![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
Discusses the efficiency measurement of online education Presents the environmental impact of online education Offers a parametric evaluation and categorization of online learning systems Covers big data ecosystems in cloud computing Provides analytical methods to find solutions for big data challenges
Completely revised including six new chapters, this new edition presents a more comprehensive knowledge of issues facing developers of complex products and process management. It includes more tools for implementing a Systems Engineering approach to minimize the risks of delays and cost overruns and helps create the right product for its customers. Designing Complex Products with Systems Engineering Processes and Techniques, Second Edition highlights how to increase customer satisfaction, quality, safety, and usability to meet program timings and budgets using a Systems Engineering approach. It provides decision-making considerations and models for creating sustainable product design and describes many techniques and tools used in product development and the product life-cycle orientation. The book also offers techniques used in Design for Manufacturing, Design for Assembly, and product evaluation methods for verification and validation testing. Many new examples, case studies, six new chapters, and updated program and data charts held on our website are offered. The book targets practicing engineers, engineering management personnel, product designers, product planners, product and program managers in all industrialized and developing countries. In addition the book is also useful to undergraduate, graduate students, and faculty in engineering, product design, and product project and program management.
This open access book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) presented at the SPPEXA Symposium in Dresden during October 21-23, 2019. In that respect, it both represents a continuation of Vol. 113 in Springer's series Lecture Notes in Computational Science and Engineering, the corresponding report of SPPEXA's first funding phase, and provides an overview of SPPEXA's contributions towards exascale computing in today's sumpercomputer technology. The individual chapters address one or more of the research directions (1) computational algorithms, (2) system software, (3) application software, (4) data management and exploration, (5) programming, and (6) software tools. The book has an interdisciplinary appeal: scholars from computational sub-fields in computer science, mathematics, physics, or engineering will find it of particular interest.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
In the past few decades Computer Hardware Description Languages (CHDLs) have been a rapidly expanding subject area due to a number of factors, including the advancing complexity of digital electronics, the increasing prevalence of generic and programmable components of software-hardware and the migration of VLSI design to high level synthesis based on HDLs. Currently the subject has reached the consolidation phase in which languages and standards are being increasingly used, at the same time as the scope is being broadened to additional application areas. This book presents the latest developments in this area and provides a forum from which readers can learn from the past and look forward to what the future holds.
This volume in the Business Analysis Professional Development Series by leading expert and keynote speaker Jamie Champagne is the second edition of our number #1 best seller. It is an instructional text that will help relatively new analysts, and those expected who do business analysis work in addition to their main role, build their skill sets, master the essentials, and advance their careers. Since the content is aligned with the consensus-based business analysis standards of both the Project Management Institute (PMI) and the International Institute of Business Analysis (IIBA), as articulated in their respective guides and bodies of knowledge, this book continues to be an excellent reference for the PMI-PBA, ECBA, CCBA, and CBAP certification exams. Seven Steps to Mastering Business Analysis, 2nd Edition, presents detailed explanations of business analysis concepts, terms, tasks, and techniques, and includes examples to help readers understand how to apply them to real-world situations. It also delineates the key activities that are core to the BA role and the diverse range of activities analysts perform based on their career competency level, ranging from problem solving and identification of business opportunities, to complex systems thinking and solution development, to strategic planning and change management. Even for those not interested in certification, like its first edition, this guide is a must-have reference for BA generalists, specialists, and hybrids at every career level and industry segment or perspective. Key Features: Helps new and experienced BAs, as well as project managers, system analysts, product managers and many others doing analysis work, master the skill sets essential to successful business analysis Supplies a clear definition of the business analysis role and insights on how to approach analysis work to help deliver successful solutions Brings needed attention to the significant value those performing the BA role are delivering to all areas of organizations today in the form of change efforts and in project-based work focused on elicitation, analysis, validation, problem solving, and solution delivery Articulates numerous techniques and approaches for learning the business you are working in and gaining an understanding of the technology environment regardless of your background Walks readers through the business case process for gaining support and initiating projects and change efforts Details techniques for successful requirements elicitation, analysis, and validation and how to successfully plan your approach to delivering high-quality business analysis deliverables Explains the current frameworks used for change and project-based work and offers suggestions on how to select the best approach/technique from the various analysis work methodologies Discusses why and how organizations approach change efforts through projects and the added value analysts can provide in helping project-based work be successful beyond the scope of the project Shows BAs how to work with stakeholders, approach them and identify what they need, build successful working relationships, and communicate and present deliverables Provides guidance relevant to BAs at every career level on how to plan, measure, and continuously improve your business analysis work and skill sets Examines the ideal traits, professional attributes, and skills of those most likely to be successful in the role to help aspiring BAs determine if it is a good fit for them and those hiring or managing BAs
Complex high-technology devices are in growing use in industry, service sectors, and everyday life. Their reliability and maintenance is of utmost importance in view of their cost and critical functions. This book focuses on this theme and is intended to serve as a graduate-level textbook and reference book for scientists and academics in the field. The chapters are grouped into five complementary parts that cover the most important aspects of reliability and maintenance: stochastic models of reliability and maintenance, decision models involving optimal replacement and repair, stochastic methods in software engineering, computational methods and simulation, and maintenance management systems. This wide range of topics provides the reader with a complete picture in a self-contained volume.
This book statistically confirms that complexity and changing technologies that affect the way operators interact within the systems of the nuclear facili-ties exacerbate the severity of incidents caused by human error and details the application of the systems engineering process to reduce human error given industries' rapidly advancing technology. Technology, Human Performance, and Nuclear Facilities: A Systems Engineering Approach to Reduce Human Error provides a basic understand-ing of Human Error/ P erformance and its relation to industrial operations and advancing technologies incorporated into facilities. The book discusses the context surrounding the complexity of changing technologies at nuclear facili-ties and the potential worsening of problems caused by human error when technology advancements concerning operator interaction with control sys-tems are implemented. It presents how to reduce human error propensity given the incorporation of advanced technology and covers ways to reduce human error using the systems engineering process. Also offered are several concepts related to the operator's involvement in the systems engineering process and the human performance integration with system operational requirements and system testing, evaluation, and validation, and the procedures and training development in the systems engineering process. This book presents empirical evidence for the importance of human performance management in the con-text of nuclear facilities and offers practical recommendations for the improve-ment of this function. Systems engineers, plant/ design engineers, the nuclear industry, plant operations management, and those involved in industrial and nuclear safety will find something of interest in this book.
This book will be the first to discuss this new developing and exciting topic -- Robustness of Network of Networks -- which can be regarded as a second revolution in network science
Visual Perception and Control of Underwater Robots covers theories and applications from aquatic visual perception and underwater robotics. Within the framework of visual perception for underwater operations, image restoration, binocular measurement, and object detection are addressed. More specifically, the book includes adversarial critic learning for visual restoration, NSGA-II-based calibration for binocular measurement, prior knowledge refinement for object detection, analysis of temporal detection performance, as well as the effect of the aquatic data domain on object detection. With the aid of visual perception technologies, two up-to-date underwater robot systems are demonstrated. The first system focuses on underwater robotic operation for the task of object collection in the sea. The second is an untethered biomimetic robotic fish with a camera stabilizer, its control methods based on visual tracking. The authors provide a self-contained and comprehensive guide to understand underwater visual perception and control. Bridging the gap between theory and practice in underwater vision, the book features implementable algorithms, numerical examples, and tests, where codes are publicly available. Additionally, the mainstream technologies covered in the book include deep learning, adversarial learning, evolutionary computation, robust control, and underwater bionics. Researchers, senior undergraduate and graduate students, and engineers dealing with underwater visual perception and control will benefit from this work.
This book surveys recent applications of inspection models, maintenance models and cumulative damage models, as well as discusses the policies involved with these models. It explains how a stochastic approach can be applied to systems using real-world examples. The book begins by introducing and summarizing standard inspection models. It dedicates chapters to random inspection models and general inspection models, before moving on to discuss inspection policies and checkpoint models. The book discusses inspection of reliability systems, such as missile maintenance systems, as well as Markov models of inspection. The book concludes with a summary of other inspection models, problems they face, and solutions to these problems. Each chapter utilizes examples to illustrate the various models, methods, and policies. This book is of interest to engineering students, researchers, and design and production engineers working in system manufacturing.
Component-Based Software Engineering (CBSE) is becoming one of the
great concerns of researchers and practitioners within the academic
areas of computer science and the software industry. After the
focus on object-oriented programming, design and modelling during
the 90's, reuse and reusability of software entities is nowadays
slowed down by new factors. The size of components, their
deployment capability, their compatibility and interoperability
features in order to be incorporated into heterogeneous cooperative
environments, their faults tolerance, and above all, their ability
to fulfill performance conditions, are critical expectations of
software engineers.
Control systems are an integral aspect of modern society and exist across numerous domains and applications. As technology advances more and more, the complexity of such systems continues to increase exponentially. Model-Based Design for Effective Control System Development is a critical source of scholarly information on model-centric approaches and implementations for control and other similar dynamic systems. Highlighting innovative topics such as configuration management, controllability analysis, and modeling requirements, this book is ideally designed for engineers, researchers, academics, project managers, and professionals interested in the design of embedded control systems.
Dependence Analysis may be considered to be the second edition of the author's 1988 book, Dependence Analysis for Supercomputing. It is, however, a completely new work that subsumes the material of the 1988 publication. This book is the third volume in the series Loop Transformations for Restructuring Compilers. This series has been designed to provide a complete mathematical theory of transformations that can be used to automatically change a sequential program containing FORTRAN-like do loops into an equivalent parallel form. In Dependence Analysis, the author extends the model to a program consisting of do loops and assignment statements, where the loops need not be sequentially nested and are allowed to have arbitrary strides. In the context of such a program, the author studies, in detail, dependence between statements of the program caused by program variables that are elements of arrays. Dependence Analysis is directed toward graduate and undergraduate students, and professional writers of restructuring compilers. The prerequisite for the book consists of some knowledge of programming languages, and familiarity with calculus and graph theory. No knowledge of linear programming is required.
This book examines the interplay between IT solutions and specific management methods in organizations. In particular, it assesses the impact of IT reliability on factors like employees' commitment and organizational performance. After developing the necessary theoretical foundation, the book presents a framework for aligning IT solutions with a number of specific management methods in organizations. In addition, it demonstrates the extent to which IT reliability can be an indicator for this alignment, and discusses the impact on employees' commitment and organizational performance under various management methods. Case studies from organizations in Switzerland and Poland help to illustrate the findings. In closing, the book presents roadmaps for improving IT and business alignment so as to achieve higher commitment and better results.
This book presents the proceedings of the 10th International Parallel Tools Workshop, held October 4-5, 2016 in Stuttgart, Germany - a forum to discuss the latest advances in parallel tools. High-performance computing plays an increasingly important role for numerical simulation and modelling in academic and industrial research. At the same time, using large-scale parallel systems efficiently is becoming more difficult. A number of tools addressing parallel program development and analysis have emerged from the high-performance computing community over the last decade, and what may have started as collection of small helper script has now matured to production-grade frameworks. Powerful user interfaces and an extensive body of documentation allow easy usage by non-specialists.
This book offers an accessible guide to ubiquitous computing, with an emphasis on pervasive networking. It addresses various technical obstacles, such as connectivity, levels of service, performance, reliability and fairness. The focus is on describing currently available off-the-shelf technologies, novel algorithms and techniques in areas such as: underwater sensor networks, ant colony based routing, heterogeneous networks, agent based distributed networks, cognitive radio networks, real-time WSN applications, machine translation, intelligent computing and ontology based bit masking. By introducing the core topics and exploring assistive pervasive systems that draw on pervasive networking, the book provides readers with a robust foundation of knowledge on this growing field of research. Written in a straightforward style, the book is also accessible to a broad audience of researchers and designers who are interested in exploring pervasive computing further.
This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.
Computational Intelligence for Wireless Sensor Networks: Principles and Applications provides an integrative overview of the computational intelligence (CI) in wireless sensor networks and enabled technologies. It aims to demonstrate how the paradigm of computational intelligence can benefit Wireless Sensor Networks (WSNs) and sensor-enabled technologies to overcome their existing issues. This book provides extensive coverage of the multiple design challenges of WSNs and associated technologies such as clustering, routing, media access, security, mobility, and design of energy-efficient network operations. It also describes various CI strategies such as fuzzy computing, evolutionary computing, reinforcement learning, artificial intelligence, swarm intelligence, teaching learning-based optimization, etc. It also discusses applying the techniques mentioned above in wireless sensor networks and sensor-enabled technologies to improve their design. The book offers comprehensive coverage of related topics, including: Emergence of intelligence in wireless sensor networks Taxonomy of computational intelligence Detailed discussion of various metaheuristic techniques Development of intelligent MAC protocols Development of intelligent routing protocols Security management in WSNs This book mainly addresses the challenges pertaining to the development of intelligent network systems via computational intelligence. It provides insights into how intelligence has been pursued and can be further integrated in the development of sensor-enabled applications.
In this book, the authors write about creativity in teaching and how to enhance creativity in learners. They highlight the new reality of teaching and learning in the digital era, specifically the impact of artificial intelligence, data economy, and artificial minds on modern teaching practices, curriculum design, and the role of teachers in classrooms. Creativity in Teaching and Teaching for Creativity: Modern Practices in the Digital Era approaches human intelligence as a universal gift. It emphasizes that the creativity of human beings is not only a natural quality, but one that can be enhanced as a result of learning. The book suggests new teaching models and approaches and discusses how the role of teachers in the classroom has fundamentally changed, emphasizing the emotional connection between students and teachers. The book will find interest among higher education policymakers who believe in the transformation of the education industry, research scholars who are pursuing their Ph.D. in the fields of education technology and education and learning, as well as those working in the area of education technology and artificial intelligence.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: * Discusses the recent advancements in Digital Forensics and Cybersecurity * Reviews detailed applications of Digital Forensics for real-life problems * Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches * Includes case studies that will be helpful for researchers * Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. * Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
|
![]() ![]() You may like...
Common Wealth, Common Good - The…
Benedict Wagner-Rundell
Hardcover
Complexity and Randomness in Group…
Frederique Bassino, Ilya Kapovich, …
Hardcover
R4,634
Discovery Miles 46 340
|