Software engineering trends and techniques in intelligent systems : proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017). Vol 3 /

This book presents new approaches and methods to solve real-world problems as well as exploratory research describing novel approaches in the field of software engineering and intelligent systems. It particularly focuses on modern trends in selected fields of interest, introducing new algorithms, me...

Full description

Saved in:
Bibliographic Details
Corporate Author Computer Science On-line Conference Online
Other Authors Šilhavý, Radek (Editor), Šilhavý, Petr (Editor), Prokopová, Zdeňka (Editor), Šenkeřík, Roman (Editor), Oplatková, Zuzana (Editor)
Format Electronic eBook
LanguageEnglish
Published Cham, Switzerland : Springer, [2017]
SeriesAdvances in intelligent systems and computing ; 575.
Subjects
Online AccessFull text
ISBN9783319571416
9783319571409
ISSN2194-5357 ;
Physical Description1 online resource (xv, 498 pages) : illustrations

Cover

Table of Contents:
  • Preface; Organization; Program Committee; Program Committee Chairs; Program Committee Members; Technical Program Committee Members; Organizing Committee Chair; Conference Organizer (Production); Conference Website, Call for Papers; Contents; Improving Algorithmic Optimisation Method by Spectral Clustering; Abstract; 1 Introduction; 2 Problem Statement; 2.1 Methods and Experiment Design; 2.2 Hypothesis Formulation and Research Questions; 2.3 Evaluation Criteria; 3 Experiment Evaluation; 3.1 Project Dataset; 4 Results; 4.1 AOM-C, MLR Models; 4.2 AOM, MLR Model; 4.3 Model Prediction Performance.
  • 5 ConclusionReferences; FRDF: Framework for Reliable Data Fusion to Leverage Communication Performance in Sensor Network; Abstract; 1 Introduction; 1.1 Background; 1.2 The Problem; 1.3 The Proposed Solution; 2 Algorithm Implementation; 2.1 Algorithm for Distributed Tree Construction; 2.2 Algorithm for Reliable Data Fusion; 2.3 Algorithm for Condition of Data Forwarding Reliability; 3 Result Discussion; 4 Conclusion; References; RASK: Request Authentication Using Shared Keys for Secured Data Aggregation in Sensor Network; Abstract; 1 Introduction; 2 Related Work; 3 Problem Identification.
  • 4 Proposed System5 Research Methodology; 5.1 Intruder Model; 5.2 Design Principle; 6 Algorithm Design; 7 Comparative Performance; 7.1 Analysis of Residual Energy; 7.2 Analysis of End-to-End Delay; 7.3 Analysis of Algorithm Processing Time; 7.4 Security Analysis; 8 Conclusion; References; Warehouse Stock Prediction Based on Fuzzy-Expert System; Abstract; 1 Introduction; 2 The Major Trends Determination; 3 Creation of an Expert Model; 4 Verification of an Expert System Prediction; 5 Conclusion; Acknowledgment; References; New Framework Model to Secure Cloud Data Storage; Abstract.
  • 1 Introduction2 Cloud Computing Security; 3 Related Works; 4 Proposed Security Model; 5 Conclusion and Future Works; References; Proposal of Complex Software Applications; Abstract; 1 Introduction; 2 General Decision-Making Model; 3 Model of Creating a Complex Software Application; 4 Decision-Making Model for a Proposal of a Safe Operating System Architecture; 5 Conclusion; Acknowledgment; References; Migrating from Conventional E-Learning to Cloud-Based E-Learning: A Case Study of Armangarayan Co.; Abstract; 1 Introduction; 2 Concept of E-Learning; 3 What's Cloud Computing?
  • 4 Literature Review5 The Case Study and Discussion; 6 Conclusions and Future Work; References; Enterprise Architecture: An Alternative to ArchiMate Conceptualization; Abstract; 1 Introduction; 1.1 ArchiMate; 1.2 Research Problem; 2 Flowthing Model; 3 FM as an EA Description; 3.1 Business Layer; 3.2 Application Layer; 3.3 Application Layer; 4 Conclusions; References; Fissure Extraction Using Dual Tree Complex Wavelet Transform and Lung Lobe Segmentation from CT Lung Images; Abstract; 1 Introduction and Literature Survey; 2 Proposed Work and Methodology; 2.1 Noise Removal
  • Mean Filter [7].