ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Real-time and Autonomous Systems 2022: Automation in Everyday Life

دانلود کتاب سیستم‌های بی‌درنگ و خودمختار 2022: اتوماسیون در زندگی روزمره

Real-time and Autonomous Systems 2022: Automation in Everyday Life

مشخصات کتاب

Real-time and Autonomous Systems 2022: Automation in Everyday Life

ویرایش:  
نویسندگان:   
سری: Lecture Notes in Networks and Systems, 674 
ISBN (شابک) : 3031326997, 9783031326998 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 238
[239] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 21 Mb 

قیمت کتاب (تومان) : 34,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Real-time and Autonomous Systems 2022: Automation in Everyday Life به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب سیستم‌های بی‌درنگ و خودمختار 2022: اتوماسیون در زندگی روزمره نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Contents
Real-Time
The Real-Time Systems Archive
	1 Introduction
	2 Real-Time Systems Within the GI Archive
	3 Historical Background
	4 Description of the Archive
		4.1 Inventory
		4.2 Digitisation
		4.3 Structuring
	5 Content of the Archive
		5.1 Basics
		5.2 Scientific Material
		5.3 Events
		5.4 The Project ``Process Control by Data Processing'' (``Prozesslenkung Durch Datenverarbeitung – PDV'')
		5.5 PEARL Review (``PEARL-Rundschau'')
		5.6 Results
	6 Usage
	7 Experience
	References
Deadlock Detection in OpenPEARL*-12pt
	1 Deadlock
		1.1 Deadlock Prevention
		1.2 Deadlock Avoidance
		1.3 Deadlock Detection and Resolution
	2 OpenPEARL
		2.1 Deadlock-Relevant Operations
	3 Static Analysis
	4 Dynamic Analysis
		4.1 Resource-Allocation-Graph
		4.2 Definite and Temporary Deadlocks
	5 Conclusion
		5.1 Evaluation of Static Deadlock Detection
		5.2 Evaluation of Dynamic Deadlock Detection
	References
Development of an Authentication Method for Time-Sensitive Networking Using FPGAs and Delay-Based Physical Unclonable Functions: A Research Plan
	1 Introduction
	2 Time-Sensitive Networking
		2.1 TSN Components
		2.2 Security Analysis
	3 Physical Unclonable Functions
		3.1 PUF-Based Authentication Protocols
	4 Future Investigations
	5 Conclusion
	References
Taking Real-Time and Virtualization to Open Source Hardware
	1 Introduction
	2 Porting an Operating System
		2.1 Static Configuration
		2.2 Kernel Structure
		2.3 Kernel Startup
		2.4 Kernel Entry and Exit
		2.5 Interrupt Management
		2.6 Memory Protection
	3 Virtual Machines in Marron
		3.1 Virtualization in RISC-V
		3.2 Structure
		3.3 VM Entry and Exit
		3.4 Interrupts
	4 Discussion
	5 Conclusion
	References
Predictive Preload at Fixed Preemption Points for Microcontrollers with Hard Real-Time Requirements
	1 Motivation
	2 Related Work
	3 Concept
		3.1 Preload Block Identification
		3.2 Preload Procedure
		3.3 Address Translation
		3.4 Asynchronic Events
	4 Experimental Results
	5 Discussion
	References
Industrie 4.0-Compliant Digital Twins Boosting Machine Servitization
	1 Introduction
	2 Industrie 4.0-Compliant Digital Twins Boosting Machine Servitization
		2.1 How Industrie 4.0-Compliant Digital Twins Boost Machine Servitization
		2.2 Best practice
		2.3 Alternative Approaches
	3 Exemplary Machine Servicing
		3.1 Error Correction Process
		3.2 Condition Monitoring and Predictive Maintenance
	4 Conclusion
	References
A Vibrotactile Assistance System for Factory Workers for Accident Detection and Prevention in the Logistics Sector
	1 Introduction
	2 Defining Challenge
	3 State of the Art Ultrasound, Radar, Time-of-flight Camera
	4 Concept
		4.1 Reading in the Sensor Data
		4.2 Evaluating the Sensor Data
		4.3 The Hazard Analysis
	5 Real-Time Analysis
	6 Implementation and Verification
	7 Conclusion
	References
MBSE for SMEs with Domain-Specific Safety Analyses and Loose Tool Coupling
	1 Introduction
	2 General Approach
		2.1 Goals
		2.2 Modeling Extensions
		2.3 Analysis Tool Integration
		2.4 Implementation Status
		2.5 Related Work
	3 Use Case
		3.1 Application Model and Safety Requirements
		3.2 Transformation, Analysis and Results at Model Level
	4 Conclusion and Future Work
	References
Software-Defined Networking with Prioritization for a Redundant Network Topology Called Double Wheel Topology
	1 Introduction
	2 Basic SDN Requirements
	3 Realization
	4 Conclusion and Outlook
	References
A Survey on Pedestrian Detection: Towards Integrating Vulnerable Road Users into Sensor Networks
	1 Introduction
	2 Methods for 2D and 3D Pedestrian Detection
		2.1 RGB Camera
		2.2 Thermal Imaging Camera
		2.3 RGBD Camera
		2.4 LiDAR Sensor
		2.5 RADAR Sensor
	3 Sensor Fusion Methods for 2D and 3D Pedestrian Detection
		3.1 LiDAR Sensor and RGB Camera
		3.2 RADAR Sensor and RGB Camera
		3.3 LiDAR and RADAR Sensors
		3.4 LIDAR Sensor, RADAR Sensor and RGB Camera
	4 Conclusion and Outlook
	References
Real-Time Aspects of Image Segmentation of Road Markings in Miniature Autonomy*-12pt
	1 Introduction
	2 Segmentation of Road Markings
		2.1 Training Data
		2.2 Network Architecture UNet
	3 Hardware Setups
	4 Latency Measurements
	5 Conclusion
	References
Real-Time Audio Classification to Determine the Article of a German Noun*-12pt
	1 Introduction
	2 Implementation
		2.1 CNN
		2.2 Structure
		2.3 Data Creation
		2.4 Overfitting Prevention
	3 Results
		3.1 Optimization Methods
		3.2 Accuracy Analysis Using Confusion Matrix
		3.3 Time Optimization
	4 Conclusion and Outlook
	References
Live GNSS Tracking of Search and Rescue Dogs with LoRa*-12pt
	1 Introduction
	2 Methods
	3 Results
		3.1 Usability of LoRa
		3.2 GNSS Reception
		3.3 Real-Time Requirements
		3.4 Supporting the Training
	4 Conclusion
	References
AutSys
Artificial Intelligence in Autonomous Systems. A Collection of Projects in Six Problem Classes*-12pt
	1 Introduction
	2 Basic Autonomous Behaviour
	3 Creating Maps of the Environment
	4 Creating Objects from Point Clouds
	5 Behaviour Inside Buildings
		5.1 Using Elevators
		5.2 Recognizing Doors
		5.3 Recognizing Door Handles
		5.4 Opening Doors
	6 Man-Robot Interaction
		6.1 Visual Interaction Component
		6.2 Simple Voice Commands
	7 Positioning with Reinforcement Learning
	8 Final Remarks
	References
Neural Networks in View of Explainable Artificial Intelligence
	1 Introduction
	2 Neural Networks as Universal Approximators
	3 What Do We Really Want?
	4 Future Work
	References
Reconstruct a Distributed Co-occurrence Graph in a P2P Network Without Overhead
	1 Motivation
	2 Description of the Decentralized Environment
		2.1 Distributed System
		2.2 Routing
		2.3 Messages
	3 Conceptional Approach
		3.1 Experimental Setup
		3.2 Basic Method
		3.3 Cautious Approach
		3.4 Exclusion List
		3.5 Shadow Effect
		3.6 Improved Exclusion List
		3.7 Mantle-Before-Core
	4 Experiments and Results
		4.1 Basic Method
		4.2 Exclusion List
		4.3 Improved Exclusion List
		4.4 Mantle-Before-Core
		4.5 Comparison
	5 Discussion
	6 Future Work
	7 Conclusion
	References
Implementing the WebMap: An Extension to the Web
	1 Introduction
	2 Idea
	3 Implementation
		3.1 Cluster Lookup Server
		3.2 Cluster Server
		3.3 Web Server
		3.4 Search Service
	4 Experimental Setup
		4.1 Setup and Data
		4.2 Creating the Local Co-occurrence Graph and Deriving Document TRCs
		4.3 Creating a Global Network of Clusters
		4.4 Searching for Documents
	5 Results and Discussion
	6 Summary and Next Steps
	References
Authentication in P2P Environment Based on Multi Dimensional Administration Graph*-12pt
	1 Introduction
		1.1 Motivation
		1.2 Contribution
	2 Related Works
		2.1 Authentication Mechanisms in P2P Environments
		2.2 Anonymous Authentication
	3 Requirements on the Mechanism
		3.1 Conditions
		3.2 Operations
	4 Proposed Approach
		4.1 Definition of Administration Layer
		4.2 Construction of Administration Graph
		4.3 Multi Criteria Authentication
	5 Conclusion
	References
Reduction of Overhead for Protocols with Remote Memory Properties*-12pt
	1 Introduction
	2 System
		2.1 Formal Model
	3 Problem Definition
	4 Related Work
	5 Solution
		5.1 Exhaustive Search
		5.2 Stochastic Approach
	6 Verification
		6.1 Hypotheses
		6.2 Setup
		6.3 Simulation Parameter
		6.4 Results
	7 Conclusion and Outlook
	References
Author Index




نظرات کاربران