You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives. It then moves on to show how it is possible to define a safety architecture (including redundancy, diversification, error-detection techniques) on the basis of safety objectives and how to identify objectives related to software programs. From software objectives, the authors present the different safety techniques (fault detection, redundancy and quality control). “Certifiable system” aspects are taken into account throughout the book. Contents 1. Safety Management. 2. From System to Software. 3. Certifiable Systems. 4. Risk and Safety Leve...
B Method presents the language needed, semantics and methodologies required to use the method on real projects. The B method is one of the well known formal methods used in railway systems safety going back to 1998 that has been deployed on many projects. Covers the B method language Includes methodologies applied on real projects
The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis. This book presents real examples of the formal techniques called "abstract interpretation" currently being used in various industrial fields: railway, aeronautics, space, automotive, etc. The purpose of this book is to present students and researchers, in a single book, with the wealth of experience of people who are intrinsically involved in the realization and evaluation of software-based safety critical systems. As the authors are people currently working within the industry, the usual problems of confidentiality, which can occur with other books, is not an issue and so makes it possible to supply new useful information (photos, architectural plans, real examples).
Evolutionary algorithms are bio-inspired algorithms based on Darwin’s theory of evolution. They are expected to provide non-optimal but good quality solutions to problems whose resolution is impracticable by exact methods. In six chapters, this book presents the essential knowledge required to efficiently implement evolutionary algorithms. Chapter 1 describes a generic evolutionary algorithm as well as the basic operators that compose it. Chapter 2 is devoted to the solving of continuous optimization problems, without constraint. Three leading approaches are described and compared on a set of test functions. Chapter 3 considers continuous optimization problems with constraints. Various approaches suitable for evolutionary methods are presented. Chapter 4 is related to combinatorial optimization. It provides a catalog of variation operators to deal with order-based problems. Chapter 5 introduces the basic notions required to understand the issue of multi-objective optimization and a variety of approaches for its application. Finally, Chapter 6 describes different approaches of genetic programming able to evolve computer programs in the context of machine learning.
Blockchain is new-age technology used to track every transaction using cryptocurrency across servers linked in a peer-to-peer network, enabling transactions to be secure, transparent and reliable. Retaining an efficient, secure and patient-centric healthcare industry has never been so important, especially due to the damaging effects of the Covid-19 pandemic. The applicability of Blockchain in the healthcare domain can be seen as a remarkable opportunity for researchers and scientists to solve real-world problems. This book focuses on the fundamentals of Blockchain technology along with the methods of its integration with the healthcare industry. It also provides an enhanced understanding of Blockchain technology, AI and IoT across the various application areas of the healthcare industry. Furthermore, throughout the book, areas of relevant applications, such as patient data privacy protection, pharmaceutical supply chains and genomics are discussed.
Almost every month, a new optimization algorithm is proposed, often accompanied by the claim that it is superior to all those that came before it. However, this claim is generally based on the algorithm's performance on a specific set of test cases, which are not necessarily representative of the types of problems the algorithm will face in real life. This book presents the theoretical analysis and practical methods (along with source codes) necessary to estimate the difficulty of problems in a test set, as well as to build bespoke test sets consisting of problems with varied difficulties. The book formally establishes a typology of optimization problems, from which a reliable test set can be deduced. At the same time, it highlights how classic test sets are skewed in favor of different classes of problems, and how, as a result, optimizers that have performed well on test problems may perform poorly in real life scenarios.
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the precautions to be taken in the implementation of the experimental procedure. These principles are illustrated by concrete examples achieved through operational simulation languages (OMNeT ++, OPNET). Presented under the complementary approach, the mathematical method is essential for the simulation. Both methodologies based largely on the theory of probability and statistics in general and particularly Markov processes, a reminder of the basic results is also available.
Stereoscopic processes are increasingly used in virtual reality and entertainment. This technology is interesting because it allows for a quick immersion of the user, especially in terms of depth perception and relief clues. However, these processes tend to cause stress on the visual system if used over a prolonged period of time, leading some to question the cause of side effects that these systems generate in their users, such as eye fatigue. This book explores the mechanisms of depth perception with and without stereoscopy and discusses the indices which are involved in the depth perception. The author describes the techniques used to capture and retransmit stereoscopic images. The causes of eyestrain related to these images are then presented along with their consequences in the long and short term. The study of the causes of eyestrain forms the basis for an improvement in these processes in the hopes of developing mechanisms for easier virtual viewing.