the proceedings contain 20 papers. the topics discussed include: how to make tasks faster: revealing the complex interactions of tasks in the memory system;combining visual and textual languages for dyslexia;genetic i...
ISBN:
(纸本)9781450355148
the proceedings contain 20 papers. the topics discussed include: how to make tasks faster: revealing the complex interactions of tasks in the memory system;combining visual and textual languages for dyslexia;genetic improvement in code interpreters and compilers;simulation-based code duplication for enhancing compiler optimizations;advanced debugging techniques to identify concurrency bugs in actor-based programs;framework support for usability evaluation of domain-specific languages;understanding the interplay between task scheduling, memory and performance;computer-assisted specification of asynchronous interfaces with non-deterministic behavior;verifying the proxy design pattern using object propositions;ZenSheet Studio: a spreadsheet-inspired environment for reactive computing;how are programming questions from women received on stack overflow? a case study of peer parity;devirtualization in LLVM;Principles, patterns, and techniques for designing and implementing practical fluent interfaces in Java;SmartJS: dynamic and self-adaptable runtime middleware for next-generation IoT systems;incremental parametric syntax for multi-language transformation;and QuixBugs: a multi-lingual program repair benchmark set based on the Quixey challenge.
the proceedings contain 28 papers. the special focus in this conference is on Model and Data Engineering. the topics include: Modeling and evaluating cross-layer elasticity strategies in cloud systems;thing federation...
ISBN:
(纸本)9783030008550
the proceedings contain 28 papers. the special focus in this conference is on Model and Data Engineering. the topics include: Modeling and evaluating cross-layer elasticity strategies in cloud systems;thing federation as a service: Foundations and demonstration;formalizing reusable communication models for distributed systems architecture;A valid BPMN extension for supporting security requirements based on cyber security ontology;a correct-by-construction model for attribute-based access control;voronoi-diagram based partitioning for distance join query processing in spatialhadoop;graph pattern matching preserving label-repetition constraints;standard and dialectal arabic text classification for sentiment analysis;a graph-based model for tag recommendations in clinical decision support system;NoSQL databases – seek for a design methodology;Spatial batch-queries processing using xBR+-trees in Solid-State Drives;Formalizing railway signaling system ERTMS/ETCS using UML/Event-B;A dynamic analysis for reverse engineering of sequence diagram using CPN;A formalized procedure for database horizontal fragmentation in isabelle/HOL proof assistant;domain-oriented verification management;a formal model for interaction specification and analysis in IoT applications;mechanizing the denotational semantics of the clock constraint specification language;ensuring the functional correctness of iot through formal modeling and verification;extensions to hybrid event-B to support concurrency in cyber-physical systems;Mortadelo: A model-driven framework for NoSQL database design;Towards onto UML for software engineering: Experimental evaluation of exclusivity constraints in relational databases;scrum and V lifecycle combined with model-based testing and model driven architecture to deal with evolutionary system issues;Adaptive algorithms for computing ontologies metrics through processing of RDF graphs.
this volume presents 70 carefully selected papers from a major joint event: the 8thinternationalconference on Soft computing and patternrecognition (SoCPaR 2016) and the 8thinternationalconference on Computationa...
ISBN:
(纸本)9783319606187;3319606182;9783319606170
this volume presents 70 carefully selected papers from a major joint event: the 8thinternationalconference on Soft computing and patternrecognition (SoCPaR 2016) and the 8thinternationalconference on Computational Aspects of Social Networks (CASoN 2016). SoCPaRCASoN 2016, which was organized by the Machine Intelligence Research Labs (MIR Labs), USA and Vellore Institute of Technology (VIT), India and held at the VIT on December 1921, 2016. It brings together researchers and practitioners from academia and industry to share their experiences and exchange new ideas on all interdisciplinary areas of soft computing and patternrecognition, as well as intelligent methods applied to social networks. this book is a valuable resource for practicing engineers/scientists and researchers working in the field of soft computing, patternrecognition and social networks.
One of the fundamental tasks of patternrecognition is pattern matching. It is the act of checking for presence of a pattern's constituents within token image to have exact match. For that, most distinctive fiduci...
详细信息
ISBN:
(纸本)9781509030385
One of the fundamental tasks of patternrecognition is pattern matching. It is the act of checking for presence of a pattern's constituents within token image to have exact match. For that, most distinctive fiducial features of pattern have to be assessed and searched in the sliding windows of same pattern size formed by logically dividing the token scene image. As huge numbers of sliding windows are to be checked withpattern, pattern matching process should be time efficient and to increase pattern matching accuracy impacts due to illumination, resolution, occlusion and pose variation must be reduced. For pattern matching, this paper presents a novel local feature descriptor, multi variant symmetric local graph structure (MVSLGS) taking into account symmetric local graph structure (SLGS) as precedent approach. the computational adequacy of the proposed approach is tested on two publicly available databases with high matching accuracy, showing its proficiency over the process of pattern matching.
this book constitutes the refereed proceedings of the 6th IFIP TC 5 internationalconference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. the 56 full papers presen...
ISBN:
(数字)9783319897431
ISBN:
(纸本)9783319897424
this book constitutes the refereed proceedings of the 6th IFIP TC 5 internationalconference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. the 56 full papers presented were carefully reviewed and selected from 202 submissions. they are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of things (IoT) and decision support systems; patternrecognition and image processing; and semantic web services.
the Modern decade of future Internet stepping into all the technologies includes sensors, artificial intelligence, patternrecognition and machine learning. As sensor technology increases its liabilities by extending ...
详细信息
ISBN:
(纸本)9781509066216
the Modern decade of future Internet stepping into all the technologies includes sensors, artificial intelligence, patternrecognition and machine learning. As sensor technology increases its liabilities by extending to novel recognition methods for identifying an individual. Smell print is a state-of-art technique to perform authentication, verification and validation of a person to apply in fields of human tracking, criminal investigation and canine training etc. this paper describes the compounds combination of human odor, the factors that influence the human odor and sources of smell print in a human body. It gives a prototype for Cogno-detective system for the human odor in order to imitate the human olfaction and procedure to implement the artificial olfaction mechanism.
Variables selection is challenging task due mainly to huge search space. this study addresses the increasingly encountered challenge of variables selection. It addresses the application of machine learning techniques ...
详细信息
Variables selection is challenging task due mainly to huge search space. this study addresses the increasingly encountered challenge of variables selection. It addresses the application of machine learning techniques to the problem of variables selection. We detailed the various models of the variables selection and examined the basic steps that are used to select the cost-effective predictors. We also walked through the initial settings and all variables selection stages, including architecture configuration, strategy generation, learning, model induction, and scoring. Results from this study show that the cost and generalization were seen to improve significantly in terms of computing time and recognition accuracy when the proposed system is applied for medical diagnosis. Good comparisons with an experimental study demonstrate the multidisciplinary applications of our approach. 1877-0509 (C) 2017 the Authors. Published by Elsevier B.V.
the proceedings contain 6 papers. the topics discussed include: dataflow acceleration of Scikit-learn Gaussian process regression;VectorPU: a generic and efficient data-container and component model for transparent da...
ISBN:
(纸本)9781450348775
the proceedings contain 6 papers. the topics discussed include: dataflow acceleration of Scikit-learn Gaussian process regression;VectorPU: a generic and efficient data-container and component model for transparent data transfer on GPU-based heterogeneous systems;using PEGs for automatic extraction of memory access descriptions to support data-parallel patternrecognition;on boosting energy-efficiency of heterogeneous embedded systems via game theory;scaling binarized neural networks on reconfigurable logic;MTP-Caffe: memory, timing, and power aware tool for mapping CNNs to GPUs.
the article presents the problem of parameter value selection of the multiclass "one against all" approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. A...
详细信息
ISBN:
(纸本)9783319472744;9783319472737
the article presents the problem of parameter value selection of the multiclass "one against all" approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary two-class classifiers in recognition problems. In this paper an original method of selecting the parameter values of the assembling algorithm using many similar face recognition tasks is proposed. the parameter optimization is done by checking all possible vectors of parameter values. the recognition results with optimized parameter values is 10% better in 8-class face database famous48 (http://***. pl/documents/176468/27493127/***) tasks than using random heuristic which can be represented by the average of all possible vectors of parameter values.
Smartphones are ubiquitous devices that enable users to perform many of their routine tasks anytime and anywhere. Withthe advancement in information technology, smartphones are now equipped with sensing and networkin...
详细信息
Smartphones are ubiquitous devices that enable users to perform many of their routine tasks anytime and anywhere. Withthe advancement in information technology, smartphones are now equipped with sensing and networking capabilities that provide context-awareness for a wide range of applications. Due to ease of use and access, many users are using smartphones to store their private data, such as personal identifiers and bank account details. this type of sensitive data can be vulnerable if the device gets lost or stolen. the existing methods for securing mobile devices, including passwords, PINs and pattern locks are susceptible to many bouts such as smudge attacks. this paper proposes a novel framework to protect sensitive data on smartphones by identifying smartphone users based on their behavioral traits using smartphone embedded sensors. A series of experiments have been conducted for validating the proposed framework, which demonstrate its effectiveness. (c) 2017 the Authors. Published by Elsevier B.V.
暂无评论