Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2801Publicado 2024Tabla de Contenidos: “…3.5.5 Logarithmic normalization -- 3.6 Data integration -- 3.6.1 Consolidation -- 3.6.2 Federation -- 3.7 Summary -- References -- 4 Machine learning -- 4.1 Introduction -- 4.2 Machine Learning paradigms -- 4.2.1 Supervised learning -- 4.2.2 Unsupervised learning -- 4.2.3 Semisupervised learning -- 4.3 Inductive bias -- 4.4 Evaluating a classifier -- 4.4.1 Evaluation steps -- 4.4.1.1 Validation -- 4.4.1.2 Testing -- 4.4.1.3 K-fold crossvalidation -- 4.4.2 Handling unbalanced classes -- 4.4.3 Model generalization -- 4.4.3.1 Underfitting -- 4.4.3.2 Overfitting -- 4.4.3.3 Accurate fittings…”
Libro electrónico -
2802Publicado 2018Tabla de Contenidos: “…The Canadian International Development Agency (CIDA) -- The Swedish International Development Cooperation Agency (Sida) -- The United States Agency for International Development (USAID) -- Policy isomorphism in security and development -- Micro-level processes: influence on donors -- Catalytic policy processes -- Decoupling and autonomy from rest of government -- Security sector reform, aid, and micro-level processes -- Notes -- References -- Part III Globalization's influence on aid agencies -- 6 Processes of globalization: Linking micro and macro -- Gaps in world society explanations of diffusion and uniformity -- Micro-level social processes of world polity influence -- Internalization and certification -- Embeddedness in civil society -- Bureaucratic activism -- Catalytic policy drivers -- Autonomy from rest of government/Ministry of Foreign Affairs -- Making macro-micro linkages -- References -- 7 The globalization of aid: Conclusions on consensus -- Consensus revisited -- Implications for research -- World polity and the nation-state -- Development assistance motivations -- Social processes and the politics of globalization -- Implications for foreign aid actors -- Implications for donor agencies -- Implications for donor-country civil society -- Implications for governments and civil society in recipient countries -- Further inquiry into 'emerging global consensus' -- Additional donors to validate qualitative findings -- The globalization of development assistance policy: impact on the developing world -- Social processes of globalization in the world society / nation-state relationship -- Conclusions on consensus -- References -- Methodological appendix -- Index…”
Libro electrónico -
2803por Kaltmeier, OlafTabla de Contenidos: “…Introduction: Biodiversity and the Anthropocene in Latin America from the Mid‐Nineteenth Century to 1950 -- References -- Biodiversity in the Southern Cone from the Mid‐Nineteenth Century to 1950 -- Environmental Knowledge -- Extracting Plants and Animals -- Agriculture and Rural Colonization -- Forestry and Deforestation -- Cattle and Animal Husbandry -- Fish Farming -- Neobiotic Transformations -- The Protection of Biodiversity -- Impacting Socio‐Biodiversity: Conquest, Colonization, and First Acceleration -- References -- Biodiversity in the Andes from the Mid‐Nineteenth Century to 1950 -- Naming, Controlling, and Classifying the Biodiversity of the Tropical Andes -- Exploiting Biodiversity: Plantations and Extractive Enclaves -- Coast -- Sierra -- Eastern Piedmont -- Biodiversity and Andean Subsistence Agriculture -- Domestication Processes -- The Advance over the Agricultural Frontier -- Conservation Strategies and the Development of Protected Areas -- Conclusions -- References -- Biodiversity in the Amazon from the Mid‐Nineteenth Century to 1950 -- Amazon: The Gestation of a World -- Collections and Commerce: Amazonian Biodiversity as Economic and Scientific Value in Validating New Scientific Theories -- Prospecting Amazonian Biodiversity -- The "Goblin of the Amazon" -- Final Considerations -- References -- Biodiversity in Mesoamerica from the Mid‐Nineteenth Century to 1950 -- The Clash between Two Models of Relationship with Nature -- Two Ways to Relate to Biodiversity: Mesoamerican Civilization vs. …”
Publicado 2024
Libro electrónico -
2804por National Research Council (U.S.).Tabla de Contenidos: “…Hazard Identification of Chemical Mixtures -- Indication of Bioavailability of Chemicals at Hazardous-Waste Sites -- Water-Quality Monitoring -- Indicators of Air Pollution -- Risk Characterization of Species Under Study -- Dose-Response Relationships -- Contamination of Human Food Chain -- IN SITU STUDIES -- Fish -- Planarians -- Starlings -- Earthworms -- Honey Bees -- SUMMARY -- 6 Animal Sentinels in Risk Assessment -- USE OF ANIMAL SENTINEL SYSTEMS IN EXPOSURE ASSESSMENT -- Animals as General Environmental Monitors -- Animals as Monitors of Their Own Exposure -- Animals as Monitors of Exposure of Their Consumers -- Animals as Surrogate Monitors of Human Exposure -- USE OF ANIMAL SENTINEL SYSTEMS IN HAZARD IDENTIFICATION -- Early Warnings: Initial Identification of Hazardous Agents -- Hazard Identification for Chemical Mixtures -- USE OF ANIMAL SENTINEL SYSTEMS IN DOSE-RESPONSE ASSESSMENT -- USE OF ANIMAL SENTINEL SYSTEMS IN RISK CHARACTERIZATION -- Risks to Animal Species Under Study -- Risk to Consumers of Animal Species Under Study -- Risk to Humans: Animal Sentinels as Surrogates -- USE OF ANIMAL SENTINEL SYSTEMS IN RISK MANAGEMENT -- Management of Risks to Animal Species Under Study -- Management of Risks to Consumers of Animal Species Under Study -- Management of Risks to Human Health: Animal Sentinels as Surrogates -- Animal Sentinel Systems as Monitors of Effectiveness of Risk Management Actions -- SUMMARY -- 7 Selection and Application of Animal Sentinel Systems in Risk Assessment -- SYSTEM DESIGN -- IMPLEMENTATION -- VALIDATION -- PROGRAM INTEGRATION -- 8 Conclusions and Recommendations -- References -- Appendix Workshop Participants…”
Publicado 1991
Libro electrónico -
2805por National Research Council (U.S.).Tabla de Contenidos: “…Reverse Dot Hybridization -- Other Detection Methods -- Use of Kits -- Prospects of PCR-Based Methods -- NATIONAL COMMITTEE ON FORENSIC DNA TYPING -- SUMMARY OF RECOMMENDATIONS -- REFERENCES -- 3 DNA Typing: Statistical Basis for Interpretation -- ESTIMATING THE POPULATION FREQUENCY OF A DNA PATTERN -- Estimating Frequencies of DNA Patterns by Counting -- Estimating Frequencies of DNA Patterns with the Multiplication Rule(Product Rule) -- Validity of Multiplication Rule and Population Substructure -- Basis of Concern About Population Substructure -- Assessing Population Substructure Requires Direct Sampling of EthnicGroups -- The Ceiling Principle: Accounting for Population Substructure -- DETERMINING ALLELE FREQUENCIES IN A POPULATION DATABANK -- IMPLICATIONS OF GENETIC CORRELATIONS AMONG RELATIVES -- IMPLICATIONS OF INCREASED POWER OF DNA TYPING COMPARED WITH CONVENTIONALSEROLOGY -- LABORATORY ERROR RATES -- TOWARD A FIRM FOUNDATION FOR STATISTICAL INTERPRETATION -- Population Studies to Set Ceiling Frequencies -- Reporting of Statistical Results -- Openness of Population Databanks -- Reporting of Laboratory Error Rates -- SUMMARY OF RECOMMENDATIONS -- REFERENCES -- 4 Ensuring High Standards -- DEFINING THE PRINCIPLES OF QUALITY ASSURANCE -- POTENTIAL METHODS FOR ENSURING QUALITY -- Certification of Individuals -- Laboratory Accreditation -- Licensing of Laboratories -- Funding Contingent On Adherence to Standards -- QUALITY ASSURANCE IN RELATED FIELDS -- INITIAL EFFORTS TOWARD ESTABLISHING STANDARDS IN FORENSIC DNA TYPING -- A REGULATORY PROGRAM FOR DNA TYPING -- Components of a Suitable Program -- The Role of Professional Organizations -- The Role of Government -- Support for Education, Training, and Research -- SUMMARY OF RECOMMENDATIONS -- REFERENCES -- 5 Forensic DNA Databanks and Privacy of Information…”
Publicado 1992
Libro electrónico -
2806Publicado 2013Tabla de Contenidos: “…Hydrophilic Interaction Chromatography (HILIC) for Drug Discovery 5.1 Drug Discovery Model 5.2 HILIC Applications for in vitro Biology 5.2.1 Biological screening and hit finding 5.2.1.1 Target selection and assay validation 5.2.1.2 High-throughput screening 5.2.2 New drug discovery strategies 5.3 HILIC Applications and Advances for Discovery Chemistry 5.3.1 Lead identification 5.3.2 Lead optimization 5.3.2.1 ADME profile 5.3.2.2 Biopharmaceutics 5.3.2.3 Chiral purity 5.3.3 Candidate selection 5.4 Practical Considerations 5.5 Conclusions Chapter 6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2807Publicado 2021Tabla de Contenidos: “…Bypassing JavaScript Validation -- SQL Injection -- Querying the Database -- Bypassing the Login Page -- Execute Database Commands Using SQLi -- SQL Injection Automation with SQLMap -- Testing for SQL Injection -- Command Injection -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Request Forgery -- The Attacker Scenario -- The Victim Scenario -- File Upload -- Simple File Upload -- Bypassing Validation -- Encoding -- OWASP Top 10 -- Summary -- Chapter 9 Web Penetration Testing and Secure Software Development Lifecycle -- Web Enumeration and Exploitation -- Burp Suite Pro -- Web Pentest Using Burp Suite -- More Enumeration -- Nmap -- Crawling -- Vulnerability Assessment -- Manual Web Penetration Testing Checklist -- Common Checklist -- Special Pages Checklist -- Secure Software Development Lifecycle -- Analysis/Architecture Phase -- Application Threat Modeling -- Assets -- Entry Points -- Third Parties -- Trust Levels -- Data Flow Diagram -- Development Phase -- Testing Phase -- Production Environment (Final Deployment) -- Summary -- Chapter 10 Linux Privilege Escalation -- Introduction to Kernel Exploits and Missing Configurations -- Kernel Exploits -- Kernel Exploit: Dirty Cow -- SUID Exploitation -- Overriding the Passwd Users File -- CRON Jobs Privilege Escalation -- CRON Basics -- Crontab -- Anacrontab -- Enumerating and Exploiting CRON -- sudoers -- sudo Privilege Escalation -- Exploiting the Find Command -- Editing the sudoers File -- Exploiting Running Services -- Automated Scripts -- Summary -- Chapter 11 Windows Privilege Escalation -- Windows System Enumeration -- System Information -- Windows Architecture -- Listing the Disk Drives -- Installed Patches -- Who Am I? …”
Libro electrónico -
2808Publicado 2018Tabla de Contenidos: “…Installing Angular Flex Layout -- Layout basics -- Flex Layout APIs for DOM containers -- Flex Layout APIs for DOM elements -- Flex Layout APIs for any element -- Adding Material Components to your app -- Angular Material schematics -- Modifying landing page with Material Toolbar -- Representing weather in Material Card -- Accessibility -- Card header and content -- Material typography -- Applying typography -- Updating the tagline as center-aligned caption -- Updating Current Weather card layout -- Implementing Layout Scaffolding -- Aligning elements -- Styling elements -- Fine-tuning styles -- Tweaking to match design -- Updating unit tests -- Custom themes -- Advanced themes -- Updating Angular Material -- Take stock of your current versions -- Check on the latest available versions -- Updating Angular Material -- Summary -- Chapter 6: Reactive Forms and Component Interaction -- Interactive prototype -- MockFlow WireFramePro -- Building the mock-up -- Home screen -- Search results -- Settings pane -- Adding interactivity -- Exporting the functional prototype -- Searching with user input -- Adding Angular Reactive Forms -- Adding and verifying components -- Adding search to weather service -- Implementing search -- Limiting user inputs with throttle/debounce -- Implementing input validation and error messaging -- Template driven forms with two-way binding -- Enabling component interaction -- Global events -- Child-parent relationships with event emitters -- Parent-child relationships with input binding -- Sibling interactions with subjects -- Summary -- Chapter 7: Create a Router-First Line-of-Business App -- Angular cheat sheet -- Binding -- Built-in directives -- Common pipes -- Starter commands, major components, and CLI scaffolds -- Configure Angular CLI autocomplete -- Router-first architecture -- Creating LemonMart…”
Libro electrónico -
2809Publicado 2021Tabla de Contenidos: “…-- Adding SQLite to DataService -- Leveraging a Micro ORM to simplify data access -- Adding Dapper to the project -- Updating the data service's initialization -- Retrieving data via services -- Performing data validation with MVVM -- Summary -- Questions -- Section 2: Extending WinUI and Modernizing Applications -- Chapter 7: Fluent Design System for Windows Applications -- Technical requirements -- What is the Fluent Design System? …”
Libro electrónico -
2810por Ratchev, SvetanTabla de Contenidos: “…Corrected Target Locations -- 5.2 Relationship Between Failures and TRE -- 5.3 Tighter Tolerances -- 6 Conclusions -- 7 Disclaimer -- References -- Assembly Cells and Systems -- Development of a Sensitive Winding Application Based on a Serial Robot and Integrated Torque Sensors -- 1 Introduction and Approach of the Problem -- 2 State of the Art of the Winding Application -- 3 Process Development -- 3.1 Winding Process -- 3.2 Feedback Control System -- 3.3 Measurement Concept -- 4 Implementation and Validation -- 5 Summary and Outlook -- References -- High-Load Titanium Drilling Using an Accurate Robotic Machining System -- 1 Introduction -- 2 Related Works -- 3 Accurate Robot Architecture -- 3.1 Kinematic Model -- 3.2 Spindle -- 3.3 Pressure Foot -- 3.4 Additional Sensors/Data Sources/Systems -- 3.5 Programmable Drilling Parameters -- 4 Industrial Applications -- 5 Experimental Methods -- 6 Results and Discussion -- 6.1 Dynamometer Results -- 6.2 Hole Quality -- 7 Conclusions -- References -- Application of Advanced Simulation Methods for the Tolerance Analysis of Mechanical Assemblies -- 1 Introduction -- 2 Tolerance Modelling -- 2.1 Case Study -- 2.2 Assembly Models -- 2.3 Probability of Defected Products and Limit State Function -- 3 Advanced Simulation Methods -- 3.1 Crude Monte Carlo -- 3.2 Latin Hypercube Simulation Method -- 3.3 Quasi Monte Carlo Simulation Based on Sobol' Sequence -- 3.4 Subset Simulation Method -- 4 Results and Discussion -- 5 Conclusions -- References -- Development of a Low-Cost, High Accuracy, Flexible Panel Indexing Cell with Modular, Elastic Architecture -- 1 Introduction -- 2 Objectives…”
Publicado 2021
Libro electrónico -
2811Publicado 2016Tabla de Contenidos: “…Introduction -- The TDD Development Cycle -- Test Framework -- Test Automation -- Installing the Unity Framework -- Exercise 11.1 Test Driven Development -- Adding the Unity Test Framework -- Configuring the Project Build Targets -- Adding the Test Cases -- Automating the TDD Cycle -- Testing RTOS Threads -- Exercise 11.2 Testing RTOS Threads -- Decoupling Low Level Functions -- Testing Interrupts -- Exercise 11.3 Testing with Interrupts -- Conclusion -- 12 Software Components -- Introduction -- CMSIS Driver -- CMSIS Driver API -- Exercise 12.1 CMSIS-Driver -- Driver Validation -- Exercise 12.2 Driver Validation -- Designing a Software Component -- Exercise 12.3 GPS Component -- Creating a Software Pack -- Software Pack Structure -- Software Pack Utilities -- Configuration Wizard -- Exercise 12.4 Configuration Wizard -- Deploying Software Components -- Conclusion -- 13 ARMv8-M -- Introduction -- Common Architectural Enhancements -- ARMv8 Baseline Enhancements -- ARMv8-M Mainline Enhancements -- TrustZone -- Interrupts and Exceptions -- Software Development -- Compiler -- Real-Time Operating System -- Debugger -- Cortex Microcontroller Software Interface Standard -- Conclusion -- Appendix -- Contact Details -- Appendices -- Debug Tools and Software -- Commercial GNU-Based Toolchains -- Commercial Toolchains -- Rapid Prototyping and Evaluation Modules -- Real-Time Operating Systems -- Digital Signal Processing -- Books -- Programming -- Cortex-M Processor -- Standards -- Digital Signal Processing -- Real-Time Operating System -- Silicon Vendors -- Training -- Index -- Back Cover…”
Libro electrónico -
2812Publicado 2016Tabla de Contenidos: “…-- Chapter 7 Types, Masks, and Triggers -- Access Table Settings -- Field Data Formats -- Text fields -- Number and currency fields -- Date/time fields -- Yes/No fields -- Gaining Control of Data Entry -- You really need to put a mask on those fields -- To require or not to require -- Making your data toe the line with validation -- Give Your Fingers a Mini Vacation by Default -- Part III Data Management Mania -- Chapter 8 A Form for All Reasons -- Generating Forms -- Keeping it simple: Form tools -- Granting most wishes: The Form Wizard -- Customizing Form Parts -- Taking the Layout view -- The theme's the thing -- Managing form controls -- Managing Data in Form View -- Navigating and finding records -- Saving, clearing, and deleting -- Chapter 9 Importing and Exporting Data -- Retrieving Data from Other Sources -- Translating file formats -- Importing and linking -- Hit the Road, Data -- Export formats -- Exporting table or query data -- Exporting a Report to PDF -- Chapter 10 Automatic Data Editing -- Please Read This First! …”
Libro electrónico -
2813Publicado 2023Tabla de Contenidos: “…. -- Performing entity validation -- How to do it... -- How it works... -- There's more... -- Deleting an entity -- How to do it... -- How it works... -- Chapter 7: Creating Forms with the Form API -- Technical requirements -- Creating a custom form and saving configuration changes -- How to do it... -- How it works... -- There's more... -- See also -- Validating form data -- Getting ready -- How to do it... -- How it works... -- See also -- Specifying conditional form elements -- How to do it... -- How it works... -- Using AJAX in a Drupal form -- How to do it... -- How it works... -- There's more... -- See also -- Customizing existing forms in Drupal -- How to do it... -- How it works... -- Chapter 8: Plug and Play with Plugins -- Technical requirements -- Creating blocks using plugins -- How to do it... -- How it works... -- There's more... -- See also -- Creating a custom field type -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a custom field widget -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a custom field formatter -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a custom plugin type -- How to do it... -- How it works... -- There's more... -- Chapter 9: Creating Custom Entity Types -- Technical requirements -- Using custom classes for entity bundles -- Getting started -- How to do it... -- How it works... -- See also -- Creating a configuration entity type -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
2814Publicado 2024Tabla de Contenidos: “…-- Chapter 5: Designing Authentication and Authorization -- Technical requirements -- Designing an auth workflow -- JWT life cycle -- TypeScript operators for safe data handling -- Null and undefined checking -- The conditional or ternary operator -- The null coalescing operator -- The nullish coalescing operator -- Optional chaining -- Implementing data entities and interfaces -- Classes, Interfaces, and Enums -- Reusable services leveraging OOP concepts -- Creating an auth service -- Implement an abstract auth service -- Abstract functions -- A cache service using localStorage -- Caching the JWT -- An in-memory auth service -- Simple login -- Logout -- Resuming a JWT session -- An HTTP interceptor -- Summary -- Further reading -- Questions -- Chapter 6: Implementing Role-Based Navigation -- Technical requirements -- Dynamic UI components and navigation -- Implementing the login component -- Conditional navigation -- Common validations for forms -- UI service using environment provider -- Side navigation -- Role-based routing using guards -- Route guards -- Auth guards -- Auth service fake and common testing providers -- A Firebase authentication recipe -- Create a Firebase application…”
Libro electrónico -
2815Publicado 2024Tabla de Contenidos: “…Vertex ML Metadata -- Vertex AI Experiments -- Vertex AI Debugging -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Maintaining ML Solutions -- MLOps Maturity -- MLOps Level 0: Manual/Tactical Phase -- MLOps Level 1: Strategic Automation Phase -- MLOps Level 2: CI/CD Automation, Transformational Phase -- Retraining and Versioning Models -- Triggers for Retraining -- Versioning Models -- Feature Store -- Solution -- Data Model -- Ingestion and Serving -- Vertex AI Permissions Model -- Custom Service Account -- Access Transparency in Vertex AI -- Common Training and Serving Errors -- Training Time Errors -- Serving Time Errors -- TensorFlow Data Validation -- Vertex AI Debugging Shell -- Summary -- Exam Essentials -- Review Questions -- Chapter 14 BigQuery ML -- BigQuery - Data Access -- BigQuery ML Algorithms -- Model Training -- Model Evaluation -- Prediction -- Explainability in BigQuery ML -- BigQuery ML vs. …”
Libro electrónico -
2816Publicado 2017Tabla de Contenidos: “…. -- Using Windows to write a Raspbian image to an SD card -- How to do it... -- Using OS X to validate a Raspbian image and write it to an SD card -- How to do it... -- Using Ubuntu 16.04 to validate a Raspbian image and write it to an SD card -- How to do it... -- Identifying RCA solder points for analog video connections -- Getting ready -- How to do it... -- Adding a USB extension over a USB OTG connector -- Getting ready -- How to do it... -- Connecting to displays and changing the configuration settings -- Getting ready -- How to do it... -- Initial Pi configuration -- Logging in to the RPZ desktop for the first time, creating users, and rebooting -- How to do it... -- There's more... -- Chapter 2: Setting Up Physical and Wireless Connections -- Introduction -- Controlling the RPZ from the UART GPIO port using the console cable -- Getting ready -- How to do it... -- Adding Wi-Fi dongle over USB OTG -- Getting ready -- How to do it... -- Hacking RPZ hardware to add up permanent Wi-Fi dongle -- Getting ready -- How to do it... -- Setting Up dynamic and static IP address for RPZ -- Getting ready -- How to do it... -- Pinging from another computer over same network -- Getting ready -- How to do it... -- SSHing your RPZ from your desktop computer -- Getting ready -- How to do it... -- Sharing a screen on your desktop computer -- Getting ready -- How to do it...…”
Libro electrónico -
2817Publicado 2017Tabla de Contenidos: “…-- APIs versus SDKs -- Dependency management -- Android -- iOS -- Available APIs -- An iOS app proving our hypotheses, MoviUber -- Hypothesis -- Validating the idea through customer interviews -- Let's build an app -- Movie locations -- Uber -- IMDB -- Displaying locations on a map -- Uber integration -- Enriching the data -- Look! …”
Libro electrónico -
2818Publicado 2023Tabla de Contenidos: “…3 Dataset and Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Implementation of a Novel Fully Convolutional Network Approach to Detect and Classify Cyber-Attacks on IoT Devices in Smart Manufacturing Systems -- 1 Introduction -- 2 Preprocessing of Datasets -- 3 Results and Analysis -- 4 Conclusions -- References -- Application of ARIMA-LSTM for Manufacturing Decarbonization Using 4IR Concepts -- 1 Introduction -- 2 Related Work on ARIMA-LSTM -- 3 Methodology -- 3.1 Data Set and Processing -- 3.2 Auto-regressive Integrated Moving Average (ARIMA) -- 3.3 Long Short-Term Memory (LSTM) -- 3.4 Hybrid ARIMA-LSTM -- 3.5 Predictive Evaluation Indicators Validation -- 4 Results -- 5 Conclusion -- References -- Online Path Planning in a Multi-agent-Controlled Manufacturing System -- 1 Introduction -- 2 Manufacturing Scenario -- 3 Design and Implementation -- 4 Conclusion -- References -- Assessing Visual Identification Challenges for Unmarked and Similar Aircraft Components -- 1 Introduction -- 2 Related Work and State of the Art -- 3 Assessing Identification Challenges - Methodology -- 4 Application of Methodology to Use-Cases -- 4.1 Use-Case 1 - Type-Identification of Bushings -- 4.2 Use-Case 2 - Identification of Tubes -- 5 Discussion -- 6 Conclusion and Outlook -- References -- Projecting Product-Aware Cues as Assembly Intentions for Human-Robot Collaboration -- 1 Introduction -- 2 Related Work -- 3 Research Objectives, Setting and Scope -- 4 Theoretical Background -- 4.1 Oriented Minimum Bounding Boxes -- 4.2 Camera and Projector Model -- 5 Methods -- 5.1 Estimating Intrinsic and Extrinsic Parameters -- 5.2 Digital Thread Framework -- 5.3 Product Design Environment -- 5.4 Intent Projection -- 6 Experimental Results and Observations -- 6.1 Occlusions -- 6.2 Bounding Boxes for Intent Projection -- 6.3 Digital Thread Framework…”
Libro electrónico -
2819Publicado 2019Tabla de Contenidos: “…Fedorov 17.1 Introduction 375 17.2 Integrated Background Heat Sink Approaches 376 17.3 Solid-State Cooling 384 17.4 Passive Cooling: Phase Change Material Regeneration Concerns 393 References 409 18 Thermal Modeling and Model Validation for 3D Stacked ICs 413; Herman Oprins, Federica Maggioni, Vladimir Cherman, Geert Van der Plas, and Eric Beyne 18.1 Introduction 413 18.2 Modeling Methods for the Thermal Analysis of 3D Integrated Structures 413 18.3 3D Stacked Thermal Test Vehicles 421 18.4 Experimental Valid…”
Libro electrónico -
2820Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- Chapter 1 Reliability Indices of a Computer System with Priority and Server Failure -- 1.1 Introduction -- 1.2 Some Fundamentals -- 1.2.1 Reliability -- 1.2.2 Mean Time to System Failure (MTSF) -- 1.2.3 Steady State Availability -- 1.2.4 Redundancy -- 1.2.5 Semi-Markov Process -- 1.2.6 Regenerative Point Process -- 1.3 Notations and Abbreviations -- 1.4 Assumptions and State Descriptions -- 1.5 Reliability Measures -- 1.5.1 Transition Probabilities -- 1.5.2 MST -- 1.5.3 Reliability and MTCSF -- 1.5.4 Availability -- 1.5.5 Expected Number of Hardware Repairs -- 1.5.6 Expected Number of Software Upgradations -- 1.5.7 Expected Number of Treatments Given to the Server -- 1.5.8 Busy Period of Server Due to H/w Repair -- 1.5.9 Busy Period of Server Due to Software Upgradation -- 1.6 Profit Analysis -- 1.7 Particular Case -- 1.8 Graphical Presentation of Reliability Indices -- 1.9 Real-Life Application -- 1.10 Conclusion -- References -- Chapter 2 Mathematical Modeling and Availability Optimization of Turbine Using Genetic Algorithm -- 2.1 Introduction -- 2.2 System Description, Notations, and Assumptions -- 2.2.1 System Description -- 2.2.2 Notations -- 2.2.3 Assumptions -- 2.3 Mathematical Modeling of the System -- 2.4 Optimization -- 2.4.1 Genetic Algorithm -- 2.5 Results and Discussion -- 2.6 Conclusion -- References -- Chapter 3 Development of Laplacian Artificial Bee Colony Algorithm for Effective Harmonic Estimator Design -- 3.1 Introduction -- 3.2 Problem Formulation of Harmonics -- 3.3 Development of Laplacian Artificial Bee Colony Algorithm -- 3.3.1 Basic Concepts of ABC -- 3.3.2 The Proposed LABC Algorithm -- 3.4 Discussion -- 3.5 Numerical Validation of Proposed Variant -- 3.5.1 Comparative Analysis of LABC with Other Meta-Heuristics…”
Libro electrónico