Ebook: Modeling Approaches and Algorithms for Advanced Computer Applications
- Tags: Computational Intelligence, Artificial Intelligence (incl. Robotics)
- Series: Studies in Computational Intelligence 488
- Year: 2013
- Publisher: Springer International Publishing
- Edition: 1
- Language: English
- pdf
"During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration.
This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA’2013) organized into four main tracks: Track 1: Computational Intelligence, Track 2: Security & Network Technologies, Track 3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
"During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration.
This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA’2013) organized into four main tracks: Track 1: Computational Intelligence, Track 2: Security & Network Technologies, Track 3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
"During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration.
This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA’2013) organized into four main tracks: Track 1: Computational Intelligence, Track 2: Security & Network Technologies, Track 3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
Content:
Front Matter....Pages 1-13
New Challenges for Future Avionic Architectures....Pages 1-1
Checking System Substitutability: An Application to Interactive Systems....Pages 3-3
The Role of Software Tracing in Software Maintenance....Pages 5-5
Information Retrieval and Social Media....Pages 7-7
Machine Learning Tool for Automatic ASA Detection....Pages 9-16
Stator Faults Detection and Diagnosis in Reactor Coolant Pump Using Kohonen Self-organizing Map....Pages 17-26
A New Approach for the Extraction of Moving Objects....Pages 27-36
Seeking for High Level Lexical Association in Texts....Pages 37-46
Statistical and Constraint Programming Approaches for Parameter Elicitation in Lexicographic Ordering....Pages 47-56
Some Global Measures for Shape Retrieval....Pages 57-64
Clustering with Probabilistic Topic Models on Arabic Texts....Pages 65-74
Automatic Phonetization of Arabic Text....Pages 75-84
A Novel Region Growing Segmentation Algorithm for Mass Extraction in Mammograms....Pages 85-94
Coverage Enhancement in Wireless Video-Based Sensor Networks with Rotating Capabilities....Pages 95-104
Improving Wireless Sensor Networks Robustness through Multi-level Fault Tolerant Routing Protocol....Pages 105-114
A New Approach for QCL-Based Alert Correlation Process....Pages 115-124
A Pragmatic and Scalable Solution for Free Riding Problem in Peer to Peer Networks....Pages 125-134
Cooperative Strategy to Secure Mobile P2P Network....Pages 135-144
An Efficient Palmprint Identification System Using Multispectral and Hyperspectral Imaging....Pages 145-154
RDAP: Requested Data Accessibility Protocol for Vehicular Sensor Networks....Pages 155-164
Improvement of LEACH for Fault-Tolerance in Sensor Networks....Pages 165-173
Locally Distributed Handover Decision Making for Seamless Connectivity in Multihomed Moving Networks....Pages 175-183
A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks....Pages 185-194
Mapping System for Merging Ontologies....Pages 195-204
80 Gb/s WDM Communication System Based on Spectral Slicing of Continuum Generating by Chirped Pulse Propagation in Law Normal Dispersion Photonic Crystal Fiber....Pages 205-216
Fuzzy Logic Based Utility Function for Context-Aware Adaptation Planning....Pages 217-225
Social Validation of Learning Objects in Online Communities of Practice Using Semantic and Machine Learning Techniques....Pages 227-236
Modelling Mobile Object Activities Based on Trajectory Ontology Rules Considering Spatial Relationship Rules....Pages 237-247
A Model-Based on Role for Software Product-Line Evolving Variability....Pages 249-258
An Approach for the Reuse of Learning Annotations Based on Ontology Techniques....Pages 259-272
Very Large Workloads Based Approach to Efficiently Partition Data Warehouses....Pages 273-283
Evaluation of the Influence of Two-Level Clustering with BUB-Trees Indexing on the Optimization of Range Queries....Pages 285-294
Identification of Terrestrial Vegetation by MSG-SEVIRI Radiometer and Follow-Up of Its Temporal Evolution....Pages 295-304
Automatic Detection of Contours of Circular Geologic Structures on Active Remote Sensing Images Using the Gradient Vector Flow Active Contour....Pages 305-314
NALD: Nucleic Acids and Ligands Database....Pages 315-327
Maximality-Based Labeled Transition Systems Normal Form....Pages 329-336
Automatic Generation of SPL Structurally Valid Products Using Graph Transformations Approach....Pages 337-346
Modeling On-the-Spot Learning: Storage, Landmarks Weighting Heuristic and Annotation Algorithm....Pages 347-356
Towards an Integrated Specification and Analysis of Functional and Temporal Properties:....Pages 357-366
Overhead Control in DP-Fair Work Conserving Real-Time Multiprocessor Scheduling....Pages 367-377
Initializing the Tutor Model Using K-Means Algorithm....Pages 379-388
Towards a Generic Reconfigurable Framework for Self-adaptation of Distributed Component-Based Application....Pages 389-398
Dynamic Bayesian Networks in Dynamic Reliability and Proposition of a Generic Method for Dynamic Reliability Estimation....Pages 399-408
Semantic Annotations and Context Reasoning to Enhance Knowledge Reuse in e-Learning....Pages 409-418
Change Impact Study by Bayesian Networks....Pages 419-428
Back Matter....Pages 429-438
....Pages 439-440