![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
This guide demonstrates how virtual build and test can be supported by the Discrete Event Systems Specification (DEVS) simulation modeling formalism, and the System Entity Structure (SES) simulation model ontology. The book examines a wide variety of Systems of Systems (SoS) problems, ranging from cloud computing systems to biological systems in agricultural food crops. Features: includes numerous exercises, examples and case studies throughout the text; presents a step-by-step introduction to DEVS concepts, encouraging hands-on practice to building sophisticated SoS models; illustrates virtual build and test for a variety of SoS applications using both commercial and open source DEVS simulation environments; introduces an approach based on activity concepts intrinsic to DEVS-based system design, that integrates both energy and information processing requirements; describes co-design modeling concepts and methods to capture separate and integrated software and hardware systems.
This work reviews the state of the art in SVM and perceptron classifiers. A Support Vector Machine (SVM) is easily the most popular tool for dealing with a variety of machine-learning tasks, including classification. SVMs are associated with maximizing the margin between two classes. The concerned optimization problem is a convex optimization guaranteeing a globally optimal solution. The weight vector associated with SVM is obtained by a linear combination of some of the boundary and noisy vectors. Further, when the data are not linearly separable, tuning the coefficient of the regularization term becomes crucial. Even though SVMs have popularized the kernel trick, in most of the practical applications that are high-dimensional, linear SVMs are popularly used. The text examines applications to social and information networks. The work also discusses another popular linear classifier, the perceptron, and compares its performance with that of the SVM in different application areas.>
This book looks at systems engineering now and comments on the future. It notes the signs of deepening our understanding of the field which includes, digital engineering, interactive model-based systems, decision support frameworks, and points to a grand unified theory. The book also suggests how the systems engineer can be a better designer and architect. Offering commentaries regarding how the field of systems engineering might evolve over the next couple of decades, Tomorrow's Systems Engineering: Commentaries on the Profession looks at the potential opportunities that might lie ahead rather than making predictions for the future of the field. The book allows the reader to prepare for the future in terms of technical interest as well as competitiveness and suggests opportunities that could be significant and useful for planning actions in the careers of future systems engineers. Discussions of improvements in how we develop and use software that can help to facilitate and protect overall IT capability within the system design and system architecture are also included. This book is for systems engineers and software engineers who wish to think now about the directions the field might take in the next two decades.
This book treats the computational use of social concepts as the focal point for the realisation of a novel class of socio-technical systems, comprising smart grids, public display environments, and grid computing. These systems are composed of technical and human constituents that interact with each other in an open environment. Heterogeneity, large scale, and uncertainty in the behaviour of the constituents and the environment are the rule rather than the exception. Ensuring the trustworthiness of such systems allows their technical constituents to interact with each other in a reliable, secure, and predictable way while their human users are able to understand and control them. "Trustworthy Open Self-Organising Systems" contains a wealth of knowledge, from trustworthy self-organisation mechanisms, to trust models, methods to measure a user's trust in a system, a discussion of social concepts beyond trust, and insights into the impact open self-organising systems will have on society.
Learn the key standards-iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon-and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs. Proximity technology-in particular, Bluetooth beacons-is a major source of business opportunity, and this book provides everything you need to know to architect a solution to capitalize on that opportunity. What You'll Learn Understand the disruptive implications of digital-physical convergence and the new applications it makes possible Review the key standards that solutions developers need to understand to capitalize on the business opportunity of proximity technology Discover the new phenomenon of beacon networks, which will be hugely significant in driving strategic decisions and creating wealth See other technologies in the proximity ecosystem catalyzed by and complementary to Bluetooth beacons, including visual light communication, magnetic resonance, and RFID Examine the Beacosystem framework for analyzing the proximity ecosystem Who This Book Is For Solutions architects of all types-venture capitalists, founders, CEOs, strategists, product managers, CTOs, business developers, and programmers Stephen Statler is a writer, public speaker, and consultant working in the beacon ecosystem. He trains and advises retailers, venue owners, VCs, as well as makers of beacon software and hardware, and is a thought leader in the beacosystem community. Previously he was the Senior Director for Strategy and Solutions Management at Qualcomm's Retail Solutions Division, helping to incubate Gimbal, one of the leading Bluetooth beacons in the market. He is also the CEO of Cause Based Solutions, creators of Give the Change, democratizing philanthropy, enabling non-profit supporters to donate the change from charity branded debit cards, and developer of The Good Traveler program. Contributors: Anke Audenaert, CEO, Favrit John Coombs, CEO, Rover Labs Theresa Mary Gordon, Co-Founder, tapGOconnect Phil Hendrix, Director, immr Kris Kolodziej, President, IndoorLBS Patrick Leddy, CEO, Pulsate Ben Parker, VP Business Development, AccelerateIT Mario Proietti, CEO, Location Smart Ray Rotolo, SVP OOH, Gimbal Kjartan Slette, COO, Unacast Jarno Vanto, Partner, Borenius Attorneys LLP David Young, Chief Engineer, Radius Networks Foreword by Asif Khan, President LBMA
This book constitutes the tutorial lectures of the 5th European Business Intelligence Summer School, eBISS 2015, held in Barcelona, Spain, in July 2015. The tutorials presented here in an extended and refined format were given by renowned experts and cover topics including schema evolution for databases and data warehouses, publishing OLAP cubes on the Semantic Web, design issues in social business intelligence projects, context-aware business intelligence, and key performance indicators in data warehouses.
Best-selling author Wallace Wang teaches you how to use El Capitan, the latest version of the Mac operating system, in everyday situations. This book shows you, the beginner Mac user, how to get up and running, operate, and work day-to-day on your Mac. You will learn how to run applications, manage windows and files, work with the internet, and more. You will even learn how to use your Mac with an iPhone and an Apple watch. If you've ever felt that you couldn't learn how to use a Mac, this is your opportunity to give it a go. What you'll learn How to get up and running with Mac OS X El Capitan How to navigate and manage views How to manage your files What entertainment options are available to you, and how to use them How to maintain your Mac How to work with iPhone and Apple watch. Who This Book Is For Anyone who wants to learn how to use OS X El Capitan. No previous experience is required.
Understand and solve many different kinds of iPhone and iPad problems. This book covers both general troubleshooting techniques applicable in a wide variety of situations as well as specific fixes for topics such as networking, apps, photos, the battery, and syncing. Glitches, hiccups, and crashes just aren't supposed to happen with iOS, but alas, all too often they do. It is these non-obvious fixes, workarounds, and preventative measures that form the core of iOS Troubleshooting. With clear, straightforward prose, this book will take the reader through hundreds of iOS problems, explain the reasons for them, and provide easy to understand solutions to get the device (and you) back in business. What you'll learn: Fix cellular and networking connections Incorporate accessories effectively Solve battery and charging issues Clear up syncing and iCloud glitches Who this book is for:Any person who uses an iOS device.
This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.
Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent organization, there are commonalities that apply to all organizations. The Accidental SysAdmin Handbook, Second Edition looks at those commonalities and provides a general introduction to critical aspects associated with system administration. It further acts to provide definitions and patterns for common computer terms and acronyms. What You Will Learn Build and manage home networking and plan more complex network environments Manage the network layer and service architectures as well as network support plans Develop a server hardware strategy and understand the physical vs. virtual server ecosystem Handle data storage, data strategies and directory services, and central account management Work with DNS, DHCP, IP v4 and IP v6 Deploy workstations and printers Manage and use antivirus and security management software Build, manage and work with intranets and Internet support services Who This Book Is For It is assumed that the reader has little to no experience in a professional information technology environment.
This work presents link prediction similarity measures for social networks that exploit the degree distribution of the networks. In the context of link prediction in dense networks, the text proposes similarity measures based on Markov inequality degree thresholding (MIDTs), which only consider nodes whose degree is above a threshold for a possible link. Also presented are similarity measures based on cliques (CNC, AAC, RAC), which assign extra weight between nodes sharing a greater number of cliques. Additionally, a locally adaptive (LA) similarity measure is proposed that assigns different weights to common nodes based on the degree distribution of the local neighborhood and the degree distribution of the network. In the context of link prediction in dense networks, the text introduces a novel two-phase framework that adds edges to the sparse graph to forma boost graph.
Learn twenty software reading techniques to enhance your effectiveness in reviewing and inspecting software artifacts such as requirements specifications, designs, code files, and usability. Software review and inspection is the best practice in software development that detects and fixes problems early. Software professionals are trained to write software but not read and analyze software written by peers. As a result, individual reading skills vary widely. Because the effectiveness of software review and inspection is highly dependent on individual reading skills, differential outcomes among software readers vary by a factor of ten. Software Reading Techniques is designed to close that gap. Dr Yang-Ming Zhu's depth of experience as a software architect, team leader, and scientist make him singularly well-equipped to bring you up to speed on all the techniques and tips for optimizing the effectiveness and efficiency of your software review and inspection skills. What You'll Learn: Improve software review, inspection procedures, and reading skills Study traditional and modern advanced reading techniques applicable to software artifacts Master specific reading techniques for software requirements specification, software design, and code Who This Book Is For: Software professionals and software engineering students and researchers
This book constitutes the post-proceedings of the 7th International Conference on Mobile Networks and Management, MONAMI 2015, held in Santander, Spain, in September 2015. The 16 full papers were carefully reviewed and selected from 24 submissions. In addition there appears one short and 5 invited papers. These are organized thematically in five parts starting with Cellular Network Management and Self-Organizing Networks in Part I. Radio Resource Management in LTE and 5G Networks aspects are discussed in Part II. Part III presents novel Techniques and Algorithms for Wireless Networks, while Part IV deals with Video Streaming over Wireless Networks. Part V includes papers presenting avant-garde research on applications and services and, finally, Part VI features two papers introducing novel architectural approaches for Wireless Sensor Networks.
This concise book shows you how experiential learning can be used to overcome the challenges posed in applying and delivering information technology (IT) to your business needs through an innovative, game-based approach. Technology innovations and evolving business models are part of a rapid change that is forcing corporate and management professionals to learn, deploy, and adopt IT in new ways in order to maintain a competitive advantage. Many are doing this through experiential learning. You'll begin by reviewing the basics of experiential learning and its relevance to IT, followed by six chapters that apply the hands-on concept through various scenarios. Make IT Through Experiential Learning one of your valued resources today. What You'll Learn: Innovative and proven IT-related application scenarios Generic management and leadership skill development Guidance for applying the learning methods for generating extraordinary results over conventional methods Who This Book Is For: IT professionals, higher education students, and those engaged in training and organizational development.
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers. SOC is also reshaping approaches to test and validation activities. These are beginning to migrate from the traditional register-transfer or gate levels of abstraction to the system level. Until now, test and validation have not been supported by system-level design tools so designers have lacked the infrastructure to exploit all the benefits stemming from the adoption of the system level of abstraction. Research efforts are already addressing this issue. This monograph provides a state-of-the-art overview of the current validation and test techniques by covering all aspects of the subject including:
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Personal Satellite Services, PSATS 2014, held in Genova, Italy, in July 2014. The 10 revised full papers presented were carefully reviewed and present the latest advances in the next generation satellite networking and communication systems.
This timely text presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as ABFT. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Features: provides a survey of resilience methods and performance models; examines the various sources for errors and faults in large-scale systems; reviews the spectrum of techniques that can be applied to design a fault-tolerant MPI; investigates different approaches to replication; discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems.
This book is concerned with the importance of Human Computer Interaction (HCI), Usability, user participants, and Sustainability in the Information Communication Technology (ICT) industry throughout the world. ICT has become a crucial instrument for communication, entertainment, commerce and research and this increased usage is presenting new environmental and sustainability issues as we try and meet the ever growing needs of both businesses and individuals. Sustainability must become central to the design of new technologies to make a concerted effort to tackle the environmental concerns we face now and for the future. Development frameworks, tools and models are used and explored and the New Participative Methodology for Sustainable Design (NPMSD) is introduced as a way of identifying key factors needed in developing more sustainable systems including new smart technology and portable devices. It is hoped additional research will be carried out in the future to assess these sustainable design steps using larger, more diverse countries with developed and developing economies to further refine such methods. Sustainable Design will be an invaluable resource for students and researchers, designers and business managers who are interested in the human-centred, environmental concerns of sustainable technologies
This book constitutes the proceedings of the First International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2015, held in Ohrid, Republic of Macedonia, in September 2015. The 39 revised papers cover the broad areas of future wireless networks, ambient and assisted living, smart infrastructures and security and reflect the fast developing and vibrant penetration of IoT technologies in diverse areas of human live.
Introductory textbook covering all the main features of the 'web programming' languages PHP and MySQL together with detailed examples that will enable readers (whether students on a taught course or independent learners) to use them to create their own applications or understand existing ones. A particular focus is the use of PHP to generate MySQL commands from a script as it is executed. Each chapter includes aims, a summary and practical exercises (with solutions) to support learning. Chapters are designed to stand alone as far as possible, so that they can be studied independently of the rest of the text by those with some previous knowledge of the languages. There is a comprehensive glossary of technical terms, together with extensive appendices for quick reference of language features.
This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.
This book constitutes the refereed proceedings of the 15th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2016, held in Katun, Russia, in September 2016. The 33 full papers presented together with 4 short papers were carefully reviewed and selected from 96 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.
This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multi-hop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.
Systems for Online Transaction Processing (OLTP) and Online Analytical Processing (OLAP) are currently separate. The potential of the latest technologies and changes in operational and analytical applications over the last decade have given rise to the unification of these systems, which can be of benefit for both workloads. Research and industry have reacted and prototypes of hybrid database systems are now appearing. Benchmarks are the standard method for evaluating, comparing and supporting the development of new database systems. Because of the separation of OLTP and OLAP systems, existing benchmarks are only focused on one or the other. With the rise of hybrid database systems, benchmarks to assess these systems will be needed as well. Based on the examination of existing benchmarks, a new benchmark for hybrid database systems is introduced in this book. It is furthermore used to determine the effect of adding OLAP to an OLTP workload and is applied to analyze the impact of typically used optimizations in the historically separate OLTP and OLAP domains in mixed-workload scenarios.
This book constitutes the refereed proceedings of the 18th International Conference on Distributed and Computer and Communication Networks, DCCN 2015, held in Moscow, Russia, in October 2015. The 38 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS evaluation in wireless networks; modeling and simulation of network protocols; queuing and reliability theory; wireless IEEE 802.11, IEEE 802.15, IEEE 802.16, and UMTS (LTE) networks; FRID technology and its application in intellectual transportation networks; protocols design (MAC, Routing) for centimeter and millimeter wave mesh networks; internet and web applications and services; application integration in distributed information systems; big data in communication networks. |
![]() ![]() You may like...
Intangible Cultural Heritage Under…
Marie Cornu, Anita Vaivade, …
Hardcover
R3,151
Discovery Miles 31 510
Secure and Resilient Software…
Mark S. Merkow, Lakshmikanth Raghavan
Hardcover
R2,505
Discovery Miles 25 050
Network Security Attacks and…
Kumar G. Dileep, Manoj Kumar Singh, …
Hardcover
R5,562
Discovery Miles 55 620
The Accidental Mayor - Herman Mashaba…
Michael Beaumont
Paperback
![]()
Trade Mark Law in Europe 3e
Alexander von Muhlendahl, Dimitris Botis, …
Hardcover
R10,642
Discovery Miles 106 420
|