دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: David Camacho, Domenico Rosaci, Giuseppe M. L. Sarné, Mario Versaci سری: Studies in Computational Intelligence, 1026 ISBN (شابک) : 3030966267, 9783030966263 ناشر: Springer سال نشر: 2022 تعداد صفحات: 463 [464] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 10 Mb
در صورت تبدیل فایل کتاب Intelligent Distributed Computing XIV به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات توزیع شده هوشمند چهاردهم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب 43 مقاله منظم دریافت شده از 18 کشور را گردآوری میکند که پیشرفتهای نوآورانهای را در محاسبات هوشمند و توزیعشده ارائه میکنند، که هم نتایج معماری و هم الگوریتمی مرتبط با این زمینهها را در بر میگیرد. توجه قابل توجهی به مدلها، تکنیکها و برنامههای جدید برای معماریهای هوشمند توزیعشده و معماریهای با کارایی بالا، تکنیکهای یادگیری ماشین، اینترنت اشیاء، بلاک چین، سیستمهای حملونقل هوشمند، تجزیه و تحلیل دادهها، سیستمهای اعتماد و شهرت و بسیاری موارد دیگر داده شده است. این کتاب شامل مقالات بررسی شده چهاردهمین سمپوزیوم بین المللی محاسبات توزیع شده هوشمند (IDC 2021) است که به دلیل وضعیت همه گیر COVSARS2 در حالت آنلاین در طی 16 تا 18 سپتامبر 2021 برگزار شد.
رویداد IDC 2021 شامل جلساتی در مورد اینترنت اشیا، تجزیه و تحلیل داده ها، یادگیری ماشین، سیستم های چند عاملی، الگوریتم ها، راه حل های حمل و نقل هوشمند آینده، بلاک چین، محاسبات توزیع شده هوشمند برای سایبر بود. -امنیت فیزیکی و امنیت و اعتماد و شهرت در محیط های هوشمند.
This book collects 43 regular papers received from 18 countries that present innovative advances in intelligent and distributed computing, encompassing both architectural and algorithmic results related to these fields. Significant attention is given to new models, techniques, and applications for distributed intelligent architectures and high-performance architectures, machine learning techniques, Internet of Things, blockchain, intelligent transport systems, data analytics, trust and reputation systems, and many others. The book includes the peer-reviewed proceedings of the 14th International Symposium on Intelligent Distributed Computing (IDC 2021), which was held in online mode due to the COVSARS2 pandemic situation, during September 16–18, 2021.
The IDC 2021 event included sessions on Internet of Things, data analytics, machine learning, multi-agent systems, algorithms, future intelligent transport solutions, blockchain, intelligent distributed computing for cyber-physical security, and security and trust and reputation in intelligent environments.
Organization Preface Contents INTERNET OF THINGS (Main Track)—Chair: David Camacho EBASI: IoT-Based Emotion and Behaviour Recognition System Against Elderly People Social Isolation 1 Introduction 2 Motivation and Related Work 2.1 Motivation 2.2 Related Work 3 Materials and Methods 3.1 Multimodal Sensor-Based Loneliness Recognition Methodology 3.2 Functional Architecture 3.3 Technical Architecture 3.4 Validation Methodology 4 Results and Discussion 5 Conclusions References Smart Health Services Based on IoT and GIS 1 Introduction 2 Definitions and Related Work 3 Smart Health Services Based on IoT and GIS 3.1 Finding the Nearest Health Care Facilities 3.2 Air Quality Monitoring 3.3 Improving Medical Services 3.4 Smart Transport for Patients 3.5 Mobile SOS System References A Review of Internet of Things Platforms Through the IoT-A Reference Architecture 1 Introduction 2 IoT-A Reference Architecture 3 State-of-the-Art Analysis 4 Discussion and Conclusions References Critical Comparison of Data Imputation Techniques at IoT Edge 1 Introduction 2 Related Work 3 Methodology 3.1 The Air Pollution Dataset 3.2 Techniques Chosen for the Edge Data Imputation 4 Results 5 Conclusion References A Novel Approach for Calculating Real-Time Composite Indicators Relying on Internet of Things and Industrial Data Spaces 1 Introduction 2 Context 3 Proposed Solution 3.1 Global Architecture 3.2 Data Gathering Strategy 3.3 Data Sharing Strategy 4 Candidate Open Source Technologies for Implementation 5 Future Work and Conclusions References MACHINE LEARNING (Main Track)—Chair: Antonio Guerrieri Using Evolving Ensembles to Deal with Concept Drift in Streaming Scenarios 1 Introduction 2 An Evolving Ensemble to Deal with Concept Drift 2.1 Initialization 2.2 Evolutionary Phase 3 Results 4 Conclusions and Future Work References Applying of Machine Learning for Analyzing Network Traffic in the Conditions of an Unbalanced Data Sample 1 Introduction 2 The Proposed Approach 3 Experimental Study of an Ensemble of Classifiers 4 Conclusion References A WNN-Based Approach for Network Intrusion Detection 1 Introduction 2 Related Research 3 WiSARD: A WNN-Based Implementation 4 The CIC-IDS Dataset 5 Experimental Results 6 Conclusion References A Force Field Reinforcement Learning Approach for the Observation Problem 1 Introduction 2 Overview of Reinforcement Learning Method Applied to the Observation Problem 3 A Force Field Reinforcement Learning Approach (FFRL) 3.1 Force Field Framework 3.2 Environment Definition 4 Training and Simulation Results 4.1 Training Model 4.2 Results 5 Conclusion and Future Work References Macro Architecture for Microservices: Improving Internal Quality of Microservice Systems 1 Introduction 2 SOA Challenges and State of the Art 2.1 Inter-service Architecture Challenges 2.2 Interaction Challenges 2.3 Service Discovery 2.4 Implications 3 Concepts and Implementation 4 Conclusion and Outlook References An Artificial Neural Network to Simulate Surface Runoff and Soil Erosion in Burned Forests 1 Introduction 2 Materials and Methods 2.1 Theoretical Approach About the Artificial Neural Networks 2.2 Neural Network Architecture 2.3 Neural Network Training 2.4 The Hydrological Database 2.5 ANN Implementation 2.6 Data Pre-processing 3 Results and Discussions 3.1 Neural Network Approximation 3.2 Evaluation of the ANN Prediction Capability 4 Conclusions References FITS (Special Session)—Chair: Maria Nadia Postorino Cooperative Negotiation in Connected Vehicles for Mitigating Traffic Congestion 1 Introduction 2 Related Work 3 Cooperative Negotiation in Traffic Routing 3.1 Problem Formulation 3.2 Cooperative Negotiation Model 4 Evaluation 4.1 Simulation Settings 4.2 Results 5 Conclusions References New Challenges for Urban Air Mobility Systems: Aerial Cooperative Vehicles 1 Introduction 2 Management of UAM Infrastructure 3 UAM Integrated Network and Flight Planning 4 Cooperative and Automated Aerial Vehicles 5 Discussion and Conclusion References Combining Coordination Strategies for Autonomous Vehicles in Intersections Networks 1 Introduction 2 Background and Related Work 2.1 Traditional Strategies 2.2 Innovative Strategies 2.3 Intersection Networks 3 Simulations and Results 3.1 Implemented Strategies 3.2 Results 4 Conclusions References Using Boundary Objects and ANT Concepts to Implement Multi-agent Systems as Drivers of Innovation in Logistics 1 Introduction 2 Boundary Objects and ANT 3 Implementing Multi-agent Systems as Drivers of Innovation in Logistics 4 Conclusions References Traffic Flow Modelling When Autonomous Vehicles Coexist with Human Driven Vehicles: Perspectives and Challenges 1 Introduction 2 Classical Models for Traffic Flows 2.1 Microscopic Models 2.2 Macroscopic Models 2.3 Machine Learning Approaches for Traffic Simulation 3 Modeling Traffic Flow in a Mixed Scenario: Perspectives and Challenges 4 Conclusions References Distributed Non-monotonic Reasoning for Transportation Network Congestion Monitoring: Theoretical Foundation 1 Introduction 2 Default Logic for Diagnosis and Symbolic Control 2.1 Default Logic Theory 2.2 Default Theories Extensions 2.3 New Formulation of Symbolic Control 3 Abductive Logical Actors of the Urban Network 3.1 Distributed Default Theory of Intelligent Agents 4 Conclusions References IDCCPSS 1 (Special Session)—Chair: Igor Kotenko Using Clustering Methods of Anomalies and Neural Networks to Conduct Additional Diagnostics of a Computer Network 1 Introduction 2 Formulation of the Problem 3 Computer Network Monitoring System with an Additional Module for Anomaly Diagnostics 4 Method for Monitoring a Computer Network Using the Additional Module for Anomaly Diagnostics 5 Testing of the Module 6 Conclusion References Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions 1 Introduction 2 Transport-Based Time Synchronization Solutions 3 Classification of Attacks 4 Preliminary Experiments with Software Tampering Attacks 5 Conclusions References An Approach to Automated Assessment of the Image of a Territorial Entity in the Media Discourse of a Foreign States 1 Introduction 2 State of the Art Analysis 3 Proposed Approach 4 Experimental Testbed 5 Results of the Experiment 6 Conclusion and Discussion References FL4J—Federated Learning Framework for Java 1 Introduction 2 Related Works 3 Framework Design 3.1 Components Overview 3.2 Abstract Mining Model Design 3.3 Data Mining Algorithm Design 3.4 ANN Implementation via DL4J 4 Experiments 5 Conclusions References BLOCKCHAIN (Main Track)—Chair: Daniele Santamaria Ontological Smart Contracts in OASIS: Ontology for Agents, Systems, and Integration of Services 1 Introduction 2 Related Work 3 Ontological Smart Contracts in OASIS 4 Architectural Design of an OSC-Oriented Application 5 Conclusions and Future Work References Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in OASIS 1 Introduction 2 Related Works 3 Preliminaries 4 Representing Ethereum Through OASIS 5 The ERC721 Standard in OASIS 6 Conclusions References Preselection Based Leader Election in Distributed Systems 1 Introduction 2 System Model and Problem Definition 3 Proposed Leader Election Algorithm 3.1 Complexity Analysis 3.2 Proof of Termination, Uniqueness, and Agreement Conditions 4 Experimental Analysis and Discussion 5 Conclusion References Physical Assets Tokenization for Blockchain Market 1 Introduction 2 Related Work 3 State of the Art 4 Proposed Approach 4.1 Phase 1 4.2 Phase 2 4.3 Phase 3 5 Conclusions References MAS & ALGORITHMS (Main Track)—Chair: Fabrizio Messina Intelligent Agents for Diffused Cyber-Physical Museums 1 Introduction 2 Related Work 3 The Cleopatra Framework 3.1 Cyber-Physical Collaboration 3.2 Software Architecture 4 Case Study and Software Prototype 5 Conclusion References T-Patterns: A Way to Model Complex Trustworthiness in a Social Multi-agent Community 1 Introduction 2 Related Work 3 The Multi-agent Social Scenario 4 The T-Pattern Model 4.1 Automatic Rules Application 4.2 T-Pattern Network 4.3 An Explicative Example 5 The T-Pattern Architecture (TPA) to Automatically Manage a TPN 6 Conclusion References An Algorithmic Proposal for the Qualitative Comparison Between the Chen-Yeh EIT Mixture Model and the Susan-Resiga GSMs Experimental Model for MR Fluids 1 Introduction 2 The Chen-Yeh Model 3 The Susan-Resiga Model 4 The Proposed Algorithm 4.1 Step 1: Elast-Visco-Plastic Model and GSM and Simple Shear Flow 4.2 Step 2: GSMs Framework and The Constitutive Laws 4.3 Step3: GSMs Framework and Evolutionary Constitutive Equations 5 Some Important Results on the Qualitative Correspondence Between the Models 6 Conclusions and Perspectives References DataX: A System for Data eXchange and Transformation of Streams 1 Introduction 2 DataX Abstraction 3 Benefits 4 Design and Implementation 5 Distributed Application Development Using DataX 6 Related Work 7 Conclusion References Monitoring Hierarchical Systems for Safety Assurance 1 Introduction 2 Monitoring of Hierarchical Systems 3 Automotive Use Case 4 Conclusions References DATA ANALYTICS (Main Track)—Chair: Michele Malgeri Preliminary Characterization of Italian Academic Scholars by Their Bibliometrics 1 Introduction 2 Data Set Description 3 Data Set Analysis 3.1 Bibliometrics Analysis 3.2 Analysis of Publication Area and Fields 4 Conclusions References ERAKS—Interactive Interface to Annotate Entities, Co-references, and Relationships 1 Introduction 2 Related Work 3 General Architecture of the Annotation 3.1 Annotation of Entities and Co-references 3.2 Annotation of Triggered Relationships Between Entities 4 Automatic and Interactive Manual Annotation 5 Graphic Interpretation of the Lists Extracted from the Annotated Documents 6 Conclusions and Future Work References Graph Theory Applied to Brain Network Analysis in Alzheimer's Disease 1 Introduction 2 Materials and Methodology 2.1 HD-EEG Acquisition System and Data Preprocessing 2.2 eLORETA Lagged Linear Connectivity Toolbox and Complex Network Parameters 3 Experimental Results 4 Discussion and Conclusions References Detection of Postpartum Depression-Related Posts: An Analysis for Serbian 1 Introduction 2 Related Work 3 Evaluation Dataset 4 Methodology 5 Results and Discussion 6 Conclusions and Future Work References SmartTeV—Leveraging eVoting with Smart Voting Ballots 1 Introduction 2 TeV Framework: Design Principles and Functionality Overview 3 Motivation for Smart Ballot 4 Intelligent Vote Tallying 5 Concluding Remarks and Future Directions References IDCCPSS 2 (Special Session)—Chair: Vasily Desnitsky A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems 1 Introduction 2 Related Work 3 Technique Description 4 Experimental Evaluation 5 Discussion 6 Conclusion References An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents 1 Introduction 2 Related Work 3 Statement of the Problem of Synthesizing a Neural Network System for Diagnosing Computer Incidents 4 Parameters of the Combined Artificial Neural Network 5 The Structure of a Neural Network System for Diagnosing Computer Incidents 6 Experiments 7 Conclusion References Approach to Anomaly Detection in Cyber-Physical Object Behavior 1 Introduction 2 Related Work 3 Approach for the Assessment of Changes in CPO's Behaviour 4 Experiments and Discussion 5 Conclusion References Security Analysis of Information Systems Based on Attack Sequences Generation and Testing 1 Introduction 2 Related Work 3 The Technique for Information Security Analysis 3.1 Attack Sequences Generation and Testing 3.2 Risk Assessment 4 Implementation and Experiments 5 Conclusion References TRIE (Special Session) & COMPUTING—Chair: Lidia Fotia A Comparative Analysis of a Designed CNN and AlexNet for Image Classification on Small Datasets 1 Introduction 2 Convolutional Neural Networks 2.1 Architecture of CNN 2.2 Pre-trained CNN: AlexNet 3 Experimental Setup and Results 3.1 Dataset 3.2 Experimental Setup for Designed CNN 3.3 Experimental Setup for AlexNet 3.4 Results 4 Conclusions References A Clustering Reputation-Based Framework in Edge-Based IoT Environments 1 Introduction 2 Related Work 3 Our Scenario 4 The Cluster Reputation Model 5 Experiments 6 Conclusions References On Next-Generation Sequencing Compression via Multi-GPU 1 Introduction 2 Genomics and VCF Format 3 Related Works 4 VCF Shark Details 4.1 Streams 4.2 Compression Schema and Computational Issues 5 Parallel Algorithm 5.1 Work-Load Distribution 5.2 GPU-parallel Implementation Details 6 Results 7 Conclusions References Experimental Approach of the Quantum Volume on Different Quantum Computing Devices 1 Introduction 2 Benchmarking Quantum Computing Devices 3 Quantum Volume 4 Experimental Investigation of Quantum Volume 5 Discussion 6 Conclusion References