![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book is a compilation of research accomplishments in the fields of modeling, simulation, and their applications, as presented at AsiaSim 2011 (Asia Simulation Conference 2011). The conference, held in Seoul, Korea, November 16-18, was organized by ASIASIM (Federation of Asian Simulation Societies), KSS (Korea Society for Simulation), CASS (Chinese Association for System Simulation), and JSST (Japan Society for Simulation Technology). AsiaSim 2011 provided a forum for scientists, academicians, and professionals from the Asia-Pacific region and other parts of the world to share their latest exciting research findings in modeling and simulation methodologies, techniques, and their tools and applications in military, communication network, industry, and general engineering problems.
Formal Techniques in Real-Time and Fault-Tolerant Systems focuses on the state of the art in formal specification, development and verification of fault-tolerant computing systems. The term `fault-tolerance' refers to a system having properties which enable it to deliver its specified function despite (certain) faults of its subsystem. Fault-tolerance is achieved by adding extra hardware and/or software which corrects the effects of faults. In this sense, a system can be called fault-tolerant if it can be proved that the resulting (extended) system under some model of reliability meets the reliability requirements. The main theme of Formal Techniques in Real-Time and Fault-Tolerant Systems can be formulated as follows: how do the specification, development and verification of conventional and fault-tolerant systems differ? How do the notations, methodology and tools used in design and development of fault-tolerant and conventional systems differ? Formal Techniques in Real-Time and Fault-Tolerant Systems is divided into two parts. The chapters in Part One set the stage for what follows by defining the basic notions and practices of the field of design and specification of fault-tolerant systems. The chapters in Part Two represent the `how-to' section, containing examples of the use of formal methods in specification and development of fault-tolerant systems. The book serves as an excellent reference for researchers in both academia and industry, and may be used as a text for advanced courses on the subject.
Sir Isaac Newton's philosophi Naturalis Principia Mathematica'(the Principia) contains a prose-style mixture of geometric and limit reasoning that has often been viewed as logically vague. In A Combination of Geometry Theorem Proving and Nonstandard Analysis, Jacques Fleuriot presents a formalization of Lemmas and Propositions from the Principia using a combination of methods from geometry and nonstandard analysis. The mechanization of the procedures, which respects much of Newton's original reasoning, is developed within the theorem prover Isabelle. The application of this framework to the mechanization of elementary real analysis using nonstandard techniques is also discussed.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
The combination of VLSI process technology and real-time digital signal processing (DSP) has brought a break-through in information technology. This rapid technical (r)evolution allows the integration of ever more complex systems on a single chip. However, these technology and integration advances have not been matched by an increase in design productivity, causing technology to leapfrog the design of integrated circuits (ICs). The success of these emerging 'systems-on-a-chip' (SOC) can only be guaranteed by a systematic and formal design methodology, possibly automated in computer-aided design (CAD) tools, and effective re-use of existing intellectual property (IP). In this book, a contribution is made to the modeling, timing verification and analysis, and the automatic synthesis of integrated real-time DSP systems. Existing literature in these three domains is extensively reviewed, making this book the first to give a comprehensive overview of existing techniques.The emphasis throughout the book is on the support and guaranteeing of the real-time aspect and constraints of these systems, which avoids time consuming design iterations and safeguards the ever shrinking time-to-market. The proposed 'Multi-Thread Graph' (MTG) system model features two-layers, unifying a (timed) Petri net and a control-data flow graph. Its unique interface between both models offers the best of two worlds and introduces an extra abstraction level hiding the operation-level details which are unnecessary during global system exploration. The formulated timing analysis and verification approach supports the calculation of temporal separation between different MTG entities as well as realistic performance metrics for highly concurrent systems. The synthesis methodology focuses on managing the task-level concurrency (i.e. task scheduling), as part of a proposed overall system design meta flow. It emphasizes performance and timing aspects ('timeliness'), while minimizing processor cost overhead as driven by high-level cost estimators.The approach is new in the abstraction level it employs, and in its optimal hybrid dynamic/static scheduling policy which, driven by cost estimators, selects the scheduling policy for each behavior. At the low-level, RTOS synthesis generates an application-specific scheduler for the software component. The proposed synthesis methodology (at the task-level) is asserted to yield most optimal results when employed before the hardware/software partition is made. At this level, the distinction between these two is minimal, such that all steps in the design trajectory can be shared, thereby reducing the system cost significantly and allowing tighter satisfaction of timing/performance constraints. From the Foreword: This book is the first comprehensive treatment of software, and more general, system, generation (synthesis) techniques based on formal models. It can be used as a very valuable reference to understand the development of the field of embedded software design, and of system design and synthesis in general. The book offers an invaluable help to researchers and practitioners of the field of embedded system design. Prof. Alberto Sangiovanni-Vincentelli, Edgar L. and Harold H.Buttner Professor of Electrical Engineering and Computer Science, University of California, Berkeley, Chief Technology Advisor, Cadence Design Systems.
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. They are organized in topical sections on wireless sensor networks, routing, applications and security.
Representations of humans in virtual environments are called Avatars. This book brings together work from a variety of relevant disciplines to detail how humans interact in computer-generated environments. It contains contributions from several key people in the field, including Microsoft Researchs Virtual World Group, and presents their findings in a way that is accessible to readers who are new to the field. Coverage details Internet-based virtual worlds that have been widely used by the public as well as networked VR systems that have been primarily used in pilot studies and research.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
Reliability, Maintainability, and Supportability play a crucial role in achieving a competitive product. While manufacturing costs are important for the success of a product, they are not the sole domains in realizing its competitive edge. Improved manufacturing and operating quality and performance coupled with reduced acquisition cost and in-service cost of ownership are important in achieving business success. It is the early phase of design which offers the greatest opportunity to address these requirements, and thus create life cycle effectiveness. The main objective of Reliability, Maintenance and Logistic Support - A Life Cycle Approach is to provide an integrated approach to reliability, maintainability, maintenance and logistic support analysis. We not only look at the ways we can improve the design process to ensure the product offers value for money, but we also consider how the owners can get the most from these products once they have entered service. The approach provides a meaningful way of integrating reliability, maintenance and supportability to enhance the product performance and sales opportunities. Hence, the book covers the following objectives: (1) Introduce the concepts of reliability, maintainability and supportability and their role in the system life cycle and effectiveness. (2) Introduce the basic probability and statistical techniques that are essential for modelling reliability, maintainability and supportability problems. (3) Introduce reliability measures: how to predict them; how to determine from in-service real-world data; how to use them. (4) Analysis of advanced models in Reliability. (5) Discuss basic and advanced concepts in both maintainability and maintenance including preventive, corrective and condition based maintenance. (6) Discuss maintenance management and optimization concepts, such as reliability-centered maintenance and age-related maintenance. (7) Provide basic concepts in supportability and Integrated logistic support. (8) Discuss techniques for design for reliability, maintainability and supportability. (9) Analysis of simple and advanced models in spares forecasting and optimization. (10) Discuss data analysis, data management and data mining techniques.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robotics for rehabilitation and assistance; mechatronics and integration technology in electronics and information devices fabrication; man-machine interactions; manufacturing; micro and nano systems; mobile robots and intelligent autonomous systems; motion control; multi-agent systems and distributed control; and multi-sensor data fusion algorithms.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Programming Multi-Agents Systems held in Valencia, Spain, in June 2012. The 10 revised full papers presented were carefully selected from 14 submissions covering a wide range of topics in multi-agent system programming languages, including language design and efficient implementation, agent communication, and robot programming. I addition to these regular papers, the volume includes six papers from the Multi-Agent programming Contest 2012 (MAPC).
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robot actuators and sensors; robot design, development and control; robot intelligence, learning and linguistics; robot mechanism and design; robot motion analysis and planning; robotic vision, recognition and reconstruction; and planning and navigation.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of adaptive control systems; automotive systems; estimation and identification; intelligent visual systems; application of differential geometry in robotic mechanisms; unmanned systems technologies and applications; new development on health management, fault diagnosis, and fault-tolerant control; biomechatronics; intelligent control of mechanical and mechatronic systems.
A straightforward introduction to basic concepts and methodologies for digital photoelasticity, providing a foundation on which future researchers and students can develop their own ideas. The book thus promotes research into the formulation of problems in digital photoelasticity and the application of these techniques to industries. In one volume it provides data acquisition by DIP techniques, its analysis by statistical techniques, and its presentation by computer graphics plus the use of rapid prototyping technologies to speed up the entire process. The book not only presents the various techniques but also provides the relevant time-tested software codes. Exercises designed to support and extend the treatment are found at the end of each chapter.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and operating system level are presented. A primary concern at these levels is balancing cost and performance against coverage and overall dependability. As these chapters demonstrate, low overhead, practical solutions are attainable and not necessarily incompatible with performance considerations. The section on innovative compiler support, in particular, demonstrates how the benefits of application specificity may be obtained while reducing hardware cost and run-time overhead. A companion to this volume (published by Kluwer) subtitled Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. Another companion to this book (published by Kluwer), subtitled Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book subtitled System Implementation, these approaches demonstrate how dependability may be tuned to the requirements of an application, the fault environment, and the characteristics of the target platform. Three classes of paradigms are considered: protocol-based paradigms for distributed applications, algorithm-based paradigms for parallel applications, and approaches to exploiting application semantics in embedded real-time control systems.
This two volumes set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. A companion to this book (published by Kluwer), subtitled Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book subtitled System Implementation, these approaches demonstrate how dependability may be tuned to the requirements of an application, the fault environment, and the characteristics of the target platform. Three classes of paradigms are considered: protocol-based paradigms for distributed applications, algorithm-based paradigms for parallel applications, and approaches to exploiting application semantics in embedded real-time control systems. Another companion book (published by Kluwer) subtitled System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and operating system level are presented. A primary concern at these levels is balancing cost and performance against coverage and overall dependability. As these chapters demonstrate, low overhead, practical solutions are attainable and not necessarily incompatible with performance considerations. The section on innovative compiler support, in particular, demonstrates how the benefits of application specificity may be obtained while reducing hardware cost and run-time overhead.
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.
On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.
Modern electronics is driven by the explosive growth of digital communications and multi-media technology. A basic challenge is to design first-time-right complex digital systems, that meet stringent constraints on performance and power dissipation. In order to combine this growing system complexity with an increasingly short time-to-market, new system design technologies are emerging based on the paradigm of embedded programmable processors. This concept introduces modularity, flexibility and re-use in the electronic system design process. However, its success will critically depend on the availability of efficient and reliable CAD tools to design, programme and verify the functionality of embedded processors. Recently, new research efforts emerged on the edge between software compilation and hardware synthesis, to develop high-quality code generation tools for embedded processors. Code Generation for Embedded Systems provides a survey of these new developments. Although not limited to these targets, the main emphasis is on code generation for modern DSP processors. Important themes covered by the book include: the scope of general purpose versus application-specific processors, machine code quality for embedded applications, retargetability of the code generation process, machine description formalisms, and code generation methodologies. Code Generation for Embedded Systems is the essential introduction to this fast developing field of research for students, researchers, and practitioners alike.
1.1 Scope This paper deals with the following subjects: 1. Introduction 2. Feasibility study definition in IT 3. Forming a feasibility study team 4. The feasibility study work 5. The feasibility study report 6. Discussion 1.2 Information Technology (IT) Information was defined as anything sensed by at least one of the human senses and that may change the level of his knowledge. The information may be true or false, sent by premeditation or generated by coincidence, needed by the interceptor or intended to create new needs. The creation of the information may be very costly or free of charge. The information may be an essential need or just a luxury. Each information may be a one shot nature, eg., announcing a marriage, or a constant update need one, eg., news. Information technology as defined herein means all the types of systems needed to deal wi.th the information, transfer it to any place, store it, adapt it, etc. Information technology is usually bused on Telecommunications. Telecommunications means a large variety of possibilities. Usually, the IT's are based on the creation, updating, processing and transmission of information. The information itself is usually alphanumeric and graphic. Gradually, there is a tendency to step over to what is seen as more natural information, audio and visual. |
You may like...
Probabilistic Nodes Combination (PNC…
Dariusz Jacek Jakobczak
Hardcover
R4,406
Discovery Miles 44 060
Data Structures and Abstractions with…
Timothy Henry, Frank Carrano
Paperback
R2,394
Discovery Miles 23 940
VLSI-SoC: Forward-Looking Trends in IC…
Jose L. Ayala, David Atienza Alonso, …
Hardcover
R1,455
Discovery Miles 14 550
Routing Algorithms in Networks-on-Chip
Maurizio Palesi, Masoud Daneshtalab
Hardcover
R4,882
Discovery Miles 48 820
A Student Guide to Object-Oriented…
Carol Britton, Jill Doake
Paperback
R1,398
Discovery Miles 13 980
|