Navigating the Evolving Landscape of Safety Standards for Machine Learning-based Road Vehicle Functions


Book Description

ML approaches to solving some of the key perception and decision challenges in automated vehicle functions are maturing at an incredible rate. However, the setbacks experienced during initial attempts at widespread deployment have highlighted the need for a careful consideration of safety during the development and deployment of these functions. To better control the risk associated with this storm of complex functionality, open operating environments, and cutting-edge technology, there is a need for industry consensus on best practices for achieving an acceptable level of safety. Navigating the Evolving Landscape of Safety Standards for Machine Learning-based Road Vehicle Functions provides an overview of standards relevant to the safety of ML-based vehicle functions and serves as guidance for technology providers—including those new to the automotive sector—on how to interpret the evolving standardization landscape. The report also contains practical guidance, along with an example from the perspective of a developer of an ML-based perception function on how to interpret the requirements of these standards. Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2024017




Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time


Book Description

Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space




Computer Security


Book Description




Pharmacy Informatics


Book Description

Applies the Principles of Informatics to the Pharmacy ProfessionEmphasizes Evidence-Based Practice and Quality Improvement ApproachesLeading the way in the integration of information technology with healthcare, Pharmacy Informatics reflects some of the rapid changes that have developed in the pharmacy profession. Written by educators and profession




Sensor Technologies


Book Description

Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications. The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. “Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications.” Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London “This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner. It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based ‘big data’ analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present. It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health.” Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visualized, in addition to offering exemplar case studies in a number of application domains. It is a must-read for those studying any undergraduate course that involves sensor technologies. It also provides a thorough foundation for those involved in the research and development of applied sensor systems. I highly recommend it to any engineer who wishes to broaden their knowledge in this area!" Chris Nugent Professor of Biomedical Engineering, University of Ulster




C4.5


Book Description

This book is a complete guide to the C4.5 system as implemented in C for the UNIX environment. It contains a comprehensive guide to the system's use, the source code (about 8,800 lines), and implementation notes.




Software Extension to the PMBOK Guide, Fifth Edition


Book Description

Designed to be used in tandem with the latest edition of the PMBOK(R) Guide, this comprehensive volume closely follows the PMBOK(R) Guide's approach to style, structure and naming, while providing readers a balanced view of methods, tools, and techniques for managing software projects across the life cycle continuum from highly predictive life cycles to highly adaptive life cycles. Software Extension To the PMBOK(R) Guide Fifth Edition provides readers with knowledge and practices that will not only improve their efficiency and effectiveness but that of their management teams and project members as well.




Programming — ALGOL


Book Description

Programming — ALGOL describes the basics of computer programming using Algol. Commands that could be added to Algol and could increase its scope are described, including multiplication and division and the use of brackets. The idea of labeling or naming a command is also explained, along with a command allowing two alternative results. Most of the important features of Algol syntax are discussed, and examples of compound statements (that is, sets of commands enclosed by a begin ... end command) are given. Comprised of 11 chapters, this book begins with an introduction to the digital computer and how it works using a list of instructions known as a program. The "punched-tape" method of feeding information into a computer is described together with the flexowriter. The next chapter provides an overview of Algol by studying a very simple program and comparing it with the same sequence of instructions written in normal English. The third chapter is about building a program, first by increasing the complexity of the actual computation and then economizing on memory stores. Subsequent chapters focus on how computer programs can be built up of simple commands; labeling or naming a command; facilities in the Algol language which allow the addition of a second alternative command to an if ... then statement; and the use of a flow diagram to translate a problem into Algol. The final chapter examines the method of running a program on a computer. This monograph will be of interest to computer programmers.




Reverse Logistics


Book Description

This book addresses decision making in reverse logistics, which concerns the integration of used and obsolete products back into the supply chain as valuable resources. It covers a wide range of aspects, related to distribution, production and inventory management, and supply chain management. For each topic, it highlights key managerial issues in real-life examples and explains which quantitative models are available for addressing them. By treating a broad range of issues in a unified way, the book offers the reader a comprehensive view on the field of reverse logistics.




Embedded Security in Cars


Book Description

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge. Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization. The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.