top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Dependable Computer Systems and Networks : Proceedings of the Eighteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, July 3–7, 2023, Brunów, Poland / / edited by Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk
Dependable Computer Systems and Networks : Proceedings of the Eighteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, July 3–7, 2023, Brunów, Poland / / edited by Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk
Autore Zamojski Wojciech
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (361 pages)
Disciplina 006.3
Altri autori (Persone) MazurkiewiczJacek
SugierJarosław
WalkowiakTomasz
KacprzykJanusz
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Dynamics
Nonlinear theories
Artificial intelligence
Computational Intelligence
Applied Dynamical Systems
Artificial Intelligence
ISBN 3-031-37720-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Line Segmentation of Handwritten Documents Using Direct Tensor Voting -- Practical Approach to Introducing Parallelism in Sequential Programs -- The digital twin to train a neural network detecting headlamps failure of motor vehicles -- Dynamic change of tasks in multiprocessor scheduling -- Regression models evaluation of short-term traffic flow prediction -- Performance analysis of a real-time data warehouse system implementation based on open-source technologies -- Evaluating the Different Factors Affecting the Educational Attainment of Students at the Faculty of Information Technology at Jordan Universities -- Hammering test on a concrete wall using Neural Network -- Artificial intelligence methods in email marketing - a survey -- Detection of oversized objects in a video stream, exploiting an image classification approach using deep neural networks -- Reliability Model of Bioregenerative Reactor of Life Support System for Deep Space Habitation -- Safety assessment of maintained control systems with cascade two-version 2oo3/1oo2 structures considering version faults -- CPU signal rank-based disaggregation in Cloud computing environments -- Efficient Clustering-based Neighbourhood in Recommender Systems -- New approach to constructive induction - Towards Deep Discrete Learning -- Softcomputing Approach to Music Generation -- Identification of the Language UsingStatistical and Neural Approaches -- Smart data logger with continuous ECG signalmonitoring -- Movement Tracking in Augmented and Mixed Realities Impacting the User Activity in Medicine and Healthcare -- General provisioning strategy for local specialized cloud computing environments -- Tabular structures detection on scanned VAT invoices -- Automation of deanonymization queries for the Bitcoin investigations -- Structural models for fault detection of Moore finite state machines -- Application of generative models to augment IMU signals in gait biometric -- Ant colony optimization algorithm for finding the maximum number of d-size cliques in a graph with not always m-vertices in its d parts -- Partitioning of a m-part weighted graph with n vertices in each its part into n cliques with m vertices and the total minimum sum of their edges weights using ant algorithms -- A Study of Architecture Optimization Techniques for Convolutional Neural Networks -- Scheduling Resource to Deploy Monitors in Automated Driving Systems -- Power Analysis of BLAKE3 Pipelined Implementations in FPGA Devices -- Deep Learning ECG Signal Analysis: Description and Preliminary Results -- Deployment of Deep Models in NLP Infrastructure -- Analysis of handwritten texts to detect selected psychological characteristics of a person -- Architecting Cloud-Based Business Software - A Practitioner's Perspective.
Record Nr. UNINA-9910741138103321
Zamojski Wojciech  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
System Dependability - Theory and Applications : Proceedings of the Nineteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. July 1-5, 2024, Brunów, Poland
System Dependability - Theory and Applications : Proceedings of the Nineteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. July 1-5, 2024, Brunów, Poland
Autore Zamojski Wojciech
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (375 pages)
Altri autori (Persone) MazurkiewiczJacek
SugierJarosław
WalkowiakTomasz
KacprzykJanusz
Collana Lecture Notes in Networks and Systems Series
ISBN 9783031618574
9783031618567
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Large Language Models for Data Extraction in Slot-Filling Tasks -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Prompting -- 3.2 Receiving the Output -- 4 Experiments -- 4.1 Datasets -- 4.2 Evaluation -- 4.3 Reasoning Problem and Hallucinations with the Precision Source Algorithm -- 4.4 Output Generated by Models -- 5 Conclusions -- A Examples of Prompts in English -- A.1 Example of a Zero-Shot Prompt -- A.2 Example of a Few-Shot Prompt -- A.3 Example of a Zero-Shot-CoT Prompt -- B Examples of Prompts in Polish -- B.1 Example of a Zero-Shot Prompt -- B.2 Example of a Few-Shot Prompt -- B.3 Example of a Zero-Shot-CoT Prompt -- C Dataset Details -- D Results -- References -- Anonymization of Bids in Blockchain Auctions Using Zero-Knowledge Proof -- 1 Introduction -- 2 Related Work -- 3 Blockchain -- 3.1 Ethereum Accounts -- 3.2 Transactions -- 4 Zero-Knowledge Proof -- 5 Proposed Architecture of Zero-Knowledge Proof Based Blockchain Auctions -- 5.1 Proposed Solution -- 5.2 Architecture -- 6 Implementation of Zero-Knowledge Proof Based Blockchain Auction -- 6.1 Tools -- 6.2 Security Tests -- 6.3 Financial Analysis -- 7 Summary -- References -- Survival Signature for Reliability Quantification of Large Systems and Networks -- 1 Survival Signature -- 2 Generalized Survival Signatures -- 3 Computational Aspects -- 4 Modelling for System Reliability -- 5 Concluding Remarks -- References -- Using Resizing Layer in U-Net to Improve Memory Efficiency -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data -- 2.2 Network Architectures -- 2.3 Training and Testing -- 2.4 Evaluation Criteria -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Multiprocessor Task Scheduling with Probabilistic Task Duration -- 1 Introduction -- 2 Problem Formulation.
3 Dependability in Scheduling - Motivation -- 4 Application of Probability - Erlang Distribution -- 5 Description of the Approach -- 6 Computational Experiments -- 7 Discussion of the Results -- References -- On-Line Scheduling Multiprocessor Tasks in the Non-predictive Environment -- 1 Introduction -- 2 The Problem -- 3 Dependable Scheduling -- 4 Online Scheduling -- 5 Non-preemptive Independent Tasks -- 6 Preemptive Independent Tasks -- 7 Conclusions -- References -- Solving a Vehicle Routing Problem for a Real-Life Parcel Locker-Based Delivery -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Solving Methods -- 4.1 Greedy Method -- 4.2 Genetic Algorithm -- 5 Computer Experiment -- 6 Conclusions and Future Works -- References -- Hammering Test for Tile Wall Using AI -- 1 Introduction -- 2 Related Works -- 2.1 Testing of Adhesive-Applied Tile Wall -- 2.2 Hammering Test -- 3 Non-destructive Test for Adhesive-Applied Tile Wall -- 3.1 Hammering Test for Adhesive-Applied Tile Wall -- 3.2 Test Specimen -- 3.3 Experiment Flow -- 4 Learning Model and Evaluation -- 4.1 Our Learning Model -- 4.2 Hyper Parameters -- 4.3 Experiment -- 5 Conclusion -- References -- Models of Resilient Systems with Online Verification Considering Changing Requirements and Latent Failures -- 1 Introduction -- 2 The Structure and Markov Model of the Single-Channel Space I& -- C Systems -- 2.1 Space Control Reconfigurable System with Online Verification -- 2.2 The Markov Single-Fragment Model of an Onboard Computer System with Serviced Units -- 3 Markov's Availability Model of Resilient Systems with Online Verification -- 3.1 The Models of Three Online Verification Scenarios of Space Computer Control Reconfigurable System -- 3.2 Research of the Space Resilient Systems Models -- 4 Conclusion -- References.
Performance Optimizations of Real World Map Transformations for 3D Realtime Mobile Games -- 1 Introduction -- 2 Basic Definitions and Requirements -- 3 Solution Description -- 3.1 Spatial Data Processor Algorithm -- 4 Experimental Results -- 5 Conclusions -- References -- Preliminary Study on the Detection of Subtle Variations in Image Sequences for Identifying False Starts in Speedway Racing -- 1 Introduction -- 2 Materials and Methods -- 2.1 False Start Definition in Speedway Racing -- 2.2 Related Work Review -- 2.3 Research Methodology -- 2.4 Database of Speedway Videos -- 3 Results -- 4 Conclusions and Future Work -- References -- Artificial Intelligence in Renewable Energy: Bibliometric Review of Current Trends and Collaborations -- 1 Introduction -- 2 Methodology -- 3 Bibliometric Analysis of Literature -- 4 Conclusion -- References -- Impact of Learning Data Statistics on the Performance of a Recommendation System Based on MovieLens Data -- 1 Introduction -- 2 Related Work -- 3 Evaluation of Recommender Systems -- 4 Characteristics of Data -- 5 Experiments -- 6 Conclusions -- References -- Randomly Initiated Cyclostationary Excitations for Dimensionality Reduction in Wiener System Identification -- 1 Introduction -- 2 Problem Statement -- 3 The Algorithm -- 4 Summary -- A Appendices -- A.1 Proof of Theorem 1 -- References -- Wireless Employee Safety Monitoring System with Measurement of Biomedical Parameters -- 1 Introduction -- 2 System Architecture -- 2.1 Work Place of the System -- 3 Personal Device -- 3.1 Algorithms and Libraries for Personal Device -- 4 Reference Device -- 5 Master Device -- 6 Connections and Workflow -- 7 Summary -- References -- Artificial Intelligence Methods for Pet Emotions Recognition -- 1 Introduction -- 2 Cat Behaviorism Overview -- 3 Assumptions and Data Preprocessing -- 4 Deep Learning Classifier.
4.1 Transfer Learning -- 4.2 Traditional Learning -- 5 MLP Classifier -- 6 Classification Based on Feature Point Prediction -- 7 Conclusions -- References -- Parallel Swarm Intelligence: Efficiency Study with Fast Range Search in Euclidean Space -- 1 Introduction -- 2 Swarm Intelligence -- 3 Implementation -- 4 Results -- 5 Summary -- References -- Digital Transformation Impacts on Industry 4.0 Evolution -- 1 Introduction -- 2 Problem Statement and Research Objectives -- 3 Impact of Industry 4.0 on the Logistics Industry -- 4 Challenges and Future Outlook -- 5 Impact on the Industrial Sector -- 6 Smart Economy and Its Impact -- 7 Challenges of Industry 4.0 for the Industrial Sector -- 8 Conclusion -- References -- Optimization of Procurement Strategy Supported by Simulated Annealing and Genetic Algorithm -- 1 Introduction -- 2 Statement of the Problem -- 3 Method Selection -- 4 Generation of Initial Solutions -- 5 Application of Genetic Algorithm (GA) -- 5.1 Chromosome, Gene, Allele -- 5.2 Initial Population -- 5.3 Parent Selection -- 5.4 Crossover -- 5.5 Mutation -- 5.6 Termination Condition -- 6 Simulated Annealing (SA) -- 7 Results -- 8 Open Problems -- 8.1 New Ideas for Crossover -- 8.2 Estimation of Demand Based on Historical Data -- 8.3 Introduction of Delay Between Order and Delivery. Initial Conditions for the Problem -- 8.4 Introduction of Resource Degradation in Time -- 8.5 Dynamic Parameterization of SA -- 9 Conclusion -- References -- Tumor Volume Measurements in Animal Experiments: Current Approaches and Their Limitations -- 1 Introduction -- 2 Measurement of Tumor Volume During Preclinical Studies -- 3 Estimation of Tumor Volumes from Tumor Length and Width Measured by Caliper -- 4 Conclusion -- References -- Utilizing CNN Architectures for Non-invasive Diagnosis of Speech Disorders -- 1 Introduction -- 2 Related Works -- 3 Experiments.
4 Summary -- References -- Preparing a Dataset of Ransomware BTC Addresses for Machine Learning Purpose -- 1 Introduction -- 2 Related Works -- 2.1 Bitcoin Heuristics -- 2.2 Ransomware Transactions -- 3 Methodology -- 3.1 Identified Ransom BTC Addresses -- 3.2 Ransom Addresses Behavior -- 3.3 Identification of Characteristic Metrics -- 4 Summary -- References -- Human Technology Frontier: A Retrospective and Challenges for the Future in the Era of Artificial Intelligence -- 1 Intelligent Systems -- 2 Life Critical Systems -- 3 Human Impact -- References -- Styles for Describing Reliable Finite State Machines in Verilog HDL -- 1 Introduction -- 2 Styles for Describing Robust FSMs -- 3 Description of Combined Structures of Robust FSMs -- 4 Experimental Results -- 5 Conclusions -- References -- Smartphone-Based Biometric System Involving Multiple Data Acquisition Sessions -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- An Ontology for the Fashion Domain Based on Knowledge Retrieval -- 1 Introduction -- 2 Related Works -- 3 Ontology Development -- 3.1 Scope Definition -- 3.2 Information Extraction Process -- 3.3 Ontology Evaluation -- 3.4 Final Version -- 4 Conclusions and Future Works -- References -- Comparative Efficiency Study of Protective Relays Schemes in Wind Energy Conversion Systems -- 1 Introduction -- 2 Types of Protective Relays Redundancy -- 3 Reliability Models -- 3.1 Single Relay -- 3.2 Series Arrangement -- 3.3 Parallel Arrangement -- 3.4 2-out-of-3 Arrangement -- 4 Case Study -- 5 Conclusions -- References -- Dedicated FPGA Resources in Improving Power Efficiency of Implementations of BLAKE3 Hash Function -- 1 Introduction -- 2 The Algorithm and Possible Adaptation of DSP Logic -- 2.1 The BLAKE Compression Function -- 2.2 Introducing the DSP Slices as 32-Bit Adders.
3 Implementations.
Record Nr. UNINA-9910865268003321
Zamojski Wojciech  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui