CENELEC EN 50128 and IEC 62279 standards are applicable to the performance of software in the railway sector. The 2011 version of the 50128 standard firms up the techniques and methods to be implemented. This is a guide to its implementation, in order to understand the foundations of the standard and how it impacts on the activities to be undertaken, helping towards better a preparation for the independent evaluation phase, which is mandatory.
The Earth’s oceans are currently undergoing unprecedented changes: rivers have suffered a severe reduction in their sediment transport, and as a result, sediment input to the oceans has dropped lower than ever before. These inputs have varied over millennia as a result of both natural occurrences and human actions, such as the building of dams and the extraction of materials from riverbeds. Sedimentary Crisis at the Global Scale 1 examines how river basins have been affected by the sedimentary crises of various historical epochs. By studying global balances, it provides insights into the profound disruption of the solid transport of fluvial bodies. The book also explores studies of various rivers, from the Amazon, which remains relatively unaffected, to dying rivers such as the Colorado and the Nile.
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives. It then moves on to show how it is possible to define a safety architecture (including redundancy, diversification, error-detection techniques) on the basis of safety objectives and how to identify objectives related to software programs. From software objectives, the authors present the different safety techniques (fault detection, redundancy and quality control). “Certifiable system” aspects are taken into account throughout the book. Contents 1. Safety Management. 2. From System to Software. 3. Certifiable Systems. 4. Risk and Safety Levels. 5. Principles of Hardware Safety. 6. Principles of Software Safety. 7. Certification. About the Authors Jean-Louis Boulanger is currently an Independent Safety Assessor (ISA) in the railway domain focusing on software elements. He is a specialist in the software engineering domain (requirement engineering, semi-formal and formal method, proof and model-checking). He also works as an expert for the French notified body CERTIFER in the field of certification of safety critical railway applications based on software (ERTMS, SCADA, automatic subway, etc.). His research interests include requirements, software verification and validation, traceability and RAMS with a special focus on SAFETY.
In a context where climate change urgently requires us to alter our paradigms, this book explores the possibilities of cities that are both more energy efficient and more respectful of the environment. Based on the observation that urban planning has been detrimentally affected by the compartmentalization of knowledge and practices, this book is conceived as a dialog between transport and urban planning on the one hand, and between engineering and social science on the other. Systemic analysis and a historical approach, integrating the teachings of the last two centuries, constitute at the methodological level the framework in which this dialog unfolds. Based on examples of good practice, Transport and Town Planning identifies an effective set of levers of action and proposes an original method to guide and accompany urban transition with a large share of the initiative reserved for the actors concerned.
The popularity of Charles de Foucauld continues to spread around the globe as time goes on. Unknown during his lifetime as a solitary monk in the Sahara Desert, and assassinated by bandits in 1916, this former French playboy had a radical conversion to Christ that compelled him to live a deeply ascetical religious life that has had a great impact on the world since his death. This definitive biography by Jean-Jacques Antier, a renowned French author of more than 50 books, is the fruit of his exhaustive research on Foucauld's life, writings and correspondence. He was given access to the complete archive on the life of Foucauld from the Congregation of the Saints compiled for his beatification process. Antier also interviewed numerous witnesses resulting in a powerful, inspiring biography of this holy, 20th century figure, a "personality of fire." Illustrated. "In seeking the true and the good, our contemporaries tend to prefer authentic and modest witnesses, symbols of the salvation of the human family. That was the intuition which guided Charles de Foucauld, a great man of God, who sought to show the Gospel in a hidden, laborious way, in the silence which God signifies his presence as if it were a gentle breeze." --Pope John Paul II
This book covers various modern theoretical, technical, practical and technological aspects of computerized numerical control and control systems of deterministic and stochastic dynamical processes.
Certifiable Software Applications 1: Main Processes is dedicated to the establishment of quality assurance and safety assurance. It establishes the context for achieving a certifiable software application. In it, the author covers recent developments such as the module, component and product line approach. Applicable standards are presented and security principles are described and discussed. Finally, the requirements for mastering quality and configuration are explained. In this book the reader will find the fundamental practices from the field and an introduction to the concept of software application. - Presents the fundamental practices from the field - Emphasizes the development of quality assurance and safety assurance - Introduces the concept of software application - Covers recent developments such as module, component, and the product line approach
Certifiable Software Applications 2: Support Processes explains the process to achieve a certifiable application. This concerns several major topics, skill management, data preparation, requirement management, software verification, and software validation. In addition, analysis of the impact of the use of COTS and pre-existing software on certifiable software is presented. Finally, the last support process concerns the management of commercial tools, the creation of a specific tools, and therefore the qualification of tools, which is based on their impact on the final software. - Explains configuration management, management of anomalies, skills management, and quality control - Discusses the major topics of skill management, data preparation, requirement management, software verification, and software validation - Presents tactics for the management of commercial tools and the creation of a specific tool which is based on their impact on the final software
Making a decision, of any importance, is never simple. On the one hand, specialists in decision theory do not come within the reach of most policy makers and, secondly, there are very few books on pragmatic decision that are not purely anecdotal. In addition, there is virtually no book that provides a link between decision-making and action. This book provides a bridge between the latest results in artificial intelligence, neurobiology, psychology and decision-making for action. What is the role of intuition or emotion? What are the main psychological biases of which we must be wary? How can we avoid being manipulated? What is the proper use of planning? How can we remain rational even if one is not an expert in probabilities? Perhaps more importantly for managers, how does one go from decision to action? So many questions fundamental to the practice of decision-making are addressed. This book dissects all issues that arise almost daily for decision-makers, at least for major decisions. Drawing on numerous examples, this book answers, in plain language and imagery, all your questions. The final chapter takes the form of a brief reminder - everything you have to remember to be a good decision-maker.
Certifiable Software Applications 3: Downward Cycle describes the descending phase of the creation of a software application, detailing specification phases, architecture, design and coding, and important concepts on modeling and implementation. For coding, code generation and/or manual code production strategies are explored. As applications are coded, a presentation of programming languages and their impact on certifiability is included. - Describes the descending phase of the creation of a software application, detailing specification phases, architecture, design and coding - Presents valuable programming examples - Includes a presentation of programming languages and their impact on certifiability
Following Mussolini’s declaration of war in June 1940, initially Italy faced only those British troops based in the Middle East but as the armed confrontation in the Western Desert of North Africa escalated, other nations were drawn in — Germany, Australia, India, South Africa, New Zealand, France and finally the United States to wage the first major tank-versus-tank battles of the Second World War. First tracing the history of the very early beginnings of civilization in North Africa, and on through the period of Italian colonization, Jean Paul Pallud begins his account when the initial shots were fired at the 11th Hussars as they approached Italian outposts near Sidi Omar in Libya. It proved to be the opening move of a campaign which was to last for three years. When the Afrikakorps led by Rommel joined the battle in February 1941, the Germans soon gained the upper hand and recovered the whole of Cyrenaica, minus Tobruk, in the summer. The campaign then swung back and forth across the desert for another year until Rommel finally captured Tobruk in June 1942 and then moved eastwards into Egypt. With British fortunes at their lowest ebb, changes in command led to Montgomery launching his offensive at El Alamein the following November. This began the advance of the Eighth Army over a thousand miles to Tunisia, resulting in the final round-up of the German and Italian forces in May 1943. Jean Paul and his camera retraced the route just prior to the recent civil war in Libya and the uprisings in Tunisia and Egypt in 2011, so he was fortunate to capture the locations before yet another war left its trail of death and destruction. Although the campaign in 1940-43 was dominated largely by armor, nevertheless the Allies lost over 250,000 men killed, wounded, missing and captured and the Axis 620,000. Those that never came home lie in cemeteries scattered across the barren landscape of a battlefield that has changed little in over 70 years.
The peaceful use of atomic energy has given rise to a variety of nuclear accidents from the start. This concerns all forms of use, industrial and medical. For each accident, Industrial and Medical Nuclear Accidents details the contamination of the environment, flora and fauna, and quantifies the effects of ionizing radiation. The book also examines the adverse effects on the health, both physical and mental, of the human populations concerned. The monetary cost is also evaluated. The research presented in this book is based on scientifically recognized publications and on the reports of national and international organizations competent in this field (IAEA, WHO, UNSCEAR, IRSN, etc.). The book contains chapters devoted to the most recent accidents (Chernobyl and Fukushima), with a large body of institutional and academic literature.
When the western Allies decided to launch a second front in North Africa, they carefully considered the anti-British feeling left in France by the ill-advised attack by the Royal Navy on the French Fleet at Mers el Kébir in July 1940. Consequently, the operation was given an American rather than a British complexion, General Eisenhower was chosen to lead a mostly American force into battle and the major Royal Navy contribution was kept as inconspicuous as possible. This operation marked the first time that American troops fought against German forces during the Second World War. They had a rough baptism of fire in southern Tunisia in February 1943, training, equipment and leadership failed in many instances to meet the requirements of the battlefield, but the US Army was quick to learn and revise army doctrines, particularly with respect to the use of armor. The successful campaign created thousands of seasoned soldiers of all ranks whose experience would prove decisive in subsequent campaigns. The next test was only two months away — the invasion of Sicily. In addition, Operation ‘Torch’ brought the French army back into the war. Most important of all, the Allies had seized the initiative in the West.
Numerical simulation is a technique of major importance in various technical and scientific fields. Used to understand diverse physical phenomena or to design everyday objects, it plays a major role in innovation in the industrial sector. Whilst engineering curricula now include training courses dedicated to it, numerical simulation is still not well-known in some economic sectors, and even less so among the general public. Simulation involves the mathematical modeling of the real world, coupled with the computing power offered by modern technology. Designed to perform virtual experiments, digital simulation can be considered as an "art of prediction". Embellished with a rich iconography and based on the testimony of researchers and engineers, this book shines a light on this little-known art. It is the first of two volumes and focuses on the principles, methods and industrial practice of numerical modeling.
Numerical simulation is a technique of major importance in various technical and scientific fields. Whilst engineering curricula now include training courses dedicated to it, numerical simulation is still not well-known in some economic sectors, and even less so among the general public. Simulation involves the mathematical modeling of the real world, coupled with the computing power offered by modern technology. Designed to perform virtual experiments, digital simulation can be considered as an "art of prediction". Embellished with a rich iconography and based on the testimony of researchers and engineers, this book shines a light on this little-known art. It is the second of two volumes and gives examples of the uses of numerical simulation in various scientific and technical fields: agriculture, industry, Earth and universe sciences, meteorology and climate studies, energy, biomechanics and human and social sciences.
Mathematical Imaging is currently a rapidly growing field in applied mathematics, with an increasing need for theoretical mathematics. This book, the second of two volumes, emphasizes the role of mathematics as a rigorous basis for imaging sciences. It provides a comprehensive and convenient overview of the key mathematical concepts, notions, tools and frameworks involved in the various fields of gray-tone and binary image processing and analysis, by proposing a large, but coherent, set of symbols and notations, a complete list of subjects and a detailed bibliography. It establishes a bridge between the pure and applied mathematical disciplines, and the processing and analysis of gray-tone and binary images. It is accessible to readers who have neither extensive mathematical training, nor peer knowledge in Image Processing and Analysis. It is a self-contained book focusing on the mathematical notions, concepts, operations, structures, and frameworks that are beyond or involved in Image Processing and Analysis. The notations are simplified as far as possible in order to be more explicative and consistent throughout the book and the mathematical aspects are systematically discussed in the image processing and analysis context, through practical examples or concrete illustrations. Conversely, the discussed applicative issues allow the role of mathematics to be highlighted. Written for a broad audience – students, mathematicians, image processing and analysis specialists, as well as other scientists and practitioners – the author hopes that readers will find their own way of using the book, thus providing a mathematical companion that can help mathematicians become more familiar with image processing and analysis, and likewise, image processing and image analysis scientists, researchers and engineers gain a deeper understanding of mathematical notions and concepts.
This study takes stock of progress made so far in the financial sectors of sub-saharan African countries. It recommends further reforms and specific measures in the areas of supervision, development of monetary operations and financial markets, external sector liberalization, central bank autonomy and accountability, payments system, and central bank accounting and auditing.
La mise en place d’un logiciel sans défaut reste primordiale pour plusieurs domaines qui requièrent des applications dites de sécurité comme les transports. La réalisation d’un modèle formel est l’approche la plus efficace pour atteindre l'objectif du zéro défaut, que ce soit en termes de temps ou de maîtrise de la complexité. Ce modèle permet d’analyser et de vérifier le comportement d’un logiciel. Cet ouvrage présente la méthode B, une méthode formelle s’appuyant sur la preuve de propriétés qui, sur la base d’une spécification et de la notion de raffinement, permet d’aller jusqu’à la production automatique de code. Différents outils découlant de cette méthode ainsi que des exemples concrets d’utilisations industrielles de différentes tailles sont aussi exposés dans des domaines tels que l’avionique ou les systèmes manufacturiers.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.