Browse Results

Showing 33,601 through 33,625 of 54,123 results

Recent Advances in Computer Vision: Theories And Applications (Studies in Computational Intelligence #804)

by Mahmoud Hassaballah Khalid M. Hosny

This book presents a collection of high-quality research by leading experts in computer vision and its applications. Each of the 16 chapters can be read independently and discusses the principles of a specific topic, reviews up-to-date techniques, presents outcomes, and highlights the challenges and future directions. As such the book explores the latest trends in fashion creative processes, facial features detection, visual odometry, transfer learning, face recognition, feature description, plankton and scene classification, video face alignment, video searching, and object segmentation. It is intended for postgraduate students, researchers, scholars and developers who are interested in computer vision and connected research disciplines, and is also suitable for senior undergraduate students who are taking advanced courses in related topics. However, it is also provides a valuable reference resource for practitioners from industry who want to keep abreast of recent developments in this dynamic, exciting and profitable research field.

Service Orientation in Holonic and Multi-Agent Manufacturing: Proceedings Of Sohoma 2017 (Studies in Computational Intelligence #762)

by Theodor Borangiu Damien Trentesaux André Thomas Sergio Cavalieri

This book gathers the peer-reviewed papers presented at the 8th edition of the International Workshop “Service Orientation in Holonic and Multi-Agent Manufacturing – SOHOMA’18” held at the University of Bergamo, Italy on June 11–12, 2018. The objective of the SOHOMA annual workshops is to foster innovation in smart and sustainable manufacturing and logistics systems by promoting new concepts, methods and solutions that use service orientation of agent-based control technologies with distributed intelligence.Reflecting the theme of SOHOMA’18: “Digital transformation of manufacturing with agent-based control and service orientation of Internet-scale platforms”, the research included focuses on how the digital transformation, as advocated by the “Industry 4.0”, “Industrial Internet of Things”, “Cyber-Physical Production Systems” and “Cloud Manufacturing” frameworks, improves the efficiency, agility and sustainability of manufacturing processes, products, and services, and how it relates to the interaction between the physical and informational worlds, which is implemented in the virtualization of products, processes and resources managed as services.

Multi-disciplinary Trends in Artificial Intelligence: 12th International Conference, MIWAI 2018, Hanoi, Vietnam, November 18–20, 2018, Proceedings (Lecture Notes in Computer Science #11248)

by Manasawee Kaenampornpan Rainer Malaka Duc Dung Nguyen Nicolas Schwind

This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.

The Route to Patient Safety in Robotic Surgery (Springer Proceedings in Advanced Robotics #126)

by Lorenzo Grespan Paolo Fiorini Gianluca Colucci

The introduction of a new technology in a consolidated field has the potential to disrupt usual practices and create a fertile ground for errors. An example is robotic surgery that is now used in most surgical specialties, pushed by technology developers and enthusiastic surgeons. To analyze the potential impact of robotic surgery on patient safety, a consortium of major European Universities started the project SAFROS whose findings are summarized and further elaborated in the three parts of this book. Part one describes safety in complex systems such as surgery, how this may disrupt the traditional surgical workflow, how safety can be monitored, and the research questions that must be posed. Part two of the book describes the main findings of this research, by identifying the risks of robotic surgery and by describing where its ancillary technologies may fail. This part addresses features and evaluation of anatomic imaging and modeling, actions in the operating room, robot monitoring and control, operator interface, and surgical training. Part three of the book draws the conclusions and offers suggestions on how to limit the risks of medical errors. One possible approach is to use automation to monitor and execute parts of an intervention, thus suggesting that robotics and artificial intelligence will be major elements of the operating room of the future.

Applications of Computational Intelligence

by Alvaro David Orjuela-Cañón Juan Carlos Figueroa-García Julián David Arias-Londoño

This book constitutes the thoroughly refereed proceedings of the First IEEE Colombian Conference, ColCACI 2018, held in Medellin, Colombia, in May 2018. The 17 full papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on artificial neural networks; computational intelligence; computer science.

Science of Cyber Security: First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11287)

by Feng Liu Shouhuai Xu Moti Yung

This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. The papers focus on science of security; cybersecurity dynamics; attacks and defenses; network security; security metrics and measurements; and performance enhancements.

Formal Methods: 21st Brazilian Symposium, SBMF 2018, Salvador, Brazil, November 26–30, 2018, Proceedings (Lecture Notes in Computer Science #11254)

by Tiago Massoni Mohammad Reza Mousavi

This book constitutes the refereed proceedings of the 21st Brazilian Symposium on Formal Methods, SBMF 2018, which took place in Salvador, Brazil, in November 2018.The 16 regular papers presented in this book were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections such as: techniques and methodologies; specification and modeling languages; theoretical foundations; verification and validation; experience reports regarding teaching formal methods; and applications.Chapter “TeSSLa: Temporal Stream-Based Specification Language” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Current Trends in Web Engineering: ICWE 2018 International Workshops, MATWEP, EnWot, KD-WEB, WEOD, TourismKG, Cáceres, Spain, June 5, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11153)

by Cesare Pautasso Fernando Sánchez-Figueroa Kari Systä Juan Manuel Murillo Rodríguez

This book constitutes the refereed thoroughly refereed post-workshop proceedings of the 18th International Conference on Web Engineering, ICWE 2018, held in Cáceres, Spain, in June 2018. The 18 revised full papers were selected from 40 submissions. The workshops complement the main conference and explore new trends on core topics of Web engineering and provide an open discussion space combining solid theory work with practical on-the-field experience. The workshop committee accepted five workshops for publication in this volume: First International Workshop on Maturity of Web Engineering Practices (MATWEP 2018), Second International Workshop on Engineering theWeb of Things (EnWoT 2018), Fourth International Workshop on Knowledge Discovery on the Web (KDWEB 2018), International Workshop on Engineering Open Data (WEOD 2018), First International Workshop on Knowledge Graphs on Travel and Tourism (TourismKG 2018).

Ambient Intelligence: 14th European Conference, AmI 2018, Larnaca, Cyprus, November 12-14, 2018, Proceedings (Lecture Notes in Computer Science #11249)

by Achilles Kameas Kostas Stathis

This book constitutes the refereed proceedings of the 14th European Conference on Ambient Intelligence, AmI 2018, held in Larnaca, Cyprus, in November 2018. The 12 revised full papers presented together with 6 short papers were carefully reviewed and selected from 36 submissions. The papers cover topics such as: Ambient Services and Smart Environments; Sensor Networks and Artificial Intelligence; Activity and Situation Recognition; Ambient Intelligence in Education.

PRIMA 2018: 21st International Conference, Tokyo, Japan, October 29-November 2, 2018, Proceedings (Lecture Notes in Computer Science #11224)

by Tim Miller Nir Oren Yuko Sakurai Itsuki Noda Bastin Tony Roy Savarimuthu Tran Cao Son

This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.

Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11005)

by Éric Renault Selma Boumerdassi Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018. The 27 papers presented in this volume were carefully reviewed and selected from 52 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Regulation Fixtures in Hydronic Heating Installations: Types, Structures, Characteristics and Applications (Studies in Systems, Decision and Control #187)

by Damian Piotr Muniak

The book focuses on design and computational issues related to fixtures and armatures in hydronic heating installations, especially regulation valves, their selection, operating principles, types and construction. The analysis is complemented by connection diagrams, drawings, photos of the valves and computational examples of their selection and operation parameters when used in a pipework and a controlled object, like a radiator. It also discusses issues related to the so-called valve authority, one of the main parameters determining the quality of the valve regulation process. Further, it includes an extensive theoretical framework along with a detailed mathematical analysis and proposes new algorithms, which have been verified and confirmed experimentally. Based on this analysis, the book presents the author’s analytical approach for sizing a regulation valve, as well as an innovative design solution for a regulation valve without the limitations of the valves currently available on the market. Lastly, it introduces a new verified method of calculating the valve pre-setting. Intended for engineers dealing with heating issues, scientists and students studying environmental engineering, energetics and related fields, the book is also useful for lecturers, designers, and those operating heating installations, as well as authors of computer programs for thermal and hydraulic balancing of heating installations.

Smart Techniques for a Smarter Planet: Towards Smarter Algorithms (Studies in Fuzziness and Soft Computing #374)

by Manoj Kumar Mishra Bhabani Shankar Mishra Yashwant Singh Patel Rajiv Misra

This book is intended to provide a systematic overview of so-called smart techniques, such as nature-inspired algorithms, machine learning and metaheuristics. Despite their ubiquitous presence and widespread application to different scientific problems, such as searching, optimization and /or classification, a systematic study is missing in the current literature. Here, the editors collected a set of chapters on key topics, paying attention to provide an equal balance of theory and practice, and to outline similarities between the different techniques and applications. All in all, the book provides an unified view on the field on intelligent methods, with their current perspective and future challenges.

Type-2 Fuzzy Logic in Control of Nonsmooth Systems: Theoretical Concepts And Applications (Studies in Fuzziness and Soft Computing #373)

by Oscar Castillo Luis T. Aguilar

This book presents the synthesis and analysis of fuzzy controllers and its application to a class of mechanical systems. It mainly focuses on the use of type-2 fuzzy controllers to account for disturbances known as hard or nonsmooth nonlinearities. The book, which summarizes the authors’ research on type-2 fuzzy logic and control of mechanical systems, presents models, simulation and experiments towards the control of servomotors with dead-zone and Coulomb friction, and the control of both wheeled mobile robots and a biped robot. Closed-loop systems are analyzed in the framework of smooth and nonsmooth Lyapunov functions.

International Conference on Intelligent Data Communication Technologies and Internet of Things (Lecture Notes on Data Engineering and Communications Technologies #26)

by Jude Hemanth Xavier Fernando Pavel Lafata Zubair Baig

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and IoT. Aimed at researchers and academicians who need to understand the importance of data communication and advanced technologies in IoT, it offers different perspectives to help readers increase their knowledge and motivates them to conduct research in the area, highlighting various innovative ideas for future research.

Future Data and Security Engineering: 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings (Lecture Notes in Computer Science #11251)

by Tran Khanh Dang Josef Küng Roland Wagner Nam Thoai Makoto Takizawa

This book constitutes the refereed proceedings of the 5th International Conference on Future Data and Security Engineering, FDSE 2018, held in Ho Chi Minh City, Vietnam, in November 2018. The 28 revised full papers and 7 short papers presented together with two papers of keynote speeches were carefully reviewed and selected from 122 submissions. The selected papers are organized into the following topical headings: security and privacy engineering; authentication and access control; big data analytics and applications; advanced studies in machine learning; deep learning and applications; data analytics and recommendation systems; Internet of Things and applications; smart city: data analytics and security; and emerging data management systems and applications.

Soft Modeling in Industrial Manufacturing (Studies in Systems, Decision and Control #183)

by Przemyslaw Grzegorzewski Andrzej Kochanski Janusz Kacprzyk

This book discusses the problems of complexity in industrial data, including the problems of data sources, causes and types of data uncertainty, and methods of data preparation for further reasoning in engineering practice. Each data source has its own specificity, and a characteristic property of industrial data is its high degree of uncertainty. The book also explores a wide spectrum of soft modeling methods with illustrations pertaining to specific cases from diverse industrial processes. In soft modeling the physical nature of phenomena may not be known and may not be taken into consideration. Soft models usually employ simplified mathematical equations derived directly from the data obtained as observations or measurements of the given system. Although soft models may not explain the nature of the phenomenon or system under study, they usually point to its significant features or properties.

Stabilization, Safety, and Security of Distributed Systems: 20th International Symposium, SSS 2018, Tokyo, Japan, November 4–7, 2018, Proceedings (Lecture Notes in Computer Science #11201)

by Taisuke Izumi Petr Kuznetsov

This book constitutes the refereed proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2018, held in Tokyo, Japan, in November 2018. The 24 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized into three tracks reflecting major trends related to distributed systems: theoretical and practical aspects of stabilizing systems; distributed networks and concurrency; and safety in malicious environments.

Learning from VLSI Design Experience

by Weng Fook Lee

This book shares with readers practical design knowledge gained from the author’s 24 years of IC design experience. The author addresses issues and challenges faced commonly by IC designers, along with solutions and workarounds. Guidelines are described for tackling issues such as clock domain crossing, using lockup latch to cross clock domains during scan shift, implementation of scan chains across power domain, optimization methods to improve timing, how standard cell libraries can aid in synthesis optimization, BKM (best known method) for RTL coding, test compression, memory BIST, usage of signed Verilog for design requiring +ve and -ve calculations, state machine, code coverage and much more. Numerous figures and examples are provided to aid the reader in understanding the issues and their workarounds.

Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11286)

by Vashek Matyáš Petr Švenda Frank Stajano Bruce Christianson Jonathan Anderson

This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018. The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.

Computational Intelligence in Information Systems: Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2018) (Advances in Intelligent Systems and Computing #888)

by Saiful Omar Wida Susanty Haji Suhaili Somnuk Phon-Amnuaisuk

This book constitutes the Proceeding of the Computational Intelligence in Information Systems conference (CIIS 2018), held in Brunei, November 16 - 18, 2018. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its application. The 19 revised papers presented in this book have been carefully selected from 41 submissions. The Conference contributes to major fields of the Computing and Information Systems in theoretical and practical aspects. This include Computational Intelligence Techniques, Data Mining, Big Data, the Internet of Things (IoTs), Machine Learning, Predictive Analytics, Product and Design technology, Smart Products, Human Centered Design (HCD), Additive Manufacturing, Information Security, Computer Networks and Cyber Technologies.

Advances in Soft and Hard Computing (Advances In Intelligent Systems and Computing #889)

by Jerzy Pejaś Imed El Fray Tomasz Hyla Janusz Kacprzyk

The book presents a collection of carefully selected, peer-reviewed papers from the 21st International Multi-Conference on Advanced Computer Systems 2018 (ACS 2018), which was held in Międzyzdroje, Poland on September 24th-26th, 2018. The goal of the ACS 2018 was to bring artificial intelligence, software technologies, biometrics, IT security and distance learning researchers in contact with the ACS community, and to give ACS attendees the opportunity to exchange notes on the latest advances in these areas of interest. The primary focus of the book is on high-quality, original and unpublished research, case studies, and implementation experiences. All of the respective papers are of practical relevance to the construction, evaluation, application or operation of advanced systems. The topics addressed are divided into five major groups: artificial intelligence, software technologies, information technology security, multimedia systems, and information system design.

Industrial Engineering in the Big Data Era: Selected Papers from the Global Joint Conference on Industrial Engineering and Its Application Areas, GJCIE 2018, June 21–22, 2018, Nevsehir, Turkey (Lecture Notes in Management and Industrial Engineering)

by Fethi Calisir Emre Cevikcan Hatice Camgoz Akdag

This book gathers extended versions of the best papers presented at the Global Joint Conference on Industrial Engineering and Its Application Areas (GJCIE), held in Nevsehir, Turkey, on June 21-22, 2018. They reports on industrial engineering methods and applications, with a special focus on the advantages and challenges posed by Big data in this field. The book covers a wide range of topics, including decision making, optimization, supply chain management and quality control.

Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11272)

by Thomas Peyrin Steven Galbraith

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11273)

by Steven Galbraith Thomas Peyrin

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Refine Search

Showing 33,601 through 33,625 of 54,123 results