Browse Results

Showing 50,501 through 50,525 of 82,864 results

Trends in Advanced Intelligent Control, Optimization and Automation: Proceedings of KKA 2017—The 19th Polish Control Conference, Kraków, Poland, June 18–21, 2017 (Advances in Intelligent Systems and Computing #577)

by Wojciech Mitkowski Janusz Kacprzyk Krzysztof Oprzędkiewicz Paweł Skruch

This volume contains the proceedings of the KKA 2017 – the 19th Polish Control Conference, organized by the Department of Automatics and Biomedical Engineering, AGH University of Science and Technology in Kraków, Poland on June 18–21, 2017, under the auspices of the Committee on Automatic Control and Robotics of the Polish Academy of Sciences, and the Commission for Engineering Sciences of the Polish Academy of Arts and Sciences. Part 1 deals with general issues of modeling and control, notably flow modeling and control, sliding mode, predictive, dual, etc. control. In turn, Part 2 focuses on optimization, estimation and prediction for control. Part 3 is concerned with autonomous vehicles, while Part 4 addresses applications. Part 5 discusses computer methods in control, and Part 6 examines fractional order calculus in the modeling and control of dynamic systems. Part 7 focuses on modern robotics. Part 8 deals with modeling and identification, while Part 9 deals with problems related to security, fault detection and diagnostics. Part 10 explores intelligent systems in automatic control, and Part 11 discusses the use of control tools and techniques in biomedical engineering. Lastly, Part 12 considers engineering education and teaching with regard to automatic control and robotics.

Trends in Artificial Intelligence: PeHealth 2016, I3A 2016, AIED 2016, AI4T 2016, IWEC 2016, and RSAI 2016, Phuket, Thailand, August 22-23, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10004)

by Masayuki Numao Thanaruk Theeramunkong Thepchai Supnithi Mahasak Ketcham Narit Hnoohom Patiyuth Pramkeaw

This book constitutes the refereed proceedings of the 14th Pacific Rim Collocated PRICAI 2016 Workshops on Artificial Intelligence, held in Phuket, Thailand, in August 2016.The 16 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The are organized around the following topics: e-health mining; image, information and intelligent applications; artificial intelligence for educational applications; artificial intelligence for tourism; emphatic computing;artificial intelligence and applications.

Trends in Control and Decision-Making for Human–Robot Collaboration Systems

by Yue Wang Fumin Zhang

This book provides an overview of recent research developments in the automation and control of robotic systems that collaborate with humans. A measure of human collaboration being necessary for the optimal operation of any robotic system, the contributors exploit a broad selection of such systems to demonstrate the importance of the subject, particularly where the environment is prone to uncertainty or complexity. They show how such human strengths as high-level decision-making, flexibility, and dexterity can be combined with robotic precision, and ability to perform task repetitively or in a dangerous environment.The book focuses on quantitative methods and control design for guaranteed robot performance and balanced human experience from both physical human-robot interaction and social human-robot interaction. Its contributions develop and expand upon material presented at various international conferences. They are organized into three parts covering:one-human–one-robot collaboration;one-human–multiple-robot collaboration; andhuman–swarm collaboration.Individual topic areas include resource optimization (human and robotic), safety in collaboration, human trust in robot and decision-making when collaborating with robots, abstraction of swarm systems to make them suitable for human control, modeling and control of internal force interactions for collaborative manipulation, and the sharing of control between human and automated systems, etc. Control and decision-making algorithms feature prominently in the text, importantly within the context of human factors and the constraints they impose. Applications such as assistive technology, driverless vehicles, cooperative mobile robots, manufacturing robots and swarm robots are considered. Illustrative figures and tables are provided throughout the book.Researchers and students working in controls, and the interaction of humans and robots will learn new methods for human–robot collaboration from this book and will find the cutting edge of the subject described in depth.

Trends in Legal Advocacy: Interviews with Prosecutors and Criminal Defense Lawyers Across the Globe, Volume One (Interviews with Global Leaders in Policing, Courts, and Prisons)

by Jane Goodman-Delahunty Dilip K. Das

A new installment of the series of Interviews with Global Leaders in Policing, Courts, and Prisons, this book expands upon the criminal justice coverage of earlier volumes, offering the voices of 14 lawyers from 13 diverse locales, including countries in Africa, North America, South America, Europe, and the Asia-Pacific region. This book is intended for students and others focusing on law and legal studies, policing, psychology and law, criminology, justice studies, public policy, and for all those interested in the front lines of legal change around the world. Featuring versatile chapters perfect for individual use or as part of a collection, this volume offers a personal approach to the legal world for students and experienced professionals.

Trends in Legal Advocacy: Interviews with Prosecutors and Criminal Defense Lawyers Across the Globe, Volume One (Interviews with Global Leaders in Policing, Courts, and Prisons)

by Jane Goodman-Delahunty and Dilip K. Das

A new installment of the series of Interviews with Global Leaders in Policing, Courts, and Prisons, this book expands upon the criminal justice coverage of earlier volumes, offering the voices of 14 lawyers from 13 diverse locales, including countries in Africa, North America, South America, Europe, and the Asia-Pacific region. This book is intended for students and others focusing on law and legal studies, policing, psychology and law, criminology, justice studies, public policy, and for all those interested in the front lines of legal change around the world. Featuring versatile chapters perfect for individual use or as part of a collection, this volume offers a personal approach to the legal world for students and experienced professionals.

Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five (Interviews with Global Leaders in Policing, Courts, and Prisons)

by Bruce F. Baker Dilip K. Das

Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five, is based on the premise that police officials have a wealth of experience that can make significant contributions to our understanding of the prospects and problems of policing today. Each chapter consists of an interview with a policing leader that explores their understanding of policing developments and current challenges in their countries and internationally, and examines how they evaluate or interpret these developments.

Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five (Interviews with Global Leaders in Policing, Courts, and Prisons)

by Bruce F. Baker Dilip K. Das

Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five, is based on the premise that police officials have a wealth of experience that can make significant contributions to our understanding of the prospects and problems of policing today. Each chapter consists of an interview with a policing leader that explores their understanding of policing developments and current challenges in their countries and internationally, and examines how they evaluate or interpret these developments.

Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting, and Vulnerability Assessment (Lecture Notes in Social Networks)

by Rokia Missaoui Talel Abdessalem Matthieu Latapy

The book collects contributions from experts worldwide addressing recent scholarship in social network analysis such as influence spread, link prediction, dynamic network biclustering, and delurking. It covers both new topics and new solutions to known problems. The contributions rely on established methods and techniques in graph theory, machine learning, stochastic modelling, user behavior analysis and natural language processing, just to name a few. This text provides an understanding of using such methods and techniques in order to manage practical problems and situations. Trends in Social Network Analysis: Information Propagation, User Behavior Modelling, Forecasting, and Vulnerability Assessment appeals to students, researchers, and professionals working in the field.

Trends in Software Testing

by Hrushikesha Mohanty J. R. Mohanty Arunkumar Balakrishnan

This book is focused on the advancements in the field of software testing and the innovative practices that the industry is adopting. Considering the widely varied nature of software testing, the book addresses contemporary aspects that are important for both academia and industry. There are dedicated chapters on seamless high-efficiency frameworks, automation on regression testing, software by search, and system evolution management. There are a host of mathematical models that are promising for software quality improvement by model-based testing. There are three chapters addressing this concern. Students and researchers in particular will find these chapters useful for their mathematical strength and rigor. Other topics covered include uncertainty in testing, software security testing, testing as a service, test technical debt (or test debt), disruption caused by digital advancement (social media, cloud computing, mobile application and data analytics), and challenges and benefits of outsourcing. The book will be of interest to students, researchers as well as professionals in the software industry.

TRIZ – The Theory of Inventive Problem Solving: Current Research and Trends in French Academic Institutions

by Denis Cavallucci

The work presented here is generally intended for engineers, educators at all levels, industrialists, managers, researchers and political representatives. Offering a snapshot of various types of research conducted within the field of TRIZ in France, it represents a unique resource.​It has been two decades since the TRIZ theory originating in Russia spread across the world. Every continent adopted it in a different manner – sometimes by glorifying its potential and its perspectives (the American way); sometimes by viewing it with mistrust and suspicion (the European way); and sometimes by adopting it as-is, without questioning it further (the Asian way). However, none of these models of adoption truly succeeded.Today, an assessment of TRIZ practices in education, industry and research is necessary. TRIZ has expanded to many different scientific disciplines and has allowed young researchers to reexamine the state of research in their field. To this end, a call was sent out to all known francophone research laboratories producing regular research about TRIZ. Eleven of them agreed to send one or more of their postdoctoral researchers to present their work during a seminar, regardless of the maturity or completeness of their efforts. It was followed by this book project, presenting one chapter for every current thesis in order to reveal the breadth, the richness and the perspectives that research about the TRIZ theory could offer our society. The topics dealt with e.g. the development of new methods inspired by TRIZ, educational practices, and measuring team impact.

Troubleshooting and Maintaining Your PC All-in-One For Dummies: All-in-one Desk Reference For Dummies

by Dan Gookin

Stop being a prisoner to your PC! Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you. There's nothing worse than firing up your PC only to discover it's inexplicably unresponsive. With this guide, you'll gain all the skills and insight you need to need to bring it back to life —and to prevent it from ever leaving you in the lurch again. Find out what's behind common PC problems Solve email and web woes, both big and small Perform regular maintenance and get serious about backups Troubleshoot to find solutions to your issues and learn proper maintenance to head off future headaches! Your PC problems aren't as big as you think! Take matters into your own hands with the helpful instruction provided inside this book!

Troubleshooting and Maintaining Your PC All-in-One For Dummies

by Dan Gookin

Stop being a prisoner to your PC! Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you. There's nothing worse than firing up your PC only to discover it's inexplicably unresponsive. With this guide, you'll gain all the skills and insight you need to need to bring it back to life —and to prevent it from ever leaving you in the lurch again. Find out what's behind common PC problems Solve email and web woes, both big and small Perform regular maintenance and get serious about backups Troubleshoot to find solutions to your issues and learn proper maintenance to head off future headaches! Your PC problems aren't as big as you think! Take matters into your own hands with the helpful instruction provided inside this book!

Troubleshooting Docker

by Rajdeep Dua Vaibhav Kohli John Wooten

Strategically design, troubleshoot, and automate Docker containers from development to deployment About This Book • Utilize current and emergent technologies for effective Docker orchestration and management • A step-by-step guide to diagnosing and fixing problems with Docker containers. Who This Book Is For This book is intended for seasoned solutions architects, developers, and programmers, system engineers, and administrators to help you troubleshoot common areas of Docker containerization. If you are looking to build production-ready Docker containers for automated deployment, you will be able to master and troubleshoot both the basic functions and the advanced features of Docker. Advanced familiarity with the Linux command line syntax, unit testing, the Docker Registry, Github, and leading container hosting platforms and Cloud Service Providers (CSP) are the prerequisites. What You Will Learn • Install Docker ecosystem tools and services, Microservices and N-tier applications • Create re-usable, portable containers with help of automation tools • Network and inter-link containers • Attach volumes securely to containers • Consume and troubleshoot Docker APIs • Troubleshooting issue of Docker deployment in Public cloud • Ease the process of container management with Kubernetes In Detail This book will traverse some common best practices to for complex application scenarios where troubleshooting can be successfully employed to provide the repeatable processes and advantages that containers can deliver. This book will be a practical guide showing how to fix real-life issues related to installation, memory, Dockerfile syntax, connection, authorization, networking and so on in Docker. This book will also teach how to solve errors that occur during advanced setup and administration and deployment in a step-by-step fashion. By sequentially working through the real-world production scenarios in each chapter throughout the book, you will gain insight into and mastery of common areas not only for effective troubleshooting, but ways and means to avoid troubleshooting in the first place. This book will also cover tips and tricks that make the workflow easier. Style and approach An easy-to-follow guide full of interactive examples of real-world development and deployment scenarios. Ample screenshots, workflows, complementary tools, and related terminal commands are provided to address a wide range of practical and situational applications.

Troubleshooting iOS: Solving iPhone and iPad Problems

by Paul McFedries

Understand and solve many different kinds of iPhone and iPad problems. This book covers both general troubleshooting techniques applicable in a wide variety of situations as well as specific fixes for topics such as networking, apps, photos, the battery, and syncing.Glitches, hiccups, and crashes just aren't supposed to happen with iOS, but alas, all too often they do. It is these non-obvious fixes, workarounds, and preventative measures that form the core of iOS Troubleshooting. With clear, straightforward prose, this book will take the reader through hundreds of iOS problems, explain the reasons for them, and provide easy to understand solutions to get the device (and you) back in business. What you'll learn:Fix cellular and networking connectionsIncorporate accessories effectivelySolve battery and charging issuesClear up syncing and iCloud glitches Who this book is for:Any person who uses an iOS device.

Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools

by Erik Ostermueller

Troubleshoot the most widespread and pernicious Java performance problems using a set of open-source and freely-available tools that will make you dramatically more productive in finding the root causes of slow performance. This is a brief book that focuses on a small number of performance anti-patterns, and you’ll find that most problems you encounter fit into one of these anti-patterns. The book provides a specific method in a series of steps referred to as the “P.A.t.h. Checklist” that encompasses persistence, alien systems, threads, and heap management. These steps guide you through a troubleshooting process that is repeatable, that you can apply to any performance problem in a Java application. This technique is especially helpful in 'dark' environments with little monitoring.Performance problems are not always localized to Java, but often fall into the realms of database access and server load. This book gives attention to both of these issues through examples showing how to identify repetitive SQL, and identify architecture-wide performance problems ahead of production rollout. Learn how to apply load like an expert, and determine how much load to apply to determine whether your system scales. Included are walk-throughs of a dozen server-side performance puzzles that are ready to run on your own machine. Following these examples helps you learn to:Assess the performance health of four main problems areas in a Java system: The P.A.t.h. Checklist presents each area with its own set of plug-it-in-now toolsPinpoint the code at fault for CPU and other bottlenecks without a Java profilerFind memory leaks in just minutes using heapSpank, the author's open-source leak detector utility that is freely available from heapSpank.orgThe repeatable method provided in this book is an antidote to lackluster average response times that are multi-second throughout the industry. This book provides a long absent, easy-to-follow, performance training regimen that will benefit anyone programming in Java. What You'll LearnAvoid the 6 most common ways to mess up a load testDetermine the exact number of threads to dial into the load generator to test your system's scalabilityDetect the three most common SQL performance anti-patternsMeasure network response times of calls to back-end systems ('alien systems')Identify whether garbage collection performance is healthy or unhealthy and whether delays are caused by problems in the old or new generation, so you know which generation needs to be adjustedWho This Book Is ForIntermediate and expert Java developers and architects. Java experts will be able to update their skill set with the latest and most productive, open-source Java performance tools. Intermediate Java developers are exposed to the most common performance defects that repeatedly show up in Java applications, ones that account for the bulk of slow-performing systems. Experts and intermediates alike will benefit from the chapters on load generation.

Troubleshooting OpenVPN

by Eric F Crist

Get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running About This Book • This is the first book on the market that resolves your issues related to troubleshooting OpenVPN • Ensure your organization's private network is protected 24x7 by resolving OpenVPN issues instantly • Save time and costs by troubleshooting to reduce the impact on your business Who This Book Is For The book is for system administrators who are experienced and well versed with OpenVPN. You should possess intermediate to master level proficiency with OpenVPN. All OpenVPN users can leverage this book. What You Will Learn • Diagnose and remediate authentication and authorization problems in OpenVPN • Overcome simple network and startup script errors • Learn OpenVPN log file format and verbosity options • Resolve operating system-specific errors • Discover various troubleshooting techniques to resolve problems in OpenVPN • Improve performance and identify bottlenecks in the network or with hardware • Determine external versus internal network issues In Detail OpenVPN, the most widely used open source VPN package, allows you to create a secure network across systems, keeping your private data secure. Connectivity and other issues are a pain to deal with, especially if they are impacting your business. This book will help you resolve the issues faced by OpenVPN users and teach the techniques on how to troubleshoot it like a true expert. This book is a one stop solution for troubleshooting any issue related to OpenVPN. We will start by introducing you to troubleshooting techniques such as Packet Sniffing, Log Parsing, and OpenSSL. You will see how to overcome operating system specific errors. Later on, you will get to know about network and routing errors by exploring the concepts of IPv4 and IPv6 networking issues. You will discover how to overcome these issues to improve the performance of your OpenVPN deployment. By the end of the book, you will know the best practices, tips, and tricks to ensure the smooth running of your OpenVPN. Style and approach This is a practical and straight-to-the point book that troubleshoots all the issues related to OpenVPN and provides best practices, tips, and tricks.

Troubleshooting SharePoint: The Complete Guide to Tools, Best Practices, PowerShell One-Liners, and Scripts

by Stacy Simpkins

Utilize a treasure trove of free SharePoint troubleshooting tools and receive insightful guidance about the types of SharePoint issues that can be discovered through their use. Chapters in this book contrast solid and least privileged builds in order to help you understand the types of issues that are raised when farms are not built the least privileged way.Because SharePoint errors often present themselves one way, when an issue is actually something entirely different, the process of finding the root cause can feel like going down a rabbit hole. Hands-on exercises get you comfortable with logs so you can efficiently and effectively “explore the rabbit hole.”Troubleshooting SharePoint also demonstrates how to identify components and settings that enter an environment where access has been restricted. The author shares his proven methods for researching an issue based on what appears in the logs, with the understanding that often it is not as simple as asking a question, but how you ask it that leads to the right answer. What You’ll Learn Utilize networking tools such as NetMon, WireShark, and Fiddler for troubleshootingMaster SharePoint PAL, Webalizer, Indihaing, Developer Dashboard, the Feature Admin tool, and moreBecome proficient using Timer Jobs and Search DiagnosticsUnderstand how various files are accessed by IIS sites and within the server file systemDiscover how IIS mappings and file permissions affect issuesTroubleshoot with ULS Viewer, PowerShell, and tools such as ProcMon, PerfMon, and Event ViewerMeet your new best friend, the ULS ViewerUse Event Viewer as a troubleshooting sourceBecome conversant in the “language” of SharePoint from the log’s perspective Who This Book Is For SharePoint administrators and developers who want to learn how to quickly diagnose and resolve issues in any SharePoint server in SharePoint farms where admin access is possible

Trust Management XI: 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings (IFIP Advances in Information and Communication Technology #505)

by Jan-Philipp Steghöfer and Babak Esfandiari

This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations.

Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings (Lecture Notes in Computer Science #10442)

by Javier Lopez Simone Fischer-Hübner Costas Lambrinoudakis

This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017. The 15 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in the following topical sections: Privacy in Mobile Environments; Transparence and Privacy Enhancing Technologies; Security Measures; Cloud - IoT Security and Privacy; Security Awareness and Social Engineering - Policy Languages.

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science #704)

by Ming Xu Zheng Qin Fei Yan Shaojing Fu

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Trustworthy Cyber-Physical Systems Engineering (Chapman & Hall/CRC Computer and Information Science Series)

by Alexander Romanovsky Fuyuki Ishikawa

From the Foreword "Getting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs." --Phil Koopman, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA Trustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such as What does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS? How does CPS trustworthiness map onto existing knowledge, and where do we need to know more? How can we mathematically prove timeliness, correctness, and other essential properties for systems that may be adaptive and even self-healing? How can we better represent the physical reality underlying real-world numeric quantities in the computing system? How can we establish, reason about, and ensure trust between CPS components that are designed, installed, maintained, and operated by different organizations, and which may never have really been intended to work together? Featuring contributions from leading international experts, the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS, and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping, taxonomy, and standardization, as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness, namely, proof and refinement, are covered, as well as engineering methods for dealing with hybrid aspects.

Trustworthy Policies for Distributed Repositories (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Reagan W. Moore Hao XU Mike Conway Arcot Rajasekar Jon Crabtree

A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly. The assurance includes plans for the sustainability of the repository, the accession of digital records, the management of technology evolution, and the mitigation of the risk of data loss. A detailed assessment is provided by the ISO-16363:2012 standard, "Space data and information transfer systems—Audit and certification of trustworthy digital repositories." This book examines whether the ISO specification for trustworthiness can be enforced by computer actionable policies. An implementation of the policies is provided and the policies are sorted into categories for procedures to manage externally generated documents, specify repository parameters, specify preservation metadata attributes, specify audit mechanisms for all preservation actions, specify control of preservation operations, and control preservation properties as technology evolves. An application of the resulting procedures is made to enforce trustworthiness within National Science Foundation data management plans.

Tunnel Fire Testing and Modeling: The Morgex North Tunnel Experiment (SpringerBriefs in Applied Sciences and Technology)

by Fabio Borghetti Marco Derudi Paolo Gandini Alessio Frassoldati Silvia Tavelli

This book aims to cast light on all aspects of tunnel fires, based on experimental activities and theoretical and computational fluid dynamics (CFD) analyses. In particular, the authors describe a transient full-scale fire test (~15 MW), explaining how they designed and performed the experimental activity inside the Morgex North tunnel in Italy. The entire organization of the experiment is described, from preliminary evaluations to the solutions found for management of operational difficulties and safety issues. This fire test allowed the collection of different measurements (temperature, air velocity, smoke composition, pollutant species) useful for validating and improving CFD codes and for testing the real behavior of the tunnel and its safety systems during a diesel oil fire with a significant heat release rate. Finally, the fire dynamics are compared with empirical correlations, CFD simulations, and literature measurements obtained in other similar tunnel fire tests. This book will be of interest to all engineers and public officials who are concerned with the nature, prevention, and management of tunnel fires.

Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)

by Yehuda Lindell

This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study.This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.

Tweeting to Freedom: An Encyclopedia of Citizen Protests and Uprisings around the World

by Jim Willis Anthony R. Fellow

This book provides an insightful and comprehensive look at the issues regarding the use of the Internet and social media by activists in more than 30 countries—and how many governments in these countries are trying to blunt these efforts to promote freedom.The innovators who created social media might never have imagined the possibility: that activists living in countries where oppressive conditions are the norm would use social media to call for changes to bring greater freedom, opportunity, and justice to the masses. The attributes of social media that make it so powerful for casual socializing—the ability to connect with nearly limitless numbers of like-minded individuals instantaneously—enables political activists to recruit, communicate, and organize like never before.This book examines three aspects of the use of social media for political activism: the degrees of media freedom practiced in countries around the world; the methods by which governments attempt to block access to information; and the various ways in which activists use the media—especially social media—to advance their cause of greater freedoms. Readers will learn how these political uprisings came from the grassroots efforts of oppressed and unhappy citizens desperate to make better lives for themselves and others like them—and how the digital age is allowing them to protest and call attention to their plights in unprecedented ways.

Refine Search

Showing 50,501 through 50,525 of 82,864 results