Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Recent Trends in Information and Communication Technology (eBook)

Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017)
eBook Download: PDF
2017 | 1st ed. 2018
930 Seiten
Springer International Publishing (Verlag)
978-3-319-59427-9 (ISBN)

Lese- und Medienproben

Recent Trends in Information and Communication Technology -
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents 94 papers from the 2nd International Conference of Reliable Information and Communication Technology 2017 (IRICT 2017), held in Johor, Malaysia, on April 23-24, 2017. Focusing on the latest ICT innovations for data engineering, the book presents several hot research topics, including advances in big data analysis techniques and applications; mobile networks; applications and usability; reliable communication systems; advances in computer vision, artificial intelligence and soft computing; reliable health informatics and cloud computing environments, e-learning acceptance models, recent trends in knowledge management and software engineering; security issues in the cyber world; as well as society and information technology.

Preface 6
IRICT-2017 Organizing Committee 8
Patron 8
Honorary Chair 8
International Advisory Board 8
Conference Chair 9
Program Committee Co-chairs 9
Secretariat 9
Publicity Committee 9
Publications Committee 9
IT Committee 10
Logistic Committee 10
Treasure Committee 10
Registration Committee 10
Sponsorship 11
International Technical Committee 11
Contents 12
Big Data Analysis Techniques and Applications 22
Prediction of Financial Distress for Electricity Sectors Using Data Mining 23
Abstract 23
1 Introduction 23
2 Methodology 24
2.1 Models for Predicting Financial Distress and Forecasting Probability of Default 24
2.2 Financial Indicators 25
3 Results and Discussion 26
3.1 Prediction Performance of Data Mining Techniques 26
3.2 Importance of Financial Indicators 29
4 Conclusion 30
References 30
Predictive Modeling for Dengue Patient’s Length of Stay (LoS) Using Big Data Analytics (BDA) 32
Abstract 32
1 Introduction 32
2 Background 33
2.1 Big Data 33
2.2 Big Data Analytics in Healthcare 33
2.3 Electronic Medical Records (EMR) System 34
2.4 Hospital Length of Stay (LoS) 34
2.5 Dengue Disease 35
2.6 Related Work 35
3 Methodology 36
3.1 Data Description 36
3.2 Predictive Modeling 37
3.2.1 Regression Analysis 37
4 Results 37
4.1 Statistics and Descriptive Analyses 37
5 Conclusions and Future Works 38
Acknowledgments 39
References 39
Experimental Performance Analysis of B+-Trees with Big Data Indexing Potentials 40
Abstract 40
1 Introduction 40
2 Methodology 42
2.1 Experimental Metrics 42
2.2 Experimental Setup 43
2.3 Querying the B+-Tree 43
3 Experimental Results and Discussions 43
3.1 Results Presentations 43
3.2 Discussions 47
4 Conclusion 48
References 48
A Proposed Methodology for Integrating Oil and Gas Data Using Semantic Big Data Technology 50
Abstract 50
1 Introduction 50
2 Related Works 51
2.1 Big Data and the Semantic Web 52
3 Proposed Framework 53
4 Result 54
5 Conclusion 56
References 56
Molecular Similarity Searching with Different Similarity Coefficients and Different Molecular Descriptors 59
Abstract 59
1 Introduction 59
2 State of the Art 60
3 Concept and Method 61
3.1 Similarity Measure 62
4 Experimental Design 63
5 Results 64
6 Conclusion 65
Acknowledgments 65
References 66
Classification of Arabic Writer Based on Clustering Techniques 68
Abstract 68
1 Introduction 68
2 Related Work 69
3 Dataset 70
4 Methodology 71
4.1 Pre-processing 71
4.2 Connected-Components 71
4.3 Feature Extraction 71
4.4 Feature Combination 72
4.5 Clustering (Classification) 73
5 Results and Discussion 74
6 Conclusions 76
References 76
Data Pre-processing Techniques for Publication Performance Analysis 79
Abstract 79
1 Introduction 79
2 Related Studies 80
2.1 Research Performance Measurement 80
2.2 Data Pre-processing 82
3 Materials and Methods 82
3.1 Datasets 82
3.2 Data Pre-processing Approach 83
4 Results and Discussions 84
5 Conclusion 85
Acknowledgement 85
References 85
Data Mining Techniques: A Systematic Mapping Review 86
Abstract 86
1 Introduction 86
2 Background 87
3 Methodology 88
3.1 Research Questions 88
3.2 Literature Search 88
3.3 Study Selection 89
3.4 Data Extraction 90
3.5 Validity 90
4 Results 90
4.1 RQ-1: What Are the Major Methods for Conducting Web Data Mining? 90
4.2 RQ-2: Which Topics in Web Data Mining Are Covered? 91
4.3 RQ-3: When and Where Were the Studies Published? 92
4.4 RQ-4: How Were Studies Performed in Terms of Visualization of the Results? 93
5 Discussion 94
5.1 Data Warehousing 94
5.2 Hyperlinks 94
5.3 Web Mining 95
6 Conclusion and Recommendations 96
References 96
A Comprehensive Study on Opinion Mining Features and Their Applications 98
Abstract 98
1 Introduction 98
1.1 Opinion Mining and Sentiment Analysis 99
2 Features of Reviews, Reviewers, Group of Reviewers and Target 99
3 Linguistic Features 101
4 Structural Features 103
5 Conclusion 106
Acknowledgments 106
References 106
Mobile Networks, Applications and Usability 110
Adaptive Hybrid Geo-casting Routing Protocol for Mobile Ad hoc Networks 111
Abstract 111
1 Introduction 111
2 Related Work 112
3 Methodology 112
4 Performance Evaluation 114
4.1 Simulation Overview 114
4.2 Simulation Result 115
4.2.1 Effect of Moving Speed 115
4.2.2 Effect of Data Traffic Loads 116
5 Conclusions 117
References 117
What Makes Older People Want to Use Mobile Devices? 118
Abstract 118
1 Introduction 118
2 Older People 119
3 Mobile Devices and Factors of Usages 119
4 Methodology 121
4.1 Interview Questions 121
4.2 Data Analysis 121
4.3 Demographic of Participants 121
5 Findings and Discussions 122
5.1 Mobile Device Design 122
5.2 Mobile Device Functions 122
5.3 Social Inspiration 123
5.4 Economical 124
6 Conclusions 124
Acknowledgments 124
References 124
Mobile Augmented Reality Tourism Application Framework 126
Abstract 126
1 Introduction 126
2 Literature Review 127
2.1 Requirements Pyramid Model 127
2.2 User Requirements 128
2.3 Functional Requirements 128
3 Methodology 129
3.1 Awareness of Problem 129
3.2 Suggestion 129
3.3 Evaluation 129
3.4 Development 130
4 Findings 130
5 Mobile Augmented Reality Tourism Application Framework 131
6 Conclusion 131
References 132
Motion Artifact Reduction Algorithm Using Sequential Adaptive Noise Filters and Estimation Methods for Mobile ECG 134
Abstract 134
1 Introduction 134
2 The Proposed Algorithm 136
3 Experimental Results and Discussions 138
4 Conclusion 139
Acknowledgment 139
References 140
Concerning Matters of Mobile Device Usage Among Older People 142
Abstract 142
1 Introduction 142
2 Older People 143
3 Mobile Devices and Older People 143
3.1 Concerning Matters (Effects) 144
4 Methodology 145
5 Findings and Discussions 145
5.1 Addictions 146
5.2 Relationship Between Human 147
5.3 Misuse 147
5.4 Learning Tool 148
6 Conclusions 148
Acknowledgments 148
References 148
Adaptive Memory Size Based Fuzzy Control for Mobile Pedestrian Navigation 150
Abstract 150
1 Introduction 150
2 Concept of Single Distribution Resampling 151
3 Adaptive Memory Size-Based Fuzzy Control 152
4 Experiment Result 153
5 Conclusions and Recommendations for Future Research 157
References 158
Extraction of Common Concepts for the Mobile Forensics Domain 159
Abstract 159
1 Introduction 159
2 Background 160
3 Method 161
3.1 Models Collection 161
3.2 Concepts Extraction 161
3.3 Common Concepts Selection 169
3.4 Designation of Common Concepts 169
4 Conclusion 170
Acknowledgment 170
References 171
Revisiting the Usability of Smartphone User Interface for Elderly Users 173
Abstract 173
1 Introduction 173
2 Literature Review 174
3 The Preliminary Study 175
3.1 Study Objective 175
3.2 Method 175
4 Results and Discussions 176
4.1 Usability Issues 176
4.2 Beyond Usability Metrics 177
4.2.1 Different Users’ Trends When Using Smartphone 177
4.2.2 User Experience with the Smartphone 177
4.3 Implications of the Study’s Findings 178
5 Conclusion and Future Work 179
References 179
Taguchi Methods for Ad Hoc on Demand Distance Vector Routing Protocol Performances Improvement in VANETs 181
Abstract 181
1 Introduction 181
2 Related Works 183
3 Taguchi Method 183
4 Results and Discussion 186
5 Conclusion 187
References 187
Two Stage Integration of GPS, Kinematic Information, and Cooperative Awareness Messages Using Cascaded Kalman Filters 189
Abstract 189
1 Introduction 189
2 The Proposed Algorithm (GPS/DR/V2V) 191
2.1 GPS/DR Fusion Algorithm 191
2.2 GPS/DR/V2V Fusion Algorithm 193
3 Results and Discussions 194
4 Conclusion 196
Acknowledgments 196
References 196
Modeling of GPS Ionospheric Scintillation Using Nonlinear Regression Technique 198
Abstract 198
1 Introduction 198
2 Experimental Setup 199
3 Method 200
4 Mathematical Model of S4 202
5 Investigation of the Mathematical Model 203
6 Conclusions 205
Acknowledgments 205
References 205
Hybrid LTE-VANETs Based Optimal Radio Access Selection 207
Abstract 207
1 Introduction 208
2 Related Work 209
2.1 Infrastructure Vehicular Connectivity 209
2.2 Multi-channel Access 209
2.3 DSRC/IEEE 802.11p 210
3 Proposed Method 212
4 Performance Evaluations 214
5 Conclusion 217
Acknowledgment 217
References 217
Reliable Communication Systems 219
Optimization of B-MAC Protocol for Multi-scenario WSN by Differential Evolution Algorithm 220
Abstract 220
1 Introduction 220
2 Related Works 221
3 Differential Evolution Algorithm 222
4 Proposed Framework 223
5 Result and Discussion 225
6 Conclusion 226
References 226
Power Consumption Optimization Based on B-MAC Protocol for Multi-Scenario WSN by Taguchi Method 227
Abstract 227
1 Introduction 227
2 Related Works 228
3 Taguchi Method 229
3.1 Planning Phase 230
3.2 Experimental Phase 230
3.3 Analysis Phase 232
3.4 Validation Experiments 233
4 Conclusion 233
References 233
Modelling and Control of a Non-linear Inverted Pendulum Using an Adaptive Neuro-Fuzzy Controller 235
Abstract 235
1 Introduction 235
2 Mathematical Model 236
3 ANFIS Controller 238
4 Simulation Results 238
5 Comparison with Sugeno FIS 240
6 Conclusion 241
References 241
Adapted WLAN Fingerprint Indoor Positioning System (IPS) Based on User Orientations 243
Abstract 243
1 Introduction 243
2 Background 244
3 Related Works 246
4 Methodology 247
5 Experiments 248
6 Result and Discussion 249
7 Conclusion and Future Work 251
Acknowledgment 252
References 252
Performance Analysis of the Impact of Design Parameters to Network-on-Chip (NoC) Architecture 254
Abstract 254
1 Introduction 254
2 Related Works 255
3 Parameters Affected Network-on-Chip (NoC) Performance 256
4 Routing Algorithm 257
5 Performance Evaluation 258
6 Conclusion 262
References 262
A Comparative Review of Adaptive Routing Approach for Network-on-Chip Router Architecture 264
Abstract 264
1 Introduction 264
2 Adaptive Routers 265
2.1 DyAD 266
2.2 SPIN 268
2.3 XGFT 269
2.4 Nostrum 269
3 Conclusion 270
References 270
Intelligent Routing Algorithm Using Genetic Algorithm (IRAGA) 272
Abstract 272
1 Introduction 272
2 Genetic Algorithm 273
3 GA-Based-Routing Algorithm 273
3.1 GLBR 274
3.2 ARGAQ 274
3.3 MURUGA 275
4 Proposed Method 276
4.1 Initialization 276
4.2 Fitness Function Calculation 276
4.3 New Population Generation 276
4.4 Crossover Refining Operation 277
5 Simulation and Analysis 277
6 Conclusion 279
References 279
Double Curved Tracks Simulation of FSO Link for Ground-to-Train Communications in Tropical Weather 281
Abstract 281
1 Introduction 281
2 FSO Ground-to-Train Communication System Model 282
2.1 Geometrical Model 283
2.2 FSO Link Mathematical Model 285
3 Simulation Results and Discussion 286
3.1 Rain and Fog Attenuation 286
3.2 FSO G2T Link Simulation Results and Performance Evaluation 288
4 Conclusions 291
Acknowledgments 291
References 291
Performance Evaluation of AODV, DSDV, and DSR Routing Protocols in MANET Using NS-2 Simulator 293
Abstract 293
1 Introduction 293
2 Classification of Routing Protocols in MANET 294
3 Ad-Hoc Routing Protocols 294
3.1 Proactive Routing 295
3.2 Reactive Routing 296
4 Simulation Setup 297
5 Performance Metrics and Results 298
5.1 Throughput 298
5.2 Average End-to-End Delay 298
5.3 Packet Loss Rate 299
6 Conclusions 300
Acknowledgement 300
References 301
Planning and Optimization of LTE Radio Access Network for Urban Area at Taiz City, Yemen 302
Abstract 302
1 Introduction 302
2 Architecture of LTE Network 303
3 LTE Network Planning and Optimization 304
4 Results and Discussions 307
5 Conclusions 309
References 310
Advances on Computer Vision 311
Arabic Sign Language Recognition Using Optical Flow-Based Features and HMM 312
Abstract 312
1 Introduction 312
2 Literature Review 313
3 Proposed System 315
3.1 Video Segmentation 315
3.2 Arabic Sign Language Recognition 316
4 Experimental Work 317
5 Conclusions 319
Acknowledgments 319
References 319
On the Design of Video on Demand Server-Based Hybrid Storage System 321
Abstract 321
1 Introduction 321
2 Related Work 322
3 Hybrid Storage System 323
3.1 MMS 324
3.2 DSC Scheme 325
4 Simulation of the VOD HSS Server 326
5 Performance Evaluation 327
5.1 Comparison of VOD HSS Architecture with VOD FLARE Architecture 328
6 Conclusions 329
References 329
An Adaptive Threshold Based on Multiple Resolution Levels for Canny Edge Detection 331
Abstract 331
1 Introduction 331
2 An Adaptive Threshold Based on Multiple Resolution Levels for Canny Edge Detection 333
3 Experiment and Results 334
4 Conclusion 337
Acknowledgements 338
References 338
The Design of an Adaptive Media Playout Technique Based on Fuzzy Logic Control for Video Streaming Over IP Networks 339
Abstract 339
1 Introduction 339
2 Design of FLAMP Technique 340
2.1 Architecture of FLAMP Technique 340
2.2 FLAMP Framework 341
2.2.1 Fuzzy Sets of FLAMP Technique 341
2.2.2 The Rule Base of FLAMP Technique 342
2.2.3 Fuzzy Inference Process of FLAMP 342
3 Performance Metrics and Simulation Results 344
3.1 Performance Metrics 344
3.1.1 Buffer Underflow 344
3.1.2 Average Buffer Overflow 344
3.1.3 Variance of Distortion of Playout (VDoP) 344
3.2 Simulation Setting 344
3.3 Simulation Results 345
3.3.1 The Count of Buffer Underflow 345
3.3.2 The Probability of Buffer Overflow 346
3.3.3 The Variation of Distortion of Playout (VDoP) 346
3.3.3 The Variation of Distortion of Playout (VDoP) 346
4 Conclusion 348
References 348
A Preliminary Study on the Effect of Audio Feedback to Support Comprehension of Web Content Among Non-visual Internet Users 350
Abstract 350
1 Introduction 350
2 Literature Review 352
2.1 Assistive Technology for the Visually Impaired Computer Users 352
2.2 Role of Audio 353
2.3 Language Matters in Transferring Knowledge 353
2.4 Accessibility of the Web Content 354
3 Methodology 354
4 Results and Discussion 355
5 Conclusion 356
References 357
Recognition of Holy Quran Recitation Rules Using Phoneme Duration 358
Abstract 358
1 Introduction 358
2 Literature Review 359
2.1 Related Studies on Phoneme Duration 359
2.2 Affecting Factors on the Phoneme Duration in Quran Recitation 359
2.2.1 Levels of Recitation 359
2.2.2 Arabic Diacritics (Al-Tashkeel) 360
2.2.3 The Characteristics of the Letters 361
2.2.4 The Ranks of the Nasalization (Ghunnah) 362
2.2.5 The Medd (Lengthenings) 363
3 Methodology 363
3.1 Data Collection Phase 364
3.2 Preprocessing Phase 364
3.3 Segmentation Phase 364
3.4 Phoneme Duration Modeling 364
4 Experimental Results and Discussion 364
5 Conclusion 366
Acknowledgments 366
References 366
Realistic Rendering Colored Light Shafts Using Light Texture 368
Abstract 368
1 Introduction 368
2 Related Works 369
3 Method 370
3.1 Light Scattering Model 370
3.2 Colored Light Scattering 371
3.3 Algorithm 372
4 Results and Discussion 372
5 Conclusion and Future Work 374
Acknowledgments 374
References 375
Evaluation of Digital Image Watermarking Techniques 376
Abstract 376
1 Introduction 376
1.1 Digital Watermarking 376
2 Watermarking Classification According to Domain 377
2.1 Spatial Domain Techniques 377
2.1.1 Least Significant Bits (LSB) 377
2.1.2 SSM Modulation Based Techniques 378
2.2 Transform Domain Techniques 379
2.2.1 Discrete Fourier Transform (DFT) 379
2.2.2 Discrete Cosine Transform (DCT) 380
2.2.3 Discrete Wavelet Transform (DWT) 380
2.2.4 Singular Value Decomposition (SVD) 381
3 Conclusion and Future Work 382
References 382
An Enhanced Quadratic Angular Feature Extraction Model for Arabic Handwritten Literal Amount Recognition 384
Abstract 384
1 Introduction 384
2 Related Works 385
3 The Proposed Quadratic Angular Feature Extraction Model 386
3.1 Angular Method 387
3.2 Quadratic Angular Method 388
4 Result and Discussion 388
5 Conclusion 390
Acknowledgments 391
References 391
Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension 393
Abstract 393
1 Introduction 393
2 Related Work 394
3 Processing Method 395
3.1 A New Dimension of Multi-view Frames in Video 396
3.2 Dimension Top View of Video 397
3.3 Dimension Side View of Video 398
4 Results and Discussions 399
5 Conclusions 402
References 402
Neuronal Approach for Emotion Recognition Based on Features Motion Estimation 404
Abstract 404
1 Introduction 404
2 Related Works 405
3 Our Approach 405
3.1 Face Detection 406
3.2 Extraction of Strategic Points 407
3.3 Motion Estimation Features 408
3.4 Description of the Action Units (FACS System) 409
3.5 Classification 410
4 Test 412
4.1 Test Data 412
4.2 Results 413
5 Conclusion 413
References 413
Segmentation and Enhancement of Fingerprint Images Based on Automatic Threshold Calculations 415
Abstract 415
1 Introduction 415
2 Methodology 416
2.1 Segmentation Features 417
2.1.1 Distribution of Image Mean, Variance and Coherence 418
2.2 Foreground Extraction 420
2.3 Filling in the Gaps in a Fingerprint Image 421
3 Results and Discussion 422
4 Conclusion 425
References 425
Capturing Haptic Experience Through Users’ Visual Sketches 427
Abstract 427
1 Introduction 427
2 The Usability Studies 430
2.1 Usability Study I 430
2.2 Usability Study II 432
3 General Discussion 433
4 Conclusion 434
References 434
A Comparative Study of a New Hand Recognition Model Based on Line of Features and Other Techniques 435
Abstract 435
1 Introduction 435
2 Hand Gesture Recognition Technology 436
3 Captured Image 436
4 Segmentation Image 436
5 Feature Extractions 437
6 The Classification Process 437
7 Review of Hand Gesture Recognition 438
7.1 Likelihood Based Classification 438
7.2 Gaussian Mixture Model and Distance Metric 439
7.3 Multi Class Support Vector Machine SVM 439
7.4 Navigation of Image Browsing 440
7.5 SD and Average 440
7.6 Constrained Generative Model CGM Neural Network 441
7.7 Contour and Centroidal Profile 441
7.8 Feed Forward Artificial Neural Networks ANN 442
8 Summary of the Research 443
9 Conclusion 444
References 445
Novel FPGA Implementation of EPZS Motion Estimation in H.264 AVC 448
Abstract 448
1 Introduction 448
2 Enhanced Predictive Zonal Search Motion Estimation 450
2.1 Predictor Selection 450
2.2 Adaptive Early Termination 451
2.3 Motion Vector Refinement 452
3 Hardware Design and Implementation of EPZS 452
3.1 CF and RF Memory Modules 453
3.2 Address Control Unit 453
3.3 SAD Module 454
3.4 ME Module 454
3.5 MC Module 456
4 Simulation Results 456
5 Conclusion 459
References 459
Advances on Artificial Intelligence and Soft Computing 461
Comparison of Drought Forecasting Using ARIMA and Empirical Wavelet Transform-ARIMA 462
Abstract 462
1 Introduction 462
2 Background Information on Methods 463
2.1 Arima 463
2.2 Empirical Wavelet Transform (EWT) 464
2.3 Ewt Arima 465
2.4 Performance Measures 465
2.5 Study Area 466
3 Results and Discussions 466
3.1 Model Development Result 466
3.2 Model Evaluation 467
4 Conclusions 470
Acknowledgments 470
References 470
Real Time Electrocardiogram Identification with Multi-modal Machine Learning Algorithms 472
Abstract 472
1 Introduction 472
2 Background of the Study 474
3 Methodology 475
4 Classification and Results 476
5 Conclusion and Future Work 478
References 478
An Analysis of Rough Set-Based Application Tools in the Decision-Making Process 480
Abstract 480
1 Introduction 480
2 Related Works 481
2.1 Rough Set Theory in Brief 481
2.2 Existing Researches Related to the Rough Set Theory 482
3 Experimental Work 483
4 Discussion of Results 484
5 Conclusion 486
Acknowledgments 486
References 487
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading 488
Abstract 488
1 Introduction 488
2 Background of Study 489
2.1 Generation Rescheduling 489
3 Methodology 490
3.1 Mathematical Formulation of the DE-Based SPCS Scheme 490
3.2 Objective Function 491
3.3 Severity Index (SI) 491
4 Overview of Differential Evolution in SPCS Perspective 493
4.1 Initialization 493
4.2 Mutation 494
4.3 Crossover 494
4.4 Selection 495
5 Results and Analysis 495
5.1 System Contingency Analysis 495
5.2 The Proposed DE Based Algorithm 496
6 Conclusion 499
Acknowledgement 499
References 499
An Implementation of Metaheuristic Algorithms in Business Intelligence Focusing on Higher Education Case Study 501
Abstract 501
1 Introduction 501
2 Proposed Business Intelligence Process 502
3 Higher Education Case Study 503
4 Metaheuristic Algorithm 504
4.1 Genetic Algorithm 504
4.2 Particle Swarm Optimization (PSO) 505
4.3 Ant Colony Optimization (ACO) 505
5 Implementation of Metaheuristic Algorithms and Results 506
6 Conclusion 507
Acknowledgments 507
References 508
Design and Control of Online Battery Energy Storage System Using Programmable Logic Controller 509
Abstract 509
1 Introduction 509
2 Methodology of Controller Design 511
2.1 The Online Battery Energy Storage System Design 511
2.1.1 Determining the Battery Pack Capacity 511
2.1.2 Selection of Inverter, Rectifier and Sensors 512
2.2 PLC Programming 513
2.3 Measurement Data and Acquisition Systems 513
3 Monitoring and Simulation of the Online BESS 514
3.1 BESS Under Safe Operating Conditions 514
3.2 BESS Under Unsafe Operating Conditions 516
4 Conclusion 517
References 517
Test Cases Minimization Strategy Based on Flower Pollination Algorithm 518
Abstract 518
1 Introduction 518
2 Test Cases Generation Based on Flower Pollination Algorithm (TGFP) 519
3 Experiments and Evaluation 520
4 Conclusion 523
Acknowledgments 523
References 524
Predicting Global Solar Radiation in Nigeria Using Adaptive Neuro-Fuzzy Approach 526
Abstract 526
1 Introduction 526
2 Materials and Method 527
2.1 Study Location 527
2.2 Neuro Fuzzy Computing 528
2.2.1 Adaptive Neuro-Fuzzy Inference System (ANFIS) 528
3 Model Performance Evaluation 530
4 Results and Discussion 530
4.1 Model Analysis 530
4.2 Model Validation 532
5 Conclusion 533
Acknowledgement 533
References 533
A Novel Hybrid Bird Mating Optimizer with Differential Evolution for Engineering Design Optimization Problems 535
Abstract 535
1 Introduction 535
2 Bird Mating Optimizer BMO 536
3 Differential Evolution DE 538
4 Bird Mating Optimizer with Differential Evolution BMO-dE 540
5 Constraints Handling 540
6 Engineering Design Optimization Problems 541
6.1 Design of Pressure Vessel 541
6.2 Design of Tension/Compression Spring 542
7 Experimental Results and Discussion 543
8 Conclusions and Recommendations for Future Works 545
8.1 Conclusions 545
8.2 Recommendations for Future Works 546
References 546
Forecasting Crude Oil Prices Using Wavelet ARIMA Model Approach 548
Abstract 548
1 Introduction 548
2 Methodology 550
2.1 Crude Oil Spot Prices Dataset 550
2.2 Autoregressive Integrated Moving Average 550
2.3 Wavelet Transform 551
2.4 Wavelet ARIMA Combination Approach 552
2.5 Effectiveness Evaluation 552
3 Result and Discussion 553
3.1 ARIMA Model Construction 553
3.2 Wavelet ARIMA Combination Implementation 555
3.3 Effectiveness Evaluation Result 555
4 Conclusion 556
Acknowledgments 556
References 556
The Classification of Urban Growth Pattern Using Topological Relation Border Length Algorithm: An Experimental Study 558
Abstract 558
1 Introduction 558
2 Materials and Methods 560
2.1 Data Collection 560
2.2 Image Pre-processing 560
2.3 Urban Growth Pattern Classification Using Existing Topological Relation Border Length Algorithm 561
2.4 Urban Growth Pattern Classification Using Improved Topological Relation Border Length Algorithm 561
3 Results and Discussion 564
4 Conclusion 565
References 565
CMARPGA: Classification Based on Multiple Association Rules Using Parallel Genetic Algorithm Pruned Decision Tree 567
Abstract 567
1 Introduction 567
2 General Ideas of AC 568
3 The Proposed Technique 569
4 Experimental Setting 570
5 Experimental Results and Performance Analysis 570
6 Conclusion 572
References 573
Modified Cuckoo Search Algorithm for Solving Global Optimization Problems 574
Abstract 574
1 Introduction 574
2 Cuckoo Search Algorithm 576
2.1 The Procedure of Basic Cuckoo Search Algorithm 577
2.2 Tournament Selection Schemes 578
2.3 Modified Cuckoo Search Algorithm 579
3 Experiments 579
3.1 Benchmark Functions 579
3.2 Experimental Results and Algorithms Settings 580
4 Conclusion and Future Works 582
References 582
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution 584
Abstract 584
1 Introduction 584
2 Related Work 585
2.1 K-Means 585
2.2 ESNN 586
2.3 Differential Evolution 588
3 The Proposed Method K-DESNN 589
4 Experimental Results and Discussion 592
5 Conclusion 593
References 593
Reliable Health Informatics 597
Local Search Based Enhanced Multi-objective Genetic Algorithm of Training Backpropagation Neural Network for Breast Cancer Diagnosis 598
Abstract 598
1 Introduction 598
2 The Proposed Method 600
3 Dataset 600
4 Experimental Study 601
4.1 Experimental Settings 601
5 Results and Discussion 602
6 Conclusion 604
References 604
Optimization Health Care Resources in Sensor Network Using Fuzzy Logic Controller 606
Abstract 606
1 Introduction 606
2 Health Care System 607
3 Proposed Method 609
4 Test System 610
4.1 Network Topology 610
4.2 IEEE 802.15.6 Protocol Stack 610
5 Simulation Results 611
6 Conclusion 614
Acknowledgements 614
References 614
Towards Improving the Healthcare Services in Least Developed Countries: A Case of Health Needs Assessment for Telehealth in Yemen 616
Abstract 616
1 Introduction 616
2 Literature Review 618
3 Methodology 619
3.1 Document 619
3.2 Observation 619
4 Analysis and Findings 620
4.1 Document Analysis and Finding 621
4.2 Observation Analysis and Finding 621
5 Discussion 623
6 Conclusion 624
References 625
User Requirements for Prediabetes Self-care Application: A Healthcare Professional Perspective 627
Abstract 627
1 Introduction 627
1.1 Background 628
1.2 Research Problem Statement and Contributions 628
2 Methodology 629
3 Results 630
3.1 Lifestyle and Self-monitoring 631
3.2 Education and Awareness 631
3.3 Motivation and Commitment 632
3.4 Attitude 632
3.5 Social Support and Coaching 633
3.6 Technology 633
4 Discussion 634
5 Conclusion and Future Work 635
Acknowledgements 636
References 636
Understanding Health Professionals’ Intention to Use Telehealth in Yemen: Using the DeLone and McLean IS Success Model 638
Abstract 638
1 Introduction 638
2 Literatures Review 639
2.1 DeLone and McLean IS Success Model 640
3 The Research Model 641
3.1 The Dimensions of the Research Model and Hypotheses 641
4 Methodology 643
5 Analysis and Findings 643
5.1 Response Rate 643
5.2 Data Screening 643
5.3 Normality and Reliability 643
5.4 Descriptive Analysis for Respondents 644
5.5 Pearson Correlation Result 645
6 Discussion 646
7 Conclusion 646
References 647
Reliable Cloud Computing Environment 650
Quality of Service (QoS) Task Scheduling Algorithm with Taguchi Orthogonal Approach for Cloud Computing Environment 651
Abstract 651
1 Introduction 651
2 Related Works 652
3 Problem Formulation and QoS Scheduling Model 653
4 The Multi-objective Task Scheduling Algorithm 654
4.1 The Proposed Dynamic Multi-Objective Orthogonal Taguchi Cat Algorithm (DMOOTC) 654
5 Simulation and Results 656
6 Discussion 657
7 Conclusion 658
References 658
A Fuzzy Logic Based Risk Assessment Approach for Evaluating and Prioritizing Risks in Cloud Computing Environment 660
Abstract 660
1 Introduction 660
2 Related Work 661
3 Research Method 662
4 Assessing Risk 662
5 Fuzzy Logic 663
5.1 Constructing Membership Functions 663
5.2 Designing Inference Based on the Set of Rules 665
5.3 Fuzzy Set Operation 665
5.4 Obtaining the Final Result by Defuzzification 666
6 Result and Discussion 667
7 Conclusion 668
References 668
Resolve Resource Contention for Multi-tier Cloud Service Using Butterfly Optimization Algorithm in Cloud Environment 670
Abstract 670
1 Introduction 670
2 Problem Statement 671
3 Related Work 671
4 The Resource Optimization and Provisioning Framework 672
4.1 Overview of ROP Framework 672
4.2 Design of RO Module 673
5 Experimental Setup 674
6 Results and Discussion 675
6.1 Best Service’s Configurations 675
6.2 Convergence Rate 676
7 Conclusion 677
References 677
Digital Forensic Challenges in the Cloud Computing Environment 679
Abstract 679
1 Introduction 679
2 Cloud Computing Forensics Challenges 680
3 Conclusions 685
Acknowledgments 685
References 685
E-Learning Acceptance Models 687
Acceptance Model of Social Media for Informal Learning 688
Abstract 688
1 Introduction 688
2 Theoretical Background 689
3 Development of Theoretical Model 689
3.1 Perceived Usefulness (PU) 690
3.2 Perceived Ease of Use (PEOU) 691
3.3 Students Engagement 691
3.4 Collaborative Learning 691
3.5 Interactivity 691
3.6 Experience 692
3.7 Culture 692
3.8 Subjective Norm 692
3.9 Image 693
3.10 Self-efficacy 693
3.11 Perceived Enjoyment 693
3.12 Intention 693
4 Discussion and Conclusion 694
References 694
Critical Factors to Learning Management System Acceptance and Satisfaction in a Blended Learning Environment 697
Abstract 697
1 Introduction 697
2 Conceptual Model and Research Hypotheses Development 698
2.1 Technology Experiences 699
2.2 System Quality 699
2.3 Information Quality 700
2.4 Service Quality 700
2.5 Students’ Acceptance 700
2.6 Students’ Satisfaction 701
3 Methodology 701
4 Data Analysis and Results 701
4.1 Structural Equation Modeling (SEM) 701
4.1.1 Assessment of the Measurement Model 702
4.1.2 Assessment of the Structural Model 704
5 Discussion and Conclusion 705
References 706
End-User Perspectives on Effectiveness of Learning Performance Through Massive Open Online Course (MOOCs) 708
Abstract 708
1 Introduction 708
2 Literature Review 709
3 Research Model and Hypotheses 709
3.1 Readiness (RE) 710
3.2 Perceived Ease of Use (PEU) 710
3.3 Perceived Usefulness (PU) 710
3.4 Perceived Enjoyment (PE) 710
3.5 Attitude (AT) 710
3.6 Continuance of use of MOOCs (CI) 711
3.7 Student Satisfaction and Effectiveness 711
4 Research Method 711
4.1 Data Collection 711
4.2 Data Analysis 711
5 Measurement Model Analysis 712
6 Conclusion 715
References 715
A Reflective Practice of Using Digital Storytelling During Teaching Practicum 717
Abstract 717
1 Introduction 717
2 Literature Review 717
3 Research Question 719
4 Methodology 719
5 Research Participants 719
6 Research Procedure 719
7 Findings and Discussions 721
7.1 Enhanced Understanding of Pedagogical Content Knowledge 721
7.2 Improved Teaching Practice 722
7.3 Professional Development 723
8 Conclusion 723
References 723
Recent Trends on Knowledge Management 725
The Role of Knowledge Sharing in Business Incubators Performance 726
Abstract 726
1 Introduction 726
2 Knowledge, Start-Ups and BIs 727
2.1 Networks as Channels 728
2.2 Knowledge Sharing and Performance 728
3 Method and Data 729
3.1 Measurement Model Results 729
3.2 Structural Model Results 730
4 Discussion 731
5 Conclusion 731
References 732
Knowledge Creation Process Within Group Problem Solving Among Students in Academic Institutions 735
Abstract 735
1 Introduction 735
2 Literature Review 736
3 Methodology 737
3.1 Data Analysis 738
3.2 Research Findings 739
4 Conclusion 742
Acknowledgment 742
References 742
Security in the Cyber World 744
Blockchain Security Hole: Issues and Solutions 745
Abstract 745
1 Introduction 745
2 Current Applications 746
2.1 Digital Payments (Cryptocurrencies) 746
2.2 Smart Contracts 747
2.3 Database and Record Management 747
2.4 Content Distribution 748
3 Security Issues and Challenges 749
3.1 Security Issues 749
3.2 Other Challenges 749
4 Solutions 750
4.1 Current Solutions 750
5 Conclusions 751
Acknowledgement 751
References 752
A Robust DCT Based Technique for Image Watermarking Against Cropping Attacks 753
Abstract 753
1 Introduction 753
2 Review of DCT 754
3 Proposed Watermarking Scheme 755
3.1 Embedding Process 755
3.2 Extracting Process 759
4 Experiment Result 760
5 Performance Comparison with Other Methods 762
6 Conclusion 763
References 763
A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework 764
Abstract 764
1 Introduction 764
2 Related Work 766
3 The Methods 766
4 The Proposed Framework 767
5 Results and Discussion 768
5.1 Pre-processing Module 768
5.2 Features Engineering Module 768
5.3 Detection Module 770
6 Conclusion and Future Work 770
References 770
SBRT: API Signature Behaviour Based Representation Technique for Improving Metamorphic Malware Detection 773
Abstract 773
1 Introduction 773
2 Related Works 774
2.1 Research Techniques for a Malware Detection System 774
3 Proposed Research’s Framework and Methodology 777
3.1 General Structure of Two Phases of the Proposed Research Framework 777
3.2 Phases Representing the Flow of the Whole Process 779
4 Analyses of Experimental Results 780
5 Conclusions 781
References 781
Society and Information Technology 784
Dimensions for Productive Ageing 785
Abstract 785
1 Introduction 785
2 Methodology 786
3 Findings on Productive Ageing Dimensions 787
3.1 Activities of Dimensions for Productive Ageing 790
4 Conclusion 791
References 791
Digital Games Acceptance in Malaysia 793
Abstract 793
1 Introduction 793
2 Literature Review 794
3 Research Methodology 795
3.1 The Sample and Administering the Survey 795
3.2 Data Analysis Procedures 797
4 Results and Discussions 797
5 Conclusions 798
References 799
Rising Ageing Population: A Preliminary Study of Malaysian Older People Expectations in Information and Communication Technology 800
Abstract 800
1 Introduction 800
2 Method 801
2.1 Discussion 802
2.2 Survey 802
3 ICT Importance and Challenges to Older People 802
4 Mobile Device Usage 804
5 Conclusion 806
Acknowledgments 807
References 807
Online Shopping Inventory Issues and Its Impact on Shopping Behavior: Customer View 808
Abstract 808
1 Introduction 808
2 Methodology 810
2.1 Survey Objective 810
3 Results Analysis and Discussions 811
3.1 Correlation Analysis 812
3.2 Comments Analysis 813
4 Conclusion 813
A Appendix 814
References 815
The DeLone–McLean Information System Success Model for Electronic Records Management System Adoption in Higher Professional Education Institutions of Yemen 816
Abstract 816
1 Introduction 816
2 Previous Works on Electronic Records Management System Technical Factors 817
2.1 System Quality 818
2.2 Information Quality 818
2.3 Service Quality 819
2.4 Behavioral Intention/Intention to Adopt ERMS 819
2.5 Decision Making Process 820
3 ERMS Adoption Model for Supporting Decision Making Process 820
4 Methodology 821
5 Findings and Discussions 822
6 Conclusion and Recommendations 824
References 825
Users’ Verification of Information System Curriculum Design Model 828
Abstract 828
1 Introduction 828
1.1 Information Systems Model 829
1.2 Definition of Curriculum Design 829
2 Methodology 831
3 Results and Discussion 831
3.1 The Results 831
3.2 Discussion 834
4 Conclusions 834
References 835
Understanding NUI Among Children: A Usability Study on Touch-Form and Free-Form Gesture-Based Interaction 836
Abstract 836
1 Introduction 836
2 Related Work 837
3 User Study 838
3.1 Method and Materials 838
3.2 Tasks 839
3.3 Preliminary State and Training Session 840
3.4 Data Collection 841
4 Result 841
5 Discussion and Recommendation 843
References 844
Influence Maximization Towards Target Users on Social Networks for Information Diffusion 846
Abstract 846
1 Introduction 846
2 Related Works 847
3 Problem Formulation 848
4 Methodology 849
5 Algorithms 849
6 Experiment 850
7 Result and Discussion 851
8 Conclusion 853
References 854
Exploring Elements and Factors in Social Content Management for ICT Service Innovation 855
Abstract 855
1 Introduction 855
2 Background 856
2.1 Evolution of Social Content Management 856
2.2 Elements Affecting Social Content Management 856
3 Method 857
4 Finding and Analysis 857
4.1 Strategy 858
4.2 People 858
4.3 Content Lifecycle 858
4.4 Technology 859
4.5 Governance 859
4.6 Strategic Managerial Aspect 859
5 Conclusion 860
Acknowledgement 860
References 860
Recent Trends on Software Engineering 864
Situational Requirement Engineering in Global Software Development 865
Abstract 865
1 Introduction 865
2 Literature Review 866
2.1 Background of the Research 866
2.2 Review of Related Research 867
2.3 Review of the Methodologies 870
2.4 Review of Situational Context 871
3 Discussion 872
3.1 Research Directions 872
4 Conclusion 874
References 874
Intellectual Property Challenges in the Crowdsourced Software Engineering: An Analysis of Crowdsourcing Platforms 877
Abstract 877
1 Introduction 877
2 Related Work 878
3 Methods 879
4 Results and Discussion 880
4.1 CSE Platforms 880
4.2 Challenges of IP Ownership Rights in CSE Platforms 880
5 Conclusion and Future Work 883
References 883
A Review of Advances in Extreme Learning Machine Techniques and Its Applications 887
Abstract 887
1 Introduction 887
2 Classical Extreme Learning Machines 888
3 Research Method 889
3.1 Research Questions 889
3.2 Research Strategy 889
3.3 Search Based on Strings and Scopes 890
3.4 Analysis of Search Result 891
4 Results and Discussion 893
4.1 ELM Techniques 893
4.2 Major Applications of ELM 893
4.3 Strength and Weaknesses of ELM 894
5 Conclusion 895
Acknowledgements 895
References 895
A Review on Meta-Heuristic Search Techniques for Automated Test Data Generation: Applicability Towards Improving Automatic Programming Assessment 898
Abstract 898
1 Introduction 899
2 Methodology 900
2.1 Planning the Review 900
2.2 Conducting the Review 900
2.3 Reporting the Review 901
3 Analysis and Results 902
3.1 Analysis of Primary Study 902
3.2 Publication Year 902
4 Conclusion and Future Work 906
Acknowledgements 907
References 907
Predicting Software Reliability with a Novel Neural Network Approach 909
Abstract 909
1 Introduction 909
2 Software Reliability Concepts 911
3 ICA-MLP Software Reliability Prediction Model 912
3.1 ICA-MLP Software Reliability Prediction Model 913
3.2 ICA-MLP Experimental Results 913
3.2.1 Experimental Results of Comparison 915
4 Conclusion 917
Acknowledgments 917
References 917
Performance Analysis of OpenMP Scheduling Type on Embarrassingly Parallel Matrix Multiplication Algorithm 919
Abstract 919
1 Introduction 919
2 Related Work 920
3 Methodology 921
3.1 Parallelizing Matrix Multiplication Algorithm 922
3.2 Measuring Execution Time 922
3.3 Experimental Platform 923
3.4 Parallel Performance Metrics 923
4 Results and Discussion 924
5 Conclusions and Future Work 926
Acknowledgments 926
References 927
Author Index 928

Erscheint lt. Verlag 24.5.2017
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo XX, 930 p. 350 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Technik
Schlagworte Big data technologies • Cloud Computing Platforms • Control Systems and Communication Technology • data analytics • data communication • data engineering • Data Mining and Data Communications • data mining techniques • Intelligent Systems • machine learning algorithms • Natural Language Processing • Parallel Processing • Security, Trust and Privacy • Sensors Networks
ISBN-10 3-319-59427-3 / 3319594273
ISBN-13 978-3-319-59427-9 / 9783319594279
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Multifunktionsgurt für die Feuerwehr

von Ivo Ernst

eBook Download (2025)
Kohlhammer Verlag
CHF 10,70