6 research outputs found

    Connecting the Vehicle with the Environment - Trends and Challenges

    Get PDF
    Innovations in automotive electronics have become increasingly complex, resulting in high-end vehicles containing more than 70 electronic control units and offering a variety of functions to the driver. In-vehicle telematics and infotainment systems provide services like digital radio, broadcast services, television, and MP3 audio. Future applications and services will integrate information sources available outside and inside the car, requiring vehicle systems connected with in-vehicle Consumer Electronics devices and the outside world. In order to realized the vision of an intelligent networked car, connected with the environment and providing the driver with information according to his demands, common efforts towards car manufacturer and supplier spanning standards for data exchange are required. The paper discusses possible approaches and future challenges

    Academic Organizer for Mobile

    Get PDF
    This Final Year Project is about Academic Organizer, where a system that is developed using J2ME programming with SOAP and XML and SQL server as database. The main focus of Academic Organizer is to check the availability of the lecturers in UTP for students' information for their academic purposes. Besides, they can also set the appointment with the lecturers and check the schedule of the labs. Lecturers could also make announcements and approve the appointments. All these function can be implemented in their handphones or PDAs. Students go to their related building according to their programmes, to see their lecturers for academic purposes or other purposes. However, sometimes the lecturers are not in their office and time is wasted here. This project is divided into two parts. The first part is the research on how to implement this project by searching the information and knowledge from journals, articles and reference books. Second part is the development part of this project using incremental model. The benefits of implementing this project are about its flexibility and mobility because mostly people carrying their handphones or PDAs everywhere and any information could be accessed nowadays. In fact, this application could be applied and will be very useful, especially for the future purposes as the technology is grown rapidly nowadays

    XESS: The XML expert system shell

    Get PDF
    The XML Expert System Shell (XESS) was designed to alleviate some of the difficulties associated with translating a knowledge base from one expert system to another. The major goal of XESS is to allow programmers to model an expert system, complete with traditional facts and rules, in an XML-based language that leverages the universally understood terms used when teaching artificial intelligence to students. XML, the extensible markup language, is a text-based standard for information interchange between disparate systems1; it was originally designed to represent data in an easily parsable, human readable format2. While some extensions of the XML specification, particularly the Simple Object Access Protocol (SOAP), have long since abandoned human readability, the core XML specification is still used frequently to produce documents that can easily be exchanged between computational platforms and created or understood by human beings. The XESS-XML language inherits all of the usability of XML; it can be edited by hand in any text editor, is human readable, and can be parsed using XML parsers commonly available in any modern programming language. The XML Schema specification provides a mechanism for explicitly defining the content of an XML document so that a document can be validated3,4,5. XML schemas specify the make-up of an XML document in exacting detail6, using a pseudo-object-oriented syntax to specify exactly which entities are allowed in the document, the attributes of those entities, where they are allowed in the document, and how often they may occur. The XESS-XML language is defined as a fully extensible XML Schema, which can be used to validate any knowledge base written in the language. The Schema provides entities for common facts (e.g. predictes, structs) and a robust syntax for expressing rules in an if-then-else format, as well as the actions that should be taken in the event that a rule is fired. Additionally, because XML schemas are fully extensible, the XESS schema may be extended to add additional functionality such as support for fuzzy logic, new clause types, or new actions to be taken when rules are fired. In addition to the XML language, XESS also includes an object oriented interpreter specification that defines a robust set of language independent APIs for interacting with the expert system. This interpreter specification is meant to set expectations, both for XESS developers and users, as to the features provided by the XESS API regardless of the language in which the interpreter has been implemented. As part of the specification, the XESS API also provides object oriented definitions for XESS plug-ins; a plug-in is capable of translating from an XESS document to the native language of a specific expert system shell in a generic way (i.e. not specific to any one rule set) and back again. This allows users to express custom expert system shells in the XESS-XML language, parse them using an XESS interpreter written in any language, and translate them to a specific expert system shell through the use of an XESS plug-in without needing to learn the specific expert system shell language or rewriting the knowledge base once for each shell tested

    Theory and Practice of Cryptography and Network Security Protocols and Technologies

    Get PDF
    In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities
    corecore