Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 51
- Social aspects 23
- History and criticism 13
- machine learning 13
- deep learning 12
- Politics and government 11
- Computer networks 10
- Examinations 10
- History of engineering & technology 10
- Management 10
- Political aspects 10
- Research & information: general 10
- Study and teaching 10
- Technology: general issues 10
- Certification 9
- artificial intelligence 9
- Artificial intelligence 8
- Cartography 8
- Philosophy 8
- Application software 7
- Computer graphics 7
- Data processing 7
- Development 7
- Digital techniques 7
- Geography 7
- Electronic data processing personnel 6
- Image processing 6
- Information visualization 6
- Photography 6
- Research 6
-
361Publicado 2020Libro electrónico
-
362
-
363Publicado 2016Tabla de Contenidos: “…Front Cover -- Thermofluid Modeling for Energy Efficiency Applications -- Copyright Page -- Contents -- List of Contributors -- Preface -- 1 Performance Evaluation of Hybrid Earth Pipe Cooling with Horizontal Piping System -- 1.1 Introduction -- 1.2 Earth Pipe Cooling Technology -- 1.3 Green Roof System -- 1.4 Experimental Design and Measurement -- 1.5 Model Description -- 1.5.1 Modeling Equation -- 1.5.2 Geometry of the Model -- 1.5.3 Mesh Generation -- 1.5.4 Solver Approach -- 1.6 Results and Discussion -- 1.7 Conclusion -- Acknowledgments -- References -- 2 Thermal Efficiency Modeling in a Subtropical Data Center -- 2.1 Introduction -- 2.2 CFD Modeling of Data Center -- 2.2.1 Simulation Approach -- 2.2.2 Modeling Equations -- 2.3 Data Center Description -- 2.4 Results and Discussion -- 2.4.1 Experimental -- 2.4.2 Simulations Results -- 2.4.2.1 Data Center Room and Rack Thermal Maps -- 2.4.2.2 Static Pressure Map -- 2.4.2.3 Air Flow Paths -- 2.5 CRAC Performance -- 2.6 Conclusions and Recommendations -- Nomenclature -- References -- 3 Natural Convection Heat Transfer in the Partitioned Attic Space -- 3.1 Introduction -- 3.2 Problem Formulation -- 3.3 Numerical Approach and Validation -- 3.4 Results and Discussions -- 3.4.1 Development of Coupled Thermal Boundary Layer -- 3.4.2 Effect of Geometry Configuration -- 3.4.3 Effect of Rayleigh Number -- 3.5 Conclusions -- References -- 4 Application of Nanofluid in Heat Exchangers for Energy Savings -- 4.1 Introduction -- 4.2 Types of Nanoparticles and Nanofluid Preparation -- 4.3 Application of Nanofluid in Heat Exchangers -- 4.4 Physical Model and Boundary Values -- 4.5 Governing Equations -- 4.6 Thermal and Fluid Dynamic Analysis -- 4.7 Thermophysical Properties of Nanofluid -- 4.7.1 Thermal Conductivity -- 4.7.2 Dynamic Viscosity -- 4.7.3 Density -- 4.7.4 Specific Heat -- 4.8 Numerical Method…”
Libro electrónico -
364
-
365
-
366por Hall, Vincent AustinTabla de Contenidos: “…Defining the environment - where your code calls home -- 4. Mapping user interaction - charting the navigation flow -- 5. …”
Publicado 2024
Libro electrónico -
367Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
Libro electrónico -
368
-
369Publicado 2024Tabla de Contenidos: “…Part 3: Attacks on Deployed AI -- Chapter 7: Evasion Attacks against Deployed AI -- Fundamentals of evasion attacks -- Importance of understanding evasion attacks -- Reconnaissance techniques for evasion attacks -- Perturbations and image evasion attack techniques -- Evasion attack scenarios -- One-step perturbation with FGSM -- Basic Iterative Method (BIM) -- Jacobian-based Saliency Map Attack (JSMA) -- Carlini and Wagner (C& -- W) attack -- Projected Gradient Descent (PGD) -- Adversarial patches - bridging digital and physical evasion techniques -- NLP evasion attacks with BERT using TextAttack -- Attack scenario - sentiment analysis -- Attack example -- Attack scenario - natural language inference -- Attack example -- Universal Adversarial Perturbations (UAPs) -- Attack scenario -- Attack example -- Black-box attacks with transferability -- Attack scenario -- Attack example -- Defending against evasion attacks -- Mitigation strategies overview -- Adversarial training -- Input preprocessing -- Model hardening techniques -- Model ensembles -- Certified defenses -- Summary -- Chapter 8: Privacy Attacks - Stealing Models -- Understanding privacy attacks -- Stealing models with model extraction attacks -- Functionally equivalent extraction -- Learning-based model extraction attacks -- Generative student-teacher extraction (distillation) attacks -- Attack example against our CIFAR-10 CNN -- Defenses and mitigations -- Prevention measures -- Detection measures -- Model ownership identification and recovery -- Summary -- Chapter 9: Privacy Attacks - Stealing Data -- Understanding model inversion attacks -- Types of model inversion attacks -- Exploitation of model confidence scores -- GAN-assisted model inversion -- Example model inversion attack -- Understanding inference attacks -- Attribute inference attacks -- Meta-classifiers…”
Libro electrónico -
370
-
371Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- N10-008 Exam Objectives -- Objective Map -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Introduction to Networks -- First Things First: What's a Network? …”
Libro electrónico -
372Publicado 2023Tabla de Contenidos: “…Well, Determine Your VIPs -- Move Swiftly Through Your Inbox(es) -- Create Specific Templates -- Flag, Star, or Designate Emails as Important -- Batch Similar Messages or Tasks -- Systematically Capture Incoming New Requests -- Determine the Sources of Your Requests -- Caught on a Weekly Worksheet! …”
Libro electrónico -
373
-
374Publicado 2018Libro electrónico
-
375Publicado 2015Tabla de Contenidos: “…-- 23.4 Value management implementation and tools used -- 23.5 Practical benefits and savings -- 23.6 Concluding remarks -- Chapter 24 Case Studies: Sustainable Design, Innovation and Competitiveness in Construction Firms -- 24.1 Introduction -- 24.2 Background and context -- 24.4 Case studies -- 24.5 Findings and discussions -- 24.6 Concluding Remarks -- References -- Chapter 25 Case Study: Retrofitting Building Services Design and Sustainability: Star Island -- 25.1 Introduction -- 25.2 Initial study or analysis to identify problems -- 25.3 Funding for capital improvement plan -- 25.4 Evaluation of design options and the cost implications -- 25.5 Proposed design solution and costs -- 25.6 Concluding remarks -- References -- Chapter 26 Case Studies: Maximising Design and Construction Opportunities through Fiscal Incentives -- 26.1 Introduction -- 26.2 Strategic considerations -- 26.3 Capital allowances planning -- 26.4 Enhanced capital allowances (ECA) -- 26.5 Land remediation relief (LRR) -- 26.6 Value added tax -- 26.7 Taxation anti-avoidance -- 26.8 Conclusion -- References -- Chapter 27 Mapping Sustainability in the Quantity Surveying Curriculum: Educating Tomorrow's Design Economists -- 27.1 Introduction -- 27.2 Literature review on sustainability issues…”
Libro electrónico -
376
-
377Publicado 2012Libro electrónico
-
378
-
379
-
380