Browse Results

Showing 68,801 through 68,825 of 72,574 results

The True Wireless

by Nikola Tesla

Nikola Tesla was a genius who revolutionized how the world looks at electricity.

Truffles: Diversity, Ecology and Biotechnology (Progress in Mycological Research)

by Kandikere R. Sridhar Sunil K. Deshmukh

Truffles are hypogeous ectomycorrhizal ascomycetous edible mushrooms distributed worldwide in terrestrial ecosystems, including deserts, as non-timber forest products. They are seasonal and have a short shelf life. Owing to their nutraceutical value, truffles are in high demand and valuable. Of the 180 or more species of truffles reported worldwide, only around 20 are commercially viable. Truffles: Diversity, Ecology and Biotechnology reviews the current advances in truffles from a historical perspective and covers ethnomycological profiles, habitats, ecology, geographical distribution, diversity, systematics, phylogeny, ultrastructure, sexual reproduction, cultivation, analytical techniques, and the impact of climate change and industrial applications on truffles. It also emphasizes the role of soil properties in the occurrence of truffles (e.g., Tuber spp.), their pathogens, product development and marketing. The contributors hail from academia and industries across the globe.

Truncated Predictor Based Feedback Designs for Linear Systems with Input Delay (Control Engineering)

by Yusheng Wei Zongli Lin

This monograph is the first of its kind to present innovative research results on truncated predictor feedback (TPF) designs for general linear systems with input delay. Beginning with a brief review of time delay systems, the first half of the book focuses on TPF with a constant feedback parameter. Both state feedback and output feedback are considered. It is established that TPF achieves stabilization in the presence of an arbitrarily large bounded delay if the open loop system is not exponentially unstable. Examples are presented to illustrate that TPF may fail to stabilize an exponentially unstable system when the delay is sufficiently large. Bounds on the delay are then established under which stabilization can be achieved. The second half of the book explores variations of the TPF laws designed with a non-constant feedback parameter to accommodate unknown delays and improve closed-loop performance. The authors employ a step-by-step approach to presenting the ultimate result on a completely delay-independent feedback law. Truncated Predictor Based Feedback Designs for Linear Systems with Input Delay will appeal to control engineers, control theorists, and graduate students studying control systems. This volume will also be a valuable resource for engineers and applied mathematicians interested in dynamic systems with time delays.

Truncated Predictor Feedback for Time-Delay Systems

by Bin Zhou

This book provides a systematic approach to the design of predictor based controllers for (time-varying) linear systems with either (time-varying) input or state delays. Differently from those traditional predictor based controllers, which are infinite-dimensional static feedback laws and may cause difficulties in their practical implementation, this book develops a truncated predictor feedback (TPF) which involves only finite dimensional static state feedback. Features and topics: A novel approach referred to as truncated predictor feedback for the stabilization of (time-varying) time-delay systems in both the continuous-time setting and the discrete-time setting is built systematically Semi-global and global stabilization problems of linear time-delay systems subject to either magnitude saturation or energy constraints are solved in a systematic manner Both stabilization of a single system and consensus of a group of systems (multi-agent systems) are treated in a unified manner by applying the truncated predictor feedback and predictor feedback The properties of the solutions to a class of parametric (differential and difference) Lyapunov matrix equations are presented in detail Detailed numerical examples and applications to the spacecraft rendezvous and formation flying problems are provided to demonstrate the usefulness of the presented theoretical results This book can be a useful resource for the researchers, engineers, and graduate students in the fields of control, applied mathematics, mechanical engineering, electrical engineering, and aerospace engineering.

Truss Optimization: A Metaheuristic Optimization Approach

by Vimal Savsani Ghanshyam Tejani Vivek Patel

This book provides a comprehensive study of structural design and optimization of different truss structures for size, shape, and topology of structure. It describes truss optimization based on into three categories: size optimization, shape optimization, and topology optimization.It also studies the performance of metaheuristic algorithms developed after 2011 for truss optimization problems. The results highlight the best approach to achieve the best performance of the structural design. Pseudo codes of all the methods are provided at the end of the book so that it can be used by the researchers, practitioners, and students to test it for different real-world systems.This book ideal for structural design engineers to realize the appropriate systems with properly optimized parameters as well as designers, practitioners, consultants involved in structural designs, researchers, academics, and graduate students in mechanical, civil, and architectural engineering.

Trust and Credit in Organizations and Institutions: As Viewed from the Evolution of Cooperation (Theoretical Biology)

by Mayuko Nakamaru

This book shows that evolutionary game theory can unravel how mutual cooperation, trust, and credit in a group emerge in organizations and institutions. Some organizations and institutions, such as insurance unions, credit unions, and banks, originated from very simple mutual-aid groups. Members in these early-stage mutual-aid groups help each other, making rules to promote cooperation, and suppressing free riders. Then, they come to “trust” not only each other but also the group they belong to, itself. The division of labor occurs when the society comes to have diversity and complexity in a larger group, and the division of labor also requires mutual cooperation and trust among different social roles. In a larger group, people cannot directly interact with each other, and the reputation of unknown people helps other decide who is a trustworthy person. However, if gossip spreads untruths about a reputation, trust and cooperation are destroyed. Therefore, how to suppress untrue gossip is also important for trust and cooperation in a larger group. If trustworthiness and credibility can be established, these groups are successfully sustainable. Some develop and evolve and then mature into larger organizations and institutions. Finally, these organizations and institutions become what they are now. Therefore, not only cooperation but also trust and credit are keys to understanding these organizations and institutions.The evolution of cooperation, a topic of research in evolutionary ecology and evolutionary game theory, can be applied to understanding how to make institutions and organizations sustainable, trustworthy, and credible. It provides us with the idea that evolutionary game theory is a good mathematical tool to analyze trust and credit. This kind of research can be applied to current hot topics such as microfinance and the sustainable use of ecosystems.

Trust-Based Communication Systems for Internet of Things Applications

by Prateek Agrawal Vishu Madaan Anand Sharma Dilip Sharma Akshat Agarwal Sandeep Kautish

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.

Trust & Fault in Multi Layered Cloud Computing Architecture

by Pradeep Kumar Gupta Punit Gupta

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing;Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system;Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Trust in Construction Projects (Spon Research)

by Anita Cerić

The relationship between project managers representing project owners and those on the contractor side is often threatened by communication risk. The main communication risk minimization strategy in the construction phase is trust, which plays a major role in the success of key working relationships across the construction industry. This book investigates this phenomenon, and goes on to show that once developed, trust outshines all other strategies of communication risk minimization and is essential for project success. As part of this investigation, communication risk in construction projects is examined in detail, with a particular focus on the effects of information asymmetry on working relationships. Drawing on many years of empirical research involving project managers working internationally, Trust in Construction Projects also provides strategies to minimize information asymmetries in order to build trust, and ensure the success of construction projects. By increasing understanding of trust in construction projects, this book adds an important new perspective to the fields of construction management and project management. This is essential reading for researchers and students, as well as practitioners in these fields.

Trust in Military Teams (Human Factors in Defence)

by Neville A. Stanton

The objective of this book is to report on contemporary trends in the defence research community on trust in teams, including inter- and intra-team trust, multi-agency trust and coalition trust. The book also considers trust in information and automation, taking a systems view of humans as agents in a multi-agent, socio-technical, community. The different types of trust are usually found to share many of the same emotive, behavioural, cognitive and social constructs, but differ in the degree of importance associated with each of them. Trust in Military Teams is written by defence scientists from the USA, Canada, Australia and the UK, under the auspices of The Transfer Cooperation Programme. It is representative of the latest thinking on trust in teams, and is written for defence researchers, postgraduate students, academics and practitioners in the human factors community.

Trust in Virtual Teams: Organization, Strategies and Assurance for Successful Projects

by Thomas P. Wise

As projects become more complex and the project teams are more geographically and culturally dispersed, so strong, trusting relationships come to the fore. Trust provides the security that enables project teams to work together effectively, even when they face project-threatening problems and challenges. Because today’s team members work virtually as much by choice as by geographic necessity, business leaders must understand how team relationships such as trust, cross-divisional projects, and how offshore team participation are all positively motivated by a solid quality assurance program. Offering real world solutions, Trust in Virtual Teams provides a clear view of how virtual projects can succeed, and how quality assurance compliments and promotes effective organizational design and project management to build solid trust relationships. Dr Wise combines the latest research in virtual team trust with simple and proven quality methods. He builds upon more than 20 years of experience in quality and project work to guide team managers in creating high performing project teams. Our understanding of the role human factors play in project performance and project resilience continues to grow. As it does, so does our need to address the behaviors and culture that enable good performance. Tom Wise’s book is a thoughtful and pragmatic guide to help project teams and managers do just that.

Trust Models for Next-Generation Blockchain Ecosystems (EAI/Springer Innovations in Communication and Computing)

by Muhammad Habib ur Rehman Davor Svetinovic Khaled Salah Ernesto Damiani

This book discusses the trust models for next-generation Blockchain ecosystems. The book provides a comprehensive discussion on various trust factors involving security, anonymization, reputation, governance, economic models, and other relevant determinants. The book covers various topics in breadth and depth. In addition, it sets the foundation to involve the readers in understanding the core theories supplemented with technical and experimental discussion. The book starts by laying out the foundations of trust models in Blockchain ecosystems. The authors then provide a study of existing trust models Blockchain networks. They then provide identification of trust factors and discuss each trust factor. The book concludes with a future outlook of trust-enabling Blockchain ecosystems.Outlines the trust models for next-generation Blockchain ecosystems;Covers the trust issues in various Blockchain ecosystems running in public, private, consortium, and cloud environments;Features issues such has privacy, security, scalability, and requirements in Blockchain.

Trusted Cellular IoT Devices: Design Ingredients and Concepts (Synthesis Lectures on Engineering, Science, and Technology)

by Kersten Heins

This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.

Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention And Detection

by Hassan Salmani

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Trusted Execution Environments

by Konstantinos Markantonakis Carlton Shepherd

Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.

Trustworthy AI - Integrating Learning, Optimization and Reasoning: First International Workshop, TAILOR 2020, Virtual Event, September 4–5, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12641)

by Fredrik Heintz Michela Milano Barry O’Sullivan

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on the Foundation of Trustworthy AI - Integrating Learning, Optimization and Reasoning, TAILOR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 11 revised full papers presented together with 6 short papers and 6 position papers were reviewed and selected from 52 submissions. The contributions address various issues for Trustworthiness, Learning, reasoning, and optimization, Deciding and Learning How to Act, AutoAI, and Reasoning and Learning in Social Contexts.

Trustworthy Execution on Mobile Devices

by Amit Vasudevan James Newsome Jonathan M. Mccune

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Trustworthy Hardware Design: Combinational Logic Locking Techniques (Analog Circuits and Signal Processing)

by Muhammad Yasin Jeyavijayan (JV) Rajendran Ozgur Sinanoglu

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.

Trustworthy Internet

by Nicola Blefari-Melazzi Giuseppe Bianchi Luca Salgarelli

This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet". The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received by the audience. The book also includes: i) an introduction by the Editors, setting the scene and presenting evolution scenarios; ii) five papers written by the session chairmen, reputed scientists, and each dedicated to a facet of the trustworthy Internet vision; iii) a concluding paper, reporting the outcomes of a panel held at the conclusion of the workshop, written by the two keynote speakers.

The Truth

by Peter James

20TH ANNIVERSARY EDITION WITH A NEW INTRODUCTION FROM THE AUTHORA thrilling tale of suspense from the bestselling author of the Roy Grace series.'Britain's answer to Stephen King and Michael Crichton.' Sunday TelegraphSusan and John Carter are crazy about each other and life is perfect but for one thing - they are on the brink of financial disaster. Surely being a surrogate mother to another man's child won't harm such a strong relationship? Especially when the mysterious Mr Sarotzini is offering to save their home and business - everything they've worked for.What seems to be a perfect solution begins to feel like an impossible situation. Susan's pregnancy is disturbingly painful but no-one will tell her why. It becomes apparent that Sarotzini wields immense power and Susan begins to doubt everything she knows. As she realises the terrifying origin of the dark forces Saratzini controls she is in fear for herself and John but most of all for her unborn baby ...

The Truth About Inventions (Fact or Fake?)

by Annabel Savery

Sort the truth from the lies with the Fact or Fake series packed full of unbelievable, mind-boggling facts!This high-interest series for children aged 9-11 sorts the facts from the fakes. From the human body and dinosaurs to history and science, each statement is proved right or wrong, and accompanied by eye-popping graphics that bring each subject to life! Prepare to be surprised and amazed by these sometimes strange, but always fascinating, truths.In Fact or Fake: The Truth About Inventions, will you separate the facts from the fakes?:Is it true that t-shirts were invented because men couldn't sew on buttons?Were popsicles really invented by accident by an 11-year-old boy?Bubble wrap was supposed to be used as wallpaper, fact or fake?Could early cameras really take pictures of ghosts?Eye-catching illustration, quirky fonts and clever design treatment make this an appealing and unputdownable high interest leisure read for children aged 9+ Other titles in the series: The Truth about the Human Body The Truth about Science The Truth about History The Truth about Space The Truth about Animals The Truth about Planet Earth The Truth about Dinosaurs The Truth about Sports The Truth about Inventions The Truth about Survival Skills

The Truth About Tesla: The Myth of the Lone Genius in the History of Innovation

by Christopher Cooper

A myth-busting biography of Nikola Tesla, the “enigmatic figure whose life and achievements appeal to historians, engineers, scientists, and many others” (Library Journal).Nikola Tesla, one of the greatest electrical inventors who ever lived, was rescued from obscurity in recent years, restored to his rightful place among historical luminaries. We’ve been told that his contributions to humanity were obscured by a number of nineteenth-century inventors and industrialists who took credit for his work or stole his patents outright. Most biographies repeat this familiar account of Tesla’s life, including his invention of alternating current, his falling out with Thomas Edison, how he lost billions in patent royalties to George Westinghouse, and his fight to prove that Guglielmo Marconi stole thirteen of his patents to “invent” radio. But what really happened?Newly uncovered information, however, proves that the popular account of Tesla’s life is itself very flawed. In The Truth About Tesla, Christopher Cooper sets out to prove that the conventional story not only oversimplifies history, it denies credit to some of the true inventors behind many of the groundbreaking technologies now attributed to Tesla, and perpetuates a misunderstanding about the process of innovation itself.Are you positive that Alexander Graham Bell invented the telephone? Are you sure the Wright Brothers were the first in flight? Think again! With a provocative foreword by Tesla biographer Marc J. Seifer, The Truth About Tesla is one of the first books to set the record straight, tracing the origin of some of the greatest electrical inventions to a coterie of colorful characters that conventional history has all but forgotten.Includes photographs

The Truth about Wuhan: How I Uncovered the Biggest Lie in History

by Dr. Andrew G. Huff

Shocking new insider information that shows what really happened in Wuhan, China, at the start of the COVID-19 outbreak and in the ensuing cover-up. The day that Dr. Andrew G. Huff left his senior scientist and vice president role at EcoHealth Alliance was one of the happiest days of his life due to the corruption he had witnessed at the organization. However, he never thought working there would be of any great consequence to the future. He was wrong. Because, as an EcoHealth Alliance insider, Dr. Huff had had a ringside seat to one of the biggest cover-ups in history. The Truth about Wuhan contains new research and a breakdown of how and why the development of COVID-19 in the United States and China was supported by the US government to collect intelligence on laboratories in China. Dr. Huff, an expert in the fields of bioterrorism and bio warfare, is a whistleblower who will show why the reasons the lab leak was covered up are incorrect. He worked on the classified research side of the program as a US government scientist. He knows the real how and why COVID-19 emerged. Besides exposing the conspiracy and cover-up, Dr. Huff also puts forth policy solutions and recommendations to prevent a lab leak virus from plaguing the world again. The Truth about Wuhan simply explains the complexity of the system that led to COVID-19&’s emergence; how the medical industrial complex grew and became entrenched in gain of function work after 9/11; why EcoHealth Alliance was the (almost) perfect intelligence collection cover; the policy actions and decision-making process as to why the United States government engaged in the COVID cover-up; how and why the United States swapped biotechnology with China and biomedical corporations; and the incentives for each of the actors or governments to engage and coordinate a global cover-up of COVID-19 origins. The Truth about Wuhan also shows how and why Dr. Anthony Fauci is intricately involved in the COVID cover-up; how scientists like EcoHealth Alliance president and CEO Dr. Peter Daszak rose to power and used their influence to corrupt science and the COVID origin investigation; and how the intelligence community likely orchestrated the cover-up with Dr. Anthony Fauci. Dr. Huff also provides personal harrowing accounts of how the US government waged a psychological operation against him to prevent him from speaking out. COVID-19 is the biggest lie, scandal, and intelligence failure in US history, and Dr. Andrew G. Huff is stepping out of the shadows to share his insider story about this failure that led to millions of deaths around the world.

The Truth App: The Truth App (Liars #1)

by Jack Heath

In this pulse-pounding techno-thriller, Jack Heath creates a world where everyone knows when you lie—and telling the truth doesn&’t always set you free.Jarli likes to think he&’s an honest guy. He&’s a big believer in telling the truth, no matter what. So he develops The Truth App, a mobile application that listens in on your conversations and can tell when someone&’s lying. Then his app goes viral and, suddenly, Jarli is an internet sensation. But, soon enough, Jarli realizes that being famous can be dangerous—especially when you&’ve just exposed everyone&’s deepest, darkest secrets. Now his entire town is out to get him; kids at school, teachers, the police, even his own family. Also, an underground network of criminals has just added Jarli to their hit list. Sometimes, exposing the truth comes with a price…

Truth from the Valley: A Practical Primer on Future IT Management Trends

by Mark Settle

Management challenges faced by IT leaders in Silicon Valley will eventually be encountered by IT leaders everywhere. Successful Silicon Valley firms operate in radically different ways when compared with their conventional Fortune 500 counterparts. Valley firms rely almost exclusively on cloud-based business applications and cloud-computing resources to conduct daily business. In addition, they are increasingly relying on artificial intelligence and machine-learning tools to extract business information from vast quantities of data. Valley firms are operating on the leading edge of the changes taking place within the IT industry. In some cases, they are literally defining the leading edge of such changes! Truth from the Valley provides insight into ways in which people, process, and technology management challenges have been addressed by IT leaders in Silicon Valley. This book provides a comprehensive portrayal of the trends that will shape IT management practices in the next decade, and it challenges its readers to find ways of converting these challenges into opportunities that will enable their organizations to become more efficient, more impactful, and more business relevant in the future.

Refine Search

Showing 68,801 through 68,825 of 72,574 results