Marknadens största urval
Snabb leverans

Böcker utgivna av River Publishers

Filter
Filter
Sortera efterSortera Populära
  • av BHANDARI HANNA
    1 557

    This edited book presents some unexplored issues of economic inequality, including case studies of various countries. Inequality is a chronic and divisive factor of society. Inequality exists as an integral attribute of human development.

  • av Sergei Petrenko
    781 - 1 457

    The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). The creation of quantitative metrics for BCM are discussed as well as several models and methods that correspond to the goals and objectives of the International Standards Organisation (ISO) Technical Committee ISO/TC 292 "e;Security and resilience"e;. Significantly, the book contains the results of not only qualitative, but also quantitative, measures of Cyber Resilience which for the first time regulates organizations' activities on protecting their critical information infrastructure.The book discusses the recommendations of the ISO 22301: 2019 standard "e;Security and resilience - Business continuity management systems - Requirements"e; for improving the BCM of organizations based on the well-known "e;Plan-Do-Check-Act"e; (PDCA) model. It also discusses the recommendations of the following ISO management systems standards that are widely used to support BCM. The ISO 9001 standard "e;Quality Management Systems"e;; ISO 14001 "e;Environmental Management Systems"e;; ISO 31000 "e;Risk Management"e;, ISO/IEC 20000-1 "e;Information Technology - Service Management"e;, ISO/IEC 27001 "e;Information Management security systems"e;, ISO 28000 "e;Specification for security management systems for the supply chain"e;, ASIS ORM.1-2017, NIST SP800-34, NFPA 1600: 2019, COBIT 2019, RESILIA, ITIL V4 and MOF 4.0, etc. The book expands on the best practices of the British Business Continuity Institute's Good Practice Guidelines (2018 Edition), along with guidance from the Disaster Recovery Institute's Professional Practices for Business Continuity Management (2017 Edition). Possible methods of conducting ECP projects in the field of BCM are considered in detail. Based on the practical experience of the author there are examples of Risk Assessment (RA) and Business Impact Analysis (BIA), examples of Business Continuity Plans (BCP) & Disaster Recovery Plans (DRP) and relevant BCP & DRP testing plans.This book will be useful to Chief Information Security Officers, internal and external Certified Information Systems Auditors, senior managers within companies who are responsible for ensuring business continuity and cyber stability, as well as teachers and students of MBA's, CIO and CSO programs.

  •  
    1 431

    This book describes the various AI, IoT, robotics, mathematical and computational modelling tools that have been used to fight the Covid-19 pandemic.

  • av Fadi Alshakhshir
    891 - 2 237

    Over recent years, many new technologies have been introduced to drive the digital transformation in the building maintenance industry. The current trend in digital evolution involves data-driven decision making which opens new opportunities for an energy centered maintenance model. Artificial Intelligence and Machine Learning are helping the maintenance team to get to the next level of maintenance intelligence to provide real-time early warning of abnormal equipment performance.This edition follows the same methodology as the First. It provides detailed descriptions of the latest technologies associated with Artificial Intelligence and Machine Learning which enable data-driven decision-making processes about the equipment's operation and maintenance. Technical topics discussed in the book include: Different Maintenance Types and The Need for Energy Centered MaintenanceThe Centered Maintenance ModelEnergy Centered Maintenance Process Measures of Equipment and Maintenance Efficiency and EffectivenessData-Driven Energy Centered Maintenance Model:Digitally Enabled Energy Centered Maintenance TasksArtificial Intelligence and Machine Learning in Energy Centered MaintenanceModel Capabilities and Analytics RulesBuilding Management System SchematicsThe book contains a detailed description of the digital transformation process of most of the maintenance inspection tasks as they move away from being manually triggered. The book is aimed at building operators as well as those building automation companies who are working continuously to digitalize building operation and maintenance procedures. The benefits are reductions in the equipment failure rate, improvements in equipment reliability, increases in equipment efficiency and extended equipment lifespan.

  •  
    1 327

    This book explores the fundamentals, recent advances, and applications of the physics of highly correlated materials. This book serves as a handbook/reference for advanced graduate students.

  • av Maksym Maksymov
    681 - 1 861

    The book covers basic approaches to the nuclear fuel state of energy reactors in the last stages of the nuclear fuel cycle, these have been developed by the authors based on Ukrainian Nuclear Power Plant (NPP) operational experience. The book starts by looking at the physical safety basis of water-water energetic reactor (WWER) nuclear fuel. It goes on to discuss modern approaches to the heat exchange modelling in nuclear power plant equipment. Next, the safety criteria when making a decision about dry storage for WWER-1000 fuel assembly are discussed. Then the effect of reactor capacity cyclic changes on energy accumulation of creep formations in fuel cladding is covered in full, along with a chapter on the analysis of WWER-1000 fuel cladding failure. Finally, the book finishes with a description of thermal safety criteria for dry storage of spent nuclear fuel.The book is essential reading for anyone concerned with NPP maintenance and safety.

  • - Sheet Metal, Piping and Plumbing
    av Joseph D'Amelio
    1 687

  • av Fredric J. Harris
    681 - 1 357

    Multirate Signal processing can improve system performance and reduce costs in applications ranging from laboratory instruments, cable modems, wireless systems, satellites, Radar, Sonar, and consumer entertainment products. This second edition continues to offer a systematic, clear, and intuitive introduction to multirate signal processing for working engineers and system designers. Significant new material and fresh concepts, including Green Signal Processing techniques have been introduced.The author uses extensive examples and figures to illustrate a wide range of multirate techniques, from basic resampling to leading-edge cascade and multi-stage filter structures. Along the way he draws on extensive research and consulting experience to introduce processing "e;tricks"e; shown to maximize performance and efficiency. Coverage includes: Effect of sampling and resampling in time and frequency domains Relationships between FIR filter specifications and filter length (# of taps) Window design and equal-ripple (Remez) design techniques Square-Root Nyquist and Half-band Filters including new enhancements Polyphase FIR filters: up-sampling, down-sampling Polyphase M-path analysis and synthesis channelizers and cascade pairs Polyphase interpolators for arbitrary sample rate changes Dyadic half-band filters, quadrature mirror filters Channel banks for multiple arbitrary bandwidths and center frequencies Comprehensive coverage of recursive all-pass filters and channelizers, non-uniform and uniform phase, mixed recursive and non-recursive Comparisons with traditional DSP designs Extensive applications coverage throughout

  • av Dr. Ioannis (Aristotle University of Thessaloniki Papaefstathiou
    1 301

    This book covers basic and advanced issues on the design of the future heterogeneous Cyber Physical Systems of Systems (CPSoS), including relevant Blockchain technologies, reconfigurable systems, advanced sensor interfaces and human-centered design processes.

  •  
    1 437

    This book covers basic information about system-level and circuit-level requirements, operation principles, key factors of considerations, and design/implementation techniques, as well as recent advances in integrated circuits and microsystems for emerging biomedical applications.

  • - The Diversity of the 21st Century Classroom
     
    1 437

    The book takes a multidisciplinary approach in looking at the problems and possible solutions that are faced by the educational professional of the 21st century when, by necessity or obligation, they face the use of ICT in their daily tasks.

  • av Tom Madsen
    681 - 1 621

    Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of Security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job, for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which is being implemented.This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focusses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

  •  
    1 447

    Advanced Control Systems: Theory and Applications provides an overview of advanced research lines in control systems as well as in design, development and implementation methodologies for perspective control systems and their components in different areas of industrial and special applications.

  • av Steven Simske
    681 - 1 437

    Text analytics consist of the statistics about a text element, which includes the word count, the word histogram, and the word frequency histogram. Most text documents of value are related to other-sometimes many other-documents, and so analytics describing the relative frequency of terms in a document compared to its peers are important for defining key words (tagging, labeling, indexing), search-responsive terms (query terms), and compressed versions of the documents (key words, summary, etc.).This clearly written text explains the functional applications of search, translation, optimization, and learning with regard to text analytics. Generation of analytics is aided by a hybrid, ensemble, or other combinatorial approach in which two or more effective analytic processes are used simultaneously, and their outputs combined to form a better "e;consensus"e;. Additional value to the preservation of the information is provided through these methods. Also, since they encompass capabilities of two or more knowledge-generating systems, they can create a "e;superset"e; of access points to the data generated. The book also describes the role of functional approaches in the testing and configuration of these systems.

  • av Bipin Singh Koranga
    1 071

  •  
    1 431

    Spreading a culture of tolerance and peace is necessary to address contemporary issues of world peace. This book aims to increase feelings of openness and respect toward others, solidarity and sharing based on a sense of security in one's own identity and capacity to recognize dimensions of being human in different cultural and social contexts.

  •  
    1 431

    This book on electronic skin takes into account not only sensing materials, but it also provides a thorough assessment of the current state of the art at system level. The book addresses embedded electronics and tactile data processing and decoding, techniques for low power embedded computing, and the communication interface.

  • av Martin (Architect Pot
    681 - 1 431

  •  
    1 431

    This book focuses on the implications of digitalization for the domain of work. The book studies the changing nature of work as well as new forms of digitally enabled organizations, work practices and cooperation. The book sheds light on the technological, economic, and political forces shaping the new world of work.

  • av Dr. Muhammad Nasir (The University of Lahore Khan
    701 - 1 431

  • av CR OLAVERRI-MONREAL
    1 431

    This book addresses issues related to the analysis of human factors in the design and evaluation of intelligent vehicles for a wide spectrum of applications and over different dimensions. Authors cover autonomous vehicles, the frameworks for analyzing automation, modelling and methods for road users' interaction such as intelligent user interfaces.

  • - Everything Intelligent Everywhere
     
    1 381

    Provides an overview of the Internet of Things - covering new ideas, concepts, research and innovation to enable the development of IoT technologies in a global context. Coverage includes research, technological innovation, validation, and deployment.

  • av Kamran Iqbal
    577 - 1 367

    Control systems are pervasive in our lives. Our homes have environmental controls. The appliances we use at home, such as the washing machine, microwave, etc. have embedded controllers. We fly in airplanes and drive automobiles, which make extensive use of control systems. The increasing automation in the past few decades has increased our reliance on control systems.A First Course in Control System Design discusses control systems design from a model-based perspective as applicable to single-input single-output systems. The emphasis in this book is on understanding and applying the techniques that enable the design of effective control systems. The book covers the time-domain and the frequency-domain design methods, as well as the design of continuous-time and discrete-time systems.Technical topics discussed in the book include: Modeling of physical systemsAnalysis of transfer function and state variable modelsControl system design via root locus Control system design in the state-spaceControl design of sampled-data systemsCompensator design via frequency response modification

  • av Luis Miguel Borges
    1 357

    Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.

  • - with Artificial Intelligence Application and Coding
    av Paul RP (Wessex Institute of Technology Hoole
    1 877

    The book addresses the current demand for a scientific approach to advanced wireless technology and its future developments, including the current move from 4G to 5G wireless systems (2020), and the future to 6G wireless systems (2030). It gives a presentation of both antennas and the adaptive signal processing.

  • av Pasquale Pagliaro
    681 - 1 447

    This book focuses on established cardiovascular principles and highlights some of the progress achieved by recent research in the cardiovascular field. The authors report the basic concepts related to the functioning of the cardiovascular system necessary for medical students to understand. To foster learning, in each chapter the fundamental points are highlighted in italics and/or bold. In addition, we have added boxes that contain some more detailed information about physiological mechanisms or clinical aspects are analyzed and described in greater detail. The book describes the structure and function of the heart and vascular system for the reader to understand how the cardiovascular system responds in both health and disease. The book conveys a unified vision of the function of the heart and the vascular system, explaining the complexity of the system that goes far beyond the integrated connection between preload, afterload and cardiac contractility. The endothelium covers the internal part of the whole cardiovascular system; therefore, endothelial physiology is treated in several chapters. Given the importance of coronary circulation in cardiac pathophysiology, this special circulation is described in detail and enriched with the most up-to-date information. Several paragraphs and boxes on clinical implications are dedicated to the principles of electrophysiology and the electrocardiogram. A space is also dedicated to myocardial ischemia/reperfusion injury and cardioprotective procedures. The book is written in a linear and simple language without compromising the scientific rigor of the various topics covered.

  • av Maribel Yasmina Santos
    687 - 1 447

    Big Data is a concept of major relevance in today's world, sometimes highlighted as a key asset for productivity growth, innovation, and customer relationship, whose popularity has increased considerably during the last years. Areas like smart cities, manufacturing, retail, finance, software development, environment, digital media, among others, can benefit from the collection, storage, processing, and analysis of Big Data, leveraging unprecedented data-driven workflows and considerably improved decision-making processes.The concept of a Big Data Warehouse (BDW) is emerging as either an augmentation or a replacement of the traditional Data Warehouse (DW), a concept that has a long history as one of the most valuable enterprise data assets. Nevertheless, research in Big Data Warehousing is still in its infancy, lacking an integrated and validated approach for designing and implementing both the logical layer (data models, data flows, and interoperability between components) and the physical layer (technological infrastructure) of these complex systems. This book addresses models and methods for designing and implementing Big Data Systems to support mixed and complex decision processes, giving special attention to BDWs as a way of efficiently storing and processing batch or streaming data for structured or semi-structured analytical problems.

  • av Medani P. Bhandari
    681 - 1 437

    In dealing with the IUCN, one must bear in mind that there never has been, and undoubtedly never will be, any other organization even remotely resembling it. Its peculiarities, subtleties and complexities are sometimes mind-boggling (Nicholson 1990 in Holdgate 1999: ix). Green Web-II investigates IUCN's role in global biodiversity conservation policy as well as in national program development in India, Pakistan, Nepal and Bangladesh. It explores how nature protection priorities and approaches are promoted or addressed by IUCN, an international organization, and how environment conservation policies are created and maintained in states with different capacities of South Asia. It also evaluates IUCN's competency in bio-diversity, climate change, nature conservation and environmental policy formulation at global, regional and country level. This study is the first detailed scholarly study on the IUCN as an organization as well as on its efforts in biodiversity conservation. This book adds to our knowledge, firstly by contributing to a small but growing body of work on the sociology of international organizations. IOs, especially International Governmental Organizations (IGOs), have long been the subject of mostly political science. Secondly, it applies a fuller sociological imagination to the study of IOs by critically exploring one of the largest and most active nature conservation organizations in the world. Thirdly, it also explores how the IUCN actually goes about building protectoral programs with individual member nations. Additionally, the book explores the recent development of the green economy (GE) concepts into IUCN's program planning today. The green economy initiative applies a people-first approach. Although the concept is relatively new, this research explores the theoretical development of a green economy and illustrates how this theory is applied in IUCN's program planning to program implementation.

  • av Sergei Petrenko
    681 - 1 447

    Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.This book contains four chapters1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.