Computational science and technology : 4th ICCST 2017, Kuala Lumpur, Malaysia, 29-30 November, 2017 /: 4th ICCST 2017, Kuala Lumpur, Malaysia, 29-30 November, 2017. (2018)
- Record Type:
- Book
- Title:
- Computational science and technology : 4th ICCST 2017, Kuala Lumpur, Malaysia, 29-30 November, 2017 /: 4th ICCST 2017, Kuala Lumpur, Malaysia, 29-30 November, 2017. (2018)
- Main Title:
- Computational science and technology : 4th ICCST 2017, Kuala Lumpur, Malaysia, 29-30 November, 2017
- Other Titles:
- ICCST 2017
- Further Information:
- Note: Rayner Alfred, Hiroyuki Iida, Ag. Asri Ag. Ibrahim, Yuto Lim, editors.
- Editors:
- Alfred, Rayner
Iida, Hiroyuki, 1962-
Ibrahim, Ag. Asri Ag
Lim, Yuto - Other Names:
- International Conference on Computational Science and Technology. International, 4th
- Contents:
- Intro; Preface; Contents; Sequential and Global Learning Styles as Pathways to Improve Learning in Programming; Abstract; 1 Introduction; 2 Motivation of the Study; 3 Experiments; 3.1 Documentation Procedure; 3.2 Hypothesis; 3.3 Experimental Design; 3.4 Participants; 3.5 Validity; 4 Data Analysis and Results; 5 Conclusion; Acknowledgments; References; Vulnerability Reports Consolidation for Network Scanners; Abstract; 1 Introduction; 2 Background; 2.1 Types of Vulnerability Scanner; 2.2 Architecture of a Vulnerability Scanner; 2.3 Vulnerability Source and Database. 2.4 Existing Free Vulnerability Management and Reporting Tools3 Solution Design; 3.1 Process Flow; 3.2 Programming Language and Libraries Used; 3.3 Data Processing and Consolidation; 4 Implementation Result; 5 Conclusion; Acknowledgement; References; A Performance Comparison of Feature Selection Methods for Sentiment Classification; Abstract; 1 Introduction; 2 Related Works; 3 Experimental Setup; 4 Results and Discussion; 5 Conclusion; References; A Real Time Road Marking Detection System on Large Variability Road Images Database; Abstract; 1 Introduction; 2 Methodology. 2.1 Inverse Perspective Transform2.2 Image Normalization; 2.3 Edge Detection; 2.4 Data Acquisition Method; 2.5 Results and Discussions; 2.6 Conclusion; References; Time Delay Modeling for Energy Efficient Thermal Comfort Control System in Smart Home Environment; 1 Introduction; 2 Research Background; 2.1 Smart Homes; 2.2 Thermal Comfort; 2.3Intro; Preface; Contents; Sequential and Global Learning Styles as Pathways to Improve Learning in Programming; Abstract; 1 Introduction; 2 Motivation of the Study; 3 Experiments; 3.1 Documentation Procedure; 3.2 Hypothesis; 3.3 Experimental Design; 3.4 Participants; 3.5 Validity; 4 Data Analysis and Results; 5 Conclusion; Acknowledgments; References; Vulnerability Reports Consolidation for Network Scanners; Abstract; 1 Introduction; 2 Background; 2.1 Types of Vulnerability Scanner; 2.2 Architecture of a Vulnerability Scanner; 2.3 Vulnerability Source and Database. 2.4 Existing Free Vulnerability Management and Reporting Tools3 Solution Design; 3.1 Process Flow; 3.2 Programming Language and Libraries Used; 3.3 Data Processing and Consolidation; 4 Implementation Result; 5 Conclusion; Acknowledgement; References; A Performance Comparison of Feature Selection Methods for Sentiment Classification; Abstract; 1 Introduction; 2 Related Works; 3 Experimental Setup; 4 Results and Discussion; 5 Conclusion; References; A Real Time Road Marking Detection System on Large Variability Road Images Database; Abstract; 1 Introduction; 2 Methodology. 2.1 Inverse Perspective Transform2.2 Image Normalization; 2.3 Edge Detection; 2.4 Data Acquisition Method; 2.5 Results and Discussions; 2.6 Conclusion; References; Time Delay Modeling for Energy Efficient Thermal Comfort Control System in Smart Home Environment; 1 Introduction; 2 Research Background; 2.1 Smart Homes; 2.2 Thermal Comfort; 2.3 Cyber-Physical Systems; 3 Energy Efficient Thermal Comfort Control System; 3.1 State Description; 4 PTIDES Model for EETCC System; 4.1 Task Dependency; 4.2 Time Label Assignment; 4.3 Safe-to-Process Analysis; 5 Numerical Evaluation; 6 Concluding Remarks. 4.2 Evaluating the Parameters of SURF4.3 Comparison the Results of SIFT and SURF; 5 Conclusion and Future Work; Acknowledgement; References; Optimizing Congestion Control for Non Safety Messages in VANETs Using Taguchi Method; Abstract; 1 Introduction; 2 Optimization; 3 Experiment Phase; 3.1 Urban Map Set-up; 3.2 Taguchi Method; 3.2.1 Planning Phase; 3.2.2 Experiment Phase; 3.2.3 Experiment Phase; 4 Experimental Analysis; 5 Result and Findings; 5.1 Bit Rate Parameter; 5.2 Number of Vehicles Parameter; 5.3 Packet Size Parameter; 5.4 Send Interval Parameter; 5.5 Simulation Time Parameter. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (x, 466 pages), illustrations
- Subjects:
- 004.6
Computer networks -- Congresses
Computer science -- Congresses
Information technology -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Computer networks
Computer science
Information technology
Signal, Image and Speech Processing
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811082764
9811082766 - Related ISBNs:
- 9789811082757
9811082758 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed February 26, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.407205
- Ingest File:
- 02_479.xml