Angebote zu "Link-Domain" (22 Treffer)

Kategorien

Shops

Risk and Uncertainty Reduction by Using Algebra...
95,95 € *
ggf. zzgl. Versand

This book covers the application of algebraic inequalities for reliability improvement and for uncertainty and risk reduction. It equips readers with powerful domain-independent methods for reducing risk based on algebraic inequalities and demonstrates the significant benefits derived from the application for risk and uncertainty reduction. Algebraic inequalities: . Provide a powerful reliability-improvement, risk and uncertainty reduction method that transcends engineering and can be applied in various domains of human activity . Present an effective tool for dealing with deep uncertainty related to key reliability-critical parameters of systems and processes . Permit meaningful interpretations which link abstract inequalities with the real world . Offer a tool for determining tight bounds for the variation of risk-critical parameters and complying the design with these bounds to avoid failure . Allow optimising designs and processes by minimising the deviation of critical output parameters from their specified values and maximising their performance This book is primarily for engineering professionals and academic researchers in virtually all existing engineering disciplines.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot
Risk and Uncertainty Reduction by Using Algebra...
95,95 € *
ggf. zzgl. Versand

This book covers the application of algebraic inequalities for reliability improvement and for uncertainty and risk reduction. It equips readers with powerful domain-independent methods for reducing risk based on algebraic inequalities and demonstrates the significant benefits derived from the application for risk and uncertainty reduction. Algebraic inequalities: . Provide a powerful reliability-improvement, risk and uncertainty reduction method that transcends engineering and can be applied in various domains of human activity . Present an effective tool for dealing with deep uncertainty related to key reliability-critical parameters of systems and processes . Permit meaningful interpretations which link abstract inequalities with the real world . Offer a tool for determining tight bounds for the variation of risk-critical parameters and complying the design with these bounds to avoid failure . Allow optimising designs and processes by minimising the deviation of critical output parameters from their specified values and maximising their performance This book is primarily for engineering professionals and academic researchers in virtually all existing engineering disciplines.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot
Risk and Uncertainty Reduction by Using Algebra...
95,95 € *
ggf. zzgl. Versand

This book covers the application of algebraic inequalities for reliability improvement and for uncertainty and risk reduction. It equips readers with powerful domain-independent methods for reducing risk based on algebraic inequalities and demonstrates the significant benefits derived from the application for risk and uncertainty reduction. Algebraic inequalities: . Provide a powerful reliability-improvement, risk and uncertainty reduction method that transcends engineering and can be applied in various domains of human activity . Present an effective tool for dealing with deep uncertainty related to key reliability-critical parameters of systems and processes . Permit meaningful interpretations which link abstract inequalities with the real world . Offer a tool for determining tight bounds for the variation of risk-critical parameters and complying the design with these bounds to avoid failure . Allow optimising designs and processes by minimising the deviation of critical output parameters from their specified values and maximising their performance This book is primarily for engineering professionals and academic researchers in virtually all existing engineering disciplines.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot
Security for Pervasive Healthcare
45,80 € *
ggf. zzgl. Versand

Miniaturization of medical appliances and wireless communication enable the pervasive health monitoring of users in their daily life thus improving users’ health and well-being, helping for quick reaction on emergencies, and yet, allowing for cost reduction in the healthcare sector. In the simplest healthcare setting, a fixed set of wireless medical sensors forms a patient area network (PAN) monitoring the user’s vital signs. Medical staff can access, gather, or process data directly, or transmit it to a remote healthcare service. Pervasive health monitoring in these diverse situations and locations is carried out by different organizations, such as fitness centers or retirement homes, by means of a medical sensor network (MSN) allowing authorized parties to access to the sensed health information.In this context, the exchange of users’ medical data leads to severe privacy and security concerns. Meeting these strict security needs of these ubiquitous medical applications is a big challenge, since privacy of medical data has to be guaranteed all the way from the resource-constrained sensor nodes to the backend services, the system has to fulfill latency needs, and lots of mobility is involved. In fact, ensuring the smooth but secure interaction of the different system parts is one of the most testing tasks.This thesis addresses the challenge of deploying secure medical sensor networks, and to this end we propose algorithms, protocols, and systems that pursue three main goals. The first being the described solutions enabling the efficient deployment of security systems – bearing in mind that the underlying interactions and the expected system operation is fundamental for the successful system deployment. Secondly, the individual mechanisms and the overall architecture should provide a comprehensive solution for key and entity management, access control, and privacy-aware identification. These are the key challenges in the analyzed scenarios due to the pervasive nature of the system wherein a multitude of parties interact with each other. Finally, security methods and cryptographic algorithms should be lightweight to allow for efficient system deployment and operation on resource-constrained devices.Overall, this work proposes a security architecture that is comprised of three security layers, namely MSN, PAN, and backend security layers. In our architecture, the MSN and PAN security layers reflect the trend towards a patient-centric approach wherein both user and health institutions share responsibility on the control of the health information. The MSN security layer is in charge of providing the basic link-security within each MSN. The PAN layer creates a security domain around the user’s PAN giving him control on the disclosure of his health information. The backend security layer ensures smooth interaction between the MSN and PAN layers.The proposed security architecture is articulated and supported by the results in four complementary research areas. The first one refers to lightweight key establishment and information verification algorithms used at the MSN layer. With this we investigate and specify how the wireless medical sensors can agree on pairwise keys and verify information in an efficient way based on polynomial schemes in the scope of an MSN. We propose several optimizations for key establishment algorithms and introduce the concept of lightweight digital certificates that allows for distributed information verification without the need of public-key cryptography.Second, we examine how the polynomial keying material can be distributed and arranged at the MSN security layer to achieve a higher resiliency level, to reduce system requirements, and to provide other security functionalities. We also show how the proposed hierarchical and multidimensional systems – tailored to fit the underlying organization of health institutions – allow for efficient deployment. A resourceful approach for key establishment is not usable if it cannot be deployed and managed, hence, we describe two key distribution and management systems for the polynomial keying material fitting the specific system deployment and operational requirements. The first system, which applies to infrastructureless systems, relies on a lightweight but resilient device, a smart card, playing the role of trust center. The second one makes use of backend services to control and manage more complex systems comprised of a multitude of networks.Third, we introduce several lightweight security mechanisms running at the PAN security layer. We describe the system interactions between both the MSN and PAN layers based on dedicated-hardware including the formation and management of the PAN security domain within the MSN security domain. The main goal of this piece of hardware, the patient security manager star – that consists of a healthcare card linked to each user and a patient security manager managed by the MSN – is to allow for PAN roaming between MSNs while guaranteeing end-to-end security. Additionally, this layer provides user privacy-aware identification for roaming users based on a hierarchy of identifiers and context-aware access control depending, e.g., on the user’s health state.The fourth addressed research topic is denominated cooperative security, an approach that aims at leveraging system security by enforcing cooperation among the nodes in an MSN, converting PANs in authentic distributed security domains that are able to manage their trust relationships, and allowing for fast and distributed revocation when nodes misbehave thus enhancing the system security.After successfully analyzing, prototyping, and testing the key components in both the MSN and the PAN layers, we have shown that our comprehensive security architecture and its components can play a fundamental role in the efficient and progressive rollout of secure pervasive healthcare systems. Further research lines emerge from this work. The first one refers to the additional refinements and extensions of the overall security architecture as well as a closer analysis of the interactions between PAN and MSN in specific use cases. The second one refers to the design of identity-based pairwise key generation engines based on non-linear keying material structures that can allow any pair of peers to generate a common symmetric-key given their identifiers but without suffering from the alpha-secure property inherent to the polynomial schemes. Such schemes might become more and more important for future pervasive systems comprising thousands or millions of devices. The third one involves further extensions for cooperative security protocols to convert large-scale distributed systems into living networks capable of autonomously controlling their own security system and removing infected nodes.

Anbieter: Dodax
Stand: 06.06.2020
Zum Angebot
Windows to the Mind
129,95 € *
ggf. zzgl. Versand

Cognitive linguists are convinced that the nature of linguistic structures is strongly influenced by the way we experience and perceive the world and by how we conceptualize and construe these experiences and perceptions in our minds. At the same time, the study of linguistic structure and usage is credited with the potential to open windows to how our minds work. The present volume collects papers investigating linguistic phenomena that reflect the key cognitive processes of metaphor, metonymy and conceptual blending, which have proven to be highly influential in linguistic conceptualization. Theoretical and methodological issues, such as metaphor identification and the relevance of the target domain for children's understanding of metaphor, are focused on in the first section. The second and third parts are devoted to the application of the theoretical frameworks of the conceptual theory of metaphor and metonymy and the theory of conceptual blending to linguistic data. The contributions critically explore the explanatory potential of these theories, build bridges between them, link them with other approaches and notions (such as construction grammar, common ground and stance/evaluation), and uncover conceptual regularities and cognitive models that underlie and shape our language use in specific domains. The linguistic structures under consideration span the range from compounds and premodified noun phrases to constructions and texts such as jokes and political speeches. Methods applied include psycholinguistic experiments, analyses of data culled from authentic language corpora and discourse-analytical approaches.

Anbieter: Dodax
Stand: 06.06.2020
Zum Angebot
Visualizing the Structure of Science
180,00 CHF *
ggf. zzgl. Versand

Constructing a great map of the sciences has been a persistent dream since the Middle Ages. In modern times this need has become even more urgent because of the requirement to combine and link research in adjacent areas, often resulting in new disciplines such as bioinformatics and nanotechnologies. Computer visualization helps humans to perceive and understand large and complex structures, such as molecular structures or data dependencies. Vargas-Quesada and  Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, so-called 'scientograms', based on the interactions between authors and their papers through citations and co-citations, using approaches such as domain analysis, social networks, cluster analysis and pathfinder networks. The resulting scientograms offer manifold possibilities. Domain analysts can discover the most significant connections between categories of a given domain, and they can also see how these categories are grouped into major thematic areas and how they are interrelated through a logical internal, while information scientists or researchers new to an area may appreciate a durable image of the essential structure of a domain.

Anbieter: Orell Fuessli CH
Stand: 06.06.2020
Zum Angebot
Wavelets and Subbands
121,00 CHF *
ggf. zzgl. Versand

Recently there has been intense research activity on the subject of wavelet and subband theory. Experts in diverse fields such as mathematics, physics, electrical engineering, and image processing have provided original and pioneering works and results. But this diversity, while rich and productive, has led to a sense of fragmentation, especially to those new to the field and to nonspecialists who are trying to understand the connections between the different aspects of wavelet and subband theory. `Wavelets and Subbands' is designed to present an understanding of wavelets and their development from a continuous-domain transformation to a frame representation and finally to multiresolution analysis tools such as subband decomposition. The book presents a theoretical understanding of the subject that is intertwined with practical examples and applications of wavelets in ultrasonic and biomedical domains. There is special emphasis on applications in communications, compression, and image processing. Topics and Features: * Provides an understanding of the link between the continuous wavelet transform, the fast wavelet transform, and subband decomposition * Algorithms and numerical examples are implemented in MATLAB * Discusses the design of wavelet bases and details how to implement the transform both in hardware and software * Covers the fundamentals and the developments of the links between areas such as time-frequency analysis, digital signal processing, image processing, and Fourier and wavelet transform, both continuous and discrete * Offers extended mathematical treatment and numerous examples, with particular emphasis on the transition from the continuous domain to multiresolution and subband decomposition. The book is an essential text and reference for graduates, researchers, and professionals in electrical engineering, TOC:1. Introduction, 2. Wavelet Fundamentals, 3. Time and Frequency Analysis of Signals, 4. Discrete Wavelet Transform: From Frames to Fast Wavelet Transform, 5. Theory of Subband Decomposition, 6. Two- Dimensional Wavelet Transforms and Applications, 7. Applications of Wavelets in The Analysis of Transient Signals, 8. Applications of Subband and Wavelet Transform in Communication Systems, 9. Real-time Implementaions of Wavelet Transforms, Appendix, Bibleography, Index

Anbieter: Orell Fuessli CH
Stand: 06.06.2020
Zum Angebot
Windows to the Mind
181,00 CHF *
ggf. zzgl. Versand

Cognitive linguists are convinced that the nature of linguistic structures is strongly influenced by the way we experience and perceive the world and by how we conceptualize and construe these experiences and perceptions in our minds. At the same time, the study of linguistic structure and usage is credited with the potential to open windows to how our minds work. The present volume collects papers investigating linguistic phenomena that reflect the key cognitive processes of metaphor, metonymy and conceptual blending, which have proven to be highly influential in linguistic conceptualization. Theoretical and methodological issues, such as metaphor identification and the relevance of the target domain for children's understanding of metaphor, are focused on in the first section. The second and third parts are devoted to the application of the theoretical frameworks of the conceptual theory of metaphor and metonymy and the theory of conceptual blending to linguistic data. The contributions critically explore the explanatory potential of these theories, build bridges between them, link them with other approaches and notions (such as construction grammar, common ground and stance/evaluation), and uncover conceptual regularities and cognitive models that underlie and shape our language use in specific domains. The linguistic structures under consideration span the range from compounds and premodified noun phrases to constructions and texts such as jokes and political speeches. Methods applied include psycholinguistic experiments, analyses of data culled from authentic language corpora and discourse-analytical approaches. alytical approaches.

Anbieter: Orell Fuessli CH
Stand: 06.06.2020
Zum Angebot
Motivation in Language
189,90 CHF *
ggf. zzgl. Versand

This volume contributes to the now one-century old question, 'Is the link between forms and meanings in language essentially arbitrary, as Saussure put it, or is it on the contrary also considerably motivated?' The greater part of the papers (Sections 1-3) analyze linguistic phenomena in which not arbitrary, but cognitively motivated links between form and meaning play a role. As such, the contributions in Section 1 examine selected aspects of motivation in the continuum between lexicon and grammar; the contributions in Section 2 study the factors underlying the range of (semantic) variants that attach to a particular lexical item; and papers in Section 3 look at motivating factors in linguistic items situated in and conceptualizing the socio-cultural domain. A smaller set of papers in Section 4 point to the role which learner motivation and attitudinal motivation may play in applied linguistics domains.

Anbieter: Orell Fuessli CH
Stand: 06.06.2020
Zum Angebot