ebook img

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing PDF

199 Pages·2015·8.941 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

Studies in Computational Intelligence 569 Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Studies in Computational Intelligence Volume 569 Serieseditor JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland e-mail:[email protected] AboutthisSeries The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand withahighquality.Theintentistocoverthetheory,applications,anddesignmeth- odsof computationalintelligence,as embeddedin the fields of engineering,com- puterscience,physicsandlifesciences,aswellasthemethodologiesbehindthem. Theseriescontainsmonographs,lecturenotesandeditedvolumesincomputational intelligence spanningthe areas of neuralnetworks, connectionistsystems, genetic algorithms,evolutionarycomputation,artificialintelligence,cellularautomata,self- organizingsystems,softcomputing,fuzzysystems,andhybridintelligentsystems. Ofparticularvaluetoboththecontributorsandthereadershiparetheshortpublica- tiontimeframeandtheworld-widedistribution,whichenablebothwideandrapid disseminationofresearchoutput. Moreinformationaboutthisseriesathttp://www.springer.com/series/7092 Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing ABC Editor RogerLee SoftwareEngineering&Information TechnologyInstitute CentralMichiganUniversity USA ISSN1860-949X ISSN1860-9503 (electronic) ISBN978-3-319-10388-4 ISBN978-3-319-10389-1 (eBook) DOI10.1007/978-3-319-10389-1 LibraryofCongressControlNumber:2014949172 SpringerChamHeidelbergNewYorkDordrechtLondon (cid:2)c SpringerInternationalPublishingSwitzerland2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’slocation,initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer. PermissionsforusemaybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violations areliabletoprosecutionundertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpub- lication,neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforany errorsoromissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespect tothematerialcontainedherein. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The purpose of the 15th IEEE/ACIS International Conference on Software En- gineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2014)heldonJune30–July2,2014inLasVegasNevada,USA,isaimedat bringingtogetherresearchersandscientists,businessmenandentrepreneurs,teach- ers and students to discuss the numerousfields of computer science, and to share ideas and information in a meaningful way. This publication captures 13 of the conference’smostpromisingpapers,andweimpatientlyawaittheimportantcontri- butionsthatweknowtheseauthorswillbringtothefield. Inchapter1,JunpingSong,HaiboWang,PinLv,ShangzhouLi,andMengluXu proposeadataminingbasedpublish/subscribesystem(DMPSS).Theexperimental results show that DMPSS realizes even matching load distribution, and it reduces theoverheadformessagetransmissionandlatencydramatically. In chapter 2, Umme Habiba,Rahat Masoodand MuhammadAwais Shiblipro- pose a secure identity managementsystem for federated Cloud environmentsthat not only ensures the secure managementof identity credentials, but preservesthe privacy of Cloud Service Consumers (CSC) also. The results of their evaluation certifythatthepresentedworkensuresthedesiredfeaturesandlevelofsecurityas expectedfrom a secure identity managementsystem for federatedCloud environ- ment. Inchapter3,AbdulmohsenAl-Thubaity,MuneeraAlhoshan,andItisamHazzaa conductedstudies on the effectof using word N-grams(N consecutivewords) on ATCaccuracy.Theirresultsshowthattheuseofsinglewordsasafeatureprovides greaterclassificationaccuracy(CA)forATCcomparedtoN-grams. Inchapter4,MohammadHadiValipour,KhashayarNikiMalekiandSaeedShiry Ghidary propose a new approach in order to control unstable systems or systems withunstableequilibrium.Evaluationmeasuresinsimulationresultsshowtheim- provementof error reduction and more robustness than a basic tuned double-PID controllerforthistask. Inchapter5,YaduGautam,CarlLee,Chin-ICheng,andCarlLangefeldstudy the performanceofthe MiDCoPapproachusing associationanalysisbasedonthe VI Preface imputedallele frequen-cyby analyzingthe GAIN Schizophreniadata. The results indicatethatthechoiceofreferencesetshasstrongimpactontheperformance. Inchapter6,SoumyaSahaandLiffordMcLauchlanproposeanapproachtocon- struct weighted minimum spanning tree in wireless sensor networks. Simulation resultsdemonstratesignificantimprovementforbothloadbalancingandnumberof messagedeliveriesafterimplementationoftheproposedalgorithm. In chapter 7, Taku Jiromaru, Tetsuo Kosaka, and Tokuro Matsuo collected an- swersofeachlearn-erforknowingelementofdifficultylevelinMathematics,and identified10types. In chapter 8, Lifeng Zhang, Akira Yamawaki and Seiichi Serikawa propose an approachto identifyand exter-minatea specialized invasivealien fish species, the blackbass.Simulationresultshowsareasonablepossibilityforidentifyablackbass fromotherfishspecies. In chapter 9, Nermin Kajtazovic, Christopher Preschern, Andrea Holler and Christian Kreiner present a novel approach for verification of compositions for safety-critical systems, based on data semantics of components. They show that CSPcanbesuccessfullyappliedforverificationofcompositionsformanytypesof properties. In chapter 10, Mitsuo Wakatsuki, Etsuji Tomita, and Tetsuro Nishino study a subclassofdeterministicpushdowntransducers,calleddeterministicrestrictedone- countertransducers(droct’s),andstudiestheequivalenceproblemfordroct’swhich acceptbyfinalstate. Inchapter11,HirokiNomiya,AtsushiMorikuni,andTeruhisaHochinproposea emotionalscenedetectioninordertoretrieveimpressivescenesfromlifelogvideos. The detection performance of the proposed method is evaluated through an emo- tionalscenedetectionexperiment. Inchapter12,TakafumiNakanishipresentsanewknowledgeextractionmethod onBigDataEra.Inthispaper,heespeciallyfocusonanaspectofheterogeneity.He discoversacorrelationinconsiderationofthecontinuityoftime. In chapter 13, Golnoush Abaei and Ali Selamat propose a new method is pro- posed to increase the accuracy of fault prediction based on fuzzy clustering and majorityranking.The resultsshow thattheir systemscan be used to guidetesting effortbyprioritizingthemodule’sfaultsinordertoimprovethequalityofsoftware developmentandsoftwaretestinginalimitedtimeandbudget. Itisoursincerehopethatthisvolumeprovidesstimulationandinspiration,and thatitwillbeusedasafoundationforworkstocome. GuestEditors June2014 JuYeonJo UniversityofNevada-LasVegas,U.S.A SatoshiTakahashi UniversityofElectro-Communications,Japan Contents A DataMining BasedPublish/Subscribe SystemoverStructured Peer-to-PeerNetworks .......................................... 1 JunpingSong,HaiboWang,PinLv,ShangzhouLi,MengluXu Secure Identity Management System for Federated Cloud Environment .................................................. 17 UmmeHabiba,RahatMasood,MuhammadAwaisShibli UsingWordN-GramsasFeaturesinArabicTextClassification ........ 35 AbdulmohsenAl-Thubaity,MuneeraAlhoshan,ItisamHazzaa OptimizationofEmotionalLearningApproachtoControlSystems withUnstableEquilibrium....................................... 45 MohammadHadiValipour,KhashayarNikiMaleki,SaeedShiryGhidary AnEvaluationoftheMiDCoPMethodforImputingAlleleFrequency inGenomeWideAssociationStudies .............................. 57 YaduGautam,CarlLee,Chin-ICheng,CarlLangefeld AnApproachtoConstructWeightedMinimum SpanningTreein WirelessSensorNetworks ....................................... 69 SoumyaSaha,LiffordMcLauchlan ElementsofDifficultyLevelinMathematics ........................ 85 TakuJiromaru,TetsuoKosaka,TokuroMatsuo IdentifyaSpecifiedFishSpeciesbytheCo-occurrenceMatrixand AdaBoost ..................................................... 99 LifengZhang,AkiraYamawaki,SeiichiSerikawa VIII Contents Constraint-BasedVerificationof Compositionsin Safety-Critical Component-BasedSystems ...................................... 113 Nermin Kajtazovic, Christopher Preschern, Andrea Höller, ChristianKreiner A Polynomial-TimeAlgorithmfor Checking the Equivalence of DeterministicRestrictedOne-CounterTransducersWhichAcceptby FinalState .................................................... 131 MitsuoWakatsuki,EtsujiTomita,TetsuroNishino AnUnsupervisedEnsembleApproachforEmotionalSceneDetection fromLifelogVideos............................................. 145 HirokiNomiya,AtsushiMorikuni,TeruhisaHochin ADiscoveryMethodofAnteroposteriorCorrelationforBig Data Era .......................................................... 161 TakafumiNakanishi IncreasingtheAccuracyofSoftwareFaultPredictionUsingMajority RankingFuzzyClustering ....................................... 179 GolnoushAbaei,AliSelamat AuthorIndex ..................................................... 195 List of Contributors GolnoushAbaei TeruhisaHochin UniversityTechnologyMalaysia, KyotoInstituteofTechnology,Japan Malaysia [email protected] [email protected] AndreaHoller AbdulmohsenAl-Thubaity GrazUniversityofTechnology,Austria KACST,SaudiArabia [email protected] [email protected] TakuJiromaru YamagataUniversity,Japan MuneeraAlhoshan [email protected] KACST,SaudiArabia [email protected] NerminKajtazovic GrazUniversityofTechnology,Austria Chin-ICheng [email protected] CentralMichiganUniversity,USA [email protected] TetsuoKosaka YamagataUniversity,Japan YaduGautam [email protected] CentralMichiganUniversity,USA [email protected] ChristianKreiner GrazUniversityofTechnology,Austria UmmeHabiba [email protected] SchoolofElectricalEngineeringand ComputerScience,Pakistan CarlLangefeld [email protected] WakeForestUniversity,USA [email protected] ItisamHazzaa KACST,SaudiArabia CarlLee [email protected]. CentralMichiganUniversity,USA edu.sa [email protected]

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.