ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Artificial intelligence in intelligent systems : proceedings of 10th Computer Science On-line Conference 2021. Vol. 2

دانلود کتاب هوش مصنوعی در سیستم‌های هوشمند: مجموعه مقالات دهمین کنفرانس آنلاین علوم کامپیوتر 2021. جلد. 2

Artificial intelligence in intelligent systems : proceedings of 10th Computer Science On-line Conference 2021. Vol. 2

مشخصات کتاب

Artificial intelligence in intelligent systems : proceedings of 10th Computer Science On-line Conference 2021. Vol. 2

ویرایش:  
نویسندگان:   
سری: Lecture notes in networks and systems, 
ISBN (شابک) : 9783030774455, 3030774457 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 778 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 73 مگابایت 

قیمت کتاب (تومان) : 37,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب Artificial intelligence in intelligent systems : proceedings of 10th Computer Science On-line Conference 2021. Vol. 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش مصنوعی در سیستم‌های هوشمند: مجموعه مقالات دهمین کنفرانس آنلاین علوم کامپیوتر 2021. جلد. 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Organization
	Program Committee
	Program Committee Chairs
	Program Committee Members
	Technical Program Committee Members
	Organizing Committee Chair
	Conference Organizer (Production)
	Conference Website, Call for Papers
Contents
Online Teaching as an Important Means of Technogenic Society Development During the Pandemic
	1 Introduction
	2 Methods
	3 Results
	4 Discussions
	5 Conclusion
	References
Application of Principal Component Analysis Based Support Vector Machine for Long-Run Economic Growth Forecasting
	1 Introduction
	2 Study Methodology
		2.1 Principal Component Analysis
		2.2 Support Vector Machine
	3 Data Description
	4 Models Performance Indicators
	5 Experiment and Results Discussion
	6 Conclusion
	References
Experimental Study of Speed Parameters and Resource Intensity of Programming Languages for Embedded Systems
	1 Introduction
	2 Literature Review
	3 Methods
		3.1 Code Writing and the Difference Between C and C++ Implementations
	4 Result
		4.1 General Testing Methodology
		4.2 Speed Parameter Testing
		4.3 Testing for Resource Intensity and Memory Operating Speed
	5 Discussion
		5.1 Speed Parameter Analysis
		5.2 Memory Operating Analysis
		5.3 Further Prospects
	6 Conclusion
	References
Classification of Cardiotocography Data for Fetal Health Using Feature Selection Techniques
	1 Introduction
	2 Related Work
		2.1 Mislabelled Data
		2.2 Missing Values
		2.3 Noisy Data
		2.4 High Dimensionality
		2.5 Imbalance Data
	3 Methodology
	4 Experiments and Results
	5 Conclusion
	References
Intersection as an Event- and Agent-Based System
	1 Introduction
		1.1 Systems in Matlab/Simulink
		1.2 Related Work in Transportation
		1.3 Our Goal
	2 Methods
		2.1 HW and SW Configuration
		2.2 Intersection
		2.3 Entities
		2.4 Road Traffic Regulations
		2.5 Traffic Lights Control Algorithm
	3 Results
	4 Conclusion
		4.1 Basic Terms
		4.2 Modelling and Simulation
		4.3 Further Development
	References
Comparison of UAV Landing Site Classifications with Deep Neural Networks
	1 Introduction
	2 Methods
		2.1 HW and SW Configuration
		2.2 Deep Neural Networks
		2.3 Classes of Landing Site
		2.4 Training Sets
		2.5 Classification of the Test Set
	3 Results
	4 Conclusion
		4.1 On Results
		4.2 Indoor-Outdoor, Invariance
		4.3 Bio-inspired Approach
	References
An Approach to Optimize Multi-objective Problems Using Hybrid Genetic Algorithms Supported by Initial Centroid Selection Optimization Enhanced K-Means Based Selection Operator
	1 Introduction
		1.1 Evolutionary Computation
		1.2 Multi-objective Optimization Problems
	2 Background
		2.1 Genetic Algorithms
		2.2 Particle Swarm Optimization
		2.3 Hybrid Genetic Algorithms
		2.4 The K-Means Clustering Algorithm
		2.5 Multi-objective Optimization Benchmark Functions
	3 Challenges
		3.1 Challenges Facing Genetic Algorithms
		3.2 Multi-objective Optimization Challenges
	4 Proposed Model Architecture
		4.1 Proposed Algorithm
	5 Results
	6 Discussion of Results
		6.1 Results Analysis
		6.2 Complexity
		6.3 Contributions
	7 Conclusion
	References
Numerical Modelling of the Impact of Dredging on Stability of Oum Rabiâ Estuary (Morocco) Using SWAN Model
	1 Introduction
	2 Problem Statement
	3 Description of the Numerical Model
	4 Results and Discussion
	5 Conclusion
	References
New Method of Verifying Cryptographic Protocols, Based on the Process Model
	1 Introduction
	2 Sequential and Distributed Processes
		2.1 Auxiliary Concepts
		2.2 Sequential Processes
		2.3 Prefix Actions and Renamings
		2.4 Distributed Processes
		2.5 Schemes of Distributed Processes
		2.6 Transition Graphs of Distributed Processes
		2.7 Values of Expressions and Formulas in States of Distributed Processes
		2.8 Marking of a Transition Graph
	3 Application of Markings of Transition Graphs to the Problems of Verification of Distributed Processes
	4 Conclusion
	References
A Method of Search Space Adaptation in the False Pseudonyms Detection Procedure
	1 Introduction
	2 The Approaches to the False Pseudonyms Detection Problem
	3 An Authorship Analysis Used by the Cognitive Assistant for the Victim Behavior Prevention
	4 Search Space Adaptation Based on the Distributed Ledger Elements and Fuzzy Cognitive Map Usage
	5 FCM Construction
	6 Simulation Results: The Usage of the FCM
	7 Conclusions
	References
Analytical Studies of Behavior of Users of the Moscow Electronic School Service
	1 Introduction
	2 Literature Review
	3 Methods
	4 The Problem Statement
	5 The Study Results’
	6 Discussion
	7 Conclusion
	References
Information and Control Systems with Distributed Ledger Usage: A Reliability Issue
	1 Introduction
	2 Information and Control Systems in the Fog: The Reliability Issue
	3 Distributed Ledger Technologies and Information Exchange Model of the Blockchain-Based Ledger
	4 Workload Modeling for the System with Distributed Ledger Usage
	5 Simulation Results
	6 Conclusions
	References
A Modified Ontology-Based Method of Workload Relocation Problem Solving for Monitoring and Forecasting Systems
	1 Introduction
	2 A Modified Method of Workload Relocation Problem Solving
	3 Ontology - Based Analysis Simulation Results
	4 Discussion and Conclusions
	References
Intelligent Data Analysis Using a Classification Method for Data Mining Knowledge Discovery Process
	1 Data Mining
	2 Education Data Mining
	3 Classification Model
		3.1 Model Designing (Training Phase)
		3.2 Model Application – for Classifying New Objects
	References
Multimodal Transportation Overview and Optimization Ontology for a Greener Future
	1 Introduction
	2 Related Work
	3 Requirements for the Ontology
		3.1 Relevant Optimisation Requirements
	4 Methodology for Ontology Development
		4.1 Conceptual Modelling
		4.2 Methodology Application
	5 Structure of the Ontology
		5.1 Main Abstracted Classes
		5.2 Order
		5.3 Hub
		5.4 Leg
		5.5 Operations
	6 Results
	7 Conclusions and Further Work
	References
A Complex Cognitive-Based Technique for Social Tension Detection in the Internet
	1 Introduction
	2 Language Data Markers
	3 A Set of Emotional States Markers Relating to Social Tention
	4 A Complex Cognitive-Based Technique for Social Tension Detection in the Global Network
	5 Simulation Results
	6 Conclusions
	References
Method of Crystallization of Alternatives for Solving the Problem of Placing VLSI Elements
	1 Introduction
	2 Formulation of the Placement Problem
	3 The Placement Mechanisms on the Base Alternative Crystallization Field Method
	4 The Placement Algorithm on the Base Alternative Crystallization Field Method
	5 Experimental Research
	6 Conclusion
	References
Resilient Rerouting in IoT Systems with Evolutionary Computing
	1 Introduction
		1.1 Research Questions and Contributions
	2 Related Work
	3 Resilient Model to Node-Link Failures in IoT
		3.1 Main Objective
		3.2 Mathematical Definition
		3.3 Establishing a Framework of Resilience to Node-Link Failures
		3.4 Mathematical Analysis of EGA-Based Model
		3.5 Towards Optimal Generation of the Transmission Route
	4 Experimental Evaluations
		4.1 Experimental Setup: Rerouting in Thirty (30) Nodes Network
		4.2 Performance Analysis of Thirty (30) Nodes Network with Different Number of Node-link Failures
		4.3 Experiment 1: Consider an IoT Network Without Node-Link Failures
		4.4 Experiment 5: Consider an IoT Network with Two Nodes and Four Links Failure (Failed Nodes: H and G, Failed Links: H – J, G – I, D – H and D – G)
		4.5 Experiment 7: Consider an IoT Network with Three Nodes and Six Links Failure (Failed Nodes: H, G and I, Failed Links: H – J, G – I, D – H, D – G, I – E and H – R)
	5 Benchmarking the Proposed Model with Popular Routing Algorithms
	6 Conclusion
	References
Urban Monthly Water Consumption Forecasting Based on Signal Decomposition and Optimized Extreme Learning Machine
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Secondary Decomposition of EMD by VMD (SDEMD)
		3.2 Extreme Learning Machine Optimized by Particle Swarm Optimization (PSO-ELM)
	4 Experimental Results and Analysis
		4.1 Dataset and Data Processing
		4.2 Model Performance Evaluation Indicators
		4.3 Feature Selection
		4.4 Experimental Results and Discussion
	5 Conclusions
	References
Comparison of Control Systems Based on PID Controllers and Based on Fuzzy Logic Using MatLab and Simulink
	1 Introduction
	2 Model of an Automatic Control System Using a PID Controller
	3 Model of an Automatic Control System with a Fuzzy Controller
	4 Conclusion
	References
The Impact of Promotion and Price Perception on Buying Decision and Repurchase Intention Through Online Shopping
	1 Introduction
	2 Literature Review and Research Hypotheses
		2.1 Promotion
		2.2 Price Perception
		2.3 Purchase Decision and Repurchase Intention
	3 Research Methodology
		3.1 Measures
		3.2 Sample and Data Collection
		3.3 Analytical Approach
	4 Results and Discussion
		4.1 Results
		4.2 Discussion
	5 Conclusions and Limitations
	References
Review Rating Prediction Based on Text Polarity in the Czech and Slovak Languages
	1 Introduction
	2 Related Work
	3 The Data
	4 Results and Discussion
	5 Conclusion
	References
Parameters of Recognition Algorithms for the Background Subtraction of Color Medical Images
	1 Introduction
	2 Materials and Methods
	3 Results
	4 Conclusions
	References
Classification of Plant Diseases Using Convolutional Neural Networks
	1 Introduction
	2 Transfer Learning
	3 Materials and Methods
		3.1 Dataset
		3.2 Software and Hardware Specifications
		3.3 Deep Learning Architectures
		3.4 Training Specifications
	4 Results and Discussion
	5 Conclusions
	References
Pairwise Separability in the Problem of Identifying Objects in Photographs Using the Example of Cultural and Historical Architectural Buildings
	1 Preliminaries
		1.1 Introduction
		1.2 Mathematical Basics
		1.3 Machine Learning Models
		1.4 Dataset
	2 Results
		2.1 Results for Convolution Neural Network
		2.2 Results for Support Vector Machine
		2.3 Results for Naive Bayes Classifier
		2.4 Results for k Nearest Neighbors
		2.5 Results for Decision Tree Classifier
	3 Using Gradient Boosting
	4 Conclusion
	References
Cognitive Logic’s Principles
	1 Introduction
	2 The Research Methodology
	3 Research Results
		3.1 The Relationship Between Mathematical Logic and Cognitive Logic is Described
		3.2 Cognitive Dichotomous Logic
		3.3 Oppositional and Dichotomous Division
		3.4 Case and Codified Reasoning
	4 Conclusion
	References
A Machine Learning Firefly Algorithm Applied to the Resource Allocation Problems
	1 Introduction
	2 KnapSack Problem
	3 Binary Firefly Algorithm
		3.1 Initialization and Element Weighting
		3.2 K-Means Transition Ranking Operator
		3.3 Repair Operator
	4 Results
		4.1 Insight of BKFA Algorithm
	5 Conclusions
	References
Market Acceptance of the Blockchain Technology on the Example of Bitcoin
	1 Introduction
	2 Features of Bitcoin as a Technology and Asset
	3 Bitcoin Price Factors
	4 Methods, Modelling, and Assessment of the Study Results
	5 Conclusions
	References
A Machine Learning Firefly Algorithm Applied to the Matrix Covering Problem
	1 Introduction
	2 Set Covering Problem
	3 Binary Firefly Algorithm
		3.1 Initialization
		3.2 Machine Learning Transition Ranking Operator
		3.3 Heuristic Operator
	4 Results
		4.1 Insight of MLFA Algorithm
	5 Conclusions
	References
Introduction into Autonomous Mobile Robot Research and Multi Cooperation
	1 Introduction
	2 AMR (Autonomous Mobile Robot)
		2.1 Navigation
		2.2 SLAM
	3 Fleet
		3.1 Centralized
		3.2 Decentralized
		3.3 Combined
	4 Communication
	5 Path Planning Algorithms
	6 Path Planning in Fleet
	7 Conclusion
	References
Equilibrium Commodity Flow Assignment in Simple Networks
	1 Introduction
	2 Equilibrium Commodity Flow Assignment
	3 Commodity Network of Three Nodes
	4 Commodity Network of Four Nodes
	5 Discussions
	6 Conclusion
	References
Co-evolutionary Approach to Solving the Problem of VLSI Partitioning Using the Ant Colony Method
	1 Introduction
	2 Formulation of the Partition Problem
	3 Development of a Co-evolutionary Partitioning Algorithm Based on Models of Adaptive Behavior of an Ant Colony
	4 Co-evolutionary Partitioning Algorithm
	5 Experimental Research
	6 Conclusion
	References
Evaluation of the Dependence of the Air Temperature Influence on the Reproductive Function of Cows Based on ASC-Analysis
	1 Introduction
	2 Materials and Methods
	3 Results and Discussion
	4 Conclusion
	References
Adaptive Control of the Movement of a Team of Mobile Robots in a Column
	1 Introduction
	2 Control of the Movement of a Group of Robots in a “Escort” Formation
	3 Algorithm of Movement of a Group of Robots in a “Escort” Type Formation Based on Collective Adaptation
	4 Conclusion
	References
A Binary Firefly Algorithm Applied to Knapsack Problem
	1 Introduction
	2 KnapSack Problem
	3 Binary Percentile Firefly Algorithm
		3.1 Initialization and Element Weighting
		3.2 Percentile Operator
		3.3 Repair Operator
	4 Results
		4.1 Understanding BPFA Contribution
	5 Conclusions
	References
Adapted Model Neural-Like Hopfield Network and the Algorithm of Its Training for Finding the Roots Systems of Linear Algebraic Equations
	1 Introduction
	2 Approaches to Solving System of Linear Algebraic Equations
	3 Task Formulation
	4 Modified Hopfield Network and Parameter Definition
	5 Configuration of Network Model and Capacity Research
	6 Conclusion
	References
Data Classification in Medicine and Healthcare Service
	1 Introduction
	2 Materials and Methods
	3 Results
	References
Development of a Method for Automatic Generation and Optimization of Fuzzy Controller Parameters Based on an Adaptive Genetic Algorithm
	1 Introduction
	2 Method for Automatic Generation and Optimization of Fuzzy Controller Parameters
	3 Adaptive Genetic Algorithm
	4 Result Analysis
	5 Discussion
	6 Conclusion
	References
Application of Machine Learning for Post Process Mining Analysis and Problem Detection in Bank
	1 Introduction
	2 Application of Machine Learning
	3 Conclusion
	References
Comprehensive Analysis of Cryptographic Protocol Implementations Using Formal Verification and Dynamic Analysis Using the PDA Language
	1 Introduction
	2 Proposed Verification Scheme
	3 Formal Verification
	4 Formal Verification of Source Codes
	5 Dynamic Analysis
	6 PDA Language
		6.1 Section «Projects»
		6.2 Section «Parameters»
		6.3 Section «MainProtocol1»
		6.4 Section «Model1»
		6.5 Section «Run»
	7 Results
	8 Discussion
	9 Conclusion
	References
Stationary Distribution in the One Server Queuing System M|M|1| with the Stopping Intensity of the Input Flow
	1 Introduction
	2 Methods
	3 Results
	4 Discussions
	5 Conclusion
	6  Checklist of Items to be Sent to Volume Editors
	References
Advantages of Data Mining for Digital Transformation of the Educational System
	1 Digital Transformation in the Educational System
	2 Basic Application Aspects of the Huge Data Sets in the Educational System
	References
Matrix Product State Representations for Machine Learning
	1 Introduction
	2 RBM Learning of MPS Networks
	3 Conclusions
	References
Improved Kangaroo Mob Optimization and Logistic Regression for Smart Grid Stability Classification
	1 Introduction
	2 Related Work
		2.1 Bio-Inspired Algorithms for Machine Learning Models Tuning
		2.2 Smart Grid Stability Classification
	3 IKMO
	4 IKMO Evaluation
	5 IKMO LR Method for Smart Grid Stability Classification
		5.1 High-Level View of the IKMO LR Method for Smart Grid Stability Classification
		5.2 Experiments Configuration
		5.3 Experimental Results
		5.4 Comparison with Literature Results
	6 Conclusions
	References
Design and Development of the Optimal Technique for the Enhancement of Contrast and Brightness Quality of Hand Capture Images Using Wavelet Transformation
	1 Introduction
	2 Related Work
	3 Problem Description
	4 Proposed Methodology
	5 Algorithm Implementation
		5.1 Algorithm for Non-linear Processing of Luminance
		5.2 Algorithm for Mitigating Multiplicative Artifacts
		5.3 Algorithm for Optimally Enhanced Image
	6 Results Discussion
	7 Conclusion
	References
Distance Learning Advantages and Disadvantages: Teaching Experience Analysis at the University with the Basis on Different Informational-Communicative Technologies
	1 Introduction
	2 Methods
		2.1 Object of Study
		2.2 Subject of Study
	3 Results
	4 Discussion
	5 Conclusion
	References
Heat Load Forecasting: Comparison Between Neuro-Fuzzy and Neural Network Approaches, a Real World Case Study
	1 Introduction
	2 Related Works
		2.1 Methodology
	3 Data Set
		3.1 Data Sets Normalization and Preprocessing
		3.2 Feature Selection
		3.3 ANN and ANFIS Modelling
	4 Results
		4.1 Numerical Results
	5 Conclusion
	References
Emergency Locksmith: A Restricted Dynamic Device Authentication Design Pattern for the Healthcare IoT
	1 Introduction
	2 Background Research
		2.1 Current Emergency Oriented Healthcare IoT Works
		2.2 Design Patterns in IoT
	3 Emergency Locksmith: An Authentication Design Pattern
	4 Results
	5 Discussion and Future Directions
	References
Fuzzy Model with Meteorological Variables for the Determination of the THSW Index and the Electric Field in the Area of East Lima, Peru
	1 Introduction
	2 Literature Review
		2.1 Fuzzy Logic
	3 Methodology Selection: THSW Index and Electric Field
		3.1 Meteorological Variables
	4 Results
		4.1 Fuzzy Model Design for Meteorological Variables
		4.2 Results of the Fuzzy Logic Model
		4.3 Evaluation of the Proposed Solution
		4.4 Experimental Evaluation of the Fuzzy Model
		4.5 Results of the Meteorological Research Variables
	5 Conclusions
	References
Hyper-heuristics: Method of Differential Evolution and Bat Method for Selecting Classification Features
	1 Introduction
		1.1 Background
	2 Methods
		2.1 Proposed Methodology
		2.2 Theoretical Basis
		2.3 Proposed Hyper-heuristic Algorithm
	3 Experimental Results and Discussion
	4 Conclusion
	References
Method for the Synthesis of Fuzzy Controllers from Experimental Data Based on Clustering
	1 Introduction
	2 Proposed Method
	3 Results
	4 Discussion
	5 Conclusion
	References
Heuristic Backward Chaining Based on Predicate Tensorization
	1 Introduction
	2 Backward Chaining and Heuristic Search
	3 Heuristic Backward Chaining
		3.1 Tabling
		3.2 Core Function
		3.3 Examples
	4 Backward Chaining Extensions
	5 Related Work
	6 Conclusion
	References
Deep Learning for the Classification of Charge Density Plots of Lithium-Ion Cathode Materials
	1 Introduction
	2 Materials and Methods
	3 Results and Discussion
	4 Conclusion
	References
Circular Encryption Algorithms to Provide a Secure Channel for Storing and Transmitting Information in Mobile Robot Groups
	1 Introduction
	2 Principle of Function Hash Operation
	3 Anonymous Hashing Algorithms
	4 Cryptonote for Information Interaction of the Robot
	5 Conclusions
	References
Utilisation of EU Employment Data in Lecturing Data Mining Course
	1 Introduction
	2 Data and Methods
		2.1 Eurostat Database
		2.2 Statistical Classification of Economic Activities - NACE
	3 Practical Example
		3.1 Example EU Employment in Software ORANGE
	4 Conclusion
	References
A Decentralized Ontology Versioning Model Designed for Inter-operability and Multi-organizational Data Exchange
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Overall Architecture
		3.2 Ontology Versioning and Evolution
		3.3 Formal Definition
		3.4 Data Model
		3.5 Voting System
		3.6 Consensus Mechanism
	4 Conclusion
	References
Digital Transformation in HR Management
	1 Introduction
	2 Methods
		2.1 Comparison of Telework in Russia and Abroad
		2.2 Methods for Calculating Compensation for Equipment Used by a Remote Worker
		2.3 Labor Safety of Remote Workers
		2.4 Labor Rationing
	3 Results
	4 Discussions
	5 Conclusion
	References
A Time Series Forecasting of Electricity Demand by ARIMA and ReLU Based ANN
	1 Introduction
	2 Literature Review
	3 Methods
	4 Results
		4.1 ARIMA Model
		4.2 ANN
	5 Conclusions
	References
Measurement of Transmission Speed in a Wireless Network with Encrypted Communication Using Various Security Protocols
	1 Introduction
	2 Measuring the Transmission Speed in a Wireless Network
	3 Transmission Rate Measurements Using the IEEE 802.11n Standard
	4 Transmission Rate Measurement with the IEEE 802.11ac Standard
	5 Conclusion
	References
Severity Estimation of Potholes in Imagery Using Convolutional Neural Networks
	1 Introduction
	2 Related Works
	3 Proposed Method
	4 Results
	5 Conclusion
	References
Portfolio Optimization Model for Asset Allocation Problem Based on Alternative Risk Measures
	1 Introduction
	2 Methods
		2.1 The Markowitz Model for Portfolio Optimization
		2.2 The Market Model (the Sharpe Index Model) for Investment Portfolio Optimization
		2.3 Modification of the Markowitz Model Based on the ( 2R2p - 2R2plow  )- and ( 2R2p - 2R2pVaR  )-Risk Measures for Portfolio
	3 Results
		3.1 The Markowitz Model and the Market Model for Portfolio Optimization
		3.2 Case Study for ( 2R2p - 2R2plow  )- and ( 2R2p - 2R2pVaR  )-Minimizing Problem
		3.3 Portfolio Efficiency Assessment in Real Time
	4 Discussions
	5 Conclusion
	References
The Assembly Processes Automation Methodology According to the IEC 61499 Standard on the LEGO Example
	1 Introduction
	2 Methodology for Assembling 3D Structures
		2.1 Connection Scheme
		2.2 Prolog
		2.3 FB
	3 Implementation Example
	4 Conclusion
	References
Conceptual Approach to Implementation of Adaptive Protection of Operational Cybersecurity Centers
	1 Introduction
	2 Mathematical Model of a Complex Security System
	3 Conclusion
	References
The Method of Context-Dependent Annotation Based on the Spectral Language Model in Information Systems for Monitoring Emergencies
	1 Introduction
	2 Method
	3 Results
	4 Discussion
	5 Conclusion
	References
Cased Based Reasoning in Business Process Management Design
	1 Introduction
	2 Literature Review
	3 Storing BPMN Diagrams
	4 Retrieving BPMN Diagrams
	5 Adapting and Retaining BPMN Diagrams
	6 Discussion
	7 Conclusion
	References
Cognitive Expert Assessment
	1 Introduction
	2 Research Methodology
	3 Research Results
		3.1 Cognitive Model of Expert Assessment
		3.2 Scenario Expert Assessments
		3.3 Influence of Informational and Cognitive Interaction on the Result of Expert Assessment
		3.4 Representative Measurement Theory in Expert Assessment
	4 Conclusion
	References
A Percentile Firefly Algorithm an Application to the Set Covering Problem
	1 Introduction
	2 Set Covering Problem
	3 Binary Percentile Firefly Algorithm
		3.1 Initialization
		3.2 Percentile Binary Operator
	4 Results
		4.1 Insight of BPFA Algorithm
		4.2 BPFA Compared with JPSO and MDBBH
	5 Conclusions
	References
Author Index




نظرات کاربران