Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience.
This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues: * National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism * Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology * Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable Energy, Enhanced End-Use Efficiency, Transportation, Economics Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science and policy on weapons, energy, and the environment. Scientists who want to make a difference will want this book." Richard Scribner, first Director, Congressional Science and Engineering Fellow Program, AAAS "Hafemeister shows how much one can understand about nuclear weapons and missile issues through simple back-of-the-envelope calculations. He also provides compact explanations of the partially successful attempts that have been made over the past 60 years to control these weapons of mass destruction. Hopefully, Physics of Societal Issues will help interest a new generation of physicists in continuing this work." Frank von Hippel, Professor, Princeton, former Assistant Director, National Security, White House, OSTP "Energy policy must be quantitative. People who don't calculate economic tradeoffs often champion simplistic hardware. 'The solution is more... nuclear power, or electric cars, or photovoltaics, etc.' Some simple physics will show that the true solution matches supply and demand as an 'integrated resource plan.' Physics of Societal Issues is a good place to begin this journey." Arthur Rosenfeld, former California Energy Commissioner, Professor-emeritus, U. of California-Berkeley
This book, comprising contributions presented at the XIX Edoardo Amaldi Conference, examines important aspects of international cooperation aimed at enhancing nuclear safety, security, safeguards (the "3S"), and non-proliferation, thereby assisting in the development and maintenance of the verification regime and progress toward a nuclear weapon-free world. The Conference served as a forum where eminent scientists, diplomats, and policymakers could compare national perspectives and update international collaborations. The book opens by addressing the political, institutional, and legal dimensions of the 3S and non-proliferation; current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that can contribute to increased effectiveness in the implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections discuss scientific and technical challenges to the effective implementation of the 3S approach and the role of international cooperation and scientific community actions in leading the world toward peace and security.
This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book * introduces novel machine-learning-based temporal normalization techniques * bridges research gaps concerning the effect of footwear and stepping speed on footstep GRF-based person recognition * provides detailed discussions of key research challenges and open research issues in gait biometrics recognition* compares biometrics systems trained and tested with the same footwear against those trained and tested with different footwear
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index.
This book is on urban resilience - how to design and operate cities that can withstand major threats such as natural disasters and economic downturns and how to recover from them. It is a collection of latest research results from two separate but collaborating research groups, namely, researchers in urban design and those on general resilience theory. The book systematically deals with the core aspects of urban resilience: systems, management issues and populations. The taxonomy can be broken down into threats, systems, resilience cycles and recovery types in the context of urban resilience. It starts with a discussion of systems resilience models, focusing on the central idea that resilience is a moving average of costs (a set of trajectories in a two-player game paradigm). The second section explores management issues, including planning, operating and emergency response in cities with specific examples such as land-use planning and carbon-neutral scenarios for urban planning. The next section focuses on urban dwellers and specific people-related issues in the context of resilience. Agent-based simulation of behaviour and perception-based resilience, as well as brand crisis management are representative examples of the topics discussed. A further section examines systems like public utilities - including managing power supplies, cyber-security issues and models for pandemics. It concludes with a discussion of the future challenges and risks facing complex systems, for example in resilient power grids, making it essential reading for a wide range of researchers and policymakers.
Blast Mitigation: Experimental and Numerical Studies covers both experimental and numerical aspects of material and structural response to dynamic blast loads and its mitigation. The authors present the most up-to-date understanding from laboratory studies and computational analysis for researchers working in the field of blast loadings and their effect on material and structural failure, develop designs for lighter and highly efficient structural members for blast energy absorption, discuss vulnerability of underground structures, present methods for dampening blast overpressures, discuss structural post blast collapse and give attention to underwater explosion and implosion effects on submerged infrastructure and mitigation measures for this environment.
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. Design of Demining Machines describes the development and testing of modern demining machines in humanitarian demining. Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines. Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, Design of Demining Machines is primarily tailored as a text for the study of the fundamentals and engineering techniques involved in the calculation and design of demining machines. It will prove as useful resource for engineers, designers, researchers and policy makers working in this field.
The topics discussed at the NATO Advanced Research Workshop Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosivedetection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up.Recent advances in nano science have demonstrated that fundamentally new physical phenomena are found when systems are reduced in size with dimensions, comparable to the fundamental microscopic length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nano devices. This work will be of interest to researchers working in spintronics, molecular electronicsand quantum information processing."
Infrared thermography is a measurement technique that enables to obtain non intrusive measurements of surface temperatures. One of the interesting features of this technique is its ability to measure a full two dimensional map of the surface temperature and for this reason it has been widely used as a flow visualization technique. Since the temperature measurements can be extremely accurate it is possible, by using a heat flux sensor, also to measure convective heat transfer coefficient distributions on a surface making the technique de facto quantitative. This book, starting from the basic theory of infrared thermography and heat flux sensor guides, both the experienced researcher and the young student, in the correct application of this powerful technique to various practical problems. A significant number of examples and applications are also examined in detail.
Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research. Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development. Topics and features: presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks; provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments; describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays; examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking; discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces; investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering. This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provides an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc. that will give the new directions of the research in the relevant field for the readers.
This book presents all aspects of situational awareness using acoustic signals. It starts by presenting the science behind understanding and interpretation of sound signals. The book then goes on to provide various signal processing techniques used in acoustics to find the direction of sound source, localize gunfire, track vehicles and detect people. The necessary mathematical background and various classification and fusion techniques are presented. The book contains majority of the things one would need to process acoustic signals for all aspects of situational awareness in one location. The book also presents array theory, which is pivotal in finding the direction of arrival of acoustic signals. In addition, the book presents techniques to fuse the information from multiple homogeneous/heterogeneous sensors for better detection. MATLAB code is provided for majority of the real application, which is a valuable resource in not only understanding the theory but readers can also use the code as a spring-board to develop their own application based software code.
The topics discussed at the NATO Advanced Research Workshop Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosivedetection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up.Recent advances in nano science have demonstrated that fundamentally new physical phenomena are found when systems are reduced in size with dimensions, comparable to the fundamental microscopic length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nano devices. This work will be of interest to researchers working in spintronics, molecular electronicsand quantum information processing."
Automatic sprinklers systems are the primary fire protection system in warehouse and storage facilities. The effectiveness of this strategy has come into question due to the challenges presented by modern warehouse facilities, including increased storage heights and areas, automated storage retrieval systems (ASRS), limitations on water supplies, and changes in firefighting strategies. The application of fire detection devices used to provide early warning and notification of incipient warehouse fire events is being considered as a component of modern warehouse fire protection. Fire Detection in Warehouse Facilities provides technical information to aid in the development of guidelines and standards for the use of fire detection technologies for modern warehouse fire protection. The authors share their thorough literature review, analyze characteristic fire hazards for modern warehouse facilities, and identify information gaps in the field. The book concludes with recommendations for the development of guidelines and standards for the use of detection technologies in warehouse fire protection design, including a research plan for implementation. This book is intended for practitioners seeking an understanding of the issues surrounding warehouse design and fire protection. The book will also prove valuable for fire hazard researchers and those involved with fire department response, applicable detection systems, and fire growth suppression.
The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to overcome current operational limits.The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additional research and development. "
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.
The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience. |
You may like...
Handbook of Surveillance Technologies
Pamela Taylor, J. K. Petersen
Hardcover
R4,711
Discovery Miles 47 110
Human Factors in Auditory Warnings
Judy Edworthy, Neville A. Stanton
Hardcover
R3,571
Discovery Miles 35 710
Computer Security and the Internet…
Paul C.Van Oorschot
Hardcover
Process Operational Safety and…
Zhe Wu, Panagiotis D. Christofides
Hardcover
R2,609
Discovery Miles 26 090
Safety of Sodium-Cooled Fast Reactors…
Songbai Cheng, Ruicong Xu
Hardcover
R4,525
Discovery Miles 45 250
|