The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation conference, AsiaSim 2012, and the Internati...
ISBN:
(数字)9783642343872
ISBN:
(纸本)9783642343865
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation conference, AsiaSim 2012, and the International conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.
When a cyber-security event occurs, a person has to answer the following questions: what events are happening;where are the events occurring;and how much damage has occurred or will occur. This paper recommends a cybe...
详细信息
ISBN:
(纸本)9780769550145;9781479902194
When a cyber-security event occurs, a person has to answer the following questions: what events are happening;where are the events occurring;and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system that provides correlation of time-series event data, a visual representation of the security events, and gives a predictive forecast of potential events based on known environmental states. The rationale for this comes from the need to have an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. Thus, it can potentially provide an early warning so that events or storms can be proactively mitigated. In addition, it can help in making business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make up.
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation conference, AsiaSim 2012, and the Internati...
ISBN:
(数字)9783642343964
ISBN:
(纸本)9783642343957
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation conference, AsiaSim 2012, and the International conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.
The medial and lateral meniscus of the knee is a crescent shaped cartilage pad between the femur and the tibia bones of knee joint. The meniscus acts as a smooth surface for the joint to move on. It helps in distribut...
详细信息
The MSV project aims to survey current best practice in multiscale visualisation and to construct a software toolkit which will make multiscale techniques readily accessible to biomedical researchers and clinicians. I...
详细信息
This paper presents a novel visual analytics technique that enables effective analysis of large and complex genomic and biomedical data. A comprehensive prototype has been developed to support the analysis process The...
详细信息
Visualizing narrative medical events into a timeline can have positive effects on clinical environments. However, the characteristics of natural language and medical environments make this representation more difficul...
详细信息
ISBN:
(纸本)9781450310154
Visualizing narrative medical events into a timeline can have positive effects on clinical environments. However, the characteristics of natural language and medical environments make this representation more difficult. This paper explains the obstacles and suggests a solution called the V-Model. The V-Model is a new innovative time model that was developed to represent chronological narrative events in a medical domain. Forty medical students participated in evaluating this model. The experimental results show the new model successfully solved the modeling requirements and had better usability compared to conventional timeline models. All the participants assessed the new timeline as very useful in effectively understanding a patient's history. Copyright 2012 ACM.
Direct Volume Rendering of Finite Element models is challenging since the visualisation process is performed in world coordinates, whereas data fields are usually defined over the elements' material coordinate sys...
详细信息
As the growing of computing capability, handy mobile devices are used to explore and deal with medical images. More and more attention was paid on remote accessing to picture archiving and communication system (PACS)....
详细信息
Existing molecular visualizations do a good job of illuminating well-defined structures, but are ill-suited to visualizing subtle organization when the data is almost entirely disordered. We introduce a process to exp...
详细信息
ISBN:
(纸本)9781467354950
Existing molecular visualizations do a good job of illuminating well-defined structures, but are ill-suited to visualizing subtle organization when the data is almost entirely disordered. We introduce a process to explore these subtle structures by visualizing an abstraction of the data. The process includes a quantitative verification step to mitigate the ambiguity induced by abstraction. We perform a case study using molecular dynamics simulation data of bulk water to demonstrate the efficacy of our process. The visualized abstractions show molecular behaviors which only happen amongst aggregates, and which would be occluded or indiscernible in a direct visualization. The effect is shown across multiple data sets with different temporal and thermal parameters. In conjunction with domain experts from the Chemistry department who performed the simulation, we confirm our observations using the quantitative verification step of our process.
暂无评论