دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Wojciech Zamojski
سری:
ISBN (شابک) : 9783030767730, 3030767736
ناشر: Springer Nature
سال نشر: 2021
تعداد صفحات: [527]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 38 Mb
در صورت تبدیل فایل کتاب Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28 – July 2, 2021, Wrocław, Poland به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تئوری و مهندسی سیستمها و شبکههای کامپیوتری قابل اعتماد: مجموعه مقالات شانزدهمین کنفرانس بینالمللی قابلیت اطمینان سیستمهای کامپیوتری DepCoS-RELCOMEX، 28 ژوئن – 2 ژوئیه 2021، Wrocław، لهستان نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Program Committee Organizing Committee Chair Members Contents Application of Assumption Modes and Effects Analysis to XMECA 1 Introduction 2 FMECA Model 3 Expert Evaluation of FMECA 3.1 Evaluation in Case of Equal Qualification (Self-assessment) of Experts 3.2 Evaluation in Case of Different Qualification (Self-assessment) of Experts 4 Assumption Modes and Effect Analysis. Case Study 5 Conclusion and Future Work References Improving Effectiveness of the Risk Management Methodology in the Revitalization Domain 1 Introduction 2 The SUMAD Methodology and Its Implementation 3 Extension of the SUMAD Methodology 4 Model of the Proposed Performance Evaluation Subsystem 4.1 Classification Scheme of Performance Indicators 4.2 Software Support for Performance Evaluation 5 Model Validation 6 Conclusions References Automated Music Generation Using Recurrent Neural Networks 1 Introduction 2 Related Work 3 Data Preprocessing 4 Research Methodology 4.1 Extracting Features 4.2 Creating Sequences 4.3 Experiments 5 Results 6 Conclusion and Future Work References Non-exhaustive Verification in Integrated Model of Distributed Systems (IMDS) Using Vagabond Algorithm 1 Introduction 2 Related Work 3 Model Checking in Integrated Model of Distributed Systems 3.1 Basic IMDS Definition 3.2 Processes in IMDS 3.3 Communication Deadlock and Resource Deadlock 4 The Vagabond Algorithm 4.1 Communication Deadlock (Node Deadlock) 4.2 Resource Deadlock (Agent Deadlock) 4.3 Heuristics 5 Experimental Results 5.1 Philosophers 5.2 Karlsruhe Production Cell 5.3 Train Scheduling 6 Limitations 7 Conclusions and Further Work References Automatic Multi-class Classification of Polish Complaint Reports About Municipal Waste Management 1 Introduction 2 Complaint Reporting System 3 Problem Statement 4 Automatic Classification of Complaint Reports 5 Results 6 Discussion References Migration of Unit Tests of C# Programs 1 Introduction 2 Background and Related Work 3 Migration of NUnit Tests into MS Test 3.1 Attributes 3.2 Assertions 4 Experimental Evaluation of Test Migration 4.1 Test Translator – Automated Support for Test Migration 4.2 Subject Programs 4.3 Results of Test Migration 4.4 Discussion of Results 5 Conclusions References Synchronization and Scheduling of Tasks in Fault-Tolerant Computer Systems with Graceful Degradation 1 Introduction 2 The Model for the Problem of Computer Fault Tolerant System Synthesis 3 Example of Computer System with Features Fault Tolerant and Graceful Degradation 3.1 System Specification 4 Conclusions References Comparison of Selected Algorithms of Traffic Modelling and Prediction in Smart City - Rzeszów 1 Introduction 2 Rzeszow Smart City and ISO Standard and Certification 3 Traffic Modelling – Methodology 3.1 ARIMA Model 3.2 Jaro Winkler Algorithm 3.3 ETS Model 4 Implementation of the ARIMA Model in Orange 3 Environment 5 Results 6 Conclusion References Dependability Analysis Using Temporal Fault Trees and Monte Carlo Simulation 1 Introduction 2 Related Work 2.1 Pandora 2.2 Quantitative Analysis Using Analytical Approaches 2.3 Quantitative Analysis Using Simulation 3 Dependability Analysis 3.1 Evaluating All MCSQs 3.2 Modelling in Goldsim 4 Case Study 5 Conclusion References Hybrid Parallel Programming in High Performance Computing Cluster 1 Introduction 2 Approaches to Determining the Complexity and Efficiency of Algorithms and Programs 3 Hardware and Software Platform 4 OpenMP and MPI Features on the Architecture of a Computing Cluster 5 Results of Experimental Studies 6 Conclusion References Computing of Blocks of Some Combinatorial Designs for Applications 1 Introduction 2 Algebraic Methods for Constructing Projective Planes 2.1 Projective Planes 2.2 The Algebraic Method to Construct the Projective Plane Using basis’s of Their Blocks 2.3 Building a Block of a Projective Plane by Its Number and a Block of a Dual Projective Plane Containing This Element 3 Conclusion References A Stopwatch Automata-Based Approach to Schedulability Analysis of Real-Time Systems with Support for Fault Tolerance Techniques 1 Introduction 2 Fault Tolerance Techniques 3 Related Work on Schedulability Analysis 4 The Approach to Checking Real-Time Constraints 4.1 Problem Statement 4.2 General Networks of Stopwatch Automata 4.3 General Model of Real-Time System Operation 4.4 Constructing a Simulation Model for Schedulability Analysis 5 Case Study 6 Conclusion References Fractional Order Derivative Mechanism to Extract Biometric Features 1 Introduction 2 Research Methods 3 Results 4 Conclusion References Contract-Based Specification and Test Generation for Adaptive Systems 1 Introduction 2 Contract-Based Specification and Test Generation 3 Languages for Specifying Contracts and Adaptive Behavior 3.1 Scenario Language 3.2 Adaptive Contract Language 4 Deriving Test Cases from Adaptive Contract Models 4.1 Translating Scenarios to Automata 4.2 Deriving Test Cases from Adaptive Contract Models 4.3 Test Generation Example 5 Related Work 6 Conclusion and Future Work References New Loss Function for Multiclass, Single-Label Classification 1 Introduction 2 Proposed Loss Function 3 Conducted Experiments 4 Summary References Network Risk Assessment Based on Attack Graphs 1 Introduction 2 Basics of Risk Assessment 2.1 Definitions 2.2 Risk Assessment Methods 3 Attack Graph Based Risk Assessment 4 Case Study 4.1 Case 1. Attacker Located in the Internet 4.2 Case 2. Attack from the Internal Network 4.3 Discussion 5 Conclusions References Cost Results of Block Inspection Policy with Imperfect Testing in Multi-unit System 1 Introduction 2 Consideration of Inspection Accuracy in System Maintenance 3 Simulation Model of System Operation with One- and Two-Level Inspection Maintenance Policy 3.1 Modelling Assumptions 3.2 Simulation Model 4 Sensitivity Results of the Simulation Model 5 Comparison of One- and Two-Level Inspection Policies in Multi-unit System 6 Conclusions References Reliability Assessment of Multi-cascade Redundant Systems Considering Failures of Intermodular and Bridge Communications 1 Introduction 2 Reliability Block Diagrams of Reactor Trip Systems Considering Communications 3 Reliability Block Diagrams of Multi-cascade Redundant Systems 4 Reliability Models 5 Research of Models 6 Conclusions References Evolution Process for SOA Systems as a Part of the MAD4SOA Methodology 1 Introduction 2 Related Work 3 Evolution Process for Service-Oriented Systems 3.1 Change Assessment Phase 3.2 Change Designing Phase 3.3 Development and Deployment Phase 3.4 Change Review Phase 4 The Case Study 5 Discussion 6 Conclusion References Optimizations for Fast Wireless Image Transfer Using H.264 Codec to Android Mobile Devices for Virtual Reality Applications 1 Introduction 2 Basic Definitions 3 Solution Description 3.1 Architecture Optimizations 3.2 Methods and Data Structures Optimizations 4 Experimental Results 4.1 CPU Resources Usage 4.2 Image and Tracking Delay 5 Conclusions References Experimental Comparison of ML/DL Approaches for Cyberattacks Diagnostics 1 Introduction 2 Testing of ML/DL Methods 3 The Efficiency of ML/DL Methods for Attack Detection 4 Testing Datasets 5 Dataset Features Number Reduction 6 Artificial Neural Network (ANN) for Attack Classification 7 Experimental Results for ML/DL Classification 8 Discussion and Results 9 Conclusions References Data Sparsity and Cold-Start Problems in M-CCF Recommender System 1 Introduction 2 Background and Related Work 2.1 A Cold-Start Problem and Neighbourhood Identification 2.2 Multi-clustering Approach to Recommendations 2.3 Contribution of Proposed Work 3 Description of M-CCF Algorithm 4 Experiments 5 Conclusions References Explaining Predictions of the X-Vector Speaker Age and Gender Classifier 1 Introduction 2 Background 2.1 Speech Classification 2.2 Explainable Artificial Intelligence (XAI) 3 Our Approach 3.1 Dataset 3.2 Neural Network Architecture 3.3 Explainability Methods 4 Preliminary Results 4.1 Experimental Setup 4.2 Classification Accuracy 4.3 Explainability Experiments 5 Conclusions and Future Work References Application of the Closed-Loop PI Controller as the Low-Pass Filter 1 Introduction 2 Model of the Low-Pass Filter Based on the Closed-Loop PI Controller 3 Simulation Test Results 4 Summary References Reliability of Multi-rotor UAV's Flight Stabilization Algorithm in Case of Object's Working Point Changes 1 Introduction 2 Standard and Non Standard Multi-rotor UAV 3 PID Controller 4 Fuzzy Logic Based Controller - the SkyNav 5 Experiments Results with the Use of the SkyNav 5.1 Experiments on a Test Bench, Under Suspension Conditions 5.2 Experimental Study of the SkyNav Controller During the Flight 6 Conclusions References Semi-Markov Model of Processing Requests Reliability and Availability in Mobile Cloud Computing Systems 1 Introduction 2 Mobile Cloud Computing System 3 Multi-state Semi-Markov Process Based Modelling of Reliability and Availability 4 SMP Model of Processing Requests in an MCC System 5 Numerical Example 6 Conclusion References Softcomputing Approach to Sarcasm Analysis 1 Introduction 2 State of Art 2.1 Semi-supervised Recognition of Sarcastic Sentences Twitter, Amazon 2.2 Sarcasm Detection on Twitter: A Behavioral Modeling Approach 3 Datasets 3.1 iSarcasm 3.2 News Headlines Dataset 4 MLP-Type ANN Sarcasm Detector 4.1 Data Preparation 4.2 Network Topology 4.3 Alternative Network Topology 4.4 Network Compilation and Training 5 CNN-Type Sarcasm Detector 5.1 Data Preprocessing 5.2 Architecture 6 Results 6.1 Sarcastic Headlines Dataset Experiments 6.2 Sarcastic Headlines and Twitter Dataset Experiments 6.3 Experiments with CNN-Type Sarcasm Detector 7 Conclusions References Open–source–based Environment for Network Traffic Anomaly Detection 1 Introduction 2 Research Context 3 Environment Description 3.1 System Architecture 3.2 Components 3.3 Methods 3.4 Configurability 4 Application 4.1 The General Data Description 4.2 Normal Traffic Analysis 4.3 Enforced Attacks Monitoring 5 Conclusions and Further Works References Building AFDX Networks of Minimal Complexity for Real-Time Systems 1 Introduction 2 The Problem of Building the AFDX Network with Minimal Complexity 3 Algorithm for Building the Minimal Network 3.1 General Scheme of the Algorithm 3.2 Calculating the Properties of Virtual Links 3.3 Virtual Links Aggregation Procedure 3.4 Messages Aggregation Procedure 3.5 Virtual Link Routing Procedure 3.6 Limited Enumeration Procedure 3.7 Estimating the Maximum Message Transmission Time and Jitter 3.8 Virtual Link Reconfiguration Procedure 4 Experimental Evaluation of the Algorithm 5 Conclusion References Efficient Computation of the Best Controls in Complex Systems Under Global Constraints 1 Introduction 2 The System 3 On-line System Identification 3.1 Least Squares Method 3.2 On-line Instrumental Variables Approach 4 Decomposition of Unconstrained Problem 5 Multi-level Optimization with Limited Resources 6 Example 6.1 Global Approach 6.2 Parallel Computation for Unconstrained Problem 6.3 Multi-level Convex Optimization Procedure 7 Summary References Building of a Variable Context Key Enhancing the Security of Steganographic Algorithms 1 Introduction 2 Keys in Steganographic Systems 3 Use of Context in Security Systems 4 Composition of a Steganographic Context Key 4.1 Encoding Data from Sensors 4.2 User Password 4.3 The Seed as a Key Security Element 4.4 Data Exchange for the Key 5 The Place of Key Embedding in the Steganographic Algorithm 6 Summary References Method of Visual Detection of the Horizon Line and Detection Assessment for Control Systems of Autonomous and Semi-autonomous Ships 1 Introduction 2 Methods of Horizon Line Detection 3 Assessment of Image Usefulness for Horizon Line Detection 4 The Proposed Methods of Horizon Line Detection 5 Methods of Improving the Quality of Horizon Line Detection and the Proposed Algorithm of Horizon Line Detection 6 Summary References Influence of Various DLT Architectures on the CPU Resources 1 Introduction 2 DLT Optimizations 2.1 DLT Description Modes 2.2 Binary Logging 2.3 Log Levels Processing 2.4 DLT Header 3 Research Setup and Scope 3.1 Research Setup 3.2 Research Results 3.3 Discussion and Conclusions References Monitoring the Granulometric Composition on the Basis of Deep Neural Networks 1 Introduction 2 Materials and Methods 3 Results and Discussions 4 Conclusion References Uncertainty Modeling in Single Machine Scheduling Problems. A Survey 1 Introduction 2 Deterministic Scheduling Problem 3 Uncertainty Modelling 3.1 Probabilistic Random Distributions 3.2 Fuzzy Description 3.3 Bound Form 4 Conclusions References An Analysis of Data Hidden in Bitcoin Addresses 1 Introduction 2 Related Work 3 Data Hiding Techniques for Bitcoin 3.1 Coinbase 3.2 OP_RETURN 3.3 Standard Transactions 3.4 Other Techniques 4 Data Hiding in Bitcoin Address 5 Classifying Suspected Addresses 6 Analysis of Identified Addresses 6.1 Qualitative Analysis of Addresses 6.2 Quantitative Analysis of Addresses 7 Data Hidden in Ethereum Addresses 8 Conclusion 9 Limitations 10 Supporting Information References The Reliability and Operational Analysis of ICT Equipment Exposed to the Impact of Strong Electromagnetic Pulses 1 Introduction 2 Reliability and Operational Analysis of an ICT Device, Taking Into Account the Impact of Strong Electromagnetic Pulses 3 Modelling of the ICT Device Operation Process Including Electromagnetic Interfere 4 Conclusion References Using ASMD-FSMD Technique for Digital Device Design 1 Introduction 2 Traditional Approach for Synchronous Multiplier Implementation 3 ASMD-FSMD Technique of the Digital Device Design 4 Experimental Research 5 Conclusions References Application of LSTM Networks for Human Gait-Based Identification 1 Introduction 2 Literature Review 2.1 Segmentation 2.2 Augmentation 2.3 Classification 3 Methodology 3.1 Database Characteristics 3.2 Segmentation 3.3 Data Augmentation 3.4 Data Splitting and Network Architecture 4 Classification Results 5 Conclusions and Future Work References Time Based Evaluation Method of Autonomous Transport Systems in the Industrial Environment 1 Autonomous Transport System 2 System Definition 2.1 Layout 2.2 Passive Trolley 2.3 Station 2.4 Virtual Path 2.5 Segment 2.6 Route 2.7 Task 2.8 Fleet Manager 2.9 Production Order 2.10 Order Manager 2.11 Operation Modes 3 Time Based System Evaluation Method (TBSE) 3.1 Operation Target 3.2 Operation Time of PO 3.3 Example Calculation of BufOut PO Time – Ideal Condition 3.4 Time Coefficients 3.5 Time Coefficients – Probability of Occurrence 4 TBSE of Implemented System 4.1 Average Operation Times 4.2 Operational Cases 4.3 Results 5 Software Methods to Reduce Disturbances 5.1 PT Searching 5.2 FM Mechanisms 5.3 Smart Charger 6 Summary References Modelling Pedestrian Behavior in a Simulator for a Security Monitoring System 1 Introduction 2 Modelling Pedestrian Traffic in Computer Simulations 3 The AvatarTraffic Simulator 3.1 The Simulator and the Scene 3.2 Simulating People and Their Movement 3.3 Elements of the Scene 4 Monitoring Operation of the AI Traffic Planning 4.1 Controlling Operation of the Queues 4.2 Supervising Avatars in Door Passages 5 Conclusions References Generalized Convolution: Replacing the Classic Convolution Operation with the Sub-network 1 Introduction 2 Related Work 3 Approach 4 Implementation and Experiment 4.1 Implementation of the Generalized Convolution 4.2 Experiment 5 Summary References Scheduling Optimization in Heterogeneous Computing Environments with Resources of Different Types 1 Introduction and Related Works 2 Co-allocation of Resources of Different Types 2.1 Problem Statement 2.2 Composite Scheduling Model 2.3 Model Example 3 Simulation Study 4 Conclusion References Subject Classification of Texts in Polish - from TF-IDF to Transformers 1 Introduction 2 Data Set 2.1 Overview 2.2 Wikipedia 2.3 Press News 2.4 Articles from a Web Portal 2.5 Scientific Reviews 2.6 Qualification Descriptions 3 Methods 3.1 TF-IDF 3.2 Doc2vec 3.3 FastText 3.4 BERT 4 Experiments and Results 4.1 Experiment Organization 4.2 Results 4.3 Time Performance 5 Conclusion References A Proposal to Use Elliptical Curves to Secure the Block in E-voting System Based on Blockchain Mechanism 1 Introduction 2 Problem Overview 3 Related Work 4 System Design 5 Conclusions References Prediction and Causality Visualization in Speech Recognition 1 Introduction 2 Background 3 Our Approach 3.1 Dataset 3.2 Preprocessing 3.3 Architecture 4 Preliminary Results 5 Conclusions and Future Work References Correlation of Bibliographic Records for OMNIS Project 1 Background 2 Introduction 2.1 Problem Statement 3 Correlation and Deduplication 3.1 Indexing 3.2 Matching Text 3.3 Normalization 4 Matching Algorithms 4.1 Algorithm: Perfect Match 4.2 Algorithm: Full Scope Search 5 Results 6 Future Work References Supporting Architectural Decision-Making with Data Retrieved from Online Communities 1 Introduction 2 Related Work and State of the Art 3 How to Support Architectural Decision-Making? 3.1 Components of the Architectural Design Process 3.2 Obtainable Architectural Data 3.3 Querying Internet Sources 3.4 Decision Suggestion Algorithm 3.5 Model of Architectural Decisions 4 Architecture of a Decision-Support System 5 Implementing the Decision-Making Support System 5.1 Sample Data Sources 5.2 Example Decision Suggestion Algorithm 5.3 Example of Use 6 Validation of Approach and Decision-Making Support Tool 7 Results 8 Discussion 9 Limitations 10 Conclusion References Author Index