دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Serhiy Shkarlet (editor), Anatoliy Morozov (editor), Alexander Palagin (editor), Dmitri Vinnikov (editor), Nikolai Stoianov (editor), Mark Zhelezniak (editor), Volodymyr Kazymyr (editor) سری: ISBN (شابک) : 3030899012, 9783030899011 ناشر: Springer سال نشر: 2022 تعداد صفحات: 489 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب Mathematical Modeling and Simulation of Systems: Selected Papers of 16th International Scientific-practical Conference, MODS, 2021 June 28–July 01, ... (Lecture Notes in Networks and Systems, 344) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدلسازی ریاضی و شبیهسازی سیستمها: مقالات برگزیده شانزدهمین کنفرانس بینالمللی علمی-عملی، MODS، 2021، 28 ژوئن – 01 ژوئیه، ... (یادداشتهای سخنرانی در شبکهها و سیستمها، 344) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Organization Preface About This Book Contents Contributors Mathematical Modeling and Simulation of Systems in Ecology and Geographic Information Systems Mathematical Modeling of Information System Designing Master Plan of the Building Territory Based on OLAP Technology 1 Introduction 2 The Main Research 3 Results and Discussion 4 Conclusions References Models and Information Technologies of Coverage of the Territory by Sensors with Energy Consumption Optimization 1 Introduction 2 Area Covering by Stationary Sensors Mathematical Models 3 Area Covering by Dynamical Sensors Information Technology 4 Computer Simulation Results 5 Conclusions References Transport of Reactive Tracer in Compacting Multi-Fraction Bottom Sediments 1 Introduction 2 Model Formulation 3 Results of Modelling 4 Conclusions References Pillars for Establishing a Durable and Future-Proof IT Architecture Maturing Along with the NSC: Approaches from Continuous Integration to Service Mesh 1 Introduction 2 Requirements for a Future-Proof IT System 3 Essential Pillars for Establishing a Durable and Future-Proof IT Architecture 3.1 Continuous Integration, Continuous Delivery, and Continuous Deployment 3.2 Kubernetes 3.3 Service Mesh 4 Self-Developed Aerosol Early Detection Forecast System 4.1 Foundation of the Forecast System 4.2 Basis of the Forecast Models and Related Works 4.3 Conception and Explanation of the Forecast System 4.4 Résumé of the Forecast System 5 Conclusion and Outlook References Optimal Control of Buried Point Sources in a Two-Dimensional Richards-Klute Equation 1 Introduction 2 Process Description and Its Model 3 Control and Optimization 4 Solving the Example Task 5 Programming Details 6 Connection Between Three-Dimensional and Two-Dimensional Problems 7 Discussion 8 Conclusion References Mathematical Modeling and Simulation of Systems in Manufacturing Modeling of Molding of Composite Products on Prepreg Basis 1 Introduction 2 Literature Review 3 Research Methodology 4 Results 5 Conclusions References Prognostic Model of a Photovoltaic Power Plant 1 Introduction 2 Method 2.1 Structural Pattern of a Prognostic Model of a Photovoltaic Power Station 2.2 Model of a Photovoltaic ‘black Box’ 2.3 Thermal Value of PV Module 2.4 Reflexive Learning of a Photovoltaic Converter Model 3 Discussion of the Results 4 Conclusions References Investigation of Stationary Processes in Vortex Energy Separator Through Its Computational Fluid Dynamics Model 1 Introduction 2 Experimental Setup 3 CFD Model 4 Results and Discussion 5 Conclusions References Numerical Analysis of the Gas Turbine Rotor Blades Thermal State Using a Refined Mathematical Model 1 Relevance of the Research 1.1 Factors, Influencing the Heat Transfer in the Gas Turbine Rotor 1.2 Methods of Rotor Blades Surface Temperature Determining 2 Research Object and Aim 3 Formulation of the Problem 3.1 The Navier–Stokes Equations System for a Compressible Heat-Conducting System 3.2 The Turbulent Components Determination 4 Solution to the Problem 5 Main Results and Their Analysis 5.1 The Flow Temperature Structure in the Rotor Axisymmetric Section 5.2 Temperature Fields on the Turbine Rotor Blades Surface 6 Conclusion References Elliptical Methods for Surface Meshing 1 Introduction 2 Literature Analysis and Problem Statement 3 Materials and Methods of Research 3.1 The Purpose and Tasks of Research 3.2 Materials of Research 3.3 Research Results 4 Conclusions References Research and Mathematical Modeling of Filter Elements Production Processes 1 Introduction 2 Analysis of the Structure of PFFE, Depending on the Field of Application 3 The Set of Parameters of the Technological Process of Manufacturing Elements of Porous Polypropylene by Pneumoextrusion 3.1 The Method of Selecting System Parameters Depending on the Industry 3.2 Research and Mathematical Modeling of PFFE Fiber Thickness 3.3 Algorithm for Developing the Allowable Thickness of PFFE Fiber 4 Conducting Experimental Studies and Modeling of Fiber Thickness 5 Conclusions References Modeling of Technological Machines Spatial Rigidity by Subsystems 1 Introduction 2 Main Part 3 Conclusions References Mathematical Modeling of Heat Field in a Six-Strand Tundish During Filling 1 Introduction 1.1 Literature Review 2 Mathematical Model 2.1 Assumptions 2.2 Equations 2.3 Boundary Conditions 3 Results 4 Conclusions References Mathematical Modeling and Simulation of Systems in Information Technology and Information Security Hash Method for Information Stream’s Safety in Dynamic Cooperative Production System 1 Introduction 2 Related Works 3 Problem Statement 4 New Method for Detecting and Localization Multiple Errors in Blocks of Information and for Restoring the Integrity of the Primary Messages 4.1 Method of the Surplus Hashing of Information Control Block 4.2 An Algorithm for Constructing Hash Codes to Ensure Message Integrity 4.3 An Example of Fixing the Multiple Error 5 Conclusion References Generation of Pseudo-random Sequences of the Maximum Period Using Elliptic Curves Transformations 1 Introduction 2 Dual Elliptic Curve Deterministic Random Bit Generator 3 New Pseudo-random Sequence Generator on Elliptic Curves 4 Statistical Testing of Pseudo-random Sequences 4.1 NIST STS Statistical Tests 4.2 Test Results 5 Conclusions References Studying the Dynamic Bottlenecks of a Load Balancer in Distributed Systems 1 Introduction 2 Purpose of Work 3 Problem Formulation 4 Structural and Functional Components of the Research System 4.1 Structural Components of the Research System 4.2 Functional Components of the Research System 5 Deterministic Models for Studying the Dynamic Bottleneck of a Load Balancer 6 Probabilistic Models for Studying Dynamic Bottlenecks of a Load Balancer 7 The Model of the Data Exchange Process 8 Research Results 9 Further Research References An Automatic Optimization Method for BPG Compression Based on Visual Perception 1 Introduction 2 BPG Coder 3 Related Work on Two-Step Method 4 Automatic Optimizing Method for BPG on Color Image 4.1 Visual Quality Metrics for Color Images 4.2 Parameter Controlling Compression (PCC) in BPG 4.3 Image Set 5 Analysis of the Accuracy 6 Conclusions References Agent Functionals in Monitoring Information Systems 1 Introduction 2 Results of Information Search of the Analogs 3 Identification of the Problem and Formulation of the Purpose of Research 4 Hypotheses 5 Research results 6 Conclusion References Performance Model for Convolutional Neural Networks 1 Introduction 2 Problem Definition 3 Performance Model 3.1 Performance Model Basics 3.2 Model Parametrization 3.3 Getting Numerical Parameters for Performance Model 4 Simulation Sample 5 Parameter Extraction Shortcomings and Ways to Avoid It 6 Conclusions and Future Work References Adaptive Selection of Turbo Code Parameters in Wireless Data Transmission Systems 1 Introduction 2 Analysis of Research and Publications 3 Formulating the Goals of the Article 4 Presentation of the Main Material 5 Analysis of the Results 6 Conclusions References Neural Network Models Ensembles for Generalized Analysis of Audit Data Transformations 1 Introduction 2 Problem Statement 3 Structural Model of Subject Area Sub-elements Transformations of the “Completeness” Prerequisite Audit 4 Ensemble of Transformation Neural Network Models 5 Choosing the Criterion for Evaluating the Effectiveness of the Neural Network Transformations Model 6 Method for Structural and Parametric Identification of a Neural Network Transformations Model in Batch Mode 7 Structural and Parametric Identification Algorithm of a Neural Network Transformations Model in Batch Mode for GPU Implementation 8 Experiments and Results 9 Conclusions References Method of Adaptive Error Control Coding of Structured Messages Using Parameterization of Reed-Solomon Codes 1 Introduction 1.1 Target Settings 1.2 Scientific Researches and Issues Analysis 1.3 The Goals 2 Method of Adaptive Error Control Coding 2.1 The Typical Composition of Structured Data 2.2 The Client–server Communication 2.3 Dynamic Subtypes 2.4 Method of Encoding 3 Conclusions and Suggestions References Usage of WBAN Systems and IoT Solutions in a Medical Environment 1 Introduction 1.1 WBAN as an Emerging Solution in Healthcare Monitoring 1.2 Features of WBAN Usage in Different Environments 2 Design of WBAN System and Its Components 2.1 General Approach for WBAN Development 2.2 WBAN Smart Components 2.3 Storage of Health Data in the Cloud 3 Implementation of Smart Hub Using AWS 3.1 Development of IoT Solutions Using Amazon Services 3.2 Design of the Smart Hub Using Amazon Cloud Services 4 Analysis of Proposed Approach 4.1 Analysis of Data Flows and Data Loses in Cloud Architecture 4.2 Wireless Distance Simulation 5 Conclusions References Architecture of Distributed Blockchain Based Intrusion Detecting System for SOHO Networks 1 Introduction 2 Related Work 2.1 Intrusion Detection 2.2 Blockchain 3 Architecture of a Blockchain Based IDS for SOHOs 4 Blockchain Structure 5 Consensus Protocol 6 Rules Management and Configuration 7 Conclusion and Future Work References Models of Social Behavior of Learning Material Acceptance in Science-Centered Approach in Education 1 Introduction 1.1 Actuality of the Work 1.2 Purpose of Work 2 Analysis of Existing Developments and Problem Statement 2.1 Analysis of Existing Developments 2.2 General Concepts of the Theory of Cellular Automata 3 Improvement of the General Rules of the Cellular Automata 3.1 Improvement of the Rule of Possible Cell States 3.2 Improvement of the Rule for Determining the State of a Cell 3.3 Introduction of the Basic Rule for Determining the Vicinity of a Cell 3.4 The Complicated Rule for Determining the Vicinity of a Cell 4 Improvement of the Cellular Automata in the Direction of Modeling of Social Behavior 4.1 The Rule of Dependence of the Susceptibility Coefficient on the Difference Between the State of a Cell and Its Environment 4.2 The Rule of Cyclic Variation of the Radiuses of Field Cell Interactions 5 Approbation of Modified Cellular Automata in Modeling the Learning Process in the Science-Centered Approach 5.1 Formulation of the Task of Modeling the Lifecycle of the Learning Process Based on a Modified CA 5.2 Testing of the Model on the Example of the Learning Process with the Science-Centered Approach 5.3 Problem Statement 5.4 Variant 1: Random Distribution with No External Influence 5.5 Variant 2: Division into Groups in the Absence of External Influence 5.6 Variant 3: Division into Groups and Presence of Influence on 4 Students 5.7 Variant 4: Division into Groups and Presence of Influence on 16 Students 5.8 Variant 5: Division into Groups and Presence of Influence on 36 Students 5.9 Variant 6: Division into Groups and the Impact on 36 Students from Different Groups 6 Conclusions References Research of Topological Properties of Network Reflections Obtained Using Different Algorithms for Scanning Initial Networks 1 Introduction 2 Random Network Model 2.1 Barabási-Albert Network: Model of Preferential Connection 2.2 Erdös-Renyi Network 3 The Proposed Network Scanning Algorithms 3.1 Building the Network Reflection Using the PageRank Algorithm 3.2 Building the Network Reflection Using the Algorithm of Maximum PageRank 3.3 Building the Network Reflection Using the Algorithm of Maximum Degree 4 Results 5 Conclusion References Using Image Segmentation Neural Network Model for Motion Representation in Sport Analytics 1 Introduction 2 Presentation of the Main Material 2.1 Model 2.2 Dataset 2.3 Training Parameters and Metrics 2.4 Evaluating the Model 2.5 Proposed Algorithm Description 2.6 Algorithm Operation Examples 3 Conclusion References Quasi-Inflection-Based Part-of-Speech Tagging of Texts for Expert Formulations Content Ambiguity Detection in Modeling Domain Knowledge 1 Introduction: Analysis of the Problem Situation 2 Discussion 3 Research Objective 4 Formal Statement of the Problem 4.1 The Proposed Method 5 Results 6 Validation of the Method 7 Conclusions References Dynamic Malware Detection Based on Embedded Models of Execution Signature Chain 1 Introduction 2 Related Work 3 Functional Safety Analysis of Android OS 4 Modelling of Application Execution Signature Chain 5 The Method of Dynamic Building Android Application Execution Signature Chain 6 Experiments and Results 6.1 Evaluation Measures 7 Conclusion References Cybersecurity User Requirements Analysis: The ECHO Approach 1 Introduction 2 ECHO Approach for a Use Case Definition 3 Use Case Modelling with CAIRIS 4 An Example Storyline and Use Cases Definitions 4.1 UC01 “Wi-Fi Router Firmware Attack” 4.2 UC02 “Man-in-the-Middle Attack” 4.3 UC03 “USB Flash Stick Malware Attack” 5 An Approach for Modelling the Example Storyline Within CAIRIS 6 Conclusion References Fuzzy Game-Theoretic Modeling of a Multi-Agent Cybersecurity Management System for an Agricultural Enterprise 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Multiagent Management System of an Agricultural Enterprise 3.2 Theoretical-Game Approach to Ensure the Stability of the Multi-Agent System 4 Results 5 Discussion 6 Conclusions and Further Research References Mathematical Modeling and Simulation of Special Purpose Equipment Samples Issue of Airplane Modification Mass Variations Based on Their Structural Modelling 1 Introduction 2 Analysis of References Data and Problem Statement 3 Goal and Tasks of Survey 4 Features of Modification Mass Variation (on Example of Military Transports 5 Method and Models of Modification Mass Structurization into Starting and Takeoff Masses 6 Modeling of Starting Mass Interrelation with Modification Key Parameters 7 Airplane Modification Takeoff Mass Increase Reasons 8 Research of Takeoff Masses’ Variation Influence on Takeoff and Landing Parameters of Certified Modifications 9 Discussion of Research Results of Modification Mass Formation Based on Structural Modelling 10 Conclusions References Decision Support with Bayesian Influence Network During UAV Flight Control 1 Target Setting 2 The Aims of Article 3 Actual Scientific Researches and Issues Analysis 4 DSS Model Building 5 Results 6 Conclusions References Modeling and Analysis of the Main Statistical Parameters of the Testing System of Special Equipment 1 Introduction 2 Background and Related Work 3 Research Method 3.1 Description of the Model of Testing Institution 3.2 Input Flow of Testing Requests 3.3 Testing System 4 Discussion 5 Conclusions and Future Work 5.1 Conclusions 5.2 Future Work References Mathematical Modeling and Simulation of Systems in Project Management Modeling of Project Portfolio Management Process in Banking 1 Introduction 1.1 Problem Statement 1.2 Process Approach for Banking 1.3 PDCA Approach 1.4 Paper’s Purpose and Objectives 2 A PDCA Model for Project Portfolio Management in Banking 2.1 Model of a PDCA Approach for Project Portfolio Management in Banking 3 Machine Learning Method 4 Conclusion References Author Index