Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – ISAT 2017 (eBook)
XVIII, 358 Seiten
Springer International Publishing (Verlag)
978-3-319-67220-5 (ISBN)
Preface 6
In Memory of Our Friend and Past ISAT Chair 8
ISAT 2017 Conference Organization 10
Contents 16
Artificial Intelligence Methods 20
A Deep Learning Approach for Valve Defect Recognition in Heart Acoustic Signal 21
Abstract 21
1 Introduction 21
2 Methods 24
2.1 Data Preparation 25
2.2 Preprocessing 25
2.3 ANN Model Architecture 27
2.4 ANN Training 29
3 Result and Discussion 30
4 Conclusion 31
References 31
Population-Based Algorithm with Selectable Evolutionary Operators for Nonlinear Modeling 33
Abstract 33
1 Introduction 33
2 Description of Proposed Method 34
2.1 Fuzzy System Used for Nonlinear Modeling 36
2.2 Encoding of the Individuals 37
2.3 Evaluation of the Individuals 37
2.4 Processing of the Individuals 39
3 Simulations 40
4 Conclusions 42
Acknowledgment 43
References 43
Evaluation of Gated Recurrent Neural Networks in Music Classification Tasks 45
Abstract 45
1 Introduction 45
2 Related Work 46
2.1 Music Audio Classification 46
2.2 Gated Recurrent Neural Networks 47
3 Gated Recurrent Network Architectures 48
4 Evaluation of RNN in Music Classification 49
4.1 Datasets Description 49
4.2 Common Conditions of the Experiments 50
4.3 Basic Comparison of RNN Architectures 51
4.4 Evaluation of Training on Random Short Excerpts 53
5 Conclusions and Future Work 53
References 54
Neuro-Fuzzy System for Medium-Term Electric Energy Demand Forecasting 56
Abstract 56
1 Introduction 56
2 Time Series Representation 57
3 Neuro-Fuzzy Forecasting System 58
4 Application Example 61
5 Conclusion 65
References 65
An Evolutionary Optimization Method Based on Scalarization for Multi-objective Problems 66
Abstract 66
1 Introduction 66
2 Scalarization and Optimality Conditions 67
3 Comments on Genetic Algorithms 68
4 The DSC Algorithm [6] 68
5 The Idea of New Scalarization 69
6 A Problem with Two Objectives 70
7 Test Functions (Problems) 71
7.1 SCH Function 71
7.2 POL Function 71
7.3 FON Function 72
8 Experimental Results 72
8.1 Comments on Applying the Genetic Algorithm 72
8.2 SCH Function Using the GA and DSC Algorithms 73
8.3 POL Function Using the GA and DSC Algorithms 73
8.4 FON Function Using the GA and DSC Algorithm 73
8.5 Comparisons and Discussions 74
9 Conclusions 75
Acknowledgments 75
References 76
Measuring Cognitive Workload in Arithmetic Tasks Based on Response Time and EEG Features 77
Abstract 77
1 Introduction 77
2 Related Work 78
3 EEG Analysis 78
4 Methodology, Experimental Setup and Data Acquisition 79
5 Data Analysis 79
5.1 Pre-processing 79
5.2 Feature Extraction 80
6 Results 82
6.1 Statistical Analysis 82
6.2 Evoked Related Potentials 86
7 Discussion 88
References 89
A Method for Genetic Selection of the Dynamic Signature Global Features’ Subset 91
Abstract 91
1 Introduction 91
2 Data Representation in the Algorithm 92
3 Genetic Selection of the Global Features 92
3.1 Encoding of Solutions 92
3.2 Processing of Solutions 93
3.3 Evaluation of Solutions 93
3.4 Signature Verification 95
4 Simulation Results 96
5 Conclusions 98
Acknowledgment 98
References 99
Knowledge Discovery and Data Mining 101
Multivariate Regression Tree for Pattern-Based Forecasting Time Series with Multiple Seasonal Cycles 102
Abstract 102
1 Introduction 102
2 Time Series Representations Using Patterns 104
3 Multivariate Regression Trees for Forecasting 105
4 Application Example 106
5 Conclusion 110
References 111
Active Protocol Discoverer Based on Grammatical Evolution 112
Abstract 112
1 Introduction 112
2 Meta-Grammar Genetic Algorithm for Protocol Discovering 113
2.1 Meta Grammar 114
3 Protocol Decomposition 115
4 The Process of Protocol Discovering 117
4.1 Stop Conditions of the Evolutionary Process 117
4.2 Fitness Function 118
4.3 Genetic Operators 118
5 Preliminary Results 118
5.1 Testing Environment 119
5.2 Process Parameters 119
5.3 Results 120
6 Conclusions 121
References 122
Speaker Diarization Using Deep Recurrent Convolutional Neural Networks for Speaker Embeddings 124
Abstract 124
1 First Section 124
2 Related Work 126
3 Method 127
3.1 Problem Formulation 127
3.2 Features 128
3.3 Network Architecture 128
4 Experiments 129
4.1 Datasets 129
4.2 Implementation 130
4.3 Baseline 130
4.4 Evaluation Metric 131
4.5 Results 131
5 Conclusions 132
Acknowledgment 132
References 132
Classification Tree for Material Defect Detection Using Active Thermography 135
Abstract 135
1 Introduction 135
2 Experimental Investigations Using Active Thermography 137
3 Classification Tree for Defect Detection 139
4 Simulation Study 141
5 Conclusion 143
References 144
Interactive Visualization of Query Results Set from Information Retrieval Using Concept Lattices 145
Abstract 145
1 Introduction 145
2 Formal Concept Analysis (FCA) 146
3 Concept Lattice Reduction Methods 147
4 Generalized One-Side Concept Lattice (GOSCL) 147
5 Visualization of Search Results Using Concept Lattice 148
6 Experiments 151
7 Conclusion 153
Acknowledgments 153
References 153
PID-Fuzzy Controllers with Dynamic Structure and Evolutionary Method for Their Construction 155
Abstract 155
1 Introduction 155
2 Description of Proposed Controller 156
2.1 Filtration Layer 156
2.2 PID Layer 157
2.3 Normalization Layer 158
2.4 Inference Layer 158
3 Description of Evolutionary Method for Controller Construction 159
3.1 Encoding of the Individuals 160
3.2 Processing of the Individuals 160
4 Simulations 161
5 Conclusions 164
Acknowledgment 164
References 164
Community Detection in Bibsonomy Using Data Clustering 166
Abstract 166
1 Introduction 166
2 Related Work 167
3 User Similarity Calculation 168
4 Experimental and Computational Details 169
4.1 Data Description 169
4.2 Descriptive Statistics of the Used Dataset 169
4.2.1 Bar Graphs of no Maximum Values 169
4.2.2 Self-Organizing Map (SOM) 170
4.3 Methodology Description 171
4.3.1 Detection of the Similar Users Using the Agglomerative Clustering 171
4.3.2 Detection of the Similar Users Using the k-Means and the k-Medoids 172
4.4 Determination of the Best Number of Clusters 172
5 Experimental Results 173
5.1 Obtained Results 173
6 Conclusion 174
References 174
Big Data, Knowledge Discovery and Data Mining, Knowledge Based Management 176
Using Predictive Data Mining Models for Data Analysis in a Logistics Company 177
Abstract 177
1 Introduction 177
2 Related Work 178
3 Methodology 179
4 Experiments and Their Evaluation 180
4.1 Experiment 1 180
4.2 Experiment 2 182
4.3 Experiment 3 183
4.4 Experiment 4 183
5 Conclusions 185
Acknowledgment 185
References 185
Twitter Sentiment Analysis Using a Modified Naïve Bayes Algorithm 187
Abstract 187
1 Introduction 187
2 Related Work 188
3 System Architecture 190
4 Methodology 190
4.1 Data Collection 190
4.2 Data Preprocessing 190
4.3 Algorithm for Performing Sentiment Analysis 192
5 Results 195
6 Conclusions and Future Work 196
References 197
Cost-Sensitive Feature Selection for Class Imbalance Problem 198
Abstract 198
1 Introduction 198
2 Background Knowledge 199
2.1 Data Imbalancing 199
2.2 Data Multidimensionality 200
2.3 Feature Selection in Term of Data Imbalance 201
3 Cost-Sensitive Feature Selection - Experiments 202
3.1 Experimental Setup 203
3.2 Results and Discussion 205
4 Summary 209
Acknowledgements 209
References 209
Constraint-Based Method for Mining Colossal Patterns in High Dimensional Databases 211
Abstract 211
1 Introduction 211
2 Related Works 213
2.1 Mining Colossal Patterns 213
2.2 Mining Pattern with Constraints 213
3 Basic Concepts and Problem Statement 214
4 Proposed Algorithm 215
5 Experiments 216
5.1 Experimental Environment and Databases 216
5.2 Comparison of the Runtimes 217
6 Conclusions and Future Work 218
Acknowledgments 219
References 219
A Dynamic Packed Approach for Analytic Data Warehouse in Ad-Hoc Queries 221
Abstract 221
1 Introduction 221
2 Partition Problem Formulation 222
3 Computational Complexity of the Partition Problem 223
4 Proposed Method 224
4.1 Algorithm 224
4.2 An Illustration of Example 224
5 Experiments 226
6 Conclusions and Future Work 228
Acknowledgments 228
References 229
Internet of Things, Cloud Computing and High Performance Computing, Distributed Computer Systems, Content Delivery Networks 230
How Is Server Software Configured? Examining the Structure of Configuration Files 231
Abstract 231
1 Introduction 231
2 Methodology 232
3 Findings 233
4 Taxonomy of Configuration Files 236
5 Errors in Configuration 238
6 Universal Configuration Description 239
7 Conclusion 242
References 242
Risk-Based Decision Making in IoT Systems 244
Abstract 244
1 Introduction and Background 244
1.1 IoT Architecture – Outline 244
1.2 IoT Applications 245
1.3 Trust in IoT 245
1.4 Scope of This Work 246
2 Trust and Risk in Sensor Networks and the IoT Environment 247
3 Model Description 248
4 Summary 253
References 253
On Implementation of Energy-Aware MPTCP Scheduler 256
Abstract 256
1 Introduction 256
2 Problem Statement 257
3 Analytical Background 258
4 Implementation 259
5 Evaluation 262
5.1 Long-Lived Streams 263
5.2 Short-Lived Streams 264
6 Summary and Conclusions 264
References 265
Mobile Monitoring System for Environment Parameters 266
Abstract 266
1 Introduction 266
2 Related Works 267
3 Solution Concept and System Architecture 267
4 Calibration and Performance Tests 271
4.1 Display Measurements and Their Location 271
4.2 Sensor’s Measurement Precision Testing and Calibration 272
4.3 Dust Sensor Re-Testing 273
5 Summary 274
Acknowledgements 274
References 275
Swarm Based System for Management of Containerized Microservices in a Cloud Consisting of Heterogene ... 276
Abstract 276
1 Introduction 276
2 Live Migration of Containers 277
3 Swarm Algorithm for Non-homogeneous Hosts 278
4 Experimental Results 280
5 Conclusions 284
References 285
Execution Management of Computational Services in Service-Oriented Systems 286
Abstract 286
1 Introduction and Related Work 286
2 Service Management System 288
3 Problem Formulation 291
4 Algorithms Managing the Execution of Computational Services 292
5 Study of Developed System Efficiency 292
6 Conclusions 294
References 295
Content Delivery Network and External Resources Detection for Selected Hosts 297
Abstract 297
1 Introduction 297
2 Technology Stack Overview 298
2.1 External Resources and Content Security Policy 298
2.2 Content Delivery Network 299
3 Applied Method 300
4 Implemented Application 302
5 Results 302
6 Conclusion and Future Work 304
References 304
Parallelization of Selected Algorithms on Multi-core CPUs, a Cluster and in a Hybrid CPU+Xeon Phi En ... 306
Abstract 306
1 Introduction 306
2 Related Work 307
3 Applications and Experiments 308
3.1 Testbed Environments 308
3.2 Parallel Genetic Algorithm 309
3.3 Parallel Algorithm for Matrix Multiplication 310
3.4 Parallel Algorithm of Integrate Calculation 311
4 Summary and Future Work 314
References 314
E-Business Systems, Web Design, Mobile and Multimedia Systems 316
Verification of Web Traffic Burstiness and Self-similarity for Multiple Online Stores 317
Abstract 317
1 Introduction 317
2 Approach for Evaluating Self-similarity and Burstiness of the Web Traffic 318
2.1 Definition of Self-similarity 318
2.2 Estimation of the Hurst Parameter Using the Aggregate Variance Method 318
2.3 Estimation of the Burstiness Factor 319
3 Results 319
3.1 Empirical Data Description 319
3.2 Burstiness 320
3.3 Self-similarity 323
4 Concluding Remarks 325
Acknowledgment 325
References 325
Frequent Scene Change in Wavelet Video Compression 327
Abstract 327
1 Introduction 327
2 Wavelet Video Coding 329
3 Methodology 330
4 Experimental Results 332
5 Conclusion 335
References 336
A Versatile Hardware and Software Toolset for Computer Aided Inspection Planning of Machine Vision A ... 338
Abstract 338
1 Introduction 338
2 Related Work 339
3 Toolset and Digital Planning Workflow 340
3.1 System Overview 341
3.2 CAD File Annotation 341
3.3 IPIL Data Container 341
3.4 System Simulation 342
3.5 System Evaluation 343
3.6 2-Robot Setup for Image Capturing 344
4 Image Acquisition Simulation and Real Images of a Laser Triangulation Setup 345
5 Summary and Discussion 346
Acknowledgements 346
References 346
The Impact of Web Pages’ Load Time on the Conversion Rate of an E-Commerce Platform 348
Abstract 348
1 Introduction 348
2 Related Work 349
3 The Measure of Application Performance 349
4 Experiments 351
4.1 Introduction 351
4.2 Research Position 351
4.3 Description of Experiments and Discussion of Results 352
5 Conclusions and Directions of Further Work 356
References 357
Nearest Neighborhood Determination Methods with Regard to Mobile Location-Based Application 358
Abstract 358
1 Introduction 358
2 Short Characteristic of Considered Algorithms 359
2.1 Basic Popular Algorithms 360
2.2 B+ Tree Integer Geohash Algorithm 362
3 Performance and Accuracy Tests 363
3.1 Research Methodology 363
3.2 Simulation Results 364
4 Final Remarks 367
References 367
Author Index 368
| Erscheint lt. Verlag | 31.8.2017 |
|---|---|
| Reihe/Serie | Advances in Intelligent Systems and Computing | Advances in Intelligent Systems and Computing |
| Zusatzinfo | XVIII, 358 p. 157 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
| Technik ► Nachrichtentechnik | |
| Schlagworte | Computer Networks • information systems • Information Systems Architecture • ISAT 2017 • Risk Management |
| ISBN-10 | 3-319-67220-7 / 3319672207 |
| ISBN-13 | 978-3-319-67220-5 / 9783319672205 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich