Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
Because of the growing reliance on software, growing concerns are how reliable a system is before it is commissioned for use, how high is the level in the system, how many vulnerabilities exist in the system before its operationalization. Equally pressing issues concern how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. The two problems are considered increasingly important because it necessitates the development of tools and techniques capable of analyzing the dependability, and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modelling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and free of vulnerabilities. This book covers the tools and techniques, cutting-edge research topics, and methodologies in the areas of system reliability, and security. It examines prediction models and methods as well as how to secure a system as it is being develop.
Because of the growing reliance on software, growing concerns are how reliable a system is before it is commissioned for use, how high is the level in the system, how many vulnerabilities exist in the system before its operationalization. Equally pressing issues concern how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. The two problems are considered increasingly important because it necessitates the development of tools and techniques capable of analyzing the dependability, and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modelling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and free of vulnerabilities. This book covers the tools and techniques, cutting-edge research topics, and methodologies in the areas of system reliability, and security. It examines prediction models and methods as well as how to secure a system as it is being develop.
Implementing energy-efficient CPUs and peripherals as well as reducing resource consumption have become emerging trends in computing. As computers increase in speed and power, their energy issues become more and more prevalent. The need to develop and promote environmentally friendly computer technologies and systems has also come to the forefront in computing research. A pioneering publication for researchers in computer science and engineering, Handbook of Energy-Aware and Green Computing, Two-Volume Set is one of the first to present a comprehensive account of recent research in energy-aware and green computing. Edited by the co-chairs of the International Green Computing Conference, this handbook incorporates fundamental knowledge from all related areas, including circuit and component design, software, operating systems, networking, mobile computing, and data centers. It also discusses up-to-date research on many aspects of power-aware computing at the component, software, and system levels.
Implementing energy-efficient CPUs and peripherals as well as reducing resource consumption have become emerging trends in computing. As computers increase in speed and power, their energy issues become more and more prevalent. The need to develop and promote environmentally friendly computer technologies and systems has also come to the forefront in computing research. A pioneering publication for researchers in computer science and engineering, Handbook of Energy-Aware and Green Computing, Two-Volume Set is one of the first to present a comprehensive account of recent research in energy-aware and green computing. Edited by the co-chairs of the International Green Computing Conference, this handbook incorporates fundamental knowledge from all related areas, including circuit and component design, software, operating systems, networking, mobile computing, and data centers. It also discusses up-to-date research on many aspects of power-aware computing at the component, software, and system levels.
This book contains papers presented at the 2021 International Conference on Smart Technologies and Systems for Internet of Things, held on November 26-27, 2021, in Shanghai, China. It covers topics like distributed processing for sensor data in CPS networks, approximate reasoning and pattern recognition for CPS networks, distributed processing in mobile networking, data analytics for social media sensor data integration, data platforms for efficient integration with CPS networks, virtualized and cloud-oriented resources for data processing for CPS networks, machine learning algorithms for CPS networks, data security and privacy in CPS networks, sensor fusion algorithms, sensor signal processing, data acquisition and preprocessing technology, intelligent computing, data mining methods and algorithms, big data system solutions and tools platform, intelligent control and intelligent management, and operational situation awareness utilizing big data-driven intelligence. It caters to postgraduate students, researchers, and practitioners specializing and working in related areas.
|
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
(1)
|