Applied Computing and Information Technology
This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12-14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepre...
Saved in:
| Main Author | |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Cham
Springer International Publishing AG
2014
Springer |
| Edition | 1 |
| Series | Studies in computational intelligence |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3319514717 9783319514710 |
| DOI | 10.1007/978-3-319-05717-0 |
Cover
Table of Contents:
- 3 System for Experiment -- 3.1 Overview -- 3.2 User Evaluation GUI -- 3.3 Gene Expression -- 4 User Evaluation Prediction Models -- 4.1 Conjoint Analysis -- 4.2 Neural Networks -- 5 User Evaluation Experiment -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Conclusions -- References -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- 1 Introduction -- 2 Facial Feature -- 2.1 Facial Feature Points -- 2.2 Facial Features -- 3 Feature Selection -- 4 Facial Expression Recognition -- 5 Emotional Scene Detection -- 6 Experiment -- 6.1 Experimental Settings -- 6.2 Experimental Result -- 7 Consideration -- 8 Conclusion -- References -- 9 Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 3 Research Objectives and Methodology -- 3.1 Research Objectives -- 3.1.1 Defining Threat Intelligence and Its Scope -- 3.1.2 Proposing an Innovative Method to Prevent DDoS Attacks in the Cloud Environment -- 3.1.3 Introducing New Proactive Approach to Defend Threats Related to DDoS Attack -- 3.1.4 Designing a Multilayer System for DDoS Prevention in the Cloud Using Threat Intelligence Techniques -- 3.1.5 Introducing an Improved Method of IP Traceback -- 3.1.6 Introducing Our Own Simple and Effective Port-Hopping Method -- 3.1.7 Experimental Confirmation of the Effectiveness of Our Method -- 3.2 Methodology -- 3.2.1 Layer 1 -- 3.2.2 Layer 2 -- 3.2.3 Layer 3 -- 3.2.4 Layer 4 -- 3.2.5 Layer 5 -- 4 Experiments -- 5 Conclusions -- References -- Practical Uses of Memory Storage Extension -- 1 Introduction -- 2 Background -- 2.1 Block Device Driver Layer and Its Execution Overhead -- 2.2 The Existing Method to Combine Block Storage Devices and Its Problems to Be Used with Memory Storage -- 3 MSX: Memory Storage Extension -- 4 Practical Uses of MSX
- 5.4 Learner Profiler -- 5.5 Learner Profile Mapper -- 5.6 CCA Component Summary -- 6 Using CCA -- 6.1 Setting up Learning Goal -- 6.2 Searching for Matching Learner Profile -- 7 Conclusion -- References -- Author Index
- Intro -- Foreword -- Contents -- Contributors -- 1 Business Sustainability Conceptualization -- Abstract -- 1 Introduction -- 2 Business Sustainability-Definitional Paradox -- 3 Evaluation of Definitions -- 4 A Holistic Definition of Business Sustainability -- 5 Key Terms -- 6 Managerial Implications and Industry Applications -- 7 Conclusions -- Appendix -- References -- A Replicated Study on Relationship Between Code Quality and Method Comments -- 1 Introduction -- 2 Methodology -- 2.1 Self-Admitted Technical Debt -- 2.2 Research Questions -- 2.3 Datasets -- 2.4 Target Comment Types -- 2.5 Comments Extraction and Labeling -- 2.6 Fix-Proneness Identification -- 3 Results -- 3.1 Are Files Containing Comments Other Than SATD Comments More Fix-Prone Than Files Without Any Comments? -- 3.2 Are Methods Containing SATD Comments More Fix-Prone Than the Other Methods? Are Methods Containing Comments Other Than SATD Comments More Fix-Prone Than Methods Without Any Comments? -- 3.3 Threats to Validity -- 4 Related Work -- 5 Conclusion -- References -- A Predictive Model for Standardized Test Performance in Michigan Schools -- 1 Introduction -- 2 Related Work -- 3 Data -- 3.1 School Proficiency Percentage -- 3.2 Crime Rate -- 3.3 Education -- 3.4 Income -- 3.5 Class Size -- 3.6 Jobless Rate -- 3.7 Charter Schools & -- Big 4 School Districts -- 3.8 Target Variable -- 4 Methodology -- 4.1 Data Cleaning -- 4.2 Modeling -- 4.3 Decision Trees -- 4.4 Logit Regression -- 4.5 Validation -- 5 Experimental Results -- 5.1 Final Model Selection -- 5.2 Model Performance -- 6 Conclusion -- References -- 4 A Development Technique for Mobile Applications Program -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 SPEM and EPF -- 2.2 Masam -- 3 Characteristics of Mobile Applications -- 4 Architecture of Applications Program -- 5 Development Procedure of AppSpec
- 4.1 High Performance File Access for Cloud Computing -- 4.2 Quick System Rejuvenation for Higher Reliability -- 4.3 Journaling Acceleration -- 4.4 Single-Level Store -- 5 Related Work -- 6 Summary -- References -- 11 How to Build a High Quality Mobile Applications Based on Improved Process -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Process Concepts -- 2.2 Process Definition -- 2.3 Mobile Applications Defect -- 2.4 Impact of Defect -- 2.5 Mobile Development Process Spiral [4] -- 2.6 Mobile Applications Defect Tree Analysis -- 3 How to Apply Improved Process for Quality Mobile Applications -- 3.1 Collecting Defect Data -- 3.2 Questionnaire to Detect Defects -- 3.3 Mobile Applications Data Analysis of Questionnaire to Detect Defects -- 3.3.1 Mobile Applications Hierarchical Decision-Making Structure -- 3.4 Mobile Applications Defect Trigger -- 4 Effectiveness Analysis of Mobile Applications Defect Trigger -- 4.1 Defect Removal Efficiency Analysis on Mobile Applications -- 5 Conclusions -- Acknowledgements -- References -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem -- 1 Introduction -- 2 Preliminaries -- 2.1 Firefly Algorithm -- 2.2 Discrete Firefly Algorithm for TSP -- 2.3 Crossover Operator -- 2.4 Mutation Operator -- 3 Hybrid Discrete Firefly Algorithm for TSP (HDFA) -- 4 Experimental Results -- 5 Conclusion -- References -- 13 Empowering MOOCs Through Course Certifying Agency Framework -- Abstract -- 1 Introduction -- 2 Relevant Works -- 3 Learner Profile Model -- 4 Course Profile Model -- 5 Proposed Framework Components -- 5.1 Virtuoso RDF Triple Store -- 5.2 Course Profiler -- 5.2.1 Access of MOOC Provider Course Listings via RESTful API -- 5.2.2 Parsing HTML of MOOC Course Search -- 5.3 Course Profile Mapper -- 5.3.1 Mapping to Triples Format -- 5.3.2 Insert Mapped RDF Triples in Triple Store
- 5.1 Development Phases -- 5.2 Graphic Notations -- 5.3 Diagrams -- 6 Application Example: An Application for Ordering a Menu at Inverse-Auction -- 7 Comparison with Related Works -- 7.1 Development Process -- 7.2 Specification Method -- 8 Conclusions -- Acknowledgements -- References -- 5 Interactive Mobile Applications Development Using Adapting Component Model -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Adapting Component Based Mobile Applications Development -- 2.2 CBD Process for Mobile Applications -- 2.2.1 Component Interfaces -- 3 Design of Interactive Mobile Applications Development Using Adapting Component Model -- 3.1 Interactive Mobile Applications Development Using Adapting Component Model -- 3.2 Components and Variation Points -- 3.3 Adapting Component Model with Interactive Mobile Applications Development -- 3.4 Implementation of Adapting Component Model with Interactive Mobile Applications Development -- 3.5 Dynamic Composition -- 4 Conclusions -- Acknowledgements -- References -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- 1 Introduction -- 1.1 Present Situation of the Visually Impaired People -- 1.2 Problems of the Conventional Walking Support Tools -- 1.3 Robotize Walking Support Tool -- 2 Related Work -- 3 Proposed Method -- 3.1 Drive Unit -- 3.2 Input Unit -- 3.3 Determination of the Motor Output -- 3.4 Obstacle Detection Unit -- 3.5 Stairs Sensor -- 3.6 Navigation Unit -- 3.7 The Length and the Weight -- 3.8 Human Interface -- 4 Experiment -- 5 Conclusion -- References -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- 1 Introduction -- 2 Interactive Evolutionary Computation (IEC) -- 2.1 Interactive Genetic Algorithm (IGA) -- 2.2 Interactive Differential Evolution (IDE)