Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
The work introduces a method for diagnosing design flaws in object oriented systems, and finding meaningful refactorings to remove such flaws. The method is based on pairing up a structural pattern that is considered pathological (e.g. a code smell or anti-pattern) with a so called design context. The design context describes the design semantics associated to the pathological structure, and the desired strategic closure for that fragment. The process is tool supported and largely automated.
refactoring --- static analysis --- diagnosis --- restructuring --- design flaw
Choose an application
Choose an application
Devastating seismic events occurring all over the world keep raising the awareness of the scientific, technical and political communities to the need of identifying assets at risk and developing more effective and cost-efficient seismic risk mitigation strategies. Significant advances in earthquake engineering research have been achieved with the rise of new technologies and techniques with potential use in risk assessment, management and mitigation. Nevertheless, there is still much to be done, particularly with regard to existing buildings, most of them built without anti-seismic provisions. The wide variety of construction and structural systems, associated with the complex behaviour of their materials, greatly limit the application of current codes and building standards to the existing building stock. To tackle this issue, there is a fundamental need for developing multidisciplinary research that can lead to the development of more sophisticated and reliable methods of analysis, as well as to improved seismic retrofitting techniques compliant with buildings conservation principles. This book intends to contribute to the aforementioned goal by stimulating the exchange of ideas and knowledge on the assessment and reduction of the seismic vulnerability of existing buildings. 10 high quality contributions authored by international experts from Italy, Portugal, Morocco, Nepal, Czech Republic and Spain are included herein. All contributions pursue the protection of existing buildings by considering the most updated methods and advanced solutions emerging from different fields of expertise.
brittle failure --- earthquakes scenarios --- n/a --- FRP --- joints --- neural networks --- pushover --- seismic performance --- infilled frames --- carpentry halved joint --- inter-storey drift --- safety assessment --- seismic risk --- high-rise RC --- discrete elements --- seismic vulnerability assessment --- limit analysis --- seismic capacity --- Geo-hazard site effects --- automatic protocols --- numerical modelling --- seismic retrofit --- retrofit --- numerical modeling --- Imzouren --- finite element modelling --- Expected damage scenario --- masonry structures --- large-scale vulnerability analysis --- seismic restoration --- vulnerability assessment --- earthquakes --- unreinforced masonry structure --- frame-infill interaction --- CARTIS form --- seismic analysis --- nonlinear static analysis --- Seismic attenuation law --- seismic behavior --- seismic retrofitting --- damage assessment --- capacity curves --- energy dissipation --- mobile-device applications --- in situ structural diagnosis --- vulnerability index --- Vulnerability assessment --- GIS mapping --- Gorkha earthquake
Choose an application
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a
Choose an application
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a
Choose an application
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a
Choose an application
Masonry is a construction material that has been used throughout the years as a structural or non-structural component in buildings. Masonry can be described as a composite material made up of different units and diverse types of arrangements, with or without mortar, that is used in many ancient public buildings, as well as with the latest technologies being applied in construction. Research in multiple relevant fields, as well as crossing structural with non-structural needs, is crucial for understanding the qualities of existent buildings and to develop new products and construction technologies. This book addresses and promotes the discussion related to the different topics addressing the use of masonry in the construction sciences and in practice, including theory and research, numerical approaches and technical applications in new works, and repair actions and interventions in the built environment, connecting theory and application across topics from academia to industry.
artificial neural network --- n/a --- regional constructive cultures --- neural networks --- cracks in shells --- infilled frames --- seismic assessment --- no-fines lightweight concrete --- unreinforced load-bearing masonry --- Nepal earthquake --- dynamic --- survey damage assessment --- masonry infills and partitions --- old urban center --- in situ test campaign --- repair costs due to infills --- static analysis --- AEM --- non-linear analysis --- mechanical properties --- numerical modelling --- granite masonry --- high-rise reinforced concrete structure --- damage analysis --- seismic rehabilitation --- structural restoration --- strengthening --- stone masonry --- masonry infill walls --- masonry characterization --- hysteresis --- ambient vibration test --- weak mortar --- seismic actions --- masonry --- bilinear approximation --- load-bearing masonry walls --- database --- flat-jack testing --- masonry shell --- Greco-Roman construction --- seismic retrofitting --- stone masonry wallets --- linear and non-linear numerical tools --- foundation settlement --- RC buildings --- observed performance --- capacity curve --- heritage construction --- masonry building --- shear-sliding tests --- post-earthquake surveys --- strengthening intervention --- wall
Choose an application
Many constructions are built with reinforced or prestressed concrete, and most of them are designed or expected to resist earthquake actions in addition to gravity loads. To limit the effects of seismic events on reinforced or prestressed concrete structures, many attempts have been made by researchers in order to (i) improve the knowledge of the response of materials (steel bars and concrete) and members by means of laboratory tests, (ii) develop numerical and capacity models, (iii) enhance procedures for the dynamic analysis and assessment of the seismic performance of structures and (iv) suggest innovative interventions for the seismic retrofit of old and damaged reinforced or prestressed concrete structures. This Special Issue is a collection of 11 important research works that cover a wide range of problems related to the previously mentioned research fields. Both researchers and practical engineers are expected to greatly benefit from this Special Issue in view of their own work and for a better comprehension of the response of r.c. members and structures.
Technology: general issues --- History of engineering & technology --- seismic retrofitting --- mainshock-damaged RC frame --- soft steel damper --- seismic performance --- mainshock-aftershock seismic sequence --- retrofitting --- modular --- finite element analysis --- flexural behavior --- ductility --- RC columns --- strengthening --- direct fastening --- steel jackets --- design procedure --- precast reinforced concrete deep beam --- experimental study --- finite element method (FEM) --- RC frames --- brick infills --- prior damage --- finite element analyses --- seismic joint --- FRP --- RC corroded columns --- localised corrosion --- numerical analyses --- modelling strategies --- cyclic actions --- seismic isolation --- asymmetric building --- mode-adaptive bidirectional pushover analysis (MABPA) --- seismic retrofit --- momentary energy input --- RC-framed skin --- seismic assessment --- nonlinear static analysis --- existing RC buildings --- retrofitting intervention --- column removal --- non-linear analysis --- progressive collapse --- reinforced concrete frame --- seismic response --- optimization --- curtailed shear wall --- buckling-restrained brace --- genetic algorithm --- seismic upgrading --- RC buildings --- industrial buildings --- industrial heritage --- steel exoskeletons --- photovoltaic plants --- n/a
Choose an application
The current Special Issue launched with the aim of further enlightening important CH areas, inviting researchers to submit original/featured multidisciplinary research works related to heritage crowdsourcing, documentation, management, authoring, storytelling, and dissemination. Audience engagement is considered very important at both sites of the CH production–consumption chain (i.e., push and pull ends). At the same time, sustainability factors are placed at the center of the envisioned analysis. A total of eleven (11) contributions were finally published within this Special Issue, enlightening various aspects of contemporary heritage strategies placed in today’s ubiquitous society. The finally published papers are related but not limited to the following multidisciplinary topics:Digital storytelling for cultural heritage;Audience engagement in cultural heritage;Sustainability impact indicators of cultural heritage;Cultural heritage digitization, organization, and management;Collaborative cultural heritage archiving, dissemination, and management;Cultural heritage communication and education for sustainable development;Semantic services of cultural heritage;Big data of cultural heritage;Smart systems for Historical cities – smart cities;Smart systems for cultural heritage sustainability.
Film, TV & radio --- 3D modeling --- 3D reconstruction --- event detection --- Twitter --- spectral clustering --- cultural heritage --- social media --- news --- journalism --- semantic analysis --- big data --- data center --- digital marketing --- eco-friendly --- environmental communication --- green websites --- green culture --- green hosting --- sustainability --- software sustainability --- multimedia tools --- static analysis --- evolution analytics --- interactive documentary --- audience engagement --- digital storytelling --- intangible heritage --- media users’ engagement --- marine heritage --- biocultural heritage --- heritage management --- heritage communication --- digital narrative --- Instagram --- UNESCO --- marine protected areas of outstanding universal value --- soundscapes --- audiovisual heritage --- semantic audio --- data-driven storytelling --- content crowdsourcing --- requirements engineering --- authoring tools --- 3D content --- IEEE 830 standard --- semantic indexing --- text classification --- Greek literature --- TextRank --- BERT --- smart cities --- energy transition --- Évora --- POCITYF --- relation extraction --- distant supervision --- deep neural networks --- Transformers --- Greek NLP --- literary fiction --- metadata extraction --- Katharevousa --- n/a --- media users' engagement --- Évora
Choose an application
This book contains 10 reviewed papers published as a Special Issue “Global and International Logistics” in the journal Sustainability, edited by Prof. Dr. Ryuichi Shibasaki, Prof. Dr. Daisuke Watanabe, and Dr. Tomoya Kawasaki. The topics of the papers contain the impact of logistics development under the China’s Belt and Road initiative (BRI) by using the improved gravity model, strategies against barriers to the BRI from a logistics and supply chain management perspective, the dynamic interaction between international logistics, and cross-border e-commerce trade, the effect of China’s restrictive programs on the international trade of waste products, the empty container repositioning problem of shipping companies with foldable containers, port capacity and connectivity improvement in the hub and feeder network in Indonesia, GHG emission scenarios for the maritime shipping sector using system dynamics, incorporating a shipping and shipbuilding market model, the emission inventory and bunker consumption from a LNG fleet from an automatic identification system database, the factors that can help select between land transport and maritime shipping in long-distance inter-regional cross-border transport, and container transport simulations in Myanmar with the global logistics intermodal network assignment model including both maritime shipping and land transport in the land-based Southeast Asia region. Some papers are related to the 8th International Conference on Transportation and Logistics (T-LOG 2020) which was held online on 6–7 September 2020 hosted by Universitas Internasional Semen Indonesia.
Technology: general issues --- Belt and Road Initiative --- New Silk Road --- One Belt One Road --- international logistics networks --- Nominal Group Technique --- scenario analysis --- global logistics simulation --- intermodal freight transport network --- economic corridor --- Myanmar --- terrestrial ASEAN --- Greater Mekong Subregion --- East–West Corridor --- Southern Corridor --- Dawei port --- GLINS model --- waste plastic --- used paper --- import ban --- import license --- international waste trade --- liquified natural gas (LNG) --- Automatic Identification System (AIS) --- spatial analysis --- greenhouse gases (GHGs) --- bunker --- emissions --- land transport --- cross-border land corridor --- Tobit model --- international logistics --- cross-border e-commerce trade --- panel vector error correction model --- sustainable development --- logistics development level --- international trade --- gravity model --- China --- the Belt and Road Initiative --- GHG emission measures --- international shipping --- system dynamics --- scenario planning --- deceleration operation --- energy efficiency design index --- LNG fuel --- zero-emission ships --- container port --- connectivity --- investment --- port cluster --- maritime container shipping --- empty container repositioning --- foldable containers --- Pacific Islands --- static analysis --- consecutive analysis --- demand fluctuation --- n/a --- East-West Corridor
Listing 1 - 10 of 18 | << page >> |
Sort by
|