Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1301Publicado 2002Tabla de Contenidos: “…Working with the C++ toolkit -- 8.1 Overview -- 8.1.1 Modular -- 8.1.2 Thread-safe -- 8.1.3 Extendable -- 8.1.4 Object-oriented API -- 8.1.5 The toolkit services -- 8.2 Getting started -- 8.2.1 The toolkit package…”
Libro electrónico -
1302Publicado 2022Tabla de Contenidos: “…11.6 Standards Requiring Design Safety -- 11.7 The Review of Designs -- 11.8 Hazardous Energy Control -- 11.9 Ergonomic Review of Designs -- 11.10 Design Review Process -- 11.11 Hazard Analysis and Risk Assessment in Design -- 11.12 Conclusion -- References -- Chapter 12 Industrial Hygiene Risk Assessment -- 12.1 Introduction -- 12.2 Fundamental Concepts -- 12.3 US Navy Industrial Hygiene Field Operations Manual -- 12.4 Alternate Health Risk Ranking Systems -- 12.5 More Complex Occupational Hygiene Risk Assessment Tools -- 12.6 Health Risk Assessments and Prioritization -- 12.7 Modified HRR/IH FMEA Methodology -- 12.8 Case Study -- 12.8.1 Sampling -- 12.8.2 Results -- 12.9 Control Banding Nanotool -- 12.10 Dermal RA -- 12.11 Occupational Health Risk and PtD Process Alignment -- 12.12 Summary -- Review Questions -- References -- Chapter 13 Machine Risk Assessments -- 13.1 Introduction -- 13.2 Machine Safety Standards -- 13.2.1 The B11 Standards -- 13.3 Machine Hazards -- 13.4 Machine Safeguarding -- 13.4.1 Machine Safety Control Systems -- 13.5 Selecting Machines for Assessment -- 13.6 Risk Assessment of Machines -- 13.7 Estimating Risk -- 13.8 Case Study -- 13.9 Assessment of Machine Maintenance and Service -- 13.10 Summary -- Appendix A Machine Safeguards Methods (Adapted from OSHA) -- References -- Chapter 14 Project-Oriented Risk Assessments -- 14.1 Introduction -- 14.2 Fatalities and Serious Incidents -- 14.3 Error Traps in Nonroutine Tasks -- 14.4 Management of Change -- 14.5 Construction Project Work -- 14.6 Construction Project Risk Assessment -- 14.7 Safe Work Methods -- 14.8 Pre-Task Hazard Analysis -- 14.9 The Use of Checklists -- 14.10 Maintenance and Service Work -- 14.11 Operating Hazard Analysis -- 14.12 Analyzing Specific Hazards -- 14.13 Pre-Entry Hazard Analysis -- 14.14 Fall Hazard Assessment -- 14.15 Summary -- Review Questions…”
Libro electrónico -
1303Publicado 2016Tabla de Contenidos: “…3.7.2 Self-protecting, Self-optimizing and Self-healing IoT Concepts -- 3.7.3 IoT Trust Framework -- 3.8 IoT Enabling the Digital Transformation of Industry -- Chapter 4 - Internet of Food and Farm 2020 -- 4.1 Global Food Production - Setting the Scene -- 4.2 Smart Farming and Food: WhereWe Are Right Now -- 4.3 Farming, Food and IoT: WhereWe Are Going -- 4.4 Challenges -- 4.4.1 Technical Dimension -- 4.4.2 Non-Technical Dimension -- 4.5 Conclusions -- Chapter 5 - Internet of Things Applications in Future Manufacturing -- 5.1 Introduction -- 5.2 EU Initiatives and IoT Platforms for Digital Manufacturing -- 5.2.1 Future Manufacturing Value Chains -- 5.2.2 Recent EU Research Initiatives in Virtual Manufacturing -- 5.2.3 Levels of Manufacturing Digitisation -- 5.2.4 Industrie 4.0 Principles for CPS Manufacturing -- 5.2.5 Digital Manufacturing and IoT Platforms -- 5.2.6 Maturity Model for IoT in Manufacturing -- 5.3 Digital Factory Automation -- 5.3.1 Business Drivers -- 5.3.2 IoT Techniques for the Virtualization of Automation Pyramid -- 5.3.3 CPS-based Factory Simulation -- 5.3.4 IoT/CPS Production Workflows - Systems-of-Systems Automation -- 5.4 IoT Applications for Manufacturing -- 5.4.1 Proactive Maintenance -- 5.4.2 Mass Customisation -- 5.4.3 Reshoring -- 5.4.4 Safe HumanWorkplaces and HMIs -- 5.5 Future Outlook and Conclusions -- 5.5.1 Outlook and Directions for Future Research and Pilots -- 5.5.2 Conclusions -- Bibliography -- Chapter 6 - Trusted IoT in the Complex Landscape of Governance, Security, Privacy, Availability and Safety -- 6.1 Introduction -- 6.2 The Need for Evaluating Trust in IoT -- 6.3 Trust Management in IoT -- 6.4 Trust for Devices -- 6.4.1 Communication-based Trust -- 6.4.2 Security-based Trust -- 6.4.3 Data-Reliability based Trust -- 6.4.4 Social Relationship based Trust -- 6.4.5 Reputation based Trust…”
Libro electrónico -
1304Publicado 2016Tabla de Contenidos: “…(c) Taking account of diagnostic coverage -- (d) Subdividing the checklists according to the effect of diagnostics -- (e) Establishing a model -- (f) Nonlinearity -- (g) Equipment type -- (h) Calibration -- 5.2.3 Fault Tree Analysis -- 5.3 Taking Account of Auto Test -- 5.4 Human Factors -- 5.4.1 Addressing Human Factors -- 5.4.2 Human Error Rates -- "HEART" method -- "TESEO" method -- 5.4.3 A Rigorous Approach -- 6 - Failure Rate and Mode Data -- 6.1 Data Accuracy -- 6.2 Sources of Data -- 6.2.1 Electronic Failure Rates -- 6.2.2 Other General Data Collections -- 6.2.3 Some Older Sources -- 6.2.4 Manufacturer's Data -- 6.2.5 Anecdotal Data -- 6.3 Data Ranges and Confidence Levels -- 6.4 Conclusions -- 7 - Demonstrating and Certifying Conformance -- 7.1 Demonstrating Conformance -- 7.2 The Current Framework for Certification -- 7.3 Self-Certification (Including Some Independent Assessment) -- 7.3.1 Showing Functional Safety Capability (FSM) as Part of the Quality Management System -- 7.3.2 Application of IEC 61508 to Projects/Products -- 7.3.3 Rigor of Assessment -- 7.3.4 Independence -- 7.4 Preparing for Assessment -- 7.5 Summary -- B - Specific Industry Sectors -- 8 - Second Tier Documents-Process, Oil and Gas Industries -- 8.1 IEC International Standard 61511: Functional Safety-Safety Instrumented Systems for the Process Industry Sector (Second Edition to be Published in 2016) -- 8.1.1 Organizing and Managing the Life Cycle -- 8.1.2 Requirements Involving the Specification -- 8.1.3 Requirements for Design and Development -- (a) Selection of components and subsystems -- (b) Architecture (i.e., safe failure fraction) -- (c) Predict the random hardware failures -- (d) Software (referred to as "program") -- (i) Requirements -- (ii) Software library modules -- (iii) Software design specification -- (iv) Code -- (v) Programming support tools…”
Libro electrónico -
1305Publicado 2024Tabla de Contenidos: “…References -- Chapter 3 Safe and Reliable Smart City Design Based on Blockchain Technology -- 3.1 Introduction -- 3.1.1 Blockchain Technology -- 3.1.2 Use of Blockchain in Smart City -- 3.1.3 Objective of Work -- 3.2 Related Work -- 3.2.1 Problem Statement -- 3.3 Blockchain Technology for Smart Cities -- 3.3.1 Application of the System -- 3.3.2 Blockchain Technology's Many Advantages in the Modern Smart City -- 3.4 Methods -- 3.4.1 Blockchain-Based Smart City Infrastructure -- 3.5 Conclusion -- References -- Chapter 4 Blockchain and Digital Twin for Enhancing Personal Security in Modern Cities -- 4.1 Introduction -- 4.2 Digital Twin -- 4.2.1 Digital Twins in Manufacturing Industry -- 4.2.2 Integration with Emerging Technologies -- 4.2.3 Real-World Reflection Through Sensors -- 4.2.4 Land Management and Global Concerns -- 4.2.5 Increasing Importance of Information Technologies -- 4.2.6 Advancements in IoT and Connectivity -- 4.2.7 Role of Artificial Intelligence (AI) in Digital Twins -- 4.2.8 Cloud Computing Empowering Digital Twins -- 4.2.9 Impact of 5G Technology -- 4.2.10 Smart Cities and the Growing Application Field -- 4.2.11 Big Data's Role in Informed Decision Making -- 4.3 Digital Twin and Metaverse -- 4.3.1 Virtual Prototyping and Design Optimization -- 4.3.2 Healthcare Integration for Personalized Medicine -- 4.3.3 The Intersection of Digital Twins and the Metaverse -- 4.3.4 Immersive Collaborative Environments -- 4.3.5 Enhanced Virtual Experiences Through Data Fusion -- 4.3.6 Challenges and Future Developments -- 4.3.7 Data Privacy and Security Concerns -- 4.3.8 Standardization and Interoperability -- 4.4 Blockchain Technology -- 4.4.1 Overview of Blockchain Technology -- 4.4.2 Data Checking and Analysis -- 4.4.3 Immutable History -- 4.4.4 Potential Problem Solving -- 4.4.5 Rapid Adoption by Major Companies…”
Libro electrónico -
1306Publicado 2025Tabla de Contenidos: “…5.4.1 Different deployment strategies for UAVs in healthcare -- 5.4.2 Logistical considerations -- 5.5 Security challenges and solutions -- 5.5.1 Security challenges associated with UAVs in healthcare -- 5.5.2 Potential solutions and mitigation strategies -- 5.5.3 Importance of regulatory compliance and adherence to safety standards -- 5.6 Regulatory and legal framework -- 5.6.1 Need for standardized regulations and guidelines to ensure safe and ethical use of UAVs -- 5.7 Conclusion and future scope -- References -- Chapter 6: Blockchain technologies using machine learning -- 6.1 Introduction -- 6.2 Understanding blockchain technologies -- 6.2.1 Introduction to blockchain -- 6.2.2 Key components of a blockchain network -- 6.2.3 Consensus mechanisms and their impact -- 6.2.4 Benefits and limitations of BCT -- 6.2.4.1 Benefits of BCT -- 6.2.4.2 Limitations of BCT -- 6.3 ML fundamentals -- 6.3.1 Overview of ML -- 6.3.2 Types of ML algorithms -- 6.3.2.1 Supervised learning algorithms -- 6.3.2.2 Unsupervised learning algorithms -- 6.3.2.3 Semi-supervised learning algorithms -- 6.3.2.4 Reinforcement learning algorithms -- 6.3.2.5 Deep learning algorithms -- 6.3.3 Data pre-processing and feature engineering -- 6.3.3.1 Data pre-processing -- 6.3.3.2 Feature engineering -- 6.4 Evaluating ML models -- 6.4.1 Common evaluation metrics -- 6.5 Synergies between blockchain and ML -- 6.5.1 Combining ML models on the blockchain -- 6.6 Applications of blockchain and ML integration -- 6.7 Challenges and limitations in BCT and ML integration -- 6.7.1 Scalability issues -- 6.7.2 Data availability and quality -- 6.7.3 Regulatory and legal challenges -- 6.7.4 Trusted oracles and data feeds -- 6.7.5 Energy efficiency concerns -- 6.8 Future prospects and research directions -- 6.8.1 Federated learning on blockchain networks…”
Libro electrónico -
1307Publicado 2023Tabla de Contenidos: “…Chapter 10 An Introduction to Security in Internet of Things (IoT) and Big Data -- 10.1 Introduction -- 10.2 Allusion Design of IoT -- 10.2.1 Stage 1-Edge Tool -- 10.2.2 Stage 2-Connectivity -- 10.2.3 Stage 3-Fog Computing -- 10.2.4 Stage 4-Data Collection -- 10.2.5 Stage 5-Data Abstraction -- 10.2.6 Stage 6-Applications -- 10.2.7 Stage 7-Cooperation and Processes -- 10.3 Vulnerabilities of IoT -- 10.3.1 The Properties and Relationships of Various IoT Networks -- 10.3.2 Device Attacks -- 10.3.3 Attacks on Network -- 10.3.4 Some Other Issues -- 10.3.4.1 Customer Delivery Value -- 10.3.4.2 Compatibility Problems With Equipment -- 10.3.4.3 Compatibility and Maintenance -- 10.3.4.4 Connectivity Issues in the Field of Data -- 10.3.4.5 Incorrect Data Collection and Difficulties -- 10.3.4.6 Security Concern -- 10.3.4.7 Problems in Computer Confidentiality -- 10.4 Challenges in Technology -- 10.4.1 Skepticism of Consumers -- 10.5 Analysis of IoT Security -- 10.5.1 Sensing Layer Security Threats -- 10.5.1.1 Node Capturing -- 10.5.1.2 Malicious Attack by Code Injection -- 10.5.1.3 Attack by Fake Data Injection -- 10.5.1.4 Sidelines Assaults -- 10.5.1.5 Attacks During Booting Process -- 10.5.2 Network Layer Safety Issues -- 10.5.2.1 Attack on Phishing Page -- 10.5.2.2 Attacks on Access -- 10.5.2.3 Attacks on Data Transmission -- 10.5.2.4 Attacks on Routing -- 10.5.3 Middleware Layer Safety Issues -- 10.5.3.1 Attack by SQL Injection -- 10.5.3.2 Attack by Signature Wrapping -- 10.5.3.3 Cloud Attack Injection with Malware -- 10.5.3.4 Cloud Flooding Attack -- 10.5.4 Gateways Safety Issues -- 10.5.4.1 On-Boarding Safely -- 10.5.4.2 Additional Interfaces -- 10.5.4.3 Encrypting End-to-End -- 10.5.5 Application Layer Safety Issues -- 10.5.5.1 Theft of Data -- 10.5.5.2 Attacks at Interruption in Service -- 10.5.5.3 Malicious Code Injection Attack…”
Libro electrónico -
1308por Smyth, NeilTabla de Contenidos: “…Kotlin Data Types,Variables and Nullability -- 12.1 Kotlin Data Types -- 12.1.1 Integer Data Types -- 12.1.2 Floating Point Data Types -- 12.1.3 Boolean Data Type -- 12.1.4 Character Data Type -- 12.1.5 String Data Type -- 12.1.6 Escape Sequences -- 12.2 Mutable Variables -- 12.3 Immutable Variables -- 12.4 Declaring Mutable and Immutable Variables -- 12.5 Data Types are Objects -- 12.6 Type Annotations and Type Inference -- 12.7 Nullable Type -- 12.8 The Safe Call Operator -- 12.9 Not-Null Assertion -- 12.10 Nullable Types and the let Function -- 12.11 Late Initialization (lateinit) -- 12.12 The Elvis Operator -- 12.13 Type Casting and Type Checking -- 12.14 Summary -- 13. …”
Publicado 2020
Libro electrónico -
1309por Ebel, NadinTabla de Contenidos: “…Intro -- Geleitwort von Per Kall -- Geleitwort von Martin Bucksteeg und Ralf Engler -- Vorwort -- Teil I - Grundlagen zum IT Service Management, ITIL und ITIL 4 -- 1 ITIL und IT Service Management -- 1.1 ITIL - ein erster Überblick -- 1.2 Grundlegende Begriffe im Service Management -- 1.2.1 Dienstleistungen (Services) -- 1.2.1.1 Wertschöpfungskonfiguration -- 1.2.1.2 Gestaltung von Dienstleistungsprozessen -- 1.2.2 Dienstleistungen in der IT (IT Services) -- 1.3 IT-Dienstleistungsmanagement mit ITIL -- 1.3.1 ITIL als Best Practice -- 1.3.2 Chancen und Vorteile -- 1.3.3 Risiken und Hemmnisse -- 1.4 Die Inhalte des ITIL 4 Frameworks -- 1.4.1 ITIL Service Value System -- 1.4.2 Vier-Dimensionen-Modell -- 1.5 Enterprise Service Management (ESM) -- 1.6 Zusammenfassung -- 1.7 Beispielfragen -- 2 ITIL und ITSM-Veröffentlichungen im Überblick -- 2.1 Die ITIL-Historie -- 2.1.1 ITIL V 1 -- 2.1.2 ITIL V 2 -- 2.1.3 ITIL V 3, ITIL Edition 2007 -- 2.1.4 ITIL V 3, ITIL Edition 2011 -- 2.1.5 ITIL Practitioner -- 2.1.6 ITIL 4 -- 2.2 Frameworks und Best Practices als ITIL-Inhalte -- 2.3 Weitere nicht proprietäre und proprietäre ITSM Frameworks -- 2.3.1 FitSM -- 2.3.2 YaSM -- 2.3.3 VeriSM -- 2.3.4 BSM -- 2.3.4.1 Services und Service Management -- 2.3.4.2 Menschen und Mitarbeiter -- 2.3.4.3 Practices -- 2.3.4.4 Tools und Technik der IT -- 2.3.5 CMMI-SVC -- 2.3.5.1 CMMI-Modelle -- 2.3.5.2 CMMI für Dienstleistungen -- 2.3.6 USMBOK -- 2.3.7 IT4IT -- 2.3.8 Agile Skalierungsframeworks -- 2.3.8.1 SAFe -- 2.3.8.2 Large Scale Scrum (LeSS) -- 2.4 Zusammenfassung -- Teil II - ITL 4 -- 3 Schlüsselkonzepte in ITIL 4 -- 3.1 Service Management und der Wertbeitrag für den Kunden -- 3.2 Stakeholder -- 3.3 Services und Produkte für die Wertschöpfung -- 3.4 Service-Beziehungen -- 3.5 Bestandteile des (Mehr-)Werts -- 3.5.1 Output und Ergebnis (Outcome) -- 3.5.2 Kosten -- 3.5.3 Risiken…”
Publicado 2021
Libro electrónico -
1310Publicado 2023Tabla de Contenidos: “…-- 1.1.3 Why a BMS Is Required in Any Energy Storage System -- 1.1.4 How a BMS Makes a Storage System Efficient, Safe, and Dependable -- 1.2 Example of a BMS in a Real System -- 1.2.1 LabView Based BMS -- 1.2.2 PLC Based BMS -- 1.2.3 Microprocessor Based BMS -- 1.2.4 Microcontroller Based BMS -- 1.3 System Failures Due to the Absence of a BMS -- 1.3.1 Dreamline Boeing Fire Incidences -- 1.3.2 Fire Accident at the Hawaii Grid Connected Energy Storage -- 1.3.3 Fire Accidents in Electric Vehicles -- References -- 2 General Requirements (Functions and Features) -- 2.1 Basic Functions of a BMS -- 2.1.1 Key Parameter Monitoring -- 2.1.2 Battery State Analysis -- 2.1.3 Safety Management -- 2.1.4 Energy Control Management -- 2.1.5 Information Management -- 2.2 Topological Structure of a BMS -- 2.2.1 Relationship Between a BMC and a Cell -- 2.2.2 Relationship Between a BCU and a BMC -- References -- 3 General Procedure of the BMS Design -- 3.1 Universal Battery Management System and Customized Battery Management System -- 3.1.1 Ideal Condition -- 3.1.2 Feasible Solution -- 3.1.3 Discussion of Universality -- 3.2 General Development Flow of the Power Battery Management System -- 3.2.1 Applicable Standards for BMS Development -- 3.2.2 Boundary of BMS Development -- 3.2.3 Battery Characteristic Test Is Essential to BMS Development -- 3.3 Core Status of Battery Modeling in the BMS Development Process -- References -- Part II Li-Ion Batteries -- 4 Introduction to Li-Ion Batteries -- 4.1 Components of Li-Ion Batteries: Electrodes, Electrolytes, Separators, and Cell Packing -- 4.2 Li-Ion Electrode Manufacturing…”
Libro electrónico -
1311Publicado 2023Tabla de Contenidos: “…5.3.4 The Need for Post-Quantum Cryptography -- 5.4 Algorithms Proposed for Post-Quantum Cryptography -- 5.4.1 Code-Based Cryptography -- 5.4.2 Lattice-Based Cryptography -- 5.4.3 Multivariate Cryptography -- 5.4.4 Hash-Based Cryptography -- 5.4.5 Supersingular Elliptic Curve Isogeny Cryptography -- 5.4.6 Quantum-Resistant Symmetric Key Cryptography -- 5.5 Launching of the Project Called "Open Quantum Safe" -- 5.6 Algorithms Proposed During the NIST Standardization Procedure for Post-Quantum Cryptography -- 5.7 Hardware Requirements of Post-Quantum Cryptographic Algorithms -- 5.7.1 NTRUEncrypt -- 5.7.1.1 Polynomial Multiplication -- 5.7.1.2 Hardware to Accelerate NTRUEncrypt -- 5.7.2 Hardware-Software Design to Implement PCQ Algorithms -- 5.7.3 Implementation of Cryptographic Algorithms Using HLS -- 5.8 Challenges on the Way of Post-Quantum Cryptography -- 5.9 Post-Quantum Cryptography Versus Quantum Cryptography -- 5.10 Future Prospects of Post-Quantum Cryptography -- References -- Chapter 6 A Statistical Characterization of MCX Crude Oil Price with Regard to Persistence Behavior and Seasonal Anomaly -- 6.1 Introduction -- 6.2 Related Literature -- 6.3 Data Description and Methodology -- 6.3.1 Data -- 6.3.2 Methodology -- 6.3.2.1 Characterizing Persistence Behavior of Crude Oil Return Time Series Using Hurst Exponent -- 6.3.2.2 Zipf Plot -- 6.3.2.3 Seasonal Anomaly in Oil Returns -- 6.4 Analysis and Findings -- 6.4.1 Persistence Behavior of Daily Oil Stock Price -- 6.4.2 Detecting Seasonal Pattern in Oil Prices -- 6.5 Conclusion and Implications -- References -- Appendix -- Chapter 7 Some Fixed Point and Coincidence Point Results Involving Gα-Type Weakly Commuting Mappings -- 7.1 Introduction -- 7.2 Definitions and Mathematical Preliminaries -- 7.2.1 Definition: G-metric Space (G-ms) -- 7.2.2 Definition: t-norm…”
Libro electrónico -
1312Publicado 2023Tabla de Contenidos: “…4.7.7 Sample Data Flow for Exception Handling -- 4.7.8 Sample Data Flow through Digital Twin Applications -- 4.7.9 Development Considerations -- 4.8 Database Considerations -- 4.9 Messaging -- 4.10 Interfaces -- 4.11 User Experience -- 4.12 Cyber Security -- 4.13 Use Case Coverage -- 4.14 Future Direction and Trends -- 4.15 Conclusion -- References -- Chapter 5 Role of Digital Twin Technology in Medical Sector-Toward Ensuring Safe Healthcare -- 5.1 Introduction to Digital Twin -- 5.2 Generic Applications of Digital Twin -- 5.3 Digital Twin Applications in Medical Field -- 5.3.1 Biosignal and Physiological Parameters Analysis for Body Area Network -- 5.3.2 Medicinal Drug Delivery -- 5.3.3 Surgical Preplanning -- 5.3.4 COVID 19 Screening and Diagnosis -- 5.4 Ongoing and Future Applications of Digital Twin in Healthcare Sector -- 5.5 Conclusion -- Acknowledgments -- References -- Chapter 6 Digital Twin as a Revamping Tool for Construction Industry -- 6.1 Introduction -- 6.2 Introduction to Digital Twin -- 6.3 Overview of Digital Twin in Construction -- 6.4 The Perks of Digital Twin -- 6.5 The Evolution of Digital Twin -- 6.6 Application of Digital Twin Technology in Construction Industry -- 6.7 Digital Twins Application for Construction Working Personnel Safety -- 6.8 Digital Twin Applications in Smart City Construction -- 6.9 Discussion -- 6.10 Conclusion -- References -- Chapter 7 Digital Twin Applications and Challenges in Healthcare -- 7.1 Introduction -- 7.2 Digital Twin -- 7.3 Applications of Digital Twin -- 7.3.1 Smart Cities -- 7.3.2 Manufacturing Sector -- 7.3.3 Healthcare -- 7.3.4 Aviation -- 7.3.5 The Disney Park -- 7.4 Challenges with Digital Twin -- 7.5 Digital Twin in Healthcare -- 7.5.1 Digital Twin for Hospital Workflow Management -- 7.5.2 Digital Twin for a Healthcare Facility…”
Libro electrónico -
1313por Srinivasan, A.Tabla de Contenidos: “…-- Summary -- Key Terms -- Review Questions -- Chapter 2: Move to Cloud Computing -- 2.1 Pros and Cons of Cloud Computing -- 2.1.1 Advantages of Cloud Computing in IT Field -- 2.1.2 The Fixed Cost Advantage -- 2.1.3 Keeping Data Safe -- 2.1.4 The Possible Disadvantages of Cloud Computing -- 2.1.5 Advantages of Cloud Computing -- 2.1.6 Disadvantages of Cloud Computing -- 2.2 Nature of the Cloud -- 2.2.1 Leveraging the Internet to Change the World -- 2.3 Technologies in Cloud Computing -- 2.3.1 Other Cloud-related Technologies -- 2.3.2 Working of Cloud -- 2.3.3 Key Characteristic of Cloud and its Role -- 2.4 Migrating into the Cloud -- 2.4.1 Cloud Computing Migration Issues: What You Need to Know? …”
Publicado 2014
Libro electrónico -
1314Publicado 2011“…Drug discovery and development process aims to make available medications that are safe and effective in improving the length and quality of life and relieving pain and suffering. …”
Libro electrónico -
1315Publicado 2018“…By the end of the book, you will have explored various aspects of embedded architecture such as memory management, focusing on a memory-safe approach, multithreading, and the RTOS approach. …”
Libro electrónico -
1316Publicado 2010“…Furthermore, the new systems must be inherently safe and environmentally benign. These realities of today's world are among the reasons that lead to serious interest in deploying nuclear power as a sustainable energy source. …”
Libro electrónico -
1317por Organisation for Economic Co-operation and Development.“…It is essential that organisations in the nuclear community maintain a healthy safety culture to achieve common goals regarding the safe operation of nuclear facilities and the safe use of nuclear material. …”
Publicado 2021
Libro electrónico -
1318por Organisation for Economic Co-operation and Development.“…All such waste must be managed safely, with the protection of human health and the environment as the highest priority. …”
Publicado 2020
Libro electrónico -
1319por World Health Organization“…For recommendations issued in the SPR, safety considerations include common barriers to safe, correct and consistent use of contraception and the benefits of preventing unintended or unwanted pregnancy…”
Publicado 2018
Libro electrónico -
1320por Samanta, Ashis Kumar“…This book on 'Chemistry and Technology of Natural and Synthetic Dyes and Pigments' is a priority publication by IntechOpen publisher and it relates to sustainable approaches towards green chemical processing of textiles, specifically on dyeing with natural dyes and pigments as well as dyeing with eco-safe synthetic dyes and chemicals. This book includes the following chapters: an introductory editorial chapter on bio-mordants, bio-dyes and bio-finishes, a review of natural dyes and pigments and its application, pantone-like shade generation with natural colorants, colour-based natural dyes and pigments, printing with natural dyes and pigments, functional property and functional finishes with natural dyes and pigments, eco-safe synthetic dyes and chemicals, and a miscellaneous review on dyed textiles and clothing including natural dye-based herbal textiles.This new book is expected to be useful for dyers of the textile industry as well as to the future researchers in this field…”
Publicado 2020
Libro electrónico