By Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel
This quantity of Advances in clever platforms and Computing includes papers awarded frequently song of IITI 2016, the 1st foreign convention on clever info applied sciences for held in could 16-21 in Sochi, Russia. The convention used to be together co-organized via Rostov kingdom shipping college (Russia) and VŠB – Technical collage of Ostrava (Czech Republic) with the participation of Russian organization for man made Intelligence (RAAI) and Russian organization for Fuzzy platforms and smooth Computing (RAFSSC). the amount is dedicated to useful types and business purposes with regards to clever details platforms. The convention has been a gathering element for researchers and practitioners to permit the implementation of complicated details applied sciences into quite a few industries. however, a few theoretical talks touching on the-state-of-the-art in clever platforms and tender computing are incorporated within the court cases in addition.
Read or Download Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2 PDF
Best international_1 books
This ebook constitutes the completely refereed post-conference complaints of the first overseas convention on Swarm Intelligence dependent Optimization, ICSIBO 2014, held in Mulhouse, France, in might 2014. The 20 complete papers provided have been rigorously reviewed and chosen from forty eight submissions. issues of curiosity awarded and mentioned within the convention specializes in the theoretical development of swarm intelligence metaheuristics and their functions in parts akin to: theoretical advances of swarm intelligence metaheuristics, combinatorial, discrete, binary, limited, multi-objective, multi-modal, dynamic, noisy, and large-scale optimization, man made immune structures, particle swarms, ant colony, bacterial foraging, synthetic bees, fireflies set of rules, hybridization of algorithms, parallel/distributed computing, laptop studying, information mining, info clustering, determination making and multi-agent structures according to swarm intelligence ideas, edition and functions of swarm intelligence rules to genuine global difficulties in a variety of domain names.
The 2 quantity set LNCS 10072 and LNCS 10073 constitutes the refereed complaints of the twelfth overseas Symposium on visible Computing, ISVC 2016, held in Las Vegas, NV, united states in December 2016. The 102 revised complete papers and 34 poster papers awarded during this booklet have been rigorously reviewed and chosen from 220 submissions.
- From Silence to Protest: International Perspectives on Weakly Resourced Groups
- Mobile Computing, Applications, and Services: 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers
- Intelligent Systems'2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 1: Mathematical Foundations, Theory, Analyses
- Meeting the Pump Users' Needs. The Proceedings of the 12th International Pump Technical Conference
Extra info for Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2
Rep. Ser. Nat. Tech. Sci. 5 (2006) Part II Probabilistic models, Algebraic Bayesian Networks and Information Protection Models and Algorithms for the Information System’s Users’ Protection Level Probabilistic Estimation Artur Azarov, Maxim Abramov, Alexander Tulupyev and Tatiana Tulupyeva Abstract Questions of information security for today’s business, somehow using information technologies are among the most important. Probabilistic relational model complex “information system—critical documents—the staff—the attacker” are being concidered, as well as an algorithm for estimating the probability of users of information systems security by social engineering attacks.
3. When two radius-vectors turn by the same angle, longer vector is more stable. Therefore when the same information volume is built in into two different pixel blocks more stable is the block with bigger sum of amplitude spectrum elements. These elements correspond to elements of the phase spectrum used. Still up to now we have not managed to ﬁnd the strong dependence of building in reliability on the image statistical characteristics. We can speak only about empiric conclusions true in many cases.
Vik Þ That means that the probability of the malefactor’s social engineering attack action success depends on the variety of the parameters such as malefactor’s resources, types of social engineering attack actions and the opportunities to use these social engineering attack actions, and the degrees of user’s vulnerabilities. The basic idea is that one malefactor’s social engineering attack action effects only one, particular user’s vulnerability. In this way, the probability of the malefactor’s social engineering attack action success may be represented as follows Psuc ¼ Atji ðDÞVji ðDÞ Atjmax ðDÞVjmax ðDÞ ð1Þ At the same time, if one malefactor’s social engineering attack action effects several user’s vulnerabilities, the probability of social engineering attack action success may be represented as follows: Psuc ¼ 1 À v Y j¼1 AtðDÞVji ðDÞ 1À Atjmax ðDÞVjmax ðDÞ !
Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2 by Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel