![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book provides insight into domino effects in industrial chemical sites and process industries. It is about the integration of safety and security resources to prevent and mitigate domino effects in the process industries. It explains how chemical industrial areas, comprised of various hazardous installations, are susceptible to a chain of undesired events, or domino effects, triggered by accidental events or intentional attacks and then presents solutions to prevent them. Firstly, the book provides a dynamic graph approach to model the domino effects induced by accidental fire or intentional fire, considering the spatial-temporal evolution of fires. Then, a dynamic risk assessment method based on a discrete dynamic event tree is proposed to assess the likelihood of VCEs and the vulnerability of installations, addressing the time dependencies in vapor cloud dispersion and the uncertainty of delayed ignitions. A dynamic methodology based on dynamic graphs and Monte Carlo is provided to assess the vulnerability of individuals and installations exposed to multi-hazards, such as fire, explosion and toxic release during escalation events. Based on these domino effect models, an economic approach is developed to integrate safe and security resources, obtaining the most cost-benefit protection strategy for preventing domino effects. Finally, a resilience-based approach is provided to find out the most cost-resilient way to protect chemical industrial areas, addressing possible domino effects. This integrated approach will be of interest to researchers, industrial engineers, chemical engineers and safety managers and will help professionals to new solutions in the area of safety and security.
Resilience Engineering (RE) studies have successfully identified and described many instances of resilient performance in high hazard sectors as well as in the far more frequent cases where people and organisations cope with the uncertainties of daily operations. Since RE was first described in 2006, a steady accumulation of insights and efforts have provided the basis for practical tools and methods. This development has been documented by a series of texts in the Resilience Engineering Perspectives series as well as by a growing number of papers and reports. This book encapsulates the essential practical lessons learned from the use of Resilience Engineering (RE) for over ten years. The main contents are a series of chapters written by those who have been instrumental in these applications. To increase the value for the reader, each chapter will include: rationale for the overall approach; data sought and reason(s) for choosing; data sources used, data analyses performed, and how recommendations were made and turned into practice. Serving as a reference for practitioners who want to analyse, support, and manage resilient performance, this book also advances research into RE by inquiring why work goes well in unpredictable environments, to improve work performance, or compensate for deficiencies.
This book highlights the advances and trends in the safety analysis of sodium-cooled fast reactors, especially from the perspective of particle bed-related phenomena during core disruptive accidents. A sodium-cooled fast reactor (SFR) is an optimized candidate of the next-generation nuclear reactor systems. Its safety is a critical issue during its R&D process. The book elaborates on research progresses in particle bed-related phenomena in terms of the molten-pool mobility, the molten-pool sloshing motion, the debris bed formation behavior, and the debris bed self-leveling behavior. The book serves as a good reference for researchers, professionals, and postgraduate students interested in sodium-cooled fast reactors. Knowledge provided is also useful for those who are engaging in severe accident analysis for lead-cooled fast reactors and light water reactors.
This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.
This book presents the state-of-the-art methodology and detailed analytical models and methods used to assess the reliability of complex systems and related applications in statistical reliability engineering. It is a textbook based mainly on the author's recent research and publications as well as experience of over 30 years in this field. The book covers a wide range of methods and models in reliability, and their applications, including: statistical methods and model selection for machine learning; models for maintenance and software reliability; statistical reliability estimation of complex systems; and statistical reliability analysis of k out of n systems, standby systems and repairable systems. Offering numerous examples and solved problems within each chapter, this comprehensive text provides an introduction to reliability engineering graduate students, a reference for data scientists and reliability engineers, and a thorough guide for researchers and instructors in the field.
The book analyses a broad range of relevant aspects as the outer space and cyber space domain do not only present analogies but are also strongly interrelated. This may occur on various levels by technologies but also in regard to juridical approaches, each nevertheless keeping its particularities. Since modern societies rely increasingly on space applications that depend on cyber space, it is important to investigate how cyberspace and outer space are connected by their common challenges. Furthermore, this book discusses not only questions around their jurisdictions, but also whether the private space industry can escape jurisdiction by dematerializing the space resource commercial processes and assets thanks to cyber technology. In addition, space and cyberspace policies are analysed especially in view of cyber threats to space communications. Even the question of an extra-terrestrial citizenship in outer space and cyberspace may raise new views. Finally, the interdependence between space and cyberspace also has an important role to play in the context of increasing militarization and emerging weaponization of outer space. Therefore, this book invites questioning the similarities and interrelations between Outer Space and Cyber Space in the same way as it intends to strengthen them.
This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.
This book addresses the reader interested in vehicular traffic phenomena, who have not learned about them before. It presents traffic phenomena like traffic breakdown and the emergence of moving traffic jams by showcasing empirical traffic data measured in real-world traffic. The author explains how these empirical traffic studies have led to the three-phase traffic theory and why this new theory is in conflict with standard traffic theories developed before. Moreover, he presents the reason for the failure of applications of standard traffic theories in real-world traffic and discusses why understanding real traffic has caused a paradigm shift in traffic and transportation science. The book examines why understanding real traffic breakdown is the basis for an explanation for the autonomous driving effects on traffic flow. It shows that understanding real traffic is possible from real-world traffic data without the need of mathematical traffic models. This makes the book intuitive for non-specialists, who can qualitatively understand all the basic features of traffic dynamics. In turn, experienced traffic researchers can grasp concepts and ideas made here easily accessible by the author, one of the leading pioneers in the field of vehicular traffic.
This open access book is a pedagogical, examples-based guide to using the Monte Carlo N-Particle (MCNP (R)) code for nuclear safeguards and non-proliferation applications. The MCNP code, general-purpose software for particle transport simulations, is widely used in the field of nuclear safeguards and non-proliferation for numerous applications including detector design and calibration, and the study of scenarios such as measurement of fresh and spent fuel. This book fills a gap in the existing MCNP software literature by teaching MCNP software usage through detailed examples that were selected based on both student feedback and the real-world experience of the nuclear safeguards group at Los Alamos National Laboratory. MCNP input and output files are explained, and the technical details used in MCNP input file preparation are linked to the MCNP code manual. Benefiting from the authors' decades of experience in MCNP simulation, this book is essential reading for students, academic researchers, and practitioners whose work in nuclear physics or nuclear engineering is related to non-proliferation or nuclear safeguards. Each chapter comes with downloadable input files for the user to easily reproduce the examples in the text.
Over the past decade, the international political system has come to be characterized as a Great Power Competition in which multiple would-be hegemons compete for power and influence. Instead of a global climate of unchallenged United States dominance, revisionist powers, notably China and Russia alongside other regional powers, are vying for dominance through political, military, and economic means. A critical battleground in the Great Power Competition is the Middle East, the Horn of Africa, and the Central Asia South Asia (CASA), also known as the Central Region. With the planned withdrawal of U.S. military forces from Afghanistan, the U.S. has stated its intention of shifting attention away from the CASA Region in favor of a more isolationist foreign policy approach. This book provides an in-depth understanding of the implications for this shift related to regional diplomacy & politics, economic opportunities & rivalries, security considerations & interests, and the information environment. Amplifying the vital importance of success in the Central Region to U.S. prosperity and security, this volume advances dialogue in identifying key issues for stakeholders within and beyond the Central Region to gain a holistic perspective that better informs decision-making at various levels. This collection of work comes from scholars, strategic thinkers, and subject matter experts who participated in the Great Power Competition Conference hosted by the University of South Florida, in partnership with the National Defense University Near East South Asia Center for Strategic Strategies in January 2020.
This book is focused on the development of rigorous, yet practical, methods for the design of advanced process control systems to improve process operational safety and cybersecurity for a wide range of nonlinear process systems. Process Operational Safety and Cybersecurity develops designs for novel model predictive control systems accounting for operational safety considerations, presents theoretical analysis on recursive feasibility and simultaneous closed-loop stability and safety, and discusses practical considerations including data-driven modeling of nonlinear processes, characterization of closed-loop stability regions and computational efficiency. The text then shifts focus to the design of integrated detection and model predictive control systems which improve process cybersecurity by efficiently detecting and mitigating the impact of intelligent cyber-attacks. The book explores several key areas relating to operational safety and cybersecurity including: machine-learning-based modeling of nonlinear dynamical systems for model predictive control; a framework for detection and resilient control of sensor cyber-attacks for nonlinear systems; insight into theoretical and practical issues associated with the design of control systems for process operational safety and cybersecurity; and a number of numerical simulations of chemical process examples and Aspen simulations of large-scale chemical process networks of industrial relevance. A basic knowledge of nonlinear system analysis, Lyapunov stability techniques, dynamic optimization, and machine-learning techniques will help readers to understand the methodologies proposed. The book is a valuable resource for academic researchers and graduate students pursuing research in this area as well as for process control engineers. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.
This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets. Further, this book examines the nexus between public health, international security, and developing technologies, building a case for augmenting biosecurity to levels beyond the laboratory constraints. With the face of biological and biomedical sciences changing, this book describes how with proper biosecurity development, these can become assets, rather than liabilities, to secure our world from natural and man-made biological disasters. The world is changing rapidly with respect to developing threats, such as terrorism, and dual-use technologies, such as synthetic biology, that are challenging how we think about biosafety and biosecurity. Further, the fields of public health and international security are colliding, as both of these share the common enemy: intentional or natural biological incidents. To date, biosecurity has been limited to laboratory-level application, and complicating efforts, and lacks credentialed biosecurity professionals skilled in both the biological sciences and threat management techniques. The result is a fragmented field of practice, with tremendous need, from the lab to the outbreak. Underpinning these principles is the SARS-CoV-2 coronavirus pandemic, providing a historic milestone to examine biosecurity through a global lens. This book describes biosecurity as a set of practices and principles to be augmented out of the constrained laboratory environment, and applied to larger efforts, such as international threat reduction and biological incident management.
This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter. The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.
This book discusses the principles, approaches, concepts and development programs for integrated aircraft avionics. The functional tasks of integrated on-board radio electronic equipment (avionics) of navigation, landing, data exchange and air traffic control are formulated that meet the modern requirements of civil and military aviation, and the principles of avionics integration are proposed. The modern approaches to the joint processing of information in navigation and landing complexes are analyzed. Algorithms of multichannel information processing in integrated avionics are considered, and examples of its implementation are presented. This book is intended for scientists and professionals in the field of aviation equipment, students and graduate students of relevant specialties.
Critical infrastructures are targets for terrorism and deliver a valuable vector through which the proliferation of CBRN and explosive precursors can be detected. Recent technological breakthroughs, notably in the field of near infrared (NIR), mid infrared (MIR), Terahertz (THz) and Gigahertz (GHz) sources and detectors, have led to rugged commercial devices, capable of standoff sensing a range of these dangerous substances. However, at the same time criminal and terrorist organizations have also benefited from the availability of technologies to increase the threat they pose to the security of citizens and a concerted effort is needed to improve early detection measures to identify activities, such as the production of homemade explosives or CBRN that can be potentially dangerous to society. The key global technological bottleneck to be overcome is the current lack of integration and networking of mature detection technology into early warning systems for critical infrastructures. Thus, this book brings together complementary information connecting the research of leading teams working on critical Infrastructure protection with academic developers and industrial producers of state of the art sensors.
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.
This book provides a comprehensive content for professionals engaged in the development of flight safety regulatory framework, as well as in the design and operation of ground-based or on-board flight support radio electronic systems. It presents mathematical tools and methods of probabilistic theory, mathematical statistics and graph theory, along with some provisions of decision-making theory and multi-criteria analysis. This book helps as a good guide for those involved in aviation risk assessment and air traffic management.
This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.
The book represents a study guide reciting theoretical basics of radar location and radio navigation systems of air and sea transport. This is the distinctive feature of this study guide. The study guide states the principal physics of radar location and radio navigation, main measuring methods of proper and relative movement parameters of an object, tactical and technical characteristics of radar location and radio navigation systems, including examining issues on radiofrequency signals detection and its parameters estimation against background and interference of different type, filtering, combined detection and rating of signals, signals resolution and classification. The structural and functioning principles of the current and advanced radar location and radio navigation systems of air and sea transport are represented in the study guide with an adequate completeness. The study guide features the result of years long lecturing on radar location and radio navigation theoretical courses at the Moscow State Technical University of Civil Aviation and G.I.Nevelskiy Maritime State Technical Academy. The study guide is designated for students of radio-engineering specialties in area of air and sea transport. The study guide can be useful for radio engineers working in the field of air and maritime transport, and for graduate students and academic researchers as well.
This book discusses multiple aspects of radiological and nuclear terrorism. Do you know what to do if there is a radiological or nuclear emergency in your city? These accidents are not common, but they have happened - and even though we have not seen an attack using these weapons, governments around the world are making plans for how to prevent them - and for how to respond if necessary. Whether you are an emergency responder, a medical caregiver, a public health official - even a member of the public wanting to know how to keep yourself and your loved ones safe - there is a need to understand how these weapons work, how radiation affects our health, how to stop an attack from taking place, how to respond appropriately in the event of an emergency, and much more. Unfortunately, the knowledge that is needed to accomplish all of this is lacking at all levels of society and government. In this book, Dr. Andrew Karam, an internationally respected expert in radiation safety and multiple aspects of radiological and nuclear emergencies, discusses how these weapons work and what they can do, how they can affect our health, how to keep yourself safe, and how to react appropriately whether you are a police officer investigating a suspect radiological weapon, a firefighter responding to a radiological or nuclear attack, a nurse or physician caring for potentially contaminated patients, or a governmental official trying to keep the public safe. To do this, he draws upon his extensive experience in the military, the several years he worked directly with emergency responders, his service on a number of advisory committees, and multiple trips overseas in the aftermath of the Fukushima accident and on behalf of the International Atomic Energy Agency, Interpol, and the Health Physics Society.
This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.
This book presents methods and algorithms to improve noise immunity of the navigation systems of civil aviation aircraft, operating on the basis of satellite radio navigation systems, as well as improving the quality of the transmission of navigation information by selecting a rational communication resource. The book provides for its productive perception both by specialists involved in the development and operation of radio electronic equipment, responsible for navigation and communication support of civil aviation aircraft, as well as by graduate students or senior students, since this book examines in detail the promising fields of development of these tools taking into account the need to comply with all requirements for noise immunity.
This book is about the strategic relevance of quantum technologies. It debates the military-specific aspects of this technology. Various chapters of this book cohere around two specific themes. The first theme discusses the global pattern of ongoing civilian and military research on quantum computers, quantum cryptography, quantum communications and quantum internet. The second theme explicitly identifies the relevance of these technologies in the military domain and the possible nature of quantum technology-based weapons. This thread further debates on quantum (arms) race at a global level in general, and in the context of the USA and China, in particular. The book argues that the defence utility of these technologies is increasingly becoming obvious and is likely to change the nature of warfare in the future. |
You may like...
Power Amplifiers for the S-, C-, X- and…
Mladen Bozanic, Saurabh Sinha
Hardcover
Computer Vision and Audition in Urban…
Mohammad Ali Nematollahi, Samaneh Shahbazi, …
Hardcover
R2,653
Discovery Miles 26 530
Essentials for the Clinical Nursing…
Eden Zabat-Kan, Susan Stabler-Haas
Paperback
R774
Discovery Miles 7 740
|