![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Energy technology & engineering > Electrical engineering > General
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
Natural Language Processing In Healthcare: A Special Focus on Low Resource Languages covers the theoretical and practical aspects as well as ethical and social implications of NLP in healthcare. It showcases the latest research and developments contributing to the rising awareness and importance of maintaining linguistic diversity. The book goes on to present current advances and scenarios based on solutions in healthcare and low resource languages and identifies the major challenges and opportunities that will impact NLP in clinical practice and health studies.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
An ideal reference book for students (undergraduates and postgraduates) studying Building Surveying, Quantity Surveying, or Architecture, etc. Of use to the Construction-related legal profession, Property Managers and Letting Agents. Builders (and homeowners, interested in identifying faults in their property), should also benefit from this book. Covers a wide range of new and old building terms, techniques, technologies, and materials, but much more extensively than the average dictionary. The alphabetical format makes it easy to check up on terms and subject-areas quickly -- and the detailed coverage (including helpful drawings/illustrated figures) provides clear guidance to the reader.
Updated to integrated modular avionics, and cabin and aircraft information systems Ideal for students gaining EASA Part 66 licences, particularly the B1 or B2 licence One of Routledge's core aircraft maintenance titles.
Conceptually, as well as practically, digitalization is similar to the implementation of a modern computation model - the model may be a centralized setup using a mainframe or it may be extended to an N-tier architecture. Regardless of the specifics of the implementation, however, the conceptual model of data processing remains the same. Digitalization is nothing but a system relying on digital technologies to create, conduct and, potentially, expand a business activity of some sort. Digitalization can be used to create an e-commerce model for a small business or to create a global supply and distribution chain geared toward almost any kind of a business. It could also be used for non-profit purposes, such as on-line education and telemedicine or e-government. Digitalization: Contexts, Roles, and Outcomes is a contemplation and analysis of the socio-technical system that is known as digitalization. It considers the context of digitalization as well as the ways by which digitalization offers value to the context within which it operates. This book aims to offer readers an entry point to a path of inquiry into the different aspects of digitalization. The goal is to identify main directions for further inquiry as well as to outline the most obvious obstacles along the way. The book aims to guide readers on their own unique journeys using the basic ideas, principles, and concepts synthesized, developed, and presented in the book. It is beneficial to both practitioners and researchers. The book covers: The functionality of digitalization The significance of digitalization Identifying the context of digitalization Designing a control system A cognitive model for the theory of digitalization Designing a theory of digitalization The book helps readers to consider the subject of digitalization in a rigorous and rational way so their own perspectives can emerge stronger and be substantiated and reinforced by building an argument vis-a-vis perspectives and points examined in this book.
Semiconductors with optical characteristics have found widespread use in evolving semiconductor photovoltaics, where optical features are important. The industrialization of semiconductors and their allied applications have paved the way for optical measurement techniques to be used in new ways. Due to their unique properties, semiconductors are key components in the daily employed technologies in healthcare, computing, communications, green energy, and a range of other uses. This book examines the fundamental optical properties and applications of semiconductors. It summarizes the information as well as the optical characteristics and applicability of semiconductors through an in-depth review of the literature. Accomplished experts in the field share their knowledge and examine new developments. FEATURES Comprehensive coverage of all types of optical applications using semiconductors Explores relevant composite materials and devices for each application Addresses the optical properties of crystalline and amorphous semiconductors Describes new developments in the field and future potential applications Optical Properties and Applications of Semiconductors is a comprehensive reference and an invaluable resource for engineers, scientists, academics, and industry R&D teams working in applied physics.
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA). The goals of the Conference are to foster international research collaborations in Management Science and Engineering Management as well as to provide a forum to present current research findings. The selected papers cover various areas in management science and engineering management, such as Decision Support Systems, Multi-Objective Decisions, Uncertain Decisions, Computational Mathematics, Information Systems, Logistics and Supply Chain Management, Relationship Management, Scheduling and Control, Data Warehousing and Data Mining, Electronic Commerce, Neural Networks, Stochastic Models and Simulation, Fuzzy Programming, Heuristics Algorithms, Risk Control, Organizational Behavior, Green Supply Chains, and Carbon Credits. The proceedings introduce readers to novel ideas on and different problem-solving methods in Management Science and Engineering Management. We selected excellent papers from all over the world, integrating their expertise and ideas in order to improve research on Management Science and Engineering Management.
Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.
In this book, the fundamentals of micro- and nanofabrication are described on the basis of the concept of "using gases as a fabrication tool." Unlike other books available on the subject, this volume assumes only entry-level mathematics, physics, and chemistry of undergraduates or high-school students in science and engineering courses. Necessary theories are plainly explained to help the reader learn about this new attractive field and enable further reading of specialized books. The book is an attractive guide for students, young engineers, and anyone getting involved in micro- and nanofabrication from various fields including physics, electronics, chemistry, and materials sciences.
Blockchain technology has been penetrating every aspect of Information and Communications Technology (ICT), and its use has been growing rapidly in recent years. The interest and development of this technology has primarily been driven by the enormous value growth of cryptocurrencies and large investments of venture capital in blockchain start-ups. Blockchain for Smart Systems: Computing Technologies and Applications is intended to clarify and define, in simple terms, the technology behind blockchain. It provides a deep dive into the core fundamentals of blockchain: hashing algorithm behind each block, distributed technology, smart contracts, and private vs. public blockchain. Features Discusses fundamental theories of practical and sophisticated applications of blockchain technology Includes case studies Discusses the concepts with illustrations, appropriate figures, tables, and simple language This book is primarily aimed at undergraduates, graduates, research scholars, academicians, and industry and technology enthusiasts working in various aspects of blockchain technology.
Articulates a series of scientific and technological developments described in a didactic way Shows a broad view of biometrics in several contexts: Current cases of study in five different areas Provides experimental results in different environments (availability of data and computer code to reproduce the experiments) Includes transdisciplinary approaches and discussions for each chapter Innovation as part of the final cases of study: developments are already affecting the new businesses of the digital age and the era of the brain
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
Nanosensors are innovative devices that exploit the unique properties exhibited by matter at the nanoscale. A growing and exciting field, nanosensors have recently spurred considerable research endeavors across the globe, driving a need for the development of new device concepts and engineering nanostructured materials with controlled properties. Nanosensors: Physical, Chemical, and Biological, Second Edition offers a panoramic view of the field and related nanotechnologies with extraordinary clarity and depth. Presenting an interdisciplinary approach, blending physics, chemistry and biology, this new edition is broad in scope and organised into six parts; beginning with the fundamentals before moving onto nanomaterials and nanofabrication technologies in the second part. The third and fourth parts provide a critical appraisal of physical nanosensors, and explore the chemical and biological categories of nanosensors. The fifth part sheds light on the emerging applications of nanosensors in the sectors of society, industry, and defense and details the cutting-edge applications of state-of-the-art nanosensors in environmental science, food technology, medical diagnostics, and biotechnology. The final part addresses self-powering and networking issues of nanosensors, and provides glimpses of future trends. This is an ideal reference for researchers and industry professionals engaged in the frontier areas of material science and semiconductor fabrication as well as graduate students in physics and engineering pursuing electrical engineering and electronics courses with a focus on nanoscience and nanotechnology. Key features: Provides an updated, all-encompassing exploration of contemporary nanosensors and highlights the exclusive nanoscale properties on which nanosensors are designed. Presents an accessible approach with a question-and-answer format to allow an easy grasp of the intricacies involved in the complex working mechanisms of devices. Contains clear, illustrative diagrams enabling the visualization of nanosensor operations, along with worked examples, end of chapter questions, and exhaustive up-to-date bibliographies appended to each chapter.
UAV swarm network has been used in many critical applications, such as disaster recovery, area surveillance, weather monitoring, and military communications. There are many challenging R&D issues in UAV network designs, such as the hardware/software integration for a large-scale UAV network management, long-distance data transmissions among UAVs, swarm shape/formation control, and intelligent UAV mobility/position prediction. This book will be the first one to cover the engineering designs (especially network protocol designs) for dynamic, large-scale UAV network. It has the technical models/algorithms and protocol specifications for practical UAV swarm network deployment. Features: Includes chapters written by professors, researchers, engineers, and experts in UAV networking fields Details network protocol descriptions for practical engineering designs Covers 7-layer protocols (particularly data routing layer) Presents novel AI models/algorithms for intelligent UAV swarming/networking control Highlights practical hardware/software implementations for advanced UAV networks This book is suitable to a variety of audiences: (1) industry UAV R&D engineers, administrators, or technicians, who would like to grasp the latest trends in UAV communications; (2) college graduate students or researchers, who may want to pursue some advanced research on large-scale UAV swarming and networking technologies; (3) government agencies that determine the future society development in this exciting field; and (4) other interested readers with a strong desire to understand the challenges of designing a QoS-oriented UAV network. The book editors are: Dr. Fei Hu, Professor in Electrical and Computer Engineering at University of Alabama, Tuscaloosa, Alabama, USA; Dr. Xin-Lin Huang, Professor in Information and Communication Engineering, Tongji University, Shanghai, China; and Dr. DongXiu Ou, Professor in Transportation Information Institute at Tongji University, Shanghai, China.
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
This book presents recent and important developments in the field of Photonics and Optoelectronics, with a particular focus on Laser Technology, Optical Communications, Optoelectronic Devices and Image Processing. At present, Photonics and Optoelectronics Technologies are pivotal to the future of laser, displays, sensors and communication technologies, and currently being developed at an extraordinary rate. This book details the theories underlying the mechanisms involved in the relevant Photonics and Optoelectronics. Devices such as laser diodes, photodetectors, and integrated optoelectronic circuits are investigated. The reviews by leading experts are of interest to researchers and engineers as well as advanced students.
- Detailed examples of new technology and its important applications for global security and defence, sufficient guidelines for immediate implementations. - Aimed at system theorists, distributed algorithms designers, NASA, DARPA, and SDA network managers, defence and security personnel, university students interested in advanced MSc and PhD projects, and many others. - The book offers a concrete and very practical management solution for many problems described in other books in this area, which were presented mostly on general descriptive and qualitative levels
A large international conference in Electrical Engineering and Applied Computing was just held in London, 30 June - 2 July, 2010. This volume will contain revised and extended research articles written by prominent researchers participating in the conference. Topics covered include Control Engineering, Network Management, Wireless Networks, Biotechnology, Signal Processing, Computational Intelligence, Data Mining, Computational Statistics, Internet Computing, High Performance Computing, and industrial applications. The book will offer the states of arts of tremendous advances in electrical engineering and applied computing and also serve as an excellent reference work for researchers and graduate students working on electrical engineering and applied computing
This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.
This book introduces readers to recent advancements in financial technologies. The contents cover some of the state-of-the-art fields in financial technology, practice, and research associated with artificial intelligence, big data, and blockchain-all of which are transforming the nature of how products and services are designed and delivered, making less adaptable institutions fast become obsolete. The book provides the fundamental framework, research insights, and empirical evidence in the efficacy of these new technologies, employing practical and academic approaches to help professionals and academics reach innovative solutions and grow competitive strengths.
The student's companion website and the instructor manual can be accessed here. This textbook provides the knowledge and skills needed for thorough understanding of the most important methods and ways of thinking in experimental physics. The reader learns to design, assemble, and debug apparatus, to use it to take meaningful data, and to think carefully about the story told by the data. Key Features: Efficiently helps students grow into independent experimentalists through a combination of structured yet thought-provoking and challenging exercises, student-designed experiments, and guided but open-ended exploration. Provides solid coverage of fundamental background information, explained clearly for undergraduates, such as ground loops, optical alignment techniques, scientific communication, and data acquisition using LabVIEW, Python, or Arduino. Features carefully designed lab experiences to teach fundamentals, including analog electronics and low noise measurements, digital electronics, microcontrollers, FPGAs, computer interfacing, optics, vacuum techniques, and particle detection methods. Offers a broad range of advanced experiments for each major area of physics, from condensed matter to particle physics. Also provides clear guidance for student development of projects not included here. Provides a detailed Instructor's Manual for every lab, so that the instructor can confidently teach labs outside their own research area. The manual can be accessed here.
The book addresses a clear gap in the current literature and comes at a very topical time The five high-level themes provide a highly suitable and multidisciplinary nature and focus; The chapter topics cover a broad and appealing range
Focuses on the definition, engineering, and delivery of AI solutions as opposed to AI itself Reader will still gain a strong understanding of AI, but through the perspective of delivering real solutions Explores the core AI issues that impact the success of an overall solution including i. realities of dealing with data, ii. impact of AI accuracy on the ability of the solution to meet business objectives, iii. challenges in managing the quality of machine learning models Includes real world examples of enterprise scale solutions Provides a series of (optional) technical deep dives and thought experiments.
Title: The Vacuum Interrupter: Theory, Design, and ApplicationShelving guide: Electrical Engineering Dr. Paul Slade draws from his nearly six decades of active experience to develop this second edition of The Vacuum Interrupter: Theory, Design, and Application. This book begins by discussing the design requirements for high voltage vacuum interrupters and then the contact requirements to interrupt the vacuum arc. It then continues by describing the various applications in which the vacuum interrupter is generally utilized. Part 1 of this book begins with a detailed review of the vacuum breakdown process. It continues by covering the steps necessary for the design and the manufacture of a successful vacuum interrupter. The vacuum arc is then discussed, including how it is affected as a function of current. An overview of the development and use of practical contact materials, along with their advantages and disadvantages, follows. Contact designs that are introduced to control the high current vacuum arc are also analyzed. Part 2, on application, begins with a discussion of the arc interruption process for low current and high current vacuum arcs. It examines the voltage escalation phenomenon that can occur when interrupting inductive circuits. The occurrence of contact welding for closed contacts subjected to the passage of high currents, and for contacts when closing on high currents, is explored. The general requirements for the successful manufacture and testing of vacuum circuit breakers is then presented. The general application of vacuum interrupters to switch load currents, especially when applied to capacitor circuits, is also given. The interruption of high short circuit currents is presented along with the expected performance of the two major contact designs. Owing to the ever-increasing need for environmentally friendly circuit protection devices, the development and application of the vacuum interrupter will only increase in the future. At present the vacuum circuit breaker is the technology of choice for distribution circuits (5kV to 40.5kV). It is increasingly being applied to transmission circuits (72.5kV to 242kV). In the future, its application for protecting high voltage DC networks is assured. Audience This is a practical source book for engineers and scientists interested in studying the development and application of the vacuum interrupter Research scientists in industry and universities Graduate students beginning their study of vacuum interrupter phenomena Design engineers applying vacuum interrupters in vacuum switches, vacuum contactors, vacuum circuit breakers, and vacuum contactors It provides a unique and comprehensive review of all aspects of vacuum interrupter technology for those new to the subject and for those who wish to obtain a deeper understanding of its science and application Scientists and engineers, who are beginning their research into vacuum breakdown and aspects of the vacuum arc, will find the extensive bibliography and phenomenological descriptions to be a useful introduction |
You may like...
Semiconductor Memories and Systems
Andrea Redaelli, Fabio Pellizzer
Paperback
R3,965
Discovery Miles 39 650
Building Services Engineering for…
Peter Tanner, Stephen Jones, …
Paperback
My Revision Notes: Building Services…
Mike Jones, Stephen Jones, …
Paperback
Practical Grounding, Bonding, Shielding…
G. Vijayaraghavan, Mark Brown, …
Paperback
R1,427
Discovery Miles 14 270
|