دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Herwig Unger. Marcel Schaible
سری: Lecture Notes in Networks and Systems, 674
ISBN (شابک) : 3031326997, 9783031326998
ناشر: Springer
سال نشر: 2023
تعداد صفحات: 238
[239]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 21 Mb
در صورت تبدیل فایل کتاب Real-time and Autonomous Systems 2022: Automation in Everyday Life به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب سیستمهای بیدرنگ و خودمختار 2022: اتوماسیون در زندگی روزمره نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Contents Real-Time The Real-Time Systems Archive 1 Introduction 2 Real-Time Systems Within the GI Archive 3 Historical Background 4 Description of the Archive 4.1 Inventory 4.2 Digitisation 4.3 Structuring 5 Content of the Archive 5.1 Basics 5.2 Scientific Material 5.3 Events 5.4 The Project ``Process Control by Data Processing'' (``Prozesslenkung Durch Datenverarbeitung – PDV'') 5.5 PEARL Review (``PEARL-Rundschau'') 5.6 Results 6 Usage 7 Experience References Deadlock Detection in OpenPEARL*-12pt 1 Deadlock 1.1 Deadlock Prevention 1.2 Deadlock Avoidance 1.3 Deadlock Detection and Resolution 2 OpenPEARL 2.1 Deadlock-Relevant Operations 3 Static Analysis 4 Dynamic Analysis 4.1 Resource-Allocation-Graph 4.2 Definite and Temporary Deadlocks 5 Conclusion 5.1 Evaluation of Static Deadlock Detection 5.2 Evaluation of Dynamic Deadlock Detection References Development of an Authentication Method for Time-Sensitive Networking Using FPGAs and Delay-Based Physical Unclonable Functions: A Research Plan 1 Introduction 2 Time-Sensitive Networking 2.1 TSN Components 2.2 Security Analysis 3 Physical Unclonable Functions 3.1 PUF-Based Authentication Protocols 4 Future Investigations 5 Conclusion References Taking Real-Time and Virtualization to Open Source Hardware 1 Introduction 2 Porting an Operating System 2.1 Static Configuration 2.2 Kernel Structure 2.3 Kernel Startup 2.4 Kernel Entry and Exit 2.5 Interrupt Management 2.6 Memory Protection 3 Virtual Machines in Marron 3.1 Virtualization in RISC-V 3.2 Structure 3.3 VM Entry and Exit 3.4 Interrupts 4 Discussion 5 Conclusion References Predictive Preload at Fixed Preemption Points for Microcontrollers with Hard Real-Time Requirements 1 Motivation 2 Related Work 3 Concept 3.1 Preload Block Identification 3.2 Preload Procedure 3.3 Address Translation 3.4 Asynchronic Events 4 Experimental Results 5 Discussion References Industrie 4.0-Compliant Digital Twins Boosting Machine Servitization 1 Introduction 2 Industrie 4.0-Compliant Digital Twins Boosting Machine Servitization 2.1 How Industrie 4.0-Compliant Digital Twins Boost Machine Servitization 2.2 Best practice 2.3 Alternative Approaches 3 Exemplary Machine Servicing 3.1 Error Correction Process 3.2 Condition Monitoring and Predictive Maintenance 4 Conclusion References A Vibrotactile Assistance System for Factory Workers for Accident Detection and Prevention in the Logistics Sector 1 Introduction 2 Defining Challenge 3 State of the Art Ultrasound, Radar, Time-of-flight Camera 4 Concept 4.1 Reading in the Sensor Data 4.2 Evaluating the Sensor Data 4.3 The Hazard Analysis 5 Real-Time Analysis 6 Implementation and Verification 7 Conclusion References MBSE for SMEs with Domain-Specific Safety Analyses and Loose Tool Coupling 1 Introduction 2 General Approach 2.1 Goals 2.2 Modeling Extensions 2.3 Analysis Tool Integration 2.4 Implementation Status 2.5 Related Work 3 Use Case 3.1 Application Model and Safety Requirements 3.2 Transformation, Analysis and Results at Model Level 4 Conclusion and Future Work References Software-Defined Networking with Prioritization for a Redundant Network Topology Called Double Wheel Topology 1 Introduction 2 Basic SDN Requirements 3 Realization 4 Conclusion and Outlook References A Survey on Pedestrian Detection: Towards Integrating Vulnerable Road Users into Sensor Networks 1 Introduction 2 Methods for 2D and 3D Pedestrian Detection 2.1 RGB Camera 2.2 Thermal Imaging Camera 2.3 RGBD Camera 2.4 LiDAR Sensor 2.5 RADAR Sensor 3 Sensor Fusion Methods for 2D and 3D Pedestrian Detection 3.1 LiDAR Sensor and RGB Camera 3.2 RADAR Sensor and RGB Camera 3.3 LiDAR and RADAR Sensors 3.4 LIDAR Sensor, RADAR Sensor and RGB Camera 4 Conclusion and Outlook References Real-Time Aspects of Image Segmentation of Road Markings in Miniature Autonomy*-12pt 1 Introduction 2 Segmentation of Road Markings 2.1 Training Data 2.2 Network Architecture UNet 3 Hardware Setups 4 Latency Measurements 5 Conclusion References Real-Time Audio Classification to Determine the Article of a German Noun*-12pt 1 Introduction 2 Implementation 2.1 CNN 2.2 Structure 2.3 Data Creation 2.4 Overfitting Prevention 3 Results 3.1 Optimization Methods 3.2 Accuracy Analysis Using Confusion Matrix 3.3 Time Optimization 4 Conclusion and Outlook References Live GNSS Tracking of Search and Rescue Dogs with LoRa*-12pt 1 Introduction 2 Methods 3 Results 3.1 Usability of LoRa 3.2 GNSS Reception 3.3 Real-Time Requirements 3.4 Supporting the Training 4 Conclusion References AutSys Artificial Intelligence in Autonomous Systems. A Collection of Projects in Six Problem Classes*-12pt 1 Introduction 2 Basic Autonomous Behaviour 3 Creating Maps of the Environment 4 Creating Objects from Point Clouds 5 Behaviour Inside Buildings 5.1 Using Elevators 5.2 Recognizing Doors 5.3 Recognizing Door Handles 5.4 Opening Doors 6 Man-Robot Interaction 6.1 Visual Interaction Component 6.2 Simple Voice Commands 7 Positioning with Reinforcement Learning 8 Final Remarks References Neural Networks in View of Explainable Artificial Intelligence 1 Introduction 2 Neural Networks as Universal Approximators 3 What Do We Really Want? 4 Future Work References Reconstruct a Distributed Co-occurrence Graph in a P2P Network Without Overhead 1 Motivation 2 Description of the Decentralized Environment 2.1 Distributed System 2.2 Routing 2.3 Messages 3 Conceptional Approach 3.1 Experimental Setup 3.2 Basic Method 3.3 Cautious Approach 3.4 Exclusion List 3.5 Shadow Effect 3.6 Improved Exclusion List 3.7 Mantle-Before-Core 4 Experiments and Results 4.1 Basic Method 4.2 Exclusion List 4.3 Improved Exclusion List 4.4 Mantle-Before-Core 4.5 Comparison 5 Discussion 6 Future Work 7 Conclusion References Implementing the WebMap: An Extension to the Web 1 Introduction 2 Idea 3 Implementation 3.1 Cluster Lookup Server 3.2 Cluster Server 3.3 Web Server 3.4 Search Service 4 Experimental Setup 4.1 Setup and Data 4.2 Creating the Local Co-occurrence Graph and Deriving Document TRCs 4.3 Creating a Global Network of Clusters 4.4 Searching for Documents 5 Results and Discussion 6 Summary and Next Steps References Authentication in P2P Environment Based on Multi Dimensional Administration Graph*-12pt 1 Introduction 1.1 Motivation 1.2 Contribution 2 Related Works 2.1 Authentication Mechanisms in P2P Environments 2.2 Anonymous Authentication 3 Requirements on the Mechanism 3.1 Conditions 3.2 Operations 4 Proposed Approach 4.1 Definition of Administration Layer 4.2 Construction of Administration Graph 4.3 Multi Criteria Authentication 5 Conclusion References Reduction of Overhead for Protocols with Remote Memory Properties*-12pt 1 Introduction 2 System 2.1 Formal Model 3 Problem Definition 4 Related Work 5 Solution 5.1 Exhaustive Search 5.2 Stochastic Approach 6 Verification 6.1 Hypotheses 6.2 Setup 6.3 Simulation Parameter 6.4 Results 7 Conclusion and Outlook References Author Index