![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
The IoT topology defines the way various components communicate with each other within a network. Topologies can vary greatly in terms of security, power consumption, cost, and complexity. Optimizing the IoT topology for different applications and requirements can help to boost the network's performance and save costs. More importantly, optimizing the topology robustness can ensure security and prevent network failure at the foundation level. In this context, this book examines the optimization schemes for topology robustness in the IoT, helping readers to construct a robustness optimization framework, from self-organizing to intelligent networking. The book provides the relevant theoretical framework and the latest empirical research on robustness optimization of IoT topology. Starting with the self-organization of networks, it gradually moves to genetic evolution. It also discusses the application of neural networks and reinforcement learning to endow the node with self-learning ability to allow intelligent networking. This book is intended for students, practitioners, industry professionals, and researchers who are eager to comprehend the vulnerabilities of IoT topology. It helps them to master the research framework for IoT topology robustness optimization and to build more efficient and reliable IoT topologies in their industry.
This book surveys reliability, availability, maintainability and safety (RAMS) analyses of various engineering systems. It highlights their role throughout the lifecycle of engineering systems and explains how RAMS activities contribute to their efficient and economic design and operation. The book discusses a variety of examples and applications of RAMS analysis, including: * software products; * electrical and electronic engineering systems; * mechanical engineering systems; * nuclear power plants; * chemical and process plants and * railway systems. The wide-ranging nature of the applications discussed highlights the multidisciplinary nature of complex engineering systems. The book provides a quick reference to the latest advances and terminology in various engineering fields, assisting students and researchers in the areas of reliability, availability, maintainability, and safety engineering.
Constructing the Infrastructure for the Knowledge Economy: Methods and Tools, Theory and Practice is the proceedings of the 12th International Conference on Information Systems Development, held in Melbourne, Australia, August 29-31, 2003. The purpose of these proceedings is to provide a forum for research and practice addressing current issues associated with Information Systems Development (ISD). ISD is undergoing dramatic transformation; every day, new technologies, applications, and methods raise the standards for the quality of systems expected by organizations as well as end users. All are becoming more dependent on the systems reliability, scalability, and performance. Thus, it is crucial to exchange ideas and experiences, and to stimulate exploration of new solutions. This proceedings provides a forum for just that, addressing both technical and organizational issues.
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services. Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book: Introduces a new location-based access control model Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest Addresses the problem of location-based access control in the context of privacy protection Presents a layered architecture of context-aware middleware Considers the development of assistive technology solutions for the blind or visually impaired Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.
Functional and Object-Oriented Analysis & Design: An Integrated Methodology teaches students of information systems, software engineering, computer science and related areas how to analyze and design information systems using the FOOM methodology. FOOM combines the object-oriented approach and the functional (process-oriented) approach. It makes a clear distinction between the analysis and design development phases, and enables a smooth transition from the former to the latter. The methodology in ""Functional and Object-Oriented Analysis & Design: An Integrated Methodolgy"" is very structured. As a result, it provides step-by-step guidelines on what to do and how to do each of the analysis and design activities. Many examples make the learning and utilization of the methodology easy.
People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it's a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects
The book describes a fundamentally new approach to software dependability, considering a software system as an ever-changing system due to changes in service objectives, users' requirements, standards and regulations, and to advances in technology. Such a system is viewed as an Open System since its functions, structures, and boundaries are constantly changing. Thus, the approach to dependability is called Open Systems Dependability. The DEOS technology realizes Open Systems Dependability. It puts more emphasis on stakeholders' agreement and accountability achievement for business/service continuity than in elemental technologies.
The Art and Science of Analyzing Software Data provides valuable information on analysis techniques often used to derive insight from software data. This book shares best practices in the field generated by leading data scientists, collected from their experience training software engineering students and practitioners to master data science. The book covers topics such as the analysis of security data, code reviews, app stores, log files, and user telemetry, among others. It covers a wide variety of techniques such as co-change analysis, text analysis, topic analysis, and concept analysis, as well as advanced topics such as release planning and generation of source code comments. It includes stories from the trenches from expert data scientists illustrating how to apply data analysis in industry and open source, present results to stakeholders, and drive decisions.
Systems development is the process of creating and maintaining information systems, including hardware, software, data, procedures and people. It combines technical expertise with business knowledge and management skill. This practical book provides a comprehensive introduction to the topic and can also be used as a handy reference guide. It discusses key elements of systems development and is the only textbook that supports the BCS Certificate in Systems Development.
Your customers want rock-solid, bug-free software that does exactly what they expect it to do. Yet they can't always articulate their ideas clearly enough for you to turn them into code. You need Cucumber: a testing, communication, and requirements tool-all rolled into one. All the code in this book is updated for Cucumber 2.4, Rails 5, and RSpec 3.5. Express your customers' wild ideas as a set of clear, executable specifications that everyone on the team can read. Feed those examples into Cucumber and let it guide your development. Build just the right code to keep your customers happy. You can use Cucumber to test almost any system or any platform. Get started by using the core features of Cucumber and working with Cucumber's Gherkin DSL to describe-in plain language-the behavior your customers want from the system. Then write Ruby code that interprets those plain-language specifications and checks them against your application. Next, consolidate the knowledge you've gained with a worked example, where you'll learn more advanced Cucumber techniques, test asynchronous systems, and test systems that use a database. Recipes highlight some of the most difficult and commonly seen situations the authors have helped teams solve. With these patterns and techniques, test Ajax-heavy web applications with Capybara and Selenium, REST web services, Ruby on Rails applications, command-line applications, legacy applications, and more. Written by the creator of Cucumber and the co-founders of Cucumber Ltd., this authoritative guide will give you and your team all the knowledge you need to start using Cucumber with confidence. What You Need: Windows, Mac OS X (with XCode) or Linux, Ruby 1.9.2 and upwards, Cucumber 2.4, Rails 5, and RSpec 3.5
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Addresses the complete functional framework workflow in IoT technology Explores basic and high level concepts Provides data based intelligent and automated systems through Industrial IoT and its implications to the real world Discusses the major applications Presents an interdisciplinary platform
This text presents a specific, synthesized approach to the application of instructional design principles, so that the designer can more easily achieve closure on the design. Each step in the process is a logical part of the mosaic forming an instructional design.
Despite its importance, the role of HdS is most often underestimated and the topic is not well represented in literature and education. To address this, Hardware-dependent Software brings together experts from different HdS areas. By providing a comprehensive overview of general HdS principles, tools, and applications, this book provides adequate insight into the current technology and upcoming developments in the domain of HdS. The reader will find an interesting text book with self-contained introductions to the principles of Real-Time Operating Systems (RTOS), the emerging BIOS successor UEFI, and the Hardware Abstraction Layer (HAL). Other chapters cover industrial applications, verification, and tool environments. Tool introductions cover the application of tools in the ASIP software tool chain (i.e. Tensilica) and the generation of drivers and OS components from C-based languages. Applications focus on telecommunication and automotive systems.
How do you detangle a monolithic system and migrate it to a microservice architecture? How do you do it while maintaining business-as-usual? As a companion to Sam Newman's extremely popular Building Microservices, this new book details a proven method for transitioning an existing monolithic system to a microservice architecture. With many illustrative examples, insightful migration patterns, and a bevy of practical advice to transition your monolith enterprise into a microservice operation, this practical guide covers multiple scenarios and strategies for a successful migration, from initial planning all the way through application and database decomposition. You'll learn several tried and tested patterns and techniques that you can use as you migrate your existing architecture. Ideal for organizations looking to transition to microservices, rather than rebuild Helps companies determine whether to migrate, when to migrate, and where to begin Addresses communication, integration, and the migration of legacy systems Discusses multiple migration patterns and where they apply Provides database migration examples, along with synchronization strategies Explores application decomposition, including several architectural refactoring patterns Delves into details of database decomposition, including the impact of breaking referential and transactional integrity, new failure modes, and more
Learn how to use, deploy, and maintain Apache Spark with this comprehensive guide, written by the creators of the open-source cluster-computing framework. With an emphasis on improvements and new features in Spark 2.0, authors Bill Chambers and Matei Zaharia break down Spark topics into distinct sections, each with unique goals. You'll explore the basic operations and common functions of Spark's structured APIs, as well as Structured Streaming, a new high-level API for building end-to-end streaming applications. Developers and system administrators will learn the fundamentals of monitoring, tuning, and debugging Spark, and explore machine learning techniques and scenarios for employing MLlib, Spark's scalable machine-learning library. Get a gentle overview of big data and Spark Learn about DataFrames, SQL, and Datasets-Spark's core APIs-through worked examples Dive into Spark's low-level APIs, RDDs, and execution of SQL and DataFrames Understand how Spark runs on a cluster Debug, monitor, and tune Spark clusters and applications Learn the power of Structured Streaming, Spark's stream-processing engine Learn how you can apply MLlib to a variety of problems, including classification or recommendation
This volume chronicles the 16th Annual Conference on System Engineering Research (CSER) held on May 8-9, 2018 at the University of Virginia, Charlottesville, Virginia, USA. The CSER offers researchers in academia, industry, and government a common forum to present, discuss, and influence systems engineering research. It provides access to forward-looking research from across the globe, by renowned academicians as well as perspectives from senior industry and government representatives. Co-founded by the University of Southern California and Stevens Institute of Technology in 2003, CSER has become the preeminent event for researchers in systems engineering across the globe. Topics include though are not limited to the following: Systems in context: * Formative methods: requirements * Integration, deployment, assurance * Human Factors * Safety and Security Decisions/ Control & Design; Systems Modeling: * Optimization, Multiple Objectives, Synthesis * Risk and resiliency * Collaborative autonomy * Coordination and distributed decision-making Prediction: * Prescriptive modeling; state estimation * Stochastic approximation, stochastic optimization and control Integrative Data engineering: * Sensor Management * Design of Experiments
A crucial step during the design and engineering of communication systems is the estimation of their performance and behavior; especially for mathematically complex or highly dynamic systems network simulation is particularly useful. This book focuses on tools, modeling principles and state-of-the art models for discrete-event based network simulations, the standard method applied today in academia and industry for performance evaluation of new network designs and architectures. The focus of the tools part is on two distinct simulations engines: OmNet++ and ns-3, while it also deals with issues like parallelization, software integration and hardware simulations. The parts dealing with modeling and models for network simulations are split into a wireless section and a section dealing with higher layers. The wireless section covers all essential modeling principles for dealing with physical layer, link layer and wireless channel behavior. In addition, detailed models for prominent wireless systems like IEEE 802.11 and IEEE 802.16 are presented. In the part on higher layers, classical modeling approaches for the network layer, the transport layer and the application layer are presented in addition to modeling approaches for peer-to-peer networks and topologies of networks. The modeling parts are accompanied with catalogues of model implementations for a large set of different simulation engines. The book is aimed at master students and PhD students of computer science and electrical engineering as well as at researchers and practitioners from academia and industry that are dealing with network simulation at any layer of the protocol stack.
Focusses on model based systems engineering and describes the architecture of the systems design models Uses real-world examples to corroborate different and disparate systems engineering activities Describes and applies the Vee systems engineering design methodology, with cohesive examples and application of designing systems Discusses culture change and the skills people need to design and integrate systems Shows detailed and cohesive examples of the systems engineering tools throughout the systems engineering lifecycle
This book explains in detail how to define requirements modelling languages - formal languages used to solve requirement-related problems in requirements engineering. It moves from simple languages to more complicated ones and uses these languages to illustrate a discussion of major topics in requirements modelling language design. The book positions requirements problem solving within the framework of broader research on ill-structured problem solving in artificial intelligence and engineering in general. Further, it introduces the reader to many complicated issues in requirements modelling language design, starting from trivial questions and the definition of corresponding simple languages used to answer them, and progressing to increasingly complex issues and languages. In this way the reader is led step by step (and with the help of illustrations) to learn about the many challenges involved in designing modelling languages for requirements engineering. The book offers the first comprehensive treatment of a major challenge in requirements engineering and business analysis, namely, how to design and define requirements modelling languages. It is intended for researchers and graduate students interested in advanced topics of requirements engineering and formal language design.
How can we understand the complexity of genes, RNAs, and proteins and the associated regulatory networks? One approach is to look for recurring types of dynamical behavior. Mathematical models prove to be useful, especially models coming from theories of biochemical reactions such as ordinary differential equation models. Clever, careful experiments test these models and their basis in specific theories. This textbook aims to provide advanced students with the tools and insights needed to carry out studies of signal transduction drawing on modeling, theory, and experimentation. Early chapters summarize the basic building blocks of signaling systems: binding/dissociation, synthesis/destruction, and activation/inactivation. Subsequent chapters introduce various basic circuit devices: amplifiers, stabilizers, pulse generators, switches, stochastic spike generators, and oscillators. All chapters consistently use approaches and concepts from chemical kinetics and nonlinear dynamics, including rate-balance analysis, phase plane analysis, nullclines, linear stability analysis, stable nodes, saddles, unstable nodes, stable and unstable spirals, and bifurcations. This textbook seeks to provide quantitatively inclined biologists and biologically inclined physicists with the tools and insights needed to apply modeling and theory to interesting biological processes. Key Features: * Full-color illustration program with diagrams to help illuminate the concepts * Enables the reader to apply modeling and theory to the biological processes * Further Reading for each chapter * High-quality figures available for instructors to download
The Art of Computer Systems Performance Analysis "At last, a welcome and needed text for computer professionals who require practical, ready-to-apply techniques for performance analysis. Highly recommended!" —Dr. Leonard Kleinrock University of California, Los Angeles "An entirely refreshing text which has just the right mixture of theory and real world practice. The book is ideal for both classroom instruction and self-study." —Dr. Raymond L. Pickholtz President, IEEE Communications Society "An extraordinarily comprehensive treatment of both theoretical and practical issues." —Dr. Jeffrey P. Buzen Internationally recognized performance analysis expert "… it is the most thorough book available to date" —Dr. Erol Gelenbe Université René Descartes, Paris "… an extraordinary book.… A worthy addition to the bookshelf of any practicing computer or communications engineer" —Dr. Vinton G. Cer??? Chairman, ACM SIGCOMM "This is an unusual object, a textbook that one wants to sit down and peruse. The prose is clear and fluent, but more important, it is witty." —Allison Mankin The Mitre Washington Networking Center Newsletter
How can we understand the complexity of genes, RNAs, and proteins and the associated regulatory networks? One approach is to look for recurring types of dynamical behavior. Mathematical models prove to be useful, especially models coming from theories of biochemical reactions such as ordinary differential equation models. Clever, careful experiments test these models and their basis in specific theories. This textbook aims to provide advanced students with the tools and insights needed to carry out studies of signal transduction drawing on modeling, theory, and experimentation. Early chapters summarize the basic building blocks of signaling systems: binding/dissociation, synthesis/destruction, and activation/inactivation. Subsequent chapters introduce various basic circuit devices: amplifiers, stabilizers, pulse generators, switches, stochastic spike generators, and oscillators. All chapters consistently use approaches and concepts from chemical kinetics and nonlinear dynamics, including rate-balance analysis, phase plane analysis, nullclines, linear stability analysis, stable nodes, saddles, unstable nodes, stable and unstable spirals, and bifurcations. This textbook seeks to provide quantitatively inclined biologists and biologically inclined physicists with the tools and insights needed to apply modeling and theory to interesting biological processes. Key Features: * Full-color illustration program with diagrams to help illuminate the concepts * Enables the reader to apply modeling and theory to the biological processes * Further Reading for each chapter * High-quality figures available for instructors to download
Martin Fowler's guide to reworking bad code into well-structured code Refactoring improves the design of existing code and enhances software maintainability, as well as making existing code easier to understand. Original Agile Manifesto signer and software development thought leader, Martin Fowler, provides a catalog of refactorings that explains why you should refactor; how to recognize code that needs refactoring; and how to actually do it successfully, no matter what language you use. Refactoring principles: understand the process and general principles of refactoring Code smells: recognize "bad smells" in code that signal opportunities to refactor Application improvement: quickly apply useful refactorings to make a program easier to comprehend and change Building tests: writing good tests increases a programmer's effectiveness Moving features: an important part of refactoring is moving elements between contexts Data structures: a collection of refactorings to organize data, an important role in programs Conditional Logic: use refactorings to make conditional sections easier to understand APIs: modules and their functions are the building blocks of our software, and APIs are the joints that we use to plug them together Inheritance: it is both very useful and easy to misuse, and it's often hard to see the misuse until it's in the rear-view mirror---refactorings can fix the misuse Examples are written in JavaScript, but you shouldn't find it difficult to adapt the refactorings to whatever language you are currently using as they look mostly the same in different languages. "Whenever you read [Refactoring], it's time to read it again. And if you haven't read it yet, please do before writing another line of code." -David Heinemeier Hansson, Creator of Ruby on Rails, Founder & CTO at Basecamp "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." -M. Fowler (1999) |
![]() ![]() You may like...
Hydrogels of Cytoskeletal Proteins…
Yoshihito Osada, Ryuzo Kawamura, …
Hardcover
R2,873
Discovery Miles 28 730
Design of Nanostructures for Versatile…
Alexandru Mihai Grumezescu
Paperback
Tinnitus: Pathophysiology and Treatment…
Aage R. Moller, Berthold Langguth, …
Hardcover
R6,642
Discovery Miles 66 420
Tinnitus - An Interdisciplinary Approach…
Winfried Schlee, Berthold Langguth, …
Hardcover
Compiler Technology - Tools, Translators…
Derek Beng Kee Kiong
Hardcover
R4,477
Discovery Miles 44 770
Deaf Culture - Exploring Deaf…
Irene W Leigh, Jean F. Andrews, …
Paperback
R2,610
Discovery Miles 26 100
|