Mostrando 21 - 25 Resultados de 25 Para Buscar '"TSR"', tiempo de consulta: 0.05s Limitar resultados
  1. 21
    por Pérez Chávez, José
    Publicado 2022
    Tabla de Contenidos: “…CUOTAS ORDINARIAS Y EXTRAORDI NARIAS QUE LIQUIDAN LOS SOCIOS DE (...) -- TSR.TFJFA. IMPUESTO AL VALOR AGREGADO. EL SUMINISTRO DE MEDICAMEN TOS A (...) -- TTCC. …”
    Libro electrónico
  2. 22
    Publicado 2017
    Tabla de Contenidos: “…4.4 Acoustic Imaging Techniques -- 4.4.1 Image Formation -- 4.4.2 Online Techniques for Acoustic Processing -- 4.5 Concluding Remarks -- Acknowledgments -- Chapter 5 Vision-Based Advanced Driver Assistance Systems -- 5.1 Introduction -- 5.2 Forward Assistance -- 5.2.1 Adaptive Cruise Control (ACC) and Forward Collision Avoidance (FCA) -- 5.2.2 Traffic Sign Recognition (TSR) -- 5.2.3 Traffic Jam Assist (TJA) -- 5.2.4 Vulnerable Road User Protection -- 5.2.5 Intelligent Headlamp Control -- 5.2.6 Enhanced Night Vision (Dynamic Light Spot) -- 5.2.7 Intelligent Active Suspension -- 5.3 Lateral Assistance -- 5.3.1 Lane Departure Warning (LDW) and Lane Keeping System (LKS) -- 5.3.2 Lane Change Assistance (LCA) -- 5.3.3 Parking Assistance -- 5.4 Inside Assistance -- 5.4.1 Driver Monitoring and Drowsiness Detection -- 5.5 Conclusions and Future Challenges -- 5.5.1 Robustness -- 5.5.2 Cost -- Acknowledgments -- Chapter 6 Application Challenges from a Bird's-Eye View -- 6.1 Introduction to Micro Aerial Vehicles (MAVs) -- 6.1.1 Micro Aerial Vehicles (MAVs) -- 6.1.2 Rotorcraft MAVs -- 6.2 GPS-Denied Navigation -- 6.2.1 Autonomous Navigation with Range Sensors -- 6.2.2 Autonomous Navigation with Vision Sensors -- 6.2.3 SFLY: Swarm of Micro Flying Robots -- 6.2.4 SVO, a Visual-Odometry Algorithm for MAVs -- 6.3 Applications and Challenges -- 6.3.1 Applications -- 6.3.2 Safety and Robustness -- 6.4 Conclusions -- Chapter 7 Application Challenges of Underwater Vision -- 7.1 Introduction -- 7.2 Offline Computer Vision Techniques for Underwater Mapping and Inspection -- 7.2.1 2D Mosaicing -- 7.2.2 2.5D Mapping -- 7.2.3 3D Mapping -- 7.2.4 Machine Learning for Seafloor Classification -- 7.3 Acoustic Mapping Techniques -- 7.4 Concluding Remarks -- Chapter 8 Closing Notes -- References -- Index -- EULA…”
    Libro electrónico
  3. 23
    Publicado 2021
    Tabla de Contenidos: “…Advertising -- Trust Marks -- Safe Harbors -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Information Management -- Data Governance -- Building a Data Inventory -- Data Classification -- Data Flow Mapping -- Data Lifecycle Management -- Workforce Training -- Cybersecurity Threats -- Threat Actors -- Incident Response -- Phases of Incident Response -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Building an Incident Response Plan -- Data Breach Notification -- Vendor Management -- Vendor Cybersecurity Incidents -- Summary -- Exam Essentials -- Chapter 5 Private Sector Data Collection -- FTC Privacy Protection -- General FTC Privacy Protection -- The Children's Online Privacy Protection Act (COPPA) -- Future of Federal Enforcement -- Medical Privacy -- The Health Insurance Portability and Accountability Act (HIPAA) -- The Health Information Technology for Economic and Clinical Health Act -- The 21st Century Cures Act -- Confidentiality of Substance Use Disorder Patient Records Rule -- Financial Privacy -- Privacy in Credit Reporting -- Gramm-Leach-Bliley Act (GLBA) -- Red Flags Rule -- Consumer Financial Protection Bureau -- Educational Privacy -- Family Educational Rights and Privacy Act (FERPA) -- Telecommunications and Marketing Privacy -- Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR) -- The Junk Fax Prevention Act (JFPA) -- Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act -- Telecommunications Act and Customer Proprietary Network Information -- Cable Communications Policy Act -- Video Privacy Protection Act (VPPA) of 1988 -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Government and Court Access to Private Sector Information -- Law Enforcement and Privacy -- Access to Financial Data…”
    Libro electrónico
  4. 24
    Publicado 2012
    Tabla de Contenidos: “…HAWT: The Final Conclusion -- Standards and Certifications -- Independent Certification -- Summary -- 9 How to Choose the Right Wind Turbine for the Job -- Important Questions to Ask When Shopping For a Small Wind Turbine -- What to Look For When Buying a Wind Turbine -- Swept Area (Rotor Diameter) -- Durability -- Predicted Annual Energy Output (AEO) -- Cost -- Speed (RPM and TSR) -- Shutdown Mechanism -- Sound -- Time to Select Your Wind Turbine -- The Variables -- Summary -- 10 Balance of System: Batteries, Inverters, Controllers, and More -- Inverters -- Grid-Tied Inverters -- Off-Grid Inverters -- Grid-Tied with Battery Backup -- Batteries -- Types of Batteries -- Basic Battery Chemistry -- Battery Ratings: Amp-Hours -- Cost of Batteries -- Energy Loss from Internal Resistance -- Battery Longevity -- Sizing Your Battery Bank -- Organization of Battery Banks -- Charge Controllers -- Will Solar Charge Controllers Work for Wind Systems? …”
    Libro electrónico
  5. 25
    Publicado 2022
    Tabla de Contenidos: “…3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM -- 3.6 Conclusion -- References -- 4 Automated TSR Using DNN Approach for Intelligent Vehicles -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Neural Network (NN) -- 4.4 Methodology -- 4.4.1 System Architecture -- 4.4.2 Database -- 4.5 Experiments and Results -- 4.5.1 FFNN -- 4.5.2 RNN -- 4.5.3 CNN -- 4.5.4 CNN -- 4.6 Discussion -- 4.7 Conclusion -- References -- 5 Honeypot: A Trap for Attackers -- 5.1 Introduction -- 5.1.1 Research Honeypots -- 5.1.2 Production Honeypots -- 5.2 Method -- 5.2.1 Low-Interaction Honeypots -- 5.2.2 Medium-Interaction Honeypots -- 5.2.3 High-Interaction Honeypots -- 5.3 Cryptanalysis -- 5.3.1 System Architecture -- 5.3.2 Possible Attacks on Honeypot -- 5.3.3 Advantages of Honeypots -- 5.3.4 Disadvantages of Honeypots -- 5.4 Conclusions -- References -- 6 Examining Security Aspects in Industrial-Based Internet of Things -- 6.1 Introduction -- 6.2 Process Frame of IoT Before Security -- 6.2.1 Cyber Attack -- 6.2.2 Security Assessment in IoT -- 6.2.2.1 Security in Perception and Network Frame -- 6.3 Attacks and Security Assessments in IIoT -- 6.3.1 IoT Security Techniques Analysis Based on its Merits -- 6.4 Conclusion -- References -- 7 A Cooperative Navigation for Multi-Robots in Unknown Environments Using Hybrid Jaya-DE Algorithm -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Problem Formulation -- 7.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm -- 7.4.1 Basic Jaya Algorithm -- 7.5 Hybrid Jaya-DE -- 7.5.1 Mutation -- 7.5.2 Crossover -- 7.5.3 Selection -- 7.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm -- 7.7 Total Navigation Path Deviation (TNPD) -- 7.8 Average Unexplored Goal Distance (AUGD) -- 7.9 Conclusion -- References -- 8 Categorization Model for Parkinson's Disease Occurrence and Severity Prediction -- 8.1 Introduction…”
    Libro electrónico