Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 46 matches in All Departments
The text provides in-depth knowledge about recent advances in solar collector system, photovoltaic system, role of thermal energy systems in buildings, phase change materials, geothermal energy, biofuels, thermal management systems for EV in social and industrial applications. It further aims toward the inclusion of innovation and implementation of strategies for CO2 emission reduction through the reduction of energy consumption using conventional sources. This book: Presents the latest advances in the field of thermal energy storage, solar energy development, geothermal energy, and hybrid energy applications for green development. Highlights the importance of innovation and implementation of strategies for CO2 emission reduction through the reduction of energy consumption using sustainable technologies and methods. Discusses design development, life cycle assessment, modeling, and simulation of thermal energy systems in detail. Synergize exploration related to the various properties and functionalities through extensive theoretical and numerical modeling present in the energy sector. Explores opportunities, challenges, future perspectives, and approaches toward gaining sustainability through renewable energy resources. The text discusses the fundamentals of thermal energy and its applications in a comprehensive manner. It further covers advancements in solar thermal, and photovoltaic systems. The text highlights the contribution of geothermal energy conversion systems to sustainable development. It showcases the design and optimization of ground source heat pumps for space conditioning and presents modeling and simulation of the thermal energy systems for design optimization. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the fields including mechanical engineering, environmental engineering, and energy engineering.
Nanotechnology has revolutionized the approach to designing and developing novel drug delivery systems. The last two decades have seen a great interest in the use of nanotechnology to offer efficient ways of delivering new and existing drugs and macromolecules. The focus of this book is the application of nanotechnology to deliver drugs and biological agents by the mucosal routes of administration i.e. nasal, pulmonary, buccal, and oral routes. It provides an overview of nanotechnology in drug delivery with a description of different types of nanoparticles, methods of preparation and characterization, and functionalization for site-specific drug delivery. The emphasis is on the use of nanoparticles in treating various cancers and infectious diseases. It broadens the use of nanoparticles by including biologics, including vaccines and immunotherapies, apart from drugs and acknowledges the concerns around the potential toxicity of nanoparticles to the host; several chapters will discuss the biodistribution of these nanoparticles when mucosal routes of administration are employed. Further, the interaction of nanoparticles with the host's immune cells is discussed. Moreover, it reviews the regulatory aspects of nanotechnology in product development, especially when delivered by the mucosal route of administration. Lastly, discusses the challenges and opportunities to manufacture nanoparticles on an industrial scale. This book is the first of its kind to focus on the design, development and delivery of nanoparticles when administered by different mucosal routes.
Covers computational methods in design and fluid dynamics with a focus on computational fluid dynamics Explains advanced material applications and manufacturing in labs using novel alloys and introduces properties in material Discusses fabrication of graphene reinforced magnesium metal matrix for orthopedic applications Illustrates simulation and optimization gear transmission, heat sink and heat exchangers application Provides unique problem-solution approach including solutions, methodology, experimental setup, and results validation
The text discusses synthesis, processing, design, simulation and characterization of biomaterials for biomedical applications. It synergizes exploration related to various properties and functionalities in the biomedical field through extensive theoretical and experimental modeling. It further presents advanced integrated design and nonlinear simulation problems occurring in the biomedical engineering field. It will serve as an ideal reference text for senior undergraduate and graduate students, and academic researchers in fields including biomedical engineering, mechanical engineering, materials science, ergonomics, and human factors. The book: Employs a problem-solution approach, where, in each chapter, a specific biomedical engineering problem is raised and its numerical, and experimental solutions are presented Covers recent developments in biomaterials such as OPMF/KGG bio composites, PEEK-based biomaterials, PF/KGG biocomposites, oil palm mesocarp Fibre/KGG biocomposites, and polymeric resorbable materials for orthopedic, dentistry and shoulder arthroplasty applications Discusses mechanical performance and corrosive analysis of biomaterials for biomedical applications in detail Presents advanced integrated design and nonlinear simulation problems occurring in the biomedical engineering field Presents biodegradable polymers for various biomedical applications over the last decade owing to their non-corrosion in the body, biocompatibility and superior strength in growing state Synergizes exploration related to the various properties and functionalities in the biomedical field through extensive theoretical and experimental modeling
Going beyond performing simple analyses, researchers involved in the highly dynamic field of computational intelligent data analysis design algorithms that solve increasingly complex data problems in changing environments, including economic, environmental, and social data. Computational Intelligent Data Analysis for Sustainable Development presents novel methodologies for automatically processing these types of data to support rational decision making for sustainable development. Through numerous case studies and applications, it illustrates important data analysis methods, including mathematical optimization, machine learning, signal processing, and temporal and spatial analysis, for quantifying and describing sustainable development problems. With a focus on integrated sustainability analysis, the book presents a large-scale quadratic programming algorithm to expand high-resolution input-output tables from the national scale to the multinational scale to measure the carbon footprint of the entire trade supply chain. It also quantifies the error or dispersion between different reclassification and aggregation schemas, revealing that aggregation errors have a high concentration over specific regions and sectors. The book summarizes the latest contributions of the data analysis community to climate change research. A profuse amount of climate data of various types is available, providing a rich and fertile playground for future data mining and machine learning research. The book also pays special attention to several critical challenges in the science of climate extremes that are not handled by the current generation of climate models. It discusses potential conceptual and methodological directions to build a close integration between physical understanding, or physics-based modeling, and data-driven insights. The book then covers the conservation of species and ecologically valuable land. A case study on the Pennsylvania Dirt and Gravel Roads Program demonstrates that multiple-objective linear programming is a more versatile and efficient approach than the widely used benefit targeting selection process. Moving on to renewable energy and the need for smart grids, the book explores how the ongoing transformation to a sustainable energy system of renewable sources leads to a paradigm shift from demand-driven generation to generation-driven demand. It shows how to maximize renewable energy as electricity by building a supergrid or mixing renewable sources with demand management and storage. It also presents intelligent data analysis for real-time detection of disruptive events from power system frequency data collected using an existing Internet-based frequency monitoring network as well as evaluates a set of computationally intelligent techniques for long-term wind resource assessment. In addition, the book gives an example of how temporal and spatial data analysis tools are used to gather knowledge about behavioral data and address important social problems such as criminal offenses. It also applies constraint logic programming to a planning problem: the environmental and social impact assessment of the regional energy plan of the Emilia-Romagna region of Italy. Sustainable development problems, such as global warming, resource shortages, global species loss, and pollution, push researchers to create powerful data analysis approaches that analysts can then use to gain insight into these issues to support rational decision making. This volume shows both the data analysis and sustainable development communities how to use intelligent data analysis tools to address practical problems and encourages researchers to develop better methods.
Going beyond performing simple analyses, researchers involved in the highly dynamic field of computational intelligent data analysis design algorithms that solve increasingly complex data problems in changing environments, including economic, environmental, and social data. Computational Intelligent Data Analysis for Sustainable Development presents novel methodologies for automatically processing these types of data to support rational decision making for sustainable development. Through numerous case studies and applications, it illustrates important data analysis methods, including mathematical optimization, machine learning, signal processing, and temporal and spatial analysis, for quantifying and describing sustainable development problems. With a focus on integrated sustainability analysis, the book presents a large-scale quadratic programming algorithm to expand high-resolution input-output tables from the national scale to the multinational scale to measure the carbon footprint of the entire trade supply chain. It also quantifies the error or dispersion between different reclassification and aggregation schemas, revealing that aggregation errors have a high concentration over specific regions and sectors. The book summarizes the latest contributions of the data analysis community to climate change research. A profuse amount of climate data of various types is available, providing a rich and fertile playground for future data mining and machine learning research. The book also pays special attention to several critical challenges in the science of climate extremes that are not handled by the current generation of climate models. It discusses potential conceptual and methodological directions to build a close integration between physical understanding, or physics-based modeling, and data-driven insights. The book then covers the conservation of species and ecologically valuable land. A case study on the Pennsylvania Dirt and Gravel Roads Program demonstrates that multiple-objective linear programming is a more versatile and efficient approach than the widely used benefit targeting selection process. Moving on to renewable energy and the need for smart grids, the book explores how the ongoing transformation to a sustainable energy system of renewable sources leads to a paradigm shift from demand-driven generation to generation-driven demand. It shows how to maximize renewable energy as electricity by building a supergrid or mixing renewable sources with demand management and storage. It also presents intelligent data analysis for real-time detection of disruptive events from power system frequency data collected using an existing Internet-based frequency monitoring network as well as evaluates a set of computationally intelligent techniques for long-term wind resource assessment. In addition, the book gives an example of how temporal and spatial data analysis tools are used to gather knowledge about behavioral data and address important social problems such as criminal offenses. It also applies constraint logic programming to a planning problem: the environmental and social impact assessment of the regional energy plan of the Emilia-Romagna region of Italy. Sustainable development problems, such as global warming, resource shortages, global species loss, and pollution, push researchers to create powerful data analysis approaches that analysts can then use to gain insight into these issues to support rational decision making. This volume shows both the data analysis and sustainable development communities how to use intelligent data analysis tools to address practical problems and encourages researchers to develop better methods.
This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to communities of open source software developers, biometric template generation as well as analysis of user behavior within heterogeneous environments of cultural educational centers. Addressing these challenging applications is what makes this edited volume of interest to researchers and students focused on social media and social network analysis.
Nanotechnology has revolutionized the approach to designing and developing novel drug delivery systems. The last two decades have seen a great interest in the use of nanotechnology to offer efficient ways of delivering new and existing drugs and macromolecules. The focus of this book is the application of nanotechnology to deliver drugs and biological agents by the mucosal routes of administration i.e. nasal, pulmonary, buccal, and oral routes. It provides an overview of nanotechnology in drug delivery with a description of different types of nanoparticles, methods of preparation and characterization, and functionalization for site-specific drug delivery. The emphasis is on the use of nanoparticles in treating various cancers and infectious diseases. It broadens the use of nanoparticles by including biologics, including vaccines and immunotherapies, apart from drugs and acknowledges the concerns around the potential toxicity of nanoparticles to the host; several chapters will discuss the biodistribution of these nanoparticles when mucosal routes of administration are employed. Further, the interaction of nanoparticles with the host's immune cells is discussed. Moreover, it reviews the regulatory aspects of nanotechnology in product development, especially when delivered by the mucosal route of administration. Lastly, discusses the challenges and opportunities to manufacture nanoparticles on an industrial scale. This book is the first of its kind to focus on the design, development and delivery of nanoparticles when administered by different mucosal routes.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to communities of open source software developers, biometric template generation as well as analysis of user behavior within heterogeneous environments of cultural educational centers. Addressing these challenging applications is what makes this edited volume of interest to researchers and students focused on social media and social network analysis.
This volume contains extended papers from Sensor-KDD 2008, the Second - ternational Workshop on Knowledge Discovery from Sensor Data. The second Sensor-KDDworkshopwasheldinLasVegasonAugust24,2008, inconjunction with the 14th ACM SIGKDD InternationalConference on KnowledgeDiscovery and Data Mining. Wide-area sensor infrastructures, remote sensors, and wireless sensor n- works, RFIDs, yield massive volumes of disparate, dynamic, and geographically distributeddata.Assuchsensorsarebecomingubiquitous, asetofbroadrequi- ments is beginning to emerge across high-priority applications including dis- ter preparedness and management, adaptability to climate change, national or homelandsecurity, andthe managementofcriticalinfrastructures.Therawdata from sensors need to be e?ciently managed and transformed to usable infor- tion through data fusion, which in turn must be converted to predictive insights via knowledge discovery, ultimately facilitating automated or human-induced tactical decisions or strategic policy based on decision sciences and decision s- port systems. The expected ubiquity of sensors in the near future, combined with the cr- ical roles they are expected to play in high-priority application solutions, points to an era of unprecedented growth and opportunities. The main motivation for the Sensor-KDD series of workshops stems from the increasing need for a forum to exchange ideas and recent research results, and to facilitate coll- oration and dialog between academia, government, and industrial stakeho- ers. This is clearly re?ected in the successful organization of the ?rst workshop (http: //www.ornl.gov/sci/knowledgediscovery/SensorKDD-2007/)alongwiththe ACMKDD-2007conference, whichwasattendedbymorethanseventyregistered participants, and resulted in an edited book (CRC Press, ISBN-9781420082326, 2008), and a special issue in the Intelligent Data Analysis journal (Volume 13, Number 3, 2
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics. Analyze the design, architecture, and security issues of wireless lighting systems Understand how to breach electronic door locks and their wireless mechanisms Examine security design flaws in remote-controlled baby monitors Evaluate the security design of a suite of IoT-connected home products Scrutinize security vulnerabilities in smart TVs Explore research into security weaknesses in smart cars Delve into prototyping techniques that address security in initial designs Learn plausible attacks scenarios based on how people will likely use IoT devices
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. "Network Security Tools" shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function. Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, "Network Security Tools" takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practicalsolutions--without reinventing the wheel. In an age when security is critical, "Network Security Tools" is the resource you want at your side when locking down your network.
Nano-Pharmacokinetics and Theranostics: Advancing Cancer Therapy addresses from a comprehensive and multidisciplinary approach the translational aspects and clinical perspectives of nano-pharmacokinetics using cancer as a model disease. Nano-pharmacokinetics is emerging as an important sub discipline of nanoscience and medical sciences because of the increasing safety issues of nanosystems on living organisms. This book reports the dynamics of nanosystems in living organisms for better understanding of nanotoxicity, pharmacology, biochemistry, physiology and medicine perspectives. It further examines current progress of state-of-the art pharmacokinetics mechanisms, which will be of great help to develop more clinical-oriented nanosystems with a wide safety margin. The book is divided into three sections: the first section focuses on the concept of pharmacokinetics with state-of-the-art Nano-Pharmacokinetics (NPK). The second section looks at the engineering of nanoparticles and pharmacokinetics clinical development. The final section focuses on Nano-Pharmacokinetics and Theranostics, elaborating the basic question of how pharmacokinetics of nanomaterials relate to their end applications such as cancer therapy. Nano-Pharmacokinetics and Theranostics: Advancing Cancer Therapy will be useful to researchers in the field of nanoparticle based targeted drug delivery including pharmaceutical scientists, material scientists, chemists, nanotechnologists, biomedical scientists, and clinicians.
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
|
You may like...
|