This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning.
This book proposes the formulation of an efficient methodology that estimates energy system uncertainty and predicts Remaining Useful Life (RUL) accurately with significantly reduced RUL prediction uncertainty.
Das Buch zeigt wie die fertigungsnahe IT-Landschaft (Produktionsleittechnik) in der Automobilfertigung vom Presswerk bis zur Endmontage homogenisiert und damit effizienter gemacht werden kann.
This volume is a collection of contributions by world-leading experts in the nuclear field who participated in the educational activities of the International School on Disarmament and Research on Conflicts (ISODARCO).
This volume explores the interpersonal, organizational, and technological enablers and barriers to information and intelligence sharing in multinational and multiagency military, humanitarian, and counterterrorism operations.
This book analyses the relationships among product safety strategy and culture, concurrent engineering, new product development (NPD) processes and product safety performance.
This book presents a systematic and comprehensive exposition of the theory of measurement accuracy and provides solutions that fill significant and long-standing gaps in the classical theory.
This book discusses reliability applications for power systems, renewable energy and smart grids and highlights trends in reliable communication, fault-tolerant systems, VLSI system design and embedded systems.
The aim of this book is to bridge the gap between standard textbook models and a range of models where the dynamic structure of the data manifests itself fully.
This book collects a high-quality selection of contemporary research and case studies on the complexity resulting from human/reliability management in industrial plants and critical infrastructures.
This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This book is focused on the development of rigorous, yet practical, methods for the design of advanced process control systems to improve process operational safety and cybersecurity for a wide range of nonlinear process systems.
The Encyclopedia of Social Network Analysis and Mining (ESNAM) is the first major reference work to integrate fundamental concepts and research directions in the areas of social networks and applications to data mining.
This volume addresses a variety of issues on traffic safety policy, ranging from issues of climate change, urban equity, and transport safety, in a broad global and societal context, while retaining situation-specific details.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks, Hanoi, Vietnam, a collection of peer-reviewed articles accepted by ICISN 2024.
This book highlights the maritime applications of Global Navigation Satellite Systems (GNSSs) with emphasis on BeiDou Navigation Satellite System (BDS).
In today's industrial companies, sensory evaluation is widely used in quality inspection of products, in marketing study and in many other fields such as risk evaluation, investment evaluation and safety evaluation.
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11.
Covers the entire process of risk management by providing methodologies for determining the sources of engineering project risk, and once threats have been identified, managing them through: identification and assessment (probability, relative importance, variables, risk breakdown structure, etc.
The book provides readers with a snapshot of recent research and technological trends in the field of condition monitoring of machinery working under a broad range of operating conditions.
This book gathers papers presented at the International Conference "e;Vision Zero for Sustainable Road Safety in Baltic Sea Region"e;, held on December 2018 at Vilnius Gediminas Technical University, in Vilnius, Lithuania.
The book summarizes the main results of the the project ENABLE-S3 covering the following aspects: validation and verification technology bricks (collection and selection of test scenarios, test executions envionments incl.
This book is a compilation of selected papers from the 3rd International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plants, held in Harbin, China on 15th-17th August 2018.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
Towards Estimating Entrainment Fraction for Dust Layers closely examines the factors that can affect the assessment of a dust hazard, and outlines a new strawman method designed to help practitioners estimate the fraction of the dust accumulations that can become airborne.
The proceedings contain papers accepted for the 17th ISPE International Conference on Concurrent Engineering, which was held in Cracow, Poland, September 6-10, 2010.