Applied Computing and Information Technology
This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepre...
Saved in:
| Main Author | |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Cham
Springer International Publishing AG
2014
Springer |
| Edition | 1 |
| Series | Studies in computational intelligence |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3319514717 9783319514710 |
| DOI | 10.1007/978-3-319-05717-0 |
Cover
| Abstract | This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. This book captures 11 of the conference's most promising papers, and the readers impatiently await the important contributions that they know these authors are going to bring to the field of computer and information science. |
|---|---|
| AbstractList | This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. This book captures 11 of the conference's most promising papers, and the readers impatiently await the important contributions that they know these authors are going to bring to the field of computer and information science. |
| Author | Lee, Roger |
| Author_xml | – sequence: 1 fullname: Lee, Roger |
| BookMark | eNpVj8tOwzAQRY14iLb0A9hlh5Aw2LGdsZclKlCpEpuKbeRX2tLUDnUK4u8JFBasRvfcoyvNEJ2EGDxCl5TcUkLgToHEDDOqMBFAAZMjNO4Z64mgHHI4RsO_QOEMDb5LDkrSczRO6ZUQQiVVBeMDdDNp22btXVbGbbvv1mGZ6eCyWajjbqu7dQzZwttViE1cfl6g01o3yY9_7wi9PEwX5ROePz_OyskcayGAC6w9EFGo2mpChNfSCQ4cXO4oWCdNraWQtoe5JVZpymRhIDfUFNxS4wrDRuj6MKzTxn-kVWy6VL033sS4SdW_X3v36uC2u_i296mrfjTrQ7fTTTW9L4VQQnHGvgCtUVki |
| ContentType | eBook |
| DEWEY | 004 |
| DOI | 10.1007/978-3-319-05717-0 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783319514727 3319514725 |
| Edition | 1 |
| ExternalDocumentID | 9783319514727 EBC5595943 |
| GroupedDBID | 0D9 0DA 38. AABBV AALVI AAZIN ABBVZ ABQUB ACLYY ADCXD AEJLV AEKFX AETDV AEZAY AGIGN AGYGE AIODD ALBAV ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CEWPM CZZ DBMNP I4C IEZ LEF SBO SWYDZ TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z84 Z85 Z87 Z88 |
| ID | FETCH-LOGICAL-a55745-ae70569fca005ea8d54747d2d17cd8bfa858cd542c0c9a1386b72b1b64c1bd6b3 |
| ISBN | 3319514717 9783319514710 |
| IngestDate | Tue Mar 04 07:17:23 EST 2025 Fri May 30 23:01:35 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum_Ident | Q342 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a55745-ae70569fca005ea8d54747d2d17cd8bfa858cd542c0c9a1386b72b1b64c1bd6b3 |
| OCLC | 978347981 |
| PQID | EBC5595943 |
| PageCount | 205 |
| ParticipantIDs | askewsholts_vlebooks_9783319514727 proquest_ebookcentral_EBC5595943 |
| PublicationCentury | 2000 |
| PublicationDate | 2014. |
| PublicationDateYYYYMMDD | 2014-01-01 |
| PublicationDate_xml | – year: 2014 text: 2014. |
| PublicationDecade | 2010 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham |
| PublicationSeriesTitle | Studies in computational intelligence |
| PublicationYear | 2014 |
| Publisher | Springer International Publishing AG Springer |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer |
| SSID | ssj0001819634 |
| Score | 2.3813508 |
| Snippet | This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on... |
| SourceID | askewsholts proquest |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer science Computer science-Congresses Information technology |
| TableOfContents | 3 System for Experiment -- 3.1 Overview -- 3.2 User Evaluation GUI -- 3.3 Gene Expression -- 4 User Evaluation Prediction Models -- 4.1 Conjoint Analysis -- 4.2 Neural Networks -- 5 User Evaluation Experiment -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Conclusions -- References -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- 1 Introduction -- 2 Facial Feature -- 2.1 Facial Feature Points -- 2.2 Facial Features -- 3 Feature Selection -- 4 Facial Expression Recognition -- 5 Emotional Scene Detection -- 6 Experiment -- 6.1 Experimental Settings -- 6.2 Experimental Result -- 7 Consideration -- 8 Conclusion -- References -- 9 Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 3 Research Objectives and Methodology -- 3.1 Research Objectives -- 3.1.1 Defining Threat Intelligence and Its Scope -- 3.1.2 Proposing an Innovative Method to Prevent DDoS Attacks in the Cloud Environment -- 3.1.3 Introducing New Proactive Approach to Defend Threats Related to DDoS Attack -- 3.1.4 Designing a Multilayer System for DDoS Prevention in the Cloud Using Threat Intelligence Techniques -- 3.1.5 Introducing an Improved Method of IP Traceback -- 3.1.6 Introducing Our Own Simple and Effective Port-Hopping Method -- 3.1.7 Experimental Confirmation of the Effectiveness of Our Method -- 3.2 Methodology -- 3.2.1 Layer 1 -- 3.2.2 Layer 2 -- 3.2.3 Layer 3 -- 3.2.4 Layer 4 -- 3.2.5 Layer 5 -- 4 Experiments -- 5 Conclusions -- References -- Practical Uses of Memory Storage Extension -- 1 Introduction -- 2 Background -- 2.1 Block Device Driver Layer and Its Execution Overhead -- 2.2 The Existing Method to Combine Block Storage Devices and Its Problems to Be Used with Memory Storage -- 3 MSX: Memory Storage Extension -- 4 Practical Uses of MSX 5.4 Learner Profiler -- 5.5 Learner Profile Mapper -- 5.6 CCA Component Summary -- 6 Using CCA -- 6.1 Setting up Learning Goal -- 6.2 Searching for Matching Learner Profile -- 7 Conclusion -- References -- Author Index Intro -- Foreword -- Contents -- Contributors -- 1 Business Sustainability Conceptualization -- Abstract -- 1 Introduction -- 2 Business Sustainability-Definitional Paradox -- 3 Evaluation of Definitions -- 4 A Holistic Definition of Business Sustainability -- 5 Key Terms -- 6 Managerial Implications and Industry Applications -- 7 Conclusions -- Appendix -- References -- A Replicated Study on Relationship Between Code Quality and Method Comments -- 1 Introduction -- 2 Methodology -- 2.1 Self-Admitted Technical Debt -- 2.2 Research Questions -- 2.3 Datasets -- 2.4 Target Comment Types -- 2.5 Comments Extraction and Labeling -- 2.6 Fix-Proneness Identification -- 3 Results -- 3.1 Are Files Containing Comments Other Than SATD Comments More Fix-Prone Than Files Without Any Comments? -- 3.2 Are Methods Containing SATD Comments More Fix-Prone Than the Other Methods? Are Methods Containing Comments Other Than SATD Comments More Fix-Prone Than Methods Without Any Comments? -- 3.3 Threats to Validity -- 4 Related Work -- 5 Conclusion -- References -- A Predictive Model for Standardized Test Performance in Michigan Schools -- 1 Introduction -- 2 Related Work -- 3 Data -- 3.1 School Proficiency Percentage -- 3.2 Crime Rate -- 3.3 Education -- 3.4 Income -- 3.5 Class Size -- 3.6 Jobless Rate -- 3.7 Charter Schools & -- Big 4 School Districts -- 3.8 Target Variable -- 4 Methodology -- 4.1 Data Cleaning -- 4.2 Modeling -- 4.3 Decision Trees -- 4.4 Logit Regression -- 4.5 Validation -- 5 Experimental Results -- 5.1 Final Model Selection -- 5.2 Model Performance -- 6 Conclusion -- References -- 4 A Development Technique for Mobile Applications Program -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 SPEM and EPF -- 2.2 Masam -- 3 Characteristics of Mobile Applications -- 4 Architecture of Applications Program -- 5 Development Procedure of AppSpec 4.1 High Performance File Access for Cloud Computing -- 4.2 Quick System Rejuvenation for Higher Reliability -- 4.3 Journaling Acceleration -- 4.4 Single-Level Store -- 5 Related Work -- 6 Summary -- References -- 11 How to Build a High Quality Mobile Applications Based on Improved Process -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Process Concepts -- 2.2 Process Definition -- 2.3 Mobile Applications Defect -- 2.4 Impact of Defect -- 2.5 Mobile Development Process Spiral [4] -- 2.6 Mobile Applications Defect Tree Analysis -- 3 How to Apply Improved Process for Quality Mobile Applications -- 3.1 Collecting Defect Data -- 3.2 Questionnaire to Detect Defects -- 3.3 Mobile Applications Data Analysis of Questionnaire to Detect Defects -- 3.3.1 Mobile Applications Hierarchical Decision-Making Structure -- 3.4 Mobile Applications Defect Trigger -- 4 Effectiveness Analysis of Mobile Applications Defect Trigger -- 4.1 Defect Removal Efficiency Analysis on Mobile Applications -- 5 Conclusions -- Acknowledgements -- References -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem -- 1 Introduction -- 2 Preliminaries -- 2.1 Firefly Algorithm -- 2.2 Discrete Firefly Algorithm for TSP -- 2.3 Crossover Operator -- 2.4 Mutation Operator -- 3 Hybrid Discrete Firefly Algorithm for TSP (HDFA) -- 4 Experimental Results -- 5 Conclusion -- References -- 13 Empowering MOOCs Through Course Certifying Agency Framework -- Abstract -- 1 Introduction -- 2 Relevant Works -- 3 Learner Profile Model -- 4 Course Profile Model -- 5 Proposed Framework Components -- 5.1 Virtuoso RDF Triple Store -- 5.2 Course Profiler -- 5.2.1 Access of MOOC Provider Course Listings via RESTful API -- 5.2.2 Parsing HTML of MOOC Course Search -- 5.3 Course Profile Mapper -- 5.3.1 Mapping to Triples Format -- 5.3.2 Insert Mapped RDF Triples in Triple Store 5.1 Development Phases -- 5.2 Graphic Notations -- 5.3 Diagrams -- 6 Application Example: An Application for Ordering a Menu at Inverse-Auction -- 7 Comparison with Related Works -- 7.1 Development Process -- 7.2 Specification Method -- 8 Conclusions -- Acknowledgements -- References -- 5 Interactive Mobile Applications Development Using Adapting Component Model -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Adapting Component Based Mobile Applications Development -- 2.2 CBD Process for Mobile Applications -- 2.2.1 Component Interfaces -- 3 Design of Interactive Mobile Applications Development Using Adapting Component Model -- 3.1 Interactive Mobile Applications Development Using Adapting Component Model -- 3.2 Components and Variation Points -- 3.3 Adapting Component Model with Interactive Mobile Applications Development -- 3.4 Implementation of Adapting Component Model with Interactive Mobile Applications Development -- 3.5 Dynamic Composition -- 4 Conclusions -- Acknowledgements -- References -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- 1 Introduction -- 1.1 Present Situation of the Visually Impaired People -- 1.2 Problems of the Conventional Walking Support Tools -- 1.3 Robotize Walking Support Tool -- 2 Related Work -- 3 Proposed Method -- 3.1 Drive Unit -- 3.2 Input Unit -- 3.3 Determination of the Motor Output -- 3.4 Obstacle Detection Unit -- 3.5 Stairs Sensor -- 3.6 Navigation Unit -- 3.7 The Length and the Weight -- 3.8 Human Interface -- 4 Experiment -- 5 Conclusion -- References -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- 1 Introduction -- 2 Interactive Evolutionary Computation (IEC) -- 2.1 Interactive Genetic Algorithm (IGA) -- 2.2 Interactive Differential Evolution (IDE) |
| Title | Applied Computing and Information Technology |
| URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5595943 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319514727 |
| Volume | 695 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagXejCW5SXIsQGRs3DsTMwQFVUVcCAStUtsi8OQqBWIikDv55L6jzaMgCL1TqS6-Rrzt-d7_MRcg4QiExkTX3uRxT5v6ZBJwYadwRAHCsFKtMOPzz6_WdvMGbjSn-fq0tSdQVfP-pK_oMq9iGumUr2D8iWg2IHfkZ8sUWEsV0iv-VXk1psuCPkNRkKnaE5BDVHNF0JmZuUm6fpi0nIzaaok2uTSXhhEtJnaREefK2d1lkPDtjeUnCgCA4uOI0uvnVIk7hJJzVW0J_XulyxqPUkilzwxNABpJ1q-SiT-mpDO3ydrHOOFqd50xvcj6qol8je-KzWVjkLPj8GqZpVsfdsjv9d-NkWacnkDc0_Lg1psrJ-5qRguEWaOlOKbJM1Pdkhm0V9DMuYy11yaWCySpgshMmqwWRVMO2R0V1v2O1TU52CSsa4x6jUHNljEINES6aliJiHvlnkRDaHSKhYCiYAOx3oQCBtV_iKO8pWvge2inzl7pPGZDrRB8RiEHHJvYxvYaslkkYV29IR6C4LCJw2Oavddvj5nu-kJ-HCI28Tq3gaYX7dpPeGvdsu-o0s8NzD34xzRDaqv9IxaaQfM32CzCtVpwbObxiCKos |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Applied+computing+and+information+technology&rft.au=Lee%2C+Roger&rft.series=Studies+in+computational+intelligence&rft.date=2014-01-01&rft.pub=Springer&rft.isbn=9783319514710&rft.volume=695&rft_id=info:doi/10.1007%2F978-3-319-05717-0&rft.externalDocID=9783319514727 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833195%2F9783319514727.jpg |