With the progress of technology and the rapid development of industry, the urban traffic of China has a tendency to blowout. The growing problem of urban traffic congestion has become an important factor which restric...
详细信息
ISBN:
(纸本)9783319459394;9783319459400
With the progress of technology and the rapid development of industry, the urban traffic of China has a tendency to blowout. The growing problem of urban traffic congestion has become an important factor which restricts the further development of urban economy. At present, Chinese urban traffic congestion is widespread, but governance of traffic problems is lagging behind. This paper starts with phenomenon of urban traffic congestion, analyzes the present situation, reasons and effects of urban traffic congestion. Taking Wuhan city as an example, by constructing a causal relationship diagram of urban traffic system, using the principle and method of system dynamics to establish a simulation model for governing the urban traffic congestion, this paper in view of system to comprehensively analyzes the causal relationship between the variables that impact of urban traffic congestion, and puts forward the countermeasures and suggestions which provide a reference for the governance of urban traffic congestion problems to solve the traffic congestion problem in Wuhan.
Integration of microgrid to grid and utilization of microgrid to share a significant load has brought revolution in the field of inverter control strategies. Modern power electronic inverters are expected to be equipp...
详细信息
ISBN:
(纸本)9789380544199
Integration of microgrid to grid and utilization of microgrid to share a significant load has brought revolution in the field of inverter control strategies. Modern power electronic inverters are expected to be equipped with parallel operation capabilities along with load sharing control design. This paper analyzes different control strategies to improve the operation of hybrid power system PV-diesel generator-battery plant. The four control strategies are proposed according to primary and secondary control of frequency. Each control strategy analyzed according to two criterions: the frequency deviations and the performance of the diesel *** are done in DigSILENT Power Factory.
The important aspect of information gathering is to know what people think about particular topic. With the growth of IT and internet, resource of opinion-rich text goes on increasing and thus the importance of text c...
详细信息
ISBN:
(纸本)9783319303482;9783319303475
The important aspect of information gathering is to know what people think about particular topic. With the growth of IT and internet, resource of opinion-rich text goes on increasing and thus the importance of text classification is increased in order to determine opinion about a subject. The main goal of sentiment analysis is to define sentiment or polarity of a sentence or a piece of text. Polarity means to check whether a particular piece text is positive, negative or neutral. The goal is to extract useful data and present it in a clear way so that one can get a general idea about people's opinions. While doing Text analytics on posts or tweets obtained from social networking site, along with text some useful information is available know as Side Data. Such side data may be found in the form of access behavior of user from web logs, referred links to sites, special symbols, emotions, etc. This side data is helpful in predicting the polarity of the text. Further, the process of classification can be done using SparkR to improve processing speed and to analyze huge amount of data.
The tsunami of internet-of-Things and mobile applications for healthcare is giving hackers an easy way to burrow deeper into our lives as never before. In this paper we argue that this security disaster is mainly due ...
详细信息
ISBN:
(纸本)9783319512341;9783319512334
The tsunami of internet-of-Things and mobile applications for healthcare is giving hackers an easy way to burrow deeper into our lives as never before. In this paper we argue that this security disaster is mainly due to a lack of consideration by the healthcare IT industry in security and privacy issues. By means of a representative healthcare mobile app, we analyse the main vulnerabilities that eHealth applications should deal with in order to protect user data and related privacy.
A software framework is a reusable design that requires various software components to function, almost out of the box. To specify a framework, the creator must specify the different components that form the framework...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
A software framework is a reusable design that requires various software components to function, almost out of the box. To specify a framework, the creator must specify the different components that form the framework and how to instantiate them. Also, the communication interfaces between these various components must be defined. In this paper, we propose such a framework based on the internet of Things (IoT) for developing applications for handling emergencies of some kind. We demonstrate the usage of our framework by explaining an application developed using it. The application is a system for tracking the status of autistic students in a school and also for alerting their parents/care takers in case of an emergency.
The number of connected devices is growing continuously, and so is their presence into our everyday lives. From GPS-enabled fitness trackers, to smart fridges that tell us what we need to buy at the grocery store, con...
详细信息
App Inventor has long been a friendly user interface to compose app on Android based phones. However, in an IoT (internet of Things) enabled environment, composing a service via heterogonous and distributed smart thin...
详细信息
ISBN:
(纸本)9781509020737
App Inventor has long been a friendly user interface to compose app on Android based phones. However, in an IoT (internet of Things) enabled environment, composing a service via heterogonous and distributed smart things becomes an important and challenging issue. In this end, this study prototypes the IoT Inventor, a web-enabled integration platform with a friendly composer for regular users to build personalized services using IoT-enabled smart things to form temporally reconfigurable agents. We also constructed two services to demonstrate the easiness and friendliness of this platform.
In this work, we propose a framework for a Virtual Machine Monitor (VMM)-based Anomaly Detection System (ADS). This framework uses a sequence-based analysis Hidden Markov Model (HMM) on static probe instrumentation da...
详细信息
ISBN:
(纸本)9781509009466
In this work, we propose a framework for a Virtual Machine Monitor (VMM)-based Anomaly Detection System (ADS). This framework uses a sequence-based analysis Hidden Markov Model (HMM) on static probe instrumentation data collected within the VMM. Long observations are split into multiple, uniformed-length, small sequences. The list of likelihood score of sequences in the new observation is compared to a reference list of likelihood scores created from a normal scenario dataset. Statistical distance values from both lists are used to predict the new observation anomaly status. We evaluated the effectiveness of the approach over multiple statistical distance measures and multiple sequence lengths. We also compared our sequence-based analysis results with a frequency-based analysis results that used the One-Class Support Vector Machine (OCSVM). The results show that the HMM sequence-based analysis can distinguish normal datasets from anomalous datasets better than the OC-SVM frequency-based analysis.
University of Lampung (Unila) as an academic institution should provide the internet service for thousands of users, monitoring the condition of electricity (Voltage, Current, Power factor, Power, and Energy consumpti...
详细信息
ISBN:
(纸本)9781509016488
University of Lampung (Unila) as an academic institution should provide the internet service for thousands of users, monitoring the condition of electricity (Voltage, Current, Power factor, Power, and Energy consumption measurement) at ICT center building has an important role, as a part of maintenance lifecycle to make sure the internet services running well, system monitoring implemented in order to know the quality of electricity supply in the system, identifying disruption events, and to calculate the amount of electrical energy usage periodically. In this research we made an application to monitor the electrical quantities in real time, and shown the statistic reports through web interface. This research was conducted on the 3-Phase electricity network at ICT center building Unila. Monitoring of voltage was done by using a step-down transformator as voltage sensor, and Current Transformer SCT-013 100A as current sensor. Energy, Power, and Power Factor value was obtained by some of scientific calculation. Python programming language was used to develop the application, mainly for data acquisition and calculation that run on BCM2835 Embedded Single Board Computer. The result of this research shown that energy consumption for each Phase was not in balance, 1st and 2nd Phase mostly high load during working hours only, while 3rd Phase energy consumption relatively stable at all time, this happen because 3rd Phase connected to Data Center which consist of several server and network equipment that always online for 24 hours.
The proceedings contain 47 papers. The topics discussed include: active magnetic bearing system using PID-surface sliding mode control;optimal design of LED street lighting with road conditions;implementation of an in...
ISBN:
(纸本)9781509010936
The proceedings contain 47 papers. The topics discussed include: active magnetic bearing system using PID-surface sliding mode control;optimal design of LED street lighting with road conditions;implementation of an integrated mobile solar power monitoring system for images and battery parameters;a genetic rough set approach to fuzzy time-series prediction;a rough set approach to data imputation and its application to a dissolved gas analysis dataset;robot partner technology based on information support system for elderly people and their family;safety live environment enhancement for older adult by using the behavior prediction model;an interactive upper-limb post-stroke rehabilitation system integrating BCI-based attention monitoring and virtual reality feedback;information dilution: granule-based information hiding in table data - a case of lenses data set in UCI machine learning repository;cryptanalysis and improvement of a provable data possession scheme in public cloud storage;enhancing internet networks confidentiality based on composite coding and channels coding schemes of signatures reconfiguration;speech recognition in a multi-speaker environment by using hidden Markov model and MEL-frequency approach;a new method for identifying users interest for personalized recommendations;a novel harmonic field based method for femoral head segmentation from challenging ct data;design of a sun tracking system based on the brightest point in sky image;food texture classification using magnetic sensor and principal component analysis;action recognition system with the Microsoft Kinect V2 using a hidden Markov model;and using house of dynamic wants to discovery the competency of religious lecturer - an example of I-Kuan Ta in the central region of Taiwan.
暂无评论