26 results on '"Acken, J."'
Search Results
2. Integrated cybersecurity for metaverse systems operating with artificial intelligence, blockchains, and cloud computing.
- Author
-
Radanliev, Petar
- Subjects
ARTIFICIAL intelligence ,SHARED virtual environments ,CLOUD computing ,BLOCKCHAINS ,TECHNOLOGICAL innovations - Abstract
In the ever-evolving realm of cybersecurity, the increasing integration of Metaverse systems with cutting-edge technologies such as Artificial Intelligence (AI), Blockchain, and Cloud Computing presents a host of new opportunities alongside significant challenges. This article employs a methodological approach that combines an extensive literature review with focused case study analyses to examine the changing cybersecurity landscape within these intersecting domains. The emphasis is particularly on the Metaverse, exploring its current state of cybersecurity, potential future developments, and the influential roles of AI, blockchain, and cloud technologies. Our thorough investigation assesses a range of cybersecurity standards and frameworks to determine their effectiveness in managing the risks associated with these emerging technologies. Special focus is directed towards the rapidly evolving digital economy of the Metaverse, investigating how AI and blockchain can enhance its cybersecurity infrastructure whilst acknowledging the complexities introduced by cloud computing. The results highlight significant gaps in existing standards and a clear necessity for regulatory advancements, particularly concerning blockchain's capability for self-governance and the earlystage development of the Metaverse. The article underscores the need for proactive regulatory involvement, stressing the importance of cybersecurity experts and policymakers adapting and preparing for the swift advancement of these technologies. Ultimately, this study offers a comprehensive overview of the current scenario, foresees future challenges, and suggests strategic directions for integrated cybersecurity within Metaverse systems utilising AI, blockchain, and cloud computing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Adaptive Threshold Tuning-based Load Balancing (ATTLB) for Cost Minimization in Cloud Computing.
- Author
-
Khoshaim, Lama S.
- Published
- 2024
- Full Text
- View/download PDF
4. ¿Qué forma debe tener una iglesia? A propósito de algunas reflexiones de Luis Moya.
- Author
-
Fernández-Cobián, Esteban
- Abstract
Copyright of Revista AUS is the property of Revista AUS and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. DEVELOPMENT OF DAG BLOCKCHAIN MODEL.
- Author
-
Tokhmetov, Akylbek, Lee, Vyacheslav, and Tanchenko, Liliya
- Subjects
BLOCKCHAINS ,DIRECTED graphs ,SCALABILITY ,PYTHON programming language ,CRYPTOGRAPHY - Abstract
In this study the authors present an innovative approach to resolving scalability and efficiency challenges in blockchain technology through the integration of Directed Acyclic Graphs (DAGs). This approach helps to overcome the limitations of traditional blockchain systems, particularly in transaction processing. The classic blockchain has some problems as slow transaction processing and poor scalability. The authors offer Directed Acyclic Graph (DAG) as a scalable and energy-efficient alternative. The paper outlines the development of a DAG-based blockchain model, utilizing Python and Flask alongside the Ed25519 cryptographic curve. It conducts a comparative analysis of DAG with traditional consensus mechanisms like Proof of Work and Proof of Stake, underscoring the efficiency and security benefits of employment of DAG. The research methodology includes an extensive literature review and the construction of a practical model to demonstrate DAG's applicability in blockchain networks. Particularly notable is the exploration of DAG's potential in Internet of Things (IoT) ecosystems, addressing critical issues such as energy inefficiency and network communication challenges in existing consensus algorithms. The authors calculated the performance of the model and compared it with similar models on several evaluation criteria. The simulation results of our proposed model show an improvement in performance and security by minimizing end-to-end delay, time cost, energy consumption, and throughput. The model eliminates the limitations of classic blockchain systems, such as high latency and low scalability. It structures transactions and blocks as a DAG, which provides fast validation and high scalability without compromising security. The research demonstrates the transformative implications of DAG for advancing blockchain technology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. THE SPIRIT OF VATICAN II: THE IDEALIST ASPECTS OF LITURGICAL ARCHITECTURE IN EUROPE.
- Author
-
KATONA, Vilmos
- Subjects
VATICAN Council (2nd : 1962-1965) ,CATHOLIC liturgy ,COMMUNITIES ,CHURCH work ,CLERGY ,TWENTIETH century ,CHURCH buildings ,CHURCH architecture - Abstract
The purpose of this study is to provide a comprehensive overview of the "idealist" intellectual workshops behind the 20th-century liturgical architecture before and after the Second Vatican Council. These workshops established their concepts on the intriguingly historic presumption that, in order to refresh the Catholic liturgy, one must seek and return to the origins of Christianity. In other words, their worldview was characterized by the spirit of ressourcement, which was one of the great motivators of the new liturgical paradigm brought about by 1962. Ressourcement had both monastic and secular aspects to the invocation - or recreation - of the early apostolic communities by means of new spatial and contextual programs in contemporary church architecture. These programs were conceptually compound, and were often guided or implemented by the clergy itself. The study also sheds light on some of the 21th-century interpretations and the survival of the same ideas in today's architectural culture. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Manabe's Radiative–Convective Equilibrium.
- Author
-
Jeevanjee, Nadir, Held, Isaac, and Ramaswamy, V.
- Subjects
NOBEL Prize in Physics ,RADIATIVE transfer ,HUMIDITY ,EQUILIBRIUM ,GREENHOUSE gases ,CLIMATE sensitivity - Abstract
Syukoro (Suki) Manabe's Nobel Prize in Physics was awarded largely for his early work on one-dimensional models of "radiative–convective equilibrium" (RCE), which produced the first credible estimates of Earth's climate sensitivity. This article reviews that work and tries to identify those aspects that make it so distinctive. We argue that Manabe's model of RCE contained three crucial ingredients. These are (i) a tight convective coupling of the surface to the troposphere, (ii) an assumption of fixed relative humidity rather than fixed absolute humidity, and (iii) a sufficiently realistic representation of greenhouse gas radiative transfer. Previous studies had separately identified these key ingredients, but none had properly combined them. We then discuss each of these ingredients in turn, highlighting how subsequent research in the intervening decades has only cemented their importance for understanding global climate change. We close by reflecting on the elegance of Manabe's approach and its lasting value. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. The master narrative of older employees in changing workplaces.
- Author
-
Niemi, Tuukka and Komp-Leukkunen, Kathrin
- Subjects
AIRLINE industry personnel ,SOCIAL services ,OLDER people ,POSTAL service - Abstract
Purpose: Interest in older employees increases in times of population ageing. Previous research exploring the situation has underlined older employees' struggle with workplace changes. However, it has not explored their master narrative – the socially shared narrative about older employees that steers behaviour. This study explores this narrative and its differences across changing workplaces. It draws on Lyotard's suggestion that master narratives disintegrate in post-modern societies. Design/methodology/approach: This study conducts focus groups among older Finnish employees of an airline, postal service and social care. These groups experienced different kinds of workplace changes, namely mass layoffs, digitalisation and restructuring. The focus groups highlight the individuals' shared narratives, thereby pinpointing the master narrative. Findings: The master narrative describes how simultaneous changes at the workplace and in their health lead older employees to look for ways to exit their jobs. This narrative is largely stable across workplaces, showing no disintegration but some variation. Originality/value: This is the first study on the master narrative of older employees and its disintegration. To the authors' knowledge, it is also the first study to use focus groups to explore a master narrative. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Combining informetrics and trend analysis to understand past and current directions in electronic design automation.
- Author
-
Curiac, Christian-Daniel and Doboli, Alex
- Abstract
There has been increasing interest in the study of research communities with the goal of optimizing their outcomes and impact. While current methods can predict future trends, they offer little insight about the causes of the trends. However, causal insight is important for strategic decision making to improve a community. This paper presents a new method to predict the possible causes for inefficiencies in a community by relating them to disconnections between trends, like trends in the number of publications, patents, citations, and so on. The method combines traditional scientometric and webometric metrics and metric predictions with a recent model for trend analysis in a community. The proposed method was used to analyze electronic design automation (EDA) domain. The analysis showed intriguing disconnections between the trends of the number of papers, number of granted patents, and impact of its main publications. The analysis suggests a slightly decreasing impact and visibility of EDA, while having less novel, commonly-accepted knowledge in the area. The gained insight suggests three possible strategic decisions to improve EDA community: avoiding to ignore new ideas, reducing the complexity of framed problems, and keeping a minimal gap between real-life needs and academic solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing.
- Author
-
Saidi, Ahmed, Nouali, Omar, and Amira, Abdelouahab
- Subjects
INFORMATION sharing ,ACCESS control ,INTERNET of things ,PRIVACY - Abstract
Attribute-based encryption (ABE) is an access control mechanism that ensures efficient data sharing among dynamic groups of users by setting up access structures indicating who can access what. However, ABE suffers from expensive computation and privacy issues in resource-constrained environments such as IoT devices. In this paper, we present SHARE-ABE, a novel collaborative approach for preserving privacy that is built on top of Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Our approach uses Fog computing to outsource the most laborious decryption operations to Fog nodes. The latter collaborate to partially decrypt the data using an original and efficient chained architecture. Additionally, our approach preserves the privacy of the access policy by introducing false attributes. Furthermore, we introduce a new construction of a collaboration attribute that allows users within the same group to combine their attributes while satisfying the access policy. Experiments and analyses of the security properties demonstrate that the proposed scheme is secure and efficient especially for resource-constrained IoT devices. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. A Parallel Fuzzy Load Balancing Algorithm for Distributed Nodes Over a Cloud System.
- Author
-
Hamdani, Mostefa, Aklouf, Youcef, and Bouarara, Hadj Ahmed
- Published
- 2022
- Full Text
- View/download PDF
12. "Mine Works Better": Examining the Influence of Embodiment in Virtual Reality on the Sense of Agency During a Binary Motor Imagery Task With a Brain-Computer Interface.
- Author
-
Ziadeh, Hamzah, Gulyas, David, Nielsen, Louise Dørr, Lehmann, Steffen, Nielsen, Thomas Bendix, Kjeldsen, Thomas Kim Kroman, Hougaard, Bastian Ilsø, Jochumsen, Mads, and Knoche, Hendrik
- Subjects
BRAIN-computer interfaces ,VIRTUAL reality ,MOTOR imagery (Cognition) ,STROKE rehabilitation ,AGENT (Philosophy) - Abstract
Motor imagery-based brain-computer interfaces (MI-BCI) have been proposed as a means for stroke rehabilitation, which combined with virtual reality allows for introducing game-based interactions into rehabilitation. However, the control of the MI-BCI may be difficult to obtain and users may face poor performance which frustrates them and potentially affects their motivation to use the technology. Decreases in motivation could be reduced by increasing the users' sense of agency over the system. The aim of this study was to understand whether embodiment (ownership) of a hand depicted in virtual reality can enhance the sense of agency to reduce frustration in an MI-BCI task. Twenty-two healthy participants participated in a within-subject study where their sense of agency was compared in two different embodiment experiences: 1) avatar hand (with body), or 2) abstract blocks. Both representations closed with a similar motion for spatial congruency and popped a balloon as a result. The hand/blocks were controlled through an online MI-BCI. Each condition consisted of 30 trials of MI-activation of the avatar hand/blocks. After each condition a questionnaire probed the participants' sense of agency, ownership, and frustration. Afterwards, a semi-structured interview was performed where the participants elaborated on their ratings. Both conditions supported similar levels of MI-BCI performance. A significant correlation between ownership and agency was observed (r = 0.47, p = 0.001). As intended, the avatar hand yielded much higher ownership than the blocks. When controlling for performance, ownership increased sense of agency. In conclusion, designers of BCI-based rehabilitation applications can draw on anthropomorphic avatars for the visual mapping of the trained limb to improve ownership. While not While not reducing frustration ownership can improve perceived agency given sufficient BCI performance. In future studies the findings should be validated in stroke patients since they may perceive agency and ownership differently than able-bodied users. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Nonuniform Clustering of Wireless Sensor Network Node Positioning Anomaly Detection and Calibration.
- Author
-
Lu, Biao and Liu, Wansu
- Subjects
WIRELESS sensor networks ,WIRELESS sensor nodes ,ANOMALY detection (Computer security) ,MAXIMUM likelihood statistics ,ALGORITHMS ,HIERARCHICAL clustering (Cluster analysis) - Abstract
In order to detect and correct node localization anomalies in wireless sensor networks, a hierarchical nonuniform clustering algorithm is proposed. This paper designs a centroid iterative maximum likelihood estimation location algorithm based on nonuniformity analysis, selects the nonuniformity analysis algorithm, gives the flowchart of node location algorithm, and simulates the distribution of nodes with MATLAB. Firstly, the algorithm divides the nodes in the network into different network levels according to the number of hops required to reach the sink node. According to the average residual energy of nodes in each layer, the sink node selects the nodes with higher residual energy in each layer of the network as candidate cluster heads and selects a certain number of nodes with lower residual energy as additional candidate cluster heads. Then, at each level, the candidate cluster heads are elected to produce the final cluster heads. Finally, by controlling the communication range between cluster head and cluster members, clusters of different sizes are formed, and clusters at the level closer to the sink node have a smaller scale. By simulating the improved centroid iterative algorithm, the values of the optimal iteration parameters α and η are obtained. Based on the analysis of the positioning errors of the improved centroid iterative algorithm and the maximum likelihood estimation algorithm, the value of the algorithm conversion factor is selected. Aiming at the problem of abnormal nodes that may occur in the process of ranging, a hybrid node location algorithm is further proposed. The algorithm uses the ℓ 2 , 1 norm to smooth the structured anomalies in the ranging information and realizes accurate positioning while detecting node anomalies. Experimental results show that the algorithm can accurately determine the uniformity of distribution, achieve good positioning effect in complex environment, and detect abnormal nodes well. In this paper, the hybrid node location algorithm is extended to the node location problem in large-scale scenes, and a good location effect is achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. Nuclear Weapons and Sustainability: Can We Have Both?
- Author
-
McGowan, Alan H.
- Subjects
NUCLEAR weapons ,SCIENCE conferences ,NUCLEAR energy ,WEAPONS of mass destruction ,ATOMIC bomb ,SUSTAINABLE urban development - Abstract
His I Getting to Zero i contains nuggets, including this: "The exceptionally eloquent personal statement by General George Lee Butler, former Commander-in-Chief of the U.S. Strategic Command and a member of the Canberra Commission, to the State of the World Forum in October 1996, in which he explains how his 30-year career with U.S. nuclear forces - first implementing this country's nuclear weapon policies and later helping shape and defend them - led him finally to the conclusion that those policies must be abandoned and the nuclear weapons themselves abolished."[48] In fact, the Treaty on the Prohibition of Nuclear Weapons, adopted by the United Nations on July 7, 2017, just came into force on January 22, 2021, with the number of signatory states reaching 86.[49],[50] It remains largely symbolic, however, since none of the nuclear weapon states and none of the NATO members with the exception of the Netherlands are signatories to this treaty. The treaty allows nuclear-weapons states, those that had built and tested atomic weapons before January 1967, to continue to retain the nuclear weapon, in return for which they will share information on the peaceful uses of nuclear energy to the non-nuclear-weapon states. B. Derosa and A. Nicolas, "The President and Nuclear Weapons: Authorities, Limits, and Process", I NTI i (2019), http://www.nti.org 45 D. French, "We Have Enough Checks on the President's Power to Order a Nuclear Strike", I National Review i (2017), https://www.nationalreview.com/corner/we-have-enough-checks-presidents-power-order-nuclear-strike 46 E. Eaves, "Why Is America Getting a New $100 Billion Nuclear Weapon?". [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF
15. Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
- Author
-
Nirmala, B. Vijaya and Selvaraj, K.
- Published
- 2024
- Full Text
- View/download PDF
16. Künstliche Intelligenz für das Wissensmanagement von sicherheitskritischen IT-Projekten : Ontologiegestütztes Case-based Reasoning zur 'intelligenten' Wiederverwendung von Erfahrungswissen
- Author
-
Ganen Sethupathy and Ganen Sethupathy
- Abstract
Die intelligente Wiederverwendung von Erfahrungswissen in sicherheitskritischen IT-Projekten, das üblicherweise in natürlichsprachlicher Form vorliegt, beispielsweise in Projektberichten, stellt eine Herausforderung in der betrieblichen Praxis dar. An der Schnittstelle von Betriebswirtschaftslehre, Wirtschaftsinformatik und Kerninformatik werden für eine mögliche Lösung drei bisher getrennte Themengebiete integriert: Projektmanagement und Wissensmanagement aus betriebswirtschaftlicher Perspektive sowie Künstliche Intelligenz (KI). Zur Ermöglichung dieser intelligenten Wiederverwendung von Erfahrungswissen werden etablierte Stränge der KI-Forschung, nämlich Ontologien und Case-based Reasoning, genutzt. Obwohl diese Ansätze aus wissenschaftlicher Sicht nicht völlig neu sind, wurden sie betriebswirtschaftlich bisher nur begrenzt erforscht, insbesondere im Kontext von Projekt- und Wissensmanagement. Gleichzeitig wird'wissenschaftliches Neuland'betreten, indem Instrumente der Word2Vec-Technik für die Ähnlichkeitsermittlung zwischen alten und neuen Projekten verwendet werden. Auf diese Weise werden KI-Technologien aus der GOFAI-Sphäre ('Good Old Fashioned Artificial Intelligence') und der'moderneren'KI-Forschung zu Neuronalen Netzen verknüpft, um die effektive Wiederverwendung von Erfahrungswissen aus sicherheitskritischen IT-Projekten zu ermöglichen.
- Published
- 2024
17. Innovations in Modern Cryptography
- Author
-
Brij B. Gupta, Deepak Kalra, Ammar Almomani, Brij B. Gupta, Deepak Kalra, and Ammar Almomani
- Abstract
In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and frequency, jeopardizing sensitive information, financial assets, and critical infrastructure. Amidst this escalating threat landscape, there's a pressing need for comprehensive solutions to safeguard digital assets and ensure the integrity, confidentiality, and availability of data. Traditional security measures are proving inadequate in the face of evolving cyber threats, necessitating innovative approaches to cybersecurity. Innovations in Modern Cryptography emerges as a solution to address the complex cybersecurity challenges of the digital age. This comprehensive handbook offers a deep dive into cutting-edge cryptographic techniques, algorithms, and applications that are reshaping the landscape of cybersecurity. By exploring advanced topics such as post-quantum cryptography, homomorphic encryption, and secure multi-party computation, the book equips readers with the knowledge and tools needed to mitigate cyber risks and protect sensitive data effectively. With contributions from leading experts in the field, this book is a valuable resource for cybersecurity professionals, researchers, educators, and students. By providing insights into emerging cryptographic solutions, practical applications, and future directions, the book empowers readers to stay ahead of cyber threats and adopt proactive security measures. Through its multidimensional approach and comprehensive coverage of cryptographic advancements, Innovations in Modern Cryptography paves the way for a more secure and resilient digital future.
- Published
- 2024
18. Project Management in Cloud Applications
- Author
-
Pramod Chandra P. Bhatt, Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, and Naresh Kumar Sehgal
- Subjects
- Project management, Cloud computing
- Abstract
Cloud Computing has been in use for several decades now, but the art and science of delivering Cloud based products is still shrouded in mystery. This book shines new light on how to deliver projects on time and within budget. The authors discuss the theory and practices of software engineering as applied to successful project execution, with real, Cloud-based products.
- Published
- 2024
19. Introduction to Machine Learning with Security : Theory and Practice Using Python in the Cloud
- Author
-
Pramod Gupta, Naresh Kumar Sehgal, John M. Acken, Pramod Gupta, Naresh Kumar Sehgal, and John M. Acken
- Subjects
- Cooperating objects (Computer systems), Machine learning, Cloud Computing
- Abstract
This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying infrastructure. The authors emphasize fundamentals and best practices for using AI and ML in a dynamic infrastructure with cloud computing and high security, preparing readers to select and make use of appropriate techniques. Important topics are demonstrated using real applications and case studies.
- Published
- 2024
20. Contrasts in Command : The Battle of Fair Oaks, May 31 - June 1, 1862
- Author
-
Victor Vignola and Victor Vignola
- Subjects
- Fair Oaks, Battle of, Va., 1862
- Abstract
The bloody two-day battle was fought on the doorstep of the Confederate capital. It was the first major combat in the Eastern Theater since Bull Run/Manassas almost a year earlier, left more than 11,000 casualties in its wake, and cost the primary Southern field army its commander. The possession of Richmond hung in its balance. Yet, almost nothing has been written about Seven Pines/Fair Oaks. Victor Vignola's Contrasts in Command: The Battle of Fair Oaks, May 31–June 1, 1862, which focuses primarily on the Fair Oaks portion of the battle, is a major contribution to the historiography of the war.Maj. Gen. George B. McClellan marched his Army of the Potomac up the Virginia Peninsula during the early spring of 1862 and placed his inexperienced IV Corps at the tip of the spear south of the flood-prone Chickahominy River. McClellan's opponent Joe Johnston took the opportunity to strike and crafted an overly complex attack plan for his Virginia army to crush the exposed corps. A series of bungled marches, piecemeal attacks, and a lack of assertive leadership doomed the Southern plan. One of the wounded late in the day on May 31 was Johnston, whose injury led to the appointment of Robert E. Lee to take his place—a decision that changed the course of the entire Civil War.Vignola's use of primary and archival sources, many of which have never been used, helped craft a wholly original tactical and leadership study that directly challenges conventional accounts.His stunning reassessment has led to renewed interest in Fair Oaks and the acquisition of a significant parcel of land by the American Battlefield Trust. Contrasts in Command: The Battle of Fair Oaks, May 31–June 1, 1862, will be hailed as one of the most important tactical studies ever published.
- Published
- 2023
21. Applications of Artificial Intelligence in Wireless Communication Systems
- Author
-
Karan Kumar and Karan Kumar
- Subjects
- Wireless communication systems, Artificial intelligence
- Abstract
'This book will provide chapters that include applications of artificial intelligence for the optimization of wireless communication systems, including channel models, channel state estimation, beamforming, codebook design, signal processing, etc. It will be extensive work in this particular domain rather than in abstract form. It will explore not just the theoretical aspects but also the practical implementation of this. The main objective of this book is to concise or to actually come up with something that should be a collection of recent research or advances in the research happening in the field. As per the recent advancement, this is one of the most exciting topic'--
- Published
- 2023
22. From the Mountains to the Bay : The War in Virginia, January-May 1862
- Author
-
Ethan S. Rafuse and Ethan S. Rafuse
- Abstract
From January to July of 1862, the armies and navies of the Union and Confederacy conducted an incredibly complex and remarkably diverse range of operations in the Commonwealth of Virginia. Under the direction of leaders like Thomas “Stonewall” Jackson, George McClellan, Joseph E. Johnston, John Rodgers, Robert E. Lee, Franklin Buchanan, Irvin McDowell, and Louis M. Goldsborough, men of the Union and Confederate armed forces marched over mountains and through shallow valleys, maneuvered on and along great tidal rivers, bridged and waded their tributaries, battled malarial swamps, dug trenches and constructed fortifications, and advanced and retreated in search of operational and tactical advantage.In the course of these operations, the North demonstrated it had learned quite a bit from its setbacks of 1861 and was able to achieve significant operational and tactical success on both land and sea. This enabled Union arms to bring a considerable portion of Virginia under Federal control—in some cases temporarily and in others permanently. Indeed, at points during the spring and early summer of 1862, it appeared the North just might succeed in bringing about the defeat of the rebellion before the year was out.A sweeping study of the operations on land and sea, From the Mountains to the Bay is the only modern scholarly work that looks at the operations that took place in Virginia in early 1862, from the Romney Campaign that opened the year to the naval engagement between the Monitor and Merrimac to the movements and engagements fought by Union and Confederate forces in the Shenandoah Valley, on the York-James Peninsula, and in northern Virginia, as a single, comprehensive campaign.
- Published
- 2023
23. Small but Important Riots : The Cavalry Battles of Aldie, Middleburg, and Upperville
- Author
-
Robert F. O'Neill and Robert F. O'Neill
- Abstract
Named a Top Ten Book of 2023 by Civil War Books and Authors June 1863. The American Civil War was two years old, and the U.S. Army in Virginia was in chaos. Reeling after the recent defeat at Chancellorsville, the Federals, especially the Cavalry Corps, scrambled to regroup. Confederate general Robert E. Lee seized the moment to launch a second invasion of the North. As Lee slipped away, frantic Federal leaders asked, “Where are the Rebels?” At this critical moment, the much-maligned Federal cavalry stepped to center stage.Small but Important Riots is a tactical study of fighting from June 17 to 22, 1863, at Aldie, Middleburg, and Upperville, placed within the strategic context of the Gettysburg campaign. It is based on Robert O'Neill's thirty years of research and access to previously unpublished documents, which reveal startling new information. Since the fighting in Loudoun Valley of Virginia ended in June 1863, one perspective has prevailed—that Brigadier General Alfred Pleasonton, who commanded the Cavalry Corps, Army of the Potomac, disobeyed orders. According to published records, Pleasonton's superiors, including President Abraham Lincoln, Secretary of War Edwin Stanton, and army commander Joseph Hooker, ordered Pleasonton to search for General Robert E. Lee's Army of Northern Virginia during a critical stage of the Gettysburg campaign, and Pleasonton ignored their orders. Recently discovered documents—discussed in this book—prove otherwise.
- Published
- 2023
24. Cloud Computing with Security and Scalability. : Concepts and Practices
- Author
-
Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken, Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, and John M. Acken
- Subjects
- Cloud computing
- Abstract
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why's and how's” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture and https protocol.Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud;Describes for IT managers how to improve their Cloud Computing infrastructures;Includes coverage of security concerns with Cloud operating models;Uses several case studies to illustrate the “why's and how's” of using the Cloud;Examples and options to improve Cloud Computing Scalability.
- Published
- 2023
25. The Rifle Musket in Civil War Combat : Reality and Myth
- Author
-
Hess, Earl J. and Hess, Earl J.
- Published
- 2022
- Full Text
- View/download PDF
26. Ends of War : The Unfinished Fight of Lee's Army after Appomattox
- Author
-
Janney, Caroline E. and Janney, Caroline E.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.