![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.
This book proposes the air insulation prediction theory and method in the subject of electrical engineering. Prediction of discharge voltage in different cases are discussed and worked out by simulation. After decades, now bottlenecks of traditional air discharge theories can be solved with this book. Engineering applications of the theory in air gap discharge voltage prediction are introduced. This book serves as reference for graduate students, scientific research personnel and engineering staff in the related fields.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book presents advanced technologies used in practice to enable early recognition and tracking of various threats to national security. It discusses practical applications, examples and recent challenges in the application fields using sophisticated sensory devices, embedded designs and airborne and ground unmanned vehicles. Undeniably rapid advances in the development of sophisticated sensory devices, significant increases of computing power available to embedded designs and the development of airborne and ground unmanned vehicles offer almost unlimited possibilities for fighting various types of pathologies affecting our societies. The book provides scientists, researchers, engineers and graduate students involved in computer vision, image processing, data fusion, control algorithms, mechanics, data mining, navigation and integrated circuit (IC) with numerous valuable, useful and practical suggestions and solutions.
This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts. The first book devoted entirely to active interrogation Presents a focused review of the relevant physics Surveys available technology Analyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.
This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book * introduces novel machine-learning-based temporal normalization techniques * bridges research gaps concerning the effect of footwear and stepping speed on footstep GRF-based person recognition * provides detailed discussions of key research challenges and open research issues in gait biometrics recognition* compares biometrics systems trained and tested with the same footwear against those trained and tested with different footwear
This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.
Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
In recent years, the paradigm of video coding has shifted from that
of a frame-based approach to a content-based approach, particularly
with the finalization of the ISO multimedia coding standard,
MPEG-4. MPEG-4 is the emerging standard for the coding of
multimedia content. It defines a syntax for a set of content-based
functionalities, namely, content-based interactivity, compression
and universal access. However, it does not specify how the video
content is to be generated. To generate the video content, video
has to be segmented into video objects and tracked as they
transverse across the video frames. This book addresses the
difficult problem of video segmentation, and the extraction and
tracking of video object planes as defined in MPEG-4. It then
focuses on the specific issue of face segmentation and coding as
applied to videoconferencing in order to improve the quality of
videoconferencing images especially in the facial region.
This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.
This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.
This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security. Some have argued that such technologies will yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. As the United States looks to the future - whether dominated by extremist groups co-opting advanced weapons in the world of globalized non-state actors or states engaged in persistent regional conflicts in areas of strategic interest - new adversaries and new science and technology will emerge. Choices made today that affect science and technology will impact how ably the US can and will respond. Chapters within the book look at the changing strategic environment in which security operations are planned and conducted; how these impact science and technology policy choices made today; and predictions of how science and technology may play a beneficial or deleterious role in the future. Some game changing technologies have received global attention, while others may be less well known; the new technologies discussed within this proposal, as well as future discoveries, may significantly alter military capabilities and may generate new threats against military and civilian sectors.
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."
This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues: National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable Energy, Enhanced End-Use Efficiency, Transportation, Economics Praise for the first edition: ""This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science and policy on weapons, energy, and the environment. Scientists who want to make a difference will want this book."" Richard Scribner, first Director, Congressional Science and Engineering Fellow Program, AAAS ""Hafemeister shows how much one can understand about nuclear weapons and missile issues through simple back-of-the-envelope calculations. He also provides compact explanations of the partially successful attempts that have been made over the past 60 years to control these weapons of mass destruction. Hopefully, Physics of Societal Issues will help interest a new generation of physicists in continuing this work."" Frank von Hippel, Professor, Princeton, former Assistant Director, National Security, White House, OSTP ""Energy policy must be quantitative. People who don't calculate economic tradeoffs often champion simplistic hardware. The solution is more... nuclear power, or electric cars, or photovoltaics, etc. Some simple physics will show that the true solution matches supply and demand as an integrated resource plan. Physics of Societal Issues is a good place to begin this journey."" Arthur Rosenfeld, former California Energy Commissioner, Professor-emeritus, U. of California-Berkeley "
This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book provides a guide for readers seeking to understand the evolution patterns for the microstrucure of rock failure, the predicting key point of rock failure and the rockburst predicting model. It will be an essential reference to understand mechanism of rockburst and sheds new light on dynamic disasters prediction. Chapters are carefully developed to cover (1) The evolution patterns for the microstructure instability of rock; (2) Rockburst hazard monitoring and predicting criterion and predicting models. The book addresses the issue with a holistic and systematic approach that investigates the occurrence mechanism of rockburst based on the evolution patterns for the microstructure of rock failure and establishes the predicting model of rockburst. This book will be of interest to researchers of mining engineering, rock mechanics engineering and safety engineering.
This proceedings volume presents new scientific works of the research workers and experts from the field of Wood Science & Fire. It looks into the properties of various tree species across the continents affecting the fire-technical properties of wood and wood-based materials, its modifications, fire-retardant methods and other technological processes that have an impact on wood ignition and burning. The results of these findings have a direct impact on Building Construction and Design describing the fire safety of wooden buildings, mainly large and multi-story ones. The results of these experiments and findings may be applied, or are directly implemented into Fire Science, Hazard Control, Building Safety which makes the application of wood and wood materials in buildings possible, while maintaining strict fire regulations. One part of the contributions focuses on the symbiosis of the material and the fire-fighting technologies. Wood burning has its own specific features, therefore, the fire protection technologies need to be updated regularly. It also includes the issue of the intervention of fire-fighting and rescue teams in the fires of wooden buildings. Presentations deal with the issue of forest fires influenced by the climate changes, relief, fuel models based on the type and the age of the forest stand.
This book is devoted to advanced materials and perspective sensors, which is one of the most important problems in nanotechnology and security. This book is useful for researchers, scientist and graduate students in the fields of solid state physics, nanotechnology and security.
The book analyses a broad range of relevant aspects as the outer space and cyber space domain do not only present analogies but are also strongly interrelated. This may occur on various levels by technologies but also in regard to juridical approaches, each nevertheless keeping its particularities. Since modern societies rely increasingly on space applications that depend on cyber space, it is important to investigate how cyberspace and outer space are connected by their common challenges. Furthermore, this book discusses not only questions around their jurisdictions, but also whether the private space industry can escape jurisdiction by dematerializing the space resource commercial processes and assets thanks to cyber technology. In addition, space and cyberspace policies are analysed especially in view of cyber threats to space communications. Even the question of an extra-terrestrial citizenship in outer space and cyberspace may raise new views. Finally, the interdependence between space and cyberspace also has an important role to play in the context of increasing militarization and emerging weaponization of outer space. Therefore, this book invites questioning the similarities and interrelations between Outer Space and Cyber Space in the same way as it intends to strengthen them.
This timely book examines how the South African National Defence Force has adapted to the country's new security, political and social environment since 1994. In South Africa's changed political state, how has civilian control of the military been implemented and what does this mean for 'defence in a democracy'? This book presents an overview of the security environment, how the mission focus of the military has changed and the implications for force procurement, force preparation, force employment and force sustainability. The author addresses other issues, such as: * the effect of integrating former revolutionary soldiers into a professional armed force * the effect of affirmative action on meritocracy, recruitment and retention * military veterans, looking at the difficulties they face in reintegrating back into society and finding gainful employment * gender equality and mainstreaming * the rise of military unions and why a confrontational, instead of a more corporatist approach to labour relations has emerged * HIV/AIDS and the consequences this holds for the military in terms of its operational effectiveness. In closing, the author highlights key events that have caused the SANDF to become 'lost in transition and transformation', spelling out some lessons learned. The conclusions she draws are pertinent for the future of defence, security and civil-military relations of countries around the world.
Detection of concealed explosives is a notoriously difficult problem, and many different approaches have been proposed to solve this problem. Nuclear quadrupole resonance (NQR) is unique in many ways. It operates in a safe AM radio frequency range, and it can remotely detect unique fingerprint (NQR spectrum) of many explosives, such as TNT or RDX. As such, the detection of target does not depend on the shape or material of the container, or the presence of metallic object such as triggers etc. Spectra of chemically similar compounds differ enough that their presence never causes interference or false alarms. Unfortunately, widespread use is prevented due to low sensitivity, radiofrequency interference from the noisy environment, and inability to detect liquid explosives. This book presents current state of the art of the attempts to overcome NQR sensitivity problem, either by increasing the strengths of signals generated, or by increasing the specificity of the technique through a better understanding of the factors that affect the quadrupolar parameters of specific explosives. The use of these specific quadrupolar parameters is demonstrated on signal processing techniques that can detect weak signals, which are hidden in a noisy background. The problem of differentiation of liquid explosives and benign liquids in closed containers is approached by measurements of different nuclear magnetic resonance (NMR) parameters. As shown, a couple of solutions has reached a prototype stage and could find their use in a near future."
Access to reliable and affordable energy, water, and services is an important determinant of the prosperity of cities along with effective mission sustainment at military installations. The idea for this book was conceived at the NATO Advanced Research Workshop (ARW) in June 2012 in Hella, Iceland. The workshop was attended by 50 scientists, engineers, and policymakers representing 15 different nations and multiple fields of expertise, reflecting the global and interdisciplinary nature of climate change and sustainability research. The focus of the workshop was on ways in which military installations and small cities can integrate energy, water, and infrastructure sustainability strategies into city and installation management plans that account for climate change uncertainties. The organization of the book reflects major topic sessions and discussions during the workshop. |
![]() ![]() You may like...
Neural Representations of Natural…
Lyndon White, Roberto Togneri, …
Hardcover
R2,628
Discovery Miles 26 280
Towards a Theoretical Framework for…
Alexander Mehler, Andy Lucking, …
Hardcover
Internet and Distributed Computing…
Jemal H. Abawajy, Mukaddim Pathan, …
Hardcover
R5,358
Discovery Miles 53 580
Advances in High Performance Computing…
Lucio Grandinetti, Etc
Hardcover
R2,690
Discovery Miles 26 900
|