System Assurances: Modeling and Management: Emerging Methodologies and Applications in Modelling, Identification and Control
Editat de Prashant Johri, Adarsh Anand, Juri Vain, Jagvinder Singh, Mohammad Tabrez Quasimen Limba Engleză Paperback – 21 feb 2022
- Provides software reliability modeling, simulation and optimization
- Offers methodologies, tools and practical applications of reliability modeling and resources allocation
- Presents cost modeling and optimization associated with complex systems
Din seria Emerging Methodologies and Applications in Modelling, Identification and Control
- 39% Preț: 715.68 lei
- 28% Preț: 723.46 lei
- 31% Preț: 642.78 lei
- 29% Preț: 669.29 lei
- 22% Preț: 547.19 lei
- 37% Preț: 691.26 lei
- 27% Preț: 685.31 lei
- 22% Preț: 816.54 lei
- 27% Preț: 817.83 lei
- 37% Preț: 818.96 lei
- 28% Preț: 995.96 lei
- 22% Preț: 688.84 lei
- 20% Preț: 855.82 lei
- 20% Preț: 853.89 lei
- 20% Preț: 854.39 lei
- 24% Preț: 714.19 lei
- 23% Preț: 678.54 lei
- 24% Preț: 628.65 lei
- 24% Preț: 625.89 lei
- 32% Preț: 941.05 lei
- 9% Preț: 944.85 lei
- 9% Preț: 666.61 lei
- 24% Preț: 733.52 lei
- 9% Preț: 686.35 lei
- 24% Preț: 582.26 lei
- 27% Preț: 896.12 lei
- 24% Preț: 712.55 lei
- 24% Preț: 669.92 lei
- 24% Preț: 753.00 lei
- 9% Preț: 943.89 lei
Preț: 499.29 lei
Nou
Puncte Express: 749
Preț estimativ în valută:
95.57€ • 103.84$ • 80.33£
95.57€ • 103.84$ • 80.33£
Carte disponibilă
Livrare economică 31 martie-14 aprilie
Livrare express 14-20 martie pentru 50.90 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780323902403
ISBN-10: 0323902405
Pagini: 614
Ilustrații: Approx. 150 illustrations
Dimensiuni: 152 x 229 x 37 mm
Greutate: 0.81 kg
Editura: ELSEVIER SCIENCE
Seria Emerging Methodologies and Applications in Modelling, Identification and Control
ISBN-10: 0323902405
Pagini: 614
Ilustrații: Approx. 150 illustrations
Dimensiuni: 152 x 229 x 37 mm
Greutate: 0.81 kg
Editura: ELSEVIER SCIENCE
Seria Emerging Methodologies and Applications in Modelling, Identification and Control
Cuprins
1. Statistical analysis approach for the quality assessment of open-source software
Yoshinobu Tamura and Shigeru Yamada
2. Analytical modeling and performance evaluation of SIP signaling protocol: Analytical modeling of SIP
Nikesh Choudhary, Vandana Khaitan (nee Gupta), and Vaneeta Goel
3. An empirical validation for predicting bugs and the release time of open source software using entropy measures—Software reliability growth models
Anjali Munde
4. Risk assessment of starting air system of marine diesel engine using fuzzy failure mode and effects analysis
Rajesh S. Prabhu Gaonkar and Sunay P. Pai
5. Test scenario generator learning for model-based testing of mobile robots
Gert Kanter and Marti Ingmar Liibert
6. Testing effort-dependent software reliability growth model using time lag functions under distributed environment
Sudeept Singh Yadav, Avneesh Kumar, Prashant Johri, and J.N. Singh
7. Design and performance analysis of MIMO PID controllers for a paper machine subsystem
Niharika Varshney, Parvesh Saini, and Ashutosh Dixit
8. Network and security leveraging IoT and image processing: A quantum leap forward
Ajay Sudhir Bale, S. Saravana Kumar, S. Varun Yogi, Swetha Vura, R. Baby Chithra, N. Vinay, and P. Pravesh
9. Modeling software patching process inculcating the impact of vulnerabilities discovered and disclosed
Deepti Aggrawal, Jasmine Kaur, and Adarsh Anand
10. Extension of software reliability growth models by several testing-time functions
Yuka Minamino, Shinji Inoue, and Shigeru Yamada
11. A semi-Markov model of a system working under uncertainty
R.K. Bhardwaj, Purnima Sonker, and Ravinder Singh
12. Design and evaluation of parallel-series IRM system
Sridhar Akiri, P. Sasikala, Pavan Kumar Subbara, and VSS Yadavalli
13. Modeling and availability assessment of smart building automation systems with multigoal maintenance
Yuriy Ponochovniy, Vyacheslav Kharchenko, and Olga Morozova
14. A study of bitcoin and Ethereum blockchains in the context of client types, transactions, and underlying network architecture
Rohaila Naaz and Ashendra Kumar Saxena
15. High assurance software architecture and design
Muhammad Ehsan Rana and Omar S. Saleh
16. Online condition monitoring and maintenance of photovoltaic system
Neeraj Khera
17. Fault diagnosis and fault tolerance
Afaq Ahmad and Sayyid Samir Al Busaidi
18. True power loss diminution by Improved Grasshopper Optimization Algorithm
Lenin Kanagasabai
19. Security analytics
Vani Rajasekar, J Premalatha, and Rajesh Kumar Dhanaraj
20. Stochastic modeling of the mean time between software failures: A review
Gabriel Pena, Veronica Moreno, and Nestor Barraza
21. Inliers prone distributions: Perspectives and future scopes
K. Muralidharan and Pratima Bavagosai
22. Integration of TPM, RCM, and CBM: A practical approach applied in Shipbuilding industry
Rupesh Kumtekar, Swapnil Kamble, and Suraj Rane
23. Revolutionizing the internet of things with swarm intelligence
Abhishek Kumar, Jyotir Moy Chatterjee, Manju Payal, and Pramod Singh Rathore
24. Security and challenges in IoT-enabled systems
S. Kala and S. Nalesh
25. Provably correct aspect-oriented modeling with UPPAAL timed automata
Juri Vain, Leonidas Tsiopoulos, and Gert Kanter
26. Relevance of data mining techniques in real life
Palwinder Kaur Mangat and Kamaljit Singh Saini
27. D-PPSOK clustering algorithm with data sampling for clustering big data analysis
C. Suresh Gnana Dhas, N. Yuvaraj, N.V. Kousik, and Tadele Degefa Geleto
28. A review on optimal placement of phasor measurement unit (PMU)
Ashutosh Dixit, Arindam Chowdhury, and Parvesh Saini
29. Effective motivational factors and comprehensive study of information security and policy challenges
M. Arvindhan
30. Integration of wireless communication technologies in internet of vehicles for handover decision and network selection
Shaik Mazhar Hussain, Kamaludin Mohamad Yusof, Afaq Ahmad, and Shaik Ashfaq Hussain
31. Modeling HIV-TB coinfection with illegal immigrants and its stability analysis
Rajinder Sharma
Yoshinobu Tamura and Shigeru Yamada
2. Analytical modeling and performance evaluation of SIP signaling protocol: Analytical modeling of SIP
Nikesh Choudhary, Vandana Khaitan (nee Gupta), and Vaneeta Goel
3. An empirical validation for predicting bugs and the release time of open source software using entropy measures—Software reliability growth models
Anjali Munde
4. Risk assessment of starting air system of marine diesel engine using fuzzy failure mode and effects analysis
Rajesh S. Prabhu Gaonkar and Sunay P. Pai
5. Test scenario generator learning for model-based testing of mobile robots
Gert Kanter and Marti Ingmar Liibert
6. Testing effort-dependent software reliability growth model using time lag functions under distributed environment
Sudeept Singh Yadav, Avneesh Kumar, Prashant Johri, and J.N. Singh
7. Design and performance analysis of MIMO PID controllers for a paper machine subsystem
Niharika Varshney, Parvesh Saini, and Ashutosh Dixit
8. Network and security leveraging IoT and image processing: A quantum leap forward
Ajay Sudhir Bale, S. Saravana Kumar, S. Varun Yogi, Swetha Vura, R. Baby Chithra, N. Vinay, and P. Pravesh
9. Modeling software patching process inculcating the impact of vulnerabilities discovered and disclosed
Deepti Aggrawal, Jasmine Kaur, and Adarsh Anand
10. Extension of software reliability growth models by several testing-time functions
Yuka Minamino, Shinji Inoue, and Shigeru Yamada
11. A semi-Markov model of a system working under uncertainty
R.K. Bhardwaj, Purnima Sonker, and Ravinder Singh
12. Design and evaluation of parallel-series IRM system
Sridhar Akiri, P. Sasikala, Pavan Kumar Subbara, and VSS Yadavalli
13. Modeling and availability assessment of smart building automation systems with multigoal maintenance
Yuriy Ponochovniy, Vyacheslav Kharchenko, and Olga Morozova
14. A study of bitcoin and Ethereum blockchains in the context of client types, transactions, and underlying network architecture
Rohaila Naaz and Ashendra Kumar Saxena
15. High assurance software architecture and design
Muhammad Ehsan Rana and Omar S. Saleh
16. Online condition monitoring and maintenance of photovoltaic system
Neeraj Khera
17. Fault diagnosis and fault tolerance
Afaq Ahmad and Sayyid Samir Al Busaidi
18. True power loss diminution by Improved Grasshopper Optimization Algorithm
Lenin Kanagasabai
19. Security analytics
Vani Rajasekar, J Premalatha, and Rajesh Kumar Dhanaraj
20. Stochastic modeling of the mean time between software failures: A review
Gabriel Pena, Veronica Moreno, and Nestor Barraza
21. Inliers prone distributions: Perspectives and future scopes
K. Muralidharan and Pratima Bavagosai
22. Integration of TPM, RCM, and CBM: A practical approach applied in Shipbuilding industry
Rupesh Kumtekar, Swapnil Kamble, and Suraj Rane
23. Revolutionizing the internet of things with swarm intelligence
Abhishek Kumar, Jyotir Moy Chatterjee, Manju Payal, and Pramod Singh Rathore
24. Security and challenges in IoT-enabled systems
S. Kala and S. Nalesh
25. Provably correct aspect-oriented modeling with UPPAAL timed automata
Juri Vain, Leonidas Tsiopoulos, and Gert Kanter
26. Relevance of data mining techniques in real life
Palwinder Kaur Mangat and Kamaljit Singh Saini
27. D-PPSOK clustering algorithm with data sampling for clustering big data analysis
C. Suresh Gnana Dhas, N. Yuvaraj, N.V. Kousik, and Tadele Degefa Geleto
28. A review on optimal placement of phasor measurement unit (PMU)
Ashutosh Dixit, Arindam Chowdhury, and Parvesh Saini
29. Effective motivational factors and comprehensive study of information security and policy challenges
M. Arvindhan
30. Integration of wireless communication technologies in internet of vehicles for handover decision and network selection
Shaik Mazhar Hussain, Kamaludin Mohamad Yusof, Afaq Ahmad, and Shaik Ashfaq Hussain
31. Modeling HIV-TB coinfection with illegal immigrants and its stability analysis
Rajinder Sharma