دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Vladimir M. Vishnevskiy, Konstantin E. Samouylov, Dmitry V. Kozyrev سری: Communications in Computer and Information Science, 1337 ISBN (شابک) : 3030662411, 9783030662417 ناشر: Springer سال نشر: 2021 تعداد صفحات: 568 [569] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 52 Mb
در صورت تبدیل فایل کتاب Distributed Computer and Communication Networks: Control, Computation, Communications: 23rd International Conference, DCCN 2020 Moscow, Russia, September 14–18, 2020 Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های کامپیوتری و ارتباطی توزیع شده: کنترل، محاسبات، ارتباطات: بیست و سومین کنفرانس بین المللی، DCCN 2020 مسکو، روسیه، 14 تا 18 سپتامبر 2020 مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات داوری بیست و سومین کنفرانس بینالمللی شبکههای توزیع شده و کامپیوتری و ارتباطی، DCCN 2020، در مسکو، روسیه، در سپتامبر 2020 است. به دلیل همهگیری COVID-19، کنفرانس به صورت آنلاین برگزار شد. 43 مقاله به دقت بررسی و از بین 167 مقاله ارسالی انتخاب شدند. مدل سازی تحلیلی سیستم های توزیع شده و کاربردهای سیستم های توزیع شده
This book constitutes the refereed proceedings of the 23rd International Conference on Distributed and Computer and Communication Networks, DCCN 2020, held in Moscow, Russia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 43 papers were carefully reviewed and selected from 167 submissions.The papers are organized in the following topical sections: computer and communication networks and technologies; analytical modeling of distributed systems, and distributed systems applications.
Preface Organization Contents Computer and Communication Networks Challenges and Performance Evaluation of Multicast Transmission in 60GHz mmWave 1 Introduction 2 IEEE 802.11ad/ay Specifications 2.1 IEEE 802.11ad 2.2 IEEE 802.11ay 3 Design Challenges of mmWave Multicast and Unicast Modes 3.1 Unicast in Directional Networks 3.2 Multicast in Traditional Networks 3.3 Multicast in Directional Networks 4 System Model 4.1 Antenna and Channel Models 5 Performance Analysis 5.1 Static Scenario: Unicast vs. Multicast Performance 5.2 Static Scenario: Coverage Area Estimation 5.3 Dynamic Scenario: Mobility Impact on Multicast Transmission 6 Conclusion References Deep Learning for IoT Traffic Prediction Based on Edge Computing 1 Introduction 2 Related Works 3 Problem Statement 4 Proposed System and Algorithm 4.1 Architecture of Deep Learning Implementation Based on Edge-Computing 4.2 Deep Learning Algorithm for IoT Traffic Prediction 5 Simulation Results 6 Conclusion and Future Work References On Optimal Placement of Base Stations in Wireless Broadband Networks to Control a Linear Section with End-to-End Delay Limited 1 Introduction 2 Problem Statement 3 Calculation of Link Distance and Coverage Radius of Stations 4 Tandem Queue Model for End-to-End Delay Evaluation 5 Integer Linear Programming Model 6 Example 6.1 Computation of the Communication Link Distance Between Base Stations 6.2 Computation of the Coverage Radius 6.3 Time Delay Calculation 7 Conclusion References CPU vs GPU Performance of MATLAB Clustering Algorithms 1 Clustering Analysis 2 Clustering Algorithms in MATLAB 3 Benchmark Details 4 CPU Benchmark 5 GPU Benchmark 6 Performance per Ruble 7 Conclusion References High-Capacity Photon Switching Systems Based on the Two-Stage 256256 Switch 1 Introduction 2 The Quasi-Complete Photon 1616 Switch 3 The Two-Stage Photon 256256 Switch as the Basic Element of High-Capacity Photon Switching Systems 4 The Method of Invariant Scaling of Photon Switching Systems 5 Complexity Calculation 5.1 Circuit Complexity 5.2 Fiber Complexity 6 The Comparative Analysis 7 Conclusion References Investigation of the Guaranteed Traffic Rate in Enterprise WLAN 1 Introduction 2 Characteristics of Wireless Local Area Network 3 Performance Parameters of Wireless Local Area Network 4 Investigation of Wireless Channel Media Access Protocol 5 Model Formulation 6 Methodology for Guaranteed Delivery Rate Estimation 7 Conclusion References SARSA Based Method for WSN Transmission Power Management 1 Introduction 2 Related Work 3 Proposed Model and SARSA Based Method 3.1 Implemented Core Technologies – Modified Multi-layer Perceptron 4 Conclusions References Method of Frequency Coding in Microwave RFID 1 Introduction 2 Frequency Coding 3 Suppression of False Signals 4 Solution of Anticollision Problem 5 Conclusion References On Synchronisation of ISS-OFDM Signals 1 Introduction 1.1 ISS-OFDM Properties 1.2 Scope of the Paper 2 State of the Art 2.1 Time-Domain Synchronisation 2.2 SCO Estimation 3 Proposed Method 3.1 Time-Domain Tracker 3.2 SCO Estimator 3.3 Simulation Setup 4 Results and Discussion 5 Conclusion References Reserve Navigation System of Tether Powered Unmanned Aerial Platform in Conditions of Turbulent Atmosphere 1 Introduction 2 Main Laws for the Motion of the Tethered Aerial Vehicle 3 Coordinates of the Vehicle 4 Conclusion References Teleportation of the Bell States on IBM Q Computers Under Their Hardware Errors 1 Introduction 2 IBM Quantum Computers 2.1 Gates 2.2 Sources of Errors 3 Experimental Realization 3.1 CNOT Gates Implementation 3.2 IBM Q Yorktown 3.3 T-Shaped IBM Quantum Computers 3.4 IBM Q Rome and IBM Q Santiago 4 Conclusion References Management of Risks for Complex Computer Network 1 Introduction 2 General Model 3 The Arbitral Solution 4 Cognitive Game 5 Conclusion References Prerequisites and Methodology for Digital Transformation of 4G Networks into 5G Ecosystem 1 Introduction 2 Statement of the Problem 3 The Concept of 5G Ecosystem 4 Subsystems and Structure of RAN and CS Models 5 RAN Deployment Models 6 Stages of Transition to the Open O-RAN 5G Network 7 Conclusion References Analytical Modeling of Distributed Systems The Simulation of Finite-Source Retrial Queueing Systems with Two-Way Communications to the Orbit and Blocking 1 Introduction 2 Model Description and Notations 3 Simulation Results 3.1 Squared Coefficient of Variation is Greater Than One 3.2 Squared Coefficient of Variation Is Less Than One 4 Conclusion References Token Based Parallel Processing Retrial Queueing System with a Probabilistic Joining Strategy for Priority Customers 1 Introduction 2 Model Description 3 Mathematical Formulation of the Model 4 Steady-State Analysis 4.1 Stability Condition 4.2 Steady-State Probability Vector 4.3 Performance Measures 5 Conclusion References A Disease Outbreak Managing Queueing System with Self-generation of Status and Random Clock for Quarantine Time 1 Introduction 2 Mathematical Model 3 Stationary Vector 4 Performance Characterestics 5 Departure Process of Customers from Pool 6 Conclusion References Stochastic Optimization of Local Purchase Quantities in a Geo/Geo/1 Production Inventory System 1 Introduction 2 Model 1 2.1 Stability Condition 2.2 Steady-State Analysis 3 Model II 3.1 Steady State Analysis 4 Model III 4.1 Steady State Analysis 5 Performance Measures 6 Distribution of Number of Local Purchase in Specified Time 7 Numerical Experiments 7.1 Cost Function 7.2 Graphical Illustrations References Mathematical Model of Horizontal VNF Scalability in virtualized Evolved Packet Core 1 Introduction 2 Background 3 System Model 4 Mathematical Model 5 Analytical Evaluation 5.1 Varying Queuing Size 5.2 Varying the Biggest Group Number 5.3 Varying Groups Count 5.4 Varying Group Service Rate 6 Conclusions 7 Appendix References The Method for User Localization in the Local Wireless Network in an Emergency 1 Introduction 2 Implementation Options 3 Model 4 Conclusion References Analysis of the Using of D2D Communications for the Ad Hoc Network Based on Subscriber Terminals 1 Introduction 2 Model 3 Conclusion References Channel Switching Threshold Strategies for Multichannel Controllable Queuing Systems 1 Introduction 2 Problem Statement 3 A-convexity in Discrete Problems of Optimization 4 Properties of Optimal Channel Switching Strategies 4.1 ``Myopic'' Strategies of Control 4.2 Broadening of the Notion of A-convexity 4.3 Multi-step Dynamic Problems of Channel Switching 5 Simulation Example 6 Conclusion References Modeling and Simulation of Reliability Function of a k-out-of-n:F System 1 Introduction 2 Problem Setting and Notation 3 Analytical Results for Reliability Function for 3-out-of-6 System 4 Simulation Results 5 Conclusion References Two Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs 1 Introduction 2 Setting of the Problem 3 Profiles for Signals of Active Sensors 4 Two Possible Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs 4.1 Structured WSN with Medium-Sized Objects 4.2 Structured WSN with Large Objects 5 Conclusions References Regeneration Analysis of Non-Markovian System with Simultaneous Service and Speed Scaling 1 Introduction 2 Description of a Model 3 Regenerative Structure 3.1 Regenerative Estimation in Discrete Time 3.2 Application for Speed Scaling System 4 Simulation 4.1 Pareto Service 4.2 Weibull Service 5 Conclusion References Integrated Tolerant Distributed Computing Network 1 Performance Model of the DCN with Non-restorable Computing Modules 1.1 Model of the Number of Virtual Computing Modules Depending on the Means of Ensuring Network Tolerance 1.2 DCN Performance Estimation Model 1.3 An Integrated Model of the DCN 2 Performance Model of the Tolerant DCN with Restorable Computing Modules 2.1 Statement of the Problem 2.2 System of Differential Equations for Studying the Transition Process of TDCN Behavior 2.3 System of Ordinary Equations for Studying the Behavior of TDCN for the Stationary Case 2.4 Evaluation of the Effectiveness of the Approximate Model References Asymptotic Analysis of RQ-System with Feedback and Batch Poisson Arrival Under the Condition of Increasing Average Waiting Time in Orbit 1 Introduction 2 The Model Description and the Problem Statement 3 Kolmogorov Equations 4 Asymptotics of the First Order 5 Asymptotics of the Second Order 6 Numerical Matrix Method 7 Numerical Results 8 Conclusion References On Comparison of Multiserver Systems with Two-Component Mixture Distributions 1 Introduction 2 Two-Component Mixture Distributions 3 Stochastic and Failure Rate Ordering of Two-Component Mixture Distributions 4 Stochastic and Failure Rate Comparison of Some Two-Component Mixture Distributions 5 Comparison of Multiserver Systems with Different Service Distributions 6 Numerical Examples 7 Conclusion References On Splitting Scenarios for Effective Simulation of Reliability Models 1 Introduction 2 Crude Simulation of the Degradation Process 3 Splitting Scenarios for the Degradation Process 3.1 Fully Branching Regeneration Splitting - Scenario a) 3.2 Standard Splitting Procedure - Scenario b) 4 Simulation Results 5 Conclusion References Ergodicity and Polynomial Convergence Rate of Generalized Markov Modulated Poisson Processes 1 Introduction 2 Some Preliminary Considerations 2.1 Some Information About the Coupling Method 2.2 Successful Coupling (See ch29zv5). 2.3 Basic Coupling Lemma (see, e.g., ch29zv13,ch29verbut,ch29zv1) 3 Lorden's Inequality 3.1 Generalized Lorden's Inequality 3.2 Some Preliminary Considerations About Generalized Intensities 3.3 Notations and Assumptions 4 Considered Generalized Markov-Modulated Poisson Process 4.1 Ergodicity of the Multi-dimensional Process Xt 4.2 About Polynomial Convergence of the Process Xt 5 Application for One Reliability System 6 Conclusion References The Mathematical Model for Calculating Physical Entity of DPI Analyser 1 Introduction 2 Related Work 3 DPI 4 The Mathematical Model 4.1 Formalization DPI Input Parameters 4.2 Ventcel-Ovcharov Model and DPI Analyser 4.3 Data Sets and Calculation 5 Simulation 6 Conclusion References The Overflow Probability Asymptotics in a Multiclass Single-Server Retrial System 1 Introduction 2 An Associated Buffered Multiclass System 2.1 Description of a Model 2.2 Analysis of a Large Deviation Probability 3 Numerical Examples 4 Conclusion References Wireless Channel Modeling and Simulation with K Distribution 1 Introduction 2 Model of Shadowed Fading Channel 3 K Distribution and Modified Bessel Functions 4 K-Fading Channel in Half Integer Case 5 Bit Error Rate for K-Fading Channel in Half Integer Case 6 Monte Carlo Simulation with K Distribution 7 Conclusion References Melanoma Detection Computer System Development with Deep Neural Networks 1 Introduction 2 Modern Results in Computer Recognition of Dermatoscopic Images 3 Data Description and Their Pre-processing 4 Building a Deep Neural Network Model and Computer Experiments 5 Conclusion References Distributed Systems Applications Comparison of Different Smoothing Methods for Initial Data of the DSN-PC Sensor Network 1 Introduction 2 System and Model Description 2.1 Geographical Properties 2.2 Input Data Sources and Their Assimilation 2.3 The Applied Numerical Weather Prediction Algorithm 2.4 Smoothing the Initial Data 3 Results 4 Conclusion References NFC Vulnerabilities Investigation 1 Introduction 1.1 RFID Technologies 1.2 NFC Technology Vulnerabilities 2 Methodology of Experiments 3 Results 3.1 NFC Signal Interception Investigation 3.2 NFC Signal Jamming Investigation 4 Conclusions References Data Migration Rate of CRUSH-Based Distributed Object Storage with Dynamic Topology 1 Introduction 2 Program Simulation of Data Migration 3 CRUSH-Based Storage with Dynamic Topology 3.1 Topology in Open Storage Systems 3.2 Migration Ratio at Different System Load 3.3 General and Specific Storage Policies 3.4 DHT Approach 4 Conclusion References Reduction of the Energy Consumption on Preliminary Signal Processing in Vibration Monitoring Networks 1 Introduction 2 Structure of a Scaling Amplifier 3 Simulation 4 Discussion and Recommendations 5 Conclusion References Stability and Sustainability of Cryptotokens in the Digital Economy 1 Introduction 2 Cryptocurrency Mining 2.1 Quasi-legal Mining 3 Cryptocurrency and Value 3.1 Economic Role 3.2 Legal Framework 3.3 Theories of Value 4 Mining Impact 5 Solutions 6 Conclusion References Identification System Model for Energy-Efficient Long Range Mesh Network Based on Digital Object Architecture 1 Introduction 2 Identification Approaches in LoRa and Mesh Networks 3 DOA Based Identification 3.1 Digital Object Architecture 3.2 DOA as Identification System 3.3 DOA Based Identification for Mesh Networks 4 Queuing Model of Identification System for Mesh Network 5 Conclusion References Efficient Wireless Data Collection System Based on LoRaWAN Technology and Distributed Computation Approach 1 Introduction 2 The Intensive Data Collection Method 2.1 Client-Server Interconnection Logic 2.2 Data Prediction Method 3 System Architecture 4 Intensive Temperature Measurement of the Building Heat Pipes 4.1 Server Side 4.2 End Device Side 4.3 Equipment Layout 5 Simulation 6 Results and Further Research Area 7 Conclusion References Computing Load Distribution by Using Peer-to-Peer Network 1 Introduction 2 High-Performance Computing Overview 3 Concept 3.1 Mathematical Basis 3.2 Generalization 3.3 Equalization 3.4 Transparency 4 The Algorithmic Analysis 5 The Network 6 The Mechanism of Distribution 7 System Estimation 8 Conclusion References Firewall Simulation Model with Filtering Rules Ranking 1 Introduction 2 Method for Ranking Firewall Filtering Rules 3 Firewall Model with Filtering Rules Ranking 4 Designing of an Imitational FW Model with Rules Ranking 5 Evaluation of the Firewall Performance Indicators 6 Conclusion References Performance of Forward Error Correction in Transport Protocol at Intrasegment Level 1 Introduction 2 Transport Connection Model 3 Probabilistic and Temporal Characteristics of the Transport Connection 4 Areas of Appropriateness for Applying the Forward Error Correction 5 Conclusion References Author Index