Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Computational Intelligence in Information Systems (eBook)

Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2016)
eBook Download: PDF
2016 | 1st ed. 2017
XV, 308 Seiten
Springer International Publishing (Verlag)
978-3-319-48517-1 (ISBN)

Lese- und Medienproben

Computational Intelligence in Information Systems -
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book constitutes the Proceedings of the Computational Intelligence in Information Systems conference (CIIS 2016), held in Brunei, November 18-20, 2016. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 26 revised full papers presented in this book have been carefully selected from 62 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.

Preface 6
Organization 7
Honorary Chair/Advisor 7
Steering Committee 7
Chairperson 7
Members 7
International Advisory Board 7
Working Committees 8
Chairman and Co-chairs 8
Secretariat 8
Technical 8
Finance 8
Ceremony and Logistics 9
Welfare and Accommodation 9
Web Master 9
Sponsorship, Promotion and Publicity 9
Publishing 9
Invitation and Protocol 9
Refreshment 9
Car and Traffic 10
Souvenir and Certificate 10
Special Session Organizers 10
International Technical Committee 10
Organizer 12
Technical Sponsors 12
Contents 13
Intelligent Systems and their Applications 16
On Using Genetic Algorithm for Initialising Semi-supervised Fuzzy c-Means Clustering 17
1 Introduction 17
2 Methodology 19
2.1 Semi-supervised Fuzzy C-Means 19
2.2 The Genetic Algorithm 20
3 Experiments 21
4 Results and Discussion 22
5 Conclusion 27
References 28
Estimation of Confidence-Interval for Yearly Electricity Load Consumption Based on Fuzzy Random Auto-Regression Model 29
Abstract 29
1 Introduction 29
2 Fundamental Theories of Fuzzy Random Variable and Fuzzy Random Auto-Regression Model 30
2.1 Fuzzy Random Variables 30
2.2 Fuzzy Random Auto-Regression (FR-AR) Model 32
3 Proposed LRS of TFN in Estimating Confidence-Interval of FR-AR Model 33
4 Empirical Analysis 36
5 Conclusion 39
Acknowledgment 39
References 39
Improved Discrete Bacterial Memetic Evolutionary Algorithm for the Traveling Salesman Problem 41
Abstract 41
1 Introduction 41
1.1 The Traveling Salesman Problem 41
1.2 The TSP as an NP-Hard Task 42
1.3 Our Previous Work 42
2 The Discrete Bacterial Memetic Evolutionary Algorithm 43
2.1 Bacterial Evolutionary Algorithm 43
2.2 Local Search 48
2.3 Comparison of Optimal Tour Lengths 49
2.4 Comparison of Runtimes 50
3 Conclusions 51
References 51
Improved Stampede Prediction Model on Context-Awareness Framework Using Machine Learning Techniques 53
Abstract 53
1 Introduction 53
1.1 Purpose of the Study 54
2 Related Works 55
3 Proposed Work 56
3.1 Decision Tree 56
3.2 K-Means 57
3.3 Participant Nodes Behavior for Group Clustering 59
4 Experimental Results 59
4.1 Performance Evaluation Criteria 59
5 Discussion of Results 61
6 Conclusion 63
References 63
Image Classification for Snake Species Using Machine Learning Techniques 66
1 Introduction 66
2 Related Works 67
3 The Snakes of Perlis Corpus 68
3.1 Feature Extraction 69
4 Experiment 70
4.1 Performance Metrics 70
4.2 Results and Discussion 71
5 Conclusion 72
References 72
Rides for Rewards (R4R): A Mobile Application to Sustain an Incentive Scheme for Public Bus Transport 74
Abstract 74
1 Introduction 74
2 Problem Statement 75
3 Related Literature 75
4 Methodology of the Rides for Rewards (R4R) Application 76
4.1 Pre-Initiation Survey 77
4.2 Collect Requirements 77
4.3 Assess Requirements 78
4.4 Develop Prototype: R4R Mobile Application 79
4.5 Conduct Pilot Study 82
5 Results 83
6 Conclusions and Future Work 83
Acknowledgements 84
References 84
Mobile mBus System Using Near Field Communication 86
Abstract 86
1 Introduction 86
2 NFC Characteristics in Related Works 87
3 Methodology 88
4 mBus System 89
4.1 System Database 90
4.2 Security–Verification Code 90
4.3 Analysis on bTag 91
4.4 mBus GUI 91
5 Discussion and Future Works 93
Acknowledgements 94
References 94
An Agent Model for Analysis of Trust Dynamics in Short-Term Human-Robot Interaction 95
Abstract 95
1 Introduction 95
2 Trust and Human-Robot Interaction 96
2.1 Trust Dynamics 96
2.2 Long-Term and Short-Term Human Robot Interaction 97
3 Computational Modeling 97
3.1 Instantaneous Relationships 98
3.2 Temporal Relationships 100
4 Simulation 100
5 Evaluation 102
5.1 Mathematical Analysis 102
5.2 Logical Verification 103
6 Conclusion 105
Acknowledgements 106
An Ambient Agent Model for a Reading Companion Robot 108
Abstract 108
1 Introduction 108
2 Companion Robots 109
3 The Ambient Agent Model 110
3.1 A Dynamical Domain Model of Cognitive Load and Reading Performance 111
3.2 Belief Base 111
3.3 Analysis Model 112
3.4 Support Model 113
4 Ontology and Specifications 114
5 Simulation Results 117
6 Automated Verification 118
7 Conclusion 119
Acknowledgement 119
References 119
Student Acceptance and Attitude Towards Using 3D Virtual Learning Spaces 121
Abstract 121
1 Introduction 121
2 Literature Review 122
2.1 Virtual Worlds and Virtual Learning Spaces 122
2.2 The Technology Acceptance Model (TAM) 123
2.3 The Technology Acceptance Model (TAM) and Virtual Worlds 123
3 Research Model and Hypotheses 124
4 Research Methodology 126
4.1 Data Collection and Procedure 126
4.2 Instrumentation 127
5 Results 127
5.1 Background Profile 127
5.2 Validity and Reliability 127
5.3 Hypothesis Testing: Regression Analysis 129
6 Discussion and Conclusion 130
References 131
Data Mining and Its Applications 133
Class Noise Detection Using Classification Filtering Algorithms 134
Abstract 134
1 Introduction 134
2 Related Works 135
3 Methodology 135
3.1 Phase1: Data Preparation 135
3.2 Phase2: Noise Detection 136
3.3 Phase3: Noise Classification 137
4 Experimental Studies 137
4.1 Datasets 137
4.2 Performance Measure 138
5 Results and Discussions 138
5.1 Noise Detection Evaluation Results in Terms of Precision 138
5.2 Noise Detection Evaluation Results in Terms of Recall 139
5.3 Noise Detection Evaluation Results in Terms of F-Measure 140
5.4 Noise Classification Results in Terms of Accuracy 140
6 Conclusion 142
References 142
A Novel Robust R-Squared Measure and Its Applications in Linear Regression 144
1 Introduction 144
2 Existing Measures and Improvement Scope 145
2.1 Outliers and Leverage Points 145
2.2 Contamination vs. Traditional Measures 145
2.3 Robust Regression and Related GoF Measures 146
3 Proposed Methodology 146
3.1 RoR2 Computation Process 146
3.2 Main Algorithm 147
4 Empirical Results 149
4.1 Simulation Construct 149
4.2 Model Selection Performance 151
4.3 Contamination Detection Performance 152
4.4 Regression Estimator Performance 152
4.5 Performance Assessment Based on Real Datasets 153
5 Conclusions and Next Steps 154
References 155
An Improvement to StockProF: Profiling Clustered Stocks with Class Association Rule Mining 156
Abstract 156
1 Introduction 156
2 An Overview of StockProF 157
3 Methodology 158
3.1 Preparation of the Stock Data Set 158
3.2 Mining Class Association Rules 160
4 Results and Discussion 160
4.1 Profiling the Clusters 161
4.2 Building Stock Portfolios 162
4.3 Average Capital Performance 162
5 Conclusion 164
References 164
Empirical Study of Sampling Methods for Classification in Imbalanced Clinical Datasets 165
Abstract 165
1 Introduction 165
2 Decision Trees 167
3 Data Imbalance 167
3.1 Undersampling 167
3.2 Oversampling 168
3.3 Model Evaluation 169
4 Experimental Datasets 169
5 Experiment Design 171
6 Results and Analysis 172
7 Conclusion 175
References 175
Internetworking, Security and Internet of Things 176
Internet of Things (IoT) with CoAP and HTTP Protocol: A Study on Which Protocol Suits IoT in Terms of Performance 177
Abstract 177
1 Introduction 177
2 HTTP and CoAP 178
2.1 Constrained Devices 178
2.2 Process of Communication Made Between HTTP and CoAP 179
2.3 HTTP and CoAP Message Format 179
3 Implementation 180
3.1 HTTP and CoAP Implementation 181
3.2 Network Performance Measures 181
3.3 Testing 181
4 Findings 182
4.1 Large Data 182
5 Conclusion 184
References 185
NTRU Binary Polynomials Parameters Selection for Reduction of Decryption Failure 187
1 Introduction 187
2 NTRU Parameters 188
3 NTRU Operation 189
4 Decryption Failure Approximation 189
4.1 Recap of Previous Decryption Failure Approximation 189
4.2 Computational Approximation of Decryption Failure for NTRU Binary Polynomials 190
5 Studying the Relationship Between the Parameters and Their Effect on the NTRU Key Generation, Encryption and Decryption 191
5.1 Testing Parameters and Environment 191
5.2 Testing for Identification of Influential Parameters: Key Determinants of Decryption Failure 192
5.3 Studying the Private Key Polynomial f 194
5.4 Using Machine Learning to Analyze the Relationship Between the Polynomial f and Large Modulus q 194
6 Conclusion 197
References 197
Energy Efficient Operational Mechanism for TDM-PON Supporting Broadband Access and Local Customer Internetworking 200
1 Introduction 200
2 System Model 203
3 Proposed Energy Efficient Operational Mechanism 204
4 Results and Discussion 206
5 Conclusion 208
References 208
Performance Analysis of MANET Under Black Hole Attack Using AODV, OLSR and TORA 210
Abstract 210
1 Introduction 210
2 Background Study 211
3 Simulation 212
3.1 Network Layout 212
3.2 Parameter Configurations 213
3.3 Black Hole Attack Configurations 213
4 Results 215
5 Findings and Analysis 217
6 Conclusions and Future Work 219
References 219
Management Information Systems and Education Technology 220
Enhancement of Learning Management System by Integrating Learning Styles and Adaptive Courses 221
Abstract 221
1 Introduction 221
1.1 Learning Management System in General 222
2 Problem Statement 223
3 Literature Review 223
3.1 Learning Styles 223
3.2 Learning Styles Model by Kolb 224
3.3 The Felder-Silverman Learning Style Model (FSLSM) 224
4 Research Methodology 225
5 Discussion 226
References 226
InterviewME: A Comparative Pilot Study on M-Learning and MAR-Learning Prototypes in Malaysian English Language Teaching 229
Abstract 229
1 English as a Second Language in Malaysia 229
1.1 Listening and Speaking 230
1.2 Mobile Learning and ELT in Malaysia 231
1.3 Mobile Augmented Reality in ELT 232
2 InterviewME MAR-Learning Application Prototype 233
3 Methodology 236
3.1 Hypotheses 237
4 Results and Discussion 238
5 Conclusion 241
References 241
A Preliminary Evaluation of ICT Centers Performance Using COBIT Framework: Evidence from Institutions of Higher Learning in Brunei Darussalam 245
Abstract 245
1 Introduction 245
1.1 COBIT Structure 247
1.2 Why COBIT? 247
2 Review of Literature 247
2.1 Maturity Level Model 248
3 Research Methodology 249
4 Results and Discussion 249
5 Conclusion 253
References 253
A Cognitive Knowledge-based Framework for Adaptive Feedback 255
Abstract 255
1 Introduction 255
2 Background 256
2.1 Approaches to Adaptive Feedback in Learning Environments 258
2.2 Knowledge Modeling in Cognitive Knowledge Base 259
3 Proposed Framework for Adaptive Feedback 261
4 Conclusion 263
Acknowledgment 263
References 263
Creative Computing 266
Towards Developing a Therapeutic Serious Game Design Model for Stimulating Cognitive Abilities: A Case for Children with Speech and Language Delay 267
Abstract 267
1 Introduction 267
2 Related Works 269
2.1 Serious Games for Therapeutic and Cognitive Stimulation 269
2.2 User Characteristics of CSLD 270
2.3 The Cognitive Development of a Child 270
3 Preliminary Study 271
4 Discussion 273
5 Conclusion 274
References 275
3D Facial Expressions from Performance Data 278
1 Introduction 278
2 Background 279
3 Performance Driven Facial Animation 280
4 Creative Process and Results 281
5 Conclusion and Future Direction 284
References 285
Computational Complexity and Algorithms 287
Constrained Generalized Delaunay Graphs are Plane Spanners 288
1 Introduction 288
2 Preliminaries 290
2.1 Auxiliary Lemmas 290
3 The Constrained Generalized Delaunay Graph 292
3.1 Planarity 292
3.2 Spanning Ratio 293
4 Conclusion 298
References 299
Solving the Longest Oneway-Ticket Problem and Enumerating Letter Graphs by Augmenting the Two Representative Approaches with ZDDs 301
1 Introduction 301
2 Preliminaries 303
2.1 Zero-Suppressed Binary Decision Diagrams 303
2.2 Frontier-Based Search 304
3 FBS for Degree Specified Graphs 305
4 New ZDD Operations 306
5 ZDDs over the Set of Edges and Vertices 307
6 Constructing ZDDs for Letter Graphs 307
7 Experiments 309
7.1 Finding the Longest Oneway-Ticket 309
7.2 Enumerating Letter and Multi-letter Graphs 311
References 312
Author Index 313

Erscheint lt. Verlag 25.10.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XV, 308 p. 91 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Technik
Schlagworte CIIS 2016 • Computational Intelligence • information systems • intelligent computing • Intelligent Systems
ISBN-10 3-319-48517-2 / 3319485172
ISBN-13 978-3-319-48517-1 / 9783319485171
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Multifunktionsgurt für die Feuerwehr

von Ivo Ernst

eBook Download (2025)
Kohlhammer Verlag
CHF 10,70