2 options
Computer design and computational defense systems / Nikos E. Mastorakis, editor.
EBSCOhost Academic eBook Collection (North America) Available online
EBSCOhost Academic eBook Collection (North America)- Format:
- Book
- Series:
- Computer Science, Technology and Applications
- Computer science, technology and applications
- Language:
- English
- Subjects (All):
- High technology--United States.
- High technology.
- System design--United States.
- System design.
- Information technology--United States.
- Information technology.
- Military research--United States.
- Military research.
- Physical Description:
- 1 online resource (285 p.)
- Edition:
- 1st ed.
- Place of Publication:
- New York : Nova Science Publishers, c2011.
- Language Note:
- English
- Summary:
- This book presents and discusses research in the study of computer science, with a particular focus on computer design and computational defence systems. Topics discussed include memory grid mapping; optimal nozzle design with monotonicity constraints; statistical reliability with applications to defence; cybersecurity; and, real-world evolutionary designs and the applications of open architectural industrial robots.
- Contents:
- Intro
- COMPUTER DESIGN AND COMPUTATIONAL DEFENSE SYSTEMS
- CONTENTS
- PREFACE
- Chapter 1 DESIGNING A HIGH PERFORMANCE INTEGRATED STRATEGY FOR SECURED DISTRIBUTED DATABASE SYSTEMS
- ABSTRACT
- 1. INTRODUCTION
- 2. PARTITIONING THE DATABASE
- 2.1. Database Fragmentation
- 2.1.1. Defining Transactions
- 2.1.2. Creating Segments
- 2.1.3. Generating Fragments
- 2.1.4. Example
- 3. CLUSTERING DISTRIBUTED SITES
- 3.1. Clustering Technique
- 3.1.1. Communication Cost between Sites
- 3.1.2. Clustering Range
- 4. FRAGMENTS ALLOCATION AND REPLICATION
- 4.1. Allocation Replication Procedures
- 4.1.1. Example
- 4.2. Allocation and Replication Cost Functions
- 4.3. Allocating and Replicating Fragments to Clusters
- 4.3.1. Cost of Allocating Fragments to Clusters CA(Tk,Fi,Cj)
- 4.3.2. Cost of Remote Access Fragments to Clusters RA(Tk,Fi,Cj)
- 4.3.3. Allocation Status AS(Tk,Fi,Cj)
- 4.3.4. Example
- 4.4. Allocating Fragments to the Sites
- 5. PERFORMANCE EVALUATION
- 5.1. Database Fragmentation Performance Evaluation
- 5.1.1 Example:
- 5.2. Clustering Performance Evaluation
- 5.2.1 Example:
- 5.3. Fragment Allocation and Replication Performance Evaluation
- 5.3.1 Performance Evaluation at Clusters
- 5.3.1.1. Example
- 5.3.2 Performance Evaluation at Sites
- 5.3.2.1 Example
- 5.4. Network Performance
- 5.4.1. Servers Load
- 5.4.2. Network Delay
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 2 A LOW COST INTELLIGENT INFRARED SYSTEM FOR SUPPORT IN VEHICLE NAVIGATION TASKS
- 2. DESCRIPTION OF THE INFRARED SYSTEM
- 3. DETECTION AND CLASSIFICATION OF TRAFFIC SIGNS
- 3.1. Data Pre-Processing
- 3.2 Structure of the Neuro-Fuzzy System
- 3.3. Learning Algorithm
- 4. EXTRACTION AND RULE INTERPRETATION
- 5. PROGRESSIVE BRAKE.
- CONCLUSION
- Chapter 3 MEMORY GRID MAPPING: AN ACTIVE MAP LEARNING APPROACH FOR AUTONOMOUS ROBOTS IN UNKNOWN ENVIRONMENTS
- 2. MEMORY GRID MAPPING MODEL
- 2.1. The Memory Grid Map Model
- 2.2. A Framework for Map Building and Active Exploration
- 1) Map Update
- 2) Position Estimation
- 3) Environmental Exploration
- 4) Map Postprocessing
- 3. THE MAP UPDATE
- 4. THE ENVIRONMENTAL EXPLORATION
- 4.1. The Proposed Exploration Method
- 4.2. The Path Exploring Behavior
- 4.3. The Obstacle Avoidance Behavior
- 5. THE MAP POSTPROCESSING
- 6. EXPERIMENTAL RESULTS
- 6.1. Performance Analysis of Exploration Process
- 6.2. Performance of Map Postprocessing
- 6.3. Performance of Map Using Cells of Different Sizes
- 6.4 Performance in Complex Environments
- DISCUSSION AND CONCLUSION
- Chapter 4 OPTIMAL NOZZLE DESIGN WITH MONOTONICITY CONSTRAINTS
- 2. MATHEMATICAL MODEL
- 3. MODEL PROBLEMS
- 4. NUMERICAL METHODS
- 5. CHOICE OF THE FUNCTIONAL
- 6. NOZZLE DESCRIPTIONS
- 6.1 Problem a. Nozzle Description Using Basis Functions
- 6.2 Problem a. Nozzle Description Using Interpolants
- 6.3. Problem b. Nozzle Description
- 6.4. Numerical Results
- 6.5. Troubles and Ways Around
- 7. WIND TUNNEL DESIGN
- 7.1. Problem Statement and Solving Procedures
- 7.2. Problems
- 7.3. Additional Methods of Nozzle Description
- 7.4. Computation Results
- ACKNOWLEDGMENTS
- Chapter 5 STATISTICAL RELIABILITY WITH APPLICATIONS TO DEFENSE
- 1. PROGNOSTICS AND HEALTH MANAGEMENT
- 2. INTEGRATING STATISTICAL SYSTEM RELIABILITY INTO PHM
- 2.1 Overview of Statistical Model
- 3. ENTERPRISE LEVEL LOGISTICS SUPPORT MODELS
- 3.1. Elements of an Enterprise Level Logistics Support Model.
- 3.2. Selected Enterprise Level Logistic Support Models
- 3.2.1. Enterprise Logistics Model (ELM)
- 3.2.2. Weapon System Sustainment Value Stream Model
- 3.2.3. Support Enterprise Model
- 3.3. Trends within Enterprise Level Logistic Support Modeling
- 3.3.1. Full Lifecycle Time-to-Failure Distributions
- 3.3.1.1. Combined Lifecycle Distribution
- 3.3.1.2. Closed-form Full Lifecycle Distribution
- 3.3.2. PHM in Enterprise Level Logistics Support Models
- 4. SYSTEM-OF-SYSTEMS MODELING &
- SIMULATION
- 4.1. Background
- 4.2. Examples of Systems-of-Systems
- 4.2.1. Army's Future Combat System (FCS) as an SoS
- 4.2.2. U.S. National Airspace as an SoS
- 4.2.3. The Nation's Infrastructure as an SoS
- 4.3. System-of-Systems Modeling &
- Simulation
- 4.3.1. The System-of-Systems Availability Model (SoSAM)
- 4.3.2. System-of-Systems Analysis Toolset (SoSAT)
- 4.3.2.1. State Model Objects and State Modeling
- 4.3.2.2. Benefits of State Modeling
- 4.4. PHM in System-of-Systems Modeling &
- Chapter 6 CYBERSECURITY: CURRENT LEGISLATION, EXECUTIVE BRANCH INITIATIVES, AND OPTIONS FOR CONGRESS
- INTRODUCTION
- Research Methodology
- DIFFICULTIES IN ADDRESSING CYBERSECURITY ISSUES
- Recent Initiatives Addressing U.S. Cybersecurity Concerns
- The Comprehensive National Cybersecurity Initiative
- Commission on Cybersecurity for the 44th Presidency
- Obama Administration 60-Day Cyberspace Policy Review
- Common Themes of Recent Cybersecurity Initiatives
- Representative Sampling of Preexisting Executive Branch Programs and Initiatives
- Comparison Matrix
- CONSIDERATIONS AND OPTIONS FOR CONGRESS
- APPENDIX. CYBERSECURITY-RELATED LEGISLATION IN THE 111TH AND 110TH CONGRESSES
- OVERVIEW LIST OF BILLS IN THE 111TH CONGRESS THAT ADDRESS A CYBERSECURITY-RELATED ISSUE.
- Directly Tied to Cybersecurity
- Tied via Appropriations or Authorization
- Peripheral Cybersecurity Related or Mentions
- DETAILS ON BILLS IN THE 111TH CONGRESS THAT ADDRESS A CYBERSECURITYRELATED ISSUE
- Procurement
- Title XLI-Procurement (in thousands of dollars)
- Overview of Bills in the 110th Congress That Address(Ed) a Cybersecurity-Related Issue Passed Bills-Public Law
- Bills That Did Not Become Law
- SUMMARY LIST OF STATUTORY FOUNDATIONS FOR CYBERSECURITY LEGISLATION
- Chapter 7 ORGANIZATION OF THEMATIC-ORIENTED SEARCH IN GLOBAL INFORMATION SYSTEMS
- 2. FUZZY MODEL OF THEMATIC-ORIENTED INFORMATION SEARCH SYSTEMS
- 3. FUZZY PRESENTATION OF DOCUMENTS, DOCUMENT COLLECTIONS AND USER REQUESTS
- 4. THEMATIC-ORIENTED INFORMATION SEARCH
- 5. AUTOMATED THEMATIC DOCUMENT CLASSIFICATION AND INCLUSION OF DOCUMENTS IN DOCUMENT COLLECTIONS BASED ON THEMATIC CLOSENESS
- 6. SELECTION OF THEMATICALLY CLOSE COLLECTION FOR SEARCH
- 7. SEARCH OF RELEVANT DOCUMENT IN SELECTED COLLECTION
- 8. ORGANIZATION OF DISTRIBUTED MULTI-SEARCH IN GLOBAL INFORMATION ARRAY
- 9. IMPROVING SEARCH RESULT
- SUMMARY
- ABOUT THE AUTHORS
- Chapter8REAL-WORLDEVOLUTIONARYDESIGNS:SECUREEVOLVABLEHARDWAREFORPUBLIC-KEYCRYPTOSYSTEMS
- Abstract
- 1.Introduction
- 2.GeneticProgramming
- 3.EvolvingHardwareforCombinationalDigitalCircuits
- 3.1.CircuitSpecificationEncoding
- 3.2.CircuitSpecificationReproduction
- 3.3.CircuitSpecificationEvaluation
- 4.Evolutionaryvs.ConventionalDesigns
- 5.RSA-BasedCryptosystems
- 6.Evolutionaryvs.ConventionalCryptographicHardware
- 7.Summary
- References
- Chapter9APPLICATIONOFOPENARCHITECTURALINDUSTRIALROBOTSANDITSSIMULATIONTECHNIQUE
- 2.Position/ForceControlforOpenArchitecturalIndustrialRobots.
- 2.1.ImpedanceModelFollowingForce/ComplianceControl
- 2.2.FeedfowardPosition/OrientationControl
- 2.3.HybridPosition/ForceControlwithWeakCoupling
- 3.3DRobotSanderforArtisticDesignedFurniture
- 3.1.Background
- 3.2.RoboticSandingSystemforWoodenPartswithCurvedSurface
- 3.3.SurfaceFollowingControlforRoboticSandingSystem
- 3.4.FeedbackControlofPolishingForce
- 3.5.FeedforwardandFeedbackControlofPosition
- 3.6.HyperCLData
- 3.7.ExperimentalResult
- 4.MoldPolishingRobot
- 4.1.Background
- 4.2.GenerationofMulti-axisCutterLocationData
- 4.3.BasicPolishingSchemeforaBall-endAbrasiveTool
- 4.4.FeedbackControlofPolishingForce
- 4.5.FeedforwardandFeedbackControlofToolPosition
- 4.6.Experiment
- 4.6.1.ExperimentalSetup
- 4.6.2.PolishingConditionandExperiment
- 4.6.3.CompliantMotionofaBall-EndAbrasiveTool
- 4.6.4.ExperimentalResult
- 4.7.LimitationofanArticulated-typeIndustrialRobot
- 5.SimulationTechnique
- 5.1.FuzzyForceControllerasanExample
- 5.2.HowtoGeneratetheReferencesforServoSystem
- 5.3.Simulation
- 6.Conclusion
- INDEX.
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- Description based on print version record.
- ISBN:
- 1-61209-484-8
- OCLC:
- 833198759
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.