Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Politics 74
- Sociology 72
- Political Science 62
- Philosophy 52
- Cultural Studies 47
- Culture 47
- Historia 47
- Literatura alemana 45
- History 38
- Data processing 35
- WebSphere 35
- Society 34
- Computer programs 33
- Història 33
- Media 33
- Cultural History 29
- Literature 28
- Body 26
- Management 25
- Political Sociology 25
- Political Theory 25
- Biblia 24
- Computer networks 24
- Artificial intelligence 23
- Literary Studies 23
- Education 22
- Filosofía 22
- Political Philosophy 22
- Development 21
- Media Studies 21
-
2241Publicado 2016Tabla de Contenidos: “…. -- 5.3.3 Annona -- 5.3.4 Croton megalocarpus -- 5.3.5 Azadirachta indica -- 5.3.6 Waste oils -- 5.3.7 Other sources of low-cost, renewable oil for biofuel production -- 5.4 Raw materials for bioethanol production -- 5.4.1 Most frequent raw materials for bioethanol production -- 5.4.1.1 Raw materials employed by country…”
Libro electrónico -
2242por Sakiyama, Kazuo, 1971-Tabla de Contenidos: “…4.4.6 Integral Property of AES Reduced to 2.5 Rounds 135 -- 4.4.7 Balanced Property 136 -- 4.4.8 Integral Property of AES Reduced to Three Rounds and Distinguishing Attack 137 -- 4.4.9 Key Recovery Attack with Integral Cryptanalysis for Five Rounds 139 -- 4.4.10 Higher-Order Integral Property + 141 -- 4.4.11 Key Recovery Attack with Integral Cryptanalysis for Six Rounds + 143 -- Further Reading 147 -- 5 Side-Channel Analysis and Fault Analysis on Block Ciphers 149 -- 5.1 Introduction 149 -- 5.1.1 Intrusion Degree of Physical Attacks 149 -- 5.1.2 Passive and Active Noninvasive Physical Attacks 151 -- 5.1.3 Cryptanalysis Compared to Side-Channel Analysis and Fault Analysis 151 -- 5.2 Basics of Side-Channel Analysis 152 -- 5.2.1 Side Channels of Digital Circuits 152 -- 5.2.2 Goal of Side-Channel Analysis 154 -- 5.2.3 General Procedures of Side-Channel Analysis 155 -- 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 -- 5.2.5 Divide-and-Conquer Algorithm 157 -- 5.3 Side-Channel Analysis on Block Ciphers 159 -- 5.3.1 Power Consumption Measurement in Power Analysis 160 -- 5.3.2 Simple Power Analysis and Differential Power Analysis 163 -- 5.3.3 General Key Recovery Algorithm for DPA 164 -- 5.3.4 Overview of Attack Targets 169 -- 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 -- 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 -- 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 -- 5.3.8 Attacks with Collision Model + 199 -- 5.4 Basics of Fault Analysis 203 -- 5.4.1 Faults Caused by Setup-Time Violations 205 -- 5.4.2 Faults Caused by Data Alternation 208 -- 5.5 Fault Analysis on Block Ciphers 208 -- 5.5.1 Differential Fault Analysis 208 -- 5.5.2 Fault Sensitivity Analysis + 215 -- Acknowledgment 223 -- Bibliography 223 -- 6 Advanced Fault Analysis with Techniques from Cryptanalysis 225 -- 6.1 Optimized Differential Fault Analysis 226 -- 6.1.1 Relaxing Fault Model 226 -- 6.1.2 Four Classes of Faulty Byte Positions 227.…”
Publicado 2015
Libro electrónico -
2243Publicado 2018Tabla de Contenidos: “…-- Business-Epics und Enablers -- 7.4.2 Der Lean Business Case eines Epics -- Hypothesen-Statement für ein Epic -- Leichtgewichtiger Lean Business Case -- Praxis -- 7.4.3 Portfolio-Kanban -- 7.4.4 Ein prototypisches Kanban-System -- 7.4.5 Schrittweise Implementierung -- 7.4.6 Priorisierung im Portfolio-Backlog -- 7.4.7 Schätzen und Planen für das Portfolio -- 7.4.8 Weiterentwicklung von Epics im Portfolio-Kanban -- 7.5 Budgets -- 7.5.1 Das Problem mit klassischen Budgets -- 7.5.2 Budgeting durch Lean Portfolio Management -- #1: Finanziere Agile Release Trains, nicht Projekte -- #2: Stärke die Entscheidungskompetenz der Release Trains -- #3: Steuere Release Trains über dynamische Budgets -- #4: Halte eine Reserve für das Portfolio-Backlog -- 7.6 Wertströme -- 7.6.1 Den Wertstrom identifizieren -- Fragen zur Identifikation des Wertstroms -- Finde die »Niere« -- 7.6.2 Mehrere Release Trains organisieren -- 7.6.3 Koordination über mehrere Trains -- Integration -- 7.6.4 Andere Arten der Entkopplung -- 8 Portfolio-Rollen -- 8.1 Lean Portfolio Management -- Unterschiede zum klassischen Portfoliomanagement -- Strategie- und Investitionenfinanzierung -- Unterstützung des Programmmanagements -- Steuerung und Feedback -- 8.2 Epic Owner -- 8.2.1 Verantwortlichkeiten des Epic Owners…”
Libro electrónico -
2244Publicado 2016Tabla de Contenidos: “…Synchronization-based objective function -- 6.3.2 Optimization of Topology -- Greedy algorithm -- Relaxed optimization -- Decomposition-based optimization -- Structure-based optimization -- 6.4 Team decision theory -- 6.4.1 Team Decision Theory -- System model -- Values of multiple information structures -- Information structures in networks -- 6.4.2 Team Decision Theory in Optimal Control -- System model -- State teams -- Dynamic teams -- 6.5 Conclusions -- Chapter 7: Communication network operation for CPSs -- 7.1 Introduction -- 7.1.1 Main Challenges -- 7.1.2 Main Approaches -- 7.2 Hybrid system modeling for CPSs -- 7.2.1 Hybrid Systems -- Linear switching system -- Control of linear switching systems -- 7.2.2 Hybrid System Model of a CPS -- Communication mode -- Relationship between communication and dynamics modes -- 7.3 Optimization of scheduling policy -- 7.3.1 Fundamental Challenges -- 7.3.2 Mode Provisioning -- Generic procedure -- Illustration by examples -- 7.3.3 Mode Scheduling -- Centralized mode scheduling -- Distributed scheduling -- 7.4 Scheduling: other approaches -- 7.4.1 Optimization-Based Scheduling -- System model -- Communication constraints -- 7.4.2 Effective Information-Based Scheduling -- Delay-tolerant Kalman filtering -- Definition of virtual queues -- Information bits -- Distributed scheduling -- 7.5 Routing -- 7.5.1 Estimation Oriented Routing -- System model -- Encoder and decoder -- Evolution of covariance -- 7.5.2 System Dynamics-Aware Multicast Routing -- System model -- Single mode routing -- Multiple routing modes -- 7.6 Conclusions -- Chapter 8: Physical layer design -- 8.1 Introduction -- 8.1.1 Modulation -- 8.1.2 Coding -- Source coding -- Channel coding -- 8.2 Adaptive modulation -- 8.2.1 System Model -- Physical dynamics -- Communication channel…”
Libro electrónico -
2245Publicado 2023Tabla de Contenidos:Libro electrónico
-
2246Publicado 2024Tabla de Contenidos: “…4.3.1 Drawbacks -- 4.3.1.1 Complexity and Expertise Dependency -- 4.3.1.2 Technological Hurdles -- 4.3.1.3 Performance and Verification -- 4.3.2 Input Data -- 4.4 Proposed System -- 4.4.1 Streamlined Expertise Requirements -- 4.4.2 Scalable Technology Implementation -- 4.4.3 Robust Performance and Validation -- 4.4.4 Advantages -- 4.4.4.1 Enhanced Accessibility -- 4.4.4.2 Improved Scalability -- 4.4.4.3 Consistently Reliable Performance -- 4.4.5 Proposed Algorithm Steps -- 4.5 Experimental Results -- 4.5.1 Performance Evaluation Methods -- 4.5.1.1 Accuracy -- 4.5.1.2 Precision -- 4.5.1.3 Recall -- 4.5.1.4 Sensitivity -- 4.5.1.5 Specificity -- 4.5.1.6 F1 Score -- 4.5.1.7 Area Under Curve (AUC) -- 4.5.1.8 Convolutional Neural Network (CNN) Architecture -- 4.5.1.9 Model Training and Validation -- 4.5.1.10 Data Augmentation and Regularization -- 4.5.1.11 Performance Metrics -- 4.6 Conclusion -- Conflicts of Interest -- References -- Chapter 5 Machine Learning-Enabled Digital Twins for Diagnostic and Therapeutic Purposes -- 5.1 Introduction -- 5.2 Conceptualization of Digital Twin and Machine Learning -- 5.2.1 Digital Twins -- 5.2.1.1 Working With the Digital Twins -- 5.2.2 Machine Learning -- 5.2.2.1 Deep Learning -- 5.2.2.2 Reinforcement Learning -- 5.3 State-of-the-Art Works -- 5.4 Applications of Digital Twins Enabled With Deep Learning Models and Reinforcement Learning -- 5.5 Limitations and Challenges -- 5.6 Opportunities/Future Scope -- 5.7 Concluding Remarks -- References -- Chapter 6 Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals -- 6.1 Introduction -- 6.2 Smart Hospitals -- 6.2.1 Key Technologies in Smart Hospital Environments -- 6.2.1.1 Internet of Things (IoT) -- 6.2.1.2 Artificial Intelligence (AI) -- 6.2.1.3 Big Data Analytics -- 6.2.1.4 Interoperable Systems…”
Libro electrónico -
2247Publicado 2005Tabla de Contenidos: “…Technical impact of major design changes -- 5.1 VisiBroker to IBM ORB change -- 5.1.1 IBM ORB setup -- 5.1.2 Using Server Access Interface with the IBM ORB -- 5.1.3 WebSphere MQ triggering replacing Object Activation Daemon -- 5.1.4 Setting up WebSphere MQ triggering -- 5.2 Tooling changes to WebSphere InterChange Server -- 5.2.1 WebSphere InterChange Server development model -- 5.2.2 Configuration files updated to XML -- 5.2.3 Eclipse platform -- 5.2.4 System Manager -- 5.2.5 System Monitor -- 5.2.6 Business Object Probes -- 5.2.7 Web-based flow and failed-flow management -- 5.2.8 Integrated Test Environment -- 5.2.9 Collaboration debugger -- 5.2.10 Activity Editor -- Chapter 6. …”
Libro electrónico -
2248Publicado 2017Tabla de Contenidos: “…Maslow (ROW 3B) -- 12.2.6 The Pragmatists (Row 4) -- 12.3 The Inception of the Digital Age (Rows 5 to 7 of Table IB) -- 12.4 Differences Between Information and Knowledge Machines -- 12.5 The Impact of Digital Domains on Extended Information -- 12.5.1 Positive Events Through the Knowledge Era (Row 5 Table IB) -- 12.5.1.1 Positive personal migration -- 12.5.1.2 Positive social migration -- 12.5.2 Negative Events in the Knowledge Era (Row 6 in Table IB) -- 12.5.3 Object and Function Basis of Kms in the Society (Row 7 Table IB) -- 12.6 Action [(VF)* Upon *Object (NO)] Based Operations -- 12.6.1 Generic Representation Of Vf*No -- 12.6.2 Processors for Numerous Applications…”
Libro electrónico -
2249Publicado 2023Tabla de Contenidos: “…Absolute Quantification -- 5.8 Mass Spectrometry - Lipidomics and Metabolomics -- 5.9 Mass Spectrometry - Drug Discovery -- 5.10 Conclusion and Future Scope -- 5.11 Resources and Software -- Acknowledgement -- References -- Chapter 6 Applications of Bioinformatics Tools in Medicinal Biology and Biotechnology -- 6.1 Introduction -- 6.2 Bioinformatics Tools -- 6.3 The Genetic Basis of Diseases -- 6.4 Proteomics -- 6.5 Transcriptomic -- 6.6 Cancer -- 6.7 Diagnosis -- 6.8 Drug Discovery and Testing -- 6.9 Molecular Medicines -- 6.10 Personalized (Precision) Medicines -- 6.11 Vaccine Development and Drug Discovery in Infectious Diseases and COVID-19 Pandemic -- 6.12 Prognosis of Ailments -- 6.13 Concluding Remarks and Future Prospects -- Acknowledgement -- References -- Chapter 7 Clinical Applications of "Omics" Technology as a Bioinformatic Tool -- Abbreviations -- 7.1 Introduction -- 7.2 Execution Method -- 7.3 Overview of Omics Technology -- 7.4 Genomics -- 7.5 Nutrigenomics -- 7.6 Transcriptomics…”
Libro electrónico -
2250Publicado 2005Tabla de Contenidos: “…Device management -- 11.1 Device management overview -- 11.2 Architecture -- 11.2.1 Device Manager -- 11.2.2 OSGi Agent -- 11.2.3 Device Manager database -- 11.2.4 Device Management portlets -- 11.2.5 Device Manager Console -- 11.3 OGSGi device sample scenario -- 11.3.1 Software distribution for OSGi bundles -- 11.3.2 Software removal for OSGi bundles -- 11.3.3 Connecting the Device Manager server and WebSphere Studio Device Developer -- 11.4 Device Manager sample scenario -- 11.4.1 Interim Fix 1 and IFix instructions -- 11.4.2 Device Manager scenario description -- 11.4.3 Device Manager bundle procedure -- 11.4.4 Update the sample application to use the new service -- 11.4.5 Device manager bundle review -- 11.4.6 Running the sample application with device management bundle -- 11.4.7 Device Troubleshooting -- 11.5 Troubleshooting with Device Manager -- Appendix A. Installing WCTME V5.7.1 -- WCTME Overview -- Installation prerequisites -- Preinstallation procedures -- Machine installations -- WebSphere Studio Site Developer installation…”
Libro electrónico -
2251por Moeller, MortenTabla de Contenidos: “…Creating profiles, packages, and tasks -- 5.1 Defining the logical structure of the environment -- 5.2 Deploying management endpoints -- 5.3 Creating monitoring profiles -- 5.3.1 Inventory scanning -- 5.3.2 Hardware scanning -- 5.3.3 System software scan -- 5.3.4 Custom scan -- 5.3.5 Defining OS and HW Monitoring Profiles -- 5.3.6 Defining TEC profiles -- 5.3.7 Building the software package for deploying DB2 Server -- 5.3.8 Creating a DB2 instance for the Outlet Solution -- 5.3.9 Defining DB2 monitoring objects -- 5.3.10 Creating the db2ecc user ID -- 5.3.11 Creating profiles for Tivoli Monitoring for Databases -- 5.3.12 Deploying WebSphere Application Server -- 5.3.13 Enabling WebSphere Application Server monitoring -- 5.3.14 Creating a software package for TimeCard Store Server -- 5.3.15 Installing the TMTP Management Agent -- 5.3.16 Configuring TMTP to monitor WebSphere -- Part 3 Putting the solution to use -- Chapter 6. …”
Publicado 2005
Libro electrónico -
2252por Bergland, JohnTabla de Contenidos: “…Security and administration -- 6.1 Linux security -- 6.1.1 System security -- 6.2 Linux administration -- 6.2.1 Scripting -- 6.2.2 Remote administration -- 6.3 Domino security -- 6.3.1 Domino 6.5 server document -- 6.3.2 Database ACLs -- 6.3.3 Notes.ini settings for Domino administration -- 6.4 Domino Web Access 6.5 security -- 6.4.1 Encrypted mail support -- 6.4.2 Secure logout -- 6.4.3 Additional security considerations -- 6.5 Domino 6.5 administration -- 6.5.1 Domino Web Administrator -- 6.5.2 Server tab -- 6.5.3 Domino Java Console -- 6.6 Converting mail files to Domino Web Access 6.5 -- Chapter 7. Configuration and tuning -- 7.1 Configuring Linux tunable parameters for DWA 6.5 -- 7.1.1 Modifying file descriptor and thread limits -- 7.2 Domino Web Access configuration and tuning…”
Publicado 2004
Libro electrónico -
2253por Laitinen, SailaTabla de Contenidos: “…12 -- 2.3.1 Baseline Maturity 13 -- 2.3.2 Customization Maturity 13 -- 2.3.3 Least Stable Sub-system 14 -- 2.3.4 Program Timing 14 -- 2.4 Summary 14 -- Chapter 3: Release Management 17 -- 3.1 The Build Cycle 19 -- 3.2 Required Testing Activities 23 -- 3.3 Summary 23 -- Chapter 4: Binary Compatibility 25 -- 4.1 API Categorization 28 -- 4.2 Maintaining Compatibility 30 -- 4.2.1 Platform Compatibility 30 -- 4.2.2 Platform-based Phone Compatibility 31 -- 4.2.3 Application Compatibility 32 -- 4.2.4 Compatibility Dimensions 32 -- 4.3 Binary Compatibility Scenario 33 -- 4.4 Binary Compatibility Verifi cation 35 -- 4.4.1 The Binary Compatibility Verifi cation Process 35 -- 4.4.2 The Binary Compatibility Verifi cation Suite 36 -- 4.4.2.1 The SDK Analyser 36 -- 4.4.2.2 The Source Analyser 38 -- 4.4.2.3 The Binary Analyser 39 -- 4.4.2.4 The Application Launcher 39 -- 4.4.2.5 Binary Compatibility Applications 40 -- 4.4.2.6 Third-Party Applications 40 -- 4.5 Possible Future Tools 40 -- 4.5.1 DepInfo Tool 41 -- 4.5.2 Header Checker Tool 41 -- 4.5.3 Ordinal Checker 42 -- 4.6 Summary 42 -- Chapter 5: Certifi cates and Standards 43 -- 5.1 Technology Certifi cates 44 -- 5.1.1 Java/TCK 44 -- 5.1.2 Bluetooth 47 -- 5.1.2.1 BT Certifi cation Areas 47 -- 5.1.3 Other Technology Licences 48 -- 5.1.4 Security Certifi cates 49 -- 5.1.5 Universal Serial Bus 50 -- 5.1.6 Infrared Connectivity 50 -- 5.1.7 Multimedia Cards (MMC) 51 -- 5.2 The Open Mobile Alliance (OMA) 52.…”
Publicado 2007
Libro electrónico -
2254por Dubois, FlorenceTabla de Contenidos: “…5.1.3 Control Center support for HSC and MCOD cloning -- 5.2 Cloning scenario -- 5.3 Using the Control Center cloning wizard -- 5.3.1 System requirements -- 5.3.2 Skill requirements -- 5.3.3 Prepare to create a cloning session -- 5.3.4 Running the Control Center cloning wizard -- 5.3.5 Prepare for submitting the generated JCL -- 5.3.6 XMAP member and MCOD cloning -- 5.3.7 When do you have to regenerate JCL -- 5.3.8 Running the generated JCL -- 5.3.9 Additional considerations -- Chapter 6. …”
Publicado 2003
Libro electrónico -
2255Publicado 2003Tabla de Contenidos: “…7.1.2 Installing WebSphere Application Server -- 7.1.3 Installing DB2 Universal Database -- 7.1.4 Installing and configuring IBM Directory Server V5.1 -- 7.2 Installing IBM Tivoli Intelligent ThinkDynamic Orchestrator -- Chapter 8. …”
Libro electrónico -
2256Publicado 2007Tabla de Contenidos: “…7.1.3 Sequences -- 7 .1.4 Permutations -- 7.2 Induction -- 7.2.1 The Sum of Odd Numbers -- 7 .2.2 Subset Counting Revisited -- 7 .2.3 More Induction Proofs -- 7 .2.4 Counting Regions -- 7.3 Counting Subsets -- 7.3.1 The Number of Ordered Subsets -- 7 .3.2 The Number of Subsets of a Given Size -- 7 .3.3 The Binomial Theorem -- 7 .3.4 Distributing Presents -- 7 .3.5 Anagrams -- 7 .3.6 Distribution of Money -- 7.4 Pascal's Triangle -- 7 .4.1 Identities in the Pascal Triangle -- 7.4.2 A Bird's- Eye View at the Pascal Triangle -- 7.5 Combinatorial Probability -- 7.5.1 Events and Probabilities -- 7 .5.2 Independent Repetition of an Experiment -- 7 .5.3 The Law of Large Numbers -- 7.6 Fibonacci Numbers -- 7.6.1 Fibonacci's Exercise -- 7 .6.2 Lots of Identities -- 7 .6.3 A Formula for the Fibonacci Numbers -- 7.7 Integers, Divisors, and Primes -- 7. 7.1 Divisibility of Integers -- 7.7.2 Primes and Their History -- 7.7.3 Factorization into Primes -- 7.7.4 Fermat's "Little" Theorem -- 7.7.5 The Euclidean Algorithm -- 7. 7.6 Primality Test -- Chapter 8: Combinatorics -- 8.1 The Pigeonhole Principle -- 8.2 Strong Pigeonholes -- 8.2.1 Pigeonhole Principle Examples: Weighing Balls -- 8.3 Dilworth's Theorem -- 8.4 Problems -- 8.5 Sets of the Same Size: Bijections -- 8.6 Finite Sets -- 8.7 Inclusion-Exclusion -- 8.8 lnfinite Sets -- 8.9 Schroder-Bcrnstein Theorem -- 8.10 Countable Sets -- 8.11 The Continuum -- 8.12 Diagonal Argwnents -- 8.12.1 A Paradox -- 8.13 Set Theory Revisited -- 8.13.1 Bijections, Injections, Surjections -- 8.13.2 Finite Cardinality -- 8.14 Functions and Permutations -- 8.14.1 Surjection, Injection, Bijection -- 8.14.2 Permutation -- Chapter 9: Automata -- 9.1 Introduction -- 9.1.1 Abstraction -- 9.2 Decision Problems vs Functions -- 9.2.1 Strings -- 9.2.2 Operations on Strings -- 9.2.3 Operations on Sets…”
Libro electrónico -
2257Publicado 2015Tabla de Contenidos: “…Front Cover -- Architecting High Performing, Scalable and Available Enterprise Web Applications -- Copyright Page -- Dedication -- Contents -- Preface -- All-around quality -- 360° view: key highlights and differentiators of the book -- Motivation for the book -- Main themes and focus areas -- Organization of chapters -- Target audience -- Declaration -- About the Author -- Acknowledgments -- 1 Architecting Scalable Enterprise Web Applications -- 1.1 Introduction -- 1.2 Scalability layers -- 1.3 Key tenets of enterprise scalability -- 1.3.1 Dimensions of scalability -- 1.4 Challenges for scalability -- 1.5 Scalability patterns and best practices -- 1.5.1 Scalability patterns -- 1.5.1.1 Scalability best practices -- 1.5.2 Deep-dive into scalability -- 1.5.2.1 Scalability through fault tolerance and failover -- 1.5.2.2 Distributed computing -- 1.5.2.2.1 Hyperscale architecture -- 1.5.2.3 Services scalability -- Architecting scalable services infrastructure -- Distributed clustered ESB configuration -- 1.5.2.4 Database scalability -- 1.5.2.5 Storage scalability -- 1.5.2.6 Virtualization -- Impact of virtualization on scalability -- 1.5.2.7 Cloud alternative -- 1.6 Architecting scalable systems -- 1.6.1 Real-world scalability-related metrics of the enterprise application -- 1.6.2 Infrastructure planning -- 1.6.2.1 Infrastructure design and components -- 1.6.2.1.1 Sizing and capacity planning -- 1.6.3 Right routing and workload management -- 1.6.4 Scalable software design -- 1.6.5 Scalability strategy at various layers -- 1.6.6 Scalability monitoring and governance -- 1.7 Scalability testing -- 1.8 Scalability anti-patterns -- 1.9 Case study -- 1.9.1 Problem statement -- 1.9.2 Analysis methodology -- 1.9.2.1 Architecture and code analysis -- 1.9.2.2 Testing methodology -- 1.9.2.3 Scalability problems identified -- 1.9.3 Scalability optimization…”
Libro electrónico -
2258Publicado 2020Tabla de Contenidos: “…Jahrhunderts -- 5.4.1 Vertrauen -- 5.4.2 Glaubwürdigkeit -- 5.4.3 Verantwortung -- 5.4.4 Transparenz -- 5.4.5 Sicherheit -- 5.4.6 Nachhaltigkeit -- 5.5 Datenschutz als regulatorischer Rahmen -- 5.6 Ethisches Handeln in analytischen Ökosystemen -- Teil II - Konzepte, Lösungen und Toolkategorien -- 6 Komponenten für zufriedenstellende Datenqualität und Stammdaten -- 6.1 Motivation -- 6.2 Die Problemlage -- 6.3 Erfolgskomponente Organisation -- 6.4 Erfolgskomponente Prozesse -- Analyse -- Bereinigung -- Anreicherung -- Überwachung und Kontrolle -- 6.5 Erfolgskomponente Technologie -- 6.6 Vorgehensweise für die Etablierung zufriedenstellender Datenqualität und Stammdaten -- 6.7 Fazit -- 7 Der Datenkatalog: das Fundament der Data-Governance-Initiative -- 7.1 Einleitung -- 7.2 Bedeutung des Datenkatalogs für die Data-Governance-Initiative -- 7.3 Metamodell -- 7.4 Funktionalitäten -- 7.5 Einführungsprojekt -- 7.6 Fachlicher Betrieb -- 7.7 Fazit -- 8 Self-Service-Datenbereitstellung im Data-Science-Umfeld: der emanzipierte Anwender -- 8.1 Einführung -- 8.2 Data Governance und Data Science -- 8.3 Self-Service-Angebote für Data & -- Analytics -- 8.4 Self-Service vs. zentrale Datenaufbereitung -- 8.5 Self-Service in der Praxis - Beispiele ganzheitlicher Govnernance-Konzepte -- 8.6 Fazit -- 9 DataOps als Basis und Treiber einer erfolgreichen Data Governance…”
Libro electrónico -
2259Publicado 2020Tabla de Contenidos: “…5.1 The Nature of Information and the Rules of Collection -- 5.2 Leads and Contacts for the Private Investigator -- 5.3 Public Sources of Information -- 5.3.1 Federal Agencies -- 5.3.2 State and Local Agencies -- 5.4 Private Sources of Information -- 5.4.1 Directories, Databases, and Atlases -- 5.4.1.1 Business Databases -- 5.4.1.2 Miscellaneous Databases -- 5.4.2 Libraries -- 5.4.3 Newspapers -- 5.4.4 The Internet and Web-Based Searches -- 5.4.4.1 Social Media Searches -- 5.4.5 Professional Associations and Groups -- 5.4.6 Auto Records -- 5.5 The Background Investigation -- 5.6 Real Property Title Search -- 5.7 Conclusion -- Notes -- 6: Collection of Evidence and Preservation of the Scene -- 6.1 Investigative Technique: Initial Scene Visitation -- 6.2 Investigative Technique: Preliminary Evidence Collection Strategies -- 6.3 Investigative Technique: Scene Sketches and Other Graphic Portrayals -- 6.3.1 Rules for Sketching -- 6.3.2 Rules for Measuring -- 6.4 Investigative Technique: Photographic Evidence -- 6.4.1 Location of Crime Scene -- 6.4.2 Photography and Special Applications -- 6.4.2.1 Vehicular Accidents and Related Auto Claims -- 6.4.2.2 Bodily Injuries and Photographic Method -- 6.4.2.3 Arson/Insurance Fraud and Photographic Evidence -- 6.4.2.4 Burglary/Criminal Trespass/Forcible Theft and Photographic Evidence -- 6.4.2.5 Drug and Alcohol Abuse and Photographic Evidence -- 6.5 Investigative Technique: Documentary Evidence -- 6.5.1 Police Records -- 6.5.1.1 Alcohol or Chemical Reports -- 6.5.1.2 Accident Reports -- 6.5.1.3 Domestic Relations Documentation -- 6.5.1.4 Radio Logs -- 6.5.1.5 Arrest Reports-Narcotics -- 6.5.1.6 Violence in the Workplace -- 6.5.1.7 Missing Person Reports -- 6.5.1.8 Disposition Sheets -- 6.5.1.9 Suspect Descriptions -- 6.6 Investigative Technique: Medical Records…”
Libro electrónico -
2260por Al-Turjman, FadiTabla de Contenidos: “…4.3.3 Strategy for preserving population heterogeneity -- 4.3.4 Inner functioning and complexity of the proposed algorithm -- 4.4 Experiments and comparative analysis -- 4.4.1 Dataset and preprocessing -- 4.4.2 Experimental setup -- 4.4.3 Obtained simulation outcomes and comparative analysis -- 4.5 Conclusion -- References -- 5 Reviewing artificial intelligence and blockchain innovations: transformative applications in the energy sector -- 5.1 Introduction -- 5.2 Literature review -- 5.2.1 Background of blockchain technology -- 5.2.2 Distributed energy resources, a new paradigm -- 5.2.3 Consensus algorithms -- 5.3 Applications of artificial intelligence and blockchain in the energy industry -- 5.3.1 Artificial intelligence in solar energy: yield performance predictions -- 5.3.2 Using artificial intelligence to improve energy performance -- 5.3.3 Artificial intelligence in grid management -- 5.3.4 Solar coin use on blockchain for renewables -- 5.3.5 Trading in energy (blockchain using peer-to-peer and artificial intelligence technologies) -- 5.3.6 Intelligent grids -- 5.3.7 Grid security -- 5.3.8 Grid administration and efficiency -- 5.3.9 Increased productivity -- 5.3.10 Predictive analytics -- 5.3.11 Storage of energy -- 5.3.12 Trading in energy -- 5.3.13 Power theft and energy fraud detection -- 5.3.14 Microgrids -- 5.3.15 Customer engagement -- 5.4 Use cases -- 5.4.1 Powerledger -- 5.4.2 Energy web foundation -- 5.4.3 Verv -- 5.5 Discussions -- 5.5.1 Comparison between Solana and the Ethereum network -- 5.5.1.1 Tesla power and Powerlegder -- 5.6 Conclusion -- References -- 6 Using artificial intelligence in education applications -- 6.1 Introduction -- 6.2 Extent of past work -- 6.3 Materials and methods -- 6.4 Result and discussion -- 6.5 Conclusion -- References…”
Publicado 2024
Libro electrónico