In this concise survey, intended for advanced undergraduate students of aesthetics, Alan Goldman focuses on the question of aesthetic value, using many practical examples from painting, music, and literature to make his case. Although he treats a wide variety of views, he argues for a nonrealist view of aesthetic value, showing that the personal element can never be factored out of evaluative aesthetic judgments and explaining why this is so.
In this concise survey, intended for advanced undergraduate students of aesthetics, Alan Goldman focuses on the question of aesthetic value, using man...
In the field of aeronautical dynamics, this book offers readers a design tool which enables them to solve the different problems that can occur during the planning stage of a private project. The authors present a system for the modeling, design and calculation of the flying qualities of airplanes and drones, with a complete mathematical model by Matlab/Simulink. As such, this book may be useful for design engineers as well as for keen airplane amateurs. The authors expound the various phases involved in the design process of an airplane, starting with the formulation of a design tool,...
In the field of aeronautical dynamics, this book offers readers a design tool which enables them to solve the different problems that can occur during...
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface...
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative r...
This book concerns the use of dioid algebra as (max, +) algebra to treat the synchronization of tasks expressed by the maximum of the ends of the tasks conditioning the beginning of another task - a criterion of linear programming. A classical example is the departure time of a train which should wait for the arrival of other trains in order to allow for the changeover of passengers. The content focuses on the modeling of a class of dynamic systems usually called -discrete event systems- where the timing of the events is crucial. Events are viewed as sudden changes in a process which...
This book concerns the use of dioid algebra as (max, +) algebra to treat the synchronization of tasks expressed by the maximum of the ends of the t...
The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network -traffic- generated over network infrastructures. This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate -always on- reliable...
The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network -traffic-...
Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that applications are now content-oriented but the protocol stack remains the same, based on the content location. Thus, it is clear that the Internet's current architecture must change. This new architecture should take into account aspects to improve content location and delivery efficiency and also content availability. Fulfilling these requirements is the main...
Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services an...
This book develops concepts and a methodology for a rational description of the organization of three-dimensional flows considering, in particular, the case where the flow is the place of separations. The descriptive analysis based on the critical point theory of Poincare develops conventional but rather unfamiliar considerations from aerodynamicists, who face the understanding of complex flows including multiple separation lines and vortices. These problems concern industrial sectors where aerodynamics plays a key role, such as aerospace, ground vehicles, buildings, etc.
...
This book develops concepts and a methodology for a rational description of the organization of three-dimensional flows considering, in particular,...
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives. It then moves on to show how it is possible to define a safety architecture (including redundancy, diversification, error-detection techniques) on the basis of safety objectives and how to identify objectives related to software programs. From software objectives, the authors present the different safety techniques (fault detection, redundancy and quality control). -Certifiable system- aspects are taken into account throughout the book.
...
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives...
Blind identification consists of estimating a multi-dimensional system only through the use of its output, and source separation, the blind estimation of the inverse of the system. Estimation is generally carried out using different statistics of the output. The authors of this book consider the blind identification and source separation problem in the complex-domain, where the available statistical properties are richer and include non-circularity of the sources - underlying components. They define identifiability conditions and present state-of-the-art algorithms that are based on...
Blind identification consists of estimating a multi-dimensional system only through the use of its output, and source separation, the blind estimation...
Optimization is generally a reduction operation of a definite quantity. This process naturally takes place in our environment and through our activities. For example, many natural systems evolve, in order to minimize their potential energy. Modeling these phenomena then largely relies on our capacity to artificially reproduce these processes. In parallel, optimization problems have quickly emerged from human activities, notably from economic concerns. This book includes the most recent ideas coming from research and industry in the field of optimization, reliability and the recognition of...
Optimization is generally a reduction operation of a definite quantity. This process naturally takes place in our environment and through our activ...