Mostrando 4,201 - 4,220 Resultados de 4,485 Para Buscar '"The Half of It"', tiempo de consulta: 0.13s Limitar resultados
  1. 4201
    Publicado 2017
    Tabla de Contenidos: “…3.3.4 Development of the Kinematic Trajectory-Tracking Error Model -- 3.3.5 Linear Controller -- 3.3.6 Lyapunov-Based Control Design -- 3.3.7 Takagi-Sugeno Fuzzy Control Design in the LMI Framework -- Takagi-Sugeno Fuzzy Error Model of a Differentially Driven Wheeled Mobile Robot -- PDC Control of a Differentially Driven Wheeled Mobile Robot -- 3.3.8 Model-Based Predictive Control -- Discrete MPC -- 3.3.9 Particle Swarm Optimization-Based Control -- MPC With PSO -- 3.3.10 Visual Servoing Approaches for Solving the Control Problems in Mobile Robotics -- 3.4 Optimal Velocity Profile Estimation for a Known Path -- References -- Chapter 4: Path Planning -- 4.1 Introduction -- 4.1.1 Robot Environment -- 4.1.2 Path Planning -- 4.1.3 Configuration and Configuration Space -- 4.1.4 Mathematical Description of Obstacle Shape and Pose in the Environment -- Border-Based Description of Obstacles -- Obstacle Description Using Intersecting Half-Planes -- 4.2 Environment Presentation for Path Planning Purposes -- 4.2.1 Graph Representation -- 4.2.2 Cell Decomposition -- Accurate Decomposition to Cells -- Approximate Decomposition to Cells -- 4.2.3 Roadmap -- Visibility Graph -- Voronoi Graph -- Triangulation -- 4.2.4 Potential Field -- 4.2.5 Sampling-Based Path-Planning -- RRT Method -- PRM Method -- 4.3 Simple Path Planning Algorithms:Bug Algorithms -- 4.3.1 Bug0 Algorithm -- 4.3.2 Bug1 Algorithm -- 4.3.3 Bug2 Algorithm -- 4.4 Graph-Based Path Planning Methods -- 4.4.1 Breadth-First Search -- 4.4.2 Depth-First Search -- 4.4.3 Iterative Deepening Depth-First Search -- 4.4.4 Dijkstra's Algorithm -- 4.4.5 A∗ Algorithm -- 4.4.6 Greedy Best-First Search -- References -- Chapter 5: Sensors Used in Mobile Systems -- 5.1 Introduction -- 5.2 Coordinate Frame Transformations -- 5.2.1 Orientation and Rotation -- 5.2.2 Translation and Rotation…”
    Libro electrónico
  2. 4202
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Half-Title -- Title -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- Epigraph -- PART I: DOES RESEARCH ETHICS REST ON A MISTAKE? …”
    Libro electrónico
  3. 4203
    Publicado 2010
    Tabla de Contenidos: “…2.2.4 Full-Duplex Ethernet -- 2.2.5 Switched Ethernet -- 2.2.6 10-Gigabit Ethernet -- 2.2.7 Virtual LAN -- 2.2.8 Token Ring -- 2.2.9 FDDI -- 2.2.10 Wireless LAN -- 2.3 Network Node Components -- 2.3.1 Hubs -- 2.3.2 Bridges -- 2.3.3 Remote Bridge -- 2.3.4 Transparent Bridge -- 2.3.5 Source-Routing Bridge -- 2.3.6 Routers -- 2.3.7 Gateways and Protocol Converters -- 2.3.8 Multiprotocol Routers and Tunneling -- 2.3.9 Half-Bridge Configuration of Router -- 2.3.10 Edge Routers -- 2.3.11 Switches -- 2.4 Wide Area Networks -- 2.5 Transmission Technology -- 2.5.1 Introduction -- 2.5.2 Wired Transmission -- 2.5.3 Wireless Transmission Media -- 2.5.4 Transmission Modes -- 2.6 Integrated Services: ISDN, Frame Relay, and Broadband -- Summary -- Exercises -- Part II: SNMP and Network Management -- Chapter 3: Basic Foundations: Standards, Models, and Language -- 3.1 Network Management Standards -- 3.2 Network Management Models -- 3.3 Organization Model -- 3.4 Information Model -- 3.4.1 Management Information Tree -- 3.4.2 Managed Object Perspective -- 3.5 Communication Model -- 3.6 Abstract Syntax Notation One: ASN. 1 -- 3.6.1 Terminology, Symbols, and Conventions -- 3.6.2 Objects and Data Types -- 3.6.3 Object Name -- 3.6.4 An Example of Use of ASN.1 from ISO 8824 -- 3.7 Encoding Structure -- 3.8 Macros -- 3.9 Functional Model -- Summary -- Exercises -- Chapter 4: SNMPv1 Network Management: Organization and Information Models -- 4.1 Managed Network: Case Histories and Examples -- 4.2 History of SNMP Management -- 4.3 Internet Organizations and Standards -- 4.3.1 Organizations -- 4.3.2 Internet Documents -- 4.4 SNMP Model -- 4.5 Organization Model -- 4.6 System Overview -- 4.7 Information Model -- 4.7.1 Introduction -- 4.7.2 Structure of Management Information -- 4.7.3 Managed Objects -- 4.7.4 Management of Information Base -- Summary -- Exercises…”
    Libro electrónico
  4. 4204
    Publicado 2021
    Tabla de Contenidos: “…Half Title -- Series Information -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Illustrations and Tables -- Abbreviations -- Introduction -- 1 Historiography and the Muslim Presence in Spain in the Early Modern Age -- Chapter 1 Muslims in Europe, Sixteenth to Eighteenth Centuries -- 1.1 Muslims, a Minority among Slaves -- 1.2 Hundreds of Muslim Embassies -- 1.3 Merchants in Ports and Cities -- 1.4 Muslim Converts to Christianity -- 1.5 Exiles, Travelers, Soldiers, and Adventurers -- Chapter 2 The Spain That Enslaves and Expels: Moriscos and Muslim Captives (1492 to 1767-1791) -- 2.1 The Moriscos between Islam and Christendom -- 2.2 Muslims, a Minority among Slaves -- Chapter 3 Spain, Land of Refuge and Survival for Thousands of Muslims: Sixteenth to Eighteenth Centuries -- 3.1 Royal Exiles in the Sixteenth Century: Recover the Throne, or Convert? …”
    Libro electrónico
  5. 4205
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgements -- Contributors -- Editors -- 1 Artificial Intelligence in Marketing -- 1.1 Introduction -- 1.2 AI, ML and Data Science -- 1.3 AI and Marketing -- 1.4 Benefits and Detriments of Using AI in Marketing -- 1.4.1 Benefits -- 1.4.2 Detriments -- 1.4.2.1 Amazon Go (Caselet) -- 1.4.2.2 Technical Working of Amazon Go -- 1.4.2.3 Issues Related to Amazon Go Technology -- 1.5 Marketing Plan and AI's Potential -- 1.6 Future -- References -- 2 Consumer Insights through Retail Analytics -- 2.1 Introduction -- 2.2 What Value Does Analytics Bring to Retail? …”
    Libro electrónico
  6. 4206
    Publicado 2020
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- Chapter 1: Introduction -- 1.1 WIND ENERGY BACKGROUND -- 1.2 ORGANIZATION OF THIS BOOK -- 1.2.1 Who Should Use This Book -- 1.2.2 Note for Instructors -- 1.2.3 Datasets Used in the Book -- Part I: Wind Field Analysis -- Chapter 2: A Single Time Series Model -- 2.1 TIME SCALE IN SHORT- TERM FORECASTING -- 2.2 SIMPLE FORECASTING MODELS -- 2.2.1 Forecasting Based on Persistence Model -- 2.2.2 Weibull Distribution -- 2.2.3 Estimation of Parameters in Weibull Distribution -- 2.2.4 Goodness of Fit -- 2.2.5 Forecasting Based on Weibull Distribution -- 2.3 DATA TRANSFORMATION AND STANDARDIZATION -- 2.4 AUTOREGRESSIVE MOVING AVERAGE MODELS -- 2.4.1 Parameter Estimation -- 2.4.2 Decide Model Order -- 2.4.3 Model Diagnostics -- 2.4.4 Forecasting Based on ARMA Model -- 2.5 OTHER METHODS -- 2.5.1 Kalman Filter -- 2.5.2 Support Vector Machine -- 2.5.3 Artificial Neural Network -- 2.6 PERFORMANCE METRICS -- 2.7 COMPARING WIND FORECASTING METHODS -- Chapter 3: Spatio temporal Models -- 3.1 COVARIANCE FUNCTIONS AND KRIGING -- 3.1.1 Properties of Covariance Functions -- 3.1.2 Power Exponential Covariance Function -- 3.1.3 Kriging -- 3.2 SPATIO-TEMPORAL AUTOREGRESSIVE MODELS -- 3.2.1 Gaussian Spatio-temporal Autoregressive Model -- 3.2.2 Informative Neighborhood -- 3.2.3 Forecasting and Comparison -- 3.3 SPATIO-TEMPORAL ASYMMETRY AND SEPARABILITY -- 3.3.1 Definition and Quantification -- 3.3.2 Asymmetry of Local Wind Field -- 3.3.3 Asymmetry Quantification -- 3.3.4 Asymmetry and Wake Effect -- 3.4 ASYMMETRIC SPATIO-TEMPORAL MODELS -- 3.4.1 Asymmetric Non-separable Spatio-temporal Model -- 3.4.2 Separable Spatio-temporal Models -- 3.4.3 Forecasting Using Spatio-temporal Model -- 3.4.4 Hybrid of Asymmetric Model and SVM -- 3.5 CASE STUDY…”
    Libro electrónico
  7. 4207
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Authors -- 1. …”
    Libro electrónico
  8. 4208
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Acronyms -- Preface -- Author -- Chapter 1 Introduction to Flight Vehicles -- 1.1 Introduction -- 1.2 Components of an Aeroplane -- 1.2.1 Fuselage -- 1.2.2 Wings -- 1.2.3 Tail Surfaces or Empennage -- 1.2.4 Landing Gear -- 1.3 Basic Principles of Flight -- 1.3.1 Forces Acting on an Aeroplane -- 1.3.2 Drag and Its Reduction -- 1.3.3 Aerodynamically Conforming Shapes: Streamlining -- 1.3.4 Stability and Balance -- 1.4 Flying Control Surfaces: Elevator, Ailerons and Rudder -- 1.4.1 Flaps, High-Lift and Flow Control Devices -- 1.4.2 Introducing Boundary Layers -- 1.4.3 Spoilers -- 1.5 Pilot's Controls: The Throttle, the Control Column and Yoke, the Rudder Pedals and the Toe Brakes -- 1.6 Modes of Flight -- 1.6.1 Static and In-Flight Stability Margins -- 1.7 Power Plant -- 1.7.1 Propeller-Driven Aircraft -- 1.7.2 Jet Propulsion -- 1.8 Avionics, Instrumentation and Systems -- 1.8.1 Autonomous Navigation -- 1.9 Geometry of Aerofoils and Wings -- 1.9.1 Aerofoil Geometry -- 1.9.2 Chord Line -- 1.9.3 Camber -- 1.9.4 Leading and Trailing Edges -- 1.9.5 Specifying Aerofoils -- 1.9.6 Equations Defining Mean Camber Line -- 1.9.7 Aerofoil Thickness Distributions -- 1.9.8 Wing Geometry -- Chapter Highlights -- Exercises -- Answers to Selected Exercises -- References -- Chapter 2 Basic Principles Governing Aerodynamic Flows -- 2.1 Introduction -- 2.2 Continuity Principle -- 2.2.1 Streamlines and Stream Tubes -- 2.3 Bernoulli's Principle -- 2.4 Laminar Flows and Boundary Layers -- 2.5 Turbulent Flows -- 2.6 Aerodynamics of Aerofoils and Wings -- 2.6.1 Flow Around an Aerofoil -- 2.6.2 Mach Number and Subsonic and Supersonic Flows -- 2.7 Properties of Air in the Atmosphere…”
    Libro electrónico
  9. 4209
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Chapter 1: Paralysis support system using IoT -- 1.1 Introduction -- 1.2 Literature review -- 1.3 Proposed healthcare system -- 1.4 System architecture -- 1.4.1 ESP32-NODE MCU -- 1.4.2 Gyro and accelerometer sensor -- 1.4.3 RF module -- 1.4.4 Encoder and decoder -- 1.4.5 LCD display -- 1.4.6 Arduino IDE -- 1.5 Results and discussion -- 1.6 Conclusion and future scope -- References -- Chapter 2: Blockchain and its applications: A review -- 2.1 Introduction -- 2.2 Blockchain architecture -- 2.3 Working of blockchain -- 2.4 Application -- 2.4.1 Healthcare -- 2.4.2 Education -- 2.4.3 Insurance -- 2.4.4 E-Commerce -- 2.4.5 Transportation -- 2.4.6 Industry of strength -- 2.5 Conclusion -- References -- Chapter 3: Data analytics tools for smart cities and smart towns -- 3.1 Introduction -- 3.2 The concept of big data analytics -- 3.3 The concept of smart cities -- 3.3.1 Data storage in smart cities -- 3.4 Need for data analytics in smart cities -- 3.4.1 Reliability -- 3.4.2 Transport -- 3.4.3 Planning -- 3.4.4 Future proofing -- 3.4.5 Effective spending -- 3.4.6 Sustainability -- 3.5 Data analytics tools -- 3.6 Data analytics tools for smart cities and towns -- 3.6.1 Hadoop -- 3.6.2 Map Reduce -- 3.6.3 Apache storm -- 3.6.4 Apache spark -- 3.6.5 Apache Flink -- 3.6.6 Flume -- 3.7 Conclusion -- References -- Chapter 4: Industrial Internet of Things and its applications in Industry 4.0 through sensor integration for a process parameter monitor and control -- 4.1 Introduction -- 4.2 Problem statement -- 4.3 Objective -- 4.4 Related works -- 4.4.1 Inferences through the survey -- 4.5 Existing methodology -- 4.5.1 Level process station -- 4.5.2 Monitoring and control of level process -- 4.5.3 SCADA…”
    Libro electrónico
  10. 4210
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Part I Secure AI/ML Systems: Attack Models -- 1 Machine Learning Attack Models -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Notation -- 1.2.2 Support Vector Machines -- 1.2.3 Neural Networks -- 1.3 White-Box Adversarial Attacks -- 1.3.1 L-BGFS Attack -- 1.3.2 Fast Gradient Sign Method -- 1.3.3 Basic Iterative Method -- 1.3.4 DeepFool -- 1.3.5 Fast Adaptive Boundary Attack -- 1.3.6 Carlini and Wagner's Attack -- 1.3.7 Shadow Attack -- 1.3.8 Wasserstein Attack -- 1.4 Black-Box Adversarial Attacks -- 1.4.1 Transfer Attack -- 1.4.2 Score-Based Black-Box Attacks -- ZOO Attack -- Square Attack -- 1.4.3 Decision-Based Attack -- Boundary Attack -- HopSkipJump Attack -- Spatial Transformation Attack -- 1.5 Data Poisoning Attacks -- 1.5.1 Label Flipping Attacks -- 1.5.2 Clean Label Data Poisoning Attack -- Feature Collision Attack -- Convex Polytope Attack and Bullseye Polytope Attack -- 1.5.3 Backdoor Attack -- 1.6 Conclusions -- Acknowledgment -- Note -- References -- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-Generation Wireless Communications -- 2.1 Introduction -- 2.1.1 Scope and Background -- 2.2 Adversarial Machine Learning -- 2.3 Challenges and Gaps -- 2.3.1 Development Environment -- 2.3.2 Training and Test Datasets -- 2.3.3 Repeatability, Hyperparameter Optimization, and Explainability -- 2.3.4 Embedded Implementation -- 2.4 Conclusions and Recommendations -- References -- 3 Threat of Adversarial Attacks to Deep Learning: A Survey -- 3.1 Introduction -- 3.2 Categories of Attacks -- 3.2.1 White-Box Attacks -- FGSM-based Method -- JSMA-based Method -- 3.2.2 Black-Box Attacks -- Mobility-based Approach -- Gradient Estimation-Based Approach -- 3.3 Attacks Overview…”
    Libro electrónico
  11. 4211
    Publicado 2025
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- About the Editor -- List of Contributors -- Preface -- Chapter 1 Advanced Building Materials -- 1.1 Introduction -- 1.1.1 Brief History of Building Materials -- 1.2 Different Factors for Consideration in the Selection of Building Materials -- 1.2.1 Climatic Conditions -- 1.2.2 Strength and Durability -- 1.2.3 Thermal Capabilities and Availability -- 1.2.4 Moisture and Fire Resistance -- 1.2.5 Maintenance and Cost Effectiveness -- 1.2.6 Sustainability and Aesthetics -- 1.3 Ancient Building Materials -- 1.3.1 Stone -- 1.3.2 Clay -- 1.3.3 Granite -- 1.3.4 Lime -- 1.3.5 Basalt -- 1.3.6 Wood -- 1.3.7 Bamboo -- 1.3.8 Thatch -- 1.3.9 Adobe -- 1.4 Conventional Building Materials -- 1.4.1 Concrete-Based Materials -- 1.4.2 Steel-Reinforced Concrete -- 1.4.3 Synthetic Fiber-Reinforced Concrete -- 1.4.4 Glass Fiber-Reinforced Concrete -- 1.4.5 Carbon Fiber-Reinforced Concrete -- 1.4.6 Steel -- 1.4.7 Brick -- 1.4.8 Glass -- 1.4.9 Wood -- 1.5 Advanced Building Materials -- 1.5.1 High-Performance Concrete -- 1.5.2 Ultra-High-Performance Concrete -- 1.5.3 Self-Healing Concrete -- 1.5.4 Flexible Concrete -- 1.5.5 Insulated Concrete Forms -- 1.5.6 Digital Concrete -- 1.5.7 Light-Emitting Concrete -- 1.5.8 Bio-Cementation -- 1.5.9 Recycled Materials -- References -- Chapter 2 Advances in Thermal Energy Storage in Buildings -- 2.1 Introduction -- 2.1.1 Heat Transfer in Building Envelopes -- 2.1.2 Classification of TES Systems -- 2.2 Types of Thermal Energy Storage -- 2.2.1 Sensible Heat Storage in Buildings -- 2.2.2 Latent Heat Storage in Buildings -- 2.2.3 Thermochemical Storage in Buildings -- 2.3 TES Methods and their Application in Buildings -- 2.3.1 Passive Storage Techniques -- 2.3.2 Active Storage Techniques -- 2.4 Advantages and Challenges of TES -- 2.5 Conclusions -- References…”
    Libro electrónico
  12. 4212
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Contents -- Acknowledgements -- Abbreviations -- Introduction -- 1 Current Situation -- 2 Conditions for Providing Humanitarian Relief -- 3 Can Consent to Relief Operations Be Withheld? …”
    Libro electrónico
  13. 4213
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Abbreviations -- General Introduction -- 1 Hypothesis, Relevance and Objectives -- 2 Definition of Terms -- 3 Structure -- Part 1 Secession in Contemporary International Law -- Section 1 Legal Analysis of the Status of the Secessionist Entity -- Introduction to Section 1 -- Chapter 1 Legal Understanding of Statehood: Role of the Factual Element in Secession -- 1 Introduction -- 2 Evolution of the Factual Element in Secession during Earlier Periods -- 2.1 Dynastic Legitimism -- 2.2 Transitory Factualist Period -- 2.3 Constitutive Theory of Recognition -- 2.4 Summary -- 3 Factualist Statehood and Declaratory Theory -- 3.1 Main Point of Reference: Montevideo Criteria -- 3.2 Underlying Rationales behind the Montevideo Criteria -- 3.3 Classical Doctrinal View of Secession -- 4 Critical Re-assessment of the Classical Doctrinal View of Secession -- 4.1 Revisiting Jellinek and Kelsen -- 4.1.1 Common Background -- 4.1.2 Jellinek: Three-Elements Doctrine and the Normative Force of the Factual -- 4.1.3 Kelsen: Statehood and the Principle of Effectiveness -- 4.1.4 Jellinek and Kelsen: Synthesis, Divergence and Impact on Future Debate -- 4.2 Theoretical Weaknesses of a Classical Doctrinal View of Secession -- 4.3 Principle of Effectiveness Is a Legal Rule -- 5 Conclusion -- Chapter 2 Prohibition of Secession in Case of Violation of Peremptory Norms -- 1 Introduction -- 2 General Outline of Peremptory Norms' Relevance to Secession -- 2.1 State Practice and Opinio Iuris -- 2.1.1 Pre-1945 Practice and Opinio Iuris -- 2.1.2 Post-1945 Practice and Opinio Iuris -- 2.1.2.1 Unlawful Territorial Acquisitions -- 2.1.2.2 Treaties and Codification Works on State Succession -- 2.1.2.3 Other Relevant Practice and Opinio Iuris of a General Character…”
    Libro electrónico
  14. 4214
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Symbols -- Authors -- 1. …”
    Libro electrónico
  15. 4215
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Contributors -- Chapter 1 A Novel Robust Watermarking Algorithm for Encrypted Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition -- 1.1 Introduction -- 1.2 Basic Theory -- 1.2.1 Discrete Wavelet Transform (DWT) -- 1.2.2 Non-Subsampled Shearlet Transform (NSST) -- 1.2.3 Matrix Schur Decomposition -- 1.2.4 Chaos Encryption System -- 1.3 Proposed Algorithm -- 1.3.1 Medical Image Encryption -- 1.3.2 Feature Extraction -- 1.3.3 Embed Watermark -- 1.3.4 Extraction of Watermark -- 1.4 Experiments and Analysis of Results -- 1.4.1 Simulation Experiment -- 1.4.2 Attacks Results -- 1.4.3 Contrastion to Plaintext Domain Algorithm -- 1.4.4 Contrastion to Other Encrypted Algorithms -- 1.5 Conclusion -- References -- Chapter 2 Robust Zero Watermarking Algorithm for Encrypted Medical Images Based on SUSAN-DCT -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Basic Theory and Proposed Algorithm -- 2.3.1 SUSAN Edge Detection -- 2.3.2 Hu Moments -- 2.3.3 Logical Mapping -- 2.3.4 Proposed Algorithm -- 2.4 Experiment and Results -- 2.4.1 Evaluation Parameter -- 2.4.2 Experimental Setup -- 2.4.3 Results and Analysis -- 2.5 Conclusion -- References -- Chapter 3 Robust Zero Watermarking Algorithm for Encrypted Medical Volume Data Based on PJFM and 3D-DCT -- 3.1 Introduction -- 3.2 The Fundamental Theory -- 3.2.1 Pseudo Jacobi-Fourier Moment -- 3.2.2 D-DCT and 3D-IDCT -- 3.2.3 Logistic Mapping -- 3.3 The Proposed Method -- 3.3.1 Medical Volume Data Encryption -- 3.3.2 Feature Extraction -- 3.3.3 Watermark Encryption and Embedding -- 3.3.4 Watermark Extraction and Decryption -- 3.4 Experimental Results and Performance Evaluation -- 3.4.1 Simulation Experiment -- 3.4.2 Attacks Results -- 3.4.3 Comparison with Unencrypted Algorithm -- 3.5 Conclusion -- References…”
    Libro electrónico
  16. 4216
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- About Our Authors -- Chapter 1 Fundamentals of the Internet of Things -- 1.1 Introduction and Background of the Internet of Things -- 1.1.1 Need for IoT -- 1.1.2 Is IoT the Future? …”
    Libro electrónico
  17. 4217
    Publicado 2019
    Tabla de Contenidos: “…ANALYSIS FOR ASEAN 5 -- THE INFLUENCE OF DOMAIN KNOWLEDGE AND CLIENT'S REPORTING STRATEGY ON TAX CONSULTANT'S DECISION -- THE ROLE OF INVESTMENTS ON PHARMACEUTICAL COMPANY PERFORMANCE THAT WAS MEDIATED WITH ADVERTISING, RAW MATERIAL, TRAINING AND NUMBER OF LABORS -- MICRO AND SMALL BUSINESS DEVELOPMENT THROUGH INNOVATION AND BUSINESS RISK ADJUSTMENT TOWARD DIGITAL BUSINESS WITH ICT ADOPTION -- DATA MINING APPROACH FOR PREDICTION OF RICE PRODUCTION USING BACKPROPAGATION ARTIFICIAL NEURAL NETWORK METHOD -- LAMPUNG PROVINCE E-COMMERCE POTENTIAL IN FACING IMT-GT 2020 -- THE INFLUENCE OF THE PROVISION OF PEOPLE'S BUSINESS CREDIT (KUR) ON THE INCOME OF UMKM ENTREPRENEURS IN SOLOK SELATAN DISTRICT -- DEVELOPMENT OF WEB AND MOBILE GIS APPLICATION OF DISASTER IN PADANG TO SUPPORT TOURISM OF WEST SUMATRA PROVINCE -- THE READINESS OF PEOPLE IN BORDER AREA IN FACING THE ASEAN ECONOMIC COMMUNITY IN BERAKIT VILLAGE, TELUK SEBONG SUB-DISTRICT, BINTAN REGENCY, KEPULAUAN RIAU PROVINCE -- DEVELOPING WEBGIS FOR BUILDINGS IN NAGARI KOTO GADANG, AGAM REGENCY, WEST SUMATRA PROVINCE -- ORGANOLEPTIC AND CRISPNESS OF PURPLE SWEET POTATO, SOYBEAN FLOUR, AND REDKIDNEY BEAN FLOUR FLAKES -- THE COMPARATIVE ANALYSIS OF COMPANY PERFORMANCE BEFORE AND AFTER THE ADOPTION OF IT GOVERNANCE (CASE STUDY ON MANUFACTURING AND MINING LISTED COMPANIES IN IDX) -- ASEAN COOPERATION ON ENVIRONMENTALLY SUSTAINABLE CITIES: IMPLICATIONS FOR DEVELOPMENT IN PALEMBANG (SOUTH SUMATERA) -- THE POTENTIAL OF ASEAN IN ASEAN PLUS THREE ECONOMIC COOPERATION -- THE IMPACT OF ASEAN ECONOMIC COMMUNITY CASE STUDY THE FISHERMEN IN BELAWAN -- LITERATURE STUDY ABOUT HALF RUBBER TREATMENT PROCESSING BY VILLAGE OWNED ENTERPRISES AS EMPOWERMENT IN INCREASING RUBBER FARMERS INCOME IN RURAL -- THE IMPACT OF FINANCIAL TECHNOLOGY (FINTECH) ON ACCOUNTING EDUCATION AND PRACTICIONER IN WEST SUMATERA -- THE CONCEPT OF SHARIA INSURANCE ARRANGEMENT IN ASEAN COUNTRIES (COMPARISON OF MALAYSIAN AND INDONESIAN ARRANGEMENT CONCEPTS) -- III. …”
    Libro electrónico
  18. 4218
    Publicado 2015
    Tabla de Contenidos: “…Chapter 1 Introductory Concepts -- 1-1 Digital and Analog Quantities -- 1-2 Binary Digits, Logic Levels, and Digital Waveforms -- 1-3 Basic Logic Functions -- 1-4 Combinational and Sequential Logic Functions -- 1-5 Introduction to Programmable Logic -- 1-6 Fixed-Function Logic Devices -- 1-7 Test and Measurement Instruments -- 1-8 Introduction to Troubleshooting -- Chapter 2 Number Systems, Operations, and Codes -- 2-1 Decimal Numbers -- 2-2 Binary Numbers -- 2-3 Decimal-to-Binary Conversion -- 2-4 Binary Arithmetic -- 2-5 Complements of Binary Numbers -- 2-6 Signed Numbers -- 2-7 Arithmetic Operations with Signed Numbers -- 2-8 Hexadecimal Numbers -- 2-9 Octal Numbers -- 2-10 Binary Coded Decimal (BCD) -- 2-11 Digital Codes -- 2-12 Error Codes -- Chapter 3 Logic Gates -- 3-1 The Inverter -- 3-2 The AND Gate -- 3-3 The OR Gate -- 3-4 The NAND Gate -- 3-5 The NOR Gate -- 3-6 The Exclusive-OR and Exclusive-NOR Gates -- 3-7 Programmable Logic -- 3-8 Fixed-Function Logic Gates -- 3-9 Troubleshooting -- Chapter 4 Boolean Algebra and Logic Simplification -- 4-1 Boolean Operations and Expressions -- 4-2 Laws and Rules of Boolean Algebra -- 4-3 DeMorgan's Theorems -- 4-4 Boolean Analysis of Logic Circuits -- 4-5 Logic Simplification Using Boolean Algebra -- 4-6 Standard Forms of Boolean Expressions -- 4-7 Boolean Expressions and Truth Tables -- 4-8 The Karnaugh Map -- 4-9 Karnaugh Map SOP Minimization -- 4-10 Karnaugh Map POS Minimization -- 4-11 The Quine-McCluskey Method -- 4-12 Boolean Expressions with VHDL -- Applied Logic -- Chapter 5 Combinational Logic Analysis -- 5-1 Basic Combinational Logic Circuits -- 5-2 Implementing Combinational Logic -- 5-3 The Universal Property of NAND and NOR Gates -- 5-4 Combinational Logic Using NAND and NOR Gates -- 5-5 Pulse Waveform Operation -- 5-6 Combinational Logic with VHDL -- 5-7 Troubleshooting -- Applied Logic -- Chapter 6 Functions of Combinational Logic -- 6-1 Half and Full Adders -- 6-2 Parallel Binary Adders -- 6-3 Ripple Carry and Look-Ahead Carry Adders -- 6-4 Comparators -- 6-5 Decoders -- 6-6 Encoders -- 6-7 Code Converters -- 6-8 Multiplexers (Data Selectors) -- 6-9 Demultiplexers -- 6-10 Parity Generators/Checkers -- 6-11 Troubleshooting -- Applied Logic -- Chapter 7 Latches, Flip-Flops, and Timers -- 7-1 Latches -- 7-2 Flip-Flops -- 7-3 Flip-Flop Operating Characteristics -- 7-4 Flip-Flop Applications -- 7-5 One-Shots -- 7-6 The Astable Multivibrator -- 7-7 Troubleshooting -- Applied Logic -- Chapter 8 Shift Registers -- 8-1 Shift Register Operations -- 8-2 Types of Shift Register Data I/Os -- 8-3 Bidirectional Shift Registers -- 8-4 Shift Register Counters -- 8-5 Shift Register Applications -- 8-6 Logic Symbols with Dependency Notation -- 8-7 Troubleshooting -- Applied Logic -- Chapter 9 Counters -- 9-1 Finite State Machines -- 9-2 Asynchronous Counters -- 9-3 Synchronous Counters -- 9-4 Up/Down Synchronous Counters -- 9-5 Design of Synchronous Counters -- 9-6 Cascaded Counters -- 9-7 Counter Decoding -- 9-8 Counter Applications -- 9-9 Logic Symbols with Dependency Notation -- 9-10 Troubleshooting -- Applied Logic -- Chapter 10 Programmable Logic -- 10-1 Simple Programmable Logic Devices (SPLDs) -- 10-2 Complex Programmable Logic Devices (CPLDs) -- 10-3 Macrocell Modes -- 10-4 Field-Programmable Gate Arrays (FPGAs) -- 10-5 Programmable Logic Software -- 10-6 Boundary Scan Logic -- 10-7 Troubleshooting -- Applied Logic -- Chapter 11 Data Storage -- 11-1 Semiconductor Memory Basics -- 11-2 The Random-Access Memory (RAM) -- 11-3 The Read-Only Memory (ROM) -- 11-4 Programmable ROMs -- 11-5 The Flash Memory -- 11-6 Memory Expansion -- 11-7 Special Types of Memories -- 11-8 Magnetic and Optical Storage -- 11-9 Memory Hierarchy -- 11-10 Cloud Storage -- 11-11 Troubleshooting -- Chapter 12 Signal Conversion and Processing -- 12-1 Analog-to-Digital Conversion -- 12-2 Methods of Analog-to-Digital Conversion -- 12-3 Methods of Digital-to-Analog Conversion -- 12-4 Digital Signal Processing -- 12-5 The Digital Signal Processor (DSP) -- Chapter 13 Data transmission -- 13-1 Data Transmission Media -- 13-2 Methods and Modes of Data Transmission -- 13-3 Modulation of Analog Signals with Digital Data -- 13-4 Modulation of Digital Signals with Analog Data -- 13-5 Multiplexing and Demultiplexing -- 13-6 Bus Basics -- 13-7 Parallel Buses -- 13-8 The Universal Serial Bus (USB) -- 13-9 Other Serial Buses -- 13-10 Bus Interfacing -- Chapter 14 Data Processing and Control -- 14-1 The Computer System -- 14-2 Practical Computer System Considerations -- 14-3 The Processor: Basic Operation -- 14-4 The Processor: Addressing Modes -- 14-5 The Processor: Special Operations -- 14-6 Operating Systems and Hardware -- 14-7 Programming -- 14-8 Microcontrollers and Embedded Systems -- 14-9 System on Chip (SoC) -- Chapter 15 Integrated Circuit Technologies -- 15-1 Basic Operational Characteristics and Parameters -- 15-2 CMOS Circuits -- 15-3 TTL (Bipolar) Circuits -- 15-4 Practical Considerations in the Use of TTL -- 15-5 Comparison of CMOS and TTL Performance -- 15-6 Emitter-Coupled Logic (ECL) Circuits -- 15-7 PMOS, NMOS, and E2CMOS…”
    Libro electrónico
  19. 4219
    por Deitel, Paul
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Digital Resources for Students -- Intro to Python® for Computer Science and Data Science -- Half Title -- Copyright -- Title Page -- Dedication -- Contents -- Preface -- Before You Begin -- 1. …”
    Libro electrónico
  20. 4220
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I -- Chapter 1: Secure Fog-Cloud of Things: Architectures, Opportunities and Challenges -- 1.1 Introduction -- 1.1.1 Chapter Road Map -- 1.2 Secure Fog-Cloud of Things -- 1.2.1 Environment -- 1.2.2 Architecture -- 1.3 Threats, Vulnerabilities and Exploits in Fog-Cloud of Things Ecosystems -- 1.4 Key Machine Learning Kits for Secure Fog-Cloud of Things Architecture -- 1.5 Applications -- 1.6 Opportunities and Challenges in Improving Security in Fog-Cloud of Things -- 1.6.1 Opportunities -- 1.6.2 Challenges -- 1.7 Future Trends -- 1.8 Conclusion -- References -- Chapter 2: Collaborative and Integrated Edge Security Architecture -- 2.1 Background -- 2.2 Edge Security Challenges -- 2.3 Perspectives of Edge Security Architecture -- 2.4 Emerging Trends and Enablers for Edge Security Architecture -- 2.4.1 The Edge Computing Architecture -- 2.4.2 Leveraging Fog-Based Security Architecture for Edge Networks -- 2.5 Collaborative and Integrated Security Architecture for Edge Computing -- 2.5.1 Overview -- 2.5.2 Distributed Virtual Firewall (DFWs) -- 2.5.3 Distributed Intrusion Detection Systems (IDSs) -- 2.6 Conclusion and Future Research -- References -- Chapter 3: A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing -- 3.1 Introduction -- 3.2 Fog Computing Systems -- 3.2.1 Description of Fog -- 3.2.2 Characteristics of Fog -- 3.2.3 Systemic Architecture of IoT-Fog-Cloud -- 3.2.4 Applications of IoT, Fog and Cloud Systems -- 3.3 Cyber Security Challenges -- 3.4 Security Solutions and Future Directions -- 3.5 Conclusion -- References -- Chapter 4: Security and Organizational Strategy: A Cloud and Edge Computing Perspective -- 4.1 Introduction…”
    Libro electrónico