Emerging Engineering Approaches and Applications : Emerging Engineering Approaches and Applications.

By: Zhao, Yonghao
Contributor(s): Mao, Elwin | Xu, Lin Li
Series: Advanced Engineering Forum: Publisher: Durnten : Trans Tech Publications, Limited, 2011Copyright date: ©2011Edition: 1st edDescription: 1 online resource (436 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9783038136620Subject(s): Mechanics, Applied -- Congresses.;Engineering -- Data processing -- Congresses.;Materials science -- CongressesGenre/Form: Electronic books. Additional physical formats: Print version:: Emerging Engineering Approaches and Applications : Emerging Engineering Approaches and ApplicationsDDC classification: 620.1 LOC classification: TA350.I527 2011ebOnline resources: Click to View
Contents:
Intro -- Emerging Engineering Approaches and Applications -- Preface and Committees and Sponsors -- Table of Contents -- Chapter 1: Engineering Applications -- The Reversing Paging Process of Callee in Heterogeneous Networks -- Multi-Objective Particle Swarm Optimization with Dynamic Crowding Entropy-Based Diversity Measure -- Cooperation Design System Based on Mobile-C Agent Platform -- The Analysis and Prevent in Traffic Accidents Based on Bayesian Network -- Research on Modeling for Administrative Law Enforcement Based on Workflow-Net -- Study of the Characteristic and Information Architecture Model of Enterprise Web Application -- Mining Implied Semantics of Database -- The Load Balancing System Design of Service Based on IXP2400 -- Correlation Analysis of Behavioral Factors of Construction Safety Based on the Chi-Square Test -- Research on Subject Trust Evaluation Based on Fuzzy Theory -- LEC-AODV Routing Protocol Based on Load and Energy Classification -- Research and Design of a Fusion Technology in Highway Engineering Measurement and Payment System -- Optimal Coverage Model in Clifford 3-Connected Wireless Sensor Networks -- MACRE: a Novel Distributed Congestion Control Algorithm in DTN -- Study on Forensic Investigation of Network Crime in Cloud Computing Environment -- A Novel Routing Protocol Based on the Channel Load Similarity for Multi-Interface Wireless Mesh Networks -- Monitoring Dissolved Oxygen Concentration (DOC) in Prawn Aquiculture Water Environment Based on Biological Behavior Characteristics -- Nondestructive Prediction of Optimal Harvest Time of Cherry Tomatoes Using VIS-NIR Spectroscopy and PLSR Calibration -- Design of Embedded Automated Fingerprint Identification System Based on DSP -- Chapter 2: Industrial Engineering -- Product Family Modeling Method for Rapid Response Design.
A Hybrid Shuffled Frog Leaping Algorithm for Solving No_Idle Permutation Flow Shop Scheduling Problems -- CU Splitting on Frame Boundary for Arbitrary Resolution Video in HEVC -- Resonant Diaphragm Liquid Density Sensor -- Locating Internet Instability under Simultaneous Events -- S3C6410-Based CDMA Short Message Communication System on WINCE6.0 Platform -- Origin of Ultraviolet Luminescence from Bulk ZnO Thin Films Grown by Molecular Beam Epitaxy -- Design and Research of Industrial Permanent Magnetic Bearing -- A Hierarchical Structure of Service-Oriented Manufacturing Mode -- Study of Combination Algorithm in Partitioning Manufacture Technology -- The Machinability of MAR-M247 Superalloy -- Chapter 3: Computational Methods for Engineering -- The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension -- An Evaluation Survey of Score Normalization in Multibiometric Systems -- Non-Line-of-Sight Error Mitigation in Wireless Communication Systems -- Information Delay Protocol Using Non-Orthogonal Quantum States -- A New Algorithm of Image Encryption Based on 3D Arnold Cat -- A New Digital Watermarking Algorithm Based on DWT-DCT-RLC -- Interactive Genetic Algorithms with Grey Level of Individual Interval Fitness -- Identity-Based Multi-Signcryption with Public Verifiability -- The Improved K-Means Algorithm in Intrusion Detection System Research -- SVD-Based Color Image Watermarking Using Discrete Wavelet Transform -- Species Identification on a Small Sample Size of RNA Sequences by Combined Method of Noise Filtering with L2-Norm -- The Comparison of the Effect of Haimming Window and Blackman Window in the Time-Scaling and Pitch-Shifting Algorithms -- Cockroach Swarm Optimization Algorithm for TSP -- Modeling and Analysis of Upload Utilization in BitTorrent System.
An Image Edge Detection Method Based on Improved Ant Colony Algorithm -- Researches on Design and Implementations of Two 2-Bit Predictors -- Fuzzy Relational Clustering Based on Knowledge Mesh and its Application -- Algorithm for Feature Extraction of Heart Sound Signal Based on Sym7 Wavelet -- Local Refinement for Graph Partitioning Based on Level Structure -- Study on the Algorithm for Real-Time Interpolation of NURBS Curve -- Root Node Vaccines for Bayesian Network Structure Learning Based on Immune Algorithm -- Improving the Performance of Process Controllers Using a New Clustered Neural Network -- The Image Filtering Algorithm Based on the Enlarged Pixel Domain -- The Image Skeleton Extraction Algorithm Based on Highest Rectangle -- Study on Route Stability Based on the Metrics of Local Topology Transformation Entropy in Mobile Ad Hoc Networks -- Chapter 4: Engineering Information System -- A Hierarchical Key Management Scheme in Mobile Ad hoc Networks -- An Intelligent Storage Determining Method for Unloaded Containers in a Cycling Trailer Deployment Mode -- Indexing Associated Knowledge Flow on the Web -- Research on Hiding Technology of Web Malicious Code -- Half-Droptail: Algorithm to Mitigate LDoS Attacks -- Virtual Area Routing: a Scalable Intra-Domain Routing Scheme -- No-Reference Image Quality Assessment Based on Visual Perception -- Comparison of the Consumption of Resources between HTTP and SIP -- A Real-Time Monitoring System of Energy Measurement -- A Smart Sentiment Analysis System in Word, Sentence and Text Level -- Design on Highway Information Publishing System and Benefit Analysis of Traffic Control System -- Analysis on Characteristics of Earthquake in the West Chinese Mainland and its Adjacent Areas -- Chapter 5: Engineering Management -- Six Sigma Applied in Inventory Management.
Developmental Research on "Life Skill" Cultivation in P.E. Curriculum System of Universities -- Nondestructive Measurement of Grape Leaf Chlorophyll Content Using Multi-Spectral Imaging Technology and Calibration Models -- Developing the Indicators of e-Decision Making Competence for College Students -- Multimedia Quality Integration Using Piecewise Function -- Practical Economic Statistical Design of ̅X Chart -- A New Approach for Solving Optimal Nonlinear Control Problems Using Decriminalization and Rationalized Haar Functions -- A Personalized Music Recommender Based on Potential Preference Learning Dynamically -- Process Preparation Resources Integration Service Mode and Semantic Description in Manufacturing Grid -- Online Multi-Attribute Reverse Auction Mechanism Design Based on Utility -- Post Value Fine Management System for Power Plant -- A Service Composition Approach Based on Patterns -- Empirical Mode Decomposition De-Noising Method Based on Improved Soft-Threshold -- Keywords Index -- Authors Index.
Summary: This special volume addresses the hottest issues in new engineering approaches and applications. It covers a wide range of topics in this area: including engineering applications, industrial engineering, engineering computational methods, engineering information systems and engineering management, etc. Via this volume, researchers in this field can access cutting-edge information.Review from Book News Inc.: The 80 papers selected for the August 2011 conference share recent research on engineering information systems, engineering management, industrial engineering, and computational methods for engineering. Two papers from the Shanghai Maritime University propose a storage location method for containers unloaded at a port terminal and a personalized music recommendation system. A contribution from the East China University of Political Science and Law explores the forensic investigation of network crime in the cloud computing environment, and a study from the Zhejiang University of Technology determines the optimal harvest time of cherry tomatoes using VIS-NIR spectroscopy and PLSR calibration. Other topics include six sigma inventory management, an image filtering algorithm, a resonant diaphragm liquid density sensor, and a server load balancing system.
Item type Current location Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF-N000439
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP-N000439
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Intro -- Emerging Engineering Approaches and Applications -- Preface and Committees and Sponsors -- Table of Contents -- Chapter 1: Engineering Applications -- The Reversing Paging Process of Callee in Heterogeneous Networks -- Multi-Objective Particle Swarm Optimization with Dynamic Crowding Entropy-Based Diversity Measure -- Cooperation Design System Based on Mobile-C Agent Platform -- The Analysis and Prevent in Traffic Accidents Based on Bayesian Network -- Research on Modeling for Administrative Law Enforcement Based on Workflow-Net -- Study of the Characteristic and Information Architecture Model of Enterprise Web Application -- Mining Implied Semantics of Database -- The Load Balancing System Design of Service Based on IXP2400 -- Correlation Analysis of Behavioral Factors of Construction Safety Based on the Chi-Square Test -- Research on Subject Trust Evaluation Based on Fuzzy Theory -- LEC-AODV Routing Protocol Based on Load and Energy Classification -- Research and Design of a Fusion Technology in Highway Engineering Measurement and Payment System -- Optimal Coverage Model in Clifford 3-Connected Wireless Sensor Networks -- MACRE: a Novel Distributed Congestion Control Algorithm in DTN -- Study on Forensic Investigation of Network Crime in Cloud Computing Environment -- A Novel Routing Protocol Based on the Channel Load Similarity for Multi-Interface Wireless Mesh Networks -- Monitoring Dissolved Oxygen Concentration (DOC) in Prawn Aquiculture Water Environment Based on Biological Behavior Characteristics -- Nondestructive Prediction of Optimal Harvest Time of Cherry Tomatoes Using VIS-NIR Spectroscopy and PLSR Calibration -- Design of Embedded Automated Fingerprint Identification System Based on DSP -- Chapter 2: Industrial Engineering -- Product Family Modeling Method for Rapid Response Design.

A Hybrid Shuffled Frog Leaping Algorithm for Solving No_Idle Permutation Flow Shop Scheduling Problems -- CU Splitting on Frame Boundary for Arbitrary Resolution Video in HEVC -- Resonant Diaphragm Liquid Density Sensor -- Locating Internet Instability under Simultaneous Events -- S3C6410-Based CDMA Short Message Communication System on WINCE6.0 Platform -- Origin of Ultraviolet Luminescence from Bulk ZnO Thin Films Grown by Molecular Beam Epitaxy -- Design and Research of Industrial Permanent Magnetic Bearing -- A Hierarchical Structure of Service-Oriented Manufacturing Mode -- Study of Combination Algorithm in Partitioning Manufacture Technology -- The Machinability of MAR-M247 Superalloy -- Chapter 3: Computational Methods for Engineering -- The BP Network Classification Leafminer-Infected Leaves Based on the Fractal Dimension -- An Evaluation Survey of Score Normalization in Multibiometric Systems -- Non-Line-of-Sight Error Mitigation in Wireless Communication Systems -- Information Delay Protocol Using Non-Orthogonal Quantum States -- A New Algorithm of Image Encryption Based on 3D Arnold Cat -- A New Digital Watermarking Algorithm Based on DWT-DCT-RLC -- Interactive Genetic Algorithms with Grey Level of Individual Interval Fitness -- Identity-Based Multi-Signcryption with Public Verifiability -- The Improved K-Means Algorithm in Intrusion Detection System Research -- SVD-Based Color Image Watermarking Using Discrete Wavelet Transform -- Species Identification on a Small Sample Size of RNA Sequences by Combined Method of Noise Filtering with L2-Norm -- The Comparison of the Effect of Haimming Window and Blackman Window in the Time-Scaling and Pitch-Shifting Algorithms -- Cockroach Swarm Optimization Algorithm for TSP -- Modeling and Analysis of Upload Utilization in BitTorrent System.

An Image Edge Detection Method Based on Improved Ant Colony Algorithm -- Researches on Design and Implementations of Two 2-Bit Predictors -- Fuzzy Relational Clustering Based on Knowledge Mesh and its Application -- Algorithm for Feature Extraction of Heart Sound Signal Based on Sym7 Wavelet -- Local Refinement for Graph Partitioning Based on Level Structure -- Study on the Algorithm for Real-Time Interpolation of NURBS Curve -- Root Node Vaccines for Bayesian Network Structure Learning Based on Immune Algorithm -- Improving the Performance of Process Controllers Using a New Clustered Neural Network -- The Image Filtering Algorithm Based on the Enlarged Pixel Domain -- The Image Skeleton Extraction Algorithm Based on Highest Rectangle -- Study on Route Stability Based on the Metrics of Local Topology Transformation Entropy in Mobile Ad Hoc Networks -- Chapter 4: Engineering Information System -- A Hierarchical Key Management Scheme in Mobile Ad hoc Networks -- An Intelligent Storage Determining Method for Unloaded Containers in a Cycling Trailer Deployment Mode -- Indexing Associated Knowledge Flow on the Web -- Research on Hiding Technology of Web Malicious Code -- Half-Droptail: Algorithm to Mitigate LDoS Attacks -- Virtual Area Routing: a Scalable Intra-Domain Routing Scheme -- No-Reference Image Quality Assessment Based on Visual Perception -- Comparison of the Consumption of Resources between HTTP and SIP -- A Real-Time Monitoring System of Energy Measurement -- A Smart Sentiment Analysis System in Word, Sentence and Text Level -- Design on Highway Information Publishing System and Benefit Analysis of Traffic Control System -- Analysis on Characteristics of Earthquake in the West Chinese Mainland and its Adjacent Areas -- Chapter 5: Engineering Management -- Six Sigma Applied in Inventory Management.

Developmental Research on "Life Skill" Cultivation in P.E. Curriculum System of Universities -- Nondestructive Measurement of Grape Leaf Chlorophyll Content Using Multi-Spectral Imaging Technology and Calibration Models -- Developing the Indicators of e-Decision Making Competence for College Students -- Multimedia Quality Integration Using Piecewise Function -- Practical Economic Statistical Design of ̅X Chart -- A New Approach for Solving Optimal Nonlinear Control Problems Using Decriminalization and Rationalized Haar Functions -- A Personalized Music Recommender Based on Potential Preference Learning Dynamically -- Process Preparation Resources Integration Service Mode and Semantic Description in Manufacturing Grid -- Online Multi-Attribute Reverse Auction Mechanism Design Based on Utility -- Post Value Fine Management System for Power Plant -- A Service Composition Approach Based on Patterns -- Empirical Mode Decomposition De-Noising Method Based on Improved Soft-Threshold -- Keywords Index -- Authors Index.

This special volume addresses the hottest issues in new engineering approaches and applications. It covers a wide range of topics in this area: including engineering applications, industrial engineering, engineering computational methods, engineering information systems and engineering management, etc. Via this volume, researchers in this field can access cutting-edge information.Review from Book News Inc.: The 80 papers selected for the August 2011 conference share recent research on engineering information systems, engineering management, industrial engineering, and computational methods for engineering. Two papers from the Shanghai Maritime University propose a storage location method for containers unloaded at a port terminal and a personalized music recommendation system. A contribution from the East China University of Political Science and Law explores the forensic investigation of network crime in the cloud computing environment, and a study from the Zhejiang University of Technology determines the optimal harvest time of cherry tomatoes using VIS-NIR spectroscopy and PLSR calibration. Other topics include six sigma inventory management, an image filtering algorithm, a resonant diaphragm liquid density sensor, and a server load balancing system.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments for this item.

to post a comment.