(495) 109 08 40
|Локальные и корпоративные сети Автор Biniyam A. Издательство Книга по Требованию|
This form of detection and recovery is localized to an individual task, and the task has deadlock awareness. A system that is capable of deadlock detection is more efficient in terms of resource utilization when compared to a system without deadlock detection. A system capable of deadlock detection is not conservative when granting resource allocation requests if deadlock is allowed to occur. Therefore, resources are highly utilized. A system without deadlock detection is conservative when granting resource allocation requests. A resource request is denied if the system believes there is a potential for deadlock, which may never occur. The conservatism of the system results in idle resources even when these resources could be used. Deadlock detection does not solve the problem; instead, the detection algorithm informs the recovery algorithm when the existence of deadlock is discovered. For deadlock in the Single resource request model, a cycle in the resource graph is a necessary and sufficient condition. For deadlock in the AND resource request model, a cycle in the resource graph is a necessary and sufficient condition ...
|Modeling and Identification for Anomaly detection in Mechanical System. A Masters of Science Paper in Electrical engineering|
The monograph presents the design requirements for the experimental testbed.
|Complex Systems in Engineering. A Symbolic Dynamics Approach for Anomaly Detection|
Maturity of scientific theories has facilitated creation of advanced technology of human-engineered complex systems.
|Anomaly detection in Electromechanical systems using Symbolic Dynamics|
The evolution of fatigue crack damage at one of the failure sites is detected from STSA of the pertinent sensor signal.
|Analyzing and Modeling Network Traffic in Wireless Sensor Networks. A Basis for Network Optimization and Anomaly Detection|
Although WSN is a promising technology, there is still a great deal of additional research required before it finally becomes a mature technology.
|Feature Selection for Anomaly Detection in Hyperspectral Data. Algorithms, Methods, and Applications|
The spectral information in hyperspectral data uniquely characterizes and identifies the chemical and/or physical properties of the constituent parts of an agricultural product that are useful for product inspection.
|Architecting and Modeling Automotive Embedded Systems. Technology, Methods and Management|
Also a quantitative method for modular architecture design, based on an information model, is described.
|Neural-Fuzzy Inference Engine for Maritime Anomaly Detection. VASE: Vessel Anticipatory Situation-Awareness Engine|
The system is referred to as VASE (Vessel Anticipatory Situation-Awareness Engine).
|Network Centric Traffic Analysis. Network Centric Anomaly Detection and Network Centric Traffic Classification|
|Modeling Multi-Processor Systems at Transaction-Level. A versatile approach to hardware architectures design and testing|
In recent years embedded systems have gained a widespread diffusion both in every market; anyone of us get in touch with them several times a day.
|Computational Systems Biology with Constraints. Stochastic Modeling of Biological Systems with Concurrent Constraint Programming|
It is precisely the use of constraints that gives flexibility and extendibility to the language, together with the presence of context-dependent stochastic rates.
|Open-Source Software and Health Information Technology. The Impact of Open-Source Software in Adopting and Implementing Electronic Medical Record Systems|
The open-source software development model emerged as a serious competitor to proprietary software development models.
|Derivation of Process Algebraic Models of Biochemical Systems. ?-calculus, Stochastic Simulation of Biochemical Reactions|
The concepts presented in the book can be especially useful for graduate students and researchers in Theoretical Computer Science who want to venture into the world of biochemical modelling, or anyone else who may be interested in gaining a general idea of the field.
|Model for Information Systems Legitimacy in Rehabilitation Counseling. A Study of Information Processing Needs of Rehabilitation Counseling Organizations and Social Networks with Regard to Cognitive Legitimacy|
The study also clarifies concepts supporting the requirements for cognitive legitimacy as operationalized by fluidity, i. e. , the ready transfer of knowledge to and from information systems.
|Hybrid of neural networks, multi-knowledge, fuzzy logic, rough set, and Bayesian classifier Computing Network Model for Intelligent Systems.|
The models are inspired from some biological principles, and furthermore they have been enhanced using hybrid of current artificial intelligent techniques such as machine learning, neural networks, multi-knowledge, fuzzy logic, rough set, Bayes classifier, and evidence reasoning theory.
|IMPLEMENTING RC5 ENCRYPTION ALGORITHM. THROUGH A WEB BASED MEDICAL CONSULTATION SYSTEM|
This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet.
|Reliability of Supply and Infrastructural Dependency Modelling Energy Distribution Systems.|
Models and methods for assessing reliability of supply in electric power systems are well documented, frequently applied in the industry and continuously being subject to research and improvement.
|Modelling of General Systems|
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.
|USING CLUSTERING AND FUZZY LOGIC APPROACHES IMPROVING THE EFFICIENCY OF MEDICAL EXPERT SYSTEM.|
Data clustering is the process in which groups of the records are not predefined.
|DIAGNOSTIC ET DETECTION DES DEAFUTS DES SYSTEMES COMPLEXES. APPLICATION AUX EOLIENNES|
Avec la demande croissante d' energie, les eoliennes apportent une reponse viable aux problemes environnementaux poses par les sources d' energie traditionnelles. Toutefois, l' eolienne est devenue un systeme complexe qui necessite une supervision rigoureuse pour obtenir un rendement energetique optimal. L' objectif de cet ouvrage se resume ainsi: etablir la surveillance d' une eolienne, et notamment de sa generatrice, en utilisant des methodes d' estimation d' etat et de detection de defauts. La surveillance de ces processus demande alors un suivi rigoureux. Ce suivi doit etre capable de detecter les defauts capteurs, de les localiser, et de les identifier pour decider des actions a entreprendre. Ces differentes etapes, qui constituent la base du diagnostic, doivent etre executees aussi rapidement que possible. La complexite croissante des unites de production necessite une automatisation de plus en plus developpee.
|A Client-Server Architecture Context Information Refinement for Pervasive Medical Systems.|
We identified the limitations of existing works regarding context information refinement in pervasive medical systems.