9 results (0,13270 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Certifications of Critical Systems – The CECRIS Experience

Certifications of Critical Systems – The CECRIS Experience

In recent years a considerable amount of effort has been devoted both in industry and academia to the development validation and verification of critical systems i. e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact. Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies processes and tools. The CECRIS project took a step forward in the growing field of development verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities setting guidelines to support engineers during the planning of the verification and validation phases.

GBP 79.99
1

Residential Energy Auditing and Improvement

Mathematical and Computational Modelling of Covid-19 Transmission

Innovation and ICT in Education The Diversity of the 21st Century Classroom

Innovation and ICT in Education The Diversity of the 21st Century Classroom

The adequate integration of information and communication technologies (ICT) in educational and training processes is one of the biggest current challenges in education. The classroom of the present is very different from just a few decades ago new technological tools are completely transforming its characteristics and activities. This internationally authored book offers a timely effective and practical vision of this new educational scenario. The book takes a multidisciplinary approach in looking at the problems and possible solutions that are faced by the educational professional of the 21st century when by necessity or obligation they face the use of ICT in their daily tasks. Divided into two parts one theoretical and another practical this book offers the highlights of the most important lines of research that are being developed today in educational technology and importantly presents the innovations which have had the most impact over recent years. From the profound transformations in the physical classroom to everything that involves new virtual scenarios where online teaching requires innovative strategies and training processes this book describes the diverse scenarios that ICT has generated and will continue to generate in the field of education. It presents a new and a very different type of education that can be adapted to the needs of the citizen of the digital society. | Innovation and ICT in Education The Diversity of the 21st Century Classroom

GBP 94.99
1

Slime Mould in Arts and Architecture

Slime Mould in Arts and Architecture

The slime mould Physarum polycephalum was a source of explosive growth of bioengineered hybrid sensing and computing devices in the past decade. Being in its vegetative state the plasmodium the slime mould configures its protoplasmic network to optimize its geometry with relation to patterns of attractants and repellents. The slime mould’s adaptability polymorphism and aestheticism inspired artists and architects. The slime mould has been seen as a self-conscious liquid form continuously changing its shape in response to external stimulation and due to interactions of thousands of micro-oscillators in its body. Elusiveness is a magic feature of the slime mould. One moment the slime mould gives you a solution to a mathematical problem by a shape of its body next moment it changes its shape and the solution disappears. Slime Mould in Arts and Architecture presents a set of unique chapters written by leading artists architects and scientists which resulted from creative translations of the slime mould behaviour into forms and sounds unconventional investigations and sensorial experiences and the slime mould ability to remove boundaries between living and artificial solid and fluid science and arts. The book gives readers unique tools for designing architectural forms and creative works using the slime mould understanding how pro-cognitive living substrates can be used in everyday life it sparks new ideas and initiates further progress in many fields or arts architecture science and engineering.

GBP 74.99
1

Embedded Artificial Intelligence Devices Embedded Systems and Industrial Applications

Embedded Artificial Intelligence Devices Embedded Systems and Industrial Applications

Recent technological developments in sensors edge computing connectivity and artificial intelligence (AI) technologies have accelerated the integration of data analysis based on embedded AI capabilities into resource-constrained energy-efficient hardware devices for processing information at the network edge. Embedded AI combines embedded machine learning (ML) and deep learning (DL) based on neural networks (NN) architectures such as convolutional NN (CNN) or spiking neural network (SNN) and algorithms on edge devices and implements edge computing capabilities that enable data processing and analysis without optimised connectivity and integration allowing users to access data from various sources. Embedded AI efficiently implements edge computing and AI processes on resource-constrained devices to mitigate downtime and service latency and it successfully merges AI processes as a pivotal component in edge computing and embedded system devices. Embedded AI also enables users to reduce costs communication and processing time by assembling data and by supporting user requirements without the need for continuous interaction with physical locations. This book provides an overview of the latest research results and activities in industrial embedded AI technologies and applications based on close cooperation between three large-scale ECSEL JU projects AI4DI ANDANTE and TEMPO. The book’s content targets researchers designers developers academics post-graduate students and practitioners seeking recent research on embedded AI. It combines the latest developments in embedded AI addressing methodologies tools and techniques to offer insight into technological trends and their use across different industries. | Embedded Artificial Intelligence Devices Embedded Systems and Industrial Applications

GBP 94.99
1

Cyber Resilience

Cyber Resilience

Modern cyber systems acquire more emergent system properties as far as their complexity increases: cyber resilience controllability self-organization proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system especially during the transition to the sixth technological stage and related Industry 4. 0 technologies: Artificial Intelligence (AI) Cloud and foggy computing 5G + IoT/IIoT Big Data and ETL Q-computing Blockchain VR/AR etc. We should even consider the cyber resilience as a primary one because the mentioned systems cannot exist without it. Indeed without the sustainable formation made of the interconnected components of the critical information infrastructure it does not make sense to discuss the existence of 4. 0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4. 0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity a potential danger of existing vulnerabilities and “sleep” hardware and software tabs as well as an inadequate efficiency of modern models methods and tools to ensure cyber security reliability response and recovery.

GBP 39.99
1

Applied Data Analytics - Principles and Applications

Applied Data Analytics - Principles and Applications

The emergence of huge amounts of data which require analysis and in some cases real-time processing has forced exploration into fast algorithms for handling very lage data sizes. Analysis of x-ray images in medical applications cyber security data crime data telecommunications and stock market data health records and business analytics data are but a few areas of interest. Applications and platforms including R RapidMiner and Weka provide the basis for analysis often used by practitioners who pay little to no attention to the underlying mathematics and processes impacting the data. This often leads to an inability to explain results or correct mistakes or to spot errors. Applied Data Analytics - Principles and Applications seeks to bridge this missing gap by providing some of the most sought after techniques in big data analytics. Establishing strong foundations in these topics provides practical ease when big data analyses are undertaken using the widely available open source and commercially orientated computation platforms languages and visualisation systems. The book when combined with such platforms provides a complete set of tools required to handle big data and can lead to fast implementations and applications. The book contains a mixture of machine learning foundations deep learning artificial intelligence statistics and evolutionary learning mathematics written from the usage point of view with rich explanations on what the concepts mean. The author has thus avoided the complexities often associated with these concepts when found in research papers. The tutorial nature of the book and the applications provided are some of the reasons why the book is suitable for undergraduate postgraduate and big data analytics enthusiasts. This text should ease the fear of mathematics often associated with practical data analytics and support rapid applications in artificial intelligence environmental sensor data modelling and analysis health informatics business data analytics data from Internet of Things and deep learning applications.

GBP 94.99
1

Challenges in Cybersecurity and Privacy - the European Research Landscape

Challenges in Cybersecurity and Privacy - the European Research Landscape

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

GBP 89.99
1