Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Technology: general issues > Technical design > Computer aided design (CAD)
For many years, the dominant fault model in automatic test pattern gen eration (ATPG) for digital integrated circuits has been the stuck-at fault model. The static nature of stuck-at fault testing when compared to the extremely dynamic nature of integrated circuit (IC) technology has caused many to question whether or not stuck-at fault based testing is still viable. Attempts at answering this question have not been wholly satisfying due to a lack of true quantification, statistical significance, and/or high computational expense. In this monograph we introduce a methodology to address the ques tion in a manner which circumvents the drawbacks of previous approaches. The method is based on symbolic Boolean functional analyses using Or dered Binary Decision Diagrams (OBDDs). OBDDs have been conjectured to be an attractive representation form for Boolean functions, although cases ex ist for which their complexity is guaranteed to grow exponentially with input cardinality. Classes of Boolean functions which exploit the efficiencies inherent in OBDDs to a very great extent are examined in Chapter 7. Exact equa tions giving their OBDD sizes are derived, whereas until very recently only size bounds have been available. These size equations suggest that straight forward applications of OBDDs to design and test related problems may not prove as fruitful as was once thought."
In the design of any visual objects, the work becomes much easier if previous designs are utilized. Computer graphics is becoming increasingly important simply because it greatly helps in utilizing such previous designs. Here, "previous designs" signifies both design results and design procedures. The objects designed are diverse. For engineers, these objects could be machines or electronic circuits, as discussed in Chap. 3, ''CA~/CAM. '' Physicians often design models of a patient's organs from computed tomography images prior to surgery or to assist in diagnosis. This is the subject of Chap. 8, "Medical Graphics. " Chapter 7, "Computer Art," deals with the way in which artists use computer graphics in creating beautiful visual images. In Chap. 1, "Computational Geometry," a firm basis is provided for the definition of shapes in designed objects; this is a typical technical area in which computer graphics is constantly making worldwide progress. Thus, the present volume, reflecting international advances in these and other areas of computer graphics, provides every potential or actual graphics user with the essential up-to-date information. There are, typically, two ways of gathering this current information. One way is to invite international authorities to write on their areas of specialization. Usually this works very well if the areas are sufficiently established that it is possible to judge exactly who knows what. Since computer graphics, however, is still in its developmental stage, this method cannot be applied.
This volume is about automation - automation in design, automation in manufacturing, and automation in production. Automation is essen tial for increased productivity of quality products at reduced costs. That even partial or piecemeal automation of a production facility can deliver dramatic improvements in productivity has been amply demon strated in many a real-life situation. Hence, currently, great ef forts are being devoted to research and development of general as well special methodologies of and tools for automation. This volume re ports on some of these methodologies and tools. In general terms, methodologies for automation can be divided into two groups. There are situations where a process, whether open-loop or closed-loop, is fairly clearly understood. In such a situation, it is possible to create a mathematical model and to prescribe a mathe matical procedure to optimize the output. If such mathematical models and procedures are computationally tractable, we call the correspond ing automation - algorithmic or parametric programming. There is, however, a second set of situations which include process es that are not well understood and the available mathematical models are only approximate and discrete. While there are others for which mathematical procedures are so complex and disjoint that they are computationally intractable. These are the situations for which heuristics are quite suitable for automation. We choose to call such automation, knowledge-based automation or heuristic programming."
This book constitutes the refereed proceedings of the European Design Science Symposium, EDSS 2011, held in Leixlip, Ireland, in October 2011 held in conjunction with the Intel European Research and Innovation Conference, ERIC 2011. The 15 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on design science and processes; evaluation and utility; and applying design science.
It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography." This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key cryptography, a field that had been the almost exclusive domain of secret agencies and mathematical hobbyist. A number of ex cellent books on the science of cryptography have appeared since 1976. In the main, these books thoroughly treat both public-key systems and block ciphers (i. e. secret-key ciphers with no memo ry in the enciphering transformation) but give short shrift to stream ciphers (i. e., secret-key ciphers wi th memory in the enciphering transformation). Yet, stream ciphers, such as those . implemented by rotor machines, have played a dominant role in past cryptographic practice, and, as far as I can determine, re main still the workhorses of commercial, military and diplomatic secrecy systems. My own research interest in stream ciphers found a natural re sonance in one of my doctoral students at the Swiss Federal Institute of Technology in Zurich, Rainer A. Rueppe1. As Rainer was completing his dissertation in late 1984, the question arose as to where he should publish the many new results on stream ciphers that had sprung from his research."
This book constitutes the refereed proceedings of the 9th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2012, held in Osaka, Japan, in September 2012. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover the topics of cooperative engineering, basic theories, methods and technologies that support CDVE, cooperative design, visualization and applications.
Informationssysteme sind die Grundlage von Building Information Modelling, BIM. Vernetzte Informationen und durchgangig vernetzte Modelldaten sind die Grundlage partnerschaftlichen Bauens. Sie erlauben transparentes Controlling und zuverlassiges Risikomanagement. Multimodelle sind vernetzte Informationen. Die Grundlagen und Methoden von BIM und Multimodellen werden erlautert und es wird aufgezeigt, wie ein prozessorientiertes Management mit Multimodellen neue Qualitat in die Planung und Steuerung von Bauprozessen bringt. Die durchgehende BIM Arbeitsweise mit vernetzten Informationen erlaubt Bauablaufsimulationen in kurzester Zeit durchzufuhren. Neben dem virtuellen Bauwerk wird auch eine virtuelle Baustelle virtuelle Realitat und gibt wichtige neue Eindrucke fur das Baumanagement. Baumanagementinformationen werden auf einmal transparent, erfassbar, begreifbar. Band 1 konzentriert sich auf die Grundlagen der Modelle und ihre Erweiterung durch Linkmodelle, auf die Methoden fur BIM und Multimodelldaten wie das Filtern, das Visualisieren und auf die Prozesse, ihre schnelle Konfiguration und das prozessbasierte Planen und Managen sowie die Informationslogistik, die gerade durch Multimodelle neue Ansatze und Qualitaten erhalt, wahrend Band 2 anschauliche Anwendungen in Baustellenplanung, Bauablaufsimulation, Bauprojekt- und Risikomanagement aufzeigt.
The total integration of the process of designing, manufacturing, and supporting a product from the earliest conceptual phase to the time it is removed from service remains an unfulfilled dream. Yet, when we look at the enormity of the process of integration even for the most simply conceived and manufactured items, we can recognize that substantial progress has been and is being made. It is our nature to be dissatisfied with near term progress, but when we realize how short a time the tools to do that integration have been available, the progress is clearly noteworthy - considering the multitudes of subjects we have to deal with. Most of the integration problems we confront today are multidisciplinary in nature. They require not only the knowledge and experience in a variety of fields but also good cooperation from different disciplined organizations to adequately comprehend and solve such problems. In Volume I we have many examples that reflect the current state of the art in integration of engineer ing and production processes. The papers for Volume I have been arranged in a more or less logical order of conceptual. design, computer-based modeling, analysis, production, and manufacturing. Chapter I is devoted to those with a design and geometrie modeling emphasis; Chapter II is devoted to an engineering analysis emphasis; and Chapter III to a production/manufacturing emphasis."
Knighting in sequence biology Edward N. Trifonov Genome classification, construction of phylogenetic trees, became today a major approach in studying evolutionary relatedness of various species in their vast - versity. Although the modern genome clustering delivers the trees which are very similar to those generated by classical means, and basic terminology is the same, the phenotypic traits and habitats are not anymore the playground for the classi- cation. The sequence space is the playground now. The phenotypic traits are - placed by sequence characteristics, "words", in particular. Matter-of-factually, the phenotype and genotype merged, to confusion of both classical and modern p- logeneticists. Accordingly, a completely new vocabulary of stringology, information theory and applied mathematics took over. And a new brand of scientists emerged - those who do know the math and, simultaneously, (do?) know biology. The book is written by the authors of this new brand. There is no way to test their literacy in biology, as no biologist by training would even try to enter into the elite circle of those who masters their almost occult language. But the army of - formaticians, formal linguists, mathematicians humbly (or aggressively) longing to join modern biology, got an excellent introduction to the field of genome cl- tering, written by the team of their kin.
The craft of designing mathematical models of dynamic objects offers a large number of methods to solve subproblems in the design, typically parameter estimation, order determination, validation, model reduc tion, analysis of identifiability, sensi tivi ty and accuracy. There is also a substantial amount of process identification software available. A typi cal 'identification package' consists of program modules that implement selections of solution methods, coordinated by supervising programs, communication, and presentation handling file administration, operator of results. It is to be run 'interactively', typically on a designer's 'work station' . However, it is generally not obvious how to do that. Using interactive identification packages necessarily leaves to the user to decide on quite a number of specifications, including which model structure to use, which subproblems to be solved in each particular case, and in what or der. The designer is faced with the task of setting up cases on the work station, based on apriori knowledge about the actual physical object, the experiment conditions, and the purpose of the identification. In doing so, he/she will have to cope with two basic difficulties: 1) The com puter will be unable to solve most of the tentative identification cases, so the latter will first have to be form11lated in a way the computer can handle, and, worse, 2) even in cases where the computer can actually produce a model, the latter will not necessarily be valid for the intended purpose."
The role of arithmetic in datapath design in VLSI design has been increasing in importance over the last several years due to the demand for processors that are smaller, faster, and dissipate less power. Unfortunately, this means that many of these datapaths will be complex both algorithmically and circuit wise. As the complexity of the chips increases, less importance will be placed on understanding how a particular arithmetic datapath design is implemented and more importance will be given to when a product will be placed on the market. This is because many tools that are available today, are automated to help the digital system designer maximize their efficiently. Unfortunately, this may lead to problems when implementing particular datapaths. The design of high-performance architectures is becoming more compli cated because the level of integration that is capable for many of these chips is in the billions. Many engineers rely heavily on software tools to optimize their work, therefore, as designs are getting more complex less understanding is going into a particular implementation because it can be generated automati cally. Although software tools are a highly valuable asset to designer, the value of these tools does not diminish the importance of understanding datapath ele ments. Therefore, a digital system designer should be aware of how algorithms can be implemented for datapath elements. Unfortunately, due to the complex ity of some of these algorithms, it is sometimes difficult to understand how a particular algorithm is implemented without seeing the actual code."
Motivation for this Book Ontologies have received increasing attention over the last two decades. Their roots can be traced back to the ancient philosophers, who were interested in a c- ceptualization of the world. In the more recent past, ontologies and ontological engineering have evolved in computer science, building on various roots such as logics, knowledge representation, information modeling and management, and (knowledge-based) information systems. Most recently, largely driven by the next generation internet, the so-called Semantic Web, ontological software engineering has developed into a scientific field of its own, which puts particular emphasis on the theoretical foundations of representation and reasoning, and on the methods and tools required for building ontology-based software applications in diverse domains. Though this field is largely dominated by computer science, close re- tionships have been established with its diverse areas of application, where - searchers are interested in exploiting the results of ontological software engine- ing, particularly to build large knowledge-intensive applications at high productivity and low maintenance effort. Consequently, a large number of scientific papers and monographs have been p- lished in the very recent past dealing with the theory and practice of ontological software engineering. So far, the majority of those books are dedicated to the th- retical foundations of ontologies, including philosophical treatises and their re- tionships to established methods in information systems and ontological software engineering.
Current multimedia and telecom applications require complex, heterogeneous multiprocessor system on chip (MPSoC) architectures with specific communication infrastructure in order to achieve the required performance. Heterogeneous MPSoC includes different types of processing units (DSP, microcontroller, ASIP) and different communication schemes (fast links, non standard memory organization and access). Programming an MPSoC requires the generation of efficient software running on MPSoC from a high level environment, by using the characteristics of the architecture. This task is known to be tedious and error prone, because it requires a combination of high level programming environments with low level software design. This book gives an overview of concepts related to embedded software design for MPSoC. It details a full software design approach, allowing systematic, high-level mapping of software applications on heterogeneous MPSoC. This approach is based on gradual refinement of hardware/software interfaces and simulation models allowing to validate the software at different abstraction levels. This book combines Simulink for high level programming and SystemC for the low level software development. This approach is illustrated with multiple examples of application software and MPSoC architectures that can be used for deep understanding of software design for MPSoC.
Simulation Methods for Reliability and Availability of Complex Systems discusses the use of computer simulation-based techniques and algorithms to determine reliability and availability (R and A) levels in complex systems. The book: shares theoretical or applied models and decision support systems that make use of simulation to estimate and to improve system R and A levels, forecasts emerging technologies and trends in the use of computer simulation for R and A and proposes hybrid approaches to the development of efficient methodologies designed to solve R and A-related problems in real-life systems. Dealing with practical issues, Simulation Methods for Reliability and Availability of Complex Systems is designed to support managers and system engineers in the improvement of R and A, as well as providing a thorough exploration of the techniques and algorithms available for researchers, and for advanced undergraduate and postgraduate students.
This book is the outcome of the NATO Advanced Research Workshop on Machine Intelligence and Knowledge Engineering for Robotic Applications held at Maratea, Italy in May 1986. Attendance of the workshop was by invitation only. Most of the participants and speakers are recognized leaders in the field, representing industry, government and academic c0mrnunity worldwide. The focus of the workshop was to review the recent advances of machine intelligence and knowledge engineering for robotic appli cations. It covers five main areas of interest. They are grouped into five sections: 1. Robot Vision 2. Knowledge Representation and Image Understanding 3. Robot Control and Inference Systems 4. Task Planning and Expert Systems 5. Software/Hardware Systems Also included in this book are a paper from the Poster Session and a brief report of the panel discussion on the Future Direction in Knowledge-Based Robotics. Section I of this book consists of four papers. It begins with a review of the basic concepts of computer vision, with emphasis on techniques specific for robot vision systems. The next paper pre sents a comprehensive 3-D vision system for robotic application."
This book introduces a design methodology that can help to
bridge the productivity gap. Two different types of designs,
depending on the design challenge, have been identified. To
validate the presented methodologies, the authors have selected and
designed accordingly three different industrial-strength
applications.
Systematic Design of Sigma-Delta Analog-to-Digital Converters
describes the issues related to the sigma-delta analog-to-digital
converters (ADCs) design in a systematic manner: from the top level
of abstraction represented by the filters defining signal and noise
transfer functions (STF, NTF), passing through the architecture
level where topology-related performance is calculated and
simulated, and finally down to parameters of circuit elements like
resistors, capacitors, and amplifier transconductances used in
individual integrators. The systematic approach allows the
evaluation of different loop filters (order, aggressiveness,
discrete-time or continuous-time implementation) with quantizers
varying in resolution. Topologies explored range from simple single
loops to multiple cascaded loops with complex structures including
more feedbacks and feedforwards. For differential circuits, with
switched-capacitor integrators for discrete-time (DT) loop filters
and active-RC for continuous-time (CT) ones, the passive integrator
components are calculated and the power consumption is estimated,
based on top-level requirements like harmonic distortion and noise
budget.
Structural optimization is currently attracting considerable attention. Interest in - search in optimal design has grown in connection with the rapid development of aeronautical and space technologies, shipbuilding, and design of precision mach- ery. A special ?eld in these investigations is devoted to structural optimization with incomplete information (incomplete data). The importance of these investigations is explained as follows. The conventional theory of optimal structural design - sumes precise knowledge of material parameters, including damage characteristics and loadings applied to the structure. In practice such precise knowledge is seldom available. Thus, it is important to be able to predict the sensitivity of a designed structure to random ?uctuations in the environment and to variations in the material properties. To design reliable structures it is necessary to apply the so-called gu- anteed approach, based on a "worst case scenario" or a more optimistic probabilistic approach, if we have additional statistical data. Problems of optimal design with incomplete information also have consid- able theoretical importance. The introduction and investigations into new types of mathematical problems are interesting in themselves. Note that some ga- theoretical optimization problems arise for which there are no systematic techniques of investigation. This monograph is devoted to the exposition of new ways of formulating and solving problems of structural optimization with incomplete information. We recall some research results concerning the optimum shape and structural properties of bodies subjected to external loadings.
The development of the 'factory of the future' by major international corporations such as General Motors, IBM, Westinghouse, etc now involves many practising engineers. This book is an attempt to identify and describe some of the building blocks required for computer aided engineering for manufacture. It begins with numerical control and the infrastructure required for the automation of individual 'islands' within existing factories. Computer aided design and computer aided manufacture are then discussed in detail together with their integration to improve manufacturing efficiency and flexibility. Robotics and flexible manufacturing systems are examined, as well as the management of these systems required for production optimization. Finally, there is an overview of the relatively new field of artificial intelligence, which is being increasingly used in most aspects of computer aided engineering for manufacture. There are many topics which could have been included or expanded upon with advantage, but the authors have attempted to strike a balance so that the reader can obtain the maximum usefulness from a reasonably concise volume.
A number of fundamental topics in the field of high performance clock distribution networks is covered in this book. High Performance Clock Distribution Networks is composed of ten contributions from authors at academic and industrial institutions. Topically, these contributions can be grouped within three primary areas. The first topic area deals with exploiting the localized nature of clock skew. The second topic area deals with the implementation of these clock distribution networks, while the third topic area considers more long-range aspects of next-generation clock distribution networks. High Performance Clock Distribution Networks presents a number of interesting strategies for designing and building high performance clock distribution networks. Many aspects of the ideas presented in these contributions are being developed and applied today in next-generation high-performance microprocessors.
The aim of computer-aided surgery (CAS) is to advance the utilization of computers in the development of new technologies for medical services. The Asian Conference on Computer Aided Surgery (ACCAS) series provides a forum for academic researchers, clinical scientists, surgeons, and industrial partners to exchange new ideas, techniques, and the latest developments in the field. The ACCAS brings together researchers from all fields related to medical activity visualization, simulation and modeling, virtual reality for CAS, image-guided diagnosis and therapies, CAS for minimally invasive intervention, medical robotics and instrumentation, surgical navigation, clinical application of CAS, telemedicine and telesurgery, and CAS education. The ACCAS is also interested in promoting collaboration among people from different disciplines and different countries in Asia and the world. This volume helps to achieve that goal and is a valuable resource for researchers and clinicians in the field.
Multi-objective optimization deals with the simultaneous optimization of two or more objectives which are normally in con?ict with each other. Since mul- objective optimization problems are relatively common in real-world appli- tions, this area has become a very popular research topic since the 1970s. However, the use of bio-inspired metaheuristics for solving multi-objective op- mization problems started in the mid-1980s and became popular until the mid- 1990s. Nevertheless, the e?ectiveness of multi-objective evolutionary algorithms has made them very popular in a variety of domains. Swarm intelligence refers to certain population-based metaheuristics that are inspired on the behavior of groups of entities (i.e., living beings) interacting locallywitheachotherandwiththeirenvironment.Suchinteractionsproducean emergentbehaviorthatismodelledinacomputerinordertosolveproblems.The two most popular metaheuristics within swarm intelligence are particle swarm optimization (which simulates a ?ock of birds seeking food) and ant colony optimization (which simulates the behavior of colonies of real ants that leave their nest looking for food). These two metaheuristics havebecome verypopular inthelastfewyears, andhavebeenwidelyusedinavarietyofoptimizationtasks, including some related to data mining and knowledge discovery in databases. However, such work has been mainly focused on single-objective optimization models. The use of multi-objective extensions of swarm intelligence techniques in data mining has been relatively scarce, in spite of their great potential, which constituted the main motivation to produce this book
This book is the fruit of a very long and elaborate process. It was conceived as a comprehensive solution to several deficiencies encountered while trying to teach the essentials of Computer Vision in different contexts: to technicians from industry looking for technological solutions to some of their problems, to students in search of a good subject for a PhD thesis, and to researchers in other fields who believe that Computer Vision techniques may help them to analyse their results. The book was carefully planned with all these people in mind. Thus, it covers the fundamentals of both 2D and 3D Computer Vision and their most widespread industrial applications, such as automated inspection, robot guidance and workpiece acquisition. The level of explanation is that of an expanded introductory text, in the sense that, besides the basic material, some special advanced topics are included in each chapter, together with an extensive bibliography for experts to follow up. Well-known researchers on each of the topics were appointed to write a chapter following several guidelines to ensure a consistent presentation throughout. I would like to thank the authors for their patience, because some of them had to go through several revisions of their chapters in order to avoid repetition and to improve the homogeneity and coherence of the book. I hope they will find that the final result has been worth their efforts.
Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.
Powerful new technology has been made available to researchers by an increasingly competitive workstation market. Papers from Canada, Japan, Italy, Germany, and the U.S., to name a few of the countries represented in this volume, discuss how workstations are used in experiments and what impact this new technology will have on experiments. As usual for IFIP workshops, the emphasis in this volume is on the formulation of strategies for future research, the determination of new market areas, and the identification of new areas for workstation research. This is the first volume of a book series reporting the work of IFIP WG 5.10. The mission of this IFIP work- ing group is to promote, develop and encourage advancement of the field of computer graphics as a basic tool, as an enabling technology and as an important part of various application areas. |
You may like...
SolidWorks CAM 2022 Black Book (Colored)
Gaurav Verma, Matt Weber
Hardcover
R1,545
Discovery Miles 15 450
SolidWorks Flow Simulation 2022 Black…
Gaurav Verma, Matt Weber
Hardcover
R1,331
Discovery Miles 13 310
SolidWorks Simulation 2022 Black Book…
Gaurav Verma, Matt Weber
Hardcover
R1,719
Discovery Miles 17 190
Basics of Autodesk Inventor Nastran 2022…
Gaurav Verma, Matt Weber
Hardcover
R1,637
Discovery Miles 16 370
Building Information Modelling (BIM) in…
W. P. de Wilde, L. Mahdjoubi, …
Hardcover
R4,856
Discovery Miles 48 560
Advances in Production Management…
Bojan Lalic, Vidosav Majstorovic, …
Hardcover
R2,944
Discovery Miles 29 440
|