Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 15 of 15 matches in All Departments
Examining soybean utilization technology, this text covers principles, processing and product applications, and emphasizes recent technology and new ways to utilize and process soybeans. It includes the many food and industrial uses of soybeans, with emphasis on soybean foods and food ingredients, including potential neutraceuticals and disease preventive foods. Up-to-date information on biotechnological advances and research findings on soybean nutrition and health benefits are also included.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
This is a book on the robust control theory and its applications for graduate students and control engineers. Robust control methods are categorized according to the type of model uncertainty and all major methods are treated in depth, including their features, possible application areas and limitations. All major topics of robust control are covered, including small-gain approach, Lyapunov approach, IQC (integral quadratic constraint) method, positive real method, regional pole-placement and gain-scheduling control. All these materials are treated in a unified manner based on an optimization approach which makes the book compact and easy to master. Included are 120 examples, 203 figures, 159 drill problems and 9 case studies. The book provides a good platform for studying and applying robust control methods.This book is divided into three parts. The first part covers the mathematical tools and linear systems, including linear algebra, convex analysis, fundamentals of linear systems, system performance, stabilization, controller parameterization, relation between time domain and frequency domain characteristics, Riccati equation and performance limitation. The second part deals with the robust analysis issues, including model uncertainty, robustness analyses based on small-gain theory, Lyapunov theory and IQC theory. The third part covers the robust design issues, including H2 control, H221e control, Mu synthesis, robust control of parametric systems, regional pole placement, gain-scheduling method and positive real method. There is an accompanying website including a solution manual and other supporting material to fully enhance learning.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.
* Covers the timely topic of fuel cells and hydrogen-based energy from its fundamentals to practical applications * Serves as a resource for practicing researchers and as a text in graduate-level programs * Tackles crucial aspects in light of the new directions in the energy industry, in particular how to integrate fuel processing into contemporary systems like nuclear and gas power plants * Includes homework-style problems
The origins of 1/1250 and 1/200 scale models can be traced back to the first years of the twentieth century and their use as identification aids by the military during the First World War. When peace came the manufacturers aimed their increasingly sophisticated products at collectors, and ever since then acquiring, enhancing, modifying or scratch-building miniature ship models has been an avidly pursued hobby around the world. This new book focusses on models of the ships of the Second World War, probably the most popular subject for miniature model collectors, and the author, a well-known modeller himself, addresses all the practical issues that might confront those many collectors who like to enhance, convert, and modify their models, or even scratch-build models of ships not commercially available. The book covers both Allied and Axis warships, naval airplanes, merchant conversions and even an Italian armed schooner, and provides historic and technical information on the ships represented as well as practical advice on modelling them. The latter is extensive with twenty-five chapters covering everything from initial production techniques such as spin casting, silicon mould casting, resin casting, die-casting, plastic mould injection, and 3D printing through techniques for enhancing and modifying models to eventually researching and scratch-building an uncommon ship or type. The focus is always on particular vessels and the vast array covered by the author builds into a fascinating panorama of the vessels that fought across the world's oceans in that era. The combination of intriguing background and historical information, combined with detailed practical information and more than 300 stunning photographs will make this book irresistible to any collector or modeller and, indeed, to anyone with an interest in the navies of the Second World War.
This issue of Otolaryngologic Clinics, guest edited by Drs. Jean Anderson Eloy, James K. Liu, and Michael Setzen, is devoted to Sinonasal and Ventral Skull Base Malignancies. Articles in this outstanding issue include: Overview of Sinonasal and Ventral Skull Base Malignancy Management; Evaluation of Patients with Sinonasal and Ventral Skull Base Malignancies; Anatomical Consideration in Sinonasal and Ventral Skull Base Malignancy Surgery; Staging of Sinonasal and Ventral Skull Base Malignancies; Endoscopic Resection of Sinonasal and Ventral Skull Base Malignancies; Transfacial and Craniofacial Approaches for Resection of Sinonasal and Ventral Skull Base Malignancies; Endoscopic Resection of Pterygopalatine Fossa and Infratemporal Fossa Malignancies; Endoscopic Resection of Clival Malignancies; Combined Endoscopic and open Approaches in the Management of Sinonasal and Ventral Skull Base Malignancies; Management of Orbital Involvement in Sinonasal and Ventral Skull Base Malignancies; Management of Cavernous Sinus Involvement in Sinonasal and Ventral Skull Base Malignancies; The Role of Robotic Surgery in the Management of Sinonasal and Ventral Skull Base Malignancies; Management of Skull Base Defects after Surgical Resection of Sinonasal and Ventral Skull Base Malignancies; The role of Radiation Therapy in the Management of Sinonasal and Ventral Skull Base Malignancies; The Role of Chemotherapy in the Management of Sinonasal and Ventral Skull Base Malignancies; The Role of Targeted Therapy in the Management of Sinonasal and Ventral Skull Base Malignancies; The Making of a Skull Base Team and the Value of Multidisciplinary Approach in the Management of Sinonasal and Ventral Skull Base Malignancies; Outcomes of Sinonasal and Ventral Skull Base Malignancy Management; and Population-Based Results in the Management of Sinonasal and Ventral Skull Base Malignancies.
The mapping of mesoscale ocean features in the coastal zone is a major potential application for satellite data. The evolution of mesoscale features such as oil slicks, fronts, eddies, and ice edge can be tracked by the wavelet analysis using satellite data from repeating paths. The wavelet transform has been applied to satellite images, such as those from Synthetic Aperture Radar (SAR), Advanced Very High-Resolution Radiometer (AVHRR), and ocean color sensor for feature extraction. In this paper, algorithms and techniques for automated detection and tracking of mesoscale features from satellite SAR imagery employing wavelet analysis have been developed. Case studies on two major coastal oil spills have been investigated using wavelet analysis for tracking along the coast of Uruguay (February 1997), and near Point Barrow, Alaska (November 1997). Comparison of SAR images with SeaWiFS (Sea-viewing Wide Field-of-view Sensor) data for coccolithophore bloom in the East Bering Sea during the fall of 1997 shows a good match on bloom boundary. This paper demonstrates that this technique is a useful and promising tool for monitoring of coastal waters.
|
You may like...
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger
Blu-ray disc
(1)
R76 Discovery Miles 760
Better Call Saul - Season 1
Bob Odenkirk, Jonathan Banks, …
Blu-ray disc
(1)
R52 Discovery Miles 520
|