Mostrando 11,241 - 11,260 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.13s Limitar resultados
  1. 11241
    Publicado 2016
    Tabla de Contenidos: “…Murphy and Steven Suib Feature Article: The Viability of Photocatalysis for Air Purification Reprinted from: Molecules 2015, 20(1), 1319-1356 http://www.mdpi.com/1420-3049/20/1/1319 -- Jaime Giménez, Bernardí Bayarri, Óscar González, Sixto Malato, José Peral and Santiago Esplugas Article: A Comparison of the Environmental Impact of Different AOPS: Risk Indexes Reprinted from: Molecules 2015, 20(1), 503-518 http://www.mdpi.com/1420-3049/20/1/503 -- John Anthony Byrne, Patrick Stuart Morris Dunlop, Jeremy William John Hamilton, Pilar Fernández-Ibáñez, Inmaculada Polo-López, Preetam Kumar Sharma and Ashlene Sarah Margaret Vennard Review: A Review of Heterogeneous Photocatalysis for Water and Surface Disinfection Reprinted from: Molecules 2015, 20(4), 5574-5615 http://www.mdpi.com/1420-3049/20/4/5574 -- Satoshi Horikoshi and Nick Serpone Review: Coupled Microwave/Photoassisted Methods for Environmental Remediation Reprinted from: Molecules 2014, 19(11), 18102-18128 http://www.mdpi.com/1420-3049/19/11/18102 -- Nobuaki Negishi and Taizo Sano Article: Photocatalytic Solar Tower Reactor for the Elimination of a Low Concentration of VOCs Reprinted from: Molecules 2014, 19(10), 16624-16639 http://www.mdpi.com/1420-3049/19/10/16624 -- Tsuyoshi Ochiai, Erina Ichihashi, Naoki Nishida, Tadashi Machida, Yoshitsugu Uchida, Yuji Hayashi, Yuko Morito and Akira Fujishima Article: Field Performance Test of an Air-Cleaner with Photocatalysis-Plasma Synergistic Reactors for Practical and Long-Term Use Reprinted from: Molecules 2014, 19(11), 17424-17434 http://www.mdpi.com/1420-3049/19/11/17424 -- Shan Zheng, Wenjun Jiang, Mamun Rashid, Yong Cai, Dionysios D. …”
    Libro electrónico
  2. 11242
    Publicado 2010
    Tabla de Contenidos: “…10.4 Key Derivation Algorithms -- 11 Interworking Security Between EPS and Other Systems -- 11.1 Interworking with GSM and 3G Networks -- 11.1.1 Routing Area Update Procedure in UTRAN -- 11.1.2 Tracking Area Update Procedure in EPS -- 11.1.3 Handover from EPS to 3G or GSM -- 11.1.4 Handover from 3G or GSM to EPS -- 11.2 Interworking with Non-3GPP Networks -- 11.2.1 Principles of Interworking with Non-3GPP Networks -- 11.2.2 Authentication and Key Agreement for Trusted Access -- 11.2.3 Authentication and Key Agreement for Untrusted Access -- 11.2.4 Security for Mobile IP Signalling -- 11.2.5 Mobility between 3GPP and non-3GPP Access Networks -- 12 Security for Voice over LTE -- 12.1 Methods for Providing Voice over LTE -- 12.1.1 IMS over LTE -- 12.1.2 Circuit Switched Fallback (CSFB) -- 12.1.3 Single Radio Voice Call Continuity (SRVCC) -- 12.2 Security Mechanisms for Voice over LTE -- 12.2.1 Security for IMS over LTE -- 12.2.2 Security for Circuit Switched Fallback -- 12.2.3 Security for Single Radio Voice Call Continuity -- 13 Security for Home Base Station Deployment -- 13.1 Security Architecture, Threats and Requirements -- 13.1.1 Scenario -- 13.1.2 Threats and Risks -- 13.1.3 Requirements -- 13.1.4 Security Architecture -- 13.2 Security Features -- 13.2.1 Authentication -- 13.2.2 Local Security -- 13.2.3 Communications Security -- 13.2.4 Location Verification and Time Synchronization -- 13.3 Security Procedures Internal to the Home Base Station -- 13.3.1 Secure Boot and Device Integrity Check -- 13.3.2 Removal of Hosting Party Module -- 13.3.3 Loss of Backhaul Link -- 13.3.4 Secure Time Base -- 13.3.5 Handling of Internal Transient Data -- 13.4 Security Procedures between Home Base Station and Security Gateway -- 13.4.1 Device Integrity Validation -- 13.4.2 Device Authentication -- 13.4.3 IKEv2 and Certificate Profiling…”
    Libro electrónico
  3. 11243
    Publicado 2015
    Tabla de Contenidos: “…Broadband Architecture 191 -- 8.1 Introduction 191 -- 8.2 Background 192 -- 8.3 Challenges to Be Addressed 195 -- 8.3.1 The Spectrum Dimension 195 -- 8.3.2 The Risk of Fragmentation of the Terminal Market 196 -- 8.3.3 The Change in TV Consumer Patterns and the Need for a Flexible Approach 197 -- 8.3.4 Business?]…”
    Libro electrónico
  4. 11244
    Publicado 2022
    Tabla de Contenidos: “…Hormone therapy -- 3.8. Medications -- 3.9. Risk factors for breast cancer -- 3.10. Breast cancer survival rate -- 3.11. …”
    Libro electrónico
  5. 11245
    Publicado 2022
    Tabla de Contenidos: “…Limitations and health risks of AR/VR -- 5. Conclusion -- References -- Chapter 5: Using interpretable machine learning identify factors contributing to COVID-19 cases in the United States -- 1. …”
    Libro electrónico
  6. 11246
    por Raj, Balwinder
    Publicado 2024
    Tabla de Contenidos: “…9.7 A Summary of Neuromorphic Hardware Methodologies -- 9.8 Neuromorphic Computing in Robotics -- 9.8.1 Sensor Processing and Perception -- 9.8.2 Motor Control and Movement -- 9.8.3 Neuromorphic Hardware Advances -- 9.8.4 Brain-Inspired Learning Algorithms -- 9.9 Challenges in Neuromorphic Computing -- 9.9.1 Language Understanding and Interpretation -- 9.9.2 Sentiment Analysis and Emotion Recognition -- 9.9.3 Natural Language Generation -- 9.9.4 Language Translation and Multilingual Processing -- 9.9.5 Dialogue Systems and Conversational Agents -- 9.9.6 Language Modeling and Prediction -- 9.9.7 Text Summarization and Information Extraction -- 9.10 Applications of Neuromorphic Computing -- 9.10.1 Medicines -- 9.10.2 Artificial Intelligence [AI] -- 9.10.3 Imaging -- 9.10.4 Sensor Processing and Perception -- 9.10.5 Motor Control and Movement -- 9.10.6 Autonomous Navigation and Mapping -- 9.10.7 Human-Robot Interaction and Collaboration -- 9.10.8 Adaptive and Learning Capabilities -- 9.10.9 Task Planning and Decision Making -- 9.10.10 Robustness and Fault Tolerance -- 9.10.11 Some More Applications -- 9.11 Conclusion -- References -- Chapter 10 Performance Evaluation of Prototype Microstrip Patch Antenna Fabrication Using Microwave Dielectric Ceramic Nanocomposite Materials for X-Band Applications -- 10.1 Introduction -- 10.2 Materials and Methods -- 10.3 Results and Discussion -- 10.4 Conclusions -- References -- Chapter 11 Build and Deploy a Smart Speaker with Biometric Authentication and Advanced Voice Interaction Capabilities -- 11.1 Introduction -- 11.2 Cybersecurity Risk as Smart Speakers Don't Have an Authentication Process -- 11.3 Related Work -- 11.4 Overview of Biometric Authentication and the Voice Algorithm-Based Smart Speaker -- 11.5 Conclusion and Discussion -- Acknowledgements -- References…”
    Libro electrónico
  7. 11247
    por Bornancin, Brandon
    Publicado 2024
    Tabla de Contenidos: “…You" -- #12 Make Room for Risks -- #13 As Your Team Changes, Encourage Your People to Be Proactive and Pick Up the Slack -- #14 Don't Hate, Imitate! …”
    Libro electrónico
  8. 11248
    por Mathura, Sanya
    Publicado 2024
    Tabla de Contenidos: “…Kenya's Nonlinear Journey: The Intersection of Science, Education, and Policy -- 15.1 My Formative Years -- 15.2 The Pivot and Defining Moment -- 15.3 Taking Risks and Embracing Learned Lessons -- 15.4 My Nonlinear Journey -- 15.5 Closing Reflections -- About the Author -- Section III: Leading the Way -- Chapter 16: Women Redefining Work-Life Balance in STEM: Integrating Parenthood into the Equation -- 16.1 The Gender Imbalance in STEM Fields -- 16.2 Challenges Women Face in STEM -- 16.3 Creating Inclusive Work Environments -- 16.4 Integrating Work and Family Life in a STEM Career -- 16.4.1 The Importance of a Lactation Space -- 16.4.2 Finding My Own Unique Outlet after Becoming a Parent -- 16.5 Strategies for Integrating Work and Family Life in a STEM Career -- 16.6 Embracing Failure Is Part of the Journey -- 16.7 Inspiring the Future of Women in STEM -- About the Author -- Chapter 17: Female AND an Engineer?…”
    Libro electrónico
  9. 11249
    Publicado 2011
    “…In total we identified three main processes in the coastal area of Benin: the migration into coastal zone, the environment changes (land use, climate change and natural risks) and the vulnerability of local residents.Method consisted to two types of surveys: the interrogation of responsible persons in public office (32 semi-structured interviews) and of the population groups (667 structured interviews). …”
    Libro electrónico
  10. 11250
    por International Energy Agency.
    Publicado 2022
    “…This report aims to support South and Southeast Asian hydropower in coping with the adverse impacts of climate change and in developing a tailored set of climate resilience measures based on a comprehensive assessment of climate risks and impacts. This report qualitatively assesses climate risks to South and Southeast Asian hydropower and quantitatively examines potential climate impacts, comparing three climate scenarios. …”
    Libro electrónico
  11. 11251
    Publicado 2016
    “…Human and animal health risks include exposure to the toxins through eating contaminated food or drinking or swimming in contaminated water. …”
    Libro electrónico
  12. 11252
    por Jewell, Jessica
    Publicado 2011
    “…In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. …”
    Capítulo de libro electrónico
  13. 11253
    Publicado 2023
    “…You'll learn proven techniques to optimize prompting, control model behavior, reduce risks like hallucination, and overcome limitations. …”
    Video
  14. 11254
    Publicado 2022
    “…This Element puts together a comprehensive, principle-based overview of the risks and abuses to environmental integrity and cost effectiveness that have emerged for carbon markets at all jurisdictional levels around the world, provides concrete examples, and offers effective policy and governance solutions to overcome such risks. …”
    Libro electrónico
  15. 11255
    “…Is it possible to take advantage of the benefits of data collection-and mitigate risks-for both companies and customers?Most consumers are not very skilled at evaluating privacy risks; they're either unable to determine the cost of sharing personal data online or unaware of what they're sharing. …”
    Grabación musical
  16. 11256
    Publicado 2023
    “…Consider that about 60% of small businesses close down within six months of being hacked. Unfortunately, the risks keep growing. There are more than 4,000 ransomware attacks daily. …”
    Video
  17. 11257
    Publicado 2022
    “…It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today. …”
    Video
  18. 11258
    “…This conference proceedings highlights the key risks and opportunities that policy makers need to address relative to fisheries globalisation so that on the one hand, the opportunities that are created are not missed while, on the other, the risks are addressed appropriately. …”
    Libro electrónico
  19. 11259
    Publicado 2023
    “…"This volume explores the characteristics and risks in the new nuclear age, which is populated by potentially more nuclear states with less reliable and smaller nuclear arsenals, often best by volatile domestic politics, face more and more intense rivalries, and operate in a novel information environment-a situation we have never previously confronted and which carries heightened risks of advertent and inadvertent nuclear use"-- Provided by publisher…”
    Libro electrónico
  20. 11260
    por Hunt, Alistair
    Publicado 2011
    “…In these countries, health risks are significant but generally not as important as time savings in the benefits side of the CBA, though the quantification and monetisation of health risks is often rather partial…”
    Capítulo de libro electrónico