Mostrando 5,141 - 5,160 Resultados de 6,274 Para Buscar '"The Voice"', tiempo de consulta: 0.14s Limitar resultados
  1. 5141
    Publicado 2023
    Tabla de Contenidos: “…12.3.1 Decision Variables -- 12.3.2 Objective Functions -- 12.3.3 Bounds of Decision Variables -- 12.3.4 Response Variables -- 12.4 Results and Discussions -- 12.4.1 Single Objective Optimization -- 12.4.2 Results of Multiobjective Optimization -- 12.5 Conclusion -- References -- Chapter 13 Genetic Algorithm-Based Optimization for Speech Processing Applications -- 13.1 Introduction to GA -- 13.1.1 Enhanced GA -- 13.2 GA in Automatic Speech Recognition -- 13.2.1 GA for Optimizing Off-Line Parameters in Voice Activity Detection (VAD) -- 13.2.2 Classification of Features in ASR Using GA -- 13.2.3 GA-Based Distinctive Phonetic Features Recognition -- 13.2.4 GA in Phonetic Decoding -- 13.3 Genetic Algorithm in Speech Emotion Recognition -- 13.3.1 Speech Emotion Recognition -- 13.3.2 Genetic Algorithms in Speech Emotion Recognition -- 13.4 Genetic Programming in Hate Speech Using Deep Learning -- 13.4.1 Introduction to Hate Speech Detection -- 13.4.2 GA Integrated With Deep Learning Models for Hate Speech Detection -- 13.5 Conclusion -- References -- Chapter 14 Performance of P, PI, PID, and NARMA Controllers in the Load Frequency Control of a Single-Area Thermal Power Plant -- 14.1 Introduction -- 14.2 Single-Area Power System -- 14.3 Automatic Load Frequency Control (ALFC) -- 14.4 Controllers Used in the Simulink Model -- 14.4.1 PID Controller -- 14.4.2 PI Controller -- 14.4.3 P Controller -- 14.5 Circuit Description -- 14.6 ANN and NARMA L2 Controller -- 14.7 Simulation Results and Comparative Analysis -- 14.8 Conclusion -- References -- Part 2: Decision Science and Simulation-Based Optimization -- Chapter 15 Selection of Nonpowered Industrial Truck for Small Scale Manufacturing Industry Using Fuzzy VIKOR Method Under FMCDM Environment -- 15.1 Introduction -- 15.2 Fuzzy Set Theory -- 15.2.1 Some Important Fuzzy Definitions -- 15.2.2 Fuzzy Operations…”
    Libro electrónico
  2. 5142
    por Anderson, Allan
    Publicado 2024
    Tabla de Contenidos: “…References -- Chapter 5 Design &amp -- Development -- What You will Learn in this Chapter -- The Chapter Roadmap -- 5.1 Design and Development Process Steps -- Part 1: Design -- 5.2 Introduction to Design -- 5.2.1 Ideation -- 5.2.2 Concept Design -- 5.2.3 Embodiment Design -- 5.2.4 Tools to Assist Embodiment Design -- Part 2: Development -- 5.3 Introduction to Development -- 5.3.1 Initial Specifications -- 5.3.2 Quality Function Deployment (QFD) -- 5.3.3 Design of Experiments (DOE) -- 5.3.4 Usability Testing -- 5.3.5 Performance and Endurance Testing -- 5.3.6 Quality Assurance -- 5.3.7 Design for Manufacturing and Assembly (DfMA) -- 5.3.8 Design for Sustainability -- 5.4 In Summary -- 5.A Design &amp -- Development Practice Questions -- Answers to practice questions: Product design and development -- References -- Chapter 6 Market Research -- What You will Learn in this Chapter -- The Chapter Roadmap -- 6.1 How Market Research Contributes to Product Innovation -- 6.1.1 Voice of the Customer -- 6.1.2 Six Critical Steps of Market Research -- 6.2 Selecting the Right Market Research Methodology -- 6.3 Primary Vs. …”
    Libro electrónico
  3. 5143
    por Kiefer, Philip
    Publicado 2020
    Tabla de Contenidos: “…Weitere Benutzerkonten anlegen -- Standard-Benutzerkonto und Administrator-Benutzerkonto -- Bildschirmzeit -- Ihren Mac möglichst energiesparend einsetzen -- Mehr Energie sparen -- Helligkeit reduzieren -- Maus, Trackpad, Tastatur -- WLAN und Bluetooth -- Kapitel 2 - Bedienungshilfen und Sprachassistentin Siri -- Die Bedienungshilfen in den Systemeinstellungen -- Die Anzeige der Bildschirminhalte besser erkennbar machen -- Bildschirminhalte vergrößert darstellen -- Lassen Sie sich die Bildschirminhalte vorlesen -- Einfache Sprachausgabe -- VoiceOver -- Audiobeschreibungen erhalten -- Bedienungshilfen bei Hörschwäche -- Bedienungshilfen rund um Tastatur, Maus und Trackpad -- Tastatur -- Bildschirmtastatur einblenden -- Mausbedienung mit der Tastatur -- Alternative Bedienung per Schaltersteuerung -- Texte diktieren -- Die Sprachsteuerung verwenden -- Sprachbefehle an die Sprachassistentin Siri erteilen -- Kapitel 3 - Mit Ihrem Mac ins Internet -- Mit dem Mac eine drahtlose Verbindung herstellen -- Webseiten aufrufen -- So öffnen Sie eine Ihnen bekannte Webadresse -- So öffnen Sie einen sogenannten Link -- So durchsuchen Sie das Internet nach Themen, die Sie interessieren -- Webseiten in einem privaten Fenster öffnen -- So speichern Sie Ihre Lieblingswebseiten ab -- Webseiten ausdrucken oder als Dokument speichern -- Sie möchten beim Start von Safari eine bestimmte Webseite laden? …”
    Libro electrónico
  4. 5144
    Publicado 2022
    Tabla de Contenidos: “…References -- 4 Artificial Intelligence and Machine Learning: Discovering New Ways of Doing Banking Business -- Structure of the Chapter -- 4.1 Introduction -- 4.2 AI in the Banking Sector: Where It Works and What For -- 4.2.1 AI and Customer Service -- 4.2.1.1 Chatbots -- 4.2.1.2 AI and Personalized Banking -- 4.2.1.3 Smart Wallets -- 4.2.1.4 Voice Assisted Banking -- 4.2.1.5 Robo Advice -- 4.2.1.6 AI Backed Blockchain for Expedite Payments -- 4.2.2 AI and Magnifying Efficiency of Banks -- 4.2.2.1 Determining Credit Scoring and Lending Decisions -- 4.2.2.2 AI and CRM -- 4.2.3 Magnifying Security and Risk Control -- 4.2.3.1 Detection and Prevention of Financial Fraud -- 4.2.3.2 Reducing Money Laundering -- 4.2.3.3 Cybersecurity -- 4.2.3.4 AI: Managing and Controlling Risk -- 4.3 AI Applications in Indian Banks: Some Selected Examples -- 4.3.1 State Bank of India -- 4.3.2 HDFC Bank -- 4.3.3 Axis Bank -- 4.3.4 Punjab National Bank -- 4.4 AI and its Impact on Banks' KPIs -- 4.4.1 Impact of AI on Profitability -- 4.4.2 Impact of AI on Productivity and Efficiency of Banks -- 4.4.3 Impact of AI on Improved Customer Satisfaction -- 4.4.4 AI Helps in Offering Innovative and Tailor-Made Services -- 4.4.5 AI Helps in Reducing Customer Attrition -- 4.4.6 Impact of AI on Overall Performance -- 4.5 Conclusion and Future of AI -- References -- 5 Analysis and Comparison of Credit Card Fraud Detection Using Machine Learning -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Proposed Method -- 5.4 Results -- 5.5 Conclusion and Future Scope -- References -- 6 Artificial Intelligence for All: Machine Learning and Healthcare: Challenges and Perspectives in India -- 6.1 Introduction -- 6.2 Healthcare in India: Challenges -- 6.3 Frameworks in Health must consider Missingness -- 6.3.1 Wellsprings of Missingness Must Be Painstakingly Comprehended…”
    Libro electrónico
  5. 5145
    Publicado 2016
    Tabla de Contenidos: “…Time Traffic 74 -- 4.3.1 Control and Data Traffic 75 -- 4.3.2 Voice over IP 76 -- 4.3.3 IPTV 78 -- 4.3.4 QOS and Real?]…”
    Libro electrónico
  6. 5146
    Publicado 2022
    Tabla de Contenidos: “…Objective 18 Summarize cloud concepts and connectivity options -- Deployment Models -- Public -- Private -- Hybrid -- Community -- Service Models -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Infrastructure as Code -- Automation/Orchestration -- Connectivity Options -- Virtual Private Network (VPN) -- Private-Direct Connection to Cloud Provider -- Multitenancy -- Scalability -- 00-FMindd 15 22/04/22 11:12 AM -- xvi Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Elasticity -- Security Implications -- REVIEW -- 18 QUESTIONS -- 18 ANSWERS -- 20 Network Implementations -- Objective 21 Compare and contrast various devices, their features, -- and their appropriate placement on the network -- Networking Devices -- Layer 2 Switch -- Layer 3 Capable Switch -- Router -- Hub -- Access Point -- Bridge -- Wireless LAN Controller -- Load Balancer -- Proxy Server -- Cable Modem -- DSL Modem -- Repeater -- Voice Gateway -- Media Converter -- Firewall -- Intrusion Prevention System(IPS)/Intrusion Detection System (IDS) Device -- VPN Headend -- Networked Devices -- Voice over Internet Protocol (VoIP) Phone -- Printer -- Physical Access Control Devices -- Cameras -- Heating, Ventilation, and Air Conditioning (HVAC) Sensors -- Internet of Things (IoT) -- Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) -- REVIEW -- 21 QUESTIONS -- 21 ANSWERS -- Objective 22 Compare and contrast routing technologies -- and bandwidth management concepts -- Routing -- Dynamic Routing -- Static Routing -- 00-FMindd 16 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Default Route -- Administrative Distance -- Exterior vs Interior -- Time to Live -- Bandwidth Management -- Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23 Given a scenario, configure and deploy common -- Ethernet switching features -- Data Virtual Local Area Network (VLAN) -- Voice VLAN -- Port Configurations -- Port Tagging/8021Q -- Port Aggregation -- Duplex -- Speed -- Flow Control -- Port Mirroring -- Port Security -- Jumbo Frames -- Auto-Medium-Dependent Interface Crossover (MDI-X) -- Media Access Control (MAC) Address Tables -- Power over Ethernet (PoE)/Power over Ethernet Plus (PoE+) -- Spanning Tree Protocol -- Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) -- Address Resolution Protocol (ARP) -- Neighbor Discovery Protocol -- REVIEW -- 23 QUESTIONS -- 23 ANSWERS -- Objective 24 Given a scenario, install and configure the appropriate -- wireless standards and technologies -- 80211 Standards -- a -- b -- g -- n (Wi-Fi 4) -- ac (Wi-Fi 5) -- ax (Wi-Fi 6) -- 00-FMindd 17 22/04/22 11:12 AM -- xviii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Frequencies and Range -- 24 GHz -- 50 GHz -- Channels -- Regulatory Impacts -- Channel Bonding -- Service Set Identifier (SSID) -- Basic Service Set -- Independent Basic Service Set (Ad-hoc) -- Extended Service Set -- Roaming -- Antenna Types -- Omni -- Directional -- Encryption Standards -- Wi-Fi Protected Access (WPA)/WPA2 Personal [Advanced Encryption -- Standard (AES)/Temporal Key Integrity Protocol (TKIP)] -- WPA/WPA2 Enterprise (AES/TKIP) -- Cellular Technologies -- Global System for Mobile Communications (GSM) -- Code-Division Multiple Access (CDMA) -- Long-Term Evolution (LTE) -- 3G, 4G, 5G -- Multiple Input, Multiple Output (MIMO) and Multi-user MIMO (MU-MIMO) -- REVIEW -- 24 QUESTIONS -- 24 ANSWERS -- 30 Network Operations -- Objective 31 Given a scenario, use the appropriate statistics -- and sensors to ensure network availability -- Performance Metrics/Sensors -- Device/Chassis -- Network Metrics -- SNMP -- Management Information Bases (MIBs) -- Object Identifiers (OIDs) -- Traps -- Network Device Logs -- Log Reviews…”
    Libro electrónico
  7. 5147
    Publicado 2015
    Tabla de Contenidos: “…Hamish Coates -- 27. Giving Voice to Non-traditional Students “Walking” the Narrative Mediation Path. …”
    Libro electrónico
  8. 5148
    Computers for seniors for dummies
    Computers For Seniors For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Learn the Types of Game Delivery -- Explore the Various Gaming Genres -- Understand How Game Makers Get Paid -- A Few of My Favorites -- Chapter 15 Creating and Viewing Digital Photos and Videos -- Capture Pictures and Video with the Camera App -- Make Audio Recordings with Voice Recorder -- Find and Play Videos Using the Movies &amp -- TV App -- Transfer Photos and Videos from a Camera or Phone -- View and Edit Photos in the Photos App -- Create a Video with the Video Editor -- Chapter 16 Listening to Music on Your PC -- Preparing to Listen to Digital Music -- Introducing Windows Media Player -- Make Your Stored Music Available in Windows Media Player -- Play Music -- Create a Playlist -- Rip a Music CD -- Burn a Music CD -- Acquire New Music -- Part 5 Windows Toolkit -- Chapter 17 Working with Networks -- Plan and Set Up a Home Network -- Enabling Wireless Router Security -- Set Up File Sharing on Your PC…”
    Libro electrónico
  9. 5149
    Publicado 2024
    Tabla de Contenidos: “…Examples of generative AI outside of chat -- Avoiding ChatGPT limitations, biases, and inappropriate responses -- Lack of real-time information -- Complex or specialized topics -- Long-form content generation -- Long-term memory -- Sensitive information -- Biased thinking -- Emotion and empathy -- Ethical and moral guidance -- Critical decision making -- Programming and debugging -- Translation accuracy -- Educational substitution -- Don't force-fit a solution -- Summary -- References -- Chapter 4: Scoring Stories -- Prioritizing the backlog -- WSJF -- User Needs Scoring -- Scoring enterprise solutions -- Examples of scoring -- Putting a backlog into order -- Patching case study revisited -- Extending tracking tools with scoring -- Try the User Needs Scoring method -- Creating more complex scoring methods -- Working with multiple backlogs in Agile -- Real-world hiccups with scoring -- I know Agile, and this is not WSJF -- The use of simple numbers one to four -- Weighting factors -- Severity seems complicated to judge -- The cost is so high that we can't ever get the work done -- Grouping issues into bugs to protect the quality -- How to work WSJF into the organization -- Summary -- References -- Chapter 5: Defining the Desired Experience -- Designing chat experiences -- Chat-only experiences -- Integrating ChatGPT into an existing chat experience -- Enabling components for a chat experience -- Designing hybrid UI/chat experiences -- Chat window size and location -- Tables -- Forms -- Charts -- Graphics and images -- Buttons, menus, and choice lists -- Links -- Creating voice-only experiences -- Designing a recommender and behind-the-scenes experiences -- Overarching considerations -- Accessibility -- Internationalization -- Trust -- Security -- Summary -- References -- Part 2: Designing -- Chapter 6: Gathering Data - Content is King…”
    Libro electrónico
  10. 5150
    por Rossetti, Nazzareno, 1951-
    Publicado 2006
    Tabla de Contenidos: “…7.1 Power Management of Desktop and Notebook Computers -- Power Management System Solution for a Pentium III Desktop System -- Power Management System Solution for Pentium IV Systems (Desktop and Notebook) -- Desktop Systems -- Powering the Silver Box -- Notebook Systems -- Future Power Trends -- 7.2 Computing and Data Communications Converge at the Point of Load -- The Proliferation of Power Supplies -- Telecom Power Distribution -- Computing Power Distribution -- Multiphase Buck Converter for POLs and VRMs -- Conclusion -- 7.3 Efficient Power Management ICs Tailored for DDR-SDRAM Memories -- Introduction -- DDR Power Management Architecture -- Worst Case Current Consumption -- Average Power Consumption -- Transient Operation -- Standby Operation -- Linear versus Switching -- Second Generation DDR-DDR2 -- FAN5236 for DDR and DDR2 Memories -- Future Trends -- 7.4 Power Management of Digital Set-Top Boxes -- Set-Top Box Architecture -- Power Management -- High Power Set-Top Boxes -- Low Power Set-Top Boxes -- Conclusion -- 7.5 Power Conversion for the Data Communications Market -- Introduction -- Current Environment with Separate Networks -- Migration to Converged Voice/Data/Video IP -- Telecom -48 V DC Power Distribution -- Datacom AC Power Distribution -- Conclusion -- 8. …”
    Libro electrónico
  11. 5151
    Publicado 2025
    Tabla de Contenidos: “…Memory, Politics and Peace -- Introduction -- Understanding Collective Memory and Peace -- The Politics of Memory and Peace -- Acknowledgment of Opposing Narratives: Hegemonic Voices Prevail -- Suppressing and Undermining Rituals and Expressions -- Vernacular Memory and Peace -- Conclusion -- References -- 18. …”
    Libro electrónico
  12. 5152
    Publicado 2010
    Tabla de Contenidos: “…. -- Chapter 23: Divide and Conquer -- SOCIAL MEDIA TAKES A COMMUNITY EFFORT -- DECENTRALIZATION AND CENTRALIZATION: ASSEMBLING AND CONDUCTING AN ORCHESTRA -- THE SOCIETY AND CULTURE OF BUSINESS -- MEETING OF THE MINDS: CONSENSUS AD IDEM -- OUTSIDE THE INSIDE: ESTABLISHING AN INSIDER PROGRAM -- EXAMPLE: NEW MEDIA BOARD OF ADVISORS -- EXAMPLE: INTERNAL TASK FORCE -- EXAMPLE: ORGANIZATIONAL TRANSFORMATION -- NEW ROLES AND RESPONSIBILITIES IN THE ERA OF EMERGING MEDIA -- NOTES -- Chapter 24: A Tale of Two Cities -- WEB 2.0 AND THE EVOLUTION OF CRM 2.0 -- TWITTER AND SOCIAL NETWORKS USHER IN A NEW ERA OF RELATIONSHIPS -- WHEN THE S IN SCRM STANDS FOR SELF-SERVING -- VENDOR RELATIONSHIP MANAGEMENT (VRM) -- THE VALUE OF SOCIAL CUSTOMERS -- VRM + SCRM = SRM -- NO BRAND IS AN ISLAND -- SOCIAL BUSINESS TAKES A HUMAN TOUCH -- NO, REALLY -- SOCIAL SCIENCE IS THE CENTER OF SOCIAL BUSINESS -- NOTES -- Chapter 25: We Earn the Relationships We Deserve -- EARNING THE THREE FS: FRIENDS, FANS, AND FOLLOWERS -- #HASHTAGS -- HASHTAGS: A PROACTIVE APPROACH -- OFFERS AND SPECIALS -- PAY PER TWEET -- NOTES -- Chapter 26: The New Media Scorecard -- THE DISPARITY BETWEEN SOCIAL MEDIA ADOPTION AND MEASUREMENT -- ROA: RETURN ON ACRONYMS -- THE ESSENTIAL GUIDE TO SOCIAL MEDIA: RESOURCES-PERSONNEL AND BUDGETS -- THE SOCIAL BAROMETER -- START WITH THE RESULTS, THEN WORK BACKWARD: DEFINING GOALS AND OBJECTIVES -- AUTHORITY: THE ABILITY TO GALVANIZE ACTION AND QUANTIFY IT -- THE CS OF MEASURING ACTION THROUGH COST -- THE ENGAGEMENT PHASE -- SHARE OF VOICE AND SHARE OF CONVERSATION -- COMPARATIVE DATA ANALYSIS -- NOTES -- Conclusion -- YOU ARE MORE INFLUENTIAL THAN YOU MAY REALIZE -- Appendix: 30-Day Listening Report -- Glossary…”
    Libro electrónico
  13. 5153
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 11: Predicting the Future of Mobile DevOps -- Mobile app development trends -- Cross-platform mobile development is on the rise -- Developing mobile apps with low code -- Security is getting more important -- Increase in the impact of AI and ML -- Increase in the usage of cloud computing -- The growing importance of UX -- The growing impact of AR and VR -- Increasing use of voice apps -- The growth of IoT integration -- Mobile DevOps trends -- Automating orchestrating of mobile releases will grow -- The rise in cloud-based infrastructure -- A growing need for automation -- The shift-left will become more prevalent -- Increasing the importance of security and data protection -- Keeping an eye on the performance of mobile apps -- The rise of AI testing and codeless testing tools -- A rise in platform engineering and developer productivity -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  14. 5154
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Computational Intelligence Methods for Sentiment Analysis in Natural Language Processing Applications -- Copyright Page -- Contents -- List of contributors -- Preface -- 1 Role of machine learning in sentiment analysis: trends, challenges, and future directions -- 1.1 Introduction -- 1.1.1 Fundamentals of sentiment analysis -- 1.1.2 Level of analysis -- 1.1.2.1 Document level -- 1.1.2.2 Sentence level -- 1.1.2.3 Aspect-level analysis -- 1.2 Related background -- 1.2.1 Lexicon-based approach -- 1.2.1.1 Dictionary-based approach -- 1.2.1.2 Corpus-based approach -- 1.2.2 Machine learning -- 1.2.2.1 Unsupervised -- 1.2.2.2 Supervised -- 1.2.2.3 Semi-supervised -- 1.2.3 Deep learning -- 1.2.4 Hybrid approach -- 1.3 Performance metrics -- 1.4 Tools for sentiment analysis -- 1.5 Trends of sentiment analysis -- 1.5.1 Social media monitoring -- 1.5.2 E-commerce -- 1.5.3 Voice of customer -- 1.5.4 Health care -- 1.5.5 Financial services -- 1.5.6 Political elections -- 1.5.7 Recommendation system -- 1.5.8 Employee retention -- 1.6 Challenges -- 1.6.1 Data gathering -- 1.6.2 Sarcasm text -- 1.6.3 Emojis -- 1.6.4 Polarity -- 1.6.5 Incomplete information -- 1.6.6 Multimodal sentiment analysis -- 1.6.7 Multilingual sentiment analysis -- 1.7 Conclusion -- 1.8 Future direction -- References -- 2 A comparative analysis of machine learning and deep learning techniques for aspect-based sentiment analysis -- 2.1 Introduction -- 2.2 Steps in sentiment analysis -- 2.2.1 Data collection -- 2.2.2 Data preprocessing -- 2.2.3 Sentiment detection -- 2.2.4 Sentiment classification -- 2.2.5 Output preparation -- 2.3 Applications of sentiment analysis -- 2.3.1 Social media -- 2.3.2 Business -- 2.3.3 Pharmaceutical industry -- 2.3.4 Politics -- 2.4 Types of sentiment analysis -- 2.5 Aspect-based sentiment analysis -- 2.5.1 Machine learning-based approaches…”
    Libro electrónico
  15. 5155
    Publicado 2024
    “…Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. …”
    Libro electrónico
  16. 5156
    Introduction to digital mobile communication
    Introduction to Digital Mobile Communication
    Publicado 2015
    Tabla de Contenidos: “…Coded Modulation 453 -- 7.6 Adaptive Interference Cancellation 456 -- 7.6.1 Adaptive Array Antenna 457 -- 7.6.2 Adaptive Interference Suppression 466 -- 7.6.3 Discussion 467 -- 7.7 Voice Coding 469 -- 7.7.1 Pulse Code Modulation 470 -- 7.7.2 Delta Modulation 471 -- 7.7.3 Adaptive Differential Pulse Code Modulation 472.…”
    Libro electrónico
  17. 5157
    Publicado 2021
    Tabla de Contenidos: “…-- 9.3.1 Intense Traffic Management -- 9.3.2 Smart Parking -- 9.3.3 Smart Waste Administration -- 9.3.4 Smart Policing -- 9.3.5 Shrewd Lighting -- 9.3.6 Smart Power -- 9.4 In Healthcare System -- 9.5 In Homes -- 9.6 In Aviation -- 9.7 In Solving Social Problems -- 9.8 Uses of AI-People -- 9.8.1 Google Maps -- 9.8.2 Ridesharing -- 9.8.3 Voice-to-Text -- 9.8.4 Individual Assistant -- 9.9 Difficulties and Profit -- 9.10 Innovations in Smart Cities -- 9.11 Beyond Humans Focus -- 9.12 Illustrative Arrangement -- 9.13 Smart Cities with No Differentiation -- 9.14 Smart City and AI -- 9.15 Further Associated Technologies -- 9.15.1 Model Identification -- 9.15.2 Picture Recognition…”
    Libro electrónico
  18. 5158
    Publicado 2021
    Tabla de Contenidos: “…Design Site and Facility Security Controls -- Wiring Closets/Intermediate Distribution Facilities -- Server Rooms/Data Centers -- Media Storage Facilities -- Evidence Storage -- Restricted and Work Area Security -- Utilities and Heating, Ventilation, and Air Conditioning -- Environmental Issues -- Fire Prevention, Detection, and Suppression -- Summary -- Domain 4 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- Open System Interconnection and Transmission Control Protocol/Internet Protocol Models -- The OSI Reference Model -- The TCP/IP Reference Model -- Internet Protocol Networking -- Secure Protocols -- Implications of Multilayer Protocols -- Converged Protocols -- Microsegmentation -- Wireless Networks -- Cellular Networks -- Content Distribution Networks -- Secure Network Components -- Operation of Hardware -- Repeaters, Concentrators, and Amplifiers -- Hubs -- Bridges -- Switches -- Routers -- Gateways -- Proxies -- Transmission Media -- Network Access Control -- Endpoint Security -- Mobile Devices -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia Collaboration -- Remote Access -- Data Communications -- Virtualized Networks -- Third-Party Connectivity -- Summary -- Domain 5 Identity and Access Management -- Control Physical and Logical Access to Assets -- Access Control Definitions -- Information -- Systems -- Devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity Management Implementation -- Single/Multifactor Authentication -- Accountability -- Session Management -- Registration, Proofing, and Establishment of Identity -- Federated Identity Management -- Credential Management Systems -- Single Sign-On -- Just-In-Time -- Federated Identity with a Third-Party Service…”
    Libro electrónico
  19. 5159
    por Stevens, Richard, 1971-
    Publicado 2016
    Tabla de Contenidos: “…-- Conclusion -- 07 Making It Real -- Introduction -- Sound Propagation -- Reverb: Advanced -- Nested Reverbs and Prioritization -- Reverb: Prebake -- Spatialization -- Sound Source Types -- Directional and Diffuse Sources -- Distance Attenuation and Detail over Distance -- Filter over Distance -- Detail over Distance -- Occlusion, Obstruction, and Exclusions -- Occlusion -- Ambient Zones -- Prioritization of Zones -- Obstructions and Exclusions -- Dynamic Occlusion -- Moving Objects and Moving Sounds -- Sounds That Move -- Moving Sound Sources with Matinee -- Creating Movement -- Moving Objects That Make Sound -- Rotating Doors -- Open/Opening Loops -- Matinee Events for Mechanical Systems -- Matinee Sound Track -- Physics -- Speed of Sound -- Doppler -- Doppler: Faking It -- Collisions -- Simple Object Collisions -- Velocity to Collision Sounds -- Sliding, Rolling, and Scraping -- Physics-based Collisions: Cascading Physics -- Prioritization: Number of Voices Control -- Animations -- Footsteps 01: Anim Notifies -- Footsteps 02: Surfaces -- Footsteps 03: Creep/Walk/Run -- Footsteps 04: Foley or Weapon Carrying Layers -- Footsteps 05: Other Notes -- Cameras and Cutscenes -- Cameras and the Listener -- Separating the Camera and Listener Position -- Conclusion -- 08 Making It Good -- Introduction -- Mixing -- General Mixing Principles -- Reference Levels -- Sound Classes and Sound Mixes: The Unreal Engine Mixing System…”
    Libro electrónico
  20. 5160
    por Room, Stewart
    Publicado 2021
    Tabla de Contenidos: “…-- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. …”
    Libro electrónico