Systems analysis and design Books
Taylor & Francis Inc Fundamentals of UserCentered Design
Book SynopsisThere has been some solid work done in the area of User-Centered Design (UCD) over the last few years. What's been missing is an in-depth, comprehensive textbook that connects UCD to usability and User Experience (UX) principles and practices. This new textbook discusses a theoretical framework in relation to other design theories. It provides a repeatable, practical process for implementation, offering numerous examples, methods, and case studies for support, and it emphasizes best practices in specific environments, including mobile and web applications, print products, as well as hardware.Trade Review"Yes! This is the book I have been looking for over the past 10 years of teaching media design. It is sufficiently practical but also with a high-level of theoretical underpinnings."— Brett Oppegaard, University of Hawaii, USA"Fundamentals of User-Centered Design: A Practical Approach is a "one-stop shop" for students and practitioners who need a comprehensive, well-written introduction to UCD principles and usability testing practices from authors who clearly have some "dirt under their fingernails." It’s full of excellent examples and practical illustrations from industry, and it’s written in a very comprehensible voice that even basic undergraduate students can understand."— Tharon W. Howard, Clemson University, USA"Yes! This is the book I have been looking for over the past 10 years of teaching media design. It is sufficiently practical but also with a high-level of theoretical underpinnings."— Brett Oppegaard, University of Hawaii, USA"Fundamentals of User-Centered Design: A Practical Approach is a "one-stop shop" for students and practitioners who need a comprehensive, well-written introduction to UCD principles and usability testing practices from authors who clearly have some "dirt under their fingernails." It’s full of excellent examples and practical illustrations from industry, and it’s written in a very comprehensible voice that even basic undergraduate students can understand."— Tharon W. Howard, Clemson University, USATable of ContentsIntroduction to User-Centered Design; Origins; UCD Principles; Research Users; Assess the Situation; Balance and Filter Design Features; Build Out an Operative Image; Test the Design; RIDE (Report, Iterate, Deploy, Evaluate); International UCD; Hardware UCD; Print UCD; Mobile UCD; UCD Teams; UCD Tools and Technologies; Index
£104.50
Nova Science Publishers Inc Dynamic Systems: Modeling, Performance &
Book SynopsisIn the first chapter, Dr Christian Hugo Hoffmann presents a study that adds to the current knowledge on financial risk and complexity while drawing on the concept of organized complexity, coined by Weaver. He finishes by explaining the correlation between the ideas of complexity, randomness, and systemic risks. In the second chapter, Peter A. Stubberud, Stephen C Stubberud, and Allen R. Stubberud present a signal processing technique, which is a simplification of the dynamic element matching technique, or DEMT and is referred to as the dynamic system matching technique, or DSMT, for controlling the noise signal in the output of a system due to manufacturing errors. In the third and final chapter, Yu Zhou, Weigang Wu, and Huaguan Li define new system models to describe the dynamicity of clusters and then, based on those models, they design and present an algorithm that is able to elect an eventual leader.
£78.39
John Wiley and Sons Ltd Computers in Context: The Philosophy and Practice
Book SynopsisWhen software systems are delivered too late, when they fail to meet the needs of their users, when only a fraction of their capacity is used, when their maintenance costs more than their development, when changes are impossible – then there is a frantic search for new and better engineering techniques and tools. Dahlbom ande Mathiassen advocate a different approach to these problems: pausing and reflection. Surprisingly little time in the education of systems developers is devoted to a consideration of the methods, goals and politics of computerization. The core of the book is an examination of the notion of quality itself. The effective computer professional must arrive at his or her sense of what quality can and should mean in a particular situation in order to resolve the inevitable creative tensions between the nature of people and that of computers, between structured systems and the process of change. The authors draw on a rich range of literature from philosophy, organizational theory, and technology and social change to support their points. But, adducing many real-life examples they avoid jargon and presuppose no formal background. Computer in Context will help students, computer professionals, and managers alike understand better what it is they are trying to do with computer systems, how and why.Trade Review "Dahlbom and Mathiassen have written a pathbreaking book about software development in a meaningful human context. They examine key assumptions about the role of software developers, and their relationship to culture and work in a way which touches everyday practice and which can subtly transform it. It should be read by every practicing software developer." – Rob Kling, University of California, Irvine "I enjoyed this book. It is both more amusing and more challenging than the usual books on system design." – Joseph A. Goguen, University of Oxford.Table of ContentsPreface. Part I. Systems. Computers. Information. Thinking. Part II. Development. Construction. Evolution. Intervention. Part III. Quality. Artifacts. Culture. Power. Part IV. Practice. Computers and People. Systems and Change. From Philosophy to Practice. Notes for Instructors. Exercises. Further Reading. References. Index.
£31.05
Nova Science Publishers Inc Performance Evaluation of Parallel, Distributed &
Book Synopsis
£129.74
J Ross Publishing Mastering Business Analysis Versatility: Seven
Book Synopsis
£54.00
J Ross Publishing Seven Steps to Mastering Business Analysis: The
Book Synopsis
£54.00
Manning Publications Designing APIs with Swagger and OpenAPI
Book SynopsisUsing standards like OpenAPI, you can provide reliable, easy-to-use interfaces that allow other developers safe, controlled access to your software. Designing APIs withSwagger and OpenAPI is a hands-on primer to properly designing and describing your APIs using the most widely-adopted standard. Designing APIswith Swagger and OpenAPI introduces you to a design-first paradigm that will teach you the best practices for describing and designing RESTful APIs using OpenAPI and Swagger. You'll build upon progressively-enhanced examples as you learn to describe an API andthen extend it in the kind of scenarios you'd encounter in the real world. As you go, you'll use the popular Open Source tools to define APIs, generate documentation, and build other developer-friendly components like mocks, server stubs, and client SDKs. Modern web applications are made of multiple components, services, and servers connected through APIs, often using HTTP and REST as their primary interfaces. These architectures rely on APIs that allow access to the functionality of a component without requiring developers to understand the details of how it was implemented. The OpenAPI specification standardizes how you describe RESTful APIs. OpenAPI is vendor-neutral and has been adopted bybig tech companies such as Google, Microsoft, and Amazon.Trade Review“A great introduction to the design process of APIs by helping youto understand OpenAPI and Swagger.” Ben McNamara “The book's instructional design was very well thought out.Instructions are clear and the topics flow quite smoothly.” Ted Hagos “I would recommend this book to anyone interested in learningabout API design!” Travis Wisnasky
£45.39
Manning Publications Software Telemetry: Reliable logging and
Book Synopsis"Do you want to learn more about software telemetry? Don't look any further, this book is the one you need." - Sander Zegveld Software telemetry is the discipline of tracing, logging, and monitoring infrastructure by observing and analyzing the events generated by the system. In Software Telemetry, you'll master the best practices for operating and updating telemetry systems. This practical guide is filled with techniques you can apply to any organization upgrading and optimizing their telemetry systems, from lean startups to well-established companies. You'll learn troubleshooting techniques to deal with every eventuality, such as building easily-auditable systems, preventing and handling accidental data leaks, and ensuring compliance with standards like GDPR. about the technologyComplex systems can become black boxes. Telemetry provides feedback on what's happening inside. Telemetry systems are built for gathering, transforming, and communicating data on the performance, functionality, processing speeds, errors, and security events of production systems. There are many forms of telemetry systems, from classic centralized logging to cutting-edge distributed tracing that follows data across microservices. But despite their difference in functionality, all telemetry systems share core operational similarities—and best practices for optimizing them to support your business needs. about the bookSoftware Telemetry is a guide to operating the telemetry systems that monitor and report on your applications. It takes a big picture view of telemetry, teaching you to manage your logging, metrics, and events as a complete end-to-end ecosystem. You'll learn the base architecture that underpins any software telemetry system, allowing you to easily integrate new systems into your existing infrastructure, and how these systems work under the hood. Throughout, you'll follow three very different companies to see how telemetry techniques impact a software-producing startup, a large legacy enterprise, and any organization that writes software for internal use. You'll even cover how software telemetry is used by court processes—ensuring that when your first telemetry discovery request arrives, there's no reason to panic! what's inside- Processes for legal compliance- Cleaning up after toxic data spills and leaks- Safely handling toxic telemetry and confidential records- Multi-tenant techniques and transformation processes- Updating metrics aggregation and sampling traces to display accurate data for longer- Revising software telemetry emissions to be easier to parse- Justifying increased spend on telemetry software about the readerFor software developers and infrastructure engineers supporting and building telemetry systems. about the authorJamie Riedesel is a staff engineer at Dropbox. She has over twenty years of experience in IT, working in government, education, legacy companies, and startups. She has specialized in DevOps for the past decade, running distributed systems in public clouds, getting over workplace trauma, and designing software telemetry architectures.Trade Review“The telemetry bible!” Sander Zegveld, Developers.nl “An in-depth guide to operating software telemetry systems.” Sushant Bhadkamkar, Lyft “A must-have tome of knowledge written by one of the leaders in software telemetry.” Andrew Bovill, CACI International Inc “Something for every level of distributed systems, from hardware to networking to operating systems to software.” Lokesh Kumar, Urgently
£43.19
Manning Publications Cyber Defenders' Career Guide
Book SynopsisKickstart a career in cyber security by learning how to adapt your existing technical and non-technical skills with Cyber Defenders' CareerGuide. Cyber Defenders' Career Guide unlocks your pathway to becoming a great security practitioner. You'll learn how toreliably enter the security field and quickly grow into your new career, following clear, practical advice that's based on research and interviews with hundreds of hiring managers. Author Alyssa Miller has spent over adecade in cyber security leadership and talent development, and she shares her unique perspective in this revealing industry guide. By some estimates, there are over 4 million unfilled jobs in cybersecurity. This important field is growing fast, with a huge demand for skilled recruits. But where do you start? How can you know you're ready? This book isyour invaluable guide to starting and navigating a rewarding security career.Trade Review“Alyssa Miller brilliantly explains the intricacies of cybersecurity and helps the reader navigate this complex moving landscape.” MarcRoulleau “A comprehensive guide on getting started in the field of Cybersecurity.” Dipen N. Kumar “Recommended for anyone wanting to work in security, no matter what part of security that is.” Jan Vinterberg “A highly recommended book for those looking to start their career in Cybersecurity, as well as those who are already part of the industry.” HarshRaval “An interesting guide to introduce yourself to the cybersecurity world.” Emanuele Origgi “A tremendous work in terms of the number of real-world examples.More than once I found myself smiling and nodding because the things the author described mirrored my experiences in being a mentor to a cybersecurity-focused community.” Rob Goelz “Very smart and definitely worth reading. I particularly loved thepart about mentoring.” Rafik Naccache “It's the most complete written introduction to a successful career approach I know.” Joerg Discher “Even if you decide that cyber security is not the right career path for you, it's full of good advice for taking charge of your career intech.” Amanda Debler
£37.99
Artech House Publishers Design and Applications of Active Integrated
Book SynopsisUsing Active Integrated Antenna (AIA) instead of the conventional sub-system designs of individual components will provide a system designer with more features and enhance performance. This book explains how active integration and co-design between the active components (amplifier, oscillator, mixer, diodes) and the antenna can provide better power transfer, higher gains, increased efficiencies, switched beam patterns and smaller design footprints. As new antenna designs will require closer integration with other radio electronics, AIA are expected to be used in future wireless terminals. The book introduces the fundamental aspects of AIA and discusses in detail the various types of AIA, such as oscillator, amplifier, mixer, transceiver, frequency reconfigurable, on-chip and on package, as well as non-foster AIA covering various frequency bands and wireless standards. It presents co-design procedures for AIA applied to multiple-input-multiple-output (MIMO) front ends as well as examples of narrowband and wideband designs. This is the first book to elaborate on AIA design with detailed step-by-step tutorials and the use of software packages (provided in an accompanying CD). It contains real world cases and illustrations, and is a must-have title for practicing and research engineers.Trade ReviewAn excellent new references is a recommended pick for college-level collections strong in electrical engineering and antenna design, offering engineers solid discussions of theory, applications, and different systems and their management. Mohammad S. Sharawi and Oualid Hammi's Design and Applications of Active Integrated Antennas offers professionals the latest methods in designing active integrated antennas for wireless devices, considering design protocol, interfaces between active components, increasing efficiency, and working between the active and passive parts of AIA. Design examples for such systems cover both narrowband and wideband applications and incorporate the latest design methods and applications. Both are solid references college-level electrical engineers will find essential. * Midwest Book Review *Table of ContentsIntroduction; Impedance Matching Methods; Amplifier Design; Antenna Fundamentals; Active Integrated Antennas; A Co-Design Approach for Designing AIA.
£128.25
Manning Publications Data Mesh in Action
Book SynopsisRevolutionize the way your organization approaches data with a data mesh! This new decentralized architecture outpaces monolithic lakes and warehouses and can work for a company of any size. Data Mesh in Action reveals how this ground breaking architecture looks for both small start-ups and large enterprises. You'll see a datamesh in action as you explore both an extended case study andmultiple real-world examples. As you go, you'll be expertly guidedthrough discussions around Socio-Technical Architecture and Domain-Driven Design with the goal of building a sleek data-as-a-productsystem.
£45.04
Technics Publications Gouvernance Non Intrusive Des Données: Le chemin
Book Synopsis
£38.24
States Academic Press New Paradigms in Computer Aided Verification
Book Synopsis
£115.15
Clanrye International Computer Aided Verification: Techniques and
Book Synopsis
£111.50
Willford Press Computer Systems: Construction Algorithms and
Book Synopsis
£115.91
Pragmatic Bookshelf The Cucumber Book 2e
Book SynopsisYour customers want rock-solid, bug-free software that does exactly what they expect it to do. Yet they can't always articulate their ideas clearly enough for you to turn them into code. You need Cucumber: a testing, communication, and requirements tool-all rolled into one. All the code in this book is updated for Cucumber 2.4, Rails 5, and RSpec 3.5. Express your customers' wild ideas as a set of clear, executable specifications that everyone on the team can read. Feed those examples into Cucumber and let it guide your development. Build just the right code to keep your customers happy. You can use Cucumber to test almost any system or any platform. Get started by using the core features of Cucumber and working with Cucumber's Gherkin DSL to describe-in plain language-the behavior your customers want from the system. Then write Ruby code that interprets those plain-language specifications and checks them against your application. Next, consolidate the knowledge you've gained with a worked example, where you'll learn more advanced Cucumber techniques, test asynchronous systems, and test systems that use a database. Recipes highlight some of the most difficult and commonly seen situations the authors have helped teams solve. With these patterns and techniques, test Ajax-heavy web applications with Capybara and Selenium, REST web services, Ruby on Rails applications, command-line applications, legacy applications, and more. Written by the creator of Cucumber and the co-founders of Cucumber Ltd., this authoritative guide will give you and your team all the knowledge you need to start using Cucumber with confidence. What You Need: Windows, Mac OS X (with XCode) or Linux, Ruby 1.9.2 and upwards, Cucumber 2.4, Rails 5, and RSpec 3.5
£30.39
Pragmatic Bookshelf Creating Software with Modern Diagramming
Book SynopsisDiagrams communicate relationships more directly and clearly than words ever can. Using only text-based markup, create meaningful and attractive diagrams to document your domain, visualize user flows, reveal system architecture at any desired level, or refactor your code. With the tools and techniques this book will give you, you'll create a wide variety of diagrams in minutes, share them with others, and revise and update them immediately on the basis of feedback. Adding diagrams to your professional vocabulary will enable you to work through your ideas quickly when working on your own code or discussing a proposal with colleagues. Expand your professional vocabulary by learning to communicate with diagrams as easily and naturally as speaking or writing. This book will provide you with the skills and tools to turn ideas into clear, meaningful, and attractive diagrams in mere minutes, using nothing more complicated than text-based markup. You'll learn what kinds of diagrams are suited to each of a variety of use cases, from documenting your domain to understanding how complex code pieces together. Model your software's architecture, creating diagrams focused broadly or narrowly, depending on the audience. Visualize application and user flows, design database schemas, and use diagrams iteratively to design and refactor your application. You'll be able to use technical diagramming to improve your day-to-day workflow. You will better understand the codebase you work in, communicate ideas more effectively and immediately with others, and more clearly document the architecture with C4 diagrams. Manually creating diagrams is cumbersome and time-consuming. You'll learn how to use text-based tools like Mermaid to rapidly turn ideas into diagrams. And You'll learn how to keep your diagrams up to date and seamlessly integrated into your engineering workflow. You'll be better at visualizing and communicating when you add diagrams to your standard vocabulary. What You Need: A Mac or PC A GitHub account
£22.79
Arcler Press Systems Analysis and Design
Book SynopsisThis book explores the process of developing effective and efficient information systems. It covers topics such as requirements gathering, system design, implementation, and maintenance. The book provides a structured approach to systems development and emphasizes the importance of understanding business processes and user needs. This book is a valuable resource for anyone involved in systems analysis and design.Table of Contents Chapter 1 Introduction to System Analysis and Design Chapter 2 System Development Life Cycle Chapter 3 Requirements Modeling Chapter 4 Data and Process Modeling Chapter 5 Architecture Design Chapter 6 User Interface Design Chapter 7 Managing Systems Implementation Chapter 8 Managing Systems Support and Security
£87.20
BCS Learning & Development Limited Business Analysis Techniques: 123 essential tools
Book SynopsisBusiness Analysis has never been more important, and valuable, to organisations as they strive to adapt to an ever-changing and faster-changing environment. This expanded edition of Business Analysis Techniques provides detailed guidance on the range and application of the techniques available to assist business analysts and others in their work. Business Analysis Techniques provides a foundation for the effective specification, design and development of digital solutions, solutions that are based on a proper understanding of the real business need and the requirements for solutions to meet them. With 123 of the most widely used techniques covered, this book is an essential resource for any business analyst. This book: Places a large number of techniques into the context of the Business Analysis Service Framework, providing clear guidance on the applicability and use of 123 of the most-used techniques available in the business analyst’s toolbox Provides detailed information on the use of each technique Accessibly written with worked examples of all of the techniques described Offers practical tips for using and adapting the techniques in the real world Pair it with Business Analysis, also published BCS for even greater insights.Trade ReviewBusiness Analysts have always had a wealth of techniques at their disposal but how the toolkit has grown! If you are looking to shine as a business analyst you will be well aware of the importance of becoming the master of our rich BA toolkit, know what technique to use for each occasion and how to use it to good effect. This upgrade on a ‘must have’ BA classic extends the toolkit by another 24 techniques! I encourage all BAs to use this book to build their confidence in their own professionalism and be regarded as masters of their BA toolkit. -- Ian Richards, Director, Business Analysis, CapitaI found this new edition to be crammed full of tried, tested and trusted business analysis techniques. Yet again giving the BA more tools for analysis success. Each technique is described in full, with scenarios to bring them to life, along with developed examples. The narrative does not shy away from giving you technique limitations or when to blend techniques together to achieve a better analysis outcome. It’s the BA book I return to again and again. -- Sarah Bullen, Head of Business Analysis, BBC, Technology and Digital Products Group, UKThe latest version brings even more techniques to bear, extending to areas of user experience, process improvement and testing; helpfully mapped against key project phases. This book is a must have resource for all BAs at any stage of their career. -- Jamie Clouting, Lead Consultant, BAE Systems Applied IntelligenceBeware, this will very quickly become the most thumbed and tabbed book in your collection. For me it’s a must-have companion, especially for brushing up on a technique you’ve not used in a while or to signpost community members seeking advice to a specific page. Also fond of the addition of aligning techniques to the BA Service Framework, which makes it even easier to find new approaches. -- Jamie Toyne, Head of Business Analysis, Ministry of Justice - Digital and TechnologyA treasure trove of techniques for every Business Analyst (BA). Essential reading for anyone entering the profession and an excellent refresher for seasoned BAs. All the techniques are laid out in-synch with most project delivery models making it easy to navigate your way through. Each technique is described with some great thoughts on how to use it. Brilliant to see all the available techniques laid out in one place. -- Tazeem Wafa, Principal Business Analyst, Bank of EnglandThis is THE body of knowledge about business analysis techniques. Comprehensive and comprehensible. The presentation of techniques is encyclopaedic, however the authors explain not only what the technique is and how it works, but why, and in what circumstances, you would use it. The use of examples helps enormously to understand how to apply the techniques. For any business analyst looking to expand his/her skill set — and I recommend all business analysts should do so — this is the book. -- James Robertson, co-author of 'Mastering the Requirements Process'Good chefs have their own variations of classic recipes, but a set of standard recipes is the firm basis for any chef. This book offers such a standard. Sometimes a technique is carried out “how we always do it” but having a clear and complete set of the original definitions helps to keep to the right track. If ever in doubt, you can always begin with, or go back to, the techniques as described here! -- Danny Kalkhoven, Le Blanc AdviesMany business analysts still make the mistake of trying to do their job using only a couple of the most basic techniques. Today’s business problems demand that you have far more in your toolkit. This business analysis classic is something every business analyst should have ready to hand when trying to solve a new problem or looking for existing ways to tackle old, intractable ones, and every edition becomes more invaluable. -- Kevin Brennan, Chief Business Architect, Aligned Outcomes & Former EVP at IIBA, led development of BABOK Guide versions 2 and 3Each new edition of Business Analysis Techniques introduces more ideas and tools than the last. But that doesn’t mean it’s carrying any extra weight. On the contrary, it’s pure unadulterated goodness – just the essentials that you need to know about each technique, whether it’s a very well-known standard or something more obscure. The most comprehensive and useful reference work on the ‘mental furniture’ that a BA needs – I recommend it. -- Nick de Voil, Director, De Voil ConsultingA must have in your bookshelf if you are looking to improve your skills in business analysis. 123 tools that can be used on their own or in combination makes it the perfect reference book for hands-on consultants. -- Peter Gerstbach, Founder & Managing Director, Gerstbach Business Analyse GmbHThis is the most comprehensive collection of business analyst techniques I’ve come across. The authors have clearly gone to a lot of trouble to balance detail with brevity, and they found just the right balance. The descriptions provide clear direction in the why and how of all the common business analysis techniques and many more. This is a must have resource in the library of every professional business analyst. -- Carl Sudholz, Digital Transformation Consultant and Senior Business Analyst, AGContext® Digital TransformationsIf you need to put together a business analysis toolkit to use in your forthcoming transformation initiative – as an individual BA, or as a BA team – then Business Analysis Techniques is the perfect source to start with. It is THE book to help you widen your perspectives, boost your curiosity and empathy. -- Milena Mileva, Managing Consultant, PMBABusiness analysis practitioners need to learn and utilize the various techniques to create value for the business. This book provides a detailed explanation of various techniques that a Business Analyst can apply to the initiatives to add value to the stakeholders. The techniques are categorically defined and easy to understand. Keep learning! -- Deepak Gupta, Principal Consultant, Wipro Technologies, IndiaSimple, practical & accessible. Each of the tools are articulated & linked in a way that is quick and easy to understand without the need to wade through pages of theory. The concise examples bring to life when & how to use each of the analysis techniques. Whether you are starting out on your business change career, or you are a seasoned professional, this new volume is an essential reference tool for anyone looking to bring discipline & structure to their analysis. -- Christian Hunter, Business Analysis Services Director, Infinity AssociatesThe 123 business analysis techniques described in this book are useful for both the seasoned senior business analyst and the less experienced junior business analyst. It is well written, descriptive and provides excellent examples of what, how, why and when to use the appropriate analysis techniques dependent on the task, business need or scenario encountered. I found the book easy to read and I look forward to applying these business analysis techniques into my day-to-day life as a business analyst. -- Allamin Ali, Senior Business Analyst, Welsh Government, United KingdomMy original copy is always close to hand. Where else would I find so many techniques all in one place, excellently summarised and demonstrated? But the icing on the cake is that techniques are now grouped by Business Analysis Service Framework categories. It's a no-brainer tool for supporting my team to provide the best possible BA service and also nicely complements my Delivering Business Analysis handbook. -- Karen Newnham, Head of Business Analysis, DVSAThis book covers some key elements of business analysis which are often overlooked - the significance of emotional factors in customer journey mapping, stakeholder perspectives, negotiation, and in conflict resolution. Describing concepts like ‘Weltanschauung’, which refers to the fundamental cognitive orientation of an entity encompassing a holistic point of view, allows readers to employ such theories regardless of which sector or industry they work with. If, like me, you believe in exploring the power of psychology for mutually beneficial outcomes at the workplace, this book will help you uncover some true gems. -- Zeinab Shabbir Tinwala, Director & CEO, Starsons International (Pvt) Ltd, Business Architect, Corporate Trainer, Career CoachI found this book very interesting and exciting; the writing style is captivating, accessible and full of intriguing knowledge. The techniques are introduced simply, yet are very rich, specific and comprehensive. All techniques are articulated and linked to one another, with real-life examples. Overall, it’s a highly practical and easy to understand reference, not only for senior business analysts, but also for beginners. Highly recommended! -- Irene Gweed, Business Analyst Lead, Product Owner & Business Analysis Trainer, EgyptTable of Contents1. Strategic Context 2. Situation Investigation 3. Feasibility Assessment and Business Case Development 4. Business Process Improvement 5. Requirements Definition 6. Business Acceptance Testing 7. Business Change Deployment 8. Stakeholder Engagement
£44.99
BCS Learning & Development Limited Defining Digital Solutions
Book SynopsisThis book offers practical guidance on establishing context needed to design and deliver a successful digital solution, and approaches you can take to acquire or develop one based on essential requirements. A must read for business analysts, software developers, software testers, solution architects and digital technologists.
£18.99
BCS Learning & Development Limited Designing Digital Solutions
Book SynopsisThis book offers practical guidance on architecting digital solutions, including UI, data, process, and security design based on essential requirements as defined. A must read for business analysts, software developers, software testers, solution architects and digital technologists.
£18.99
BCS Learning & Development Limited Delivering Digital Solutions
Book SynopsisThis book offers practical guidance for the delivery of digital solutions - detailing software engineering and software testing stages essential to deploying a digital solution plus development and support tools. A must read for business analysts, software developers, software testers, solution architects and digital technologists.
£19.99
Paragon Publishing Enterprise Data Architecture: How to navigate its landscape
£22.99
Packt Publishing Limited DomainDriven Refactoring
Book Synopsis
£41.81
WIT Press Managing Complexity
Book SynopsisManaging Complexity is the first book that clearly defines the concept of Complexity, explains how Complexity can be measured and tuned, and describes the seven key features of Complex Systems: 1. Connectivity 2. Autonomy 3. Emergency 4. Nonequilibrium 5. Non-linearity 6. Self-organisation 7. Co-evolution The thesis of the book is that complexity of the environment in which we work and live offers new opportunities and that the best strategy for surviving and prospering under conditions of complexity is to develop adaptability to perpetually changing conditions. An effective method for designing adaptability into business processes using multi-agent technology is presented and illustrated by several extensive examples, including adaptive, real-time scheduling of taxis, see-going tankers, road transport, supply chains, railway trains, production processes and swarms of small space satellites. Additional case studies include adaptive servicing of the International Space Station; adaptive processing of design changes of large structures such as wings of the largest airliner in the world; dynamic data mining, knowledge discovery and distributed semantic processing.Finally, the book provides a foretaste of the next generation of complex issues, notably, The Internet of Things, Smart Cities, Digital Enterprises and Smart Logistics.Table of ContentsContents PART 1 Fundamentals 1 What is complexity? Introduction; Defining Complexity; Complex Versus Complicated; Complexity and Uncertainty; The Seven Criteria of Complexity; Negative and Positive Aspects of Complexity; Evolution Favours Complexity; Co-Evolution of Technology, Economy and Society; Complexity and Information Society; Complexity and Philosophy 2 A method for managing complexity Introduction; Coping with External Complexity; Tuning Internal Complexity; Modelling Complexity; Adaptability; Designing Adaptive Business Processes 3 Multi-agent technology Introduction; Fundamentals; MAS for Adaptive Resource Allocation; Knowledge Base; Virtual World; Decision-Making; Agent Negotiations; Architecture; Multi-Agent Platform; Main Features of Our MAS; Multi-Agent Software as a Complex Adaptive System; Comparing Multi-Agent Software with Conventional Programs 4 Emergent intelligence Fundamentals; Evidence of Intelligent Behaviour; Thermodynamics of the Virtual World PART 2 Commercial applications 5 Adaptive scheduling of seagoing tankers The Problem; The Solution; Results 6 Adaptive scheduling of taxis The Problem; The Solution; Results 7 Adaptive scheduling of car rentals The Problem; The Solution; Results 8 Adaptive scheduling of road transport The Problem; The Solution; Results 9 Adaptive data mining The Problem; The Solution; Application Examples; Results 10 Adaptive semantic processing The Problem; The Solution; Application Example: Assessing Relevance of Abstracts; Results 11 Adaptive detection of clashes caused by design changes The Problem; The Solution; Results 133 12 Adaptive scheduling of supply networks The Problem; The Solution; Results 13 Adaptive scheduling of services for the international space station The Problem; The Solution; Results 14 Adaptive scheduling of a fleet of satellites The Problem; The Solution; Results 15 Adaptive scheduling of high-speed railways The Problem; The Solution; Results 16 Adaptive scheduling of manufacturing The Problem; The Solution; Results 17 Adaptive management of service teams The Problem; The Solution; Results 18 Adaptive project management The Problem; The Solution; Results PART 3 A roadmap into the future 19 A vision and ideas A Shift from Personal to Business Applications; The IoT; Digital Enterprise; Smart City; Smart Logistics
£56.05
Imperial College Press Analysis And Synthesis Of Computer Systems (2nd
Book SynopsisAnalysis and Synthesis of Computer Systems presents a broad overview of methods that are used to evaluate the performance of computer systems and networks, manufacturing systems, and interconnected services systems. Aside from a highly readable style that rigorously addresses all subjects, this second edition includes new chapters on numerical methods for queueing models and on G-networks, the latter being a new area of queuing theory that one of the authors has pioneered.This book will have a broad appeal to students, practitioners and researchers in several different areas, including practicing computer engineers as well as computer science and engineering students.Table of ContentsBasic Tools of Probabilistic Modelling; The Queue with Server of Walking Type and Its Applications to Computer System Modelling; Queueing Network Models; Queueing Networks with Multiple Classes of Positive and Negative Customers and Product Form Solution; Markov-Modulated Queues; Diffusion Approximation Methods for General Queueing Networks; Approximate Decomposition and Iterative Techniques for Closed Model Solution; Synthesis Problems in Single-Resource Systems: Characterisation and Control of Achievable Performance; Control of Performance in Mutliple-Resource Systems; A Queue with Server of Walking Type.
£90.00
Imperial College Press Nature Of Change Or The Law Of Unintended
Book SynopsisThis absorbing book provides a broad introduction to the surprising nature of change, and explains how the Law of Unintended Consequences arises from the waves of change following one simple change. Change is a constant topic of discussion, whether be it on climate, politics, technology, or any of the many other changes in our lives. However, does anyone truly understand what change is?Over time, mankind has deliberately built social and technology based systems that are goal-directed — there are goals to achieve and requirements to be met. Building such systems is man's way of planning for the future, and these plans are based on predicting the behavior of the system and its environment, at specified times in the future. Unfortunately, in a truly complex social or technical environment, this planned predictability can break down into a morass of surprising and unexpected consequences. Such unpredictability stems from the propagation of the effects of change through the influence of one event on another.The Nature of Change explains in detail the mechanism of change and will serve as an introduction to complex systems, or as complementary reading for systems engineering. This textbook will be especially useful to professionals in system building or business change management, and to students studying systems in a variety of fields such as information technology, business, law and society.Table of ContentsWhat Do We Mean By Change?; Some Definitions; Failure by Design; Influence, Boundaries and Structure; Change in Complex Systems; Propagation; Simulation; What Do We Do When A Change Is Indicated?; Implementing a System; Co-evolutionary Change in the Real World; In the Future.
£48.45
ISTE Ltd and John Wiley & Sons Inc Modeling and Verification of Real-time Systems:
Book SynopsisThis title is devoted to presenting some of the most important concepts and techniques for describing real-time systems and analyzing their behavior in order to enable the designer to achieve guarantees of temporal correctness. Topics addressed include mathematical models of real-time systems and associated formal verification techniques such as model checking, probabilistic modeling and verification, programming and description languages, and validation approaches based on testing. With contributions from authors who are experts in their respective fields, this will provide the reader with the state of the art in formal verification of real-time systems and an overview of available software tools.Table of ContentsPreface 15 Stephan MERZ and Nicolas NAVET Chapter 1. Time Petri Nets – Analysis Methods and Verification with TINA 19 Bernard BERTHOMIEU, Florent PERES and Francois VERNADAT 1.1. Introduction 19 1.2. Time Petri nets 20 1.2.1. Definition 20 1.2.2. States and the state reachability relation 20 1.2.3. Illustration 22 1.2.4. Some general theorems 23 1.3. State class graphs preserving markings and LTL properties 24 1.3.1. State classes 24 1.3.2. Illustration 25 1.3.3. Checking the boundedness property on-the-fly 26 1.3.4. Variations 27 1.4. State class graphs preserving states and LTL properties 28 1.4.1. Clock domain 28 1.4.2. Construction of the SSCG 29 1.4.3. Variants 30 1.5. State class graphs preserving states and branching properties 32 1.6. Computing firing schedules 33 1.6.1. Schedule systems 33 1.6.2. Delays (relative dates) versus dates (absolute) 34 1.6.3. Illustration 35 1.7. An implementation: the Tina environment 35 1.8. The verification of SE−LTL formulae in Tina 37 1.8.1. The temporal logic SE−LTL 37 1.8.2. Preservation of LTL properties by tina constructions 39 1.8.3. selt: the SE−LTL checker of Tina 39 1.9. Some examples of use of selt 42 1.9.1. John and Fred 42 1.9.2. The alternating bit protocol 44 1.10. Conclusion 47 1.11. Bibliography 48 Chapter 2. Validation of Reactive Systems by Means of Verification and Conformance Testing 51 Camille CONSTANT, Thierry JERON, Herve MARCHAND and Vlad RUSU 2.1. Introduction 51 2.2. The IOSTS model 54 2.2.1. Syntax of IOSTS 54 2.2.2. Semantics of IOSTS 56 2.3. Basic operations on IOSTS 57 2.3.1. Parallel product 57 2.3.2. Suspension 58 2.3.3. Deterministic IOSTS and determinization 60 2.4. Verification and conformance testing with IOSTS 60 2.4.1. Verification 60 2.4.2. Conformance testing 64 2.5. Test generation 64 2.6. Test selection 68 2.7. Conclusion and related work 70 2.8. Bibliography 73 Chapter 3. An Introduction to Model Checking 77 Stephan MERZ 3.1. Introduction 77 3.2. Example: control of an elevator 78 3.3. Transition systems and invariant checking 79 3.3.1. Transition systems and their runs 81 3.3.2. Verification of invariants 82 3.4. Temporal logic 84 3.4.1. Linear-time temporal logic 84 3.4.2. Branching-time temporal logic 87 3.4.3. ω-automata 89 3.4.4. Automata and PTL 92 3.5. Model checking algorithms 94 3.5.1. Local PTL model checking 95 3.5.2. Global CTL model checking 97 3.5.3. Symbolic model checking algorithms 99 3.6. Some research topics 103 3.7. Bibliography 105 Chapter 4. Model Checking Timed Automata 111 Patricia BOUYER and Francois LAROUSSINIE 4.1. Introduction 111 4.2. Timed automata 112 4.2.1. Some notations 112 4.2.2. Timed automata, syntax and semantics 113 4.2.3. Parallel composition 114 4.3. Decision procedure for checking reachability 115 4.4. Other verification problems 118 4.4.1. Timed languages 118 4.4.2. Branching-time timed logics 118 4.4.3. Linear-time timed logics 120 4.4.4. Timed modal logics 121 4.4.5. Testing automata 121 4.4.6. Behavioral equivalences 121 4.5. Some extensions of timed automata 121 4.5.1. Diagonal clock constraints 122 4.5.2. Additive clock constraints 123 4.5.3. Internal actions 124 4.5.4. Updates of clocks 125 4.5.5. Linear hybrid automata 126 4.6. Subclasses of timed automata 127 4.6.1. Event-recording automata 127 4.6.2. One-clock timed automata 128 4.6.3. Discrete-time models 129 4.7. Algorithms for timed verification 130 4.7.1. A symbolic representation for timed automata: the zones 130 4.7.2. Backward analysis in timed automata 131 4.7.3. Forward analysis of timed automata 132 4.7.4. A data structure for timed systems: DBMs 133 4.8. The model-checking tool Uppaal 134 4.9. Bibliography 135 Chapter 5. Specification and Analysis of Asynchronous Systems using CADP 141 Radu MATEESCU 5.1. Introduction 141 5.2. The CADP toolbox 142 5.2.1. The LOTOS language 143 5.2.2. Labeled transition systems 143 5.2.3. Some verification tools 144 5.3. Specification of a drilling unit 147 5.3.1. Architecture 150 5.3.2. Physical devices and local controllers 152 5.3.3. Main controller – sequential version 155 5.3.4. Main controller – parallel version 157 5.3.5. Environment 158 5.4. Analysis of the functioning of the drilling unit 159 5.4.1. Equivalence checking 159 5.4.2. Model checking 161 5.5. Conclusion and future work 164 5.6. Bibliography 166 Chapter 6. Synchronous Program Verification with Lustre/Lesar 171 Pascal RAYMOND 6.1. Synchronous approach 171 6.1.1. Reactive systems 171 6.1.2. The synchronous approach 172 6.1.3. Synchronous languages 172 6.2. The Lustre language 173 6.2.1. Principles 173 6.2.2. Example: the beacon counter 174 6.3. Program verification 174 6.3.1. Notion of temporal property 175 6.3.2. Safety and liveness 175 6.3.3. Beacon counter properties 175 6.3.4. State machine 175 6.3.5. Explicit automata 176 6.3.6. Principles of model checking 176 6.3.7. Example of abstraction 177 6.3.8. Conservative abstraction and safety 178 6.4. Expressing properties 178 6.4.1. Model checking: general scheme 178 6.4.2. Model checking synchronous program 179 6.4.3. Observers 180 6.4.4. Examples 180 6.4.5. Hypothesis 180 6.4.6. Model checking of synchronous programs 181 6.5. Algorithms 182 6.5.1. Boolean automaton 182 6.5.2. Explicit automaton 182 6.5.3. The “pre ” and “post ” functions 183 6.5.4. Outstanding states 183 6.5.5. Principles of the exploration 184 6.6. Enumerative algorithm 184 6.7. Symbolic methods and binary decision diagrams 185 6.7.1. Notations 185 6.7.2. Handling predicates 186 6.7.3. Representation of the predicates 186 6.7.4. Typical interface of aBDD library 188 6.7.5. Implementation of BDDs 188 6.7.6. Operations on BDDs 189 6.7.7. Notes on complexity 191 6.7.8. Typed decision diagrams 192 6.7.9. Care set and generalized cofactor 194 6.8. Forward symbolic exploration 195 6.8.1. General scheme 196 6.8.2. Detailed implementation 196 6.8.3. Symbolic image computing 198 6.8.4. Optimized image computing 198 6.9. Backward symbolic exploration 201 6.9.1. General scheme 201 6.9.2. Reverse image computing 202 6.9.3. Comparing forward and backward methods 203 6.10. Conclusion and related works 203 6.11. Demonstrations 204 6.12. Bibliography 205 Chapter 7. Synchronous Functional Programming with Lucid Synchrone 207 Paul CASPI, Gregoire HAMON and Marc POUZET 7.1. Introduction 207 7.1.1. Programming reactive systems 207 7.1.2. Lucid Synchrone 211 7.2. Lucid Synchrone 213 7.2.1. An ML dataflow language 213 7.2.2. Stream functions 214 7.2.3. Multi-sampled systems 216 7.2.4. Static values 222 7.2.5. Higher-order features 222 7.2.6. Datatypes and pattern matching 224 7.2.7. A programming construct to share the memory 225 7.2.8. Signals and signal patterns 227 7.2.9. State machines and mixed designs 229 7.2.10. Parametrized state machines 233 7.2.11. Combining state machines and signals 234 7.2.12. Recursion and non-real-time features 236 7.2.13. Two classical examples 236 7.3. Discussion 240 7.3.1. Functional reactive programming and circuit description languages 240 7.3.2. Lucid Synchrone as a prototyping language 241 7.4. Conclusion 242 7.5. Acknowledgment 243 7.6. Bibliography 243 Chapter 8. Verification of Real-Time Probabilistic Systems 249 Marta KWIATKOWSKA, Gethin NORMAN, David PARKER and Jeremy SPROSTON 8.1. Introduction 249 8.2. Probabilistic timed automata 250 8.2.1. Preliminaries 250 8.2.2. Syntax of probabilistic timed automata 252 8.2.3. Modeling with probabilistic timed automata 254 8.2.4. Semantics of probabilistic timed automata 254 8.2.5. Probabilistic reachability and invariance 255 8.3. Model checking for probabilistic timed automata 258 8.3.1. The region graph 258 8.3.2. Forward symbolic approach 261 8.3.3. Backward symbolic approach 266 8.3.4. Digital clocks 273 8.4. Case study: the IEEE FireWire root contention protocol 277 8.4.1. Overview 277 8.4.2. Probabilistic timed automata model 278 8.4.3. Model checking statistics .281 8.4.4. Performance analysis 282 8.5. Conclusion 285 8.6. Bibliography 285 Chapter 9. Verification of Probabilistic Systems Methods and Tools 289 Serge HADDAD and Patrice MOREAUX 9.1. Introduction 289 9.2. Performance evaluation of Markovian models 290 9.2.1. A stochastic model of discrete event systems 290 9.2.2. Discrete-time Markov chains 292 9.2.3. Continuous-time Markov chains 294 9.3. High level stochastic models 297 9.3.1. Stochastic Petri nets with general distributions 297 9.3.2. GLSPN with exponential distributions . 299 9.3.3. Performance indices of SPN 300 9.3.4. Overview of models and methods in performance evaluation 300 9.3.5. The Great SPN tool 301 9.4. Probabilistic verification of Markov chains 303 9.4.1. Limits of standard performance indices 303 9.4.2. A temporal logic for Markov chains 303 9.4.3. Verification algorithms 305 9.4.4. Overview of probabilistic verification of Markov chains 306 9.4.5. The ETMCC tool 307 9.5. Markov decision processes 308 9.5.1. Presentation of Markov decision processes 308 9.5.2. A temporal logic for Markov decision processes 309 9.5.3. Verification algorithms 309 9.5.4. Overview of verification of Markov decision processes 313 9.5.5. The PRISM tool 314 9.6. Bibliography 315 Chapter 10. Modeling and Verification of Real-Time Systems using the IF Toolset 319 Marius BOZGA, Susanne GRAF, Laurent MOUNIER and Iulian OBER 10.1. Introduction 320 10.2. Architecture 322 10.3. The IF notation 324 10.3.1. Functional features 324 10.3.2. Non-functional features 326 10.3.3. Expressing properties with observers 328 10.4. The IF tools 329 10.4.1. Core components 329 10.4.2. Static analysis 332 10.4.3. Validation 333 10.4.4. Translating UML to IF 334 10.5. An overview on uses of IF in case studies 336 10.6. Case study: the Ariane 5 flight program 337 10.6.1. Overview of the Ariane 5 flight program 337 10.6.2. Verification of functional properties 339 10.6.3. Verification of non-functional properties 343 10.6.4. Modular verification and abstraction 344 10.7. Conclusion 345 10.8. Bibliography 347 Chapter 11. Architecture Description Languages: An Introduction to the SAE AADL 353 Anne-Marie DEPLANCHE and Sebastien FAUCOU 11.1. Introduction 353 11.2. Main characteristics of the architecture description languages 356 11.3. ADLs and real-time systems 357 11.3.1. Requirement analysis 357 11.3.2. Architectural views 359 11.4. Outline of related works 360 11.5. The AADL language 362 11.5.1. An overview of the AADL 363 11.6. Case study 365 11.6.1. Requirements 365 11.6.2. Architecture design and analysis with AADL 366 11.6.3. Designing for reuse: package and refinement 377 11.7. Conclusion 380 11.8. Bibliography 381 List of Authors 385 Index 389
£201.35
ISTE Ltd and John Wiley & Sons Inc Linear Systems
Book SynopsisLinear systems have all the necessary elements (modeling, identification, analysis and control), from an educational point of view, to help us understand the discipline of automation and apply it efficiently. This book is progressive and organized in such a way that different levels of readership are possible. It is addressed both to beginners and those with a good understanding of automation wishing to enhance their knowledge on the subject. The theory is rigorously developed and illustrated by numerous examples which can be reproduced with the help of appropriate computation software. 60 exercises and their solutions are included to enable the readers to test and enhance their knowledge.Table of ContentsPreface xi Introduction xvii Chapter 1. Reminders and General Points 1 1.1. Lines 1 1.2. Adaptation and stationary waves 4 1.3. Smith chart 6 1.4. Power in a line 6 1.5. Line sections 7 1.6. Lines with losses 9 Chapter 2. Measurements in HF 11 2.1. Material 11 2.2. The power bench11 2.3. Measurements on the network analyzer 14 Chapter 3. Resonant Cavities 25 3.1. Resonance 25 3.2. Coaxial cavities 28 3.3. Quarter-wave cavities 29 Chapter 4. Fabrication and Tuning of Cavities 47 4.1. Standard structures 47 4.2. Materials 53 4.3. Assembly 56 4.4. Temperature stability 58 4.5. Cavity tuning 70 Chapter 5. The Band-pass Filter 83 5.1. The band-pass function 83 5.2. Calculation of a Tchebycheff band-pass 85 5.3. Technologies 87 Chapter 6. The Combline Filter 97 6.1. Architecture 97 6.2. Dimension calculations. Dishal’s Method 105 6.3. Tuning of filters 114 Chapter 7. Channel Multiplexing 129 7.1. Definitions 129 7.2. The duplexer 129 7.3. The combiner 140 Chapter 8. Auxiliary Devices 157 8.1. Introduction 157 8.2. Circulators 157 8.3. The antenna alarms 165 8.4. Loads and attenuators 170 8.5. Reception amplifiers 177 8.6. The impedance adaptor 186 8.7. The 2nd harmonic rejecter 186 Chapter 9. Directive Couplers 189 9.1. Introduction 189 9.2. Technologies 191 9.3. The hybrid transformer 194 9.4. The 180° hybrid ring 196 9.5. The wireline 198 9.6. The “groundless” coupler 199 9.7. The “catnose” coupler 201 9.8. Discrete-elements coupler 202 9.9. Numerical data 204 9.10. Applications 210 Chapter 10. Helical Resonators 213 10.1. Introduction 213 10.2. Functioning 214 10.3. Structures 215 10.4. Tapping and coupling 219 10.5. Quality coefficient 220 10.6. Set-up rules 223 10.7. Applications 224 Chapter 11. Multicouplers 225 11.1. Transmitter multicouplers (TX) 225 11.2. Receiver multicouplers (RX) 235 11.3. TX/RX multicouplers 236 11.4. TMA 240 11.5. Power and intermodulations 243 11.6. Multiband coupling 254 Chapter 12. Utilities 257 12.1. BASIC programs 257 12.2. Varia 264 Chapter 13. Various Questions and Exploratory Ways 271 13.1. The coupler without intrinsic loss 271 13.2. Infinite rejection band-pass 275 13.3. Helix TX multicoupler 276 13.4. Conclusion 278 Bibliography 281 Index 283
£150.05
ISTE Ltd and John Wiley & Sons Inc Systems of Systems
Book SynopsisIn recent years, the systems designed to support activity in the fields of banking, health, transportation, space, aeronautics, defense, etc. have become increasingly larger and more complex. With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new capabilities and services through the combination of system functionalities. This has led to a further increasing complexity that has to be managed in order to take advantage of these system integrations. The book is divided into two parts. The first part addresses the concept and practical illustrations of a “system of systems” and is a multidisciplinary introduction to the notion of a “systems of systems” that is discussed extensively in the current scientific and technical literature. After a critical comparison of the different definitions and a range of various practical illustrations, this part provides answers to key questions such as what a system of systems is and how its complexity can be mastered. The second part, described as “systems-of-systems engineering: methods and tools”, focuses on both engineering and modeling, and standardization issues that are critical to deal with the key steps in systems of systems engineering: namely eliciting stakeholder needs, architecture optimization, integration of constituent systems, qualification, and utilization.Table of ContentsAuthor Biographies xv Introduction xix PART 1. SYSTEMS OF SYSTEMS, CONCEPTS AND PRACTICAL ILLUSTRATIONS 1 Chapter 1. Systems of Systems: From Concept to Actual Development 3 Dominique LUZEAUX 1.1. Network omnipresence creating a worldwide environment 3 1.2. Increasing complexity of the environment 5 1.3. Towards a definition of the concept of system of systems 11 1.4. Control of the system of systems 34 1.5. Tools for the control of the system of systems 47 1.6. The need for standardization 56 1.7. The human factor in systems of systems 58 1.8. Budgetary aspects of the systems of systems 68 1.9. The need for governance 70 1.10. Conclusion 75 1.11. Appendix: system of systems’ definitions in literature. 77 1.12. Bibliography 84 Chapter 2. Emergence and Complexity of Systems of Systems 89 Patrice MICOUIN 2.1. Introduction 89 2.2. Matter and shape 90 2.3. Systems 92 2.4. Genesis of concrete systems 99 2.5. Complexity of systems of systems 107 2.6. Systems of systems engineering 111 2.7. Conclusion 115 2.8. Bibliography 116 Chapter 3. Contractual Aspects of the Acquisition and Use of Systems of Systems 119 Danièle VÉRET 3.1. Introduction 119 3.2. An integrated set of components of various natures 121 3.3. Combining people with diversified skills and their contributions 125 3.4. Commitments to coordinate 130 3.5. Ownership rights 142 3.6. The most adapted legal strategies 147 3.7. Conclusion 148 Chapter 4. The Human Factor within the Context of Systems of Systems 149 Jean-René RUAULT 4.1. Introduction 149 4.2. Definition and epistemological aspects 150 4.3. The issue 154 4.4. Current human factors in systems engineering 160 4.5. The organizations’ complexity from the standpoint of social sciences: impacts on the systems of systems 166 4.6. Social sciences implemented within the context of systems of systems 192 4.7. Recognizable good practices in the field of organizations 201 4.8. Conclusion 202 4.9. Acknowledgments 203 4.10. Bibliography 203 Chapter 5. Space Communication and Observation System of Systems 207 Frédéric PRADEILLES and Dominique LUZEAUX 5.1. The dual context of omnipresent information and the commoditization of space 207 5.2. The technical view: an interconnection of ground-based and space-borne systems 209 5.3. Search for functionality and capacity 213 5.4. A logic of exchange on an international scale 214 5.5. Conclusion 220 5.6. Bibliography 221 Chapter 6. Intelligent Transport Systems 223 Michel CHAVRET 6.1. The field of intelligent transport 223 6.2. ACTIF 226 6.3. Practical application 230 6.4. Conclusion 234 6.5. Bibliography 234 Chapter 7. Systems of Systems in the Healthcare Field 235 Jean-René RUAULT 7.1. Introduction 235 7.2. From capability challenges to the design of systems of systems 236 7.3. Personal service, the main characteristic of systems within the healthcare field 239 7.4. Coordination of the medical and paramedical agents, in hospitals and in private practices 242 7.5. The development of information technologies and their interoperability, heart of the healthcare networks issue 245 7.6. Difficulties encountered 256 7.7. Conclusion 258 7.8. Acknowledgments 258 7.9. Bibliography 259 Chapter 8. Critical Infrastructure Protection 261 Jean-Luc ZOLESIO 8.1. General context of critical infrastructure protection 261 8.2. Protection requirements 266 8.3. Security systems of the future 272 8.4. The human factor 285 8.5. Conclusion 290 Chapter 9. Globalization and Systemic Impacts 291 Dominique LUZEAUX, Jean-René RUAULT and Lui KAM 9.1. Introduction 291 9.2. System of systems “globalization” 292 9.3. Beyond the concepts of systems 309 9.4. Globalization’s impact on systems of systems engineering 312 9.5. Conclusion 316 9.6. Appendix: a summary of the properties of nonlinear dynamic systems 317 9.7. Bibliography 318 PART 2. SYSTEMS OF SYSTEMS ENGINEERING, METHODS, STANDARDS AND TOOLS 321 Chapter 10. Methods and Tools for Systems of Systems Engineering 323 Dominique LUZEAUX 10.1. Systems of systems engineering: from the control of complexity to the necessity of a model-driven approach 323 10.2. Architecture 326 10.3. From architecture to detailed design: reference architectures 331 10.4. Requirement traceability and engineering tools 338 10.5. Reverse engineering and impact studies 342 10.6. Distributed simulation tools for model engineering 344 10.7. Global control of operational security via testability 346 10.8. Towards a virtuous circle of simulation-tests to control the tests 352 10.9. Collaborative work tools 357 10.10. Conclusion 360 10.11. Acknowledgements 361 10.12. Bibliography 362 Chapter 11. Model-driven Design and Simulation 363 Lui KAM 11.1. General points 363 11.2. A few definitions 365 11.3. Model-driven engineering 378 11.4. Feedback 385 11.5. Conclusion and perspectives 392 11.6. Bibliography 394 Chapter 12. Standardization in the Field of Systems and Systems of Systems Engineering 399 Jean-René RUAULT and Jean-Pierre MEINADIER 12.1. Introduction 399 12.2. Example of the importance of standards in the interoperability of systems and systems of systems 400 12.3. Standards used in the field of systems and systems of systems 403 12.4. Application and adaptation of system engineering standards in the context of systems of systems 433 12.5. Implementation of standards in the context of systems of systems 438 12.6. Conclusion 439 12.7. Acknowledgements 439 12.8. Appendix A. Standard relative to business process modeling 439 12.9. Appendix B. Standard relative to the Web services business process execution language 443 12.10. Appendix C. Ontology definition metamodel specification 444 12.11. Appendix D. UML profile for DoDAF/MODAF (USA Department of Defense and UK Ministry of Defense Architecture Framework) 446 12.12. Appendix E. Standard relative to software-intensive systems architecture 451 12.13. Appendix F. Unified modeling language 454 12.14. Appendix G. Systems modeling language 457 12.15. Appendix H. Good practices of IT service management, ITIL 461 12.16. Appendix I. Standard relative to IT services management 464 12.17. Appendix J. Software engineering – Product quality 466 12.18. Appendix J.1. Standard ISO 9126, part 1, quality model 466 12.19. Appendix J.2. Standard ISO 9126, part 3, internal metrics 468 12.20. Appendix K. Standard on software product quality requirements and evaluation 468 12.21. Appendix L. Standard on the common criteria for IT security evaluation 469 12.22. Appendix M. Standard relative to a system’s life cycle process 473 12.23. Appendix N. Standard relative to the processes for engineering a system 482 12.24. Appendix O. Standard for the application and management of the systems engineering process 487 12.25. Appendix P. Standard relative to software life cycle processes 494 12.26. Appendix Q. Standard relative to software measurement process 499 12.27. Appendix R. Standard relative to software product evaluation 500 12.28. Appendix S. Standard on systems engineering, product and design data exchange 504 12.29. Appendix T. Standard on the exchange of product model data, products life cycle support 507 12.30. Bibliography 510 Conclusion 513 List of Authors 519 Index 521
£194.70
ISTE Ltd and John Wiley & Sons Inc Models and Analysis for Distributed Systems
Book SynopsisNowadays, distributed systems are increasingly present, for public software applications as well as critical systems. software applications as well as critical systems. This title and Distributed Systems: Design and Algorithms – from the same editors – introduce the underlying concepts, the associated design techniques and the related security issues. The objective of this book is to describe the state of the art of the formal methods for the analysis of distributed systems. Numerous issues remain open and are the topics of major research projects. One current research trend consists of profoundly mixing the design, modeling, verification and implementation stages. This prototyping-based approach is centered around the concept of model refinement. This book is more specifically intended for readers that wish to gain an overview of the application of formal methods in the design of distributed systems. Master’s and PhD students, as well as engineers in industry, will find a global understanding of the techniques as well as references to the most up-to-date works in this area.Table of ContentsForeword 9 Claude GIRAULT Chapter 1. Introduction 17 Serge HADDAD, Fabrice KORDON, Laurent PAUTET and Laure PETRUCCI FIRST PART. FORMAL MODELS FOR DISTRIBUTED SYSTEMS 21 Chapter 2. Introduction to Formal Models 23 Laure PETRUCCI 2.1.Motivation 23 2.2.Semi-formalmodels 24 2.3.Formal models 27 2.4.After specification, verification 35 2.5. Outline of Part I 37 2.6.Bibliography 37 Chapter 3. Specification and Design Approaches 41 Christine CHOPPY and Laure PETRUCCI 3.1. Introduction 41 3.2.Criteria for developing specifications 42 3.3. Specification development methodologies 50 3.4.Conclusion 60 3.5.Bibliography 60 Chapter 4. Modeling Time 63 Béatrice BÉRARD 4.1. Introduction 63 4.2.Semantics of timed models 65 4.3.Classical timed models 68 4.4.Specification of timing requirements 85 4.5.Conclusion 90 4.6.Bibliography 90 Chapter 5. Architecture Description Languages 97 Pascal POIZAT and Thomas VERGNAUD 5.1. Introduction 97 5.2.Concepts 100 5.3.Formal ADLs 109 5.4.ADLs for actual implementation 117 5.5.Conclusion 130 5.6.Bibliography 130 SECOND PART. VERIFICATION TECHNIQUES FOR DISTRIBUTED SYSTEMS 135 Chapter 6. Introduction to Verification 137 Serge HADDAD 6.1. Introduction 137 6.2.Formal models for verification 138 6.3.Expression of properties 141 6.4. Verification methods 144 6.5. Outline of Part 2 151 6.6.Bibliography 151 Chapter 7. Verification of Finite-State Systems 155 Jean-François PRADAT-PEYRE and Yann THIERRY-MIEG 7.1. Introduction 155 7.2. Petri net definition 156 7.3.Structural approaches 158 7.4.Formal verification by model-checking 183 7.5.Classification of model-checking approaches 191 7.6.Decision diagram-based approaches 194 7.7.Partial order reductions 203 7.8. Reductions exploiting symmetry 212 7.9.Conclusion 214 7.10.Bibliography 215 Chapter 8. Verification of Infinite-State Systems 221 Stéphane DEMRI and Denis POITRENAUD 8.1. Introduction 221 8.2. Counter systems 225 8.3.Recursive Petri nets 233 8.4. Presburger arithmetic as symbolic representation 250 8.5.Concludingremarks 263 8.6.Bibliography 263 Chapter 9. Verification of Timed Systems 271 Pierre-Alain REYNIER 9.1. Introduction 271 9.2.Construction of the region graph 273 9.3.Handling infinite abstractions 284 9.4.Robustness issues in timed systems 293 9.5.Conclusion 303 9.6.Bibliography 303 Chapter 10. Distributed Control 307 Claude DUTHEILLET, Isabelle MOUNIER and Nathalie SZNAJDER 10.1. Introduction 307 10.2. Decentralized Control 311 10.3. Controller synthesis for distributed systems 323 10.4. Multi-player games 339 10.5.Conclusion 346 10.6.Bibliography 346 List of Authors 353 Index 355
£128.66
ISTE Ltd and John Wiley & Sons Inc Algorithms and Ordering Heuristics for
Book SynopsisDisCSP (Distributed Constraint Satisfaction Problem) is a general framework for solving distributed problems arising in Distributed Artificial Intelligence. A wide variety of problems in artificial intelligence are solved using the constraint satisfaction problem paradigm. However, there are several applications in multi-agent coordination that are of a distributed nature. In this type of application, the knowledge about the problem, that is, variables and constraints, may be logically or geographically distributed among physical distributed agents. This distribution is mainly due to privacy and/or security requirements. Therefore, a distributed model allowing a decentralized solving process is more adequate to model and solve such kinds of problem. The distributed constraint satisfaction problem has such properties. Contents Introduction Part 1. Background on Centralized and Distributed Constraint Reasoning 1. Constraint Satisfaction Problems 2. Distributed Constraint Satisfaction Problems Part 2. Synchronous Search Algorithms for DisCSPs 3. Nogood Based Asynchronous Forward Checking (AFC-ng) 4. Asynchronous Forward Checking Tree (AFC-tree) 5. Maintaining Arc Consistency Asynchronously in Synchronous Distributed Search Part 3. Asynchronous Search Algorithms and Ordering Heuristics for DisCSPs 6. Corrigendum to “Min-domain Retroactive Ordering for Asynchronous Backtracking” 7. Agile Asynchronous BackTracking (Agile-ABT) Part 4. DisChoco 2.0: A Platform for Distributed Constraint Reasoning 8. DisChoco 2.0 9. Conclusion About the Authors Mohamed Wahbi is currently an associate lecturer at Ecole des Mines de Nantes in France. He received his PhD degree in Computer Science from University Montpellier 2, France and Mohammed V University-Agdal, Morocco in 2012 and his research focused on Distributed Constraint Reasoning.Table of ContentsPREFACE ix INTRODUCTION xiii PART 1. BACKGROUND ON CENTRALIZED AND DISTRIBUTED CONSTRAINT REASONING 1 CHAPTER 1. CONSTRAINT SATISFACTION PROBLEMS 3 1.1. Centralized constraint satisfaction problems 3 1.3. Summary 28 CHAPTER 2. DISTRIBUTED CONSTRAINT SATISFACTION PROBLEMS 29 2.1. Distributed constraint satisfaction problems 29 2.2. Methods for solving DisCSPs 36 2.3. Summary 47 PART 2. SYNCHRONOUS SEARCH ALGORITHMS FOR DISCSPS 49 CHAPTER 3. NOGOOD-BASED ASYNCHRONOUS FORWARD CHECKING (AFC-NG) 51 3.1. Introduction 51 3.2. Nogood-based asynchronous forward checking 53 3.3. Correctness proofs 59 3.4. Experimental evaluation 60 3.5. Summary 68 CHAPTER 4. ASYNCHRONOUS FORWARD-CHECKING TREE (AFC-TREE) 69 4.1. Introduction 69 4.2. Pseudo-tree ordering 70 4.3. Distributed depth-first search tree construction 72 4.4. The AFC-tree algorithm 75 4.5. Correctness proofs 79 4.6. Experimental evaluation 79 4.7. Other related works 85 4.8. Summary 86 CHAPTER 5. MAINTAINING ARC CONSISTENCY ASYNCHRONOUSLY IN SYNCHRONOUS DISTRIBUTED SEARCH 87 5.1. Introduction 87 5.2. Maintaining arc consistency 88 5.3. Maintaining arc consistency asynchronously 89 5.4. Theoretical analysis 94 5.5. Experimental results 95 5.6. Summary 99 PART 3. ASYNCHRONOUS SEARCH ALGORITHMS AND ORDERING HEURISTICS FOR DISCSPS 101 CHAPTER 6. CORRIGENDUM TO “MIN-DOMAIN RETROACTIVE ORDERING FOR ASYNCHRONOUS BACKTRACKING” 103 6.1. Introduction 103 6.2. Background 104 6.3. ABT_DO-Retro may not terminate 106 6.4. The right way to compare orders 108 6.5. Summary 110 CHAPTER 7. AGILE ASYNCHRONOUS BACKTRACKING (AGILE-ABT) 111 7.1. Introduction 111 7.2. Introductory material 113 7.3. The algorithm 117 7.4. Correctness and complexity 120 7.5. Experimental results 123 7.6. Related works 129 7.7. Summary 130 PART 4. DISCHOCO 2.0: A PLATFORM FOR DISTRIBUTED CONSTRAINT REASONING 131 CHAPTER 8. DISCHOCO 2.0 133 8.1. Introduction 133 8.2. Architecture 134 8.3. Using DisChoco 2.0 137 8.4. Experimentations 140 8.5. Conclusion 142 CONCLUSIONS 143 BIBLIOGRAPHY 147 INDEX 157
£125.06
ISTE Ltd and John Wiley & Sons Inc Real-time Systems Scheduling 1: Fundamentals
Book SynopsisReal-time systems are used in a wide range of applications, including control, sensing, multimedia, etc. Scheduling is a central problem for these computing/communication systems since responsible of software execution in a timely manner. This book provides state of knowledge in this domain with special emphasis on the key results obtained within the last decade. This book addresses foundations as well as the latest advances and findings in Real-Time Scheduling, giving all references to important papers. But nevertheless the chapters will be short and not overloaded with confusing details. Coverage includes scheduling approaches for mono-core as well as multi-core platforms, dependent tasks, networks, and notably very tremendous recent advances in scheduling of energy constrained embedded systems. Other sophisticated issues such as feedback control scheduling and timing analysis of critical applications are also addressed. This volume can serve as a textbook for courses on the topic in bachelor and in more advanced master programs. It also provides a reference for computer scientists and engineers involved in the design or the development of Cyber-Physical Systems which require up-to-date real-time scheduling solutions.Table of ContentsPREFACE xi LIST OF FIGURES xv LIST OF TABLES xxi CHAPTER 1. INTRODUCTION TO REAL-TIME SCHEDULING 1 Emmanuel GROLLEAU 1.1. Real-time systems 1 1.2. Material architectures 5 1.2.1. CPUs 5 1.2.2. Communication networks 7 1.2.3. Sensors and actuators 9 1.3. Operating systems 9 1.3.1. Generalities 10 1.3.2. Real-time operating systems 10 1.3.3. Primitives provided by the kernel 12 1.4. Scheduling 14 1.4.1. Online and offline scheduling 14 1.4.2. Task characterization 16 1.4.3. Criticality 19 1.4.4. Metrics related to scheduling 20 1.4.5. Practical factors 22 1.4.6. Multi-core scheduling 27 1.5. Real-time application modeling and analysis 30 1.5.1. Modeling 30 1.5.2. Analysis 31 1.6. System architecture and schedulability 34 CHAPTER 2. UNIPROCESSOR ARCHITECTURE SOLUTIONS 39 Laurent GEORGE and Jean-François HERMANT 2.1. Introduction 40 2.2. Characterization of a scheduling problem 42 2.2.1. Task model 42 2.2.2. Temporal constraint models 45 2.2.3. Scheduling model 46 2.2.4. Concepts and notations 50 2.3. Scheduling algorithms/optimality 52 2.3.1. FP fixed-job priority algorithms 52 2.3.2. JFP algorithms 55 2.3.3. Dynamic priority algorithms 57 2.4. Busy periods and worst-case scenarios 58 2.4.1. Busy periods 58 2.4.2. Worst-case scenarios 60 2.5. Feasibility conditions 66 2.5.1. FP feasibility conditions 66 2.5.2. JFP feasibility conditions 70 2.6. Sensitivity analysis 75 2.6.1. Sensitivity of WCETs 78 2.6.2. Sensitivity of periods 88 2.6.3. Sensitivity of deadlines 90 2.7. Conclusion 95 2.8. Bibliography 97 CHAPTER 3. MULTIPROCESSOR ARCHITECTURE SOLUTIONS 105 Joël GOOSSENS and Pascal RICHARD 3.1. Introduction 105 3.1.1. Application modeling 106 3.1.2. Platform modeling 108 3.2. Scheduler classification 108 3.2.1. Online and offline schedulers 108 3.2.2. Task preemption and migration 109 3.2.3. Priorities of tasks 111 3.2.4. Classification 111 3.3. Properties of schedulers 111 3.3.1. Qualitative properties 112 3.3.2. Quantitative properties 117 3.4. Partitioned scheduling 121 3.4.1. Partitioning algorithms 121 3.4.2. Evaluation of partitioning algorithms 126 3.5. Global scheduling 131 3.5.1. Proportionate fair algorithms 132 3.5.2. Generalization of uniprocessor scheduling algorithms 142 3.6. Conclusion 143 3.7. Bibliography 143 CHAPTER 4. SYNCHRONIZATIONS: SHARED RESOURCE ACCESS PROTOCOLS 149 Serge MIDONNET and Frédéric FAUBERTEAU 4.1. Introduction 150 4.2. Terminology and notations 150 4.2.1. Diagrams 152 4.2.2. Synchronization protocols 153 4.3. Synchronization problems 160 4.3.1. Unbounded priority inversion 160 4.3.2. Deadlock 166 4.3.3. Chained blocking 172 4.4. Calculating the blocking factor 177 4.4.1. The case of uniprocessor architectures 177 4.4.2. The case of multiprocessor architectures 180 4.5. Conclusion 187 4.6. Bibliography 188 CHAPTER 5. ESTIMATION OF EXECUTION TIME AND DELAYS 193 Claire MAIZA, Pascal RAYMOND and Christine ROCHANGE 5.1. Worst-case execution time analysis: an example 195 5.1.1. Embedded system architecture analysis 197 5.1.2. Execution path analysis 206 5.2. Going further 211 5.2.1. Multi-task: the cost of preemption 211 5.2.2. Multi-core and other complex architectures 215 5.2.3. Influence of critical embedded systems design methods 218 5.2.4. Tools 224 5.3. Conclusion 225 5.4. Bibliography 225 CHAPTER 6. OPTIMIZATION OF ENERGY CONSUMPTION 231 Cécile BELLEUDY 6.1. Introduction 232 6.2. State of the art 235 6.2.1. General comments 235 6.2.2. Modeling the consumption of an operating system 237 6.2.3. Consumption management strategies within multicore systems 238 6.3. Modeling consumption 242 6.3.1. Characterization platform: hardware and software 242 6.3.2. Power consumption modeling 243 6.3.3. Context switch 244 6.3.4. Inter-process communication 247 6.4. Low consumption scheduling 249 6.4.1. Simulation environment 250 6.4.2. Low power consumption scheduling policy 251 6.5. Experimental results 255 6.5.1. Application test: H.264 decoder 255 6.5.2. Analysis of the simulation results 258 6.6. Conclusion 262 6.7. Bibliography 262 LIST OF AUTHORS 269 INDEX 271 SUMMARY OF VOLUME 2 275
£125.06
ISTE Ltd and John Wiley & Sons Inc Real-time Systems Scheduling 2: Focuses
Book SynopsisReal-time systems are used in a wide range of applications, including control, sensing, multimedia, etc. Scheduling is a central problem for these computing/communication systems since it is responsible for software execution in a timely manner. This book, the second of two volumes on the subject, brings together knowledge on specific topics and discusses the recent advances for some of them. It addresses foundations as well as the latest advances and findings in real-time scheduling, giving comprehensive references to important papers, but the chapters are short and not overloaded with confusing details. Coverage includes scheduling approaches for networks and for energy autonomous systems. Other sophisticated issues, such as feedback control scheduling and probabilistic scheduling, are also addressed. This book can serve as a textbook for courses on the topic in bachelor's degrees and in more advanced master's degree programs. It also provides a reference for computer scientists and engineers involved in the design or the development of Cyber-Physical Systems which require up-to-date real-time scheduling solutions.Table of ContentsPREFACE xi LIST OF FIGURES xv LIST OF TABLES xix CHAPTER 1. SCHEDULING IN ENERGY AUTONOMOUS OBJECTS 1Maryline CHETTO CHAPTER 2. PROBABILISTIC SCHEDULING 29Liliana CUCU-GROSJEAN, Adriana GOGONEL and Dorin MAXIM CHAPTER 3. CONTROL AND SCHEDULING JOINT DESIGN 53Daniel SIMON, Ye-Qiong SONG and Olivier SENAME CHAPTER 4. SYNCHRONOUS APPROACH AND SCHEDULING 97Yves SOREL and Dumitru POTOP-BUTUCARU CHAPTER 5. INDUCTIVE APPROACHES FOR PACKET SCHEDULING IN COMMUNICATION NETWORKS 151Malika BOURENANE and Abdelhamid MELLOUK CHAPTER 6. SCHEDULING IN NETWORKS 195Ye-Qiong SONG CHAPTER 7. FOCUS ON AVIONICS NETWORKS 217Jean-Luc SCHARBARG and Christian FRABOUL LIST OF AUTHORS 247 INDEX 249 SUMMARY OF VOLUME 1 251
£125.06
ISTE Ltd and John Wiley & Sons Inc Metaheuristics for Logistics
Book SynopsisThis book describes the main classical combinatorial problems that can be encountered when designing a logistics network or driving a supply chain. It shows how these problems can be tackled by metaheuristics, both separately and using an integrated approach. A huge number of techniques, from the simplest to the most advanced ones, are given for helping the reader to implement efficient solutions that meet its needs. A lot of books have been written about metaheuristics (methods for solving hard optimization problems) and supply chain management (the field in which we find a huge number of combinatorial optimization problems) in the last decades. So, the main reason of this book is to describe how these methods can be implemented for this class of problems.Table of ContentsIntroduction xi Part 1. Basic Notions 1 Chapter 1. Introductory Problems 3 1.1. The “swing states” problem 3 1.2. Adel and his camels 5 1.3. Sauron’s forges 7 1.3.1. Problem 1: The inspection of the forges 8 1.3.2. Problem 2: The production of the deadly weapon 9 Chapter 2. A Review of Logistic Problems 13 2.1. Some history 13 2.1.1. The Fermat–Torricelli point 13 2.1.2. The Monge problem 14 2.1.3. The Seven Bridges of Königsberg and the Icosian Game 15 2.2. Some polynomial problems 16 2.2.1. The assignment problem 16 2.2.2. The transportation problem 17 2.2.3. The Minimum-Cost Spanning Tree problem 19 2.3. Packing problems 20 2.3.1. The knapsack problem 20 2.3.2. The bin packing problem 21 2.4. Routing problems 22 2.4.1. The traveling salesman problem 23 2.4.2. The vehicle routing problem (VRP) 24 2.5. Production scheduling problems 24 2.5.1. The flow-shop scheduling problem (FSSP)26 2.5.2. The job-shop scheduling problem (JSSP) 29 2.6. Lot-sizing problems 31 2.7. Facility location problems 33 2.7.1. The Uncapacitated Plant Location Problem (UPLP) 33 2.7.2. The Dynamic Location Problem (DLP) 35 2.8. Conclusion 36 Chapter 3. An Introduction to Metaheuristics 37 3.1. Optimization problems 37 3.2. Metaheuristics: basic notions 39 3.2.1. Intensification and diversification 40 3.2.2. Neighborhood systems 40 3.3. Individual-based metaheuristics 41 3.3.1. Local search 41 3.3.2. Simulated annealing 44 3.3.3. The kangaroo Algorithm 46 3.3.4. Iterated local search 48 3.3.5. Tabu Search 49 3.4. Population-based metaheuristics 50 3.4.1. Evolutionary algorithms 51 3.4.2. The ant colony algorithm 52 3.4.3. Particle Swarm Optimization 53 3.5. Conclusion 55 Chapter 4. A First Implementation of Metaheuristics 57 4.1. Representing a list of objects 57 4.2. The implementation of a local search 59 4.2.1. The construction of an initial solution 59 4.2.2. Description of basic moves 60 4.2.3. The implementation of stochastic descent (LS) 62 4.3. The implementation of individual-based metaheuristics 64 4.3.1. Simulated annealing (SA) 64 4.3.2. Iterated local search (ILS) 66 4.14. Conclusion 66 Part 2. Advanced Notions 69 Chapter 5. The Traveling Salesman Problem 71 5.1. Representing a solution: the two-level tree structure 71 5.2. Constructing initial solutions 74 5.2.1. A greedy heuristic: nearest neighbor 74 5.2.2. A simplification heuristic: the Christofides algorithm 76 5.3. Neighborhood systems 78 5.3.1. The Lin & Kernighan neighborhood 79 5.3.2. Ejection chain techniques 83 5.4. Some results 86 5.5. Conclusion 88 Chapter 6. The Flow-Shop Problem 89 6.1. Representation and assessment of a solution 89 6.2. Construction of the initial solution 90 6.2.1. Simplification heuristics: CDS 91 6.2.2. A greedy heuristic: NEH 94 6.3. Neighborhood systems 97 6.3.1. Improvement of the insertion movements 98 6.3.2. Variable-depth neighborhood search 101 6.4. Results 107 6.5. Conclusion 107 Chapter 7. Some Elements for Other Logistic Problems 109 7.1. Direct representation versus indirect representation 109 7.2. Conditioning problems 111 7.2.1. The knapsack problem 111 7.2.2. The bin-packing problem 112 7.3. Lot-sizing problems 114 7.4. Localization problems 115 7.5. Conclusion 117 Part 3. Evolutions and Current Trends 119 Chapter 8. Supply Chain Management 121 8.1. Introduction to supply chain management 121 8.2. Horizontal synchronization of the supply chain 122 8.2.1. The beer game 123 8.2.2. The bullwhip effect 125 8.3. Vertical synchronization of a supply chain 126 8.4. An integral approach of the supply chain 127 8.5. Conclusion 129 Chapter 9. Hybridization and Coupling Using Metaheuristics 131 9.1. Metaheuristics for the optimization of the supply chain 131 9.2. Hybridization of optimization methods 133 9.2.1. Classification of hybrid methods 133 9.2.2. Illustration by example 134 9.2.3. “Metaheuristic/local search” hybridization 135 9.2.4. Metaheuristic hybridization/Exact Methods 135 9.3. Coupling of optimization methods and performance evaluations 138 9.3.1. Double complexity 138 9.3.2. Coupling of optimization method/simulation model 139 9.4. Conclusion 141 Chapter 10. Flexible Manufacturing Systems 143 10.1. Introduction to the FMS challenges 143 10.2. The job-shop problem with transport 145 10.2.1. Definition of the problem 145 10.3. Proposal for a metaheuristic/simulation coupling 148 10.3.1. Representation of a solution 148 10.3.2. Simulation method 149 10.3.3. Optimization method 152 10.3.4. Results 153 10.4. Workshop layout problem 154 10.4.1. Aggregated model and exact resolution 154 10.4.2. Detailed model and approximate solutions 157 10.5. Conclusion 159 Chapter 11. Synchronization Problems Based on Vehicle Routings 161 11.1. Inventory routing problem 162 11.1.1. Presentation of the problem 162 11.1.2. Resolution by metaheuristics 166 11.2. The location-routing problem 167 11.2.1. Definition of the problem 167 11.2.2. Solution with metaheuristics 171 11.3. Conclusion 172 Chapter 12. Solution to Problems 173 12.1. The swing state problem 173 12.2. Adel and his camels 176 12.2.1. First question 176 12.2.2. Second question 177 12.2.3. Third question 180 12.3. The forges of Sauron 180 12.3.1. The inspection of the forges 180 12.3.2. Production of the lethal weapon 183 Conclusion 185 Bibliography 187 Index 197
£125.06
ISTE Ltd and John Wiley & Sons Inc Metaheuristics for Intelligent Electrical
Book SynopsisIntelligence is defined by the ability to optimize, manage and reconcile the currents of physical, economic and even social flows. The strong constraint of immediacy proves to be an opportunity to imagine, propose and deliver solutions on the common basis of optimization techniques. Metaheuristics for Intelligent Electrical Networks analyzes the use of metaheuristics through independent applications but united by the same methodology.Table of ContentsIntroduction xi Chapter 1 Single Solution Based Metaheuristics 1 1.1 Introduction 1 1.2 The descent method 2 1.3 Simulated annealing 3 1.4 Microcanonical annealing 4 1.5 Tabu search 6 1.6 Pattern search algorithms 6 1.6.1 The GRASP method 7 1.6.2 Variable neighborhood search 8 1.6.3 Guided local search 10 1.6.4 Iterated local search 11 1.7 Other methods 12 1.7.1 The Nelder–Mead simplex method 13 1.7.2 The noising method 14 1.7.3 Smoothing methods 15 1.8 Conclusion 16 Chapter 2 Population-based Methods 17 2.1 Introduction 17 2.2 Evolutionary algorithms 18 2.2.1 Genetic algorithms 18 2.2.2 Evolution strategies 20 2.2.3 Coevolutionary algorithms 21 2.2.4 Cultural algorithms 21 2.2.5 Differential evolution 23 2.2.6 Biogeography-based optimization 25 2.2.7 Hybrid metaheuristic based on Bayesian estimation 27 2.3 Swarm intelligence 29 2.3.1 Particle Swarm Optimization 29 2.3.2 Ant colony optimization 32 2.3.3 Cuckoo search 35 2.3.4 The firefly algorithm 36 2.3.5 The fireworks algorithm 38 2.4 Conclusion 42 Chapter 3 Performance Evaluation of Metaheuristics 43 3.1 Introduction 43 3.2 Performance measures 44 3.2.1 Quality of solutions 44 3.2.2 Computational effort 45 3.2.3 Robustness 46 3.3 Statistical analysis 46 3.3.1 Data description 47 3.3.2 Statistical tests 48 3.4 Literature benchmarks 49 3.4.1 Characteristics of a test function 49 3.4.2 Test functions 50 3.5 Conclusion 58 Chapter 4 Metaheuristics for FACTS Placement and Sizing 59 4.1 Introduction 59 4.2 FACTS devices 61 4.2.1 The SVC 62 4.2.2 The STATCOM 63 4.2.3 The TCSC 63 4.2.4 The UPFC 63 4.3 The PF model and its solution 64 4.3.1 The PF model 64 4.3.2 Solution of the network equations 66 4.3.3 FACTS implementation and network modification 69 4.3.4 Formulation of FACTS placement problem as an optimization issue 69 4.4 PSO for FACTS placement 72 4.4.1 Solutions coding 73 4.4.2 Binary particle swarm optimization 75 4.4.3 Proposed Lévy-based hybrid PSO algorithm 82 4.4.4 “Hybridization” of continuous and discrete PSO algorithms for application to the positioning and sizing of FACTS 99 4.5 Application to the placement and sizing of two FACTS 100 4.5.1 Application to the 30-node IEEE network 103 4.5.2 Application to the IEEE 57-node network 104 4.5.3. Significance of the modified velocity likelihoods method 109 4.5.4 Influence of the upper and lower bounds on the velocity Vciof particles ci 111 4.5.5 Optimization of the placement of several FACTS of different types (general case) 115 4.6 Conclusion 118 Chapter 5 Genetic Algorithm-based Wind Farm Topology Optimization 121 5.1 Introduction 121 5.2 Problem statement 122 5.2.1 Context 122 5.2.2 Calculation of power flow in wind turbine connection cables 125 5.3 Genetic algorithms and adaptation to our problem 129 5.3.1 Solution encoding 129 5.3.2 Selection operator 131 5.3.3 Crossover 132 5.3.4 Mutation 135 5.4 Application 137 5.4.1 Application to farms of 15–20 wind turbines 140 5.4.2 Application to a farm of 30 wind turbines 140 5.4.3 Solution of a farm of 30 turbines proposed by human expertise 144 5.4.4 Validation 145 5.5 Conclusion 145 Chapter 6 Topological Study of Electrical Networks 149 6.1 Introduction 149 6.2 Topological study of networks 150 6.2.1 Random graphs 151 6.2.2 Generalized random graphs 151 6.2.3 Small-world networks 152 6.2.4 Scale-free networks 152 6.2.5 Some results inspired by the theory of percolation 153 6.2.6 Network dynamic robustness 160 6.3 Topological analysis of the Colombian electrical network 161 6.3.1 Phenomenological characteristics 161 6.3.2 Fractal dimension 169 6.3.3 Network robustness 179 6.4 Conclusion 182 Chapter 7. Parameter Estimation of α-Stable Distributions 183 7.1 Introduction 183 7.2 Lévy probability distribution 184 7.2.1 Definitions 184 7.2.2 McCulloch α-stable distribution generator 189 7.3 Elaboration of our non-parametric α-stable distribution estimator 191 7.3.1 Statistical tests 192 7.3.2 Identification of the optimization problem and design of the non-parametric estimator 195 7.4 Results and comparison with benchmarks 197 7.4.1 Validation with benchmarks 197 7.4.2 Parallelization of the process on a GP/GPU card 211 7.5 Conclusion 220 Chapter 8 SmartGrid and MicroGrid Perspectives 221 8.1 New SmartGrid concepts 221 8.2 Key elements for SmartGrid deployment 224 8.2.1 Improvement of network resilience in the face of catastrophic climate events 225 8.2.2 Increasing electrical network efficiency 227 8.2.3 Integration of the variability of renewable energy sources 229 8.3 SmartGrids and components technology architecture 231 8.3.1 Global SmartGrid architecture 231 8.3.2 Basic technological elements for SmartGrids 232 8.3.3 Integration of new MicroGrid layers: definition 235 Appendix 1 241 Appendix 2 245 Bibliography 251 Index 265
£125.06
ISTE Ltd and John Wiley & Sons Inc Metaheuristics for Vehicle Routing Problems
Book SynopsisThis book is dedicated to metaheuristics as applied to vehicle routing problems. Several implementations are given as illustrative examples, along with applications to several typical vehicle routing problems. As a first step, a general presentation intends to make the reader more familiar with the related field of logistics and combinatorial optimization. This preamble is completed with a description of significant heuristic methods classically used to provide feasible solutions quickly, and local improvement moves widely used to search for enhanced solutions. The overview of these fundamentals allows appreciating the core of the work devoted to an analysis of metaheuristic methods for vehicle routing problems. Those methods are exposed according to their feature of working either on a sequence of single solutions, or on a set of solutions, or even by hybridizing metaheuristic approaches with others kind of methods.Table of ContentsNotations and Abbreviations ix Introduction xiii Chapter 1. General Presentation of Vehicle Routing Problems 1 1.1. Logistics management and combinatorial optimization 1 1.1.1. History of logistics 2 1.1.2. Logistics as a science 5 1.1.3. Combinatorial optimization 5 1.2. Vehicle routing problems 6 1.2.1. Problems in transportation optimization 6 1.2.2. Vehicle routing problems in other contexts 7 1.2.3. Characteristics of vehicle routing problems 7 1.2.4. The capacitated vehicle routing problem 11 1.3. Conclusion 13 Chapter 2. Simple Heuristics and Local Search Procedures 15 2.1. Simple heuristics 16 2.1.1. Constructive heuristics 16 2.1.2. Two-phase methods 19 2.1.3. Best-of approach and randomization 22 2.2. Local search 23 2.2.1. Principle 23 2.2.2. Classical moves 24 2.2.3. Feasibility tests 25 2.2.4. General approach from Vidal et al 28 2.2.5. Multiple neighborhoods 30 2.2.6. Very constrained problems 33 2.2.7. Acceleration techniques 33 2.2.8. Complex moves 36 2.3. Conclusion 37 Chapter 3. Metaheuristics Generating a Sequence of Solutions 39 3.1. Simulated annealing (SA) 39 3.1.1. Principle 39 3.1.2. Simulated annealing in vehicle routing problems 40 3.2. Greedy randomized adaptive search procedure: GRASP 41 3.2.1. Principle 41 3.2.2. GRASP in vehicle routing problems 43 3.3. Tabu search 44 3.3.1. Principle 44 3.3.2. Tabu search in vehicle routing problems 45 3.4. Variable neighborhood search 47 3.4.1. Principle 47 3.4.2. Variable neighborhood search in vehicle routing problems 49 3.5. Iterated local search 50 3.5.1. Principle 50 3.5.2. Iterated local search in vehicle routing problems 52 3.6. Guided local search 54 3.6.1. Principle 54 3.6.2. Guided local search in vehicle routing problems 55 3.7. Large neighborhood search 56 3.7.1. Principle 56 3.7.2. Large neighborhood search in vehicle routing problems 58 3.8. Transitional forms 59 3.8.1. Evolutionary local search principle 59 3.8.2. Application to vehicle routing problems 60 3.9. Selected examples 61 3.9.1. GRASP for the location-routing problem 61 3.9.2. Granular tabu search for the CVRP 65 3.9.3. Adaptive large neighborhood search for the pickup and delivery problem with time windows 69 3.10. Conclusion 74 Chapter 4. Metaheuristics Based on a Set of Solutions 77 4.1. Genetic algorithm and its variants 77 4.1.1. Genetic algorithm 77 4.1.2. Memetic algorithm 79 4.1.3. Memetic algorithm with population management 79 4.1.4. Genetic algorithm and its variants in vehicle routing problems 80 4.2. Scatter search 82 4.2.1. Scatter search principle 82 4.2.2. Scatter search in vehicle routing problems 83 4.3. Path relinking 83 4.3.1. Principle 84 4.3.2. Path relinking in vehicle routing problems 85 4.4. Ant colony optimization 86 4.4.1. Principle 86 4.4.2. ACO in vehicle routing problems 89 4.5. Particle swarm optimization 89 4.5.1. Principle 89 4.5.2. PSO in vehicle routing problems 90 4.6. Other approaches and their use in vehicle routing problems 91 4.7. Selected examples 92 4.7.1. Scatter search for the periodic capacitated arc routing problem 92 4.7.2. PR for the muti-depot periodic VRP 97 4.7.3. Unified genetic algorithm for a wide class of vehicle routing problems 101 4.8. Conclusion 106 Chapter 5. Metaheuristics Hybridizing Various Components 109 5.1. Hybridizing metaheuristics 109 5.1.1. Principle 110 5.1.2. Application to vehicle routing problems 111 5.1.3. Selected examples 112 5.2. Matheuristics 122 5.2.1. Principle 123 5.2.2. Application to vehicle routing problems 124 5.2.3. Selected examples 128 5.3. Conclusion 144 Conclusion 145 Bibliography 149 Index 167
£125.06
ISTE Ltd and John Wiley & Sons Inc Memory and Action Selection in Human-Machine
Book SynopsisThe first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how synchronization between conscious processes and unconscious processes is established for a sense of smoothness, and how memory processes and action selection processes are coordinated. The first half this book describes the theory in detail. The book begins by outlining the whole view of the theory consisting of action selection processes and memorization processes, and their interactions. Then, a detailed description for action selection processes theorized as a nonlinear dynamic human behavior model with real-time constraints is provided, followed by a description for memorization processes. Also, implications of the theory to human–machine interactions are discussed. The second goal of this book is to provide a methodology to study how Two Minds works in practice when people use interactive systems. The latter half of this book describes theory practices in detail. A new methodology called Cognitive Chrono-Ethnography (CCE) is introduced, which adds the time dimension to Hutchins’ Cognitive Ethnography, in order to practice "know the users" systematically by designing user studies based on a simulation of users’ mental operations controlled by Two Minds. The author then shows how CCE has been applied to understanding the ways in which people navigate in real physical environments by walking and by car, respectively, and explores the possibility of applying CCE to predict people’s future needs. This is not for understanding how people use interfaces at present but to predict how people want to use the interfaces in the future given they are currently using them in a certain way Finally, the book concludes by describing implications of human–machine interactions that are carried out while using modern artefacts for people's cognitive development from birth, on the basis of the theories of action selection and memorization.Table of ContentsIntroduction ix Part 1. Theoretical Foundation for Dealing with Action Selection and Memorization 1 Chapter 1. A Unified Theory of Action Selection and Memory 3 1.1. Organic self-consistent field theory 3 1.1.1. Self-consistent field theory in physics 3 1.1.2. “Organic” SCFT 4 1.1.3. Human beings considered in O-SCFT 4 1.1.4. Scale mix 5 1.2. Development of brain architecture model under the NDHBmodel/RT 6 1.2.1. O-PDP 6 1.2.2. The guideline for architecture selection 6 1.2.3. Development of cross-networks of neurons in the brain 7 Chapter 2. NDHB-Model/RT: Nonlinear Dynamic Human Behavior Model with Realtime Constraints 11 2.1. Maximum satisfaction architecture 11 2.1.1. Happiness goals 11 2.1.2. Society layers 12 2.1.3. Brain layers 12 2.1.4. Conditions to make people feel satisfaction 15 2.2. Brain information hydrodynamics 16 2.2.1. The time axis is central to information flow 17 2.2.2. Cerebrum formation process 17 2.2.3. Information flows in the brain 19 2.2.4. Emergence of emotion in BIH 20 2.2.5. Biorhythm of information flow 21 2.2.6. Role of language 21 2.2.7. Multiple personality disorder 21 2.3. Structured meme theory 22 2.3.1. Meme 22 2.3.2. Memes propagate by means of resonance 23 2.3.3. Characteristics of meme propagation 24 2.4. NDHB-model/RT 25 2.5. MHP/RT: Model human processor with real-time constraints 27 2.5.1. MHP/RT’s basic flow 28 2.5.2. Basic MHP/RT behaviors 30 2.6. Two Minds and emotions 36 2.6.1. Dynamics of consciousness–emotion interaction: an explanation by MHP/RT 37 2.6.2. Taxonomy of emotions: behavioral perspective 40 Chapter 3. Layered-structure of Memory and its Development 43 3.1. MHP/RT modules and their associated memories 43 3.1.1. Memory formation process 45 3.1.2. MD memory frames 46 3.1.3. Memory functions via resonance 49 3.1.4. Memory operates in pipelining 49 3.2. Hierarchical structure of human action selection 51 3.2.1. Three-layered structure of interneurons system 51 3.2.2. Formation process 51 3.3. Emotion initiation via memory processes 54 Chapter 4. Implication for Human–Machine Interaction: Autonomous System Interaction Design (ASID) based on NDHB-Model/RT 57 4.1. Users modeled by MHP/RT with MD memory frames 57 4.2. Autonomous systems versus linear systems 58 4.2.1. Linear systems 58 4.2.2. Autonomous systems 60 4.3. Needs that a society of information systems must meet 60 4.4. Outline of ASI 61 4.5. Conclusions 62 Part 2. Theoretically Motivated Methodology for Understanding Users 65 Chapter 5. Cognitive Chrono-ethnography 67 5.1. Understanding people’s behavior in real life 67 5.2. Cognitive chrono-ethnography 69 5.2.1. Requirements for the methodology (CCE) to study human beings’ behavior in real life 69 5.2.2. CCE procedure 70 5.2.3. Behavior selection shaping factors 72 Chapter 6. A CCE Study: Slow Self-paced Navigation 75 6.1. Introduction: navigation in a train station by following signs 75 6.2. Steps 1 and 2 of CCE 76 6.2.1. Attention, planning and working memory 77 6.2.2. An MHP/RT simulation of navigation behavior 78 6.3. Step 3 of CCE: monitor recruiting 82 6.3.1. Investigation of cognitive aging characteristics 82 6.4. Steps 4 and 5 of CCE: monitor behavior observation and individual model construction 83 6.4.1. Train stations, tasks and participants 84 6.4.2. Method 85 6.5. Step 6 of CCE: socioecological model construction 86 6.6. Discussion 87 6.6.1. Two modes of navigation 87 6.6.2. Web navigation 88 6.6.3. Nature of complicated navigation processes 90 6.7. Conclusions 90 Chapter 7. Fast Externally-paced Navigation 93 7.1. Introduction 93 7.2. Steps 1 and 2 of CCE 95 7.2.1. Designing a CCE study 96 7.3. Step 3 of CCE: monitor recruiting 98 7.3.1. Screening 99 7.3.2. Interview for the final selection 100 7.4. Steps 4 and 5 of CCE: monitor behavior observation and individual model construction 100 7.4.1. Data analysis 100 7.4.2. Information necessary for safe and enjoyable driving 102 7.4.3. Examples 103 7.5. Conclusions 105 Chapter 8. Designing for Future Needs 109 8.1. Introduction 109 8.2. Making inaccessible future needs accessible: t-translation invariant principle 110 8.3. A case study of CCE: why do fans repeat visits to the ballpark? 112 8.3.1. Steps 1 and 2 of CCE 112 8.3.2. Step 3 of CCE: monitor recruiting 115 8.3.3. Step 4 of CCE: field observation 115 8.3.4. Step 5 of CCE: conduct retrospective interviews 116 8.3.5. Step 6 of CCE: socioecological model construction 117 8.3.6. Results: developing from a pre-fan to a repeater 120 8.4. Discussion 122 8.4.1. Selection of elite monitors 122 8.4.2. CCE interview 122 8.4.3. Applicability of CCE 123 8.5. Conclusions 124 Conclusion 127 Bibliography 133 Index 137
£125.06
Edward Elgar Publishing Ltd Technology and Anti-Money Laundering: A Systems
Book SynopsisThis insightful book examines the influence of information systems on anti-money laundering (AML). It builds on systems theory in order to develop a coherent theoretical framework that can be used for AML research.By using a case study of a major financial institution in the EU-area, a number of technological influences on AML are deconstructed and are used to examine the role that technology plays within AML. The book provides a systems theoretical description of the effects of technology on AML and offers considerations on the risk-based approach - the most important contemporary evolution within regulatory initiatives on AML and terrorism financing. Technology and Anti-Money Laundering will appeal to researchers of financial crime and AML as well as those interested in information systems and systems theory. A number of considerations for practitioners are also discussed, including the risk-based approach and the integration of AML-technology in financial institutions, as well as an important data-mining application. Money Laundering Reporting Officers (MLROs) in financial institutions and central bankers will also find much of interest in this book.Trade Review‘. . . a stimulating look at the hard work done in many specialisms that collectively seek to combat money laundering.’ -- Sally Ramage, The Criminal Lawyer‘While there is much noise about the control of money laundering, there are few whose work is able to rise above the din and in clear notes contribute in a constructive manner to the debate. This work is not only an intelligent discussion of many of the substantive issues relating to the control of money laundering, but a great deal more. Drawing on systems theory and seeing the control of money laundering particularly from the standpoint of technology as complex and integral to the proper and effective operation of financial institutions, the author addresses in a novel and practical way the design and management of risk based compliance. The theory is tested, not only in terms of viable technology, but also in an actual case study involving real issues in a bank. Consequently, those concerned with the formulation of policy, the design of controls and procedures and the implementation of such will find the contribution that this book makes of great significance.’ -- Barry Rider, Bryan Cave LLP, UK‘This book avoids the usual trap of interminably listing AML war stories. Instead Dr. Demetis presents a solid theoretical foundation for AML research and practice. He gives a damning critique of the way so-called technological solutions are used uncritically by some AML professionals, and analyses the risk-based approach, describing its problems and ways of avoiding them. He presents a fascinating in-depth case study of a financial institution, and a short case of a bank using technology to improve its True Positive Rate substantially to 17 per cent.’ -- Ian Angell, London School of Economics, UK‘Dr Demetis makes a great contribution to our understanding of anti-money laundering at both a systems and practical level. [He] writes as someone who not only thinks deeply about these issues but, as the in-depth case examples show, has tried to see how far technology can address some audacious goals. Readers will learn that while risk-based approaches to anti-money laundering have been an interesting regulatory development, practical implementation, despite the hype of technology vendors, is “still at a primordial state”.’ -- Michael Mainelli, Gresham College and Z/YEN Group, UKTable of ContentsContents: Preface 1. Introduction 2. Introduction to Anti-Money Laundering 3. On Systems Theory 4. The Case Study of Drosia Bank 5. Systems Theory – A Theory for AML 6. The Risk-based Approach and a Risk-based Data-mining Application References Index
£89.30
College Publications A Journey Through the Systems Landscape
£20.42
Taylor & Francis Ltd How to Set Up Information Systems: A
Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index
£123.50
Taylor & Francis Ltd How to Set Up Information Systems: A
Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index
£52.24
ISTE Ltd and John Wiley & Sons Inc Model Driven Engineering for Distributed
Book SynopsisModel-based development methods, and supporting technologies, can provide the techniques and tools needed to address the dilemma between reducing system development costs and time, and developing increasingly complex systems. The Model Driven Architecture (MDA) initiative of the Object Management Group (OMG) is concerned with the development of standards and technologies that enable and support model-based system development. The aim of this book is to provide the information needed to understand and apply MDE (including MDA) approaches to the development of embedded systems. Chapters, written by experts from academia and industry, cover topics relating to MDE practices and methods, as well as emerging MDE technologies. Much of the writing is based on the presentations given at the Summer School 'MDE for Embedded Systems' held at Brest, France, in September 2004.Table of Contents1. Model engineering: from principles to platforms - Jean Bezivin; 2. Model-driven development of distributed real-time and embedded systems - Douglas C. Schmidt; 3. About model-transformations: QVT vs. OCL vs.... - Pierre-Alain Muller; 4. Separating dependability and technology-specific concerns using aspect-oriented modelling techniques - Robert France; 5. Model-driven systems engineering: SysML & the MDSysE approach at THALES - Veronique Normand and Daniel Exertier; 6. Maturity of model driven engineering for embedded control systems from a mechatronic perspective - Martin Torngren; 7. Real time components and contracts - Jean-Marc Jezequel; 8. The THINK component-based operating system - Jean-Philippe Fassino; 9. Model-driven schedulability analysis - Jean-Philippe Babau and Sebastien Gerard; 10. Performance analysis based on the UML SPT profile - Dorina C. Petriu; 11. Embedded code generation - Ivan Porres; 12 - Model-driven architecture for intensive embedded systems - Lossan Bonde, Pierre Boulet, Arnaud Cuccuru, Jean-Luc Dekeyser, Cedric Dumoulin, Philippe Marquet and Michael Samyn; 13. Spidergon: a NoC modeling paradigm - Marcello Coppola.
£128.66
Rosenfeld Media Orchestrating Experiences: Collaborative Design
Book Synopsis
£42.74
Springer Nature Switzerland AG Quantum Technology and Optimization Problems: First International Workshop, QTOP 2019, Munich, Germany, March 18, 2019, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the First International Workshop on Quantum Technology and Optimization Problems, QTOP 2019, held in Munich, Germany, in March 2019.The 18 full papers presented together with 1 keynote paper in this volume were carefully reviewed and selected from 21 submissions. The papers are grouped in the following topical sections: analysis of optimization problems; quantum gate algorithms; applications of quantum annealing; and foundations and quantum technologies.Table of ContentsAnalysis of Optimization Problems.- Quantum Gate Algorithms.- Applications of Quantum Annealing.- Foundations and Quantum Technologies.
£58.49
Springer Nature Switzerland AG High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet
Book SynopsisThis open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.Table of ContentsWhy High-Performance Modelling and Simulation for Big Data Applications Matters.- Parallelization of hierarchical matrix algorithms for electromagnetic scattering problems.- Tail Distribution and Extreme Quantile Estimation using Non-Parametric Approaches.- Towards efficient and scalable data-intensive content delivery: State-of-the-art, issues and challenges.- Big Data in 5G Distributed Applications.- Big Data Processing, Analysis and Applications in Mobile Cellular Networks.- Medical Data Processing and Analysis for Remote Health and Activities Monitoring.- Towards human cell simulation.- Cloud-based High Throughput Virtual Screening in Novel Drug Discovery.- Ultra Wide Band Body Area Networks: Design and integration with Computational Clouds.- Survey on AI-based multimodal methods for emotion detection.- Forecasting Cryptocurrency Value by Sentiment Analysis: An HPC-oriented Survey of the State-of-the-Art in the Cloud Era.
£40.49
Springer Nature Switzerland AG Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405
Book SynopsisThis open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019.Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first. Table of ContentsFoundations of Reversible Computation.- Software and Reversible Systems: A Survey of Recent Activities.- Simulation and Design of Quantum Circuits.- Research on Reversible Functions Having Component Functions with Specified Properties - An Overview.- A Case Study for Reversible Computing: Reversible Debugging.- Towards Choreographic-Based Monitoring.- Reversibility in Chemical Reactions.- Reversible Control of Robots.- Reversible Languages and Incremental State Saving in Optimistic Parallel Discrete Event Simulation.- Reversible Computation in Wireless Communications.- Error Reconciliation in Quantum Key Distribution Protocols.
£31.49
Springer Nature Switzerland AG IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML/PKDD 2020, Ghent,
Book SynopsisThis book constitutes selected papers from the Second International Workshop on IoT Streams for Data-Driven Predictive Maintenance, IoT Streams 2020, and First International Workshop on IoT, Edge, and Mobile for Embedded Machine Learning, ITEM 2020, co-located with ECML/PKDD 2020 and held in September 2020. Due to the COVID-19 pandemic the workshops were held online. The 21 full papers and 3 short papers presented in this volume were thoroughly reviewed and selected from 35 submissions and are organized according to the workshops and their topics: IoT Streams 2020: Stream Learning; Feature Learning; ITEM 2020: Unsupervised Machine Learning; Hardware; Methods; Quantization.Table of ContentsStream Learning.- Feature Learning.- Unsupervised Machine Learning.- Hardware.- Methods.- Quantization.
£67.49