You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. ...
The first four books in Lorelei Bell's 'Sabrina Strong Series' of urban fantasy novels, now available in one volume! Ascension: Left penniless after the death of her father, Sabrina Strong isn’t thrilled about working for the North American Vampire Association. Driven by her desire to discover the identity of the mysterious in her dreams, Sabrina is attacked on her way to the interview. Her life is narrowly saved by a passing vampire - but could he be the one that turned her mother and marked Sabrina as his own so long ago? Trill: New friends and shocking revelations await Sabrina. After she learns what her role as a sibyl means, her partner Dante puts himself at great risk to discover mor...
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
The book focuses on the different aspects of sensing technology, i.e. high reliability, adaptability, recalibration, information processing, data fusion, validation and integration of novel and high performance sensors specifically aims to monitor agricultural and environmental parameters. This book is dedicated to Sensing systems for Agricultural and Environmental Monitoring offers to variety of users, namely, Master and PhD degree students, researchers, practitioners, especially Agriculture and Environmental engineers. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.
Collision Reconstruction Methodologies - Volume 7A - The last ten years have seen explosive growth in the technology available to the collision analyst, changing the way reconstruction is practiced in fundamental ways. The greatest technological advances for the crash reconstruction community have come in the realms of photogrammetry and digital media analysis. The widespread use of scanning technology has facilitated the implementation of powerful new tools to digitize forensic data, create 3D models and visualize and analyze crash vehicles and environments. The introduction of unmanned aerial systems and standardization of crash data recorders to the crash reconstruction community have enh...
Battery Fires: Why They Happen and How They Happen was written to assist those interested in this type of incident understand how automotive fires develop, spread and the damage they cause, using both deductive and inductive reasoning. The main focus of the book resides in looking at differences in failure modes between DC and AC systems, general types of battery and electrical failure modes leading to fire, how to interpret electrical fire, determination of the primary failed part, and other skills the investigating engineer will require to perform technical failure mode analysis. However, some fires have consumed the evidence to the point where a determination cannot be made with any degree of certainty. In this instance, evidence will be quite limited, and the analysis will have its limitations and should be included in the discussion as such. In some cases, a “cause undetermined” report is all the evidence will support. Battery Fires: Why They Happen and How They Happen is a unique title which brings together the theory and the practice of correctly evaluating the root causes of unexpected and dangerous automobile fires.
Modern vehicles have electronic control units (ECUs) to control various subsystems such as the engine, brakes, steering, air conditioning, and infotainment. These ECUs (or simply ‘controllers’) are networked together to share information, and output directly measured and calculated data to each other. This in-vehicle network is a data goldmine for improved maintenance, measuring vehicle performance and its subsystems, fleet management, warranty and legal issues, reliability, durability, and accident reconstruction. The focus of Data Acquisition from HD Vehicles Using J1939 CAN Bus is to guide the reader on how to acquire and correctly interpret data from the in-vehicle network of heavy-d...
This book to offers a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus. Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance. These authors offer a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers.
This book presents the implementation of novel concepts and solutions, which allows to enhance the cyber security of administrative and industrial systems and the resilience of economies and societies to cyber and hybrid threats. This goal can be achieved by rigorous information sharing, enhanced situational awareness, advanced protection of industrial processes and critical infrastructures, and proper account of the human factor, as well as by adequate methods and tools for analysis of big data, including data from social networks, to find best ways to counter hybrid influence. The implementation of these methods and tools is examined here as part of the process of digital transformation through incorporation of advanced information technologies, knowledge management, training and testing environments, and organizational networking. The book is of benefit to practitioners and researchers in the field of cyber security and protection against hybrid threats, as well as to policymakers and senior managers with responsibilities in information and knowledge management, security policies, and human resource management and training.
Lindee has been kidnapped, leaving Sabrina racing against time - and vampires - to find her. After running out on her wedding, Sabrina flees to the Black Veil: a world where humans are objects of bloodlust and vampires reign supreme. When she receives the news of Lindee's disappeance, Sabrina is forced to make a risky deal with the legendary king of the realm: Drakulya the Impaler. But as a sinister conspiracy unfolds, has she sacrificed too much?