Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 39 matches in All Departments
Understanding the mechanical behavior of solids and contacts (interfaces and joints) is vital for the analysis, design, and maintenance of engineering systems. Materials may simultaneously experience the effects of many factors such as elastic, plastic, and creep strains, different loading (stress) paths, volume change under shear stress, microcracking leading to fracture and failure, strain softening or degradation. Typically the available models account for only one factor at a time, however, the Disturbed State Concept (DSC) with the Hierarchical Single Surface (HISS) plasticity is a unified modelling approach that can allow for numerous factors simultaneously, and in an integrated manner. DSC/HISS Modeling Applications for Problems in Mechanics, Geomechanics, and Structural Mechanics provides readers with comprehensive information including the basic concepts and applications for the Disturbed State Concept (DSC)/ HISS modeling regarding a wide range of engineering materials and contacts. Uniformity in format and content of each chapter will make it easier for the reader to appreciate the potential of using the DSC/HISS modeling across various applications. Features: Presents a new and simplified way to learn characterizations and behaviors of materials and contacts under various conditions Offers modeling applicable to several different materials including geologic (clays, sands, rocks), modified geologic materials (structured soils, overconsolidated soils, expansive soils, loess, frozen soils, chemically treated soils), hydrate bearing sediments, and more
Smart shipping is a future method for transporting ocean cargo and exploring the resources of oceans for medical drugs, food, energy resources, and other products. A smart ship is an integration of shipping with many fields such as fishing, manufacturing, navigation, communication, computing, control, sensing, etc., to provide better shipping and services. The purpose of this edited book is to provide state-of-the-art approaches and novel technologies for smart ships, covering a range of topics in these areas so that it will be an excellent reference book for the researchers, students, and professionals in these areas. It presents the fundamental technologies needed to build smart ships, and gives a clear explanation of them. This book will serve as a good reference for researchers to know the state of the art and to discover uncovered territory and develop new applications, as well as being a guideline for building future smart ships. Yang Xiao is a Full Professor in the Department of Computer Science at the University of Alabama, Tuscaloosa, Alabama, USA. Tieshan Li is a Full Professor in the School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China.
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
Seeking new methods to satisfy increasing communication demands, researchers continue to find inspiration from the complex systems found in nature. From ant-inspired allocation to a swarm algorithm derived from honeybees, Bio-Inspired Computing and Networking explains how the study of biological systems can significantly improve computing, networking, and robotics. Containing contributions from leading researchers from around the world, the book investigates the fundamental aspects and applications of bio-inspired computing and networking. Presenting the latest advances in bio-inspired communication, computing, networking, clustering, optimization, and robotics, the book considers state-of-the-art approaches, novel technologies, and experimental studies, including bio-inspired: Optimization of dynamic NP-hard problems Top-down controller design for distributing a robot swarm among multiple tasks Self-organizing data and signals cellular systems Dynamic spectrum access in cognitive radio networks QoS-aware architecture for scalable, adaptive, and survivable network systems Locomotion control of the Hexapod Robot Gregor III The book explores bio-inspired topology control and reconfiguration methods, as well as bio-inspired localization, synchronization, and mobility approaches. Providing wide-ranging coverage that includes past approaches, current challenges, and emerging concepts such as the evolution and self-healing of network architectures and protocols, this comprehensive reference provides you with the well-rounded understanding you need to continue the advancement of the development, design, and implementation of bio-inspired computing and networking.
"A Smart Network Solution to Crowded Bandwidth" Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitive Radio Network (CRN), allows unlicensed users opportunistic access to licensed bands without interfering with existing users. Although some initial study has been conducted in this field, researchers need a systematic reference book that presents clear definitions, functions, and current challenges of the CRNs. Cognitive Radio Networks presents state-of-the-art approaches and novel technologies for cognitive wireless radio networks and sheds light on future developments in these areas. Comprising the contributions of many prominent world-wide cognitive radio researchers, this book covers all CRN essentials including spectrum sensing, spectrum handoff, spectrum sharing, and CRN routing schemes. Divided into five parts, the book addresses the physical layer, medium access control, the routing layer, cross-layer considerations and advanced topics in cognitive radio networks. The chapters also review research, management, support, and cognitive techniques such as position and network awareness, infrastructure and physical and link layer concerns. The editors of this volume are noted experts in the field of wireless networks and security. Dr. Yang Xiao's research has been supported by the U.S. National Science Foundation (NSF), U.S. Army Research, Fleet & Industrial Supply Center San Diego (FISCSD), and the University of Alabama's Research Grants Committee. Dr. Fei Hu has worked with NSF, Cisco, Lockheed Martin, Sprint, and otherorganizations. By bringing together the combined input of international experts, these editors have advanced the field of this nascent technology and helped to forge new paths of discovery for progressive communications possibilities.
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks. About the Author Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.
Advancement in design and construction to embrace the impact of rapid global urbanization growth in infrastructure development is inevitable. This proceedings volume includes many smart and green solutions for civil infrastructures, incorporating geotechnical and engineering geology aspects. The articles presented in this volume are attempts made by the researchers and practitioners to address many geotechnical challenges, based on the state-of-the-art practices, innovative technologies, new research results and case histories in construction and design towards safer and cost effective infrastructures. This volume covers a wide range of topics with direct relevance to people within the broad field of geomechanics, including consultants, contractors, academics, materials suppliers and the owners and operators of civil infrastructures. Many papers associated with numerical modeling of transport infrastructure, advanced soil and rock testing, field monitoring, tunnelling, expansive soils, geo-center motion, triaxial and dynamic testing, piles etc. are included. The content is based on the contributions to the 6th GeoChina International Conference on Civil & Transportation Infrastructures: From Engineering to Smart & Green Life Cycle Solutions -- Nanchang, China, 2021.
This book illustrates theories in photovoltaic power generation, and focuses on the application of photovoltaic system, such as on-grid and off-grid system optimization design. The principle of the solar cell and manufacturing processes, the design and installation of PV system are extensively discussed in the book, making it an essential reference for graduate students in photovoltaic field and industrial engineers.
This book is devoted to fill the 'urban economics niche' and conceptualize a framework for valuing the urban configuration via local housing market. Advanced network analysis techniques are employed to capture the centrality features hindered in street layout. The author explores the several effects of urban morphology via housing market over two distinct contexts: UK and China. This work will appeal to a wide readership from scholars and practitioner to policy makers within the fields of real estate analysis, urban and regional studies, urban planning, urban design and economic geography.
This book is devoted to fill the 'urban economics niche' and conceptualize a framework for valuing the urban configuration via local housing market. Advanced network analysis techniques are employed to capture the centrality features hindered in street layout. The author explores the several effects of urban morphology via housing market over two distinct contexts: UK and China. This work will appeal to a wide readership from scholars and practitioner to policy makers within the fields of real estate analysis, urban and regional studies, urban planning, urban design and economic geography.
As the birthplace of moveable-type printing, China has some claim to being the homeland of publishing. China's ancient civilisation has nurtured a distinctively Chinese publishing industry, and this industry has done much to spread Chinese ideas and culture around the world. Yang Hu and Xiao Yang provide a comprehensive introduction to the origins and development of printing and publication in China from ancient to modern times, complemented throughout with full colour illustrations.
Presenting the work of prominent researchers working on smart
grids and related fields around the world, Security and Privacy in
Smart Grids identifies state-of-the-art approaches and novel
technologies for smart grid communication and security. It
investigates the fundamental aspects and applications of smart grid
security and privacy and reports on the latest advances in the
range of related areas making it an ideal reference for students,
researchers, and engineers in these fields.
The book s chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
The First International Conference on Mobile Lightweight Systems (MOBILIGHT) was held in Athens during May 18-20, 2009. The decision to organize a scientific event on wireless communications, where competition is really enormous, was motivated by discussions with some colleagues about the current unprecedented request for lightweight, wireless communication devices with high usability and performance able to support added-value services in a highly mobile environment. Such devices follow the user everywhere he/she goes (at work, at home, while travelling, in a classroom, etc.), but also result in exciting - search, development and business opportunities. Such a scenario clearly demands significant upgrades to the existing communi- tion paradigm in terms of infrastructure, devices and services to support the anytime, anywhere, any device philosophy, introducing novel and fast-evolving requirements and expectations on research and development in the field of information and com- nication technologies. The core issue is to support the desire of wireless users to have 24/7 network availability and transparent access to "their own" services.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
Appropriate for researchers, practitioners, and students alike, Communication and Networking in Smart Grids presents state-of-the-art approaches and novel technologies for communication networks in smart grids. It explains how contemporary grid networks are developed and deployed and presents a collection of cutting-edge advances to help improve current practice. Prominent researchers working on smart grids and in related fields around the world explain the fundamental aspects and applications of smart grids. Describing the role that communication and networking will play in future smart grids, they examine power delivery and the complete range of features and services available through smart grids. The book is divided into two parts: Smart Grids in General and Communications and Networks in Smart Grids. Its comprehensive coverage includes:
Outlining an optimum method for the design of distributed electric power supply and communication networks, the book reports on key ICT system engineering trends for regional energy marketplaces supporting electric mobility. It considers the spectrum of related topics in communication, IT, and security to provide you with the understanding needed to participate in the development, design, and implementation of future smart grid communications and networks.
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects of underwater communication. Prominent researchers from around the world consider contemporary challenges in the development of underwater acoustic sensor networks (UW-ASNs) and introduce a cross-layer approach for effective integration of all communication functionalities. Discussing architectures for two- and three-dimensional sensor networks, this authoritative resource clearly delineates the main differences between terrestrial and underwater sensor networks-covering the wide range of topics related to UW-ASNs. It examines efficient distributed routing algorithms for delay-insensitive and delay-sensitive applications and introduces a realistic acoustic model characterized by channel utilization efficiency that enables proper setting of the optimal packet size for underwater communication. It also: Provides efficient sensor communication protocols for the underwater environment Addresses the topology control problem for sparse and dense 3D networks Presents a novel distributed MAC protocol that incorporates a unique closed-loop distributed algorithm for setting the optimal transmit power and code length The book includes coverage of routing, fault tolerance, time synchronization, optimal clustering, medium access control, software, hardware, and channel modeling. Exploring the need to design an energy-efficient cross-layer protocol suite, this resource provides the understanding required to achieve high-performance channel access, routing, event transport reliability, and data flow control with underwater acoustic sensors.
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband wireless systems. Get Connected to the WiMAX Revolution WiMAX/MobileFi: Advanced Research and Technology brings together the world's leading WiMAX researchers to present progressive techniques in the design, analysis, and optimization of protocols for WiMAX. This ground-breaking, previously unpublished, collection of papers addresses topics such as connection admission control, integration with WiFi Networks, QoS support, handoff management, scheduling algorithms, and load-balancing just to name a few. Written under the leadership of editor Yang Xiao, member of the IEEE 802.11 working group, WiMAX/MobileFi: Advanced Research and Technology represents the most cutting-edge survey of WiMAX technologies. It provides a foundation to support currently emerging applications as well as fuel the development of future innovations.
Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitive Radio Network (CRN), allows unlicensed users opportunistic access to licensed bands without interfering with existing users. Although some initial study has been conducted in this field, researchers need a systematic reference book that presents clear definitions, functions, and current challenges of the CRNs. Cognitive Radio Networks presents state-of-the-art approaches and novel technologies for cognitive wireless radio networks and sheds light on future developments in these areas. Comprising the contributions of many prominent world-wide cognitive radio researchers, this book covers all CRN essentials including spectrum sensing, spectrum handoff, spectrum sharing, and CRN routing schemes. Divided into five parts, the book addresses the physical layer, medium access control, the routing layer, cross-layer considerations and advanced topics in cognitive radio networks. The chapters also review research, management, support, and cognitive techniques such as position and network awareness, infrastructure and physical and link layer concerns. The editors of this volume are noted experts in the field of wireless networks and security. Dr. Yang Xiao's research has been supported by the U.S. National Science Foundation (NSF), U.S. Army Research, Fleet & Industrial Supply Center San Diego (FISCSD), and the University of Alabama's Research Grants Committee. Dr. Fei Hu has worked with NSF, Cisco, Lockheed Martin, Sprint, and other organizations. By bringing together the combined input of international experts, these editors have advanced the field of this nascent technology and helped to forge new paths of discovery for progressive communications possibilities.
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects of underwater communication. Prominent researchers from around the world consider contemporary challenges in the development of underwater acoustic sensor networks (UW-ASNs) and introduce a cross-layer approach for effective integration of all communication functionalities. Discussing architectures for two- and three-dimensional sensor networks, this authoritative resource clearly delineates the main differences between terrestrial and underwater sensor networks-covering the wide range of topics related to UW-ASNs. It examines efficient distributed routing algorithms for delay-insensitive and delay-sensitive applications and introduces a realistic acoustic model characterized by channel utilization efficiency that enables proper setting of the optimal packet size for underwater communication. It also: Provides efficient sensor communication protocols for the underwater environment Addresses the topology control problem for sparse and dense 3D networks Presents a novel distributed MAC protocol that incorporates a unique closed-loop distributed algorithm for setting the optimal transmit power and code length The book includes coverage of routing, fault tolerance, time synchronization, optimal clustering, medium access control, software, hardware, and channel modeling. Exploring the need to design an energy-efficient cross-layer protocol suite, this resource provides the understanding required to achieve high-performance channel access, routing, event transport reliability, and data flow control with underwater acoustic sensors.
This book is about the philosophical, historical, and interpretative aspects of Mencius. It explores his influence, reception, and relevance in China from the third century BCE to the present, as well as offers comparative studies of Mencius and major figures in the history of Chinese and Western philosophy. With 34 accessible articles written by leading philosophers and scholars, the Dao Companion to the Philosophy of Mencius provides both broad pictures and in-depth discussions regarding the work of one of the most important and influential Chinese philosophers. It covers his normative ethics, meta-ethics, political philosophy, epistemology and moral psychology. The last section of the volume, “Mencius and Western Philosophers: Comparative Perspectives,” explicitly puts him in dialogue with major Western philosophers. The Dao Companion to the Philosophy of Mencius serves as an essential volume for college students, graduate students, and scholars who study and teach Mencius as well as Chinese philosophy and comparative philosophy in general.
This book constitutes the proceedings of the International Conference on Cognitive Computing, ICCC 2022, held as part of SCF 2022 in December 2022. The conference was held in Honolulu, USA. The 6 full and 2 short papers presented in this volume were carefully reviewed and selected from 17 submissions. The papers cover all aspects of Sensing Intelligence (SIJ as a Service (SlaaS). Cognitive Computing is a sensing-driven computing (SDC) scheme that explores and integrates intelligence from all types of senses in various scenarios and solution contexts.
China covers about 7% of the earth's land surface and encompasses a hugely diverse range of habitats. As a result, it boasts a rich and diverse avifauna, including some of the most spectacular and fascinating birds to be found anywhere in the world. Building on the enormous popularity and reputation of the original A Field Guide to the Birds of China (2000), John MacKinnon's fully updated and refreshed work remains a truly comprehensive, taxonomically modern, fully illustrated, and authoritative field guide. 1484 bird species are richly illustrated in 164 annotated colour plates, which are closely integrated with up-to-date colour distribution maps, QR codes providing easy access to birdcalls, IUCN Red List status indicators and new, concise descriptions. These descriptions feature key observations as well as conveying crucial changes to species distributions resulting from climate change and landscape transformation. Guide to the Birds of China will appeal to an international and growing audience of professional and amateur ornithologists and birding enthusiasts, academic researchers and students, wildlife photographers, and conservationists.
|
You may like...
|