Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 588
- History 266
- Història 209
- Management 153
- Filosofía 151
- Data processing 131
- Literature, Romance 124
- Biblia 122
- Computer networks 122
- Crítica e interpretación 117
- Música 116
- Development 114
- Bíblia 110
- Education 104
- Engineering & Applied Sciences 98
- Ciencias sociales 91
- Humanities, Multidisciplinary 90
- Culture 87
- Artificial intelligence 86
- Social Sciences, Interdisciplinary 86
- Application software 85
- Cultura 83
- Església Catòlica 81
- Colecciones 80
- Religion 79
- Business & Economics 78
- Computer programs 78
- Humanities 78
- César, Cayo Julio 77
- Philosophy 77
-
20361Publicado 2022Tabla de Contenidos: “…3.2.4 Wiener Filter -- 3.3 Preprocessing Using Multilevel (Multiresolution) Methods -- 3.3.1 Wavelet Method -- 3.3.2 Ridgelet Transform -- 3.3.3 Curvelet Transform -- 3.3.4 Decompaction and Reconstruction Images Using Shearlet Transform (SHT) -- 3.3.5 Discrete Shearlet Transform (DST) -- 3.3.6 Shearlet Decompaction and Reconstruction -- 3.3.7 Shearlet and Wavelet Comparison -- 3.3.8 Complex Shearlet Transform -- 3.3.9 Complex Shearlet Transform for Image Enhancement -- 3.3.10 Low and High frequencies of Complex Shearlet Transform for Image Denoising -- 3.4 General Comparison of Single/Multilevel Methods and Selection of Methods for Noise Removal and Image Enhancement -- 3.5 Application of Preprocessing -- 3.5.1 Pavement Surface Drainage Condition Assessment -- 3.6 Summary and Conclusion -- 3.7 Questions and Exercises -- Chapter 4 Fuzzy and Its Recent Advances -- 4.1 Introduction -- 4.1.1 Type-1 Fuzzy Set Theory -- 4.1.2 Type-2 Fuzzy Set Theory -- 4.1.3 a-Plane Representation of General Type-2 Fuzzy Sets -- 4.1.4 Type-Reduction -- 4.1.5 Defuzzification -- 4.1.6 Type-3 Fuzzy Logic Sets -- 4.2 Ambiguity Modeling in the Fuzzy Methods -- 4.2.1 Background of General Type-2 Fuzzy Sets -- 4.3 Theory of Automatic Methods for MF Generation -- 4.3.1 Automatic Procedure to Generate a 3D Membership Function -- 4.4 Steps and Components of General 3D Type-2 Fuzzy Logic Systems (G3DT2 FL) -- 4.4.1 General 3D Type-2 Fuzzy Logic Systems (G3DT2 FL) -- 4.5 General 3D Type-2 Polar Fuzzy Method -- 4.5.1 Automatic MF Generator -- 4.5.2 A Measure of Ultrafuzziness -- 4.5.3 Theoretic Operations of 3D Type-2 Fuzzy Sets in the Polar Frame -- 4.5.4 Representation of Fuzzy 3D Polar Rules -- 4.5.5 θ-Slice and α − Planes -- 4.6 Computational Performance (CP) -- 4.7 Application of G3DT2FLS in Pattern Recognition…”
Libro electrónico -
20362Publicado 2024Tabla de Contenidos: “…2.7.3 Significance to Crystallization and Downstream Operations -- 2.8 Adsorption, Hygroscopicity, and Deliquesce -- 2.8.1 Phase Diagram -- 2.8.2 Measurement -- 2.8.3 Significance to Crystallization and Downstream Operations -- 2.9 Crystal Morphology -- 2.9.1 General Observations -- 2.9.2 Measurement and Prediction -- 2.9.3 Significance to Crystallization and Downstream Operations -- 2.10 Partical Size Distribution and Surface Area -- 2.10.1 Particle Distribution Definition -- 2.10.2 Measurement -- 2.10.3 Significance to Crystallization and Downstream Operations -- Chapter 3 Polymorphism -- 3.1 Phase Rule -- 3.2 Phase Transition -- 3.2.1 Enantiotropy and Monotropy -- 3.2.2 Metastable Equilibrium and Suspended Transformation -- 3.2.3 Measurement -- 3.3 Prediction of Crystal Structure and its Formation -- 3.3.1 Equilibrium Approach -- 3.3.2 Kinetic Approach -- 3.4 Selection and Screening of Crystal Forms -- 3.4.1 Selection Criteria -- 3.4.2 Candidates for Forming Salts and Co-crystals -- 3.4.3 High Throughput and Process-Based Screening -- 3.5 Examples -- EXAMPLE 3.1 -- EXAMPLE 3.2 -- EXAMPLE 3.3 -- EXAMPLE 3.4 -- EXAMPLE 3.5 -- EXAMPLE 3.6 -- EXAMPLE 3.7 -- EXAMPLE 3.8 -- EXAMPLE 3.9 -- Chapter 4 Kinetics -- 4.1 SUPERSATURATION AND RATE PROCESSES -- 4.2 Nucleation -- 4.2.1 Homogeneous Nucleation -- 4.2.2 Heterogeneous Nucleation -- 4.2.3 Secondary Nucleation -- 4.3 Crystal Growth and Agglomeration -- 4.3.1 Crystal Growth Mechanisms -- 4.3.2 Agglomeration Mechanism -- 4.3.3 Measurement of Crystal Growth Rate -- 4.3.4 Crystal Population Balance -- 4.4 Nucleate/Seed Aging and Ostwald Ripening -- 4.5 DELIVERED PRODUCT: PURITY, CYSTAL FORM, SIZE AND MORPHOLOGY, AND CHEMICAL and PHYSICAL STABILITY -- 4.6 Design of Experiment (DOE)-Model-Based Approach -- 4.7 Model-Free Feedback Control -- Chapter 5 Mixing and Crystallization -- 5.1 INTRODUCTION…”
Libro electrónico -
20363Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Error Estimation of the Function by (Zrμ, r ≥1) Using Product Means (E,s)(N, pn,qn) of the Conjugate Fourier Series -- 1.1 Introduction -- 1.1.1 Definition 1 -- 1.1.2 Definition 2 -- 1.1.3 Definition 3 -- 1.2 Theorems -- 1.2.1 Theorem 1 -- 1.2.2 Theorem 2 -- 1.3 Lemmas -- 1.3.1 Lemma 1 -- 1.3.2 Lemma 2 -- 1.3.3 Lemma 3 -- 1.4 Proof of the Theorems -- 1.4.1 Proof of the Theorem 1 -- 1.4.2 Proof of the Theorem 2 -- 1.5 Corollaries -- 1.5.1 Corollary 1 -- 1.5.2 Corollary 2 -- 1.6 Example -- 1.7 Conclusion -- References -- Chapter 2 Blow Up and Decay of Solutions for a Klein-Gordon Equation With Delay and Variable Exponents -- 2.1 Introduction -- 2.2 Preliminaries -- 2.3 Blow Up of Solutions -- 2.4 Decay of Solutions -- Acknowledgment -- References -- Chapter 3 Some New Inequalities Via Extended Generalized Fractional Integral Operator for Chebyshev Functional -- 3.1 Introduction -- 3.2 Preliminaries -- 3.3 Fractional Inequalities for the Chebyshev Functional -- 3.4 Fractional Inequalities in the Case of Extended Chebyshev Functional -- 3.5 Some Other Fracional Inequalities Related to the Extended Chebyshev Functional -- 3.6 Concluding Remark -- References -- Chapter 4 Blow Up of the Higher-Order Kirchhoff-Type System With Logarithmic Nonlinearities -- 4.1 Introduction -- 4.2 Preliminaries -- 4.3 Blow Up for Problem for E (0) < -- d -- 4.4 Conclusion -- References -- Chapter 5 Developments in Post-Quantum Cryptography -- 5.1 Introduction -- 5.2 Modern-Day Cryptography -- 5.2.1 Symmetric Cryptosystems -- 5.2.2 Asymmetric Cryptosystems -- 5.2.3 Attacks on Modern Cryptosystems -- 5.2.3.1 Known Attacks -- 5.2.3.2 Side-Channel Attacks -- 5.3 Quantum Computing -- 5.3.1 The Main Aspects of Quantum Computing -- 5.3.2 Shor's Algorithm -- 5.3.3 Grover's Algorithm…”
Libro electrónico -
20364Publicado 2023Tabla de Contenidos: “…2.7.1 Composition of the Atmosphere: The Troposphere, Stratosphere, Mesosphere, Ionosphere and Exosphere -- 2.7.2 Air Density -- 2.7.3 Temperature -- 2.7.4 Pressure -- 2.7.5 Effects of Pressure and Temperature -- 2.7.6 Viscosity -- 2.7.7 Bulk Modulus of Elasticity -- 2.7.8 Temperature Variations with Altitude: The Lapse Rate -- 2.8 International Standard Atmosphere (from ESDU 77021, 1986) -- 2.9 Generation of Lift and Drag -- 2.10 Aerodynamic Forces and Moments -- 2.10.1 Aerodynamic Coefficients -- 2.10.2 Aerofoil Drag -- 2.10.3 Aircraft Lift Equation and Lift Curve Slope -- 2.10.4 Centre of Pressure -- 2.10.5 Aerodynamic Centre -- 2.10.6 Pitching Moment Equation -- 2.10.7 Elevator Hinge Moment Coefficient -- Chapter Highlights -- Exercises -- Answers to Selected Exercises -- References -- Chapter 3 Mechanics of Equilibrium Flight -- 3.1 Introduction -- 3.2 Speeds of Equilibrium Flight -- 3.3 Basic Aircraft Performance -- 3.3.1 Optimum Flight Speeds -- 3.4 Conditions for Minimum Drag -- 3.5 Stability in the Vicinity of the Minimum Drag Speed -- 3.6 Range and Endurance Estimation -- 3.7 Trim -- 3.8 Stability of Equilibrium Flight -- 3.9 Longitudinal Static Stability -- 3.9.1 Neutral Point (Stick-Fixed) -- 3.9.2 Neutral Point (Stick-Free) -- 3.10 Manoeuvrability -- 3.10.1 Pull-Out Manoeuvre -- 3.10.2 Manoeuvre Margin: Stick-Fixed -- 3.10.3 Manoeuvre Margin: Stick-Free -- 3.11 Lateral Stability and Stability Criteria -- 3.12 Experimental Determination of Aircraft Stability Margins -- 3.13 Summary of Equilibrium- and Stability-Related Equations -- Chapter Highlights -- Exercises -- Answers to Selected Exercises -- References -- Chapter 4 Aircraft Non-Linear Dynamics: Equations of Motion -- 4.1 Introduction -- 4.2 Aircraft Dynamics -- 4.3 Aircraft Motion in a 2D Plane -- 4.4 Moments of Inertia -- 4.5 Euler's Equations and the Dynamics of Rigid Bodies…”
Libro electrónico -
20365por Mulder, ValentinTabla de Contenidos: “…Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland…”
Publicado 2023
Libro electrónico -
20366por Vasques, XavierTabla de Contenidos: “…3.2.4 Binary Logistic Regression with Keras on TensorFlow -- 3.3 Support Vector Machine -- 3.3.1 Linearly Separable Data -- 3.3.2 Not Fully Linearly Separable Data -- 3.3.3 Nonlinear SVMs -- 3.3.4 SVMs for Regression -- 3.3.5 Application of SVMs -- 3.3.5.1 SVM Using scikit-learn for Classification -- 3.3.5.2 SVM Using scikit-learn for Regression -- 3.4 Artificial Neural Networks -- 3.4.1 Multilayer Perceptron -- 3.4.2 Estimation of the Parameters -- 3.4.2.1 Loss Functions -- 3.4.2.2 Backpropagation: Binary Classification -- 3.4.2.3 Backpropagation: Multi-class Classification -- 3.4.3 Convolutional Neural Networks -- 3.4.4 Recurrent Neural Network -- 3.4.5 Application of MLP Neural Networks -- 3.4.6 Application of RNNs: LST Memory -- 3.4.7 Building a CNN -- 3.5 Many More Algorithms to Explore -- 3.6 Unsupervised Machine Learning Algorithms -- 3.6.1 Clustering -- 3.6.1.1 K-means -- 3.6.1.2 Mini-batch K-means -- 3.6.1.3 Mean Shift -- 3.6.1.4 Affinity Propagation -- 3.6.1.5 Density-based Spatial Clustering of Applications with Noise -- 3.7 Machine Learning Algorithms with HephAIstos -- References -- Further Reading -- Chapter 4 Natural Language Processing -- 4.1 Classifying Messages as Spam or Ham -- 4.2 Sentiment Analysis -- 4.3 Bidirectional Encoder Representations from Transformers -- 4.4 BERT's Functionality -- 4.5 Installing and Training BERT for Binary Text Classification Using TensorFlow -- 4.6 Utilizing BERT for Text Summarization -- 4.7 Utilizing BERT for Question Answering -- Further Reading -- Chapter 5 Machine Learning Algorithms in Quantum Computing -- 5.1 Quantum Machine Learning -- 5.2 Quantum Kernel Machine Learning -- 5.3 Quantum Kernel Training -- 5.4 Pegasos QSVC: Binary Classification -- 5.5 Quantum Neural Networks -- 5.5.1 Binary Classification with EstimatorQNN -- 5.5.2 Classification with a SamplerQNN…”
Publicado 2024
Libro electrónico -
20367Publicado 2024Tabla de Contenidos: “…-- 1.5 Need of Blockchain -- 1.6 Uses of Blockchain -- 1.7 Evolution of Blockchain -- 1.8 Blockchain in Ethereum -- 1.9 Advantages of Smart Contracts -- 1.10 Use Cases of Smart Contracts -- 1.11 Real-Life Example of Smart Contracts -- 1.12 Blockchain in Decentralized Applications -- 1.12.1 Advantages of DApps -- 1.12.2 Role of Blockchain in Metaverse -- 1.12.3 Uses of Blockchain in Metaverse Applications -- 1.12.4 Some Popular Examples of Metaverse Applications -- 1.13 Decentraland -- 1.14 Challenges Faced by Blockchain -- 1.15 Weaknesses of Blockchain -- 1.16 Future of Blockchain -- 1.17 Conclusion -- References -- Chapter 2 Blockchain with Federated Learning for Secure Healthcare Applications -- 2.1 Introduction -- 2.2 Federated Learning -- 2.3 Motivation -- 2.4 Federated Machine Learning -- 2.5 Federated Learning Frameworks -- 2.6 FL Perspective for Blockchain and IoT -- 2.7 Federated Learning Applications -- 2.8 Limitations -- References -- Chapter 3 Futuristic Challenges in Blockchain Technologies -- 3.1 Introduction -- 3.2 Blockchain -- 3.2.1 Background of Blockchain -- 3.2.2 Introduction to Cryptocurrencies: Bitcoin -- 3.2.3 Different Cryptocurrencies -- 3.2.4 Proof of Work (POW) -- 3.3 Issues and Challenges with Blockchain -- 3.4 Internet of Things (IoT) -- 3.5 Background of IoT -- 3.5.1 Issues and Challenges Faced by IoT -- 3.6 Conclusion -- References -- Chapter 4 AIML-Based Blockchain Solutions for IoMT -- 4.1 Introduction -- 4.2 Objective and Contribution -- 4.3 Security Challenges in Different Domains -- 4.4 Healthcare -- 4.5 Agriculture -- 4.6 Transportation…”
Libro electrónico -
20368por Sountharrajan, S.Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
Publicado 2023
Libro electrónico -
20369por Kumar, Kukatlapalli PradeepTabla de Contenidos: “…3.3 Snowflake Cloud Data Warehouse -- 3.3.1 High-Level Architecture of Snowflake Cloud Data Warehouse -- 3.3.2 Features of Snowflake Cloud Data Warehouse -- 3.3.3 Snowflake Cloud Data Warehouse Pricing -- 3.4 Google BigQuery Cloud Data Warehouse -- 3.4.1 High-Level Architecture of Google BigQuery Cloud Data Warehouse -- 3.4.2 Features of Google BigQuery Cloud Data Warehouse -- 3.4.3 Google BigQuery Cloud Data Warehouse Pricing -- 3.5 Microsoft Azure Synapse Cloud Data Warehouse -- 3.5.1 Microsoft Azure Synapse Cloud Data Warehouse Architecture -- 3.5.2 Features of Microsoft Azure Synapse Cloud Data Warehouse -- 3.5.3 Pricing of Microsoft Azure Synapse Cloud Data Warehouse -- 3.6 Informatica Intelligent Cloud Services (IICS) -- 3.6.1 Informatica Intelligent Cloud Services Architecture -- 3.6.2 Salient Features of Informatica Intelligent Cloud Services -- 3.6.3 Informatica Intelligent Cloud Services Pricing Model -- 3.7 Conclusion -- Acknowledgements -- References -- Chapter 4 Data Mining with Cluster Analysis Through Partitioning Approach of Huge Transaction Data -- 4.1 Introduction -- 4.2 Methodology Used in Proposed Cluster Analysis System -- 4.2.1 Design of Algorithms -- 4.3 Literature Survey on Existing Systems -- 4.3.1 Experimental Results -- 4.4 Conclusion -- References -- Chapter 5 Application of Data Science in Macromodeling of Nonlinear Dynamical Systems -- 5.1 Introduction -- 5.2 Nonlinear Autonomous Dynamical System -- 5.3 Nonlinear System - MOR -- 5.3.1 Proper Orthogonal Decomposition -- 5.4 Data Science Life Cycle -- 5.4.1 Problem Identification -- 5.4.2 Identifying Available Data Sources and Data Collection -- 5.4.3 Data Processing -- 5.4.4 Data Exploration -- 5.4.5 Feature Extraction -- 5.4.6 Modeling -- 5.4.7 Model Performance Evaluation -- 5.5 Artificial Neural Network in Modeling -- 5.5.1 Machine Learning…”
Publicado 2023
Libro electrónico -
20370Publicado 2023Tabla de Contenidos: “…-- 3.6 Insights to Digital Twin Technology Concept -- 3.6.1 Parts Twins -- 3.6.2 Product Twins -- 3.6.3 System Twins -- 3.6.4 Process Twins -- 3.7 Types of Digital Twin -- 3.7.1 Digital Twin Prototype (DTP) -- 3.7.2 Digital Twin Instance (DTI) -- 3.7.3 Digital Twin Environment (DTE) -- 3.8 Traits of Digital Twin -- 3.8.1 Look Same as the Original Object -- 3.8.2 Consists Different Details of the Original Object -- 3.8.3 Behaves Same as the Original Object -- 3.8.4 Can Predict and Inform in Advance About Problems That Could Occur -- 3.9 Value of Digital Twin -- 3.10 Advantages of Digital Twin -- 3.11 Real-World Examples of Use of Digital Twin -- 3.12 Conclusion -- References -- Chapter 4 Digital Twin Solution Architecture -- 4.1 Introduction -- 4.2 Previous Work -- 4.2.1 How This Work Differs -- 4.3 Use Cases -- 4.4 Architecture Considerations -- 4.5 Understanding the Physical Object -- 4.5.1 Modeling Considerations -- 4.6 Digital Twin and IoT -- 4.7 Digital Twin Solution Architecture -- 4.7.1 Conceptual Digital Twin Solution Architecture -- 4.7.2 Infrastructure Platform and IoT Services -- 4.7.3 Digital Twin Data and Process Model -- 4.7.4 Digital Twin Services -- 4.7.5 Digital Twin Applications -- 4.7.6 Sample Basic Data Flow through Digital Twin…”
Libro electrónico -
20371por Tyagi, Amit KumarTabla de Contenidos: “…3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers -- 3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References -- Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society -- 4.1 Introduction -- 4.2 Background Work -- 4.3 Motivation -- 4.4 Existing Innovations in the Current Society -- 4.5 Expected Innovations in the Next-Generation Society -- 4.6 An Environment with Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.7 Open Issues in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.8 Research Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.9 Legal Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.10 Future Research Opportunities Towards Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications…”
Publicado 2024
Libro electrónico -
20372por Karmakar, AnupamTabla de Contenidos: “…3.6 Ways to Overcome the Barriers of Planning/Means to Reduce the Limitations of Planning -- 3.7 Types of Plans -- 3.7.1 Strategic Plans -- 3.7.2 Tactical Plans -- 3.7.3 Specific Plans -- 3.7.4 Directional Plans -- 3.7.5 Long-Range Plans -- 3.7.6 Short-Range Plans -- 3.7.7 Operational Plans -- 3.7.8 Contingency Plan -- 3.7.9 Derivative Plan -- 3.7.10 Master Plan -- 3.8 Management by Objectives (MBO) -- 3.8.1 Steps of MBO Process -- 3.9 Essentials of a Good Plan -- 3.10 Meaning and Concept of Forecasting -- 3.11 Steps of Forecasting -- 3.11.1 Specification of Purpose of Forecasting -- 3.11.2 Gathering and Organizing Data -- 3.11.3 Selection and/or Formulation of the Forecasting Technique -- 3.11.4 Estimating the Future -- 3.11.5 Implementation of the Forecasts Made -- 3.11.6 Comparing Actual Results with the Forecasted Ones -- 3.11.7 Fine-Tuning the Forecasting Process -- 3.12 Techniques of Forecasting -- 3.12.1 Quantitative Techniques -- 3.12.2 Qualitative Techniques -- 3.13 Importance/Advantages of Forecasting -- 3.14 Limitations of Forecasting -- Summary -- Keywords -- Question Bank -- References -- Chapter 4: Organizing -- 4.1 Organization: Concept and Definition -- 4.1.1 Organization as a Process -- 4.1.2 Organization as a Framework of Internal Relationships -- 4.1.3 Difference Between Dynamic and Static Concepts of Organization -- 4.2 Characteristics of Organization -- 4.3 Comparison Between Traditional and Modern Organization -- 4.4 Importance of Organizing -- 4.5 Principles of Organizing -- 4.6 Features of a Sound Organization -- 4.7 Functions of Organizing -- 4.8 Process or Steps in Organizing -- 4.9 Organizing Versus Management -- 4.10 Organization Structure: Concept and Definition -- 4.10.1 Factors Influencing the Choice of Organization Structure -- 4.10.2 Elements of Organization Structure -- 4.10.3 Advantages of Organization Structure…”
Publicado 2011
Libro electrónico -
20373Publicado 2016Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Preface -- Acknowledgments -- Brief Contents -- Contents -- 1 Introduction -- 1.1 The Electrical/Electronics Industry -- 1.2 A Brief History -- 1.3 Units of Measurement -- 1.4 Systems of Units -- 1.5 Significant Figures, Accuracy, and Rounding Off -- 1.6 Powers of Ten -- 1.7 Fixed-Point, Floating-Point, Scientific, and Engineering Notation -- 1.8 Conversion Between Levels of Powers of Ten -- 1.9 Conversion Within and Between Systems of Units -- 1.10 Symbols -- 1.11 Conversion Tables -- 1.12 Calculators -- 1.13 Computer Analysis -- 2 Voltage and Current -- 2.1 Introduction -- 2.2 Atoms and Their Structure -- 2.3 Voltage -- 2.4 Current -- 2.5 Voltage Sources -- 2.6 Ampere-Hour Rating -- 2.7 Battery Life Factors -- 2.8 Conductors and Insulators -- 2.9 Semiconductors -- 2.10 Ammeters and Voltmeters -- 2.11 Applications -- 2.12 Computer Analysis -- 3 Resistance -- 3.1 Introduction -- 3.2 Resistance: Circular Wires -- 3.3 Wire Tables -- 3.4 Temperature Effects -- 3.5 Types of Resistors -- 3.6 Color Coding and Standard Resistor Values -- 3.7 Conductance -- 3.8 Ohmmeters -- 3.9 Resistance: Metric Units -- 3.10 The Fourth Element-The Memristor -- 3.11 Superconductors -- 3.12 Thermistors -- 3.13 Photoconductive Cell -- 3.14 Varistors -- 3.15 Applications -- 4 Ohm's Law, Power, and Energy -- 4.1 Introduction -- 4.2 Ohm's Law -- 4.3 Plotting Ohm's Law -- 4.4 Power -- 4.5 Energy -- 4.6 Efficiency -- 4.7 Circuit Breakers, GFCIs, and Fuses -- 4.8 Applications -- 4.9 Computer Analysis -- 5 Series dc Circuits -- 5.1 Introduction -- 5.2 Series Resistors -- 5.3 Series Circuits -- 5.4 Power Distribution in a Series Circuit -- 5.5 Voltage Sources in Series -- 5.6 Kirchhoff's Voltage Law -- 5.7 Voltage Division in a Series Circuit -- 5.8 Interchanging Series Elements -- 5.9 Notation -- 5.10 Ground Connection Awareness…”
Libro electrónico -
20374Publicado 2018Tabla de Contenidos: “…Local Basis Functions -- 4.1.4 Experimental Model Validation -- 4.1.4.1 Quantifying Modeling Performance -- 4.1.5 Mutually Orthogonal Basis Functions -- 4.1.6 Multi-Antenna Environments and Mutual Coupling -- 4.2 Oscillator Phase Noise -- 4.2.1 Phase-Noise Power Spectrum and Leeson's Equation -- 4.2.2 Phase-Noise Modeling: Free-Running Oscillator -- 4.2.3 Phase-Noise Modeling: Phase-Locked Loop -- 4.3 Data Converters -- 4.3.1 Modeling of Quantization Noise -- 4.4 Statistical Modeling -- 4.4.1 The Bussgang Theorem and the System Model -- 4.5 Stochastic Modeling of Power Ampli ers -- 4.6 Oscillator Phase Noise -- 4.7 Stochastic Modeling of Data Converters -- 4.8 Model Concatenation and Simulations -- 4.8.1 Signal-to-Interference and Noise Ratio -- 4.8.2 Simulations -- 4.8.3 Simulation Results -- References -- 5 Multicarrier Waveforms -- 5.1 Multicarrier Waveforms -- 5.1.1 The Principle of Orthogonality -- 5.1.2 OFDM-Based Waveforms…”
Libro electrónico -
20375Publicado 2023Tabla de Contenidos: “…Acknowledgments -- References -- 3 Spectral element methods for turbulence -- 3.1 Introduction -- 3.2 Advection-diffusion in a single deformed element -- 3.3 The multielement case -- 3.4 PN-PN formulation for incompressible flows -- 3.5 PN-PN formulation for low-Mach-number flows -- 3.6 Computing the pressure -- 3.7 Practical aspects -- 3.7.1 Stabilization techniques -- 3.7.2 Outflow boundary conditions -- 3.8 Example applications -- References -- 4 Spline-based methods for turbulence -- 4.1 Introduction -- 4.2 A brief introduction to splines -- 4.2.1 Univariate B-splines -- 4.2.2 Multivariate B-splines -- 4.2.3 Mapping to physical domains -- 4.2.4 Extension to multipatch domains -- 4.2.5 Local refinement of multivariate B-splines -- 4.2.6 Representation in terms of classical finite element bases -- 4.3 Spline-based methods for incompressible flows -- 4.3.1 The strong form of the incompressible flow problem -- 4.3.2 The weak form of the incompressible flow problem -- 4.3.3 Spatial discretization using a spline collocation method -- 4.3.4 Spatial discretization using a spline Galerkin method -- 4.3.5 Temporal discretization -- 4.4 A selection of spline velocity/pressure pairs -- 4.5 Stabilized spline-based methods -- References -- 5 Finite element methods for turbulence -- 5.1 Introduction -- 5.2 Discretization foundations -- 5.2.1 Basis functions -- 5.2.2 Time integration -- 5.3 Finite element formulations -- 5.3.1 Scalar advection-diffusion -- 5.3.1.1 Weak form -- 5.3.1.2 Numerical examples -- Advection in one direction -- Advection in a rotating flow field -- 5.3.2 Compressible Navier-Stokes -- 5.3.3 Low-Mach and incompressible Navier-Stokes -- 5.3.3.1 Strong form -- 5.3.3.2 Weak form - finite element discretization -- 5.3.3.3 Local reconstruction of diffusive flux -- 5.3.3.4 Discrete system of equations -- 5.3.3.5 Numerical examples…”
Libro electrónico -
20376por Dey, ArindamTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: Natural Language Processing (NLP) Applications -- Chapter 1 A Comprehensive Analysis of Various Tokenization Techniques and Sequence-to-Sequence Model in Natural Language Processing -- 1.1 Introduction -- 1.2 Literature Survey -- 1.3 Sequence-to-Sequence Models -- 1.3.1 Convolutional Seq2Seq Models -- 1.3.2 Pointer Generator Model -- 1.3.3 Attention-Based Model -- 1.4 Comparison Table -- 1.5 Comparison Graphs -- 1.6 Research Gap Identified -- 1.7 Conclusion -- References -- Chapter 2 A Review on Text Analysis Using NLP -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Comparison Table of Previous Techniques -- 2.4 Comparison Graphs -- 2.5 Research Gap -- 2.6 Conclusion -- References -- Chapter 3 Text Generation & -- Classification in NLP: A Review -- 3.1 Introduction -- 3.2 Literature Survey -- 3.3 Comparison Table of Previous Techniques -- 3.3.1 Sentiment Analysis -- 3.3.2 Translation -- 3.3.3 Tokenization Based on Noisy Texts -- 3.3.4 Question Answer Model -- 3.4 Research Gap -- 3.5 Conclusion -- References -- Chapter 4 Book Genre Prediction Using NLP: A Review -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Comparison Table -- 4.4 Research Gap Identified -- 4.5 Future Scope -- 4.6 Conclusion -- References -- Chapter 5 Mood Detection Using Tokenization: A Review -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Comparison Table of Previous Techniques -- 5.4 Graphs -- 5.5 Research Gap -- 5.6 Conclusion -- References -- Chapter 6 Converting Pseudo Code to Code: A Review -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Comparison Table -- 6.4 Graphs of Comparison Done -- 6.5 Research Gap Identified -- 6.6 Conclusion -- References -- Part 2: Machine Learning Applications in Specific Domains…”
Publicado 2024
Libro electrónico -
20377por Assmann, TomTabla de Contenidos: “…-- 3.4 Image -- 3.5 Private Nutzung -- 3.6 Fazit -- Literatur -- 4: Die Renaissance des Lastenrads -- 4.1 Einführung -- 4.2 Nie wirklich weg, aber in der Nische versteckt -- 4.3 Die Renaissance beginnt -- 4.4 Die Radlogistik nimmt Fahrt auf -- 4.5 Aktueller Status der Radlogistik -- 4.6 Fazit -- Literatur…”
Publicado 2024
Libro electrónico -
20378Publicado 2013Tabla de Contenidos: “…-- 3.1.2 Long-term Goals - Short-term Actions and Transitions -- 3.1.3 The Cradle to Cradle Principles -- 3.1.4 Complementary Metabolisms -- 3.2 Product Certification Program Overview -- 3.2.1 Certification Levels -- 3.2.2 Program Categories -- 3.2.3 The Cradle to Cradle CertifiedCM Marks -- 3.3 Product Certification Overview -- 3.3.1 Scope -- 3.3.2 Continuous Improvement and Optimization -- 3.3.3 Material Health -- 3.3.4 Material Reutilization -- 3.3.5 Renewable Energy and Carbon Management -- 3.3.6 Water Stewardship -- 3.3.7 Social Fairness -- 3.3.8 Certification Program Summary -- Notes and References -- China's Implementation of Alternatives Assessment in the Building Industry: GIGA -- 4.1 Introduction -- 4.2 China Context -- 4.2.1 Health -- 4.2.2 Barriers to Health -- 4.3 Resurgence of Health -- 4.3.1 Trust as a Catalyst -- 4.3.2 Wealth as a Catalyst -- 4.3.3 Access to Information as a Catalyst -- 4.4 Social Media and the Rebuilding of Trust -- 4.4.1 Perfect Storm of Change -- 4.5 Minimization Versus Regeneration in China -- 4.5.1 Regenerative Chemistry -- 4.6 GIGA (Green Ideas, Green Actions) -- 4.6.1 GIGA: the User's Perspective -- 4.6.2 GIGA: Green Algorithm -- 4.6.3 GIGA: Unpacking Alternatives Assessment -- 4.7 Impact: Process -- 4.8 Alternatives Assessment at Scale -- 4.9 Conclusion -- References -- A Collaborative Industry and University Alternative Assessment of Plasticizers for Wire and Cable -- 5.1 Background -- 5.2 Project Workplan -- 5.3 Selection of a Chemical/Chemical Class of Concern and Application -- 5.4 Pilot Project Team Formation -- 5.5 Screening Against the Red List…”
Libro electrónico -
20379por Kamal, RajTabla de Contenidos: “…3.9 Two Outputs Simplification-Computer-Based Prime Implicants Using Star Product and Sharp Operations -- 3.9.1 Combination of Two Cubes Differing in One Variable into One Cube-A Star Product Operation -- 3.9.2 Finding Essential Prime Implicants Using Two Cubes-A Sharp Operation -- 3.9.3 Computer-Based Minimization Method to Find Minimum Required Cover (SOP function implicants) -- 3.10 Computer-Based Minimization-Quine-McCluskey Method -- 3.10.1 Quine-McCluskey Method of Finding Prime Implicants -- 3.10.2 Finding Minimal Sum from the Prime Implicants for an Output -- 3.10.3 Finding Minimal Sum for the Multi-Output Case Using Quine-McCluskey Method -- Chapter 4: Binary Arithmetic and Decoding and Mux Logic Units -- 4.1 Binary Arithmetic Units -- 4.1.1 Binary Addition of Two Bits -- 4.1.2 Addition of Two Arithmetic Numbers Each of 4 Bits -- 4.1.3 Subtraction of Two Arithmetic Numbers Each of 4 Bits -- 4.2 Decoder -- 4.2.1 Decoder (Line Decoder) -- 4.2.2 The 1 of 2 and 1 of 4 Line Decoders -- 4.2.3 The Four-line to 16-line Decoder -- 4.2.4 Function Specific Decoders -- 4.3 Encoder -- 4.3.1 Encoder (Line Encoder) -- 4.3.2 Encoder (Priority Encoder) -- 4.3.3 BCD 10 of 1 Four-bit Encoder -- 4.3.4 Octal 8 of 1 Three-bit Encoder and Hexadecimal Encoder -- 4.4 Multiplexer -- 4.4.1 Multiplexer (Line Selector) -- 4.4.2 Multiplexer with Outputs Enabling Control (gate) Pin(s) -- 4.5 Demultiplexer -- 4.5.1 Demultiplexer Definition -- Chapter 5: Code Converters, Comparators and Other Logic Processing Circuits -- 5.1 Code Converters -- 5.1.1 Codes for Decimal Numbers -- 5.1.2 Unit Distance Code Converter -- 5.1.3 ASCII (American Standard Code for Information Interchange) for the Alphanumeric Characters -- 5.2 Equality and Magnitude Comparators Between Two Four-bit Numbers -- 5.3 Odd Parity and Even Parity Generators -- 5.4 The 4-bit AND, OR, XOR Between Two Words…”
Publicado 2011
Libro electrónico -
20380por Vasappanavara, RameshTabla de Contenidos: “…-- 4.3.4 Accessing and Modifying Array Elements -- 4.3.5 Passing Arrays as Arguments to Methods -- 4.3.6 Returning Arrays as Arguments to Methods -- 4.3.7 Multi-dimensional Arrays -- 4.3.8 Java. util. Arrays Class -- 4.4 String -- 4.4.1 Array of Strings -- 4.4.2 String Class Methods -- 4.4.3 StringBuffer Class -- 4.4.4 StringBuilder Class -- 4.5 Collection Framework -- 4.5.1 Vector Class -- 4.5.2 Vector Methods -- 4.6 Key Points -- Exercise Questions -- Objective Questions -- Short-answer Questions -- Long-answer Questions -- Assignment Questions…”
Publicado 2011
Libro electrónico