Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 199
- Application software 194
- History 177
- Software engineering 173
- Computer programming 148
- Historia 143
- Software Engineering/Programming and Operating Systems 142
- Development 131
- Electrical & Computer Engineering 128
- Database management 118
- Management 116
- Telecommunications 115
- Design 105
- Social aspects 104
- History and criticism 102
- Web sites 96
- RELIGION 94
- Web site development 90
- Computer networks 89
- Microsoft .NET Framework 88
- Música sagrada 85
- Java (Computer program language) 82
- Web Development 79
- Database Management 77
- Música 73
- Artificial intelligence 72
- Historia y crítica 70
- Internet telephony 70
- Computer Science 69
- Crítica e interpretación 66
-
5141Publicado 2023Tabla de Contenidos: “…12.3.1 Decision Variables -- 12.3.2 Objective Functions -- 12.3.3 Bounds of Decision Variables -- 12.3.4 Response Variables -- 12.4 Results and Discussions -- 12.4.1 Single Objective Optimization -- 12.4.2 Results of Multiobjective Optimization -- 12.5 Conclusion -- References -- Chapter 13 Genetic Algorithm-Based Optimization for Speech Processing Applications -- 13.1 Introduction to GA -- 13.1.1 Enhanced GA -- 13.2 GA in Automatic Speech Recognition -- 13.2.1 GA for Optimizing Off-Line Parameters in Voice Activity Detection (VAD) -- 13.2.2 Classification of Features in ASR Using GA -- 13.2.3 GA-Based Distinctive Phonetic Features Recognition -- 13.2.4 GA in Phonetic Decoding -- 13.3 Genetic Algorithm in Speech Emotion Recognition -- 13.3.1 Speech Emotion Recognition -- 13.3.2 Genetic Algorithms in Speech Emotion Recognition -- 13.4 Genetic Programming in Hate Speech Using Deep Learning -- 13.4.1 Introduction to Hate Speech Detection -- 13.4.2 GA Integrated With Deep Learning Models for Hate Speech Detection -- 13.5 Conclusion -- References -- Chapter 14 Performance of P, PI, PID, and NARMA Controllers in the Load Frequency Control of a Single-Area Thermal Power Plant -- 14.1 Introduction -- 14.2 Single-Area Power System -- 14.3 Automatic Load Frequency Control (ALFC) -- 14.4 Controllers Used in the Simulink Model -- 14.4.1 PID Controller -- 14.4.2 PI Controller -- 14.4.3 P Controller -- 14.5 Circuit Description -- 14.6 ANN and NARMA L2 Controller -- 14.7 Simulation Results and Comparative Analysis -- 14.8 Conclusion -- References -- Part 2: Decision Science and Simulation-Based Optimization -- Chapter 15 Selection of Nonpowered Industrial Truck for Small Scale Manufacturing Industry Using Fuzzy VIKOR Method Under FMCDM Environment -- 15.1 Introduction -- 15.2 Fuzzy Set Theory -- 15.2.1 Some Important Fuzzy Definitions -- 15.2.2 Fuzzy Operations…”
Libro electrónico -
5142por Anderson, AllanTabla de Contenidos: “…References -- Chapter 5 Design & -- Development -- What You will Learn in this Chapter -- The Chapter Roadmap -- 5.1 Design and Development Process Steps -- Part 1: Design -- 5.2 Introduction to Design -- 5.2.1 Ideation -- 5.2.2 Concept Design -- 5.2.3 Embodiment Design -- 5.2.4 Tools to Assist Embodiment Design -- Part 2: Development -- 5.3 Introduction to Development -- 5.3.1 Initial Specifications -- 5.3.2 Quality Function Deployment (QFD) -- 5.3.3 Design of Experiments (DOE) -- 5.3.4 Usability Testing -- 5.3.5 Performance and Endurance Testing -- 5.3.6 Quality Assurance -- 5.3.7 Design for Manufacturing and Assembly (DfMA) -- 5.3.8 Design for Sustainability -- 5.4 In Summary -- 5.A Design & -- Development Practice Questions -- Answers to practice questions: Product design and development -- References -- Chapter 6 Market Research -- What You will Learn in this Chapter -- The Chapter Roadmap -- 6.1 How Market Research Contributes to Product Innovation -- 6.1.1 Voice of the Customer -- 6.1.2 Six Critical Steps of Market Research -- 6.2 Selecting the Right Market Research Methodology -- 6.3 Primary Vs. …”
Publicado 2024
Libro electrónico -
5143por Kiefer, PhilipTabla de Contenidos: “…Weitere Benutzerkonten anlegen -- Standard-Benutzerkonto und Administrator-Benutzerkonto -- Bildschirmzeit -- Ihren Mac möglichst energiesparend einsetzen -- Mehr Energie sparen -- Helligkeit reduzieren -- Maus, Trackpad, Tastatur -- WLAN und Bluetooth -- Kapitel 2 - Bedienungshilfen und Sprachassistentin Siri -- Die Bedienungshilfen in den Systemeinstellungen -- Die Anzeige der Bildschirminhalte besser erkennbar machen -- Bildschirminhalte vergrößert darstellen -- Lassen Sie sich die Bildschirminhalte vorlesen -- Einfache Sprachausgabe -- VoiceOver -- Audiobeschreibungen erhalten -- Bedienungshilfen bei Hörschwäche -- Bedienungshilfen rund um Tastatur, Maus und Trackpad -- Tastatur -- Bildschirmtastatur einblenden -- Mausbedienung mit der Tastatur -- Alternative Bedienung per Schaltersteuerung -- Texte diktieren -- Die Sprachsteuerung verwenden -- Sprachbefehle an die Sprachassistentin Siri erteilen -- Kapitel 3 - Mit Ihrem Mac ins Internet -- Mit dem Mac eine drahtlose Verbindung herstellen -- Webseiten aufrufen -- So öffnen Sie eine Ihnen bekannte Webadresse -- So öffnen Sie einen sogenannten Link -- So durchsuchen Sie das Internet nach Themen, die Sie interessieren -- Webseiten in einem privaten Fenster öffnen -- So speichern Sie Ihre Lieblingswebseiten ab -- Webseiten ausdrucken oder als Dokument speichern -- Sie möchten beim Start von Safari eine bestimmte Webseite laden? …”
Publicado 2020
Libro electrónico -
5144Publicado 2022Tabla de Contenidos: “…References -- 4 Artificial Intelligence and Machine Learning: Discovering New Ways of Doing Banking Business -- Structure of the Chapter -- 4.1 Introduction -- 4.2 AI in the Banking Sector: Where It Works and What For -- 4.2.1 AI and Customer Service -- 4.2.1.1 Chatbots -- 4.2.1.2 AI and Personalized Banking -- 4.2.1.3 Smart Wallets -- 4.2.1.4 Voice Assisted Banking -- 4.2.1.5 Robo Advice -- 4.2.1.6 AI Backed Blockchain for Expedite Payments -- 4.2.2 AI and Magnifying Efficiency of Banks -- 4.2.2.1 Determining Credit Scoring and Lending Decisions -- 4.2.2.2 AI and CRM -- 4.2.3 Magnifying Security and Risk Control -- 4.2.3.1 Detection and Prevention of Financial Fraud -- 4.2.3.2 Reducing Money Laundering -- 4.2.3.3 Cybersecurity -- 4.2.3.4 AI: Managing and Controlling Risk -- 4.3 AI Applications in Indian Banks: Some Selected Examples -- 4.3.1 State Bank of India -- 4.3.2 HDFC Bank -- 4.3.3 Axis Bank -- 4.3.4 Punjab National Bank -- 4.4 AI and its Impact on Banks' KPIs -- 4.4.1 Impact of AI on Profitability -- 4.4.2 Impact of AI on Productivity and Efficiency of Banks -- 4.4.3 Impact of AI on Improved Customer Satisfaction -- 4.4.4 AI Helps in Offering Innovative and Tailor-Made Services -- 4.4.5 AI Helps in Reducing Customer Attrition -- 4.4.6 Impact of AI on Overall Performance -- 4.5 Conclusion and Future of AI -- References -- 5 Analysis and Comparison of Credit Card Fraud Detection Using Machine Learning -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Proposed Method -- 5.4 Results -- 5.5 Conclusion and Future Scope -- References -- 6 Artificial Intelligence for All: Machine Learning and Healthcare: Challenges and Perspectives in India -- 6.1 Introduction -- 6.2 Healthcare in India: Challenges -- 6.3 Frameworks in Health must consider Missingness -- 6.3.1 Wellsprings of Missingness Must Be Painstakingly Comprehended…”
Libro electrónico -
5145Publicado 2016Tabla de Contenidos: “…Time Traffic 74 -- 4.3.1 Control and Data Traffic 75 -- 4.3.2 Voice over IP 76 -- 4.3.3 IPTV 78 -- 4.3.4 QOS and Real?]…”
Libro electrónico -
5146Publicado 2022Tabla de Contenidos: “…Objective 18 Summarize cloud concepts and connectivity options -- Deployment Models -- Public -- Private -- Hybrid -- Community -- Service Models -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Infrastructure as Code -- Automation/Orchestration -- Connectivity Options -- Virtual Private Network (VPN) -- Private-Direct Connection to Cloud Provider -- Multitenancy -- Scalability -- 00-FMindd 15 22/04/22 11:12 AM -- xvi Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Elasticity -- Security Implications -- REVIEW -- 18 QUESTIONS -- 18 ANSWERS -- 20 Network Implementations -- Objective 21 Compare and contrast various devices, their features, -- and their appropriate placement on the network -- Networking Devices -- Layer 2 Switch -- Layer 3 Capable Switch -- Router -- Hub -- Access Point -- Bridge -- Wireless LAN Controller -- Load Balancer -- Proxy Server -- Cable Modem -- DSL Modem -- Repeater -- Voice Gateway -- Media Converter -- Firewall -- Intrusion Prevention System(IPS)/Intrusion Detection System (IDS) Device -- VPN Headend -- Networked Devices -- Voice over Internet Protocol (VoIP) Phone -- Printer -- Physical Access Control Devices -- Cameras -- Heating, Ventilation, and Air Conditioning (HVAC) Sensors -- Internet of Things (IoT) -- Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) -- REVIEW -- 21 QUESTIONS -- 21 ANSWERS -- Objective 22 Compare and contrast routing technologies -- and bandwidth management concepts -- Routing -- Dynamic Routing -- Static Routing -- 00-FMindd 16 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Default Route -- Administrative Distance -- Exterior vs Interior -- Time to Live -- Bandwidth Management -- Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23 Given a scenario, configure and deploy common -- Ethernet switching features -- Data Virtual Local Area Network (VLAN) -- Voice VLAN -- Port Configurations -- Port Tagging/8021Q -- Port Aggregation -- Duplex -- Speed -- Flow Control -- Port Mirroring -- Port Security -- Jumbo Frames -- Auto-Medium-Dependent Interface Crossover (MDI-X) -- Media Access Control (MAC) Address Tables -- Power over Ethernet (PoE)/Power over Ethernet Plus (PoE+) -- Spanning Tree Protocol -- Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) -- Address Resolution Protocol (ARP) -- Neighbor Discovery Protocol -- REVIEW -- 23 QUESTIONS -- 23 ANSWERS -- Objective 24 Given a scenario, install and configure the appropriate -- wireless standards and technologies -- 80211 Standards -- a -- b -- g -- n (Wi-Fi 4) -- ac (Wi-Fi 5) -- ax (Wi-Fi 6) -- 00-FMindd 17 22/04/22 11:12 AM -- xviii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Frequencies and Range -- 24 GHz -- 50 GHz -- Channels -- Regulatory Impacts -- Channel Bonding -- Service Set Identifier (SSID) -- Basic Service Set -- Independent Basic Service Set (Ad-hoc) -- Extended Service Set -- Roaming -- Antenna Types -- Omni -- Directional -- Encryption Standards -- Wi-Fi Protected Access (WPA)/WPA2 Personal [Advanced Encryption -- Standard (AES)/Temporal Key Integrity Protocol (TKIP)] -- WPA/WPA2 Enterprise (AES/TKIP) -- Cellular Technologies -- Global System for Mobile Communications (GSM) -- Code-Division Multiple Access (CDMA) -- Long-Term Evolution (LTE) -- 3G, 4G, 5G -- Multiple Input, Multiple Output (MIMO) and Multi-user MIMO (MU-MIMO) -- REVIEW -- 24 QUESTIONS -- 24 ANSWERS -- 30 Network Operations -- Objective 31 Given a scenario, use the appropriate statistics -- and sensors to ensure network availability -- Performance Metrics/Sensors -- Device/Chassis -- Network Metrics -- SNMP -- Management Information Bases (MIBs) -- Object Identifiers (OIDs) -- Traps -- Network Device Logs -- Log Reviews…”
Libro electrónico -
5147Publicado 2015Tabla de Contenidos: “…Hamish Coates -- 27. Giving Voice to Non-traditional Students “Walking” the Narrative Mediation Path. …”
Libro electrónico -
5148Computers for seniors for dummiesComputers For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…-- Learn the Types of Game Delivery -- Explore the Various Gaming Genres -- Understand How Game Makers Get Paid -- A Few of My Favorites -- Chapter 15 Creating and Viewing Digital Photos and Videos -- Capture Pictures and Video with the Camera App -- Make Audio Recordings with Voice Recorder -- Find and Play Videos Using the Movies & -- TV App -- Transfer Photos and Videos from a Camera or Phone -- View and Edit Photos in the Photos App -- Create a Video with the Video Editor -- Chapter 16 Listening to Music on Your PC -- Preparing to Listen to Digital Music -- Introducing Windows Media Player -- Make Your Stored Music Available in Windows Media Player -- Play Music -- Create a Playlist -- Rip a Music CD -- Burn a Music CD -- Acquire New Music -- Part 5 Windows Toolkit -- Chapter 17 Working with Networks -- Plan and Set Up a Home Network -- Enabling Wireless Router Security -- Set Up File Sharing on Your PC…”
Libro electrónico -
5149Publicado 2024Tabla de Contenidos: “…Examples of generative AI outside of chat -- Avoiding ChatGPT limitations, biases, and inappropriate responses -- Lack of real-time information -- Complex or specialized topics -- Long-form content generation -- Long-term memory -- Sensitive information -- Biased thinking -- Emotion and empathy -- Ethical and moral guidance -- Critical decision making -- Programming and debugging -- Translation accuracy -- Educational substitution -- Don't force-fit a solution -- Summary -- References -- Chapter 4: Scoring Stories -- Prioritizing the backlog -- WSJF -- User Needs Scoring -- Scoring enterprise solutions -- Examples of scoring -- Putting a backlog into order -- Patching case study revisited -- Extending tracking tools with scoring -- Try the User Needs Scoring method -- Creating more complex scoring methods -- Working with multiple backlogs in Agile -- Real-world hiccups with scoring -- I know Agile, and this is not WSJF -- The use of simple numbers one to four -- Weighting factors -- Severity seems complicated to judge -- The cost is so high that we can't ever get the work done -- Grouping issues into bugs to protect the quality -- How to work WSJF into the organization -- Summary -- References -- Chapter 5: Defining the Desired Experience -- Designing chat experiences -- Chat-only experiences -- Integrating ChatGPT into an existing chat experience -- Enabling components for a chat experience -- Designing hybrid UI/chat experiences -- Chat window size and location -- Tables -- Forms -- Charts -- Graphics and images -- Buttons, menus, and choice lists -- Links -- Creating voice-only experiences -- Designing a recommender and behind-the-scenes experiences -- Overarching considerations -- Accessibility -- Internationalization -- Trust -- Security -- Summary -- References -- Part 2: Designing -- Chapter 6: Gathering Data - Content is King…”
Libro electrónico -
5150por Rossetti, Nazzareno, 1951-Tabla de Contenidos: “…7.1 Power Management of Desktop and Notebook Computers -- Power Management System Solution for a Pentium III Desktop System -- Power Management System Solution for Pentium IV Systems (Desktop and Notebook) -- Desktop Systems -- Powering the Silver Box -- Notebook Systems -- Future Power Trends -- 7.2 Computing and Data Communications Converge at the Point of Load -- The Proliferation of Power Supplies -- Telecom Power Distribution -- Computing Power Distribution -- Multiphase Buck Converter for POLs and VRMs -- Conclusion -- 7.3 Efficient Power Management ICs Tailored for DDR-SDRAM Memories -- Introduction -- DDR Power Management Architecture -- Worst Case Current Consumption -- Average Power Consumption -- Transient Operation -- Standby Operation -- Linear versus Switching -- Second Generation DDR-DDR2 -- FAN5236 for DDR and DDR2 Memories -- Future Trends -- 7.4 Power Management of Digital Set-Top Boxes -- Set-Top Box Architecture -- Power Management -- High Power Set-Top Boxes -- Low Power Set-Top Boxes -- Conclusion -- 7.5 Power Conversion for the Data Communications Market -- Introduction -- Current Environment with Separate Networks -- Migration to Converged Voice/Data/Video IP -- Telecom -48 V DC Power Distribution -- Datacom AC Power Distribution -- Conclusion -- 8. …”
Publicado 2006
Libro electrónico -
5151Publicado 2025Tabla de Contenidos: “…Memory, Politics and Peace -- Introduction -- Understanding Collective Memory and Peace -- The Politics of Memory and Peace -- Acknowledgment of Opposing Narratives: Hegemonic Voices Prevail -- Suppressing and Undermining Rituals and Expressions -- Vernacular Memory and Peace -- Conclusion -- References -- 18. …”
Libro electrónico -
5152Publicado 2010Tabla de Contenidos: “…. -- Chapter 23: Divide and Conquer -- SOCIAL MEDIA TAKES A COMMUNITY EFFORT -- DECENTRALIZATION AND CENTRALIZATION: ASSEMBLING AND CONDUCTING AN ORCHESTRA -- THE SOCIETY AND CULTURE OF BUSINESS -- MEETING OF THE MINDS: CONSENSUS AD IDEM -- OUTSIDE THE INSIDE: ESTABLISHING AN INSIDER PROGRAM -- EXAMPLE: NEW MEDIA BOARD OF ADVISORS -- EXAMPLE: INTERNAL TASK FORCE -- EXAMPLE: ORGANIZATIONAL TRANSFORMATION -- NEW ROLES AND RESPONSIBILITIES IN THE ERA OF EMERGING MEDIA -- NOTES -- Chapter 24: A Tale of Two Cities -- WEB 2.0 AND THE EVOLUTION OF CRM 2.0 -- TWITTER AND SOCIAL NETWORKS USHER IN A NEW ERA OF RELATIONSHIPS -- WHEN THE S IN SCRM STANDS FOR SELF-SERVING -- VENDOR RELATIONSHIP MANAGEMENT (VRM) -- THE VALUE OF SOCIAL CUSTOMERS -- VRM + SCRM = SRM -- NO BRAND IS AN ISLAND -- SOCIAL BUSINESS TAKES A HUMAN TOUCH -- NO, REALLY -- SOCIAL SCIENCE IS THE CENTER OF SOCIAL BUSINESS -- NOTES -- Chapter 25: We Earn the Relationships We Deserve -- EARNING THE THREE FS: FRIENDS, FANS, AND FOLLOWERS -- #HASHTAGS -- HASHTAGS: A PROACTIVE APPROACH -- OFFERS AND SPECIALS -- PAY PER TWEET -- NOTES -- Chapter 26: The New Media Scorecard -- THE DISPARITY BETWEEN SOCIAL MEDIA ADOPTION AND MEASUREMENT -- ROA: RETURN ON ACRONYMS -- THE ESSENTIAL GUIDE TO SOCIAL MEDIA: RESOURCES-PERSONNEL AND BUDGETS -- THE SOCIAL BAROMETER -- START WITH THE RESULTS, THEN WORK BACKWARD: DEFINING GOALS AND OBJECTIVES -- AUTHORITY: THE ABILITY TO GALVANIZE ACTION AND QUANTIFY IT -- THE CS OF MEASURING ACTION THROUGH COST -- THE ENGAGEMENT PHASE -- SHARE OF VOICE AND SHARE OF CONVERSATION -- COMPARATIVE DATA ANALYSIS -- NOTES -- Conclusion -- YOU ARE MORE INFLUENTIAL THAN YOU MAY REALIZE -- Appendix: 30-Day Listening Report -- Glossary…”
Libro electrónico -
5153Publicado 2023Tabla de Contenidos: “…-- Summary -- Chapter 11: Predicting the Future of Mobile DevOps -- Mobile app development trends -- Cross-platform mobile development is on the rise -- Developing mobile apps with low code -- Security is getting more important -- Increase in the impact of AI and ML -- Increase in the usage of cloud computing -- The growing importance of UX -- The growing impact of AR and VR -- Increasing use of voice apps -- The growth of IoT integration -- Mobile DevOps trends -- Automating orchestrating of mobile releases will grow -- The rise in cloud-based infrastructure -- A growing need for automation -- The shift-left will become more prevalent -- Increasing the importance of security and data protection -- Keeping an eye on the performance of mobile apps -- The rise of AI testing and codeless testing tools -- A rise in platform engineering and developer productivity -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
5154Publicado 2024Tabla de Contenidos: “…Front Cover -- Computational Intelligence Methods for Sentiment Analysis in Natural Language Processing Applications -- Copyright Page -- Contents -- List of contributors -- Preface -- 1 Role of machine learning in sentiment analysis: trends, challenges, and future directions -- 1.1 Introduction -- 1.1.1 Fundamentals of sentiment analysis -- 1.1.2 Level of analysis -- 1.1.2.1 Document level -- 1.1.2.2 Sentence level -- 1.1.2.3 Aspect-level analysis -- 1.2 Related background -- 1.2.1 Lexicon-based approach -- 1.2.1.1 Dictionary-based approach -- 1.2.1.2 Corpus-based approach -- 1.2.2 Machine learning -- 1.2.2.1 Unsupervised -- 1.2.2.2 Supervised -- 1.2.2.3 Semi-supervised -- 1.2.3 Deep learning -- 1.2.4 Hybrid approach -- 1.3 Performance metrics -- 1.4 Tools for sentiment analysis -- 1.5 Trends of sentiment analysis -- 1.5.1 Social media monitoring -- 1.5.2 E-commerce -- 1.5.3 Voice of customer -- 1.5.4 Health care -- 1.5.5 Financial services -- 1.5.6 Political elections -- 1.5.7 Recommendation system -- 1.5.8 Employee retention -- 1.6 Challenges -- 1.6.1 Data gathering -- 1.6.2 Sarcasm text -- 1.6.3 Emojis -- 1.6.4 Polarity -- 1.6.5 Incomplete information -- 1.6.6 Multimodal sentiment analysis -- 1.6.7 Multilingual sentiment analysis -- 1.7 Conclusion -- 1.8 Future direction -- References -- 2 A comparative analysis of machine learning and deep learning techniques for aspect-based sentiment analysis -- 2.1 Introduction -- 2.2 Steps in sentiment analysis -- 2.2.1 Data collection -- 2.2.2 Data preprocessing -- 2.2.3 Sentiment detection -- 2.2.4 Sentiment classification -- 2.2.5 Output preparation -- 2.3 Applications of sentiment analysis -- 2.3.1 Social media -- 2.3.2 Business -- 2.3.3 Pharmaceutical industry -- 2.3.4 Politics -- 2.4 Types of sentiment analysis -- 2.5 Aspect-based sentiment analysis -- 2.5.1 Machine learning-based approaches…”
Libro electrónico -
5155Publicado 2024“…Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. …”
Libro electrónico -
5156Introduction to digital mobile communicationIntroduction to Digital Mobile CommunicationPublicado 2015Tabla de Contenidos: “…Coded Modulation 453 -- 7.6 Adaptive Interference Cancellation 456 -- 7.6.1 Adaptive Array Antenna 457 -- 7.6.2 Adaptive Interference Suppression 466 -- 7.6.3 Discussion 467 -- 7.7 Voice Coding 469 -- 7.7.1 Pulse Code Modulation 470 -- 7.7.2 Delta Modulation 471 -- 7.7.3 Adaptive Differential Pulse Code Modulation 472.…”
Libro electrónico -
5157Publicado 2021Tabla de Contenidos: “…-- 9.3.1 Intense Traffic Management -- 9.3.2 Smart Parking -- 9.3.3 Smart Waste Administration -- 9.3.4 Smart Policing -- 9.3.5 Shrewd Lighting -- 9.3.6 Smart Power -- 9.4 In Healthcare System -- 9.5 In Homes -- 9.6 In Aviation -- 9.7 In Solving Social Problems -- 9.8 Uses of AI-People -- 9.8.1 Google Maps -- 9.8.2 Ridesharing -- 9.8.3 Voice-to-Text -- 9.8.4 Individual Assistant -- 9.9 Difficulties and Profit -- 9.10 Innovations in Smart Cities -- 9.11 Beyond Humans Focus -- 9.12 Illustrative Arrangement -- 9.13 Smart Cities with No Differentiation -- 9.14 Smart City and AI -- 9.15 Further Associated Technologies -- 9.15.1 Model Identification -- 9.15.2 Picture Recognition…”
Libro electrónico -
5158Publicado 2021Tabla de Contenidos: “…Design Site and Facility Security Controls -- Wiring Closets/Intermediate Distribution Facilities -- Server Rooms/Data Centers -- Media Storage Facilities -- Evidence Storage -- Restricted and Work Area Security -- Utilities and Heating, Ventilation, and Air Conditioning -- Environmental Issues -- Fire Prevention, Detection, and Suppression -- Summary -- Domain 4 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- Open System Interconnection and Transmission Control Protocol/Internet Protocol Models -- The OSI Reference Model -- The TCP/IP Reference Model -- Internet Protocol Networking -- Secure Protocols -- Implications of Multilayer Protocols -- Converged Protocols -- Microsegmentation -- Wireless Networks -- Cellular Networks -- Content Distribution Networks -- Secure Network Components -- Operation of Hardware -- Repeaters, Concentrators, and Amplifiers -- Hubs -- Bridges -- Switches -- Routers -- Gateways -- Proxies -- Transmission Media -- Network Access Control -- Endpoint Security -- Mobile Devices -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia Collaboration -- Remote Access -- Data Communications -- Virtualized Networks -- Third-Party Connectivity -- Summary -- Domain 5 Identity and Access Management -- Control Physical and Logical Access to Assets -- Access Control Definitions -- Information -- Systems -- Devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity Management Implementation -- Single/Multifactor Authentication -- Accountability -- Session Management -- Registration, Proofing, and Establishment of Identity -- Federated Identity Management -- Credential Management Systems -- Single Sign-On -- Just-In-Time -- Federated Identity with a Third-Party Service…”
Libro electrónico -
5159por Stevens, Richard, 1971-Tabla de Contenidos: “…-- Conclusion -- 07 Making It Real -- Introduction -- Sound Propagation -- Reverb: Advanced -- Nested Reverbs and Prioritization -- Reverb: Prebake -- Spatialization -- Sound Source Types -- Directional and Diffuse Sources -- Distance Attenuation and Detail over Distance -- Filter over Distance -- Detail over Distance -- Occlusion, Obstruction, and Exclusions -- Occlusion -- Ambient Zones -- Prioritization of Zones -- Obstructions and Exclusions -- Dynamic Occlusion -- Moving Objects and Moving Sounds -- Sounds That Move -- Moving Sound Sources with Matinee -- Creating Movement -- Moving Objects That Make Sound -- Rotating Doors -- Open/Opening Loops -- Matinee Events for Mechanical Systems -- Matinee Sound Track -- Physics -- Speed of Sound -- Doppler -- Doppler: Faking It -- Collisions -- Simple Object Collisions -- Velocity to Collision Sounds -- Sliding, Rolling, and Scraping -- Physics-based Collisions: Cascading Physics -- Prioritization: Number of Voices Control -- Animations -- Footsteps 01: Anim Notifies -- Footsteps 02: Surfaces -- Footsteps 03: Creep/Walk/Run -- Footsteps 04: Foley or Weapon Carrying Layers -- Footsteps 05: Other Notes -- Cameras and Cutscenes -- Cameras and the Listener -- Separating the Camera and Listener Position -- Conclusion -- 08 Making It Good -- Introduction -- Mixing -- General Mixing Principles -- Reference Levels -- Sound Classes and Sound Mixes: The Unreal Engine Mixing System…”
Publicado 2016
Libro electrónico -
5160por Room, StewartTabla de Contenidos: “…-- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. …”
Publicado 2021
Libro electrónico