6 research outputs found
Connecting the Vehicle with the Environment - Trends and Challenges
Innovations in automotive electronics have become increasingly
complex, resulting in high-end vehicles containing more than 70
electronic control units and offering a variety of functions to the driver.
In-vehicle telematics and infotainment systems provide services like digital
radio, broadcast services, television, and MP3 audio. Future applications
and services will integrate information sources available outside
and inside the car, requiring vehicle systems connected with in-vehicle
Consumer Electronics devices and the outside world. In order to realized
the vision of an intelligent networked car, connected with the environment
and providing the driver with information according to his demands,
common efforts towards car manufacturer and supplier spanning
standards for data exchange are required. The paper discusses possible
approaches and future challenges
Academic Organizer for Mobile
This Final Year Project is about Academic Organizer, where a system that is
developed using J2ME programming with SOAP and XML and SQL server as
database. The main focus of Academic Organizer is to check the availability of the
lecturers in UTP for students' information for their academic purposes. Besides, they
can also set the appointment with the lecturers and check the schedule of the labs.
Lecturers could also make announcements and approve the appointments. All these
function can be implemented in their handphones or PDAs. Students go to their
related building according to their programmes, to see their lecturers for academic
purposes or other purposes. However, sometimes the lecturers are not in their office
and time is wasted here. This project is divided into two parts. The first part is the
research on how to implement this project by searching the information and
knowledge from journals, articles and reference books. Second part is the
development part of this project using incremental model. The benefits of
implementing this project are about its flexibility and mobility because mostly people
carrying their handphones or PDAs everywhere and any information could be
accessed nowadays. In fact, this application could be applied and will be very useful,
especially for the future purposes as the technology is grown rapidly nowadays
XESS: The XML expert system shell
The XML Expert System Shell (XESS) was designed to alleviate some of the difficulties associated with translating a knowledge base from one expert system to another. The major goal of XESS is to allow programmers to model an expert system, complete with traditional facts and rules, in an XML-based language that leverages the universally understood terms used when teaching artificial intelligence to students. XML, the extensible markup language, is a text-based standard for information interchange between disparate systems1; it was originally designed to represent data in an easily parsable, human readable format2. While some extensions of the XML specification, particularly the Simple Object Access Protocol (SOAP), have long since abandoned human readability, the core XML specification is still used frequently to produce documents that can easily be exchanged between computational platforms and created or understood by human beings. The XESS-XML language inherits all of the usability of XML; it can be edited by hand in any text editor, is human readable, and can be parsed using XML parsers commonly available in any modern programming language. The XML Schema specification provides a mechanism for explicitly defining the content of an XML document so that a document can be validated3,4,5. XML schemas specify the make-up of an XML document in exacting detail6, using a pseudo-object-oriented syntax to specify exactly which entities are allowed in the document, the attributes of those entities, where they are allowed in the document, and how often they may occur. The XESS-XML language is defined as a fully extensible XML Schema, which can be used to validate any knowledge base written in the language. The Schema provides entities for common facts (e.g. predictes, structs) and a robust syntax for expressing rules in an if-then-else format, as well as the actions that should be taken in the event that a rule is fired. Additionally, because XML schemas are fully extensible, the XESS schema may be extended to add additional functionality such as support for fuzzy logic, new clause types, or new actions to be taken when rules are fired. In addition to the XML language, XESS also includes an object oriented interpreter specification that defines a robust set of language independent APIs for interacting with the expert system. This interpreter specification is meant to set expectations, both for XESS developers and users, as to the features provided by the XESS API regardless of the language in which the interpreter has been implemented. As part of the specification, the XESS API also provides object oriented definitions for XESS plug-ins; a plug-in is capable of translating from an XESS document to the native language of a specific expert system shell in a generic way (i.e. not specific to any one rule set) and back again. This allows users to express custom expert system shells in the XESS-XML language, parse them using an XESS interpreter written in any language, and translate them to a specific expert system shell through the use of an XESS plug-in without needing to learn the specific expert system shell language or rewriting the knowledge base once for each shell tested
Theory and Practice of Cryptography and Network Security Protocols and Technologies
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities