My Account Log in

1 option

Towards Extensible and Adaptable Methods in Computing / edited by Shampa Chakraverty, Anil Goel, Sanjay Misra.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Chakraverty, Shampa, editor.
Goel, Anil, editor.
Misra, Sanjay, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Language:
English
Subjects (All):
Software engineering.
Computer programming.
Management information systems.
Computer science.
Software Engineering.
Programming Techniques.
Management of Computing and Information Systems.
Local Subjects:
Software Engineering.
Programming Techniques.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XIX, 407 pages) : 179 illustrations, 119 illustrations in color
Edition:
First edition 2018.
Contained In:
Springer eBooks
Place of Publication:
Singapore : Springer Singapore : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web Intelligence, Machine Learning and Computing in Education. These sub-domains of computing work together in mutually complementary ways to build systems and applications that scale well, and which can successfully meet the demands of changing times and contexts. The topics under each track have been carefully selected to highlight certain qualitative aspects of applications and systems, such as scalability, flexibility, integration, efficiency and context awareness. The first section (Agile Software Development) includes six contributions that address related issues, including risk management, test case prioritization and tools, open source software reliability and predicting the change proneness of software. The second section (Data Management) includes discussions on myriad issues, such as extending database caches using solid-state devices, efficient data transmission, healthcare applications and data security. In turn, the third section (Machine Learning) gathers papers that investigate ML algorithms and present their specific applications such as portfolio optimization, disruption classification and outlier detection. The fourth section (Web Intelligence) covers emerging applications such as metaphor detection, language identification and sentiment analysis, and brings to the fore web security issues such as fraud detection and trust/reputation systems. In closing, the fifth section (Computing in Education) focuses on various aspects of computer-aided pedagogical methods.
Contents:
Chapter 1. Risk Assessment Framework: ADRIM Process model for Global Software Development
Chapter 2. An Extended Test Case Prioritization Technique using Script and Linguistic Parameters in a Distributed Agile Environment
Chapter 3. AutoJet: Web Application Automation Tool
Chapter 4. Prioritisation of User Story Acceptance Tests in Agile Software Development using Meta Heuristic Techniques in Comparative Analysis
Chapter 5. Software Reliability assessment using Deep Learning Technique
Chapter 6 . Empirical Validation of OO metrics and machine learning algorithms for software change proneness
Chapter 7. Extending database cache using SSDs
Chapter 8. Cloud Based Healthcare Monitoring System Using STORM And KAFKA
Chapter 9. Honeynet Data Analysis and Distributed SSH Brute-Force Attacks
Chapter 10. Efficient Data Transmission in WSN: Techniques and Future Challenges
Chapter 11. A Study of Epidemic Spreading and Rumor Spreading over Complex Networks
Chapter 12. Medical Alert System using Social Data
Chapter 13. A novel framework for portfolio optimization based on modified Simulated Annealing algorithm using ANN, RBFN and ABC Algorithm
Chapter 14. A Proposed Method for Disruption Classification in Tokamak using Convolutional Neural Network
Chapter 15. Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection Using Weka
Chapter 16. Super-Intelligent Machine Operations in 21st Century Manufacturing Industries: A Boost or Doom to Political and Human Development?
Chapter 17. Exploring Ensembles for Unsupervised Outlier Detection: An Empirical Analysis
Chapter 18. A Review of Type-III Metaphors
Chapter 19. Multi-Class Classification of Sentiments in Hindi Sentences Based on Intensities
Chapter 20. Language identification for Hindi language transliterated text in Roman Script using Generative Adversarial Networks
Chapter 21. An improved Similarity Measure to alleviate sparsity problem in Context Aware Recommender Systems
Chapter 22. Trust and Reputation-Based Model to Prevent Denial of Service Attacks in Mobile Agent System
Chapter 23. Fraud Detection in Online Transactions Using Supervised Learning Techniques
Chapter 24. Real-time Printed Text Reader for Visually Impaired
Chapter 25. Knowledge and Belief Based Task Assignment in Crowdsourcing Platform
Chapter 26. Teaching Algorithms Using an Android App
Chapter 27. Keyword Extraction using Graph Centrality and WordNet
Chapter 28. Hybrid Mobile Learning Architecture for Higher Education
Chapter 29. Using Collaborative Robotics as a Way to Engage Students
Chapter 30. Assessing Scratch Programmers' Development of Computational Thinking with Transaction-Level Data.
Other Format:
Printed edition:
ISBN:
978-981-13-2348-5
9789811323485
9789811323478
9789811323492
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account