Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 214
- Development 196
- Engineering & Applied Sciences 178
- Application software 169
- Data processing 155
- Management 151
- Python (Computer program language) 120
- Computer Science 112
- Machine learning 109
- Artificial intelligence 108
- Historia 103
- Computer security 96
- Computer networks 94
- Computer programs 94
- Social aspects 93
- Programming 90
- Security measures 86
- Computer programming 78
- Research & information: general 78
- Design 77
- Database management 76
- Filosofía 74
- Data mining 73
- Engineering and Technology 73
- Big data 72
- Physical Sciences 72
- Philosophy 70
- Cloud computing 69
- Education 69
- Computer software 68
-
6201Publicado 2016Tabla de Contenidos: “…3.4 Optimal control -- 3.4.1 LQR Control -- 3.4.2 LQG Control -- 3.5 Conclusions -- Chapter 4: Typical cyber physical systems -- 4.1 Introduction -- 4.2 Power networks -- 4.2.1 Physical Dynamics -- 4.2.2 Protection -- 4.2.3 Smart Metering -- 4.2.4 Communication Systems in Industrial Control and Smart Grids -- 4.3 Robotic networks -- 4.3.1 Physical Dynamics -- Deterministic model -- Probabilistic model -- 4.3.2 Communications and Control -- 4.3.3 Coordination of Robots -- Rendezvous -- Connectivity maintenance -- 4.4 Conclusions -- Chapter 5: Communication capacity requirements -- 5.1 Introduction -- 5.1.1 Methodologies and Contexts -- 5.1.2 Basic Models -- 5.2 Deterministic System: Stability -- 5.2.1 Topological Entropy -- Spanning orbit-based definition -- Separated orbit-based definition -- Cover-based definition -- Equivalence -- 5.2.2 Communication Capacity Requirements -- System model -- Communication requirements for estimation -- Communication requirements for linear system control -- Communication requirements for optimal control -- 5.2.3 Calculation of Topological Entropy -- Linear systems -- Generic systems -- 5.3 Stochastic Systems: Estimation -- 5.3.1 System Model -- 5.3.2 Separation -- 5.3.3 Sequential Estimation -- Gauss-Markov source -- Noiseless digital channel -- 5.4 Stochastic Systems: Stability -- 5.4.1 System Model -- 5.4.2 Inadequacy of Channel Capacity -- 5.4.3 Anytime Capacity -- Necessity -- Sufficiency -- Encoding procedure -- 5.5 Stochastic Systems: Reduction of Shannon Entropy -- 5.5.1 Cybernetics Argument -- Law of requisite variety -- Shannon entropy in discrete-value dynamics -- Shannon entropy in continuous-value dynamics -- Controller design based on entropy -- Criticisms on entropy-based control -- 5.5.2 Does Practical Control Really Reduce Entropy?…”
Libro electrónico -
6202
-
6203Publicado 2003“…Implement DSL end-to-end solutions for all six current DSL architectures Coverage includes: All DSL varieties: U.S. and international varieties include ANSI and ITU standards as well as legacy and proprietary xDSL varieties, such as CAP Cisco DSL-related equipment that supports all the xDSL varieties and configurations in both Cisco IOS(r) Software and the graphical user interface Cisco DSL Manager (CDM) software All six architectures that implement DSL using TCP/IP, with in-depth discussion of the four most commonly-used architectures New standards and deregulation issues, including the ITU SHDSL standard and the evolving VDSL technology International regulatory and infrastructure issues, with measurements expressed for both U.S. and international audiences Common challenges and their solutions when deploying or migrating using xDSL, including voice-over-IP (VoIP) and multimedia traffic Using MPLS to move DSL-generated traffic through networks Bonus appendixes provide an overview of ATM as well as a tour of Cisco Long-Reach Ethernet (LRE) Virtual private networks, firewall security, e-commerce applications, multiple voice lines, and e-learning programs: Digital Subscriber Line (DSL) can bring all of these services to even the smallest network at an affordable price. …”
Libro electrónico -
6204Publicado 2016Tabla de Contenidos: “…Discriminating and Language Varieties -- 8.4.3. Native Language Identification -- 8.5. …”
Libro electrónico -
6205Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Factories of the Future -- 1.0 Introduction -- 1.1 Factory of the Future -- 1.1.1 Plant Structure -- 1.1.2 Plant Digitization -- 1.1.3 Plant Processes -- 1.1.4 Industry of the Future: A Fully Integrated Industry -- 1.2 Current Manufacturing Environment -- 1.3 Driving Technologies and Market Readiness -- 1.4 Connected Factory, Smart Factory, and Smart Manufacturing -- 1.4.1 Potential Benefits of a Connected Factory -- 1.5 Digital and Virtual Factory -- 1.5.1 Digital Factory -- 1.5.2 Virtual Factory -- 1.6 Advanced Manufacturing Technologies -- 1.6.1 Advantages of Advanced Manufacturing Technologies -- 1.7 Role of Factories of the Future (FoF) in Manufacturing Performance -- 1.8 Socio-Econo-Techno Justification of Factories of the Future -- References -- Chapter 2 Industry 5.0 -- 2.1 Introduction -- 2.1.1 Industry 5.0 for Manufacturing -- 2.1.1.1 Industrial Revolutions -- 2.1.2 Real Personalization in Industry 5.0 -- 2.1.3 Industry 5.0 for Human Workers -- 2.2 Individualized Human-Machine-Interaction -- 2.3 Industry 5.0 is Designed to Empower Humans, Not to Replace Them -- 2.4 Concerns in Industry 5.0 -- 2.5 Humans Closer to the Design Process of Manufacturing -- 2.5.1 Enablers of Industry 5.0 -- 2.6 Challenges and Enablers (Socio-Econo-Techno Justification) -- 2.6.1 Social Dimension -- 2.6.2 Governmental and Political Dimension -- 2.6.3 Interdisciplinarity -- 2.6.4 Economic Dimension -- 2.6.5 Scalability -- 2.7 Concluding Remarks -- References -- Chapter 3 Machine Learning - A Survey -- 3.1 Introduction -- 3.2 Machine Learning -- 3.2.1 Unsupervised Machine Learning -- 3.2.2 Variety of Unsupervised Learning -- 3.2.3 Supervised Machine Learning -- 3.2.4 Categories of Supervised Learning -- 3.3 Reinforcement Machine Learning -- 3.3.1 Applications of Reinforcement Learning…”
Libro electrónico -
6206Publicado 2025Tabla de Contenidos: “…-- 5.3.1.14 Collective and Individual Image Rights -- 5.3.2 For Leagues -- 5.3.2.1 Media Rights Lots, International Rights and OTT Opportunities -- 5.3.2.2 Stakes in the League's Commercial Company -- 5.3.2.3 National Sponsorship and Other Deals -- 5.3.2.4 Centralisation of Global Rights With the Federation -- 5.3.2.5 Professional Sport/Amateur Sport Solidarity Mechanisms -- 5.3.2.6 Lobbying -- 5.4 The Professionalisation of Women's Football in Europe -- 5.4.1 Women's Football: Growth Lever and Source of Legitimacy -- 5.4.2 Europe's Three Types of Women's Football Clubs -- 5.4.3 Europe's Mixed Clubs On the Up -- 5.4.4 Potential Synergies Between Women's and Men's Football -- 5.4.3.1 Strategy -- 5.4.3.2 Use of Equipment and Facilities -- 5.4.3.3 Sales -- 5.4.3.4 Communication/Marketing -- 5.4.3.5 Human Resources -- 5.5 Conclusion -- Notes -- Bibliography -- Chapter 6 The Competition Between Private Circuits and Federation-Run Events in Individual Sports -- 6.1 The Regulation of Private Circuits and Federation-Run Competitions -- 6.1.1 The Economic Value and Professionalism of Circuits -- 6.1.1.1 Definition of Professional Athlete in Individual Sports -- 6.1.1.2 Three Categories of Individual Sports in Terms of Competition-Circuit Revenues -- 6.1.2 The Regulation of Circuits -- 6.1.2.1 Governance -- 6.1.2.2 Competition Structure and Rules -- 6.1.2.3 Protecting the Game -- 6.1.2.4 Finance and Marketing -- 6.1.2.5 Social Responsibility -- 6.2 A Wide Variety of Events Models -- 6.2.1 Types of Events, Business Models and Partnerships -- 6.2.1.1 Events as a Pretext for Mass Participation…”
Libro electrónico -
6207Publicado 2022Tabla de Contenidos: “…8.3.2.2 MY DATA Control Technologies -- 8.3.3 Logic-Based Usage Control (LUCON) -- 8.3.3.1 Degree (D) -- 8.3.3.2 Data Provenance Tracking -- 8.4 Conclusion -- References -- Chapter 9: Building Trust in Data Spaces -- 9.1 Introduction -- 9.2 Data Sovereignty and Usage Control -- 9.2.1 Data Provider and Data Consumer -- 9.2.2 Protection Goals and Attacker Model -- 9.2.3 Building Blocks -- 9.3 Certification Process -- 9.3.1 Multiple Eye Principle -- 9.3.2 Component Certification -- 9.3.3 Operational Environment Certification -- 9.4 Connector Identities and Software Signing -- 9.4.1 Technical Implementation of the Certification Process -- 9.4.2 Connector Identities and Company Descriptions -- 9.4.3 Software Signing and Manifests -- 9.5 Connector System Security -- 9.5.1 Trusted Computing Base -- 9.5.2 Remote Attestation -- 9.6 Conclusion -- References -- Chapter 10: Blockchain Technology and International Data Spaces -- 10.1 Introduction -- 10.2 Blockchain Technology -- 10.2.1 Basic Concept -- 10.2.2 Design Parameters -- 10.2.3 Smart Contracts -- 10.2.4 Opportunities of Blockchain Systems -- 10.3 Blockchain in International Data Spaces -- 10.4 Application Examples: Industrial Use Cases -- 10.4.1 TrackChain -- 10.4.2 Silke -- 10.4.3 Sinlog -- 10.4.4 BC for Production -- 10.5 Conclusion -- References -- Chapter 11: Federated Data Integration in Data Spaces -- 11.1 Introduction -- 11.2 Federated Data Integration Workflows in Data Spaces -- 11.2.1 A Simple Demonstrator Scenario -- 11.2.2 A Data Integration Workflow Solution for Data Spaces -- 11.3 Toward Formalisms for Virtual Data Space Integration -- 11.3.1 Logical Foundations for Data Integration -- 11.3.2 Data Integration Tool Extensions for Data Spaces -- References -- Chapter 12: Semantic Integration and Interoperability -- 12.1 Introduction -- 12.2 The Neglected Variety Dimension…”
Libro electrónico -
6208Publicado 2022Tabla de Contenidos: “…6.10.14 Case 4: Image-Based Features Extraction in Pavement Cracking Evaluation -- 6.10.15 Automatic Extraction of Crack Features -- 6.10.16 Extraction of Crack Skeleton Using Shearlet Complex Method -- 6.10.17 Calculate Crack Width Feature Using External Multiplication Method -- 6.10.18 Detection of Crack Starting Feature (Crack Core) Using EPA Emperor Penguin Metaheuristic Algorithm -- 6.10.19 Selection of Crack Root Feature Based on Geodetic Distance -- 6.10.20 Determining Coordinates of the Crack Core as the Optimal Center at the Failure Level using EPA Method -- 6.10.21 Development of New Features for Crack Evaluation Based on Graph Energy -- 6.10.22 Crack Homogeneity Feature Based on Graph Energy Theory -- 6.10.23 Spall Type 1 Feature: Crack Based on Graph Energy Theory in Crack Width Mode -- 6.10.24 General Crack Index Based on Graph Energy Theory -- 6.11 Summary and Conclusion -- 6.12 Questions and Exercises -- Further Reading -- Chapter 7 Feature Prioritization and Selection Methods -- 7.1 Introduction -- 7.2 A Variety of Features Selection Methods -- 7.2.1 Filter Methods -- 7.2.2 Correlation Criteria -- 7.2.3 Mutual Information (MI) -- 7.2.4 Wrapper Methods -- 7.2.5 Sequential Feature Selection (SFS) Algorithm -- 7.2.6 Heuristic Search Algorithm (HAS) -- 7.2.7 Embedded Methods -- 7.2.8 Hybrid Methods -- 7.2.9 Feature Selection Using the Fuzzy Entropy Method -- 7.2.10 Hybrid-Based Feature Selection Using the Hierarchical Fuzzy Entropy Method -- 7.2.11 Step 1: Measure Similarity Index and Evaluate Features -- 7.2.12 Step 2: Final Feature Vector -- 7.3 Classification Algorithm Based on Modified Support Vectors for Feature Selection - CDFESVM -- 7.3.1 Methods for Determining the Fuzzy Membership Function in Feature Selection -- 7.4 Summary and Conclusion -- 7.5Questions and Exercises -- Further Reading…”
Libro electrónico -
6209Publicado 2022“…"The fully revised new edition of the popular textbook, featuring additional MATLAB exercises and new algorithms for processing digital audio signals Digital Audio Signal Processing (DASP) techniques are used in a variety of applications, ranging from audio streaming and computer-generated music to real-time signal processing and virtual sound processing. …”
Libro electrónico -
6210Publicado 2019“…This volume seeks to infer large phylogenetic networks from phonetically encoded lexical data and contribute in this way to the historical study of language varieties. The technical step that enables progress in this case is the use of causal inference algorithms. …”
Electrónico -
6211
-
6212Publicado 2019Libro electrónico
-
6213Publicado 2017Tabla de Contenidos: “…Front Cover -- Elements of Information Organization and Dissemination -- Copyright Page -- Contents -- Preface -- A Background -- A.1 Introduction -- A.2 Concept of IOD -- A.3 Need for IOD -- A.4 Role of IOD -- A.5 Nomenclature -- A.5.1 Other Names -- A.6 Definition of Documentation -- A.6.1 New Dimension -- A.6.2 Clear Scope -- A.6.3 New Context -- A.7 Main Facets -- A.7.1 Differences -- A.8 IOD Activities -- References -- B Information Sources -- B.1 Introduction -- B.2 Genesis of IS -- B.3 Varieties of IS -- B.3.1 Human Information Sources -- B.3.2 Institutional Information Sources -- B.3.3 Documentary Information Sources (DIS) -- B.3.3.1 Definition -- B.3.3.2 Recording Media and Technology -- B.3.3.3 Media of Presentation -- Advantages of IS in Print Medium -- Advantages of IS in Digital Medium -- B.3.3.4 Categories of DIS -- Binary Division -- Trinary Division -- Quaternary Division -- B.3.3.5 Characteristics of DIS -- Primary Information Sources -- Secondary Information Sources -- Tertiary Information Sources -- Differences Between DIS -- B.3.3.6 Nature of Printed DIS -- Book -- Periodical -- Report -- Pamphlet -- Research Paper -- Conference Paper -- Guide to Literature -- Patent Literature -- Standard -- Specification -- Trade Literature -- Manuscript -- Government Publication -- B.3.3.7 Nature of Non-printed DIS -- Electronic Publications -- Databases -- Internet/Web Resources -- B.3.3.8 Gray Literature -- Characteristics of GL -- Types of GL -- B.4 Importance of IS -- References -- C Information Users -- C.1 Introduction -- C.2 User -- C.2.1 User Community -- C.2.2 Types of User -- C.3 User Study (US) -- C.3.1 Types and Scope of US -- C.3.2 Need of US -- C.3.3 Objectives of US -- C.3.4 User Characteristics -- C.3.5 Benefits of User Study -- C.3.6 Guidelines for US -- C.4 Information Need -- C.4.1 Basis of Need -- C.4.2 Affecting Factors…”
Libro electrónico -
6214Publicado 2023Tabla de Contenidos: “…-- 1.3 The Inception of Zero Trust Concept -- 1.3.1 Cloud Security Alliance's Software Define Perimeter and Zero Trust -- 1.3.2 Google's BeyondCorp Zero Trust Model -- 1.3.3 Gartner's CARTA Framework for Zero Trust -- 1.3.3.1 CARTA's Zero Trust Implementation Approach -- 1.3.4 Netflix's LISA Model for Zero Trust -- 1.3.4.1 LISA Principles -- 1.3.5 Forrester's ZTX Framework -- 1.3.6 NIST SP 800:207 Zero Trust Framework -- 1.3.6.1 NIST's Zero Trust Architecture Foundation -- 1.3.6.2 Policy Engine -- 1.3.6.3 Policy Administrator -- 1.3.6.4 Policy Enforcement Point -- 1.3.7 The Open Group Zero Trust's Approach -- 1.3.7.1 Key Requirements for Zero Trust as per the Open Group -- 1.3.7.2 Organizational Value and Risk Alignment -- 1.3.7.3 Guardrails and Governance -- 1.3.7.4 Technology -- 1.3.7.5 Security Controls -- 1.3.8 Microsoft's Zero Trust Principles -- 1.4 Why Zero Trust Is Important -- 1.5 Benefits of Zero Trust -- 1.6 Zero Trust Principle Redefined -- 1.6.1 Re-Examine All Default Access Controls -- 1.6.2 Micro-Segmentation -- 1.6.3 Preventing Lateral Movement -- 1.6.4 Leverage a Variety of Preventative Techniques -- 1.6.5 Enable Real-Time Monitoring and Controls to Identify and Halt Malicious Activity Quickly -- 1.6.6 Align to the Broader Security Strategy -- 1.7 Zero Trust for Everyone -- 1.7.1 Government -- 1.7.2 Enterprises -- 1.7.3 Small and Medium Businesses -- 1.7.4 Consumers -- 1.8 Chapter Summary -- 2 Zero Trust - Disrupting the Business Model…”
Libro electrónico -
6215
-
6216
-
6217por Keller, Simon“…Simon Keller seeks to discover what the point of loyalty is, exploring the varieties of loyalty and their psychological and ethical differences, and concluding that it is an essential but fallible part of human life…”
Publicado 2007
Libro -
6218Publicado 2015Tabla de Contenidos: “…Cloud Computing Foundations and Business Requirements -- 1 Cloud Computing -- 1.1 Introduction -- 1.1.1 Operation Cost Rationalization -- 1.1.2 Revenue Estimation for Emerging Products -- 1.2 Cloud Computing at a Glance -- 1.3 Right Approach to Definition -- 1.4 A Brief History of Cloud Computing Definitions -- 1.5 Parallel Computing -- 1.5.1 Hardware Parallelism -- 1.5.1.1 Processor parallelism -- 1.5.1.2 Memory parallelism -- 1.5.2 Software Parallelism -- 1.5.2.1 Algorithm parallelism -- 1.5.2.2 Programming parallelism -- 1.5.2.3 Data parallelism -- 1.5.2.4 Architecture balance parallelism -- 1.5.3 Different Types of Parallel Models -- 1.6 Distributed Computing -- 1.7 Grid Computing -- 1.8 Utility Computing -- 1.9 Cloud Computing -- 1.10 Summary -- 1.10.1 Software (Applications) -- 1.10.2 IT Infrastructure (Hardware) -- 1.11 Review Questions -- 2 Business Needs -- 2.1 Introduction -- 2.2 Project Contents and Processes -- 2.3 Allocate the Right People for the Right Job -- 2.4 Business Analyst Role -- 2.5 Defining Business -- 2.6 Business Variables -- 2.6.1 Business Entity -- 2.6.2 Business Strategy -- 2.6.3 Business Profile (Variety) -- 2.6.4 Business Size (Volume) -- 2.6.5 Business Variation -- 2.7 Classification of Business Requirements -- 2.7.1 Business Requirements -- 2.7.2 Stakeholder requirements -- 2.7.3 Solution Requirements -- 2.7.3.1 Functional requirements -- 2.7.3.2 Nonfunctional requirements -- 2.7.4 Transition Requirements -- 2.8 E2E Process of Business Problem Solving -- 2.8.1 Business Problem Definition -- 2.8.1.1 Preliminary definition -- 2.8.1.2 Analysis process -- 2.8.1.3 Confirmation and documentation of the real problem -- 2.8.1.4 Challenges of problem definition…”
Libro electrónico -
6219
-
6220Publicado 2019“…In addressing some of these constraints, researchers are developing and using varieties of modern and innovative techniques to improve local tomato germplasm, make rapid genetic gains, and breed for varieties with resistance to biotic and abiotic stress. …”
Libro electrónico