Mostrando 1,761 - 1,780 Resultados de 3,267 Para Buscar '"minimal"', tiempo de consulta: 0.12s Limitar resultados
  1. 1761
    Tabla de Contenidos: “…France -- Les consommateurs restent confiants alors que l'optimisme des entreprises fléchit -- Les tensions inflationnistes sont minimes -- Le taux d'utilisation des capacités dépasse désormais sa moyenne de longue période -- L'emploi croît et le chômage recule lentement -- Emploi, revenus et inflation -- Indicateurs financiers -- Demande et production -- Indicateurs extérieurs -- Italie -- La croissance de la production s'est ralentie -- La consommation reste relativement faible -- Emploi, revenus et inflation -- Un affaiblissement de la compétitivité s'est produit -- Les conditions monétaires ont continué à s'assouplir -- Demande et production -- Indicateurs financiers -- Indicateurs extérieurs -- Royaume-Uni -- La croissance de la production se ralentit -- Le déficit de la balance commerciale s'est creusé -- Emploi, revenus et inflation -- Les bénéfices et la confiance des entreprises diminuent -- La politique budgétaire est devenue plus restrictive -- Indicateurs financiers -- Demande et production -- Indicateurs extérieurs -- Canada -- Le ralentissement de la croissance arrête la chute du chômage -- Le déficit extérieur se réduit malgré la détérioration des termes de l'échange -- Emploi, revenus et inflation -- Indicateurs extérieurs -- Les taux d'intérêt ont augmenté -- Mais la compétitivité s'est significativement améliorée -- Indicateurs financiers -- Demande et production -- Australie -- Baisse des prix des produits de base et du dollar australien -- Baisse de croissance des volumes d'exportation hors produits de base -- Demande, production et prix -- Autriche -- Le climat des affaires est moins optimiste, mais la confiance des consommateurs s'est améliorée -- L'emploi s'est développé -- Demande, production et prix -- Belgique -- Le chômage recule -- Les finances publiques s'améliorent -- Demande, production et prix -- Corée…”
    Libro electrónico
  2. 1762
    Tabla de Contenidos: “…Les liquidités sont abondantes et les écarts de taux minimes -- Graphique I.14. Les prix des matières premières et du transport augmentent rapidement -- Enjeux de politique macroéconomique -- A quel rythme la politique monétaire devrait-elle revenir à la neutralité ? …”
    Libro electrónico
  3. 1763
    Tabla de Contenidos: “…. -- La pénétration des pays en développement sur les marchés agricoles mondiaux a été minime -- Graphique I.17. Parts des exportations mondiales de marchandises, 1990-2000 -- Les pays de l'OCDE dominent le commerce agricole -- Les prix mondiaux des produits de base sont demeurés relativement bas -- Mise en œuvre de l'AACU -- L'AACU a marqué un tournant historique dans la réforme du système de commerce agricole -- Accès aux marchés -- En dépit de la tarification, les droits applicables aux produits agricoles demeurent élevés... -- Graphique I.18. …”
    Libro electrónico
  4. 1764
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Advances in GPU Research and Practice -- Copyright -- Dedication -- Contents -- List of Contributors -- Preface -- Acknowledgments -- Part 1: Programming and tools -- Chapter 1: Formal analysis techniques for reliable GPU programming: current solutions and call to action -- 1 GPUs in Support of Parallel Computing -- Bugs in parallel and GPU code -- 2 A quick introduction to GPUs -- Organization of threads -- Memory spaces -- Barrier synchronization -- Warps and lock-step execution -- Dot product example -- 3 Correctness issues in GPU programming -- Data races -- Lack of forward progress guarantees -- Floating-point accuracy -- 4 The need for effective tools -- 4.1 A Taxonomy of Current Tools -- 4.2 Canonical Schedules and the Two-Thread Reduction -- Race freedom implies determinism -- Detecting races: ``all for one and one for all'' -- Restricting to a canonical schedule -- Reduction to a pair of threads -- 4.3 Symbolic Bug-Finding Case Study: GKLEE -- 4.4 Verification Case Study: GPUVerify -- 5 Call to Action -- GPUs will become more pervasive -- Current tools show promise -- Solving basic correctness issues -- Equivalence checking -- Clarity from vendors and standards bodies -- User validation of tools -- Acknowledgments -- References -- Chapter 2: SnuCL: A unified OpenCL framework for heterogeneous clusters -- 1 Introduction -- 2 OpenCL -- 2.1 Platform Model -- 2.2 Execution Model -- 2.3 Memory Model -- 2.4 Synchronization -- 2.5 Memory Consistency -- 2.6 OpenCL ICD -- 3 Overview of SnuCL framework -- 3.1 Limitations of OpenCL -- 3.2 SnuCL CPU -- 3.3 SnuCL Single -- 3.4 SnuCL Cluster -- 3.4.1 Processing synchronization commands -- 4 Memory management in SnuCL Cluster -- 4.1 Space Allocation to Memory Objects -- 4.2 Minimizing Copying Overhead -- 4.3 Processing Memory Commands -- 4.4 Consistency Management…”
    Libro electrónico
  5. 1765
    Publicado 2017
    Tabla de Contenidos: “…4.2 - Maintenance analysis procedures -- 4.2.1 - The MSG Series Procedures -- 4.2.2 - Reliability-Centered Maintenance -- 4.2.3 - MSG-3 Logic -- 4.2.4 - Structures -- 4.2.5 - Fatigue Damage -- 4.2.6 - Environmental Deterioration -- 4.2.7 - Accidental Damage -- 4.2.8 - Systems and Power Plants -- 4.2.9 - Setting Task Frequencies/Intervals -- 4.3 - Statistical reliability assessment -- 4.4 - Logistic support analysis -- 4.4.1 - LSA Tasks -- 4.4.2 - Failure Mode Effect Analysis -- 4.5 - Fault tree analysis -- 4.5.1 - Qualitative Analysis of a Fault Tree -- 4.5.2 - Quantitative Analysis of a Fault Tree -- 4.6 - Level of repair analysis -- 4.7 - Logistic support analysis record -- 4.8 - LSA models -- 4.9 - Elements of ILS -- 4.10 - Support equipment -- 4.11 - Facilities -- 4.12 - Data -- Chapter 5 - Intelligent Structural Rating System Based on Back-Propagation Network -- 5.1 - Introduction -- 5.2 - Artificial neural network -- 5.2.1 - Basic Theory -- 5.2.2 - Back-Propagation Network -- 5.3 - Design BPN for AD -- 5.3.1 - BPN Configuration -- 5.3.2 - Case Study -- 5.4 - Discussion -- 5.4.1 - Selection of Number of Nodes in Hidden Layers and Parameter Ratio -- 5.4.2 - Selection of Training Algorithms -- 5.5 - Conclusions -- Chapter 6 - Fault Tree Analysis for Composite Structural Damage -- 6.1 - Introduction -- 6.2 - Basic principles of fault tree analysis -- 6.2.1 - Elements of FTA -- 6.2.2 - Boolean Algebra Theorems -- 6.3 - FTA for composite damage -- 6.4 - Qualitative analysis -- 6.4.1 - Minimal Cut Sets -- 6.4.2 - Structure Importance Analysis -- 6.4.3 - Probability Importance Analysis -- 6.4.4 - Relative Probability Importance Analysis -- 6.5 - Quantitative analysis -- 6.6 - Discussion -- 6.7 - Potential solutions -- 6.7.1 - Material Design -- 6.7.2 - Fabrication Process -- 6.7.3 - Personnel Training -- 6.7.4 - Surface Protection…”
    Libro electrónico
  6. 1766
    Publicado 2019
    Tabla de Contenidos: “…6.3.4 Constant Voltage Constant Current Constant Voltage Charging -- 6.3.5 Pulse Charging -- 6.3.6 Charging Termination -- 6.3.7 Comparison of Charging Algorithms for Lithium‐Ion Batteries -- 6.4 Optimal Charging Current Profiles for Lithium‐Ion Batteries -- 6.4.1 Energy Loss Modeling -- 6.4.2 Minimization of Energy Loss -- 6.5 Lithium Titanate Oxide Battery with Extreme Fast Charging Capability -- 6.6 Summary -- References -- Chapter 7 Battery Balancing -- 7.1 Background -- 7.2 Battery Sorting -- 7.2.1 Battery Sorting Based on Capacity and Internal Resistance -- 7.2.2 Battery Sorting Based on a Self‐organizing Map -- 7.3 Battery Passive Balancing -- 7.3.1 Fixed Shunt Resistor -- 7.3.2 Switched Shunt Resistor -- 7.3.3 Shunt Transistor -- 7.4 Battery Active Balancing -- 7.4.1 Balancing Criterion -- 7.4.2 Balancing Control -- 7.4.3 Balancing Circuits -- 7.4.3.1 Cell to Cell -- 7.4.3.2 Cell to Pack -- 7.4.3.3 Pack to Cell -- 7.4.3.4 Cell to Energy Storage Tank to Cell -- 7.4.3.5 Cell to Pack to Cell -- 7.5 Battery Active Balancing Systems -- 7.5.1 Active Balancing System Based on the SOC as a Balancing Criterion -- 7.5.1.1 Battery Balancing Criterion -- 7.5.1.2 Battery Balancing Circuit -- 7.5.1.3 Battery Balancing Control -- 7.5.1.4 Experimental Results -- 7.5.2 Active Balancing System Based on FL Controller -- 7.5.2.1 Balancing Principle -- 7.5.2.2 Design of FL Controller -- 7.5.2.3 Adaptability of FL Controller -- 7.5.2.4 Battery Balancing Criterion -- 7.5.2.5 Experimental Results -- 7.6 Summary -- References -- Chapter 8 Battery Management Systems in Electric Vehicles -- 8.1 Background -- 8.2 Battery Management Systems -- 8.2.1 Battery Parameter Acquisition Module -- 8.2.2 Battery System Balancing Module -- 8.2.3 Battery Information Management Module -- 8.2.4 Thermal Management Module -- 8.3 Typical Structure of BMSs -- 8.3.1 Centralized BMS…”
    Libro electrónico
  7. 1767
    Publicado 2023
    Tabla de Contenidos: “…Chapter 5 Functional and Non-Functional Requirements in Agile Software Development -- 5.1 Introduction -- 5.2 Agile Requirements Gathering -- 5.3 Types of Requirements -- 5.4 Functional Requirement Gathering -- 5.5 Non-Functional Requirement Gathering -- 5.6 Testing Functional and Non-Functional Requirements -- 5.7 Conclusion and Future Scope -- References -- Chapter 6 Minimizing Cost, Effort, and Implementation Complexity for Adopting Security Requirements in an Agile Development Process for Cyber-Physical Systems -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Methodology -- 6.4 Conclusion -- References -- Chapter 7 A Systematic Literature Review on Test Case Prioritization Techniques -- 7.1 The Motivation for Systematic Review -- 7.1.1 Existing Literature Reviews on Test Case Prioritization -- 7.1.2 Resources Used for SLR -- 7.1.3 Search Criteria -- 7.1.4 Research Questions -- 7.2 Results -- 7.2.1 What is the Current Status of Test Case Prioritization? …”
    Libro electrónico
  8. 1768
    por Shynk, John Joseph
    Publicado 2012
    Tabla de Contenidos: “…6.9 Markov Sequence -- 6.10 Markov Process -- 6.11 Random Sequences -- 6.11.1 Bernoulli Sequence -- 6.11.2 Bernoulli Scheme -- 6.11.3 Independent Sequences -- 6.11.4 Bernoulli Random Walk -- 6.11.5 Binomial Counting Sequence -- 6.12 Random Processes -- 6.12.1 Poisson Counting Process -- 6.12.2 Random Telegraph Signal -- 6.12.3 Wiener Process -- 6.12.4 Gaussian Process -- 6.12.5 Pulse Amplitude Modulation -- 6.12.6 Random Sine Signals -- Problems -- Further Reading -- 7 Stochastic Convergence, Calculus, and Decompositions -- 7.1 Introduction -- 7.2 Stochastic Convergence -- 7.3 Laws of Large Numbers -- 7.4 Central Limit Theorem -- 7.5 Stochastic Continuity -- 7.6 Derivatives and Integrals -- 7.7 Differential Equations -- 7.8 Difference Equations -- 7.9 Innovations and Mean-Square Predictability -- 7.10 Doob-Meyer Decomposition -- 7.11 Karhunen-Lo`eve Expansion -- Problems -- Further Reading -- 8 Systems, Noise, and Spectrum Estimation -- 8.1 Introduction -- 8.2 Correlation Revisited -- 8.3 Ergodicity -- 8.4 Eigenfunctions of RXX(τ) -- 8.5 Power Spectral Density -- 8.6 Power Spectral Distribution -- 8.7 Cross-Power Spectral Density -- 8.8 Systems with Random Inputs -- 8.8.1 Nonlinear Systems -- 8.8.2 Linear Systems -- 8.9 Passband Signals -- 8.10 White Noise -- 8.11 Bandwidth -- 8.12 Spectrum Estimation -- 8.12.1 Periodogram -- 8.12.2 Smoothed Periodogram -- 8.12.3 Modified Periodogram -- 8.13 Parametric Models -- 8.13.1 Autoregressive Model -- 8.13.2 Moving-Average Model -- 8.13.3 Autoregressive Moving-Average Model -- 8.14 System Identification -- Problems -- Further Reading -- 9 Sufficient Statistics and Parameter Estimation -- 9.1 Introduction -- 9.2 Statistics -- 9.3 Sufficient Statistics -- 9.4 Minimal Sufficient Statistic -- 9.5 Exponential Families -- 9.6 Location-Scale Families -- 9.7 Complete Statistic -- 9.8 Rao-Blackwell Theorem…”
    Libro electrónico
  9. 1769
    Publicado 2015
    Tabla de Contenidos: “…4.2.2 Likelihood Equations for Poisson Loglinear Model -- 4.2.3 The Key Role of the Mean-Variance Relation -- 4.2.4 Large-Sample Normal Distribution of Model Parameter Estimators -- 4.2.5 Delta Method Yields Covariance Matrix for Fitted Values -- 4.2.6 Model Misspecification: Robustness of GLMs with Correct Mean -- 4.3 Likelihood-Ratio/Wald/Score Methods of Inference for GLM Parameters -- 4.3.1 Likelihood-Ratio Tests -- 4.3.2 Wald Tests -- 4.3.3 Score Tests -- 4.3.4 Illustrating the Likelihood-Ratio, Wald, and Score Tests -- 4.3.5 Constructing Confidence Intervals by Inverting Tests -- 4.3.6 Profile Likelihood Confidence Intervals -- 4.4 Deviance of a GLM, Model Comparison, and Model Checking -- 4.4.1 Deviance Compares Chosen Model with Saturated Model -- 4.4.2 The Deviance for Poisson GLMs and Normal GLMs -- 4.4.3 Likelihood-Ratio Model Comparison Uses Deviance Difference -- 4.4.4 Score Tests and Pearson Statistics for Model Comparison -- 4.4.5 Residuals and Fitted Values Asymptotically Uncorrelated -- 4.4.6 Pearson, Deviance, and Standardized Residuals for GLMs -- 4.5 Fitting Generalized Linear Models -- 4.5.1 Newton-Raphson Method -- 4.5.2 Fisher Scoring Method -- 4.5.3 Newton-Raphson and Fisher Scoring for a Binomial Parameter -- 4.5.4 ML as Iteratively Reweighted Least Squares -- 4.5.5 Simplifications for Canonical Link Functions -- 4.6 Selecting Explanatory Variables for a GLM -- 4.6.1 Stepwise Procedures: Forward Selection and Backward Elimination -- 4.6.2 Model Selection: The Bias-Variance Tradeoff -- 4.6.3 AIC: Minimizing Distance of the Fit from the Truth -- 4.6.4 Summarizing Predictive Power: R-Squared and Other Measures -- 4.6.5 Effects of Collinearity -- 4.7 Example: Building a GLM -- 4.7.1 Backward Elimination with House Selling Price Data -- 4.7.2 Gamma GLM Has Standard Deviation Proportional to Mean…”
    Libro electrónico
  10. 1770
    Publicado 2017
    Tabla de Contenidos: “…6.2 The Effect of Offering a Choice of Modes -- 6.3 Getting People to Respond Online -- 6.4 Sequencing Different Modes of Data Collection -- 6.5 Separating the Effects of Mode on Selection and Reporting -- 6.5.1 Conceptualizing Mode Effects -- 6.5.2 Separating Observation from Nonobservation Error -- 6.5.2.1 Direct Assessment of Measurement Errors -- 6.5.2.2 Statistical Adjustments -- 6.5.2.3 Modeling Measurement Error -- 6.6 Maximizing Comparability Versus Minimizing Error -- 6.7 Conclusions -- References -- Chapter 7 Mobile Web Surveys: A Total Survey Error Perspective -- 7.1 Introduction -- 7.2 Coverage -- 7.3 Nonresponse -- 7.3.1 Unit Nonresponse -- 7.3.2 Breakoffs -- 7.3.3 Completion Times -- 7.3.4 Compliance with Special Requests -- 7.4 Measurement Error -- 7.4.1 Grouping of Questions -- 7.4.1.1 Question-Order Effects -- 7.4.1.2 Number of Items on a Page -- 7.4.1.3 Grids versus Item-By-Item -- 7.4.2 Effects of Question Type -- 7.4.2.1 Socially Undesirable Questions -- 7.4.2.2 Open-Ended Questions -- 7.4.3 Response and Scale Effects -- 7.4.3.1 Primacy Effects -- 7.4.3.2 Slider Bars and Drop-Down Questions -- 7.4.3.3 Scale Orientation -- 7.4.4 Item Missing Data -- 7.5 Links Between Different Error Sources -- 7.6 The Future of Mobile web Surveys -- References -- Chapter 8 The Effects of a Mid-Data Collection Change in Financial Incentives on Total Survey Error in the National Survey of Famil... -- 8.1 Introduction -- 8.2 Literature Review: Incentives in Face-to-Face Surveys -- 8.2.1 Nonresponse Rates -- 8.2.2 Nonresponse Bias -- 8.2.3 Measurement Error -- 8.2.4 Survey Costs -- 8.2.5 Summary -- 8.3 Data and Methods -- 8.3.1 NSFG Design: Overview -- 8.3.2 Design of Incentive Experiment -- 8.3.3 Variables -- 8.3.4 Statistical Analysis -- 8.4 Results -- 8.4.1 Nonresponse Error -- 8.4.2 Sampling Error and Costs -- 8.4.3 Measurement Error…”
    Libro electrónico
  11. 1771
    Publicado 2016
    Tabla de Contenidos: “…5.13.2 The Classics and Second Course Source -- 5.13.3 The Problem Books -- 5.13.4 Other Useful Sources -- 5.13.5 R for Probability -- 5.14 Complements, Problems, and Programs -- Chapter 6 Probability and Sampling Distributions -- 6.1 Introduction -- 6.2 Discrete Univariate Distributions -- 6.2.1 The Discrete Uniform Distribution -- 6.2.2 The Binomial Distribution -- 6.2.3 The Geometric Distribution -- 6.2.4 The Negative Binomial Distribution -- 6.2.5 Poisson Distribution -- 6.2.6 The Hypergeometric Distribution -- 6.3 Continuous Univariate Distributions -- 6.3.1 The Uniform Distribution -- 6.3.2 The Beta Distribution -- 6.3.3 The Exponential Distribution -- 6.3.4 The Gamma Distribution -- 6.3.5 The Normal Distribution -- 6.3.6 The Cauchy Distribution -- 6.3.7 The t-Distribution -- 6.3.8 The Chi-square Distribution -- 6.3.9 The F-Distribution -- 6.4 Multivariate Probability Distributions -- 6.4.1 The Multinomial Distribution -- 6.4.2 Dirichlet Distribution -- 6.4.3 The Multivariate Normal Distribution -- 6.4.4 The Multivariate t Distribution -- 6.5 Populations and Samples -- 6.6 Sampling from the Normal Distributions -- 6.7 Some Finer Aspects of Sampling Distributions -- 6.7.1 Sampling Distribution of Median -- 6.7.2 Sampling Distribution of Mean of Standard Distributions -- 6.8 Multivariate Sampling Distributions -- 6.8.1 Noncentral Univariate Chi-square, t, and F Distributions -- 6.8.2 Wishart Distribution -- 6.8.3 Hotellings T2 Distribution -- 6.9 Bayesian Sampling Distributions -- 6.10 Further Reading -- 6.11 Complements, Problems, and Programs -- Chapter 7 Parametric Inference -- 7.1 Introduction -- 7.2 Families of Distribution -- 7.2.1 The Exponential Family -- 7.2.2 Pitman Family -- 7.3 Loss Functions -- 7.4 Data Reduction -- 7.4.1 Sufficiency -- 7.4.2 Minimal Sufficiency -- 7.5 Likelihood and Information -- 7.5.1 The Likelihood Principle…”
    Libro electrónico
  12. 1772
    por Bijalwan, Anchit
    Publicado 2024
    Tabla de Contenidos: “…7.5 Conclusion and Future Works -- References -- Chapter 8 A Robust Authentication Technique for Client-Server Secure Login -- 8.1 Introduction -- 8.2 Preliminary Concept -- 8.2.1 Cryptography -- 8.2.2 Symmetric Key Algorithms -- 8.2.3 Asymmetric Key Algorithms -- 8.2.4 Hash Function -- 8.2.5 Key Exchange -- 8.3 Related Work -- 8.3.1 Transport Layer Security (TLS) Protocol -- 8.3.2 Kerberos -- 8.3.3 Secure Remote Password (SRP) Protocol -- 8.3.4 OAuth -- 8.3.5 Mutual Authentication -- 8.4 Proposed Technique -- 8.4.1 Key-Generation Phase -- 8.4.2 Registration Phase -- 8.4.3 Login Phase -- 8.4.4 Principles of the Algorithm -- 8.5 Implementation -- 8.6 Discussion -- 8.6.1 Security Analysis -- 8.6.2 Security Features and Performance Comparison -- 8.7 Conclusion -- References -- Chapter 9 Application of a Web-Based Food Ordering Platform to Minimize Food Wastage and Prevent Theft -- 9.1 Introduction -- 9.1.1 Background -- 9.1.2 The Food Wastage Issues in Cafeterias -- 9.1.3 Overcrowding and Long Queues in Cafeteria -- 9.1.4 Theft and Delivery Assurance -- 9.1.5 Scalability of Cafeteria Operations -- 9.1.6 Lack of Use of Technology in School Cafeteria -- 9.1.7 Problems with Traditional Software Architecture -- 9.2 Literature Review -- 9.2.1 The Current Food Wastage Problem in Cafeterias -- 9.2.2 Identifying Gaps to Overcome Overcrowding Issues in Cafeteria -- 9.2.2.1 Similar Food Ordering Solutions -- 9.2.3 Research Gaps -- 9.3 Methodology -- 9.3.1 Introduction -- 9.3.2 Feature Requirements -- 9.3.3 System Architecture Requirements -- 9.3.4 Technical Requirements -- 9.3.5 Infrastructure Design -- 9.3.6 Software Architecture -- 9.3.7 IoT Integrations -- 9.3.8 Database Schema -- 9.4 Discussion -- 9.4.1 Advantages -- 9.4.2 Limitations -- 9.4.3 Comparison to Other Implementations -- 9.5 Conclusion -- References -- Part 2: IT in the Textile Industry…”
    Libro electrónico
  13. 1773
    por Liang, Y.
    Publicado 2022
    Tabla de Contenidos: “…Loops -- 5.1 Introduction -- 5.2 The while Loop -- 5.3 Case Study: Guessing Numbers -- 5.4 Loop Design Strategies -- 5.5 Controlling a Loop with User Confirmation and Sentinel Value -- 5.6 The for Loop -- 5.7 Nested Loops -- 5.8 Minimizing Numerical Errors -- 5.9 Case Studies -- 5.10 Keywords break and continue -- 5.11 Case Study: Checking Palindromes -- 5.12 Case Study: Displaying Prime Numbers -- 5.13 Case Study: Random Walk -- Chapter 6. …”
    Libro electrónico
  14. 1774
    Publicado 2023
    Tabla de Contenidos: “…6.8.3.1 Blockchain Can Store Information Coming from IoT Devices -- 6.8.3.2 Secure Data Storage with Blockchain Distribution -- 6.8.3.3 Data Encryption via Hash Key and Tested by the Miners -- 6.8.3.4 Spoofing Attacks and Data Loss Prevention -- 6.8.3.5 Unauthorized Access Prevention Using Blockchain -- 6.8.3.6 Exclusion of Centralized Cloud Servers -- 6.9 Conclusions -- References -- Chapter 7 Deep Learning Approach to Industrial Energy Sector and Energy Forecasting with Prophet -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Methodology -- 7.3.1 Splitting of Data (Test/Train) -- 7.3.2 Prophet Model -- 7.3.3 Data Cleaning -- 7.3.4 Model Implementation -- 7.4 Results -- 7.4.1 Comparing Forecast to Actuals -- 7.4.2 Adding Holidays -- 7.4.3 Comparing Forecast to Actuals with the Cleaned Data -- 7.5 Conclusion and Future Scope -- References -- Chapter 8 Application of Novel AI Mechanism for Minimizing Private Data Release in Cyber-Physical Systems -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Proposed Mechanism -- 8.4 Experimental Results -- 8.5 Future Directions -- 8.6 Conclusion -- References -- Chapter 9 Environmental and Industrial Applications Using Internet of Things (IoT) -- 9.1 Introduction -- 9.2 IoT-Based Environmental Applications -- 9.3 Smart Environmental Monitoring -- 9.3.1 Air Quality Assessment -- 9.3.2 Water Quality Assessment -- 9.3.3 Soil Quality Assessment -- 9.3.4 Environmental Health-Related to COVID-19 Monitoring -- 9.4 Applications of Sensors Network in Agro-Industrial System -- 9.5 Applications of IoT in Industry -- 9.5.1 Application of IoT in the Autonomous Field -- 9.5.2 Applications of IoT in Software Industries -- 9.5.3 Sensors in Industry -- 9.6 Challenges of IoT Applications in Environmental and Industrial Applications -- 9.7 Conclusions and Recommendations -- Acknowledgments -- References…”
    Libro electrónico
  15. 1775
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Media Files Table of Contents -- Chapter 1: Setting Up Snow Leopard -- Show Me: Media 1.1-Setting Network Preferences -- Show Me: Media 1.2-Changing Your User Account Password -- Tell Me More: Media 1.3-Creating Strong Passwords -- Chapter 2: Getting Comfortable with Snow Leopard -- Show Me: Media 2.1-Creating a User Account -- Show Me: Media 2.2-Deleting a User Account -- Show Me: Media 2.3-Setting Up Fast User Switching -- Tell Me More: Media 2.4-Inappropriate Use of Automatic Login -- Chapter 3: Getting Familiar with Your Hardware -- Tell Me More: Media 3.1-Trackpad Gestures -- Show Me: Media 3.2-Using the System Profiler -- Show Me: Media 3.3-Installing a Printer -- Chapter 4: Tailoring the Desktop to Your Liking -- Tell Me More: Media 4.1-Creating Neutral Space in a Photo -- Show Me: Media 4.2-Hiding the Dock -- Show Me: Media 4.3-Adding the Eject Button to Menu Extras -- Show Me: Media 4.4-Using the Mosaic Effect in a Screen Saver -- Chapter 5: Making Use of Support Resources -- Show Me: Media 5.1-Searching for Text in a Help Article -- Tell Me More: Media 5.2-Boolean Operators -- Show Me: Media 5.3-Scheduling a Callback from an Apple Expert -- Show Me: Media 5.4-Making an Appointment at the Genius Bar -- Chapter 6: Managing Applications and Files -- Tell Me More: Media 6.1-Contrasting Two Methods for Minimizing Windows -- Show Me: Media 6.2-Using Spaces -- Show Me: Media 6.3-Customizing Views in the Finder -- Show Me: Media 6.4-Creating a Smart Folder -- Show Me: Media 6.5-Adding Spotlight Comments to Files -- Show Me: Media 6.6-Using Other Features of Spotlight -- Show Me: Media 6.7-Copying Files by Dragging -- Show Me: Media 6.8-Moving Files by Dragging -- Chapter 7: Browsing the Web -- Tell Me More: Media 7.1-Setting Safari Preferences -- Show Me: Media 7.2-Customizing Top Sites…”
    Vídeo online
  16. 1776
    por Ganegedara, Thushan
    Publicado 2022
    Tabla de Contenidos: “…Deep networks in the real world -- 6 Teaching machines to see: Image classification with CNNs -- 6.1 Putting the data under the microscope: Exploratory data analysis -- 6.1.1 The folder/file structure -- 6.1.2 Understanding the classes in the data set -- 6.1.3 Computing simple statistics on the data set -- 6.2 Creating data pipelines using the Keras ImageDataGenerator -- 6.3 Inception net: Implementing a state-of-the-art image classifier -- 6.3.1 Recap on CNNs -- 6.3.2 Inception net v1 -- 6.3.3 Putting everything together -- 6.3.4 Other Inception models -- 6.4 Training the model and evaluating performance -- Summary -- Answers to exercises -- 7 Teaching machines to see better: Improving CNNs and making them confess -- 7.1 Techniques for reducing overfitting -- 7.1.1 Image data augmentation with Keras -- 7.1.2 Dropout: Randomly switching off parts of your network to improve generalizability -- 7.1.3 Early stopping: Halting the training process if the network starts to underperform -- 7.2 Toward minimalism: Minception instead of Inception…”
    Libro electrónico
  17. 1777
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  18. 1778
    por Gatti, Rathishchandra R.
    Publicado 2023
    Tabla de Contenidos: “…1.6.12 Challenges Related to Energy Harvesting Techniques -- 1.6.13 Generic Energy Generator -- 1.6.14 Hybrid Energy Sources -- 1.6.15 Cooperation Among Different Energy Sources -- 1.6.16 Energy Storage -- 1.6.17 Intelligent Prediction Model for Amount of Harvested Energy -- 1.6.18 Focus on Energy Generator for Underwater and Underground Applications -- 1.7 Conclusion -- References -- Chapter 2 Self-Powered Wireless Sensor Networks in Cyber Physical System -- 2.1 Introduction -- 2.2 Wireless Sensor Networks in CPS -- 2.3 Architecture of WSNs with Energy Harvesting -- 2.4 Energy Harvesting for WSN -- 2.5 Energy Harvesting Due to Mechanical Vibrations -- 2.6 Piezoelectric Generators -- 2.7 Piezoelectric Materials -- 2.8 Types of Piezoelectric Structures -- 2.8.1 Nanogenerators -- 2.8.2 Piezoelectric Nanogenerators -- 2.8.3 Triboelectric Nanogenerators -- 2.8.4 Pyroelectric Nanogenerators -- 2.8.5 Thermoelectric Nanogenerator -- 2.9 Hybridized Nanogenerators for Energy Harvesting -- 2.10 Conclusion -- References -- Chapter 3 The Emergence of Cyber-Physical System in the Context of Self-Powered Soft Robotics -- 3.1 Introduction -- 3.2 Actuators and Its Types -- 3.2.1 Nature of Actuation -- 3.2.1.1 Actuators Based on Thermal Materials -- 3.2.1.2 Actuators Based on Pressure -- 3.2.1.3 Actuators Based on Photo Responsivity -- 3.2.1.4 Actuators Based on Explosive Function -- 3.2.1.5 Electric Actuation Methods -- 3.3 Soft Actuator Electrodes -- 3.4 Sensors -- 3.5 Soft Robotic Structures and Control Methods -- 3.6 Soft Robot Applications -- 3.7 Future Scope -- 3.8 Conclusion -- References -- Chapter 4 Dynamic Butterfly Optimization Algorithm-Based Task Scheduling for Minimizing Energy Consumption in Distributed Green Data Centers -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 Green Data Centers -- 4.2.2 Energy-Aware Task Scheduling…”
    Libro electrónico
  19. 1779
    Publicado 2022
    Tabla de Contenidos: “…8.2.4.2 ML-based classification comparison -- 8.2.4.3 Benefits of using a single OSA -- 8.2.4.4 Benefits of feature transformation for classification -- 8.2.4.5 Failure localization -- 8.2.5 Conclusions -- 8.3 Residual-based spectrum monitoring -- 8.3.1 Residual-based approach for optical spectrum analysis -- 8.3.2 Facilitating ML algorithm deployment using residual signals -- 8.3.3 Illustrative results -- 8.3.3.1 Comparison of residual-based and feature-based approaches -- 8.3.3.2 The efficiency of residual adaptation mechanism -- 8.3.4 Conclusions -- 8.4 Monitoring of filterless optical networks -- 8.4.1 Motivation of optical monitoring in FONs -- 8.4.2 Signal identification and classification -- 8.4.3 Optical signal tracking -- 8.4.3.1 Feature-based tracking -- Individual feature -- Super features -- 8.4.3.2 Residual-based tracking -- 8.4.4 Illustrative results -- 8.4.4.1 PAM4 scenario -- 8.4.4.2 QPSK scenario -- 8.4.5 Conclusions -- 8.5 Concluding remarks and future work -- List of acronyms -- References -- 9 Machine learning and data science for low-margin optical networks -- 9.1 The shape of networks to come -- 9.2 Current QoT margin taxonomy and design -- 9.3 Generalization of optical network margins -- 9.3.1 Optimal spectral efficiency -- 9.3.2 Field margins -- 9.3.3 Uncertainty margins -- 9.3.4 Unallocated and implementation margins -- 9.3.5 Protection margins -- 9.3.6 Total spectral efficiency margin and QoT margin equivalency -- 9.4 Large scale assessment of margins and their time variations in a deployed network -- 9.4.1 Assessing the quality of transmission -- 9.4.2 Description of the dataset -- 9.4.3 Example of SNR variations in time -- 9.4.4 Distributions of the minimal, maximal and median margins for all connections in the dataset -- 9.4.5 System margins and long term performance variations…”
    Libro electrónico
  20. 1780
    Publicado 2013
    Tabla de Contenidos: “…-- 3.1.2 Long-term Goals - Short-term Actions and Transitions -- 3.1.3 The Cradle to Cradle Principles -- 3.1.4 Complementary Metabolisms -- 3.2 Product Certification Program Overview -- 3.2.1 Certification Levels -- 3.2.2 Program Categories -- 3.2.3 The Cradle to Cradle CertifiedCM Marks -- 3.3 Product Certification Overview -- 3.3.1 Scope -- 3.3.2 Continuous Improvement and Optimization -- 3.3.3 Material Health -- 3.3.4 Material Reutilization -- 3.3.5 Renewable Energy and Carbon Management -- 3.3.6 Water Stewardship -- 3.3.7 Social Fairness -- 3.3.8 Certification Program Summary -- Notes and References -- China's Implementation of Alternatives Assessment in the Building Industry: GIGA -- 4.1 Introduction -- 4.2 China Context -- 4.2.1 Health -- 4.2.2 Barriers to Health -- 4.3 Resurgence of Health -- 4.3.1 Trust as a Catalyst -- 4.3.2 Wealth as a Catalyst -- 4.3.3 Access to Information as a Catalyst -- 4.4 Social Media and the Rebuilding of Trust -- 4.4.1 Perfect Storm of Change -- 4.5 Minimization Versus Regeneration in China -- 4.5.1 Regenerative Chemistry -- 4.6 GIGA (Green Ideas, Green Actions) -- 4.6.1 GIGA: the User's Perspective -- 4.6.2 GIGA: Green Algorithm -- 4.6.3 GIGA: Unpacking Alternatives Assessment -- 4.7 Impact: Process -- 4.8 Alternatives Assessment at Scale -- 4.9 Conclusion -- References -- A Collaborative Industry and University Alternative Assessment of Plasticizers for Wire and Cable -- 5.1 Background -- 5.2 Project Workplan -- 5.3 Selection of a Chemical/Chemical Class of Concern and Application -- 5.4 Pilot Project Team Formation -- 5.5 Screening Against the Red List…”
    Libro electrónico