Mostrando 121 - 140 Resultados de 257 Para Buscar '343 Industries', tiempo de consulta: 0.10s Limitar resultados
  1. 121
    por López Eguilaz, Máxima Juliana
    Publicado 2015
    Tabla de Contenidos: “…EL SISTEMA DE CIENCIA Y TECNOLOGÍA (...); 3.4.3. ANALOGÍAS Y PARTICULARIDADES (...); 4 EL SECTOR PÚBLICO EN CIENCIA (...)…”
    Libro electrónico
  2. 122
    por Porto, Edgard
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  3. 123
    por Petrozzi, Sergio
    Publicado 2012
    Tabla de Contenidos: “…3.3.6 Non-statistical Methods of Estimation3.3.7 Expressing Analytical Results; 3.3.8 Significant Figures - "Box-and-Dot" Method; 3.3.9 Outlier Tests; 3.4 Regression; 3.4.1 Regression Analysis; 3.4.2 Calibration Function; 3.4.3 The "Optimal" Trend Line; 3.4.4 Linear Regression; 4: The Analytical Process; 4.1 The Analytical Process in the Overall Context; 4.2 Planning Phase; 4.2.1 Analytical Problem; 4.2.2 Object of Investigation; 4.2.3 Sample; 4.2.4 Sampling; 4.2.5 Examination Procedures; 4.2.6 Analyte; 4.2.7 Literature and Database Research; 4.3 Analysis; 4.3.1 Measurement…”
    Libro electrónico
  4. 124
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  5. 125
    por Rabinovich, Michael
    Publicado 2002
    Libro electrónico
  6. 126
    Publicado 2023
    Tabla de Contenidos: “…3.3.2 Leadership Compared to Management -- 3.3.3 Politics, Power, and Getting Things Done -- 3.3.4 Personality -- 3.4 Performing Integration -- 3.4.1 Performing Integration at the Process Level -- 3.4.2 Integration at the Cognitive Level -- 3.4.3 Integration at the Context Level -- 3.4.4 Integration and Complexity -- 4. …”
    Libro electrónico
  7. 127
    Publicado 2019
    Tabla de Contenidos:
    Libro electrónico
  8. 128
    por Weilkiens, Tim
    Publicado 2007
    Libro electrónico
  9. 129
    por Sanromán Aranda, Roberto
    Publicado 2008
    Tabla de Contenidos: “…5.5 Elementos constitutivos del concepto de obligación -- 5.5.1 Nacimiento de la obligación fiscal -- 5.5.2 Elementos de la obligación fiscal -- 5.6 Derechos y obligaciones de los contribuyentes -- 5.6.1 Derechos -- 5.6.2 Obligaciones -- 5.7 Potestad tributaria del Estado y delitos fiscales -- 5.8 Autoridades fiscales -- Actividades de aprendizaje -- Capítulo 6 Comercio exterior e inversión extranjera -- 6.1 Comercio exterior -- 6.2 Legislación en materia de comercio exterior -- 6.2.1 Medidas arancelarias -- 6.2.2 Medidas de regulación no arancelaria -- 6.3 Prácticas desleales de comercio internacional -- 6.4 Los incoterms en el comercio internacional -- 6.5 Arbitraje internacional -- 6.6 Inversión extranjera -- 6.6.1 Actividades reservadas al Estado -- 6.6.2 Actividades reservadas a nacionales -- 6.6.3 Actividades con un porcentaje de inversión extranjera son las siguientes -- 6.6.4 Actividades con un porcentaje mayor de inversión extranjera que requieren resolución favorable de la Comisión Nacional de Inversión Extranjera -- Capítulo 7 Propiedad intelectual -- 7.1 Derechos de autor -- 7.1.1 Ley Federal de Derecho de Autor -- 7.2 Propiedad industrial -- 7.2.1 Ley de Propiedad Industrial (27 de junio de 1991) -- 7.2.2 Invenciones, modelos de utilidad y diseños industriales -- 7.2.3 Signos distintivos -- 7.2.4 Franquicia -- 7.2.5 Secreto industrial -- Actividades de aprendizaje -- Capítulo 8 Derecho laboral y legislación aplicable -- 8.1 Contenido del derecho laboral -- 8.2 La relación laboral y su origen -- 8.3 Formas de contratación -- 8.3.1 Contrato individual -- 8.3.2 Contrato colectivo de trabajo -- 8.3.3 Contrato ley -- 8.4 Suspensión de la relación laboral -- 8.4.1 Rescisión de la relación de trabajo -- 8.4.2 Causas de rescisión laboral sin responsabilidad para el trabajador -- 8.4.3 Causas de terminación de las relaciones de trabajo…”
    Libro electrónico
  10. 130
    por Kapil, Sheeba
    Publicado 2011
    Libro electrónico
  11. 131
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Chapter 1: Paralysis support system using IoT -- 1.1 Introduction -- 1.2 Literature review -- 1.3 Proposed healthcare system -- 1.4 System architecture -- 1.4.1 ESP32-NODE MCU -- 1.4.2 Gyro and accelerometer sensor -- 1.4.3 RF module -- 1.4.4 Encoder and decoder -- 1.4.5 LCD display -- 1.4.6 Arduino IDE -- 1.5 Results and discussion -- 1.6 Conclusion and future scope -- References -- Chapter 2: Blockchain and its applications: A review -- 2.1 Introduction -- 2.2 Blockchain architecture -- 2.3 Working of blockchain -- 2.4 Application -- 2.4.1 Healthcare -- 2.4.2 Education -- 2.4.3 Insurance -- 2.4.4 E-Commerce -- 2.4.5 Transportation -- 2.4.6 Industry of strength -- 2.5 Conclusion -- References -- Chapter 3: Data analytics tools for smart cities and smart towns -- 3.1 Introduction -- 3.2 The concept of big data analytics -- 3.3 The concept of smart cities -- 3.3.1 Data storage in smart cities -- 3.4 Need for data analytics in smart cities -- 3.4.1 Reliability -- 3.4.2 Transport -- 3.4.3 Planning -- 3.4.4 Future proofing -- 3.4.5 Effective spending -- 3.4.6 Sustainability -- 3.5 Data analytics tools -- 3.6 Data analytics tools for smart cities and towns -- 3.6.1 Hadoop -- 3.6.2 Map Reduce -- 3.6.3 Apache storm -- 3.6.4 Apache spark -- 3.6.5 Apache Flink -- 3.6.6 Flume -- 3.7 Conclusion -- References -- Chapter 4: Industrial Internet of Things and its applications in Industry 4.0 through sensor integration for a process parameter monitor and control -- 4.1 Introduction -- 4.2 Problem statement -- 4.3 Objective -- 4.4 Related works -- 4.4.1 Inferences through the survey -- 4.5 Existing methodology -- 4.5.1 Level process station -- 4.5.2 Monitoring and control of level process -- 4.5.3 SCADA…”
    Libro electrónico
  12. 132
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Preface -- Acknowledgements -- Contents -- Chapter 1: Sustainable Development of Recent High-Rise Timber Buildings -- 1.1 Introduction -- 1.2 Recent High-Rise Timber Buildings -- 1.3 GHGs -- 1.4 Assessment Criteria -- 1.5 Construction Cost -- 1.6 Fire Safety -- 1.7 Building Height -- 1.8 Conclusions -- References -- Chapter 2: Ultralight Membrane Structures Toward a Sustainable Environment -- 2.1 Introduction -- 2.2 Engineering Design of Ultralightweight Membrane Structures -- 2.2.1 Structural and Material Efficiency Through Tensile State -- 2.2.2 Boundary-Tensioned Membrane Structures -- 2.2.3 Pneumatic Membrane Structures -- 2.2.4 Structural Design Optimization Challenges and Opportunities -- 2.3 Membrane Materials -- 2.3.1 Fabrics and Foils -- 2.3.2 Thermomechanical Response of Structural Membranes -- 2.3.3 Constitutive Modeling Challenges and Opportunities -- 2.4 Sustainability of Membrane Structures -- 2.4.1 Embodied Energy and Material Consumption -- 2.4.2 Recyclability -- 2.4.3 Thermal Properties Challenges and Opportunities -- 2.5 Conclusions -- References -- Chapter 3: Development of Sustainable Concrete Using Treated Bamboo Reinforcement -- 3.1 Introduction -- 3.2 Possibility and Potential for Bamboo -- 3.3 Methodology -- 3.4 Results of Tested Bamboo-Reinforced Concrete Beams -- 3.4.1 Results of Pullout Tests -- 3.4.2 Load-Deflection Behavior of Bamboo-Reinforced Concrete Beams -- 3.4.3 Ductility, Stiffness, and Energy Absorption of Bamboo-Reinforced Concrete Beams -- 3.5 Conclusions -- References -- Chapter 4: Implementation of Circular Economy Between Mining and Construction Sectors: A Promising Route to Achieve Sustainable Development Goals -- 4.1 Introduction -- 4.2 Mine Waste Management and Environmental Issues -- 4.2.1 Mining Industry and Waste Generation -- 4.2.2 Environmental Risks Related to Mine Waste…”
    Libro electrónico
  13. 133
    por Farahani, Shahin
    Publicado 2008
    Tabla de Contenidos: “…3.2.8 The Service Primitives3.2.9 PHY Packet Format; 3.2.10 Summary of the PHY Layer Responsibilities; 3.3 IEEE 802.15.4 MAC Layer; 3.3.1 Beacon-Enabled Operation and Superframe Structure; 3.3.2 The Interframe Spacing; 3.3.3 CSMA-CA; 3.3.4 MAC Services; 3.3.5 The MAC Frame Format; 3.3.6 The MAC Promiscuous Mode of Operation; 3.3.7 Summary of the MAC Layer Responsibilities; 3.4 The ZigBee NWK Layer; 3.4.1 Broadcasting; 3.4.2 Multicasting; 3.4.3 Many-to-One Communication; 3.4.4 Hierarchical (Tree) Topology; 3.4.5 Mesh Topology; 3.4.6 Routing; 3.4.7 Route Discovery…”
    Libro electrónico
  14. 134
    Publicado 2023
    Tabla de Contenidos: “…The case of implicit preference modeling -- 3.4.3. Step-by-step application -- 3.5. References -- Chapter 4. …”
    Libro electrónico
  15. 135
    Publicado 2023
    Tabla de Contenidos: “…In the Laboratory -- 6.1 Industrial Laboratory -- 6.2 Professional Laboratory -- 6.3 Processing Yourself: Black-and-White -- 6.3.1 Overview: Negative Processing -- 6.3.2 Chemicals -- 6.3.3 Hardware…”
    Libro electrónico
  16. 136
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…Engagement with representatives of industry -- 1.6. Financial resources -- 1.6.1. The case for investing in health promotion and disease prevention -- 1.6.2. …”
    Libro electrónico
  17. 137
    Publicado 2022
    Libro
  18. 138
    Publicado 2022
    Libro electrónico
  19. 139
    Publicado 2011
    Tabla de Contenidos: “…12 ADVANCES IN DATA MINING 328 -- 12.1 Graph Mining 329 -- 12.2 Temporal Data Mining 343 -- 12.3 Spatial Data Mining (SDM) 357 -- 12.4 Distributed Data Mining (DDM) 360 -- 12.5 Correlation Does Not Imply Causality 369 -- 12.6 Privacy, Security, and Legal Aspects of Data Mining 376 -- 12.7 Review Questions and Problems 381 -- 12.8 References for Further Study 382 -- 13 GENETIC ALGORITHMS 385 -- 13.1 Fundamentals of GAs 386 -- 13.2 Optimization Using GAs 388 -- 13.3 A Simple Illustration of a GA 394 -- 13.4 Schemata 399 -- 13.5 TSP 402 -- 13.6 Machine Learning Using GAs 404 -- 13.7 GAs for Clustering 409 -- 13.8 Review Questions and Problems 411 -- 13.9 References for Further Study 413 -- 14 FUZZY SETS AND FUZZY LOGIC 414 -- 14.1 Fuzzy Sets 415 -- 14.2 Fuzzy-Set Operations 420 -- 14.3 Extension Principle and Fuzzy Relations 425 -- 14.4 Fuzzy Logic and Fuzzy Inference Systems 429 -- 14.5 Multifactorial Evaluation 433 -- 14.6 Extracting Fuzzy Models from Data 436 -- 14.7 Data Mining and Fuzzy Sets 441 -- 14.8 Review Questions and Problems 443 -- 14.9 References for Further Study 445 -- 15 VISUALIZATION METHODS 447 -- 15.1 Perception and Visualization 448 -- 15.2 Scientifi c Visualization and -- Information Visualization 449 -- 15.3 Parallel Coordinates 455 -- 15.4 Radial Visualization 458 -- 15.5 Visualization Using Self-Organizing Maps (SOMs) 460 -- 15.6 Visualization Systems for Data Mining 462 -- 15.7 Review Questions and Problems 467 -- 15.8 References for Further Study 468 -- Appendix A 470 -- A.1 Data-Mining Journals 470 -- A.2 Data-Mining Conferences 473 -- A.3 Data-Mining Forums/Blogs 477 -- A.4 Data Sets 478 -- A.5 Comercially and Publicly Available Tools 480 -- A.6 Web Site Links 489 -- Appendix B: Data-Mining Applications 496 -- B.1 Data Mining for Financial Data Analysis 496 -- B.2 Data Mining for the Telecomunications Industry 499 -- B.3 Data Mining for the Retail Industry 501 -- B.4 Data Mining in Health Care and Biomedical Research 503 -- B.5 Data Mining in Science and Engineering 506.…”
    Libro electrónico
  20. 140
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…SHA-256 -- 6.6 Blockchain Technology Applications -- 6.6.1 Blockchain Technology in the Healthcare Industry -- 6.6.2 Stock Market Uses of Blockchain Technology -- 6.6.3 Financial Exchanges in Blockchain Technology -- 6.6.4 Blockchain in Real Estate -- 6.6.5 Blockchain in Government -- 6.6.6 Other Opportunities in the Industry -- 6.7 Difficulties -- 6.8 Conclusion -- References -- Chapter 7 Explainable Artificial Intelligence for Cybersecurity -- 7.1 Introduction -- 7.1.1 Use of AI in Cybersecurity -- 7.1.2 Limitations of AI -- 7.1.3 Motivation to Integrate XAI to Cybersecurity -- 7.1.4 Contributions -- 7.2 Cyberattacks -- 7.2.1 Phishing Attack -- 7.2.1.1 Spear Phishing -- 7.2.1.2 Whaling -- 7.2.1.3 Smishing -- 7.2.1.4 Pharming -- 7.2.2 Man-in-the-Middle (MITM) Attack -- 7.2.2.1 ARP Spoofing -- 7.2.2.2 DNS Spoofing -- 7.2.2.3 HTTPS Spoofing -- 7.2.2.4 Wi-Fi Eavesdropping -- 7.2.2.5 Session Hijacking -- 7.2.3 Malware Attack -- 7.2.3.1 Ransomware -- 7.2.3.2 Spyware -- 7.2.3.3 Botnet -- 7.2.3.4 Fileless Malware -- 7.2.4 Denial-of-Service Attack -- 7.2.5 Zero-Day Exploit -- 7.2.6 SQL Injection…”
    Libro electrónico