Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
8121Publicado 2023Tabla de Contenidos: “…-- A Strategy Cannot Ignore the Front Line -- A Fake Strategy in Purple Prose -- Failing to Grasp the Current Situation May Lead to Mistakes -- The Risk of Homogenized Strategies -- Note -- 3 Preparations to Build the Correct Strategy -- Take the Right Steps to Analyze -- Use Frameworks and Concepts Wisely -- Have a Unique Point of View, Think Outside of the Box -- Support the Front Line -- Emphasis on Essence and Mechanism -- Bring in a Key Person -- Note -- 4 Create a Dynamic Strategy! …”
Libro electrónico -
8122por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Taxes on energy use -- The use of explicit carbon pricing mechanisms is growing as jurisdictions seek ways of quickening the transition to lower carbon economies -- Energy taxes were lowered in 2022 as jurisdictions supported households and businesses with rising costs driven by elevated global energy prices -- 3.4.3. …”
Publicado 2023
Libro electrónico -
8123por Doll-Steinberg, DanielTabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
Publicado 2023
Libro electrónico -
8124Publicado 2023Tabla de Contenidos: “…Considerations -- Individual performance approaches -- Research findings -- Considerations -- Knowledge of results and impact -- Research findings -- Considerations -- Impact: Organisational level -- Organisational performance monitoring and evaluation -- Research findings -- Considerations -- Perceived impact -- Research findings -- Considerations -- Impact - Systems level -- Performance, evaluation and legitimacy mechanisms -- Research findings -- Considerations -- Research findings -- Considerations -- System level innovative evaluation capacity -- Research findings -- Considerations -- Summary -- References -- Notes -- 4 Systemic insights -- Systemic Insights -- How the systemic insights were identified and validated -- 1. …”
Libro electrónico -
8125Publicado 2023Tabla de Contenidos: “…CPU and memory requirements -- Disk requirements -- Analyze Index Disk Usage API -- ML node capacity -- Storage efficiency strategies -- Reducing dimensionality -- Quantization -- Excluding dense_vector from _source -- Summary -- Chapter 4: Performance Tuning - Working with Data -- Deploying an NLP model -- Loading a model into Elasticsearch -- Model deployment configurations -- Load testing -- Rally -- RAM estimation -- Troubleshooting slowdown -- Summary -- Part 3: Specialized Use Cases -- Chapter 5: Image Search -- Overview of image search -- The evolution of image search -- The mechanism behind image search -- The role of vector similarity search -- Image search in practice -- Vector search with images -- Image vectorization -- Indexing image vectors in Elasticsearch -- k-Nearest Neighbor (kNN) search -- Challenges and limitations with image search -- Multi-modal models for vector search -- Introduction and rationale -- Understanding the concept of vector space in multi-modal models -- Introduction to the OpenAI clip-ViT-B-32-multilingual-v1 model -- Implementing vector search for diverse media types -- Summary -- Chapter 6: Redacting Personal Identifiable Information Using Elasticsearch -- Overview of PII and redaction -- Types of data that may contain PII -- Risks of storing PII in logs -- How PII is leaked or lost -- Redacting PII with NER models and regex patterns -- NER models -- Regex patterns -- Combining NER models and regex (or grok) patterns for PII redaction -- PII redaction pipeline in Elasticsearch -- Generating synthetic PII -- Installing the default pipeline -- Expected results -- Expanding and customizing options for the PII redaction pipeline in Elasticsearch -- Customizing the default PII example -- Cloning the pipeline to create different versions for different data streams -- Fine-tuning NER models for particular datasets…”
Libro electrónico -
8126por Tezuysal, AlkinTabla de Contenidos: “…Vertical scaling - enhancing capacity within existing infrastructure -- InnoDB Cluster for MySQL -- Sharding and resharding -- Future trends and emerging challenges in database scaling -- Serverless databases -- Summary -- Part 5: Best Practices and Future Trends -- Chapter 7: Best Practices for Building and Maintaining Your Database -- Designing for performance - optimizing database efficiency -- Schema design -- Query optimization -- Advanced query optimization techniques -- Using subqueries and JOIN clauses wisely -- Utilizing temporary tables -- Optimizing aggregates and GROUP BY clauses -- Using an index to assist GROUP BY clauses -- Iterative process and analysis -- Understanding database scaling -- Vertical scaling -- Horizontal scaling -- Replication in PostgreSQL -- MySQL replication -- Ensuring database security -- Access control -- Implementing robust authentication mechanisms -- Permission models -- PostgreSQL permission model -- Roles and privileges -- Example setup in PostgreSQL -- MySQL permission model -- Privileges and levels -- Example setup in MySQL -- Management and flexibility -- Exploring data encryption -- Protecting data at rest -- Protecting data in transit -- Monitoring and auditing -- Data quality and governance - maintaining high standards -- Learning about data cleaning -- Data governance frameworks -- Compliance -- Collaboration and documentation -- Effective communication -- Documentation practices -- Advanced topics in database management -- Backup and recovery -- Tools for monitoring PostgreSQL -- MySQL performance monitoring tools -- Strategies for regular performance analysis -- Summary -- Chapter 8: The Future of Databases and Their Designs -- Understanding vectorized search -- MySQL enhancements and innovations -- MySQL HeatWave -- Prospects of use cases of HeatWave…”
Publicado 2024
Libro electrónico -
8127Publicado 1995Tabla de Contenidos: “…Preventing HIV Transmission -- Copyright -- Contents -- Preface -- Acknowledgments -- Executive Summary -- THE PROBLEM -- THE PANEL'S CHARGE -- SCIENTIFIC ASSESSMENT OF PROGRAM EFFECTIVENESS -- Needle Exchange -- Bleach Distribution -- COMMUNITY AND LEGAL FACTORS -- RECOMMENDED COURSE OF ACTION -- NOTE -- Introduction -- DIMENSIONS OF THE PROBLEM -- RESPONSES TO THE EPIDEMIC -- THE CHARGE TO THE PANEL -- THE PANEL'S REPORT -- Information Sources -- Approach -- Organization -- NOTES -- REFERENCES -- Part 1 Dimensions of the Problem -- 1 The Epidemiology of HIV and AIDS -- BIOLOGICAL MECHANISMS OF TRANSMISSION -- Injection Drug Use Transmission -- Direct Needle Sharing -- Indirect Needle Sharing -- Risk Behaviors and Interventions -- Sexual Transmission -- Perinatal Transmission -- Conclusion -- EPIDEMIOLOGIC DATA -- HIV and AIDS Surveillance -- Mode of Acquisition of Infection -- HIV AND AIDS AMONG INJECTION DRUG USERS -- Surveillance -- Sexual Transmission Among Injection Drug Users -- Perinatal Transmission from Injection Drug Users -- SUMMARY -- Conclusions -- Recommendations -- NOTES -- REFERENCES -- 2 The Epidemiology of Injection Drug Use -- ESTIMATES OF INJECTION DRUG USERS -- Geographic Variations -- National Surveys of Drug Abuse -- National Household Survey on Drug Abuse -- Washington DC Metropolitan Area Drug Study -- Surveys of Youth -- Conclusion -- CHARACTERISTICS OF INJECTION DRUG USERS -- A National Profile -- Local Drug Use Trends and Patterns -- SUMMARY -- Recommendation -- NOTES -- REFERENCES -- 3 Needle Exchange and Bleach Distribution Programs in the United States -- INTRODUCTION -- NEEDLE EXCHANGE PROGRAMS -- Legal Issues -- Program Operations -- Sites -- Staffing -- Policies -- Hours of Operation -- On-Site Services Offered -- Items Distributed -- Characteristics of Program Participants -- Cost and Cost-Effectiveness…”
Libro electrónico -
8128Publicado 1995Tabla de Contenidos: “…Development of Medications for the Treatment of Opiate and Cocaine Addictions: Issues for the Government and Private Sector -- Copyright -- Acknowledgments -- Preface -- Note to the Reader -- Contents -- Executive Summary -- STATE OF THE SCIENTIFIC KNOWLEDGE ON ADDICTION -- NIDA'S MEDICATIONS DEVELOPMENT DIVISION -- EFFECTIVENESS OF TREATMENT -- TREATMENT FINANCING -- TRAINING AND EDUCATION -- FEDERAL REGULATORY ISSUES -- Food and Drug Administration -- Drug Enforcement Administration -- STATE REGULATORY ISSUES -- Interim Actions -- Long-Term Actions -- MARKET OBSTACLES AND CREATING INCENTIVES -- Size of the Market -- Drug Pricing and Intellectual Property Rights -- Societal Stigma -- NEED FOR FEDERAL LEADERSHIP -- CONCLUSIONS -- OPTIONS FOR FURTHER CONSIDERATION -- REFERENCES -- 1 Introduction -- PUBLIC-HEALTH REPERCUSSIONS OF ILLICIT DRUG USE -- Health Consequences: Violence -- Health Consequences: AIDS -- Health Consequences: Tuberculosis -- Health Consequences: Drug-exposed Infants -- ECONOMIC COSTS OF ILLICIT DRUG USE TO SOCIETY -- EXTENT OF ILLICIT DRUG USE -- ROLE OF PHARMACOTHERAPY -- REFERENCES -- 2 Overview of the State of Scientific Knowledge Concerning Drug Addiction -- CONCEPTS OF DRUG ADDICTION -- BIOLOGICAL CORRELATES AND PSYCHOPHARMACOLOGY OF ADDICTION -- Opiate Addiction -- Cocaine Addiction -- MDD AND STRATEGIES FOR THE DISCOVERY OF A COCAINE MEDICATION: DESCRIPTION AND CRITICAL ANALYSIS -- Introduction -- Source of Compounds -- Medication Preclinical Screening -- In Vitro Screen-Receptors and Mechanisms of Action -- In Vivo Screen-Behavioral Tests -- Specific Conclusions and Recommendations for the MDD -- Clinical Trials -- Human Behavioral Models -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 3 Assessment of the Medications Development Division -- STRUCTURE AND FUNCTIONS OF THE MEDICATIONS DEVELOPMENT DIVISION…”
Libro electrónico -
8129Publicado 2019Tabla de Contenidos: “…2.4.4 Z-BRE4K General Architecture Information Workflow -- 2.4.5 Z-BRE4K General Architecture Component Distribution -- 2.5 Conclusions -- References -- Chapter 3 - Reference Architecture for Factory Automation using Edge Computing and Blockchain Technologies -- 3.1 FAR-EDGE Project Background -- 3.2 FAR-EDGE Vision and Positioning -- 3.3 State of the Art in Reference Architectures -- 3.3.1 Generic Reference Architectures -- 3.3.2 RAMI 4.0 -- 3.3.3 IIRA -- 3.3.4 OpenFog RA -- 3.4 FAR-EDGE Reference Architecture -- 3.4.1 Functional Viewpoint -- 3.4.1.1 Automation domain -- 3.4.1.2 Analytics domain -- 3.4.1.3 Simulation domain -- 3.4.1.4 Crosscutting functions -- 3.4.2 Structural Viewpoint -- 3.4.2.1 Field Tier -- 3.4.2.2 Gateway Tier -- 3.4.2.3 Ledger Tier -- 3.4.2.4 Cloud Tier -- 3.5 Key Enabling Technologies for Decentralization -- 3.5.1 Blockchain Issues -- 3.5.2 Permissioned Blockchains -- 3.5.3 The FAR-EDGE Ledger Tier -- 3.5.4 Validation use Cases -- 3.6 Conclusions -- References -- Chapter 4 - IEC-61499 Distributed Automation for the Next Generation of Manufacturing Systems -- 4.1 Introduction -- 4.2 Transition towards the Digital Manufacturing Paradigm: A Need of the Market -- 4.3 Reasons for a New Engineering Paradigm in Automation -- 4.3.1 Distribution of Intelligence is Useless without Appropriate Orchestration Mechanisms -- 4.3.2 Defiance of Rigid Hierarchical Levels towards the Full Virtualization of the Automation Pyramid -- 4.4 IEC-61499 Approach to Cyber-Physical Systems -- 4.4.1 IEC-61499 runtime -- 4.4.2 Functional Interfaces -- 4.4.2.1 IEC-61499 interface -- 4.4.2.2 Wireless interface -- 4.4.2.3 Wrapping interface -- 4.4.2.4 Service-oriented interface -- 4.4.2.5 Fieldbus interface(s) -- 4.4.2.6 Local I/O interface -- 4.5 The "CPS-izer", a Transitional Path towards Full Adoption of IEC-61499 -- 4.6 Conclusions -- References…”
Libro electrónico -
8130Publicado 2017Tabla de Contenidos: “…10.4.2 - Lightning and Thunderstorms -- 10.4.3 - Aircraft Impact -- 10.4.3.1 - Background -- 10.4.3.2 - Airfield Proximity -- 10.4.4 - Earthquake -- 10.4.5 - Meteorological Factors -- 10.4.6 - Other Consequences -- Part 4 - Achieving Reliability and Maintainability -- Chapter 11 - Design and Assurance Techniques -- 11.1 - Specifying and Allocating the Requirement -- 11.2 - Stress Analysis -- 11.3 - Environmental Stress Protection -- 11.4 - Failure Mechanisms -- 11.4.1 - Types of Failure Mechanism -- 11.4.2 - Failures in Semiconductor Components -- 11.4.3 - Discrete Components -- 11.5 - Complexity and Parts -- 11.5.1 - Reduction of Complexity -- 11.5.2 - Part Selection -- 11.5.3 - Redundancy -- 11.6 - Burn-In and Screening -- 11.7 - Maintenance Strategies -- Chapter 12 - Design Review, Test and Reliability Growth -- 12.1 - Review Techniques -- 12.2 - Categories of Testing -- 12.2.1 - Environmental Testing -- 12.2.2 - Marginal Testing -- 12.2.3 - High-Reliability Testing -- 12.2.4 - Testing for Packaging and Transport -- 12.2.5 - Multiparameter Testing -- 12.2.6 - Step-Stress Testing -- 12.3 - Reliability Growth Modeling -- 12.3.1 - The CUSUM Technique -- 12.3.2 - Duane Plots -- Chapter 13 - Field Data Collection and Feedback -- 13.1 - Reasons for Data Collection -- 13.2 - Information and Difficulties -- 13.3 - Times to Failure -- 13.4 - Spreadsheets and Databases -- Equipment code -- How found -- Type of fault -- Action taken -- Discipline -- Free text -- 13.5 - Best Practice and Recommendations -- 13.6 - Analysis and Presentation of Results -- 13.7 - Manufacturers' data -- 13.8 - Anecdotal Data -- 13.9 - Examples of Failure Report Forms -- 13.10 - No-Fault-Found (NFF) -- Chapter 14 - Factors Influencing Down Time -- 14.1 - Key Design Areas -- 14.1.1 - Access -- 14.1.2 - Adjustment -- 14.1.3 - Built-In Test Equipment…”
Libro electrónico -
8131Publicado 2018Tabla de Contenidos: “…Some useful, easy, and free programming tools -- I.5. Mechanisms and features of the script language -- I.5.1. …”
Libro electrónico -
8132por Ghosh, SmarajitTabla de Contenidos: “…Cover -- Contents -- Preface -- Introduction -- Electromagnetism -- Direction of Current in a Conductor -- Direction of Magnetic Flux in a Conductor -- Flux Distribution of an Isolated Current-carrying Conductor -- Force Between Two Current-carrying Conductors -- Force on a Conductor in a Magnetic Field -- Generation of Induced enf and Current -- Faraday's Laws -- Lenz's Law -- Induced emf -- Dynamically Induced emf -- Statically Induced emf -- Magnetic Circuits -- Magnetomotive Force -- Magnetic Field Intensity -- Magnetic Flux -- Single-phase Circuits -- Series R-L Circuit -- Series R-C Circuit -- Series L-C-R Circuit -- Power Triangle -- Complex Power -- Three-phase Circuits -- Advantages of Three-phase System -- Phase Sequence -- Interconnection of Three Phases -- Star and Delta Connections -- Voltages, Currents and Power in Star Connections -- Voltages, Currents and Power in Delta Connections -- For Star Connections -- Measurement of Three-phase Power -- Principle of Energy Conversion -- Energy in the Coupling Field -- Energy in the Field -- Co-energy -- Electrical Energy Input to the system -- Estimation of Mechanical Forces in an Electromagnetic System -- Case 1: Motion of the Moving Part is Very Slow -- Case 2: Motion of the Moving Part Instantaneously -- Estimation of Magnetic Force in Linear Systems -- Doubly Excited Systems -- Cylindrical Rotating Machine -- Case 1: Synchronous Motor/Machine -- Case 2: ωm = ωs − ωr -- Chapter 1: Transformers -- 1.1 Definition -- 1.2 Basic Principle -- 1.3 Types of Transformers -- 1.4 Construction of Single-phase Transformer -- 1.4.1 Core Type -- 1.4.2 Shell Type -- 1.4.3 Spiral Core Type -- 1.5 Transformer Windings -- 1.5.1 Concentric Windings -- 1.5.2 Sandwich Windings -- 1.6 Terminals and Leads -- 1.7 Bushings -- 1.8 Tapping -- 1.9 Cooling of Transformer -- 1.10 Transformer Oil…”
Publicado 2012
Libro electrónico -
8133Publicado 2019Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
Libro electrónico -
8134Publicado 2024Tabla de Contenidos: “…-- Integrating Beagle Security into our security pipeline -- Automating testing with Python -- Ensuring reliability and resilience in automated workflows -- Robust error-handling mechanisms -- Implementing retry logic -- Building idempotent operations -- Automated testing and validation -- Documentation and knowledge sharing -- Security and access control -- Implementing a logger for security pipelines -- Summary -- Chapter 7: Creating Custom Security Automation Tools with Python -- Designing and developing tailored security automation tools -- Integrating external data sources and APIs for enhanced functionality -- Extending tool capabilities with Python libraries and frameworks -- pandas -- scikit-learn -- Summary -- Part 4: Python Defense Strategies for Robust Security -- Chapter 8: Secure Coding Practices with Python -- Understanding secure coding fundamentals -- Principles of secure coding -- Common security vulnerabilities -- Input validation and sanitization with Python -- Input validation -- Input sanitization -- Preventing code injection and execution attacks -- Preventing SQL injection -- Preventing command injection -- Data encryption and Python security libraries -- Symmetric encryption -- Asymmetric encryption -- Hashing -- Secure deployment strategies for Python applications -- Environment configuration -- Dependency management…”
Libro electrónico -
8135por Guidetti, OliverTabla de Contenidos: “…5.3.3 Automation of harassment tactics -- 5.3.4 Challenges for detection and response -- 5.4 Nefarious uses of generative AI -- 5.4.1 Social media -- 5.4.2 CEO fraud case -- 5.4.3 Virtual kidnapping scam -- 5.4.4 Revenge pornography -- 5.4.5 Manipulation in financial markets -- 5.4.6 AI-generated phishing emails -- 5.4.7 Synthetic identity fraud -- 5.4.8 Fabricated evidence in legal cases -- 5.4.9 Examination of tactics employed by harassers -- 5.5 Legal and ethical quandaries -- 5.5.1 Legal challenges in addressing generative AI-driven harassment -- 5.6 AI in creative industries and copyright challenges -- 5.6.1 Insufficiency of legislation in the face of AI advancements -- 5.6.2 Legal and regulatory frameworks for AI -- 5.6.3 Balancing free expression and user protection -- 5.7 Ethical concerns -- 5.8 AI governance, strategy, and the 'good society' -- 5.9 Strategies for detection and prevention -- 5.9.1 Advanced AI detection technologies -- 5.9.2 Collaborative industry efforts -- 5.9.3 Public awareness and education -- 5.10 Research and development -- 5.10.1 Investment in AI ethics research -- 5.10.2 Engaging the academic community -- 5.11 Legal and policy measures -- 5.11.1 Regulatory frameworks -- 5.11.2 International cooperation -- 5.12 Technology user policies -- 5.12.1 Robust platform policies -- 5.12.2 User reporting mechanisms -- 5.13 Ethical AI development -- 5.13.1 Ethical guidelines for AI developers -- 5.13.2 Incorporating ethical AI into design -- 5.14 Redress and mitigation -- 5.14.1 Victim support -- 5.14.2 Accountability of tech companies -- 5.14.3 Proactive monitoring for misuse -- 5.14.4 Collaboration with law enforcement -- 5.15 Policy and legal measures -- 5.15.1 Legal frameworks for redress -- 5.15.2 Regulations to prevent repeat offenses -- 5.16 Public awareness and advocacy -- 5.16.1 Awareness campaigns…”
Publicado 2024
Libro electrónico -
8136Publicado 2017Tabla de Contenidos: “…6.4 Challenges for Wireless On-Chip Communication -- 6.4.1 Performance and Area Analysis -- 6.4.2 Crosstalk Between Inductive Links -- 6.4.3 Crosstalk Noise on Adjacent On-Chip Components -- 6.4.3.1 Crosstalk effects due to an inductive link -- 6.4.3.2 Case study -- 6.4.3.3 Crosstalk noise effects caused by inductive link arrays -- 6.4.3.4 Noise sensitivity of power network topologies -- 6.5 Intertier Power Transfer -- 6.6 Summary -- 7 Interconnect Prediction Models -- 7.1 Interconnect Prediction Models for Two-Dimensional Circuits -- 7.2 Interconnect Prediction Models for Three-Dimensional ICs -- 7.3 Projections for Three-Dimensional ICs -- 7.4 Summary -- 8 Cost Considerations for Three-Dimensional Integration -- 8.1 Through Silicon Via Processing Options -- 8.1.1 TSV Flows and Geometries -- 8.1.2 Cost Comparison of Through Silicon Via Processing Steps -- 8.1.2.1 Through silicon via lithography -- 8.1.2.2 Through silicon via silicon etch -- 8.1.2.3 Through silicon via liner processing -- 8.1.2.4 Through silicon via liner opening for through silicon via last flow -- 8.1.2.5 Through silicon via barrier and Cu seed processing -- 8.1.2.6 Through silicon via Cu plating and effect on chemical mechanical planarization -- 8.1.2.7 Through silicon via chemical mechanical planarization processing -- 8.1.2.8 Backside processing -- 8.1.3 Comparison of Through Silicon Via Processing Cost -- 8.1.3.1 Processing of the 5×50 through silicon via geometry -- 8.1.3.2 Processing of the 10×100 through silicon via geometry -- 8.1.3.3 Scaling through silicon via geometries -- 8.2 Interposer-Based Systems Integration -- 8.2.1 Cost of Interposer Manufacturing Features -- 8.2.1.1 Cost of through silicon via processing -- 8.2.1.2 Cost of die-to-die interconnect processing -- 8.2.1.3 Cost of processing metal planes and metal-insulator-metal capacitors…”
Libro electrónico -
8137Publicado 2014Tabla de Contenidos: “…17 The Emergence of Sovereign Wealth Funds in Asia -- 17.1 Introduction -- 17.2 Stylized Facts about Developing Asia's Foreign Exchange Reserves -- 17.3 Informal Examination of the Adequacy of Developing Asia's FOREIGN EXCHANGE Reserves -- 17.4 Sovereign Wealth Funds as a Blueprint for Investing Developing Asia's Excess Reserves -- 17.5 Policy Prescriptions for Developing Asia's SWFs -- 17.6 Conclusion -- References -- 18 China Investment Corporation: China's Sovereign Wealth Fund -- 18.1 Introduction -- 18.2 Overview and Organizational Structure -- 18.2.1 CIC International -- 18.2.2 Central Huijin -- 18.3 Investment Strategy -- 18.3.1 CIC -- 18.3.2 CIC International -- 18.3.3 Central Huijin -- 18.4 Current Problems -- 18.4.1 Ministerial Conflict Between SAFE and the Ministry of Finance -- 18.4.2 Internal Conflict Between CIC International and Central Huijin -- 18.4.3 Unsatisfactory Performance of CIC Investments -- 18.4.4 The Problematic Financing Mechanism of CIC International -- 18.4.5 Low Transparency of CIC -- 18.5 Policy Recommendations -- 18.5.1 Better Coordination Between SAFE and the Ministry of Finance -- 18.5.2 More Sustainable Financing Mechanism -- 18.5.3 Enhance Investment Performance -- 18.5.4 Improve Transparency of its Operation -- 18.5.5 Reorganization of CIC -- 18.6 Conclusion -- References -- 19 Portfolio Allocation Dynamics of China Investment Corporation in the Aftermath of the Global Financial Crisis of 2007-2009 -- 19.1 Introduction -- 19.2 SWFs and China's Economic Policy -- 19.2.1 Large and Growing FX Reserves of China -- 19.2.2 Rising Costs of Sterilization -- 19.2.3 Quest for Higher Returns -- 19.3 CIC: Establishment and Objectives -- 19.3.1 Immediate Circumstances Leading up to Establishment of CIC -- 19.3.2 Establishment of CIC: Policy Disputes -- 19.3.3 CIC: Current Structure -- 19.3.4 Funding of CIC…”
Libro electrónico -
8138Publicado 2023Tabla de Contenidos: “…6.8.3.1 Blockchain Can Store Information Coming from IoT Devices -- 6.8.3.2 Secure Data Storage with Blockchain Distribution -- 6.8.3.3 Data Encryption via Hash Key and Tested by the Miners -- 6.8.3.4 Spoofing Attacks and Data Loss Prevention -- 6.8.3.5 Unauthorized Access Prevention Using Blockchain -- 6.8.3.6 Exclusion of Centralized Cloud Servers -- 6.9 Conclusions -- References -- Chapter 7 Deep Learning Approach to Industrial Energy Sector and Energy Forecasting with Prophet -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Methodology -- 7.3.1 Splitting of Data (Test/Train) -- 7.3.2 Prophet Model -- 7.3.3 Data Cleaning -- 7.3.4 Model Implementation -- 7.4 Results -- 7.4.1 Comparing Forecast to Actuals -- 7.4.2 Adding Holidays -- 7.4.3 Comparing Forecast to Actuals with the Cleaned Data -- 7.5 Conclusion and Future Scope -- References -- Chapter 8 Application of Novel AI Mechanism for Minimizing Private Data Release in Cyber-Physical Systems -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Proposed Mechanism -- 8.4 Experimental Results -- 8.5 Future Directions -- 8.6 Conclusion -- References -- Chapter 9 Environmental and Industrial Applications Using Internet of Things (IoT) -- 9.1 Introduction -- 9.2 IoT-Based Environmental Applications -- 9.3 Smart Environmental Monitoring -- 9.3.1 Air Quality Assessment -- 9.3.2 Water Quality Assessment -- 9.3.3 Soil Quality Assessment -- 9.3.4 Environmental Health-Related to COVID-19 Monitoring -- 9.4 Applications of Sensors Network in Agro-Industrial System -- 9.5 Applications of IoT in Industry -- 9.5.1 Application of IoT in the Autonomous Field -- 9.5.2 Applications of IoT in Software Industries -- 9.5.3 Sensors in Industry -- 9.6 Challenges of IoT Applications in Environmental and Industrial Applications -- 9.7 Conclusions and Recommendations -- Acknowledgments -- References…”
Libro electrónico -
8139Publicado 2011Tabla de Contenidos: “…-- 4.2 The Purpose of Forward Contracts -- 4.3 Advantages of Forward Contracts -- 4.4 Problems with Forward Contracts -- 4.4.1 Parties with Matching Needs -- 4.4.2 Non-performance -- 4.4.3 Non-transferability -- 4.5 The Pricing of Commodity Forward Contracts -- 4.6 Currency Forward Contracts -- 4.6.1 The Operation of the Currency Forward Market -- 4.6.2 Characteristics of Currency Forward Contracts -- 4.6.3 The Pricing of Currency Forward Contracts -- 4.6.4 Covered Interest Arbitrage -- 4.6.5 Rolling Over Currency Forward Contracts -- 4.7 Interest Rate Forwards -- 4.7.1 Mechanics of FRAs -- 4.7.2 The FRA Payment Amount -- 4.7.3 An Alternative View of an FRA and the Settlement Amount -- 4.7.4 Uses of FRAs -- 4.8 Non-deliverable Forwards -- Chapter Summary -- Review Questions -- Problems -- Case Study -- Chapter 5: Futures Contracts -- Learning Objectives -- 5.1 What Is a Futures Contract? …”
Libro electrónico -
8140por InamuddinTabla de Contenidos: “…4.2.5.3 Design Principles and Synthetic Strategy Adopted to Synthesize PAFs -- 4.2.5.4 Synthesize of PAFs -- 4.2.5.5 PAF Characterization -- 4.2.5.6 Applications -- 4.2.6 Porous Organic Cages -- 4.2.6.1 Characterization of Organic Cages -- 4.3 Conclusions and Perspectives -- References -- Chapter 5 Gel-Type Natural Polymers as Electroconductive Materials -- 5.1 Introduction -- 5.2 Natural Polymers -- 5.2.1 Hydrogels -- 5.2.2 Classification of Hydrogels -- 5.2.3 Composition of Hydrogels -- 5.2.4 Natural Polymers Derived Hydrogels -- 5.2.5 Cellulose-Based Hydrogels -- 5.2.6 Chitosan-Based Hydrogels -- 5.2.7 Xanthan Gum-Based Hydrogels -- 5.2.8 Sea Weed-Derived Polysaccharide-Based Hydrogels -- 5.2.9 Protein-Based Hydrogels -- 5.2.10 DNA-Based Hydrogels -- 5.3 Synthesis Methods for Fabrication of Natural Polymer-Based Hydrogels -- 5.3.1 Natural Polymer-Based Chemically Cross-Linked Hydrogels -- 5.3.2 Grafting Method -- 5.3.3 Radical Polymerization Method -- 5.3.4 Irradiation Method -- 5.3.5 Enzymatic Reaction Method -- 5.4 Natural Polymer-Based Physically Cross-Linked Hydrogels -- 5.4.1 By Freezing and Thawing Cycles -- 5.4.2 By Hydrogen Bonding -- 5.4.3 By Ionic Interactions -- 5.5 Properties of Natural Polymer-Based Hydrogels -- 5.5.1 Mechanical Properties -- 5.5.2 Biodegradability -- 5.5.3 Swelling Characteristics -- 5.6 Stimuli Sensitivity of Hydrogels -- 5.7 Application of Hydrogels as Electrochemical Supercapacitors -- 5.7.1 Types of Supercapacitors -- 5.7.2 Electrochemical Double-Layer Capacitor (EDLC) -- 5.7.3 Pseudo Capacitor -- 5.7.4 Asymmetric or Hybrid Supercapacitors -- 5.8 Conducting Polymer Hydrogels as Electrode Materials -- 5.9 Conducting Polymer Hydrogels as Electrolyte Materials -- 5.10 Conclusion -- References -- Chapter 6 Ionic Liquids for Supercapacitors -- 6.1 Introduction -- 6.2 Brief Introduction of Supercapacitor…”
Publicado 2023
Libro electrónico