Learning and Testing System 142
6 Preliminary Experimental Analysis 144
7 Conclusion and Future Work 146
Acknowledgments 146
References 146
14 A Algorithm of Detectors Generating Based on Negative Selection Algorithm 148
Abstract 148
1 Introduction 148
2 The Analysis of Negative Selection Algorithm 149
3 An Improved Algorithm for Generating Immune Detectors 150
3.1 Related Definitions 150
3.2 Twice Matching of r-contiguous Algorithm 151
4 The Simulation Experiment 152
4.1 Initialization Parameters 152
5 Experimental Results and Analysis 152
6 Conclusion 154
Acknowledgments 154
References 154
15 A Comparative Study on Disease Risk Model in Exploratory Spatial Analysis 155
Abstract 155
1 Introduction 155
2 Research Methods and Data Sources 156
2.1 Research Methods 156
2.2 Data Sources 156
3 Comparative Research on Different Models 157
3.1 Statistical Model of Poisson Distribution 158
3.2 Statistical Model of Poisson-Gamma 159
3.3 Statistical Model of Log-Normal 161
3.4 Statistical Model of EB Estimator of Moments 162
4 Conclusions and Future Work 165
Acknowledgments 166
Bibliography 166
16 An Algorithm for Image Denoising Based on Adaptive Total Variation 168
Abstract 168
1 Introduction 168
2 Traditional TV Model 169
3 ATV (Adaptive Total Variation) Model 169
3.1 Steerable Filter 169
3.2 Detection Operator 171
4 Comparative Analysis and Experimental Results 171
5 Conclusion 173
References 173
17 Social Events Detection and Tracking Based on Microblog 174
Abstract 174
1 Backgroud 175
2 Program 176
2.1 Based on the Frequency or Rankings Change Detection Program 176
2.2 Joint Analysis Based on Clustering and Denoising 177
2.3 The Comparison of These Two Methods 181
3 The Event Ancillary Information 182
4 Trend Analysis 182
5 System Architecture 183
6 Conclusion and Future Work 183
References 184
18 An Optimization of the Delay Scheduling Algorithm for Real-Time Video Stream Processing 185
Abstract 185
1 Introduction 186
2 Related Work 187
3 Design and Implementation 189
4 Experiment 191
4.1 Setup 191
4.2 Experimental Results 192
5 Conclusions and Future Work 194
References 194
19 Microblogging Recruitment Information Mining 196
Abstract 196
1 Introduction 197
2 The Mining Method 197
2.1 Data Filtering Based on Keyword Search 197
2.2 Create Rule Model According to the Position Classification 198
3 Software and Data 200
3.1 Software 200
3.2 Used Data 200
4 The System Architecture 200
5 Operation Steps 201
6 Conclusion and Future Work 202
6.1 The Project Summary 202
6.2 Limitations and Future Work 204
Acknowledgments 204
References 204
20 Community Trust Recommendation Based on Probability Matrix Factorization 206
Abstract 206
1 Introduction 206
2 Community Trust Model Based on Probability Matrix Factorization (CT-PMF) 208
3 Experiment 211
3.1 Dataset and Experiment Setup 211
3.2 Results on Rating Prediction 213
4 Conclusion 214
References 214
21 Robust Markov Random Field Model for Image Segmentation 215
Abstract 215
1 Introduction 215
2 The Theoretical Background 216
3 The Proposed Model 218
4 Experimental Results 220
5 Conclusions 222
Acknowledgment 222
References 223
22 Community Clustering Based on Weighted Informative Graph 224
Abstract 224
1 Introduction 224
2 Community Clustering Based on WIG Algorithm 225
2.1 Preprocessing 225
2.2 GN Algorithm Based on User’s Social Information (GN-USI) 226
2.3 GN Algorithm Based on Cut Edge Coefficient (GN-CEC) 229
3 Evaluation Experiment and Analysis 229
4 Conclusion 233
References 233
23 A Data Clustering Algorithm Using Cuckoo Search 234
Abstract 234
1 Introduction 234
2 Overview of Cuckoo Search Algorithm 235
3 CS Clustering 236
4 Simulation 237
5 Conclusions 239
Acknowledgments 239
References 239
24 The Application of Bacteria Swarm Optimization Algorithm in Site Choice of Logistics Center 240
Abstract 240
1 Introduction 240
2 Overview of Bacteria Swarm Optimization Algorithm 241
2.1 Chemotaxis 241
2.2 Swarming 241
2.3 Reproduction 242
2.4 Elimination and Dispersal 242
3 Logistics Distribution Center Location Model 243
4 Improved Bacteria Swarm Optimization Algorithm 244
5 Data Set Description 244
6 Conclusions 247
Acknowledgments 247
References 247
25 SIDA: An Information Dispersal Based Encryption Algorithm 248
Abstract 248
1 Introduction 248
2 Related Work 249
3 Security Information Dispersal Algorithm 250
3.1 Data Encryption Using SIDA 251
3.1.1 Data Partition 252
3.1.2 The First Layer Encryption 253
3.1.3 Data Transformation 253
3.1.4 The Second Layer Encryption 254
3.2 Data Decryption 254
4 Performance and Security Analysis of SIDA 256
4.1 The Encryption and Decryption Complexity of SIDA 256
4.2 The Re-Encryption Complexity of SIDA 256
4.3 Security Analysis of SIDA 257
5 Conclusion and Future Work 257
Acknowledgments 258
References 258
26 Software Behavior Analysis Method Based on Behavior Template 259
Abstract 259
1 Introduction 259
2 Related Work 260
3 The Relative Algorithms and Technology 261
3.1 Function Transfer Map (FTM) 261
3.2 Minimum System Calls Function Block Transfer Map 262
3.3 Automata Based on FTM 263
4 System of SABT 264
4.1 The Pre-process Module 264
4.2 The Modelling Module 264
4.3 The Detection Module 265
5 Experiments 266
6 Conclusion 267
References 267
27 Formalizing Dynamic Service Interaction Based on Pi-Calculus 269
Abstract 269
1 Introduction 269
1.1 Background 269
1.2 Content of the Article 270
2 Modeling Method 270
2.1 Dynamic Service Interaction 270
2.2 Model About Dynamic Interaction 271
3 System Modeling 273
3.1 Classification of the Agents 273
3.2 Service Interaction 274
3.3 Formal Description Based on Pi-Calculus 274
4 Analysis and Validation 276
5 Conclusions 277
Acknowledgments 278
References 278
28 Applications of Video Structured Description Technology for Traffic Violation Monitoring 279
Abstract 279
1 Introduction 279
2 Related Work 280
3 Surveillance Video Semantic Model 281
3.1 Sematic Need 281
3.2 Video Sematic Model 281
4 Traffic Violation Monitoring Application 283
4.1 Run the Red Traffic Light 283
4.2 Combined Lane Judge Violation 283
5 Conclusions 284
Acknowledgment 284
References 285
29 Research of Mining Multi-level Association Rule Models 286
Abstract 286
1 Background and Motivation 286
2 Literature Review 287
2.1 Apriori Algorithm 287
2.2 The Concept Hierarchy of Merchandise 287
3 Method 288
4 Analysis and Discussion of Mining Model 289
4.1 Itemsets at the Same Level 289
4.2 Large Itemsets of Merchandise Between Different Levels 290
4.3 Complete Multi-Level Association Rules 293
5 Future Research 295
Reference 295
30 Research of the Dimension Combination Strategy Model 296
Abstract 296
1 Research Motivation and Purpose 296
2 Discussion Document 297
2.1 Streamlining Data 298
2.2 Connected Resistance, the Ability to Identify and Measure the Amount of Information Law 298
2.3 Progressive Selection Method 299
3 Research Methods 300
4 Implementing Results and Discussion 301
4.1 Single-Column Model and Compare the Results of Analysis 301
4.2 Complete Field Analysis and Comparison of the Results of the Model 302
5 Conclusions and Future Research Directions 305
References 306
31 Short Latency Bias in Latency Matrix Completion 307
Abstract 307
1 Introduction 307
2 An Overview of Latency Matrix Completion 308
3 Theoretical Analyze of Short Latency Bias 311
4 Experiments 312
5 Conclusion 314
References 314
32 Facial Feature Extraction Based on Weighted ALW and Pulse-Coupled Neural Network 316
Abstract 316
1 Introduction 316
2 Lifting Wavelet Scheme and Pulsed-Coupled Neural Network 318
2.1 Lifting Scheme 318
2.2 Pulse-Coupled Neural Network 319
3 The Proposed Algorithm 320
3.1 Weighted Lifting Wavelet Scheme 320
3.2 The Proposed Method 322
4 Simulation and Analysis 324
4.1 Experiment in ORL 324
4.2 Experiment in YALE 326
5 Conclusion 327
References 327
33 Event Representation and Reasoning Based on SROIQ and Event Elements Projection 329
Abstract 329
1 Introduction 329
2 Related Work 330
3 Concepts of Event Model 331
4 Event Projection Method Based on SROIQ 333
4.1 SROIQ Syntax and Semantics for Event Model 333
4.2 Event Element Projection 334
4.3 Element Projection of Event Status 335
4.4 Event Relation Reasoning Based on Element Projection 336
5 Formalization Example 337
6 Conclusion 339
Acknowledgements 339
References 339
34 The Research and Application of Data Warehouse’s Model Design 341
Abstract 341
1 Introduction 341
2 The Implementation Methods 342
2.1 Construction Methods of Data Warehouse and Realization Process 343
2.2 Data Organization Model and Granularity Choose 344
3 Hospital Drug Data Warehouse Model Design 346
3.1 Basic Design Process 346
3.2 Logical Modeling and Physical Implementation 347
4 Research and Implement in Design Strategy 352
4.1 Index Strategy 352
4.2 Table Design Strategy 352
4.3 Aggregate Design Strategy 354
5 Discussion and Conclusion 354
Bibliography 354
35 Question Recognition Based on Subject 356
Abstract 356
1 Introduction 356
2 Question Analysis 357
3 Question Recognition Based on Subject 358
3.1 Subject Recognition 358
3.2 Feature Extraction 359
3.3 Recognition Workflow 360
4 Experiments 360
4.1 Experimental Data 360
4.2 Experimental Results and Analysis 361
5 Related Work 362
6 Conclusion 363
References 363
36 Development of a Mobile Augmented Reality System to Facilitate Real-World Learning 365
Abstract 365
1 Introduction 366
2 Related Work 367
3 System Overview 368
3.1 The AR Materials Remote Server 369
3.2 The AR-Based Mobile Learning System 370
4 Experimental Results 371
5 Conclusions and Future Work 372
Acknowledgment 373
References 373
37 A Simple Randomized Algorithm for Complete Target Coverage Problem in Sensor Wireless Networks 375
Abstract 375
1 Introduction 375
2 Related Work 376
3 System Model and Problem Definition 377
4 Our Solution 378
5 Simulation Results 379
6 Conclusion 379
Acknowledgments 380
References 380
38 A Novel Enveloped-Form Feature Extraction Technique for Heart Murmur Classification 381
Abstract 381
1 Introduction 382
2 Methodology 382
2.1 Discrete Wavelet Transform 383
2.2 Shannon Envelope 383
2.3 Detecting and Selecting Peaks of Heart Murmurs 384
2.4 Feature Extraction 387
3 Experimental Results 387
3.1 Experimental Settings 387
3.2 Results 388
4 Conclusion 388
Acknowledgement 388
References 389
39 Research on Network Security Strategy Model 390
Abstract 390
1 Introduction 390
2 Architecture of the Model 391
3 Workflow of the Model 391
3.1 Acquisition of Public Key for Both Sides 391
3.2 Establishment of the Secure Connection 392
3.3 Transmission of Data 393
4 Realization of the Model 394
4.1 Main Algorithm Principle of the Model’s Security System 394
4.2 Realization of the Data Transmission 395
4.3 Realization of Key Management 395
Acknowledgement 395
40 Investigating on Radioactivity of LBE and Pb in ADS Spallation Target 396
Abstract 396
1 Introduction 397
2 Method of Calculation 398
2.1 Fluka 398
2.2 Induced Activity Calculation 398
3 Results and Discussion 399
3.1 Induced Activity in Spallation Target 399
3.2 Residual Activity in LBE Target 400
4 Summary and Conclusions 403
Acknowledgements 404
References 404
41 Design of Farmland Environment Remote Monitoring System Based on ZigBee Wireless Sensor Network 406
Abstract 406
1 Introduction 406
2 Overall Design Framework of Farmland Environment Data Monitoring System 407
2.1 Goals of System Design 407
2.2 Overall System Structure 407
3 Design of Farmland Environment Remote Monitoring System 409
3.1 Overall System Design 409
3.2 System Hardware 409
3.3 System Software Design 410
3.3.1 The Application Transplant Design 410
3.3.2 Web Module Design 412
3.3.3 System Database Design 412
3.3.4 ZigBee Module Design 413
4 Realization of Farmland Environment Remote Monitoring System 414
5 System Test Results 416
6 Conclusion 417
Acknowledgments 417
References 417
42 Attractions and Monuments Touring System Based on Cloud Computing and Augmented Reality 418
Abstract 418
1 Introduction 418
2 System Overview 419
3 Design of Motion Detection Module 419
4 Establishment of Spatial Movement Model 421
4.1 Relative Rotation Using Quaternion 421
4.2 Coordinate Transformations and Gravity Component Removal 423
5 The Implementation of Google Earth Virtual Touring 425
5.1 Data Processing 425
5.2 Data Management of Geographic Information 427
6 Conclusions 428
References 428
43 Constructing Weighted Gene Correlation Network on GPUs 430
Abstract 430
1 Introduction 431
2 Methods 432
3 Results and Discussions 434
4 Conclusions 438
Acknowledgements 438
References 439
44 Design of Scalable Control Plane via Multiple Controllers 441
Abstract 441
1 Introduction 441
2 Related Works 443
3 Proposed Framework 443
3.1 Overview 443
3.2 Implementation Details 445
3.2.1 Zookeeper File System 445
3.2.2 Election Mechanism 446
3.2.3 Link Discovery 447
3.2.4 Entire Network Topology Information Acquisition 447
4 Analysis and Results 447
5 Conclusion 448
References 449
45 Research on Learning Record Tracking System Based on Experience API 450
Abstract 450
1 Introduction 450
2 Overview of the Experience API 451
3 Learning Record Model Based on Experience API 452
3.1 Learning Record Model Based on Experience API 452
3.2 Learning Record Information Interaction Process 453
4 Implementation of Learning Record Tracking System Based on Experience API 453
4.1 Learning Record Tracking System Architecture 453
4.2 How to Transfer Learning Record to LRS 454
4.3 How to Read Learning Records from LRS 456
5 Conclusion 457
46 An EF6 Code-First Approach Using MVC Architecture Pattern for Watershed Data Download, Visualization and Analysis System Development Based on CUAHSI-HIS 458
Abstract 458
1 Introduction 459
2 Methodology and Design 460
2.1 ASP.NET MVC5 460
2.2 Entity Framework 6 Code-First Approach 461
2.3 The Architecture of Watershed Datacenter System 464
3 Implementation of the System 465
3.1 Hardware Condition 465
3.2 Responsive Web Design 465
3.3 Functionality 465
3.4 Data Visualization 466
4 Discussion and Conclusion 468
Acknowledgments 468
References 469
47 Student-t Mixture Modelling for Image Segmentation with Markov Random Field 470
Abstract 470
1 Introduction 470
2 Proposed Model 471
3 Experimental Results 475
3.1 Synthetic Images 475
3.2 Natural Image Segmentation 475
4 Conclusions 477
Acknowledgments 478
References 478
48 Integrated Genetic Algorithm and Fuzzy Logic for Planning Path of Mobile Robots 479
Abstract 479
1 Introduction 480
2 The Design of the Control System 480
3 Image Model 481
4 Path Model 482
5 The Design of FLC on GA 483
5.1 The Establishing of Rule Base for FLC 484
5.2 The Optimizing of the FLC Via the GA 484
5.2.1 Parameter Coding 484
5.2.2 Confirming the Fitness Function 485
6 Conclusions 485
Acknowledgement 486
References 487
49 Characterization of Noise Contaminations in Realistic Heart Sound Acquisition 488
Abstract 488
1 Introduction 489
2 Classification of Noise 490
2.1 Speech Interference 490
2.2 Respiration Interference 491
2.3 Abdominal Interference 492
2.4 Ambient Interference 492
2.5 Electromagnetic Interference 492
3 Methods 493
3.1 Heart Sound Dataset 493
3.2 Evaluation Method 493
4 Result and Discussion 495
4.1 Noise Characteristics 495
4.2 Noise Destruction Capability 496
5 Conclusion 496
Acknowledgement 497
References 497
50 Independent Component Analysis of Space-Time Patterns of Groundwater System 499
Abstract 499
1 Introduction 500
2 Methodology 501
2.1 Principal Component Analysis, PCA 501
2.2 Independent Component Analysis, ICA 502
3 Numerical Experiment 504
3.1 Development of the Ideal Case 504
3.2 Observation Data Created by Modflow 505
3.3 The Results of ICA 506
4 Conclusion 509
References 510
51 Analysis of the Status Quo of MOOCs in China 511
Abstract 511
1 Introduction 512
2 MOOCS and Its Special Features and Types 512
2.1 The Definition of MOOCs 512
2.2 The Special Features of MOOCs 512
2.3 The Type of MOOCs 513
3 The Development of MOOCs in China 514
4 Introspection of the Heat of MOOCs 515
4.1 The Merit of MOOCs 515
4.2 The Limitations of Introspection 517
5 Conclusion 517
52 Detection for Different Type Botnets Using Feature Subset Selection 519
Abstract 519
1 Introduction 519
2 Method 520
2.1 Data Collection 520
2.2 A Modified Artificial Fish Swarm Algorithm 521
2.3 Data Transformation 522
3 Experiment Results 522
4 Conclusion and Feature Works 524
Acknowledgments 525
References 525
53 Rotation Invariant Feature Extracting of Seal Images Based on PCNN 526
Abstract 526
1 Introduction 527
2 PCNN and Feature Extraction 527
3 Pearson Correlation Coefficient 531
4 Conclusion 534
Acknowlegment 535
References 535
54 The Taguchi System-Two Steps Optimal Algorithm Based Neural Network for Dynamic Sensor Product Design 536
Abstract 536
1 Introduction 537
2 The Taguchi System-Two Steps Optimal Algorithm 538
3 Verification 539
3.1 Establish the Taguchi System 539
3.2 Construct the Dynamic Sensor Product Design System 540
3.2.1 Establish the Dynamic Sensor Product Design System 540
3.2.2 Verify the Methodology 544
Modeling 544
Testing the NN Model 544
4 Conclusion 544
References 545
55 Accurate Analysis of a Movie Recommendation Service with Linked Data on Hadoop and Mahout 546
Abstract 546
1 Introduction 547
2 Related Work 547
3 Movie Recommendation Architecture 548
3.1 Movie Linked Data 549
3.2 Recommendation Service 550
4 Performance Analysis and Accuracy Measurement 551
4.1 Accuracy Measurement 551
4.2 Recommender Experimentation 552
5 Conclusion 554
Acknowledgments 554
References 554
56 A Method of Event Ontology Mapping 556
Abstract 556
1 Introduction 556
2 Related Work 557
3 Concepts About Event Ontology 558
4 Event Ontology Mapping 559
4.1 Definitions About Event Ontology 559
4.2 Event Ontology Comprehensive Semantic Similarity Calculation Model 559
4.2.1 Event Class Similarity Calculation 560
4.2.2 Calculation of Event Class Structure Information Similarity 563
5 Experiment and Analysis 564
5.1 Event Class Similarity and Event Class Structure Information Similarity 565
6 Conclusion 567
Acknowledgements 567
References 567
57 A Research on Multi-dimensional Multi-attribute String Matching Mechanism for 3D Motion Databases 569
Abstract 569
1 Introduction 569
2 Multi-dimensional Multi-attribute Sequence Model for Motion Data 571
3 Index Structure and Query Processing 572
4 Experimental Results 574
5 Conclusion 574
References 574
58 An Novel Web Service Clustering Approach for Linked Social Service 576
Abstract 576
1 Introduction 577
2 Linked Social Service 578
3 Calculating Service Similarity with Tree Structure 579
3.1 Mapping Service to Tree Structure 580
3.2 Service Tree Mapping Algorithm 580
3.3 Service Similarity Calculations Based on Tree Structure 581
4 Spatial Clustering 583
5 Implementation and Evaluation 585
5.1 Service Similarity with Tree Structure 585
5.2 Clustering Visualization 586
6 Conclusion 587
References 588
59 Cloud Computing Adoption Decision Modelling for SMEs: From the PAPRIKA Perspective 589
Abstract 589
1 Introduction 589
2 Related Work 590
2.1 Background 590
2.2 Decision Support Systems 590
2.3 Rationality of Using PAPRIKA Method 592
3 Modelling the Cloud Adoption Process 594
3.1 Model Design 594
4 Method 595
5 Simulation 597
6 Results 597
7 Discussion 602
8 Limitations 603
9 Conclusion 603
Acknowledgments 603
Appendex 1: Ranking of Alternatives 603
References 606
60 Cost Analysis Between Statins and Hepatocellular Carcinoma by Using Data Mining Approach 608
Abstract 608
1 Introduction 608
2 Data Mining Method 610
2.1 Study Design 610
2.2 The Database of Taiwanese National Health Insurance 610
2.3 Identification of Study Sample 611
2.4 Statin User and Non-User 611
2.5 Potential Confounders 612
2.6 Statistical Analyses 612
3 Conclusion 612
3.1 Results of Demographic Characteristics 612
3.2 Results of Cost-Effectiveness Analysis 615
3.3 Discussion 615
References 615
61 Hospital Service Queue Management System with Wireless Approach 617
Abstract 617
1 Introduction 617
2 Literature Review 618
3 Service Queue Management System with Wireless Approach 619
3.1 System Boundary and Architecture 619
3.2 Database and Development Tools 621
3.3 Queuing Management Mechanism 622
4 System Prototype Implementation 623
5 Conclusion 626
References 626
62 A Smartphone Based Hand-Held Indoor Positioning System 628
Abstract 628
1 Introduction 628
2 Methods 629
2.1 Data Acquisition 630
2.2 ZUPT 630
2.3 Kalman Filter Design 632
2.4 Step Length Calculation 632
2.5 Trajectory Calculation 634
3 Experiment and Results 634
3.1 Simulation of ZUPT and Kalman Filter 635
3.2 Simulation of Step Length 636
3.3 Experiment of Participant Navigation 637
4 Conclusion 638
Acknowledgment 638
References 638
63 A Variational Bayesian Approach for Unsupervised Clustering 640
Abstract 640
1 Introduction 641
2 Gaussian Mixture Model, GMM 642
3 The Variational Bayesian (VB) Approach 643
4 Simulation Results 647
5 Conclusion 649
Acknowledgment 649
References 649
64 Virtualized Multimedia Environment for Shoulder Pain Rehabilitation 650
Abstract 650
1 Introduction 651
2 Materials and Methods 652
3 Results 655
4 Discussion 658
Acknowledgment 659
References 659
65 Multimedia Technology with Tracking Function for Hand Rehabilitation 660
Abstract 660
1 Introduction 661
2 Materials and Methods 661
2.1 Literature Review 662
2.2 System Planning 662
2.2.1 1D Barcode 663
2.2.2 Barcode Scanner and Hand Gliding Cart 664
2.2.3 Software Development 664
2.3 Experimental Methods 664
2.3.1 Experimental Design 664
2.3.2 Experimental Procedures 665
3 Results 665
3.1 Test of the Persons with Normal Upper Limb Function 666
3.2 Test of the Persons with Impaired Upper Limb Function 667
4 Discussion 668
Acknowledgment 668
References 668
66 LBS with University Campus Navigation System 670
Abstract 670
1 Introduction 670
2 Case Studies 671
3 Definitions 672
3.1 Android 672
3.2 Global Positioning System 672
3.3 HTML, CSS, Java Script 673
3.4 JSP, Servlet 673
3.5 Apache Tomcat 673
4 Application Design 674
4.1 Standard Versus Personalized Map 674
4.2 Components 675
5 Conclusions and Future Work 676
References 676
67 An Efficient Energy Deployment Scheme of Sensor Node 677
Abstract 677
1 Introduction 677
2 Wireless Sensor Node Communication Model 678
2.1 Single Sensor Node Communication Model 678
2.2 Multiple Sensor Coverage Area Estimation 679
3 Sensor Field Power Consumption and Power Efficiency 679
3.1 Sensor Field Power Consumption 679
3.2 Coverage Power Efficiency and Simulation Results 682
4 Self-regulated Mechanism 682
5 Conclusions 683
References 683
68 Channel Equalization for MIMO LTE System in Multi-path Fading Channels 684
Abstract 684
1 Introduction 684
2 Simplified MIMO LTE System Model 685
3 MIMO Receiver 686
3.1 Zero Forcing Equalizer 687
3.2 Minimum Mean Square Error Equalizer 687
3.3 Sphere Decoding Equalizer 687
4 Simulations 688
4.1 Simulation Configuration 688
4.2 Simulation Results 688
5 Conclusion 691
References 691
69 All-Digital High-Speed Wide-Range Binary Detecting Pulsewidth Lock Loops 692
Abstract 692
1 Introduction 692
2 Traditional All-Digital Pulsewidth Lock Loops and Duty Cycle Corrector 693
3 Operation Principle and Circuit Design 694
4 Simulation Results 697
5 Conclusion 698
References 698
70 A BUS Topology Temperature Sensor Cell Design with System in Package Application 699
Abstract 699
1 Introduction 699
2 The BUS Topology Multi-Point Temperature Sensing 700
3 Implementation and Simulation Results 702
4 Conclusion 704
References 704
71 The Off-Axis Parabolic Mirror Optical Axis Adjustment Method in a Wedge Optical Plate Lateral Shearing Interferometer 706
Abstract 706
1 Introduction 706
2 Basic Principle 707
3 The Optical Alignment System 709
4 Experiments and Results 712
4.1 Pre-experiment of Five Semiconductor Laser Beams Fine Adjustment 712
4.2 Experiment with OAP Mirror 713
5 Conclusions 714
References 715
72 Two-Mirror Telescope Optical Axis Alignment by Additive Color Mixing Method 716
Abstract 716
1 Introduction 717
2 Basic Principle 718
3 The Optical Alignment System 720
4 Experiments and Results 723
4.1 Initial Alignment 724
4.2 The Optical Axis of TMT Alignment 724
5 Conclusions 725
References 726
73 Design of Relay Lens Based on Zero Seidel Aberrations 727
Abstract 727
1 Introduction 727
2 Thin Lens Layout for 1:1 Relay Lens 728
2.1 Controlling Power, Petzval Sum and Longitudinal Chromatic Aberration 728
2.2 Handling Coma, Distortion, and Transverse Chromatic Aberration 729
2.3 Minimizing Spherical Aberration and Astigmatism 729
3 Design Examples 730
3.1 Setting Half Part of the Relay Lens 730
3.2 Symmetric Relay Lens with Aperture Stop 730
3.3 Bending Lens Shape for Reducing Spherical and Astigmatism Aberrations 732
3.4 Further Optimization 732
4 Conclusion 735
References 735
74 The Optical Spectra Analysis of 4 LED White-Light Sources Passing Through Different Fogs 736
Abstract 736
1 Introduction 736
2 Experiment 737
3 Results and Discussion 737
4 Results and Discussion 742
Acknowledgements 742
References 742
75 High Resolution Camera Lens Design for Tablet PC 743
Abstract 743
1 Introduction 743
2 Initial Structure Selection 744
3 Sensor Selection 745
4 Material Selection 747
5 Simulation Results and Discussions 748
5.1 Spot Diagram 749
5.2 MTF 749
5.3 Field Curvature and Distortion 750
5.4 Longitudinal Aberration 750
5.5 Later Color 750
5.6 Relative Illumination 753
6 Results and Discussion 753
References 753
76 Two-Wavelength Optical Microscope Optical Axis Adjustment by Five Incident Parallel Laser Beams 754
Abstract 754
1 Introduction 754
2 Basic Principle 755
3 The Optical Alignment System 757
4 Experiments and Results 760
4.1 Pre-experiment of Five Semiconductor Laser Beams Fine Adjustment 761
4.2 Experiment with TWOM 761
5 Conclusions 762
Reference 763
77 The Correlation Analysis Between the Non-contact Intraocular Pressure and Diopter 764
Abstract 764
1 Introduction 765
2 Method 765
3 Result 768
4 Discussion 769
References 770
78 Automated Tool Trajectory Planning for Spray Painting Robot of Free-Form Surfaces 771
Abstract 771
1 Introduction 771
2 The Model of a Large Free-Form Surface 772
3 Trajectory Optimization Based on T-Bézier Curve 774
4 Simulation 776
5 Experimental Verification 777
6 Conclusion 779
Acknowledgments 779
References 780
79 The Research of Analysis Addiction of Online Game 781
Abstract 781
1 Background and Motivation 782
2 Specific Objective 782
3 Method 783
3.1 Schema 783
3.2 Steps and Analysis 783
4 Conclusion 788
5 Future Research 789
80 Parameter Estimation of Trailing Suction Hopper Dredger Dredging Model by GA 790
Abstract 790
1 Introduction: Genetic Algorithm 790
2 Problem Formulation: Parameter Estimation of TSHD Dredging Model 791
2.1 Soil-Type-Dependent Parameters 792
3 Proposed Solution 792
4 Results and Discussion 792
5 Conclusion 794
References 794
81 CPP Control System Design of Ship Based on Siemens PLC 795
Abstract 795
1 Introduction 795
2 The Composition of CPP 796
3 The Hardware Design of CPP 797
4 The Software Design of CPP 798
4.1 The Overall Design 798
4.2 Pitch Control Algorithm Design 798
4.3 Realization of Control Software of STEP7 800
4.3.1 Hardware Configuration 800
4.3.2 Modularization Programming 801
4.3.3 Debugging of Simulator 804
5 Conclusion 804
References 804
82 The Surface Deformation Prediction of Ship-Hull Plate for Line Heating 805
Abstract 805
1 Introduction 805
2 Brainstorming 806
3 FEA Simulation of LH Process 807
3.1 Heated Zones Division and Measuring Points Distribution 807
3.2 Description of Steel Plates Surface Deformation 808
3.3 FEA Numerical Simulation of LH Process 809
4 Modeling of ANN 811
4.1 ANN Model 811
4.2 The Determination of Input and Output Parameters in ANN Model 814
4.3 Training Results of SVM 815
5 Prediction Experiments by SVM 815
6 Conclusion 817
Acknowledgements 817
References 817
83 The Framework Research of the Internet of Things in Dispatching Emergency Supplies 818
Abstract 818
1 Introduction 818
2 The Internet of Things and Related Technologies 819
2.1 The Basic Concept of the Internet of Things 819
2.2 The Basic Features of the Internet of Things 819
2.3 The Key Technology of the Internet of Things 819
3 The Application Framework of the Internet of Things in Emergency Dispatch Architecture 820
3.1 The Architecture of the Internet of Things 820
3.2 The EPC IOT System in Emergency Supplies Scheduling 823
3.2.1 EPC Electronic Coding System 824
3.2.2 RFID System 824
3.2.3 Information Network System 824
3.3 Things Application Architecture for Dispatching Emergence Supplies 828
4 Conclusion 829
Acknowledgments 830
84 Simulation and Optimization of the AS/RS Based on Flexsim 831
Abstract 831
1 Introduction 831
2 Flexsim 832
3 Simulation Steps 832
4 Target 833
5 The Simulation of Stereoscopic Warehouse 833
6 Conclusion 839
Acknowledgments 839
85 Design and Experiment of Control System for Underwater Ocean Engineering Structure Inspection and Cleaning Remotely Operated Vehicle 840
Abstract 840
1 Introduction 841
2 System Design 841
3 Design of Underwater Control System 842
3.1 The Design of Dynamic Propulsion Unit 842
3.2 The Design of the Underwater Controller 846
4 The Design of Water Surface Console 847
5 Experimental Study 848
5.1 Attitude Measurement Test 848
5.2 Underwater Navigation Test 849
5.3 Underwater Depth Test 850
5.4 Monitoring and Crawling Clean-up Test 852
5.5 The Summary of this Chapter 853
6 Conclusion 853
Acknowledgment 853
References 854
86 Using Experiment on Social Learning Environment Based on an Open Source Social Platform 855
Abstract 855
1 Introduction 855
2 Related Work 856
3 Experiment Conduction 857
4 Conclusion 860
87 User Authentication Mechanism on Wireless Medical Sensor Networks 861
Abstract 861
1 Introduction 861
2 Wireless Medical Sensor Network (WMSN) 862
3 Our Scheme 864
3.1 Registration Phase 866
3.2 Login Phase 866
3.3 Authentication Phase 869
4 Analysis 871
5 Conclusions 872
References 872
88 Application of Cloud Computing for Emergency Medical Services: A Study of Spatial Analysis and Data Mining Technology 873
Abstract 873
1 Introduction 874
2 Literature Review 875
3 Results 880
4 Conclusions 887
Acknowledgement 888
References 888
89 Social Event Detection and Analysis Using Social Event Radar 890
Abstract 890
1 Introduction 890
2 Related Works 891
2.1 Social Media Data Collection 891
2.2 Chinese Word Segmentation 892
2.3 Opinion Mining 892
3 System Design 893
3.1 SER Data Collection 893
3.2 Social Event Tracking System 894
3.3 Sentiment Analysis Module 896
4 Conclusions 898
Acknowledgments 899
References 899
90 Social Network and Consumer Behavior Analysis: A Case Study in the Retail Store 900
Abstract 900
1 Introduction 900
2 Subjects/Materials and Methods 901
2.1 Data Source 901
2.2 Study Samples 902
2.3 Case and Control 902
2.4 Events 902
2.5 The Analysis Tool 903
2.6 Statistical Analysis 903
3 Results 903
4 Discussion 906
Acknowledgment 907
References 907
91 Novel Scheme for the Distribution of Flyers Using a Real Movement Model for DTNs 909
Abstract 909
1 Introduction 909
2 Related Work 910
3 Proposed Approach 911
4 Simulation Results 915
5 Conclusions and Future Work 918
References 919
92 A Study of Two-Dimensional Normal Class Grouping 920
Abstract 920
1 Introduction 920
2 Literature Review 921
3 Two-Dimensional Grouping Model 922
3.1 The Objective of Two-Dimensional Normal Class Grouping 924
3.2 First Stage Distribution 925
3.3 Two-Dimensional Normal Class Grouping Platform and Second Stage Distribution 926
4 Conclusions 927
References 928
93 Visualized Comparison as a Correctness Indicator for Music Sight-Singing Learning Interface Evaluation—A Pitch Recognition Technology Study 929
Abstract 929
1 Introduction 929
2 Self-generated Visualization on Music Sight-Singing Design 930
3 Benefits Evaluation 932
3.1 Efficiency of Self-generated Visualization on Pitch Recognition 932
3.2 Discrimination of Self-generated Visualization on Pitch Recognition 932
3.3 Visualized Comparison as a Correctness Indicator 933
4 Conclusion 933
References 934
94 A Fuzzy Genetic Approach for Optimization of Online Auction Fraud Detection 935
Abstract 935
1 Introduction 935
2 Literature Review 936
2.1 Fuzzy Control System and Genetic Algorithms 936
2.2 Fraud Detection in Online Auctions 937
3 Detection Model 937
3.1 Web Crawler System for Online Auction Data Collection 938
3.2 Fuzzy Genetic Approach 938
3.2.1 Membership Function 939
3.2.2 Gene Encoding 939
3.2.3 Fitness Function 940
3.2.4 Selection and Reproduction 942
4 Experimental Results 942
5 Conclusions 943
References 944
95 A Study on the Use Intention of After School Teachers Using Interactive e-Learning Systems in Teaching 945
Abstract 945
1 Introduction 946
1.1 Purpose and Scope of the Study 946
2 Review 947
3 Research Methods 947
3.1 Design 947
3.2 Research Facets and Operational Definition 948
4 Data Analysis 949
4.1 Questionnaires Were Collected and Analyzed 949
4.2 Reliability and Validity 951
4.3 Mean Assays 951
4.4 Factors 951
4.5 Regression Analysis 951
5 Conclusions 952
References 952
96 Bibliometric Analysis of Emerging Trends in High Frequency Trading Research 954
Abstract 954
1 Introduction 954
2 Diverse Issues of HFT Research 955
3 Bibliometric Analysis 955
References 959
97 Interactive Performance Using Wearable Devices: Technology and Innovative Applications 961
Abstract 961
1 Introduction 961
2 Related Work 962
3 Proposed Approach 962
3.1 System Architecture 963
3.2 Motion Capture 965
3.3 Interactive Storytelling 971
4 Simulation Results 972
5 Conclusions and Future Work 973
References 974
98 Usability Evaluation of Acoustic-Oriented Services on Mouse Manipulation: Can Manipulation with Dual Senses Be Good? 975
Abstract 975
1 Introduction 975
2 System Architecture 977
3 Benefits Evaluation 979
3.1 High Acoustic-Oriented Services/Talking Aid and Cursor Positioning 979
3.2 Low Acoustic-Oriented Services/Talking Aid 980
3.3 Low Acoustic-Oriented Services/Cursor Positioning 980
4 Conclusion 981
References 982
99 Effect of We-Intention on Adoption of Information System Embedding Social Networking Technology: A Case of Cloud Drive 984
Abstract 984
1 Introduction 984
2 Literature Review 985
2.1 Definition of Usability 985
2.2 Definition of We-Intention 985
3 Experiment Design 986
4 Results 986
5 Conclusion and Suggestion 987
References 988
100 Improving Project Risk Management of Cloud CRM Using DANP Approach 989
Abstract 989
1 Introduction 990
2 Literature References 990
2.1 Project Risks 990
2.2 Project Management 990
2.3 Organizational Performance Measurement: A Balanced Scorecard 991
2.4 Risks of Cloud Computing Service 991
2.5 Cloud Customer Relationship Management 991
2.6 The DANP Method 992
3 Research Methodology 992
3.1 Research Framework 992
3.2 Data Collection 992
3.3 Data Analysis and Results 993
4 Conclusion 996
References 996
101 Improving Project Risk Management by a Hybrid MCDM Model Combining DEMATEL with DANP and VIKOR Methods—An Example of Cloud CRM 998
Abstract 998
1 Introduction 998
2 Literature References 999
2.1 Project Risks 999
2.2 Project Management 999
2.3 Organizational Performance Measurement: A Balanced Scorecard 999
2.4 Risks of Cloud Computing Service 1000
2.5 Cloud Customer Relationship Management 1000
2.6 The DANP Method 1000
2.7 The Delphi Method 1000
2.8 The VIKOR Method 1001
3 Research Methodology 1001
3.1 Research Framework 1001
3.2 Data Collection 1002
3.3 Data Analysis and Results 1002
4 Conclusion 1004
References 1004
102 Using VIKOR to Improve E-Service Quality Performance in E-Store 1006
Abstract 1006
1 Introduction 1006
2 Literature Review 1007
2.1 Service Quality 1007
2.2 E-Service Quality 1008
2.3 Service Quality Models 1008
2.4 Customer Loyalty and Its Antecedents 1008
2.5 The VIKOR Method 1009
3 Research Methodology 1009
3.1 Research Framework 1010
3.2 Data Collection 1010
3.3 Data Analysis and Results 1011
4 Conclusion 1011
References 1013
103 Study on the Intellectual Capital and Firm Performance 1015
Abstract 1015
1 Introduction 1015
2 Literature Review 1016
2.1 Intellectual Capital 1016
2.2 Intellectual Capital and Firm Performance 1017
3 Methodology 1019
3.1 Hypothesis 1019
3.2 Sample and Data 1019
3.3 Empirical Model 1019
4 Empirical Results 1020
4.1 Descriptive Statistics 1020
4.2 Pearson Correlation 1020
4.3 Regression Results 1021
5 Conclusion 1021
References 1022
104 Voluntary Disclosure and Future Earnings 1023
Abstract 1023
1 Introduction 1023
2 Literature Review and Hypothesis Development 1024
2.1 Future Earnings 1024
2.2 Voluntary Disclosure 1025
2.3 Voluntary Disclosure and Future Earnings 1025
3 Research Methodology 1025
3.1 Sample and Data 1025
3.2 Empirical Model 1026
4 Empirical Results 1026
4.1 Descriptive Statistics 1026
5 Conclusion 1027
References 1027
105 A Smart Design of Pre-processing Classifier for Impulse Noises on Digital Images 1029
Abstract 1029
1 Introduction 1029
2 Noise Model 1030
3 A Smart Pre-processing Classifier 1031
3.1 Definition of Classifier Input 1031
3.2 If-Then Rules for Classification 1032
4 Simulation Results 1033
5 Conclusions 1035
References 1035
106 An Effective Machine Learning Approach for Refining the Labels of Web Facial Images 1037
Abstract 1037
1 Introduction 1037
2 The Related Work 1039
2.1 Unsupervised Label Refinement 1039
2.2 Multi-step Gradient Algorithm 1040
2.3 Coordinate Decent Algorithm 1040
3 PSO and Binary PSO for ULR 1041
3.1 Particle Swarm Optimization for ULR 1041
3.2 Binary Particle Swarm Optimization for ULR 1042
4 Experimental Results and Analysis 1043
4.1 Experiment by Multi-step Gradient and Coordinate Decent Algorithm 1044
4.2 Experiment by PSO and Binary PSO 1044
5 Conclusions 1046
References 1046
107 Using the Data-Service Framework to Design a Distributed Multi-Levels Computer Game for Insect Education 1048
Abstract 1048
1 Introduction 1048
2 Game Design 1049
3 A Real Case 1050
4 Conclusion and Future Work 1053
References 1053
108 Financial Diagnosis System (FDS) for Food Industry Listed in the Taiwan Stock Exchange (TWSE) 1054
Abstract 1054
1 Introduction 1054
2 Data Description 1056
3 System Implementation 1056
3.1 Industry Analysis 1057
3.2 Historical Analysis 1057
3.3 Diagnosis Report for a Company 1057
4 Conclusion 1058
109 Classification Rule Discovery for Housing Purchase Life Cycle 1059
Abstract 1059
1 Introduction 1059
2 Related Work 1060
2.1 Data Mining Techniques 1061
2.2 Classification Rules 1061
2.3 Classification by C4.5 Algorithm 1061
3 Research Methodology 1062
3.1 Description of the Data 1062
3.2 Evaluation Methods 1063
4 Experimental Results 1065
4.1 The Classification Rules 1065
5 Conclusion 1067
References 1068
110 Algorithms of AP+ Tree Operations for IoT System 1069
Abstract 1069
1 Introduction 1069
2 AP+ Tree Structure Design 1070
3 AP+ Tree Operations Algorithms 1071
3.1 Query Operations 1071
3.2 Insertion Leaf Node Operations 1072
3.3 Deletion Operations 1073
3.4 Reconstruction Operations 1074
4 Performance Analysis 1074
5 Conclusions 1075
Acknowledgments 1075
References 1075
111 Dynamic Storage Method of Big Data Based on Layered and Configurable Technology 1076
Abstract 1076
1 Introduction 1076
2 Layered and Configurable Model 1077
2.1 Metadata Definition Layer 1078
2.2 Structured Key-Value Model Layer 1079
2.3 Data Physical Storage Layer 1079
3 The Instances of Dynamic Storage Scheme 1080
3.1 The Representation of Metadata Information 1080
3.2 The Definition of Key-Value Model 1081
3.3 The Implementation of Physical Storage 1081
4 Conclusions 1082
Acknowledgements 1082
References 1082
112 MIC-Based Preconditioned Conjugate Gradient Method for Solving Large Sparse Linear Equations 1083
Abstract 1083
1 Introduction 1083
2 Intel MIC Architecture 1084
3 PCG Method 1085
4 PCG Method Based on Intel MIC 1086
4.1 Storage Scheme 1086
4.2 PCG Method Based on Intel MIC 1087
5 Numerical Results and Experimental Environment 1088
5.1 Performance Evaluation 1088
6 Summary 1089
References 1089
113 Modeling and Assessing the Helpfulness of Chinese Online Reviews Based on Writing Behavior 1090
Abstract 1090
1 Introduction 1091
2 Observation and Analysis 1091
2.1 Writing Behavior 1091
2.2 Writing Speed 1092
2.3 Product Features 1093
3 The Model of Assessing the Helpfulness of Online Reviews 1093
4 Experiment 1094
5 Conclusions 1096
Acknowledgements 1096
References 1097
114 The Average Path Length of Association Link Network 1098
Abstract 1098
1 Introduction 1098
2 The Analysis of Link Density of ALN 1099
3 The Approximate Solution of Average Path Length of ALN 1101
4 Experiments 1102
5 Conclusions 1103
Acknowledgments 1104
References 1104
115 The Intelligent Big Data Analytics Framework for Surveillance Video System 1105
Abstract 1105
1 Introduction 1105
2 Related Work 1106
3 The Intelligent Big Data Analytics Framework 1107
4 Distributed Surveillance Video System Based on Hadoop 1108
5 Conclusions 1109
Acknowledgments 1109
References 1110
116 The Intelligent Video Processing Platform Using Video Structural Description Technology for the Highway Traffic 1111
Abstract 1111
1 Introduction 1111
2 Related Work 1112
3 The Intelligent Video Processing Platform 1113
4 The Case Study on the Highway Traffic 1114
5 Conclusions 1115
Acknowledgments 1115
References 1115
117 The Scheme of the Cooperative Gun-Dome Face Image Acquisition in Surveillance Sensors 1117
Abstract 1117
1 Introduction 1117
2 Methodology 1119
3 Experiments 1120
4 Conclusions 1121
Acknowledgments 1122
References 1122
118 Vehicle Color Recognition Based on CUDA Acceleration 1124
Abstract 1124
1 Introduction 1124
2 Positioning of Identifiable Area and Highlight Inspection 1125
3 Convolutional Neural Networks Algorithm 1126
4 Identification Systems on Vehicle Color 1127
5 Conclusion 1128
References 1129
119 Video Retargeting for Intelligent Sensing of Surveillance Devices 1130
Abstract 1130
1 Introduction 1130
2 Basic Model 1131
3 The Proposed Method 1132
4 Experimental Results 1134
5 Conclusions 1134
Acknowledgments 1134
References 1135
120 Web Knowledge Acquisition Model Based on Human Cognitive Process 1136
Abstract 1136
1 Introduction 1136
2 Web Knowledge Acquisition Cognitive Process Model 1137
3 UCM 1138
4 Knowledge Discovery Method Based on Clue 1139
5 Conclusions and Future Work 1140
Acknowledgements 1141
References 1141
121 An Investigation on the Relationship Among Employees’ Job Stress, Satisfaction and Performance 1142
Abstract 1142
1 Introduction 1142
2 Literature Review 1143
2.1 Job Stress 1143
2.2 Relationship Between Job Stress and Performance 1143
2.3 Relationship Between Job Satisfaction and Performance 1144
3 Methodology 1144
3.1 Research Framework 1144
3.2 Research Hypotheses 1145
3.3 Questionnaire 1145
3.3.1 Factor Analysis 1145
4 Results Analysis 1146
5 Conclusions and Suggestions 1148
5.1 Build up an Ideal Communication System 1148
5.2 Encourage Cooperation and Empower Employees 1148
5.3 Set up Self-training Mechanisms 1149
References 1149
122 Research on Influence Factors of the Formation of Virtual Innovation Clusters 1150
Abstract 1150
1 Introduction 1150
2 Literature Review 1151
2.1 Virtual Innovation Cluster 1151
2.2 Formation of Cluster 1152
2.3 Influence Factors of Cluster’s Formation 1152
3 Methodology 1153
3.1 Analysis of VIC’s Characteristics 1153
3.2 Factor Analysis 1153
3.3 Model 1154
4 Empirical Study 1154
4.1 The Survey 1154
4.2 The Questionnaire 1154
4.3 Results Analysis 1155
5 Conclusions and Suggestions 1156
Acknowledgments 1157
References 1157
123 Research on the Development Path of New-Type R& D Organization in Guangdong Province, China
Abstract 1158
1 Introduction 1158
2 The Development History of New-Type R& D Organization in Guangdong
2.1 The First Period: 1994–2004 1159
2.2 The Second Period: 2005–2010 1159
2.3 The Third Period: Since 2011 1160
3 The Development Path of New-Type R& D Organization in Guangdong
3.1 The Characteristics of the Development Path of New-Type R& D Organization in Guangdong
3.1.1 A Lot of Support from the Local Government Involved in … 1161
3.1.2 The Daring Spirit of Guangdong Government 1161
3.1.3 The Effective Accumulation of High Levels of Resources 1162
4 Reasons for the Success of Development Path of New-Type R& D Organization in Guangdong
4.1 The Development of the New-Type R& D Organization Complies with the Local Economic Development Needs
4.2 Guangdong Government has the Entrepreneurial Spirit 1163
5 Enlightenments of the Development Path of New-Type R& D Organization in Guangdong
5.1 New-Type R& D Organization Is an Effective Way to Promote the Sustainable Development of Local Economy
5.2 The Construction and Development of New-Type R& D Organization Needs the Support and Guidance of Local Government
5.3 The Development Path of New-Type R& D Organization Should Meet the Need of Area Development
References 1165
124 Analysis of Technology Diffusion Among Agricultural Industry Clusters by Game Theory 1166
Abstract 1166
1 Introduction 1166
2 Framework of Analysis 1167
2.1 The Main Bodies of Agricultural Technology Diffusion 1167
2.1.1 Agricultural Enterprises 1167
2.1.2 Farmers 1167
2.1.3 Government 1168
2.2 The Establishment and Analysis of the Game Model 1168
2.2.1 Government-Led Agricultural Industry Clusters 1168
Pattern One—The Static Condition of Complete Information 1168
Pattern Two—The Dynamic Condition of Complete Information 1169
2.2.2 Market-Led Agricultural Industry Clusters 1170
Pattern One—The Static Condition of Complete Information 1170
Pattern Two—The Static Condition of Incomplete Information 1170
3 Conclusions and Suggestions 1172
3.1 Active Technology Diffusion Strategies in Government-Led Industry Clusters 1172
3.2 Active Technology Diffusion Strategies in Market-Led Industry Clusters 1173
125 Weakness of Zhang-Wang Scheme Without Using One-Way Hash Function 1174
Abstract 1174
1 Introduction 1174
2 Review of Zhang-Wang Scheme 1175
2.1 Signature Generation Phase 1175
2.2 Verification Phase 1175
3 Misuse Order of Operation Problem 1176
4 Our Attack Method 1177
4.1 Two’s Complement System 1177
4.2 XOR Operation 1178
4.3 Our Attack 1180
5 Conclusion 1181
Acknowledgements 1181
References 1181
126 Weakness of an ElGamal-Like Cryptosystem for Enciphering Large Messages 1182
Abstract 1182
1 Introduction 1182
2 Review of Hwang–Chang–Hwang’s Scheme 1183
2.1 The ElGamal Cryptosystem 1183
2.2 Hwang et al.’s Scheme 1183
3 Our Comment 1184
3.1 The Exclusive-OR Operation Issue 1184
3.2 Security Analysis 1186
4 Conclusion 1188
Acknowledgements 1188
References 1188
127 Study of Kindergartner Work Pressure Based on Fuzzy Inference System 1189
Abstract 1189
1 Introduction 1189
2 Review of Environment in Taiwan 1190
2.1 Nouns Definition 1190
2.2 A Table for Major Regions of Pressure Source 1192
2.3 Study Limited and Rang 1192
3 Questionnaire Design 1193
3.1 Questionnaire Structure 1193
3.2 Study of Sampling 1193
3.2.1 Basic Information of an Individual Teacher 1193
4 An Assessment of Working Efficiency Using Fuzzy Logic Inference 1195
4.1 The Concept of the Fuzzy Logic and Inference 1195
4.2 Establishment of a Specific Function and a Rule Base 1195
5 Conclusion 1197
Acknowledgements 1198
References 1198
128 Comment on ‘The Hermite-Hadamard Inequality for R-Convex Functions’ 1200
Abstract 1200
1 Introduction 1200
2 Conclusion 1202
Acknowledgements 1203
Reference 1203
Author Index 1204

Erscheint lt. Verlag 28.7.2016
Reihe/Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Zusatzinfo XXII, 1252 p. 507 illus., 135 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Informatik Weitere Themen Hardware
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Big Data • Frontier computing • Human-Centric Computing • Uviquitous computing • wireless sensor networks
ISBN-10 981-10-0539-7 / 9811005397
ISBN-13 978-981-10-0539-8 / 9789811005398
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 38,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Build memory-efficient cross-platform applications using .NET Core

von Trevoir Williams

eBook Download (2024)
Packt Publishing (Verlag)
CHF 29,30
Learn asynchronous programming by building working examples of …

von Carl Fredrik Samson

eBook Download (2024)
Packt Publishing Limited (Verlag)
CHF 29,30