Browse Results

Showing 7,651 through 7,675 of 74,025 results

Attack of the Turtle

by Drew Carlson

It's 1776, and the Revolutionary War is raging. Fourteen-year-old Nathan Wade is a patriot, but he's too young to join the fight. Then his cousin David Bushnell comes to town with a secret. David has designed a water machine that can explode bombs underwater. And his mission is to launch it against the British warships in New York harbor. Nate reluctantly agrees to help David build the weapon of war 2; dubbed the "American Turtle," Although he's terrified of water and worried about getting caught, when unlikely circumstances put Nate at the center of the action, he must face the murky waters of his fears head-on. Based on actual historical events, this adventure story captures the drama of the first submarine used in naval warfare and the struggles of a teenager overcoming self-doubt.

Attack-and-Defense Games for Control Systems: Analysis and Synthesis

by Yuanqing Xia Yuan Yuan Huanhuan Yuan Huapeng Dong Mengbi Wang

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks.Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems.This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.

Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13745)

by Steven Furnell Weizhi Meng Wenjuan Li

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Attacks and Defenses for the Internet-of-Things: 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings (Lecture Notes in Computer Science #15397)

by Moti Yung Weizhi Meng Jun Shao

This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Attainable Region Theory: An Introduction to Choosing an Optimal Reactor

by David Glasser Diane Hildebrandt Benjamin Glasser David Ming Matthew Metgzer

Learn how to effectively interpret, select and optimize reactors for complex reactive systems, using Attainable Region theory Teaches how to effectively interpret, select and optimize reactors for complex reactive systems, using Attainable Region (AR) theory Written by co-founders and experienced practitioners of the theory Covers both the fundamentals of AR theory for readers new to the field, as we all as advanced AR topics for more advanced practitioners for understanding and improving realistic reactor systems Includes over 200 illustrations and 70 worked examples explaining how AR theory can be applied to complex reactor networks, making it ideal for instructors and self-study Interactive software tools and examples written for the book help to demonstrate the concepts and encourage exploration of the ideas

Attaining High Performance Communications: A Vertical Approach

by Ada Gavrilovska

No single solution applied at one particular layer can help applications solve all performance-related issues with communication services. Instead, this book shows that a coordinated effort is needed among the layers. It covers many different types of technologies and layers across the stack, from the architectural features of the hardware, through the protocols and their implementation in operating system kernels, to the manner in which application services and middleware are using underlying platforms. The book also describes key developments in high-end platforms, high performance interconnection fabrics and communication libraries, and multi- and many-core systems.

Attention Hijacked: Using Mindfulness to Reclaim Your Brain from Tech

by Erica B. Marcus

Technology surrounds us every day: a phone alarm wakes us up, an electronic calendar tracks assignment deadlines, GPS directs us to the new dentist’s office, social media keeps us connected to friends and family, and streaming platforms make sure we’re never without something new to binge-watch. Our devices and apps can make life much more convenient and entertaining. But for years, scientists have warned that too much screen time may have negative effects on our health. With portable devices and remote learning, it is even more difficult to put down electronics. Being intentional about how and when to unplug can help teens and young adults to protect their physical and mental wellbeing in a world where screens and technology are increasingly becoming necessities rather than just conveniences. Attention Hijacked offers a roadmap for those deciding how they want to deal with technology, exploring the ways technology affects the individual, dispelling common misinformation, and using this knowledge to make personalized decisions. Page Plus links in the book lead to mindfulness and meditation audio clips. Using mindfulness techniques, this book gives readers the power to take charge of their technology use.

Attenuation of Incoherent Seismic Noise (Advances in Oil and Gas Exploration & Production)

by Abdullatif Al-Shuhail Saleh Al-Dossary

This book examines the effects of incoherent noise and how it leads to the misinterpretation of seismic data. It also reviews common noise reduction approaches and their drawbacks, focusing on developments that have occurred in the past decade. The main features of this book include: • Hands-on implementation in MATLAB and/or C • In-depth discussions of both theoretical and practical aspects of the subject • Supplementary, real-world seismic data • Detailed descriptions of structure-enhancing filters. Connecting the theory and practical implementation of noise reduction, the book helps readers fill the gap from equations to code, and from classical filters to the preservation and enhancement of a robust structure. Lastly, it highlights cutting-edge research in the area. As such, it is of interest to researchers in the fields of petroleum engineering, exploration seismology, and geophysics, as well as to practitioners working in the petroleum industry.

Attosecond Physics: Attosecond Measurements and Control of Physical Systems (Springer Series in Optical Sciences #177)

by Amelle Zaïr Ricardo Torres Luis Plaja

Attophysics is an emerging field in physics devoted to the study and characterization of matter dynamics in the sub-femtosecond time scale. This book gives coverage of a broad set of selected topics in this field, exciting by their novelty and their potential impact. The book is written review-like. It also includes fundamental chapters as introduction to the field for non-specialist physicists. The book is structured in four sections: basics, attosecond pulse technology, applications to measurements and control of physical processes and future perspectives. It is a valuable reference tool for researchers in the field as well as a concise introduction to non-specialist readers.

Attracted to Conflict: Dynamic Foundations Of Destructive Social Relations (Peace Psychology Book Series)

by Peter T. Coleman Andrzej Nowak Larry Liebovitch Andrea Bartoli Katharina Kugler Robin R. Vallacher Lan Bui-Wrzosinska

Conflict is inherent in virtually every aspect of human relations, from sport to parliamentary democracy, from fashion in the arts to paradigmatic challenges in the sciences, and from economic activity to intimate relationships. Yet, it can become among the most serious social problems humans face when it loses its constructive features and becomes protracted over time with no obvious means of resolution. This book addresses the subject of intractable social conflict from a new vantage point. Here, these types of conflict represent self-organizing phenomena, emerging quite naturally from the ongoing dynamics in human interaction at any scale--from the interpersonal to the international. Using the universal language and computational framework of nonlinear dynamical systems theory in combination with recent insights from social psychology, intractable conflict is understood as a system locked in special attractor states that constrain the thoughts and actions of the parties to the conflict. The emergence and maintenance of attractors for conflict can be described by means of formal models that incorporate the results of computer simulations, experiments, field research, and archival analyses. Multi-disciplinary research reflecting these approaches provides encouraging support for the dynamical systems perspective. Importantly, this text presents new views on conflict resolution. In contrast to traditional approaches that tend to focus on basic, short-lived cause-effect relations, the dynamical perspective emphasizes the temporal patterns and potential for emergence in destructive relations. Attractor deconstruction entails restoring complexity to a conflict scenario by isolating elements or changing the feedback loops among them. The creation of a latent attractor trades on the tendency toward multi-stability in dynamical systems and entails the consolidation of incongruent (positive) elements into a coherent structure. In the bifurcation scenario, factors are identified that can change the number and types of attractors in a conflict scenario. The implementation of these strategies may hold the key to unlocking intractable conflict, creating the potential for constructive social relations.

Attracting Native Pollinators: The Xerces Society Guide to Conserving North American Bees and Butterflies and Their Habitat

by The Xerces Society Dr Marla Spivak

With the recent decline of the European honey bee, it is more important than ever to encourage the activity of other native pollinators to keep your flowers beautiful and your grains and produce plentiful. In Attracting Native Pollinators, you’ll find ideas for building nesting structures and creating a welcoming habitat for an array of diverse pollinators that includes not only bees, but butterflies, moths, and more. Take action and protect North America’s food supply for the future, while at the same time enjoying a happily bustling landscape.

Attractive Ellipsoids in Robust Control (Systems & Control: Foundations & Applications)

by Alexander Poznyak Andrey Polyakov Vadim Azhmyakov

This monograph introduces a newly developed robust-control design technique for a wide class of continuous-time dynamical systems called the "attractive ellipsoid method. " Along with a coherent introduction to the proposed control design and related topics, the monograph studies nonlinear affine control systems in the presence of uncertainty and presents a constructive and easily implementable control strategy that guarantees certain stability properties. The authors discuss linear-style feedback control synthesis in the context of the above-mentioned systems. The development and physical implementation of high-performance robust-feedback controllers that work in the absence of complete information is addressed, with numerous examples to illustrate how to apply the attractive ellipsoid method to mechanical and electromechanical systems. While theorems are proved systematically, the emphasis is on understanding and applying the theory to real-world situations. Attractive Ellipsoids in Robust Control will appeal to undergraduate and graduate students with a background in modern systems theory as well as researchers in the fields of control engineering and applied mathematics.

Attribute-Based Encryption and Access Control (Data-Enabled Engineering)

by Yan Zhu Dijiang Huang Qiuxiang Dong

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

by Timo Steffens

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Auction Design for the Wireless Spectrum Market (SpringerBriefs in Computer Science)

by Qian Zhang Peng Lin Xiaojun Feng

This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems. Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of channels and spatial reuse is proposed. In the second scenario, a framework is designed to enable spectrum group secondary users with a limited budget. Finally, a flexible auction is created enabling operators to purchase the right amounts of spectrum at the right prices according to their users' dynamic demands. Both concise and comprehensive, Auction Design for the Wireless Spectrum Market is suited for professionals and researchers working with wireless communications and networks. It is also a useful tool for advanced-level students interested in spectrum and networking issues.

Auction Theory for Computer Networks

by Ping Wang Zhu Han Dusit Niyato Nguyen Cong Luong

Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities. Topics including cloud networking models, MIMO, mmWave communications, 5G, data aggregation, task allocation, user association, interference management, wireless caching, mobile data offloading, and security. Introducing fundamental concepts from an engineering perspective and describing a wide range of state-of-the-art techniques, this is an excellent resource for graduate and senior undergraduate students, network and software engineers, economists, and researchers.

Audel Electrical Trades Pocket Manual

by L. W. Brittian

Answers at your fingertipsThis hands-on guide will help you trouble-shoot and solve electrical problems in industrial and commercial settings. You'll find plain-English explanations for a wide range of electrical equipment and systems, from transformers and switchgears to alarm and wiring systems. Use this book to quickly access reliable information and improve your on-the-job skills. Get useful rules of thumb and quick tricks Discover formulas, charts, and tables essential for plant electrical work Locate technical data quickly and get up to speed on everyday electrical questions Packed with illustrations that help you grasp ideas quickly and easily

Audel HVAC Fundamentals, Volume 1: Heating Systems, Furnaces and Boilers (Audel Technical Trades Series #17)

by James E. Brumbaugh

A reference you'll warm up to From the background and basics of heating systems to the newest chip-based technology, this first volume of Audel's HVAC Library gives you comprehensive information you need on the job. Whether you're installing, servicing, repairing, or troubleshooting an old or new heating system, you'll find what you're looking for, from wood and coal furnace maintenance to new calculations and the latest environmental technologies and regulations. * Review the basics of installation, wiring, and troubleshooting for different HVAC systems * Choose the correct system for the space, climate, and needs * Compare the economy and efficiency of various fuel types * Install, maintain, and troubleshoot conversion units * Find formula cross references, data tables with conversions, and listings of trade organizations and equipment manufacturers

Audel HVAC Fundamentals, Volume 3: Air Conditioning, Heat Pumps and Distribution Systems (Audel Technical Trades Series #6)

by James E. Brumbaugh

Keep it cool or heat things up This third volume of Audel's HVAC Library gives you a comprehensive, hands-on guide to installing, servicing, and repairing all basic air-conditioning systems in both new and older construction. You'll also find complete coverage of specialized heating units-radiators, radiant heating systems, stoves, fireplaces, heat pumps, and indoor/outdoor pool heaters, plus fans, exhaust systems, air filters, and more. It's what you need to complete your HVAC reference library. * Make accurate calculations for AC system output * Tailor AC systems for older construction * Learn to install and service today's popular electronic air cleaners and filters * Service less common heating systems such as coal-fired furnaces * Install, maintain, and repair humidifiers and dehumidifers * Handle radiators, convectors, and baseboard heating units

Audel Industrial Multi-Craft Mini-Ref

by Thomas Bieber Davis

An essential, pocket-sized manual for industrial craftspeople from a brand relied on for more than a century The Audel(tm) Industrial Trades Multi-Craft Reference Manual is aimed at the industrial mechanic, millwright, machinist, plumber, pipefitter, welder, carpenter, sheet metal mechanic, and other skilled craftspeople who need quick, no-nonsense access to dependable information--fast. Including up-to-date focus on "green" thinking and industrial sustainability, this handy, compact guide serves as an ideal on-the-job reference on topics such as pump facts, bearing information, motor facts, wood and carpentry, pipefitting, welding, blacksmithing, and much more. New Audel book from bestselling author Tom Davis Topics searchable by machine, device, or material Heavily illustrated and designed with lay-flat binding for ease of use on the job Includes worked-out examples when math is presented to accelerate learning Building on a rich legacy of titles from the celebrated Audel brand, this new addition to their esteemed lineup continues the tradition of delivering trusted content skilled workers reach for the most.

Audel Pumps and Hydraulics

by Mark Richard Miller Harry L. Stewart Rex Miller

Pull up what you need to knowPumps and hydraulic equipment are now used in more facets of industry than ever before. Whether you are a pump operator or you encounter pumps and hydraulic systems through your work in another skilled trade, a basic knowledge of the practical features, principles, installation, and maintenance of such systems is essential. You'll find it all here, fully updated with real-world examples and 21st-century applications.Learn to install and service pumps for nearly any applicationUnderstand the fundamentals and operating principles of pump controls and hydraulicsService and maintain individual pumping devices that use smaller motorsSee how pumps are used in robotics, taking advantage of hydraulics to lift larger, heavier loadsHandle new types of housings and work with the latest electronic controlsKnow the appropriate servicing schedule for different types of pumping equipmentInstall and troubleshoot special-service pumps

Audio Augmented Reality: Concepts, Technologies and Narratives

by Matias Harju

Audio Augmented Reality: Concepts, Technologies and Narratives provides readers with a comprehensive overview of audio augmented reality (AAR), focussing on its narrative potential while discussing several design considerations and prospective application domains.In this groundbreaking book, sound designer Matias Harju provides a practical and insightful exploration of the medium. The book draws perspectives from sound designers, researchers and industry professionals who are actively shaping this rapidly evolving field.Designed to inspire and offer practical insights, Audio Augmented Reality: Concepts, Technologies and Narratives serves as a guide for creators, academics, and anyone interested in exploring the creative potential of AAR.

Audio Basics

by Stanley Alten

Written by highly respected author Stan Alten, AUDIO BASICS provides readers with a fundamental understanding of the principles, technology, and techniques of audio production. Because the material is not medium-specific, readers can apply techniques to sound production in any of the major audio and audio/visual media.

Audio Effects: Theory, Implementation and Application

by Joshua D. Reiss Andrew McPherson

Audio Effects: Theory, Implementation and Application explores digital audio effects relevant to audio signal processing and music informatics. It supplies fundamental background information on digital signal processing, focusing on audio-specific aspects that constitute the building block on which audio effects are developed. The text integrates t

Audio Engineer's Reference Book

by Michael Talbot-Smith

An authoritative reference on all aspects of audio engineering and technology including basic mathematics and formulae, acoustics and psychoacoustics, microphones, loudspeakers and studio installations. Compiled by an international team of experts, the second edition was updated to keep abreast of fast-moving areas such as digital audio and transmission technology. Much of the material has been revised, updated and expanded to cover the very latest techniques. This is a new paperback version.

Refine Search

Showing 7,651 through 7,675 of 74,025 results