ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28 – July 2, 2021, Wrocław, Poland

دانلود کتاب تئوری و مهندسی سیستم‌ها و شبکه‌های کامپیوتری قابل اعتماد: مجموعه مقالات شانزدهمین کنفرانس بین‌المللی قابلیت اطمینان سیستم‌های کامپیوتری DepCoS-RELCOMEX، 28 ژوئن – 2 ژوئیه 2021، Wrocław، لهستان

Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28 – July 2, 2021, Wrocław, Poland

مشخصات کتاب

Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28 – July 2, 2021, Wrocław, Poland

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9783030767730, 3030767736 
ناشر: Springer Nature 
سال نشر: 2021 
تعداد صفحات: [527] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 38 Mb 

قیمت کتاب (تومان) : 44,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28 – July 2, 2021, Wrocław, Poland به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تئوری و مهندسی سیستم‌ها و شبکه‌های کامپیوتری قابل اعتماد: مجموعه مقالات شانزدهمین کنفرانس بین‌المللی قابلیت اطمینان سیستم‌های کامپیوتری DepCoS-RELCOMEX، 28 ژوئن – 2 ژوئیه 2021، Wrocław، لهستان نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Organization
	Program Committee
	Organizing Committee
	Chair
	Members
Contents
Application of Assumption Modes and Effects Analysis to XMECA
	1 Introduction
	2 FMECA Model
	3 Expert Evaluation of FMECA
		3.1 Evaluation in Case of Equal Qualification (Self-assessment) of Experts
		3.2 Evaluation in Case of Different Qualification (Self-assessment) of Experts
	4 Assumption Modes and Effect Analysis. Case Study
	5 Conclusion and Future Work
	References
Improving Effectiveness of the Risk Management Methodology in the Revitalization Domain
	1 Introduction
	2 The SUMAD Methodology and Its Implementation
	3 Extension of the SUMAD Methodology
	4 Model of the Proposed Performance Evaluation Subsystem
		4.1 Classification Scheme of Performance Indicators
		4.2 Software Support for Performance Evaluation
	5 Model Validation
	6 Conclusions
	References
Automated Music Generation Using Recurrent Neural Networks
	1 Introduction
	2 Related Work
	3 Data Preprocessing
	4 Research Methodology
		4.1 Extracting Features
		4.2 Creating Sequences
		4.3 Experiments
	5 Results
	6 Conclusion and Future Work
	References
Non-exhaustive Verification in Integrated Model of Distributed Systems (IMDS) Using Vagabond Algorithm
	1 Introduction
	2 Related Work
	3 Model Checking in Integrated Model of Distributed Systems
		3.1 Basic IMDS Definition
		3.2 Processes in IMDS
		3.3 Communication Deadlock and Resource Deadlock
	4 The Vagabond Algorithm
		4.1 Communication Deadlock (Node Deadlock)
		4.2 Resource Deadlock (Agent Deadlock)
		4.3 Heuristics
	5 Experimental Results
		5.1 Philosophers
		5.2 Karlsruhe Production Cell
		5.3 Train Scheduling
	6 Limitations
	7 Conclusions and Further Work
	References
Automatic Multi-class Classification of Polish Complaint Reports About Municipal Waste Management
	1 Introduction
	2 Complaint Reporting System
	3 Problem Statement
	4 Automatic Classification of Complaint Reports
	5 Results
	6 Discussion
	References
Migration of Unit Tests of C# Programs
	1 Introduction
	2 Background and Related Work
	3 Migration of NUnit Tests into MS Test
		3.1 Attributes
		3.2 Assertions
	4 Experimental Evaluation of Test Migration
		4.1 Test Translator – Automated Support for Test Migration
		4.2 Subject Programs
		4.3 Results of Test Migration
		4.4 Discussion of Results
	5 Conclusions
	References
Synchronization and Scheduling of Tasks in Fault-Tolerant Computer Systems with Graceful Degradation
	1 Introduction
	2 The Model for the Problem of Computer Fault Tolerant System Synthesis
	3 Example of Computer System with Features Fault Tolerant and Graceful Degradation
		3.1 System Specification
	4 Conclusions
	References
Comparison of Selected Algorithms of Traffic Modelling and Prediction in Smart City - Rzeszów
	1 Introduction
	2 Rzeszow Smart City and ISO Standard and Certification
	3 Traffic Modelling – Methodology
		3.1 ARIMA Model
		3.2 Jaro Winkler Algorithm
		3.3 ETS Model
	4 Implementation of the ARIMA Model in Orange 3 Environment
	5 Results
	6 Conclusion
	References
Dependability Analysis Using Temporal Fault Trees and Monte Carlo Simulation
	1 Introduction
	2 Related Work
		2.1 Pandora
		2.2 Quantitative Analysis Using Analytical Approaches
		2.3 Quantitative Analysis Using Simulation
	3 Dependability Analysis
		3.1 Evaluating All MCSQs
		3.2 Modelling in Goldsim
	4 Case Study
	5 Conclusion
	References
Hybrid Parallel Programming in High Performance Computing Cluster
	1 Introduction
	2 Approaches to Determining the Complexity and Efficiency of Algorithms and Programs
	3 Hardware and Software Platform
	4 OpenMP and MPI Features on the Architecture of a Computing Cluster
	5 Results of Experimental Studies
	6 Conclusion
	References
Computing of Blocks of Some Combinatorial Designs for Applications
	1 Introduction
	2 Algebraic Methods for Constructing Projective Planes
		2.1 Projective Planes
		2.2 The Algebraic Method to Construct the Projective Plane Using basis’s of Their Blocks
		2.3 Building a Block of a Projective Plane by Its Number and a Block of a Dual Projective Plane Containing This Element
	3 Conclusion
	References
A Stopwatch Automata-Based Approach to Schedulability Analysis of Real-Time Systems with Support for Fault Tolerance Techniques
	1 Introduction
	2 Fault Tolerance Techniques
	3 Related Work on Schedulability Analysis
	4 The Approach to Checking Real-Time Constraints
		4.1 Problem Statement
		4.2 General Networks of Stopwatch Automata
		4.3 General Model of Real-Time System Operation
		4.4 Constructing a Simulation Model for Schedulability Analysis
	5 Case Study
	6 Conclusion
	References
Fractional Order Derivative Mechanism to Extract Biometric Features
	1 Introduction
	2 Research Methods
	3 Results
	4 Conclusion
	References
Contract-Based Specification and Test Generation for Adaptive Systems
	1 Introduction
	2 Contract-Based Specification and Test Generation
	3 Languages for Specifying Contracts and Adaptive Behavior
		3.1 Scenario Language
		3.2 Adaptive Contract Language
	4 Deriving Test Cases from Adaptive Contract Models
		4.1 Translating Scenarios to Automata
		4.2 Deriving Test Cases from Adaptive Contract Models
		4.3 Test Generation Example
	5 Related Work
	6 Conclusion and Future Work
	References
New Loss Function for Multiclass, Single-Label Classification
	1 Introduction
	2 Proposed Loss Function
	3 Conducted Experiments
	4 Summary
	References
Network Risk Assessment Based on Attack Graphs
	1 Introduction
	2 Basics of Risk Assessment
		2.1 Definitions
		2.2 Risk Assessment Methods
	3 Attack Graph Based Risk Assessment
	4 Case Study
		4.1 Case 1. Attacker Located in the Internet
		4.2 Case 2. Attack from the Internal Network
		4.3 Discussion
	5 Conclusions
	References
Cost Results of Block Inspection Policy with Imperfect Testing in Multi-unit System
	1 Introduction
	2 Consideration of Inspection Accuracy in System Maintenance
	3 Simulation Model of System Operation with One- and Two-Level Inspection Maintenance Policy
		3.1 Modelling Assumptions
		3.2 Simulation Model
	4 Sensitivity Results of the Simulation Model
	5 Comparison of One- and Two-Level Inspection Policies in Multi-unit System
	6 Conclusions
	References
Reliability Assessment of Multi-cascade Redundant Systems Considering Failures of Intermodular and Bridge Communications
	1 Introduction
	2 Reliability Block Diagrams of Reactor Trip Systems Considering Communications
	3 Reliability Block Diagrams of Multi-cascade Redundant Systems
	4 Reliability Models
	5 Research of Models
	6 Conclusions
	References
Evolution Process for SOA Systems as a Part of the MAD4SOA Methodology
	1 Introduction
	2 Related Work
	3 Evolution Process for Service-Oriented Systems
		3.1 Change Assessment Phase
		3.2 Change Designing Phase
		3.3 Development and Deployment Phase
		3.4 Change Review Phase
	4 The Case Study
	5 Discussion
	6 Conclusion
	References
Optimizations for Fast Wireless Image Transfer Using H.264 Codec to Android Mobile Devices for Virtual Reality Applications
	1 Introduction
	2 Basic Definitions
	3 Solution Description
		3.1 Architecture Optimizations
		3.2 Methods and Data Structures Optimizations
	4 Experimental Results
		4.1 CPU Resources Usage
		4.2 Image and Tracking Delay
	5 Conclusions
	References
Experimental Comparison of ML/DL Approaches for Cyberattacks Diagnostics
	1 Introduction
	2 Testing of ML/DL Methods
	3 The Efficiency of ML/DL Methods for Attack Detection
	4 Testing Datasets
	5 Dataset Features Number Reduction
	6 Artificial Neural Network (ANN) for Attack Classification
	7 Experimental Results for ML/DL Classification
	8 Discussion and Results
	9 Conclusions
	References
Data Sparsity and Cold-Start Problems in M-CCF Recommender System
	1 Introduction
	2 Background and Related Work
		2.1 A Cold-Start Problem and Neighbourhood Identification
		2.2 Multi-clustering Approach to Recommendations
		2.3 Contribution of Proposed Work
	3 Description of M-CCF Algorithm
	4 Experiments
	5 Conclusions
	References
Explaining Predictions of the X-Vector Speaker Age and Gender Classifier
	1 Introduction
	2 Background
		2.1 Speech Classification
		2.2 Explainable Artificial Intelligence (XAI)
	3 Our Approach
		3.1 Dataset
		3.2 Neural Network Architecture
		3.3 Explainability Methods
	4 Preliminary Results
		4.1 Experimental Setup
		4.2 Classification Accuracy
		4.3 Explainability Experiments
	5 Conclusions and Future Work
	References
Application of the Closed-Loop PI Controller as the Low-Pass Filter
	1 Introduction
	2 Model of the Low-Pass Filter Based on the Closed-Loop PI Controller
	3 Simulation Test Results
	4 Summary
	References
Reliability of Multi-rotor UAV's Flight Stabilization Algorithm in Case of Object's Working Point Changes
	1 Introduction
	2 Standard and Non Standard Multi-rotor UAV
	3 PID Controller
	4 Fuzzy Logic Based Controller - the SkyNav
	5 Experiments Results with the Use of the SkyNav
		5.1 Experiments on a Test Bench, Under Suspension Conditions
		5.2 Experimental Study of the SkyNav Controller During the Flight
	6 Conclusions
	References
Semi-Markov Model of Processing Requests Reliability and Availability in Mobile Cloud Computing Systems
	1 Introduction
	2 Mobile Cloud Computing System
	3 Multi-state Semi-Markov Process Based Modelling of Reliability and Availability
	4 SMP Model of Processing Requests in an MCC System
	5 Numerical Example
	6 Conclusion
	References
Softcomputing Approach to Sarcasm Analysis
	1 Introduction
	2 State of Art
		2.1 Semi-supervised Recognition of Sarcastic Sentences Twitter, Amazon
		2.2 Sarcasm Detection on Twitter: A Behavioral Modeling Approach
	3 Datasets
		3.1 iSarcasm
		3.2 News Headlines Dataset
	4 MLP-Type ANN Sarcasm Detector
		4.1 Data Preparation
		4.2 Network Topology
		4.3 Alternative Network Topology
		4.4 Network Compilation and Training
	5 CNN-Type Sarcasm Detector
		5.1 Data Preprocessing
		5.2 Architecture
	6 Results
		6.1 Sarcastic Headlines Dataset Experiments
		6.2 Sarcastic Headlines and Twitter Dataset Experiments
		6.3 Experiments with CNN-Type Sarcasm Detector
	7 Conclusions
	References
Open–source–based Environment for Network Traffic Anomaly Detection
	1 Introduction
	2 Research Context
	3 Environment Description
		3.1 System Architecture
		3.2 Components
		3.3 Methods
		3.4 Configurability
	4 Application
		4.1 The General Data Description
		4.2 Normal Traffic Analysis
		4.3 Enforced Attacks Monitoring
	5 Conclusions and Further Works
	References
Building AFDX Networks of Minimal Complexity for Real-Time Systems
	1 Introduction
	2 The Problem of Building the AFDX Network with Minimal Complexity
	3 Algorithm for Building the Minimal Network
		3.1 General Scheme of the Algorithm
		3.2 Calculating the Properties of Virtual Links
		3.3 Virtual Links Aggregation Procedure
		3.4 Messages Aggregation Procedure
		3.5 Virtual Link Routing Procedure
		3.6 Limited Enumeration Procedure
		3.7 Estimating the Maximum Message Transmission Time and Jitter
		3.8 Virtual Link Reconfiguration Procedure
	4 Experimental Evaluation of the Algorithm
	5 Conclusion
	References
Efficient Computation of the Best Controls in Complex Systems Under Global Constraints
	1 Introduction
	2 The System
	3 On-line System Identification
		3.1 Least Squares Method
		3.2 On-line Instrumental Variables Approach
	4 Decomposition of Unconstrained Problem
	5 Multi-level Optimization with Limited Resources
	6 Example
		6.1 Global Approach
		6.2 Parallel Computation for Unconstrained Problem
		6.3 Multi-level Convex Optimization Procedure
	7 Summary
	References
Building of a Variable Context Key Enhancing the Security of Steganographic Algorithms
	1 Introduction
	2 Keys in Steganographic Systems
	3 Use of Context in Security Systems
	4 Composition of a Steganographic Context Key
		4.1 Encoding Data from Sensors
		4.2 User Password
		4.3 The Seed as a Key Security Element
		4.4 Data Exchange for the Key
	5 The Place of Key Embedding in the Steganographic Algorithm
	6 Summary
	References
Method of Visual Detection of the Horizon Line and Detection Assessment for Control Systems of Autonomous and Semi-autonomous Ships
	1 Introduction
	2 Methods of Horizon Line Detection
	3 Assessment of Image Usefulness for Horizon Line Detection
	4 The Proposed Methods of Horizon Line Detection
	5 Methods of Improving the Quality of Horizon Line Detection and the Proposed Algorithm of Horizon Line Detection
	6 Summary
	References
Influence of Various DLT Architectures on the CPU Resources
	1 Introduction
	2 DLT Optimizations
		2.1 DLT Description Modes
		2.2 Binary Logging
		2.3 Log Levels Processing
		2.4 DLT Header
	3 Research Setup and Scope
		3.1 Research Setup
		3.2 Research Results
		3.3 Discussion and Conclusions
	References
Monitoring the Granulometric Composition on the Basis of Deep Neural Networks
	1 Introduction
	2 Materials and Methods
	3 Results and Discussions
	4 Conclusion
	References
Uncertainty Modeling in Single Machine Scheduling Problems. A Survey
	1 Introduction
	2 Deterministic Scheduling Problem
	3 Uncertainty Modelling
		3.1 Probabilistic Random Distributions
		3.2 Fuzzy Description
		3.3 Bound Form
	4 Conclusions
	References
An Analysis of Data Hidden in Bitcoin Addresses
	1 Introduction
	2 Related Work
	3 Data Hiding Techniques for Bitcoin
		3.1 Coinbase
		3.2 OP_RETURN
		3.3 Standard Transactions
		3.4 Other Techniques
	4 Data Hiding in Bitcoin Address
	5 Classifying Suspected Addresses
	6 Analysis of Identified Addresses
		6.1 Qualitative Analysis of Addresses
		6.2 Quantitative Analysis of Addresses
	7 Data Hidden in Ethereum Addresses
	8 Conclusion
	9 Limitations
	10 Supporting Information
	References
The Reliability and Operational Analysis of ICT Equipment Exposed to the Impact of Strong Electromagnetic Pulses
	1 Introduction
	2 Reliability and Operational Analysis of an ICT Device, Taking Into Account the Impact of Strong Electromagnetic Pulses
	3 Modelling of the ICT Device Operation Process Including Electromagnetic Interfere
	4 Conclusion
	References
Using ASMD-FSMD Technique for Digital Device Design
	1 Introduction
	2 Traditional Approach for Synchronous Multiplier Implementation
	3 ASMD-FSMD Technique of the Digital Device Design
	4 Experimental Research
	5 Conclusions
	References
Application of LSTM Networks for Human Gait-Based Identification
	1 Introduction
	2 Literature Review
		2.1 Segmentation
		2.2 Augmentation
		2.3 Classification
	3 Methodology
		3.1 Database Characteristics
		3.2 Segmentation
		3.3 Data Augmentation
		3.4 Data Splitting and Network Architecture
	4 Classification Results
	5 Conclusions and Future Work
	References
Time Based Evaluation Method of Autonomous Transport Systems in the Industrial Environment
	1 Autonomous Transport System
	2 System Definition
		2.1 Layout
		2.2 Passive Trolley
		2.3 Station
		2.4 Virtual Path
		2.5 Segment
		2.6 Route
		2.7 Task
		2.8 Fleet Manager
		2.9 Production Order
		2.10 Order Manager
		2.11 Operation Modes
	3 Time Based System Evaluation Method (TBSE)
		3.1 Operation Target
		3.2 Operation Time of PO
		3.3 Example Calculation of BufOut PO Time – Ideal Condition
		3.4 Time Coefficients
		3.5 Time Coefficients – Probability of Occurrence
	4 TBSE of Implemented System
		4.1 Average Operation Times
		4.2 Operational Cases
		4.3 Results
	5 Software Methods to Reduce Disturbances
		5.1 PT Searching
		5.2 FM Mechanisms
		5.3 Smart Charger
	6 Summary
	References
Modelling Pedestrian Behavior in a Simulator for a Security Monitoring System
	1 Introduction
	2 Modelling Pedestrian Traffic in Computer Simulations
	3 The AvatarTraffic Simulator
		3.1 The Simulator and the Scene
		3.2 Simulating People and Their Movement
		3.3 Elements of the Scene
	4 Monitoring Operation of the AI Traffic Planning
		4.1 Controlling Operation of the Queues
		4.2 Supervising Avatars in Door Passages
	5 Conclusions
	References
Generalized Convolution: Replacing the Classic Convolution Operation with the Sub-network
	1 Introduction
	2 Related Work
	3 Approach
	4 Implementation and Experiment
		4.1 Implementation of the Generalized Convolution
		4.2 Experiment
	5 Summary
	References
Scheduling Optimization in Heterogeneous Computing Environments with Resources of Different Types
	1 Introduction and Related Works
	2 Co-allocation of Resources of Different Types
		2.1 Problem Statement
		2.2 Composite Scheduling Model
		2.3 Model Example
	3 Simulation Study
	4 Conclusion
	References
Subject Classification of Texts in Polish - from TF-IDF to Transformers
	1 Introduction
	2 Data Set
		2.1 Overview
		2.2 Wikipedia
		2.3 Press News
		2.4 Articles from a Web Portal
		2.5 Scientific Reviews
		2.6 Qualification Descriptions
	3 Methods
		3.1 TF-IDF
		3.2 Doc2vec
		3.3 FastText
		3.4 BERT
	4 Experiments and Results
		4.1 Experiment Organization
		4.2 Results
		4.3 Time Performance
	5 Conclusion
	References
A Proposal to Use Elliptical Curves to Secure the Block in E-voting System Based on Blockchain Mechanism
	1 Introduction
	2 Problem Overview
	3 Related Work
	4 System Design
	5 Conclusions
	References
Prediction and Causality Visualization in Speech Recognition
	1 Introduction
	2 Background
	3 Our Approach
		3.1 Dataset
		3.2 Preprocessing
		3.3 Architecture
	4 Preliminary Results
	5 Conclusions and Future Work
	References
Correlation of Bibliographic Records for OMNIS Project
	1 Background
	2 Introduction
		2.1 Problem Statement
	3 Correlation and Deduplication
		3.1 Indexing
		3.2 Matching Text
		3.3 Normalization
	4 Matching Algorithms
		4.1 Algorithm: Perfect Match
		4.2 Algorithm: Full Scope Search
	5 Results
	6 Future Work
	References
Supporting Architectural Decision-Making with Data Retrieved from Online Communities
	1 Introduction
	2 Related Work and State of the Art
	3 How to Support Architectural Decision-Making?
		3.1 Components of the Architectural Design Process
		3.2 Obtainable Architectural Data
		3.3 Querying Internet Sources
		3.4 Decision Suggestion Algorithm
		3.5 Model of Architectural Decisions
	4 Architecture of a Decision-Support System
	5 Implementing the Decision-Making Support System
		5.1 Sample Data Sources
		5.2 Example Decision Suggestion Algorithm
		5.3 Example of Use
	6 Validation of Approach and Decision-Making Support Tool
	7 Results
	8 Discussion
	9 Limitations
	10 Conclusion
	References
Author Index




نظرات کاربران