1462-1998 (Adopted Iso/Iec 14102:1995) Information Technology |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 1998 |
Descrizione fisica | 1 online resource (80 pages) |
Disciplina | 005.365 |
Soggetto topico |
Application software
Software engineering Information technology |
ISBN | 0-7381-1486-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280554203316 |
[Place of publication not identified], : IEEE, 1998 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
1462-1998 (Adopted Iso/Iec 14102:1995) Information Technology |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 1998 |
Descrizione fisica | 1 online resource (80 pages) |
Disciplina | 005.365 |
Soggetto topico |
Application software
Software engineering Information technology |
ISBN | 0-7381-1486-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910142240003321 |
[Place of publication not identified], : IEEE, 1998 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Systems Engineering Workshops : CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings / / edited by John Krogstie, Haralambos Mouratidis, Jianwen Su |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXXIII, 276 p. 75 illus.) |
Disciplina | 005.365 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business information services
Application software Software engineering Data protection Information technology - Management Business Information Systems Computer and Information Systems Applications Software Engineering Enterprise Architecture Data and Information Security Computer Application in Administrative Data Processing |
ISBN | 3-319-39564-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Third International Workshop on Advances in Services Design Based on the Notion of Capability - ASDENCA 2016 Preface -- ASDENCA 2016 Organization -- First International Workshop on Business Model Dynamics and Information Systems Engineering (BumDISE 2016) Preface -- Fourth International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE 2016) Preface -- First International Workshop on Energy-Awareness and Big Data Management in Information Systems - EnBIS 2016 Preface -- Second International Workshop on Enterprise Modeling (EM 2016) Preface -- The Sixth International Workshop on Information Systems Security Engineering (WISSE 2016) Preface -- Contents -- ASDENCA/BUMDISE 2016 - Capability-Based Development Methods -- Selection and Evolutionary Development of Software-Service Bundles: A Capability Based Method -- Abstract -- 1 Introduction -- 2 Method Overview -- 2.1 Problem Statement -- 2.2 Evolutionary Development Process -- 2.3 Capability Modeling -- 3 Evolutionary Development Stages -- 3.1 Design Stage -- 3.2 Delivery Stage -- 3.3 Evolution -- 4 Application Example -- 4.1 Description -- 4.2 Model -- 4.3 Results -- 5 Related Work -- 6 Summary and Future Work -- References -- LightCDD: A Lightweight Capability-Driven Development Method for Start-Ups -- Abstract -- 1 Introduction -- 2 Problem Investigation -- 3 First Experiences on Applying CDD for Enterprise Development -- 3.1 Capability as a Service in a Nutshell -- 3.2 Two Practical Start-up Cases -- 3.3 Applying the CDD in Full -- 3.4 Lessons Learnt, Experiences -- 4 Light CDD for Enterprise Modelling of Start-Ups -- 5 Conclusions and Discussion -- References -- ASDENCA/BUMDISE 2016 - Integration of Capability with Goals and Context -- Comparison of Tool Support for Goal Modelling in Capability Management -- Abstract -- 1 Introduction -- 2 Background.
2.1 Capability Management -- 2.2 Capability Modelling in CaaS -- 2.3 4EM Enterprise Modelling Method -- 3 Experiment Design and Results -- 3.1 Experiment Design -- 3.2 Experiment Results -- 4 Summary and Future Work -- References -- Extending Capabilities with Context Awareness -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Capability and Context Analysis -- 4 Selecting Design Time Integration -- 4.1 Design Time Options in the Symbiosis Case -- 5 Selecting Run-Time Integration -- 5.1 Monitoring Tool Extension -- 5.2 Adjustment Tool Extension -- 5.3 Run Time Options in the Symbiosis Case -- 6 Summarize Tool Support Needed -- 7 Conclusions -- Acknowledgments -- References -- Design of Capability Delivery Adjustments -- Abstract -- 1 Introduction -- 2 Capability Adjustment -- 2.1 Background -- 2.2 Types of Adjustments -- 3 Elaboration of Adjustments -- 4 Example -- 5 Related Work -- 6 Conclusion -- References -- ASDENCA/BUMDISE 2016 - Business Modeling -- The Fast Fashion Business Model -- Abstract -- 1 The Apparel Industry -- 2 Research Design and Setting -- 3 The Creative Machine -- 4 The Shop Connection -- 5 The Relay -- 6 The Fast Fashion Business Model -- 7 Conclusion -- References -- Cycles of Organizational Renewal: The Interplay of Strategy and Innovation at Bang & Olufsen -- Abstract -- 1 Introduction -- 2 Methods -- 3 Preliminary Findings -- 4 Conclusion -- References -- Information Systems for Innovation: A Comparative Analysis of Maturity Models' Characteristics -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Innovation Maturity Models in Research and Practice -- 4 Models' Structures and Validation -- 5 Discussion of the Results -- 6 Conclusion and Future Work -- References -- COGNISE 2016 -- Learning from Errors as a Pedagogic Approach for Reaching a Higher Conceptual Level in Database Modeling -- Abstract -- 1 Introduction. 2 Teaching Database Modelling as a Challenge to IS Educators -- 3 Learning from Errors in Educating Database Modeling -- 4 Rasmussen's Three Level Model of Human Performance -- 4.1 Skill-Based Behavior -- 4.2 Rule-Based Behavior -- 4.3 Knowledge-Based Behavior -- 5 Errors as means for Shifting Between Levels of Abstraction -- 6 Conclusions: Future Directions and Instructional Implications -- References -- `Mathematical' Does Not Mean `Boring': Integrating Software Assignments to Enhance Learning of Logico-Mathematical Concepts -- 1 Introduction -- 2 Previous Works -- 3 The Gen2sat Assignment -- 3.1 Gen2sat -- 3.2 The Assignment -- 3.3 Results and Feedback -- 4 Summary and Future Research -- References -- User Involvement in Applications of the PoN -- 1 Introduction -- 2 Reviewing Applications of the PoN -- 2.1 Literature Review Protocol -- 2.2 Relevant Findings -- 3 Potential Reasons for the Lack of User Involvement -- 3.1 Notation Designers Considered as the Prototypical User -- 3.2 Users are Involved, but Afterwards -- 3.3 Requirements are Derived from Theory -- 3.4 Existing Theory is Assumed to Cover Requirements -- 3.5 Cognitive Effectiveness is an Afterthought -- 4 A Benefit of Involving Users in Notations Design -- 5 Concluding Outlook -- References -- A Visual Logical Language for System Modelling in Combinatorial Test Design -- 1 Introduction -- 2 Logical Restrictions in CTD Models -- 3 A New Visual Logical Language -- 4 Summary and Future Research -- References -- Peel the Onion: Use of Collaborative and Gamified Tools to Enhance Software Engineering Education -- Abstract -- 1 Introduction -- 2 Scientific Background -- 2.1 Collaborative Tools in Education -- 2.2 Gamification in IS and SE Education -- 3 Collaborative and Gamified Teaching Method -- 3.1 The Method -- 3.2 Analyzing the Teaching Model from a Motivational Perspective. 4 Students' Responses to the Teaching Method -- 5 Expected Contribution and Further Evaluation -- References -- ENBIS 2016 -- Energy Enhancement of Multi-application Monitoring Systems for Smart Buildings -- 1 Introduction -- 2 Related Works -- 3 Overview of Multi-application Monitoring System -- 4 Optimization of Application Requirements -- 4.1 Formalization of Application Requirements and Sensor Configuration -- 4.2 Algorithm -- 5 Experimental Platform -- 5.1 Continuous Query Engine: SoCQ Engine -- 5.2 WSN Simulator: Modified WSNet -- 5.3 Gateway: 3SoSM Gateway -- 6 Experiments -- 6.1 Experiment Setup -- 6.2 Experimental Scenario -- 7 Conclusion -- References -- Micro-accounting for Optimizing and Saving Energy in Smart Buildings -- 1 Introduction -- 2 The OPlatform -- 3 Energy Savings in Offices -- 4 Smart Energy Switch -- 5 Conclusions and Future Works -- References -- Modeling CO2 Emissions to Reduce the Environmental Impact of Cloud Applications -- 1 Introduction -- 2 Related Work -- 3 Energy Mix Analysis -- 3.1 Analysis of the Problem -- 3.2 Conceptualization -- 3.3 Calibration -- 3.4 Validation -- 4 CO2-Driven Site Selection -- 5 Concluding Remarks -- References -- EM 2016 -- Modeling and Enacting Enterprise Decisions -- 1 Introduction and Related Work -- 2 Background -- 2.1 Decision Model and Notation (DMN) -- 2.2 Formalization -- 3 The Role of Decision Models -- 3.1 A Decision Model Corresponding to a Single Decision Activity in a Process Model -- 3.2 A Decision Model Spanning over Multiple Decision Activities in an Existing Process Model -- 3.3 A Decision Model that can Be Translated to a Straightforward Process for Execution -- 3.4 Executing a Decision Model Beyond One Fixed Decision: Flexibility -- 4 Three Scenarios for the Execution of Decision Models -- 4.1 Standard Forward Decision Execution -- 4.2 Optimized Forward Decision Execution. 4.3 Flexible Decision Execution Scenarios -- 5 Conclusions and Future Work -- References -- A Modelling Environment for Business Process as a Service -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Overview of the BPaaS Design Environment -- 4 Methodology -- 5 BPaaS Modelling Method -- 6 BPaaS Ontology -- 7 Alignment Support -- 8 Semantic Lifting -- 9 Conclusion -- Acknowledgement -- Reference -- Understanding Production Chain Business Process Using Process Mining: A Case Study in the Manufacturing Scenario -- 1 Introduction -- 2 Working Scenario -- 3 Process Mining Techniques -- 4 Process Mining into Practice -- 4.1 Evaluation Criteria -- 4.2 Preliminary Results -- 4.3 Discussion and Comparison -- 5 Conclusion and Future Work -- References -- WISSE 2016 -- Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products -- 1 Introduction -- 2 The Assertion -- 3 Evaluation -- 3.1 Data -- 3.2 Control Variables -- 3.3 Methods -- 3.4 Sampling -- 3.5 Results -- 4 Discussion -- References -- APPARATUS: Reasoning About Security Requirements in the Internet of Things -- 1 Introduction -- 2 Related Work -- 3 Presentation of APPARATUS Reasoning -- 4 Example of Security Reasoning -- 5 Conclusion -- References -- Associating the Severity of Vulnerabilities with their Description -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Database, Characteristics and Scoring Systems -- 4 Correlation Analysis -- 5 Conclusion -- References -- Discovering Potential Interaction Violations among Requirements -- 1 Introduction -- 2 Background and Related Work -- 3 Discovering Undocumented Scenarios -- 3.1 Modeling a Domain -- 3.2 Analysing the Model -- 3.3 The Loophole Algorithm -- 4 Conclusion and Future Work -- References -- Extending HARM to make Test Cases for Penetration Testing -- Abstract. 1 Introduction. |
Record Nr. | UNINA-9910254945503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in digital forensics XVIII : 18th IFIP WG 11.9 international conference, virtual event, January 3-4, 2022 : revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (209 pages) |
Disciplina | 005.365 |
Collana | IFIP advances in information and communication technology |
Soggetto topico |
Application software
Computer science |
ISBN | 3-031-10078-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996483163003316 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in digital forensics XVIII : 18th IFIP WG 11.9 international conference, virtual event, January 3-4, 2022 : revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (209 pages) |
Disciplina | 005.365 |
Collana | IFIP advances in information and communication technology |
Soggetto topico |
Application software
Computer science |
ISBN | 3-031-10078-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910584493703321 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Android Application Security : A Semantics and Context-Aware Approach / / by Mu Zhang, Heng Yin |
Autore | Zhang Mu |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XI, 105 p. 37 illus., 29 illus. in color.) |
Disciplina | 005.365 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer security
Computer communication systems Electrical engineering Systems and Data Security Computer Communication Networks Communications Engineering, Networks |
ISBN | 3-319-47812-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Background -- Semantics-Aware Android Malware Classification -- Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks -- Efficient and Context-Aware Privacy Leakage Confinement -- Automatic Generation of Security-Centric Descriptions for Android Apps -- Limitation and Future Work -- Conclusion. |
Record Nr. | UNINA-9910151858103321 |
Zhang Mu
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Appcelerator Titanium application development by example beginner's guide [[electronic resource] ] : over 30 interesting recipes to help you create cross-platform apps with Titanium, and explore the new features in Titanium 3 / / Darren Cope |
Autore | Cope Darren |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Publishing, c2013 |
Descrizione fisica | 1 online resource (334 p.) |
Disciplina | 005.365 |
Soggetto topico |
Application software
Mobile computing - Programming |
Soggetto genere / forma | Electronic books. |
ISBN | 1-84969-501-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: How to Get Up and Running with Titanium; System requirements and restrictions; Installing Titanium; Time for action - installing Titanium Studio; Setting up Titanium Studio; Time for action - setting up Titanium Studio; Installing the Android SDK; Time for action - configuring the Android SDK; Installing the iOS SDK; Time for action - configuring the iOS SDK; Installation problems - did something go wrong?; Your first cross-platform app
Time for action - creating an app from a templateTime for action - running an app in the emulator; Did the app fail to run?; A review of the first app; tiapp.xml; tiapp XML structure explained; Other files in the base directory; The Resources directory; app.js; KS_nav_ui.png and KS_nav_views.png; The android and iphone directories; Summary; Chapter 2: How to Make an Interface; What's in the toolkit?; A recap; Window; Tab group and tabs; Creating a tab group; Creating a tab; Labels; Views; Time for action - adding a view to a window; Time for action - adding a button to a view Time for action - making something happen when the button is pressedAdding a settings screen - a TableView masterclass; Time for action - adding a new window; Time for action - adding a styled TableViewRow object; Platform-specific tools; Add an Android menu; Time for action - adding an Android menu; Time for action - running the Android menu changes on iOS; Why did this fail?; Isolating platform-specific code; Time for action - add an iOS fix for the Android menu; Capturing debug messages; Coding iOS specific elements; Time for action - add an info button to the navigation bar; Summary Chapter 3: How to Design Titanium AppsJSON; Extending your app over multiple files; Titanium.include; Time for action - creating an activity indicator; Require; Require - loading a marketplace module; Time for action - adding an Appcelerator marketplace module; Require - promoting commonJS compliant code; MVC; Time for action - creating a better designed app using MVC; Behind the scenes - a look at the code; What does this mean?; An example of require; Alloy; Time for action - creating an Alloy app; Summary; Chapter 4: Gluing Your App Together with Events, Variables, and Callbacks Sharing dataExecution context; Global variables; What is the right way to share data?; Time for action - sharing information between windows; Events; Event scope; Event properties; Making something happen - fireEvent; Time for action - creating a progress bar game; Global event listeners and garbage collection; Better event code using callbacks; Summary; Chapter 5: It's All About Data; External data; Time for action - creating an HTTP request; RSS reader; Time for action - fetching RSS; Time for action - parsing and displaying the RSS; Storing data on the device; Which one should you use filesystem, database, or properties? |
Record Nr. | UNINA-9910463177303321 |
Cope Darren
![]() |
||
Birmingham, U.K., : Packt Publishing, c2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Appcelerator Titanium application development by example beginner's guide [[electronic resource] ] : over 30 interesting recipes to help you create cross-platform apps with Titanium, and explore the new features in Titanium 3 / / Darren Cope |
Autore | Cope Darren |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Publishing, c2013 |
Descrizione fisica | 1 online resource (334 p.) |
Disciplina | 005.365 |
Soggetto topico |
Application software
Mobile computing - Programming |
ISBN | 1-84969-501-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: How to Get Up and Running with Titanium; System requirements and restrictions; Installing Titanium; Time for action - installing Titanium Studio; Setting up Titanium Studio; Time for action - setting up Titanium Studio; Installing the Android SDK; Time for action - configuring the Android SDK; Installing the iOS SDK; Time for action - configuring the iOS SDK; Installation problems - did something go wrong?; Your first cross-platform app
Time for action - creating an app from a templateTime for action - running an app in the emulator; Did the app fail to run?; A review of the first app; tiapp.xml; tiapp XML structure explained; Other files in the base directory; The Resources directory; app.js; KS_nav_ui.png and KS_nav_views.png; The android and iphone directories; Summary; Chapter 2: How to Make an Interface; What's in the toolkit?; A recap; Window; Tab group and tabs; Creating a tab group; Creating a tab; Labels; Views; Time for action - adding a view to a window; Time for action - adding a button to a view Time for action - making something happen when the button is pressedAdding a settings screen - a TableView masterclass; Time for action - adding a new window; Time for action - adding a styled TableViewRow object; Platform-specific tools; Add an Android menu; Time for action - adding an Android menu; Time for action - running the Android menu changes on iOS; Why did this fail?; Isolating platform-specific code; Time for action - add an iOS fix for the Android menu; Capturing debug messages; Coding iOS specific elements; Time for action - add an info button to the navigation bar; Summary Chapter 3: How to Design Titanium AppsJSON; Extending your app over multiple files; Titanium.include; Time for action - creating an activity indicator; Require; Require - loading a marketplace module; Time for action - adding an Appcelerator marketplace module; Require - promoting commonJS compliant code; MVC; Time for action - creating a better designed app using MVC; Behind the scenes - a look at the code; What does this mean?; An example of require; Alloy; Time for action - creating an Alloy app; Summary; Chapter 4: Gluing Your App Together with Events, Variables, and Callbacks Sharing dataExecution context; Global variables; What is the right way to share data?; Time for action - sharing information between windows; Events; Event scope; Event properties; Making something happen - fireEvent; Time for action - creating a progress bar game; Global event listeners and garbage collection; Better event code using callbacks; Summary; Chapter 5: It's All About Data; External data; Time for action - creating an HTTP request; RSS reader; Time for action - fetching RSS; Time for action - parsing and displaying the RSS; Storing data on the device; Which one should you use filesystem, database, or properties? |
Record Nr. | UNINA-9910786708603321 |
Cope Darren
![]() |
||
Birmingham, U.K., : Packt Publishing, c2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial intelligence andsecurity . Part 1 : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021 : proceedings / / edited by Xingming Sun [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (774 pages) |
Disciplina | 005.365 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico | Application software |
ISBN | 3-030-78609-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Artificial Intelligence -- Research on Spoofing Jamming of Integrated Navigation System on UAV -- 1 Introduction -- 2 Forwarding Spoofing Jamming -- 3 GPS/INS Integrated Navigation System Spoofing -- 3.1 GPS/INS Integrated Navigation -- 3.2 Spoofing Control of Integrated Navigation -- 4 Spoofing Trajectory Planning -- 4.1 Extension Line -- 4.2 Tangent Line -- 5 Simulation Analysis -- 6 Conclusion -- References -- Multi-penalty Functions GANs via Multi-task Learning -- 1 Introduction -- 2 Related Work -- 2.1 Adversarial Learning Stability -- 2.2 Penalty Function Method -- 3 Generative Adversarial Networks -- 4 MPF-GANs -- 4.1 Multi-penalty Functions Method in GANs -- 4.2 Network Structure and Its Objective Functions -- 4.3 Training MPF-GANs -- 5 Experiments -- 5.1 Evaluation Metrics and Data Sets -- 5.2 Penalty Factor λ of MPF-GANs -- 5.3 Experiments of MPF-GANs -- 5.4 Experiments of Different GANs -- 6 Conclusion -- References -- Community Detection Model Based on Graph Representation and Self-supervised Learning -- 1 Introduction -- 2 Related Work -- 3 Model and Method -- 3.1 Preliminaries -- 3.2 Models -- 3.3 Model Optimization -- 4 Experiments -- 4.1 Datasets -- 4.2 Baselines and Metrics for Comparison -- 4.3 Parameters Setting -- 4.4 Preliminary Study of DGC -- 4.5 Experimental Results -- 5 Conclusion -- References -- Efficient Distributed Stochastic Gradient Descent Through Gaussian Averaging -- 1 Introduction -- 2 Related Work -- 3 Distributed SGD with Guassian Distribution Averaging -- 3.1 Gradient Distribution -- 3.2 Details of GASGD -- 3.3 Convergence Analysis -- 4 Experiments and Results -- 4.1 Experiment Setup -- 4.2 Convergence Accuracy -- 4.3 Computation and Communication Complexity -- 5 Conclusion -- References.
Application Research of Improved Particle Swarm Optimization Algorithm Used on Job Shop Scheduling Problem -- 1 Introduction -- 2 Mathematical Model of Job Shop Scheduling Problem -- 3 Job Shop Scheduling Algorithm Based on Improved Particle Swarm Optimization -- 3.1 Encoding Operation -- 3.2 Particle Swarm Initialized -- 3.3 Improved Particle Swarm Algorithm -- 3.4 Decoding Operations -- 4 Process Steps of JSSP-SERPSO Algorithm -- 5 Experiments and Results Analysis -- 6 Conclusion -- References -- Artificial Intelligence Chronic Disease Management System Based on Medical Resource Perception -- 1 Introduction -- 2 Related Work -- 3 Artificial Intelligence Management System Based on Resource Cognition -- 3.1 System Architecture -- 3.2 Coordination of Medical Resources Based on Hierarchical Diagnosis and Classification Management -- 3.3 Big Data Analysis of NCDS Based on Multi-dimensional Data Fusion -- 3.4 NCDS Decision Support System Based on Clinical Pathway -- 3.5 NCDS Management Service Integration -- 4 Practice Result -- 5 Conclusion -- References -- Research on Deep Learning Denoising Method in an Ultra-Fast All-Optical Solid-State Framing Camera -- 1 Introduction -- 2 Theoretical Model -- 2.1 Principle of NLM Filtering Algorithm -- 2.2 Principles of Convolutional Neural Networks -- 2.3 NLM Deep Learning Image Processing Method Based on Convolutional Neural Network -- 3 Experiment and Analysis -- 3.1 Experimental System -- 3.2 Image Processing -- 4 Conclusion -- References -- LSTM-XGBoost Application of the Model to the Prediction of Stock Price -- 1 Introduction -- 2 Related Work -- 2.1 Long and Short-Term Memory Neural Network (LSTM) -- 2.2 XGBoost Model -- 3 Model Construction -- 4 Simulation Experiment -- 4.1 Evaluating Indicator -- 4.2 Experimental Comparison -- 5 Conclusion -- References. Test of Integrated Urban Rail Transit Vehicle-to-Ground Communication System Based on LTE-U Technology -- 1 Introduction -- 2 Test Objectives and Contents -- 2.1 Test Objectives -- 2.2 Test Contents -- 3 Test Environment -- 3.1 Channel Environment -- 3.2 Service Model -- 4 Results -- 5 Conclusion -- References -- Research on Efficient Image Inpainting Algorithm Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Image Inpainting Network Model -- 3.1 Segmentation Network -- 3.2 CBAM Attention Module -- 3.3 Improving Inpainting Network -- 4 Experiments -- 4.1 Qualitative Analysis -- 4.2 Quantitative Analysis -- 4.3 Time Analysis -- 4.4 Comprehensive Evaluation Function -- 5 Conclusion -- References -- Subspace Classification of Attention Deficit Hyperactivity Disorder with Laplacian Regularization -- 1 Introduction -- 2 Material and Method -- 2.1 Image Data Preprocessing -- 2.2 Binary Hypothesis Testing Framework -- 2.3 Laplacian Regularized Subspace Learning -- 3 Experiment Results -- 3.1 Subspace Dimension and Analysis -- 3.2 Classification Comparison -- 3.3 ROC Analysis -- 4 Conclusion -- References -- Study the Quantum Transport Process: Machine Learning Simulates Quantum Conditional Master Equation -- 1 Introduction -- 2 Quantum Conditional Master Equation -- 3 Example: A Two-Level Quantum Transport System -- 4 Machine Learning Method Simulate Quantum Master Equation -- 4.1 Quantum Master Equation and LSTM Network -- 4.2 Experiment and Result Analysis -- 5 Conclusion -- References -- Neural Network Study Quantum Synchronization and Quantum Correlation Under Non-zero Temperature -- 1 Introduction -- 2 Model -- 3 Quantum correlation -- 4 Quantum Synchronize Under Different Temperature -- 5 Conclusion -- References -- Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning. 1 Introduction -- 2 Description of the Problem -- 2.1 Stable Adaptation of Manufacturer-Distributor Service Resources -- 2.2 Bilateral Matching Model Based on Manufacturer-Dealer Satisfaction -- 3 Solving Algorithm Design -- 3.1 The Gale-Shapley Algorithm -- 3.2 Q-learning Algorithm -- 3.3 Bilateral Adaptation Algorithm Design Based on Gale-Shapley and Q-learning -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Automatic CT Lesion Detection Based on Feature Pyramid Inference with Multi-scale Response -- 1 Introduction -- 2 Proposed Method -- 2.1 Mathematical Morphology Operations -- 2.2 Feature Extraction Network -- 2.3 Aggregated Dilation Block -- 2.4 Global Attention Block -- 3 Experiments and Results -- 3.1 Datasets -- 3.2 Training Schedule -- 3.3 Hardware and Software Setup -- 3.4 Evaluation -- 3.5 Results -- 4 Conclusion -- References -- A Survey of Chinese Anaphora Resolution -- 1 Introduction -- 2 Resources for Anaphora Resolution -- 2.1 MUC Dataset -- 2.2 ACE Dataset -- 2.3 OntoNotes Dataset -- 3 Anaphora Resolution Methods -- 3.1 English Anaphora Resolution -- 3.2 Chinese Anaphora Resolution -- 3.3 Summary -- 4 Future Prospects -- References -- Efficient 3D Pancreas Segmentation Using Two-Stage 3D Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Segmentation Method Overview -- 2.2 Pre-processing -- 2.3 Training -- 2.4 Testing -- 2.5 Network Architecture -- 3 Experiments -- 3.1 Datasets -- 3.2 Implementation Details -- 3.3 Results -- 4 Conclusions -- References -- Multi-UAV Task Allocation Method Based on Improved Bat Algorithm -- 1 Introduction -- 1.1 Research Background -- 1.2 Related Works -- 2 Improved Bat Algorithm -- 2.1 Bat Algorithm -- 2.2 Improved Bat Algorithm -- 3 Simulation and Result Analysis -- 3.1 Simulation -- 3.2 Result Analysis -- 4 Conclusions -- References. Deep Learning Models for Intelligent Healthcare: Implementation and Challenges -- 1 Introduction -- 2 Application of CNN in Intelligent Healthcare -- 2.1 Applications of Deep Learning in Medicine -- 2.2 Deep Learning for Medical Imaging -- 3 Limitations and Challenges of Deep Learning in Healthcare -- 4 Conclusion and Future Work -- References -- An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection -- 1 Introduction -- 2 Related Work -- 2.1 Flame Detection Algorithm -- 2.2 Smoke Detection Algorithm -- 3 Method -- 3.1 Suspected Area Detection -- 3.2 Attention Suspected Areas of Flame and Smoke -- 3.3 Detection Network -- 4 Experiments -- 4.1 Dataset -- 4.2 Experimental Details -- 4.3 Evaluation Index -- 4.4 Experimental Results -- 5 Conclusion -- References -- The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning -- 1 Introduction -- 2 Related Work -- 2.1 Method of Calculating Weight Set -- 2.2 Method of Calculating Evaluation Set -- 3 Energy Metering Safety Indexes -- 3.1 Safety Index System Modeling -- 3.2 Specific Evaluation Process -- 3.3 Index Security Classification -- 4 Safety Performance Dynamic Evaluation Model -- 4.1 Calculate the Dynamic Fuzzy Evaluation Set -- 4.2 Dynamic Weight of Safety Factors -- 4.3 Calculate the Dynamic Comprehensive Evaluation Set -- 5 Experiment and Analysis -- 6 Conclusion -- References -- Offline Writer Identification Using Convolutional Neural Network and VLAD Descriptors -- 1 Introduction -- 2 Related Work -- 3 Writer Identification Pipeline -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Feature Extraction -- 3.4 Encoding -- 3.5 Writer Identification -- 4 Experiments and Results -- 4.1 Evaluation Metrics -- 4.2 Results and Analysis -- 5 Conclusion -- References. A Light-Weight Prediction Model for Aero-Engine Surge Based on Seq2Seq. |
Record Nr. | UNISA-996464493803316 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Artificial intelligence andsecurity . Part 1 : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021 : proceedings / / edited by Xingming Sun [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (774 pages) |
Disciplina | 005.365 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico | Application software |
ISBN | 3-030-78609-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Artificial Intelligence -- Research on Spoofing Jamming of Integrated Navigation System on UAV -- 1 Introduction -- 2 Forwarding Spoofing Jamming -- 3 GPS/INS Integrated Navigation System Spoofing -- 3.1 GPS/INS Integrated Navigation -- 3.2 Spoofing Control of Integrated Navigation -- 4 Spoofing Trajectory Planning -- 4.1 Extension Line -- 4.2 Tangent Line -- 5 Simulation Analysis -- 6 Conclusion -- References -- Multi-penalty Functions GANs via Multi-task Learning -- 1 Introduction -- 2 Related Work -- 2.1 Adversarial Learning Stability -- 2.2 Penalty Function Method -- 3 Generative Adversarial Networks -- 4 MPF-GANs -- 4.1 Multi-penalty Functions Method in GANs -- 4.2 Network Structure and Its Objective Functions -- 4.3 Training MPF-GANs -- 5 Experiments -- 5.1 Evaluation Metrics and Data Sets -- 5.2 Penalty Factor λ of MPF-GANs -- 5.3 Experiments of MPF-GANs -- 5.4 Experiments of Different GANs -- 6 Conclusion -- References -- Community Detection Model Based on Graph Representation and Self-supervised Learning -- 1 Introduction -- 2 Related Work -- 3 Model and Method -- 3.1 Preliminaries -- 3.2 Models -- 3.3 Model Optimization -- 4 Experiments -- 4.1 Datasets -- 4.2 Baselines and Metrics for Comparison -- 4.3 Parameters Setting -- 4.4 Preliminary Study of DGC -- 4.5 Experimental Results -- 5 Conclusion -- References -- Efficient Distributed Stochastic Gradient Descent Through Gaussian Averaging -- 1 Introduction -- 2 Related Work -- 3 Distributed SGD with Guassian Distribution Averaging -- 3.1 Gradient Distribution -- 3.2 Details of GASGD -- 3.3 Convergence Analysis -- 4 Experiments and Results -- 4.1 Experiment Setup -- 4.2 Convergence Accuracy -- 4.3 Computation and Communication Complexity -- 5 Conclusion -- References.
Application Research of Improved Particle Swarm Optimization Algorithm Used on Job Shop Scheduling Problem -- 1 Introduction -- 2 Mathematical Model of Job Shop Scheduling Problem -- 3 Job Shop Scheduling Algorithm Based on Improved Particle Swarm Optimization -- 3.1 Encoding Operation -- 3.2 Particle Swarm Initialized -- 3.3 Improved Particle Swarm Algorithm -- 3.4 Decoding Operations -- 4 Process Steps of JSSP-SERPSO Algorithm -- 5 Experiments and Results Analysis -- 6 Conclusion -- References -- Artificial Intelligence Chronic Disease Management System Based on Medical Resource Perception -- 1 Introduction -- 2 Related Work -- 3 Artificial Intelligence Management System Based on Resource Cognition -- 3.1 System Architecture -- 3.2 Coordination of Medical Resources Based on Hierarchical Diagnosis and Classification Management -- 3.3 Big Data Analysis of NCDS Based on Multi-dimensional Data Fusion -- 3.4 NCDS Decision Support System Based on Clinical Pathway -- 3.5 NCDS Management Service Integration -- 4 Practice Result -- 5 Conclusion -- References -- Research on Deep Learning Denoising Method in an Ultra-Fast All-Optical Solid-State Framing Camera -- 1 Introduction -- 2 Theoretical Model -- 2.1 Principle of NLM Filtering Algorithm -- 2.2 Principles of Convolutional Neural Networks -- 2.3 NLM Deep Learning Image Processing Method Based on Convolutional Neural Network -- 3 Experiment and Analysis -- 3.1 Experimental System -- 3.2 Image Processing -- 4 Conclusion -- References -- LSTM-XGBoost Application of the Model to the Prediction of Stock Price -- 1 Introduction -- 2 Related Work -- 2.1 Long and Short-Term Memory Neural Network (LSTM) -- 2.2 XGBoost Model -- 3 Model Construction -- 4 Simulation Experiment -- 4.1 Evaluating Indicator -- 4.2 Experimental Comparison -- 5 Conclusion -- References. Test of Integrated Urban Rail Transit Vehicle-to-Ground Communication System Based on LTE-U Technology -- 1 Introduction -- 2 Test Objectives and Contents -- 2.1 Test Objectives -- 2.2 Test Contents -- 3 Test Environment -- 3.1 Channel Environment -- 3.2 Service Model -- 4 Results -- 5 Conclusion -- References -- Research on Efficient Image Inpainting Algorithm Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Image Inpainting Network Model -- 3.1 Segmentation Network -- 3.2 CBAM Attention Module -- 3.3 Improving Inpainting Network -- 4 Experiments -- 4.1 Qualitative Analysis -- 4.2 Quantitative Analysis -- 4.3 Time Analysis -- 4.4 Comprehensive Evaluation Function -- 5 Conclusion -- References -- Subspace Classification of Attention Deficit Hyperactivity Disorder with Laplacian Regularization -- 1 Introduction -- 2 Material and Method -- 2.1 Image Data Preprocessing -- 2.2 Binary Hypothesis Testing Framework -- 2.3 Laplacian Regularized Subspace Learning -- 3 Experiment Results -- 3.1 Subspace Dimension and Analysis -- 3.2 Classification Comparison -- 3.3 ROC Analysis -- 4 Conclusion -- References -- Study the Quantum Transport Process: Machine Learning Simulates Quantum Conditional Master Equation -- 1 Introduction -- 2 Quantum Conditional Master Equation -- 3 Example: A Two-Level Quantum Transport System -- 4 Machine Learning Method Simulate Quantum Master Equation -- 4.1 Quantum Master Equation and LSTM Network -- 4.2 Experiment and Result Analysis -- 5 Conclusion -- References -- Neural Network Study Quantum Synchronization and Quantum Correlation Under Non-zero Temperature -- 1 Introduction -- 2 Model -- 3 Quantum correlation -- 4 Quantum Synchronize Under Different Temperature -- 5 Conclusion -- References -- Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning. 1 Introduction -- 2 Description of the Problem -- 2.1 Stable Adaptation of Manufacturer-Distributor Service Resources -- 2.2 Bilateral Matching Model Based on Manufacturer-Dealer Satisfaction -- 3 Solving Algorithm Design -- 3.1 The Gale-Shapley Algorithm -- 3.2 Q-learning Algorithm -- 3.3 Bilateral Adaptation Algorithm Design Based on Gale-Shapley and Q-learning -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Automatic CT Lesion Detection Based on Feature Pyramid Inference with Multi-scale Response -- 1 Introduction -- 2 Proposed Method -- 2.1 Mathematical Morphology Operations -- 2.2 Feature Extraction Network -- 2.3 Aggregated Dilation Block -- 2.4 Global Attention Block -- 3 Experiments and Results -- 3.1 Datasets -- 3.2 Training Schedule -- 3.3 Hardware and Software Setup -- 3.4 Evaluation -- 3.5 Results -- 4 Conclusion -- References -- A Survey of Chinese Anaphora Resolution -- 1 Introduction -- 2 Resources for Anaphora Resolution -- 2.1 MUC Dataset -- 2.2 ACE Dataset -- 2.3 OntoNotes Dataset -- 3 Anaphora Resolution Methods -- 3.1 English Anaphora Resolution -- 3.2 Chinese Anaphora Resolution -- 3.3 Summary -- 4 Future Prospects -- References -- Efficient 3D Pancreas Segmentation Using Two-Stage 3D Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Segmentation Method Overview -- 2.2 Pre-processing -- 2.3 Training -- 2.4 Testing -- 2.5 Network Architecture -- 3 Experiments -- 3.1 Datasets -- 3.2 Implementation Details -- 3.3 Results -- 4 Conclusions -- References -- Multi-UAV Task Allocation Method Based on Improved Bat Algorithm -- 1 Introduction -- 1.1 Research Background -- 1.2 Related Works -- 2 Improved Bat Algorithm -- 2.1 Bat Algorithm -- 2.2 Improved Bat Algorithm -- 3 Simulation and Result Analysis -- 3.1 Simulation -- 3.2 Result Analysis -- 4 Conclusions -- References. Deep Learning Models for Intelligent Healthcare: Implementation and Challenges -- 1 Introduction -- 2 Application of CNN in Intelligent Healthcare -- 2.1 Applications of Deep Learning in Medicine -- 2.2 Deep Learning for Medical Imaging -- 3 Limitations and Challenges of Deep Learning in Healthcare -- 4 Conclusion and Future Work -- References -- An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection -- 1 Introduction -- 2 Related Work -- 2.1 Flame Detection Algorithm -- 2.2 Smoke Detection Algorithm -- 3 Method -- 3.1 Suspected Area Detection -- 3.2 Attention Suspected Areas of Flame and Smoke -- 3.3 Detection Network -- 4 Experiments -- 4.1 Dataset -- 4.2 Experimental Details -- 4.3 Evaluation Index -- 4.4 Experimental Results -- 5 Conclusion -- References -- The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning -- 1 Introduction -- 2 Related Work -- 2.1 Method of Calculating Weight Set -- 2.2 Method of Calculating Evaluation Set -- 3 Energy Metering Safety Indexes -- 3.1 Safety Index System Modeling -- 3.2 Specific Evaluation Process -- 3.3 Index Security Classification -- 4 Safety Performance Dynamic Evaluation Model -- 4.1 Calculate the Dynamic Fuzzy Evaluation Set -- 4.2 Dynamic Weight of Safety Factors -- 4.3 Calculate the Dynamic Comprehensive Evaluation Set -- 5 Experiment and Analysis -- 6 Conclusion -- References -- Offline Writer Identification Using Convolutional Neural Network and VLAD Descriptors -- 1 Introduction -- 2 Related Work -- 3 Writer Identification Pipeline -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Feature Extraction -- 3.4 Encoding -- 3.5 Writer Identification -- 4 Experiments and Results -- 4.1 Evaluation Metrics -- 4.2 Results and Analysis -- 5 Conclusion -- References. A Light-Weight Prediction Model for Aero-Engine Surge Based on Seq2Seq. |
Record Nr. | UNINA-9910491028703321 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|