Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
In 1996 archaeologists excavated over 70,000 inscribed pieces of wood from a well in Changsha, the largest such discovery ever made in China. They are local administrative records of the state of Wu in the 230s and provide remarkable detail on the society, governance, and economy of third century central China. Although Wu was one of the famous Three Kingdoms, its administrative history was poorly known until these documents were found, so we have written this book to explain the context and content of these document to help researchers use these valuable texts to rewrite the history of South China.
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.
An exciting and richly detailed new history of the Silk Road that tells how it became more important as a route for diplomacy than for trade The King's Road offers a new interpretation of the history of the Silk Road, emphasizing its importance as a diplomatic route, rather than a commercial one. Tracing the arduous journeys of diplomatic envoys, Xin Wen presents a rich social history of long-distance travel that played out in deserts, post stations, palaces, and polo fields. The book tells the story of the everyday lives of diplomatic travelers on the Silk Road-what they ate and drank, the gifts they carried, and the animals that accompanied them-and how they navigated a complex web of geographic, cultural, and linguistic boundaries. It also describes the risks and dangers envoys faced along the way-from financial catastrophe to robbery and murder. Using documents unearthed from the famous Dunhuang "library cave" in Western China, The King's Road paints a detailed picture of the intricate network of trans-Eurasian transportation and communication routes that was established between 850 and 1000 CE. By exploring the motivations of the kings who dispatched envoys along the Silk Road and describing the transformative social and economic effects of their journeys, the book reveals the inner workings of an interstate network distinct from the Sino-centric "tributary" system. In shifting the narrative of the Silk Road from the transport of commodities to the exchange of diplomatic gifts and personnel, The King's Road puts the history of Eastern Eurasia in a new light.
This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.
Many of the polymers we use every day are highly flammable. Historically, a large number of home fires were caused by ignited polymeric materials until legislation was introduced requiring fire retardants to be added to these materials. Fire retardants increase the time it takes for materials to ignite, providing valuable time to prevent a fire or escape. However, it has become apparent that many of the traditional treatments used as fire retardants are harmful to human health and highly persistent in the environment. With evermore polymeric materials in our homes and lives it is still highly valuable to be able to make fire retardants, but consideration must be given to their environmental impact and sustainability. Green Fire Retardants for Polymeric Materials looks at both the choice of different materials and treatments for improving the fire retardancy of polymeric materials as well as green approaches to synthesising these fire retardants. It is a timely resource both for green chemists interested in real world applications for their work and polymer scientists keen to increase the sustainability of their products and processes.
|
You may like...
|