![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing in such models or of information acquired from IoT technologies. The proposed software architectures are presented in the form of design patterns. This information fusion will facilitate many novel application fields ranging from emergency response, to urban monitoring and surveillance, and to smart buildings. The book consists of 8 chapters. The first 2 chapters focus on the basics of BIMs, while chapter 3 presents fundamental service-oriented architecture patterns for complex information models. Subsequently, chapters 4 and 5 elaborate on the hardware and software side of IoT, with a special focus on their use for BIMs. Chapter 6 provides advanced SOA patterns for BIMs, while chapter 7 details patterns for IoT, and for BIM and IoT information fusion. Lastly, chapter 8 summarizes the work and provides an outlook on promising future developments. Overall, the book will be beneficial for researchers and developers in the fields of building information models, IoT applications, and systems integration.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.
This book constitutes the refereed post-conference proceedings of the International Conference on Machine Learning and Intelligent Communications, MLICOM 2016, held in Shanghai, China in August 2016. The 41 revised full papers were carefully reviewed and selected from 47 submissions. The papers are organized thematically: data mining in heterogeneous networks, decentralized learning for wireless communication systems, intelligent cooperative/distributed coding, intelligent cooperative networks, Intelligent massive MIMO, time coded multi-user MIMO System based on three dimensional complementary codes, intelligent positioning and navigation systems, intelligent spectrum allocation schemes, machine learning algorithm & cognitive radio networks, machine learning for multimedia.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360 Degrees 2015, held in Rome, Italy, in October 2015. The IoT 360 Degrees is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360 Degrees 2015, held in Rome, Italy, in October 2015. The IoT 360 Degrees is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.
This book constitutes the proceedings of the Third International Conference on Internet of Things (IoT) Technologies for HealthCare, HealthyIoT 2016, held in Vasteras, Sweden, October 18-19, 2016. The conference also included the First Workshop on Emerging eHealth through Internet of Things (EHIoT 2016). IoT as a set of existing and emerging technologies, notions and services provides many solutions to delivery of electronic healthcare, patient care, and medical data management. The 31 revised full papers presented along with 9 short papers were carefully reviewed and selected from 43 submissions in total. The papers cover topics such as healthcare support for the elderly, real-time monitoring systems, security, safety and communication, smart homes and smart caring environments, intelligent data processing and predictive algorithms in e-Health, emerging eHealth IoT applications, signal processing and analysis, and smartphones as a healthy thing.
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Personal Satellite Services, PSATS 2014, held in Genova, Italy, in July 2014. The 10 revised full papers presented were carefully reviewed and present the latest advances in the next generation satellite networking and communication systems.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Industrial IoT Technologies and Applications, IoT 2016, held in GuangZhou, China, in March 2016. The volume contains 26 papers carefully reviewed and selected from 55 submissions focusing on topics such as big data, cloud computing, Internet of Things (IoT).
Over the years, medical informatics has matured into a true scientific discipline. Fundamental and applied aspects are now taught in various fields of health, including medicine, dentistry, pharmacy, nursing and public health. Medical informatics is also often included in the curricula of many other disciplines, including the life sciences, engineering and economics. Medical informatics is a complex and rapidly changing discipline. Relatively few books have been published on the subject, and they rapidly become obsolete. This book is the fruit of a collaborative effort between authors teaching medical informatics in France and others who are conducting research in this field. In addition, an international perspective was pursued, as reflected in the inclusion of various developments and actions in both the USA and Europe. This book is divided into 18 chapters, all of which include learning objectives, recommendations for further reading, exercises and bibliographic references.
This book addresses current technology trends and requirements leading towards the next era in mobile communication handsets; and beyond that the book proposes innovative solutions that could be candidate solutions for 5G phones. It adopts a multidisciplinary and interdisciplinary stance towards handset design, a necessary ingredient if 5th Generation handset and services are to really take-off. Therefore the scope of the book targets a broad range of subjects, including energy efficiency, RF design, cooperation, context-aware systems, roaming, and short-range networking, all of which working in synergy to provide seamless mobility and high speed connectivity within a HetNet environment. Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can introduce power savings of up to 50% on state-of-the-art. Going beyond this, a chapter on business modeling approaches is also included, based on incentive mechanisms for cooperation that will provide the necessary leverage to promote the up-take of the proposed technology.
This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Symposium on Computer Music Modeling and Retrieval, CMMR 2013, held in Marseille, France, in October 2013. The 38 conference papers presented were carefully reviewed and selected from 94 submissions. The chapters reflect the interdisciplinary nature of this conference with following topics: augmented musical instruments and gesture recognition, music and emotions: representation, recognition, and audience/performers studies, the art of sonification, when auditory cues shape human sensorimotor performance, music and sound data mining, interactive sound synthesis, non-stationarity, dynamics and mathematical modeling, image-sound interaction, auditory perception and cognitive inspiration, and modeling of sound and music computational musicology.
This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing Paradigms for Mental Health, MindCare 2015, held in Milan, Italy, in September 2015. The 23 full papers and 6 short papers presented were carefully reviewed and selected from 40 submissions. The papers deal with the use of technologies in favor of maintaining and improving mental wellbeing. They focus on building new computing paradigms and on addressing a multitude of challenges in mental healthcare, for example in psychiatric and psychological domains with emphasis on new technologies, such as video and audio technologies and mobile and wearable computing.
Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.
This book constitutes the proceedings of the 13th International Workshop on Knowledge Management and Acquisition for Intelligent Systems, PKAW 2014, held in Gold Cost, Qld, Australia, in December 2014. The 18 full papers and 4 short papers included in this volume were carefully reviewed and selected from 69 initial submissions. They deal with knowledge acquisition, expert systems, intelligent agents, ontology engineering, foundations of artificial intelligence, machine learning, data mining, Web mining, information systems, Web and other applications.
It is widely acknowledged that the cost of validation and testing comprises a s- nificant percentage of the overall development costs for electronic systems today, and is expected to escalate sharply in the future. Many studies have shown that up to 70% of the design development time and resources are spent on functional verification. Functional errors manifest themselves very early in the design flow, and unless they are detected up front, they can result in severe consequence- both financially and from a safety viewpoint. Indeed, several recent instances of high-profile functional errors (e. g. , the Pentium FDIV bug) have resulted in - creased attention paid to verifying the functional correctness of designs. Recent efforts have proposed augmenting the traditional RTL simulation-based validation methodology with formal techniques in an attempt to uncover hard-to-find c- ner cases, with the goal of trying to reach RTL functional verification closure. However, what is often not highlighted is the fact that in spite of the tremendous time and effort put into such efforts at the RTL and lower levels of abstraction, the complexity of contemporary embedded systems makes it difficult to guarantee functional correctness at the system level under all possible operational scenarios. The problem is exacerbated in current System-on-Chip (SOC) design meth- ologies that employ Intellectual Property (IP) blocks composed of processor cores, coprocessors, and memory subsystems. Functional verification becomes one of the major bottlenecks in the design of such systems.
This book constitutes the proceedings of the First International Conference on Physiological Computing Systems, PhyCS 2014, held in Lisbon, Portugal, in January 2014. The 10 papers presented in this volume were carefully reviewed and selected from 52 submissions. They are organized in topical sections named: methodologies and methods; devices; applications; and human factors.
In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
This book constitutes the proceedings of the First International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2015, held in Ohrid, Republic of Macedonia, in September 2015. The 39 revised papers cover the broad areas of future wireless networks, ambient and assisted living, smart infrastructures and security and reflect the fast developing and vibrant penetration of IoT technologies in diverse areas of human live. |
You may like...
Secure Broadcast Communication - In…
Adrian Perrig, J. D. Tygar
Hardcover
R2,779
Discovery Miles 27 790
Security in the Information Society…
M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi, …
Hardcover
R4,335
Discovery Miles 43 350
|