|
Showing 1 - 25 of
53 matches in All Departments
Renewable Hydrogen: Opportunities and Challenges in Commercial
Success presents fundamental principles and the latest research and
technological advances in renewable hydrogen commercialization.
With commercial scenarios and case studies, the book offers
practical guidance for the scale-up of hydrogen production and
storage. Beginning with an introduction to alternative energy
resources, Part 1 presents a deep dive into the chemical,
biochemical and electrochemical processes of hydrogen production.
Part 2 discusses hydrogen storage and transportation, with Part 3
reviewing the applications of hydrogen in the automobile, space and
chemical industries. Finally, Part 4 considers future perspectives,
including challenges and techno economics. Renewable Hydrogen:
Opportunities and Challenges in Commercial Success is an essential
read for those seeking to understand how to successfully apply
hydrogen production and storage research to an industrial scale.
This book is a relevant reference for any readers interested in the
security aspects of Cyber-Physical Systems and particularly useful
for those looking to keep informed on the latest advances in this
dynamic area. Cyber-Physical Systems (CPSs) are characterized by
the intrinsic combination of software and physical components.
Inherent elements often include wired or wireless data
communication, sensor devices, real-time operation and automated
control of physical elements. Typical examples of associated
application areas include industrial control systems, smart grids,
autonomous vehicles and avionics, medial monitoring and robotics.
The incarnation of the CPSs can therefore range from considering
individual Internet-of-Things devices through to large-scale
infrastructures. Presented across ten chapters authored by
international researchers in the field from both academia and
industry, this book offers a series of high-quality contributions
that collectively address and analyze the state of the art in the
security of Cyber-Physical Systems and related technologies. The
chapters themselves include an effective mix of theory and applied
content, supporting an understanding of the underlying security
issues in the CPSs domain, alongside related coverage of the
technological advances and solutions proposed to address them. The
chapters comprising the later portion of the book are specifically
focused upon a series of case examples, evidencing how the
protection concepts can translate into practical application.
This book presents high-quality, original contributions (both
theoretical and experimental) on Information Security, Machine
Learning, Data Mining and Internet of Things (IoT). It gathers
papers presented at ICETIT 2019, the 1st International Conference
on Emerging Trends in Information Technology, which was held in
Delhi, India, in June 2019. This conference series represents a
targeted response to the growing need for research that reports on
and assesses the practical implications of IoT and network
technologies, AI and machine learning, data analytics and cloud
computing, security and privacy, and next generation computing
technologies.
Blockchain Technology Solutions for the Security of IoT-Based
Healthcare Systems explores the various benefits and challenges
associated with the integration of blockchain with IoT healthcare
systems, focusing on designing cognitive-embedded data technologies
to aid better decision-making, processing and analysis of large
amounts of data collected through IoT. This book series targets the
adaptation of decision-making approaches under cognitive computing
paradigms to demonstrate how the proposed procedures, as well as
big data and Internet of Things (IoT) problems can be handled in
practice. Current Internet of Things (IoT) based healthcare systems
are incapable of sharing data between platforms in an efficient
manner and holding them securely at the logical and physical level.
To this end, blockchain technology guarantees a fully autonomous
and secure ecosystem by exploiting the combined advantages of smart
contracts and global consensus. However, incorporating blockchain
technology in IoT healthcare systems is not easy. Centralized
networks in their current capacity will be incapable to meet the
data storage demands of the incoming surge of IoT based healthcare
wearables.
Cementitious materials, rocks and fibre-reinforced composites
commonly termed as "quasibrittle," need a different fracture
mechanics approach to model the crack propagation study because of
the presence of significant size of fracture process zone ahead of
the crack-tip. Recent studies show that concrete structures
manifest three important stages in fracture process: crack
initiation, stable crack propagation and unstable fracture or
failure. Fracture Mechanics concept can better explain the above
various stages including the concepts of ductility, size-effect,
strain softening and post-cracking behavior of concrete and
concrete structures.
The book presents a basic introduction on the various nonlinear
concrete fracture models considering the respective fracture
parameters. To this end, a thorough state-of-the-art review on
various aspects of the material behavior and development of
different concrete fracture models is presented. The development of
cohesive crack model for standard test geometries using commonly
used softening functions is shown and extensive studies on the
behavior of cohesive crack fracture parameters are also carried
out. The subsequent chapter contains the extensive study on the
double-"K" and double-"G" fracture parameters in which some recent
developments on the related fracture parameters are illustrated
including introduction of weight function method to Double-"K"
Fracture Model and formulization of size-effect behavior of the
double-"K" fracture parameters. The application of weight function
approach for determining of the "KR"-curve associated with cohesive
stress distribution in the fracture process zone is also presented.
Available test data are used to validate the new approach. Further,
effect of specimen geometry, loading condition, size-effect and
softening function on various fracture parameters is investigated.
Towards the end, a comparative study between different fracture
parameters obtained from various models is presented."
This book explains farmer suicides in India in the backdrop of
rural politics as a determining factor. By bringing in politics as
a variable the research presented in the book reveals that there
are non-farm factors playing critical role in prompting behavioral
change amongst the peasantry but haven't received much academic
attention. The book argues that the changing nature of public
spaces has significantly altered the perception of self in the
rural society of India. It presents indicators of this rural change
and how the state policy and political parties led political
mobilization that changed the character of community relations in
the rural areas. The book shows that other possible manifestations
of the large-scale behavioral change in the rural areas and
increasing rural distress, those are equally serious but haven't
received much attention, are rising cases of drug-addiction,
agrarian riots, or other forms of collective violence. The
increasing number of farmers protests also need to be understood in
this context.
Today, Internet of Things (IoT) is ubiquitous as it is applied in
practice in everything from Industrial Control Systems (ICS) to
e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities,
smart parking, healthcare, supply chain management and many more.
Numerous industries, academics, alliances and standardization
organizations make an effort on IoT standardization, innovation and
development. But there is still a need for a comprehensive
framework with integrated standards under one IoT vision.
Furthermore, the existing IoT systems are vulnerable to huge range
of malicious attacks owing to the massive numbers of deployed IoT
systems, inadequate data security standards and the
resource-constrained nature. Existing security solutions are
insufficient and therefore it is necessary to enable the IoT
devices to dynamically counter the threats and save the system.
Apart from illustrating the diversified IoT applications, this book
also addresses the issue of data safekeeping along with the
development of new security-enhancing schemes such as blockchain,
as well as a range of other advances in IoT. The reader will
discover that the IoT facilitates a multidisciplinary approach
dedicated to create novel applications and develop integrated
solutions to build a sustainable society. The innovative and fresh
advances that demonstrate IoT and computational intelligence in
practice are discussed in this book, which will be helpful and
informative for scientists, research scholars, academicians,
policymakers, industry professionals, government organizations and
others. This book is intended for a broad target audience,
including scholars of various generations and disciplines,
recognized scholars (lecturers and professors) and young
researchers (postgraduate and undergraduates) who study the legal
and socio-economic consequences of the emergence and dissemination
of digital technologies such as IoT. Furthermore, the book is
intended for researchers, developers and operators working in the
field of IoT and eager to comprehend the vulnerability of the IoT
paradigm. The book will serve as a comprehensive guide for the
advanced-level students in computer science who are interested in
understanding the severity and implications of the accompanied
security issues in IoT. Dr. Bharat Bhushan is an Assistant
Professor of Department of Computer Science and Engineering (CSE)
at School of Engineering and Technology, Sharda University, Greater
Noida, India. Prof. (Dr.) Sudhir Kumar Sharma is currently a
Professor and Head of the Department of Computer Science, Institute
of Information Technology & Management affiliated to GGSIPU,
New Delhi, India. Prof. (Dr.) Bhuvan Unhelkar (BE, MDBA, MSc, PhD;
FACS; PSM-I, CBAP (R)) is an accomplished IT professional and
Professor of IT at the University of South Florida,
Sarasota-Manatee (Lead Faculty). Dr. Muhammad Fazal Ijaz is working
as an Assistant Professor in Department of Intelligent Mechatronics
Engineering, Sejong University, Seoul, Korea. Prof. (Dr.) Lamia
Karim is a professor of computer science at the National School of
Applied Sciences Berrechid (ENSAB), Hassan 1st University.
Security and Privacy Issues in IoT Devices and Sensor Networks
investigates security breach issues in IoT and sensor networks,
exploring various solutions. The book follows a two-fold approach,
first focusing on the fundamentals and theory surrounding sensor
networks and IoT security. It then explores practical solutions
that can be implemented to develop security for these elements,
providing case studies to enhance understanding. Machine learning
techniques are covered, as well as other security paradigms, such
as cloud security and cryptocurrency technologies. The book
highlights how these techniques can be applied to identify attacks
and vulnerabilities, preserve privacy, and enhance data security.
This in-depth reference is ideal for industry professionals dealing
with WSN and IoT systems who want to enhance the security of these
systems. Additionally, researchers, material developers and
technology specialists dealing with the multifarious aspects of
data privacy and security enhancement will benefit from the book's
comprehensive information.
Integration of IoT (Internet of Things) with big data and cloud
computing has brought forward numerous advantages and challenges
such as data analytics, integration, and storage. This book
highlights these challenges and provides an integrating framework
for these technologies, illustrating the role of blockchain in all
possible facets of IoT security. Furthermore, it investigates the
security and privacy issues associated with various IoT systems
along with exploring various machine learning-based IoT security
solutions. This book brings together state-of-the-art innovations,
research activities (both in academia and in industry), and the
corresponding standardization impacts of 5G as well. Aimed at
graduate students, researchers in computer science and engineering,
communication networking, IoT, machine learning and pattern
recognition, this book Showcases the basics of both IoT and various
security paradigms supporting IoT, including Blockchain Explores
various machine learning-based IoT security solutions and
highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially
concerned with IoT security Provides insights into the taxonomy of
challenges, issues, and research directions in IoT-based
applications Includes examples and illustrations to effectively
demonstrate the principles, algorithm, applications, and practices
of security in the IoT environment
This book is written to introduce the application of
high-performance composite materials such as fiber reinforced
polymers, functionally graded composites, and sustainable fiber
reinforced composites for development of thin-walled plated
structures, beams, girders, and deck structures subjected to
different kinds of loads. This book also includes test cases and
its validation with finite element method using general purpose
commercial computer software. Moreover, the book also deals with
design methodology of advanced composite materials based on
different applications. The comprehensive overview of the
state-of-the-art research on the high-performance composite
structures dealing with their stability, response, and failure
characteristics will be of significant interest to scientists,
researchers, students, and engineers working in the thrust area of
advanced composite structures. This book is also helpful for Ph.D.
candidates for developing their fundamental understanding on
high-performance composite structures, and it will also appropriate
for master- and undergraduate-level courses on design of composite
structures especially for Civil Engineering Infrastructures.
The Internet has gone from an Internet of people to an Internet of
Things (IoT). This has brought forth strong levels of complexity in
handling interoperability that involves the integrating of wireless
sensor networks (WSNs) into IoT. This book offers insights into the
evolution, usage, challenges, and proposed countermeasures
associated with the integration. Focusing on the integration of
WSNs into IoT and shedding further light on the subtleties of such
integration, this book aims to highlight the encountered problems
and provide suitable solutions. It throws light on the various
types of threats that can attack both WSNs and IoT along with the
recent approaches to counter them. This book is designed to be the
first choice of reference at research and development centers,
academic institutions, university libraries, and any institution
interested in the integration of WSNs into IoT. Undergraduate and
postgraduate students, Ph.D. scholars, industry technologists,
young entrepreneurs, and researchers working in the field of
security and privacy in IoT are the primary audience of this book.
The book aims to showcase the basics of both IoT and Blockchain for
beginners as well as their integration and challenge discussions
for existing practitioner. It aims to develop understanding of the
role of blockchain in fostering security. The objective of this
book is to initiate conversations among technologists, engineers,
scientists, and clinicians to synergize their efforts in producing
low-cost, high-performance, highly efficient, deployable IoT
systems. It presents a stepwise discussion, exhaustive literature
survey, rigorous experimental analysis and discussions to
demonstrate the usage of blockchain technology for securing
communications. The book evaluates, investigate, analyze and
outline a set of security challenges that needs to be addressed in
the near future. The book is designed to be the first reference
choice at research and development centers, academic institutions,
university libraries and any institutions interested in exploring
blockchain. UG/PG students, PhD Scholars of this fields, industry
technologists, young entrepreneurs and researchers working in the
field of blockchain technology are the primary audience of this
book.
The purpose of this edited book is to present and showcase the
basic fundamentals, applications, and integration of both IoT and
Blockchain. The trend of applying Blockchain to IoT is rapidly
growing because it helps to overcome various challenges faced by
IoT, from smart manufacturing to unmanned aerial vehicles. Thise
book aims to showcase the basics of both IoT and Blockchain as well
as the integration and challenges for existing practitioners. Thise
book initiates conversations among technologists, engineers,
scientists, and clinicians to synergize their efforts in producing
low-cost, high-performance, highly efficient, deployable IoT
systems. Thise book is theory-based and is useful for engineers
from various disciplines, including industrial engineering,
computer science, electronics, telecommunications, electrical,
agricultural, and cybersecurity, along with researchers,
professionals, and students.
This book is written to introduce the application of
high-performance composite materials such as fiber reinforced
polymers, functionally graded composites, and sustainable fiber
reinforced composites for development of thin-walled plated
structures, beams, girders, and deck structures subjected to
different kinds of loads. This book also includes test cases and
its validation with finite element method using general purpose
commercial computer software. Moreover, the book also deals with
design methodology of advanced composite materials based on
different applications. The comprehensive overview of the
state-of-the-art research on the high-performance composite
structures dealing with their stability, response, and failure
characteristics will be of significant interest to scientists,
researchers, students, and engineers working in the thrust area of
advanced composite structures. This book is also helpful for Ph.D.
candidates for developing their fundamental understanding on
high-performance composite structures, and it will also appropriate
for master- and undergraduate-level courses on design of composite
structures especially for Civil Engineering Infrastructures.
This book is a relevant reference for any readers interested in the
security aspects of Cyber-Physical Systems and particularly useful
for those looking to keep informed on the latest advances in this
dynamic area. Cyber-Physical Systems (CPSs) are characterized by
the intrinsic combination of software and physical components.
Inherent elements often include wired or wireless data
communication, sensor devices, real-time operation and automated
control of physical elements. Typical examples of associated
application areas include industrial control systems, smart grids,
autonomous vehicles and avionics, medial monitoring and robotics.
The incarnation of the CPSs can therefore range from considering
individual Internet-of-Things devices through to large-scale
infrastructures. Presented across ten chapters authored by
international researchers in the field from both academia and
industry, this book offers a series of high-quality contributions
that collectively address and analyze the state of the art in the
security of Cyber-Physical Systems and related technologies. The
chapters themselves include an effective mix of theory and applied
content, supporting an understanding of the underlying security
issues in the CPSs domain, alongside related coverage of the
technological advances and solutions proposed to address them. The
chapters comprising the later portion of the book are specifically
focused upon a series of case examples, evidencing how the
protection concepts can translate into practical application.
This book presents high-quality, original contributions (both
theoretical and experimental) on Information Security, Machine
Learning, Data Mining and Internet of Things (IoT). It gathers
papers presented at ICETIT 2019, the 1st International Conference
on Emerging Trends in Information Technology, which was held in
Delhi, India, in June 2019. This conference series represents a
targeted response to the growing need for research that reports on
and assesses the practical implications of IoT and network
technologies, AI and machine learning, data analytics and cloud
computing, security and privacy, and next generation computing
technologies.
Integration of IoT (Internet of Things) with big data and cloud
computing has brought forward numerous advantages and challenges
such as data analytics, integration, and storage. This book
highlights these challenges and provides an integrating framework
for these technologies, illustrating the role of blockchain in all
possible facets of IoT security. Furthermore, it investigates the
security and privacy issues associated with various IoT systems
along with exploring various machine learning-based IoT security
solutions. This book brings together state-of-the-art innovations,
research activities (both in academia and in industry), and the
corresponding standardization impacts of 5G as well. Aimed at
graduate students, researchers in computer science and engineering,
communication networking, IoT, machine learning and pattern
recognition, this book Showcases the basics of both IoT and various
security paradigms supporting IoT, including Blockchain Explores
various machine learning-based IoT security solutions and
highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially
concerned with IoT security Provides insights into the taxonomy of
challenges, issues, and research directions in IoT-based
applications Includes examples and illustrations to effectively
demonstrate the principles, algorithm, applications, and practices
of security in the IoT environment
Cementitious materials, rocks and fibre-reinforced composites
commonly termed as quasibrittle, need a different fracture
mechanics approach to model the crack propagation study because of
the presence of significant size of fracture process zone ahead of
the crack-tip. Recent studies show that concrete structures
manifest three important stages in fracture process: crack
initiation, stable crack propagation and unstable fracture or
failure. Fracture Mechanics concept can better explain the above
various stages including the concepts of ductility, size-effect,
strain softening and post-cracking behavior of concrete and
concrete structures. The book presents a basic introduction on the
various nonlinear concrete fracture models considering the
respective fracture parameters. To this end, a thorough
state-of-the-art review on various aspects of the material behavior
and development of different concrete fracture models is presented.
The development of cohesive crack model for standard test
geometries using commonly used softening functions is shown and
extensive studies on the behavior of cohesive crack fracture
parameters are also carried out. The subsequent chapter contains
the extensive study on the double-K and double-G fracture
parameters in which some recent developments on the related
fracture parameters are illustrated including introduction of
weight function method to Double-K Fracture Model and formulization
of size-effect behavior of the double-K fracture parameters. The
application of weight function approach for determining of the
KR-curve associated with cohesive stress distribution in the
fracture process zone is also presented. Available test data are
used to validate the new approach. Further, effect of specimen
geometry, loading condition, size-effect and softening function on
various fracture parameters is investigated. Towards the end, a
comparative study between different fracture parameters obtained
from various models is presented.
Tourism has remained neglected in our country due to variety of
factors. The process of globalization has however given new twist
to India and we can develop our tourism sector at par with leading
countries of the globe. India has the potential to develop
varieties of tourism and time has come to develop it at full pace.
We will incorporate millions of poor people into the mainstreaming
process of development through developing tourism. It is one of the
most important possibilities which could help the country usher in
new era marked by prosperity in 21st century to ensure sustainable
development. We must seize the opportunity.
This book presents the statistical methods that are useful in the study of molecular evolution and illustrates how to use them in actual data analysis. Molecular evolution has been developing at a great pace over the past decade or so, driven by the huge increase in genetic sequence data from many organisms, the improvement of high-speed microcomputers, and the development of several new methods for phylogenetic analysis. This book for graduate students and researchers, assuming a basic knowledge of evolution, molecular biology, and elementary statistics, should make it possible for graduate students and researchers, assuming a basic knowledge of evolution, molecular biology, and elementary statistics, should make it possible for many investigators to incorporate refined statistical analysis of large-scale data in their own work.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|