Narrow your search
Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Book
Towards automated restructuring of object oriented systems
Author:
ISBN: 1000009204 3866442742 Year: 2008 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

The work introduces a method for diagnosing design flaws in object oriented systems, and finding meaningful refactorings to remove such flaws. The method is based on pairing up a structural pattern that is considered pathological (e.g. a code smell or anti-pattern) with a so called design context. The design context describes the design semantics associated to the pathological structure, and the desired strategic closure for that fragment. The process is tool supported and largely automated.


Book
Die Statik im Stahlbetonbau: : ein Lehr- und Handbuch der Baustatik
Author:
Year: 1956 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Reducing the Seismic Vulnerability of Existing Buildings: Assessment and Retrofit
Authors: --- ---
ISBN: 3039212583 3039212575 Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Devastating seismic events occurring all over the world keep raising the awareness of the scientific, technical and political communities to the need of identifying assets at risk and developing more effective and cost-efficient seismic risk mitigation strategies. Significant advances in earthquake engineering research have been achieved with the rise of new technologies and techniques with potential use in risk assessment, management and mitigation. Nevertheless, there is still much to be done, particularly with regard to existing buildings, most of them built without anti-seismic provisions. The wide variety of construction and structural systems, associated with the complex behaviour of their materials, greatly limit the application of current codes and building standards to the existing building stock. To tackle this issue, there is a fundamental need for developing multidisciplinary research that can lead to the development of more sophisticated and reliable methods of analysis, as well as to improved seismic retrofitting techniques compliant with buildings conservation principles. This book intends to contribute to the aforementioned goal by stimulating the exchange of ideas and knowledge on the assessment and reduction of the seismic vulnerability of existing buildings. 10 high quality contributions authored by international experts from Italy, Portugal, Morocco, Nepal, Czech Republic and Spain are included herein. All contributions pursue the protection of existing buildings by considering the most updated methods and advanced solutions emerging from different fields of expertise.


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Masonry Buildings: Research and Practice
Author:
ISBN: 3039213741 3039213733 Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Masonry is a construction material that has been used throughout the years as a structural or non-structural component in buildings. Masonry can be described as a composite material made up of different units and diverse types of arrangements, with or without mortar, that is used in many ancient public buildings, as well as with the latest technologies being applied in construction. Research in multiple relevant fields, as well as crossing structural with non-structural needs, is crucial for understanding the qualities of existent buildings and to develop new products and construction technologies. This book addresses and promotes the discussion related to the different topics addressing the use of masonry in the construction sciences and in practice, including theory and research, numerical approaches and technical applications in new works, and repair actions and interventions in the built environment, connecting theory and application across topics from academia to industry.


Book
Seismic Assessment and Retrofit of Reinforced Concrete Structures
Authors: ---
ISBN: 3036550585 3036550577 Year: 2022 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Many constructions are built with reinforced or prestressed concrete, and most of them are designed or expected to resist earthquake actions in addition to gravity loads. To limit the effects of seismic events on reinforced or prestressed concrete structures, many attempts have been made by researchers in order to (i) improve the knowledge of the response of materials (steel bars and concrete) and members by means of laboratory tests, (ii) develop numerical and capacity models, (iii) enhance procedures for the dynamic analysis and assessment of the seismic performance of structures and (iv) suggest innovative interventions for the seismic retrofit of old and damaged reinforced or prestressed concrete structures. This Special Issue is a collection of 11 important research works that cover a wide range of problems related to the previously mentioned research fields. Both researchers and practical engineers are expected to greatly benefit from this Special Issue in view of their own work and for a better comprehension of the response of r.c. members and structures.


Book
Cultural Heritage Storytelling, Engagement and Management in the Era of Big Data and the Semantic Web
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The current Special Issue launched with the aim of further enlightening important CH areas, inviting researchers to submit original/featured multidisciplinary research works related to heritage crowdsourcing, documentation, management, authoring, storytelling, and dissemination. Audience engagement is considered very important at both sites of the CH production–consumption chain (i.e., push and pull ends). At the same time, sustainability factors are placed at the center of the envisioned analysis. A total of eleven (11) contributions were finally published within this Special Issue, enlightening various aspects of contemporary heritage strategies placed in today’s ubiquitous society. The finally published papers are related but not limited to the following multidisciplinary topics:Digital storytelling for cultural heritage;Audience engagement in cultural heritage;Sustainability impact indicators of cultural heritage;Cultural heritage digitization, organization, and management;Collaborative cultural heritage archiving, dissemination, and management;Cultural heritage communication and education for sustainable development;Semantic services of cultural heritage;Big data of cultural heritage;Smart systems for Historical cities – smart cities;Smart systems for cultural heritage sustainability.


Book
Global and International Logistics
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains 10 reviewed papers published as a Special Issue “Global and International Logistics” in the journal Sustainability, edited by Prof. Dr. Ryuichi Shibasaki, Prof. Dr. Daisuke Watanabe, and Dr. Tomoya Kawasaki. The topics of the papers contain the impact of logistics development under the China’s Belt and Road initiative (BRI) by using the improved gravity model, strategies against barriers to the BRI from a logistics and supply chain management perspective, the dynamic interaction between international logistics, and cross-border e-commerce trade, the effect of China’s restrictive programs on the international trade of waste products, the empty container repositioning problem of shipping companies with foldable containers, port capacity and connectivity improvement in the hub and feeder network in Indonesia, GHG emission scenarios for the maritime shipping sector using system dynamics, incorporating a shipping and shipbuilding market model, the emission inventory and bunker consumption from a LNG fleet from an automatic identification system database, the factors that can help select between land transport and maritime shipping in long-distance inter-regional cross-border transport, and container transport simulations in Myanmar with the global logistics intermodal network assignment model including both maritime shipping and land transport in the land-based Southeast Asia region. Some papers are related to the 8th International Conference on Transportation and Logistics (T-LOG 2020) which was held online on 6–7 September 2020 hosted by Universitas Internasional Semen Indonesia.

Listing 1 - 10 of 18 << page
of 2
>>
Sort by