Mostrando 5,121 - 5,140 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.12s Limitar resultados
  1. 5121
    Publicado 2004
    Tabla de Contenidos: “…Process Choreographer as a Web services router -- 6.1 Introducing Process Choreographer -- 6.2 Overview of implemented scenarios -- 6.3 Creating a development and runtime environment -- 6.3.1 Business process container setup -- 6.3.2 Business process container validation -- 6.4 Scenario 1: Invoking a collaboration -- 6.4.1 Overview and implementation steps -- 6.4.2 Importing and tailoring the WSDL -- 6.4.3 Creating the SOAP process -- 6.4.4 Creating the JMS process -- 6.4.5 Testing in the Unit Test Environment -- 6.4.6 Testing in WebSphere Application Server Enterprise -- 6.5 Scenario 2: Invoking a WebSphere Business Integration Adapter -- 6.6 Scenario 3: Invoking a message flow -- 6.7 Summary -- Appendix A. Hardware and software configuration -- Machine configuration -- Installation order -- Appendix B. …”
    Libro electrónico
  2. 5122
    Publicado 2017
    Tabla de Contenidos: “…Aware Routing Protocols 274 -- References 276 -- Abbreviations/Terminologies 278 -- Questions 280 -- Exercises 281 -- 11 Routing in Wireless Sensor Networks 285 -- 11.1 Basics of Wireless Sensor Networks 285 -- 11.1.1 Hardware Architecture of Sensor Node 287 -- 11.1.2 Network Topology 289 -- 11.1.3 Design Factors 290 -- 11.1.4 Classification of Routing Protocol 292 -- 11.2 Routing Challenges in Wireless Sensor Networks 293 -- 11.2.1 Self?]…”
    Libro electrónico
  3. 5123
    Publicado 2015
    Tabla de Contenidos: “…5.1 What to Expect from this Chapter -- 5.2 Introduction -- 5.3 Effectiveness Criteria, Figures of Merit, Metrics, and Predictions -- 5.3.1 Review -- 5.3.2 Example -- 5.3.3 Reliability Predictions -- 5.4 Statistical Comparison Overview -- 5.4.1 Quality of Knowledge -- 5.4.2 Three Comparisons -- 5.4.3 Count Data from Aggregates of Systems -- 5.4.4 Environmental Conditions -- 5.5 Statistical Comparison Techniques -- 5.5.1 Duration Requirements -- 5.5.2 Count Requirements -- 5.6 Failure Reporting and Corrective Action System -- 5.7 Reliability Testing -- 5.7.1 Component Life Testing -- 5.7.2 Reliability Growth Testing -- 5.7.3 Software Reliability Modeling -- 5.8 Best Practices in Reliability Requirements Comparisons -- 5.8.1 Track Achievement of Reliability Requirements -- 5.8.2 Institute a FRACAS -- 5.9 Chapter Summary -- 5.10 Exercises -- References -- Chapter 6 Design for Reliability -- 6.1 What to Expect from this Chapter -- 6.2 Introduction -- 6.3 Techniques for Reliability Assessment -- 6.3.1 Quantitative Reliability Modeling -- 6.3.2 Reliability Testing -- 6.4 The Design for Reliability Process -- 6.4.1 Information Sources -- 6.5 Hardware Design for Reliability -- 6.5.1 Printed Wiring Boards -- 6.5.2 Design for Reliability in Complex Systems -- 6.6 Qualitative Design for Reliability Techniques -- 6.6.1 Fault Tree Analysis -- 6.6.2 Failure Modes, Effects, and Criticality Analysis -- 6.7 Design for Reliability for Software Products -- 6.8 Robust Design -- 6.9 Design for Reliability Best Practices for Systems Engineers -- 6.9.1 Reliability Requirements -- 6.9.2 Reliability Assessment -- 6.9.3 Reliability Testing -- 6.9.4 DFR Practices -- 6.10 Software Resources -- 6.11 Chapter Summary -- 6.12 Exercises -- References -- Chapter 7 Reliability Engineering for High-Consequence Systems -- 7.1 What to Expect from this Chapter…”
    Libro electrónico
  4. 5124
    Publicado 2024
    Tabla de Contenidos: “…Chapter 5 Reinforcement Learning for Adaptive Mechatronics Systems -- 5.1 Introduction to Adaptive Mechatronics Systems -- 5.2 Fundamentals of Reinforcement Learning -- 5.3 Reinforcement Learning Algorithms for Mechatronics -- 5.4 Adaptive Control Strategies in Mechatronics -- 5.5 Autonomous Decision-Making in Mechatronics -- 5.6 Optimization and Energy Efficiency in Mechatronics -- 5.7 Safety and Robustness in Reinforcement Learning -- 5.8 Real-World Applications and Case Studies -- 5.9 Challenges and Future Directions -- 5.10 Ethical and Societal Implications -- 5.11 Conclusion -- References -- Further Reading -- Chapter 6 Application of PLC in the Mechatronics Industry -- 6.1 Introduction -- 6.1.1 History and Evolution of PLCs -- 6.1.2 Literature Review -- 6.1.3 Scope and Objectives -- 6.2 Role of PLC in Mechatronics System Integration -- 6.2.1 Integration of PLC with Mechanical Systems -- 6.2.2 Integration of PLC with Electrical Systems -- 6.2.3 Integration of PLC with Computing Systems -- 6.3 PLC Applications in Mechatronics Industry -- 6.3.1 Programming and Implementation of PLC in Mechatronics -- 6.4 PLC in Mechatronics System Design -- 6.4.1 Integration of PLCs in Mechatronics Systems -- 6.4.2 Mechatronics System Components -- 6.4.3 PLC Hardware Selection -- 6.5 Safety in Mechatronics Systems -- 6.5.1 Safety Standards and Regulations -- 6.5.2 Safety Interlocks and Emergency Stop Systems -- 6.5.3 Fault Detection and Tolerance -- 6.6 Case Studies for Mechatronics Systems Using PLCs -- 6.6.1 Automotive Manufacturing -- 6.6.2 Bottling and Packaging Industry -- 6.6.3 Aircraft Landing Gear Control -- 6.6.4 E-Commerce Warehouse Automation -- 6.6.5 CNC Machining Centers -- 6.6.6 Precision Agriculture -- 6.7 Challenges and Future Trends -- 6.7.1 Challenges in Implementing Mechatronics Systems -- 6.7.2 Emerging Technologies and Trends in Mechatronics…”
    Libro electrónico
  5. 5125
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…3 At-Least-K Conjunctive Normal Form (KNF) -- 4 Cardinality Constraint Extraction and Analysis -- 4.1 Extraction -- 4.2 Analysis with BDDs -- 4.3 PySAT Encodings Experimental Evaluation -- 5 Cardinality Conflict-Driven Clause Learning -- 5.1 Implementation Details -- 5.2 Inprocessing Techniques -- 6 Proof Checking -- 6.1 Satisfying Assignments -- 6.2 Clausal Proofs -- 6.3 Starting with KNF Input -- 7 Experimental Evaluation -- 7.1 SAT Competition Benchmarks -- 7.2 Magic Squares and Max Squares -- 8 Conclusion and Future Work -- References -- CaDiCaL 2.0 -- 1 Introduction -- 2 Architecture -- 3 External Propagator -- 4 Proofs -- 5 Tracer Interface -- 6 Constraints and Flipping -- 7 Interpolation -- 8 Testing and Debugging -- 9 Experiments -- 10 Conclusion -- References -- Formally Certified Approximate Model Counting -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Approximate Model Counting -- 3.2 Formalization in Isabelle/HOL -- 4 Approximate Model Counting in Isabelle/HOL -- 4.1 Abstract Specification and Probabilistic Analysis -- 4.2 Concretization to a Certificate Checker -- 4.3 Extending ApproxMC to ApproxMCCert -- 4.4 CNF-XOR Unsatisfiability Checking -- 5 Experimental Evaluation -- 6 Conclusion and Future Work -- References -- Scalable Bit-Blasting with Abstractions -- 1 Introduction -- 2 Preliminaries -- 3 Abstraction-Refinement Framework -- 4 Refinement Schemes -- 4.1 Hand-Crafted Lemmas -- 4.2 Lemma Scoring Scheme -- 4.3 Synthesizing Lemmas via Abduction -- 4.4 Lemma Verification -- 5 Integration -- 6 Evaluation -- 7 Conclusion -- References -- Hardware Model Checking -- The MoXI Model Exchange Tool Suite -- 1 Overview -- 2 Intermediate Language -- 3 Tool Suite -- 3.1 Translators -- 3.2 Utilities -- 4 Tool Suite Validation -- 5 Benchmarks -- 6 Conclusion and Future Work -- References -- SMLP: Symbolic Machine Learning Prover…”
    Libro electrónico
  6. 5126
    Publicado 2024
    Tabla de Contenidos: “…5.5 Security Standards and Protocols -- 5.5.1 ISO/IEC 27001 -- 5.5.2 NIST SP 800-53 -- 5.5.3 SOC 2 -- 5.5.4 PCI DSS -- 5.5.5 IEC 62443 -- 5.5.6 OWASP -- 5.5.7 Control Objectives for Information and Related Technologies (COBIT) -- 5.6 Network Security -- 5.7 Access Control -- 5.7.1 Role-based Access Control (RBAC) -- 5.7.2 Discretionary Access Control (DAC) -- 5.7.3 Mandatory Access Control (MAC) -- 5.8 Authentication and Authorization -- 5.9 Privacy Concerns -- 5.10 Case Studies -- 5.10.1 Equifax Data Breach -- 5.10.2 Target Data Breach -- 5.10.3 WannaCry Ransomware Attack -- 5.11 Conclusion -- 5.12 Future Scope -- References -- 6 Efficient-driven Approaches Related to Meta-Heuristic Algorithms using Machine Learning Techniques -- 6.1 Introduction -- 6.2 Stochastic Optimization -- 6.2.1 Genetic Algorithm -- 6.2.2 Particle Swarm Optimization -- 6.3 Heuristic Search -- 6.3.1 Heuristic Search Techniques -- 6.4 Meta-Heuristic -- 6.4.1 Structures of Meta-Heuristic -- 6.5 Machine Learning -- 6.5.1 Applications of Meta-Heuristic -- References -- 7 Security and Privacy Issues in Distributed Healthcare Systems - A Survey -- 7.1 Introduction -- 7.1.1 Traditional Systems -- 7.1.2 Distributed Systems -- 7.2 Previous Study -- 7.2.1 Background and Definitions -- 7.3 Security and Privacy Needs -- 7.4 Security and Privacy Goals -- 7.5 Type of Attacks in Distributed Systems -- 7.5.1 Malicious Hardware -- 7.5.2 Malicious Programs -- 7.6 Recommendations and Future Approaches -- 7.7 Conclusion -- References -- 8 Implementation and Analysis of the Proposed Model in a Distributed e-Healthcare System -- 8.1 Introduction -- 8.2 Outmoded Systems -- 8.3 Distributed Systems -- 8.3.1 Peer-to-Peer Architecture -- 8.4 Previous Work -- 8.5 Service-Oriented Architecture of e-Healthcare -- 8.6 Implementation of the Proposed Model -- 8.6.1 Speech Software…”
    Libro electrónico
  7. 5127
    Publicado 2015
    Tabla de Contenidos: “…Cell Challenges 93 -- 3.7 Conclusions and Future Directions 97 -- References 99 -- 4 Cooperation for Next Generation Wireless Networks 105 -- 4.1 Introduction 105 -- 4.2 Cooperative Diversity and Relaying Strategies 107 -- 4.2.1 Cooperation and Network Coding 107 -- 4.2.2 Cooperative ARQ MAC Protocols 108 -- 4.3 PHY Layer Impact on MAC Protocol Analysis 110 -- 4.3.1 Impact of Fast Fading and Shadowing on Packet Reception for QoS Guarantee 111 -- 4.3.2 Impact of Shadowing Spatial Correlation 112 -- 4.4 Case Study: NCCARQ 113 -- 4.4.1 NCCARQ Overview 113 -- 4.4.2 PHY Layer Impact 114 -- 4.5 Performance Evaluation 116 -- 4.5.1 Simulation Scenario 116 -- 4.5.2 Simulation Results 117 -- 4.6 Conclusion 122 -- Acknowledgements 122 -- References 122 -- 5 Mobile Clouds: Technology and Services for Future Communication Platforms 125 -- 5.1 Introduction 125 -- 5.2 The Mobile Cloud 127 -- 5.2.1 User Resources 129 -- 5.2.2 Software Resources 130 -- 5.2.3 Hardware Resources 131 -- 5.2.4 Networking Resources 132 -- 5.3 Mobile Cloud Enablers 133 -- 5.3.1 The Mobile User Domain 133 -- 5.3.2 Wireless Technologies 135 -- 5.3.3 Software and Middleware 139 -- 5.4 Network Coding 140 -- 5.5 Summary 145 -- References 145 -- 6 Cognitive Radio for 5G Wireless Networks 149 -- 6.1 Introduction 149 -- 6.2 Overview of Cognitive Radio Technology in 5G Wireless 150 -- 6.3 Spectrum Optimisation using Cognitive Radio 152 -- 6.4 Relevant Spectrum Optimisation Literature in 5G 152.…”
    Libro electrónico
  8. 5128
    Publicado 2014
    Tabla de Contenidos: “…The Ethernet System -- The Four Basic Elements of Ethernet -- The Ethernet Frame -- The Media Access Control Protocol -- Hardware -- Network Protocols and Ethernet -- Best-Effort Delivery -- Design of Network Protocols -- Protocol Encapsulation -- Internet Protocol and Ethernet Addresses -- Looking Ahead -- Chapter 4. …”
    Libro electrónico
  9. 5129
    Publicado 2022
    Tabla de Contenidos: “…4.2.3 How It Works -- 4.3 Generating a Viewer Database -- 4.3.1 Problem -- 4.3.2 Solution -- 4.3.3 How It Works -- 4.4 Training and Testing -- 4.4.1 Problem -- 4.4.2 Solution -- 4.4.3 How It Works -- 5 Algorithmic Deep Learning -- 5.1 Building the Filter -- 5.1.1 Problem -- 5.1.2 Solution -- 5.1.3 How It Works -- 5.2 Simulating -- 5.2.1 Problem -- 5.2.2 Solution -- 5.2.3 How It Works -- 5.3 Testing and Training -- 5.3.1 Problem -- 5.3.2 Solution -- 5.3.3 How It Works -- 6 Tokamak Disruption Detection -- 6.1 Introduction -- 6.2 Numerical Model -- 6.2.1 Dynamics -- 6.2.2 Sensors -- 6.2.3 Disturbances -- 6.2.4 Controller -- 6.3 Dynamical Model -- 6.3.1 Problem -- 6.3.2 Solution -- 6.3.3 How It Works -- 6.4 Simulate the Plasma -- 6.4.1 Problem -- 6.4.2 Solution -- 6.4.3 How It Works -- 6.5 Control the Plasma -- 6.5.1 Problem -- 6.5.2 Solution -- 6.5.3 How It Works -- 6.6 Training and Testing -- 6.6.1 Problem -- 6.6.2 Solution -- 6.6.3 How It Works -- 7 Classifying a Pirouette -- 7.1 Introduction -- 7.1.1 Inertial Measurement Unit -- 7.1.2 Physics -- 7.2 Data Acquisition -- 7.2.1 Problem -- 7.2.2 Solution -- 7.2.3 How It Works -- 7.3 Orientation -- 7.3.1 Problem -- 7.3.2 Solution -- 7.3.3 How It Works -- 7.4 Dancer Simulation -- 7.4.1 Problem -- 7.4.2 Solution -- 7.4.3 How It Works -- 7.5 Real-Time Plotting -- 7.5.1 Problem -- 7.5.2 Solution -- 7.5.3 How It Works -- 7.6 Quaternion Display -- 7.6.1 Problem -- 7.6.2 Solution -- 7.6.3 How It Works -- 7.7 Making the IMU Belt -- 7.7.1 Problem -- 7.7.2 Solution -- 7.7.3 How It Works -- 7.8 Testing the System -- 7.8.1 Problem -- 7.8.2 Solution -- 7.8.3 How It Works -- 7.9 Classifying the Pirouette -- 7.9.1 Problem -- 7.9.2 Solution -- 7.9.3 How It Works -- 7.10 Data Acquisition GUI -- 7.10.1 Problem -- 7.10.2 Solution -- 7.10.3 How It Works -- 7.11 Hardware Sources -- 8 Completing Sentences -- 8.1 Introduction…”
    Libro electrónico
  10. 5130
    Publicado 2024
    Tabla de Contenidos: “…Attacks on IoT Software -- 8.3.2. Attacks on IoT Hardware -- 8.3.3. Types of Attacks on IoT Infrastructure -- 8.4. …”
    Libro electrónico
  11. 5131
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Decision Making Using Fuzzy Logic Using Multicriteria -- 1.1 Introduction -- 1.2 Fuzzy Logic -- 1.3 Decision Making -- 1.4 Literature Review -- 1.5 Conclusion -- Acknowledgment -- References -- Chapter 2 Application of Fuzzy Logic in the Context of Risk Management -- 2.1 Introduction -- 2.2 Objectives of Risk Management -- 2.3 Improved Risk Estimation -- 2.3.1 Point-Wise Calculations on a Curve -- 2.3.2 Estimation of a Curve -- 2.3.3 Accuracy in Quantification is Raised -- 2.3.4 The Problems with the Basic Quantification Approach -- 2.4 Threat at Quantification Matrix -- 2.4.1 Qualitative Matrix -- 2.4.2 Errors in Scaling -- 2.4.3 Band Width at Various Scales -- 2.5 Fundamental Definitions -- 2.5.1 Positioning Statement -- 2.5.2 Risk Under the Level of Tolerance -- 2.5.3 Risk Elimination -- 2.6 Fuzzy Logic -- 2.7 Risk Related to Fuzzy Matrix -- 2.8 Conclusion -- Bibliography -- Chapter 3 Use of Fuzzy Logic for Controlling Greenhouse Environment: A Study Through the Lens of Web Monitoring -- 3.1 Introduction -- 3.2 Design (Hardware) -- 3.2.1 Sensor for Measuring Soil Moisture -- 3.2.2 Sensor for Measuring Humidity and Temperature -- 3.3 Programming Arduino Mega Board -- 3.3.1 Fuzzification -- 3.3.2 Fuzzy Inference -- 3.3.3 Communication via Remote Connections and a Web Server -- 3.4 Implementation of a Prototype -- 3.5 Results -- 3.6 Conclusion -- Bibliography -- Chapter 4 Fuzzy Logics and Marketing Decisions -- 4.1 Introduction -- 4.2 Literature -- 4.2.1 Fuzzy Logic (FL) -- 4.2.2 FL Application in Marketing -- 4.2.2.1 Communication and Advertising -- 4.2.2.2 Customer Service and Satisfaction -- 4.2.2.3 Customer Segmentation -- 4.2.2.4 CRM -- 4.2.2.5 Pricing -- 4.2.2.6 Evaluation of a Product -- 4.2.2.7 Uncertainty in the Development of New Products…”
    Libro electrónico
  12. 5132
    por Umamaheswari, K.
    Publicado 2023
    Tabla de Contenidos: “…14.3 Summary of Anomaly Detections Techniques Using Machine Learning Algorithms -- 14.3.1 Data Dimension Reduction -- 14.3.2 Adaptability with Dynamic Data Changes -- 14.3.3 Correlation Exploitation -- 14.4 Experimental Results and Challenges of Machine Learning Approaches -- 14.4.1 Data Exploration -- 14.4.1.1 Pre-Processing and Dimensionality Reduction -- 14.4.1.2 Clustering -- 14.4.2 Outlier Detection -- 14.4.2.1 Neural Network -- 14.4.2.2 Support Vector Machine (SVM) -- 14.4.2.3 Bayesian Network -- 14.5 Performance Evaluation -- 14.6 Conclusion -- References -- Chapter 15 Unique and Random Key Generation Using Deep Convolutional Neural Network and Genetic Algorithm for Secure Data Communication Over Wireless Network -- 15.1 Introduction -- 15.2 Literature Survey -- 15.3 Proposed Work -- 15.4 Genetic Algorithm (GA) -- 15.4.1 Selection -- 15.4.2 Crossover -- 15.4.3 Mutation -- 15.4.4 ECDH Algorithm -- 15.4.5 ECDH Key Exchange -- 15.4.6 DCNN -- 15.4.7 Results -- 15.5 Conclusion -- References -- Part V: Automotive Applications -- Chapter 16 Review of Non-Recurrent Neural Networks for State of Charge Estimation of Batteries of Electric Vehicles -- 16.1 Introduction -- 16.2 Battery State of Charge Prediction Using Non.Recurrent Neural Networks -- 16.2.1 Feed-Forward Neural Network -- 16.2.2 Radial Basis Function Neural Network -- 16.2.3 Extreme Learning Machine -- 16.2.4 Support Vector Machine -- 16.3 Evaluation of Charge Prediction Techniques -- 16.3 Conclusion -- References -- Chapter 17 Driver Drowsiness Detection System -- 17.1 Introduction -- 17.2 Literature Survey -- 17.2.1 Reports on Driver's Fatigue Behind the Steering Wheel -- 17.2.2 Survey on Camera-Based Drowsiness Classification -- 17.2.3 Survey on Ear for Drowsy Detection -- 17.3 Components and Methodology -- 17.3.1 Software (Toolkit Used) -- 17.3.2 Hardware Components…”
    Libro electrónico
  13. 5133
    Publicado 2022
    “…It is also useful for software developers who want to discover the electronics/hardware world; anyone who has a hardware project idea and wants to bring it to the world; and anyone who wants to use fast prototyping for a hardware product using Arduino. …”
    Video
  14. 5134
    Publicado 2017
    “…The text starts with an overview and anatomy of IoT, ecosystem of IoT, communication protocols, networking, and available hardware, both present and future applications and transformations, and business models. …”
    Libro electrónico
  15. 5135
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface Second Edition -- Preface First Edition -- List of Contributors -- Chapter 1 Processing of Information in the Human Visual System -- 1.1 Preface -- 1.2 Design and Structure of the Eye -- 1.3 Optical Aberrations and Consequences for Visual Performance -- 1.4 Chromatic Aberration -- 1.5 Neural Adaptation to Monochromatic Aberrations -- 1.6 Optimizing Retinal Processing with Limited Cell Numbers, Space, and Energy -- 1.7 Adaptation to Different Light Levels -- 1.8 Rod and Cone Responses -- 1.9 Spiking and Coding -- 1.10 Temporal and Spatial Performance -- 1.11 ON/OFF Structure, Division of the Whole Illuminance Amplitude -- 1.12 Consequences of the Rod and Cone Diversity on Retinal Wiring -- 1.13 Motion Sensitivity in the Retina -- 1.14 Visual Information Processing in Higher Centers -- 1.14.1 Morphology -- 1.14.2 Functional Aspects - Receptive Field Structures and Cortical Modules -- 1.15 Effects of Attention -- 1.16 Color Vision, Color Constancy, and Color Contrast -- 1.17 Depth Perception -- 1.18 Adaptation in the Visual System to Color, Spatial, and Temporal Contrast -- 1.19 Conclusions -- Acknowledgements -- References -- Chapter 2 Introduction to Building a Machine Vision Inspection -- 2.1 Preface -- 2.2 Specifying a Machine Vision System -- 2.2.1 Task and Benefit -- 2.2.2 Parts -- 2.2.3 Part Presentation -- 2.2.4 Performance Requirements -- 2.2.5 Information Interfaces -- 2.2.6 Installation Space -- 2.2.7 Environment -- 2.2.8 Checklist -- 2.3 Designing a Machine Vision System -- 2.3.1 Camera Type -- 2.3.2 Field of View -- 2.3.3 Resolution -- 2.3.4 Choice of Camera, Frame Grabber, and Hardware Platform -- 2.3.5 Lens Design -- 2.3.6 Choice of Illumination -- 2.3.7 Mechanical Design -- 2.3.8 Electrical Design -- 2.3.9 Software -- 2.4 Costs -- 2.5 Words on Project Realization…”
    Libro electrónico
  16. 5136
    Publicado 2017
    Tabla de Contenidos: “…2.24.1.9 - Availability of Staff -- 2.24.2 - Factors Affecting the Military Maintenance System -- Chapter 3 - Aircraft Reliability and Maintainability Analysis and Design -- 3.1 - Reliability fundamental mathematics -- 3.1.1 - Density Function -- 3.1.2 - Failure Probability Function -- 3.1.3 - Failure Rate -- 3.1.4 - Reliability Function -- 3.1.5 - Bathtub Curve -- 3.1.6 - MTTF -- 3.2 - Some common failure distributions -- 3.2.1 - Exponential Distribution -- 3.2.2 - Weibull Distribution -- 3.2.3 - Normal Distribution -- 3.2.4 - Lognormal Distribution -- 3.2.5 - Summary of Often Used Distributions -- 3.3 - Binary system reliability models -- 3.3.1 - Series System -- 3.3.2 - Parallel System -- 3.3.3 - Standby Redundancy System -- 3.4 - Mechanical reliability-Stress-strength interference model -- 3.4.1 - Introduction of Theory -- 3.4.2 - Analytical Results -- 3.4.3 - Example -- 3.5 - Fuzzy reliability theory -- 3.5.1 - Irrationality of Conventional Reliability Theory -- 3.5.2 - Fuzzy Reliability Basic Theories -- 3.5.3 - Fuzzy Reliability -- 3.5.4 - Fuzzy Failure Rate -- 3.5.5 - Fuzzy MTBF -- 3.6 - Hardware reliability -- 3.6.1 - Failure Mechanisms and Damage Models -- 3.6.2 - Incorrect Mechanical Performance -- 3.6.3 - Incorrect Thermal Performance -- 3.6.4 - Incorrect Electrical Performance -- 3.6.5 - Electromagnetic Interference -- 3.6.6 - Particle Radiation -- 3.6.7 - Yield -- 3.6.8 - Buckling -- 3.6.9 - Fracture -- 3.6.10 - Interfacial Deadhesion -- 3.6.11 - Fatigue -- 3.6.12 - Creep -- 3.6.13 - Wear -- 3.6.14 - Aging Due to Interdiffusion -- 3.6.15 - Aging Due to Particle Radiation -- 3.6.16 - Other Forms of Aging -- 3.6.17 - Corrosion -- 3.6.18 - Metal Migration -- 3.7 - Maintainability analysis and design -- 3.7.1 - Definitions Used in Maintainability Engineering -- 3.7.2 - Measurements -- 3.7.3 - Maintainability Function…”
    Libro electrónico
  17. 5137
    Publicado 2019
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Biographies -- Foreword by Professor Sun -- Foreword by Professor Ouyang -- Series Preface -- Preface -- Chapter 1 Introduction -- 1.1 Background -- 1.2 Electric Vehicle Fundamentals -- 1.3 Requirements for Battery Systems in Electric Vehicles -- 1.3.1 Range Per Charge -- 1.3.2 Acceleration Rate -- 1.3.3 Maximum Speed -- 1.4 Battery Systems -- 1.4.1 Introduction to Electrochemistry of Battery Cells -- 1.4.1.1 Ohmic Overvoltage Drop -- 1.4.1.2 Activation Overvoltage -- 1.4.1.3 Concentration Overvoltage -- 1.4.2 Lead-Acid Batteries -- 1.4.3 NiCd and NiMH Batteries -- 1.4.3.1 NiCd Batteries -- 1.4.3.2 NiMH Batteries -- 1.4.4 Lithium‐Ion Batteries -- 1.4.5 Battery Performance Comparison -- 1.4.5.1 Nominal Voltage -- 1.4.5.2 Specific Energy and Energy Density -- 1.4.5.3 Capacity Efficiency and Energy Efficiency -- 1.4.5.4 Specific Power and Power Density -- 1.4.5.5 Self‐discharge -- 1.4.5.6 Cycle Life -- 1.4.5.7 Temperature Operation Range -- 1.5 Key Battery Management Technologies -- 1.5.1 Battery Modeling -- 1.5.2 Battery States Estimation -- 1.5.3 Battery Charging -- 1.5.4 Battery Balancing -- 1.6 Battery Management Systems -- 1.6.1 Hardware of BMS -- 1.6.2 Software of BMS -- 1.6.3 Centralized BMS -- 1.6.4 Distributed BMS -- 1.7 Summary -- References -- Chapter 2 Battery Modeling -- 2.1 Background -- 2.2 Electrochemical Models -- 2.3 Black Box Models -- 2.4 Equivalent Circuit Models -- 2.4.1 General n‐RC Model -- 2.4.2 Models with Different Numbers of RC Networks -- 2.4.2.1 Rint Model -- 2.4.2.2 Thevenin Model -- 2.4.2.3 Dual Polarization Model -- 2.4.2.4 n‐RC Model -- 2.4.3 Open Circuit Voltage -- 2.4.4 Polarization Characteristics -- 2.5 Experiments -- 2.6 Parameter Identification Methods -- 2.6.1 Offline Parameter Identification Method -- 2.6.2 Online Parameter Identification Method…”
    Libro electrónico
  18. 5138
    por Tripathi, Padmesh
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing -- 1.1 Introduction -- 1.2 Background Subtraction -- 1.3 Mathematics Behind Background Subtraction -- 1.4 Gaussian Mixture Model -- 1.4.1 Gaussian Mixture Model (GMM) Algorithm for Background Subtraction -- 1.4.2 Gaussian Mixture Model (GMM) Algorithm - A Simple Example -- 1.5 Principal Component Analysis -- 1.6 Applications -- 1.6.1 Military Surveillance -- 1.6.2 Visual Observation of Animals in Forests -- 1.6.3 Marine Surveillance -- 1.6.4 Defense Surveillance Systems -- 1.7 Conclusion -- References -- Chapter 2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing -- 2.1 Introduction -- 2.2 Moving Object Detection -- 2.3 Envisaging the Object Detection -- 2.3.1 Filtering Algorithm -- 2.3.2 Identification of Object Detection in Bad Weather Circumstance -- 2.3.3 Color Clustering -- 2.3.4 Dangerous Animal Detection -- 2.3.5 UAV Video End-of-Line Detection and Tracking in Live Traffic -- 2.3.5.1 Contextual Detection -- 2.3.5.2 Calculation of Location of a Car -- 2.3.6 Estimation of Crowd -- 2.3.7 Parking Lot Management -- 2.3.8 Public Automatic Anomaly Detection Systems -- 2.3.9 Modification of Robust Principal Component Analysis -- 2.3.10 Logistics Automation -- 2.3.11 Detection of Criminal Behavior in Humans -- 2.3.12 UAV Collision Avoidance and Control System -- 2.3.13 An Overview of Potato Growth Stages -- 2.4 Conclusion -- References -- Chapter 3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Data Preparation -- 3.2.2 Model Training -- 3.2.3 Hardware and Software Configuration -- 3.3 Result -- 3.4 Conclusion…”
    Libro electrónico
  19. 5139
    por Nartovich, Aleksandr
    Publicado 2004
    Tabla de Contenidos: “…Installation and configuration -- 3.1 Installation requirements -- 3.1.1 Hardware requirements -- 3.1.2 Software prerequisites -- 3.1.3 Installation user profile -- 3.1.4 Network setup -- 3.1.5 Optional software -- 3.2 Installing WebSphere Application Server V5.0 Enterprise Enablement -- 3.2.1 Graphical installation -- 3.2.2 Verifying WebSphere Application Server V5.0 Enterprise Enablement installation -- 3.2.3 Console installation -- 3.2.4 Silent installation with a response file -- 3.2.5 Installing the PTFs -- 3.3 Installing WebSphere Portal -- 3.3.1 Graphical installation -- 3.3.2 Console installation -- 3.3.3 Verifying the installation -- 3.4 Configuring a portal instance -- 3.4.1 Basic configuration -- 3.4.2 Creating a basic WebSphere Portal instance -- 3.4.3 Testing the instance -- 3.5 Uninstalling WebSphere Portal -- 3.5.1 Uninstalling the WebSphere Portal instance…”
    Libro electrónico
  20. 5140
    Publicado 2005
    Tabla de Contenidos: “…Installing SAP NetWeaver 2004s with DB2 UDB V8.2.2 -- 3.1 Test environment -- 3.1.1 Software configuration -- 3.1.2 Hardware configuration -- 3.2 SAP installation guides -- 3.3 System preparation -- 3.3.1 The Prerequisites Checker Tool -- 3.3.2 Checking conditions -- 3.3.3 Running modes…”
    Libro electrónico