LEADER 01019nam0 22002893i 450 001 UMC0077125 005 20231121125911.0 010 $a2228889563 100 $a20160725d1995 ||||0itac50 ba 101 | $afre 102 $afr 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜Les œindo-européens$ehistoire, langues, mythes$fBernard Sergent 210 $aParis$cPayot & Rivages$d©1995 215 $a536 p.$d23 cm. 225 | $aBibliothèque scientifique 410 0$1001CFI0145472$12001 $aBibliothèque scientifique 700 1$aSergent$b, Bernard$3CFIV038446$4070$0154215 801 3$aIT$bIT-01$c20160725 850 $aIT-FR0017 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 912 $aUMC0077125 950 0$aBiblioteca umanistica Giorgio Aprea$d 52CIS 8/515$e 52VM 0000782085 VM barcode:00071379. - Inventario:5184 LLCSVM$fA $h20090212$i20121204 977 $a 52 996 $aIndo-européens$93642261 997 $aUNICAS LEADER 12876nam 22007455 450 001 9910299273803321 005 20251225202047.0 010 $a3-319-77818-8 024 7 $a10.1007/978-3-319-77818-1 035 $a(CKB)4100000002892515 035 $a(DE-He213)978-3-319-77818-1 035 $a(MiAaPQ)EBC6287503 035 $a(MiAaPQ)EBC5589042 035 $a(Au-PeEL)EBL5589042 035 $a(OCoLC)1029077617 035 $a(PPN)225551381 035 $a(EXLCZ)994100000002892515 100 $a20180315d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aContext-Aware Systems and Applications, and Nature of Computation and Communication $e6th International Conference, ICCASA 2017, and 3rd International Conference, ICTCC 2017, Tam Ky, Vietnam, November 23-24, 2017, Proceedings /$fedited by Phan Cong Vinh, Nguyen Ha Huy Cuong, Emil Vassev 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 237 p. 72 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v217 311 08$a3-319-77817-X 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Context-Aware Systems and Applications -- A Resource-Aware Preference Model for Context-Aware System -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Resource-Aware Preference Model -- 4.1 Context-Aware System Architecture -- 4.2 Rule Structure -- 4.3 Preference Manager Layer -- 5 Derived-Context Based User Preference -- 5.1 Preference Level Monitor (PLM) -- 6 A Simple Case Study -- 6.1 Context-Based Preferences -- 6.2 Rule-Based Preferences -- 7 Conclusion and Future Work -- References -- A Context Adaptive Framework for IT Governance, Risk, Compliance and Security -- Abstract -- 1 Introduction -- 2 GRC and Security -- 3 IT GRC -- 4 IT Security -- 5 IT GRC and IT Security -- 6 An Integrated IT GRCS Framework -- 7 Conclusion -- References -- Hybrid Classifier by Integrating Sentiment and Technical Indicator Classifiers -- Abstract -- 1 Introduction -- 2 Research Methodology -- 2.1 Sentiment Definition -- 2.1.1 Bullish and Bearish -- 2.1.2 Sentiment Ratio -- 2.1.3 Sentiment Trading Strategies (STS) -- 2.1.4 Sentiment Classifier Formula -- 2.2 Technical Indicator -- 2.2.1 Relative Volatility Index (RVI) -- 2.2.2 Money Flow Index (MFI) -- 2.2.3 Relative Strength Index (RSI) -- 2.3 Classification Algorithms -- 2.3.1 Technical Indicator Classifiers -- 2.3.2 Sentiment Classifiers -- 2.3.3 Hybrid Classifiers -- 3 Experiments and Results -- 3.1 Datasets -- 3.2 Experiments -- 3.3 Results -- 4 Conclusion and Discussion -- References -- Visualizing Space-Time Map for Bus -- Abstract -- 1 Introduction -- 2 Visual Features -- 2.1 The Capacity of Human Vision -- 2.2 The Visual Features -- 2.3 The Retinal Variables -- 3 Approaching Temporal Geography to Making Space-Time Bus Map -- 3.1 Space-Time Map -- 3.2 Space-Time Map for Representing Bus Network. 327 $a4 Approaching Temporal Geography and Visualization to Creating Visualized-Space-Time Bus Map -- 4.1 Reducing the Thickness of Screen -- 4.2 Creating Visualized-Space-Time Bus Map -- 4.3 Improving Visual Features of Visualized-Space-Time Bus Map -- 5 Conclusion -- References -- Generation of Power State Machine for Android Devices -- 1 Introduction -- 2 Formal Analysis of Android Applications' Power Consumption -- 2.1 Analysis of the Power State in Mobile Applications for a Hardware Component -- 2.2 Analysis Power State in Mobile Applications -- 2.3 Optimize Power Consumption Model for Each Specific Application -- 3 Implementation -- 4 Related Work -- 5 Conclusion -- References -- Modeling Self-adaptation - A Possible Endeavour? -- Abstract -- 1 Introduction to Self-adaptation -- 2 Correct Self-adaptation -- 3 Modeling Self-adaptation with KnowLang -- 4 Case Study -- 4.1 Modeling Self-adaptation that Adds on Safety -- 4.2 Testing the Self-adaptation Model -- 5 Conclusion -- Acknowledgements -- References -- Enhancement of Wu-Manber Multi-pattern Matching Algorithm for Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Snort and Pattern Matching Algorithms -- 2.2 Wu-Manber Algorithm -- 2.3 Bloom Filter -- 3 Related Work -- 4 Proposed Algorithm -- 4.1 Preprocessing Phase -- 4.2 Matching Phase -- 5 Experiment and Performance Evaluations -- 5.1 Experimental Data -- 5.2 Experimental Results -- 6 Conclusions -- References -- Goal-Capability-Commitment Based Context-Aware Collaborative Adaptive Diagnosis and Compensation -- Abstract -- 1 Introduction -- 2 Technology Base -- 2.1 Capability-Commitment-Goal Representation -- 2.1.1 Capability -- 2.1.2 Commitment -- 2.1.3 Adaptation Goal -- 2.2 Semantic Matching -- 3 Our Approach -- 3.1 Failure Diagnosis -- 3.2 Capability and Commitment Compensation -- 4 Experiments and Discussion. 327 $a5 Conclusion -- Acknowledgment -- References -- Traffic Incident Recognition Using Empirical Deep Convolutional Neural Networks Model -- 1 Introduction -- 2 Convolutional Neural Networks (CNN) Based Approach to Traffic Incident Detection -- 2.1 Proposed CNN Model -- 2.2 The System for Traffic Incident Detection -- 3 Experimental Results -- 4 Conclusion -- References -- Block-Moving Approach for Speed Adjustment on Following Vehicle in Car-Following Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Block-Moving Approach -- 3.1 The Clearance of a Moving Vehicle -- 3.2 Moving-Block Approach to Adjusting Follower Speed -- 4 Headway-Based Controlling Follower Speed -- 5 Conclusion -- References -- The Context-Aware Calculating Method in Language Environment Based on Hedge Algebras Approach to Improve Result of Forecasting Time Series -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Fuzzy Time Series -- 2.2 Some Basis Concepts of Hedge Algebras -- 3 Proposed Method -- 3.1 Rule for Adjusting the Fuzzy Logical Relationships -- 3.2 Method for Partitioning the Universe of Discourse -- 3.3 Algorithm for Forecasting -- 4 Empirical Result -- 4.1 We Test the Proposed Method on the Time Series that are Enrollments at University of Alabama -- 4.2 Test of Forecasting TAIEX Index -- 5 Conclusion -- References -- Algebraic Operations in Fuzzy Object-Oriented Databases Based on Hedge Algebras -- 1 Introduction -- 2 The Basic Concepts -- 2.1 Hegde Algebra -- 2.2 Neighborhood Level -- 2.3 Fuzzy Object-Oriented Database -- 3 Evaluation of Duplicates in Fuzzy Objects -- 3.1 Approximation Level k -- 3.2 Redundant Fuzzy Objects -- 4 Fuzzy Algebraic Operations -- 4.1 Algebraic Operations for Fuzzy Objects -- 4.2 Algebraic Operations for Fuzzy Classes -- 4.3 Fuzzy Queries -- 5 Conclusion -- References. 327 $aContext-Adaptive Values-Based Games for the Young: Responsible Decision Making for a Sustainable World -- Abstract -- 1 Introduction -- 2 Values and Sustainability -- 3 Responsible Decision-Making in Games -- 4 Context-Adaptive Games for Inculcating Values in the Young -- 5 Design of Context-Adaptive Values-Based Games -- 5.1 Scenario 1: Context-Adaptive Values-Based Snakes and Ladders -- 5.2 Scenario 2: Context-Adaptive, Decision-Driven Story of Helpfulness and Kindness -- 6 Conclusion -- References -- Applying and Deploying Cyber Physical System in Monitoring and Managing Operations Under Mines and U ... -- Abstract -- 1 Introduction -- 1.1 Developing a Cyber Physical System for Monitoring and Managing Operations Under Mines and Underg ... -- 1.2 New Technologies Applied in the Project -- 2 The Building of Database Structure -- 2.1 System Software -- 3 Conclusion -- References -- The Method of Maintaining Data Consistency in Allocating Resources for the P2P Network Model -- 1 Introduction -- 2 Related Work -- 3 The Model Structure Tree Broadcasts Resource Allocation in Heterogeneous Distributed Platforms -- 4 Analytical Model for Resource Allocation in Heterogeneous Distributed Platforms -- 4.1 Queueing Model -- 4.2 Availability and Latency Computation -- 5 Algorithm -- 6 Experiments and Results -- 7 Conclusion and Future Works -- References -- Fragmentation in Distributed Database Design Based on KR Rough Clustering Technique -- Abstract -- 1 Rationale -- 2 Some Related Concepts -- 2.1 Data Discretization and Attribute Selection, Attribute Extraction According to Rough Set Approach -- 2.2 Information System, Indistinguishable Relation -- 2.3 Reference-Specific Vector and Similarity -- 3 Proposed Vertical Fragmentation Algorithm Based on KR Rough Clustering -- 3.1 KR Rough Clustering Algorithm -- 3.2 Proposed KR Rough Clustering Algorithm. 327 $a3.3 Evaluation of KR Rough Clustering Algorithm -- 4 Experimental Results of KR Rough Clustering Algorithm -- 5 Conclusion -- References -- Nature of Computation and Communication -- Architectural Framework for Context Awareness and Health Conscious Applications on Mobile Devices -- Abstract -- 1 Introduction -- 2 Related Research -- 2.1 Contextual and Context Aware -- 2.2 Contextual Aware Applications in Health Care -- 3 Modeling Context Aware Sensibility for Mobile Systems -- 3.1 Logical Description Knowledge Base -- 3.2 Ontology -- 3.3 Multi-agent System -- 4 Framework for Context-Aware Healthcare Applications on Mobile System -- 4.1 Architecture Framework -- 4.2 Mechanism of Operation -- 5 Conclusion -- References -- Holistic Personas and the Five-Dimensional Framework to Assist Practitioners in Designing Context-Aw ... -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 The Five-Dimensional Requirements Elicitation Framework -- 3.2 The Design of Online AIS Learning Resources Using Holistic Personas -- 3.3 Procedure -- 4 Results -- 5 Discussion -- 6 Implications and Limitations of Our Findings -- 7 Conclusion and Future Research -- Acknowledgements -- References -- Abnormal Behavior Detection Based on Smartphone Sensors -- Abstract -- 1 Introduction -- 2 The Proposed Framework -- 2.1 The Feature Selection -- 2.2 Abnormal Behavior Analysis -- 2.3 Monitoring Application -- 3 Experiment and Results -- 3.1 Experiment Environment -- 3.2 The Collected and Processing Data -- 3.3 The Abnormal Behavior Analysis Results -- 4 Conclusion and Future Works -- Acknowledgments -- References -- An Effective of Data Organizing Method Combines with Nai?ve Bayes for Vietnamese Document Retrieval -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Organize Documents in the Warehouse -- 3.1 Feature Selection. 327 $a3.2 Organize Document Based on Clustering. 330 $aThis book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2017, held in November 2017 in Tam Ky City, Vietnam. The 23 revised full papers presented were carefully selected from 31 submissions. The papers of ICCASA cover a wide spectrum in the area of context-aware-systems. CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection used to dynamically control computing and networking functions. The papers of ICTCC cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v217 606 $aInformation storage and retrieval systems 606 $aComputer networks 606 $aComputers, Special purpose 606 $aArtificial intelligence 606 $aInformation Storage and Retrieval 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aArtificial Intelligence 615 0$aInformation storage and retrieval systems. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aArtificial intelligence. 615 14$aInformation Storage and Retrieval. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aArtificial Intelligence. 676 $a004 702 $aCong Vinh$b Phan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHa Huy Cuong$b Nguyen$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVassev$b Emil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299273803321 996 $aContext-Aware Systems and Applications, and Nature of Computation and Communication$92205535 997 $aUNINA