ebook img

Applied Computing and Information Technology PDF

205 Pages·2017·5.605 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Applied Computing and Information Technology

Studies in Computational Intelligence 695 Roger Lee Editor Applied Computing and Information Technology Studies in Computational Intelligence Volume 695 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] About this Series The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the worldwide distribution, which enable both wide and rapid dissemination of research output. More information about this series at http://www.springer.com/series/7092 Roger Lee Editor Applied Computing and Information Technology 123 Editor RogerLee Software Engineering andInformation TechnologyInstitute Central Michigan University Mount Pleasant,MI USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN978-3-319-51471-0 ISBN978-3-319-51472-7 (eBook) DOI 10.1007/978-3-319-51472-7 LibraryofCongressControlNumber:2016961333 ©SpringerInternationalPublishingAG2017 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The purpose of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) held during December 12–14, 2016 in Las Vegas, USA was to bring together researchers, scientists, engineers, industry practitioners,andstudentstodiscuss,encourage,andexchangenewideas,research results, and experiences on all aspects of Applied Computers and Information Technology,andtodiscussthepracticalchallengesencounteredalongthewayand the solutions adopted to solve them. The conference organizers have selected the best 13 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. In chapter “Business Sustainability Conceptualization”, Arunasalam Sambhan- than, Vidyasagar Potdar, and Elizabeth Chang document research that has been undertaken to define the term business sustainability by analyzing multiple defi- nitionsproposedintheexistingliterature.Themainconceptualcontributionofthis paper is its holistic presentation of the concept of business sustainability with contextual relevance to the ICT sector. In chapter “A Replicated Study on Relationship Between Code Quality and Method Comments”, Yuto Miyake, Sousuke Amasaki, Hirohisa Aman, and TomoyukiYokogawaclarifytherelationshipbetweencommentsotherthanSATD (self-admittedtechnicaldebt)commentsandcodequality.Thisstudydemonstrates a need for further analysis on the contents of comments and its relation to code quality. Inchapter“APredictiveModelfor StandardizedTestPerformanceinMichigan Schools”, William Sullivan, Joseph Marr, and Gongzhu Hu build a predictive modelasanearlywarningsystemforschoolsthatmayfallbelowthestateaverage in building level average proficiency in the Michigan Educational Assessment Program(MEAP).Theyutilizedataminingtechniquestodevelopvariousdecision tree models and logistic regression models, and find that the decision tree model with entropy impurity measure accurately predicts school performance. v vi Foreword In chapter “A Development Technique for Mobile Applications Program”, Byeondo Kang, Boram Song, Seungwon Yang, and Jonseok Lee present a devel- opment technique, AppSpec, for mobile applications program. They applied AppSpec to developing a mobile application program, and then presented the products of diagrams as the result of performing development phases of AppSpec. In chapter “Interactive Mobile Applications Development Using Adapting Component Model”, Haeng-Kon Kim and Roger Y. Lee discuss some of the problems of the current mobile based human management applications and show how the introduction of adaptive component based development (CBD) model provides flexible and extensible solutions to mobile applications. In chapter “Development of Guiding Walking Support Device for Visually Impaired People with the GPS”, Tsubasa Sugimoto, Shota Nakashima, and Yuhki Kitazono conduct development and experiment of the walking support device that enablethemtogooutwitheasebybeingequippedwithsensorstodetectobstacles and omni-wheels and navigate them in this study. Inchapter“UserEvaluationPredictionModelsBasedonConjointAnalysisand Neural Networks for Interactive Evolutionary Computation”, Ryuya Akase and Yoshihiro Okada develop user evaluation prediction models based on conjoint analysis and neural networks for interactive evolutionary computation (IEC) implementedbyinteractivegeneticalgorithmandinteractivedifferentialevolution. In chapter “Emotional Video Scene Retrieval Using Multilayer Convolutional Network”, Hiroki Nomiya, Shota Sakaue, Mitsuaki Maeda, and Teruhisa Hochin proposeasceneretrievalmethodbasedonfacialexpressionrecognition(FER).The effectivenessoftheproposedmethodisevaluatedthroughanexperimenttoretrieve emotional scenes from a lifelog video database. In chapter “Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments”, Badr Alshehry and William Allen propose a highly inventive multilayer system for protection against DDoS in the cloud that utilizes threat intelligence techniques and a proactive approach to detect traffic behavior anomalies.Aseriesofexperimentswereperformedandtheresultsdemonstratethat this multilayer approach can detect and mitigate DDoS attacks from a variety of known and unknown sources. In chapter “Practical Uses of Memory Storage Extension”, Shuichi Oikawa discussestheseveralpracticalusesofamemorystorageextension(MSX)incloud computing and also in the fundamental operating system architecture. In chapter “How to Build a High Quality Mobile Applications Based on ImprovedProcess”,Haeng-KonKimandRogerY.Leeidentifydefectstoproduce reliable mobile software and analyze the relationship among different defects among mobile applications. Another goal ofthispaper istodesignadefect trigger based on the findings. Inchapter“ANewHybridDiscreteFireflyAlgorithmforSolvingtheTraveling SalesmanProblem”,AbdulqaderM.Mohsen,andWedadAl-Sororiproposeanew hybrid variant of discrete firefly algorithm, called HDFA, to solve traveling salesman problem (TSP). In the proposed improvement, the balance between intensification and diversification is achieved by utilizing the local search Foreword vii procedures, 2-opt and 3-opt, to improve searching performance and speed up the convergence. In chapter “Empowering MOOCs Through Course Certifying Agency Framework”, Yeong-tae Song, Yuanqiong Wang, and Yongik Yoon propose a MOOC course certifying agency framework, which merges learners’ profiles from various MOOC providers so consolidated profiles are available in one place. The result is the list of learners who match or almost match a given job description. It isour sincere hope that this volume provides stimulation and inspiration, and that it will be used as a foundation for works to come. December 2016 Takaaki Goto Ryutsu Keizai University Ryugasaki, Japan Contents Business Sustainability Conceptualization.... .... .... .... ..... .... 1 Arunasalam Sambhanthan, Vidyasagar Potdar and Elizabeth Chang A Replicated Study on Relationship Between Code Quality and Method Comments.. .... ..... .... .... .... .... .... ..... .... 17 Yuto Miyake, Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa A Predictive Model for Standardized Test Performance in Michigan Schools .... .... ..... .... .... .... .... .... ..... .... 31 William Sullivan, Joseph Marr and Gongzhu Hu A Development Technique for Mobile Applications Program..... .... 47 Byeondo Kang, Boram Song, Seungwon Yang and Jonseok Lee Interactive Mobile Applications Development Using Adapting Component Model.. .... .... ..... .... .... .... .... .... ..... .... 63 Haeng-Kon Kim and Roger Y. Lee Development of Guiding Walking Support Device for Visually Impaired People with the GPS..... .... .... .... .... .... ..... .... 77 Tsubasa Sugimoto, Shota Nakashima and Yuhki Kitazono User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation .. .... 91 Ryuya Akase and Yoshihiro Okada Emotional Video Scene Retrieval Using Multilayer Convolutional Network.. .... ..... .... .... .... .... .... ..... .... 105 Hiroki Nomiya, Shota Sakaue, Mitsuaki Maeda and Teruhisa Hochin Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments. .... .... .... .... .... ..... .... 119 Badr Alshehry and William Allen ix x Contents Practical Uses of Memory Storage Extension . .... .... .... ..... .... 135 Shuichi Oikawa How to Build a High Quality Mobile Applications Based on Improved Process ... .... ..... .... .... .... .... .... ..... .... 149 Haeng-Kon Kim and Roger Y. Lee A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem... .... .... .... .... .... ..... .... 169 Abdulqader M. Mohsen and Wedad Al-Sorori Empowering MOOCs Through Course Certifying Agency Framework. .... .... ..... .... .... .... .... .... ..... .... 181 Yeong-tae Song, Yuanqiong Wang and Yongik Yoon Author Index.. .... .... .... ..... .... .... .... .... .... ..... .... 197

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.