ICT Innovations 2009 (eBook)

eBook Download: PDF
2010 | 2010
XII, 462 Seiten
Springer Berlin (Verlag)
978-3-642-10781-8 (ISBN)

Lese- und Medienproben

ICT Innovations 2009 -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: • Multimedia Information Systems • Artificial Intelligence • Pervasive and Ubiquitous Computing • Eco and Bio Informatics • Internet and Web Applications and Services • Wireless and Mobile Communications and Services • Computer Networks, Security and Cryptography • Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.

Preface 5
Organization 6
Table of Contents 8
Invited Keynote Papers 8
Corporate Environmental Management Information Systems – CEMIS 2.0 12
Traditional Approach 12
Strategic Environmental Management for In-House Logistics 13
Conclusion 14
References 15
Computational Electronics and 21st Century Education 16
Introduction 16
What Is Computational Electronics? 17
Self-heating Effects in Nano-Scale Devices 17
Process Variation in FinFET Devices 21
Computational Electronics and 21$^{st}$ Century Education 23
The Future of Computational Electronics 28
References 29
Wireless Sensor Networks for Cattle Health Monitoring 31
Introduction 31
Related Activities and Challenges 32
Animal Behaviour 33
Hardware Design and Realization 34
Frequency Selection 34
Penetration Depth 35
Bandwidth versus Battery Lifetime 35
Prototype System 36
Antenna Height 36
Data Collection 38
Conclusions 40
References 40
Tools for High Throughput Differential Methylation Study in Cancer 42
Background 42
Methods 42
Results 42
Conclusion 43
Compensatory Fuzzy Ontology 44
Introduction 44
Ontology and Fuzzy Ontology 45
Fuzzy Logic and Modeling of Decision 45
Compensatory Fuzzy Logic 46
Relation between Compensatory Fuzzy Logic and Boolean Logic 48
Compound Inference 48
Compensatory Fuzzy Ontology 49
Case Study: Ontology for Competitive Enterprise 50
Conclusions 52
References 53
Conceptual Clustering and Analysis of Data from Gynecological Database 54
Introduction 54
WITT Algorithm and Corrections of the Clustering Parameters 55
Pre-clustering and Refinement Algorithm 57
Experimental Results 58
Clustering Data from Pre-eclampsia Database 58
Clustering Data from Polycystic Ovary Syndrome Database 60
Conclusion 62
References 63
System for Prediction of the Winner in a Sports Game 64
Introduction 64
System Design 65
Data Collection 66
Data Preprocessing 66
Feature Selection 67
Training and Test Data Sets 67
Implementation 68
The Crawler 68
Preprocessing 69
Feature Selection 69
Interface to WEKA 69
Results 69
Conclusions and Future Work 71
References 72
Computer Generated News Site – TIME.mk 73
Introduction 73
TIME.mkasaNewsEngine 74
Retrievers 74
Keywords Extraction 75
Image Processor 76
Classifier Engine 77
Clustering Engine 77
Ranker 78
Implementation Details 80
Results 80
Conclusion and Future Work 82
References 82
Applying Bagging Techniques to the SA Tabu Miner Rule Induction Algorithm 83
Introduction 83
Bagging 84
Bagging the SA Tabu Miner 85
Experimental Results 88
Conslusion 90
References 91
Information/Material Processing Synergy: Flexible Manufacturing and Operating System Metaphor for a Biological Cell 93
Introduction 93
The Cell and Its Parallel and Distributed File Processing Features 94
Cell Files 94
Cell Disks 95
Process Management vs. Memory Management 96
Time-Sharing vs. Autonomy 97
Consistency 97
Pipeline Processing 97
Parallel Processing: Inter-thread Communication 97
Compilation as Manufacturing – From Source Code to a Robot 98
Just-in-Time Manufacturing 99
Common Building/Coding Blocks 99
Nanotechnology and the Future of Parallel Processing Systems 99
Conclusion 100
References 101
Position Estimation of Mobile Robots Using Unsupervised Learning Algorithms 103
Introduction 103
System Architecture 104
Experiments and Evaluation Results 107
Conclusion 109
References 110
Practical Method for Real-Time Path Planning and Optimization for Mobile Robots 112
Introduction 112
Path Objectives 113
Path Planning Using Hermite Cubic Splines 114
Path Refinement and Optimization 116
Simulation Experiments and Results 118
Conclusion and Future Work 120
Untitled 120
References 120
Protein Classification Based on 3D Structures and Fractal Features 122
Introduction 122
Our Approach 123
Volume Fractal Descriptor 124
Voxel Based Descriptor 125
Distance-Weighted k Nearest Neighbors Classifier 128
Experimental Results 128
Conclusion 130
References 130
Protein Function Prediction Based on Neighborhood Profiles 132
Introduction 132
Research Methods 134
Extraction of Neighbourhood Profiles 134
Chi-Square Method for Protein Function Prediction 136
Results 136
Conclusion 140
References 140
Automated Structural Classification of Proteins by Using Decision Trees and Structural Protein Features 142
Introduction 142
Classification Process Architecture and Methods 145
Bottom-Up Classification Approach 146
Multi-level Modification of the C4.5 Algorithm 147
Experimental Results 148
Conclusion 150
References 150
Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach 152
Introduction 152
Multidimensional Scaling 153
MDS-MAP Algorithm 155
Semidefinite Programming 155
Simulation Results 157
Random Network Topology 157
Square Grid Network Topology 159
Hexagonal Grid Network Topology 159
Conclusions 161
References 162
On the Complexity of the Greedy Construction of Linear Error-Correcting Codes 163
Introduction 163
Greedy Algorithms for Code Construction 164
The Gilbert’s Construction 164
The Varshamov’s Construction 165
The Jenkins’ Construction 165
The Lexicographic Construction 166
Estimate of the Parameters of the Greedy Codes: The Gilbert-Varshamov Bound 168
Some Results on the Gilbert-Varshamov Bound 168
Comparison with Prior Work 170
Conclusion 171
References 172
Vulnerability Assessment of Complex Networks Based on Optimal Flow Measurements under Intentional Node and Edge Attacks 173
Introduction 173
Network Utility Maximization Problem- NUM 175
Attack Strategies 176
Degree Centrality – DEG 176
Betweenness Centrality – BTWN 176
Eigenvector Centrality (Pagerank) - PR 177
Simulation and Results 177
Conclusion 181
References 181
Outage Probability of Multi-hop Relay Systems in Various Fading Channels 183
Introduction 183
System and Channel Models 184
Numerical Results 187
Conclusion 191
References 192
Non-poisson Processes of Email Virus Propagation 193
Introduction 193
Email Network Model 195
Email Virus Propagation Model 197
Simulations and Analyses 199
Conclusion 201
References 201
Impact of Community Structures on Ad Hoc Networks Performances 203
Introduction 203
Modeling Social Networks of User Communities 205
Community Based Communication and Mobility Patterns 206
Simulation Scenarios 207
Impact of Social Communities on Network Performances 208
Conclusion 211
References 212
Rule Induction of Physical-Chemical Water Property from Diatoms Community 213
Introduction 213
Rule Learning for Knowledge Discovery 215
Rule Learning Basics 215
CN2 Algorithm 215
Learning Regression Rules 215
Coverage and Compactness 216
Data Description 216
Measured Data 216
Experimental Design 217
Results Using CN2 Algorithm from Lake Measurements 217
Standard Covering Method 217
Weighted Covering Method 219
Conclusion 221
References 221
Semantic Interaction in Enterprise Data-Flow Visualization Environments: An Exploratory Study 223
Introduction 223
Background 224
Methods 225
Case Study 226
Discussion 230
Conclusions and Future Research 231
References 231
A Beehive-Like Multi-agent Solution to Enhance Findability of Semantic Web Services and Facilitate Personalization within a P2P Network 233
Introduction and Background 233
From the Beehive Model to the Mobile Agents-Based Solution 234
Main Benefits of Agents’ Action as a Beehive 235
Traversal of the P2P Network 235
Maintaining Diversity to Solve Heterogeneity 236
Benefits of the Proposed Model in Improving the Quality of Electronic Services 238
Potential Misuse Cases and Workarounds 240
Related Work 241
Conclusion and Future Trends 241
References 241
Phonetic Experiment Web Application 243
Introduction 243
Software Solution Description 244
Software Requirements 244
Development Tools and Environments 245
Software Design 245
Experiment Flow 246
Security Issues 248
Data Collection and Data Extraction 249
Results 249
Conclusion 250
References 250
Using XAML in Representation of Dental Charts in Electronic Health Record 252
Introduction 252
XAML Basics 254
XAML in Medis.Net.Dental Application 255
Conclusion and Future Work 260
References 261
Enterprise Tomography Driven Governance of Federated ERP in a Cloud 262
Introduction 262
Federated ERP in a Cloud 263
Enterprise Tomography Driven Governance of Integration Lifecycle Management 266
Related Works 267
Conclusion 267
References 268
Composite Index of e-Business Strategy Readiness of the Enterprises in the Republic of Macedonia 270
Introduction 270
Survey Instrument and Methodology 271
Indicators of the Composite Index of e-Business Strategic Readiness 271
Sample 273
Results and Discussion 273
Calculation of the Composite Index of e-Business Strategic Readiness 275
Calculation of the Composite Sub-indices 276
Conclusion 279
References 279
Performance Evaluation of a New Approach for Automatic Question Production 280
Introduction 280
Weaknesses of e-Testing 281
How to Create a Large Set of Questions for e-Testing? 282
A Model for Automatic Question Production for e-Testing Systems 283
Methodology to Evaluate the Model 284
Comparative Analysis of the Results 285
Conclusion 288
References 288
Semantic Supported Modeling and Orchestration of Logistic Integrated Processes, with Focus on Supply Chain: Framework Design 289
Introduction 289
The Need for Integration 290
Integration Challenges 292
The Gap + Idea 292
Details of the Framework 294
Validation 294
Conclusions and Future Work 296
References 297
Web Service Validation within Semantic SOA-Based Model 299
Introduction and Problem Definition 299
Semantic SOA-Based Model 301
Web Service Validation within Semantic SOA-Based Model 304
Web Service Compliance 304
Design Aspects 305
Conclusion and Outlook 306
References 307
Auto-production 3D Graphics Content for Mobile Communication 308
Introduction 308
Avatar Modeling and Animation 309
Software Architecture 311
Content Creator Module 312
End-User Module 312
Results 314
Conclusion and Future Work 315
References 315
On-Line Animation System for Learning and Practice Cued Speech 317
Introduction 317
Computer Graphics Face Animation 319
MPEG-4 Tools for Avatar Animation 321
Implementation and Simulation Results 324
Conclusion 326
References 326
AUM and Enterprise Tomography: New Concepts for Technology Enhanced Learning for Enterprise Systems in Higher Education 328
Introduction 328
Background 329
Technology Enhanced Learning 330
Concept for TEL for Enterprise Systems in HE 331
Application Usage Mining 331
AUM for TEL 333
Enterprise Tomography Supporting Adaptive Learning Environment 333
Conclusions and Future Work 336
References 336
Multiplatform Real-Time Rendering of MPEG-4 3D Scenes with Microsoft XNA 338
Introduction 338
Real-Time Visualization 339
MPEG-4 3D Scene 341
Integration of MPEG-4 into XNA 343
Conclusion 344
References 345
Fast Classification Scheme for HARDI Data Simplification 346
Introduction 346
Methods 348
Results 349
Discussion and Conclusions 353
References 355
Experimental Comparison of PSNR and SSIM Metrics for Video Quality Estimation 357
Introduction 357
Introduction to PSNR (Peak Signal to Noise Ratio) 358
Introduction to SSIM (Structural Similarity) 359
Analysis of PSNR and SSIM Values in Modified Video Sequences 360
Example 1 363
Example 2 364
Example 3 364
Conclusion 365
Future Research 366
References 366
Quasigroup String Transformations and Hash Function Design 367
Introduction 367
Our Contribution 368
Related Work 368
Quasigroup String Transformations 369
Design of Compression Functions by Using Quasigroup String Transformations 371
Application of First Type of Design: The NaSHA-(m, 2, 6) Hash Function 373
One Implementation of OT Transformation 374
Conclusion 374
References 375
Appendix A 376
Performances of Error-Correcting Codes Based on Quasigroups 377
Introduction 377
Quasigroup Transformation and TASC 378
Code Description 379
Description of Coding 379
Description of Decoding 379
Experimental Results 381
Influence of the Pattern on the Performances 382
The Influence of the Key Length on the Performances 386
The Influence of the Used Quasigroup 386
A Method for Decreasing the Number of Null-Errors 388
Conclusions 388
References 389
On the Computational Asymmetry of the S-Boxes Present in Blue Midnight Wish Cryptographic Hash Function 390
Introduction 390
Observations on Some Properties of the SHA-2 S-Boxes 391
Properties of {/sc Blue Midnight Wish} S-Boxes 396
Conclusions and Future Work 398
References 398
Optimization of Adaptive Petri-Net Grid Genetic Algorithm Workflows 400
Introduction 400
Optimization of Adaptive Grid Genetic Algorithms 402
Analysis of the Adaptive Grid Genetic Algorithm 404
Experimental Results 405
Conclusion 408
References 408
Massively Parallel Seismic Data Wavelet Processing Using Advanced Grid Workflows 410
Introduction 410
Wavelet Analysis of the Seismic Data 411
Wavelet Processing 412
Application Model 415
Conclusion and Future Work 417
References 418
Grids in the Near Future: A Technical and Social Review 419
Introduction 419
Road from Here 420
Technical Issues 420
Social and Policy Issues 422
Conclusion 424
References 425
Object Oriented Approach in Computer Aided Process Planning 427
Introduction 427
Manufacturing System Interaction 428
Manufacturing Activities Model 428
Process Planning Network 429
Object Oriented System for Process Planning 429
Module of Parametric Modeling Designer 431
Module for Generating Process Plan Network 433
Conclusions 436
References 436
Videoconferencing as Tool of Higher Education 437
Introduction 437
Higher Education in Europe: From the Bologna Process to the Tempus Programme 439
From the Video Conferencing Approach to the TEMPUS VICES Project 441
Expected Results and Future Perspectives of VICES 444
Conclusion 446
References 446
A New Solution for Workflow and Document Management Used for University Management in WODOMI Project 448
Introduction 448
System Architecture 449
Database Provider Layer 452
Service Layer 452
Base Object Model 453
Portal Data Model 453
Page and Control Model 454
Process Model 454
Navigation Model 454
Security Model 454
Layout Model 455
GUI Layer 455
Document Creator 455
Multi-Language Support 456
Portal Validation 456
Portal Deployment 456
Conclusion 456
References 457
Author Index 458

Erscheint lt. Verlag 6.1.2010
Zusatzinfo XII, 462 p.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Schlagworte Artificial Intelligence • Bio Informatics • Cloud Computing • computer network • cryptography • Distributed Systems • Internet • metrics • Multimedia Information Systems • nanotechnology • Pervasive Computing • security • ubiquitous computing
ISBN-10 3-642-10781-8 / 3642107818
ISBN-13 978-3-642-10781-8 / 9783642107818
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 11,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99