the proceedings contain 32 papers. the topics discussed include: VLSI architecture with a configurable data processing pathbased on serial distributed arithmetic;improving the performance of processing special comput...
the proceedings contain 32 papers. the topics discussed include: VLSI architecture with a configurable data processing pathbased on serial distributed arithmetic;improving the performance of processing special computing tasks using an asynchronous actor model;diagnostics of aluminum alloys with friction stir welded joints based on multivariate analysis of acoustic emission signals;use of trainable wavelet transform with adaptive threshold filtering for noise reduction of speech signals;analysis of the statistical characteristics of the discrete breater in CuPt7 crystal by the method of molecular dynamics by GPU-calculations;optimization method for non-cooperative iris recognition task using Daugman integro-differential operator;computer-aided simulation of WC-10Co-4Cr cermet coatings formation and predictive detection of optimal spraying regimes;and analysis of city transport network based on geoinformation systems in transport zones of industrial city.
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. this is in contrast to most existi...
详细信息
ISBN:
(纸本)9781450362856
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. this is in contrast to most existing methods, where the system is set to use a certain level of authentication at design time, such as basic authentication, certificate-based authentication, or no authentication at all. To this end, we propose a notion of authenticatable task graph, which encodes standard task dependencies and allows for authentication tasks to be intermittently inserted into the computation task graph. the optimization objective here is to maximize the number of authentication tasks as well as peer-authentication, while remaining in the system energy bounds. We propose three offline optimization techniques and one online algorithm, where the system can dynamically manage the tradeoff between energy consumption and the level of security in the presence of uncertainties imposed by the physical environment. Our optimization algorithms are validated by a rich set of simulations as well as a real-world case study on a group of unmanned aerial vehicles (UAVs) that are assigned area search tasks and are required to perform peer-authentication within their battery limits.
the development of existing software system, including web-based developmental surveillance programs, adopt linear software versioning systems wherein all files associated to a particular software version is pre-packe...
详细信息
It is essential to develop efficient methods to detect abnormal events, such as car-crashes or stalled vehicles, from surveillance cameras to provide in-time help. this motivates us to propose a novel method to detect...
详细信息
Termination is an important non-functional property of distributed algorithms. In an event-driven setting, the interesting aspect of termination is the possibility of control flow loops through communication, which th...
详细信息
ISBN:
(纸本)9781450367943
Termination is an important non-functional property of distributed algorithms. In an event-driven setting, the interesting aspect of termination is the possibility of control flow loops through communication, which this paper aims to investigate. In practice, it is often difficult to spot the possible communication behaviour of an algorithm at a glance. With a static analysis, the design process can be supported by visualizing possible flow of messages and give hints on possible sources of non-termination. We propose a termination analysis for distributed algorithms formulated in an event-driven specification language. the idea is to construct a message flow graph describing the possible communication between components (input-action pairs). We show that acyclicity of that graph implies termination. While many interesting algorithms indeed contain cycles, we also suggest ways of detecting cycles which cannot lead to non-termination. As a practical evaluation, we describe a concrete programming language together with a tool for automated termination analysis.
the proceedings contain 79 papers. the special focus in this conference is on Biologically Inspired Cognitive Architectures. the topics include: Practical User and Entity Behavior Analytics Methods for Fraud Detection...
ISBN:
(纸本)9783030257187
the proceedings contain 79 papers. the special focus in this conference is on Biologically Inspired Cognitive Architectures. the topics include: Practical User and Entity Behavior Analytics Methods for Fraud Detection systems in Online Banking: A Survey;significance of Emotional Context While Performing Semantic Tasks;the Semantic Complex event Processing based on Metagraph Approach;deceptive Actions and Robot Collision Avoidance;a Cognitive Architecture for a Transportation Robotic System;reconfigurable Locomotion of Hexapod Robot based on Inverse Kinematics;development of Text Data Processing Pipeline for Scientific systems;environment of Modeling Methods for Indicating Objects based on Displaced Concepts;increasing of Semantic Sustainability in the Interaction of Information Processes;story-Centric View on the Mind;computational Model for Granulating of Objects in the Semantic Network to Enhance the Sustainability of Niche Concepts;metascience and Metacognition;dynamic Parameters of the Diffusion in Human Brain White Matter During Cognitive Tasks;Preliminary Results and Analysis Independent Core Observer Model (ICOM) Cognitive Architecture in a Mediated Artificial Super Intelligence (mASI) System;independent Core Observer Model Research Program Assumption Codex;human Brain Computer/Machine Interface System Feasibility Study for Independent Core Observer Model based Artificial General Intelligence Collective Intelligence systems;preliminary Mediated Artificial Superintelligence Study, Experimental Framework, and Definitions for an Independent Core Observer Model Cognitive Architecture-based System;development of an Optimal Production Plan Using Fuzzy Logic Tools;internet Users Authentication via Artificial Intelligence;biologically Inspired Algorithm for Increasing the Number of Artificial Neurons;analysis of the Possibility of the Neural Network Implementation of the Viola-Jones Algorithm;semantics Beyond Language.
In Western Europe, the number of Internet connected devices is expected to increase from the 2.3 billion devices in 2017, to 4 billion in 2022. Dealing withthis growth is an increasing problem for administrators atte...
详细信息
event-basedsystems encounter challenges of correctness and consistency. Correctness means that the execution results match the intention of the designer. Consistency means that different data elements that co-exist w...
详细信息
distributed complex event processing evaluates CEP-queries over data produced by geographically distributed sources. To cope with bandwith restrictions, it is common to employ in-network processing where the operators...
详细信息
distributed renewable energy systems (DRESs) and their interconnection network, typically using Internet-based protocols, are susceptible to a wide range of cyber-security and resilience challenges. these challenges h...
详细信息
ISBN:
(纸本)9781450366717
distributed renewable energy systems (DRESs) and their interconnection network, typically using Internet-based protocols, are susceptible to a wide range of cyber-security and resilience challenges. these challenges have been shown to cause problems for the overall grid optimization process. In order to detect such events, we argue that an adequate correlation between network and energy generation data is required. therefore, in this study, we provide a work-in-progress insight related to the profiling of real network data and energy generation measurements gathered by a local wind-turbine at Lancaster University. We argue that such an analysis is very important to profile various attack vectors in the modern energy networks that consider DRESs and take necessary actions to prevent any data breaches in the future.
暂无评论