Browse Results

Showing 14,526 through 14,550 of 53,616 results

Descriptional Complexity of Formal Systems

by Jeffrey Shallit Alexander Okhotin

This book constitutes the refereed proceedings of the 17th International Conference on Descriptional Complexity of Formal Systems, DCFS 2015, held in Waterloo, ON, Canada, in June 2015. The 23 full papers presented together with 2 invited talks were carefully reviewed and selected from 29 submissions. The subject of the workshop was descriptional complexity. Roughly speaking, this field is concerned with the size of objects in various mathematical models of computation, such as finite automata, pushdown automata, and Turing machines. Descriptional complexity serves as a theoretical representation of physical realizations, such as the engineering complexity of computer software and hardware. It also models similar complexity phenomena in other areas of computer science, including unconventional computing and bioinformatics.

Descriptive Data Mining

by David L. Olson

This book offers an overview of knowledge management. It starts with an introduction to the subject, placing descriptive models in the context of the overall field as well as within the more specific field of data mining analysis. Chapter 2 covers data visualization, including directions for accessing R open source software (described through Rattle). Both R and Rattle are free to students. Chapter 3 then describes market basket analysis, comparing it with more advanced models, and addresses the concept of lift. Subsequently, Chapter 4 describes smarketing RFM models and compares it with more advanced predictive models. Next, Chapter 5 describes association rules, including the APriori algorithm and provides software support from R. Chapter 6 covers cluster analysis, including software support from R (Rattle), KNIME, and WEKA, all of which are open source. Chapter 7 goes on to describe link analysis, social network metrics, and open source NodeXL software, and demonstrates link analysis application using PolyAnalyst output. Chapter 8 concludes the monograph. Using business-related data to demonstrate models, this descriptive book explains how methods work with some citations, but without detailed references. The data sets and software selected are widely available and can easily be accessed.

Descriptive Data Mining (Computational Risk Management)

by David L. Olson Georg Lauhoff

This book provides an overview of data mining methods demonstrated by software. Knowledge management involves application of human knowledge (epistemology) with the technological advances of our current society (computer systems) and big data, both in terms of collecting data and in analyzing it. We see three types of analytic tools. Descriptive analytics focus on reports of what has happened. Predictive analytics extend statistical and/or artificial intelligence to provide forecasting capability. It also includes classification modeling. Diagnostic analytics can apply analysis to sensor input to direct control systems automatically. Prescriptive analytics applies quantitative models to optimize systems, or at least to identify improved systems. Data mining includes descriptive and predictive modeling. Operations research includes all three. This book focuses on descriptive analytics.The book seeks to provide simple explanations and demonstration of some descriptive tools. This second edition provides more examples of big data impact, updates the content on visualization, clarifies some points, and expands coverage of association rules and cluster analysis. Chapter 1 gives an overview in the context of knowledge management. Chapter 2 discusses some basic software support to data visualization. Chapter 3 covers fundamentals of market basket analysis, and Chapter 4 provides demonstration of RFM modeling, a basic marketing data mining tool. Chapter 5 demonstrates association rule mining. Chapter 6 is a more in-depth coverage of cluster analysis. Chapter 7 discusses link analysis. Models are demonstrated using business related data. The style of the book is intended to be descriptive, seeking to explain how methods work, with some citations, but without deep scholarly reference. The data sets and software are all selected for widespread availability and access by any reader with computer links.

Descriptive Set Theoretic Methods in Automata Theory

by Michał Skrzypczak

The book is based on the PhD thesis Descriptive Set Theoretic Methods in Automata Theory, awarded the E. W. Beth Prize in 2015 for outstanding dissertations in the fields of logic, language, and information. The thesis reveals unexpected connections between advanced concepts in logic, descriptive set theory, topology, and automata theory and provides many deep insights into the interplay between these fields. It opens new perspectives on central problems in the theory of automata on infinite words and trees and offers very impressive advances in this theory from the point of view of topology. " the thesis of Micha Skrzypczak offers certainly what we expect from excellent mathematics: new unexpected connections between a priori distinct concepts, and proofs involving enlightening ideas. Thomas Colcombet. "

The Desert War: Book 4 of the Ladybird Expert History of the Second World War (The Ladybird Expert Series #10)

by James Holland

Part of the ALL-NEW LADYBIRD EXPERT SERIES.____________Why was North Africa such a key component in Britain's success over Mussolini and his Italian Army?How did they blunt Italy's actions?What challenges did they face?And what new technologies were brought to bear?When fascist dictator Mussolini declared war against Britain he was taking a huge risk . . . Italy lacked natural resources, and Britain and France's wealth.He hoped to create a new Roman Empire across the Mediterranean and into Africa. And with Hitler and the Nazi's by his side he had a great chance of doing so - but what was it that stopped him?Discover the answers and more inside James Holland's The Desert War, the thrilling and accessible account that explains what happened, who the key figures were and the tactics, triumphs and failures on both sides . . .

Design Alchemy

by Roderick Sims

The promise of online learning--flexible, learner-centered, responsive--was forward-looking and poised to revolutionize education. But too often online learning courses have little room for student engagement and their design does not reflect the potential for interactive and collaborative learning. Design Alchemy counters this trend by synthesizing the art and science of educational design to model a whole that transcends the sum of its parts. Challenging yet accessible, it clearly sets out steps for harnessing innovative strategies and designer creativity to provide educational platforms that reduce learner boredom and instructor burnout, and encourage deeper interaction with subject matter. Activities, assessment methods, and sample course materials are designed toward improving quality, embracing diversity, and adapting positively to change. And the book's palette of resources enables readers to effectively apply the principles in their own practice: The evolution of Design Alchemy in the context of online learning. Alignment with core theories and practice models. The framework: elements of pedagogy and components of practice. Case studies showing Design Alchemy in real-world learning. Tools, templates, and a sample syllabus. The Design Alchemy Manifesto, summarizing key ideas. Researchers and practitioners in technology and education will look to Design Alchemy as a transformative work to help make the most of student potential, learning opportunities, and their own professional growth.

Design and Analysis of Biomolecular Circuits

by Douglas Densmore Heinz Koeppl Gianluca Setti Mario Di Bernardo

The book deals with engineering aspects of the two emerging and intertwined fields of synthetic and systems biology. Both fields hold promise to revolutionize the way molecular biology research is done, the way today's drug discovery works and the way bio-engineering is done. Both fields stress the importance of building and characterizing small bio-molecular networks in order to synthesize incrementally and understand large complex networks inside living cells. Reminiscent of computer-aided design (CAD) of electronic circuits, abstraction is believed to be the key concept to achieve this goal. It allows hiding the overwhelming complexity of cellular processes by encapsulating network parts into abstract modules. This book provides a unique perspective on how concepts and methods from CAD of electronic circuits can be leveraged to overcome complexity barrier perceived in synthetic and systems biology.

Design and Analysis of Cryptographic Algorithms in Blockchain

by Yi Mu Xiaosong Zhang Ke Huang Fatemeh Rezaeibagha

This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. It devotes three chapters to review the background and basic knowledge, four chapters to discuss specific types of cryptographic primitive design for blockchain, one chapter to discuss optimization tools and another chapter for blockchain regulation and economies. This book covers the systematic survey of research objects, as well as detailed reviews of cryptographic schemes, lectures and methodologies to practice cryptography. The main findings of this book are summarized as following, first, the practical design and analysis of cryptographic schemes for blockchain can address major problems in blockchain at algorithmic level. Then, some intrinsic deficiencies in some traditional cryptographic primitives, like centralized setup, impractical design, etc, prevent the successful application of these primitives in blockchain. However, huge efforts are being made to make these primitives practical and applicable for researchers. Finally, the formal and rigorous design and analysis of public key cryptographic algorithms is vital to blockchain. Design and Analysis of Cryptographic Algorithms in Blockchain is a useful textbook for graduate students and PhD students, or researches who wish to connect cryptography with blockchain for research and developing projects.

Design and Analysis of Distributed Energy Management Systems: Integration of EMS, EV, and ICT (Power Electronics and Power Systems)

by Anh Tuan Tran Tatsuya Suzuki Shinkichi Inagaki Yoshihiko Susuki

This book provides key ideas for the design and analysis of complex energy management systems (EMS) for distributed power networks. Future distributed power networks will have strong coupling with (electrified) mobility and information-communication technology (ICT) and this book addresses recent challenges for electric vehicles in the EMS, and how to synthesize the distributed power network using ICT. This book not only describes theoretical developments but also shows many applications using test beds and provides an overview of cutting edge technologies by leading researchers in their corresponding fields. Describes design and analysis of energy management systems;Illustrates the synthesis of distributed energy management systems based on aggregation of local agents;Discusses dependability issues of the distributed EMS with emphasis on the verification scheme based on remote-operational hardware-in-the-loop (HIL) simulation and cybersecurity.

Design and Analysis of Security Protocol for Communication

by Sheng-Lung Peng Dinesh Goyal S. Balamurugan O. P. Verma

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

Design and Applications of Nature Inspired Optimization: Contribution of Women Leaders in the Field (Women in Engineering and Science)

by Dipti Singh Vanita Garg Kusum Deep

This book gives a detailed information of various real-life applications from various fields using nature inspired optimization techniques. These techniques are proven to be efficient and robust in many difficult problems in literature. The authors provide detailed information about real-life problems and how various nature inspired optimizations are applied to solve these problems. The authors discuss techniques such as Biogeography Based Optimization, Glow Swarm Optimization, Elephant herd Optimization Algorithm, Cuckoo Search Algorithm, Ant Colony Optimization, and Grey Wolf Optimization etc. These algorithms are applied to a wide range of problems from the field of engineering, finance, medicinal etc. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in nature inspired optimization, inspiring women and men, girls and boys to enter and apply themselves to the field.

Design and Architecture for Signal and Image Processing: 15th International Workshop, DASIP 2022, Budapest, Hungary, June 20–22, 2022, Proceedings (Lecture Notes in Computer Science #13425)

by Karol Desnos Sergio Pertuz

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022. The 13 full included in the volume were carefully reviewed and selected from 32 submissions. They are organized in the following topical sections: leading signal, image and video processing and machine learning in custom embedded, edge and cloud computing architectures and systems.

Design and Control of Swarm Dynamics

by Roland Bouffanais

The book is about the key elements required for designing, building and controlling effective artificial swarms comprised of multiple moving physical agents. Therefore this book presents the fundamentals of each of those key elements in the particular frame of dynamic swarming, specifically exposing the profound connections between these elements and establish some general design principles for swarming behaviors. This scientific endeavor requires an inter-disciplinary approach: biomimetic inspiration from ethology and ecology, study of social information flow, analysis of temporal and adaptive signaling network of interaction, considerations of control of networked real-time systems, and lastly, elements of complex adaptive dynamical systems. This book offers a completely new perspective on the scientific understanding of dynamic collective behaviors thanks to its multi-disciplinary approach and its focus on artificial swarm of physical agents. Two of the key problems in understanding the emergence of swarm intelligent behaviors are identifying the social interaction rules a. k. a. the behavioral algorithm and uncovering how information flows between swarming agents. While most books about swarm dynamics have been focusing on the former, this book emphasizes the much-less discussed topic of distributed information flow, always with the aim of establishing general design principles.

Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks)

by Chandra Sekhar Mukherjee Dibyendu Roy Subhamoy Maitra

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services

by Puthiyavan Udayakumar

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF.The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF. What You Will LearnDesign and deploy security for infrastructure, data, and applicationsDesign and deploy an identify solutionDesign and deploy a protect solutionDesign and deploy a detect solutionDesign and deploy a respond solutionDesign and deploy a recover solutionWho This Book Is ForCyber system administrators and architects working with Microsoft Azure integrated services

Design and Deploy Azure VMware Solutions: Build and Run VMware Workloads Natively on Microsoft Azure

by Puthiyavan Udayakumar

Learn the essential design and deployment skills to utilize Azure VMware Solution to seamlessly move your VMware-based workloads from your datacenter to Azure and to integrate your VMware environment with Azure. This book will teach you how to manage your existing environments with the same VMware products you already know while modernizing your applications with Azure native services. Design and Deploy Azure VMware Solutions starts by reviewing Azure VMware essentials, followed by a walkthrough of the methods of preparing and expanding to Azure VMware Solution. Here, you will learn about the layers of Microsoft AVS, including the vSphere, vSAN, NSX-T, and assess and migrate on-prem VMware workloads to Azure VMware Solution using HCX. Further, you will understand how to deploy the desktop and learn Hosting Pool using Horizon on Microsoft Azure, a modern approach to managing and securing Horizon components. VMware Tanzu for modernizing applications in Azure and disaster recovery for VMware workloads in Azure is then discussed in detail. Finally, you will learn monitoring and operations management using the VMware vRealize Suite and see a demonstration of how to plan and deploy Infrastructure as a Service (IaaS) for Azure VMware Solution via vRealize Automation. After reading the book, you will be able to migrate or extend VMware workloads from on-premises to Azure without the need to re-architect applications or retool operations.What Will You Learn Get started with Azure VMware SolutionPrepare and plan to utilize Azure VMware SolutionDesign and deploy Azure VMware SolutionManage and secure Azure VMware Solution Who Is This Book For Azure VMware administrators and Azure Cloud Architects.

Design and Deploy Microsoft Azure Virtual Desktop: An Essential Guide for Architects and Administrators

by Puthiyavan Udayakumar

Design and build the new desktop service from Microsoft. This book offers a modern framework, design methodology, and best practices of design and deployment for virtual apps and desktops.Microsoft Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) which is simple to deploy, accessible from any device, easy to manage, and secure. The book starts with AVD essentials and its critical features, followed by the planning and method of preparing for AVD. You will go through defining the requirements and assessing by setting the AVD application baseline, network requirements, and security requirements. Next, you will learn how to design and deploy the core infrastructure of Microsoft AVD to understand its Access Layer, Control Layer, Resource Layer, Hosting Layer, and User Layer. You will also learn how to design the desktop and Host Pool of AVD. And you will learn the modern way to manage and secure AVD components.After reading this book, you will have the right blend of knowledge and skills to set up and run the Azure cloud-based virtual desktop and virtual applications.What You Will LearnUnderstand the key design and deployment essentials of AVDPlan, gather requirements, and assess for AVDDesign and deploy Core Infrastructure of Microsoft AVDIntegrate with profile and personalization managementMonitor and secure Azure virtual desktopsWho Is This Book For:AVD system administrators and AVD system architects

Design and Development of Efficient Energy Systems (Artificial Intelligence and Soft Computing for Industrial Transformation)

by Suman Lata Tripathi Sanjeevikumar Padmanaban Dushyant Kumar Singh P. Raja

There is not a single industry which will not be transformed by machine learning and Internet of Things (IoT). IoT and machine learning have altogether changed the technological scenario by letting the user monitor and control things based on the prediction made by machine learning algorithms. There has been substantial progress in the usage of platforms, technologies and applications that are based on these technologies. These breakthrough technologies affect not just the software perspective of the industry, but they cut across areas like smart cities, smart healthcare, smart retail, smart monitoring, control, and others. Because of these “game changers,” governments, along with top companies around the world, are investing heavily in its research and development. Keeping pace with the latest trends, endless research, and new developments is paramount to innovate systems that are not only user-friendly but also speak to the growing needs and demands of society. This volume is focused on saving energy at different levels of design and automation including the concept of machine learning automation and prediction modeling. It also deals with the design and analysis for IoT-enabled systems including energy saving aspects at different level of operation. The editors and contributors also cover the fundamental concepts of IoT and machine learning, including the latest research, technological developments, and practical applications. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in the area of IoT and machine technology, this is a must-have for any library.

Design and Development of Training Games

by Talib S. Hussain Susan L. Coleman

The multidisciplinary nature of learning-games development is key to successful projects. In this book, field leaders in serious games and professionals in entertainment games share practical guidelines and lessons from their own experiences researching and developing learning games. This volume includes: • The key elements of design and development that require particular attention from multiple disciplines to ensure success • An overview of successful models and methods, and the trade-offs made throughout the process, to guide development • Cohesive, multidisciplinary views of the issues that arise and of the techniques applied in order to produce effective learning games grounded in specific experiences, community consensus, and analysis of successful learning games that have already been released • The stories behind the games, to illustrate how final design and development decisions were reached. Aimed at professionals and academics interested in developing and researching learning games, it offers a comprehensive picture of the state of the art.

Design and Development Research: Methods, Strategies, and Issues

by Rita C. Richey James D. Klein

AECT Design & Development Outstanding Book Award for 2008! Design and Development Research thoroughly discusses methods and strategies appropriate for conducting design and development research. Rich with examples and explanations, the book describes actual strategies that researchers have used to conduct two major types of design and development research: 1) product and tool research and 2) model research. Common challenges confronted by researchers in the field when planning and conducting a study are explored and procedural explanations are supported by a wide variety of examples taken from current literature. Samples of actual research tools are also presented. Important features in this volume include: concise checklists at the end of each chapter to give a clear summary of the steps involved in the various phases of a project; an examination of the critical types of information and data often gathered in studies, and unique procedures for collecting these data; examples of data collection instruments, as well as the use of technology in data collection; and a discussion of the process of extracting meaning from data and interpreting product and tool and model research findings. Design and Development Research is appropriate for both experienced researchers and those preparing to become researchers. It is intended for scholars interested in planning and conducting design and development research, and is intended to stimulate future thinking about methods, strategies, and issues related to the field.

Design and Implementation of Fully-Integrated Inductive DC-DC Converters in Standard CMOS

by Michiel Steyaert Mike Wens

CMOS DC-DC Converters aims to provide a comprehensive dissertation on the matter of monolithic inductive Direct-Current to Direct-Current (DC-DC) converters. For this purpose seven chapters are defined which will allow the designer to gain specific knowledge on the design and implementation of monolithic inductive DC-DC converters, starting from the very basics.

Design and Implementation of Practical Schedulers for M2M Uplink Networks

by Akshay Kumar Ahmed Abdelhadi T. Charles Clancy

This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies;Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler;Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.

The Design and Implementation of the FreeBSD Operating System

by Marshall Kirk Mckusick George V. Neville-Neil Robert N.M. Watson

This technical guide to FreeBSD's internal structure has now been extensively updated to cover all major improvements between Versions 5 and Version 11.

Design and Implementation of the MTX Operating System

by K. C. Wang

This course-tested textbook describes the design and implementation of operating systems, and applies it to the MTX operating system, a Unix-like system designed for Intel x86 based PCs. Written in an evolutional style, theoretical and practical aspects of operating systems are presented as the design and implementation of a complete operating system is demonstrated. Throughout the text, complete source code and working sample systems are used to exhibit the techniques discussed. The book contains many new materials on the design and use of parallel algorithms in SMP. Complete coverage on booting an operating system is included, as well as, extending the process model to implement threads support in the MTX kernel, an init program for system startup and a sh program for executing user commands. Intended for technically oriented operating systems courses that emphasize both theory and practice, the book is also suitable for self-study.

The Design and Implementation of the RT-Thread Operating System

by Qiu Yi Xiong Puxiang Tianlong Zhu

Since the release of V0.01 in 2006, to the present V4.0 version, RT-Thread has developed a reputation among developers for its open source strategy. RT-Thread has gained a large following among members of the embedded open source community in China with hundreds of thousands of enthusiasts. RT-Thread is widely used in energy, automotive, medical, consumer electronics, among other applications, making it a mature and stable open source embedded operating system. The purpose of RT-Thread RTOS Design and Implementation is to create an easy learning curve for mastering RT-Thread, so that more developers can participate in the development of RT-Thread and work together to create an open source, tiny, and beautiful Internet of Things operating system. The book’s first part introduces the RT-Thread kernel and starts with an overview of RT-Thread before covering thread management, clock management, inter-thread synchronization, inter-thread communication, memory management, and interrupt management. The second part begins with RT-Thread kernel porting and explains how to port RT-Thread to a hardware board to run it. The second part also introduces RT-Thread components and discusses the Env development environment, FinSH console, device management, and network framework. Additional topics covered include: The I/O device framework Virtual file systems Peripheral interfaces Devices including the PIN device, UART device, and ADC device, among others. Each chapter features code samples, as well as helpful tables and graphs, so you can practice as you learn as well as perform your own experiments.

Refine Search

Showing 14,526 through 14,550 of 53,616 results