Mostrando 4,381 - 4,400 Resultados de 5,260 Para Buscar '"Edge"', tiempo de consulta: 0.13s Limitar resultados
  1. 4381
    Publicado 2013
    Tabla de Contenidos: “…7.4.3 Criteria for Preferred Material in Ecolabels -- 7.5 Conclusion -- References -- DSM's Sustainability Journey Towards a Proactive Ingredient Policy for Gaining Effectiveness in the Design of Better Products -- 8.1 General Introduction: Sustainability as Business Growth Driver Opportunity and Global Trends -- 8.1.1 Ecological Benefits: Transparent Assessment with Life-cycle Assessment (LCA) -- 8.1.2 Importance of Global Platforms and Partnerships -- 8.1.3 The Challenges Ahead for a Life Sciences and Materials Sciences Company -- 8.2 A Brighter Future with Composites -- 8.2.1 Leading-edge Performance -- 8.2.2 Lower Eco-footprint -- 8.2.3 Elimination of Substances of hazardous concern -- 8.2.4 BluCureTM Cobalt-free Curing Systems -- 8.2.5 Alternatives to Styrene Reactive Diluents -- 8.2.6 Introduction of Good Manufacturing Practice (GMP) -- 8.3 Facing the Technical, Performance and Cost Challenges: the Introduction of Halogen-free Flame Retardants -- 8.3.1 Overcoming Technical Challenges -- 8.3.2 Moving Forward -- 8.4 Conclusion -- References -- US Environmental Protection Agency's Design for the Environment (DfE) Alternatives Assessment Program -- 9.1 Introduction -- 9.2 Selecting an Approach for Chemical Substitution -- 9.3 PentaBDE Case Study -- 9.3.1 How DfE Conducted CAA for PentaBDE -- 9.3.2 Limitations of Original Methodology and Criteria -- 9.4 New CAA Methodology and Criteria: Steps to Conducting a CAA -- 9.4.1 Step 1: Determine Feasibility -- 9.4.2 Step 2: Collect Information on Chemical Alternatives -- 9.4.3 Step 3: Convene Stakeholders -- 9.4.4 Step 4: Identify Alternatives -- 9.4.5 Step 5: Conduct the Hazard Assessment -- 9.4.6 Step 6: Apply Economic and Life-cycle Context -- 9.4.7 Step 7: Apply the Results in Decision-making for Safer Chemical Substitutes -- 9.5 Application of New CAA Criteria…”
    Libro electrónico
  2. 4382
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Contributors -- Chapter 1 A Novel Robust Watermarking Algorithm for Encrypted Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition -- 1.1 Introduction -- 1.2 Basic Theory -- 1.2.1 Discrete Wavelet Transform (DWT) -- 1.2.2 Non-Subsampled Shearlet Transform (NSST) -- 1.2.3 Matrix Schur Decomposition -- 1.2.4 Chaos Encryption System -- 1.3 Proposed Algorithm -- 1.3.1 Medical Image Encryption -- 1.3.2 Feature Extraction -- 1.3.3 Embed Watermark -- 1.3.4 Extraction of Watermark -- 1.4 Experiments and Analysis of Results -- 1.4.1 Simulation Experiment -- 1.4.2 Attacks Results -- 1.4.3 Contrastion to Plaintext Domain Algorithm -- 1.4.4 Contrastion to Other Encrypted Algorithms -- 1.5 Conclusion -- References -- Chapter 2 Robust Zero Watermarking Algorithm for Encrypted Medical Images Based on SUSAN-DCT -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Basic Theory and Proposed Algorithm -- 2.3.1 SUSAN Edge Detection -- 2.3.2 Hu Moments -- 2.3.3 Logical Mapping -- 2.3.4 Proposed Algorithm -- 2.4 Experiment and Results -- 2.4.1 Evaluation Parameter -- 2.4.2 Experimental Setup -- 2.4.3 Results and Analysis -- 2.5 Conclusion -- References -- Chapter 3 Robust Zero Watermarking Algorithm for Encrypted Medical Volume Data Based on PJFM and 3D-DCT -- 3.1 Introduction -- 3.2 The Fundamental Theory -- 3.2.1 Pseudo Jacobi-Fourier Moment -- 3.2.2 D-DCT and 3D-IDCT -- 3.2.3 Logistic Mapping -- 3.3 The Proposed Method -- 3.3.1 Medical Volume Data Encryption -- 3.3.2 Feature Extraction -- 3.3.3 Watermark Encryption and Embedding -- 3.3.4 Watermark Extraction and Decryption -- 3.4 Experimental Results and Performance Evaluation -- 3.4.1 Simulation Experiment -- 3.4.2 Attacks Results -- 3.4.3 Comparison with Unencrypted Algorithm -- 3.5 Conclusion -- References…”
    Libro electrónico
  3. 4383
    por Jayaweera, Sudharman K., 1972-
    Publicado 2015
    Tabla de Contenidos: “…9.6.6 Optimal Myopic Sensing Decision Policies, 354 -- 9.7 A Reduced Complexity Optimal Subband Selection Framework with an Alternative Reward Function, 355 -- 9.7.1 A New Model for Subband Dynamics, 357 -- 9.7.2 A Simplified Reward Function and a Reduced-Complexity Optimal Policy, 359 -- 9.7.3 A Reduced Complexity Optimal Policy for Independent Subbands, 362 -- 9.7.4 Optimal Myopic Policies with Reduced Dimensional Subband State Vectors, 363 -- 9.8 Machine-Learning Aided Subband Selection Policies, 364 -- 9.8.1 Q-Learning, 365 -- 9.8.2 Q-Learning in a POMDP: A Q-Learning Algorithm for Subband Selection, 368 -- 9.9 Summary, 372 -- 10 Spectral Activity Detection inWideband Cognitive Radios 377 -- 10.1 Introduction, 377 -- 10.2 Optimal Wideband Spectral Activity Detection, 379 -- 10.3 Wideband Spectral Activity Detection, 386 -- 10.4 Wavelet Transform-Based Wideband Spectral Activity Detection, 392 -- 10.4.1 Wavelet Transform, 394 -- 10.4.2 Edge Detection with Wavelet Transform, 395 -- 10.4.3 Spectral Activity Detection Based on Edge Detection, 397 -- 10.5 Wideband Spectral Activity Detection in Non-Gaussian Noise, 398 -- 10.5.1 Arbitrary but Known Noise Distribution, 399 -- 10.5.2 Robust Spectral Activity Detection, 406 -- 10.6 Wideband Spectral Activity Detection with Compressive Sampling, 413 -- 10.6.1 Compressive Sampling, 415 -- 10.6.2 Compressive Sensing of Wideband Spectrum, 419 -- 10.7 Summary, 421 -- 11 Signal Classification inWideband Cognitive Radios 429 -- 11.1 Introduction, 429 -- 11.2 Signal Classification Problem in a Wideband Cognitive Radio, 431 -- 11.3 Feature Extraction for Signal Classification, 435 -- 11.3.1 Carrier/Center Frequency, 435 -- 11.3.2 Cyclostationary Features, 436 -- 11.3.3 Modulation Type and Order Features, 441 -- 11.4 A Signal Classification Architecture for a Wideband Cognitive Radio, 445 -- 11.5 Bayesian Nonparametric Signal Classification, 447 -- 11.6 Sequential Bayesian Nonparametric Signal Classification, 462 -- 11.7 Summary, 469.…”
    Libro electrónico
  4. 4384
    Publicado 2021
    Tabla de Contenidos: “…Domain 3 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- ISO/IEC 19249 -- Threat Modeling -- Secure Defaults -- Fail Securely -- Separation of Duties -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Privacy by Design -- Shared Responsibility -- Defense in Depth -- Understand the Fundamental Concepts of Security Models -- Primer on Common Model Components -- Information Flow Model -- Noninterference Model -- Bell-LaPadula Model -- Biba Integrity Model -- Clark-Wilson Model -- Brewer-Nash Model -- Take-Grant Model -- Select Controls Based Upon Systems Security Requirements -- Understand Security Capabilities of Information Systems -- Memory Protection -- Secure Cryptoprocessor -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-Based Systems -- Server-Based Systems -- Database Systems -- Cryptographic Systems -- Industrial Control Systems -- Cloud-Based Systems -- Distributed Systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded Systems -- High-Performance Computing Systems -- Edge Computing Systems -- Virtualized Systems -- Select and Determine Cryptographic Solutions -- Cryptography Basics -- Cryptographic Lifecycle -- Cryptographic Methods -- Public Key Infrastructure -- Key Management Practices -- Digital Signatures and Digital Certificates -- Nonrepudiation -- Integrity -- Understand Methods of Cryptanalytic Attacks -- Brute Force -- Ciphertext Only -- Known Plaintext -- Chosen Plaintext Attack -- Frequency Analysis -- Chosen Ciphertext -- Implementation Attacks -- Side-Channel Attacks -- Fault Injection -- Timing Attacks -- Man-in-the-Middle -- Pass the Hash -- Kerberos Exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design…”
    Libro electrónico
  5. 4385
    Publicado 2019
    Tabla de Contenidos: “…Real‐World Applications -- Challenges and Future Research -- Analysis Challenges -- Scale Challenges -- Sensitivity Challenge -- Conclusion -- Acknowledgment -- Locations, Events, Actions, Participants, and Things in the Three Little Pigs -- Edges in the Three Little Pigs Graph -- References -- Chapter 7 A Neural Network Model of Motivated Decision‐Making in Everyday Social Behavior -- Introduction -- Overview -- Constraint Satisfaction Processing -- Theoretical Background -- Motivational Systems -- Situations -- Interoceptive or Bodily State -- Wanting -- Competition Among Motives -- Motivation Changes Dynamically -- Neural Network Implementation -- General Processing in the Network -- Conclusion -- References -- Chapter 8 Dealing with Culture as Inherited Information -- Galton's Problem as a Core Feature of Cultural Theory -- How to Correct for Treelike Inheritance of Traits Across Groups -- Early Attempts to Correct Galton's Problem -- More Recent Attempts to Correct Galton's Problem -- Example Applications -- Dealing with Nonindependence in Less Treelike Network Structures -- Determining Which Network Is Most Important for a Cultural Trait -- Correcting for Network Nonindependence When Testing Trait-Trait Correlations -- Example Applications -- Future Directions for Formal Modeling of Culture -- Improved Network Autoregression Implementations -- A Global Data Set of Expected Nonindependence to Solve Galton's Problem -- Better Collection of Behavioral Trait Variation Across Populations -- Acknowledgments -- References -- Chapter 9 Social Media, Global Connections, and Information Environments: Building Complex Understandings of Multi‐Actor Interactions -- A New Setting of Hyperconnectivity -- The Information Environment -- Social Media in the Information Environment -- Integrative Approaches to Understanding Human Behavior -- Muddy the Waters…”
    Libro electrónico
  6. 4386
    por Dirksen, Jos
    Publicado 2023
    Tabla de Contenidos: “…THREE.MeshToonMaterial -- THREE.MeshStandardMaterial -- THREE.MeshPhysicalMaterial -- THREE.ShadowMaterial -- Using your own shaders with THREE.ShaderMaterial -- Customizing existing shaders with CustomShaderMaterial -- Materials you can use for a line geometry -- THREE.LineBasicMaterial -- THREE.LineDashedMaterial -- Summary -- Chapter 5: Learning to Work with Geometries -- 2D geometries -- THREE.PlaneGeometry -- THREE.CircleGeometry -- THREE.RingGeometry -- THREE.ShapeGeometry -- 3D geometries -- THREE.BoxGeometry -- THREE.SphereGeometry -- THREE.CylinderGeometry -- THREE.ConeGeometry -- THREE.TorusGeometry -- THREE.TorusKnotGeometry -- THREE.PolyhedronGeometry -- THREE.IcosahedronGeometry -- THREE.TetrahedronGeometry -- THREE.OctahedronGeometry -- THREE.DodecahedronGeometry -- Summary -- Chapter 6: Exploring Advanced Geometries -- Learning advanced geometries -- THREE.ConvexGeometry -- THREE.LatheGeometry -- BoxLineGeometry -- THREE.RoundedBoxGeometry -- TeapotGeometry -- Creating a geometry by extruding a 2D shape -- THREE.ExtrudeGeometry -- THREE.TubeGeometry -- Extruding 3D shapes from an SVG element -- THREE.ParametricGeometry -- Geometries you can use for debugging -- THREE.EdgesGeometry -- THREE.WireFrameGeometry -- Creating a 3D text mesh -- Rendering text -- Adding custom fonts -- Creating text using the Troika library -- Summary -- Chapter 7: Points and Sprites -- Understanding points and sprites -- Styling particles using textures -- Drawing an image on the canvas -- Using textures to style particles -- Working with sprite maps -- Creating THREE.Points from existing geometry -- Summary -- Part 3: Particle Clouds, Loading and Animating Models -- Chapter 8: Creating and Loading Advanced Meshes and Geometries -- Geometry grouping and merging -- Grouping objects together -- Merging geometries -- Loading geometries from external resources…”
    Libro electrónico
  7. 4387
    Publicado 2023
    Tabla de Contenidos: “…-- CCSP Exam Objectives -- CCSP Certification Exam Objective Map -- How to Contact the Publisher -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Architectural Concepts -- Cloud Characteristics -- Business Requirements -- Understanding the Existing State -- Cost/Benefit Analysis -- Intended Impact -- Cloud Computing Service Categories -- Software as a Service -- Infrastructure as a Service -- Platform as a Service -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Multi-Cloud -- Community Cloud -- Multitenancy -- Cloud Computing Roles and Responsibilities -- Cloud Computing Reference Architecture -- Virtualization -- Hypervisors -- Virtualization Security -- Cloud Shared Considerations -- Security and Privacy Considerations -- Operational Considerations -- Emerging Technologies -- Machine Learning and Artificial Intelligence -- Blockchain -- Internet of Things -- Containers -- Quantum Computing -- Edge and Fog Computing -- Confidential Computing -- DevOps and DevSecOps -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Data Classification -- Data Inventory and Discovery -- Data Ownership -- Data Flows -- Data Discovery Methods -- Information Rights Management -- Certificates and IRM -- IRM in the Cloud -- IRM Tool Traits -- Data Control -- Data Retention -- Data Audit and Audit Mechanisms -- Data Destruction/Disposal -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Cloud Data Security -- Cloud Data Lifecycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Cloud Storage Architectures -- Storage Types…”
    Libro electrónico
  8. 4388
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1 - Implementing Turning Operations in Fusion 360 -- Chapter 1: Getting Started with Turning and Its Tools -- Technical requirements -- Approaching a lathe and its components -- Cylindrical coordinate system -- Different types of turning operations -- Understanding the main parameters -- Turning speed -- Cutting speed -- Cutting depth -- Cutting feed -- Cutting power -- Exploring main machining strategies -- Longitudinal operations -- Facing operations -- Plunging operations -- Profiling operations -- Understanding tool geometry -- Tool edges -- Tool surfaces -- Tool angles -- Summary -- Chapter 2: Handling Part Setup for Turning -- Technical requirements -- Exploring the main interface of a CAM project -- Finding example projects in Fusion 360 -- Importing our chuck -- Understanding how to set up the first part to be machined -- Setup tab -- Stock tab -- The Post Process tab -- Summary -- Chapter 3: Discovering the Tool Library and Custom Tools -- Technical requirements -- Discovering the tool library -- Creating a new tool -- Getting a sample tool -- Creating a new tool -- Importing a third-party tool library -- Importing new tools with a plugin (CoroPlus) -- Summary -- Chapter 4: Implementing Our First Turning Operation -- Technical requirements -- Setting up a facing operation -- Using CoroPlus to calculate cutting parameters -- Entering the cutting parameters into Fusion 360 -- Discovering tool simulation -- Checking the generated G-code -- Settings -- Operations -- Summary -- Chapter 5: Discovering More Turning Strategies -- Technical requirements -- Turning Profile (Roughing) -- The Tool tab -- The Geometry tab -- The Passes tab -- Simulation -- Turning Profile (Finishing) -- The Tool tab -- The Geometry tab…”
    Libro electrónico
  9. 4389
    Publicado 2011
    Tabla de Contenidos: “…Sentry-Bot: An Intruder Detector -- Adding the Ultrasonic Sensor -- Avoiding Objects -- Following an Object in a Straight Line -- The Shooter Extension -- Testing the Shooter -- Creating the Complete Sentry Program -- Conclusion -- 13. Table-Bot: An Edge-Avoiding Robot -- Creating the Antennae Attachments -- Programming Table-Bot -- Keeping Track of Events -- Getting Out of Corners -- Conclusion -- 14. …”
    Libro electrónico
  10. 4390
    Publicado 2022
    Tabla de Contenidos: “…-- 1.1.1 A Nuts-and-Bolts Description -- 1.1.2 A Services Description -- 1.1.3 What Is a Protocol? -- 1.2 The Network Edge -- 1.2.1 Access Networks -- 1.2.2 Physical Media -- 1.3 The Network Core -- 1.3.1 Packet Switching -- 1.3.2 Circuit Switching -- 1.3.3 A Network of Networks -- 1.4 Delay, Loss, and Throughput in Packet-Switched Networks -- 1.4.1 Overview of Delay in Packet-Switched Networks -- 1.4.2 Queuing Delay and Packet Loss -- 1.4.3 End-to-End Delay -- 1.4.4 Throughput in Computer Networks -- 1.5 Protocol Layers and Their Service Models -- 1.5.1 Layered Architecture -- 1.5.2 Encapsulation -- 1.6 Networks Under Attack -- 1.7 History of Computer Networking and the Internet -- 1.7.1 The Development of Packet Switching: 1961-1972 -- 1.7.2 Proprietary Networks and Internetworking: 1972-1980 -- 1.7.3 A Proliferation of Networks: 1980-1990 -- 1.7.4 The Internet Explosion: The 1990s -- 1.7.5 The New Millennium -- 1.8 Summary -- Homework Problems and Questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Chapter 2: Application Layer -- 2.1 Principles of Network Applications -- 2.1.1 Network Application Architectures -- 2.1.2 Processes Communicating -- 2.1.3 Transport Services Available to Applications -- 2.1.4 Transport Services Provided by the Internet -- 2.1.5 Application-Layer Protocols -- 2.1.6 Network Applications Covered in This Book -- 2.2 The Web and HTTP -- 2.2.1 Overview of HTTP -- 2.2.2 Non-Persistent and Persistent Connections -- 2.2.3 HTTP Message Format -- 2.2.4 User-Server Interaction: Cookies -- 2.2.5 Web Caching -- 2.2.6 HTTP/2…”
    Libro electrónico
  11. 4391
    Publicado 2017
    Tabla de Contenidos: “…2.4.2 DOPPLER FREQUENCY SHIFTS (OBSERVER STATIONARY, SOURCE IN MOTION) -- 2.4.3 ACOUSTIC FIELD FROM A MOVING SOURCE -- 2.5 SOUND REFLECTION AND TRANSMISSION AT A FLUID-FLUID BOUNDARY -- 2.5.1 STRUCTURE OF THE SOLUTION -- 2.5.2 THE STATIONARY PHASE APPROXIMATION -- 2.5.3 PLANE-WAVE REFLECTION -- 2.5.4 WESTON'S EFFECTIVE DEPTH -- 2.5.5 PLANE-WAVE REFRACTION -- 2.5.6 THE LATERAL WAVE -- 2.6 THE "IDEAL" WAVEGUIDE -- 2.6.1 PLANE WAVES AND NORMAL MODES -- 2.6.2 THE ACOUSTIC FIELD IN THE IDEAL WAVEGUIDE -- 2.6.3 INTERMODAL INTERFERENCE -- 2.7 THE PEKERIS CHANNEL -- 2.7.1 THE INTEGRAL-TRANSFORM SOLUTION FOR THE FIELD -- 2.7.2 THE NORMAL MODE SOLUTION -- 2.7.3 THE CHARACTERISTIC EQUATION -- 2.8 THREE-DIMENSIONAL PROPAGATION -- 2.8.1 HORIZONTAL REFRACTION -- 2.8.2 THE "IDEAL" WEDGE -- 2.8.3 THE SHADOW EDGE -- 2.8.4 INTRAMODAL INTERFERENCE -- 2.8.5 THE PENETRABLE WEDGE -- Acknowledgment -- REFERENCES -- 3 - Sound Propagation Modeling -- 3.1 RAY MODELS -- 3.1.1 A PARTICULAR TYPE OF ANALYTIC 2-D RAY TRACING -- 3.1.1.1 Kinematic Ray Tracing -- 3.1.1.2 Dynamic Ray Tracing -- 3.1.1.3 Caustics -- 3.1.1.4 Coherent Computation of Propagation Loss and Propagation Time Series -- 3.1.2 EXAMPLE -- 3.2 WAVE NUMBER INTEGRATION OR SPECTRAL METHODS -- 3.2.1 SOLUTION OF THE DEPTH-DEPENDENT ODE SYSTEMS -- 3.2.1.1 Recursive Computation of Reflection-Coefficient Matrices for the Solid Bottom -- 3.2.1.2 Propagator Matrices for the Fluid Region -- 3.2.1.3 Alternative Treatment of the Fluid Region -- 3.2.1.4 Final Remarks -- 3.2.2 ADAPTIVE INTEGRATION -- 3.2.3 EXAMPLE -- 3.3 NORMAL MODE PROPAGATION MODELS -- 3.3.1 MODAL WAVE NUMBERS -- 3.3.2 MODE FUNCTIONS -- 3.3.3 EXCITATION COEFFICIENTS -- 3.3.4 RANGE-DEPENDENT MEDIA -- 3.3.4.1 Equations Relating the Modal Expansion Coefficients -- 3.3.4.2 Solution in Terms of Reflection-Coefficient Matrices -- 3.3.4.3 Final Remarks…”
    Libro electrónico
  12. 4392
    Publicado 2019
    Tabla de Contenidos: “…Data Security and Privacy Protection -- 1.4.6. IoT-Based Edge Computing and Networking -- 1.5. Emerging Research Areas in Bio-Inspired Algorithm-Based Big Data Analytics -- 1.5.1. …”
    Libro electrónico
  13. 4393
    Publicado 2014
    “…This timely book aims to facilitate the implementation of cutting-edge techniques to design problems offering innovative solutions to the growing power demands in small- and large-size industries. …”
    Libro electrónico
  14. 4394
    Publicado 2016
    “…Thermofluid Modeling for Sustainable Energy Applications provides a collection of the most recent, cutting-edge developments in the application of fluid mechanics modeling to energy systems and energy efficient technology. …”
    Libro electrónico
  15. 4395
    Publicado 2016
    Tabla de Contenidos: “…9.3.2 Case-study: Size-and-shape analysis and mutation -- 9.4 Edge-based shape coordinates -- 9.5 Investigating allometry -- 10 Shape and size-and-shape distributions -- 10.1 The uniform distribution -- 10.2 Complex Bingham distribution -- 10.2.1 The density -- 10.2.2 Relation to the complex normal distribution -- 10.2.3 Relation to real Bingham distribution -- 10.2.4 The normalizing constant -- 10.2.5 Properties -- 10.2.6 Inference -- 10.2.7 Approximations and computation -- 10.2.8 Relationship with the Fisher-von Mises distribution -- 10.2.9 Simulation -- 10.3 Complex Watson distribution -- 10.3.1 The density -- 10.3.2 Inference -- 10.3.3 Large concentrations -- 10.4 Complex angular central Gaussian distribution -- 10.5 Complex Bingham quartic distribution -- 10.6 A rotationally symmetric shape family -- 10.7 Other distributions -- 10.8 Bayesian inference -- 10.9 Size-and-shape distributions -- 10.9.1 Rotationally symmetric size-and-shape family -- 10.9.2 Central complex Gaussian distribution -- 10.10 Size-and-shape versus shape -- 11 Offset normal shape distributions -- 11.1 Introduction -- 11.1.1 Equal mean case in two dimensions -- 11.1.2 The isotropic case in two dimensions -- 11.1.3 The triangle case -- 11.1.4 Approximations: Large and small variations -- 11.1.5 Exact moments -- 11.1.6 Isotropy -- 11.2 Offset normal shape distributions with general covariances -- 11.2.1 The complex normal case -- 11.2.2 General covariances: Small variations -- 11.3 Inference for offset normal distributions -- 11.3.1 General MLE -- 11.3.2 Isotropic case -- 11.3.3 Exact isotropic MLE in R -- 11.3.4 EM algorithm and extensions -- 11.4 Practical inference -- 11.5 Offset normal size-and-shape distributions -- 11.5.1 The isotropic case -- 11.5.2 Inference using the offset normal size-and-shape model -- 11.6 Distributions for higher dimensions -- 11.6.1 Introduction…”
    Libro electrónico
  16. 4396
    Publicado 2024
    “…This exciting new volume provides a comprehensive overview of the latest technological advances in agriculture, focusing on these three cutting-edge technologies. The book will explore the potential benefits of these technologies in improving agricultural efficiency, productivity, and sustainability. …”
    Libro electrónico
  17. 4397
    Publicado 2024
    “…In the rapidly evolving landscape of modern manufacturing, the integration of cutting-edge technologies has become imperative for businesses to remain competitive and adaptive. …”
    Libro electrónico
  18. 4398
    Publicado 2023
    “…The development of cutting-edge technology has increased the need for energy significantly, which has resulted in an overreliance on fossil fuels. …”
    Libro electrónico
  19. 4399
    Publicado 2023
    Tabla de Contenidos: “…Chapter 10 An Introduction to Security in Internet of Things (IoT) and Big Data -- 10.1 Introduction -- 10.2 Allusion Design of IoT -- 10.2.1 Stage 1-Edge Tool -- 10.2.2 Stage 2-Connectivity -- 10.2.3 Stage 3-Fog Computing -- 10.2.4 Stage 4-Data Collection -- 10.2.5 Stage 5-Data Abstraction -- 10.2.6 Stage 6-Applications -- 10.2.7 Stage 7-Cooperation and Processes -- 10.3 Vulnerabilities of IoT -- 10.3.1 The Properties and Relationships of Various IoT Networks -- 10.3.2 Device Attacks -- 10.3.3 Attacks on Network -- 10.3.4 Some Other Issues -- 10.3.4.1 Customer Delivery Value -- 10.3.4.2 Compatibility Problems With Equipment -- 10.3.4.3 Compatibility and Maintenance -- 10.3.4.4 Connectivity Issues in the Field of Data -- 10.3.4.5 Incorrect Data Collection and Difficulties -- 10.3.4.6 Security Concern -- 10.3.4.7 Problems in Computer Confidentiality -- 10.4 Challenges in Technology -- 10.4.1 Skepticism of Consumers -- 10.5 Analysis of IoT Security -- 10.5.1 Sensing Layer Security Threats -- 10.5.1.1 Node Capturing -- 10.5.1.2 Malicious Attack by Code Injection -- 10.5.1.3 Attack by Fake Data Injection -- 10.5.1.4 Sidelines Assaults -- 10.5.1.5 Attacks During Booting Process -- 10.5.2 Network Layer Safety Issues -- 10.5.2.1 Attack on Phishing Page -- 10.5.2.2 Attacks on Access -- 10.5.2.3 Attacks on Data Transmission -- 10.5.2.4 Attacks on Routing -- 10.5.3 Middleware Layer Safety Issues -- 10.5.3.1 Attack by SQL Injection -- 10.5.3.2 Attack by Signature Wrapping -- 10.5.3.3 Cloud Attack Injection with Malware -- 10.5.3.4 Cloud Flooding Attack -- 10.5.4 Gateways Safety Issues -- 10.5.4.1 On-Boarding Safely -- 10.5.4.2 Additional Interfaces -- 10.5.4.3 Encrypting End-to-End -- 10.5.5 Application Layer Safety Issues -- 10.5.5.1 Theft of Data -- 10.5.5.2 Attacks at Interruption in Service -- 10.5.5.3 Malicious Code Injection Attack…”
    Libro electrónico
  20. 4400
    por Prakash, Kolla Bhanu
    Publicado 2024
    “…Whether a student diving into this field for the first time, a seasoned professional looking to broaden your skillset, or an enthusiast eager to explore cutting-edge advancements, this book has something for you. …”
    Libro electrónico