Mostrando 361 - 380 Resultados de 466 Para Buscar 'Maps to the Stars', tiempo de consulta: 0.12s Limitar resultados
  1. 361
    Publicado 2020
    Libro electrónico
  2. 362
    por óes, Isabel
    Publicado 2019
    Electrónico
  3. 363
    Publicado 2016
    Tabla de Contenidos: “…Front Cover -- Thermofluid Modeling for Energy Efficiency Applications -- Copyright Page -- Contents -- List of Contributors -- Preface -- 1 Performance Evaluation of Hybrid Earth Pipe Cooling with Horizontal Piping System -- 1.1 Introduction -- 1.2 Earth Pipe Cooling Technology -- 1.3 Green Roof System -- 1.4 Experimental Design and Measurement -- 1.5 Model Description -- 1.5.1 Modeling Equation -- 1.5.2 Geometry of the Model -- 1.5.3 Mesh Generation -- 1.5.4 Solver Approach -- 1.6 Results and Discussion -- 1.7 Conclusion -- Acknowledgments -- References -- 2 Thermal Efficiency Modeling in a Subtropical Data Center -- 2.1 Introduction -- 2.2 CFD Modeling of Data Center -- 2.2.1 Simulation Approach -- 2.2.2 Modeling Equations -- 2.3 Data Center Description -- 2.4 Results and Discussion -- 2.4.1 Experimental -- 2.4.2 Simulations Results -- 2.4.2.1 Data Center Room and Rack Thermal Maps -- 2.4.2.2 Static Pressure Map -- 2.4.2.3 Air Flow Paths -- 2.5 CRAC Performance -- 2.6 Conclusions and Recommendations -- Nomenclature -- References -- 3 Natural Convection Heat Transfer in the Partitioned Attic Space -- 3.1 Introduction -- 3.2 Problem Formulation -- 3.3 Numerical Approach and Validation -- 3.4 Results and Discussions -- 3.4.1 Development of Coupled Thermal Boundary Layer -- 3.4.2 Effect of Geometry Configuration -- 3.4.3 Effect of Rayleigh Number -- 3.5 Conclusions -- References -- 4 Application of Nanofluid in Heat Exchangers for Energy Savings -- 4.1 Introduction -- 4.2 Types of Nanoparticles and Nanofluid Preparation -- 4.3 Application of Nanofluid in Heat Exchangers -- 4.4 Physical Model and Boundary Values -- 4.5 Governing Equations -- 4.6 Thermal and Fluid Dynamic Analysis -- 4.7 Thermophysical Properties of Nanofluid -- 4.7.1 Thermal Conductivity -- 4.7.2 Dynamic Viscosity -- 4.7.3 Density -- 4.7.4 Specific Heat -- 4.8 Numerical Method…”
    Libro electrónico
  4. 364
    Publicado 2014
    Libro electrónico
  5. 365
    Publicado 2018
    Electrónico
  6. 366
    por Hall, Vincent Austin
    Publicado 2024
    Tabla de Contenidos: “…Defining the environment - where your code calls home -- 4. Mapping user interaction - charting the navigation flow -- 5. …”
    Libro electrónico
  7. 367
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
    Libro electrónico
  8. 368
    por Södergård, Caj
    Publicado 2021
    Libro electrónico
  9. 369
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Attacks on Deployed AI -- Chapter 7: Evasion Attacks against Deployed AI -- Fundamentals of evasion attacks -- Importance of understanding evasion attacks -- Reconnaissance techniques for evasion attacks -- Perturbations and image evasion attack techniques -- Evasion attack scenarios -- One-step perturbation with FGSM -- Basic Iterative Method (BIM) -- Jacobian-based Saliency Map Attack (JSMA) -- Carlini and Wagner (C&amp -- W) attack -- Projected Gradient Descent (PGD) -- Adversarial patches - bridging digital and physical evasion techniques -- NLP evasion attacks with BERT using TextAttack -- Attack scenario - sentiment analysis -- Attack example -- Attack scenario - natural language inference -- Attack example -- Universal Adversarial Perturbations (UAPs) -- Attack scenario -- Attack example -- Black-box attacks with transferability -- Attack scenario -- Attack example -- Defending against evasion attacks -- Mitigation strategies overview -- Adversarial training -- Input preprocessing -- Model hardening techniques -- Model ensembles -- Certified defenses -- Summary -- Chapter 8: Privacy Attacks - Stealing Models -- Understanding privacy attacks -- Stealing models with model extraction attacks -- Functionally equivalent extraction -- Learning-based model extraction attacks -- Generative student-teacher extraction (distillation) attacks -- Attack example against our CIFAR-10 CNN -- Defenses and mitigations -- Prevention measures -- Detection measures -- Model ownership identification and recovery -- Summary -- Chapter 9: Privacy Attacks - Stealing Data -- Understanding model inversion attacks -- Types of model inversion attacks -- Exploitation of model confidence scores -- GAN-assisted model inversion -- Example model inversion attack -- Understanding inference attacks -- Attribute inference attacks -- Meta-classifiers…”
    Libro electrónico
  10. 370
    por Bröcher, Joachim
    Publicado 2021
    Libro electrónico
  11. 371
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- N10-008 Exam Objectives -- Objective Map -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Introduction to Networks -- First Things First: What's a Network? …”
    Libro electrónico
  12. 372
    Publicado 2023
    Tabla de Contenidos: “…Well, Determine Your VIPs -- Move Swiftly Through Your Inbox(es) -- Create Specific Templates -- Flag, Star, or Designate Emails as Important -- Batch Similar Messages or Tasks -- Systematically Capture Incoming New Requests -- Determine the Sources of Your Requests -- Caught on a Weekly Worksheet! …”
    Libro electrónico
  13. 373
    Publicado 2016
    Libro electrónico
  14. 374
    Publicado 2018
    Libro electrónico
  15. 375
    Publicado 2015
    Tabla de Contenidos: “…-- 23.4 Value management implementation and tools used -- 23.5 Practical benefits and savings -- 23.6 Concluding remarks -- Chapter 24 Case Studies: Sustainable Design, Innovation and Competitiveness in Construction Firms -- 24.1 Introduction -- 24.2 Background and context -- 24.4 Case studies -- 24.5 Findings and discussions -- 24.6 Concluding Remarks -- References -- Chapter 25 Case Study: Retrofitting Building Services Design and Sustainability: Star Island -- 25.1 Introduction -- 25.2 Initial study or analysis to identify problems -- 25.3 Funding for capital improvement plan -- 25.4 Evaluation of design options and the cost implications -- 25.5 Proposed design solution and costs -- 25.6 Concluding remarks -- References -- Chapter 26 Case Studies: Maximising Design and Construction Opportunities through Fiscal Incentives -- 26.1 Introduction -- 26.2 Strategic considerations -- 26.3 Capital allowances planning -- 26.4 Enhanced capital allowances (ECA) -- 26.5 Land remediation relief (LRR) -- 26.6 Value added tax -- 26.7 Taxation anti-avoidance -- 26.8 Conclusion -- References -- Chapter 27 Mapping Sustainability in the Quantity Surveying Curriculum: Educating Tomorrow's Design Economists -- 27.1 Introduction -- 27.2 Literature review on sustainability issues…”
    Libro electrónico
  16. 376
    por Aguilar-Mediavilla, Eva
    Publicado 2019
    Libro electrónico
  17. 377
    Publicado 2012
    Libro electrónico
  18. 378
    por Elsevier B.V.
    Publicado 2021
    Revista digital
  19. 379
    Publicado 2009
    Libro electrónico
  20. 380
    Publicado 2023
    Libro electrónico