Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 239
- Application software 202
- Artificial intelligence 200
- Management 192
- Engineering & Applied Sciences 170
- Computer networks 160
- Cloud computing 157
- Computer programs 127
- Machine learning 123
- Computer security 116
- Computer graphics 102
- Data processing 101
- Python (Computer program language) 101
- Security measures 101
- Digital techniques 98
- Computer Science 94
- Photography 85
- Web site development 82
- Design 81
- Technological innovations 81
- Internet of things 79
- Image processing 77
- Computer software 76
- History 71
- Programming 71
- Examinations 68
- Information technology 67
- Historia 65
- Leadership 65
- Computer programming 59
-
4381Publicado 2013Tabla de Contenidos: “…7.4.3 Criteria for Preferred Material in Ecolabels -- 7.5 Conclusion -- References -- DSM's Sustainability Journey Towards a Proactive Ingredient Policy for Gaining Effectiveness in the Design of Better Products -- 8.1 General Introduction: Sustainability as Business Growth Driver Opportunity and Global Trends -- 8.1.1 Ecological Benefits: Transparent Assessment with Life-cycle Assessment (LCA) -- 8.1.2 Importance of Global Platforms and Partnerships -- 8.1.3 The Challenges Ahead for a Life Sciences and Materials Sciences Company -- 8.2 A Brighter Future with Composites -- 8.2.1 Leading-edge Performance -- 8.2.2 Lower Eco-footprint -- 8.2.3 Elimination of Substances of hazardous concern -- 8.2.4 BluCureTM Cobalt-free Curing Systems -- 8.2.5 Alternatives to Styrene Reactive Diluents -- 8.2.6 Introduction of Good Manufacturing Practice (GMP) -- 8.3 Facing the Technical, Performance and Cost Challenges: the Introduction of Halogen-free Flame Retardants -- 8.3.1 Overcoming Technical Challenges -- 8.3.2 Moving Forward -- 8.4 Conclusion -- References -- US Environmental Protection Agency's Design for the Environment (DfE) Alternatives Assessment Program -- 9.1 Introduction -- 9.2 Selecting an Approach for Chemical Substitution -- 9.3 PentaBDE Case Study -- 9.3.1 How DfE Conducted CAA for PentaBDE -- 9.3.2 Limitations of Original Methodology and Criteria -- 9.4 New CAA Methodology and Criteria: Steps to Conducting a CAA -- 9.4.1 Step 1: Determine Feasibility -- 9.4.2 Step 2: Collect Information on Chemical Alternatives -- 9.4.3 Step 3: Convene Stakeholders -- 9.4.4 Step 4: Identify Alternatives -- 9.4.5 Step 5: Conduct the Hazard Assessment -- 9.4.6 Step 6: Apply Economic and Life-cycle Context -- 9.4.7 Step 7: Apply the Results in Decision-making for Safer Chemical Substitutes -- 9.5 Application of New CAA Criteria…”
Libro electrónico -
4382Publicado 2024Tabla de Contenidos: “…Intro -- Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Contributors -- Chapter 1 A Novel Robust Watermarking Algorithm for Encrypted Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition -- 1.1 Introduction -- 1.2 Basic Theory -- 1.2.1 Discrete Wavelet Transform (DWT) -- 1.2.2 Non-Subsampled Shearlet Transform (NSST) -- 1.2.3 Matrix Schur Decomposition -- 1.2.4 Chaos Encryption System -- 1.3 Proposed Algorithm -- 1.3.1 Medical Image Encryption -- 1.3.2 Feature Extraction -- 1.3.3 Embed Watermark -- 1.3.4 Extraction of Watermark -- 1.4 Experiments and Analysis of Results -- 1.4.1 Simulation Experiment -- 1.4.2 Attacks Results -- 1.4.3 Contrastion to Plaintext Domain Algorithm -- 1.4.4 Contrastion to Other Encrypted Algorithms -- 1.5 Conclusion -- References -- Chapter 2 Robust Zero Watermarking Algorithm for Encrypted Medical Images Based on SUSAN-DCT -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Basic Theory and Proposed Algorithm -- 2.3.1 SUSAN Edge Detection -- 2.3.2 Hu Moments -- 2.3.3 Logical Mapping -- 2.3.4 Proposed Algorithm -- 2.4 Experiment and Results -- 2.4.1 Evaluation Parameter -- 2.4.2 Experimental Setup -- 2.4.3 Results and Analysis -- 2.5 Conclusion -- References -- Chapter 3 Robust Zero Watermarking Algorithm for Encrypted Medical Volume Data Based on PJFM and 3D-DCT -- 3.1 Introduction -- 3.2 The Fundamental Theory -- 3.2.1 Pseudo Jacobi-Fourier Moment -- 3.2.2 D-DCT and 3D-IDCT -- 3.2.3 Logistic Mapping -- 3.3 The Proposed Method -- 3.3.1 Medical Volume Data Encryption -- 3.3.2 Feature Extraction -- 3.3.3 Watermark Encryption and Embedding -- 3.3.4 Watermark Extraction and Decryption -- 3.4 Experimental Results and Performance Evaluation -- 3.4.1 Simulation Experiment -- 3.4.2 Attacks Results -- 3.4.3 Comparison with Unencrypted Algorithm -- 3.5 Conclusion -- References…”
Libro electrónico -
4383por Jayaweera, Sudharman K., 1972-Tabla de Contenidos: “…9.6.6 Optimal Myopic Sensing Decision Policies, 354 -- 9.7 A Reduced Complexity Optimal Subband Selection Framework with an Alternative Reward Function, 355 -- 9.7.1 A New Model for Subband Dynamics, 357 -- 9.7.2 A Simplified Reward Function and a Reduced-Complexity Optimal Policy, 359 -- 9.7.3 A Reduced Complexity Optimal Policy for Independent Subbands, 362 -- 9.7.4 Optimal Myopic Policies with Reduced Dimensional Subband State Vectors, 363 -- 9.8 Machine-Learning Aided Subband Selection Policies, 364 -- 9.8.1 Q-Learning, 365 -- 9.8.2 Q-Learning in a POMDP: A Q-Learning Algorithm for Subband Selection, 368 -- 9.9 Summary, 372 -- 10 Spectral Activity Detection inWideband Cognitive Radios 377 -- 10.1 Introduction, 377 -- 10.2 Optimal Wideband Spectral Activity Detection, 379 -- 10.3 Wideband Spectral Activity Detection, 386 -- 10.4 Wavelet Transform-Based Wideband Spectral Activity Detection, 392 -- 10.4.1 Wavelet Transform, 394 -- 10.4.2 Edge Detection with Wavelet Transform, 395 -- 10.4.3 Spectral Activity Detection Based on Edge Detection, 397 -- 10.5 Wideband Spectral Activity Detection in Non-Gaussian Noise, 398 -- 10.5.1 Arbitrary but Known Noise Distribution, 399 -- 10.5.2 Robust Spectral Activity Detection, 406 -- 10.6 Wideband Spectral Activity Detection with Compressive Sampling, 413 -- 10.6.1 Compressive Sampling, 415 -- 10.6.2 Compressive Sensing of Wideband Spectrum, 419 -- 10.7 Summary, 421 -- 11 Signal Classification inWideband Cognitive Radios 429 -- 11.1 Introduction, 429 -- 11.2 Signal Classification Problem in a Wideband Cognitive Radio, 431 -- 11.3 Feature Extraction for Signal Classification, 435 -- 11.3.1 Carrier/Center Frequency, 435 -- 11.3.2 Cyclostationary Features, 436 -- 11.3.3 Modulation Type and Order Features, 441 -- 11.4 A Signal Classification Architecture for a Wideband Cognitive Radio, 445 -- 11.5 Bayesian Nonparametric Signal Classification, 447 -- 11.6 Sequential Bayesian Nonparametric Signal Classification, 462 -- 11.7 Summary, 469.…”
Publicado 2015
Libro electrónico -
4384Publicado 2021Tabla de Contenidos: “…Domain 3 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- ISO/IEC 19249 -- Threat Modeling -- Secure Defaults -- Fail Securely -- Separation of Duties -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Privacy by Design -- Shared Responsibility -- Defense in Depth -- Understand the Fundamental Concepts of Security Models -- Primer on Common Model Components -- Information Flow Model -- Noninterference Model -- Bell-LaPadula Model -- Biba Integrity Model -- Clark-Wilson Model -- Brewer-Nash Model -- Take-Grant Model -- Select Controls Based Upon Systems Security Requirements -- Understand Security Capabilities of Information Systems -- Memory Protection -- Secure Cryptoprocessor -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-Based Systems -- Server-Based Systems -- Database Systems -- Cryptographic Systems -- Industrial Control Systems -- Cloud-Based Systems -- Distributed Systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded Systems -- High-Performance Computing Systems -- Edge Computing Systems -- Virtualized Systems -- Select and Determine Cryptographic Solutions -- Cryptography Basics -- Cryptographic Lifecycle -- Cryptographic Methods -- Public Key Infrastructure -- Key Management Practices -- Digital Signatures and Digital Certificates -- Nonrepudiation -- Integrity -- Understand Methods of Cryptanalytic Attacks -- Brute Force -- Ciphertext Only -- Known Plaintext -- Chosen Plaintext Attack -- Frequency Analysis -- Chosen Ciphertext -- Implementation Attacks -- Side-Channel Attacks -- Fault Injection -- Timing Attacks -- Man-in-the-Middle -- Pass the Hash -- Kerberos Exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design…”
Libro electrónico -
4385Publicado 2019Tabla de Contenidos: “…Real‐World Applications -- Challenges and Future Research -- Analysis Challenges -- Scale Challenges -- Sensitivity Challenge -- Conclusion -- Acknowledgment -- Locations, Events, Actions, Participants, and Things in the Three Little Pigs -- Edges in the Three Little Pigs Graph -- References -- Chapter 7 A Neural Network Model of Motivated Decision‐Making in Everyday Social Behavior -- Introduction -- Overview -- Constraint Satisfaction Processing -- Theoretical Background -- Motivational Systems -- Situations -- Interoceptive or Bodily State -- Wanting -- Competition Among Motives -- Motivation Changes Dynamically -- Neural Network Implementation -- General Processing in the Network -- Conclusion -- References -- Chapter 8 Dealing with Culture as Inherited Information -- Galton's Problem as a Core Feature of Cultural Theory -- How to Correct for Treelike Inheritance of Traits Across Groups -- Early Attempts to Correct Galton's Problem -- More Recent Attempts to Correct Galton's Problem -- Example Applications -- Dealing with Nonindependence in Less Treelike Network Structures -- Determining Which Network Is Most Important for a Cultural Trait -- Correcting for Network Nonindependence When Testing Trait-Trait Correlations -- Example Applications -- Future Directions for Formal Modeling of Culture -- Improved Network Autoregression Implementations -- A Global Data Set of Expected Nonindependence to Solve Galton's Problem -- Better Collection of Behavioral Trait Variation Across Populations -- Acknowledgments -- References -- Chapter 9 Social Media, Global Connections, and Information Environments: Building Complex Understandings of Multi‐Actor Interactions -- A New Setting of Hyperconnectivity -- The Information Environment -- Social Media in the Information Environment -- Integrative Approaches to Understanding Human Behavior -- Muddy the Waters…”
Libro electrónico -
4386por Dirksen, JosTabla de Contenidos: “…THREE.MeshToonMaterial -- THREE.MeshStandardMaterial -- THREE.MeshPhysicalMaterial -- THREE.ShadowMaterial -- Using your own shaders with THREE.ShaderMaterial -- Customizing existing shaders with CustomShaderMaterial -- Materials you can use for a line geometry -- THREE.LineBasicMaterial -- THREE.LineDashedMaterial -- Summary -- Chapter 5: Learning to Work with Geometries -- 2D geometries -- THREE.PlaneGeometry -- THREE.CircleGeometry -- THREE.RingGeometry -- THREE.ShapeGeometry -- 3D geometries -- THREE.BoxGeometry -- THREE.SphereGeometry -- THREE.CylinderGeometry -- THREE.ConeGeometry -- THREE.TorusGeometry -- THREE.TorusKnotGeometry -- THREE.PolyhedronGeometry -- THREE.IcosahedronGeometry -- THREE.TetrahedronGeometry -- THREE.OctahedronGeometry -- THREE.DodecahedronGeometry -- Summary -- Chapter 6: Exploring Advanced Geometries -- Learning advanced geometries -- THREE.ConvexGeometry -- THREE.LatheGeometry -- BoxLineGeometry -- THREE.RoundedBoxGeometry -- TeapotGeometry -- Creating a geometry by extruding a 2D shape -- THREE.ExtrudeGeometry -- THREE.TubeGeometry -- Extruding 3D shapes from an SVG element -- THREE.ParametricGeometry -- Geometries you can use for debugging -- THREE.EdgesGeometry -- THREE.WireFrameGeometry -- Creating a 3D text mesh -- Rendering text -- Adding custom fonts -- Creating text using the Troika library -- Summary -- Chapter 7: Points and Sprites -- Understanding points and sprites -- Styling particles using textures -- Drawing an image on the canvas -- Using textures to style particles -- Working with sprite maps -- Creating THREE.Points from existing geometry -- Summary -- Part 3: Particle Clouds, Loading and Animating Models -- Chapter 8: Creating and Loading Advanced Meshes and Geometries -- Geometry grouping and merging -- Grouping objects together -- Merging geometries -- Loading geometries from external resources…”
Publicado 2023
Libro electrónico -
4387Publicado 2023Tabla de Contenidos: “…-- CCSP Exam Objectives -- CCSP Certification Exam Objective Map -- How to Contact the Publisher -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Architectural Concepts -- Cloud Characteristics -- Business Requirements -- Understanding the Existing State -- Cost/Benefit Analysis -- Intended Impact -- Cloud Computing Service Categories -- Software as a Service -- Infrastructure as a Service -- Platform as a Service -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Multi-Cloud -- Community Cloud -- Multitenancy -- Cloud Computing Roles and Responsibilities -- Cloud Computing Reference Architecture -- Virtualization -- Hypervisors -- Virtualization Security -- Cloud Shared Considerations -- Security and Privacy Considerations -- Operational Considerations -- Emerging Technologies -- Machine Learning and Artificial Intelligence -- Blockchain -- Internet of Things -- Containers -- Quantum Computing -- Edge and Fog Computing -- Confidential Computing -- DevOps and DevSecOps -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Data Classification -- Data Inventory and Discovery -- Data Ownership -- Data Flows -- Data Discovery Methods -- Information Rights Management -- Certificates and IRM -- IRM in the Cloud -- IRM Tool Traits -- Data Control -- Data Retention -- Data Audit and Audit Mechanisms -- Data Destruction/Disposal -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Cloud Data Security -- Cloud Data Lifecycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Cloud Storage Architectures -- Storage Types…”
Libro electrónico -
4388Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1 - Implementing Turning Operations in Fusion 360 -- Chapter 1: Getting Started with Turning and Its Tools -- Technical requirements -- Approaching a lathe and its components -- Cylindrical coordinate system -- Different types of turning operations -- Understanding the main parameters -- Turning speed -- Cutting speed -- Cutting depth -- Cutting feed -- Cutting power -- Exploring main machining strategies -- Longitudinal operations -- Facing operations -- Plunging operations -- Profiling operations -- Understanding tool geometry -- Tool edges -- Tool surfaces -- Tool angles -- Summary -- Chapter 2: Handling Part Setup for Turning -- Technical requirements -- Exploring the main interface of a CAM project -- Finding example projects in Fusion 360 -- Importing our chuck -- Understanding how to set up the first part to be machined -- Setup tab -- Stock tab -- The Post Process tab -- Summary -- Chapter 3: Discovering the Tool Library and Custom Tools -- Technical requirements -- Discovering the tool library -- Creating a new tool -- Getting a sample tool -- Creating a new tool -- Importing a third-party tool library -- Importing new tools with a plugin (CoroPlus) -- Summary -- Chapter 4: Implementing Our First Turning Operation -- Technical requirements -- Setting up a facing operation -- Using CoroPlus to calculate cutting parameters -- Entering the cutting parameters into Fusion 360 -- Discovering tool simulation -- Checking the generated G-code -- Settings -- Operations -- Summary -- Chapter 5: Discovering More Turning Strategies -- Technical requirements -- Turning Profile (Roughing) -- The Tool tab -- The Geometry tab -- The Passes tab -- Simulation -- Turning Profile (Finishing) -- The Tool tab -- The Geometry tab…”
Libro electrónico -
4389Publicado 2011Tabla de Contenidos: “…Sentry-Bot: An Intruder Detector -- Adding the Ultrasonic Sensor -- Avoiding Objects -- Following an Object in a Straight Line -- The Shooter Extension -- Testing the Shooter -- Creating the Complete Sentry Program -- Conclusion -- 13. Table-Bot: An Edge-Avoiding Robot -- Creating the Antennae Attachments -- Programming Table-Bot -- Keeping Track of Events -- Getting Out of Corners -- Conclusion -- 14. …”
Libro electrónico -
4390Publicado 2022Tabla de Contenidos: “…-- 1.1.1 A Nuts-and-Bolts Description -- 1.1.2 A Services Description -- 1.1.3 What Is a Protocol? -- 1.2 The Network Edge -- 1.2.1 Access Networks -- 1.2.2 Physical Media -- 1.3 The Network Core -- 1.3.1 Packet Switching -- 1.3.2 Circuit Switching -- 1.3.3 A Network of Networks -- 1.4 Delay, Loss, and Throughput in Packet-Switched Networks -- 1.4.1 Overview of Delay in Packet-Switched Networks -- 1.4.2 Queuing Delay and Packet Loss -- 1.4.3 End-to-End Delay -- 1.4.4 Throughput in Computer Networks -- 1.5 Protocol Layers and Their Service Models -- 1.5.1 Layered Architecture -- 1.5.2 Encapsulation -- 1.6 Networks Under Attack -- 1.7 History of Computer Networking and the Internet -- 1.7.1 The Development of Packet Switching: 1961-1972 -- 1.7.2 Proprietary Networks and Internetworking: 1972-1980 -- 1.7.3 A Proliferation of Networks: 1980-1990 -- 1.7.4 The Internet Explosion: The 1990s -- 1.7.5 The New Millennium -- 1.8 Summary -- Homework Problems and Questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Chapter 2: Application Layer -- 2.1 Principles of Network Applications -- 2.1.1 Network Application Architectures -- 2.1.2 Processes Communicating -- 2.1.3 Transport Services Available to Applications -- 2.1.4 Transport Services Provided by the Internet -- 2.1.5 Application-Layer Protocols -- 2.1.6 Network Applications Covered in This Book -- 2.2 The Web and HTTP -- 2.2.1 Overview of HTTP -- 2.2.2 Non-Persistent and Persistent Connections -- 2.2.3 HTTP Message Format -- 2.2.4 User-Server Interaction: Cookies -- 2.2.5 Web Caching -- 2.2.6 HTTP/2…”
Libro electrónico -
4391Publicado 2017Tabla de Contenidos: “…2.4.2 DOPPLER FREQUENCY SHIFTS (OBSERVER STATIONARY, SOURCE IN MOTION) -- 2.4.3 ACOUSTIC FIELD FROM A MOVING SOURCE -- 2.5 SOUND REFLECTION AND TRANSMISSION AT A FLUID-FLUID BOUNDARY -- 2.5.1 STRUCTURE OF THE SOLUTION -- 2.5.2 THE STATIONARY PHASE APPROXIMATION -- 2.5.3 PLANE-WAVE REFLECTION -- 2.5.4 WESTON'S EFFECTIVE DEPTH -- 2.5.5 PLANE-WAVE REFRACTION -- 2.5.6 THE LATERAL WAVE -- 2.6 THE "IDEAL" WAVEGUIDE -- 2.6.1 PLANE WAVES AND NORMAL MODES -- 2.6.2 THE ACOUSTIC FIELD IN THE IDEAL WAVEGUIDE -- 2.6.3 INTERMODAL INTERFERENCE -- 2.7 THE PEKERIS CHANNEL -- 2.7.1 THE INTEGRAL-TRANSFORM SOLUTION FOR THE FIELD -- 2.7.2 THE NORMAL MODE SOLUTION -- 2.7.3 THE CHARACTERISTIC EQUATION -- 2.8 THREE-DIMENSIONAL PROPAGATION -- 2.8.1 HORIZONTAL REFRACTION -- 2.8.2 THE "IDEAL" WEDGE -- 2.8.3 THE SHADOW EDGE -- 2.8.4 INTRAMODAL INTERFERENCE -- 2.8.5 THE PENETRABLE WEDGE -- Acknowledgment -- REFERENCES -- 3 - Sound Propagation Modeling -- 3.1 RAY MODELS -- 3.1.1 A PARTICULAR TYPE OF ANALYTIC 2-D RAY TRACING -- 3.1.1.1 Kinematic Ray Tracing -- 3.1.1.2 Dynamic Ray Tracing -- 3.1.1.3 Caustics -- 3.1.1.4 Coherent Computation of Propagation Loss and Propagation Time Series -- 3.1.2 EXAMPLE -- 3.2 WAVE NUMBER INTEGRATION OR SPECTRAL METHODS -- 3.2.1 SOLUTION OF THE DEPTH-DEPENDENT ODE SYSTEMS -- 3.2.1.1 Recursive Computation of Reflection-Coefficient Matrices for the Solid Bottom -- 3.2.1.2 Propagator Matrices for the Fluid Region -- 3.2.1.3 Alternative Treatment of the Fluid Region -- 3.2.1.4 Final Remarks -- 3.2.2 ADAPTIVE INTEGRATION -- 3.2.3 EXAMPLE -- 3.3 NORMAL MODE PROPAGATION MODELS -- 3.3.1 MODAL WAVE NUMBERS -- 3.3.2 MODE FUNCTIONS -- 3.3.3 EXCITATION COEFFICIENTS -- 3.3.4 RANGE-DEPENDENT MEDIA -- 3.3.4.1 Equations Relating the Modal Expansion Coefficients -- 3.3.4.2 Solution in Terms of Reflection-Coefficient Matrices -- 3.3.4.3 Final Remarks…”
Libro electrónico -
4392Publicado 2019Tabla de Contenidos: “…Data Security and Privacy Protection -- 1.4.6. IoT-Based Edge Computing and Networking -- 1.5. Emerging Research Areas in Bio-Inspired Algorithm-Based Big Data Analytics -- 1.5.1. …”
Libro electrónico -
4393Publicado 2014“…This timely book aims to facilitate the implementation of cutting-edge techniques to design problems offering innovative solutions to the growing power demands in small- and large-size industries. …”
Libro electrónico -
4394Publicado 2016“…Thermofluid Modeling for Sustainable Energy Applications provides a collection of the most recent, cutting-edge developments in the application of fluid mechanics modeling to energy systems and energy efficient technology. …”
Libro electrónico -
4395Publicado 2016Tabla de Contenidos: “…9.3.2 Case-study: Size-and-shape analysis and mutation -- 9.4 Edge-based shape coordinates -- 9.5 Investigating allometry -- 10 Shape and size-and-shape distributions -- 10.1 The uniform distribution -- 10.2 Complex Bingham distribution -- 10.2.1 The density -- 10.2.2 Relation to the complex normal distribution -- 10.2.3 Relation to real Bingham distribution -- 10.2.4 The normalizing constant -- 10.2.5 Properties -- 10.2.6 Inference -- 10.2.7 Approximations and computation -- 10.2.8 Relationship with the Fisher-von Mises distribution -- 10.2.9 Simulation -- 10.3 Complex Watson distribution -- 10.3.1 The density -- 10.3.2 Inference -- 10.3.3 Large concentrations -- 10.4 Complex angular central Gaussian distribution -- 10.5 Complex Bingham quartic distribution -- 10.6 A rotationally symmetric shape family -- 10.7 Other distributions -- 10.8 Bayesian inference -- 10.9 Size-and-shape distributions -- 10.9.1 Rotationally symmetric size-and-shape family -- 10.9.2 Central complex Gaussian distribution -- 10.10 Size-and-shape versus shape -- 11 Offset normal shape distributions -- 11.1 Introduction -- 11.1.1 Equal mean case in two dimensions -- 11.1.2 The isotropic case in two dimensions -- 11.1.3 The triangle case -- 11.1.4 Approximations: Large and small variations -- 11.1.5 Exact moments -- 11.1.6 Isotropy -- 11.2 Offset normal shape distributions with general covariances -- 11.2.1 The complex normal case -- 11.2.2 General covariances: Small variations -- 11.3 Inference for offset normal distributions -- 11.3.1 General MLE -- 11.3.2 Isotropic case -- 11.3.3 Exact isotropic MLE in R -- 11.3.4 EM algorithm and extensions -- 11.4 Practical inference -- 11.5 Offset normal size-and-shape distributions -- 11.5.1 The isotropic case -- 11.5.2 Inference using the offset normal size-and-shape model -- 11.6 Distributions for higher dimensions -- 11.6.1 Introduction…”
Libro electrónico -
4396Publicado 2024“…This exciting new volume provides a comprehensive overview of the latest technological advances in agriculture, focusing on these three cutting-edge technologies. The book will explore the potential benefits of these technologies in improving agricultural efficiency, productivity, and sustainability. …”
Libro electrónico -
4397Publicado 2024“…In the rapidly evolving landscape of modern manufacturing, the integration of cutting-edge technologies has become imperative for businesses to remain competitive and adaptive. …”
Libro electrónico -
4398Publicado 2023“…The development of cutting-edge technology has increased the need for energy significantly, which has resulted in an overreliance on fossil fuels. …”
Libro electrónico -
4399Publicado 2023Tabla de Contenidos: “…Chapter 10 An Introduction to Security in Internet of Things (IoT) and Big Data -- 10.1 Introduction -- 10.2 Allusion Design of IoT -- 10.2.1 Stage 1-Edge Tool -- 10.2.2 Stage 2-Connectivity -- 10.2.3 Stage 3-Fog Computing -- 10.2.4 Stage 4-Data Collection -- 10.2.5 Stage 5-Data Abstraction -- 10.2.6 Stage 6-Applications -- 10.2.7 Stage 7-Cooperation and Processes -- 10.3 Vulnerabilities of IoT -- 10.3.1 The Properties and Relationships of Various IoT Networks -- 10.3.2 Device Attacks -- 10.3.3 Attacks on Network -- 10.3.4 Some Other Issues -- 10.3.4.1 Customer Delivery Value -- 10.3.4.2 Compatibility Problems With Equipment -- 10.3.4.3 Compatibility and Maintenance -- 10.3.4.4 Connectivity Issues in the Field of Data -- 10.3.4.5 Incorrect Data Collection and Difficulties -- 10.3.4.6 Security Concern -- 10.3.4.7 Problems in Computer Confidentiality -- 10.4 Challenges in Technology -- 10.4.1 Skepticism of Consumers -- 10.5 Analysis of IoT Security -- 10.5.1 Sensing Layer Security Threats -- 10.5.1.1 Node Capturing -- 10.5.1.2 Malicious Attack by Code Injection -- 10.5.1.3 Attack by Fake Data Injection -- 10.5.1.4 Sidelines Assaults -- 10.5.1.5 Attacks During Booting Process -- 10.5.2 Network Layer Safety Issues -- 10.5.2.1 Attack on Phishing Page -- 10.5.2.2 Attacks on Access -- 10.5.2.3 Attacks on Data Transmission -- 10.5.2.4 Attacks on Routing -- 10.5.3 Middleware Layer Safety Issues -- 10.5.3.1 Attack by SQL Injection -- 10.5.3.2 Attack by Signature Wrapping -- 10.5.3.3 Cloud Attack Injection with Malware -- 10.5.3.4 Cloud Flooding Attack -- 10.5.4 Gateways Safety Issues -- 10.5.4.1 On-Boarding Safely -- 10.5.4.2 Additional Interfaces -- 10.5.4.3 Encrypting End-to-End -- 10.5.5 Application Layer Safety Issues -- 10.5.5.1 Theft of Data -- 10.5.5.2 Attacks at Interruption in Service -- 10.5.5.3 Malicious Code Injection Attack…”
Libro electrónico -
4400por Prakash, Kolla Bhanu“…Whether a student diving into this field for the first time, a seasoned professional looking to broaden your skillset, or an enthusiast eager to explore cutting-edge advancements, this book has something for you. …”
Publicado 2024
Libro electrónico