|
Showing 1 - 12 of
12 matches in All Departments
By making use of the principles of systems science, the scientific
community can explain many complicated matters of the world and
shed new light on unsettled problems. Each real science has its own
particular methodology for not only qualitative but also
quantitative analyses, so it is important to understand the organic
whole of systems research with operable mathematical methods.
Systems Science: Methodological Approaches presents a mathematical
explanation of systems science, giving readers a complete technical
formulation of different systemic laws. It enables them to use a
unified methodology to attack different problems that are hard, if
not impossible, for modern science to handle. Following a brief
history of systems science, the book explores: Basic concepts,
characteristics, properties, and classifications of general systems
Nonlinear systems dynamics and the theory of catastrophe
Dissipative structures and synergistics Studies of chaos, including
logistic mapping, phase space reconstruction, Lyapunov exponents,
and chaos of general single relation systems Different aspects and
concepts of fractals, including a presentation of L systems
analysis and design Complex systems and complexity, with a
discussion of how the phenomena of "three" and complexity are
related, and how various cellular automata can be constructed to
generate useful simulations and figurative patterns Complex
adaptive systems and open complex giant systems, with introduction
of the yoyo model and practical applications Complex networks and
related concepts and methods The book concludes with several case
studies that demonstrate how various concepts and the logic of
systems can be practically applied to resolve real-life problems,
such as the prediction of natural disasters. The book will be
useful in directing future research and applications of systems
science on a commonly accepted platform and playground.
Enterprise solutions have emerged as promising tools for
integrating and extending business processes across business
functions. Supplying a clear and comprehensive introduction to the
field, this book provides a detailed description of enterprise
information integration from the development of enterprise systems
to extended enterprise information integration in supply chain
environments.
Enterprise Integration and Information Architecture: A Systems
Perspective on Industrial Information Integration explains how to
improve industrial information integration through the application
of a systems approach. Describing how systems science is impacting
current research in industrial information integration, it covers
enterprise architecture, information architecture for enterprises,
business process/work flow modeling, and enterprise information
integration.
Covering the emergence, growth, and extension of integrated
enterprise systems, the book provides you with various perspectives
of modern enterprise solutions. It introduces the critical concepts
of ERP, industry-oriented enterprise resource planning, and entire
resource planning. It also provides guidance on how to transition
from extended enterprise integration in a supply chain environment
to systems-based enterprise architecture, enterprise modeling, and
enterprise modeling in a supply chain environment.
The book proposes a new information architecture for enterprise and
supply chain management. It presents modeling and integration
information flows for enterprise information integration, together
with the Internet of Things (IoT). It also explores the theory and
methods of industrial information integration including integration
approaches and enterprise application integration.
Complete with numerous examples of extended enterprise integration
in actual supply chain environments, the book illustrates the
critical issues that arise in professional practice and also
explores emerging trends in enterprise integration and its
information architecture"
By making use of the principles of systems science, the scientific
community can explain many complicated matters of the world and
shed new light on unsettled problems. Each real science has its own
particular methodology for not only qualitative but also
quantitative analyses, so it is important to understand the organic
whole of systems research with operable mathematical methods.
Systems Science: Methodological Approaches presents a mathematical
explanation of systems science, giving readers a complete technical
formulation of different systemic laws. It enables them to use a
unified methodology to attack different problems that are hard, if
not impossible, for modern science to handle. Following a brief
history of systems science, the book explores: Basic concepts,
characteristics, properties, and classifications of general systems
Nonlinear systems dynamics and the theory of catastrophe
Dissipative structures and synergistics Studies of chaos, including
logistic mapping, phase space reconstruction, Lyapunov exponents,
and chaos of general single relation systems Different aspects and
concepts of fractals, including a presentation of L systems
analysis and design Complex systems and complexity, with a
discussion of how the phenomena of "three" and complexity are
related, and how various cellular automata can be constructed to
generate useful simulations and figurative patterns Complex
adaptive systems and open complex giant systems, with introduction
of the yoyo model and practical applications Complex networks and
related concepts and methods The book concludes with several case
studies that demonstrate how various concepts and the logic of
systems can be practically applied to resolve real-life problems,
such as the prediction of natural disasters. The book will be
useful in directing future research and applications of systems
science on a commonly accepted platform and playground.
|
Research and Practical Issues of Enterprise Information Systems - 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna, Austria, December 13-14, 2016, Proceedings (Paperback, 1st ed. 2016)
A. Min Tjoa, Li Da Xu, Maria Raffai, Niina Maarit Novak
|
R2,428
Discovery Miles 24 280
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 10th International
IFIP WG 8.9 Working Conference on Research and Practical Issues of
Enterprise Information Systems, CONFENIS 2016, held in Vienna,
Austria, in December 2016. The conference provided an international
forum for the broader IFIP community to discuss the latest research
findings in the area of EIS and specifically aimed at facilitating
the exchange of ideas and advances on all aspects and developments
of EIS. The 25 papers presented in this volume were carefully
reviewed and selected from 63 submissions. They were organized in
topical sections on: semantic concepts and open data; customer
relationship management; security and privacy issues; advanced
manufacturing and management aspects; business intelligence and big
data; decision support in EIS; and EIS-practices.
|
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
|
R1,523
Discovery Miles 15 230
|
Ships in 10 - 15 working days
|
This volume constitutes the refereed proceedings of two workshops:
the Second International Workshop on Modern Cryptography and
Security Engineering (MoCrySEn 2013) and the Third International
Workshop on Security and Cognitive Informatics for Homeland Defense
(SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5
International Cross-Domain Conference, CD-ARES 2013, in Regensburg,
Germany, in September 2013. The 16 revised papers presented at
MoCrySEn 2013 were carefully reviewed and selected from 30
submissions. They deal with symmetric-key cryptography, public-key
cryptography, algorithmic cryptanalysis, software and hardware
implementation of cryptographic algorithms, database encryption,
and interaction between cryptographic theory and implementation
issues. The 15 papers presented at SeCIHD 2013 are organized in
topical sections on cyber security and dependability, network
security and privacy, and multimedia technology for homeland
defense.
|
Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
|
R1,535
Discovery Miles 15 350
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the IFIP WG 8.4,
8.9, TC 5 International Cross-Domain Conference on Availability,
Reliability and Security, CD-ARES 2013, held in Regensburg,
Germany, in September 2013. The 21 revised papers presented were
carefully reviewed and selected for inclusion in the volume. The
papers concentrate on the many aspects of information systems
bridging the gap between research results in computer science and
the many application fields. They are organized in the following
topical sections: economic, ethical, legal, multilingual,
organizational and social aspects; context-oriented information
integration; data/information management as a service;
context-oriented information integration and location-aware
computing; security and privacy; risk management and business
continuity; and security and privacy and location based
applications. Also included are 15 papers from a special session on
Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).
|
Multidisciplinary Research and Practice for Informations Systems - IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings (Paperback, 2012 ed.)
Gerald Quirchmayer, Josef Basl, Ilsun You, Li Da Xu, Edgar Weippl
|
R2,903
Discovery Miles 29 030
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the IFIP WG 8.4,
8.9, TC 5 International Cross Domain Conference and Workshop on
Availability, Reliability and Security, CD-ARES 2012, held in
Prague, Czech Republic, in August 2012. The 50 revised papers
presented were carefully reviewed and selected for inclusion in the
volume. The papers concentrate on the many aspects of information
systems bridging the gap between research results in computer
science and the many application fields. They are organized in the
following topical sections: cross-domain applications: aspects of
modeling and validation; trust,security, privacy, and safety;
mobile applications; data processing and management; retrieval and
complex query processing; e-commerce; and papers from the colocated
International Workshop on Security and Cognitive Informatics for
Homeland Defense, SeCIHD 2012.
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, Vienna, Austria, August 22-26, 2011, Proceedings (Paperback)
A. Min Tjoa, Gerald Quirchmayr, Ilsun You, Li Da Xu
|
R1,499
Discovery Miles 14 990
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the IFIP WG
8.4/8.9 International Cross Domain Conference and Workshop on
Availability, Reliability and Security - Multidisciplinary Research
and Practice for Business, Enterprise and Health Information
Systems, ARGES 2011, held in Vienna, Austria, in August 2011.The 29
revised papers presented were carefully reviewed and selected for
inclusion in the volume. The papers concentrate on the many aspects
of availability, reliability and security for information systems
as a discipline bridging the application fields and the well-
defined computer science field. They are organized in three
sections: multidisciplinary research and practice for business,
enterprise and health information systems; massive information
sharing and integration and electronic healthcare; and papers from
the colocated International Workshop on Security and Cognitive
Informatics for Homeland Defense.
|
Research and Practical Issues of Enterprise Information Systems - 11th IFIP WG 8.9 Working Conference, CONFENIS 2017, Shanghai, China, October 18-20, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
A. Min Tjoa, Li Rong Zheng, Zhuo Zou, Maria Raffai, Li Da Xu, …
|
R1,469
Discovery Miles 14 690
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 11th IFIP WG
8.9 Working Conference on Research and Practical Issues of
Enterprise Information Systems, CONFENIS 2017, held in Shanghai,
China, in October 2017. The 17 full papers presented in this volume
were carefully reviewed and selected from 39 submissions. They were
organized in topical sections named: EIS concepts, theory and
methods; IoT and emerging paradigm; EIS for industry 4.0; big data
analytics; and intelligent electronics and systems for industrial
IoT.
|
Information and Communication Technology - Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings (Paperback, 1st ed. 2015)
Ismail Khalil, Erich Neuhold, A. Min Tjoa, Li Da Xu, Ilsun You
|
R2,473
Discovery Miles 24 730
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Third IFIP TC
5/8 International Conference on Information and Communication
Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015
as a special track on Availability, Reliability and Security, and
the 9th IFIP WG 8.9 Working Conference on Research and Practical
Issues of Enterprise Information Systems, CONFENIS 2015, held as
part of the 23rd IFIP World Computer Congress, WCC 2015, in
Daejeon, Korea, in October 2015. The 35 revised full papers
presented were carefully reviewed and selected from 84 submissions.
The papers have been organized in the following topical sections:
networks and systems architecture; teaching and education;
authentication and profiling; data management and information
advertizing; applied modeling and simulation; network security;
dependable systems and applications, multimedia security;
cryptography; big data and text mining, and social impact of EIS
and visualization.
Securing the Internet of Things provides network and cybersecurity
researchers and practitioners with both the theoretical and
practical knowledge they need to know regarding security in the
Internet of Things (IoT). This booming field, moving from strictly
research to the marketplace, is advancing rapidly, yet security
issues abound. This book explains the fundamental concepts of IoT
security, describing practical solutions that account for resource
limitations at IoT end-node, hybrid network architecture,
communication protocols, and application characteristics.
Highlighting the most important potential IoT security risks and
threats, the book covers both the general theory and practical
implications for people working in security in the Internet of
Things.
|
You may like...
The Northman
Alexander Skarsgard, Nicole Kidman, …
Blu-ray disc
(1)
R210
Discovery Miles 2 100
|