Electronics and communications engineering Books
Nova Science Publishers Inc Hydroelectricity & Power Electronics:
Book SynopsisIn modern society, the utility power grid is supposed to guarantee load management, demand side management, as well as to use the market price of electricity and forecasting of energy (eg: based on wind and solar renewable sources) in order to optimise the whole electrical distribution system. An optimised power system is expected to have the following characteristics: high efficiency, high availability, good quality of service and high level of security, which leads to the concepts of distributed generation and smart-grid. This book discusses different emerging technologies, principles and applications of power electronics and hydroelectric power. Some of the topics discussed include parallel three-phase back-to-back converters; risk management of hydropower projects; and cascade converters for wide conversion ratios.
£182.99
O'Reilly Media Make: Volume 56
Book SynopsisIt doesn't take a fully-stocked laboratory to perform biological scientific experiments. Make: Volume 56 shows you how to make electricity using everyday mud, extract DNA with a 3D-printed centrifuge, and isolate fruit DNA in your cocktails. Plus learn about one group hacking medical devices for real time diabetes data and another that's trying to open source life-saving insulin. Plus, more than 18 projects, including: Make a teeny-tiny FM transmitter spy bug Build a retro-style cell phone with the cutting-edge Adafruit Feather Fona Learn to make your own fasteners by tapping and threading
£7.59
O'Reilly Media How to Use a Breadboard!
Book Synopsishis full-color, illustrated handbook uses comic book-style panels to explain the basics of using a breadboard; then it walks you through ten fun and educational projects. You'll learn-by-doing as you study the circuit diagrams and colorful drawings, working your way through each project. Bonus features include an "X-Ray" drawing of the inside of the breadboard and a guide to understanding resistor color codes. p> A solderless breadboard is the perfect platform for learning electronics, whether at home or in the classroom, because it can be used over and over again for different circuits. With the projects in this handbook, you will learn how to use a light sensor, a potentiometer, a diode, a 555 timer, capacitors, transistors, and more! You'll also be challenged to actively figure out what else you can do with the circuits you have built. Learn how to build the following circuits: Dark Detector LED Flasher Electric Cricket Breathing LED Banshee Siren Light Theramin Blues Organ Bike Signal Light Touch Switch Led Color Organ As you gain experience building the circuits, you'll also learn how to read schematics - the shorthand language of electronics. The glossary provides definitions and illustrations for terms that may be unfamiliar. There's no better way to learn than by making things yourself. In this booklet you won't be handed all the answers. You'll be encouraged to experiment, and you'll be asked questions that you'll have to try to answer yourself. Get started with your breadboard experiments today. Electronics is the perfect STEM subject because it touches on all the key components - science, technology, engineering, and mathematics. Build your technical skills with this hands-on learning course!
£7.59
Morgan & Claypool Publishers Computer Techniques for Dynamic Modeling of DC-DC
Book SynopsisComputers play an important role in the analyzing and designing of modern DC-DC power converters. This book shows how the widely used analysis techniques of averaging and linearization can be applied to DC-DC converters with the aid of computers. Obtained dynamical equations may then be used for control design.The book is composed of two chapters. Chapter 1 focuses on the extraction of control-to-output transfer function. A second-order converter (a buck converter) and a fourth-order converter (a Zeta converter) are studied as illustrative examples in this chapter. Both ready-to-use software packages, such as PLECS® and MATLAB® programming, are used throught this chapter.The input/output characteristics of DC-DC converters are the object of considerations in Chapter 2. Calculation of input/output impedance is done with the aid of MATLAB® programming in this chapter. The buck, buck-boost, and boost converter are the most popular types of DC-DC converters and used as illustrative examples in this chapter.This book can be a good reference for researchers involved in DC-DC converters dynamics and control.Table of Contents Acknowledgments Extraction of Small-Signal Transfer Functions Using PLECS® Extraction of Small-Signal Transfer Functions Using PLECS® On the Extraction of Input and Output Impedance of PWM DC-DC Converters On the Extraction of Input and Output Impedance of PWM DC-DC Converters Author's Biography
£41.75
Nova Science Publishers Inc Recent Trends in Microstrip Antennas for Wireless
Book SynopsisThe book covers a broad range of topics, including basic antenna theory, analytical and numerical techniques in applied electromagnetics, antenna arrays (including adaptive), aperture antennas, antenna measurements, microwave engineering, industrial and medical microwave applications, and so on. 5G propagation, MIMO and array antennas, optical nano-antennas, scattering and diffraction, computational electromagnetics, radar systems, plasmonics and nanophotonics, and advanced EM materials and structures such as metamaterials and metasurfaces are among the subjects covered in the book.
£58.39
Rebel Girls Inc Ada Lovelace Cracks the Code
Book SynopsisFrom the world of Good Night Stories for Rebel Girls comes a story based on the exciting real-life adventures of Ada Lovelace, one of the world's first computer programmers.Growing up in nineteenth century London, England, Ada is curious about absolutely everything. She is obsessed with machines and with creatures that fly. She even designs her own flying laboratory!According to her mother, Ada is a bit too wild, so she encourages Ada to study math. At first Ada thinks: Bleh! Who can get excited about a subject without pictures? But she soon falls in love with it. One day she encounters a mysterious machine, and from that moment forward Ada imagines a future full of possibility-one that will eventually inspire the digital age nearly two hundred years later.Ada Lovelace Cracks the Code is the story of a pioneer in the computer sciences, and a testament to women's invaluable contributions to STEM throughout history.This historical fiction chapter book also includes additional text on Ada Lovelace's lasting legacy, as well as educational activities designed to teach simple coding and mathematical concepts.About the Rebel Girls Chapter Book SeriesMeet extraordinary real-life heroines in the Good Night Stories for Rebel Girls chapter book series! Introducing stories based on the lives and times of extraordinary women in global history, each stunningly designed chapter book features beautiful illustrations from a female artist as well as bonus activities in the backmatter to encourage kids to explore the various fields in which each of these women thrived. The perfect gift to inspire any young reader!Trade Review"Filled with examples of creativity sparked by small observations, this detailed look at the earliest days of modern computing is engaging, informative, and inspiring." ― Common Sense Media"Activities at the back of the book make [this] great to spark inspiration in girls and boys." ― Metro ParentTable of ContentsENGAGED COMMUNITY - Thanks to a supportive and active global community, Good Night Stories for Rebel Girls broke crowdfunding records. Volume 2 followed in 2017 and broke the record set by volume 1, making the series the highest funded publishing project in crowdfunding history. Since publication, the books have sold over 4 million copies and they have been translated into over 47 languages and are available worldwide. The Rebel Girls community counts on us to tell stories that help every girl in the world dream bigger, aim higher, and fight harder. STEM-ESTEEM - Most people who turn out to be scientists or engineers or mathematicians, first showed interest in those fields in elementary school. In fact, research shows that girls will not study or enter a career in STEM if they do not cultivate interests by age seven. It's incredibly rare to encounter female pioneers in the STEM space. Ada Lovelace is an excellent example of a role model whose ideas are approachable enough for a child to comprehend, and big enough to inspire. EDUCATIONAL ACTIVITIES - The book will include exercises and challenges for the young reader to learn the fundamental rules of coding. FULL-COLOR ILLUSTRATION - Unlike most chapter books for this age range, this title will incorporate at least ten full-color illustrations by Marina Muun. They will depict Ada at all ages, Victorian England, the mechanisms of the infamous difference machine, as well as Ada's incredible handwriting.
£8.99
New Age International (UK) Ltd Microcontroller and Embedded Systems
Book Synopsis
£23.75
New Age International (UK) Ltd Introduction to Control Engineering: Modeling,
Book Synopsis
£33.25
ISTE Ltd and John Wiley & Sons Inc Traffic Management
Book SynopsisTransport systems are facing an impossible dilemma: satisfy an increasing demand for mobility of people and goods, while decreasing their fossil-energy requirements and preserving the environment. Additionally, transport has an opportunity to evolve in a changing world, with new services, technologies but also new requirements (fast delivery, reliability, improved accessibility). The subject of traffic is organized into two separate but complementary volumes: Volume 3 on Traffic Management and Volume 4 on Traffic Safety. Traffic Management, Volume 3 of the 'Research for Innovative Transports' Set, presents a collection of updated papers from the TRA 2014 Conference, highlighting the diversity of research in this field. Theoretical chapters and practical case studies address topics such as cooperative systems, the global approach in modeling, road and railway traffic management, information systems and impact assessment.Table of ContentsAcknowledgments xvii Preface xix Introduction xxiiiSimon COHEN and George YANNIS Part 1. Data Collection 1 Chapter 1. A Review of Statewide Traffic Data Collection, Processing, Projection and Quality Control 3Rafiqul TAREFDER and James BROGAN 1.1. Introduction 3 1.2. Current traffic data collection in New Mexico 4 1.3. NMDOT data processing and reporting 9 1.4. Traffic data projection and quality control 10 1.5. Conclusions 17 1.6. Acknowledgments 17 1.7. Bibliography 18 Chapter 2. SYNCRO – An Innovative Public Procurement of an Advanced Data Gathering System for Interurban Roads Based on its Technologies 19Jean-Christophe MAISONOBE, Jean Daniel DEMOND, Giannicola MARENGO, Dolores ADAMSKI, Diego ALBESANO and Olivier LATOUILLE 2.1. Introduction 19 2.2. Elaboration of the SYNCRO technical vision: the SYNCRO functional program 21 2.3. A system to gather road data and to provide the current operational road management center with data 24 2.4. Impact and potential of the SYNCRO system 26 2.5. An innovative legal framework to implement three phases of the SYNCRO project 27 2.6. Conclusion 30 2.7. Acknowledgments 32 Chapter 3. Tailoring a Reference Model for C-ITS Architectures and Using a DATEX II Profile to Communicate Traffic Signal Information 33Jörg FREUDENSTEIN and Ian CORNWELL 3.1. Introduction 33 3.2. Architecture of intelligent transport systems 34 3.3. A generic C-ITS architecture 36 3.4. A tailored architecture for the use case “Traffic Light Phase Assistant” 39 3.5. A DATEX II profile to communicate traffic light information 41 3.6. Summary 43 3.7. Bibliography 44 Chapter 4. Sensor City Mobility: The City of Assen as a “Living Lab” for Smart Mobility Solutions Using Sensor Data 45Jan BURGMEIJER, Janiek DE KRUIJFF, Ernst Jan VAN ARK, Gerdien KLUNDER and Diana VONK NOORDEGRAAF 4.1. Introduction 45 4.2. Architecture, sensor network and technologies used 48 4.3. Use cases for mobility 51 4.4. Modeling 54 4.5. Preliminary results and evaluation of the experiment 57 4.6. Acknowledgments 58 4.7. Bibliography 59 Part 2. Traffic Modeling and Simulation 61 Chapter 5. Forecasting Capabilities of a Micro-Simulation Method for Trip Generation 63Jorge CABRERA DELGADO and Patrick BONNEL 5.1. Introduction 63 5.2. Methodology 65 5.3. Results 72 5.4. Conclusion 75 5.5. Acknowledgments 75 5.6. Bibliography 75 Chapter 6. Modeling and Solving International Journey Planning Problems 79Konstantinos N. ANDROUTSOPOULOS and Konstantinos G. ZOGRAFOS 6.1. Introduction 79 6.2. Defining international itinerary planning problems 80 6.3. Modeling issues 83 6.4. Previous related work 85 6.5. Algorithmic approach 87 6.6. Concluding remarks 92 6.7. Acknowledgments 92 6.8. Bibliography 92 Chapter 7. Optimized Intermodal Roundtrips in Transport Networks 95Cecília VALE and Isabel RIBEIRO 7.1. Introduction 95 7.2. Model description 96 7.3. Computational applications 98 7.4. Conclusions 102 7.5. Bibliography 103 Chapter 8. Modeling Traffic Hindrance Caused by Road Construction as Part of a Multicriteria Assessment Framework 105Eric VAN BERKUM and Henny TER HUERNE 8.1. Introduction 105 8.2. Framework 106 8.3. Route choice during road works 111 8.4. Example 115 8.5. Conclusion 117 8.6. Acknowledgments 118 8.7. Bibliography 118 Part 3. Traffic Management, Monitoring and Routing 121 Chapter 9. Behavioral Responses to Traffic Congestion – Findings from Paris, São Paulo and Mumbai 123Gaele LESTEVEN 9.1. Introduction 123 9.2. Methodology 127 9.3. Results 130 9.4. Conclusions 134 9.5. Acknowledgments 136 9.6. Bibliography 136 Chapter 10. Empirical Analysis of Lane Changing Behavior at a Freeway Weaving Section 139Florian MARCZAK, Winnie DAAMEN and Christine BUISSON 10.1. Introduction 139 10.2. Data collection site and technique 142 10.3. Methodology and definitions 143 10.4. Results 145 10.5. Discussion and conclusion 149 10.6. Bibliography 150 Chapter 11. Applying and Testing a New Generation Traffic Management with Multi-objectives 153Martijn DE KIEVIT and Yusen CHEN 11.1. Introduction 153 11.2. Definitions 155 11.3. Literature review 156 11.4. Methodology 159 11.5. Application cases and results 159 11.6. Concluding remarks 164 11.7. Acknowledgments 164 11.8. Bibliography 165 Chapter 12. ON-TIME: A Framework for Integrated Railway Network Operation Management 167Thomas ALBRECHT, and Meena DASIGI 12.1. Introduction 167 12.2. Real-time perturbation management 171 12.3. Train speed control 175 12.4. Demonstration and validation approach 178 12.5. Conclusions 180 12.6. Acknowledgments 180 12.7. Bibliography 180 Chapter 13. A Multi-Lane Capacity Model Designed for Variable Speed Limit Applications 183Aurélien DURET 13.1. Background 183 13.2. MLC model 186 13.3. Meso-LWR model and multi-lane capacity model 192 13.4. Application 194 13.5. Discussion 199 13.6. Acknowledgments 200 13.7. Bibliography 200 Chapter 14. Evaluation Parameters of Re-routing Strategy 203Vladimir ZYRYANOV and Anastasia FEOFILOVA 14.1. Introduction 203 14.2. Simulation framework 205 14.3. Determination of the dynamic re-routing start based on traffic flow conditions 209 14.4. Conclusion 214 14.5. References 215 Part 4. Travel Information 217 Chapter 15. Pre-Trip Road Information Impact Assessment: A Literature Review 219Sylvain BELLOCHE, Charlotte PIERREFEU and Caroline SORAND 15.1. Introduction 219 15.2. Pre-trip road information content and broadcasting media 220 15.3. Determining factors for user choice 223 15.4. Pre-trip road information impacts 225 15.5. Conclusions and discussion 231 15.6. Bibliography 232 Chapter 16. Transferability Study on Full-scale Implementation of Real-time Passenger Information 235Mitja KLEMENCIC, Vlasta RODOšEK, Marko CELAN and Marjan LEP 16.1. Introduction 235 16.2. RTPI testing in Maribor 236 16.3. Benefits of the RTPI system 238 16.4. Cost benefit analysis and RTPI system 240 16.5. Mobility toolbox as transferability tool 246 16.6. Conclusion 248 16.7. Acknowledgments 248 16.8. Bibliography 249 Chapter 17. Excess Commuting and Commuting Economy: Peak and Off-Peak Variation in Travel Efficiency Measures 251Enda MURPHY 17.1. Introduction . 251 17.2. Excess commuting, commuting economy and off-peak travel 252 17.3. Data and methods 256 17.4. Results 259 17.5. Conclusions and limitations 264 17.6. Bibliography 265 Chapter 18. Deployment of Interoperable Cross-Border Multimodal Traveler Information in Central Europe 267Gerhard MENZEL, Martin BÖHM and Katharina ZWICK 18.1. Introduction 267 18.2. The EDITS concept 269 18.3. Conclusion 274 18.4. Bibliography 275 Part 5. Assessment and Impacts 277 Chapter 19. The Impacts of Cooperative raffic Systems on Safety, Environment and Travel Times: A Literature Survey 279Isabela MOCANU, Philippe NITSCHE and Kerry MALONE 19.1. Introduction 279 19.2. Description of systems and bundles 281 19.3. Reviewed literature 283 19.4. Methodology 284 19.5. Results 287 19.6. Conclusions and recommendations 289 19.7. Acknowledgments 290 19.8. Bibliography 291 Chapter 20. The Impact of Navigation Support and Traffic Information on Distance-keeping Behavior 293Aikaterini TOULIOU, Evangelia GAITANIDOU and Evangelos BEKIARIS 20.1. Introduction 293 20.2. Methods 296 20.3. Results 299 20.4. Discussion 302 20.5. Bibliography 304 Chapter 21. Impact Evaluation of Traffic Performance and Road Safety: A Case Study on an Urban Motorway in France 307Simon COHEN and Zoi CHRISTOFOROU 21.1. Introduction 307 21.2. The site and the its application 308 21.3. Evaluation of the impact on traffic 310 21.4. Road safety implications 313 21.5. Discussion 315 21.6. Conclusions 316 21.7. Bibliography 317 Chapter 22. Assessment of the Main New Travel-times Calculation Technologies on Lyon East Ring Road 319Eric PURSON, Alexis BACELAR, Eric KLEIN, Bruno LEVILLY and Fabrice RECLUS 22.1. Introduction 319 22.2. The trial site 321 22.3. Assessed technologies 323 22.4. Implemented methodology 324 22.5. Innovative administrative procedure 328 22.6. Conclusion 329 22.7. Acknowledgments 329 22.8. Bibliography 329 Chapter 23. Rail Externalities: Assessing the Social Cost of Rail Congestion 331María PÉREZ HERRERO, Julien BRUNEL and Gregoire MARLOT 23.1. Introduction 331 23.2. Related literature 332 23.3. The model and the econometric strategy 335 23.4. The data set 336 23.5. Results 338 23.6. Conclusions 341 23.7. Acknowledgments 342 23.8. Bibliography 342 List of Authors 345 Index 349
£125.06
ISTE Ltd and John Wiley & Sons Inc Secure Connected Objects
Book SynopsisIn this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects. This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".Table of ContentsForeword xi Preface xiii Acknowledgements xv Preamble xvii Part 1 Introduction – The Buzz about IoT and IoE 1 Chapter 1 Introduction 3 1.1 Definition of communicating- or connected Things 3 1.1.1 Connected Things – Communicating Things 3 1.1.2 Definition of the IoT 4 1.1.3 Internet of X 5 Chapter 2 The (Overly) Vast World of IoT 9 2.1 2011–2016: the craze for the term “Connected Thing” 9 2.1.1 The catch-all 9 2.1.2 Fashion, buzz and “bubble” 10 2.1.3 “Hype” cycle for innovations 11 2.2 The true goal of this book 14 Chapter 3 Why a Connectable Thing? 15 3.1 Examples of connectable things 15 3.1.1 Home care for the elderly 16 3.1.2 In the automotive industry 19 Part 2 Constraints Surrounding an IoT Project 21 Chapter 4 Aspects to be Taken into Consideration 23 4.1 Aspects pertaining to the concrete realization of Connected Things 23 4.1.1 Financial and marketing aspects 24 4.1.2 Technical and industrial aspects 24 4.1.3 Regulatory and normative aspects 24 4.1.4 Security aspects 24 4.1.5 Cost aspects 24 Chapter 5 Financial and Marketing Aspects 27 5.1 Economic aspects 27 5.1.1 Saleable / buyable 27 5.2 Ergonomic aspects 29 5.2.1 Mechanical form and design vs ergonomics 29 Chapter 6 Technical and Industrial Aspects 31 6.1 Technical aspects 31 6.1.1 Life cycle of a new product 31 6.1.2 Techno-economic feasibility 32 6.1.3 Design 32 6.1.4 Industrialization, manufacturing process and quality assurance 32 6.2 Energy aspects 32 6.2.1 Power supply to the Thing 33 6.3 Industrial aspects 39 Chapter 7 Regulatory and Normative Aspects 41 7.1 Regulatory aspects and recommendations 41 7.1.1 Radiofrequency regulations 42 7.2 Health-related recommendations 43 7.2.1 Exposure of the human body to electromagnetic fields 44 7.2.2 Specific Absorption Rate (SAR) 44 7.3 Societal regulations and individual freedoms (privacy) 45 7.3.1 The various data needing to be protected 45 7.3.2 Loi Informatique et Libertés 45 7.3.3 Mandate 436, PIA and RFID and IoT applications 46 7.3.4 GDPR – General Data Protection Regulation 49 7.3.5 Privacy by design 51 7.4 Environmental regulations and recycling 53 7.4.1 Electronic waste treatment 53 7.4.2 Regulation and organization of the chain 54 7.4.3 Labeling of electrical and electronic equipment 54 7.5 Normative aspects 55 7.5.1 ISO/AFNOR 55 7.5.2 IEEE 56 7.5.3 ETSI 56 Chapter 8 Security Aspects 59 8.1 Security aspects 59 8.1.1 The weak links 60 8.1.2 Possible solutions 62 8.1.3 Definition and choice of security target 63 8.1.4 Concepts of security levels applied in IoT 64 8.1.5 True security – the “Secure Element” 67 8.1.6 Cryptography 70 8.1.7 Symmetric and asymmetric encryption 71 8.1.8 Consumer Things, IoT, security… and the Cloud 75 8.2 Judging the quality of security 80 8.3 Some thoughts about security, privacy and IoT 81 8.4 Vulnerabilities and attacks in the IoT chain 82 8.4.1 Attacks on the software layer 83 8.4.2 Attacks on the board or Thing 84 8.4.3 Attacks on the integrated circuits 84 8.4.4 Security standards 85 Part 3 Overall Architecture of the IoT Chain 87 Chapter 9 Communication Models in IoT 89 9.1 Communication models in IoT 89 9.1.1 OSI model 89 9.1.2 TCP/IP model 92 9.1.3 By way of conclusion 98 Chapter 10. Overall Architecture of an IoT System 101 10.1 Overall architecture of a CT and IoT solution 101 10.1.1 Description of the complete chain 102 10.2 From a more technological point of view 102 10.2.1 Architecture and overview of an IoT chain 102 10.2.2 The “base station/gateway” 106 10.2.3 The “Cloud” zone 109 10.2.4 The “User” zone 110 10.3 The very numerous protocols involved 113 Part 4 Detailed Description of the IoT Chain 117 Part 4A From the User (The Outside World) to the Thing 119 Chapter 11 From the Outside World to the Thing 121 11.1 Connection of the Thing to the outside world 121 11.1.1 Using sensors 121 11.1.2 Using wired connections 122 11.1.3 Using RF links 122 11.1.4 Very Short Range (<10 cm) 122 11.1.5 Short range SR Wide band (tens of meters) 124 Chapter 12 The Secure Connected Thing 127 12.1 Physical constitution of the Thing 127 12.1.1 Sensors 127 12.1.2 Local intelligence – microcontroller 128 12.1.3 Security (SE)… 128 Part 4B From the Thing to the Base Station 131 Chapter 13 Means of Communication to Access a Base Station 133 13.1 Possible network connectivity technologies 133 13.1.1 Local or ultra-local non-operated RF networks 135 13.1.2 Extended-deployment operated RF networks 136 13.1.3 Is there space for all these technologies? 136 13.2 Medium-range MR Wide-band (hundreds of meters) 136 13.2.1 Wi-Fi 137 13.3 Long-range (LR– tens of kilometers) 138 13.3.1 NB, UNB, WB, UWB, FHSS, DSSS and RF regulations 138 13.3.2 Regulators and regulations 140 13.3.3 RF bases 146 13.4 LTN – Low-Throughput Network 152 13.4.1 Long Range LR - LTN 153 13.4.2 LR LTN in (U)NB– SIGFOX 156 13.4.3 LR LTN in DSSS (spectrum spreading) – LoRa, from Semtech 167 13.4.4 A discussion of spectrum spreading – SS 169 13.4.5 LR WB 192 13.4.6 Operated LR WB networks 196 Part 4C From the Base Station to the Server 203 Chapter 14 Network Access Layer – IP 205 14.1 IPv4 205 14.1.1 Operation 206 14.1.2 Services provided 206 14.1.3 Reliability 206 14.2 IPv6 207 14.2.1 Differences between IPv6 and IPv4 207 14.2.2 Problems of privacy and/or anonymity? 209 14.3 6LoWPAN 209 14.3.1 Description of the technology 210 14.3.2 Integration of an IPv6 packet into an IEEE 802.15.4 frame 210 14.3.3 Autoconfiguration of an IP address 211 14.3.4 Network supervision and management 211 14.3.5 Constraints on “upper-layer” applications 211 14.3.6 Security 212 14.3.7 Routing 212 Chapter 15 The Server 215 15.1 Conventional functions of a server in IoT 216 Chapter 16 Transport and Messaging Protocols 219 16.1 Transport 219 16.1.1 Operation 220 16.1.2 Structure of a TCP segment 220 16.2 “IoT messaging” technologies 221 16.2.1 Main protocol parameters 221 16.3 Protocols 225 16.4 HTTP – HyperText Transfer Protocol 226 16.5 Http/2 227 16.6 MQTT – Message Queuing Telemetry Transport 227 16.6.1 Security in MQTT 229 16.7 CoAP – Constrained Application Protocol 229 16.8 XMPP 230 16.9 DDS – Data Distribution Service 231 16.10 AMQP – Advanced Message Queuing Protocol 232 16.11 SMQ 233 16.12 JMS – Java Messaging Service 233 16.13 Other protocols 234 16.14 The broker 234 16.14.1 Examples of possibilities 235 16.15 Programming languages 236 16.16 Operating systems 236 Part 4D From the Cloud Server to the Various Users 237 Chapter 17 Cloud and Fog Computing 239 17.1 Cloud computing? 239 17.1.1 What is its mode of operation? 240 17.1.2 Advantages and benefits in IoT applications 240 17.1.3 Types of Cloud computing 241 17.1.4 Cloud products and services 241 17.2 Example: the PaaS platform AWS IoT 242 17.3 How security is managed 244 17.4 Fog computing? 245 17.5 Big data 246 17.6 Natural interfaces 247 Part 5 Concrete Realization of an IoT Solution Examples and Costs 249 Chapter 18 Examples of the Concrete Realization of Connected Things 251 18.1 Subject/application taken as an example 251 18.1.1 Architecture of the product: a communicating physical Thing 253 18.1.2 Mandatory steps in creating the Thing 255 Chapter 19 Cost Aspects 261 19.1 CAPEX and OPEX are in the same boat… 261 19.1.1 CAPEX 262 19.1.2 OPEX 273 19.1.3 Conclusions 275 19.1.4 Very important conclusions 276 Conclusion 279 Bibliography 281 Index 285
£125.06
ISTE Ltd and John Wiley & Sons Inc Designing Interactive Hypermedia Systems
Book SynopsisThis book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and technical complexities confronted by researchers in social, communication, humanities, art and design.Table of ContentsIntroduction xi Everado REYES-GARCIA Chapter 1 From Controversies to Decision-making: Between Argumentation and Digital Writing 1 Orélie DESFRICHES-DORIA 1.1 Introduction 1 1.2 Hypertexts and hypermedia 2 1.3 From decision-making to the study of controversies 3 1.3.1 Definition of the concept of controversy 3 1.3.2 Shifts from one situation to another 4 1.3.3 Controversy representation 5 1.3.4 Some controversy visualization and processing tools and methods 7 1.4 Detailed presentation of Vesta Cosy 9 1.5 What is the content of argument representations? 14 1.5.1 Interactions between the two fields 14 1.5.2 Theoretical approaches to argumentation 16 1.5.3 Hypermedia structure in the process of decision-making map construction with Vesta Cosy 19 1.6 Application of Vesta Cosy to controversy analysis 22 1.6.1 Characterization of the nature of a controversy 22 1.6.2 Methodological principles of controversy analysis 24 1.7 New digital writings with hypermedia 29 1.7.1 Extension of reasoning and paradigm shift 29 1.7.2 Hyperlinked content according to diversified details 30 1.7.3 Disorientation, hypernarrativity and interactions 32 1.8 Conclusion 33 1.9 Bibliography 33 Chapter 2 Training in Digital Writing Through the Prism of Tropisms: Case Studies and Propositions 37 Stéphane CROZAT 2.1 Abstract 37 2.2 Introduction 37 2.3 Issue: theoretical approach to digital technology 38 2.3.1 The possibility of mechanizing intellectual labor 38 2.3.2 Digitization of content 39 2.3.3 “It has been manipulated”: manipulation as a source of digital content 40 2.3.4 “And it will be again”: manipulation as the future of digital content 41 2.4 Proposition: tropisms of digital content 42 2.4.1 The concept of tropism 42 2.4.2 Modeling of functional tendencies of digital objects 44 2.5 Detailed description of tropisms 44 2.5.1 Abstraction: it has been coded and will be recoded 44 2.5.2 Addressing: it has been found and will be found again 45 2.5.3 Connection: it has been transmitted and will be retransmitted 46 2.5.4 Duplication: it has been copied and will be recopied 46 2.5.5 Transformation: it has been changed and will be changed again 47 2.5.6 Universality: it has been integrated and will be reintegrated 48 2.6 Application: training in digital technology with tropisms 48 2.6.1 Training in ordinary digital writing at the University of Technology of Compiègne (UTC) 48 2.6.2 BABA strings (abstraction and polymorphism) 49 2.6.3 SolSys string (staging, hypertextualization) 51 2.6.4 BD string (transclusion, interactivity) 53 2.7 Case study: training in digital writing at IFCAM 53 2.7.1 Introduction to training 53 2.7.2 Training scenario 54 2.7.3 An experience to increase awareness using Etherpad 54 2.7.4 Understanding the properties of digital technology and theoretical content 56 2.7.5 Assignment 1: analysis of practices 57 2.7.6 Part two: reading and writing, second assignment (critical observation) 57 2.8 Perspective: a MOOC “digital literacy” project 57 2.8.1 Defining information literacy 58 2.8.2 Defining digital technology 59 2.8.3 Issue: teaching information literacy 60 2.8.4 Components of teaching information literacy 61 2.8.5 Format: challenges of MOOCs 62 2.8.6 Proposition: content and scenario for an information literacy MOOC 64 2.9 Conclusion and perspectives 65 2.10 Acknowledgments 66 2.11 Further reading 66 2.12 Bibliography 67 Chapter 3 Assessing the Design of Hypermedia Interfaces: Differing Perspectives 69 María Inés LAITANO 3.1 Man–machine interaction 70 3.1.1 Fundamental principles of usability 70 3.1.2 Cognitive engineering 72 3.2 Mediated human activity 74 3.2.1 The Danish school 76 3.2.2 Instrumental psychology 78 3.3 Meaningful systems 80 3.3.1 Semiotic engineering 80 3.3.2 The sociocognitive model 84 3.3.3 Semiotic scenario 86 3.4 Three mediations: three ways of evaluating a design? 88 3.5 Bibliography 93 Chapter 4 Experience Design: Explanation and Best Practices 97 Leslie MATTÉ GANET 4.1 Several problems identified with interface creation 99 4.1.1 Users have difficulty too often 99 4.1.2 An awkward practice of Experience Design 99 4.1.3 A difficult beginning for Experience Design in France 100 4.1.4 Ill-defined jobs 101 4.1.5 Manufacturers at various XD maturity levels 102 4.2 What is good Experience Design? 104 4.3 How does Experience Design work? 106 4.3.1 A method, more than a result 106 4.3.2 Focused on humans 106 4.3.3 A transformed project management 106 4.3.4 New professions 108 4.3.5 Tools in DX 112 4.4 A powerful approach 114 4.4.1 XD protects from rejection 114 4.4.2 XD allows for an important gain in time 115 4.4.3 The XD facilitator 116 4.5 Example of XD contribution to an industrial project 116 4.5.1 Creating the Website with classic project management 117 4.5.2 Revising the Website with XD project management 121 4.6 How can we improve the quality of Experience Design in the ICT industries? 124 4.6.1 A team with an open mind and empathy 124 4.6.2 Co-design, creativity, ideation and respiration 124 4.6.3 Good skills for appropriate responsibilities 125 4.6.4 The systematic presence of the user and going into the field 126 4.6.5 No longer using the term UX 126 4.7 Conclusion 127 4.8 Bibliography 128 Chapter 5 Designing Authoring Software Environments for the Interactive Arts: An Overview of Mobilizing.js 131 Dominique CUNIN 5.1 Research context: artistic practices of interactivity 131 5.1.1 Art and technique in the face of the digital 131 5.1.2 An idea: an authoring software environment 134 5.2 Computer graphics, game engine, art engine? 138 5.2.1 Reusability 138 5.2.2 Game engine: when the metaphor and the objective design the tool 140 5.2.3 Programming for the interactive arts: toward complexity 142 5.2.4 Art engine, an authoring environment possibility? 149 5.3 Mobilizing.js: an attempt at a multi-paradigmatic authoring software environment 151 5.3.1 Artistic technical conduct and critical technical practice 153 5.3.2 An engine with many speeds 157 5.4 Structure and results of Mobilizing.js 163 5.4.1 Overview of a technical sequence 163 5.4.2 Constructing interactivities 170 5.4.3 Interactive, immersive and collaborative system 175 5.5 Conclusion 181 5.6 Bibliography 182 Chapter 6 Clues Anomalies Understanding Detecting Underlying Assumptions and Expected Practices in the Digital Humanities through the AIME Project 185 Donato RICCI, Robin DE MOURAT, Christophe LECLERCQ and Bruno LATOUR 6.1 Abstract 185 6.2 Introduction 186 6.3 AIME and its digital humanities set-up 188 6.4 Methodology: multiplying listening devices 193 6.5 Anomaly family #1: displacements in acknowledging on-and-offline practices ecosystem 197 6.6 Anomaly family #2: interface-driven methodology and its encounters with scholarly publics 199 6.7 Anomaly family #3: the shock of collaboration’s ethoses 204 6.8 Qualifying anomalies for a better understanding of Digital Humanities projects 207 6.9 Bibliography 209 List of Authors 213 Index 215
£125.06
ISTE Ltd and John Wiley & Sons Inc Modeling and Simulation of Logistics Flows 3:
Book SynopsisVolume 3 begins with an introduction to which are added four chapters focused on modeling and flow simulation in an environment in 2 or 3 dimensions (2D or 3D). They deal with different cases taken from situations found in the field. A conclusion comes close this third book: The different software used in this third volume Computer simulation of discrete flows Mixed flow simulation Flows in 3D and the evacuation simulation Flows in 3D for conveying and storage The conclusion discusses the future developments of the software and their integration into society. At the end of each volume is a bibliography and a list of web links. There is also a glossary explaining some abbreviations, acronyms and some very specific terminology of logistics and operations research.Table of ContentsAbout This Book ix Introduction xv Chapter 1 Computer Simulation of Discrete Flows 1 1.1 Introduction 1 1.2 Worked example 1 1.2.1 Map of the resort 2 1.2.2 Problem statement and design brief 3 1.3 Setting up the project in the ExtendSim 9 software 5 1.3.1 Definition of the principal parameters 5 1.3.2 Designing the model and inputting constraints 7 1.3.3 Definition of flows 22 1.3.4 Running the simulation 22 1.3.5 Creation and allocation of resources 24 1.3.6 Rerunning the simulation 28 1.3.7 Generating a report and analysis 29 1.3.8 Development, enhancement and improvement 31 1.3.9 Hierarchy 38 1.3.10 Appearance design 40 1.4 Conclusion 44 Chapter 2 Simulation of Mixed Flows 47 2.1 Mixed Flows 47 2.2 An example of modeling mixed flows 48 2.2.1 Problem statement and specifications 48 2.3 Creating and inputting the project in ExtendSim 52 2.3.1 Definition of the principal parameters 52 2.3.2 Soda production and bottling 53 2.3.3 Transport, carbonation and labeling 80 2.3.4 Packaging and storage 85 2.3.5 Maintenance and cleaning 93 2.3.6 Finishing touches 98 2.4 Conclusion 108 Chapter 3 3D Flows and Evacuation Simulation 109 3.1 3D flows 109 3.2 The Pathfinder software 110 3.3 Evacuation of a building with PathFinder 111 3.3.1 Importing and formatting the first floor plans 113 3.3.2 Creating the different first floor rooms 117 3.3.3 Creating the first floor doors 120 3.3.4 Populating with occupants 122 3.3.5 Simulation and results for the first floor evacuation 123 3.3.6 Incorporating furniture 126 3.3.7 Importing and formatting the second floor plans 128 3.3.8 Creating rooms, doors and populating with occupants 129 3.3.9 Creating the stairs 130 3.3.10 Simulation and results for evacuation of the whole building 134 3.4 Extensions 146 3.4.1 Moving to SFPE mode 146 3.4.2 Groups of occupants 148 3.4.3 Managing the elevators 148 3.4.4 Creating viewpoints 154 3.4.5 Creating camera tours 156 3.4.6 Further possibilities 158 Chapter 4 3D Flows, Distribution and Warehousing 159 4.1 Product distribution 159 4.2 The FlexSim software 159 4.3 Basic concepts of the FlexSim software 160 4.3.1 General appearance of FlexSim 160 4.3.2 Libraries 162 4.3.3 Mouse-based functions 164 4.3.4 Connections between objects 165 4.4 Worked example 166 4.4.1 Description of the warehouse 167 4.4.2 Warehouse operation 168 4.4.3 Modeling stage 1 170 4.4.4 Modeling stage 2 178 4.4.5 Modeling stage 3 184 4.5 Detailed flow and task executer management 194 4.5.1 Generation of containers with several types of content 194 4.5.2 A fixed resource for task executers 198 4.5.3 Shared task executers 200 4.5.4 Pulled and pushed flows and more 204 4.5.5 Naming items 210 4.5.6 Timetables, groups and resources 216 4.6 Experimenter 231 4.6.1 Constructing the model 231 4.6.2 Adding the dashboard 232 4.6.3 Configuring the Experimenter 235 4.7 Concluding remarks 239 Conclusion 241 Glossary 245 Bibliography 251 Index 259
£122.35
ISTE Ltd and John Wiley & Sons Inc Fourier Analysis
Book SynopsisThis book aims to learn to use the basic concepts in signal processing. Each chapter is a reminder of the basic principles is presented followed by a series of corrected exercises. After resolution of these exercises, the reader can pretend to know those principles that are the basis of this theme. "We do not learn anything by word, but by example."Table of ContentsPreface xi Chapter 1. Fourier Series 1 1.1. Theoretical background 1 1.1.1. Orthogonal functions 1 1.1.2. Fourier Series 3 1.1.3. Periodic functions 5 1.1.4. Properties of Fourier series 6 1.1.5. Discrete spectra. Power distribution 8 1.2. Exercises 9 1.2.1. Exercise 1.1. Examples of decomposition calculations 10 1.2.2. Exercise 1.2 11 1.2.3. Exercise 1.3 12 1.2.4. Exercise 1.4 12 1.2.5. Exercise 1.5 12 1.2.6. Exercise 1.6. Decomposing rectangular functions 13 1.2.7. Exercise 1.7. Translation and composition of functions 14 1.2.8. Exercise 1.8. Time derivation of a function 15 1.2.9. Exercise 1.9. Time integration of functions 15 1.2.10. Exercise 1.10 15 1.2.11. Exercise 1.11. Applications in electronic circuits 16 1.3. Solutions to the exercises 17 1.3.1. Exercise 1.1. Examples of decomposition calculations 17 1.3.2. Exercise 1.2 25 1.3.3. Exercise 1.3 26 1.3.4. Exercice 1.4 26 1.3.5. Exercise 1.5 27 1.3.6. Exercise 1.6 27 1.3.7. Exercise 1.7. Translation and composition of functions 29 1.3.8. Exercise 1.8. Time derivation of functions 31 1.3.9. Exercise 1.9. Time integration of functions 32 1.3.10. Exercise 1.10 32 1.3.11. Exercise 1.11 35 Chapter 2. Fourier Transform 39 2.1. Theoretical background 39 2.1.1. Fourier transform 39 2.1.2. Properties of the Fourier transform 42 2.1.3. Singular functions 46 2.1.4. Fourier transform of common functions 51 2.1.5. Calculating Fourier transforms using the Dirac impulse method 53 2.1.6. Fourier transform of periodic functions 54 2.1.7. Energy density 54 2.1.8. Upper limits to the Fourier transform 55 2.2. Exercises 56 2.2.1. Exercise 2.1 56 2.2.2. Exercise 2.2 57 2.2.3. Exercise 2.3 58 2.2.4. Exercise 2.4 59 2.2.5. Exercise 2.5 59 2.2.6. Exercise 2.6 59 2.2.7. Exercise 2.7 60 2.2.8. Exercise 2.8 60 2.2.9. Exercise 2.9 61 2.2.10. Exercise 2.10 62 2.2.11. Exercise 2.11 62 2.2.12. Exercise 2.12 63 2.2.13. Exercise 2.13 63 2.2.14. Exercise 2.14 64 2.2.15. Exercise 2.15 64 2.2.16. Exercise 2.16 65 2.2.17. Exercise 2.17 66 2.3. Solutions to the exercises 67 2.3.1. Exercise 2.1 67 2.3.2. Exercise 2.2 68 2.3.3. Exercise 2.3 74 2.3.4. Exercise 2.4 74 2.3.5. Exercise 2.5 76 2.3.6. Exercise 2.6 76 2.3.7. Exercise 2.7 77 2.3.8. Exercise 2.8 79 2.3.9. Exercise 2.9 82 2.3.10. Exercise 2.10 85 2.3.11 Exercise 2.11 86 2.3.12 Exercise 2.12 88 2.3.13 Exercise 2.13 91 2.3.14 Exercise 2.14 91 2.3.15 Exercice 2.15 92 2.3.16 Exercise 2.16 94 2.3.17 Exercise 2.17 95 Chapter 3. Laplace Transform 97 3.1. Theoretical background 97 3.1.1. Definition 97 3.1.2. Existence of the Laplace transform 98 3.1.3. Properties of the Laplace transform 98 3.1.4. Final value and initial value theorems 102 3.1.5. Determining reverse transforms 102 3.1.6. Approximation methods 105 3.1.7. Laplace transform and differential equations 107 3.1.8. Table of common Laplace transforms 108 3.1.9. Transient state and steady state 110 3.2. Exercise instruction 111 3.2.1. Exercise 3.1 111 3.2.2. Exercise 3.2 111 3.2.3. Exercise 3.3 112 3.2.4. Exercise 3.4 112 3.2.5. Exercise 3.5 112 3.2.6. Exercise 3.6 113 3.2.7. Exercise 3.7 113 3.2.8. Exercise 3.8 115 3.2.9. Exercise 3.9 115 3.2.10. Exercise 3.10 115 3.3. Solutions to the exercises 116 3.3.1. Exercise 3.1 116 3.3.2. Exercise 3.2 117 3.3.3. Exercise 3.3 121 3.3.4. Exercise 3.4 122 3.3.5. Exercise 3.5 130 3.3.6. Exercise 3.6 131 3.3.7. Exercise 3.7 132 3.3.8. Exercise 3.8 136 3.3.9. Exercise 3.9 138 3.3.10. Exercise 3.10 139 Chapter 4. Integrals and Convolution Product 143 4.1. Theoretical background 143 4.1.1. Analyzing linear systems using convolution integrals 143 4.1.2. Convolution properties 144 4.1.3. Graphical interpretation of the convolution product 145 4.1.4. Convolution of a function using a unit impulse 145 4.1.5. Step response from a system 147 4.1.6. Eigenfunction of a convolution operator 148 4.2. Exercises 149 4.2.1. Exercise 4.1 149 4.2.2. Exercise 4.2 150 4.2.3. Exercise 4.3 150 4.2.4. Exercise 4.4 151 4.2.5. Exercise 4.5 151 4.2.6. Exercise 4.6 152 4.3. Solutions to the exercises 153 4.3.1. Exercise 4.1 153 4.3.2. Exercise 4.2 156 4.3.3. Exercise 4.3 160 4.3.4. Exercise 4.4 163 4.3.5. Exercise 4.5 164 4.3.6. Exercise 4.6 165 Chapter 5. Correlation 169 5.1. Theoretical background 169 5.1.1. Comparing signals 169 5.1.2. Correlation function 170 5.1.3. Properties of correlation functions 172 5.1.4. Energy of a signal 176 5.2. Exercises 177 5.2.1. Exercise 5.1 177 5.2.2. Exercise 5.2 178 5.2.3. Exercise 5.3 178 5.2.4. Exercise 5.4 178 5.2.5. Exercice 5.5 179 5.2.6. Exercice 5.6 179 5.2.7. Exercise 5.7 179 5.2.8. Exercice 5.8 180 5.2.9. Exercise 5.9 180 5.2.10. Exercise 5.10 181 5.2.11. Exercise 5.11 181 5.2.12. Exercise 5.12 182 5.2.13. Exercise 5.13 182 5.2.14. Exercise 5.14 183 5.3. Solutions to the exercises 183 5.3.1. Exercise 5.1 183 5.3.2. Exercice 5.2 188 5.3.3. Exercise 5.3 191 5.3.4. Exercice 5.4 192 5.3.5. Exercise 5.5 193 5.3.6. Exercise 5.6 196 5.3.7. Exercise 5.7 197 5.3.8. Exercise 5.8 201 5.3.9. Exercise 5.9 204 5.3.10. Exercise 5.10 205 5.3.11 Exercise 5.11 206 5.3.12 Exercise 5.12 207 5.3.13 Exercise 5.13 208 5.3.14 Exercise 5.14 209 Chapter 6. Signal Sampling 213 6.1. Theoretical background 213 6.1.1. Sampling principle 213 6.1.2. Ideal sampling 214 6.1.3. Finite width sampling 218 6.1.4. Sample and hold (S/H) sampling 221 6.2. Exercises 225 6.2.1. Exercise 6.1 225 6.2.2. Exercise 6.2 225 6.2.3. Exercise 6.3 226 6.2.4. Exercise 6.4 226 6.2.5. Exercise 6.5 226 6.2.6. Exercise 5.6 227 6.2.7. Exercise 6.7 227 6.2.8. Exercice 6.8 228 6.3. Solutions to the exercises 229 6.3.1. Exercise 6.1 229 6.3.2. Exercise 6.2 229 6.3.3. Exercise 6.3 233 6.3.4. Exercice 6.4 235 6.3.5. Exercise 6.5 236 6.3.6. Exercise 6.6 238 6.3.7. Exercise 6.7 240 6.3.8. Exercise 6.8 242 Bibliography 245 Index 247
£125.06
ISTE Ltd and John Wiley & Sons Inc Analog Electronics for Measuring Systems
Book SynopsisMany instrumentation engineers and scientists often deal with analog electronic issues when approaching delicate measurements. Even if off-the-shelf measuring solutions exist, comprehension of the analog behavior of the measuring system is often a necessity. This book provides a concise introduction to the main elements of a low frequency analog acquisition chain. It aims to be sufficiently general to provide an introduction, yet specific enough to guide the reader through some classical problems that may be encountered in the subject. Topics include sensors, conditioning circuits, differential and instrumentation amplifiers, active filters (mainly for anti-aliasing purposes) and analog to digital converters. A chapter is devoted to an introduction to noise and electronic compatibility.This work is intended for people with a general background in electronics and signal processing, who are looking for an introduction to classical electronic solutions employed in measuring instruments involving low frequency analog signal processing. Table of ContentsIntroduction ix Chapter 1 Fundamentals of Sensing and Signal Conditioning 1 1.1 Introduction 1 1.2 Voltage generating sensors 1 1.3 Current generating sensors 9 1.4 Charge generating sensors 19 1.5 Resistive sensors 24 1.6 Reactive sensors 36 1.7 Conclusion 37 Chapter 2 Amplification and Amplifiers 39 2.1 Introduction 39 2.2 Introduction to operational amplifiers 40 2.3 Limitations of real operational amplifiers 42 2.4 Instrumentation amplifiers 47 2.5 Isolation amplifiers 57 2.6 Conclusion 59 Chapter 3 Elements of Active Filter Synthesis 61 3.1 Introduction 61 3.2 Low-pass filter approximation 64 3.3 Active filter synthesis by means of standard cells 76 3.4 Frequency transform techniques 82 3.5 Conclusion 88 Chapter 4 Analog to Digital Converters 89 4.1 Digital to analog converters and analog to digital converters: an introduction 89 4.2 Notations and digital circuits 91 4.3 Sample and hold circuits 94 4.4 Converter structures 96 4.5 No silver bullet: choosing the best trade-off 112 4.6 Conclusion 118 Chapter 5 Introduction to Noise Analysis in Low Frequency Circuits 121 5.1 What is noise? 121 5.2 Stochastic modeling of a noise 123 5.3 Different kinds of stochastic noises 129 5.4 Limits of modeling 134 5.5 Contributions from stochastically independent noise sources 135 5.6 Noise equivalent bandwidth and noise factor 137 5.7 Amplifiers and noise 139 5.8 Noise from “outer space”: electromagnetic compatibility 148 5.9 Conclusion 152 Appendix 153 Bibliography 155 Index 157
£125.06
ISTE Ltd and John Wiley & Sons Inc Matrix and Tensor Decompositions in Signal
Book SynopsisThe second volume will deal with a presentation of the main matrix and tensor decompositions and their properties of uniqueness, as well as very useful tensor networks for the analysis of massive data. Parametric estimation algorithms will be presented for the identification of the main tensor decompositions. After a brief historical review of the compressed sampling methods, an overview of the main methods of retrieving matrices and tensors with missing data will be performed under the low rank hypothesis. Illustrative examples will be provided.Table of ContentsVolume 2 1. Matrix decompositions2. Tensor decompositions3. Tensor networks4. Parametric estimation of tensor decompositions5. Recovery of low rank matrix reconnects (LRMR) and low-tensor recovery (LRTR)
£101.66
ISTE Ltd and John Wiley & Sons Inc Computational Color Science: Variational
Book SynopsisColor is a sensation generated both by the interaction of the visual sensors in the eyes with the natural environment and by the elaboration of visual information by higher brain functions.This book presents the mathematical framework needed to deal with several models of color processing of digital images. The book starts with a short yet exhaustive introduction to the basic phenomenological features of color vision, which are constantly used throughout the book. The discussion of computational issues starts with color constancy, which is dealt with in a rigorous and self-contained mathematical setting. Then, the original Retinex model and its numerous variants are introduced and analyzed with direct discrete equations. The remainder of the book is dedicated to the variational analysis of Retinex-like models, contextualizing their action with respect to contrast enhancement. Table of ContentsPreface ix Chapter 1. Rudiments of Human Visual System (HVS) Features 1 1.1. The retina 1 1.1.1. Photoreceptors: rods and cones 2 1.2. Adaptation and photo-electrical response of receptors 4 1.3. Spatial locality of vision 5 1.4. Local contrast enhancement 6 1.5. Physical vs. perceived light intensity contrast: Weber- Fechner’s law 9 Chapter 2. Computational Color Constancy Algorithms 13 2.1. The dichromatic and Lambertian image formation models 14 2.2. Classical hypotheses for illuminant and reflectance estimation 17 2.2.1. White-patch assumption and related models 18 2.2.2. Gray-world assumption and related models 20 2.2.3. Shades of gray and multi-scale max-RGB assumptions to mix white-patch and gray-world hypotheses 22 2.2.4. Gray-edge assumption and related models 24 2.2.5. Multi-scale n-th order shades of gray-edge assumption: a general hypothesis 26 Chapter 3. Retinex-like Algorithms for Color Image Processing 29 3.1. Mathematical description of the original ratio-threshold-reset Retinex algorithm 30 3.2. Analysis of the ratio-reset Retinex formula: the limit ε → 0 33 3.2.1. Retinex: “a melody that everyone plays differently” 37 3.3. From paths to pixel sprays: RSR 41 3.3.1. LRSR and SMRSR 43 3.4. A psychophysical method to measure (achromatic) induction 45 3.5. Automatic Color Equalization: ACE 50 3.6. RACE: a model with mixed features between RSR and ACE 52 3.6.1. Regularization of RACE formula: attachment to original image 54 3.7. An alternative fusion between RSR and ACE: STRESS 56 Chapter 4. Variational Formulation of Histogram Equalization 59 4.1. The Caselles–Sapiro model 59 4.2. Interpretation of Caselles–Sapiro’s functional for histogram equalization 65 4.3. Application of histogram equalization techniques to color images 67 Chapter 5. Perceptually-inspired Variational Models for Color Enhancement in the RGB Space 69 5.1. Beyond the Caselles–Sapiro model: modification of the histogram equalization functional to approach visual properties 70 5.1.1. A contrast term coherent with HVS properties 70 5.1.2. Entropic adjustment term 73 5.2. Minimization of perceptual functionals 75 5.2.1. Stability of the iterative semi-implicit gradient descent scheme 80 5.2.2. A general strategy for the reduction of computational complexity 81 5.2.3. Results 83 5.3. Embedding existing perceptually inspired color correction models in the variational framework 85 5.3.1. Alternative variational and EDP formalizations of Retinex-like algorithms 89 5.4. Variational interpretation of the Rudd-Zemach model of achromatic induction 92 5.5. Perceptual enhancement in the wavelet domain 95 5.5.1. Adjustment to the average value in the wavelet domain 98 5.5.2. Local contrast enhancement in the wavelet domain 99 5.6. High-dynamic-range (HDR) imaging 101 5.6.1. A two-stage tone mapping 105 Appendix 111 Bibliography 117 Index 125
£125.06
ISTE Ltd and John Wiley & Sons Inc Advanced Numerical Methods with Matlab 1:
Book SynopsisMost physical problems can be written in the form of mathematical equations (differential, integral, etc.). Mathematicians have always sought to find analytical solutions to the equations encountered in the different sciences of the engineer (mechanics, physics, biology, etc.). These equations are sometimes complicated and much effort is required to simplify them. In the middle of the 20th century, the arrival of the first computers gave birth to new methods of resolution that will be described by numerical methods. They allow solving numerically as precisely as possible the equations encountered (resulting from the modeling of course) and to approach the solution of the problems posed. The approximate solution is usually computed on a computer by means of a suitable algorithm. The objective of this book is to introduce and study the basic numerical methods and those advanced to be able to do scientific computation. The latter refers to the implementation of approaches adapted to the treatment of a scientific problem arising from physics (meteorology, pollution, etc.) or engineering (structural mechanics, fluid mechanics, signal processing, etc.) .Table of ContentsPreface xi Part 1 Introduction 1 Chapter 1 Review of Linear Algebra 3 1.1. Vector spaces 3 1.1.1. General definitions 3 1.1.2. Free families, generating families and bases 4 1.2. Linear mappings 5 1.3. Matrices 7 1.3.1. Operations on matrices 7 1.3.2. Change-of-basis matrices 8 1.3.3. Matrix notations 9 1.4. Determinants 10 1.5. Scalar product 12 1.6. Vector norm 12 1.7. Matrix eigenvectors and eigenvalues 13 1.7.1. Definitions and properties 13 1.7.2. Matrix diagonalization 15 1.7.3. Triangularization of matrices 15 1.8 Using Matlab 16 Chapter 2 Numerical Precision 21 2.1. Introduction 21 2.2. Machine representations of numbers 22 2.3. Integers 23 2.3.1. External representation 23 2.3.2. Internal representation of positive integers 24 2.4. Real numbers 25 2.4.1. External representation 25 2.4.2. Internal encoding of real numbers 25 2.5. Representation errors 26 2.5.1. Properties of computer-based arithmetic 27 2.5.2. Operation of subtraction 28 2.5.3. Stability 29 2.6. Determining the best algorithm 29 2.7 Using Matlab 30 2.7.1. Definition of variables 30 2.7.2. Manipulating numbers 30 Part 2 Approximating Functions 35 Chapter 3 Polynomial Interpolation 37 3.1. Introduction 37 3.2. Interpolation problems 37 3.2.1. Linear interpolation 38 3.3. Polynomial interpolation techniques 38 3.4. Interpolation with the Lagrange basis 39 3.4.1. Polynomial interpolation error 43 3.4.2. Neville–Aitken method 46 3.5. Interpolation with the Newton basis 46 3.6. Interpolation using spline functions 48 3.6.1. Hermite interpolation 50 3.6.2. Spline interpolation error 55 3.7 Using Matlab 58 3.7.1. Operations on polynomials 58 3.7.2. Manipulating polynomials 59 3.7.3. Evaluation of polynomials 60 3.7.4. Linear and nonlinear interpolation 60 3.7.5. Lagrange function 63 3.7.6. Newton function 64 Chapter 4 Numerical Differentiation 67 4.1. First-order numerical derivatives and the truncation error 67 4.2. Higher-order numerical derivatives 70 4.3. Numerical derivatives and interpolation 71 4.4. Studying the differentiation error 73 4.5. Richardson extrapolation 77 4.6. Application to the heat equation 78 4.7 Using Matlab 81 Chapter 5 Numerical Integration 83 5.1. Introduction 83 5.2. Rectangle method 84 5.3. Trapezoidal rule 84 5.4. Simpson’s rule 87 5.5. Hermite’s rule 90 5.6. Newton–Côtes rules 91 5.7. Gauss–Legendre method 92 5.7.1. Problem statement 92 5.7.2. Legendre polynomials 94 5.7.3 Choosing the αi and xi (i = 0, . . . , n) 99 5.8 Using Matlab 100 5.8.1. Matlab functions for numerical integration 100 5.8.2. Trapezoidal rule 101 5.8.3. Simpson’s rule 103 Part 3 Solving Linear Systems 107 Chapter 6 Matrix Norm and Conditioning 109 6.1. Introduction 109 6.2. Matrix norm 109 6.3. Condition number of a matrix 113 6.3.1 Approximation of K(A) 116 6.4. Preconditioning 116 6.5 Using Matlab 117 6.5.1. Matrices and vectors 117 6.5.2. Condition number of a matrix 119 Chapter 7 Direct Methods 123 7.1. Introduction 123 7.2. Method of determinants or Cramer’s method 123 7.2.1. Matrix inversion by Cramer’s method 124 7.3. Systems with upper triangular matrices 124 7.4. Gaussian method 125 7.4.1. Solving multiple systems in parallel 129 7.5. Gauss–Jordan method 129 7.5.1. Underlying principle 129 7.5.2. Computing the inverse of a matrix with the Gauss–Jordan algorithm 131 7.6. LU decomposition 132 7.7. Thomas algorithm 133 7.8. Cholesky decomposition 134 7.9 Using Matlab 136 7.9.1. Matrix operations 136 7.9.2. Systems of linear equations 138 Chapter 8 Iterative Methods 147 8.1. Introduction 147 8.2. Classical iterative techniques 148 8.2.1. Jacobi method 149 8.2.2. Gauss–Seidel method 151 8.2.3. Relaxation method 152 8.2.4. Block forms of the Jacobi, Gauss–Seidel and relaxation methods 154 8.3. Convergence of iterative methods 155 8.4. Conjugate gradient method 157 8.5 Using Matlab 159 8.5.1. Jacobi method 159 8.5.2. Relaxation method 160 Chapter 9 Numerical Methods for Computing Eigenvalues and Eigenvectors 163 9.1. Introduction 163 9.2. Computing det (A − λI) directly 164 9.3. Krylov methods 166 9.4. LeVerrier method 167 9.5. Jacobi method 168 9.6. Power iteration method 171 9.6.1. Deflation algorithm 172 9.7. Inverse power method 173 9.8. Givens–Householder method 174 9.8.1. Givens algorithm 175 9.9 Using Matlab 176 9.9.1. Application to a buckling beam 177 Chapter 10 Least-squares Approximation 185 10.1. Introduction 185 10.2. Analytic formulation 185 10.3. Algebraic formulation 191 10.3.1. Standard results on orthogonality 191 10.3.2. Least-squares problem 191 10.3.3. Solving by orthogonalization 192 10.4. Numerically solving linear equations by QR factorization 193 10.4.1. Householder transformations 193 10.4.2. QR factorization 193 10.4.3. Application to the least-squares problem 193 10.5. Applications 194 10.5.1. Curve fitting 194 10.5.2. Approximations of derivatives 195 10.6 Using Matlab 195 Part 4 Appendices 199 Appendix 1 Introduction to Matlab 201 Appendix 2 Introduction to Optimization 209 Bibliography 215 Index 217
£125.06
ISTE Ltd and John Wiley & Sons Inc Analog Automation and Digital Feedback Control
Book SynopsisThis book covers various modern theoretical, technical, practical and technological aspects of computerized numerical control and control systems of deterministic and stochastic dynamical processes. Readers will discover: A review of the fundamentals and results of the theory of analogue control systems A clear and detailed presentation on the experimental modeling of dynamic processes Frequency synthesis techniques and in the state space of digital control systems Concrete applications of deterministic and stochastic optimal regulation laws New multimedia platforms, training and experimental automated research Various topologies and creation strategies, computer-aided telecontrol regulation systems, as well as a prototype of an automated laboratory that can be remotely operated via the Internet Simple Matlab programs to reproduce, where necessary, the main numerical and graphical results presented Many exercises corrected at the end of each chapter Detailed studies of practical automation projects, aimed at consolidating the skills of the automation profession acquired in the book Table of ContentsPreface ix Introduction xiii Part 1. Analog Feedback Control Systems 1 Chapter 1. Models of Dynamic Processes 3 1.1. Introduction to dynamic processes 3 1.1.1. Definition, hypotheses and notations 3 1.1.2. Implications of hypotheses 4 1.1.3. Dynamic model: an automation perspective 5 1.2. Transfer functions 6 1.2.1. Existence conditions 6 1.2.2. Construction 6 1.2.3. General structure of a transfer function 8 1.2.4. Tools for the analysis of the properties of transfer functions 8 1.2.5. First- and second-order transfer functions 8 1.3. State models 12 1.3.1. Definition 12 1.3.2. Illustrative example 13 1.3.3. General structure of the state model 14 1.4. Linear state models with constant parameters 15 1.4.1. Linearization-based construction 15 1.4.2. Structure of a linear state model with constant parameters 16 1.4.3. Properties of a model without pure input delay (τ0 = 0) 18 1.5. Similarity transformation 20 1.6. Exercises and solutions 21 Chapter 2. Experimental Modeling Approach of Dynamic Processes 39 2.1. Introduction to experimental modeling 39 2.1.1. Problem statement 39 2.1.2. Principle of experimental modeling 39 2.1.3. Experimental modeling methodology 40 2.2. Step response-based modeling 44 2.2.1. Model of order 1 44 2.2.2. Under-damped model of order 2 (ξ < 1) 44 2.2.3. Damped model of order ≥ 2 (Strejc method) 46 2.3. Frequency response-based modeling 50 2.4. Modeling based on ARMA model 52 2.4.1. ARMA model 52 2.4.2. Parameter estimation of an ARMA model 54 2.5. Matlab-aided experimental modeling 56 2.6. Exercises and solutions 58 Chapter 3. Review of Analog Feedback Control Systems 73 3.1. Open-loop analog control 73 3.1.1. Principle 73 3.1.2. Open-loop control 74 3.2. Analog control system 74 3.3. Performances of an analog control system 75 3.3.1. Closed-loop transfer functions 75 3.3.2. Performance quantities 76 3.4. Simple analog controllers 76 3.5. PID/PIDF controllers 77 3.5.1. Structure and role of the parameters of a PID/PIDF controller 77 3.5.2. Ziegler–Nichols methods for parameter calculation 79 3.5.3. Calculation of parameters by pole placement 79 3.5.4. Direct calculation of optimal PID parameters 81 3.5.5. LQR-based indirect calculation of optimal PID parameters 85 3.5.6. Implementation of analog controllers 85 3.6. Controllers described in the state space 86 3.6.1. Principle and block diagram of a linear state feedback 86 3.6.2. Techniques for calculating the state feedback gain 87 3.6.3. Integral action state feedback 88 3.6.4. State feedback with integral action and observer 90 3.6.5. State feedback with output error compensator 92 3.7. Principle of equivalence between PID and LQR controllers 92 3.7.1. Proof of the equivalence principle 93 3.7.2. Equivalence relation 96 3.7.3. Case study 96 3.8. Exercises and solutions 99 Part 2. Synthesis and Computer-aided Simulation of Digital Feedback Control Systems 123 Chapter 4. Synthesis of Digital Feedback Control Systems in the Frequency Domain 125 4.1. Synthesis methodology 125 4.2. Transfer function G(z) of a dynamic process 125 4.2.1. Sampled dynamic model 125 4.2.2. Discretization of Gc(p) if input delay τ0 = 0 126 4.2.3. Discretization of Gc(s) if input delay τ0 # 0 128 4.2.4. Examples of calculation of G(z) by discretization of Gc(s) 132 4.3. Transfer function D(z): discretization method 136 4.3.1. Interest of discretization 136 4.3.2. Discretization of Dc(s) by invariance methods 137 4.3.3. Discretization of Dc(s) by transformation methods 139 4.3.4. z-Transfer functions of simple controllers 142 4.3.5. General structure of D(z) and recurrence equation 144 4.3.6. Discretization of transfer functions with Matlab 145 4.4. Transfer function D(z): model method 146 4.4.1. Principle of the model method 146 4.4.2. Examples of direct design of digital controllers 146 4.4.3. Conditions for the use of model approach 148 4.4.4. Practical rules for using the model approach 149 4.5. Discrete block diagram of digital control 150 4.5.1. Closed-loop characteristic transfer functions 151 4.5.2. Sampling frequency 152 4.6. Exercises and solutions 154 Chapter 5. Computer-aided Simulation of Digital Feedback Control Systems 177 5.1. Approaches to computer-aided simulation 177 5.2. Programming of joint recurrence equations 178 5.2.1. Formulation 178 5.2.2. Example of Matlab® programming 179 5.3. Simulation using Matlab macro programming 183 5.4. Graphic simulation 186 5.5. Case study: simulation of servomechanisms 187 5.5.1. Simulation of a speed servomechanism 187 5.5.2. Simulation of a position servomechanism 191 5.6. Exercises and solutions 194 Chapter 6. Discrete State Models of Dynamic Processes 199 6.1. Discretization of the state model of a dynamic process 199 6.1.1. Discretization of a state model 200 6.1.2. Discretization of a state model with input delay 201 6.2. Calculation of {A, B, C, D} parameters of a discrete state model 204 6.2.1. Calculation of A = eAT 204 6.2.2. Calculation of B 206 6.2.3. Calculation of C and D 208 6.3. Properties of a discrete state model {A, B, C, D} 208 6.3.1. Infinity of state models of one dynamic process 208 6.3.2. Stability 209 6.3.3. Controllability and stabilizability 209 6.3.4. Observability and detectability 210 6.4. Exercises and solutions 210 Appendices 215 Appendix 1. Table of Z-transforms 217 Appendix 2. Matlab® Elements Used in This Book 219 Bibliography 223 Index 227
£125.06
ISTE Ltd and John Wiley & Sons Inc Analysis, Modeling and Stability of Fractional
Book SynopsisThis book introduces an original fractional calculus methodology (‘the infinite state approach’) which is applied to the modeling of fractional order differential equations (FDEs) and systems (FDSs). Its modeling is based on the frequency distributed fractional integrator, while the resulting model corresponds to an integer order and infinite dimension state space representation. This original modeling allows the theoretical concepts of integer order systems to be generalized to fractional systems, with a particular emphasis on a convolution formulation.Table of Contents1. The Fractional Integrator. 2. Frequency Approach to the Synthesis of the Fractional Integrator. 3. Comparison of Two Simulation Techniques. 4. Fractional Modeling of the Diffusive Interface. 5. Modeling of Physical Systems with Fractional Models: an Illustrative Example. 6. The Distributed Model of the Fractional Integrator. 7. Modeling of FDEs and FDSs. 8. Fractional Differentiation. 9. Analytical Expressions of FDS Transients. 10. Infinite State and Fractional Differentiation of Functions.
£125.06
ISTE Ltd and John Wiley & Sons Inc Society 5.0: Industry of the Future,
Book SynopsisFollowing the rapid development of connected technologies, which are now highly sophisticated and spread across the globe, Society 5.0 has emerged and brought with it a dramatic societal shift. In 1998, Kodak, the world leader in photographic film, had 170,000 employees. It thus seemed unthinkable that just 3 years later, the majority of people would stop taking photographs to paper film and that Kodak would have disappeared. These are the stakes of this new society that is taking shape. This book, which does not seek to critique current politics, management or marketing literature, aims to fight against the excesses of this often-misunderstood Society 5.0 and to present the ideas and associated technologies that comprise it, all working towards societal improvement. Among these technologies, artificial intelligence, robotics, digital platforms and 3D printing are undoubtedly the most important, and thus receive the greatest focus. Table of ContentsForeword xv Preface xvii Introduction xix Chapter 1. Society 5.0, Its Logic and Its Construction 1 1.1. The origins of society 5.0 1 1.2. The ancient ages 6 1.3. Cybernics or cyber-physical systems 7 1.4. The Council on Competitiveness-Nippon (COCN) 8 1.5. The lessons of history 8 1.6. The decision variables of society 5.0 9 1.6.1. Which role for information? 9 1.6.2. Which role for time? 11 1.6.3. Which role for nature? 11 1.6.4. Which role for distraction? 12 1.6.5. Which role for identity? 13 1.6.6. Which role for alienation? 16 1.6.7. Which role for action? 17 1.7. The contribution of the first revolution 18 1.8. Humanity 2.0 and society 5.0 18 1.9. The new role of society 5.0: a return to bio? 19 1.10. Growing sectors and lagging sectors 19 1.11. The elements of society 5.0 20 Chapter 2. From Society 5.0 to Its Associated Policies 23 2.1. The place of politics in organizations 23 2.1.1. The three levels: strategic, tactical, operational 23 2.1.2. Politics and ethics 24 2.1.3. The relationship between the strategic, tactical and operational levels, and the organization’s functions and tasks 25 2.2. The implementation of national policies 25 2.3. The notion of walls 27 2.3.1. Different types of walls 27 2.3.2. The “NIMBY” wall 28 2.3.3. The wall between private individuals and professionals 29 2.4. New political attitudes 30 2.4.1. Vetocracy 30 2.4.2. Ultrademocracy 33 2.5. The role of governments 34 2.5.1. The protection of national industry 34 2.5.2. The limitations required by governments 35 2.5.3. The question of public orders 36 2.5.4. New cultural policies 36 Chapter 3. Industry 4.0 at the Core of Society 5.0 37 3.1. Business in society 5.0 38 3.1.1. The recent history of the decline of industry 38 3.1.2. The impact of political choices 39 3.1.3. Pierre Musso’s perspective 40 3.2. The firm: a general theory 41 3.2.1. The management of a firm 41 3.2.2. The definition of a market 43 3.2.3. The concept of productive activity 43 3.2.4. The fundamental structures of the firm 44 3.2.5. The question of the appearance of improved structures 46 3.2.6. The usefulness of the concept of profit center 48 3.2.7. The difference between functions and structures 49 3.2.8. The relationship between environment, strategy and structure 49 3.3. The determinants of the factory of the future 50 3.3.1. The main determinants 50 3.3.2. The place of digital 52 3.3.3. Direct manufacturing 53 3.4. The different types of factories of the future 53 3.4.1. Factory 4.0: “integrated logistics chain” 54 3.4.2. The Key-Technology factory: “a highly differentiating process” 54 3.4.3. The Craft-Industrial factory: “tailor-made industrialized production” 54 3.4.4. The Client Drive factory: “the customer operates the process” 54 3.4.5. The Low Cost factory: “in Open Source” 55 3.5. The regulatory determinants of the factory of the future 56 3.6. The main questions regarding the factory of the future 56 3.6.1. The location of the factory of the future 58 3.6.2. Production cycles 58 3.6.3. Finances in the factory of the future 59 3.6.4. The conditions of its emergence 60 3.7. Changes related to the factory of the future 60 3.7.1. Actions for favoring the advent of the factory of the future 61 3.7.2. The notion of industrial revolution 61 3.8. Daily management 62 3.9. Additive manufacturing technologies 62 3.9.1. CNC tools 62 3.9.2. The notion of CPPS 62 3.10. The example of the textile industry 63 Chapter 4. The City and Mobility 3.0 67 4.1. Research 67 4.1.1. The city in motion 67 4.1.2. Transit-City program 68 4.1.3. Research on smart vehicles 69 4.2. The link between smart vehicles and road infrastructure 70 4.2.1. Smart vehicles’ levels 71 4.2.2. Current examples of autonomous vehicles 73 4.2.3. The challenges of the road environment 73 4.2.4. The smart and mobile habitat 74 Chapter 5. Information Technology 2.0, the Foundation of Society 5.0 75 5.1. The reference to Jean-Paul Sartre 75 5.2. The “Sartrian” man in the digital world 77 5.3. Schemata 79 5.4. Data in their environment 79 5.4.1. The sources of data 79 5.4.2. Regulations on data use 80 5.5. The impact of the digital world 81 5.6. The digital shift of organizations 82 5.6.1. Organizations where the digital shift has been a failure 82 5.6.2. Organizations that made the digital shift early 82 5.6.3. Organizations blocked at ICT 1.0 83 5.7. ICT infrastructure 84 5.8. Primitive technologies 84 5.8.1. Text analysis 84 5.8.2. Voice recognition 85 5.8.3. The mobile phone as an inclusive technology 85 5.9. Recent technologies 86 5.9.1. Robotics and automation 86 5.9.2. Virtual reality 87 5.9.3. Computer-aided design 87 5.9.4. Artificial intelligence 89 Chapter 6. Society 5.0 and the Management of the Future 91 6.1. The firm from the managerial viewpoint 91 6.1.1. The definition of management 91 6.1.2. Management’s contents 92 6.2. The definition of market 92 6.3. Marketing 93 6.3.1. Marketing is an approach which only makes sense in a certain context 93 6.3.2. The four historical periods of marketing.95 6.3.3. The features of the different phases 96 6.4. The logics: need, desire, expectation and demand 99 6.4.1. The Lacanian perspective applied to marketing 99 6.4.2. The place of marketing 100 6.5. New managerial skills 102 6.6. Boredom comes from repetition 103 6.7. Customer satisfaction 103 6.8. Resistance to consumption 104 6.9. Recovery, gleaning, etc 105 6.10. Customer relationship management: an essential tool 105 6.11. The holistic approach to management 106 6.11.1. Sociocracy 106 6.11.2. Holacracy 107 6.12. The hacker’s position 108 6.12.1. Corporate hacking 108 6.12.2. Managing a hacking session 111 6.12.3. Human resources management 112 6.13. Feeble signals for understanding evolution 114 6.14. The generations 115 6.14.1. The Beta generation 115 6.14.2. The more “ecological” consumption of new generations 115 6.14.3. The middle-class generation 116 6.15. Skills and generations 117 6.15.1. The distinctive skills of a firm 117 6.15.2. The history of Low and Less 117 6.15.3. The cashless generation 117 6.15.4. Changes in commercialization and in business 118 6.15.5. Changes in the market 118 Chapter 7. The Consequences of the End of Major Innovations 121 7.1. The end of the major innovations: some observations 121 7.2. Marketing philosophy as a vehicle for enhancing technology 123 7.2.1. Why do we mention a marketing philosophy? 123 7.2.2. The example of Intel processors 124 7.2.3. Innovation balance 124 7.3. The new forms of innovation 125 7.4. The globalization of research 126 7.4.1. The globalization of science does not really exist 126 7.4.2. Scientific globalization is only real for mathematics, physics and health 127 7.4.3. The key point is European research 127 7.5. The globalization of scientific publications 128 7.5.1. Scientific communication: publish or perish 128 7.5.2. The solution, to expand the scope of “publications” 129 7.6. The role of bureaucracy in research 129 7.7. The role of China 130 7.8. The solution: to restore philosophy, poetry and morality to science and innovation 131 7.9. The new research in society 5.0 132 7.10. Innovation related to opportunities 132 7.11. The paradigm of innovation 134 7.12. Design thinking 135 7.12.1. Stage 1: identifying a problem and understanding its environment, “observation phase” 135 7.12.2. Stage 2: finding the concept or idea that will make it possible to find a solution, “ideation” phase.136 7.12.3. Stage 3: designing 136 7.12.4. Stage 4: building a model and a prototype 136 7.12.5. Stage 5: the assessment phase or “evaluation” 137 7.13. The risks of innovation 138 7.14. The lessons of Thomas Edison 139 7.15. Methods for innovating 140 7.15.1. The preliminary questions related to the genesis of a product or a service 141 7.15.2. The choice on whether to innovate a product-service or to innovate a process 142 7.16. Man in innovation 142 7.16.1. The human resources of the innovative firm 142 7.16.2. The answer to the society of boredom 142 7.17. The different forms of boredom 143 7.18. The transgression phenomenon and the transcendence one 144 7.19. Boredom comes from the ugly 145 7.19.1. The risk of uniformity 145 7.19.2. The search for harmony 146 7.20. The search for equilibrium 147 7.21. Design as a technical answer 147 7.21.1. Industrial aesthetics and design laws 147 7.21.2. The evolution of design needs 149 7.21.3. The use of a former theoretical approach in design 150 7.21.4. The aesthetic components 152 7.21.5. The impact of the sociometrics and homology 154 7.22. The sources and forms of design 155 7.23. The other criteria for innovating a product or a service 156 Chapter 8. Innovation in Society 5.0 157 8.1. The innovative product service 157 8.1.1. Losses during the innovation process 158 8.1.2. The question on the validation of a new product or a service 159 8.1.3. Improving a product 160 8.2. The paradigm shift 160 8.3. Mash-up forms 162 8.4. “Co” society 163 8.5. The sharing of information 163 8.6. Social networks, Internet and innovation 164 8.7. The collaborative forms 164 8.8. Innovation ecosystems 165 8.8.1. Resource centers 165 8.8.2. The concept of the Digital Innovation Hub 166 8.9. The evolution of former innovation organizations 168 8.10. Innovation in human resources 168 Chapter 9. “Co” Society 171 9.1. “Co” society 171 9.2. The evolution from prosthetic man to the current man 171 9.2.1. Types of bored men 172 9.2.2. Prosthetic man 172 9.2.3. Civilized man 173 9.2.4. Rational man. 173 9.2.5. Information society man 174 9.2.6. Augmented or improved man 174 9.3. The split between boredom and innovation 174 9.4. New innovative strategies 175 9.4.1. Innovation must be everywhere 175 9.4.2. The end of the dynamics of jealous marketing 175 9.4.3. “Co” society as a means for understanding the consumer 176 9.5. Porter’s strategic model 176 9.5.1. The notion of strategy and of strategic model 176 9.5.2. The concept of value chain 177 9.5.3. Porter’s three basic strategies 178 9.5.4. Cost strategic advantage 179 9.5.5. Differentiation advantage 179 9.5.6. Focus strategy 180 9.5.7. Development pathways 181 9.5.8. The origins of market massification 181 9.5.9. The vision through differentiation 182 9.6. Useful partnerships 183 9.7. Different types of alliances 184 9.7.1. The conditions of alliances 184 9.7.2. Strategic alliance through fusion 185 9.7.3. Strategic alliances involved via the execution of an agreement 185 9.7.4. Alliances through the integration of products.186 9.7.5. Determinants of an alliance 187 9.8. Typology of firms (according to Kotler) 188 9.8.1. The leader’s strategy 188 9.8.2. The challenger’s strategy 189 9.8.3. The follower’s strategy 189 9.8.4. The specialist’s strategy 190 Chapter 10. The Challenges of Localization, the Market, Skills and Knowledge 191 10.1. Localization is increasingly losing its interest 191 10.2. New practices related to the lack of importance of localization 192 10.3. The importance of reconstruction 193 10.4. Changes in market shares: why and how? 193 10.5. The issue of skills and knowledge 194 10.6. The notion of intellectual capital 194 10.7. Changes in operational marketing 196 10.8. Intrusive marketing 197 10.9. The use of acquired knowledge 198 10.10. Identification of regulations in documents 199 10.11. Identification of forms of commitment 200 10.12. Implementation of normalization 200 10.13. Organizational consequences 201 10.13.1. The norm as an agent for contextual change 201 10.13.2. The norm and machines 202 10.14. The impact of change on data 203 10.15. Changes in programs and processes 203 10.16. Organizational evolution 204 10.17. The challenge of generating trust 206 10.17.1. Specialized marketplaces 206 10.17.2. Rating, the representation of trust 206 10.17.3. Commitment as an ingredient of trust 207 10.17.4. The necessary confidence for inviting financing 207 Chapter 11. On-Demand Society 209 11.1. Does boredom have any influence on need, desire, expectation and demand? 209 11.1.1. Collective neurosis and diverted uses 209 11.1.2. The theory of diverted uses and the role of boredom 210 11.1.3. Examples of diverted uses 211 11.2. “Servitization”, the products and services of revolution 5.0 212 11.3. The notion of “servitization” 213 11.4. The nature of “servitization” 213 11.4.1. Servicizing 214 11.4.2. The different forms of servicizing 214 11.4.3. “Servuction” 215 11.4.4. Competitive advantage 215 11.5. The paths toward “servitization” 216 11.5.1. The formation of value 217 11.5.2. “XaaS” logic 218 11.5.3. The “rental” rather than the “purchase” logic 219 11.6. Enterprise manufacturing services 220 11.6.1. The fabless 220 11.6.2. Original design manufacturers 221 11.6.3. The example of the EMS of electronics 221 11.7. The key points of “servitization”: visualization and virtualization 222 11.8. Recent developments 223 11.8.1. Tokyo University of Technology 224 11.8.2. The SPREE project 224 11.8.3. The example of the firm Komatsu 224 Chapter 12. The Economy of Society 5.0 227 12.1. The new economies 228 12.2. The problems in the age of connectivity 230 12.3. Evolution of economy 230 12.3.1. Hunting and gathering economy 231 12.3.2. Bartering economy 231 12.3.3. Souk economy or the basis of market economy. 232 12.3.4. Production economy 232 12.3.5. Mass distribution economy 233 12.3.6. Market economy 234 12.3.7. Environmental economy 234 12.3.8. Intangible economy 234 12.4. Economy related to digital tools 235 12.5. The power of platforms 237 12.5.1. The concept of platform 237 12.5.2. The role of trust in platforms 237 12.5.3. The different types of platforms 238 12.5.4. The State as platform 239 12.5.5. Platform as a service 242 12.5.6. Marketing platforms 243 12.6. The limits of platforms 243 12.7. Free economy 244 12.7.1. The characteristics of free economy 245 12.7.2. The example of the “free” newspaper market 245 12.8. The fight against large firms 245 12.9. The notion of data visualization 246 12.10. Technology creating new resources 247 Conclusion 249 Bibliography 251 Index 269
£125.06
ISTE Ltd and John Wiley & Sons Inc Organic Electronics 1: Materials and Physical
Book SynopsisDue to their special properties, organic semiconductors enable the development of large-area, low-cost devices, paving the way for flexible and nomadic applications that advantageously replace those made with traditional semiconductors. This book describes the properties and deposition methods of organic semiconductors, transparent conductive materials or metals which are used in the fabrication of organic devices. The physical processes (optical, electrical and interface) that control the mechanisms in the formation and transport of the charge carriers of the materials are studied and explained in detail. Organic Electronics 1 introduces the fundamental and applied aspects of the field of organic electronics. It is intended for researchers and students in university programs or engineering schools specializing in electronics, energy and materials.Table of ContentsIntroduction ix Chapter 1. Semiconductor Theory 1 1.1. Introduction 1 1.2. Review of the basic concepts of crystalline semiconductors 3 1.2.1. Intrinsic semiconductors 4 1.2.2. Extrinsic semiconductors 5 1.2.3. Fermi level 7 1.2.4. Charge transport in semiconductors 7 1.3. P–N junction 9 1.3.1. Space charge region 9 1.3.2. Junction capacitance 11 1.4. Impurities and defects 11 1.4.1. Traps and recombination centers 12 1.5. Metal/semiconductor contact 20 1.5.1. Parameters of metal/semiconductor contacts 20 1.5.2. Formation of metal/semiconductor contacts 21 1.5.3. Width λ of the space charge region 23 1.5.4. Junction capacitance 23 1.5.5. Schottky effect 24 1.5.6. Schottky diode 25 1.6. Semiconductors under non-equilibrium conditions 27 1.6.1. Parameters of a semiconductor under non-equilibrium conditions 27 1.6.2. Recombination of carriers via recombination centers (Shockley–Read–Hall theory) 29 1.6.3. Transient relaxation current 31 1.7. Space charge current 34 1.7.1. The case of an ideal semiconductor 35 1.7.2. Trap-filled limit voltage 37 1.7.3. Discrete traps and trap distribution 37 1.8. Hopping conduction 38 Chapter 2. Materials 41 2.1. Introduction 41 2.2. Organic materials 42 2.2.1. Binding and hybridization of carbon 46 2.3. Conjugated polymers 48 2.3.1. Polyacetylene 49 2.3.2. Benzene 51 2.3.3. Deposition of polymer films 52 2.4. Energy bands 53 2.4.1. Concepts of solitons and polarons 55 2.4.2. Concept of doping 58 2.5. Small molecules 61 2.6. Design and engineering of organic materials 63 2.7. Hybrid materials or nanocomposites 65 2.7.1. Polymer matrix nanocomposites 67 2.7.2. Nanocomposites with nanomaterials 67 2.7.3. Preparation of nanocomposites 68 2.8. Transparent and conductive materials 73 2.8.1. Indium tin oxide 73 2.8.2. Fluorine-doped tin oxide 74 2.8.3. Other transparent oxide conductors 75 2.8.4. Other transparent conductive materials 75 2.9. Materials for encapsulation 78 2.9.1. Glass slides 78 2.9.2. Hybrid multilayers 79 Chapter 3. Optical Processes 81 3.1. Introduction 81 3.2. Interaction between light and molecules 81 3.2.1. Electronic transitions 81 3.2.2. Selection rules 82 3.3. Optical processes 84 3.3.1. Light absorption 84 3.3.2. Light emission 88 3.3.3. Perrin–Jablonski diagram 91 3.3.4. Quenching 91 3.4. Excitons 99 3.4.1. Classification of excitons 100 3.4.2. Binding energy of excitons 101 3.4.3. Movement of excitons 103 3.4.4. Dissociation of excitons 103 3.5. Experimental techniques 104 3.5.1. UV–visible absorption spectroscopy 104 3.5.2. Photoluminescence spectroscopy 106 3.5.3. Infrared and Raman spectroscopy 110 Chapter 4. Electronic Processes 115 4.1. Introduction 115 4.2. Charge carrier injection process 116 4.2.1. Injection mechanisms 117 4.2.2. Hole or electron devices 119 4.2.3. Transport layers 121 4.3. Charge transport process 123 4.3.1. Hopping mechanisms 124 4.3.2. Space-charge limited conduction 133 4.3.3. Defects and traps in organic semiconductors 140 Chapter 5. Interface Processes 155 5.1. Introduction 155 5.2. Formation of organic semiconductor/metal interfaces 155 5.2.1. Vacuum-level alignment model: Mott–Schottky theory 156 5.2.2. Interface dipole model: Bardeen’s theory 156 5.2.3. Characteristics of organic semiconductor/metal interfaces 158 5.2.4. Fermi-level pinning 160 5.2.5. Integer charge transfer process 162 5.3. Surface characterization techniques 166 5.3.1. Atomic force microscopy 166 5.3.2. X-ray photoelectron spectroscopy 167 5.3.3. UV photoelectron spectroscopy 168 5.4. Interface engineering 169 5.4.1. Inverted structure devices 170 5.4.2. Self-assembled monolayers 172 5.5. Conclusion 174 List of Acronyms 175 References 183 Index 191
£124.15
ISTE Ltd and John Wiley & Sons Inc Fundamentals and Applications of Acoustic
Book SynopsisIn the last few decades, metamaterials have revolutionized the ways in which waves are controlled, and applied in physics and practical situations. The extraordinary properties of metamaterials, such as their locally resonant structure with deep subwavelength band gaps and their ranges of frequency where propagation is impossible, have opened the way to a host of applications that were previously unavailable. Acoustic metamaterials have been able to replace traditional treatments in several sectors, due to their better performance in targeted and tunable frequency ranges with strongly reduced dimensions. This is a training book composed of nine chapters written by experts in the field, giving a broad overview of acoustic metamaterials and their uses. The book is divided into three parts, covering the state-of-the-art, the fundamentals and the real-life applications of acoustic metamaterials.Table of ContentsPart 1. Overview of the Current Research in Acoustic 1. Visco-thermal Effects in Acoustic Metamaterials Based on Local Resonances, José Sanchez-Dehesa and Vincente Cutanda Henriquez. 2. Locally Resonant Metamaterials for Plate Waves: the Respective Role of Compressional Versus Flexural Resonances of a Dense Forest of Vertical Rods, Martin Lott and Philippe Roux. 3. Slow Sound and Critical Coupling to Design Deep Sub wave length Acoustic Metamaterials for Perfect Absorption and Efficient Diffusion, Vincente Romero-Garcìa, Noé Jiménez and Jean-Philippe Groby. Part 2. Principles and Fundamentals of Acoustic Metamaterials 4. Homogenization of Thin 3D Periodic Structures in the Time Domain – Effective Boundary and Jump Conditions, Agnès Maurel, Kim Pham and Jean-Jacques Marigo. 5.The Plane Wave Expansion Method, Jérôme Vasseur. 6. Introduction to Multiple Scattering Theory, Logan Schwan and Jean-Philippe Groby. Part 3. Applications of Acoustic Metamaterials 7. Acoustic Metamaterials for Industrial Applications, Clément Lagarrigue and Damien Lecoq. 8. Elastic Metamaterials for Radio Frequency Applications, Sarah Benchabane and Alexandre Reinhardt. 9. Acoustic Metamaterials and Underwater Acoustics Applications, Christian Audoly.
£125.06
ISTE Ltd and John Wiley & Sons Inc Training Engineers for Innovation
Book SynopsisThroughout history, engineers have been defined as those who bring technological innovation to society. However, the concept of innovation and the role of the engineer are now changing as a result of globalization, the digital revolution, growing inequalities and environmental concerns. Training Engineers for Innovation therefore analyzes the ways in which the educational systems for engineers are adapting to these new demands, as well as the conditions in which this training has developed. This book brings together the works of a consortium of researchers dedicated to the subject area as part of the Innov’Ing 2020 project. Its contributors present various means to devise effective pedagogies adapted to a holistic approach to innovation which incorporates the technical, economic, social, ethical and environmental dimensions of engineering.Table of ContentsPart 1. Innovation Design and Expectations toward Training 1. From Technological Innovation to “Situated” Innovation: Improving the Adaptation of Engineering Training to the Societal Challenges of the 21st Century, Emmanuel Cardona Gil, Linda Gardelle and Brad Tabas. 2. Responding to an Event: Innovation of the Contemporary Engineer?, Frédéric Huet, Hugues Choplin, Isabelle Cailleau and Pierre Steiner. 3. Innovation within Companies: Changes and Impacts on Our Student Engineer Training Models, Christiane Gillet and Klara Kövesi. 4. Skills and Competencies for Innovators: New Priorities and Requirements for Engineering Graduates, Klara Kövesi and Péter Csizmadia. Part 2. New Skills and Adaptation to Training Systems 5. The Training of Innovators between Skill Acquisition and Construction of an Individual Socioprofessional Identity, Tiphaine Liu. 6. Innovation Training and Entrepreneurship in French Engineering Higher Education Institutions: An Investigation of the Commission des Titres d’Ingénieur, Anne-Marie Jolly and Julie Nolland. 7. Determinants of Skill Matching among Young Hungarian Engineers, Péter Csizmadia and Zsuzsanna Veroszta. Part 3. Pedagogies of Innovation 8. Swimming with Sharks without Being Eaten: How Engineering Students can Learn Creativity, Entrepreneurial Thinking and Innovation, Claudius Terkowsky, Tobias Haertel, Anna-Lena Rose, Liudvika Leisyte and Dominik May. 9. Engaging with Heritage to Promote Innovative Thinking in Engineering Management Education, Jane Andrews and Robin Clark. 10. How Do Graduate Engineering Schools Train for Innovation? Study of the Curricula of Three French Schools, Denis Lemaître and Christophe Morace. 11. Developing Methods and Programs for Teaching Innovation to Engineers: Toward Eco-Innovation?, Catherine Adam and Serge Coco.
£125.06
ISTE Ltd and John Wiley & Sons Inc Metaheuristics for Robotics
Book SynopsisThis book is dedicated to the application of metaheuristic optimization in trajectory generation and control issues in robotics. In this area, as in other fields of application, the algorithmic tools addressed do not require a comprehensive list of eligible solutions to effectively solve an optimization problem. This book investigates how, by reformulating the problems to be solved, it is possible to obtain results by means of metaheuristics. Through concrete examples and case studies particularly related to robotics this book outlines the essentials of what is needed to reformulate control laws into concrete optimization data. The resolution approaches implemented as well as the results obtained are described in detail, in order to give, as much as possible, an idea of metaheuristics and their performance within the context of their application to robotics.Table of ContentsPreface ix Introduction xiii Chapter 1. Optimization: Theoretical Foundations and Methods 1 1.1. The formalization of an optimization problem 1 1.2. Constrained optimization methods 5 1.2.1. The method of Lagrange multipliers 9 1.2.2. Method of the quadratic penalization 11 1.2.3. Methods of interior penalties 12 1.2.4. Methods of exterior penalties 13 1.2.5. Augmented Lagrangian method 14 1.3. Classification of optimization methods 15 1.3.1. Deterministic methods 16 1.3.2. Stochastic methods 18 1.4. Conclusion 21 1.5. Bibliography 22 Chapter 2. Metaheuristics for Robotics 27 2.1. Introduction 27 2.2. Metaheuristics for trajectory planning problems 28 2.2.1. Path planning 29 2.2.2. Trajectory generation 43 2.3. Metaheuristics for automatic control problems 45 2.4. Conclusion 50 2.5. Bibliography 50 Chapter 3. Metaheuristics for Constrained and Unconstrained Trajectory Planning 53 3.1. Introduction 53 3.2. Obstacle avoidance 54 3.3. Bilevel optimization problem 58 3.4. Formulation of the trajectory planning problem 59 3.4.1. Objective functions 60 3.4.2. Constraints 62 3.5. Resolution with a bigenetic algorithm 63 3.6. Simulation with the model of the Neuromate robot 66 3.6.1. Geometric model of the Neuromate robot 67 3.6.2. Kinematic model of the Neuromate robot 71 3.6.3. Simulation results 72 3.7. Conclusion 83 3.8. Bibliography 83 Chapter 4. Metaheuristics for Trajectory Generation by Polynomial Interpolation 87 4.1. Introduction 87 4.2. Description of the problem addressed 88 4.3. Formalization 91 4.3.1. Criteria 91 4.3.2. Constraints 92 4.4. Resolution 94 4.4.1. Augmented Lagrangian 95 4.4.2. Genetic operators 97 4.4.3. Solution coding 99 4.5. Simulation results 100 4.6. Conclusion 116 4.7. Bibliography 118 Chapter 5. Particle Swarm Optimization for Exoskeleton Control 121 5.1. Introduction 121 5.2. The system and the problem under consideration 123 5.2.1. Representation and model of the system under consideration 123 5.2.2. The problem under consideration 125 5.3. Proposed control algorithm 126 5.3.1. The standard PSO algorithm 126 5.3.2. Proposed control approach 128 5.4. Experimental results 135 5.5. Conclusion 142 5.6. Bibliography 143 Conclusion 147 Index 153
£125.06
ISTE Ltd and John Wiley & Sons Inc Automatic Detection of Irony: Opinion Mining in
Book SynopsisIn recent years, there has been a proliferation of opinion-heavy texts on the Web: opinions of Internet users, comments on social networks, etc. Automating the synthesis of opinions has become crucial to gaining an overview on a given topic. Current automatic systems perform well on classifying the subjective or objective character of a document. However, classifications obtained from polarity analysis remain inconclusive, due to the algorithms' inability to understand the subtleties of human language. Automatic Detection of Irony presents, in three stages, a supervised learning approach to predicting whether a tweet is ironic or not. The book begins by analyzing some everyday examples of irony and presenting a reference corpus. It then develops an automatic irony detection model for French tweets that exploits semantic traits and extralinguistic context. Finally, it presents a study of portability in a multilingual framework (Italian, English, Arabic).Table of ContentsPreface ix Introduction xi Chapter 1. From Opinion Analysis to Figurative Language Treatment 1 1.1. Introduction 1 1.2. Defining the notion of opinion 3 1.2.1. The many faces of opinion 3 1.2.2. Opinion as a structured model 4 1.2.3. Opinion extraction: principal approaches 5 1.3. Limitations of opinion analysis systems 7 1.3.1. Opinion operators 8 1.3.2. Domain dependency 9 1.3.3. Implicit opinions 10 1.3.4. Opinions and discursive context above phrase level 11 1.3.5. Presence of figurative expressions 12 1.4. Definition of figurative language 13 1.4.1. Irony 13 1.4.2. Sarcasm 18 1.4.3. Satire 20 1.4.4. Metaphor 21 1.4.5. Humor 22 1.5. Figurative language: a challenge for NLP 23 1.6. Conclusion 23 Chapter 2. Toward Automatic Detection of Figurative Language 25 2.1. Introduction 25 2.2. The main corpora used for figurative language 27 2.2.1. Corpora annotated for irony/sarcasm 28 2.2.2. Corpus annotated for metaphors 33 2.3. Automatic detection of irony, sarcasm and satire 36 2.3.1. Surface and semantic approaches 36 2.3.2. Pragmatic approaches 39 2.4. Automatic detection of metaphor 51 2.4.1. Surface and semantic approaches 52 2.4.2. Pragmatic approaches 53 2.5. Automatic detection of comparison 58 2.6. Automatic detection of humor 58 2.7. Conclusion 61 Chapter 3. A Multilevel Scheme for Irony Annotation in Social Network Content 63 3.1. Introduction 63 3.2. The FrIC 65 3.3. Multilevel annotation scheme 66 3.3.1. Methodology 66 3.3.2. Annotation scheme 69 3.4. The annotation campaign 79 3.4.1. Glozz 79 3.4.2. Data preparation 80 3.4.3. Annotation procedure 81 3.5. Results of the annotation campaign 83 3.5.1. Qualitative results 83 3.5.2. Quantitative results 84 3.5.3. Correlation between different levels of the annotation scheme 89 3.6. Conclusion 93 Chapter 4. Three Models for Automatic Irony Detection 95 4.1. Introduction 95 4.2. The FrICAuto corpus 97 4.3. The SurfSystem model: irony detection based on surface features 99 4.3.1. Selected features 99 4.3.2. Experiments and results 101 4.4. The PragSystem model: irony detection based on internal contextual features 104 4.4.1. Selected features 104 4.4.2. Experiments and results 109 4.4.3. Discussion 116 4.5. The QuerySystem model: developing a pragmatic contextual approach for automatic irony detection 118 4.5.1. Proposed approach 118 4.5.2. Experiments and results 122 4.5.3. Evaluation of the query-based method 123 4.6. Conclusion 124 Chapter 5. Towards a Multilingual System for Automatic Irony Detection 127 5.1. Introduction 127 5.2. Irony in Indo-European languages 128 5.2.1. Corpora 128 5.2.2. Results of the annotation process 130 5.2.3. Summary 139 5.3. Irony in Semitic languages 140 5.3.1. Specificities of Arabic 142 5.3.2. Corpus and resources 143 5.3.3. Automatic detection of irony in Arabic tweets 146 5.4. Conclusion 149 Conclusion 151 Appendix 155 References 169 Index 189
£125.06
ISTE Ltd and John Wiley & Sons Inc Topographical Tools for Filtering and
Book SynopsisMathematical morphology has developed a powerful methodology for segmenting images, based on connected filters and watersheds. We have chosen the abstract framework of node- or edge-weighted graphs for an extensive mathematical and algorithmic description of these tools.Volume 2 proposes two physical models for describing valid flooding on a node- or edge-weighted graph, and establishes how to pass from one to another. Many new flooding algorithms are derived, allowing parallel and local flooding of graphs. Watersheds and flooding are then combined for solving real problems. Their ability to model a real hydrographic basin represented by its digital elevation model constitutes a good validity check of the underlying physical models. The last part of Volume 2 explains why so many different watershed partitions exist for the same graph. Marker-based segmentation is the method of choice for curbing this proliferation. This book proposes new algorithms combining the advantages of the previous methods which treated node- and edge-weighted graphs differently.Table of ContentsNotations xi Introduction xxv Part 1. Flooding 1 Chapter 1. Modelling Flooding in Edgeor Node-weighted Graphs 3 1.1. Summary of the chapter 3 1.2. The importance of flooding 4 1.2.1. Flooding creates lakes 4 1.2.2. Flooding for controlling watershed segmentation 4 1.2.3. Flooding, razing, leveling and flattening 5 1.3. Description of the flood covering a topographic surface 6 1.3.1. Observing the same flooding on two levels of abstraction 6 1.3.2. Modeling the two scales of flooding: at the pixel level or at the region level 7 1.3.3. Modeling a flooded topographic surface as a node-weighted graph 8 1.3.4. Modeling an edge-weighted graph as a tank network 15 1.4. The relations between n-floodings and e-floodings 19 1.4.1. Modeling flooding on two scales: the equivalence of both models 19 1.5. Flooding a flowing graph 21 1.5.1. Flowing graphs: reminder 21 1.5.2. Starting from an edge-weighted graph G[nil, η] 22 1.5.3. Starting from a node-weighted graph G[ν, nil] 24 1.5.4. Summarizing 24 Chapter 2. Lakes and Regional Minima 27 2.1. Summary of the chapter 27 2.2. Lakes from e-floodings and n-floodings 27 2.2.1. e-flooding of graphs G[nil, η] 27 2.2.2. n-flooding of graphs G[ν, nil] 28 2.3. Regional minimum lakes and full lakes 29 2.3.1. e-floodings of graphs G[nil, η] 29 2.3.2. n-floodings of graphs G[ν, nil] 30 2.4. Coherence between the definitions of lakes in G[ν, nil] and in G[nil, δenν] 31 Chapter 3. Among all Possible Floodings, Choosing One 33 3.1. Summary of the chapter 33 3.2. Various mechanisms for selecting a particular flooding 34 3.2.1. Dominated flooding in node- and edge-weighted graphs 34 3.2.2. Dominated flooding in node- and edge-weighted graphs 36 3.2.3. Dominated flooding as a function of the ceiling function 37 3.3. The topography of dominated flooding 37 3.3.1. The regional minima of dominated flooding in an edge-weighted graph G[nil, η] 38 3.3.2. The regional minima of dominated n-flooding in node-weighted graphs G[ν, nil] 39 3.3.3. Algorithmic consequences 41 3.4. Computing dominated flooding by local adjustments 43 3.4.1. The case of edge-weighted graphs G[nil, η] 43 3.4.2. The case of node-weighted graphs G[ν, nil] 44 3.4.3. Software or hardware implementation of Berge’s algorithm 45 Chapter 4. Flooding and Flooding Distances 49 4.1. Summary of the chapter 49 4.2. Flooding distances 49 4.2.1. The flooding distance associated with the lakes of node- or edge-weighted graphs 49 4.2.2. Characterization of the flooding distance 50 4.2.3. Flooding distances on a graph or a tree 52 4.2.4. The shortest flooding distances 53 4.2.5. Dominated flooding and flooding distances 56 4.3. The shortest path algorithms for computing dominated flooding 66 4.3.1. Computing the shortest flooding distance with the Moore–Dijkstra algorithm 66 4.4. The flooding core-expanding algorithm 75 4.4.1. The first version of the core-expanding algorithm applied to the augmented graph G 76 4.4.2. The second version of the core-expanding algorithm applied to the initial graph G 78 4.4.3. The third version of the core-expanding algorithm applied to the initial graph G 79 4.5. Marker-based segmentation 81 4.5.1. The case of a node-weighted graph G(ν, nil) 81 Chapter 5. Graph Flooding via Dendrograms 83 5.1. Summary of the chapter 83 5.2. Introduction 84 5.3. Dendrograms: reminder 86 5.3.1. The structure associated with an order relation 86 5.3.2. Dendrograms 87 5.3.3. Stratification index and partial ultrametric distances (PUD) 88 5.4. The hierarchy of lake zones 89 5.4.1. The lake zones of an edge-weighted graph G(nil, η) 89 5.4.2. The hierarchy of lake zones, i.e. the closed balls of χ 92 5.4.3. Representing of hierarchy of lake zones 94 5.5. The law of communicating vessels 98 5.5.1. The flooding levels in connected subgraphs and closed balls 99 5.6. Dominated flooding on the dendrogram of lake zones 100 5.6.1. Notations 100 5.6.2. Incidence of the ceiling function on the dendrogram flooding levels 100 5.6.3. Finding the flooding level of a leaf 102 5.6.4. Parallel processing for flooding the dendrogram 105 5.6.5. Strategies for flooding the dendrogram of lake zones 106 5.7. Constructing and flooding a binary dendrogram 111 5.7.1. Two dendrograms representing the same hierarchy 111 5.7.2. Constructing a binary dendrogram representing a hierarchy 112 5.7.3. Flooding a binary dendrogram 113 5.8. A derived algorithm for dominated flooding 113 5.8.1. Algorithm “ancestor-flood without constructing the dendrogram” 117 5.8.2. Illustration 117 Part 2. Modeling a Real Hydrographic Basin 119 Chapter 6. The Hydrographic Basin of a Digital Elevation Model 121 6.1. Summary of the chapter 121 6.2. Preprocessing the digital elevation model 121 6.2.1. Suppressing the spurious regional minima 121 6.2.2. Creating an ∞ − steep digraph 123 6.2.3. Local pruning for extracting marked rivers 126 6.2.4. Extracting all rivers 128 6.2.5. Labeling sources and rivers 129 6.2.6. Detection of crest lines 131 6.2.7. Detecting the upstream of sources 132 6.2.8. Analyzing the tree structure of rivers 133 6.2.9. Constructing the catchment zones of riverlets 137 Part 3. Watershed Partitions 139 Chapter 7. Minimum Spanning Forests and Watershed Partitions 141 7.1. Summary of the chapter 141 7.2. Flooding distance, minimum spanning trees and forests 142 7.2.1. Flooding distances 142 7.2.2. Flooding distance on the minimum spanning tree of the graph G(nil, η) 143 7.2.3. Characterizing the MST 145 7.3. Minimum spanning forests rooted in markers 146 7.3.1. Constructing the minimum spanning forest 147 7.3.2. Converting the minimum spanning forest into a minimum spanning tree 149 7.4. Watershed partitions of weighted graphs 150 7.4.1. Catchment basins and watershed partitions 150 7.4.2. Flowing paths and catchment basins 151 7.5. Minimum spanning forests rooted in the regional minima 151 7.5.1. A minimum spanning forest corresponds to each watershed partition 151 7.5.2. Inversely, each watershed partition spans a minimum spanning forest 154 7.5.3. A rather unexpected watershed partition 156 7.6. A manifold of different watershed partitions 159 7.6.1. Catchment zones and catchment basins 159 7.7. Reducing the number of watershed partitions 160 7.7.1. Minimum spanning forests of k – steep or ∞ − steep graphs 163 7.7.2. The waterfall hierarchy 168 7.7.3. Usefulness of the waterfall hierarchy 171 Chapter 8. Marker-based Segmentation 175 8.1. Dominated flooding and minimum spanning forests 177 8.1.1. Dominated flooding 177 8.1.2. Minimum spanning forests 177 8.1.3. Illustration 178 8.1.4. Minimum spanning forests and dominated flooding 179 8.2. Constructing a minimum spanning forest rooted in the markers 183 8.2.1. Algorithms for constructing a minimum spanning forest 183 8.2.2. Increasing the selectiveness of Prim’s algorithm 186 8.2.3. Marker-based segmentation of node-weighted graphs 187 8.2.4. Derived algorithms 190 8.3. Marker-based segmentation after flooding the graph 194 8.3.1. Segmenting the dominated flooding of a graph 194 8.3.2. The case of an edge-weighted graph 194 8.3.3. Constructing a k – steep or ∞ − steep watershed partition for a node-weighted graph G(ν, nil) 200 8.4. Directly constructing a marker-based ∞ − steep watershed partition with the core expanding algorithm 201 8.5. The early days of marker-based segmentation 202 8.5.1. The level-by-level construction of a watershed 203 8.6. A two scale marker-based segmentation 205 8.7. Instant marker-based segmentation 205 8.7.1. Why and when we need instant marker-based segmentation 205 8.7.2. The reef and cascade distance 206 8.7.3. Computing the reef and cascade distance for all pairs of nodes in G(nil, η) 209 8.7.4. Computing the smallest reef and cascade distances between all couples of nodes in a graph 212 Conclusion 217 Appendix 227 References 239 Index 241
£125.06
ISTE Ltd and John Wiley & Sons Inc Disruptive Technology and Defence Innovation
Book SynopsisRecent advances in the disciplines of computer science (e.g., quantum theory, artificial intelligence), biotechnology and nanotechnology have deeply modified the structures of knowledge from which military capabilities are likely to develop. This book discusses the implications of disruptive technologies for the defence innovation ecosystem. Two complementary dimensions of the defence innovation ecosystem are highlighted: the industrial and intra-organizational. On the industrial scale, there is a shift in the ecology of knowledge underpinning the defence industrial and technological base (DITB). At the intra-organizational level, it is the actors’ practices that change and, through them, their skills and the processes by which they are acquired and transferred. In this context, the sources and legitimacy of innovation are being transformed, in turn requiring sometimes radical adaptations on the part of the various actors, including companies, military services, research communities and governmental agencies, which make up the defence innovation ecosystem.Table of ContentsIntroduction xiPierre BARBAROUX Part 1. Transformation of the Innovation Organization Model in the Defence Sector 1 Chapter 1. Innovation Dynamics in Defence Industries 3Jean BELIN and Marianne GUILLE 1.1. Introduction 3 1.2. Transformation of the defence industry’s innovation environment 4 1.2.1. Changes in the science and technology system 5 1.2.2. Intensifying competition and increasing complexity of the knowledge mobilized 10 1.2.3. Less dependence on defence financing 14 1.3. Opening of the defence sector 19 1.3.1. Development of duality 19 1.3.2. More cooperation 21 1.3.3. New institutions and stronger links with academic research 23 1.4. Conclusion 26 1.5. References 27 Chapter 2. Evolution of the Aerospace and Defence Innovation Model: Intensifying Science and Technology Relationships 31Cécile FAUCONNET 2.1. Introduction 31 2.2. Reflection framework 33 2.2.1. Defence innovation 33 2.2.2. Knowledge-based innovation 35 2.3. Methodology 37 2.3.1. Bibliometric approach 37 2.3.2. Data source and analysis 39 2.4. Results 43 2.4.1. Descriptive analysis 43 2.4.2. Scientific knowledge and quality of technological innovation 47 2.5. Conclusion 50 2.6. Appendices 50 2.7. References 53 Chapter 3. Identification of Defence Technological Knowledge Systems: A Tool for Duality Analysis 59François-Xavier MEUNIER 3.1. Introduction 59 3.2. Definition of a TKS and defence innovation 60 3.3. Data 63 3.4. Methodology 66 3.5. Results 70 3.6. Conclusion 76 3.7. References 77 Chapter 4. Defence Aerospace Firms: What Are the Technological Coherence of Their R&D? 81Cécile FAUCONNET, Didier LEBERT, Célia ZYLA and Sylvain MOURA 4.1. Introduction 81 4.2. Assumptions on the relatedness and technological coherence of DA firms 83 4.3. Measuring technological coherence 86 4.4. The data: scope and content 89 4.5. Main results 96 4.6. Conclusion 100 4.7. References 100 Chapter 5. Innovation and Legitimacy: The Case of Remotely Piloted Aircraft Systems 105Pierre BARBAROUX 5.1. Introduction 105 5.2. Technological innovation and legitimacy 108 5.3. The ecosystem of RPAS in France 110 5.4. The role of the French Air Force RPAS Center of Excellence (CED) in legitimizing RPAS systems 114 5.5. Implications and conclusion 117 5.6. References 119 Part 2. Transformation of Skills and Uses Induced by Innovations 121 Chapter 6. Man–machine Teaming: Towards a New Paradigm of Man–machine Collaboration? 123Vincent FERRARI 6.1. The challenges of collaboration 123 6.2. The sharing of human–machine authority: the premises of collaboration 125 6.3. Expert systems and human–system collaboration 128 6.4. AI and collaboration between human and artificial agents 129 6.4.1. The omnipresence of weak AI 130 6.4.2. The opacity of weak AI 130 6.4.3. A mistrust of weak AI 132 6.4.4. Strong AI for human–system collaboration? 133 6.5. Seeing beyond cognition to innovate 134 6.6. Conclusion 135 6.7. References 136 Chapter 7. Perspectives and Ambitions of the Maintenance in Operational Condition Renovated at the Heart of the Armament Programs: Illustrations in the Terrestrial Environment 139Nicolas HUÉ, Walter ARNAUD and Christophe GRANDEMANGE 7.1. Introduction 139 7.2. Context and future challenges of the MCO 140 7.2.1. End-to-end construction, from upstream phases to the in-service use phase 140 7.2.2. The necessary awareness of stakeholder responsibilities 141 7.2.3 What are the support mechanisms for better industrial accountability? 142 7.2.4. The influence of the environment 143 7.2.5. Financial issues that are central to the work 144 7.3. Innovations for the MCO of the future: the prerequisite for digitization 144 7.3.1. The necessary digitization of the MCO 144 7.3.2. The foundation of digitization: RFID, HUMS and interoperability. 145 7.4. Innovations for the MCO of the future: research and innovation challenges 150 7.4.1. Predictions of optimal maintenance plans: artificial intelligence and big data 150 7.4.2. Augmented and virtual reality (AR/VR) 151 7.4.3. 3D printing 151 7.4.4. Remote maintenance 152 7.5. Some safeguards 152 7.5.1. Technology at the service of humans 152 7.5.2. Jobs and skills that need to be managed in symbiosis 153 7.5.3. A strategic challenge for the DITB 153 7.6. Prospects for the future 154 Chapter 8. Technological Change and Individual Competencies: The Influence of Glass-cockpit Aircraft on French Air Force Pilots Training and Skills 155Cyril CAMACHON and Pierre BARBAROUX 8.1. Introduction 155 8.2. The pilot training model: epistemological foundations and typology of skills 157 8.3. Research context 159 8.3.1. Data sources and analyses 159 8.3.2. The initial training phase at Salon-de-Provence 161 8.4. Digitization of glass cockpits: what are the implications for pilot training? 163 8.4.1. The basic technical skills revisited 163 8.4.2. Reconfiguring the training toolset? The role of embedded simulation 169 8.5. Discussion and conclusion 174 8.6. References 177 Chapter 9. Towards the Advent of High-Altitude Pseudo-Satellites (HAPS) 181Bertrand KIRSCH and Olivier MONTAGNIER 9.1. Introduction 181 9.2. Capability issues: observation and telecommunications. 184 9.3. Solar flight history: projects, records and accidents 185 9.4. Resolution of a scientific and technological paradox 191 9.4.1. Solar energy: unlimited? 192 9.4.2. The keys to endurance 193 9.4.3. A technological challenge: the aeroelasticity of flexible wings 194 9.4.4. An alternative way to remedy flutter: aeroelastic weaving 197 9.5. Conclusion 199 9.6. References 200 Conclusion 203Pierre BARBAROUX List of Authors 209 Index 211
£125.06
ISTE Ltd and John Wiley & Sons Inc Artificial Intelligence, Cybersecurity and Cyber
Book SynopsisThe aim of the book is to analyse and understand the impacts of artificial intelligence in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.Table of ContentsIntroduction ix Chapter 1. On the Origins of Artificial Intelligence 1 1.1. The birth of artificial intelligence (AI) 1 1.1.1. The 1950s–1970s in the United States 1 1.1.2. AI research in China 7 1.1.3. AI research in Russia 9 1.1.4. AI research in Japan 12 1.1.5. AI research in France 14 1.2. Characteristics of AI research 16 1.3. The sequences of AI history 19 1.4. The robot and robotics 23 1.5. Example of AI integration: the case of the CIA in the 1980s 27 1.5.1. The CIA’s instruments and methods for understanding and appropriating AI adapted to its needs 29 1.5.2. Focus groups, research, coordination 35 1.5.3. The network of interlocutors outside the intelligence community 36 1.5.4. What AI applications for what intelligence needs? 42 Chapter 2. Concepts and Discourses 45 2.1. Defining AI 47 2.1.1. AI 47 2.1.2. Expert systems 54 2.1.3. Machine learning and deep learning 56 2.1.4. The robot, robotics 57 2.2. Types of AI 60 2.3. Evolution of the themes over time 62 2.3.1. Google Trends 62 2.3.2. The AAAI magazine 63 2.4. The stories generated by artificial intelligence 67 2.4.1. The transformative power of AI 67 2.4.2. The absolute superiority of human intelligence over the machine 75 2.4.3. The replacement of humans by machines 76 2.4.4. AI as an existential threat 77 2.4.5. The place of AI and robotics in fiction: the example of Japan 80 2.5. Political considerations 82 2.5.1. National strategies for artificial intelligence 85 2.5.2. U.S. policy 97 Chapter 3. Artificial Intelligence and Defense Issues 105 3.1. Military policies and doctrines for AI: the American approach 105 3.1.1. American defense AI policy 105 3.1.2. AI in American military doctrines 114 3.2. Military AI in Russia 128 3.3. AI and the art of warfare 136 3.3.1. Manuel de Landa: war in the age of intelligent machines 136 3.3.2. AI announcing a new RMA? 139 3.3.3. Applications of AI in the military field 143 3.3.4. Expert systems in military affairs 146 3.3.5. Autonomous weapons 148 3.3.6. Robotics and AI 151 3.4. AI and cyber conflict 155 3.4.1. Malware, cybersecurity and AI 157 3.4.2. AI and cyberweapons 162 3.4.3. Offensive–defensive/security configurations 163 3.4.4. Adversarial AI and adversarial Machine Learning 171 3.4.5. AI and information warfare 173 3.4.6. Example 1: the war in Syria 179 3.4.7. Example 2: events in Hong Kong in 2019 181 3.4.8. Example 3: malicious AI attacks 183 3.4.9. Example 4: swarming attacks 184 3.4.10. Example 5: crossing universes with AI and without AI 185 Conclusion 187 Appendices 195 Appendix 1. A Chronology of AI 197 Appendix 2. AI in Joint Publications (Department of Defense, United States) 207 Appendix 3. AI in the Guidelines and Instructions of the Department of Defense (United States) 209 Appendix 4. AI in U.S. Navy Instructions 211 Appendix 5. AI in U.S. Marine Corps Documents 213 Appendix 6. AI in U.S. Air Force Documents 215 References 217 Index 235
£125.06
ISTE Ltd and John Wiley & Sons Inc Optimization for Engineering Problems
Book SynopsisOptimization is central to any problem involving decision-making in engineering. Optimization theory and methods deal with selecting the best option regarding the given objective function or performance index. New algorithmic and theoretical techniques have been developed for this purpose, and have rapidly diffused into other disciplines. As a result, our knowledge of all aspects of the field has grown even more profound. In Optimization for Engineering Problems, eminent researchers in the field present the latest knowledge and techniques on the subject of optimization in engineering. Whereas the majority of work in this area focuses on other applications, this book applies advanced and algorithm-based optimization techniques specifically to problems in engineering. Table of ContentsPreface ix Chapter 1. Review of some Constrained Optimization Schemes 1Jonnalagadda SRINIVAS 1.1. Introduction 1 1.2. Constrained optimization problems 3 1.3. Direct solution techniques 4 1.3.1. Complex search method 4 1.3.2. Random search techniques 6 1.3.3. Method of feasible directions 7 1.4. Indirect solution techniques 8 1.4.1. Penalty function approach 8 1.4.2. Multipliers method 10 1.4.3. Simulated annealing search 10 1.5. Constrained multi-objective optimization 12 1.6. Conclusions 14 1.7. References 14 Chapter 2. Application of Flower Pollination Algorithm for Optimization of ECM Process Parameters 17Bappa ACHERJEE, Debanjan MAITY, Arunanshu S. KUAR and Manoj K. DUTTA 2.1. Introduction 17 2.2. Flower pollination algorithm 21 2.3. Optimization of the ECM process: results and discussions 23 2.3.1. Experimental data and empirical models 24 2.3.2. Single-objective optimization 25 2.3.3. Multi-objective optimization 31 2.4. Conclusion 34 2.5. References 35 Chapter 3. Machinability and Multi-response Optimization of EDM of Al7075/SIC/WS2 Hybrid Composite Using the PROMETHEE Method 39Mohan Kumar PRADHAN and Brajpal SINGH 3.1. Introduction 40 3.1.1. Overview of metal matrix composites 41 3.1.2. CNC EDM machine 42 3.2. Literature review 49 3.2.1. Metal removing rate 51 3.2.2. Tool wear process 53 3.2.3. Radial overcut 54 3.2.4. Surface topography or surface finish 54 3.3. Optimization process 55 3.3.1. Analytic hierarchy process method 55 3.3.2. PROMETHEE method 60 3.3.3. Ranking relations for improved PROMETHEE 63 3.4. Result and discussion 66 3.4.1. The effect of EDM parameters on machining characteristics of EDM machine 66 3.4.2. Optimization of EDM parameters 71 3.5. Conclusion 71 3.6. References 72 Chapter 4. Optimization of Cutting Parameters during Hard Turning using Evolutionary Algorithms 77Vahid POURMOSTAGHIMI and Mohammad ZADSHAKOYAN 4.1. Introduction 78 4.2. Genetic programming 83 4.3. Particle swarm optimization 86 4.4. Materials and methods 89 4.4.1. Experimental setup 89 4.4.2. Optimization procedure 90 4.5. Results 92 4.5.1. Experimental results 92 4.5.2. GP results 93 4.5.3. Optimization results 95 4.6. Conclusion 96 4.7. References 96 Chapter 5. Development of a Multi-objective Salp Swarm Algorithm for Benchmark Functions and Real-world Problems 101Sushant P. MHATUGADE, Ganesh M. KAKANDIKAR, Omkar K. KULKARNI and Vilas M. NANDEDKAR 5.1. Introduction 101 5.2. Salp swarm algorithm 105 5.2.1. Single-objective salp swarm algorithm (SSA) 107 5.2.2. Multi-objective salp swarm algorithm (MSSA) 109 5.3. Constraint handling techniques 113 5.4. Experimental results and discussion 114 5.4.1. Single-objective unconstrained test functions 115 5.4.2. Single-objective constrained test functions 117 5.4.3. Multi-objective unconstrained test functions 120 5.4.4. Multi-objective constrained test functions 122 5.4.5. Real-world application 125 5.5. Conclusion 127 5.6. References 128 Chapter 6. Water Quality Index: is it Possible to Measure with Fuzzy Logic? 131Alexandre CHOUPINA, Elisabeth T. PEREIRA, Samara Silva SOARES, Poliana ARRUDA, Francis Lee RIBEIRO and Paulo Sérgio SCALIZE 6.1. Introduction 131 6.2. Data and methodology 134 6.2.1. Data and description of the case study 134 6.2.2. Parameters 135 6.2.3. Water quality index 136 6.2.4. Construction of the water quality index by fuzzy logic (WQF) 144 6.3. Results and discussion 148 6.3.1. Water quality analysis 148 6.3.2. Index validation 150 6.4. Conclusions 154 6.5. Appendix 155 6.6. References 156 List of Authors 161 Index 163
£125.06
ISTE Ltd and John Wiley & Sons Inc Energy Transition in Metropolises, Rural Areas,
Book SynopsisEnergy Transition in Metropolises, Rural Areas and Deserts presents detailed field studies of energy transition in Lille, Riyadh, Fayence, Bokhol, Ouarzazate and the Arabian Desert. It analyzes local actions and good practices according to the resources and constraints involved in the process of removing the obstacles to the transition. Solutions are sought for the right type of space for buildings, transport, industry and services, and targets are set for Europe, the Middle East and Africa as part of the Paris Climate Agreement. As a pedagogical tool, this book is aimed at not only politicians and professionals, but also any members of the public who wish to learn about changes in production and energy consumption.Table of ContentsForeword vii Preface ix Acknowledgments xi List of Acronyms xiii Chapter 1. Three Types of Space for Analyzing Energy Transition 1 1.1. From energy-to-energy transition 1 1.2. Presentation of the six research areas. 8 1.3. The importance of climates in the energy transition 12 1.4. Energy sectors analyzed by field 14 Chapter 2. Energy Transition in Metropolises 17 2.1. Energy characteristics in metropolises 17 2.2. The example of Riyadh in Saudi Arabia 22 2.2.1. Presentation of Riyadh 22 2.2.2. Development, construction and housing of Riyadh 32 2.2.3. Transport from Riyadh 47 2.2.4. Riyadh’s challenges for energy transition 51 2.3. The example of the European Metropolis of Lille in France 63 2.3.1. Presentation of the European Metropolis of Lille 63 2.3.2. Development, construction and housing of the European Metropolis of Lille 71 2.3.3. Transport of the European Metropolis of Lille 77 2.3.4. Challenges of the European Metropolis of Lille for the energy transition 81 2.4. Lessons learned from the energy transition in metropolises 92 2.4.1. Priority to controlling energy consumption in metropolises 95 2.4.2. Microproduction of energy in metropolises 102 2.4.3. Peripheral power generation units and networks 104 Chapter 3. The Energy Transition in Rural Areas 109 3.1. The characteristics of energy in rural areas 109 3.2. The example of Pays de Fayence in France 112 3.2.1. Presentation of Pays de Fayence 112 3.2.2. Development of the Pays de Fayence 117 3.2.3. Transport in the Pays de Fayence 130 3.2.4. Challenges of the Pays de Fayence for the energy transition 132 3.3. The example of Bokhol in Senegal 137 3.3.1. Presentation of Bokhol 137 3.3.2. Development of the Bokhol site 149 3.3.3. Bokhol’s challenges for the energy transition 156 3.4. Lessons learned from the energy transition in rural areas 158 3.4.1. Dynamics of positive energy territories 160 3.4.2. Complex regulations and rurality 165 3.4.3. Landscapes and rurality 168 Chapter 4. The Energy Transition in the Desert 171 4.1. The characteristics of energy in the desert 171 4.2. The example of Ouarzazate in Morocco 172 4.2.1. Presentation of Ouarzazate 172 4.2.2. Spatial planning in Ouarzazate 183 4.2.3. Ouarzazate’s challenges for the energy transition 186 4.3. The example of Neom in Saudi Arabia 188 4.3.1. Neom’s presentation 188 4.3.2. Development of the Neom project 195 4.3.3. Neom’s challenges for the energy transition 199 4.4. Lessons learned from the energy transition in the desert 200 Conclusion 205 References 219 Index 223
£132.00
ISTE Ltd and John Wiley & Sons Inc Mobile Robotics
Book SynopsisMobile Robotics presents the different tools and methods that enable the design of mobile robots; a discipline booming with the emergence of flying drones, underwater mine-detector robots, robot sailboats and vacuum cleaners. Illustrated with simulations, exercises and examples, this book describes the fundamentals of modeling robots, developing the concepts of actuators, sensors, control and guidance. Three-dimensional simulation tools are also explored, as well as the theoretical basis for the reliable localization of robots within their environment. This revised and updated edition contains additional exercises and a completely new chapter on the Bayes filter, an observer that enhances our understanding of the Kalman filter and facilitates certain proofs.Table of ContentsIntroduction ix Chapter 1. Three-dimensional Modeling 1 1.1. Rotation matrices 1 1.1.1. Definition 2 1.1.2. Lie group 3 1.1.3. Lie algebra 4 1.1.4. Rotation vector 5 1.1.5. Adjoint 6 1.1.6. Rodrigues rotation formulas 7 1.1.7. Coordinate system change 8 1.2. Euler angles 11 1.2.1. Definition 11 1.2.2. Rotation vector of a moving Euler matrix 13 1.3. Inertial unit 14 1.4. Dynamic modeling 17 1.4.1. Principle 17 1.4.2. Modeling a quadrotor 18 1.5. Exercises 20 1.6. Corrections 37 Chapter 2. Feedback Linearization 65 2.1. Controlling an integrator chain 65 2.1.1. Proportional-derivative controller 66 2.1.2. Proportional-integral-derivative controller 67 2.2. Introductory example 68 2.3. Principle of the method 69 2.3.1. Principle 69 2.3.2. Relative degree 71 2.3.3. Differential delay matrix 72 2.3.4. Singularities 73 2.4. Cart 75 2.4.1. First model 75 2.4.2. Second model 76 2.5. Controlling a tricycle 78 2.5.1. Speed and heading control 78 2.5.2. Position control 80 2.5.3. Choosing another output 81 2.6. Sailboat 82 2.6.1. Polar curve 83 2.6.2. Differential delay 83 2.6.3. The method of feedback linearization 84 2.6.4. Polar curve control 87 2.7. Sliding mode 87 2.8. Kinematic model and dynamic model 90 2.8.1. Principle 90 2.8.2. Example of the inverted rod pendulum 91 2.8.3. Servo-motors 94 2.9. Exercises 95 2.10. Corrections 107 Chapter 3. Model-free Control 133 3.1. Model-free control of a robot cart 134 3.1.1. Proportional heading and speed controller 134 3.1.2. Proportional-derivative heading controller 136 3.2. Skate car 137 3.2.1. Model 138 3.2.2. Sinusoidal control 140 3.2.3. Maximum thrust control 140 3.2.4. Simplification of the fast dynamics 142 3.3. Sailboat 145 3.3.1. Problem 145 3.3.2. Controller 146 3.3.3. Navigation 152 3.3.4. Experiment 153 3.4. Exercises 155 3.5. Corrections 168 Chapter 4. Guidance 183 4.1. Guidance on a sphere 183 4.2. Path planning 187 4.2.1. Simple example 187 4.2.2. Bézier polynomials 188 4.3. Voronoi diagram 189 4.4. Artificial potential field method 191 4.5. Exercises 192 4.6. Corrections 201 Chapter 5. Instantaneous Localization 221 5.1. Sensors 221 5.2. Goniometric localization 225 5.2.1. Formulation of the problem 225 5.2.2. Inscribed angles 226 5.2.3. Static triangulation of a plane robot 228 5.2.4. Dynamic triangulation 229 5.3. Multilateration 230 5.4. Exercises 231 5.5. Corrections 236 Chapter 6. Identification 243 6.1. Quadratic functions 243 6.1.1. Definition 243 6.1.2. Derivative of a quadratic form 244 6.1.3. Eigenvalues of a quadratic function 245 6.1.4. Minimizing a quadratic function 245 6.2. The least squares method 246 6.2.1. Linear case 246 6.2.2. Nonlinear case 248 6.3. Exercises 250 6.4. Corrections 253 Chapter 7. Kalman Filter 263 7.1. Covariance matrices 263 7.1.1. Definitions and interpretations 263 7.1.2. Properties 266 7.1.3. Confidence ellipse 267 7.1.4. Generating Gaussian random vectors 268 7.2. Unbiased orthogonal estimator 269 7.3. Application to linear estimation 274 7.4. Kalman filter 275 7.5. Kalman–Bucy 279 7.6. Extended Kalman filter 282 7.7. Exercises 283 7.8. Corrections 298 Chapter 8. Bayes Filter 329 8.1. Introduction 329 8.2. Basic notions of probabilities 329 8.3. Bayes filter 332 8.4. Bayes smoother 334 8.5. Kalman smoother 335 8.5.1. Equations of the Kalman smoother 335 8.5.2. Implementation 336 8.6. Exercises 337 8.7. Corrections 345 References 359 Index 361
£125.06
ISTE Ltd and John Wiley & Sons Inc Concepts and Semantics of Programming Languages
Book SynopsisThis book the first of two volumes explores the syntactical constructs of the most common programming languages, and sheds a mathematical light on their semantics, while also providing an accurate presentation of the material aspects that interfere with coding. Concepts and Semantics of Programming Languages 1 is dedicated to functional and imperative features. Included is the formal study of the semantics of typing and execution; their acquisition is facilitated by implementation into OCaml and Python, as well as by worked examples. Data representation is considered in detail: endianness, pointers, memory management, union types and pattern-matching, etc., with examples in OCaml, C and C++. The second volume introduces a specific model for studying modular and object features and uses this model to present Ada and OCaml modules, and subsequently Java, C++, OCaml and Python classes and objects. This book is intended not only for computer science students and teachers but also seasoned programmers, who will find a guide to reading reference manuals and the foundations of program verification.Table of ContentsForeword xi Preface xiii Chapter 1. From Hardware to Software 1 1.1. Computers: a low-level view 1 1.1.1. Information processing 1 1.1.2. Memories 2 1.1.3. CPUs 3 1.1.4. Peripheral devices 7 1.2. Computers: a high-level view 8 1.2.1. Modeling computations 9 1.2.2. High-level languages 9 1.2.3. From source code to executable programs 10 Chapter 2. Introduction to Semantics of Programming Languages 15 2.1. Environment, memory and state 16 2.1.1. Evaluation environment 16 2.1.2. Memory 18 2.1.3. State 20 2.2. Evaluation of expressions 21 2.2.1. Syntax 21 2.2.2. Values 22 2.2.3. Evaluation semantics 24 2.3. Definition and assignment 26 2.3.1. Defining an identifier 26 2.3.2. Assignment 29 2.4. Exercises 31 Chapter 3. Semantics of Functional Features 35 3.1. Syntactic aspects 35 3.1.1. Syntax of a functional kernel 35 3.1.2. Abstract syntax tree 36 3.1.3. Reasoning by induction over expressions 39 3.1.4. Declaration of variables, bound and free variables 39 3.2. Execution semantics: evaluation functions 42 3.2.1. Evaluation errors 42 3.2.2. Values 43 3.2.3. Interpretation of operators 45 3.2.4. Closures 46 3.2.5. Evaluation of expressions 47 3.3. Execution semantics: operational semantics 54 3.3.1. Simple expressions 55 3.3.2. Call-by-value 56 3.3.3. Recursive and mutually recursive functions 60 3.3.4. Call-by-name 61 3.3.5. Call-by-value versus call-by-name 62 3.4. Evaluation functions versus evaluation relations 64 3.4.1. Status of the evaluation function 64 3.4.2. Induction over evaluation trees 65 3.5. Semantic properties 69 3.5.1. Equivalent expressions 69 3.5.2. Equivalent environments 71 3.6. Exercises 71 Chapter 4. Semantics of Imperative Features 77 4.1. Syntax of a kernel of an imperative language 77 4.2. Evaluation of expressions 81 4.3. Evaluation of definitions 86 4.4. Operational semantics 89 4.4.1. Big-step semantics 89 4.4.2. Small-step semantics 93 4.4.3. Expressiveness of operational semantics 95 4.5. Semantic properties 96 4.5.1. Equivalent programs 96 4.5.2. Program termination 98 4.5.3. Determinism of program execution 100 4.5.4. Big steps versus small steps 103 4.6. Procedures 109 4.6.1. Blocks 109 4.6.2. Procedures 112 4.7. Other approaches 118 4.7.1. Denotational semantics 118 4.7.2. Axiomatic semantics, Hoare logic 129 4.8. Exercises 134 Chapter 5. Types 137 5.1. Type checking: when and how? 139 5.1.1. When to verify types? 139 5.1.2. How to verify types? 140 5.2. Informal typing of a program Exp2 141 5.2.1. A first example 141 5.2.2. Typing a conditional expression 142 5.2.3. Typing without type constraints 142 5.2.4. Polymorphism 143 5.3. Typing rules in Exp2 143 5.3.1. Types, type schemes and typing environments 143 5.3.2. Generalization, substitution and instantiation 146 5.3.3. Typing rules and typing trees 151 5.4. Type inference algorithm in Exp2 154 5.4.1. Principal type 154 5.4.2. Sets of constraints and unification 155 5.4.3. Type inference algorithm 159 5.5. Properties 167 5.5.1. Properties of typechecking 167 5.5.2. Properties of the inference algorithm 167 5.6. Typechecking of imperative constructs 168 5.6.1. Type algebra 168 5.6.2. Typing rules 169 5.6.3. Typing polymorphic definitions 171 5.7. Subtyping and overloading 172 5.7.1. Subtyping 173 5.7.2. Overloading 175 Chapter 6. Data Types 179 6.1. Basic types 179 6.1.1. Booleans 179 6.1.2. Integers 181 6.1.3. Characters 186 6.1.4. Floating point numbers 187 6.2. Arrays 191 6.3. Strings 194 6.4. Type definitions 194 6.4.1. Type abbreviations 195 6.4.2. Records 196 6.4.3. Enumerated types 200 6.4.4. Sum types 202 6.5. Generalized conditional 205 6.5.1. C style switch/case 205 6.5.2. Pattern matching 208 6.6. Equality 216 6.6.1. Physical equality 217 6.6.2. Structural equality 218 6.6.3. Equality between functions 220 Chapter 7. Pointers and Memory Management 223 7.1. Addresses and pointers 223 7.2. Endianness 225 7.3. Pointers and arrays 225 7.4. Passing parameters by address 226 7.5. References 229 7.5.1. References in C++ 229 7.5.2. References in Java 233 7.6. Memory management 234 7.6.1. Memory allocation 234 7.6.2. Freeing memory 237 7.6.3. Automatic memory management 239 Chapter 8. Exceptions 243 8.1. Errors: notification and propagation 243 8.1.1. Global variable 245 8.1.2. Record definition 245 8.1.3. Passing by address 245 8.1.4. Introducing exceptions 246 8.2. A simple formalization: ML-style exceptions 247 8.2.1. Abstract syntax 247 8.2.2. Values 248 8.2.3. Type algebra 248 8.2.4. Operational semantics 248 8.2.5. Typing 250 8.3. Exceptions in other languages 250 8.3.1. Exceptions in OCaml 251 8.3.2. Exceptions in Python 251 8.3.3. Exceptions in Java 253 8.3.4. Exceptions in C++ 254 Conclusion 257 Appendix: Solutions to the Exercises 259 List of Notations 287 Index of Programs 289 References 293 Index 295
£124.15
ISTE Ltd and John Wiley & Sons Inc Noise in Radio-Frequency Electronics and its
Book SynopsisThe ability of wireless communication devices to transmit reliable information is fundamentally limited by sources of noise related to the electronic components in use. Noise in Radio-Frequency Electronics and its Measurement has five chapters that address the theoretical aspects of this subject, and concludes with a series of exercises and solutions. The book examines the origin and sources of noise inside electronic radio-frequency circuits, their impact in telecommunications, their modeling and their measurement. Particular attention is dedicated to the origins, establishment and significance of formulas that are used when the noise characteristics of an electronic circuit are modeled or measured. This book instructs the reader in the application of the examined methods and their adaptation to solving problems, as well as how to comfortably use the presented formulas.Table of ContentsPreface ix List of Symbols xi Introduction xv Chapter 1. Background Noise in Electronics 1 1.1. Introduction 1 1.2. Spontaneous fluctuations in electronic components 2 1.2.1. Introduction 2 1.2.2. Thermal noise 2 1.2.3. Shot noise 7 1.2.4. Generation / recombination noise 7 1.2.5. Excess noise 8 1.3. Noise factor 9 1.3.1. Definition 9 1.3.2. Reference temperature for the noise factor 11 1.3.3. Importance of the noise factor in telecommunications 12 1.4. Noise in two-ports 13 1.4.1. Representation of noise in two-ports 13 1.4.2. Expression of the noise factor of a two-port 15 1.4.3. Minimum noise factor of a two-port 16 1.4.4. Inverse relations 19 1.5. Characterization of noise in a two-port 20 1.6. Conclusion 22 Chapter 2. Friis Formula 23 2.1. Introduction 23 2.2. Calculation method 24 2.3. Calculation of the admittance parameters of the Q1, Q2 association in cascade 26 2.4. Contribution of noise generators e1, i1, e2 and i2 to I1 and I4 27 2.4.1. Introduction 27 2.4.2. Contribution of the noise generator e1 27 2.4.3. Contribution of the noise generator i1 28 2.4.4. Contribution of the noise generator e2 28 2.4.5. Contribution of the noise generator i2 29 2.5. eTot and iTot identification 30 2.6. Calculation of F12(YS) 30 2.7. Friis Formula 31 2.7.1. Introduction 31 2.7.2. Transducer power gain 32 2.7.3. Available power gain 34 2.8. Conclusion 35 Chapter 3. Adapted Attenuator and Noise Factor 37 3.1. Introduction 37 3.2. Calculation of Y and S parameters 38 3.3. General representation of noise in two-ports 39 3.4. Equivalent noise generators at the input of the adapted attenuator 40 3.5. Noise factor on 50 Ω of the adapted attenuator 41 3.6. Using Bosma’s theorem 43 3.7. Consequences on the structure of a receiver 46 3.8. Equivalent noise resistance and noise conductance at the input 47 3.9. Conclusion 48 Chapter 4. Noise Factor Measurement on 50 Ω 51 4.1. Introduction 51 4.2. Noise factor measurement by Y factor 52 4.3. Second stage correction 54 4.4. Measurement procedure and calculation of the noise factor of the DUT 55 4.5. Available power gain and insertion power gain of the DUT 57 4.6. Sample results 60 4.7. Conclusion 62 Chapter 5. Characterization in Noise 65 5.1. Introduction 65 5.2. The tuner 67 5.2.1. Tuner constitution 67 5.2.2. Noise behavior of the noise diode + tuner assembly 68 5.2.3. Tuner calibration procedure 71 5.3. Characterization in noise of the noise measurement chain 73 5.4. Characterization in S parameters of the device under test 74 5.5. Noise characterization of the device under test 74 5.6. Validation of a noise characterization bench 75 5.6.1. Introduction 75 5.6.2. 2.5 dB adapted attenuator 76 5.6.3. Coaxial cable 78 5.7. Conclusion 79 Chapter 6. Exercises and Answers 81 6.1. Exercises 81 6.2. Solutions 91 Conclusion 117 Appendix 1 119 Appendix 2 125 Appendix 3 135 Appendix 4 149 Bibliography 163 Index 165
£125.06
ISTE Ltd and John Wiley & Sons Inc Microprocessor 1: Prolegomena - Calculation and
Book SynopsisSince its commercialization in 1971, the microprocessor, a modern and integrated form of the central processing unit, has continuously broken records in terms of its integrated functions, computing power, low costs and energy saving status. Today, it is present in almost all electronic devices. Sound knowledge of its internal mechanisms and programming is essential for electronics and computer engineers to understand and master computer operations and advanced programming concepts. This book in five volumes focuses more particularly on the first two generations of microprocessors, those that handle 4- and 8- bit integers. Microprocessor 1 the first of five volumes presents the computation function, recalls the memory function and clarifies the concepts of computational models and architecture. A comprehensive approach is used, with examples drawn from current and past technologies that illustrate theoretical concepts, making them accessible.Table of ContentsQuotation vii Preface ix Introduction xiii Chapter 1. The Function of Computation 1 1.1. Beginnings 2 1.2. Classes of computers 10 1.3. Analog approach 36 1.4. Hardware–software relationship 37 1.5. Integration and its limits 43 1.6. Conclusion 47 Chapter 2. The Function of Memory 49 2.1. Definition 50 2.2. Related concepts 56 2.2.1. A story of endianness 56 2.2.2. Alignment 56 2.3. Modeling 57 2.4. Classification 59 2.5. Conclusion 61 Chapter 3. Computation Model and Architecture: Illustration with the von Neumann Approach 63 3.1. Basic concepts 64 3.1.1. The idea of a program 64 3.1.2. Control and data flows and mechanisms 65 3.1.3. Models of computation 67 3.1.4. Architectures 72 3.1.5. The semantic gap 80 3.2. The original von Neumann machine 81 3.2.1. von Neumann’s computation model 81 3.2.2. von Neumann’s (machine) architecture 82 3.2.3. Control 89 3.3. Modern von Neumann machines 90 3.3.1. Abstraction level 91 3.3.2. Base execution outline 97 3.3.3. Possible transfers 100 3.3.4. Summary: advantages and disadvantages of this model 102 3.4. Variations on a theme 104 3.4.1. Classification by bus 104 3.4.2. Harvard architectures 111 3.4.3. Parallelism 113 3.5. Instruction set architecture 117 3.5.1. Storage components 118 3.5.2. Data format and type 126 3.5.3. Instruction set 126 3.5.4. Memory model 127 3.5.5. Execution modes 128 3.5.6. Miscellaneous 128 3.6. Basic definitions for this book 128 3.7. Conclusion 129 Conclusion of Volume 1 131 Exercises 133 Acronyms 135 References 153 Index 173
£125.06
ISTE Ltd and John Wiley & Sons Inc Energy and Motorization in the Automotive and
Book SynopsisThe book is intended for students in engineering school or university, young engineers or newcomers in the automotive industry or aeronautics. The objective is to describe in a simple and clear way the problem of energy and motorization for the automobile, helicopters or airplanes. The front-end treatment of these industrial sectors makes it possible to analyze in an original way the similarities and differences of these different means of transport. For this, and based on current technologies and tomorrow, it specifically describes the problem of the energy requirement of cars and aircraft. The result is a search for an ideal motorization associated with the behavior of these different means of transport followed by the analysis of the performances of the various types of engines by covering gas turbines, internal combustion engines and electric motors. Transmission elements such as aerospace gearboxes or gearboxes are described as well as a chapter on energy storage means and their performance including batteries, supercapacitors, inertial or pneumatic storage, hydrogen or fuels from fossil fuels. A final chapter shows the interest and prospects of energy hybridization and electrification for the progressive replacement of fossil fuels. Beyond the technological descriptions, the book focuses on proposing basic sizing rules in order to justify certain performances and to give the reader the means to appropriate the basic know-how of these industrial sectors.Table of ContentsForeword ix Preface xi Introduction xv Chapter 1. Motorization and Reflection on Ideal Engines 1 1.1. Motorization for an aircraft 1 1.1.1. Helicopters 1 1.1.2. Aircraft 19 1.1.3. Compound formulas 22 1.2. Motorization for an automobile 25 1.2.1. Determining tractive force and useful power 25 1.2.2. Definition of ideal transportation powertrain 30 1.3. Conclusion 33 Chapter 2. Engine Technologies 35 2.1. Introduction 35 2.2. Gas turbines 36 2.2.1. General operating principles 36 2.2.2. Improvement of gas turbines 79 2.3. Electric motors 87 2.3.1. Introduction to electric motors 87 2.3.2. Use of electric motors and mission profile 93 2.3.3. Electric motor technologies for propulsion 101 2.3.4. Examples of specific propulsion systems and applications 105 2.4. Internal combustion engine pistons 111 2.4.1. Theoretical thermodynamic cycles 111 2.4.2. Real cycles 128 2.5. Conclusion 142 Chapter 3. Power Transmission Elements 145 3.1. Transmission system for rotating wings 145 3.1.1. Conventional helicopters 145 3.1.2. The case of multi-rotor structures 151 3.2. Transmission system for aircraft 152 3.2.1. Propeller aircraft cases 152 3.2.2. Turbojet aircraft 153 3.3. Transmission system for the automotive industry 154 3.3.1. Gasoline or diesel internal combustion engines 154 3.3.2. The case of electric motors 167 3.4. Conclusion 168 Chapter 4. Energy Storage 171 4.1. Classification of energy sources 171 4.1.1. Primary energy sources 171 4.1.2. Energy carrier concept 173 4.1.3. Use of different energy sources in automotive and aeronautical transport 174 4.2. Energy storage for transport 178 4.2.1. Different forms of energy storage 178 4.2.2. Different energy storage technologies 179 4.3. Forms of hydrogen storage 186 4.3.1. Storage in gaseous form 187 4.3.2. Storage in liquid form 188 4.3.3. Storage in solid form 189 4.3.4. Comparison of diesel fuel tanks and automotive batteries 213 4.4. Conclusion 217 Chapter 5. Hybridization 219 5.1. Hybridization of electric motors: range extender 221 5.1.1. Application examples for the automotive industry 222 5.1.2. Application examples for aeronautics 229 5.2. Hybridization of combustion engines: improving energy efficiency 232 5.2.1. Interest in parallel hybridization 232 5.2.2. Classification of electrical hybridization: the case of the automobile 234 5.2.3. Implementation of hybridization in the case of the automobile 255 5.3. Conclusion 263 References 265 Index 269
£125.06
ISTE Ltd and John Wiley & Sons Inc System Requirements Engineering: A SysML
Book SynopsisThe book deals with requirements engineering in the context of System Engineering. He proposes a method to guide this activity engineering. The method is supported by the SysML modeling language. A first chapter aims to present the context and the associated definitions, to position the requirements engineering in the processes system engineering, to define the modeling and its contributions, and to make the link with the management of IS projects. The second chapter is devoted to the proposed method for implementing the requirements engineering subprocesses. Each of the 8 activities the component is first described before specifying how the SysML language can be exploited to achieve it effectively. Proposal for a book Please fill out the questionnaire below and send it back to Chantal Menascé: c.menasce@iste.co.uk The 3rd chapter is an application of the method to define the needs of the stakeholders of a system. The example is built on the basis of the RobAFIS'2018 competition. The 4th chapter continues the application of the method in the continuity of the IS processes to define the requirements of the same system. The appendices present at the same time a toolbox to realize the engineering of the requirements but also the complete results of engineering in Chapters 3 and 4.Table of ContentsForeword ix Preface xiii Part 1. Requirements Engineering 1 Chapter 1. The Requirements Engineering Process 3 1.1. Background and main definitions 3 1.2. Requirements engineering process 10 1.2.1. Requirements engineering and ISO 15288 processes 11 1.2.2. Requirements engineering and ISO 29110 processes 14 1.2.3. Problem versus solution 18 1.3. Requirements engineering process and modeling 19 1.4. Engineering processes and project management 26 Chapter 2. A Method for Requirements Engineering 31 2.1. Proposal of a requirements engineering method 31 2.1.1. Requirement diagram 36 2.1.2. Block definition diagram 38 2.1.3. Use case diagram 38 2.1.4. State machine diagram 39 2.1.5. Sequence diagram 39 2.1.6. Activity diagram 40 2.2. Define the system framework 40 2.2.1. Goal 40 2.2.2. Define the system framework using SysML 41 2.2.3. Systematization and verification 43 2.3. Define the system life cycle 43 2.3.1. Goal 43 2.3.2. Define the system life cycle using SysML 44 2.3.3. Systematization and verification 45 2.4. Define contexts45 2.4.1. Goal 45 2.4.2. Define contexts using SysML 45 2.4.3. Systematization and verification 47 2.5. Define uses 47 2.5.1. Goal 47 2.5.2. Define uses using SysML 49 2.5.3. Systematization and verification 52 2.6. Describe the use scenarios 53 2.6.1. Goal 53 2.6.2. Describe the use scenarios using SysML 53 2.6.3. Systematization and verification 62 2.7. Define functional requirements 62 2.7.1. Goal 62 2.7.2. Define functional requirements using SysML 65 2.7.3. Systematization and verification 67 2.8. Define non-functional requirements 67 2.8.1. Goal 67 2.8.2. Define non-functional requirements using SysML 68 2.8.3. Systematization and verification 70 2.9. Ensure traceability 72 2.9.1. Goal 72 2.9.2. Ensure traceability using SysML 72 2.9.3. Systematization and verification 75 2.10. Conclusion 75 Part 2. Case Study, Application of the Method 77 Chapter 3. Definition of Stakeholders’ Needs 79 3.1. Case study 79 3.1.1. Context of the case study 80 3.1.2. Structure of the SysML project 81 3.1.3. Presentation of the results 84 3.2. Definition of needs 85 3.2.1. Define the system framework 85 3.2.2. Define the system life cycle 86 3.2.3. Define contexts 87 3.2.4. Define uses 89 3.2.5. Describe the use scenarios 92 3.2.6. Define functional requirements 92 3.2.7. Define non-functional requirements 95 3.2.8. Ensure traceability 95 3.3. Stakeholder needs definition documents 98 3.3.1. Use a document template 98 3.3.2. Use a list of needs 119 Chapter 4. System Requirements Engineering 125 4.1. Case study 125 4.1.1. Structure of the SysML project 125 4.1.2. Presentation of the results 126 4.2. Definition of system requirements 126 4.2.1. Define the system framework 126 4.2.2. Define the system life cycle 127 4.2.3. Define contexts 127 4.2.4. Define uses 128 4.2.5. Describe the use scenarios 132 4.2.6. Define functional requirements 135 4.2.7. Define non-functional requirements 136 4.2.8. Ensure traceability 136 4.3. System requirements analysis document 139 4.4. Requirements management 161 4.4.1. Fundamental elements 162 4.4.2. Management workflows 168 4.4.3. Use in student projects 173 Chapter 5. Integration with Other Methods 175 5.1. Context 175 5.2. Integration with the Harmony SE method 175 5.2.1. Modification of the project structure 176 5.2.2. The Harmony SE method and requirements engineering 176 5.2.3. Definition of stakeholders’ needs 178 5.2.4. Analysis of system requirements 179 5.2.5. Conclusion 180 5.3. Integration with the Arcadia method 180 5.3.1. The Arcadia method and requirements engineering 181 5.3.2. Definition of stakeholders’ needs 182 5.3.3. Analysis of system requirements 183 5.3.4. Conclusion 185 5.4. Integration with the CESAM method 186 5.4.1. The CESAM method and requirements engineering 186 5.4.2. Definition of stakeholders’ needs 187 5.4.3. Analysis of system requirements 189 5.4.4. Conclusion 189 References 191 Index 195
£125.06
ISTE Ltd and John Wiley & Sons Inc Electricity Production from Renewable Energies
Book SynopsisSince the early 2000s, energy and environmental issues have led to a marked increase in electricity production from renewable energy sources. Sustainable development and concern for future generations constantly challenge us to develop new technologies for energy production, as well as new energy usage patterns. Their rapid emergence can make these new technologies difficult to understand and can thus affect perceptions.Directed towards a broad audience, this book contributes to a better understanding of new electricity generation technologies. It presents the issues, sources and means of conversion using a general approach, while developing scientific concepts to understand their main technical characteristics.This revised and extended second edition presents current data characterizing the development of these renewable energy sources, covering emerging photovoltaic and tidal technologies, offshore wind power, and recent developments on the integration of these sources into the electricity grid. The emergence of self-production and self-consumption is also addressed. In addition, several exercises provide the reader with an opportunity to evaluate their understanding.Table of ContentsForeword xiBernard MULTON Introduction xiiiBenoît ROBYNS Chapter 1. Electricity Production from Renewable Energy 1Benoît ROBYNS 1.1. Decentralized or centralized production? 1 1.1.1. Decentralized production 1 1.1.2. Centralized production 2 1.2. The issue of renewable energies 3 1.2.1. Observations 3 1.2.2. The sustainable development context 6 1.2.3. Commitments and perspectives 7 1.3. Renewable energy sources 10 1.3.1. Wind energy 10 1.3.2. Solar energy 11 1.3.3. Hydraulics 12 1.3.4. Geothermal energy 13 1.3.5. Biomass 13 1.3.6. Contribution of the various renewable energies 14 1.4. Production of electricity from renewable energies 15 1.4.1. Electricity supply chains 15 1.4.2. Efficiency factor 18 1.5. Self-production and self-consumption of energy 19 1.6. References 20 Chapter 2. Solar Photovoltaic Power 21Arnaud DAVIGNY 2.1. Introduction 21 2.2. Characteristics of the primary resource 23 2.3. Photovoltaic conversion 29 2.3.1. Introduction 29 2.3.2. Photovoltaic effect 29 2.3.3. Photovoltaic cells 32 2.3.4. Cell association 56 2.4. Maximum electric power extraction 62 2.5. Power converters 66 2.5.1. Introduction 66 2.5.2. Structure of the photovoltaic conversion chains 67 2.5.3. Choppers 69 2.5.4. Inverters 73 2.6. Adjustment of the active and reactive power 78 2.7. Solar power stations 79 2.7.1. Introduction 79 2.7.2. Autonomous power stations 79 2.7.3. Power stations connected to the network 81 2.8. Exercises 84 2.8.1. Characteristics of a photovoltaic panel 84 2.8.2. Sizing an autonomous photovoltaic installation 86 2.9. References 89 Chapter 3. Wind Power 93Bruno FRANÇOIS and Benoît ROBYNS 3.1. Characteristic of the primary resource 93 3.1.1. Variability 93 3.1.2. The Weibull distribution 94 3.1.3. The effect of relief 97 3.1.4. Loading rate 98 3.1.5. Compass card 99 3.2. Kinetic wind energy 100 3.3. Wind turbines 102 3.3.1. Horizontal axis wind turbines 102 3.3.2. Vertical axis wind turbines 109 3.3.3. Comparison of the various turbine types 113 3.4. Power limitation by varying the power coefficient 114 3.4.1. The “pitch” or variable pitch angle system 114 3.4.2. The “stall” or aerodynamic stall system 116 3.5. Mechanical couplings between the turbine and the electric generator 117 3.5.1. Connection between mechanical speed, synchronous speed and electrical network frequency 117 3.5.2. “Direct drive” wind turbines (without a multiplier) 119 3.5.3. Use of a speed multiplier 119 3.6. Generalities on induction and mechanical electric conversion 120 3.7. “Fixed speed” wind turbines based on induction machines 122 3.7.1. Physical principle 122 3.7.2. Constitution of induction machines 123 3.7.3. Modeling 124 3.7.4. Conversion system 128 3.7.5. Operational characteristics 130 3.8. Variable speed wind turbine 131 3.8.1. Issues 131 3.8.2. Classification of the structures according to machine technologies 132 3.8.3. Principle of element sizing 135 3.8.4. Adjustment of active and reactive powers 136 3.8.5. Aerogenerators based on a doubly-fed induction machine 141 3.8.6. Aerogenerators based on a synchronous machine 147 3.9. Offshore wind turbines 154 3.9.1. Advantages of offshore wind 154 3.9.2. Types of offshore wind turbines 156 3.10. Wind farms 158 3.10.1. Architecture 158 3.10.2. Abundance 160 3.11. Exercises 161 3.11.1. Fixed speed wind turbines 161 3.11.2. Characterization of a turbine and estimate of the generated power 163 3.11.3. High power variable speed wind turbines 168 3.12. References 170 Chapter 4. Terrestrial and Marine Hydroelectricity 173Benoît ROBYNS and Antoine HENNETON 4.1. Run-of-the-river hydraulics 173 4.1.1. Hydroelectricity 173 4.1.2. Small hydraulics 176 4.1.3. Hydraulic turbines 178 4.1.4. Electromechanical conversion for small hydroelectricity 185 4.1.5. Exercise: small hydroelectric run-of-the-river power station 187 4.2. Hydraulic power of the sea 202 4.2.1. Wave power 202 4.2.2. Energy of the continuous ocean currents 207 4.2.3. Tidal energy 209 4.2.4. Wave production, wave-power generator 215 4.2.5. Production by sea currents 238 4.2.6. Tidal production 251 4.2.7. Exercise: estimation of the production of a simple effect tidal power 265 4.3. References 266 Chapter 5. Thermal Power Generation 273Jonathan SPROOTEN 5.1. Introduction 273 5.2. Geothermal power 273 5.2.1. Introduction 273 5.2.2. The resource 274 5.2.3. Fluid characteristics 275 5.2.4. The principle of geothermal power plants 277 5.2.5. Thermodynamic conversion 279 5.2.6. Steam turbine 284 5.2.7. The alternator 286 5.3. Thermodynamic solar power generation 292 5.3.1. Introduction 292 5.3.2. The principle of concentration 292 5.3.3. Cylindro-parabolic design 297 5.3.4. The solar tower 300 5.3.5. Parabolic dish design 301 5.3.6. Comparison of solar thermodynamic generations 303 5.4. Cogeneration by biomass 304 5.4.1. Origin of biomass – energy interests 304 5.4.2. Cogeneration principle 305 5.5. References 307 Chapter 6. Integration of Decentralized Production into the Electrical Network 309Benoît ROBYNS and Jonathan SPROOTEN 6.1. From a centralized network to a decentralized network 309 6.1.1. The transmission network 309 6.1.2. The distribution network 311 6.1.3. Services for the electric system 312 6.1.4. Actors of a liberalized system 317 6.1.5. Roles of decentralized production in network management 318 6.2. Connection constraints and usage checks 318 6.2.1. Voltage management 318 6.2.2. Frequency control 322 6.2.3. Quality of the electric wave 325 6.2.4. Protection and short-circuiting of the electrical system 327 6.2.5. Decoupling protection 327 6.2.6. Other limitations 327 6.3. The challenges of integrating decentralized power generation 328 6.3.1. Defense and infrastructure reconstruction plan for the electricity system 328 6.3.2. Production forecasting for extreme weather conditions 329 6.3.3. Network hosting capacity and protection 330 6.4. Perspectives for better integration into networks 332 6.4.1. Actions at the source level 332 6.4.2. Actions at the network level 334 6.4.3. Actions at the consumer level 341 6.5. References 343 List of Authors 347 Index 349
£124.15
ISTE Ltd and John Wiley & Sons Inc Scattering and Diffraction by Wedges 2: The
Book SynopsisThe book has a dual purpose. The first is to expose a general methodology to solve problems of electromagnetism in geometries constituted of angular regions. The second is to bring the solutions of some canonical problems of fundamental importance in modern electromagnetic engineering with the use of the Wiener-Hopf technique. In particular, the general mathematical methodology is very ingenious and original. It is based on sophisticated and attractive procedures exploiting simple and advanced properties of analytical functions. Once the reader has acquired the methodology, she/he can easily obtain the solution of the canonical problems reported in the book. The book can be appealing also to readers who are not directly interested in the detailed mathematical methodology and/ or in electromagnetics. In fact the same methodology can be extended to acoustics and elasticity problems. Moreover, the proposed practical problems with their solutions constitute a list of reference solutions and can be of interests in engineering production in the field of radio propagations, electromagnetic compatibility and radar technologies.Table of ContentsPreface ix Introduction xiii Chapter 4. Exact Solutions for Electromagnetic Impedance Wedges 1 4.1. Introduction 1 4.2. A list of the impedance wedge problems amenable to exact WH solutions 9 4.3. Cases involving classical WH equations 10 4.3.1. WH formulation of the diffraction by an impedance half-plane 11 4.3.2. Exact solutions of the diffraction by an impedance half-plane 18 4.3.3. Exact solution for the full-plane junction at skew incidence 37 4.3.4. Exact solution of the penetrable half-plane problem (the jump) 39 4.3.5. Exact solution of the right-angled wedge scattering problem 40 4.4. Exact solutions for impedance wedge problems with the GWHE form of section 3.5 – form #1 51 4.4.1. The WH solution of the Malyuzhinets problem 52 4.4.2. Diffraction at skew incidence ( αo ≠ 0 ) by a wedge with a PEC and a PMC face 58 4.4.3. Diffraction at skew incidence ( αo ≠ 0 ) by a wedge with a PEC face and the other face with diagonal Zb with one null element 60 4.5. Exact solutions for the impedance wedge problems with the GWHEs written in an alternative form – form #2 62 4.5.1. Exact factorization with diagonal polynomial matrices P a,b (m) 64 4.5.2. Anisotropic symmetric impedance wedges at normal incidence 67 4.5.3. Non-symmetric wedges at normal incidence with commuting Pa and Pb 68 4.5.4. Non-symmetric wedges at skew incidence 70 4.5.5. Two particular wedge problems amenable to exact solutions 72 4.6. A general form of the GWHEs to study the arbitrary face impedance wedges – form #3 76 Appendix 4.A. Some important formulas of decomposition for wedge problems 79 Chapter 5. Fredholm Factorization Solutions of GWHEs for the Electromagnetic Impedance Wedges Surrounded by an Isotropic Medium 87 5.1. Introduction 87 5.2. Generalized Wiener-Hopf equations for the impenetrable wedge scattering problem of an electromagnetic plane wave at skew incidence 88 5.3. Fredholm factorization solution in the η plane of GWHEs 92 5.4. Fredholm factorization solution in the w plane of GWHEs 95 5.5. Approximate solution of FIEs derived from GWHEs 97 5.6. Analytic continuation of approximate solutions of GWHEs 101 5.7. Far-field computation 103 5.8. Criteria for the examples 110 5.9. Example 1: Symmetric isotropic impedance wedge at normal incidence with Ez polarization 111 5.10. Example 2: Non-symmetric isotropic impedance wedge at normal incidence with Hz polarization and surface wave contribution 119 5.11. Example 3: PEC wedge at skew incidence 121 5.12. Example 4: Arbitrary impedance half-plane at skew incidence 124 5.13. Example 5: Arbitrary impedance wedge at skew incidence 126 5.14. Example 6: Arbitrary impedance concave wedge at skew incidence 128 5.15. Discussion 132 Appendix 5.A. Fredholm properties of the integral equation (5.3.1) 132 Chapter 6. Diffraction by Penetrable Wedges 135 6.1. Introduction 135 6.2. GWHEs for the dielectric wedge at normal incidence (Ez-polarization) 140 6.3. Reduction of the GWHEs for the dielectric wedge at Ez-polarization to Fredholm integral equations 142 6.4. Analytic continuation for the solution of the dielectric wedge at Ez-polarization 154 6.5. Some remarks on the Fredholm integral equations (6.3.24), (6.3.26) and numerical solutions 159 6.6. Field evaluation in any point of the space 162 6.7. The dielectric wedge at skew incidence 165 6.8. Criteria for examples of the scattering by a dielectric wedge at normal incidence (Ez-polarization) 176 6.9. Example: the scattering by a dielectric wedge at normal incidence (Ez-polarization) 177 6.10. Discussion 186 Appendix 6.A. Fredholm factorization applied to (6.3.2)–(6.3.5) 186 Appendix 6.B. Source term ηi (η) 188 References 199 Index 205 Summary of Volume 1 209
£125.06
ISTE Ltd and John Wiley & Sons Inc Archives in the Digital Age: Preservation and the
Book SynopsisArchiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order to exploit it over time, while maintaining its integrity and authenticity. Digital technologies bring about major transformations, not only in terms of the types of documents that are transferred to and stored in archives, in the behaviors and practices of the humanities and social sciences (digital humanities), but also in terms of the volume of data and the technological capacity for managing and preserving archives (Big Data). Archives in The Digital Age focuses on the impact of these various digital transformations on archives, and examines how the right to memory and the information of future generations is confronted with the right to be forgotten; a digital prerogative that guarantees individuals their private lives and freedoms.Table of ContentsPreface ix Introduction xi Chapter 1. Digital Archives: Elements of Definition 1 1.1. Key concepts of digital archives 1 1.1.1. Archives 1 1.1.2. Archive management 2 1.1.3. Archival management tools 4 1.1.4. Digital archives 7 1.2. Electronic Records Management 7 1.2.1. ERM: elements of definition 7 1.2.2. ERM: implementation steps 10 1.3. Records management 18 1.3.1. Structure of standard 15489 19 1.3.2. Content of the standard 20 1.3.3. Design and implementation of an RM project according to the standard 22 1.3.4. MoReq: the added value of RM 25 1.4. EDRMS: merging ERM and RM 26 1.5. ECM: the overall data management strategy 27 1.6. Conclusion 30 Chapter 2. Digital Archiving: Methods and Strategies 31 2.1. Introduction 31 2.2. Digital archiving: elements of definition 31 2.3. Digital archiving: the essential standards 34 2.3.1. NF Z 42-013/ISO 14641 standard 36 2.3.2. NF 461: electronic archiving system 38 2.3.3. OAIS (ISO 14721): Open Archival Information System 39 2.3.4. ISO 19905 (PDF/A) 42 2.3.5. ISO 30300, ISO 30301 and ISO 30302 series of standards 44 2.3.6. ISO 23081 44 2.4. Methodology for setting up a digital archiving process 46 2.4.1. Qualifying and classifying information 46 2.4.2. Classification scheme 47 2.4.3. Retention schedule or retention standard 51 2.4.4. Metadata 52 2.4.5. Archiving processes and procedures 55 2.5. Archiving of audiovisual documents 58 2.5.1. Definition of audiovisual archives 58 2.5.2. Treatment of audiovisual archives 60 2.5.3. Migration of audiovisual documents 62 2.5.4. Digital archiving of audiovisual documents 63 2.6. Email archiving 65 2.6.1. Email archiving and legislation 66 2.6.2. Why archive emails? 67 2.7. Conclusion 69 Chapter 3. Archives in the Age of Digital Humanities 71 3.1. Introduction 71 3.2. History of the digital humanities 72 3.2.1. “Literary and Linguistic Computing”: 1940–1980 72 3.2.2. “Humanities computing”: 1980–1994 74 3.2.3. “Digital humanities”: since 1994 77 3.3. Definitions of the digital humanities 78 3.4. Archives in the age of the digital humanities 80 3.4.1. Digital archive platforms 81 3.4.2. Software managing digital archives 84 3.4.3. Digital humanities at the heart of long-term preservation 89 3.4.4. Digital humanities and the liberation of the humanities: access and accessibility 107 3.5. Conclusion 112 Chapter 4. Digital Archiving and Big Data 113 4.1. Introduction 113 4.2. Definition of Big Data 115 4.3. Big Data issues 119 4.4. Big Data: challenges and areas of application 120 4.5. Data archiving in the age of Big Data 122 4.5.1. Management and archiving of Big Data 122 4.5.2. Big Data technologies and tools 125 4.5.3. Blockchain, the future of digital archiving of Big Data 137 4.6. Conclusion 147 Chapter 5. Preservation of Archives versus the Right to be Forgotten 149 5.1. Introduction 149 5.2. Forgetting 150 5.3. The right to be forgotten 150 5.3.1. Limits to the right to be forgotten 150 5.3.2. European Directive on the protection of personal data 151 5.3.3. General Data Protection Regulation 153 5.3.4. The right to dereferencing: common criteria 156 5.4. Effectiveness of the right to be forgotten 156 5.4.1. Technical challenge of the effectiveness of the right to be forgotten 157 5.4.2. Legal challenge of the effectiveness of the right to be forgotten 160 5.5. The right to digital oblivion: a controversial subject 163 5.6. Public archives versus the right to be forgotten 165 5.6.1. Archives: exemptions from the right to be forgotten 167 5.6.2. Online publication of archives and finding aids containing personal data 168 5.6.3. Private digital archives and the right to be forgotten 171 5.6.4. Web archiving and the right to be forgotten 172 5.7. Google and the right to be forgotten 173 5.8. Conclusion 178 Conclusion 181 List of Acronyms 185 References 193 Index 207
£124.15
ISTE Ltd and John Wiley & Sons Inc Smart Zero-energy Buildings and Communities for
Book SynopsisSmart zero-energy buildings and communities have a major role to play in the evolution of the electric grid towards alignment with carbon neutrality policies. The goal to reduce greenhouse gas emissions in the built environment can be pursued through a holistic approach, including the drastic reduction of buildings’ energy consumption.The state-of-the-art in this field relates, on the one hand, to design methodologies and innovative technologies which aim to minimize the energy demand at the building level. On the other hand, the development of information and communication technologies, along with the integration of renewable energy and storage, provide the basis for zero and positive energy buildings and communities that can produce, store, manage and exchange energy at a local level.This book provides a structured and detailed insight of the state-of-the-art in this context based on the analysis of real case studies and applications.Table of ContentsPreface xiNikos KAMPELIS List of Acronyms xvNikos KAMPELIS Chapter 1 The Role of Smart Grids in the Building Sector 1Denia KOLOKOTSA 1.1 Smart and zero-energy buildings 2 1.1.1 Smart metering 3 1.1.2 Demand response (DR) 4 1.1.3 Distributed systems 6 1.2 Smart and zero-energy communities 6 1.3 Conclusion and future prospects 10 Chapter 2 Integrated Design (ID) Towards Smart Zero-energy Buildings and Smart Grids 13Theoni KARLESSI, Pietro MURATORE, Luca VENEZIA, Laura STANDARDI, Klemens LEUTGÖB and Anne Sigrid NORDBY 2.1 Introduction 15 2.2 Methodology 16 2.3 Integrated design in smart and zero-energy buildings 17 2.4 ID process principles and guidelines 19 2.4.1 Benefits 22 2.4.2 Barriers 23 2.5 Scope of services 24 2.6 Remuneration models 26 2.7 Application of evaluation tools 28 2.8 Sustainability certification 29 2.9 Consultancy and quality assurance 30 2.10 Measurement of design quality criteria 31 2.11 Defining a client’s objectives 33 2.11.1 Capital cost reduction 34 2.11.2 Delivery risk reduction 35 2.12 Defining the tenant’s objectives 35 2.12.1 Operational cost reduction 36 2.12.2 Building unsuitability risk reduction 36 2.13 Best practice sites 37 2.13.1 Alexandros N Tombazis and Associates Architects S.A office building 37 2.13.2 APIVITA Commercial and Industrial S.A 42 2.13.3 Stavros Niarchos Foundation Cultural Center 46 2.13.4 Karelas Office Park 50 Chapter 3 Data Analysis and Energy Modeling in Smart and Zero-energy Buildings and Communities 55Nikos KAMPELIS, Konstantinos GOBAKIS, Vagias VAGIAS, Denia KOLOKOTSA, Laura STANDARDI, Daniela ISIDORI, Cristina CRISTALLI, Fabio Maria MONTAGNINO, Filippo PAREDES, Pietro MURATORE, Luca VENEZIA, Marina Kyprianou DRACOU, Alaric MONTENON, Andri PYRGOU, Theoni KARLESSI and Mat SANTAMOURIS 3.1 Energy signature for the NTL of Cyprus Institute 55 3.2 Athalassa Campus and the NTL building 57 3.2.1 Methodology 61 3.2.2 Description of the Novel Technology case study 63 3.2.3 Data exploration 68 3.2.4 Correlation matrix 71 3.2.5 Regression model 72 3.3 Linear Fresnel solar collector at the NTL building, Cyprus Institute 85 3.3.1 Development of the NTL model 90 3.3.2 Energy performance analysis in the NTL 92 3.3.3 Discussion 100 3.4 Conclusion 101 Chapter 4 On the Comparison of Occupancy in Relation to Energy Consumption and Indoor Environmental Quality: A Case Study 103Margarita Niki ASSIMAKOPOULOS, Nikolaos BARMPARESOS, Alexandros PANTAZARAS, Theoni KARLESSI and Siew Eang LEE 4.1 Introduction 103 4.2 Methodology 104 4.3 Description of the case building 105 4.4 Description of the experimental procedure 105 4.5 Results 106 4.5.1 Investigation of energy consumption and indoor air quality 106 4.5.2 Days of special interest – high occupancy 110 4.5.3 Days of special interest – increased energy consumption 112 4.6 Discussion and concluding remarks 112 Chapter 5 Indoor Environmental Quality and Energy Consumption Assessment and ANN Predictions for an Integrated Internet-based Energy Management System Towards a Zero-energy Building 115Denia KOLOKOTSA 5.1 Introduction 115 5.2 Description of the SDE buildings 116 5.2.1 General information 116 5.2.2 Monitoring activities for SDE 3 118 5.3 The power loads and hourly energy consumption 118 5.4 Indoor environmental quality 118 5.4.1 Thermal comfort assessment – time series analysis 127 5.4.2 Indoor air quality 129 5.4.3 The indoor illuminance levels 129 5.5 Cross correlation 135 5.6 Prediction using artificial neural networks (ANN) 136 5.6.1 Prediction of outdoor temperature 137 5.6.2 Prediction of relative humidity 138 5.6.3 Prediction of power loads 139 5.7 Specifications for an integrated internet-based energy management system toward a zero-energy building 141 5.7.1 The phases of the internet-based energy management system for SDE 142 5.7.2 Integration of software and prediction algorithms 149 5.8 Conclusion 149 Chapter 6 Objective and Subjective Evaluation of Thermal Comfort in the Loccioni Leaf Lab, Italy 151 Marina LASKARI, Francesco CARDUCCI, Daniela ISIDORI, Martina SENZACQUA, Laura STANDARDI and Cristina CRISTALLI6.1 Introduction 151 6.2 Background information 152 6.3 Methodology 153 6.3.1 Subjective measurements 154 6.3.2 Objective measurements 154 6.3.3 Combined analysis of objective and subjective measurements 155 6.3.4 User preferences and satisfaction with internal conditions 157 6.4 Collection of building background data 157 6.5 Collection of monitored data 160 6.6 Right-Now questionnaire survey 162 6.7 Results 166 6.7.1 Analysis of MyLeaf measurements 167 6.7.2 Analysis of Comfort Meter measurements 173 6.7.3 Analysis of Right-Now survey responses 176 6.7.4 Respondent characteristics and thermal comfort 184 6.7.5 Combined analysis of objective and subjective measurements 187 6.7.6 Correlation analysis for MyLeaf and Right-Now survey measurements 190 6.7.7 Correlation analysis for objective and subjective measurements (Research for Innovation office space) 191 6.7.8 Comparison between objective and subjective thermal sensation measurements 195 6.7.9 Determination of acceptable and unacceptable conditions 196 6.8 Conclusion 197 Chapter 7 Smart Meters and User Engagement in the Leaf House 199Niki GAITANI 7.1 Introduction 199 7.2 Methodology 200 7.3 Analysis of user engagement 201 7.3.1 Development of the questionnaire 201 7.3.2 Leaf House case study 203 7.4 Results 210 7.4.1 Demographics, socioeconomics 210 7.4.2 Physiological, social and behavioral aspects 212 7.4.3 Information level 214 7.4.4 Health and comfort 215 7.4.5 Living situation 217 7.5 Conclusion 218 Chapter 8 Integration of Energy Storage in Smart Communities and Smart Grids 221Denia KOLOKOTSA, Nikos KAMPELIS, Angeliki MAVRIGIANNAKI, Marco GENTILOZZI, Filippo PAREDES, Fabio Maria MONTAGNINO and Luca VENEZIA 8.1 Energy storage systems in smart grids 223 8.1.1 Electrical and electrochemical energy storage in smart grids 223 8.1.2 Mechanical energy storage in smart grids 228 8.1.3 Thermal energy storage in smart grids 231 8.2 Energy storage and smart grids: case studies 234 8.2.1 Case study 1: the Leaf Community smart grid energy storage system 234 8.2.2 Case study 2: energy storage of CSP and integration with smart grids 244 8.3 Conclusion and future prospects 261 Conclusion and Recommendations 263Nikos KAMPELIS References 267 List of Authors 283 Index 287
£124.15
ISTE Ltd and John Wiley & Sons Inc Hybrid Excited Synchronous Machines: Topologies,
Book SynopsisOur transition towards a cleaner and more sustainable future has seen an increase in the use of electrical energy in the functioning of our society. This implies the need to develop tools and methods which allow us to study electromagnetic devices and ensure their functioning for as long as possible. This requires us to use these tools to understand their behavior, not just as one component, but also in the entire systems in which they can be found, throughout their life cycle. This book provides electrical engineering students and researchers with the resources to analyze how synchronous machines behave over their entire field of operation, particularly focusing on hybrid excited synchronous machines (HESMs). The field of HESMs, although not a fundamental problem in the strict sense of the term, provides answers to a range of fundamental problems: the flux weakening of permanent magnet machines, energy optimization, and lastly the increasing costs of rare-earths permanent magnets.Table of ContentsForeword vii Introduction ix Chapter 1 Hybrid Excited Synchronous Machines: Principles and Structures 1 1.1 Introduction 1 1.2 Interest in hybrid excitation 3 1.2.1 Motoring mode operation 4 1.2.2 Generation mode operation 10 1.3 Hybrid excited structures 12 1.3.1 Classification criteria 13 1.3.2 Structures and classification 19 1.4 Conclusions and perspectives 28 Chapter 2 Control of Hybrid Excited Synchronous Machines 31 2.1 Introduction 31 2.2 Modeling of hybrid excited synchronous machines 32 2.2.1 The nature of the equations 35 2.2.2 Control modes 39 2.3 Torque characteristics and basic control laws 41 2.3.1 Torque characteristics as a function of I and ψ 42 2.3.2 Torque characteristics as a function of V and δ 44 2.3.3 Notion of stability for an open loop and the consequences of closed-loop operations 45 2.3.4 Fundamental control laws 51 2.3.5 Temporary overloaded motor operation 56 2.4 Setting the speed of HESMs (maximal characteristics/envelopes) 58 2.4.1 Low-speed operations 59 2.4.2 Operation at high speeds/the notion of flux weakening 72 2.5 Operations on the entire “torque/speed” plane 111 2.5.1 Efficiency optimization algorithms on the entire “torque/speed” plane 113 2.5.2 Normalized model with losses and the calculation of V n max 118 2.5.3 Machines with non-salient poles (ρ = 1) 121 2.5.4 Machines with salient poles (ρ ≠ 1) 125 2.5.5 Validity of the tools developed and the contribution towards hybrid excitation 131 2.6 Conclusions and perspectives 148 Chapter 3 Experimental Studies of Hybrid Excited Synchronous Machines 153 3.1 Introduction 153 3.2 Machine 1 154 3.2.1 Structure and operating principles 155 3.2.2 Construction 159 3.2.3 Experimental study 162 3.3 Machine 2 170 3.3.1 Structure and operating principle 172 3.3.2 Construction 179 3.3.3 Experimental study 186 3.4 Conclusions and perspectives 194 Conclusion 197 References 199 Index 211
£112.50
ISTE Ltd and John Wiley & Sons Inc Organization and Pedagogy of Complexity: Systemic
Book SynopsisOrganization and Pedagogy of Complexity deals with real systems, their architecture, and speaks of those who design, develop and maintain them. After a summary of the architecture proposed by Daniel Krob, president of CESAMES in Paris, France, the book focuses on the sensor and effector equipment that routes and converts the system's information to the place where it is processed. These are the equivalent of the system's sense organs. It also analyzes the roots of complexity from the perspective of combinatorics: in real systems, everything comes down to cases and/or configurations being validated in greater or lesser numbers, but which must be kept under control. This book presents two case studies, giving a global vision of complexity. Finally, it presents a prospective approach that brings the engineering of artificial systems closer to that of biological systems, based on first-hand information provided by Philippe Kourilsky, Emeritus Professor at the Collège de France.Table of ContentsPreface ix Part 1 The Organic Component of Systems 1 Introduction to Part 1 3 Chapter 1 Elements of Systemics: Systems Architecture 5 1.1 Introduction 5 1.2 Systemic definition of a system 7 1.2.1 From real systems to formal systems 7 1.2.2 Definition of a system 7 1.2.3 Integration of systems 9 1.3 Organization of a systemic model 12 1.3.1 Architectural visions of a system 12 1.3.2 Properties of a system 17 1.3.3 Descriptions of a system 18 1.3.4 Reference framework for system analysis 20 1.4 Architecture of a system 22 1.4.1 Systemic perspective of the systems architecture process 22 1.4.2 Architectural perspectives of the systems architecture process 23 1.5 In conclusion 25 Chapter 2 Natural Functions 29 2.1 The notion of energetic transducers, revisited 29 2.2 Some fundamental transducers 34 2.2.1 Example of an adder circuit with CMOS technology 40 Chapter 3 Emergent Properties: System Integration 47 3.1 Integration 47 3.2 The stack structure and its constructive logic 54 3.2.1 Correctly interpreting events 59 3.2.2 The epistemological lesson of the computer stack 61 3.3 Milestones from the history of computer stack development 67 3.3.1 Digression on interface engineering costs 69 3.3.2 Observing the nano-world 74 3.4 Moore's "law": a structure for integration 77 Part 2 A Complex World 87 Introduction to Part 2 89 Chapter 4 Phenomenology of Complexity 91 4.1 Drive and control in a complex environment 92 4.2 Communicating in a complex environment 93 4.3 The four dimensions of complexity 96 4.4 Measuring complexity 98 4.4.1 On Richard Feynman's intuition 100 4.5 Counting 102 Chapter 5 The Roots of Complexity: Inaccessible Numbers 105 5.1 The provenance of inaccessible numbers 105 5.2 Typology of inaccessible numbers 107 5.2.1 Quantum interlude: statistical physics 114 5.3 Familiar numbers 116 5.4 The library of Babel 120 5.5 Inaccessible numbers of the third infinity: information sciences 122 5.5.1 The numbers of software engineers 123 5.5.2 The numbers of the genome 127 Chapter 6 Walking through Complexity 133 6.1 The example of the computer stack 133 6.1.1 Chance and inaccessible numbers 139 6.2 The organized objects of the 3rd infinity 145 6.2.1 Engineering hazard 146 6.3 Facing the immensity of the infinitely complex 155 6.4 Testimonials: another look at the interface stack 163 6.4.1 Harthong, Feynman, von Neumann and Turing 163 6.4.2 Internal language, external language, according to von Neumann 168 6.4.3 Imbrication of stack languages 170 Part 3 Examples of Systemics and Complexity 179 Introduction to Part 3 181 Chapter 7 Systemic Aspects of the French Electrical System 183 7.1 Growth: the "life" of an electrical system and its end 187 7.2 Interoperability and cooperation 195 7.3 Resilience 199 7.4 Computerization and organization 204 7.5 Future problems 210 7.5.1 Renewable energy and the optimization of the network at the European level 211 7.5.2 Domestic photovoltaics 214 7.5.3 Europeanizing the network: the problem of governance 214 7.6 Conclusion 217 Chapter 8 Systemic Aspects of Project Systems 221 8.1 The science of projects 221 8.2 Control 224 8.2.1 Project size 224 8.2.2 The dynamics of relations: pairings 228 8.2.3 Human complexity 229 8.3 Volume of information exchanges in projects 232 8.3.1 Interoperability {U, S, E} 232 8.3.2 Detecting, monitoring and fixing errors 238 8.3.3 The systemic lesson of projects 246 Conclusion 249 List of Acronyms 273 References 279 Index 281
£118.80
ISTE Ltd and John Wiley & Sons Inc Cindynics, The Science of Danger: A Wake-up Call
Book SynopsisThis book offers a new perspective to uncover the keys to accident and disaster avoidance. Created with a working group, it presents research and understanding on the root causes of disasters. Indeed, beyond technical failures, human beings are at the heart of organizations and, through the exchange of data and information, influential relationships inevitably emerge such as conflicts of interest and cooperation.With examples selected from multiple accidents and disasters, this book demonstrates that analyzing the causal chain that leads to an accident is not sufficient if we wish to truly understand it. The role of operational and managerial actors and the complexities they generate are also explored.Cindynics, The Science of Danger helps readers develop their ability to identify gaps, deficits, dissonances, disjunctions, degenerations and blockages, which are the real dangers in inevitably evolving activity situations. With an easily-understandable approach, this book offers new perspectives in several fields (health, crisis management and conflict resolution).Table of ContentsAcknowledgments ix Presentation of the Institut pour la Maîtrise des Risques (French Institute for Risk Management) xi Foreword xiiiAndré LANNOY Preface xvii Chapter 1. Understanding Cindynics 1 1.1. The approach 3 1.2. The method 4 1.3. The tools 6 1.4. Processes 7 Chapter 2. The Usefulness of the Cindynics Approach and Method 9 2.1. The situation, the founding concept of cindynics 9 2.2. Characterizing an activity situation 10 2.3. Qualifying a dangerous situation within an activity situation 12 2.3.1. Notion of a dangerous situation 13 2.3.2. Qualifying the dangerousness of a situation 15 Chapter 3. The Usefulness of Cindynics Tools 17 3.1. Qualification grid for risk sources that are not easily identifiable 17 3.2. Describing this type of risk source 18 3.2.1. At the global organization level 19 3.2.2. At the level of stakeholder groups 23 3.2.3. At the level of the individual actor 23 Chapter 4. Reducing Risk Sources 25 Chapter 5. A Comparative View Between Dependability and Cindynics 29 5.1. Introduction 29 5.1.1. Dependability 29 5.1.2. The cindynics approach 29 5.1.3. Dependability and cindynics seem to ignore or even compete with each other 30 5.2. What is a complex system? 30 5.3. Dependability approach – its strengths and limitations 30 5.3.1. The scope of dependability 30 5.3.2. Description of the system and its components 31 5.3.3. Functional analysis 31 5.3.4. Process hazard analysis 31 5.3.5. Technological choices 31 5.3.6. Identification of failures – analyzing risks 32 5.3.7. Strengths and limitations of the approach 32 5.4. The cindynics approach 32 5.4.1. The cindynic situation and its scope 32 5.4.2. Strengths and limitations of the approach 33 5.5. Conflict or complementarity of the two approaches 34 5.6. Conclusion 35 Chapter 6. Perspectives 37 Conclusion 41 Examples of Approaches 45 Appendix 1. Current Risk Management and its Shortcomings 99 Appendix 2. Notions of Interaction and Complexity 105 Appendix 3. The Grounded Theorization Method 109 Appendix 4. Notions of Quantum Theory 111 Appendix 5. Summary of CSDs 115 Appendix 6. Archeocindynic Study 117 Appendix 7. Bhopal Study 137 Appendix 8. More Information About Bhopal 143 Appendix 9. Collection of Information on the Queen Mary II Gangway Accident 149 Appendix 10. Queen Mary Accident Cause Tree 157 Appendix 11. Collection of Information on the Deepwater Horizon Oil Rig Accident 159 Appendix 12. Synthesis Note of the Work of IMdR–AFPCN: “Vulnerability of Networks and Natural Disasters” 165 Appendix 13. The New Cindynics Concepts Training Course 167 Postface 169 Glossary 173 References 179 Index 185
£124.15
ISTE Ltd and John Wiley & Sons Inc Smart Grids and Buildings for Energy and Societal
Book SynopsisThis book presents interdisciplinary approaches to help buildings, electrical energy networks and their users contribute to the energy and societal transition. Smart Grids and Buildings for Energy and Societal Transition examines the technologies, uses and imaginaries involved in implementing smart buildings and smart grids. Production and consumption forecasts, modeling of stakeholder involvement and self-consumption within a renewable energy community exploiting blockchain technology are examples developed with a view to fostering the emergence of smart grids. The potential of smart buildings, taking into account user comfort while increasing energy efficiency, is identified. Full-scale demonstrators are used to test the proposed solutions, and to ensure that users take full advantage of the potential for electrical flexibility.
£118.80
ISTE Ltd and John Wiley & Sons Inc Advanced Testing of Systems-of-Systems, Volume 2:
Book SynopsisAs a society today, we are so dependent on systems-of-systems that any malfunction has devastating consequences, both human and financial. Their technical design, functional complexity and numerous interfaces justify a significant investment in testing in order to limit anomalies and malfunctions. Based on more than 40 years of practice, this book goes beyond the simple testing of an application – already extensively covered by other authors – to focus on methodologies, techniques, continuous improvement processes, load estimates, metrics and reporting, which are illustrated by a case study. It also discusses several challenges for the near future. Pragmatic and clear, this book displays many examples and references that will help you improve the quality of your systemsof-systems efficiently and effectively and lead you to identify the impact of upstream decisions and their consequences. Advanced Testing of Systems-of-Systems 2 deals with the practical implementation and use of the techniques and methodologies proposed in the first volume.Table of ContentsDedication and Acknowledgments xiii Preface xv Chapter 1 Test Project Management 1 1.1 General principles 1 1.1.1 Quality of requirements 2 1.1.2 Completeness of deliveries 3 1.1.3 Availability of test environments 3 1.1.4 Availability of test data 4 1.1.5 Compliance of deliveries and schedules 5 1.1.6 Coordinating and setting up environments 6 1.1.7 Validation of prerequisites – Test Readiness Review (TRR) 6 1.1.8 Delivery of datasets (TDS) 7 1.1.9 Go-NoGo decision – Test Review Board (TRB) 7 1.1.10 Continuous delivery and deployment 8 1.2 Tracking test projects 9 1.3 Risks and systems-of-systems 10 1.4 Particularities related to SoS 11 1.5 Particularities related to SoS methodologies 11 1.5.1 Components definition 12 1.5.2 Testing and quality assurance activities 12 1.6 Particularities related to teams 12 Chapter 2 Testing Process 15 2.1 Organization 17 2.2 Planning 18 2.2.1 Project WBS and planning 19 2.3 Control of test activities 21 2.4 Analyze 22 2.5 Design 23 2.6 Implementation 24 2.7 Test execution 25 2.8 Evaluation 26 2.9 Reporting 28 2.10 Closure 29 2.11 Infrastructure management 29 2.12 Reviews 30 2.13 Adapting processes 31 2.14 RACI matrix 32 2.15 Automation of processes or tests 33 2.15.1 Automate or industrialize? 33 2.15.2 What to automate? 33 2.15.3 Selecting what to automate 34 Chapter 3 Continuous Process Improvement 37 3.1 Modeling improvements 37 3.1.1 PDCA and IDEAL 38 3.1.2 CTP 39 3.1.3 SMART 41 3.2 Why and how to improve? 41 3.3 Improvement methods 42 3.3.1 External/internal referential 42 3.4 Process quality 46 3.4.1 Fault seeding 46 3.4.2 Statistics 46 3.4.3 A posteriori 47 3.4.4 Avoiding introduction of defects 47 3.5 Effectiveness of improvement activities 48 3.6 Recommendations 50 Chapter 4 Test, QA or IV&V Teams 51 4.1 Need for a test team 52 4.2 Characteristics of a good test team 53 4.3 Ideal test team profile 54 4.4 Team evaluation 55 4.4.1 Skills assessment table 56 4.4.2 Composition 58 4.4.3 Select, hire and retain 59 4.5 Test manager 59 4.5.1 Lead or direct? 60 4.5.2 Evaluate and measure 61 4.5.3 Recurring questions for test managers 62 4.6 Test analyst 63 4.7 Technical test analyst 64 4.8 Test automator 65 4.9 Test technician 66 4.10 Choose our testers 66 4.11 Training, certification or experience? 67 4.12 Hire or subcontract? 67 4.12.1 Effective subcontracting 68 4.13 Organization of multi-level test teams 68 4.13.1 Compliance, strategy and organization 69 4.13.2 Unit test teams (UT/CT) 70 4.13.3 Integration testing team (IT) 70 4.13.4 System test team (SYST) 70 4.13.5 Acceptance testing team (UAT) 71 4.13.6 Technical test teams (TT) 71 4.14 Insourcing and outsourcing challenges 72 4.14.1 Internalization and collocation 72 4.14.2 Near outsourcing 73 4.14.3 Geographically distant outsourcing 74 Chapter 5 Test Workload Estimation 75 5.1 Difficulty to estimate workload 75 5.2 Evaluation techniques 76 5.2.1 Experience-based estimation 76 5.2.2 Based on function points or TPA 77 5.2.3 Requirements scope creep 79 5.2.4 Estimations based on historical data 80 5.2.5 WBS or TBS 80 5.2.6 Agility, estimation and velocity 81 5.2.7 Retroplanning 82 5.2.8 Ratio between developers – testers 82 5.2.9 Elements influencing the estimate 83 5.3 Test workload overview 85 5.3.1 Workload assessment verification and validation 86 5.3.2 Some values 86 5.4 Understanding the test workload 87 5.4.1 Component coverage 87 5.4.2 Feature coverage 88 5.4.3 Technical coverage 88 5.4.4 Test campaign preparation 89 5.4.5 Running test campaigns 89 5.4.6 Defects management 90 5.5 Defending our test workload estimate 91 5.6 Multi-tasking and crunch 92 5.7 Adapting and tracking the test workload 92 Chapter 6 Metrics, KPI and Measurements 95 6.1 Selecting metrics 96 6.2 Metrics precision 97 6.2.1 Special case of the cost of defaults 97 6.2.2 Special case of defects 98 6.2.3 Accuracy or order of magnitude? 98 6.2.4 Measurement frequency 99 6.2.5 Using metrics 99 6.2.6 Continuous improvement of metrics 100 6.3 Product metrics 101 6.3.1 FTR: first time right 101 6.3.2 Coverage rate 102 6.3.3 Code churn 103 6.4 Process metrics 104 6.4.1 Effectiveness metrics 104 6.4.2 Efficiency metrics 107 6.5 Definition of metrics 108 6.5.1 Quality model metrics 109 6.6 Validation of metrics and measures 110 6.6.1 Baseline 110 6.6.2 Historical data 111 6.6.3 Periodic improvements 112 6.7 Measurement reporting 112 6.7.1 Internal test reporting 113 6.7.2 Reporting to the development team 114 6.7.3 Reporting to the management 114 6.7.4 Reporting to the clients or product owners 115 6.7.5 Reporting to the direction and upper management 116 Chapter 7 Requirements Management 119 7.1 Requirements documents 119 7.2 Qualities of requirements 120 7.3 Good practices in requirements management 122 7.3.1 Elicitation 122 7.3.2 Analysis 123 7.3.3 Specifications 123 7.3.4 Approval and validation 124 7.3.5 Requirements management 124 7.3.6 Requirements and business knowledge management 125 7.3.7 Requirements and project management 125 7.4 Levels of requirements 126 7.5 Completeness of requirements 126 7.5.1 Management of TBDs and TBCs 126 7.5.2 Avoiding incompleteness 127 7.6 Requirements and agility 127 7.7 Requirements issues 128 Chapter 8 Defects Management 129 8.1 Defect management, MOA and MOE 129 8.1.1 What is a defect? 129 8.1.2 Defects and MOA 130 8.1.3 Defects and MOE 130 8.2 Defect management workflow 131 8.2.1 Example 131 8.2.2 Simplify 132 8.3 Triage meetings 133 8.3.1 Priority and severity of defects 133 8.3.2 Defect detection 134 8.3.3 Correction and urgency 135 8.3.4 Compliance with processes 136 8.4 Specificities of TDDs, ATDDs and BDDs 136 8.4.1 TDD: test-driven development 136 8.4.2 ATDD and BDD 137 8.5 Defects reporting 138 8.5.1 Defects backlog management 139 8.6 Other useful reporting 141 8.7 Don’t forget minor defects 141 Chapter 9 Configuration Management 143 9.1 Why manage configuration? 143 9.2 Impact of configuration management 144 9.3 Components 145 9.4 Processes 145 9.5 Organization and standards 146 9.6 Baseline or stages, branches and merges 147 9.6.1 Stages 148 9.6.2 Branches 148 9.6.3 Merge 148 9.7 Change control board (CCB) 149 9.8 Delivery frequencies 149 9.9 Modularity 150 9.10 Version management 150 9.11 Delivery management 151 9.11.1 Preparing for delivery 153 9.11.2 Delivery validation 154 9.12 Configuration management and deployments 155 Chapter 10 Test Tools and Test Automation 157 10.1 Objectives of test automation 157 10.1.1 Find more defects 158 10.1.2 Automating dynamic tests 159 10.1.3 Find all regressions 160 10.1.4 Run test campaigns faster 161 10.2 Test tool challenges 161 10.2.1 Positioning test automation 162 10.2.2 Test process analysis 162 10.2.3 Test tool integration 162 10.2.4 Qualification of tools 163 10.2.5 Synchronizing test cases 164 10.2.6 Managing test data 164 10.2.7 Managing reporting (level of trust in test tools) 165 10.3 What to automate? 165 10.4 Test tooling 166 10.4.1 Selecting tools 167 10.4.2 Computing the return on investment (ROI) 169 10.4.3 Avoiding abandonment of tools and automation 169 10.5 Automated testing strategies 170 10.6 Test automation challenge for SoS 171 10.6.1 Mastering test automation 171 10.6.2 Preparing test automation 173 10.6.3 Defect injection/fault seeding 173 10.7 Typology of test tools and their specific challenges 174 10.7.1 Static test tools versus dynamic test tools 175 10.7.2 Data-driven testing (DDT) 176 10.7.3 Keyword-driven testing (KDT) 176 10.7.4 Model-based testing (MBT) 177 10.8 Automated regression testing 178 10.8.1 Regression tests in builds 178 10.8.2 Regression tests when environments change 179 10.8.3 Prevalidation regression tests, sanity checks and smoke tests 179 10.8.4 What to automate? 180 10.8.5 Test frameworks 182 10.8.6 E2E test cases 183 10.8.7 Automated test case maintenance or not? 184 10.9 Reporting 185 10.9.1 Automated reporting for the test manager 186 Chapter 11 Standards and Regulations 187 11.1 Definition of standards 189 11.2 Usefulness and interest 189 11.3 Implementation 190 11.4 Demonstration of compliance – IADT 190 11.5 Pseudo-standards and good practices 191 11.6 Adapting standards to needs 191 11.7 Standards and procedures 192 11.8 Internal and external coherence of standards 192 Chapter 12 Case Study 195 12.1 Case study: improvement of an existing complex system 195 12.1.1 Context and organization 196 12.1.2 Risks, characteristics and business domains 198 12.1.3 Approach and environment 200 12.1.4 Resources, tools and personnel 210 12.1.5 Deliverables, reporting and documentation 212 12.1.6 Planning and progress 213 12.1.7 Logistics and campaigns 216 12.1.8 Test techniques 217 12.1.9 Conclusions and return on experience 218 Chapter 13 Future Testing Challenges 223 13.1 Technical debt 223 13.1.1 Origin of the technical debt 224 13.1.2 Technical debt elements 225 13.1.3 Measuring technical debt 226 13.1.4 Reducing technical debt 227 13.2 Systems-of-systems specific challenges 228 13.3 Correct project management 229 13.4 DevOps 230 13.4.1 DevOps ideals 231 13.4.2 DevOps-specific challenges 231 13.5 IoT (Internet of Things) 232 13.6 Big Data 233 13.7 Services and microservices 234 13.8 Containers, Docker, Kubernetes, etc 235 13.9 Artificial intelligence and machine learning (AI/ML) 235 13.10 Multi-platforms, mobility and availability 237 13.11 Complexity 238 13.12 Unknown dependencies 238 13.13 Automation of tests 239 13.13.1 Unrealistic expectations 240 13.13.2 Difficult to reach ROI 241 13.13.3 Implementation difficulties 242 13.13.4 Think about maintenance 243 13.13.5 Can you trust your tools and your results? 244 13.14 Security 245 13.15 Blindness or cognitive dissonance 245 13.16 Four truths 246 13.16.1 Importance of Individuals 247 13.16.2 Quality versus quantity 247 13.16.3 Training, experience and expertise 248 13.16.4 Usefulness of certifications 248 13.17 Need to anticipate 249 13.18 Always reinvent yourself 250 13.19 Last but not least 250 Terminology 253 References 261 Index 267 Summary of Volume 1 269
£112.50
ISTE Ltd and John Wiley & Sons Inc Systems and Uses of Digital Sciences for
Book SynopsisSystems and Uses of Digital Sciences for Knowledge Organization is a large-scale scientific work that brings together researchers and R&D professionals to discuss ideas and actions in the organization of knowledge. The main objective of this book is to define collaborative strategies, use advanced technologies in multiple research fields and outline applications of knowledge organization and its cultural, education, economic and industrial potential.The organization of knowledge and advanced technologies (OCTA) asks the following questions: How can we strengthen alliances between multi-disciplinary and trans-disciplinary studies? How can we broaden our skills surrounding common objects of study? How can we innovate the solutions found and propose sustainable development to society confidently? This book is a result of intensive and collaborative work between highly respected scientific authors. The nine chapters that have been selected for this book have been peer-reviewed by the OCTA program committee, both as written submissions and when presented during the OCTA multi-conference on organization.Table of ContentsIntroduction xiSahbi SIDHOM and Amira KADDOUR Chapter 1 Multi-Agent System and Ontology to Manage Ideas and Represent Knowledge: Creativity Challenge 1Pedro Chávez BARRIOS, Davy MONTICOLO and Sahbi SIDHOM 1.1 Introduction 1 1.2 Multi-agent system (MAS) and ontology 3 1.2.1 MAS and ontology 3 1.2.2 MAS methodologies 5 1.2.3 Methodologies to design ontologies 6 1.3 MAS and ontology: our approach proposal 7 1.3.1 MAS methodology GAIA 7 1.3.2 Applying the ontology, Uschold’s ontology 8 1.4 Results 9 1.4.1 Multi-agent system results 9 1.4.2 Ontology results 13 1.5 Conclusion 16 1.6 Appendices 16 1.7 References 22 Chapter 2 Comparative Study of Educational Process Construction Supported by an Intelligent Tutoring System 27Walid BAYOUNES, Inès BAYOUDH S ADI and Hénda BEN GHÉZALA 2.1 Introduction 27 2.2 New view of educational process 28 2.2.1 Psycho-pedagogical level 30 2.2.2 Didactic level 30 2.2.3 Situational level 30 2.2.4 Online level 30 2.3 Definition framework 30 2.3.1 Didactic domain world 31 2.3.2 Instructional design world 32 2.3.3 Learning environment world 33 2.3.4 Learning situation world 34 2.4 Comparative study 34 2.4.1 Study scope 34 2.4.2 Description of systems 35 2.4.3 Specification of approaches 36 2.4.4 Study results and discussion 50 2.5 Conclusion and future works 51 2.6 References 52 Chapter 3 Multi-Criteria Decision-Making Recommender System Based on Users’ Reviews 55Mariem BRIKI, Sabrine BEN ABDRABBAH and Nahla BEN AMOR 3.1 Introduction 55 3.2 Multi-criteria decision-making 56 3.3 Basics of recommendation systems and related work 58 3.3.1 Recommender systems 58 3.3.2 Text mining-based recommendation systems 59 3.3.3 Multi-criteria recommender systems 60 3.4 New multi-criteria text-based recommendation system 62 3.4.1 Primary criterion-based recommendation system 62 3.4.2 Multi-criteria text mining-based recommendation system 66 3.5 Experimental study 67 3.5.1 Dataset and metrics 67 3.5.2 Evaluation metrics 68 3.5.3 Experimental protocol 69 3.5.4 Experimental results 70 3.6 Conclusion 71 3.7 References 72 Chapter 4 Spammer Detection Relying on Reviewer Behavior Features Under Uncertainty 75Malika BEN KHALIFA, Zied ELOUEDI and Eric LEFÈVRE 4.1 Introduction 75 4.2 Background 78 4.2.1 The belief function theory 78 4.2.2 Evidential K-nearest neighbors 80 4.3 Spammer detection relying on the reviewers’ behavioral features 81 4.3.1 Step 1: Features extraction 82 4.3.2 Step 2: Initialization and learning phase 87 4.3.3 Step 3: Distinguishing between innocent and spammer reviewers 88 4.4 Experimental study 89 4.4.1 Evaluation protocol 90 4.4.2 Results and discussion 91 4.5 Conclusion and future work 92 4.6 References 92 Chapter 5 Social Networking Application, Connections Between Visual Communication Systems and Personal Information on the Web 97Marilou KORDAHI 5.1 Introduction 97 5.2 Related published works 100 5.3 Pattern for the SignaComm, first approach 101 5.3.1 SignaComm’s context 102 5.3.2 SignaComm’s pattern 103 5.4 From text phrases to signagrams for the protection of personal data 107 5.4.1 Automatic translation 107 5.4.2 Dictionary of signagrams 109 5.5 SignaComm’s first technical test 110 5.5.1 Interface pattern 110 5.5.2 User profile pattern 111 5.5.3 Machine translation pattern 111 5.5.4 Activity pattern 113 5.6 Discussion and conclusion 113 5.7 Acknowledgment 114 5.8 References 114 Chapter 6 A New Approach of Texts and Writing Normalization for Arabic Knowledge Organization 119Hammou FADILI 6.1 Introduction 119 6.2 Motivation 120 6.3 Using a machine learning model 120 6.4 Technological elements integration 124 6.5 Corpus and dataset 126 6.6 Experiences and evaluations 127 6.6.1 Results 129 6.7 Conclusion 130 6.8 References 131 Chapter 7 Ebola Epidemic in the Congo 2018–2019: How Does Twitter Permit the Monitoring of Rumors? 137Marc TANTI 7.1 Introduction 137 7.2 Materials and methods 139 7.3 Results 143 7.3.1 Regarding the general public, the citizens 143 7.3.2 Regarding the experts 145 7.3.3 Regarding the media 146 7.3.4 Regarding the politicians 148 7.4 Conclusion 149 7.5 Acknowledgment 150 7.6 References 150 Chapter 8 From Human and Social Indexing to Automatic Indexing in the Era of Big Data and Open Data 153Nabil KHEMIRI and Sahbi SIDHOM 8.1 Introduction 153 8.2 Indexing definition 154 8.3 Manual indexing 155 8.4 Automatic indexing 156 8.4.1 Statistical indexing methods 156 8.4.2 Linguistic indexing methods 157 8.4.3 Semantic indexing 158 8.4.4 Social indexing 159 8.5 Indexing methods for Big Data and Open Data 159 8.6 Conclusion 161 8.7 References 161 Chapter 9 Strategies for the Sustainable Use of Digital Technology by the AWI in the Management of Knowledge and Cultural Communication on the “Arab World” 165Asma ABBASSI 9.1 Introduction 165 9.2 The Arab World Institute and the construction of knowledge around the “Arab World” in the West 166 9.3 The AWI’s digital communication strategies 168 9.4 The images built by the AWI and the question of feedback 176 9.5 The role of digital tools in sustainability and durability in the management of knowledge and communication at the AWI 178 9.6 Conclusion 180 9.7 References 181 List of Authors 185 Index 187
£112.50
ISTE Ltd and John Wiley & Sons Inc Finite Element Method to Model Electromagnetic
Book SynopsisNumerical modeling now plays a central role in the design and study of electromagnetic systems. In the field of devices operating in low frequency, it is the finite element method that has come to the fore in recent decades. Today, it is widely used by engineers and researchers in industry, as well as in research centers. This book describes in detail all the steps required to discretize Maxwell's equations using the finite element method. This involves progressing from the basic equations in the continuous domain to equations in the discrete domain that are solved by a computer. This approach is carried out with a constant focus on maintaining a link between physics, i.e. the properties of electromagnetic fields, and numerical analysis. Numerous academic examples, which are used throughout the various stages of model construction, help to clarify the developments.
£118.80
ISTE Ltd and John Wiley & Sons Inc Model-based Systems Architecting: Using CESAM to
Book SynopsisModel-based Systems Architecting is a key tool for designing complex industrial systems. It is dedicated to the working systems architects, engineers and modelers, in order to help them master the complex integrated systems that they are dealing with in their day-to-day professional lives. It presents the CESAMES Systems Architecting Method (CESAM), a systems architecting and modeling framework which has been developed since 2003 in close interaction with many leading industrial companies, providing rigorous and unambiguous semantics for all classical systems architecture concepts. This approach is practically robust and easy-to-use: during the last decade, it was deployed in more than 2,000 real system development projects within the industry, and distributed to around 10,000 engineers around the globe.Table of ContentsPreface ix Acknowledgments xv Introduction xvii Chapter 1 Introduction to CESAM 1 1.1 CESAM: a mathematically sound system modeling framework 1 1.2 CESAM: a framework focused on complex integrated systems 8 1.3 CESAM: a collaboration-oriented architecting framework 12 1.4 CESAM: a business-oriented framework 16 Chapter 2 Why Architecting Systems? 19 2.1 Product and project systems 19 2.2 The complexity threshold 22 2.3 Addressing systems architecting becomes key 25 2.4 The value of systems architecting 31 2.5 The key role of systems architects 34 2.6 How to analyze a systems architect profile? 36 Chapter 3 CESAM Framework 39 3.1 Elements of systemics 39 3.1.1 Interface 39 3.1.2 Environment of a system 41 3.2 The three architectural visions 42 3.2.1 Architectural visions definition 42 3.2.2 Architectural visions overview 46 3.2.3 Relationships between the three architectural visions 52 3.2.4 Organization of a system model 55 3.3 CESAM systems architecture pyramid 57 3.3.1 The three key questions to ask 57 3.3.2 The last question that shall not be forgotten 59 3.4 More systems architecture dimensions 60 3.4.1 Descriptions versus expected properties 60 3.4.2 Descriptions 62 3.4.3 Expected properties 73 3.5 CESAM systems architecture matrix 78 Chapter 4 Identifying Stakeholders: Environment Architecture 83 4.1 Why identify stakeholders? 83 4.2 The key deliverables of environment architecture 85 4.2.1 Stakeholder hierarchy diagram 85 4.2.2 Environment diagram 87 Chapter 5 Understanding Interactions with Stakeholders: Operational Architecture 91 5.1 Why understand interactions with stakeholders? 91 5.2 The key deliverables of operational architecture 94 5.2.1 Need architecture diagram 94 5.2.2 Lifecycle diagram 95 5.2.3 Use case diagrams 97 5.2.4 Operational scenario diagrams 99 5.2.5 Operational flow diagram 101 Chapter 6 Defining What the System Shall Do: Functional Architecture 103 6.1 Why understand what the system does? 103 6.2 The key deliverables of functional architecture 105 6.2.1 Functional requirement architecture diagram 106 6.2.2 Functional mode diagram 108 6.2.3 Functional breakdown and interaction diagrams 109 6.2.4 Functional scenario diagrams 111 6.2.5 Functional flow diagram 112 Chapter 7 Deciding How the System Shall be Formed: Constructional Architecture 115 7.1 Understanding how the system is formed? 115 7.2 The key deliverables of constructional architecture 117 7.2.1 Constructional requirement architecture diagram 118 7.2.2 Configuration diagram 120 7.2.3 Constructional breakdown and interaction diagram 121 7.2.4 Constructional scenario diagram 123 7.2.5 Constructional flow diagram 124 Chapter 8 Taking into Account Failures: Dysfunctional Analysis 127 8.1 Systems do not always behave as they should 127 8.2 The key deliverables of dysfunctional analysis 134 8.2.1 Dysfunctional analysis from an operational perspective 135 8.2.2 Dysfunctional analysis from a functional perspective 136 8.2.3 Dysfunctional analysis from a constructional perspective 138 Chapter 9 Choosing the Best Architecture: Trade-off Techniques 141 9.1 Systems architecting does not usually lead to a unique solution 141 9.2 Trade-off techniques 143 9.2.1 General structure of a trade-off process 143 9.2.2 Managing trade-offs in practice 145 Conclusion 149 Appendices 157 Appendix 1 System Temporal Logic 159 Appendix 2 Classical Engineering Issues 163 Appendix 3 Example of System Model Managed with CESAM 177 Appendix 4 Implementing CESAM through a SysML Modeling Tool 199 Appendix 5 Some Good Practices in Systems Modeling 209 References 211 Index 219
£112.50