Towards Extensible and Adaptable Methods in Computing

This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web I...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chakraverty, Shampa (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Goel, Anil (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Misra, Sanjay (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06718nam a2200505 4500
001 978-981-13-2348-5
003 DE-He213
005 20191023232124.0
007 cr nn 008mamaa
008 181104s2018 si | s |||| 0|eng d
020 |a 9789811323485  |9 978-981-13-2348-5 
024 7 |a 10.1007/978-981-13-2348-5  |2 doi 
040 |d GrThAP 
050 4 |a QA76.758 
072 7 |a UMZ  |2 bicssc 
072 7 |a COM051230  |2 bisacsh 
072 7 |a UMZ  |2 thema 
082 0 4 |a 005.1  |2 23 
245 1 0 |a Towards Extensible and Adaptable Methods in Computing  |h [electronic resource] /  |c edited by Shampa Chakraverty, Anil Goel, Sanjay Misra. 
250 |a 1st ed. 2018. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2018. 
300 |a XIX, 407 p. 179 illus., 119 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1. Risk Assessment Framework: ADRIM Process model for Global Software Development -- Chapter 2. An Extended Test Case Prioritization Technique using Script and Linguistic Parameters in a Distributed Agile Environment -- Chapter 3. AutoJet: Web Application Automation Tool -- Chapter 4. Prioritisation of User Story Acceptance Tests in Agile Software Development using Meta Heuristic Techniques in Comparative Analysis -- Chapter 5. Software Reliability assessment using Deep Learning Technique -- Chapter 6 . Empirical Validation of OO metrics and machine learning algorithms for software change proneness -- Chapter 7. Extending database cache using SSDs -- Chapter 8. Cloud Based Healthcare Monitoring System Using STORM And KAFKA -- Chapter 9. Honeynet Data Analysis and Distributed SSH Brute-Force Attacks -- Chapter 10. Efficient Data Transmission in WSN: Techniques & Future Challenges -- Chapter 11. A Study of Epidemic Spreading and Rumor Spreading over Complex Networks -- Chapter 12. Medical Alert System using Social Data -- Chapter 13. A novel framework for portfolio optimization based on modified Simulated Annealing algorithm using ANN, RBFN and ABC Algorithm -- Chapter 14. A Proposed Method for Disruption Classification in Tokamak using Convolutional Neural Network -- Chapter 15. Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection Using Weka -- Chapter 16. Super-Intelligent Machine Operations in 21st Century Manufacturing Industries: A Boost or Doom to Political and Human Development? -- Chapter 17. Exploring Ensembles for Unsupervised Outlier Detection: An Empirical Analysis -- Chapter 18. A Review of Type-III Metaphors -- Chapter 19. Multi-Class Classification of Sentiments in Hindi Sentences Based on Intensities -- Chapter 20. Language identification for Hindi language transliterated text in Roman Script using Generative Adversarial Networks -- Chapter 21. An improved Similarity Measure to alleviate sparsity problem in Context Aware Recommender Systems -- Chapter 22. Trust and Reputation-Based Model to Prevent Denial of Service Attacks in Mobile Agent System -- Chapter 23. Fraud Detection in Online Transactions Using Supervised Learning Techniques -- Chapter 24. Real-time Printed Text Reader for Visually Impaired -- Chapter 25. Knowledge and Belief Based Task Assignment in Crowdsourcing Platform -- Chapter 26. Teaching Algorithms Using an Android App -- Chapter 27. Keyword Extraction using Graph Centrality and WordNet -- Chapter 28. Hybrid Mobile Learning Architecture for Higher Education -- Chapter 29. Using Collaborative Robotics as a Way to Engage Students -- Chapter 30. Assessing Scratch Programmers' Development of Computational Thinking with Transaction-Level Data. 
520 |a This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web Intelligence, Machine Learning and Computing in Education. These sub-domains of computing work together in mutually complementary ways to build systems and applications that scale well, and which can successfully meet the demands of changing times and contexts. The topics under each track have been carefully selected to highlight certain qualitative aspects of applications and systems, such as scalability, flexibility, integration, efficiency and context awareness. The first section (Agile Software Development) includes six contributions that address related issues, including risk management, test case prioritization and tools, open source software reliability and predicting the change proneness of software. The second section (Data Management) includes discussions on myriad issues, such as extending database caches using solid-state devices, efficient data transmission, healthcare applications and data security. In turn, the third section (Machine Learning) gathers papers that investigate ML algorithms and present their specific applications such as portfolio optimization, disruption classification and outlier detection. The fourth section (Web Intelligence) covers emerging applications such as metaphor detection, language identification and sentiment analysis, and brings to the fore web security issues such as fraud detection and trust/reputation systems. In closing, the fifth section (Computing in Education) focuses on various aspects of computer-aided pedagogical methods. 
650 0 |a Software engineering. 
650 0 |a Computer programming. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 1 4 |a Software Engineering.  |0 http://scigraph.springernature.com/things/product-market-codes/I14029 
650 2 4 |a Programming Techniques.  |0 http://scigraph.springernature.com/things/product-market-codes/I14010 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
700 1 |a Chakraverty, Shampa.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Goel, Anil.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Misra, Sanjay.  |e editor.  |0 (orcid)0000-0002-3556-9331  |1 https://orcid.org/0000-0002-3556-9331  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811323478 
776 0 8 |i Printed edition:  |z 9789811323492 
856 4 0 |u https://doi.org/10.1007/978-981-13-2348-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)