Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Energy technology & engineering
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Eco-friendly and comprehensive strategy for policy makers Accomplished guide for academicians and other stakeholders of environments Sustainable development in carbon sequestration in different vegetation landscapes
1) Covers different types of cranes including bridge cranes, tower cranes, aerial cranes and dual cranes 2) Provides different industrial applications 3) Demonstrates how to reduce unwanted vibrations to ensure safe and effective operations 4) Discusses how to use advanced control methods in order to reduce vibration
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
With new chapters on electrical system optimization and ISO 50001, this edition also covers the latest updates to codes and standards in the energy industry. Also included are chapters on energy economic analysis, energy auditing, waste heat recovery, utility system optimization, HVAC, cogeneration, control systems, energy management, compressed air system optimization and financing energy projects. Additional topics include emerging technologies such as oxy-fuel combustion, high efficiency burners, enhanced heat exchangers, and ceramic membranes for heat recovery as well as information on how to do an energy analysis of any system; electrical system optimization; state-of-the-art lighting and lighting controls. This reference will guide you step by step in applying the principles of energy engineering and management to the design of electrical, HVAC, utility, process and building systems for both new design and retrofit projects. The text is thoroughly illustrated with tables, graphs, diagrams and sample problems.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
Provides an overview of the role engineering plays in climate change and environmental pollution Presents an updated overview of Green Engineering focusing on green technology Innovations Explores energy management strategies Discusses green communication technologies, green computing technologies, green smart buildings, green smart lighting, green smart mobility management, fuel-efficient transportation, paperless offices, energy efficiency measures, waste recycling, etc. Identifies the development of sustainable plans and programs at the urban level within the current legislative framework
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
Based upon the author's wide experience in a broad range of projects, this invaluable book sets the scene and places rock installation in the context of the offshore industry today. This is an industry where health, safety and environmental considerations are factored in to a project with the same level of professionalism as regulatory compliance and good design. Full information is provided about planning, preparation, execution and reporting of a rock installation project. Brief but key information is provided about rock types, the nature of the seabed and the relationship between the quarry and the receiving vessel, which together form a system of turning a terrestrial geological formation into a rock berm offshore. Rock installation vessels, their characteristics, equipment and capabilities are examined in outline. This book is based upon personal experience offshore in a series of rock installation projects over the last 16 years. It covers the oil and gas sector, coastal engineering, power and telecom cable projects and draws on practice in the UK, Norwegian and Danish Exclusive Economic Zones where much rock installation takes place. The range in scale is significant, from large oil field development projects to those of a much more specialised nature such as the preparation of sites from which a jackup rig can safely operate. The marine environment is examined in some detail. The author believes that all personnel working in the offshore industry, whether at sea or in onshore positions, need to understand the harsh but majestic, hostile and often unforgiving marine environment. With a number of new operators developing both end of life and new fields, knowledge concerning SRI has been diluted or even lost. This book is a useful enabler for project staff and new client representatives offshore to have a productive rock installation experience from the initial discussions with a contractor to the final results and verification.
Global populations have grown rapidly in recent decades, leading to
ever increasing demands for shelter, resources, energy and
utilities. Coupled with the worldwide need to achieve lower impact
buildings and conservation of resources, the need to achieve
sustainability in urban environments has never been more acute.
This book critically reviews the fundamental issues and applied
science, engineering and technology that will enable all cities to
achieve a greater level of metropolitan sustainability, and assist
nations in meeting the needs of their growing urban populations.
This easy accessible textbook provides an overview of solar to
electric energy conversion, followed by a detailed look at one
aspect, namely photovoltaics, including the underlying principles
and fabrication methods. Professor Wolf, an experienced author and
teacher, reviews such green technologies as solar-heated-steam
power, hydrogen, and "artificial leaf" approaches, as well as
nuclear fusion. Throughout the book, carefully chosen, up-to-date
examples are used to illustrate important concepts and research
tools.
A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.
This new volume, Real-Life Applications of the Internet of Things: Challenges, Applications, and Advances, provides an overview of the Internet of Things along with its architectures, its vital technologies their uses in our daily life and other domains, and associated challenges. The book also covers some advanced topics where IoT is combined with other emerging technologies, such as blockchain and cloud, which will bring a revolution in the era of IoT. Topics in the volume cover the many powerful features and applications of IoT, such as for weather forecasting, in agriculture, in medical science, in surveillance systems, and much more. The first section of the book covers many of the issues and challenging arising from the Internet of Things. The section explores security challenges, such as attack detection and prevention systems as well as energy efficiency and resource management in IoT. Part II introduces various application areas of IoT, including the uses of smart technology in agricultural management, in healthcare diagnosis and monitoring, and in the financial industry. The third section of the book discusses the integration of IoT with blockchain, cloud, and big data and features some advanced topics. The variety of topics includes surveillance network technology, the shift from television to video streaming apps and the technology involved, using IoT-fog computing for smart healthcare, detection of anomalies in climate conditions, and even detection of illegal wood logging activity. The informative chapters in this volume will shed light on the varied challenges, issues, and advances in IoT technology and culture for scientists and researchers, faculty and students, and industry professionals.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
In Contesting Hydropower in the Brazilian Amazon, Ed Atkins focuses on how local, national, and international civil society groups have resisted the Belo Monte and Sao Luiz do Tapajos hydroelectric projects in Brazil. In doing so, Atkins explores how contemporary opposition to hydropower projects demonstrate a form of 'contested sustainability' that highlights the need for sustainable energy transitions to take more into account than merely greenhouse gas emissions. The assertion that society must look to successfully transition away from fossil fuels and towards sustainable energy sources often appears assured in contemporary environmental governance. However, what is less certain is who decides which forms of energy are deemed 'sustainable.' Contesting Hydropower in the Brazilian Amazon explores one process in which the sustainability of a 'green' energy source is contested. It focuses on how civil society actors have both challenged and reconfigured dominant pro-dam assertions that present the hydropower schemes studied as renewable energy projects that contribute to sustainable development agendas. The volume also examines in detail how anti-dam actors act to render visible the political interests behind a project, whilst at the same time linking the resistance movement to wider questions of contemporary environmental politics. This interdisciplinary work will be of great interest to students and scholars of sustainable development, sustainable energy transitions, environmental justice, environmental governance, and development studies.
The 20th century is known to the entire world as a century of American greatness. Innovations in energy drove that American superiority; innovations such as oil pipelines, petroleum-based fuel, the light bulb, electricity, and the power grid. However, our legacy energy economy leaves us wanting in the 21st century. Centralized vulnerability, wasted generation capacity, dependence on foreign fuel, and climate change are financed by every one of us at the pump and in our monthly utility bill. However, "Energy Freedom" is not about what is wrong with our current energy economy; rather it describes a bright future that is waiting to be unlocked. It presents a plan where the average homeowner can not only achieve Energy Freedom for their household, but usher in the new energy economy.
This book provides a collection of papers from the Ninth Workshop on Computing: Theory and Practice, WCTP 2019 devoted to theoretical and practical approaches to computation, which was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, the University of the Philippines Diliman, and De La Salle University. The proceedings provide a broad overview of recent research trends in computer science research in Asia, particularly in these two countries. The papers included in the proceedings focus on both theoretical and practical aspects of computations, such as programming language theory, modeling of software systems, applications of machine learning, empathic computing, and various applications of information technology.
This radical book aims to inject new insight and urgency into the discourse on the retrofitting of commercial and residential buildings in the face of the climate emergency. It is about the why, how and who should take the lead in revolutionising buildings in the face of serious climate and social change. Buildings contribute very significantly to the output of carbon, particularly in developed countries where the stock is old, but it is neither feasible nor desirable to demolish them all and start again! If existing buildings cannot in be replaced in the short-term by new zero carbon stock, retrofitting and adaptation of the existing building stock is critical and urgent. This book explains why and how the improvement of buildings requires a complex, holistic approach that brings all stakeholders together with respect and understanding. Yet to do this against a limited time frame is challenging. The book analyses what must be done, explores how it could be achieved and sets out a manifesto for action by all those engaged: from policy makers, to educationalists, designers, constructors, investors, funders and occupiers. By bringing together authors from across the built environment disciplines, the book stimulates debate within policy, practice and education circles which must lead to action if we are to avoid catastrophe. This is a unique addition to the literature on the sustainability of existing buildings and their retrofitting for the benefit of all.
An ideal reference book for students (undergraduates and postgraduates) studying Building Surveying, Quantity Surveying, or Architecture, etc. Of use to the Construction-related legal profession, Property Managers and Letting Agents. Builders (and homeowners, interested in identifying faults in their property), should also benefit from this book. Covers a wide range of new and old building terms, techniques, technologies, and materials, but much more extensively than the average dictionary. The alphabetical format makes it easy to check up on terms and subject-areas quickly -- and the detailed coverage (including helpful drawings/illustrated figures) provides clear guidance to the reader.
An ideal reference book for students (undergraduates and postgraduates) studying Building Surveying, Quantity Surveying, or Architecture, etc. Of use to the Construction-related legal profession, Property Managers and Letting Agents. Builders (and homeowners, interested in identifying faults in their property), should also benefit from this book. Covers a wide range of new and old building terms, techniques, technologies, and materials, but much more extensively than the average dictionary. The alphabetical format makes it easy to check up on terms and subject-areas quickly -- and the detailed coverage (including helpful drawings/illustrated figures) provides clear guidance to the reader.
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies |
You may like...
Advances in Energy, Environment and…
Ahmad Zuhairi Abdullah, Azlin Fazlina Osman
Hardcover
R6,138
Discovery Miles 61 380
My Revision Notes: Building Services…
Mike Jones, Stephen Jones, …
Paperback
R619
Discovery Miles 6 190
Power System Analysis and Design, SI…
J. Duncan Glover, Mulukutla Sarma, …
Paperback
Biofuel Technologies for a Sustainable…
Yashvir Singh, Prateek Negi, …
Hardcover
R2,970
Discovery Miles 29 700
Power System Analysis and Design, SI…
Thomas Overbye, J. Duncan Glover, …
Paperback
Building Services Engineering for…
Peter Tanner, Stephen Jones, …
Paperback
R1,325
Discovery Miles 13 250
|