This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were careful...
详细信息
ISBN:
(数字)9783319083261
ISBN:
(纸本)9783319083254
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on complex networks and data stream mining; data mining methods; intelligent systems applications; knowledge representation in databases and systems; textual data analysis and mining; special session: challenges in text mining and semantic information retrieval; special session: warehousing and OLAPing complex, spatial and spatio-temporal data; ISMIS posters.
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programmin...
详细信息
ISBN:
(数字)9798350349740
ISBN:
(纸本)9798350349757
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programming technique could enhance the performance and efficiency for distributed systems and multicore processors as well as the IoT systems. However, parallel computing, presents certain difficulties and constraints, including synchronization, communication, security concerns, and load balancing. In this regard, a novel IoT workload balancing model for heterogeneous IoT architectures is presented in this paper. This model is intended to reduce the execution time of large systems by redistributing part of their functions to other involved IoT nodes. An experiment has been conducted to evaluate the actual real load for each IoT node and tried to rebalance the load using the proposed model. The results were encouraging as the performance time was reduced by about one third on two cores.
We introduce the Riskman ontology & shapes for representing and analysing information about risk management for medical devices. Risk management is concerned with taking necessary precautions so a medical device d...
详细信息
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs...
详细信息
ISBN:
(数字)9798331542634
ISBN:
(纸本)9798331542641
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs by integrating advanced AI capabilities for personalized support and adaptive learning. The platform supports user registration and authentication, course and lesson management, and offers interactive features like AI-driven chat support. In this study, we show the importance of creating user-friendly online learning platforms with the implementation of modern AI trends. The development and testing of this platform is ongoing to determine the adaptation of the system to different learning styles.
Recently, in Mathematical and Computational Applications Journal Chiu et al. [1] and Chen and Chiu [2] propose an inventory model based on EPQ with rework to determine the replenishment lot size and the number of ship...
详细信息
Recently, in Mathematical and Computational Applications Journal Chiu et al. [1] and Chen and Chiu [2] propose an inventory model based on EPQ with rework to determine the replenishment lot size and the number of shipments for a vendor-buyer integrated production-inventory system. They solve the inventory problem by considering both variables as continuous. However, the number of shipments must be considered as discrete variable. In this direction, this paper revisits and solves the inventory problem of [1-2] considering the decision variables according to their nature. Two easy and improved algorithms are proposed which simplify and complement the research works of [1-2].
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, we...
详细信息
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and ...
详细信息
Dominance constraints are logical tree descriptions originating from automata theory that have multiple applications in computational linguistics. The satisfiability problem of dominance constraints is NP-complete. In...
ISBN:
(纸本)9780898714906
Dominance constraints are logical tree descriptions originating from automata theory that have multiple applications in computational linguistics. The satisfiability problem of dominance constraints is NP-complete. In most applications, however, only normal dominance constraints are used. The satisfiability problem of normal dominance constraints can be reduced in linear time to the configuration problem of dominance graphs, as shown recently. In this paper, we give a polynomial time algorithm testing configurability of dominance graphs (and thus satisfiability of normal dominance constraints). Previous to our work no polynomial time algorithms were known.
Results of extensive computational experiments aimed at comparing performance quality (accuracy of an approximate solution and the running time) of the Threshold Accept (TA) approach versus the Simulated Annealing (SA...
详细信息
暂无评论