Cover image for Horizons in Computer Science Research.
Horizons in Computer Science Research.
Title:
Horizons in Computer Science Research.
Author:
Clary, Thomas S.
ISBN:
9781624174971
Personal Author:
Physical Description:
1 online resource (356 pages)
Series:
Horizons in Computer Science
Contents:
HORIZONS IN COMPUTER SCIENCE RESEARCH VOLUME 4 -- HORIZONS IN COMPUTER SCIENCE RESEARCH VOLUME 4 -- Contents -- Preface -- Application of Artificial Intelligence in the Upstream Oil and Gas Industry -- Abstract -- 1. Neural Networks and Their Background -- 1.1. A Short History of Neural Networks -- 1.2. Structure of a Neural Network -- 1.3. Mechanics of Neural Networks Operation -- 2. Evolutionary Computing -- 2.1. Genetic Algorithms -- 2.2. Mechanism of a Genetic Algorithm -- 3. Fuzzy Logic -- 3.1. Fuzzy Set Theory -- 3.2. Approximate Reasoning -- 3.3. Fuzzy Inference -- 4. Applications in the Oil and Gas Industry -- 4.1. Neural Networks Applications -- 4.1.1. Reservoir Characterization -- 4.1.2. Virtual Magnetic Resonance Imaging Logs -- 4.2. Genetic Algorithms Applications -- 4.3. Fuzzy Logic Applications -- 4.3.1. Results -- References -- Multi-Path Routing Protocols for Ad Hoc Networks -- Abstract -- 1. Introduction -- 2. Routing in a MANET -- 2.1. Approaches Based on Route Construction, Maintenance and Update Mechanisms -- a. Proactive (Table-driven) Routing -- b. Reactive (On-demand) Routing -- c. Hybrid Routing -- 2.2. Approaches Based on Logical Organization, Network Configuration and Utilization of Specific Resources -- a. Uniform Routing -- Flat Uniform Routing -- Geographical Information Based Uniform Routing -- b. Non-uniform Routing -- Flat Non-uniform Routing -- Hierarchical Non-uniform Routing -- 2.3. Overview of Well-Known Routing Protocols -- Dynamic Source Routing (DSR) -- Ad hoc On-demand Distance Vector (AODV) -- Fisheye State Routing (FSR) -- Location-Aided Routing (LAR) -- 3. Ad Hoc Multi-path Routing Protocols -- 3.1. Example Multi-path Routing Protocols -- 3.2. Multi-path Performance Evaluation -- 4. Design Principles of Multi-path Protocols.

5. Multi-path Case Study of Video Streaming on a Vehicular Ad Hoc Network -- 5.1. Multiple Description Coding -- 5.2. Applying Multi-path Routing to VANET Video Streaming -- Conclusion -- References -- Development of Software to Characterize Particulate Matter in Air Pollution -- Abstract -- 1. Introduction -- 2. Current Particle Characterization Techniques -- 2.1. Gravimetric Approach -- 2.2. Atomic Absorption Spectroscopy -- 2.3. High Performance Liquid Chromatography -- 2.4. Gas Chromatography-mass Spectrometry -- 2.5. Sem and Energy Dispersive X-Ray -- 2.5.1. Manual SEM -- 2.5.2. Computer Controlled SEM -- 2.5.3. SEM Integrated with Image Analyzing Techniques -- 3. Principle of PM Characterization by SEM Integrated with Image Analyzing Techniques -- 3.1. Image Reading -- 3.2. Preprocessing -- 3.3. Segmentation -- 3.4. Feature Extraction -- 3.4.1. Shape of PM -- 3.5. Representation -- 3.6. Case Study I: Use of Extended Sobel Edge Detection Method for Studying the PM Emission During Agricultural Activities -- 4. Commercial Software for Integrating SEM and Image Analyzing Techniques for PM Characterization -- 4.1. Overlapped or Connected Particles in Images -- 4.1.1. FCM Algorithm for Separating Connected Particles -- 4.1.2. SKeletonization by Influence Zone (SKIZ) -- 4.2. Selection of Optimal Image Segmentation Algorithm -- 5. Selection of Optimal Image Segmentation Algorithm by Support Vector Machines -- 5.1. Designed Software -- 5.2. Case Study II: Examples of Selecting Optimal Image Segmentation Algorithm Using SVM -- 5.2.1. Case 1 -- 5.2.2. Case 2 -- 5.2.3. Case 3 -- Conclusion -- Acknowledgments -- References -- Web-based Software Infrastructure for Service-Oriented Science -- Abstract -- 1. Introduction -- 2. Architecture -- 2.1. Computing Resources Layer -- 2.2. Services Layer -- 2.3. Applications Layer -- 2.4. Users Layer.

3. Service Interface -- 4. Service Container -- 5. Service Composition -- 5.1. Workflow Editor -- 5.2. Workflow Management Service -- Conclusion -- References -- Example of Clinical Applications of Wearable Monitoring Systems -- Abstract -- Introduction -- Application of Wearable Systems in Clinics -- Wearable Solutions Supporting Diagnosis: Quantifying Motor Disorders through Motor Holter Systems - Case Studies in Parkinson's Disease and Tourette Syndrome -- Wearable Solutions Supporting Monitoring: Textile Electrodes System for Pre-term Newborns in Neonatal Intensive Care Unit -- Wearable Solution Supporting Rehabilitation: A Multimodal Quantitative Approach in Ortheses and Prostheses Selection/customization -- Conclusion -- References -- The Layered Software Infrastructure for Solving Large-scale Optimization Problems on the Grid -- Abstract -- 1. Introduction -- 2. Overview of Optimization Problems and Resolution Methods -- 3. The BNB-Solver Framework -- 3.1. Serial Implementation -- 3.2. Shared Memory Implementation -- 3.3. Distributed Memory Implementation -- 3.4. Problem-specific Components -- 4. The Software Architecture of BNB-Grid Meta-computing Environment -- 4.1. Computing Element Management -- 4.2. Computing Space Management and Work Distribution -- 4.3. Reliable Computations -- 4.4. User Interface -- 5. Experimental Results -- Related Work -- Conclusion -- References -- Implementation Models for Function Block and Function Block Application in Distributed Intelligent Control Network Based on World FIP Protocol -- Abstract -- Part I. A Implementation Models for Function Block in Distributed Intelligent Control Network Based on WorldFIP Protocol -- 1. Introduction -- 2. Generalized Function Block Diagram Model -- 3. Construction and Implementation of GFBD Model in Field Intelligent Nodes in DICN.

3.1. Data Storage Structure in GFB Instruction Codes Segments -- 3.2. Data Storage Structure in FB Input/Output Segments -- 3.3. Data Storage Structure in GFB Contained Parameter Segments -- 4. Ladder Diagram Analysis Model Based on GFBD Model -- Conclusions -- Part II. A Implementation Models for Function Block Application in DICN Based on WorldFIP Protocol -- 1. Introduction -- 2. Data Storage Segmentation Model for Field Intelligent Nodes -- 2.1. Data Storage Structure in FB Instruction Codes Segments -- 2.2. Data Storage Structure in FB Input/Output Segments -- 2.3. Data Storage Structure in FB Contained Parameter Segments -- 3. Data Model in User Layer in Worldfip Communication -- FBA Schedule Algorithm -- 4.1. "Passive Schedule" Based on Compel Data -- 4.2. Single-task FBA Schedule -- 4.3. Multi-task FBA Schedule -- Conclusions -- References -- The Italian Network SPIN-UTI: Protocol Design and Validation for Active Surveillance of ICU-Acquired Infections -- Abstract -- Background -- The National Healthcare Safety Network -- The Hospital in Europe Link for Infection Control through Surveillance Project -- The Italian Nosocomial Infections Surveillance in Intensive Care Units Project -- Methods for Surveillance -- Validation of ICU-Acquired Infection Surveillance -- An Integrated Approach: Patient-based and Laboratory-based Surveillance -- Conclusion -- References -- A Review of the Intellectual Property Rights in the Field of Wearable Sensors and Systems -- Abstract -- 1. Introduction -- 2. Building Blocks of Wearable Biomedical Devices -- 3. Category and History of IPR in Wearable Biomedical Systems -- 4. Survey of IPR in Wearable Biomedical Systems -- Conclusion -- References -- Internet Infrastructure Resilience Assessment -- Abstract -- Introduction -- Results -- Database -- Monitoring -- Future Assesments -- References.

Chaos-based 2D Visual Encryption Mechanism for ECG Medical Signals -- Abstract -- I. Introduction -- II. A 2D Chaos-based Encryption Scheme for Clinical ECG Signals -- III. Simulation Results -- Conclusion -- Acknowledgments -- References -- PACKET CLASSIFICATION USING CROSS-PRODUCTING -- Abstract -- 1.Introduction -- 2.RelatedWork -- 3.HierarchicalCross-producting -- 3.1.TelescopicSearch -- 3.2.Algorithm -- 3.2.1.SidePrefixGeneration -- 3.2.2.SubspaceProcessing -- 3.2.3.Cross-productTableConstruction -- 3.2.4.LookupProcedure -- 3.2.5.UpdateProcedure -- 3.3.PerformanceEvaluation -- 3.3.1.RealFilterDatabases -- 3.3.2.SyntheticDatabases -- 4.ControlledCross-producting -- 4.1.Motivation -- 4.1.1.Algorithm -- 4.2.Refinements -- 4.2.1.ApproximateRangetoPrefixTransformation -- 4.2.2.CacheLineAlignment -- 4.3.IncrementalUpdates -- 4.4.PerformanceEvaluation -- 5.Conclusion -- References -- PRINCIPLES OF DISTRIBUTED MODEL-BASED DIAGNOSIS OF ACTIVE SYSTEMS -- 1.Introduction -- 2.DistributedSystem -- 3.DistributedObservation -- 4.UncertainObservation -- 5.DistributedProcessing -- 6.ProcessingOptimization -- 6.1.ActiveAlgebra -- 7.StepwiseDiagnosis-generation -- 8.RelatedWork -- 9.Conclusion -- References -- CRYPTOGRAPHIC PUZZLES AND GAME THEORY AGAINST DOS AND DDOS ATTACKS IN NETWORKS -- Abstract -- 1.Introduction -- 2.ClientPuzzles -- 2.1.ClientPuzzleProperties -- 2.2.CPU-boundPuzzles -- 2.2.1.HashReversalPuzzles: -- 2.2.2.ParallelHashPuzzle -- 2.2.3.Hint-BasedPuzzle -- 2.2.4.ChainedHashPuzzle -- 2.2.5.DiscreteLogarithmPuzzle -- 2.2.6.SubsetSumPuzzle -- 2.3.Memory-boundPuzzles -- 2.3.1.FunctionLook-upPuzzle -- 2.3.2.PatternPuzzle -- 3.GameTheoryandSecurity -- 3.1.TypesofGames&BasicDefinitions -- 3.1.1.Cooperative&Non-CooperativeGames -- 3.1.2.Sequential&SimultaneousGames -- 3.1.3.Single&RepeatedGames -- 3.1.4.Perfect&InperfectInformation.

3.1.5.ZeroSum&NonZeroSumGames.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: