Browse Results

Showing 15,451 through 15,475 of 56,510 results

Descriptional Complexity of Formal Systems

by Cezar Câmpeanu Florin Manea Jeffrey Shallit

This book constitutes the refereed proceedings of the 17th International Conference on Descriptional Complexity of Formal Systems, DCFS 2015, held in Waterloo, ON, Canada, in June 2015. The 23 full papers presented together with 2 invited talks were carefully reviewed and selected from 29 submissions. The subject of the workshop was descriptional complexity. Roughly speaking, this field is concerned with the size of objects in various mathematical models of computation, such as finite automata, pushdown automata, and Turing machines. Descriptional complexity serves as a theoretical representation of physical realizations, such as the engineering complexity of computer software and hardware. It also models similar complexity phenomena in other areas of computer science, including unconventional computing and bioinformatics.

Descriptional Complexity of Formal Systems: 23rd IFIP WG 1.02 International Conference, DCFS 2021, Virtual Event, September 5, 2021, Proceedings (Lecture Notes in Computer Science #13037)

by Yo-Sub Han Sang-Ki Ko

This book constitutes the proceedings of the 23rd International Conference on Descriptional Complexity of Format Systems, DCFS 2021, which was supposed to take place in Seoul South Korea in June 2021, but the conference was canceled due to the COVID-19 crisis.The 16 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The conference focus to all aspects of descriptional complexity-the costs of description of objects in various computational models such as Turing machines, pushdown automata, finite automata or grammars.

Descriptional Complexity of Formal Systems: 24th IFIP WG 1.02 International Conference, DCFS 2022, Debrecen, Hungary, August 29–31, 2022, Proceedings (Lecture Notes in Computer Science #13439)

by Yo-Sub Han György Vaszil

This book constitutes the proceedings of the 24th International Conference on Descriptional Complexity of Format Systems, DCFS 2022, which was supposed to take place in Debrecen, Hungary in August 2022.The 14 full papers presented in this volume were carefully reviewed and selected from 17 submissions. The book also contains 4 invited talks. The conference focus to all aspects of descriptional complexity including Automata, grammars, languages, and other formal systems; various modes of operations and complexity measures.

Descriptional Complexity of Formal Systems: 21st IFIP WG 1.02 International Conference, DCFS 2019, Košice, Slovakia, July 17–19, 2019, Proceedings (Lecture Notes in Computer Science #11612)

by Michal Hospodár Galina Jirásková Stavros Konstantinidis

This book constitutes the proceedings of the 21st International Conference on Descriptional Complexity of Format Systems, DCFS 2019, held in Košice, Slovakia, in July 2019. The 18 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The book also contains 4 invited talks. They deal with all aspects of descriptional complexity and costs of description of objects in various computational models, such as Turing machines, pushdown automata, finite automata, grammars, and others.

Descriptional Complexity of Formal Systems: 22nd International Conference, DCFS 2020, Vienna, Austria, August 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12442)

by Galina Jirásková Giovanni Pighizzini

This book constitutes the proceedings of the 22nd International Conference on Descriptional Complexity of Format Systems, DCFS 2020, which was supposed to take place in Vienna, Austria, in August 2020, but the conference was canceled due to the COVID-19 crisis.The 19 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They deal with all aspects of descriptional complexity and costs of description of objects in various computational models, such as Turing machines, pushdown automata, finite automata, grammars, and others.

Descriptional Complexity of Formal Systems: 20th IFIP WG 1.02 International Conference, DCFS 2018, Halifax, NS, Canada, July 25–27, 2018, Proceedings (Lecture Notes in Computer Science #10952)

by Stavros Konstantinidis Giovanni Pighizzini

This book constitutes the proceedings of the 20th International Conference on Descriptional Complexity of Formal Systems, DCFS 2018, held in Halifax, NS, Canada, in July 2018. The 19 full papers presented were carefully reviewed and selected from 24 submissions.DCFS is an annual international working conference concerning the descriptional complexity of formal systems and structures and its applications. Topics of interest are related to all aspects of descriptional complexity and much more.

Descriptional Complexity of Formal Systems

by Jeffrey Shallit Alexander Okhotin

This book constitutes the refereed proceedings of the 17th International Conference on Descriptional Complexity of Formal Systems, DCFS 2015, held in Waterloo, ON, Canada, in June 2015. The 23 full papers presented together with 2 invited talks were carefully reviewed and selected from 29 submissions. The subject of the workshop was descriptional complexity. Roughly speaking, this field is concerned with the size of objects in various mathematical models of computation, such as finite automata, pushdown automata, and Turing machines. Descriptional complexity serves as a theoretical representation of physical realizations, such as the engineering complexity of computer software and hardware. It also models similar complexity phenomena in other areas of computer science, including unconventional computing and bioinformatics.

Descriptive Data Mining

by David L. Olson

This book offers an overview of knowledge management. It starts with an introduction to the subject, placing descriptive models in the context of the overall field as well as within the more specific field of data mining analysis. Chapter 2 covers data visualization, including directions for accessing R open source software (described through Rattle). Both R and Rattle are free to students. Chapter 3 then describes market basket analysis, comparing it with more advanced models, and addresses the concept of lift. Subsequently, Chapter 4 describes smarketing RFM models and compares it with more advanced predictive models. Next, Chapter 5 describes association rules, including the APriori algorithm and provides software support from R. Chapter 6 covers cluster analysis, including software support from R (Rattle), KNIME, and WEKA, all of which are open source. Chapter 7 goes on to describe link analysis, social network metrics, and open source NodeXL software, and demonstrates link analysis application using PolyAnalyst output. Chapter 8 concludes the monograph. Using business-related data to demonstrate models, this descriptive book explains how methods work with some citations, but without detailed references. The data sets and software selected are widely available and can easily be accessed.

Descriptive Data Mining (Computational Risk Management)

by David L. Olson Georg Lauhoff

This book provides an overview of data mining methods demonstrated by software. Knowledge management involves application of human knowledge (epistemology) with the technological advances of our current society (computer systems) and big data, both in terms of collecting data and in analyzing it. We see three types of analytic tools. Descriptive analytics focus on reports of what has happened. Predictive analytics extend statistical and/or artificial intelligence to provide forecasting capability. It also includes classification modeling. Diagnostic analytics can apply analysis to sensor input to direct control systems automatically. Prescriptive analytics applies quantitative models to optimize systems, or at least to identify improved systems. Data mining includes descriptive and predictive modeling. Operations research includes all three. This book focuses on descriptive analytics.The book seeks to provide simple explanations and demonstration of some descriptive tools. This second edition provides more examples of big data impact, updates the content on visualization, clarifies some points, and expands coverage of association rules and cluster analysis. Chapter 1 gives an overview in the context of knowledge management. Chapter 2 discusses some basic software support to data visualization. Chapter 3 covers fundamentals of market basket analysis, and Chapter 4 provides demonstration of RFM modeling, a basic marketing data mining tool. Chapter 5 demonstrates association rule mining. Chapter 6 is a more in-depth coverage of cluster analysis. Chapter 7 discusses link analysis. Models are demonstrated using business related data. The style of the book is intended to be descriptive, seeking to explain how methods work, with some citations, but without deep scholarly reference. The data sets and software are all selected for widespread availability and access by any reader with computer links.

Descriptive Set Theoretic Methods in Automata Theory

by Michał Skrzypczak

The book is based on the PhD thesis Descriptive Set Theoretic Methods in Automata Theory, awarded the E. W. Beth Prize in 2015 for outstanding dissertations in the fields of logic, language, and information. The thesis reveals unexpected connections between advanced concepts in logic, descriptive set theory, topology, and automata theory and provides many deep insights into the interplay between these fields. It opens new perspectives on central problems in the theory of automata on infinite words and trees and offers very impressive advances in this theory from the point of view of topology. " the thesis of Micha Skrzypczak offers certainly what we expect from excellent mathematics: new unexpected connections between a priori distinct concepts, and proofs involving enlightening ideas. Thomas Colcombet. "

The Desert War: Book 4 of the Ladybird Expert History of the Second World War (The Ladybird Expert Series #10)

by James Holland

Part of the ALL-NEW LADYBIRD EXPERT SERIES.____________Why was North Africa such a key component in Britain's success over Mussolini and his Italian Army?How did they blunt Italy's actions?What challenges did they face?And what new technologies were brought to bear?When fascist dictator Mussolini declared war against Britain he was taking a huge risk . . . Italy lacked natural resources, and Britain and France's wealth.He hoped to create a new Roman Empire across the Mediterranean and into Africa. And with Hitler and the Nazi's by his side he had a great chance of doing so - but what was it that stopped him?Discover the answers and more inside James Holland's The Desert War, the thrilling and accessible account that explains what happened, who the key figures were and the tactics, triumphs and failures on both sides . . .

Design Alchemy

by Roderick Sims

The promise of online learning--flexible, learner-centered, responsive--was forward-looking and poised to revolutionize education. But too often online learning courses have little room for student engagement and their design does not reflect the potential for interactive and collaborative learning. Design Alchemy counters this trend by synthesizing the art and science of educational design to model a whole that transcends the sum of its parts. Challenging yet accessible, it clearly sets out steps for harnessing innovative strategies and designer creativity to provide educational platforms that reduce learner boredom and instructor burnout, and encourage deeper interaction with subject matter. Activities, assessment methods, and sample course materials are designed toward improving quality, embracing diversity, and adapting positively to change. And the book's palette of resources enables readers to effectively apply the principles in their own practice: The evolution of Design Alchemy in the context of online learning. Alignment with core theories and practice models. The framework: elements of pedagogy and components of practice. Case studies showing Design Alchemy in real-world learning. Tools, templates, and a sample syllabus. The Design Alchemy Manifesto, summarizing key ideas. Researchers and practitioners in technology and education will look to Design Alchemy as a transformative work to help make the most of student potential, learning opportunities, and their own professional growth.

Design and Analysis of Biomolecular Circuits

by Douglas Densmore Heinz Koeppl Gianluca Setti Mario Di Bernardo

The book deals with engineering aspects of the two emerging and intertwined fields of synthetic and systems biology. Both fields hold promise to revolutionize the way molecular biology research is done, the way today's drug discovery works and the way bio-engineering is done. Both fields stress the importance of building and characterizing small bio-molecular networks in order to synthesize incrementally and understand large complex networks inside living cells. Reminiscent of computer-aided design (CAD) of electronic circuits, abstraction is believed to be the key concept to achieve this goal. It allows hiding the overwhelming complexity of cellular processes by encapsulating network parts into abstract modules. This book provides a unique perspective on how concepts and methods from CAD of electronic circuits can be leveraged to overcome complexity barrier perceived in synthetic and systems biology.

Design and Analysis of Cryptographic Algorithms in Blockchain

by Yi Mu Xiaosong Zhang Ke Huang Fatemeh Rezaeibagha

This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. It devotes three chapters to review the background and basic knowledge, four chapters to discuss specific types of cryptographic primitive design for blockchain, one chapter to discuss optimization tools and another chapter for blockchain regulation and economies. This book covers the systematic survey of research objects, as well as detailed reviews of cryptographic schemes, lectures and methodologies to practice cryptography. The main findings of this book are summarized as following, first, the practical design and analysis of cryptographic schemes for blockchain can address major problems in blockchain at algorithmic level. Then, some intrinsic deficiencies in some traditional cryptographic primitives, like centralized setup, impractical design, etc, prevent the successful application of these primitives in blockchain. However, huge efforts are being made to make these primitives practical and applicable for researchers. Finally, the formal and rigorous design and analysis of public key cryptographic algorithms is vital to blockchain. Design and Analysis of Cryptographic Algorithms in Blockchain is a useful textbook for graduate students and PhD students, or researches who wish to connect cryptography with blockchain for research and developing projects.

Design and Analysis of Distributed Energy Management Systems: Integration of EMS, EV, and ICT (Power Electronics and Power Systems)

by Anh Tuan Tran Tatsuya Suzuki Shinkichi Inagaki Yoshihiko Susuki

This book provides key ideas for the design and analysis of complex energy management systems (EMS) for distributed power networks. Future distributed power networks will have strong coupling with (electrified) mobility and information-communication technology (ICT) and this book addresses recent challenges for electric vehicles in the EMS, and how to synthesize the distributed power network using ICT. This book not only describes theoretical developments but also shows many applications using test beds and provides an overview of cutting edge technologies by leading researchers in their corresponding fields. Describes design and analysis of energy management systems;Illustrates the synthesis of distributed energy management systems based on aggregation of local agents;Discusses dependability issues of the distributed EMS with emphasis on the verification scheme based on remote-operational hardware-in-the-loop (HIL) simulation and cybersecurity.

Design and Analysis of Security Protocol for Communication

by Sheng-Lung Peng Dinesh Goyal S. Balamurugan O. P. Verma

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

Design and Applications of Nature Inspired Optimization: Contribution of Women Leaders in the Field (Women in Engineering and Science)

by Dipti Singh Vanita Garg Kusum Deep

This book gives a detailed information of various real-life applications from various fields using nature inspired optimization techniques. These techniques are proven to be efficient and robust in many difficult problems in literature. The authors provide detailed information about real-life problems and how various nature inspired optimizations are applied to solve these problems. The authors discuss techniques such as Biogeography Based Optimization, Glow Swarm Optimization, Elephant herd Optimization Algorithm, Cuckoo Search Algorithm, Ant Colony Optimization, and Grey Wolf Optimization etc. These algorithms are applied to a wide range of problems from the field of engineering, finance, medicinal etc. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in nature inspired optimization, inspiring women and men, girls and boys to enter and apply themselves to the field.

Design and Architecture for Signal and Image Processing: 15th International Workshop, DASIP 2022, Budapest, Hungary, June 20–22, 2022, Proceedings (Lecture Notes in Computer Science #13425)

by Karol Desnos Sergio Pertuz

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022. The 13 full included in the volume were carefully reviewed and selected from 32 submissions. They are organized in the following topical sections: leading signal, image and video processing and machine learning in custom embedded, edge and cloud computing architectures and systems.

Design and Control of Swarm Dynamics

by Roland Bouffanais

The book is about the key elements required for designing, building and controlling effective artificial swarms comprised of multiple moving physical agents. Therefore this book presents the fundamentals of each of those key elements in the particular frame of dynamic swarming, specifically exposing the profound connections between these elements and establish some general design principles for swarming behaviors. This scientific endeavor requires an inter-disciplinary approach: biomimetic inspiration from ethology and ecology, study of social information flow, analysis of temporal and adaptive signaling network of interaction, considerations of control of networked real-time systems, and lastly, elements of complex adaptive dynamical systems. This book offers a completely new perspective on the scientific understanding of dynamic collective behaviors thanks to its multi-disciplinary approach and its focus on artificial swarm of physical agents. Two of the key problems in understanding the emergence of swarm intelligent behaviors are identifying the social interaction rules a. k. a. the behavioral algorithm and uncovering how information flows between swarming agents. While most books about swarm dynamics have been focusing on the former, this book emphasizes the much-less discussed topic of distributed information flow, always with the aim of establishing general design principles.

Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks)

by Chandra Sekhar Mukherjee Dibyendu Roy Subhamoy Maitra

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services

by Puthiyavan Udayakumar

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF.The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF. What You Will LearnDesign and deploy security for infrastructure, data, and applicationsDesign and deploy an identify solutionDesign and deploy a protect solutionDesign and deploy a detect solutionDesign and deploy a respond solutionDesign and deploy a recover solutionWho This Book Is ForCyber system administrators and architects working with Microsoft Azure integrated services

Design and Deploy Azure VMware Solutions: Build and Run VMware Workloads Natively on Microsoft Azure

by Puthiyavan Udayakumar

Learn the essential design and deployment skills to utilize Azure VMware Solution to seamlessly move your VMware-based workloads from your datacenter to Azure and to integrate your VMware environment with Azure. This book will teach you how to manage your existing environments with the same VMware products you already know while modernizing your applications with Azure native services. Design and Deploy Azure VMware Solutions starts by reviewing Azure VMware essentials, followed by a walkthrough of the methods of preparing and expanding to Azure VMware Solution. Here, you will learn about the layers of Microsoft AVS, including the vSphere, vSAN, NSX-T, and assess and migrate on-prem VMware workloads to Azure VMware Solution using HCX. Further, you will understand how to deploy the desktop and learn Hosting Pool using Horizon on Microsoft Azure, a modern approach to managing and securing Horizon components. VMware Tanzu for modernizing applications in Azure and disaster recovery for VMware workloads in Azure is then discussed in detail. Finally, you will learn monitoring and operations management using the VMware vRealize Suite and see a demonstration of how to plan and deploy Infrastructure as a Service (IaaS) for Azure VMware Solution via vRealize Automation. After reading the book, you will be able to migrate or extend VMware workloads from on-premises to Azure without the need to re-architect applications or retool operations.What Will You Learn Get started with Azure VMware SolutionPrepare and plan to utilize Azure VMware SolutionDesign and deploy Azure VMware SolutionManage and secure Azure VMware Solution Who Is This Book For Azure VMware administrators and Azure Cloud Architects.

Design and Deploy Microsoft Azure Virtual Desktop: An Essential Guide for Architects and Administrators

by Puthiyavan Udayakumar

Design and build the new desktop service from Microsoft. This book offers a modern framework, design methodology, and best practices of design and deployment for virtual apps and desktops.Microsoft Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) which is simple to deploy, accessible from any device, easy to manage, and secure. The book starts with AVD essentials and its critical features, followed by the planning and method of preparing for AVD. You will go through defining the requirements and assessing by setting the AVD application baseline, network requirements, and security requirements. Next, you will learn how to design and deploy the core infrastructure of Microsoft AVD to understand its Access Layer, Control Layer, Resource Layer, Hosting Layer, and User Layer. You will also learn how to design the desktop and Host Pool of AVD. And you will learn the modern way to manage and secure AVD components.After reading this book, you will have the right blend of knowledge and skills to set up and run the Azure cloud-based virtual desktop and virtual applications.What You Will LearnUnderstand the key design and deployment essentials of AVDPlan, gather requirements, and assess for AVDDesign and deploy Core Infrastructure of Microsoft AVDIntegrate with profile and personalization managementMonitor and secure Azure virtual desktopsWho Is This Book For:AVD system administrators and AVD system architects

Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities

by Puthiyavan Udayakumar Dr. R. Anandan

Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

Design and Development of Efficient Energy Systems (Artificial Intelligence and Soft Computing for Industrial Transformation)

by Suman Lata Tripathi Sanjeevikumar Padmanaban Dushyant Kumar Singh P. Raja

There is not a single industry which will not be transformed by machine learning and Internet of Things (IoT). IoT and machine learning have altogether changed the technological scenario by letting the user monitor and control things based on the prediction made by machine learning algorithms. There has been substantial progress in the usage of platforms, technologies and applications that are based on these technologies. These breakthrough technologies affect not just the software perspective of the industry, but they cut across areas like smart cities, smart healthcare, smart retail, smart monitoring, control, and others. Because of these “game changers,” governments, along with top companies around the world, are investing heavily in its research and development. Keeping pace with the latest trends, endless research, and new developments is paramount to innovate systems that are not only user-friendly but also speak to the growing needs and demands of society. This volume is focused on saving energy at different levels of design and automation including the concept of machine learning automation and prediction modeling. It also deals with the design and analysis for IoT-enabled systems including energy saving aspects at different level of operation. The editors and contributors also cover the fundamental concepts of IoT and machine learning, including the latest research, technological developments, and practical applications. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in the area of IoT and machine technology, this is a must-have for any library.

Refine Search

Showing 15,451 through 15,475 of 56,510 results