Proceedings of the European Computing Conference (eBook)

Volume 1
eBook Download: PDF
2010 | 2009
XXIV, 809 Seiten
Springer US (Verlag)
978-0-387-84814-3 (ISBN)

Lese- und Medienproben

Proceedings of the European Computing Conference -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Engineers and Scientists working on various areas of Systems Theory, Applied Mathematics, Simulation, Numerical and Computational Methods and Parallel Computing present the latest findings, advances, and current trends on a wide range of topics. This proceedings volume will be of interest to students, researchers, and practicing engineers.


The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Engineers and Scientists working on various areas of Systems Theory, Applied Mathematics, Simulation, Numerical and Computational Methods and Parallel Computing present the latest findings, advances, and current trends on a wide range of topics. This proceedings volume will be of interest to students, researchers, and practicing engineers.

Contents 6
Contributors 14
Part 1: Neural Networks and Applications 26
Handwriting Knowledge Based on Parameterization for Writer Identification 27
1.1 Introduction 27
1.2 System Schedule 28
1.3 Database 29
1.4 Image Preprocessing and Segmentation 30
1.5 Feature Extraction 31
1.6 Classification and Results 33
1.6.1 Neural Networks 33
1.6.2 Experimental Methodology 34
1.7 Conclusions 36
References 36
Identification Surfaces Family 38
2.1 Introduction 38
2.2 The Algorithm for the Identification of a Geometric Feature Family 40
2.3 The Identification of a Geometric Feature Family Using the Genetic Algorithm 42
2.4 The Identification of a Geometric Feature Family Using the Neural Network 43
2.4.1 Database Generation 44
2.4.2 Application 45
2.5 Conclusion 47
References 47
Neuro-Fuzzy Models and Tobacco Control 48
3.1 Introduction 48
3.2 What Is Well Known 49
3.2.1 Fuzzy Control Model 50
3.2.2 Neural Networks Models 50
3.2.3 EVOlving POLicies 51
3.3 The Novelty of the Paper 52
3.4 Conclusion 53
References 53
PNN for Molecular Level Selection Detection 55
4.1 Introduction 55
4.2 Problem Formulation and Methodology 56
4.2.1 Genetic Material 56
4.2.2 PNN-Based Methodology 57
4.3 Experimental Results and Conclusions 58
References 59
Fine-Tune Artificial Neural Networks Automatically 61
5.1 Introduction 61
5.2 The Automatic Tuning of Artificial Neural Networks 62
5.3 Improving the Learning Process of Artificial Neural Networks 63
5.4 Experiments 63
5.4.1 Research Data and Experiment Design 63
5.4.2 Experimental Results 64
5.5 Conclusion 65
References 65
A Neurofuzzy Network for Supporting Detection of Diabetic Symptoms 66
6.1 Introduction 66
6.2 Neurofuzzy System 67
6.2.1 Nonlinear I/O Mapping 68
6.2.2 NN-Based Xmu Evaluation 69
6.2.3 Fuzzy Associative Memory 70
6.2.4 Neural Thresholding 70
6.2.5 NN-Based Segmentation 71
6.3 Numerical Results 71
6.4 Conclusions 73
References 73
Empirical Assessment of LR- and ANN-Based Fault Prediction Techniques 74
7.1 Introduction 74
7.2 Descriptions of Data and Metric Suite 76
7.2.1 Data Set 76
7.2.2 Metric Suite 76
7.3 Data Analysis and Research Methodology 77
7.3.1 Descriptive Statistics 77
7.3.2 Logistic Regression Model 77
7.3.3 Artificial Neural Network Model 79
7.3.4 Model Evaluation 79
7.4 Analysis Results 80
7.4.1 Descriptive Statistics 80
7.4.2 Logistic Regression Results 82
7.4.3 Artificial Neural Network Results 82
7.5 Model Evaluations 82
7.5.1 Comparison of LR and ANN Using ROC Curve 82
7.5.2 Leave-More-Out Cross Validations 83
7.6 Conclusions 83
References 84
Part 2: Advances in Image Processing 86
A New Scheme of Image Watermarking 87
8.1 Introduction 87
8.2 Our New Image Watermarking Algorithm 89
8.2.1 The Watermarking Embedding Algorithm 89
8.2.2 The Public Watermarking Detection Algorithm 91
8.2.3 Use of Multi-Resolution Field: The 5/3 Wavelet Decomposition 91
8.2.4 Presentation of the Turbo Coder 92
8.3 Perceptual Quality Metrics 93
8.4 Preliminary Results 95
8.4.1 Robustness Against Attacks 95
8.4.2 Fidelity of Watermarked Images After Attacks 95
8.4.2.1 Fidelity Against Noise Attacks 96
8.4.2.2 Fidelity Against JPEG Compression Attacks 96
8.4.2.3 Fidelity Against Filtering Attacks 97
8.5 Conclusions 98
References 99
Diffusing Vector Field of Gray-Scale Images for Image Segmentation 101
9.1 Introduction 101
9.2 Diffusing Vector Field of Gray-Scale Images 102
9.2.1 The Form of Electrostatic Field Force 102
9.2.2 The Repulsion Vector Between Image Points 103
9.2.3 The Diffusing Vector Field of Images 103
9.3 Image Segmentation by the Diffusing Vector Field 108
9.3.1 The Primitive Area in Images 108
9.3.2 The Diffusing Centers in the Primitive Area 108
9.3.3 Primitive Area Extraction by the Area-Expanding Method 110
9.3.4 Gray-Scale Image Segmentation Based on the Diffusing Vector Field 113
9.4 Conclusion 114
References 115
Image Processing via Synchronization in a Self-Organizing Oscillatory Network 116
10.1 Introduction 116
10.2 Main Characteristics of the Oscillatory Network 117
10.3 Network Segmentation Capabilities 119
10.3.1 Grey-Level Image Segmentation 119
10.3.2 Colored Image Segmentation 121
10.4 Selective Image Segmentation 121
10.5 Conclusion 122
References 123
Feature Based Color Stereo Matching Algorithm Using Restricted Search 124
11.1 Introduction 124
11.2 Linking Feature Points into Chains 125
11.3 Color Stereo Vision 125
11.4 Proposed Algorithm 126
11.4.1 Feature Extraction 126
11.4.2 Feature Matching 127
11.5 Important Notes in the New Algorithm 127
11.6 Conclusions 128
References 129
A Novel Edge-Preserving Lossy Image Coder 131
12.1 Introduction 131
12.2 Proposed Model 132
12.2.1 Image Selection and Feature of Interest Definition 132
12.2.2 Feature of Interest Map (FOIM) Extraction 132
12.2.3 Domain Transform 133
12.2.4 Pixel Mapping to Domain Transform 133
12.2.5 Image Coding with Modified SPIHT and Arithmetic Coding 133
12.2.6 Arithmetic and SPIHT Decoding 134
12.3 Results, Discussion, and Comparisons 136
12.4 Conclusions 137
References 138
Part 3: Modeling and Simulation 139
Equivalent Circuit Extraction for Passive Devices 140
13.1 Introduction 140
13.2 Formulation of the Proposed Method 141
13.3 Computational Results 143
13.4 Conclusions 147
References 147
Sleep Quality Differences According to a Statistical Continuous Sleep Model 149
14.1 Introduction 149
14.2 Database 150
14.3 Feature Extraction 150
14.4 HMM Sleep Modelling 151
14.5 Experiments and Results 153
14.6 Conclusion 156
References 157
Simulation Modeling in Support of a European Airspace Study 158
15.1 Introduction 158
15.2 Background on Airspace Study 159
15.3 CRCT 159
15.3.1 Traffic Flow and Demand Analysis 160
15.3.2 Aircraft Reroute Definition 161
15.3.3 Capture of Dynamic Data 162
15.3.4 Data Transfer from CRCT to MSim 162
15.4 MSim and the AOC Process Model 163
15.5 Conclusion 166
References 166
3D Measurement System for Car Deformation Analysis 167
16.1 Introduction 167
16.2 The Basic Concept of the Method 169
16.3 Main Processing Steps 170
16.3.1 Camera Calibration 170
16.3.2 Estimating the Plane Formed by the Laser Stripe 171
16.3.3 Determining the Position and Orientation of the Scanning Device 172
16.4 Structuring and Noise Reduction 174
16.5 Examples 175
16.6 Conclusions 177
References 177
Adaptive MV ARMA Identification Under the Presence of Noise 179
17.1 Introduction 179
17.2 Problem Reformulation 180
17.3 Examples 184
17.3.1 Example 1 184
17.3.2 Example 2 186
17.3.3 Example 3 188
17.4 Conclusions 189
References 190
Planck’s Law Simulation Using Particle Systems 192
18.1 Introduction 192
18.2 Black Body Radiation 193
18.3 Particle Systems 193
18.4 The Proposed System 194
18.5 Results 196
18.6 Conclusions 197
References 197
Simulation Results Using Shock Absorbers with Primary Intelligence-VZN 198
19.1 Introduction 199
19.2 The Matlab/Simulink Simulation 199
19.3 On Roll Theoretical Consideration 203
19.4 Conclusions 209
References 209
Pattern Generation via Computer 211
20.1 Introduction 211
20.2 Pattern Description 212
20.2.1 Pattern as Input/Output Relation 212
20.2.2 2-Commutative Linear Representation System 213
20.2.3 Realization Procedure 216
20.2.4 Partial Realization 216
20.3 Pattern Generation 218
20.4 Conclusion 222
References 222
3D Reconstruction: Estimating Depth of Hole from 2D Camera Perspectives 224
21.1 Introduction 224
21.2 Contact/Mechanical/Electromechanical Scanners 225
21.3 Non-Contact Scanners 225
21.3.1 Time of Flight Scanners 226
21.3.2 Laser Triangulation Scanners 227
21.3.3 Structured Light 228
21.3.4 Stereoscopic Scanners 228
21.3.5 Overview of Scanners 229
21.4 CAD Modeling 230
21.5 Our Approach-Perception Based Vision (PBV) 230
21.6 Future Work 232
References 232
Modeling Diversity in Recovery Computer Systems 233
22.1 Introduction 233
22.2 Problem Formulation 234
22.3 Modeling Diversity 236
22.4 A Study of the Effect of Diversity on the Identifiability of Failures in the Systems 240
22.5 Conclusion 241
References 242
Cell Automata Models for a Reaction-Diffusion System 244
23.1 Introduction 244
23.2 The Reaction-Diffusion Systems 245
23.3 Discrete and Ultra-Discrete Reaction Diffusion Systems Derived from the PPS Equation 246
23.3.1 Discretization Procedure 246
23.3.2 Ultra-Discretization Procedures 247
23.4 Numerical Simulations and Final Remarks 248
References 249
3D Reconstruction of Solid Models from 2D Camera Perspectives 250
24.1 Introduction 250
24.2 Our Approach 252
24.3 Comparison Metrics 253
24.3.1 Number of Views 253
24.3.2 Technique 254
24.3.3 Drawing 255
24.3.4 Object 255
24.3.5 Cross-Sectional Views, Hidden Lines, and Dead-End Holes 255
24.3.6 User Interaction 255
24.3.7 Vectorization 255
24.4 Comparison of Approaches 255
24.4.1 Multiview Approaches 255
24.4.1.1 Liu et al. [8] 256
24.4.1.2 Cicek and Gulesin [9] 256
24.4.1.3 Dimri and Gurumoorthy [10] 256
24.4.1.4 Lee and Han [14] 256
24.4.1.5 Gong et al. [15] 257
24.4.2 Single View Approach 257
24.4.2.1 Cooper [16] 257
24.4.2.2 Martin et al. [17] 257
24.4.2.3 Feng et al. [18] 257
24.5 Summary 258
References 258
DiProNN: VM-Based Distributed Programmable Network Node Architecture 260
25.1 Introduction 260
25.2 DiProNN: Distributed Programmable Network Node 261
25.2.1 DiProNN and Virtual Machines 263
25.2.2 DiProNN Processing Unit Architecture 263
25.2.3 DiProNN Communication Protocol 264
25.3 DiProNN Programming Model 264
25.3.1 DiProNN Program Example 266
25.3.2 DiProNN Data Flow 266
25.4 Related work 267
25.5 Conclusions and Future work 267
References 268
A Semantics of Behavioural Concepts for Open Virtual Enterprises 269
26.1 Introduction 269
26.2 Core Behaviour Concepts in the RM-ODP Foundations Part 271
26.3 Meta-Modeling Time and Behavioural Constraints 273
26.3.1 Time 273
26.3.2 Behavioural Constraints 274
26.3.2.1 Constraints of Sequentiality 274
26.3.2.2 Constraints of Concurrency 275
26.3.2.3 Constraints of Nondeterminism 275
26.4 Behavioural Policies in RM-ODP Enterprise Language 276
26.4.1 Obligation 277
26.4.2 Permission 278
26.4.3 Prohibition 278
26.5 Conclusions 278
References 279
A Semantics of Community Related Concepts in ODP Enterprise Language 281
27.1 Introduction 281
27.2 Related Works 282
27.3 The RM-ODP 283
27.3.1 The RM-ODP Foundations Part 284
27.3.2 The RM-ODP Enterprise Language 285
27.4 Syntax Domain 286
27.5 Semantics Domain 288
27.6 Meaning Function 289
27.7 Conclusion 290
References 290
Modeling of the Speech Process Including Anatomical Structure of the Vocal Tract 292
28.1 Introduction 292
28.2 Selection of Feature Vectors 293
28.3 Model of Vocal Tract 294
28.4 Conclusions 296
References 297
Carbon Nanotube FET with Asymmetrical Contacts 298
29.1 Introduction 298
29.2 Single Schottky Barrier CNTFET 299
29.3 Simulation Methodology 300
29.4 Results and Discussion 301
29.5 Conclusion 302
References 302
Optimizing Prosthesis Design by Using Virtual Environments 304
30.1 Introduction 304
30.2 The Virtual Module 306
30.3 The 3D Engine 306
30.4 Virtual Sensors 307
30.5 The Virtual Prosthesis Module 307
30.6 The Synchronization Module 308
30.7 Conclusions 309
References 309
Part 4: Multi-Agent Systems 310
A Maude-Based Tool for Simulating DIMA Model 311
31.1 Introduction 311
31.2 The DIMA Multi-Agents Model 313
31.2.1 Example: Auction Application 314
31.3 Rewriting Logic and Maude Language 314
31.4 DIMA-Maude Model 316
31.4.1 Modeling of the DIMA Model with Maude 316
31.4.2 Simulation of the Example Under Maude 320
31.5 Steps of the DIMA Model Simulator 320
31.6 Technical Aspect of the Simulator 322
31.7 Conclusion and Future Work 322
References 323
Using Two-Level Morphology to Recognize Derived Agentive Nouns 324
32.1 Introduction 324
32.1.1 Two-Level Rules 325
32.2 Two-Level Rules for Morphological Recognition of Derived Agentive Nouns 326
32.2.1 Remaining Rules 326
32.2.2 The Lexicon 330
32.2.3 Results and Examples 330
32.3 Conclusions 332
References 332
Towards an Agent Framework to Support Distributed Problem Solving 334
33.1 Introduction 334
33.2 Agent Standardization 335
33.3 Implementation Details 336
33.3.1 ACENET 336
33.3.2 Grid-Like Distributed Architecture 338
33.4 Matrix Multiplication over ACENET 338
33.5 Conclusion and Discussion 339
References 340
Building Moderately Open Multi-Agent Systems: The HABA Process 341
34.1 Introduction 341
34.2 Background 342
34.2.1 Related Work 342
34.2.2 An Application to Seismic Monitoring 342
34.3 Moderately Open Multi-Agent Systems 342
34.3.1 Multi-Agent System Architecture 343
34.3.2 The HABA Development Framework for Moderately Open Multi-Agent Systems 343
34.4 The HABA.DM Methodology for Agent-Oriented Analysis and Design 344
34.4.1 The Analysis Stage 344
34.4.2 The Design Stage 345
34.5 Programming Environment 346
34.5.1 Programming in HABA.PL 346
34.5.2 Creating and Running a MAS 347
34.5.3 The HABA.PM Project Manager 348
34.6 Conclusions 348
References 349
Part 5: Educational Software and E-Learning Systems 350
Using Mathematics for Data Traffic Modeling Within an E-Learning Platform 351
35.1 Introduction 351
35.2 Methods and Materials 352
35.3 Proposed Analysis Process 353
35.4 Results 353
35.5 Conclusions 358
References 358
Developing Statistics Learning at a Distance Using Formal Discussions 360
36.1 Introduction 360
36.2 The Hybrid Course 361
36.2.1 Course Modules 361
36.2.2 Collaborative Learning 362
36.3 Method 364
36.3.1 Sample 364
36.3.2 Student Performance and Evaluation 364
36.4 Summary and Concluding Remarks 365
References 366
Distance Teaching in the Technology Course in Senior High School 368
37.1 Introduction 368
37.2 Literature Review 369
37.2.1 Team Teaching 369
37.2.2 Distance Education 370
37.3 Research Method 371
37.3.1 Research Subjects 371
37.3.2 Method of the Study 372
37.3.3 Research Tools 372
37.3.4 Data Collection, Processing and Analysis 373
37.4 Curriculum Design 373
37.4.1 The Title of the Class 373
37.4.2 Purpose of the Curriculum 373
37.4.3 Goal of Teaching 373
37.4.4 Location and Place 373
37.4.5 The Plan of Curriculum 374
37.4.5.1 Teaching Equipment 374
Hardware 374
Software 374
37.4.5.2 Contracted Lesson Plan 374
37.5 Findings and Discussion 377
37.5.1 The Questionnaire on Learning Effectiveness 377
37.5.2 Interview with Participating Teachers 378
37.6 Conclusion and Suggestions 380
37.6.1 Conclusion 380
37.6.2 Suggestions 381
References 381
Electronic Exams for the 21st Century 383
38.1 Introduction 383
38.2 Electronic Documents 385
38.3 Need for New Types of E-Tests 386
38.4 Towards a New Generation of E-Tests 386
38.4.1 New Possibilities 387
38.4.2 Facilitating e-Assessment 388
38.5 Teaching Telematics via Telematics 389
38.6 Conclusion 389
References 389
Effects of the Orff Music Teaching Method on Creative Thinking Abilities 391
39.1 Introduction 391
39.2 Purpose of the Study 392
39.2.1 Content 392
39.2.2 Characteristics 392
39.3 Activities of the Orff Music Teaching Method 392
39.3.1 Language of Rhythm 392
39.3.2 Singing 392
39.3.3 Performing 393
39.4 Research Method 393
39.4.1 Sampling 393
39.4.2 Research Tools 393
39.5 Results Analysis 394
39.5.1 Influence of the Orff Music Teaching Method on Children’s Creative Thinking 394
39.5.2 Influence of the Orff Music Teaching Method on Children’s Fluency in Their Creative Thinking 395
39.5.3 Influence of the Orff Music Teaching Method on Children’s Flexibility in Their Creative Thinking 396
39.5.4 Influence of the Orff Music Teaching Method on Children’s Originality in Their Creative Thinking 396
39.6 Conclusion and Suggestions 397
References 398
Knowledge Application for Preparing Engineering High School Teachers 399
40.1 Introduction 399
40.2 Literature Reviews 400
40.2.1 The Applications of Knowledge 400
40.2.2 Knowledge Technologies 401
40.3 Research Methods 401
40.3.1 Modified Delphi Technique 402
40.3.2 The Development of the Questionnaire 402
40.3.3 Knowledge Application Platform 402
40.4 Results 403
40.4.1 Investigation Results Analysis for the 1st Round and the 2nd Round Using the Modified Delphi Technique 403
40.4.2 The Construction of a Knowledge Application Platform 404
40.4.3 The Results of the Questionnaire 404
40.5 Discussion 405
40.6 Conclusion 406
References 406
Collaborative Online Network and Cultural Exchange Project 408
41.1 Introduction 408
41.2 Background of the Project 409
41.2.1 Content 410
41.2.2 Characteristics 410
41.3 Discussions of Web-Enhanced Project-Based Learning 411
41.3.1 PBL 411
41.3.2 Discussing Project-Based Learning with Constructivism 411
41.3.3 Internet Courses and Problem-Based Learning 411
41.4 Contents 412
41.4.1 Members of This Project 413
41.4.2 Expected Benefits 413
41.5 Collaborative Online Network and Cultural Exchange Project-Especially Excellent Works 413
41.5.1 Project Title 413
41.5.2 School Name 413
41.5.3 Course Field: Integrative Activities 413
41.5.3.1 Attendants 413
41.5.3.2 Project Website 413
41.5.4 Summer 413
41.5.5 Curriculum and Innovative Teaching 414
41.6 Conclusion and Analysis 414
41.6.1 WHY (Why We Insist on Proceeding with Educational Communication by ICT) 417
41.6.2 What, When, Who, Where, How (What are We Doing? When We Do It? Whom Do We Do It With? Where We Do it? How We Do It?) 417
References 418
A Study of the Project on Mobile Devices in Education 419
42.1 Introduction 419
42.2 Definitions and Conditions 420
42.2.1 Content 420
42.2.2 Conditions 420
42.3 Types and Characteristics 421
42.4 PHS Applications in Education 421
42.4.1 Administrative Applications 422
42.4.2 Communication and Collaboration Applications 422
42.4.3 Teaching and Learning Applications 422
42.5 Study Method 422
42.5.1 Procedure 422
42.5.2 Subject Background 423
42.5.3 Interviewer’s Background 423
42.5.4 Interview Data 423
42.5.5 Analysis of Data 424
42.5.6 Formulas 424
42.6 Conclusion and Suggestions 427
References 428
The Solutions of Mobile Technology for Primary School 429
43.1 Introduction 429
43.2 The Meaning of Mobile Technology 430
43.2.1 The Connotations of Mobile Technology 430
43.2.2 Characteristics of Mobile Technology 431
43.3 The Connotations of Mobile Technology Integrate into the Science and Technology Curriculum for Primary School 433
43.3.1 Our Country’s Future National Elementary School Nature and Life Science and Technology Curriculum Mobile Technology Connotation 433
43.3.1.1 Content 433
43.3.1.2 Procedure 434
43.3.1.3 System Vein 434
43.3.1.4 Progress 434
43.3.1.5 Making Uniform 434
43.3.1.6 Document 434
43.3.2 The Teaching Strategies for Mobile Technology Integrate into Science and Technology Curriculum 435
43.3.2.1 Teaching of Strategy Dissemination 435
43.3.2.2 Teaching of Strategy Facilitation 435
43.3.2.3 Teaching of Strategy Inside Collaboration 435
43.3.2.4 Teaching of Strategy Outside Collaboration 435
43.3.2.5 Teaching of Strategy Apprenticeship 436
43.3.2.6 The Teaching Strategy Generative Development 436
43.4 The Solutions of Mobile Technology Integrate into Science and Technology Curriculum for Primary School 436
43.4.1 Student Stratification Plane 436
43.4.2 Teacher Stratification Plane 437
43.4.3 Administrative Stratification Plane 438
43.5 Conclusion 439
References 440
A Study of Verifying Knowledge Reuse Path Using SEM 441
44.1 Purpose 441
44.2 Literature Review 442
44.2.1 Process and Transfer 442
44.2.2 Structural Equation Modeling 443
44.3 Methodology 444
44.3.1 Theory Model 444
44.3.2 Subjects 444
44.3.3 Instrument 445
44.4 Findings 445
44.4.1 The Model-Fitting Process 446
44.5 Conclusions 449
References 449
A Web-Based System for Distance Learning of Programming 450
45.1 Introduction 450
45.2 The WAPE System 451
45.3 The CLASS Subsystem 452
45.4 The PRACTICE Subsystem 453
45.5 Knowledge Model 454
45.6 Student Model 455
45.7 Bayesian Network 456
45.8 Testing 457
45.9 Conclusion 458
References 459
New Software for the Study of the Classic Surfaces from Differential Geometry 460
46.1 Introduction 460
46.2 Computer-Based Training as a Didactic Method 461
46.3 Application Present 462
46.3.1 Theoretical Presentation of Classic Surfaces 463
46.3.2 Examples 464
46.4 Conclusion 468
References 469
Data Requirements for Detecting Student Learning Style in an AEHS 470
47.1 Introduction 470
47.2 The Unified Learning Style Model Approach 471
47.3 Data Requirements for Detecting Learning Preferences 472
47.4 Conclusions 474
References 474
Ontology-Based Feedback E-Learning System for Mobile Computing 476
48.1 Virtual Courses 476
48.2 Semantic Feedbacks 478
48.3 Ontologisms 483
48.4 Mobile Computing Prototype 484
48.5 Conclusion 485
References 485
Part 6: Information Communication Technologies 486
Potentiality of Information Technology Systems 487
49.1 Introduction 487
49.2 Cyclical Nature of Information and Communication Systems 488
49.3 Nature of Information in a Modern Organization and Its Interaction with Communication Systems 489
49.4 Range of Information System and Communication System Aspects 489
49.5 Types of Information Systems and Communication System Aspects 490
49.6 Availability Needed by the Information System and Communication System Elements 491
49.7 Sources of Information Systems and Communication Systems 491
49.8 Strategies for Management 492
49.8.1 Design and Polices 492
49.8.2 Equipment Selection and Repairing 493
49.8.3 System Monitoring and Improvement 494
49.9 Conclusions 494
References 495
A Review of Techniques to Counter Spam and Spit 496
50.1 Introduction 496
50.2 Unsolicited Messages in Electronic Mail (Spam) 497
50.2.1 Electronic Mail 497
50.2.1.1 SMTP (Simple Mail Transfer Protocol) 498
50.2.1.2 MIME (Multipurpose Internet Mail Extensions) 498
50.2.1.3 S/MIME (Secure/Multipurpose Internet Mail Extensions) 498
50.2.1.4 POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) 498
50.2.2 SPAM 498
50.3 Techniques to Counter Spam 499
50.3.1 Techniques to Prevent Spam 499
50.3.2 Techniques to Detect Spam 500
50.3.3 Techniques to React to Spam 501
50.4 Techniques to Counter Unsolicited Calls in Internet Telephony (Spit) 502
50.4.1 Spit Definition 502
50.4.2 Techniques to Counter Spit 502
50.5 Similarities and Differences Between Spam and Spit 504
50.5.1 Similarities 504
50.5.2 Differences 504
50.6 Conclusions 505
References 505
Sequential Algorithms for Max-Min Fair Bandwidth Allocation 506
51.1 Introduction 506
51.2 Cumulated Ordered Outcomes 509
51.3 Shortfalls to Ordered Targets 512
51.4 Computational Experiments 514
51.5 Conclusion 516
References 516
A Temporal Variation in Indoor Environment 518
52.1 Introduction 518
52.2 Effect of Body Shadowing 519
52.2.1 Statistical Distribution 519
52.2.2 Amplitude Correlation 520
52.2.3 Level Crossing Rate and Duration of Fading 520
52.3 Adopted Model of the Human Body 520
52.4 Simulation of Temporal Variations of Signal 521
52.4.1 Simulating Setting 521
52.4.2 Analysis of Narrow Band Channel 522
52.4.2.1 The Temporal Variation of the Signal Envelope 522
52.4.2.2 Level Crossing Rate 523
52.4.3 Analysis of Wide Band Channel 524
52.4.3.1 Impulse Response of the Channel 524
52.5 Solution to the Unavailability of the Channel 525
52.6 Conclusion 526
References 526
Workflow Management for Cross-Media Publishing 528
53.1 Introduction 528
53.2 Cross-Media Publishing 529
53.3 Paper Edition 530
53.4 Cross-Media Publishing 532
53.5 Publishing Speed and Rhythm 532
53.6 Conclusions 535
References 536
A Bayesian Approach to Improve the Performance of P2P Networks 537
54.1 Introduction 537
54.2 Related Work 538
54.3 Solution Overview 539
54.4 The Profiles 541
54.4.1 Constructing the Semantic Profile for Each Node 541
54.4.2 Constructing and Maintaining the Profiles for the Connections of the Nodes 541
54.4.3 The Reply Profile 543
54.4.4 The Query Profile 544
54.5 Protocol Extension 545
54.6 Results 545
54.7 Conclusion 547
References 547
Deploying BitTorrent in Mobile Environments 548
55.1 Introduction 548
55.2 P2P File-Sharing Over Mobile Networks 549
55.2.1 Gnutella 550
55.2.2 BitTorrent 550
55.3 The Proposed Architecture 551
55.3.1 The Mobile Peer-to-Peer Node 553
55.3.2 The Multi-Tracker Extension 553
55.3.3 Proxy 554
55.4 BitTorrent for Symbian-Based Smartphones: A Case Study 557
55.5 Results and Conclusions 557
References 558
Numerical Simulation for the Hopf Bifurcation in TCP Systems 559
56.1 Introduction 559
56.2 Local Stability and Existence of Hopf Bifurcation 561
56.3 Direction and Stability of Bifurcating Periodic Solutions 562
56.4 A Numerical Example Illustrated by Computer Simulations 563
56.5 Conclusion 566
References 566
Communications by Vector Manifolds 567
57.1 Introduction 567
57.2 Topological Description of the Electromagnetic Field 568
57.3 Signaling by Vector Manifolds 570
57.3.1 Quasi-TEM Modal Signaling 571
57.3.2 Signaling by Nonseparable Field Impulses 572
57.4 Hardware: Theory and Circuitry 572
57.5 Conclusions 572
References 573
A Computation Study in Mesh Networks by Scheduling Problems 574
58.1 Introduction 574
58.2 Problem Formulation 575
58.3 Problem Solution 576
58.4 Experimental Analysis 579
58.4.1 A Typical Example 579
58.5 Conclusions 580
References 580
Serially Concatenated RS Codes with ST Turbo Codes Over Ring 581
59.1 Introduction 581
59.2 System Description 582
59.3 Simulation Model 585
59.4 Results 586
59.5 Conclusions 589
References 589
Network Performance Monitoring and Utilization Measurement 590
60.1 Introduction 590
60.2 Network Performance Evaluation 591
60.3 Testing Platform 591
60.4 Experimental Results and Analysis 592
60.4.1 Experimental Setup 592
60.4.2 Experimental Results 592
60.5 Conclusion 595
References 595
Blind Adaptive Multiuser Detection Based on Affine Projection Algorithm 596
61.1 Introduction 596
61.2 Proposed Blind Adaptive Multiuser Detector Using Single Antenna 597
61.3 Proposed Blind Adaptive Multiuser Detector Using Antenna Array 599
61.4 Simulation Results 600
61.4.1 Case 1 601
61.4.2 Case 2 601
61.4.3 Case 3 601
61.4.4 Case 4 603
61.5 Conclusions 605
References 605
Multiple Base Station Positioning for Sensor Applications 607
62.1 Introduction 607
62.2 Base Station Placement Approaches 608
62.2.1 Placement of N-Base Stations 609
62.3 System Model 609
62.3.1 Deployment of the Sensor Nodes 610
62.3.2 Finding the Location Information 610
62.3.3 Collecting Location Information 610
62.3.4 Determination of the Best Locations for K Base Stations 611
62.3.5 Routing 611
62.3.6 Sensor Node Energy Model 612
62.3.7 Lifetime Estimation 612
62.4 K-Means Local+ 613
62.4.1 K-Means Clustering 613
62.4.2 Establishment of the Routing 614
62.4.3 Positioning of the Base Station 614
62.5 Computational Results 614
62.6 Conclusion 616
References 616
Considerations for the Design of a General Purpose Wireless Sensor Node 618
63.1 Introduction 618
63.2 Previous Work 619
63.3 System Design Constraints 619
63.3.1 Processor Module 620
63.3.1.1 Power Saving 620
63.3.1.2 Clock Scaling 620
63.3.1.3 Instruction Set 621
63.3.1.4 I/O Ports/Operation 621
63.3.2 RF Transceiver Module 622
63.3.2.1 Power Consumption 622
63.3.2.2 Ease of Use 622
63.3.3 Memory Module 623
63.3.4 Sensor Board Module 623
63.3.5 Power Management Module 623
63.4 Our Design 624
63.4.1 Processor Module 624
63.4.1.1 Power Saving 624
63.4.1.2 Clock Scaling 625
63.4.1.3 Instruction Set 625
63.4.1.4 I/O Ports/Operation 626
63.4.2 RF Transceiver Module 626
63.4.3 Memory Module 627
63.4.4 Sensor Board Module 627
63.4.5 Power Management Module 628
63.5 Conclusion 628
References 629
Performance Comparison and Improvement of Wireless Network Protocols 630
64.1 Introduction 630
64.2 Description of Protocols 631
64.3 The Simulation Network Model 633
64.4 Performance Results 633
64.5 Conclusion 635
References 637
Modeling the Erroneous Behaviour of a Sequential Memory Component with Streams 638
65.1 Introduction 638
65.2 Regular Behaviour 639
65.2.1 Interface 640
65.2.2 Service Domain 640
65.2.3 Regular Behaviour 640
65.2.4 Implementation 641
65.3 Irregular Behaviour 642
65.3.1 Erroneous Input Histories 642
65.3.2 Classification 642
65.4 Fault Sensitive Memory Component 643
65.4.1 Input/Output Behaviour 643
65.4.2 Implementation 643
65.5 Fault Tolerant Memory Component 644
65.5.1 Input/Output Behaviour 644
65.5.1.1 Implementation 644
65.6 Robust Memory Component 645
65.6.1 Input/Output Behaviour 645
65.6.2 Implementation 645
65.7 Fault Correcting Memory Component 646
65.7.1 Input/Output Behaviour 646
65.7.2 Implementation 646
65.8 Conclusion 647
References 648
FPGA Implementation of PPM I-UWB Baseband Transceiver 649
66.1 Introduction 649
66.2 Ultra-Wideband Versus Narrowband 650
66.3 Pulse Position Modem Architecture 652
66.3.1 PPM Signal Structure 652
66.3.2 PPM Modulator 653
66.3.3 PPM Demodulator 654
66.4 PPM I-UWB Software and Hardware Simulation 654
66.4.1 Matlab Algorithm and Simulation Results 654
66.4.2 VHDL Algorithm and Simulation Results 655
66.5 PPM I-UWB Hardware Synthesis and Verification 657
66.5.1 VHDL Synthesis Results 657
66.5.2 Xilinx ChipScope Verification Results 658
66.5.3 LCD Verification Results 659
66.6 Conclusions 659
References 659
WSN-Based Audio Surveillance Systems 661
67.1 Introduction 661
67.2 System Architecture 662
67.3 Design Issues: Audio Source Coding Algorithms 664
67.4 Implementation Issues: RFD, FFD, and GW Software 664
67.5 Validation 665
67.6 Conclusion and Future Work 666
References 666
Smart Antenna Design Using Multi-Objective Genetic Algorithms 668
68.1 Introduction 668
68.2 Formulation of the Antenna Array Pattern 669
68.3 Numerical Results 671
68.4 Conclusions 672
References 673
Part 7: Computer Applications in Modern Medicine 674
Intention to Adopt the E-Health Services System in a Bureau of Health 675
69.1 Introduction 675
69.2 Literature Review 676
69.2.1 E-Health System in Taiwan 676
69.2.2 Theory of Reasoned Action 677
69.2.3 Theory of Planned Behavior 677
69.3 Methods 678
69.4 Results 680
69.4.1 Determinants 680
69.4.2 Relative Importance of Determinants 681
69.5 Discussion and Conclusion 682
69.5.1 Multiple Factors of Using Behavior 682
69.5.2 Volition of Participants 682
69.5.3 The Implication for Strategic Planning 683
References 683
Visualization and Clustering of DNA Sequences 685
70.1 Visualization of DNA Sequences 685
70.2 A Visualization Algorithm 688
70.2.1 1D Graphical Representation of DNA Sequences 688
70.2.2 2D Representation of Encoded DNA Sequences by Base-Curves 689
70.3 Examination of Similarities Among Encoded DNA Sequences 691
70.4 Conclusion 694
References 694
E-Health Service in Taiwan-The Role of Organizational Innovativeness 695
71.1 Introduction 695
71.2 Literature Review 696
71.2.1 Compatibility 696
71.2.2 Personal Innovativeness 696
71.2.3 Organizational Innovativeness 697
71.3 Method 698
71.4 Results 699
71.5 Discussion and Conclusion 703
References 703
Analysis of Heart Sounds with Wavelet Entropy 705
72.1 Introduction 705
72.2 Materials and Methods 706
72.2.1 Data Acquisition 707
72.2.2 Data Analysis 707
72.2.3 Wavelet Entropy 707
72.3 Results 708
72.4 Discussion and Conclusion 710
References 711
Detection of Mitral Regurgitation and Normal Heart Sounds 713
73.1 Introduction 713
73.2 Materials and Method 714
73.2.1 Data Acquisition 715
73.2.2 Data Analysis 715
73.3 Results 716
73.4 Discussion and Conclusion 717
References 719
Wavelet Entropy Detection of Heart Sounds 721
74.1 Introduction 721
74.2 Materials and Methods 722
74.2.1 Data Acquisition 723
74.2.2 Data Analysis 723
74.2.3 Wavelet Entropy 723
74.3 Results 724
74.4 Discussion and Conclusion 725
References 727
Continuous Wavelet Transform Analysis of Heart Sounds 729
75.1 Introduction 729
75.2 Materials and Method 730
75.2.1 Data Acquisition 731
75.2.2 Data Analysis 731
75.3 Results 732
75.4 Conclusion 733
References 735
Limitations of Lung Segmentation Techniques 737
76.1 Introduction 737
76.1.1 Lung Cancer 738
76.1.2 Medical Image Segmentation 739
76.1.3 Segmentation Techniques 739
76.1.3.1 Threshold Techniques 740
76.1.3.2 Edge-Based Methods 740
76.1.3.3 Region-Based Methods 740
76.1.3.4 Connectivity-Preserving Relaxation Methods 740
76.2 Literature Survey 740
76.3 Implementation 742
76.3.1 Scheme-I (Thresholding + Morphology) 742
76.3.2 Scheme-II (Thresholding + Ball Algorithm) 743
76.4 Results 746
76.4.1 Limitations of Scheme-I 746
76.4.2 Limitations of Scheme-II 748
76.5 Discussion 749
References 749
Segmentation of Anatomical Structures Using Volume Definition Tools 751
77.1 Introduction 752
77.2 Manual Volume Definition 752
77.2.1 Linear Interpolation 753
77.2.2 Orthogonal Contour Interpolation 754
77.3 Volume Interpolation From Non-Parallel Contours 756
77.4 Conclusions 760
References 761
Shape Analysis of Heart Rate Lorenz Plots 762
78.1 Introduction 762
78.2 Methods 763
78.3 Image Processing 763
78.4 Results 766
78.5 Discussion 767
References 767
Human Readable Rule Induction in Medical Data Mining 769
79.1 Introduction 769
79.2 The Medical Data Sets 770
79.3 Rule Induction Algorithms 771
79.3.1 WEKA Classifier Algorithms 771
79.3.2 Rule and Decision Tree Induction Algorithms Summary 772
79.4 Experimental Setup 773
79.4.1 Summary of Experimental Results 773
79.4.2 The Tradeoffs Between Readability and Accuracy 777
79.5 Discussion 778
79.6 Conclusions 779
References 779
Author Index 781
Subject Index 784

Erscheint lt. Verlag 16.3.2010
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXIV, 816 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte algorithms • Communication • Computer Applications in Modern Medicine • e-Learning Systems • field programmable gate array • FPGA • Image Processing • Information • information communication • knowledge base • Knowledge Engineering • Modelling and Simulation • Monitor • multi-agent system • Multi-agent Systems • Neural networks • Ontology • Power Systems • programming • Semantics • Systems Theory • Transceiver • Visualization • Web-based Applications
ISBN-10 0-387-84814-2 / 0387848142
ISBN-13 978-0-387-84814-3 / 9780387848143
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 20,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99