This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions.
Managing nuclear power emergencies is significantly different from managing other types of emergencies, including fire, flood, and other disasters because nuclear disaster management requires special technical skills and a rigid protocol which outlines detailed steps and procedure before an evacuation announcement could be made.
This book addresses the shelf life of foods, a key factor in determining how food is distributed and consequently where and when different food products are available for consumption.
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfängen des Verlags von 1842 erschienen sind.
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfängen des Verlags von 1842 erschienen sind.
This book expands on the subject matter of 'Computational Electromagnetics and Model-Based Inversion: A Modern Paradigm for Eddy-Current Nondestructive Evaluation.
The conflict in Ukraine has thrust the Black Sea into the center of the largest European dispute since 1945, leading to significant consequences for both the Alliance and the countries neighboring the Black Sea.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
This reference work provides comprehensive information about the bioactive molecules presented in our daily food and their effect on the physical and mental state of our body.
The safe operation of computer systems continues to be a key issue in many applications where people, environment, investment, or goodwill can be at risk.
Das Buch spannt den Bogen von modernen Technologien zur Flugsicherung über die wesentlichen Avioniksysteme (Kommunikation, Navigation, Surveillance) sowie die bordautonome Energieversorgung bis hin zur Integration der Systeme im Flugzeug.
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in October 2021 in Zhuji, Zhejiang, China.
Replacement Models with Minimal Repair is a collection of works by several well-known specialists on the subject of minimal repair in replacement policies.
This book presents the concept of food sharing from a European perspective, and provides a concise analysis of its safety implications and the chemical properties of recovered foods.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts.
The book provides readers with a snapshot of recent research and technological trends in the field of condition monitoring of machinery working under a broad range of operating conditions.
This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested.
This book presents modeling methods and algorithms for data-driven prediction and forecasting of practical industrial process by employing machine learning and statistics methodologies.
This book presents the selected peer-reviewed proceedings of the International Conference on Thermal Engineering and Management Advances (ICTEMA 2020).
This book covers the topic of eddy current nondestructive evaluation, the most commonly practiced method of electromagnetic nondestructive evaluation (NDE).
Dieses Buch bietet einen Überblick über die neuesten Implementierungen von Quanten-Zufallszahlengeneratoren (QRNGs) und untersucht insbesondere deren Beziehung zu klassischen statistischen Zufallsmodellen und numerischen Techniken zur Berechnung von Zufallszahlen.