Mostrando 3,981 - 4,000 Resultados de 5,617 Para Buscar '"hardware"', tiempo de consulta: 0.11s Limitar resultados
  1. 3981
    Publicado 2022
    Tabla de Contenidos: “…8.2.3.1 Object Recognition -- 8.2.3.2 Object Detection -- 8.2.3.3 Object Tracking -- 8.2.4 Edge Computing, Fog Computing, and Cloud Computing -- 8.2.4.1 Edge Computing -- 8.2.4.2 Fog Computing -- 8.2.4.3 Cloud Computing -- 8.2.5 Benefits of Computer Vision‐Driven Traffic Management -- 8.2.6 Challenges of Computer Vision‐Driven Traffic Management -- 8.2.6.1 Big Data Issues -- 8.2.6.2 Privacy Issues -- 8.2.6.3 Technical Barriers -- 8.3 Research Methodology -- 8.3.1 Research Questions and Objectives -- 8.3.2 Study Design -- 8.3.2.1 Selection Rationale -- 8.3.2.2 Potential Challenges -- 8.3.3 Adapted Study Design Research Approach -- 8.3.4 Selected Hardware and Software -- 8.3.4.1 Hardware: The NVIDIA Jetson Nano Developer Kit and Accompanying Items -- 8.3.5 Hardware Proposed -- 8.3.5.1 Software Stack: NVIDIA Jetpack SDK and Accompanying Requirements (All Iterations) -- 8.3.6 Software Proposed -- 8.4 Conclusion -- References -- Chapter 9 Implementation and Evaluation of Computer Vision Prototype for Vehicle Detection -- 9.1 Prototype Setup -- 9.1.1 Introduction -- 9.1.2 Environment Setup -- 9.2 Testing -- 9.2.1 Design and Development: The Default Model and the First Iteration -- 9.2.2 Testing (Multiple Images) -- 9.2.3 Analysis (Multiple Images) -- 9.2.4 Testing (MP4 File) -- 9.2.5 Testing (Livestream Camera) -- 9.3 Iteration 2: Transfer Learning Model -- 9.3.1 Design and Development -- 9.3.2 Test (Multiple Images) -- 9.3.3 Analysis (Multiple Images) -- 9.3.4 Test (MP4 File) -- 9.3.5 Analysis (MP4 File) -- 9.3.6 Test (Livestream Camera) -- 9.3.7 Analysis (Livestream Camera) -- 9.3.8 Redesign -- 9.4 Iteration 3: Increased Sample Size and Change of Accuracy Analysis (Images) -- 9.4.1 Design and Development -- 9.4.2 Testing -- 9.4.3 Analysis -- 9.4.3.1 Confusion Matrices -- 9.4.3.2 Precision, Recall, and F‐score -- 9.5 Findings and Discussion…”
    Libro electrónico
  2. 3982
    Publicado 2023
    Tabla de Contenidos: “…5.3.4 The Need for Post-Quantum Cryptography -- 5.4 Algorithms Proposed for Post-Quantum Cryptography -- 5.4.1 Code-Based Cryptography -- 5.4.2 Lattice-Based Cryptography -- 5.4.3 Multivariate Cryptography -- 5.4.4 Hash-Based Cryptography -- 5.4.5 Supersingular Elliptic Curve Isogeny Cryptography -- 5.4.6 Quantum-Resistant Symmetric Key Cryptography -- 5.5 Launching of the Project Called "Open Quantum Safe" -- 5.6 Algorithms Proposed During the NIST Standardization Procedure for Post-Quantum Cryptography -- 5.7 Hardware Requirements of Post-Quantum Cryptographic Algorithms -- 5.7.1 NTRUEncrypt -- 5.7.1.1 Polynomial Multiplication -- 5.7.1.2 Hardware to Accelerate NTRUEncrypt -- 5.7.2 Hardware-Software Design to Implement PCQ Algorithms -- 5.7.3 Implementation of Cryptographic Algorithms Using HLS -- 5.8 Challenges on the Way of Post-Quantum Cryptography -- 5.9 Post-Quantum Cryptography Versus Quantum Cryptography -- 5.10 Future Prospects of Post-Quantum Cryptography -- References -- Chapter 6 A Statistical Characterization of MCX Crude Oil Price with Regard to Persistence Behavior and Seasonal Anomaly -- 6.1 Introduction -- 6.2 Related Literature -- 6.3 Data Description and Methodology -- 6.3.1 Data -- 6.3.2 Methodology -- 6.3.2.1 Characterizing Persistence Behavior of Crude Oil Return Time Series Using Hurst Exponent -- 6.3.2.2 Zipf Plot -- 6.3.2.3 Seasonal Anomaly in Oil Returns -- 6.4 Analysis and Findings -- 6.4.1 Persistence Behavior of Daily Oil Stock Price -- 6.4.2 Detecting Seasonal Pattern in Oil Prices -- 6.5 Conclusion and Implications -- References -- Appendix -- Chapter 7 Some Fixed Point and Coincidence Point Results Involving Gα-Type Weakly Commuting Mappings -- 7.1 Introduction -- 7.2 Definitions and Mathematical Preliminaries -- 7.2.1 Definition: G-metric Space (G-ms) -- 7.2.2 Definition: t-norm…”
    Libro electrónico
  3. 3983
    Publicado 2018
    Tabla de Contenidos: “…3.3.4.3 Outdoor Street Canyon Scenario -- 3.3.4.4 General Frequency Trend in Delay Domain -- 3.3.5 Directional Domain Measurements -- 3.3.5.1 Indoor Of ce Wideband Results at 60 GHz -- 3.3.5.2 Indoor Of ce Multifrequency Results -- 3.3.5.3 Urban Macrocell Outdoor Results at 5 GHz -- 3.4 Channel Modeling -- 3.4.1 5G Stochastic Channel Models -- 3.4.1.1 Transmission Loss Modeling -- 3.4.1.2 Multipath Directional and Delay Modeling -- 3.4.1.3 Spatial Consistency -- 3.4.2 Geometry-Based Modeling -- 3.4.2.1 Blockage -- 3.5 Summary and Future Work -- References -- 4 Mathematical Modeling of Hardware Impairments -- 4.1 RF Power Ampli ers -- 4.1.1 The Volterra Series -- 4.1.2 Common Subsets of the Volterra Series -- 4.1.2.1 Static Polynomial -- Third-Order Static Polynomial -- 4.1.2.2 A Note on Odd-Even and Odd Orders -- 4.1.2.3 Memory Polynomial -- 4.1.2.4 Generalized Memory Polynomial -- 4.1.3 Global vs. …”
    Libro electrónico
  4. 3984
    Publicado 2015
    Tabla de Contenidos:
    Libro electrónico
  5. 3985
    Publicado 2006
    Tabla de Contenidos: “…14.7 Simple feature14.8 Multi-layer feature; 14.9 Drama; 14.10 Music; 15 Archiving and backup; 15.1 Selection for archiving; 15.2 Compact disc; 15.3 CD-ROM; 15.4 Digital Audio Tape; 15.5 Analog; 15.6 Computer backup; 16 Tweaks; 16.1 Mouse options; 16.2 Hardware controller; 16.3 Keyboard shortcuts; 16.4 MIDI triggering; 16.5 SMPTE synchronization; 16.6 Favorites; 16.7 Preferences (F4); 16.8 Icons; 17 Using the CD-ROM; 17.1 Adobe Audition; 17.2 Bonus material; 18 Hardware and software requirements; 18.1 PC; 18.2 Sound card; 18.3 Loudspeakers/headphones; 18.4 Hard disks; 18.5 USB; 18.6 Firewire…”
    Libro electrónico
  6. 3986
    por Grout, Ian
    Publicado 2008
    Tabla de Contenidos: “…1.6.3 Field Programmable Gate Array (FPGA)1.7 PLD Configuration Technologies; 1.8 Programmable Logic Vendors; 1.9 Programmable Logic Design Methods and Tools; 1.9.1 Introduction; 1.9.2 Typical PLD Design Flow; 1.10 Technology Trends; References; Student Exercises; Chapter 2: Electronic Systems Design; 2.1 Introduction; 2.2 Sequential Product Development Process versus Concurrent Engineering Process; 2.2.1 Introduction; 2.2.2 Sequential Product Development Process; 2.2.3 Concurrent Engineering Process; 2.3 Flowcharts; 2.4 Block Diagrams; 2.5 Gajski-Kuhn Chart; 2.6 Hardware-Software Co-Design…”
    Libro electrónico
  7. 3987
    por Vugt, Sander van
    Publicado 2013
    Tabla de Contenidos: “…Working with Virtual Machines -- Performing common tasks -- Working with hardware -- Booting your virtual machine from a CD-ROM -- Modifying virtual hardware -- Working with shared folders -- Setting virtual machine options -- Automatic snapshots -- Time synchronization -- VNC connections -- Securing virtual machines -- Summary -- 4. …”
    Libro electrónico
  8. 3988
    Publicado 2017
    Tabla de Contenidos: “…-- Existing tools to analyze a physical environment -- Capacity Planner -- DPACK -- Assessment of an existing virtual environment -- Discovery and inventory -- Health check -- Existing tools for analyzing a virtual environment -- RVTools -- VOA -- VMware vSphere Health Check -- Summary -- Chapter 4: Deployment Workflow and Component Installation -- vSphere components and workflow -- ESXi deployment plan -- Choosing the hardware platform -- Identification of the storage architecture -- Defining the network configuration -- ESXi installation -- Where to install ESXi? …”
    Libro electrónico
  9. 3989
    Publicado 2017
    Tabla de Contenidos: “…-- Introduction -- Setting up hardware for home automation with the RPZ -- Getting ready…”
    Libro electrónico
  10. 3990
    por Lucas, Michael, 1967-
    Publicado 2013
    Tabla de Contenidos: “…Installation Preparations -- OpenBSD Hardware -- Supported Hardware -- Proprietary Hardware, Blobs, and Firmware -- Processors -- Memory (RAM) -- Hard Drives -- Virtualization -- Multiple Operating Systems -- Getting OpenBSD -- Official CDs -- Internet Downloads -- Mirror Site Layout -- Release Directories -- Boot Media -- Choosing Install Media -- Local Installation Servers -- File Sets -- Partitioning -- Standard OpenBSD Partitions -- Root Partition -- Swap Space -- /tmp Directory -- /var Partition -- /usr Partition -- /usr/X11R6 Partition…”
    Libro electrónico
  11. 3991
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  12. 3992
    por Chen, Whei-Jen
    Publicado 2005
    Tabla de Contenidos: “…Planning considerations -- 3.1 Siebel release matrix for DB2 UDB -- 3.1.1 IBM DB2 Universal DatabaseTM V8.2 ESE -- 3.1.2 Operating systems and hardware for DB2 UDB -- 3.1.3 Siebel Developer Web Client -- 3.2 Siebel sizing considerations -- 3.2.1 Information requirements -- 3.2.2 Sizing deliverables -- 3.2.3 Related reviews -- 3.3 Hardware and storage requirements -- 3.3.1 Siebel hardware and storage requirements -- 3.3.2 Considerations for hardware planning -- 3.3.3 DB2 UDB -- 3.4 Database layout and recommendations -- 3.4.1 Decision time -- 3.4.2 Table grouping by Siebel components used -- 3.5 Using Siebel with DB2 UDB 32-bit versus 64-bit -- 3.6 Users and groups -- 3.7 Checklist -- Chapter 4. …”
    Libro electrónico
  13. 3993
    Publicado 2023
    Tabla de Contenidos: “…Hardware memory consistency -- Fences and happens-before -- Consistency models -- 13.3. …”
    Libro electrónico
  14. 3994
    Publicado 1996
    Tabla de Contenidos: “…Mathematics and Physics of Emerging Biomedical Imaging -- Copyright -- PREFACE -- Contents -- Chapter 1 Introduction and Summary -- PLATE CAPTIONS -- Chapter 2 X-Ray Projection Imaging -- 2.1 INTRODUCTION -- 2.2 MAMMOGRAPHY -- 2.2.1 Scanning Methods -- 2.2.2 Area Detectors -- 2.3 CHEST RADIOGRAPHY -- 2.3.1 Scanning Methods -- 2.3.2 Area Detectors -- 2.4 DIGITAL FLUOROSCOPY -- 2.5 PORTAL IMAGING -- 2.6 RESEARCH OPPORTUNITIES -- 2.7 Suggested Reading -- Chapter 3 X-Ray Computed Tomography -- 3.1 INTRODUCTION -- 3.1.1 History -- 3.1.2 Principle of Operation -- 3.2 PRESENT STATUS OF CT INSTRUMENTATION AND TECHNOLOGY -- 3.2.1 X-Ray Tubes -- 3.2.2 Detector Systems -- 3.2.3 Image Artifacts -- 3.2.4 Quantitative CT -- 3.2.5 Requirements for High-Speed CT -- 3.3 SPIRAL CT -- 3.4 ELECTRON BEAM TECHNIQUES -- 3.5 DATA HANDLING AND DISPLAY TECHNIQUES -- 3.6 RESEARCH OPPORTUNITIES -- 3.7 Suggested Reading -- Chapter 4 Magnetic Resonance Imaging -- 4.1 PRINCIPLES OF MAGNETIC RESONANCE IMAGING -- 4.2 HARDWARE -- 4.2.1 Magnet Systems: Current Status and Opportunities -- 4.2.2 Pulsed-field MRI Systems -- 4.2.3 Radio-frequency Coils for MRI -- Computational Design of RF Coils -- Cooled Receiver Coils for MR Imaging -- Use of Multiple Receivers -- 4.2.4 Magnetic Field Gradients -- Local versus Whole-Body Gradients -- Design Considerations -- Applications -- Bioeffects -- 4.2.5 Research Opportunities for MRI Hardware -- Magnet Systems -- Pulsed-field MRI -- RF Coils -- Gradient Systems -- 4.2.6 Suggested Reading Related to MRI Hardware -- Magnet Systems -- Pulsed-field MRI -- RF Coils -- Gradient Systems -- 4.3 DYNAMIC MR IMAGE RECONSTRUCTION -- 4.3.1 Partial Fourier Reconstruction -- Predominantly One-sided Data Collection -- Predominantly Every Other Point -- Collecting Multiple Echoes -- Two- and Three-Dimensional Extensions -- 4.3.2 Reduced Gibbs Ringing…”
    Libro electrónico
  15. 3995
    Publicado 2021
    Tabla de Contenidos: “…Common Pitfalls -- Common Cloud Vulnerabilities -- Describe the Secure Software Development Lifecycle Process -- NIST Secure Software Development Framework -- OWASP Software Assurance Security Model -- Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Lifecycle -- Avoid Common Vulnerabilities During Development -- Cloud-Specific Risks -- Quality Assurance -- Threat Modeling -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional Testing -- Security Testing Methodologies -- Use Verified Secure Software -- Approved Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-On -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Domain 5 Cloud Security Operations -- Implement and Build Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems…”
    Libro electrónico
  16. 3996
    Publicado 2022
    Tabla de Contenidos: “…Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Life Cycle -- Cloud-Specific Risks -- Threat Modeling -- Avoid Common Vulnerabilities during Development -- Secure Coding -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional and Non-functional Testing -- Security Testing Methodologies -- Quality Assurance -- Abuse Case Testing -- Use Verified Secure Software -- Securing Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-on -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Chapter 5 Cloud Security Operations -- Build and Implement Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems -- Manage Physical and Logical Infrastructure for Cloud Environment -- Access Controls for Remote Access -- Operating System Baseline Compliance Monitoring and Remediation…”
    Libro electrónico
  17. 3997
    Publicado 2012
    Tabla de Contenidos: “…Chapter 10: A Biomorphic Active Cochlear Model In SilicoChapter 11: Micropower Adaptive VLSI Systems for Acoustic Source Localization and Separation; Chapter 13: Terahertz Imaging and Spectroscopy: State-of-the-Art and Future Trends; Chapter 14: Terahertz Technology Based on Nanoelectronic Devices; Chapter 15: Design and Assessment Principles of Semiconductor Flat-Panel Detector-Based X-Ray Micro-CT Systems for Small-Animal Imaging; Chapter 16: Portable High-Frequency Ultrasound Imaging System Design and Hardware Considerations…”
    Libro electrónico
  18. 3998
    Publicado 2018
    Tabla de Contenidos: “…Learn About Technology -- The Basics of Hardware and Software -- Files and Folders -- The Internet -- Telephony -- Learn More About Technology -- Getting It Done -- 4. …”
    Libro electrónico
  19. 3999
    Tabla de Contenidos: “…Economic and Social Impacts; Economic impacts; Consumer electronics, ICT hardware, software, network service and platforms; Users/creators; Traditional media…”
    Libro electrónico
  20. 4000
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Configuring HBase -- Introduction -- Configuring and deploying HBase -- Using the filesystem -- Administering clusters -- Managing clusters -- Chapter 2: Loading Data from Various DBs -- Introduction -- Extracting data from Oracle -- Loading data using Oracle Big data connector -- Bulk utilities -- Using Hive with Apache HBase -- Using Sqoop -- Chapter 3: Working with Large Distributed Systems Part I -- Introduction -- Scaling elastically or Auto Scaling with built-in fault tolerance -- Auto Scaling HBase using AWS -- Works on different VM/physical, cloud hardware -- Chapter 4: Working with Large Distributed Systems Part II -- Introduction -- Read path -- Write Path -- Snappy -- LZO compression -- LZ4 compressor -- Replication -- Chapter 5: Working with Scalable Structure of tables -- Introduction -- HBase data model part 1 -- HBase data model part 2 -- How HBase truly scales on key and schema design -- Chapter 6: HBase Clients -- Introduction -- HBase REST and Java Client -- Working with Apache Thrift -- Working with Apache Avro -- Working with Protocol buffer -- Working with Pig and using Shell -- Chapter 7: Large-Scale MapReduce -- Introduction -- Chapter 8: HBase Performance Tuning -- Introduction -- Working with infrastructure/operating systems -- Working with Java virtual machines -- Changing the configuration of components -- Working with HDFS -- Chapter 9: Performing Advanced Tasks on Hbase -- Machine learning using Hbase -- Real-time data analysis using Hbase and Mahout -- Full text indexing using Hbase -- Chapter 10: Optimizing Hbase for Cloud -- Introduction -- Configuring Hbase for the Cloud -- Connecting to an Hbase cluster using the command line…”
    Libro electrónico