Proceedings of the European Computing Conference (eBook)

Volume 2
eBook Download: PDF
2010 | 2009
XXIII, 729 Seiten
Springer US (Verlag)
978-0-387-85437-3 (ISBN)

Lese- und Medienproben

Proceedings of the European Computing Conference -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Engineers and Scientists working on various areas of Systems Theory, Applied Mathematics, Simulation, Numerical and Computational Methods and Parallel Computing present the latest findings, advances, and current trends on a wide range of topics. This proceedings volume will be of interest to students, researchers, and practicing engineers.


Software testing has been considered so important that organizations can assign teams only for testing activities. Testing is an important activity to ensure software quality. Tests are usually run several times to certify that code ma- tenance did not accidentally insert defects into working parts of the software. In such situations, test teams shall be able to estimate the required effort to execute test cases in its schedules and to request more resources or negotiate deadlines when necessary. When regarding model-based testing approaches that we use in our documented Integrated and Optimized Software Testing methodology (IOSTP) [1-4], a high number of test cases can be automatically generated. As team resources are limited, it may be not practical to execute all generated test cases. Their complexity usually determines the effort required to execute them and it can be used for planning test resources and test suites. Several software development estimation models have been proposed over the years. However, these models do not estimate the effort for executing a given test suite, since their estimations are based on software development complexity instead of its test planning, test case design and test execution complexity. According to our reading of the literature (e. g. [5-14]), ''best practices'' in model-based effort estimation include: Local calibration (or LC); i. e. using local data to set two special tuning parameters; Stratification; i. e. given a database of past projects, and a current project to be estimated, restrict local calibration to just those records from similar projects.

Contents 6
Contributors 13
Part 1: Computer Applications in Power Systems 24
Wind Energy Production Forecasting 25
1.1 Introduction 25
1.2 Related Work 26
1.3 Theoretical Approach 26
1.3.1 Neural Networks 26
1.3.2 Quasi-Newton Method for Training the Neural Network 27
1.3.3 Genetic Algorithm for Training the Neural Network 28
1.4 Computational Results 29
1.4.1 Parameter Selection 29
1.4.2 Network Parameter Issues 29
1.4.3 Data Series Partitioning 30
1.4.4 Learning and Training 31
1.4.5 Out of Sample Evaluation 31
1.5 Conclusion and Further Research 33
References 34
Operation Management on Autonomous Power System 36
2.1 Introduction 36
2.2 Algorithm Implementation 37
2.2.1 Load and wind power forecasting 37
2.2.2 Unit Commitment 38
2.2.3 Economic Dispatch 39
2.2.4 Dynamic Security Assessment 40
2.3 Operation Management 41
2.3.1 Data Entry 41
2.3.2 Unit Commitment 41
2.3.3 Dynamic Security Assessment 43
2.3.4 Preventive Security Assessment 43
2.4 Conclusion 44
References 45
A Low-Power Portable H.264/AVC Decoder Using Elastic Pipeline 46
3.1 Introduction 46
3.2 Conventional Pipeline Architecture 47
3.3 Elastic Pipeline Architecture 48
3.3.1 Concept 48
3.3.2 Feedback-Type Voltage/Frequency Control Algorithm 48
3.3.3 Architecture 50
3.4 Experimental Results 51
3.4.1 Test Sequence 51
3.4.2 The Optimum Number of Slots Per Frame 51
3.4.3 Power Saving 52
3.5 Summary 53
References 53
Part 2: Computational Techniques and Algorithms 54
Computational Methods for Detecting Types of Nonlinear Dynamics 55
4.1 Introduction 55
4.2 Mathematical Framework Presentation 56
4.2.1 Model Presentation 56
4.2.2 The Householder QR Factorization for a Matrix $/textbf{/textit{A}} /in R^2 xR^2$ 57
4.3 Implementation Methods for Numerical Simulations 59
4.3.1 Implementation Method Used to Detect the Behavior Type of System (4.1) 59
4.3.2 Implementation Method Used to Calculate the Lyapunov Exponents, Using Householder QR Factorization 63
4.4 Numerical Simulations 65
4.5 Conclusion 67
References 67
The Worm Cutter Tool Profiling Based on Discreet Surfaces Representation 69
5.1 Introduction 69
5.2 The Rack-Gear Tool Profiling 70
5.3 Reference Systems and Generation Movements 71
5.4 The Primary Peripheral Surface of the Worm Cutter 73
5.4.1 The Intermediary Surface Family in the Reference System of the Worm Cutter Primary Peripheral Surface 73
5.4.2 The Enwrapping Condition 74
5.4.3 The Characteristic Curve of the Conjugated Surfaces 74
5.4.4 Primary Peripheral Surface of the Worm Cutter 75
5.5 The Software for the Rolling Generating Tool Profiling (RGTP) 75
5.6 Applications 80
5.7 Conclusions 81
References 82
Suggesting Correct Words Algorithms Developing in FarsiTeX 83
6.1 Introduction 83
6.2 Algorithms of Suggesting Correct Words 85
6.2.1 On an Incorrect Word 85
6.3 Increasing Speed 86
6.4 Memory Usage Problems 86
6.4.1 Using Static Functions 86
6.4.2 Using Multi Files 87
6.4.3 The Roots of the Farsi Words Instead of the Whole Words 87
6.5 Implementation Results 88
6.6 Other Techniques and Conclusion 88
6.7 Appendix 89
References 90
On the Analytical and Numerical Computation in Mechanical Modeling 92
7.1 Introduction About Coding 92
7.2 Notions on the Set of Polynomials 93
7.3 A Theorem of Division 93
7.4 A New Definition of Euclidean Ring 94
7.5 The Model of Thin Plates and Coding 94
7.6 Conclusion 96
References 96
Real Genetic Algorithm for Traveling Salesman Problem Optimization 98
8.1 Introduction 98
8.2 Encoding Schemes of GA 99
8.3 Example: A Real Problem of Solid Waste Routing 100
8.4 GA Optimization 102
8.4.1 Coding 102
8.4.2 Fitness 102
8.4.3 Selection, Crossover and Mutation 103
8.5 Results 104
8.6 Conclusion 106
References 107
The COTECOMO: COnstractive Test Effort COst MOdel 108
9.1 Introduction 109
9.2 Attributes Affecting Software/System Test Effort 111
9.2.1 Conventional Approach to Test Effort Estimation 111
9.2.2 The Selection of the Sizing and Estimation Methodologies 112
9.2.2.1 Sizing and Estimation Methodologies 113
9.2.2.2 Characteristics of the Cost Estimation 114
9.2.2.3 General Advantages of Estimation Methodologies: 114
9.2.3 The Software Test Effort Models - Critical Review 115
9.2.3.1 Industry Case Studies 116
9.2.4 Adaptive Cyclic Pairwise Rejection Rules of Estimation Model Candidates Using performance measures (ACPREPM) 117
9.2.4.1 Adaptive Cyclic Pairwise Rejection of Estimation Model 119
9.3 COTECOMO Methodology 120
9.3.1 Test Effort Estimation Using System Test Points: A New Metric for Practitioners 121
9.3.2 Software/System Test Point (STP) Evaluation 124
9.4 COTECOMO Effort Estimation Procedure and Case Study Results 125
9.5 Conclusion and Future Work 128
References 128
A Semantics of Core Computational Model for ODP Specifications 130
10.1 Introduction 130
10.2 Related Work 131
10.3 The RM-ODP 132
10.3.1 The RM-ODP Foundations Part 132
10.3.2 The RM-ODP Computational Language 133
10.4 The Syntax Domain 134
10.5 Semantics Domain 136
10.6 Meaning Function 136
10.7 Conclusion 138
References 139
Computer Simulation Via Direct Modeling 141
11.1 Introduction 141
11.2 Background 142
11.2.1 The DiCOMO General Scheme as Applied to Continuous Media 142
11.2.2 IC Simulation Algorithms 144
11.2.3 The Molecular Binding Simulation 148
11.2.4 DiCOMO Approach Compatibility with the Sun’s Fortress Object-Oriented Language for Parallelization 149
11.3 Conclusions 149
References 150
Image Segmentation with Improved Artificial Fish Swarm Algorithm 151
12.1 Introduction 151
12.2 The Artificial Fish Swarm Algorithm 152
12.2.1 The Artificial Fish 152
12.2.2 Five Basic Behaviors of AF 152
12.2.3 The Improved Adaptive Step Length in AFSA 153
12.3 Image Segmentation by Improved AFSA 154
12.3.1 The Multi-Threshold Image Segmentation 154
12.3.2 The Parameter Selection and Results 154
12.4 Discussion and Conclusion 155
12.4.1 Discussion 155
12.4.2 Conclusion 155
References 156
Propagation of Elastic-Plastic Waves in Bars 157
13.1 Introduction 157
13.2 Problem Formulation 157
13.3 Approximation Study 161
13.4 Numerical Example 164
13.5 Conclusions 167
References 167
Shahyat Algorithm as a Clustering Method 169
14.1 Introduction 169
14.2 Description of Shahyat Algorithm 170
14.2.1 Finding the Candidate Centers Without Differentiating from Heat Function 171
14.2.2 Selecting C Main Centers from T+1 Candidate Centers 172
14.3 Solving a Clustering Problem by Shahyat Algorithm 172
14.4 Specifications of Shahyat Algorithm 175
14.5 Iris Data 176
14.6 Conclusion 178
References 178
A Modified Electromagnetism-Like Algorithm Based on a Pattern Search Method 179
15.1 Introduction 179
15.2 Electromagnetism-Like Algorithm 180
15.3 Hooke and Jeeves Pattern Search Method 182
15.4 Numerical Results 182
15.5 Conclusions 185
References 185
Latency Hiding and Adaptability for Parallel Iterative Algorithms 186
16.1 Introduction 186
16.2 Parallel Iterative Reconstruction Methods 187
16.3 Adaptability 188
16.4 Results 189
16.5 Discussion and Conclusions 191
References 192
Clustering the Linearly Inseparable Clusters 193
17.1 Introduction 193
17.2 Description of the Algorithm 194
17.3 Iris Data 196
17.4 Conclusion 198
References 199
A Top-Down Minimization Algorithm for Non-Deterministic Systems 200
18.1 Introduction 200
18.2 Method Presentation 201
18.3 Conclusions 204
References 205
Part 3: Natural Phenomena and Computer Models 206
Multi-Layer Finite Volume Solution of Wind Induced Basin Flow 207
19.1 Introduction 207
19.2 Governing Equations 208
19.3 Numerical Formulation 210
19.4 Artificial Viscosity 211
19.5 Boundary Condition 212
19.6 Verification Test 212
19.7 Conclusions 214
References 214
NASIR Heat Generation and Transfer Solver for RCC Dams 216
20.1 Introduction 216
20.2 Governing Equations 217
20.3 Numerical Solutions 220
20.4 Domain Discretization 221
20.5 Verification of Solution 222
20.6 Applications to a Typical Case 224
20.7 Conclusions 224
References 226
Water Hammer Modeling Using 2nd Order Godunov Finite Volume Method 227
21.1 Introduction 227
21.2 Governing Equations 228
21.3 Formulation of Finite Volume Schemes for Water Hammer 229
21.4 Boundary Conditions 231
21.4.1 Upstream Head-Constant Reservoir 232
21.4.2 Fully Closed Downstream Valve 232
21.5 Time Integration 233
21.6 Numerical Results and Discussion 233
21.7 Conclusions 234
References 235
Simulation of Wind Pressure on Two Tandem Tanks 236
22.1 Introduction 236
22.2 Governing Equations 237
22.3 Numerical Method 238
22.4 Application of the Model 240
22.5 Discussion 244
References 244
Tropical Cyclone Forecaster Integrated with Case-Based Reasoning 246
23.1 Introduction 246
23.2 Problem Formulation 247
23.3 Development of CBR Intensity Prediction Model 250
23.3.1 Case Representation 250
23.3.2 Building a Case Store 250
23.3.3 Case Retrieval 250
23.4 Results and Discussion 251
23.5 Conclusion and Future Work 252
References 252
Part 4: Knowledge Engineering, Decision Rules and Data Bases 253
Toward an Understanding of Knowledge Reuse in an On-Line Environment 254
24.1 Introduction 254
24.1.1 Statement of Research Problem 255
24.1.2 Purposes of the Study 255
24.2 Literature Review 255
24.2.1 Knowledge Reuse as a Process 255
24.2.2 Meta-Cognitive Knowledge 256
24.2.3 Meta-Cognitive Regulation 256
24.2.4 Meta-Cognitive Strategies 257
24.3 Theory Frame 259
24.3.1 Intention of Knowledge Reuse 259
24.3.2 Meta-Cognitive Intention of Knowledge Reuse 262
24.3.3 Behavior of Knowledge Reuse 263
24.4 Research Method 263
24.4.1 Data Collection 263
24.4.2 Measurement of Constructs 263
24.4.3 Scale Validation Method 263
24.5 Data Analysis and Results 264
24.5.1 Samples 264
24.5.2 Measurement Equations 265
24.5.3 Structural Equations 267
24.5.4 Conclusion 268
References 268
Handling Contradictions in Knowledge Discovery Applications 269
25.1 What’s Wrong with Contradictions? 269
25.2 Correcting Classical Logic’s Mistake? 270
25.3 A Different Approach - Knowledge Bases and Presence Values 271
25.4 Conclusion 275
Appendix: Indicative Results for LM4 276
References 282
A Cooperative Distributed Query-Processing Approach 283
26.1 Introduction 283
26.1.1 Transparency Types 284
26.2 Traditional DDBMS 285
26.3 Co-operative and Dynamic DDBMS 285
26.3.1 Architecture 285
26.3.1.1 Client 286
26.3.1.2 Distributed Query Service Provider 286
26.3.1.3 Data Dictionary Service Provider 286
26.3.1.4 Local Query Service Provider (LQSP) 286
26.3.2 Distributed Execution Plan Strategy 287
26.3.3 Communication Overview 287
26.3.3.1 DQSP Process 288
26.3.3.2 DDSP Process 289
26.3.3.3 LQSP Process 289
26.3.4 Query Processing Example 289
26.4 Conclusion 292
References 293
Estimating Join and Projection Selectivity Factors 294
27.1 Introduction 294
27.2 Related Work 295
27.3 Data Distribution Approximation by Orthogonal Series 297
27.4 Join Selectivity Estimation 297
27.5 Projection Selectivity Estimation 301
27.6 Conclusions 303
References 303
Decision Rules: A Metamodel to Organize Information 305
28.1 Introduction 305
28.2 Problem Formulation 306
28.2.1 The Output for a Decision-Model 306
28.2.2 The Ideology of Knowledge Representation 307
28.3 Problem Solution 309
28.3.1 An Example to Justify the Solution 311
28.4 Conclusions 313
References 313
A Computerized Solution for the Financial Diagnose of the SMEs 315
29.1 Introduction 315
29.2 Problem Formulation 317
29.2.1 Testing the Enterprise Liquidity Ratio 317
29.2.2 Testing the Enterprise’s Profitableness 317
29.2.3 Inferring the Recommendations 319
29.3 Problem Solution 320
29.3.1 The System’s Variables 320
29.3.2 Logic Blocks 321
29.3.3 Command Blocks 322
29.3.4 Testing the Computerized Solution and Displaying the Results 323
29.4 Conclusion 324
References 324
DELP System: Tracking Deadlocks and Phantoms in Databaseas 325
30.1 Introduction 325
30.2 Related Work 326
30.3 System Description 326
30.4 Experiments and Results 327
30.4.1 Deadlock Occurrences 328
30.4.2 Phantom Occurrences 328
30.5 Conclusions 329
References 330
Concurrency Control for Multilevel Secure Distributed Real-Time Databases 331
31.1 Introduction 331
31.2 Review of Literature 332
31.3 Computing Complexity 334
31.3.1 Secure Concurrency Control Protocol 335
31.3.2 Concurrency Control Algorithm 338
31.4 Simulation Results 340
31.5 Conclusion 342
References 343
A New Framework for Nondeterministic Multi-valued System Minimization 344
32.1 Introduction 344
32.2 Minimization Tools 345
32.3 The Proposed Principles of Minimization 346
32.4 Network Minimization of Nondeterministic Tables with Correlated Outputs 347
32.5 Conclusions 348
References 349
Part 5: Web-Based Applications 350
Thread Pool-Based Improvement of the Mean-Value Analysis Algorithm 351
33.1 Introduction 351
33.2 Backgrounds and Related Work 353
33.3 Improving MVA Based on Thread Pool Investigation 354
33.4 Applying Improved MVA Algorithm in Different ASP.NET Environments 356
33.4.1 Experimental Configurations 356
33.4.2 Performance Prediction with the Improved MVA Algorithm 357
33.4.3 Experimental Validation 358
33.5 Conclusions and Future Work 362
References 362
Security Enhancements for Web-Based Applications 364
34.1 Introduction 364
34.1.1 Hidden Fields 365
34.1.2 Cookies 366
34.2 Building Blocks 367
34.2.1 Digest Algorithms 367
34.2.2 Digests and HTML Forms 367
34.2.3 The HMAC Standard 367
34.3 Proposed Approach 369
34.4 Implementation 370
34.5 Conclusions 376
References 376
Description and Discovery of Web Applications in Grid 377
35.1 Introduction 377
35.2 The Project Scenario and Resource’s Provider Challenges 378
35.2.1 Grid Services, Grid Resources and Web Services-Based Application 379
35.2.2 Solution Proposed for Application Description and Discovery: Mapping of WSDL Artifacts and UDDI Data Model 380
35.3 A Semantic Description for Resources 381
35.3.1 Web Application Description Enrichment with OWL-S Language and its Application to Discovery Task 382
35.4 Conclusions 384
References 384
An Approach to Treat the User’s Preferences About Personal Data 385
36.1 Introduction 385
36.2 Current Web Privacy Treatment 386
36.3 Web Privacy Controlled by User 387
36.4 Case Study 388
36.5 Conclusions 390
References 390
Ssort: Peak Analysis for Efficient String Sorting 391
37.1 Introduction 391
37.2 Algorithm Description 392
37.3 Algorithm 393
37.4 Result Analysis 398
37.5 Further Work 399
37.6 Conclusion 400
References 400
Parametric Studies for the AEC Domain Using InteliGrid Platform 401
38.1 Introduction 401
38.2 InteliGrid Architecture Components 402
38.3 Use Case: Parametric Studies in Civil Engineering 404
38.4 Conclusion 406
References 406
An Auction-Based Resource Allocation Strategy with a Proportional Share Model for Economic-Based Grid Systems 408
39.1 Introduction 408
39.2 Related Works 409
39.3 Proposed Algorithm 410
39.4 Experimental Results 411
39.5 Concluding Remarks 412
References 412
Part 6: Advances in Computer Science and Applications 414
Propagation in Cylindrical Inset Dielectric Guide Structures 415
40.1 Introduction 415
40.2 Formulation 416
40.3 Numerical Results 418
40.4 Conclusions 419
References 419
On the Damage in Nonlinear Mesoscopic Materials 421
41.1 Introduction 421
41.2 Basic Micropolar Equations 422
41.3 Proposed Model for the Interface 422
41.4 Degradation and Failure of the Interface 424
41.5 Conclusions 424
References 425
Diagnosis of Robotized Assembling Systems 427
42.1 Introduction 427
42.2 Modelling the Robot Assembled Process: Assembly Supervisor Petri Nets 429
42.3 SE - Functions for Basic Configurations of ASPN 431
42.4 Design and Implementation Method 433
42.5 Conclusion 434
References 435
Open Architecture Systems for MERO Walking Robots Control 437
43.1 Introduction 437
43.2 Robot Position Control 439
43.3 Conclusions and Results 441
References 443
Mass Transfer Analysis in the Case of the EFG Method 444
44.1 Introduction 444
44.2 Problem Formulation 445
44.3 Numerical Results 447
44.4 Conclusions 454
References 454
Information System Architecture for Data Warehousing 455
45.1 Introduction 455
45.2 Federated Databases and Data Warehouses 456
45.3 Architecture Extension with Temporal Elements 457
45.4 Conclusion 460
References 460
Dimensional Dynamics Identification of Reconfigurable Machine Tools 462
46.1 Introduction 462
46.2 Algorithm for Online Identification of the Dimensional Dynamics 463
46.3 Experimental Research 467
46.4 Conclusions 467
References 468
Compaction-Induced Deformation on Flexible Substrate 469
47.1 Introduction 469
47.2 Materials and Method 471
47.3 Results and Discussion 476
47.4 Conclusions 479
References 480
Robust and Accurate Visual Odometry by Stereo 481
48.1 Introduction 481
48.2 The Visual Odometry Algorithm 482
48.2.1 Feature Extraction and Tracking 483
48.2.2 Motion Estimation 483
48.2.3 Cyclic Correction 485
48.3 Experimental Results 485
48.3.1 Equipment and Setup 485
48.3.2 Test Results 488
48.4 Concluding Remarks 489
References 489
Financial Auditing in an E-Business Environment 491
49.1 Introduction 491
49.2 Impacts of e-Business on Audit Missions and Auditors 492
49.2.1 Knowledge of the Client’s Business and Planning Mission 493
49.2.2 Evaluating Audit Risks in E-Business 494
49.2.3 Specific Controls in Auditing E-Business 497
49.3 Solutions for an Efficient Financial Auditing in E-Business 498
49.4 Conclusion 499
References 500
Reputed Authenticated Routing Ad-Hoc Networks Protocol 501
50.1 Introduction 501
50.2 Security Analysis of ARAN 502
50.3 The Proposed Reputation System Scheme: Reputed-ARAN 503
50.4 Simulation 507
50.5 Conclusion and Future Directions 509
References 510
Quantum Mechanical Analysis of Nanowire FETs 511
51.1 Introduction 511
51.2 Device Structure and Approach 512
51.3 Results 514
51.4 Conclusion 515
References 515
Part 7: Software Tools and Programming Languages 517
Impact of Quality Factors on the Success of Software Development 518
52.1 Introduction 518
52.2 The Distinguishing Characteristics 519
52.2.1 Abstraction 519
52.2.2 Encapsulation 519
52.2.3 Inheritance 520
52.3 Software Quality Factors 520
52.3.1 Flexibility 520
52.3.2 Maintainability 520
52.3.3 Reliability 520
52.3.4 Usability 521
52.4 An Illustrative Case Study Problem 521
52.5 Comparing the Two Methodologies 521
52.5.1 Preliminary Results 521
52.5.1.1 Reliability Results 522
52.5.1.2 Maintainability Results 522
52.5.1.3 Flexibility Results 522
52.5.1.4 Usability Results 523
52.5.2 Discussions 523
52.5.2.1 Differences in Reliability 523
52.5.2.2 Differences in Maintainability 524
52.5.2.3 Differences in Flexibility 525
52.5.2.4 Differences in Usability 525
52.6 Conclusions 526
Refrences 526
Sisal 3.2 Language Structure Decomposition 528
53.1 Introduction 528
53.2 The Compound Node Select 530
53.3 The Compound Node Forall 530
53.4 Decomposition of the Case Expression 531
53.5 Decomposition of the multidimensional Loops 532
53.6 Decomposition of the Array Element Selection 533
53.7 Array Element Replacement with a Singlet List Selection Construction 534
53.8 Array Element Replacement With a Scalar Replacement Construction 534
53.9 Array Element Replacement with Array Replacement Construction 535
53.10 Decomposition of the Where Expression 536
53.11 Decomposition of the Vector Operations 537
53.12 Conclusion 537
References 538
An Embedded Application for Driverless Metro Train 539
54.1 Introduction 539
54.2 Experimental Set Up of Train Control System 540
54.2.1 Hardware 541
54.3 Hardware Implementation 542
54.3.1 The Resulting Hardware 542
54.4 Simulations 542
54.4.1 Assembly Code (written on UMPS Version 2.1) 543
54.5 Challenges 544
54.6 Conclusion and Future Scope of this Model 544
References 545
A Post-mortem JavaSpaces Debugger 546
55.1 Introduction 546
55.2 Background 547
55.2.1 JavaSpaces 547
55.2.2 Jini 547
55.2.3 Weak Unstable Predicates 548
55.2.4 Strong Unstable Predicates 550
55.3 JSD Architecture 550
55.3.1 Predicate Detection Language 551
55.4 JSD Example 552
55.5 Conclusion 553
References 554
Stochastic Numerical Simulations Using C# 555
56.1 Introduction 555
56.2 Numerical Solutions of SDEs 556
56.3 Numerical Experiments Using C# 557
References 560
Visualization and Analyses of Multi-Dimensional Data Sets Using OLAP- A Case Study of a Student Administration System 561
57.1 Introduction 561
57.2 Design of OLAP Cubes 562
57.3 Case Study 565
57.4 Conclusion 565
References 565
Design of a Computer-Based Triangle Chess Machine 566
58.1 Introduction 566
58.2 Implementation 568
58.3 Conclusions 570
References 570
A Taxonomy Model for Analyzing Project-Based Learning Using Analytical Hierarchy Process (AHP): A Case Study of Design of a Beer Company Website in an Elementary School 571
59.1 Introduction 571
59.2 The AHP Procedure 572
59.3 Experimental Setup and Results 575
59.4 Conclusions 575
References 576
A Framework of Mixed Model of a Neural Network and Boolean Logic for Financial Crisis Prediction 577
60.1 Introduction 577
60.2 The Framework 578
60.3 Methodologies 580
60.4 Conclusions 581
References 581
Chinese Document Clustering Using Self-Organizing Map-Based on Botanical Document Warehouse 582
61.1 Introduction 582
61.2 Related Works 583
61.2.1 Dealing With Unstructured Documents 583
61.2.2 Self Organizing Map Algorithm 584
61.2.3 Users’ Information Need 585
61.3 Methodology 585
61.4 Results 586
61.4.1 Discussion 586
61.4.2 Evaluation 587
61.5 Conclusion 588
References 588
Linear Discriminant Analysis in Ottoman Alphabet Character Recognition 590
62.1 Introduction 590
62.2 The Preprocessing 591
62.3 The Feature Extraction 592
62.3.1 Principle Components Analysis 593
62.3.2 Linear Discriminant Analysis 593
62.4 Classification 594
62.5 Experimental Results 595
62.6 Conclusion 596
References 596
User Requirements Engineering and Management in Software Development 597
63.1 Introduction 597
63.2 Stakeholders’ Interests 598
63.3 Requirements are Interrelated 598
63.4 The Need for Requirements Management 599
63.5 Accelerating Development 601
63.6 Requirements Development and Management 602
63.7 Strategies and Best Practices for Better User Requirements Management 603
63.8 Traditional vs. Novel Approach to RM 604
63.9 Assessing Return on Investment 606
63.10 Conclusion 607
References 607
SSAF - A Tool for Active Filter Synthesis 609
64.1 Introduction 609
64.2 Program’s Structure and Algorithm 610
64.3 SSAF Program - Implementation and Operation 613
64.4 Conclusion 614
References 615
Part 8: Theoretical Approaches in Information Science 616
On the Complexity of the Auxetic Systems 617
65.1 Introduction 617
65.2 Structural Complexity 618
65.3 Computing Complexity 619
65.4 Case Study and Conclusions 620
References 621
New Verification of Reactive Requirement for Lyee Method 623
66.1 Introduction 623
66.2 Lyee Methodology and Requirement 624
66.3 Reactive Systems 625
66.3.1 Composition of Reactive System 625
66.3.2 Reactive System on Lyee Specification 625
66.4 Verification Lyee Requirement by Temporal Logic 627
66.4.1 Verification by Temporal Logic 628
66.4.2 Example 629
66.4.3 Proof of Example 631
66.5 Discussions 633
66.5.1 Shared Variable and Common Variable 633
66.5.2 Classification of Condition and Fairness 633
66.5.3 Expression as a Design Rule 633
66.6 Conclusion 634
References 635
A Tree Derivation Procedure for Multivalent and Paraconsistent Inference 636
67.1 Valid Arguments 636
67.2 Tree Construction 636
67.3 Multivalent Tree Construction 638
67.3.1 Multiple Tree Derivation Scheme 641
67.3.2 Single Tree Derivation Scheme 641
67.4 Appendix: Matrices for Epsilon 442 642
References 642
On the Feedback Stabilization of Matrix 643
68.1 Introduction 643
68.2 Numerical Stabilization of Polynomial and Matrix 646
68.3 Feedback Stabilization of Interval Controllable Canonical Form 647
68.4 Single Feedback Stabilization 653
68.5 Feedback Stabilization of Hessenberg Form 655
68.6 Conclusion 660
References 660
Maxwell Geometric Dynamics 661
69.1 Variational Problem in Electrodynamics 661
69.2 Ibragimov-Maxwell Lagrangian 662
69.3 Ibragimov-Udriscedilte-Maxwell Lagrangian 663
69.4 Udriscedilte-Maxwell Lagrangian 664
69.5 Discrete Maxwell geometric dynamics 665
69.6 Von Neumann Analysis 667
69.7 Open Problems 670
69.8 Conclusions 670
References 671
Fractional Right Ideals 672
References 677
A Distributed Approach for Concurrent Password Recovery of Archived Files 678
71.1 Introduction 678
71.2 Encrypted-Compressed Zip Archive Files 679
71.2.1 Brute Force Attack 679
71.2.2 Dictionary Attack 680
71.3 Distributed Password Recovery 680
71.3.1 Achieving Data Independency for Brute Force Attack 682
71.3.2 Achieving Data Independency for Dictionary Attack 682
71.3.3 Coding and Performance Issues 683
71.4 Conclusion 683
References 685
Solutions for an Integral-Differential Equation 686
72.1 Introduction 686
72.2 Problem Formulation 687
72.3 Numerical Method 691
72.4 Conclusions 694
References 695
Development of Genetic Algorithms and C-Method for Optimizing a Scattering by Rough Surface 696
73.1 Introduction 696
73.2 Compute the Reflectivity 697
73.3 Synthesis with Genetic Algorithms 698
73.4 Application 699
73.5 Conclusions 700
References 700
Author Index 701
Subject Index 704

Erscheint lt. Verlag 25.3.2010
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXIV, 732 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte algorithms • autonom • Case-Based Reasoning • Complexity • Computer Applications in Modern Medicine • e-Learning Systems • Image Processing • Information • information communication • information system • Knowledge Discovery • Knowledge Engineering • Modelling and Simulation • Multi-agent Systems • Neural networks • Optimization • Power Systems • robot • Routing • Semantics • Systems Theory • verification • Visualization • Web-based Applications
ISBN-10 0-387-85437-1 / 0387854371
ISBN-13 978-0-387-85437-3 / 9780387854373
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 19,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99