Advances in Computational Science and Engineering

Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

Advances in Computational Science and Engineering

Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

59,92 €*

lieferbar, sofort per Download

This volume constitutes the selected and extended papers of workshops and symposia of the International Conference, on Advances in Computational Science and Engineering, FGCN2008, held in Sanya, Hainan Island, China in December 2008. The volume contains the workshops on peer-to-peer computing for information search (P2PSearch 2008), on wireless ad hoc, mesh and sensor networks (WAMSNet-08), on sensor networks and applications (SNA 2008), on wireless communications for intelligent transportation systems (WITS-08), on network assurance (NA 2008) , on communication & network technology management 2008 (CNM 2008), on forensics for future generation communication environments (F2GC-08), as well as on silver technology for aging society (STAS2008), together with the symposia on the 3rd international symposium on smart home (SH'08), on database theory and application (DTA-08), on u- and e- service, science and technology (UNESST-08), on control and automation (CA-08) , on grid and distributed computing (GDC-08), as well as on signal processing, image processing and pattern recognition (SIP 2008).

1;Preface;52;Organization;73;Table of Contents;104;A Heuristic Approach for Designing Regional Language Based Raw-Text Extractor and Unicode Font-Mapping Tool;124.1;Introduction;124.2;Related Works;134.3;Our Work;134.3.1;Main ( );144.3.2;Process (Inputfolderpath, Outputfolderpath);144.3.3;Recursivetraverse (Filepath);154.3.4;Webpageverifier (Filepath);154.3.5;Rawtextextractor (Webpage);154.3.6;Fontmapper (String);164.3.7;Search (Proprietaryfontvalue);164.4;Result and Discussion;174.4.1;Complexity Analysis of the Stated Algorithm;174.4.2;Test Results;174.5;Conclusion;224.6;References;235;Aspect-Oriented Formal Specification for Real-Time Systems;245.1;Introduction;245.2;Aspect-Oriented Formal Specification;255.3;Case Studies;285.3.1;Aspect-Oriented Formal Specification of Multimedia Stream;285.3.2;Aspect Oriented Formal Specification of ABP;315.3.3;Integration of Informal Specification and Formal Specification by Aspect- Oriented Approach;345.4;Conclusion and Future Research;405.5;References;416;The Advanced of Fuzzy Vault Using Password;446.1;Introduction;446.2;Related work;456.2.1;Fuzzy Logic;456.2.2;Fuzzy Vault Scheme;456.2.3;Fingerprint;466.2.4;Fuzzy Vault Scheme for Fingerprint;466.2.5;Hardening Fingerprint Fuzzy Vault Using Password;476.3;Vulnerability Analysis of Hardening Fuzzy Vault Using Password;496.3.1;Adversarial Model;496.3.2;The Problem of K. Nandakumar's Scheme;516.3.3;The Attacks Scenario;516.3.4;Proposed Scheme;526.4;Conclusion;546.5;References;547;An Enhanced EDD QoS Scheduler for IEEE 802.11e WLAN;567.1;Introduction;567.2;Related Work;587.2.1;IEEE 802.11e HCCA Protocol;587.2.2;Reference Scheduler;597.2.3;SETT-EDD Scheduler;607.2.4;ARROW Scheduler;627.3;Proposed Scheduling Algorithm;637.3.1;TXOP Allocation;637.3.2;SI Allocation;647.4;Performance Evaluation of the Proposed Algorithm;657.4.1;Simulation Scenarios;667.4.2;Analysis of the Simulation Results;667.5;Conclusion;697.6;References;708;Recognition of Loneliness of the Elderly People in Ubiquitous Computing Environment;718.1;Introduction;718.2;Related Work;728.3;Scenario for the Loneliness Inference System;738.4;Definition of Lonely Cases;748.4.1;Case 1.1;758.4.2;Case 1.2;788.4.3;Case 2;798.5;Inference;818.6;System Architecture;818.7;Conclusions;828.8;References;839;Voronoi-assisted Parallel Bidirectional Heuristic Search;849.1;Introduction;849.2;Our Proposal;879.3;Performance Evaluation;889.4;Conclusion;949.5;References;9410;Artificial K-Lines and Applications;9610.1;Introduction;9610.2;Our Proposal;9710.3;AKL Applications;9910.3.1;Application 1: Robot and Assembly Line Example;9910.3.2;Application 2: Machine Learning;10210.4;Comparison with Neural Networks;10710.5;Conclusion;10710.6;References;10811;Spike Sorting Method Based on Two-Stage Radial Basis Function Networks;10911.1;Introduction;10911.2;Two-Stage Radius Basis Function Network;11011.2.1;Training Stage of RBF Networks;11111.2.2;Testing Stage of RBF Networks;11211.3;Data Source;11311.3.1;Obtain Raw Signals and Add White Noise;11311.3.2;Spike Detection;11411.3.3;Spike Sorting;11411.4;Experiment Results;11411.5;Conclusion;11511.6;References;11612;The Establishment of $in vitro$ Model of Primary Rat Brain Microvascular Endothelial Cells;11712.1;Introduction;11712.2;Materials and Methods;11812.2.1;Animals;11812.2.2;Reagents;11912.2.3;Culture Solution;11912.2.4;Culture Flask;11912.2.5;Method;11912.3;Results;12012.3.1;BMEC Were Cultivated in 24 Hours;12012.3.2;BMEC after 1 Week of Culture;12112.4;Discussions;12212.5;References;12413;A FC-GSEA Approach to Identify Significant Gene-Sets Using Microarray Gene Expression Data;12613.1;Introduction;12613.2;Gene Set Enrichment Analysis;12713.3;FC-GSEA : Fisher's Criterion Based GSEA;12813.3.1;Motivation;12813.3.2;Fisher's Criterion Based Gene Ranking;13013.3.3;Estimating Significance in FC-GSEA;13313.3.4;Multiple Hypothesis Test in FC-GSEA;134
ISBN 9783642102387
Artikelnummer 9783642102387
Medientyp E-Book - PDF
Copyrightjahr 2009
Verlag Springer-Verlag
Umfang 269 Seiten
Sprache Englisch
Kopierschutz Adobe DRM