The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed f...
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed for a single-phase flow in a porous medium. Within the framework of the proposed model, the task of identifying one parameter of the model characterizing the simulated reservoir system is set. To construct a discrete analog of the inverse problem, the finite difference method is used using an explicit–implicit approximation in time. To solve the resulting system of nonlinear equations, a special representation is proposed that allows reducing the nonlinear system to two independent systems of linear equations. As a result, an explicit formula is obtained for determining the approximate value of the desired reservoir parameter. Based on the proposed method, numerical experiments were carried out for model problems.
Remote monitoring of objects or technological processes is used in many industries and service-oriented companies to obtain up-to-date information about the state of things or technical processes. The article is devot...
详细信息
Microservice architectures have become the de facto paradigm for building scalable, service-oriented systems. Although their decentralized design promotes resilience and rapid development, the inherent complexity lead...
详细信息
ISBN:
(纸本)9798400715938
Microservice architectures have become the de facto paradigm for building scalable, service-oriented systems. Although their decentralized design promotes resilience and rapid development, the inherent complexity leads to subtle performance challenges. In particular, non-fatal errors - internal failures of remote procedure calls that do not cause top-level request failures - can accumulate along the critical path, inflating latency and wasting *** this work, we analyze over 11 billion RPCs across more than 6,000 microservices at Uber. Our study shows that nearly 29% of successful requests experience non-fatal errors that remain hidden in traditional monitoring. We propose a novel latency-reduction estimator (LR estimator) to quantify the potential benefit of eliminating these errors. Our contributions include a systematic study of RPC error patterns, a methodology to estimate latency reductions, and case studies demonstrating up to a 30% reduction in tail latency.
In this study, a new generalized model of thermo-viscoelasticity with three phase-lag (TPL) theory concerning memory-dependent derivative (MDD) theory is emphasized. The governing combined equations of the novel model...
详细信息
Autonomous Systems (AS) enable systems to adapt to drastic and unprecedented environmental changes, a capability that can be enhanced through the utilization of Digital Twins (DTs). However, the additional capabilitie...
详细信息
ISBN:
(数字)9798350389760
ISBN:
(纸本)9798350389777
Autonomous Systems (AS) enable systems to adapt to drastic and unprecedented environmental changes, a capability that can be enhanced through the utilization of Digital Twins (DTs). However, the additional capabilities of AS come at the cost of explainability, as the expanding adaptation space complicates the reasoning about the system's behavior. For certain types of systems, it is crucial to ensure that specific properties are upheld despite the system's autonomous behavior. To facilitate the monitoring of these properties, we propose the use of Runtime Verification (RV). This tutorial demonstrates the integration of RV tools into the Digital Twins as a Service (DTaaS) platform to monitor and verify the behavior of AS in real-time. By exploring various methods to incorporate RV tools within a DT context, the tutorial aims to advance the application of RV technologies in autonomic computing and self-adaptive system design. Specifically, we demonstrate how the behavior of a self-configuring DT can be verified utilizing RV. This is accomplished through the DTaaS platform, which supports seamless deployment of DT-based AS.
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech syst...
详细信息
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech systems and networks remains critical. This paper comprehensively reviews the evolving landscape of cybersecurity issues within the FinTech sector and explores effective mitigation measures. Four independent researchers reviewed relevant literature from IEEE Xplore Digital Library, ScienceDirect, Taylor & Francis, Emerald Insight, Springer, SAGE, Wiley Online Library, Hindawi, MDPI, ACM Digital Library, IGI Global, and Google Scholar. The research paper begins by examining the history and evolution of FinTech, drivers for the growth of FinTech, segments of the FinTech industry, FinTech ecosystem, FinTech business model, and FinTech application. Subsequently, it then delves into an analysis of the most pressing cybersecurity issues confronting FinTech firms, such as privacy concerns, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, and others. In response to these cybersecurity issues, the paper evaluates various mitigation strategies and best practices adopted by FinTech firms and regulatory bodies globally. These measures include technological solutions such as authentication and access control mechanisms, cryptography, big data analytics, intrusion detection/prevention systems, regular data backup, artificial intelligence and machine learning, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems. The paper also emphasizes the importance of FinTech regulatory sandboxes, regulatory compliance, basic security training, continuous monitoring of threats, zero-trust policy, robust cybersecurity culture, regular testing, and stringent security policies to strengthen the FinTech ecosystem's cyber resilience. Based on empirical research, i
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits frequently capitalize on human psychology, trust, and a lack of vigilance to attain unauthorized entry to networks, systems, or data. In contrast to traditional social engineering tactics that center on psychological manipulation, technical social engineering attacks employ technological means and strategies to manipulate and beguile individuals. The paper presents an attempt to detect social engineering attacks. The approach utilized four machine learning algorithms (decision tree, random forest, K-nearest neighbor, and extreme gradient boosting). The analysis is centered on data collected from network hosts, which may serve as indicators of a potential social engineering attack. The empirical results demonstrated high detection accuracy.
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate methods of balancing classes and to develop a classification method on imbalanced data to increase the level of network security. The methods used are: methods of artificial intelligence, machine learning. The following results were obtained: Class balancing methods based on Undersampling, Oversampling and their combinations were studied. The following methods were chosen for further research: SMOTEENN, SVMSMOTE, BorderlineSMOTE, ADASYN, SMOTE, KMeansSMOTE. The UNSW-NB 15 set was used as the source data, which contains information about the normal functioning of the network and during intrusions. A decision tree based on the CART (Classification And Regression Tree) algorithm was used as the basic classifier. According to the research results, it was found that the use of the SMOTEENN method provides an opportunity to improve the quality of detection of intrusions in the functioning of the network. Conclusions. The scientific novelty of the obtained results lies in the complex use of data balancing methods and the method of data classification based on decision trees to detect intrusions into computer networks, which made it possible to reduce the number of Type II errors.
Lip reading is a technique that aims to understand spoken words by analyzing people's lip movements. Deep learning algorithms are used as a powerful tool for detecting and recognizing lip movements more accurately...
详细信息
The theory of intuitionistic fuzzy sets (IFSs) plays an essential role to deal with uncertainty and ambiguity. However, the IFSs deal only with anticipation, not periodicity. But, complex IFSs (CIFS) can handle both u...
详细信息
暂无评论