<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:ynews="http://news.yahoo.com/rss/">
    <channel>
        <title>Nova Reader - Subject</title>
        <link>https://www.novareader.co</link>
        <description>Default RSS Feed</description>
        <language>en-us</language>
        <copyright>Newgen KnowledgeWorks</copyright>
        <item>
            <title><![CDATA[Managing the Complexity of Critical Infrastructures]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764957429042-f2a37137-4ed0-4ea3-b085-65cd41a35788/9783319510439.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783319510439</link>
            <description><![CDATA[This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) research communities, enhancing their preparedness for CI-related emergencies, while also providing expertise and technologies for other stakeholders to promote their understanding and mitigation of the consequences of CI disruptions, leading to enhanced resilience. The book collects the tutorial material developed by the authors for several courses on the modelling, simulation and analysis of CIs, representing extensive and integrated CIP expertise. It will help CI stakeholders, CI operators and civil protection authorities understand the complex system of CIs, and help them adapt to these changes and threats in order to be as prepared as possible for mitigating emergencies and crises affecting or arising from CIs.]]></description>
            <pubDate><![CDATA[2017-02-09T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Handbook of Ocean Wave Energy]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764578929127-ba8511d2-ac86-47d2-81a6-f83fd83319b0/9783319398891.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783319398891</link>
            <description><![CDATA[This book offers a concise, practice-oriented reference-guide to the field of ocean wave energy. The ten chapters highlight the key rules of thumb, address all the main technical engineering aspects and describe in detail all the key aspects to be considered in the techno-economic assessment of wave energy converters. Written in an easy-to-understand style, the book answers questions relevant to readers of different backgrounds, from developers, private and public investors, to students and researchers. It is thereby a valuable resource for both newcomers and experienced practitioners in the wave energy sector.]]></description>
            <pubDate><![CDATA[2016-12-06T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Global Business Strategy]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764578923960-dd425006-ba81-418e-adc2-5b00452d3dd7/9784431554684.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9784431554684</link>
            <description><![CDATA[This book presents theories and case studies for corporations in developed nations, including Japan, for designing strategies to maximize opportunities and minimize threats in business expansion into developing nations. The case studies featured here focus on Asia, including China and India,  and use examples of Japanese manufacturers. Five case studies are provided, including Hitachi Construction Machinery and Shiseido in China and Maruti Suzuki in India. These cases facilitate the reader’s understanding of the business environments in emerging economies. 

This volume is especially recommended for business people responsible for  international business development, particularly in China and India. In addition, the book serves as a useful resource for students in graduate-level courses in international management.]]></description>
            <pubDate><![CDATA[2015-03-24T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Cyber-Physical Systems of Systems]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764505570113-a68e94a5-e9c3-4a2b-b068-13bd55a4062f/9783319475905.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783319475905</link>
            <description><![CDATA[Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today’s infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, many embedded systems, and a great number more, strongly depend on systems-of-systems. The correct operation and continuous availability of these underlying systems-of-systems are fundamental for the functioning of our modern society.

The 8 papers presented in this book document the main insights on Cyber-Physical System of Systems (CPSoSs) that were gained during the work in the FP7-610535 European Research Project AMADEOS (acronym for Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems). It is the objective of this book to present, in a single consistent body, the foundational concepts and their relationships. These form a conceptual basis for the description and understanding of SoSs and go deeper in what we consider the characterizing and distinguishing elements of SoSs: time, emergence, evolution and dynamicity.]]></description>
            <pubDate><![CDATA[2016-12-15T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764505563875-7e164c85-c144-4fe3-b0e1-cc87b1c50bea/9783319300306.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783319300306</link>
            <description><![CDATA[Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and the effect of a given drug can be reflected by changing the Markov model. These lecture notes provide an accessible introduction to the mathematical methods needed to deal with these models. They emphasize the use of numerical methods and provide sufficient details for the reader to implement the models and thereby study the effect of various drugs.  Examples in the text include stochastic calcium release from internal storage systems in cells, as well as stochastic models of the transmembrane potential. Well known Markov models are studied and a systematic approach to including the effect of mutations is presented. Lastly, the book shows how to derive the optimal properties of a theoretical model of a drug for a given mutation defined in terms of a Markov model.]]></description>
            <pubDate><![CDATA[2016-04-18T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Bisociative Knowledge Discovery]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764495569351-37a977c1-9f1f-4fc6-972e-2d9852789e82/9783642318306.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783642318306</link>
            <description><![CDATA[Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied to originates from one domain. The focus of this book, and the BISON project from which the contributions are originating, is a network based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of finding well defined global or local patterns they wanted to find domain bridging associations which are, by definition, not well defined since they will be especially interesting if they are sparse and have not been encountered before. The 32 contributions presented in this state-of-the-art volume together with a detailed introduction to the book are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.]]></description>
            <pubDate><![CDATA[2012-06-26T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Autonomes Fahren]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764479306380-7bd99496-f87c-4af5-91b5-c436aac74e87/9783662458549.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783662458549</link>
            <description><![CDATA[Ist das voll automatisierte, autonom fahrende Auto zum Greifen nah? Testfahrzeuge und Zulassungen in den USA erwecken diesen Eindruck, werfen aber gleichzeitig viele neue Fragestellungen auf. Wie werden autonome Fahrzeuge in das aktuelle Verkehrssystem integriert? Wie erfolgt ihre rechtliche Einbettung? Welche Risiken bestehen und wie wird mit diesen umgegangen? Und welche Akzeptanz seitens der Gesellschaft sowie des Marktes kann hinsichtlich dieser Entwicklungen überhaupt erwartet werden?

Das vorliegende Buch gibt Antworten auf ein breites Spektrum dieser und weiterer Fragen. Expertinnen und Experten aus Deutschland und den USA beschreiben aus ingenieur- und gesellschaftswissenschaftlicher Sicht zentrale Themen im Zusammenhang mit der Automatisierung von Fahrzeugen im öffentlichen Straßenverkehr. Sie zeigen auf, welche „Entscheidungen“ einem autonomen Fahrzeug abverlangt werden beziehungsweise welche „Ethik“ programmiert werden muss. Die Autorinnen und Autoren diskutieren Erwartungen und Bedenken, die die individuelle wie auch die gesellschaftliche Akzeptanz des autonomen Fahrens kennzeichnen. Ein durch autonome Fahrzeuge erhöhtes Sicherheitspotenzial wird den Herausforderungen und Lösungsansätzen, die bei der Absicherung des Sicherheitskonzeptes eine Rolle spielen, gegenübergestellt. Zudem erläutern sie, welche Veränderungsmöglichkeiten und Chancen sich für unsere Mobilität und die Neuorganisation des Verkehrsgeschehens ergeben, nicht zuletzt auch für den Güterverkehr. Das Buch bietet somit eine aktuelle, umfassende und wissenschaftlich fundierte Auseinandersetzung mit dem Thema „Autonomes Fahren“.]]></description>
            <pubDate><![CDATA[2015-05-05T18:30]]></pubDate>
        </item><item>
            <title><![CDATA[Anti-fragile ICT Systems]]></title>
            <media:thumbnail url="https://storage.googleapis.com/nova-demo-unsecured-files/unsecured/content-1764479303830-fc054f0e-2103-4ece-836a-248cb9fe66ae/9783319300702.png"></media:thumbnail>
            <link>https://www.novareader.co/book/isbn/9783319300702</link>
            <description><![CDATA[This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.

The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility forclasses of events with negative impacts.]]></description>
            <pubDate><![CDATA[2016-03-21T18:30]]></pubDate>
        </item>
    </channel>
</rss>