This book aims to present a state-of-the-art survey of theories and methods of reliability, maintenance, and warranty with emphasis on multi-unit systems, and to reflect current hot topics: imperfect maintenance, economic dependence, opportunistic maintenance, quasi-renewal processes, warranty with maintenance and economic dependency, and software testing and maintenance.
The two volume set LNCS 12506 and 12507 constitutes the proceedings of the 19th International Semantic Web Conference, ISWC 2020, which was planned to take place in Athens, Greece, during November 2-6, 2020.
Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce.
This volume gathers the latest advances, innovations, and applications in the field of structural health monitoring (SHM) and more broadly in the fields of smart materials and intelligent systems.
This book offers ideas to help improve digital technologies and increase their efficiency during implementation and application for researchers and practitioners.
How can police officers engaged in public order policing ensure they act lawfully, secure safe criminal convictions, avoid civil claims and, perhaps most importantly, maintain the peace?
This second edition of this book provides, at a high level and in a tractable fashion, a description of how wireless communications are achieved in the latest smartphones.
The papers in this volume present an overview of the general aspects and practical applications of dynamic inverse methods, through the interaction of several topics, ranging from classical and advanced inverse problems in vibration, isospectral systems, dynamic methods for structural identification, active vibration control and damage detection, imaging shear stiffness in biological tissues, wave propagation, to computational and experimental aspects relevant for engineering problems.
This book presents solutions to control problems in a number of robotic systems and provides a wealth of worked-out examples with full analytical and numerical details, graphically illustrated to aid in reader comprehension.
This book constitutes the proceedings of the 22nd International Conference on Computer Information Systems and Industrial Management, CISIM 2023, held in Tokio, Japan, during September 22-24, 2023.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
During the last decades, considerable progress has been observed in all aspects regarding the study of cooperative systems including modeling of cooperative systems, resource allocation, discrete event driven dynamical control, continuous and hybrid dynamical control, and theory of the interaction of information, control, and hierarchy.
Analytical pyrolysis allows scientists to use routine laboratory instrumentation for analyzing complex, opaque, or insoluble samples more effectively than other analytical techniques alone.
Microsoft SQL Server 2008 introduces new geography and geometry spatial datatypes that enable the storage of structured data describing the shape and position of objects in space.
Constructal Theory of Social Dynamics brings together for the first time social scientists and engineers to develop a predictive theory of social organization, as a conglomerate of mating flows that morph in time to flow more easily (people, goods, money, energy, information).
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 8th International Conference on ICT for Sustainable Development (ICT4SD 2023), held in Goa, India, on August 3-4, 2023.
This volume constitutes the revised selected papers from 4 workshops:Workshop on Adaptive Service-oriented and Cloud Applications (ASOCA 2022), 3rd International Workshop on AI-enabled Process Automation (AI-PA 2022), 3rd International Workshop on Architectures for Future Mobile Computing and Internet of Things (FMCIoT 2022), and 18th International Workshop on Engineering Service-Oriented Applications and Cloud Services (WESOACS 2022) held in conjunction with the 20th International Conference on Service-Oriented Computing, ICSOC 2022.
The spectre of destructive malpractice lawsuits haunts every practicing doctor who simply wants protection and peace of mind, but most physicians find the world of malpractice confusing and wrapped in legal riddles.
Dieses Lehrbuch behandelt zunächst zentrale Themen der klassischen Theoretischen Informatik und führt darauf aufbauend in die Grundlagen der Algorithmischen Informationstheorie ein.
Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks.
The past few years have seen the attention and rapid developments in event-triggered sampled-data systems, in which the effect of event-triggered sensor measurements and controller updates is explored in controller analysis and design.
This book presents a method for evaluating Selberg zeta functions via transfer operators for the full modular group and its congruence subgroups with characters.
This book introduces a newset of orthogonal hybrid functions (HF) which approximates time functions in apiecewise linear manner which is very suitable for practical applications.
This book constitutes the refereed proceedings of the 21st International Conference on Integer Programming and Combinatorial Optimization, IPCO 2020, held in London, UK, in June 2020.
Covering a wide range of research currently being done in drug analysis, Drug Testing Technology: Assessment of Field Applications compares and evaluates various methods used to determine abused drugs taken by individuals, and their application in various programs and contexts.
The unconventional computing is a niche for interdisciplinary science, cross-bred of computer science, physics, mathematics, chemistry, electronic engineering, biology, material science and nanotechnology.