Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 14 of 14 matches in All Departments
This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software
This book is a compilation of research papers and presentations from the Fourth Annual International Conference on Data Science, Machine Learning and Blockchain Technology (AICDMB 2023, Mysuru, India, 16-17 March 2023). The book covers a wide range of topics, including data mining, natural language processing, deep learning, computer vision, big data analytics, cryptography, smart contracts, decentralized applications, and blockchain-based solutions for various industries such as healthcare, finance, and supply chain management. The research papers presented in this book highlight the latest advancements and practical applications in data science, machine learning, and blockchain technology, and provide insights into the future direction of these fields. The book serves as a valuable resource for researchers, students, and professionals in the areas of data science, machine learning, and blockchain technology.
This book comprehensively covers the topic of COVID-19 and other pandemics and epidemics data analytics using computational modelling. Biomedical and Health Informatics is an emerging field of research at the intersection of information science, computer science, and health care. The new era of pandemics and epidemics bring tremendous opportunities and challenges due to the plentiful and easily available medical data allowing for further analysis. The aim of pandemics and epidemics research is to ensure high-quality, efficient healthcare, better treatment and quality of life by efficiently analyzing the abundant medical, and healthcare data including patient's data, electronic health records (EHRs) and lifestyle. In the past, it was a common requirement to have domain experts for developing models for biomedical or healthcare. However, recent advances in representation learning algorithms allow us to automatically learn the pattern and representation of the given data for the development of such models. Medical Image Mining, a novel research area (due to its large amount of medical images) are increasingly generated and stored digitally. These images are mainly in the form of: computed tomography (CT), X-ray, nuclear medicine imaging (PET, SPECT), magnetic resonance imaging (MRI) and ultrasound. Patients' biomedical images can be digitized using data mining techniques and may help in answering several important and critical questions related to health care. Image mining in medicine can help to uncover new relationships between data and reveal new and useful information that can be helpful for scientists and biomedical practitioners. Assessing COVID-19 and Other Pandemics and Epidemics using Computational Modelling and Data Analysis will play a vital role in improving human life in response to pandemics and epidemics. The state-of-the-art approaches for data mining-based medical and health related applications will be of great value to researchers and practitioners working in biomedical, health informatics, and artificial intelligence..
Smart grids with distributed clean energy generation, storage and prosumers are the future of energy systems. They need two-way digital communication between multiple customers and suppliers of energy, to produce, buy and sell electricity to the grid at small scales. These arrangements need a system that maintains, checks, and registers information about transactions. Blockchain technology is able to handle these requirements with smart contracts, peer-to-peer energy trading and immutable transactions. A blockchain is a digital ledger of transactions that can be accessed across the entire network of computer systems. Combined with sensors to track energy flows, blockchain can enable the smart grid. After an introduction to blockchain, chapters cover integration with IoT, IoT- and blockchain-enabled smart grids, use of sensors, security and privacy, use of machine and deep learning, energy storage and transaction, as well as use of cryptocurrencies for transactions. Written by an international team with the necessary multi-disciplinarity, this work for researchers in power systems as well as economists with related interests covers the use of blockchain technology for smart grids.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologies that are part of a framework whose aim is to move from a simple collection and storage of information toward proactive systems that are able to fuse several information sources to detect relevant events in their early incipient phase. Part III, Technologies for Homeland Security, considers relevant applications of surveillance systems in the framework of homeland security. It presents real-world case studies of how innovative technologies can be used to effectively improve the security of sensitive areas without violating the rights of the people involved. Examining cutting-edge research topics, the book provides you with a comprehensive understanding of the technological, legislative, organizational, and management issues related to surveillance. With a specific focus on privacy, it presents innovative solutions to many of the issues that remain in the quest to balance security with the preservation of privacy that society demands.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologies that are part of a framework whose aim is to move from a simple collection and storage of information toward proactive systems that are able to fuse several information sources to detect relevant events in their early incipient phase. Part III, Technologies for Homeland Security, considers relevant applications of surveillance systems in the framework of homeland security. It presents real-world case studies of how innovative technologies can be used to effectively improve the security of sensitive areas without violating the rights of the people involved. Examining cutting-edge research topics, the book provides you with a comprehensive understanding of the technological, legislative, organizational, and management issues related to surveillance. With a specific focus on privacy, it presents innovative solutions to many of the issues that remain in the quest to balance security with the preservation of privacy that society demands.
This book constitutes the proceedings of the 19th International Conference on Formal Methods for Industrial Critical Systems, FMICS 2014, held in Florence, Italy, in September 2014. The 13 papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: cyber-physical systems; computer networks; railway control systems; verification methods; and hardware and software testing.
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.
Human errors, as well as deliberate sabotage, pose a considerable danger to passengers riding on the modern railways and have created disastrous consequences. To protect civilians against both intentional and unintentional threats, rail transportation has become increasingly automated. Railway Safety, Reliability, and Security: Technologies and Systems Engineering provides engineering students and professionals with a collection of state-of-the-art methodological and technological notions to support the development and certification of real-time safety-critical railway control systems, as well as the protection of rail transportation infrastructures.
This book comprehensively covers the topic of COVID-19 and other pandemics and epidemics data analytics using computational modelling. Biomedical and Health Informatics is an emerging field of research at the intersection of information science, computer science, and health care. The new era of pandemics and epidemics bring tremendous opportunities and challenges due to the plentiful and easily available medical data allowing for further analysis. The aim of pandemics and epidemics research is to ensure high-quality, efficient healthcare, better treatment and quality of life by efficiently analyzing the abundant medical, and healthcare data including patient's data, electronic health records (EHRs) and lifestyle. In the past, it was a common requirement to have domain experts for developing models for biomedical or healthcare. However, recent advances in representation learning algorithms allow us to automatically learn the pattern and representation of the given data for the development of such models. Medical Image Mining, a novel research area (due to its large amount of medical images) are increasingly generated and stored digitally. These images are mainly in the form of: computed tomography (CT), X-ray, nuclear medicine imaging (PET, SPECT), magnetic resonance imaging (MRI) and ultrasound. Patients' biomedical images can be digitized using data mining techniques and may help in answering several important and critical questions related to health care. Image mining in medicine can help to uncover new relationships between data and reveal new and useful information that can be helpful for scientists and biomedical practitioners. Assessing COVID-19 and Other Pandemics and Epidemics using Computational Modelling and Data Analysis will play a vital role in improving human life in response to pandemics and epidemics. The state-of-the-art approaches for data mining-based medical and health related applications will be of great value to researchers and practitioners working in biomedical, health informatics, and artificial intelligence..
This book constitutes refereed proceedings of the Workshops of the 18th European Dependable Computing Conference, EDCC: 13th Workshop on Software Engineering for Resilient Systems, SERENE 2022; Third Worskhop on Dynamic Risk Management for Autonomous Systems, DREAMS 2022, Third Workshop on Artificial Intelligence for Railways, AI4RAILS, held in Zaragoza, Spain, in September 2022. The 11 workshop papers presented were thoroughly reviewed and selected from 22 submissions. The workshop papers complement the main conference topics by addressing dependability or security issues in specic application domains or by focussing in specialized topics, such as system resilience.
This book constitutes refereed proceedings of the Workshops of the 16th European Dependable Computing Conference, EDCC: 1st Workshop on Articial Intelligence for Railways, AI4RAILS 2020, 1st Worskhop on Dynamic Risk Management for Autonomous Systems, DREAMS 2020, 2nd Workshop on Dependable Solutions for Intelligent Electricity Distribution Grids, DSOGRI 2020, 12th Workshop on Software Engineering for Resilient Systems, SERENE 2020, held in September 2020. Due to the COVID-19 pandemic the workshops were held virtually. The 12 full papers and 4 short papers were thoroughly reviewed and selected from 35 submissions. The workshop papers complement the main conference topics by addressing dependability or security issues in specic application domains or by focussing in specialized topics, such as system resilience.
Una guida pratica su come ottenere l'Alta Fedelta del suono tra le pareti domestiche, scritta in modo obiettivo e a scopo prevalentemente divulgativo, con molti consigli pratici e schede di approfondimento tecnico. Il manuale copre tutti i componenti di un impianto hi-fi, dalle sorgenti, agli amplificatori, ai diffusori acustici, senza trascurare gli accessori (a cui e dedicato un apposito capitolo) e con enfasi particolare sul trattamento ambientale.
Critical applications are defined as the ones whose failure has a relevant impact on finance, human beings and the environment. A failure occurs when the application is no longer able to guarantee the success of its required function. There exists several levels of criticality, according to the several possible classes of failure. The simplest distinction, for instance, is between the classes of failure corresponding to service unavailable or service incorrect, with many nuances within those two extremes (ie: partial failures). Generally speaking, it is better to make the system unavailable when a possibly incorrect behaviour is diagnosed, when system unavailability corresponds to a safer state. This book discusses critical applications and the inconsistencies which poses a threat to the successful completion of the function.
|
You may like...
|