Yang / Kim / Park | Advances in Computational Science and Engineering | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 28, 269 Seiten

Reihe: Communications in Computer and Information Science

Yang / Kim / Park Advances in Computational Science and Engineering

Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
1. Auflage 2009
ISBN: 978-3-642-10238-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

E-Book, Englisch, Band 28, 269 Seiten

Reihe: Communications in Computer and Information Science

ISBN: 978-3-642-10238-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This volume constitutes the selected and extended papers of workshops and symposia of the International Conference, on Advances in Computational Science and Engineering, FGCN2008, held in Sanya, Hainan Island, China in December 2008. The volume contains the workshops on peer-to-peer computing for information search (P2PSearch 2008), on wireless ad hoc, mesh and sensor networks (WAMSNet-08), on sensor networks and applications (SNA 2008), on wireless communications for intelligent transportation systems (WITS-08), on network assurance (NA 2008) , on communication & network technology management 2008 (CNM 2008), on forensics for future generation communication environments (F2GC-08), as well as on silver technology for aging society (STAS2008), together with the symposia on the 3rd international symposium on smart home (SH'08), on database theory and application (DTA-08), on u- and e- service, science and technology (UNESST-08), on control and automation (CA-08) , on grid and distributed computing (GDC-08), as well as on signal processing, image processing and pattern recognition (SIP 2008).

Yang / Kim / Park Advances in Computational Science and Engineering jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Organization;7
3;Table of Contents;10
4;A Heuristic Approach for Designing Regional Language Based Raw–Text Extractor and Unicode Font–Mapping Tool;12
4.1;Introduction;12
4.2;Related Works;13
4.3;Our Work;13
4.3.1;Main ( );14
4.3.2;Process (Inputfolderpath, Outputfolderpath);14
4.3.3;Recursivetraverse (Filepath);15
4.3.4;Webpageverifier (Filepath);15
4.3.5;Rawtextextractor (Webpage);15
4.3.6;Fontmapper (String);16
4.3.7;Search (Proprietaryfontvalue);16
4.4;Result and Discussion;17
4.4.1;Complexity Analysis of the Stated Algorithm;17
4.4.2;Test Results;17
4.5;Conclusion;22
4.6;References;23
5;Aspect-Oriented Formal Specification for Real-Time Systems;24
5.1;Introduction;24
5.2;Aspect-Oriented Formal Specification;25
5.3;Case Studies;28
5.3.1;Aspect-Oriented Formal Specification of Multimedia Stream;28
5.3.2;Aspect Oriented Formal Specification of ABP;31
5.3.3;Integration of Informal Specification and Formal Specification by Aspect- Oriented Approach;34
5.4;Conclusion and Future Research;40
5.5;References;41
6;The Advanced of Fuzzy Vault Using Password;44
6.1;Introduction;44
6.2;Related work;45
6.2.1;Fuzzy Logic;45
6.2.2;Fuzzy Vault Scheme;45
6.2.3;Fingerprint;46
6.2.4;Fuzzy Vault Scheme for Fingerprint;46
6.2.5;Hardening Fingerprint Fuzzy Vault Using Password;47
6.3;Vulnerability Analysis of Hardening Fuzzy Vault Using Password;49
6.3.1;Adversarial Model;49
6.3.2;The Problem of K. Nandakumar's Scheme;51
6.3.3;The Attacks Scenario;51
6.3.4;Proposed Scheme;52
6.4;Conclusion;54
6.5;References;54
7;An Enhanced EDD QoS Scheduler for IEEE 802.11e WLAN;56
7.1;Introduction;56
7.2;Related Work;58
7.2.1;IEEE 802.11e HCCA Protocol;58
7.2.2;Reference Scheduler;59
7.2.3;SETT-EDD Scheduler;60
7.2.4;ARROW Scheduler;62
7.3;Proposed Scheduling Algorithm;63
7.3.1;TXOP Allocation;63
7.3.2;SI Allocation;64
7.4;Performance Evaluation of the Proposed Algorithm;65
7.4.1;Simulation Scenarios;66
7.4.2;Analysis of the Simulation Results;66
7.5;Conclusion;69
7.6;References;70
8;Recognition of Loneliness of the Elderly People in Ubiquitous Computing Environment;71
8.1;Introduction;71
8.2;Related Work;72
8.3;Scenario for the Loneliness Inference System;73
8.4;Definition of Lonely Cases;74
8.4.1;Case 1.1;75
8.4.2;Case 1.2;78
8.4.3;Case 2;79
8.5;Inference;81
8.6;System Architecture;81
8.7;Conclusions;82
8.8;References;83
9;Voronoi-assisted Parallel Bidirectional Heuristic Search;84
9.1;Introduction;84
9.2;Our Proposal;87
9.3;Performance Evaluation;88
9.4;Conclusion;94
9.5;References;94
10;Artificial K-Lines and Applications;96
10.1;Introduction;96
10.2;Our Proposal;97
10.3;AKL Applications;99
10.3.1;Application 1: Robot and Assembly Line Example;99
10.3.2;Application 2: Machine Learning;102
10.4;Comparison with Neural Networks;107
10.5;Conclusion;107
10.6;References;108
11;Spike Sorting Method Based on Two-Stage Radial Basis Function Networks;109
11.1;Introduction;109
11.2;Two-Stage Radius Basis Function Network;110
11.2.1;Training Stage of RBF Networks;111
11.2.2;Testing Stage of RBF Networks;112
11.3;Data Source;113
11.3.1;Obtain Raw Signals and Add White Noise;113
11.3.2;Spike Detection;114
11.3.3;Spike Sorting;114
11.4;Experiment Results;114
11.5;Conclusion;115
11.6;References;116
12;The Establishment of $in vitro$ Model of Primary Rat Brain Microvascular Endothelial Cells;117
12.1;Introduction;117
12.2;Materials and Methods;118
12.2.1;Animals;118
12.2.2;Reagents;119
12.2.3;Culture Solution;119
12.2.4;Culture Flask;119
12.2.5;Method;119
12.3;Results;120
12.3.1;BMEC Were Cultivated in 24 Hours;120
12.3.2;BMEC after 1 Week of Culture;121
12.4;Discussions;122
12.5;References;124
13;A FC-GSEA Approach to Identify Significant Gene-Sets Using Microarray Gene Expression Data;126
13.1;Introduction;126
13.2;Gene Set Enrichment Analysis;127
13.3;FC-GSEA : Fisher’s Criterion Based GSEA;128
13.3.1;Motivation;128
13.3.2;Fisher’s Criterion Based Gene Ranking;130
13.3.3;Estimating Significance in FC-GSEA;133
13.3.4;Multiple Hypothesis Test in FC-GSEA;134
13.4;Experiments and Results;134
13.4.1;Identification of Significant Genes;134
13.4.2;Finding Leukemia-Related Pathways;135
13.5;Discussions;138
13.6;References;138
14;A Comparison between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance;140
14.1;Introduction;140
14.2;QEPDandCSID;141
14.2.1;Quaternion Euclidean Product Distance (QEPD);141
14.2.2;Cauchy-Schwartz Inequality Distance (CSID);141
14.3;Comparison by Experiment;143
14.3.1;Database;143
14.3.2;QEPD Computation;143
14.3.3;CSID Computation;146
14.3.4;Comparison of Result;146
14.4;Conclusion;148
14.5;References;148
15;Wavelet Decomposition Feature Parallel Fusion by Quaternion Euclidean Product Distance Matching Score for Finger Texture Verification;149
15.1;Introduction;149
15.2;Related Work;151
15.2.1;Quaternion;151
15.2.2;The Extraction of 2-D Wavelet Decomposition Coefficients;152
15.2.3;Parallel Fusion;152
15.3;Our Algorithm;152
15.3.1;Finger Texture ROI Extraction;153
15.3.2;Wavelet Decomposition Feature Parallel Fusion;153
15.3.3;Quaternion Euclidean Product Distance;154
15.3.4;QEPD Matching;154
15.4;Experiment;155
15.4.1;Finger Database;155
15.4.2;Finger Matching;155
15.4.3;Finger Texture Verification;157
15.4.4;Speed;157
15.4.5;A Comparison with Palmprint QEPD;158
15.5;Conclusion;159
15.6;References;160
16;Studies of Fingerprint Template Selection and Update;161
16.1;Introduction;161
16.2;Multiple Templates Fusion;162
16.3;Multiple Templates Selection Analyze;164
16.3.1;Templates Selection and Multibiometrics;164
16.3.2;A Model of Template Selection;164
16.3.3;How Many Templates Should Be Selected?;165
16.4;Score Based Template Selection;166
16.5;Score Based Template Update;167
16.5.1;Introduction to Template Update;167
16.5.2;Two Strategies of Template Update;167
16.6;Experimental Results;168
16.6.1;Experiment for Template Selection;168
16.6.2;Experiment for Template Update;170
16.7;Summary and Future Work;173
16.8;References;173
17;Characterizing Genes by Marginal Expression Distribution;175
17.1;Introduction;175
17.2;Methods;176
17.2.1;Statistical Model;176
17.2.2;Model Selection;177
17.3;Experimental Results;177
17.3.1;Estimating Number of Components;177
17.3.2;Real Dataset;178
17.4;Conclusions;184
17.5;References;185
17.6;Appendix: Density Functions;186
18;Combining Biochemical Features and Evolutionary Information for Predicting DNA-Binding Residues in Protein Sequences;187
18.1;Introduction;187
18.2;Methods;189
18.2.1;Data Preparation;189
18.2.2;Training Strategy;190
18.2.3;Evolutionary Information;190
18.2.4;Random Forests;191
18.2.5;Classifier Evaluation;192
18.3;Results;193
18.3.1;Prediction of DNA-Binding Residues Using Random Forests;193
18.3.2;Effect of Evolutionary Information on Classifier Performance;194
18.3.3;Classifier Evaluation Using a Separate Test Dataset;197
18.4;Conclusions;199
18.5;References;199
19;A Predictive Approach for Selecting Suitable Computing Nodes in Grid Environment by Using Data Mining Technique;201
19.1;Introduction;201
19.2;Related Works;202
19.3;Fuzzy Decision Tree;203
19.3.1;Fuzzy Logic (FL);205
19.3.2;Fuzzy Decision Tree Algorithm;205
19.4;System Architecture;207
19.4.1;Miner Application;207
19.4.2;Broker Layer;209
19.5;Experimental Results and Discussion;211
19.6;Conclusion and Future Works;215
19.7;References;215
20;A New Multidimensional Point Access Method for Efficient Sequential Processing of Region Queries;217
20.1;Introduction;217
20.2;Characteristics of Space Filling Curves;218
20.3;Multifarious Granuled Grid(MGG) and Multifarious Granuled SFC(MGSFC);220
20.3.1;Multifarious Granuled Grid(MGG);220
20.3.2;Multifarious Granuled Space Filling Curve(MGSFC);220
20.3.3;Region Query Processing;222
20.4;MLGF-Plus;225
20.4.1;MLGF;225
20.4.2;MLGF-Plus;226
20.5;Conclusions;228
20.6;References;229
21;Automatic Extraction of HLA-Disease Interaction Information from Biomedical Literature;230
21.1;Introduction;230
21.2;Entity Recognizing in HaDextract System;232
21.2.1;HLA Entity;232
21.2.2;Disease and Geographic Locations Entity;233
21.2.3;Abbreviation of Disease Entity;233
21.3;Information Extraction in HaDextract System;234
21.3.1;Relation and Filtering Keyword;234
21.3.2;Parse Tree Search Algorithm;235
21.4;SystemPerformance;237
21.5;Results and Discussion;238
21.6;Conclusion;240
21.7;References;241
22;Description and Verification of Pattern-Based Composition in Coq;242
22.1;Introduction;242
22.2;Related Works;243
22.3;Problem Illustration;244
22.4;The Formal Proof;247
22.4.1;The Correctness Criterion;248
22.4.2;Formalizing the Correctness Criterion in Coq;249
22.4.3;Proving Correctness of the Composition;251
22.5;Conclusions and Future Work;254
22.6;References;255
23;A Synthetic Reverse Model Based on AIS and the Application;257
23.1;Introduction;257
23.2;Related Works;258
23.3;Similarity Distance of Network Behavior;259
23.3.1;Behavior Modeling;259
23.3.2;The Similar Distance Algorithm;260
23.3.3;The Sample Set Optimization Based on Artificial Immune;261
23.4;Synthesized Distance Model;263
23.4.1;Mathematic Modeling;263
23.4.2;Synthetic Distance Model;265
23.4.3;Synthetic Dimension Reduction Model;265
23.5;The Dimension Reduction Method of Behavior Samples;266
23.5.1;Mapping to 2-Dimension Points;266
23.5.2;Behavior Detection Method;267
23.6;Conclusion;267
23.7;References;268
24;Author Index;269



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.