Browse Results

Showing 52,951 through 52,975 of 72,409 results

Printed Flexible Sensors: Fabrication, Characterization and Implementation (Smart Sensors, Measurement and Instrumentation #33)

by Anindya Nag Subhas Chandra Mukhopadhyay Jurgen Kosel

This book presents recent advances in the design, fabrication and implementation of flexible printed sensors. It explores a range of materials for developing the electrode and substrate parts of the sensors, on the basis of their electrical and mechanical characteristics. The sensors were processed using laser cutting and 3D printing techniques, and the sensors developed were employed in a number of healthcare, environmental and industrial applications, including: monitoring of physiological movements, respiration, salinity and nitrate measurement, and tactile sensing. The type of sensor selected for each application depended on its dimensions, robustness and sensitivity. The sensors fabricated were also embedded in an IoT-based system, allowing them to be integrated into real-time applications.

Printed Resonant Periodic Structures and Their Applications

by Mahesh Abegaonkar Lalithendra Kurra Shiban Kishen Koul

This book is a reference for researchers who want to learn about resonant periodic structures for applications in microstrip circuits. The readers can learn simple methods to analyze these structures using commercially available software and equivalent circuit modelling. The application examples demonstrated in the book will open up new research ideas in this field.

Printer's Error: Irreverent Stories of Books History

by J. P. Romney Rebecca Romney

Delve into the curious history of print and publishing—from the Gutenberg Bible and Shakespeare&’s folios to rare book forgers, literary scandals, and more. The printing press is one history&’s greatest achievements. It allowed us to record and spread some of humanity&’s most brilliant ideas. But let&’s not forget that humankind is also full of idiots. In Printer&’s Error, historian J.P. Romney and rare book specialist Rebecca Romney take readers on a rollicking ride through some of the greatest and strangest moments in book history. Readers will meet intriguing characters such as Marino Massimo De Caro, the Italian librarian and master book thief; bookbinder Thomas Cobden-Sanderson, who created the world&’s most beautiful typeface—then plotted to destroy it; and William Tyndale, who made the Holy Bible accessible to countless worshippers—and was also burned at the stake for heresy. The Romneys scoured five hundred years of book history and collected some of its most absurd episodes. And then like so many humans before them, they wrote a book about it.

Printing a Mediterranean World: Florence, Constantinople, and the Renaissance of Geography

by Sean Roberts

In 1482 Francesco Berlinghieri produced the Geographia, a book of over 100 folio leaves describing the world in Italian verse interleaved with lavishly engraved maps. Roberts demonstrates that the Geographia represents the moment of transition between printing and manuscript culture, while forming a critical base for the rise of modern cartography.

Printing of Graphene and Related 2D Materials: Technology, Formulation and Applications

by Leonard W. Ng Guohua Hu Richard C. Howe Xiaoxi Zhu Zongyin Yang Christopher G. Jones Tawfique Hasan

This book discusses the functional ink systems of graphene and related two-dimensional (2D) layered materials in the context of their formulation and potential for various applications, including in electronics, optoelectronics, energy, sensing, and composites using conventional graphics and 3D printing technologies. The authors explore the economic landscape of 2D materials and introduce readers to fundamental properties and production technologies. They also discuss major graphics printing technologies and conventional commercial printing processes that can be used for printing 2D material inks, as well as their specific strengths and weaknesses as manufacturing platforms. Special attention is also paid to scalable production methods for ink formulation, making this an ideal book for students and researchers in academia or industry, who work with functional graphene and other 2D material ink systems and their applications.Explains the state-of-the-art 2D material production technologies that can be manufactured at the industrial scale for functional ink formulation;Provides starting formulation examples of 2D material, functional inks for specific printing methods and their characterization techniques;Reviews existing demonstrations of applications related to printed 2D materials and provides possible future development directions while highlighting current knowledge gaps;Gives a snapshot and forecast of the commercial market for printed GRMs based on the current state of technologies and existing patents.

Printing of Textile Substrates: Machineries and Methods

by Mathews Kolanjikombil

This book discusses the various methods and techniques of printing. It covers the history and development of printing techniques and machinery, design marking details, engraving, ingredients of print pastes, etc. The subject matter of this book also includes notes on the machinery, equipment, and technology used in printing.Print edition not for sale in South Asia (India, Sri Lanka, Nepal, Bangladesh, Pakistan or Bhutan)

The Printing Press as an Agent of Change

by Elizabeth L. Eisenstein

Originally published in two volumes in 1980, The Printing Press as an Agent of Change is now issued in a paperback edition containing both volumes. The work is a full-scale historical treatment of the advent of printing and its importance as an agent of change. Professor Eisenstein begins by examining the general implications of the shift from script to print, and goes on to examine its part in three of the major movements of early modern times - the Renaissance, the Reformation, and the rise of modern science.

The Printing Revolution in Early Modern Europe (Canto Classics Series)

by Elizabeth L. Eisenstein

In 1979 Elizabeth Eisenstein provided the first full-scale treatment of the fifteenth-century printing revolution in the West in her monumental two-volume work, The Printing Press as an Agent of Change. <p><p>This abridged edition, after summarising the initial changes introduced by the establishment of printing shops, goes on to discuss how printing challenged traditional institutions and affected three major cultural movements: the Renaissance, the Reformation, and the rise of modern science. Also included is a later essay which aims to demonstrate that the cumulative processes created by printing are likely to persist despite the recent development of new communications technologies.

The Printing Revolution in Early Modern Europe (Canto Classics)

by Elizabeth L. Eisenstein

Although the importance of the advent of printing for the Western world has long been recognized, it was Elizabeth Eisenstein, in her monumental, two-volume work, The Printing Revolution in Early Modern Europe, who provided the first full-scale treatment of the subject. This illustrated and abridged edition gives a stimulating survey of the communications revolution of the fifteenth century. After summarizing the initial changes introduced by the establishment of printing shops, it goes on to discuss how printing affected three major cultural movements: the Renaissance, the Reformation, and the rise of modern science. This new edition includes a new essay discussing recent controversies provoked by the first edition and reaffirms the thesis that the advent of printing entailed a communications revolution. Fully-illustrated and annotated, the book argues that the cumulative processes set in motion with the advent of printing are likely to persist despite the recent development of new communications technologies.

Printreading for Residential and Light Commercial Construction, Part 2 (4th Edition)

by Thomas E. Proctor Leonard P. Toenjes

Printreading for Residential and Light Commercial Construction--Part 2, 4th Edition, provides printreading experience in residential and light commercial construction. Printreading fundamentals, construction materials, and light frame construction utilized in residential and light commercial buildings are covered in detail. Heavy emphasis is placed on residential and commercial building code requirements and Americans with Disabilities Act (ADA) requirements. Expanded coverage is provided for including engineered wood products, exterior insulation and finish systems (EIFS), and electrical and mechanical systems. Chapter 11--Quantity Takeoff--provides an introduction to quantity takeoff principles and techniques for calculating quantities of structural components, finish materials, and mechanical and electrical systems.

Printreading For Welders

by Thomas E. Proctor Jonathan F. Gosse

Printreading for Welders is an established text/workbook that presents an introduction to printreading fundamentals, American Welding Society (AWS) welding symbols, and related printreading applications found in the welding and fabrication industry. This edition includes the latest AWS standards and welding symbol specifications with color-enhanced illustrations, detailed prints, and descriptive photos. This industry-leading text/workbook has an open, contemporary design with helpful factoids incorporated throughout. Interactive printreading tests, Quick Quizzes®, and flash cards on the CD-ROM offer challenging activities for testing print interpretation skills and knowledge. The Printreading for Welders text/workbook and CD-ROM package is the industry leader in providing numerous industry prints and skill-building activities. An essential companion text/workbook to Welding Skills, Printreading for Welders includes all the printreading and related math content necessary to implement an AWS SENSE-based curriculum.

Prions and Mad Cow Disease

by Brian K. Nunnally Ira S. Krull

The alarm sounded by Canada's confirmed case of bovine spongiform encephalopathy (BSE) has reaffirmed the exigency of establishing improved safeguards and more aggressive surveillance protocols in North America and around the world. Research converging on the probable causative agent--prion proteins--calls for intensive assessment of the headway gained in tracing prions, testing for transmissible neurodegenerative diseases, and developing methods for cornering the epidemic. With an illustrious panel of 36 international contributors, this timely book marshals techniques for prion protein assay and diagnosis of transmissible spongiform encephalopathies (TSEs).

Priority-Zone Mapping for Reforestation: Case Study in the Montane Dry Forests of Bolivia (SpringerBriefs in Geography)

by Larissa Böhrkircher Michael Leuchner Fabio Bayro Kaiser Christa Reicher

Andean dry forest ecosystems are threatened by deforestation and unsustainable land use methods. The negative effects for the livelihood of the local population, biodiversity, and the regional climate could be countered by reforestation measures; however, dry land forests have not attracted the same level of interest and investment like other ecosystems. This book describes the development of a priority-zone map for reforestation measures, showing where reforestation might have the greatest social and ecological benefits. To achieve this, a problem analysis of a case study region is conducted and thematic reforestation benefits are determined. Using remote sensing and GIS, the areas where benefits can be obtained are mapped in individual layers and compiled into a summarizing priority-zone map. It is thus possible to identify areas where reforestation would achieve multiple benefits. The concept of priority maps could be used to facilitate reforestation strategies by local communities and municipal governments and could thus contribute to initiate an integrated forest and landscape restoration of the Bolivian montane dry forests.

Prism and Lens Making: A Textbook for Optical Glassworkers

by Twyman F

Prism and Lens Making: A Textbook for Optical Glassworkers, Second Edition is a unique compendium of the art and science of the optical working of glass for the production of mirrors, lenses, and prisms. Incorporating minor corrections and a foreword by Professor Walter Welford FRS, this reissue of the 1957 edition provides a wealth of technical information and hands-on guidance gained from a lifetime of experience. Although some of the techniques have been replaced by more modern methods, this classic book is still a valuable source of practical assistance as well as being a pleasure to read.

Prison Food: Identity, Meaning, Practices, and Symbolism in European Prisons (Palgrave Studies in Prisons and Penology)

by An-Sofie Vanhouche

Based on the lived experiences of incarcerated persons and staff, this book explores the symbolic significance of prison foodways to normalization, autonomy, identity construction, power, group formation and security. The book also traces the rationalization(s) that policy makers attach to prison food, from the water and bread diet of the 18th century, the contested abolition of alcohol consumption, to the current fear surrounding the spread of COVID-19 through food distribution in prisons. The argument is developed that prison food policies have always reflected how Belgian governments have treated imprisoned persons. The emphasis on Belgian prisons and the discussions on prison foodways situated on a micro and macro level add a unique flavour to prison food scholarship by providing a deeper understanding of a penal culture outside the dominant tradition of Anglo-Saxon and Nordic studies. Consequently, the book provides a nuanced conception of prison foodways for penologists, sociologists, those with interests in wider prison policy, and those working on the socio-cultural role of food in closed environments.

Privacy and Data Protection Challenges in the Distributed Era (Learning and Analytics in Intelligent Systems #26)

by Eugenia Politou Efthimios Alepis Maria Virvou Constantinos Patsakis

This book examines the conflicts arising from the implementation of privacy principles enshrined in the GDPR, and most particularly of the ``Right to be Forgotten'', on a wide range of contemporary organizational processes, business practices, and emerging computing platforms and decentralized technologies. Among others, we study two ground-breaking innovations of our distributed era: the ubiquitous mobile computing and the decentralized p2p networks such as the blockchain and the IPFS, and we explore their risks to privacy in relation to the principles stipulated by the GDPR. In that context, we identify major inconsistencies between these state-of-the-art technologies with the GDPR and we propose efficient solutions to mitigate their conflicts while safeguarding the privacy and data protection rights. Last but not least, we analyse the security and privacy challenges arising from the COVID-19 pandemic during which digital technologies are extensively utilized to surveil people’s lives.

Privacy and Data Protection in Software Services (Services and Business Process Reengineering)

by Roberto Senigaglia Claudia Irti Alessandro Bernes

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal rules should be bound together for moulding a special ‘toolbox’ to solve present and future issues. The volume is intended to contribute to this ‘toolbox’ in the area of software services, while addressing how to make legal studies work closely with engineers’ and computer scientists’ fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals’ fundamental rights and freedoms.

Privacy and Data Protection Seals (Information Technology and Law Series #28)

by Rowena Rodrigues Vagelis Papakonstantinou

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics.Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

Privacy and Healthcare Data: 'Choice of Control' to 'Choice' and 'Control'

by Christina Munns Subhajit Basu

In order for the information society to realise its full potential, personal data has to be disclosed, used and often shared. This book explores the disclosure and sharing of data within the area of healthcare. Including an overview of how health information is currently managed, the authors argue that with changes in modern society, the idea of personal relationships with a local GP who solely holds and controls your health records is becoming rapidly outdated. The authors aim to encourage and empower patients to make informed choices about sharing their health data. They do this by developing a three-stage theoretical model for change to the roles of the NHS and the individual. The study generates debate to stimulate and inspire new models and policy, and to provoke new visions for the sharing of healthcare data. Such discussion is framed through an exploration of the changing concept of 'privacy' and 'patient control' in healthcare information management. The volume draws on best practices from Europe and the USA and combines these to form a suggested vision for the UK as an early adopter of change. The volume will be essential reading for academics in the field of privacy and data protection, as well as healthcare and informatics professionals across different jurisdictions.

Privacy and Security Challenges in Cloud Computing: A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.)

by T. Ananth Kumar

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Privacy and Security for Mobile Crowdsourcing (River Publishers Series in Digital Security and Forensics)

by Shabnam Sodagari

This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements. Technical topics discussed in the book include but are not limited to: Risks affecting crowdsensing platforms Spatio-temporal privacy of crowdsourced applications Differential privacy for data mining crowdsourcing Blockchain-based crowdsourcing Secure wireless mobile crowdsensing. This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.

Privacy as Trust: Information Privacy for an Information Age

by Ari Ezra Waldman

It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better protect our information in a digitized world. With case studies involving websites, online harassment, intellectual property, and social robots, Waldman shows how 'privacy as trust' can be applied in the most challenging real-world contexts to make privacy work for all of us. This book should be read by anyone concerned with reshaping the theory and practice of privacy in the modern world.

Privacy Computing: Theory and Technology

by Fenghua Li Hui Li Ben Niu

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

by Rongxing Lu

This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.

Privacy-Enhancing Fog Computing and Its Applications (SpringerBriefs in Electrical and Computer Engineering)

by Xiaodong Lin Jianbing Ni Xuemin Sherman Shen

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.

Refine Search

Showing 52,951 through 52,975 of 72,409 results