You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
I have long had an interest in the life sciences, but have had few opportunities to indulge that interest in my professional activities. It has only been through simulation that those opportunities have arisen. Some of my most enjoyable classes were those I taught to students in the life sciences, where I attempted to show them the value of simulation to their discipline. That there is such a value cannot be questioned. Whether you are interested in population ecology, phar macokinetics, the cardiovascular system, or cell interaction, simulation can play a vital role in explaining the underlying processes and in enhancing our understanding of these processes. This book comprises an excellent...
First multi-year cumulation covers six years: 1965-70.
This introduction and textbook familiarizes engineers with the use of mathematical and computational modeling and simulation in a way that develops their understanding of the solution characteristics of a broad class of real-world problems. The relevant basic and advanced methodologies are explained in detail, with special emphasis on ill-defined problems. Some fifteen simulation systems are presented on the language and the logical level. Moreover, the reader also can accumulate an experiential overview by studying the wide variety of case studies spanning much of science and engineering. The latter are briefly described within the book but their full versions as well as some simulation software demos are available on the Web. The book can be used for courses on various levels as well as for self-study. Advanced sections are identified and can be skipped in a first reading or in undergraduate courses.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous ...
This comprehensive textbook/reference provides an in-depth overview of the key aspects of transportation analysis, with an emphasis on modeling real transportation systems and executing the models. Topics and features: presents comprehensive review questions at the end of each chapter, together with detailed case studies, useful links, references and suggestions for further reading; supplies a variety of teaching support materials at the book’s webpage on Springer.com, including a complete set of lecture slides; examines the classification of models used for multimodal transportation systems, and reviews the models and evaluation methods used in transportation planning; explains traffic assignment to road networks, and describes computer simulation integration platforms and their use in the transportation systems sector; provides an overview of transportation simulation tools, and discusses the critical issues in the design, development and use of the simulation models.
This book presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. Relevant case studies are also provided, to help the reader to master the interdisciplinary material. Features: includes self-test exercises in each chapter, together with a glossary; offers a variety of teaching support materials at an associated website, including a comprehensive set of slides and lecture videos; presents a brief overview of the study of systems, and embedded computing systems, before defining CPS; introduces the concepts of the Internet of Things, and ubiquitous (or pervasive) computing; reviews the design challenges of CPS, and their impact on systems and software engineering; describes the ideas behind Industry 4.0 and the revolutions in digital manufacturing, including smart and agile manufacturing, as well as cybersecurity in manufacturing; considers the social impact of the changes in skills required by the globalized, digital work environment of the future.
The book introduces the concept of ‘smart technologies’, especially ‘Internet of Things’ (IoT), and elaborates upon various constituent technologies, their evolution and their applications to various challenging problems in society. It then presents research papers and case studies based upon inception, application and implementation of IoT-based smart technologies for various application areas from some of the most technologically conservative domains like agriculture and farming to the most advanced areas such as automobiles, financial transactions and industrial applications. The book contents is thus applicable not only to academic researcher, but also to interested readers from ...
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover al...
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something in...