![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
The two volume proceedings of CCIS 698 and 699 constitutes revised selected papers from the 4th International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2016, held in Hong Kong, China, in November 2016. The total of 118 papers presented in these proceedings were carefully reviewed and selected from 311 submissions. The contributions were organized in topical sections named: smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental processes; applications of geo-informatics in resource management and sustainable ecosystem.
The two volume proceedings of CCIS 698 and 699 constitutes revised selected papers from the 4th International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2016, held in Hong Kong, China, in November 2016. The total of 118 papers presented in these proceedings were carefully reviewed and selected from 311 submissions. The contributions were organized in topical sections named: smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental processes; applications of geo-informatics in resource management and sustainable ecosystem.
Learn how to onboard ServiceNow ITSM tools by evangelizing, educating, and coordinating your organization's service desk, developers, and stakeholders. Drawing on his own story of lessons learned in spinning up the adoption of ServiceNow throughout the Al Jazeera Media Network, application architect Gabriele Kahlout shows IT service managers how to launch automated ServiceNow ticketing tools in seamless integration with their organization's existing email and Active Directory. Spinning Up ServiceNow: IT Service Managers' Guide to Successful User Adoption shows you how to orchestrate your IT service desks and developers to facilitate the adoption and consumption of IT services by all users, supporting their various business needs while optimizing human-computer interaction and minimizing stress and productivity loss arising from poor human-system design. What You'll Learn Quick-start ServiceNow in a matter of days with the minimum configuration required to start processing tickets via email Avoid the teething problems that can spoil your users' onboarding experience with ServiceNow Automate the process of scaling up new teams into ServiceNow Shape your users' experiences so that they retain their familiar bearings in email and Active Directory while welcoming the power of ServiceNow enhancements Create a strategy to avoid common pitfalls that sabotage ITSM programs Who This Book Is For IT managers charged with implementing ServiceNow ITSM suites in their organizations and business analysts determining the requirements for such implementation. The secondary readership is system administrators and developers involved in ITSM.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016. The 14 revised full papers were carefully reviewed and selected from 18 submissions. The papers are organized thematically in four parts, starting with cloud computing and software defined networking followed by Internet-of-the-things, vehicular networks and novel techniques and algorithms.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360 Degrees 2015, held in Rome, Italy, in October 2015. The IoT 360 Degrees is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360 Degrees 2015, held in Rome, Italy, in October 2015. The IoT 360 Degrees is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. The book will provide clear proof that mobile technologies are playing an ever increasing important and critical role in supporting toy computing, which is a new research discipline in computer science. It is also expected that the book will further research new best practices and directions in toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is mainly intended for researchers and students working in computer science and engineering, and for toy industry technology providers, having particular interests in mobile services. The wide range of authors of this book will help the various communities understand both specific and common problems. This book facilities software developers and researchers to become more aware of this challenging research opportunity. As well, the book is soliciting shall provide valuable strategic outlook on the emerging toy industry.
This book constitutes the post-conference proceedings of the First International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016, held in May 2016 in Liverpool, UK. Smart grid is the next generation electric grid that enables efficient, intelligent, and economical power generation, transmission, and distribution. The 25 revised full papers presented were reviewed and selected from 36 submissions. The papers cover technical topics such as high-level ideology and methodology, concrete smart grid inspired data sensing, processing, and networking technologies, smart grid system architecture, Quality of Service (QoS), energy efficiency, security in smart grid systems, management of smart grid systems, service engineering and algorithm design, and real-world deployment experiences.
Fuzzy set theory provides a framework for representing uncertainty.
As increasing importance is being given to uncertainty management
in intelligent systems, fuzzy inferencing procedures are vital.
Using Fest (Fuzzy Expert System Tools), the authors focus on the
parameters of fuzzy rule-based systems. The book then goes on to
show how Fest can be used for inference of indistinct data and
algorithmic descriptions. Divided into three parts, this
comprehensive text covers the characteristics of expert systems and
fuzzy sets theory, knowledge representation and the inference
process. Features include:
This book constitutes the refereed proceedings of the International Summit on Applications for Future Internet, AFI 2016, held in Puebla, Mexico, in May 2016. The 21 papers presented were carefully selected from 29 submissions and focus on the usage of Future Internet in the biological and health sciences as well as the increased application of IoT devices in fields like smart cities, health and agriculture.
The goal of this book is to crystallize the emerging mobile computing technologies and trends by focusing on the most promising solutions in services computing. The book will provide clear proof that mobile technologies are playing an increasingly important and critical role in supporting toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is intended for researchers and students working in computer science and engineering, as well as toy industry technology providers, having particular interests in mobile services.
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Personal Satellite Services, PSATS 2014, held in Genova, Italy, in July 2014. The 10 revised full papers presented were carefully reviewed and present the latest advances in the next generation satellite networking and communication systems.
This book delivers concise coverage of classical methods and new developments related to indoor location-based services. It collects results from isolated domains including geometry, artificial intelligence, statistics, cooperative algorithms, and distributed systems and thus provides an accessible overview of fundamental methods and technologies. This makes it an ideal starting point for researchers, students, and professionals in pervasive computing. Location-based services are services using the location of a mobile computing device as their primary input. While such services are fairly easy to implement outside buildings thanks to accessible global positioning systems and high-quality environmental information, the situation inside buildings is fundamentally different. In general, there is no simple way of determining the position of a moving target inside a building without an additional dedicated infrastructure. The book's structure is learning oriented, starting with a short introduction to wireless communication systems and basic positioning techniques and ending with advanced features like event detection, simultaneous localization and mapping, and privacy aspects. Readers who are not familiar with the individual topics will be able to work through the book from start to finish. At the same time all chapters are self-contained to support readers who are already familiar with some of the content and only want to pick selected topics that are of particular interest.
Max Gath presents a multiagent system for the optimization of transport logistics in highly complex and dynamic domains. The described solution dynamically optimizes processes and provides a high flexibility, scalability, robustness, and adaptability to individual customer demands. The experimental evaluation points out the effectiveness and efficiency by using the example of commonly applied benchmarks as well as two case studies in groupage traffic and in courier, express, and parcel services with same-day deliveries. Both case studies were performed with leading transport companies in Germany. The results demonstrate that the multiagent-based solution satisfies domain-specific requirements and exploits high optimization potential in real-world processes.
Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of cloud and hybrid-cloud scenarios. Many books cover how to develop applications in Oracle APEX. It's a tool with a fast-growing user-base as developers come to know how quick and easy it is to create new applications that run in a browser. However, just getting an application off the ground is only a small part of a bigger picture. Applications must be supported. They must be available when users need them. They must be robust against disaster and secure against malicious attack. These are the issues addressed in Oracle Application Express Administration. These are the issues that when tackled successfully lead to long term success in using Oracle APEX as a rapid application-development toolset. Readers of this book learn how to install the Oracle APEX engine in support of small-scale projects such as at the departmental level, and in support of enterprise-level projects accessed by thousands of users across dozens of time zones. Readers learn to take advantage of Oracle Database's underlying feature set in regards to application scalability and performance, integrity, security, high-availability, and robustness against failure and data loss. Oracle Application Express Administration also describes different cloud solutions, integration with Oracle E-Business Suite, and helps in taking advantage of multitenancy in Oracle Database 12c and beyond. Covers important enterprise considerations such as scalability, robustness, high-availability. Describes cloud-based application deployment scenarios Focuses on creating the right deployment environment for long-term success What You Will Learn Install, upgrade, and configure robust APEX environments Back up and recover APEX applications and their data Monitor and tune the APEX engine and its applications Benefit from new administration features in APEX 5.0 Run under multi-tenant architecture in Oracle Database 12c Manage the use of scarce resources with Resource Manager Secure your data with advanced security features Build high-availability into your APEX deployments Integrate APEX with Oracle E-Business Suite Who This Book Is For Architects, administrators, and developers who want to better understand how APEX works in a corporate environment. Readers will use this book to design deployment architectures around Oracle Database strengths like multi-tenancy, resource management, and high availability. The book is also useful to administrators responsible for installation and upgrade, backup and recovery, and the ongoing monitoring of the APEX engine and the applications built upon it.
One of the most significant challenges in the development of embedded and cyber-physical systems is the gap between the disciplines of software and control engineering. In a marketplace, where rapid innovation is essential, engineers from both disciplines need to be able to explore system designs collaboratively, allocating responsibilities to software and physical elements, and analyzing trade-offs between them. To this end, this book presents a framework that allows the very different kinds of design models - discrete-event (DE) models of software and continuous time (CT) models of the physical environment - to be analyzed and simulated jointly, based on common scenarios. The individual chapters provide introductions to both sides of this co-simulation technology, and give a step-by-step guide to the methodology for designing and analyzing co-models. They are grouped into three parts: Part I introduces the technical basis for collaborative modeling and simulation with the Crescendo technology. Part II continues with different methodological guidelines for creating co-models and analyzing them in different ways using case studies. Part III then delves into more advanced topics and looks into the potential future of this technology in the area of cyber-physical systems. Finally various appendices provide summaries of the VDM and 20-sim technologies, a number of valuable design patterns applicable for co-models, and an acronym list along with indices and references to other literature. By combining descriptions of the underlying theory with records of real engineers' experience in using the framework on a series of case studies the book appeals to scientists and practitioners alike. It is complemented by tools, examples, videos, and other material on www.crescendotool.org. Scientists/researchers and graduate students working in embedded and cyber-physical systems will learn the semantic foundations for collaborative modeling and simulation, as well as the current capabilities and limitations of methods and tools in this field. Practitioners will be able to develop an appreciation of the capabilities of the co-modeling techniques, to assess the benefits of more collaborative approaches to modeling and simulation, and will benefit from the included guidelines and modeling patterns.
This book provides an overview of the problems involved in engineering scalable, elastic, and cost-efficient cloud computing services and describes the CloudScale method - a description of rescuing tools and the required steps to exploit these tools. It allows readers to analyze the scalability problem in detail and identify scalability anti-patterns and bottlenecks within an application. With the CloudScale method, software architects can analyze both existing and planned IT services. The method allows readers to answer questions like: * With an increasing number of users, can my service still deliver acceptable quality of service? * What if each user uses the service more intensively? Can my service still handle it with acceptable quality of service? * What if the number of users suddenly increases? Will my service still be able to handle it? * Will my service be cost-efficient? First the book addresses the importance of scalability, elasticity, and cost-efficiency as vital quality-related attributes of modern cloud computing applications. Following a brief overview of CloudScale, cloud computing applications are then introduced in detail and the aspects that need to be captured in models of such applications are discussed. In CloudScale, these aspects are captured in instances of the ScaleDL modeling language. Subsequently, the book describes the forward engineering part of CloudScale, which is applicable when developing a new service. It also outlines the reverse and reengineering parts of CloudScale, which come into play when an existing (legacy) service is modified. Lastly, the book directly focuses on the needs of both business-oriented and technical managers by providing guidance on all steps of implementing CloudScale as well as making decisions during that implementation. The demonstrators and reference projects described serve as a valuable starting point for learning from experience. This book is meant for all stakeholders interested in delivering scalable, elastic, and cost-efficient cloud computing applications: managers, product owners, software architects and developers alike. With this book, they can both see the overall picture as well as dive into issues of particular interest.
This book addresses current technology trends and requirements leading towards the next era in mobile communication handsets; and beyond that the book proposes innovative solutions that could be candidate solutions for 5G phones. It adopts a multidisciplinary and interdisciplinary stance towards handset design, a necessary ingredient if 5th Generation handset and services are to really take-off. Therefore the scope of the book targets a broad range of subjects, including energy efficiency, RF design, cooperation, context-aware systems, roaming, and short-range networking, all of which working in synergy to provide seamless mobility and high speed connectivity within a HetNet environment. Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can introduce power savings of up to 50% on state-of-the-art. Going beyond this, a chapter on business modeling approaches is also included, based on incentive mechanisms for cooperation that will provide the necessary leverage to promote the up-take of the proposed technology.
This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology; investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices; provides guidance on biometric systems design; explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats; discusses such usage issues as collaboration frameworks, and messaging and data translation; examines the impact of biometric technologies on society, covering issues of privacy and user factors; reviews the current situation in identity management, and predicts where these trends may take us in the future.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Industrial IoT Technologies and Applications, IoT 2016, held in GuangZhou, China, in March 2016. The volume contains 26 papers carefully reviewed and selected from 55 submissions focusing on topics such as big data, cloud computing, Internet of Things (IoT).
This book constitutes the refereed proceedings of the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and the 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, held in Pisa, Italy, in September 2016.The 11 full papers and 4 short papers presented together with one invited talk were carefully reviewed and selected from 24 submissions. They are organized in the following sections: automated verification techniques; model-based system analysis; and applications and case studies.
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Frequency Identification (RFID), which helped to automate inventory, tracking and basic identification, today IoT is characterized by a dynamic trend toward connecting smart sensors, objects, devices, data and applications. The next step will be "cognitive IoT," facilitating object and data re-use across application domains and leveraging hyper-connectivity, interoperability solutions and semantically enriched information distribution. The Architectural Reference Model (ARM), presented in this book by the members of the IoT-A project team driving this harmonization effort, makes it possible to connect vertically closed systems, architectures and application areas so as to create open interoperable systems and integrated environments and platforms. It constitutes a foundation from which software companies can capitalize on the benefits of developing consumer-oriented platforms including hardware, software and services. The material is structured in two parts. Part A introduces the general concepts developed for and applied in the ARM. It is aimed at end users who want to use IoT technologies, managers interested in understanding the opportunities generated by these novel technologies, and system architects who are interested in an overview of the underlying basic models. It also includes several case studies to illustrate how the ARM has been used in real-life scenarios. Part B then addresses the topic at a more detailed technical level and is targeted at readers with a more scientific or technical background. It provides in-depth guidance on the ARM, including a detailed description of a process for generating concrete architectures, as well as reference manuals with guidelines on how to use the various models and perspectives presented to create a concrete architecture. Furthermore, best practices and tips on how system engineers can use the ARM to develop specific IoT architectures for dedicated IoT solutions are illustrated and exemplified in reverse mapping exercises of existing standards and platforms.
Over the years, medical informatics has matured into a true scientific discipline. Fundamental and applied aspects are now taught in various fields of health, including medicine, dentistry, pharmacy, nursing and public health. Medical informatics is also often included in the curricula of many other disciplines, including the life sciences, engineering and economics. Medical informatics is a complex and rapidly changing discipline. Relatively few books have been published on the subject, and they rapidly become obsolete. This book is the fruit of a collaborative effort between authors teaching medical informatics in France and others who are conducting research in this field. In addition, an international perspective was pursued, as reflected in the inclusion of various developments and actions in both the USA and Europe. This book is divided into 18 chapters, all of which include learning objectives, recommendations for further reading, exercises and bibliographic references.
This book is dedicated to Prof. Sadaaki Miyamoto and presents cutting-edge papers in some of the areas in which he contributed. Bringing together contributions by leading researchers in the field, it concretely addresses clustering, multisets, rough sets and fuzzy sets, as well as their applications in areas such as decision-making. The book is divided in four parts, the first of which focuses on clustering and classification. The second part puts the spotlight on multisets, bags, fuzzy bags and other fuzzy extensions, while the third deals with rough sets. Rounding out the coverage, the last part explores fuzzy sets and decision-making. |
![]() ![]() You may like...
Probabilistic and Causal Inference - The…
Hector Geffner, Rina Dechter, …
Hardcover
R4,211
Discovery Miles 42 110
Exploring Future Opportunities of…
Madhulika Bhatia, Tanupriya Choudhury, …
Hardcover
R7,249
Discovery Miles 72 490
Deep Learning Applications for…
Monica R. Mundada, Seema S., …
Hardcover
R7,211
Discovery Miles 72 110
Research Anthology on Artificial Neural…
Information R Management Association
Hardcover
R14,040
Discovery Miles 140 400
Research Anthology on Artificial Neural…
Information R Management Association
Hardcover
R14,050
Discovery Miles 140 500
Ontology-Based Applications for…
Mohammad Nazir Ahmad, Robert M Colomb, …
Hardcover
R4,787
Discovery Miles 47 870
|