Browse Results

Showing 16,926 through 16,950 of 60,089 results

Detached-Eddy Simulation Series Methods for Compressor Internal Flow: Method, Development and Application

by Ruiyu Li Limin Gao Lei Zhao

This book concentrates on high-fidelity numerical methods for predicting internal flows within aeroengines’ compressors. A distinctive features of this work is the establishment of a comprehensive research framework. Specifically, it starts with engineering application requirements and integrates high-performance parallel algorithms to develop detached eddy simulation (DES)-series methods tailored to the needs of compressor design. Additionally, it encompasses the development of data analysis methods suitable for handling the "vast" amounts of high-fidelity unsteady flow data in compressors and the high spatial resolution experimental results. This book takes us from making the intricate details of compressor flow field structures "visible" to “explainable”. Another noteworthy aspect of this book is its practical orientation, seamlessly intergrating theoretical concepts with practical applications. Herein, it addresses three major engineering problems in detail and elucidates the technical approaches involving advanced numerical methods and data analysis techniques for solving these physical problems. The book highlights the challenging issues associated with complex internal flows in compressors, the governing equations for DES-series methods, and the implementation strategies for numerical simulations of internal compressor flows. They also delve into data-driven analysis methods for unsteady flow field data, high-fidelity numerical simulations of flow in the blade root region of compressors, dynamic flow capture methods in the tip region of compressor blades, and simulation and analysis of flow fields in inlet distortion generators. This book serves as a valuable reference for researchers and engineering professionals in the aerospace, computational fluid dynamics, and high-performance turbomachinery fields. Additionally, it can be used as a specialized textbook for doctoral and master's students in disciplines such as aerospace science and technology, power engineering, and engineering thermophysics.

Detecting Peripheral-based Attacks on the Host Memory

by Patrick Stewin

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

Detecting Regime Change in Computational Finance: Data Science, Machine Learning and Algorithmic Trading

by Jun Chen Edward P Tsang

This is the first book of its kind to build on the framework of Directional Change. The concept of Directional Change opens a whole new area of research. – From the Foreword by Dr Richard Olsen, Founder and CEO of Lykke, Co-founder of OANDA and pioneer in high-frequency finance and fintech A creative start at a novel and difficult problem for investors large and small. – Professor M. A. H. Dempster, University of Cambridge and Cambridge Systems Associates Limited Financial markets technology and the practice of trading are in a state of constant change. A book that details a completely new concept in trading, however, is very rare. This is one such book, and the authors should be applauded for producing this exciting new work. The concept and framework of Directional Change in prices is an area of research with much promise! – Dr David Norman, Founder of TTC Institute and author This book shows how AI could be a game-changer in finance. – Dr Amadeo Alentorn, Head of Research/Fund Manager at Merian Global Investors Based on interdisciplinary research into "Directional Change", a new data-driven approach to financial data analysis, Detecting Regime Change in Computational Finance: Data Science, Machine Learning and Algorithmic Trading applies machine learning to financial market monitoring and algorithmic trading. Directional Change is a new way of summarising price changes in the market. Instead of sampling prices at fixed intervals (such as daily closing in time series), it samples prices when the market changes direction ("zigzags"). By sampling data in a different way, this book lays out concepts which enable the extraction of information that other market participants may not be able to see. The book includes a Foreword by Richard Olsen and explores the following topics: Data science: as an alternative to time series, price movements in a market can be summarised as directional changes Machine learning for regime change detection: historical regime changes in a market can be discovered by a Hidden Markov Model Regime characterisation: normal and abnormal regimes in historical data can be characterised using indicators defined under Directional Change Market Monitoring: by using historical characteristics of normal and abnormal regimes, one can monitor the market to detect whether the market regime has changed Algorithmic trading: regime tracking information can help us to design trading algorithms It will be of great interest to researchers in computational finance, machine learning and data science. About the Authors Jun Chen received his PhD in computational finance from the Centre for Computational Finance and Economic Agents, University of Essex in 2019. Edward P K Tsang is an Emeritus Professor at the University of Essex, where he co-founded the Centre for Computational Finance and Economic Agents in 2002.

Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)

by V. S. Subrahmanian Judee K. Burgoon Norah E. Dunbar

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists.Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics.Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Wireless Networks)

by Beibei Li Rongxing Lu Gaoxi Xiao

​This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals.Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Magnus Almgren Vincenzo Gulisano Federico Maggi

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Juan Caballero Urko Zurutuza Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings (Lecture Notes in Computer Science #13358)

by Lorenzo Cavallaro Daniel Gruss Giancarlo Pellegrino Giorgio Giacinto

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.

Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings (Lecture Notes in Computer Science #10885)

by Cristiano Giuffrida Sébastien Bardin Gregory Blanc

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

Detection of Intrusions and Malware, and Vulnerability Assessment: 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings (Lecture Notes in Computer Science #13959)

by Daniel Gruss Federico Maggi Mathias Fischer Michele Carminati

This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security.

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings (Lecture Notes in Computer Science #9721)

by Juan Caballero, Urko Zurutuza and Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings (Lecture Notes in Computer Science #14828)

by Federico Maggi Mathias Payer Michele Carminati Manuel Egele

This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17–19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12223)

by Clémentine Maurice Leyla Bilge Gianluca Stringhini Nuno Neves

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. ​*The conference was held virtually due to the COVID-19 pandemic.

Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings (Lecture Notes in Computer Science #12756)

by Nuno Neves Leyla Bilge Lorenzo Cavallaro Giancarlo Pellegrino

This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas.Chapter “SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science #11543)

by Roberto Perdisci Clémentine Maurice Giorgio Giacinto Magnus Almgren

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Michalis Polychronakis Michael Meier

This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Detection of Karst Voids at Deep Pile Foundation

by Liu Liu Zhenming Shi Ming Peng Shaojun Li Fengjuan Tao

Karst voids at pile locations can have a significant negative impact on the bearing capacity and overall safety of cast-in-place pile foundations. This book introduces a state-of-the-art detection system, comprising of specialized equipment, algorithms, and software, designed to identify karst voids during deep cast-in-place pile foundation construction. The system includes a unique multifrequency borehole sonic probe, a single borehole radar, two pile hole sonar probes, and a corresponding signal analysis method. Several field and synthetic tests have been conducted to detect karst voids during cast-in-place pile foundation construction, and the results demonstrate that this technology can offer detailed geological information for pile design and ensure the safety of foundation construction. The work presented in this book has received the First Prize for Technological Invention in Shanghai, China in 2022.

Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)

by Hans Jonasson

Good requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,

Deterministic and Stochastic Optimal Control and Inverse Problems

by Baasansuren Jadamba

Inverse problems of identifying parameters and initial/boundary conditions in deterministic and stochastic partial differential equations constitute a vibrant and emerging research area that has found numerous applications. A related problem of paramount importance is the optimal control problem for stochastic differential equations. This edited volume comprises invited contributions from world-renowned researchers in the subject of control and inverse problems. There are several contributions on optimal control and inverse problems covering different aspects of the theory, numerical methods, and applications. Besides a unified presentation of the most recent and relevant developments, this volume also presents some survey articles to make the material self-contained. To maintain the highest level of scientific quality, all manuscripts have been thoroughly reviewed.

Deterministic Extraction from Weak Random Sources

by Ariel Gabizon

A deterministic extractor is a function that extracts almost perfect random bits from a weak random source. In this research monograph the author constructs deterministic extractors for several types of sources. A basic theme in this work is a methodology of recycling randomness which enables increasing the output length of deterministic extractors to near optimal length. The author's main work examines deterministic extractors for bit-fixing sources, deterministic extractors for affine sources and polynomial sources over large fields, and increasing the output length of zero-error dispersers. This work will be of interest to researchers and graduate students in combinatorics and theoretical computer science.

Deterministic Network Calculus: From Theory to Practical Implementation

by Anne Bouillard Marc Boyer Euriell Le Corronc

Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its theoretical foundations to its implementations. The book is divided into three parts. The first part focuses on the (min,plus) framework and its algorithmic aspects. The second part defines the network calculus model and analyzes one server in isolation. Different service and scheduling policies are discussed, particularly when data is packetized. The third part is about network analyses. Pay burst only once and pay multiplexing only once phenomena are exhibited, and different analyses are proposed and compared. This includes the linear programming approaches that compute tight performance bounds. Finally, some partial results on the stability are detailed.

Deterministic, Stochastic, and Deep Learning Methods for Computational Electromagnetics

by Wei Cai

This book provides a well-balanced and comprehensive picture based on clear physics, solid mathematical formulation, and state-of-the-art useful numerical methods in deterministic, stochastic, deep neural network machine learning approaches for computer simulations of electromagnetic and transport processes in biology, microwave and optical wave devices, and nano-electronics. Computational research has become strongly influenced by interactions from many different areas including biology, physics, chemistry, engineering, etc. A multifaceted approach addressing the interconnection among mathematical algorithms and physical foundation and application is much needed to prepare graduate students and researchers in applied mathematics and sciences and engineering for innovative advanced computational research in many applications areas, such as biomolecular solvation in solvents, radar wave scattering, the interaction of lights with plasmonic materials, plasma physics, quantum dots, electronic structure, current flows in nano-electronics, and microchip designs, etc.

Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace

by Brian M. Mazanec Bradley A. Thayer

While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.

Detonado não-oficial de Super Smash Bros Wii U, Dicas, Truques, e Segredos do Jogo

by Michel Pinheiro Joshua Abbott

*Guia Não-Oficial* Guia de Estratégias e Dicas Avançadas. Este é o mais abrangente e o único guia detalhado que você vai encontrar online. Disponível para download instantâneo em seu celular, dispositivo de eBook ou em papel.

Deus Ex: Icarus Effect

by James Swallow

IT'S NOT THE END OF THE WORLD. BUT YOU CAN SEE IT FROM HERE. In the near future, with physical augmentation gaining ground and nano-cybernetics only years away, the dawn of limitless human evolution is just beyond the horizon, and a secret corporate cabal of ruthless men intends to make sure that humankind stays under its control. But two people on opposite sides of the world are starting to ask questions that could get them killed. Secret Service agent Anna Kelso has been suspended for investigating the shooting that claimed her partner's life. Anna suspects that the head of a bio-augmentation firm was the real target, and against orders she's turned up a few leads concerning a covert paramilitary force and a cadre of underground hackers. But the cover-up runs deep, and now there's a target on her back. Meanwhile, Ben Saxon, former SAS officer turned mercenary, joins a shadowy special ops outfit. They say they're a force for good, but Saxon quickly learns that the truth is not so clear-cut. So begins a dangerous quest to uncover a deadly secret that will take him from Moscow to London, D. C. to Geneva, and to the dark truth--if he lives that long. The year is 2027; in a world consumed by chaos and conspiracy, two people are set on a collision course with the most powerful and dangerous organization in history--and the fate of humanity hangs in the balance.

Refine Search

Showing 16,926 through 16,950 of 60,089 results