Applied Computing and Information Technology

This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepre...

Full description

Saved in:
Bibliographic Details
Main Author Lee, Roger
Format eBook
LanguageEnglish
Published Cham Springer International Publishing AG 2014
Springer
Edition1
SeriesStudies in computational intelligence
Subjects
Online AccessGet full text
ISBN3319514717
9783319514710
DOI10.1007/978-3-319-05717-0

Cover

Abstract This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. This book captures 11 of the conference's most promising papers, and the readers impatiently await the important contributions that they know these authors are going to bring to the field of computer and information science.
AbstractList This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. This book captures 11 of the conference's most promising papers, and the readers impatiently await the important contributions that they know these authors are going to bring to the field of computer and information science.
Author Lee, Roger
Author_xml – sequence: 1
  fullname: Lee, Roger
BookMark eNpVj8tOwzAQRY14iLb0A9hlh5Aw2LGdsZclKlCpEpuKbeRX2tLUDnUK4u8JFBasRvfcoyvNEJ2EGDxCl5TcUkLgToHEDDOqMBFAAZMjNO4Z64mgHHI4RsO_QOEMDb5LDkrSczRO6ZUQQiVVBeMDdDNp22btXVbGbbvv1mGZ6eCyWajjbqu7dQzZwttViE1cfl6g01o3yY9_7wi9PEwX5ROePz_OyskcayGAC6w9EFGo2mpChNfSCQ4cXO4oWCdNraWQtoe5JVZpymRhIDfUFNxS4wrDRuj6MKzTxn-kVWy6VL033sS4SdW_X3v36uC2u_i296mrfjTrQ7fTTTW9L4VQQnHGvgCtUVki
ContentType eBook
DEWEY 004
DOI 10.1007/978-3-319-05717-0
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783319514727
3319514725
Edition 1
ExternalDocumentID 9783319514727
EBC5595943
GroupedDBID 0D9
0DA
38.
AABBV
AALVI
AAZIN
ABBVZ
ABQUB
ACLYY
ADCXD
AEJLV
AEKFX
AETDV
AEZAY
AGIGN
AGYGE
AIODD
ALBAV
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CEWPM
CZZ
DBMNP
I4C
IEZ
LEF
SBO
SWYDZ
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z82
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-a55745-ae70569fca005ea8d54747d2d17cd8bfa858cd542c0c9a1386b72b1b64c1bd6b3
ISBN 3319514717
9783319514710
IngestDate Tue Mar 04 07:17:23 EST 2025
Fri May 30 23:01:35 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum_Ident Q342
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a55745-ae70569fca005ea8d54747d2d17cd8bfa858cd542c0c9a1386b72b1b64c1bd6b3
OCLC 978347981
PQID EBC5595943
PageCount 205
ParticipantIDs askewsholts_vlebooks_9783319514727
proquest_ebookcentral_EBC5595943
PublicationCentury 2000
PublicationDate 2014.
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – year: 2014
  text: 2014.
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Studies in computational intelligence
PublicationYear 2014
Publisher Springer International Publishing AG
Springer
Publisher_xml – name: Springer International Publishing AG
– name: Springer
SSID ssj0001819634
Score 2.3813508
Snippet This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on...
SourceID askewsholts
proquest
SourceType Aggregation Database
Publisher
SubjectTerms Computer science
Computer science-Congresses
Information technology
TableOfContents 3 System for Experiment -- 3.1 Overview -- 3.2 User Evaluation GUI -- 3.3 Gene Expression -- 4 User Evaluation Prediction Models -- 4.1 Conjoint Analysis -- 4.2 Neural Networks -- 5 User Evaluation Experiment -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Conclusions -- References -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- 1 Introduction -- 2 Facial Feature -- 2.1 Facial Feature Points -- 2.2 Facial Features -- 3 Feature Selection -- 4 Facial Expression Recognition -- 5 Emotional Scene Detection -- 6 Experiment -- 6.1 Experimental Settings -- 6.2 Experimental Result -- 7 Consideration -- 8 Conclusion -- References -- 9 Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 3 Research Objectives and Methodology -- 3.1 Research Objectives -- 3.1.1 Defining Threat Intelligence and Its Scope -- 3.1.2 Proposing an Innovative Method to Prevent DDoS Attacks in the Cloud Environment -- 3.1.3 Introducing New Proactive Approach to Defend Threats Related to DDoS Attack -- 3.1.4 Designing a Multilayer System for DDoS Prevention in the Cloud Using Threat Intelligence Techniques -- 3.1.5 Introducing an Improved Method of IP Traceback -- 3.1.6 Introducing Our Own Simple and Effective Port-Hopping Method -- 3.1.7 Experimental Confirmation of the Effectiveness of Our Method -- 3.2 Methodology -- 3.2.1 Layer 1 -- 3.2.2 Layer 2 -- 3.2.3 Layer 3 -- 3.2.4 Layer 4 -- 3.2.5 Layer 5 -- 4 Experiments -- 5 Conclusions -- References -- Practical Uses of Memory Storage Extension -- 1 Introduction -- 2 Background -- 2.1 Block Device Driver Layer and Its Execution Overhead -- 2.2 The Existing Method to Combine Block Storage Devices and Its Problems to Be Used with Memory Storage -- 3 MSX: Memory Storage Extension -- 4 Practical Uses of MSX
5.4 Learner Profiler -- 5.5 Learner Profile Mapper -- 5.6 CCA Component Summary -- 6 Using CCA -- 6.1 Setting up Learning Goal -- 6.2 Searching for Matching Learner Profile -- 7 Conclusion -- References -- Author Index
Intro -- Foreword -- Contents -- Contributors -- 1 Business Sustainability Conceptualization -- Abstract -- 1 Introduction -- 2 Business Sustainability-Definitional Paradox -- 3 Evaluation of Definitions -- 4 A Holistic Definition of Business Sustainability -- 5 Key Terms -- 6 Managerial Implications and Industry Applications -- 7 Conclusions -- Appendix -- References -- A Replicated Study on Relationship Between Code Quality and Method Comments -- 1 Introduction -- 2 Methodology -- 2.1 Self-Admitted Technical Debt -- 2.2 Research Questions -- 2.3 Datasets -- 2.4 Target Comment Types -- 2.5 Comments Extraction and Labeling -- 2.6 Fix-Proneness Identification -- 3 Results -- 3.1 Are Files Containing Comments Other Than SATD Comments More Fix-Prone Than Files Without Any Comments? -- 3.2 Are Methods Containing SATD Comments More Fix-Prone Than the Other Methods? Are Methods Containing Comments Other Than SATD Comments More Fix-Prone Than Methods Without Any Comments? -- 3.3 Threats to Validity -- 4 Related Work -- 5 Conclusion -- References -- A Predictive Model for Standardized Test Performance in Michigan Schools -- 1 Introduction -- 2 Related Work -- 3 Data -- 3.1 School Proficiency Percentage -- 3.2 Crime Rate -- 3.3 Education -- 3.4 Income -- 3.5 Class Size -- 3.6 Jobless Rate -- 3.7 Charter Schools &amp -- Big 4 School Districts -- 3.8 Target Variable -- 4 Methodology -- 4.1 Data Cleaning -- 4.2 Modeling -- 4.3 Decision Trees -- 4.4 Logit Regression -- 4.5 Validation -- 5 Experimental Results -- 5.1 Final Model Selection -- 5.2 Model Performance -- 6 Conclusion -- References -- 4 A Development Technique for Mobile Applications Program -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 SPEM and EPF -- 2.2 Masam -- 3 Characteristics of Mobile Applications -- 4 Architecture of Applications Program -- 5 Development Procedure of AppSpec
4.1 High Performance File Access for Cloud Computing -- 4.2 Quick System Rejuvenation for Higher Reliability -- 4.3 Journaling Acceleration -- 4.4 Single-Level Store -- 5 Related Work -- 6 Summary -- References -- 11 How to Build a High Quality Mobile Applications Based on Improved Process -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Process Concepts -- 2.2 Process Definition -- 2.3 Mobile Applications Defect -- 2.4 Impact of Defect -- 2.5 Mobile Development Process Spiral [4] -- 2.6 Mobile Applications Defect Tree Analysis -- 3 How to Apply Improved Process for Quality Mobile Applications -- 3.1 Collecting Defect Data -- 3.2 Questionnaire to Detect Defects -- 3.3 Mobile Applications Data Analysis of Questionnaire to Detect Defects -- 3.3.1 Mobile Applications Hierarchical Decision-Making Structure -- 3.4 Mobile Applications Defect Trigger -- 4 Effectiveness Analysis of Mobile Applications Defect Trigger -- 4.1 Defect Removal Efficiency Analysis on Mobile Applications -- 5 Conclusions -- Acknowledgements -- References -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem -- 1 Introduction -- 2 Preliminaries -- 2.1 Firefly Algorithm -- 2.2 Discrete Firefly Algorithm for TSP -- 2.3 Crossover Operator -- 2.4 Mutation Operator -- 3 Hybrid Discrete Firefly Algorithm for TSP (HDFA) -- 4 Experimental Results -- 5 Conclusion -- References -- 13 Empowering MOOCs Through Course Certifying Agency Framework -- Abstract -- 1 Introduction -- 2 Relevant Works -- 3 Learner Profile Model -- 4 Course Profile Model -- 5 Proposed Framework Components -- 5.1 Virtuoso RDF Triple Store -- 5.2 Course Profiler -- 5.2.1 Access of MOOC Provider Course Listings via RESTful API -- 5.2.2 Parsing HTML of MOOC Course Search -- 5.3 Course Profile Mapper -- 5.3.1 Mapping to Triples Format -- 5.3.2 Insert Mapped RDF Triples in Triple Store
5.1 Development Phases -- 5.2 Graphic Notations -- 5.3 Diagrams -- 6 Application Example: An Application for Ordering a Menu at Inverse-Auction -- 7 Comparison with Related Works -- 7.1 Development Process -- 7.2 Specification Method -- 8 Conclusions -- Acknowledgements -- References -- 5 Interactive Mobile Applications Development Using Adapting Component Model -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Adapting Component Based Mobile Applications Development -- 2.2 CBD Process for Mobile Applications -- 2.2.1 Component Interfaces -- 3 Design of Interactive Mobile Applications Development Using Adapting Component Model -- 3.1 Interactive Mobile Applications Development Using Adapting Component Model -- 3.2 Components and Variation Points -- 3.3 Adapting Component Model with Interactive Mobile Applications Development -- 3.4 Implementation of Adapting Component Model with Interactive Mobile Applications Development -- 3.5 Dynamic Composition -- 4 Conclusions -- Acknowledgements -- References -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- 1 Introduction -- 1.1 Present Situation of the Visually Impaired People -- 1.2 Problems of the Conventional Walking Support Tools -- 1.3 Robotize Walking Support Tool -- 2 Related Work -- 3 Proposed Method -- 3.1 Drive Unit -- 3.2 Input Unit -- 3.3 Determination of the Motor Output -- 3.4 Obstacle Detection Unit -- 3.5 Stairs Sensor -- 3.6 Navigation Unit -- 3.7 The Length and the Weight -- 3.8 Human Interface -- 4 Experiment -- 5 Conclusion -- References -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- 1 Introduction -- 2 Interactive Evolutionary Computation (IEC) -- 2.1 Interactive Genetic Algorithm (IGA) -- 2.2 Interactive Differential Evolution (IDE)
Title Applied Computing and Information Technology
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5595943
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319514727
Volume 695
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagXejCW5SXIsQGRs3DsTMwQFVUVcCAStUtsi8OQqBWIikDv55L6jzaMgCL1TqS6-Rrzt-d7_MRcg4QiExkTX3uRxT5v6ZBJwYadwRAHCsFKtMOPzz6_WdvMGbjSn-fq0tSdQVfP-pK_oMq9iGumUr2D8iWg2IHfkZ8sUWEsV0iv-VXk1psuCPkNRkKnaE5BDVHNF0JmZuUm6fpi0nIzaaok2uTSXhhEtJnaREefK2d1lkPDtjeUnCgCA4uOI0uvnVIk7hJJzVW0J_XulyxqPUkilzwxNABpJ1q-SiT-mpDO3ydrHOOFqd50xvcj6qol8je-KzWVjkLPj8GqZpVsfdsjv9d-NkWacnkDc0_Lg1psrJ-5qRguEWaOlOKbJM1Pdkhm0V9DMuYy11yaWCySpgshMmqwWRVMO2R0V1v2O1TU52CSsa4x6jUHNljEINES6aliJiHvlnkRDaHSKhYCiYAOx3oQCBtV_iKO8pWvge2inzl7pPGZDrRB8RiEHHJvYxvYaslkkYV29IR6C4LCJw2Oavddvj5nu-kJ-HCI28Tq3gaYX7dpPeGvdsu-o0s8NzD34xzRDaqv9IxaaQfM32CzCtVpwbObxiCKos
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Applied+computing+and+information+technology&rft.au=Lee%2C+Roger&rft.series=Studies+in+computational+intelligence&rft.date=2014-01-01&rft.pub=Springer&rft.isbn=9783319514710&rft.volume=695&rft_id=info:doi/10.1007%2F978-3-319-05717-0&rft.externalDocID=9783319514727
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833195%2F9783319514727.jpg