Mostrando 43,181 - 43,200 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 2.10s Limitar resultados
  1. 43181
    Publicado 2015
    Tabla de Contenidos: “…-- 3.4 Managing Biases -- 3.5 Summary -- Chapter 4: Rule #2: Know the Domain -- 4.1 Cautionary Tale #1: ``Discovering'' Random Noise -- 4.2 Cautionary Tale #2: Jumping at Shadows -- 4.3 Cautionary Tale #3: It Pays to Ask -- 4.4 Summary -- Chapter 5: Rule #3: Suspect Your Data -- 5.1 Controlling Data Collection -- 5.2 Problems with Controlled Data Collection -- 5.3 Rinse (and Prune) Before Use -- 5.3.1 Row Pruning -- 5.3.2 Column Pruning -- 5.4 On the Value of Pruning -- 5.5 Summary -- Chapter 6: Rule #4: Data Science Is Cyclic -- 6.1 The Knowledge Discovery Cycle -- 6.2 Evolving Cyclic Development -- 6.2.1 Scouting -- 6.2.2 Surveying -- 6.2.3 Building -- 6.2.4 Effort -- 6.3 Summary -- Part II: Data Mining: A Technical Tutorial -- Chapter 7: Data Mining and SE -- 7.1 Some Definitions -- 7.2 Some Application Areas…”
    Libro electrónico
  2. 43182
    Publicado 2012
    Tabla de Contenidos: “…Figure 1.6 Taux de change effectif réel dans sept pays d'Amérique latine, de janvier 2008 à mars 2011 -- Figure 1.7 Effets du contrôle des changes au Brésil et en Turquie -- Figure 1.8 Croissance du crédit réel dans sept pays d'Amérique latine, 2010 -- Figure 2.1 Pays d'Amérique latine et de l'OCDE : poids de la fonction publique dans la population active, 2008 -- Figure 2.2 Amérique latine et OCDE : dépenses publiques, 2000, 2007 et 2009 -- Figure 2.3 Amérique latine : couverture de programmes de transferts conditionnés -- Figure 2.4a Amérique latine et OCDE : l'exécutif a-t-il un pouvoir de veto sur la législation ? …”
    Libro electrónico
  3. 43183
    por Banerjee, Chandan
    Publicado 2024
    Tabla de Contenidos: “…9.3 Research Gaps -- 9.4 Emerging Research Directions -- 9.5 The Broad Concept of FBG Sensor Applications in Industry 4.0 -- 9.6 Conclusion -- References -- Chapter 10 Fog Computing-Enabled Cancer Cell Detection System Using Convolution Neural Network in Internet of Medical Things -- 10.1 Introduction -- 10.2 Fog Computing: Approach of IoMT -- 10.3 Relationship Between IoMT and Deep Neural Network -- 10.4 Fog Computing Enabled CNN for Medical Imaging -- 10.5 Algorithm Approach of Proposed Model -- 10.6 Result and Analysis -- 10.7 Conclusion -- References -- Chapter 11 Application of IoT in Smart Farming and Precision Farming: A Review -- 11.1 Introduction -- 11.2 Methodologies Used in Precision Agriculture -- 11.3 Contribution of IoT in Agriculture -- 11.4 IoT Enabled Smart Farming -- 11.5 IoT Enabled Precision Farming -- 11.6 Machine Learning Enable Precision Farming -- 11.7 Application of Operational Research Method in Farming System -- 11.8 Conclusion -- 11.9 Future Scope -- References -- Chapter 12 Big IoT Data Analytics in Fog Computing -- 12.1 Introduction -- 12.2 Literature Review -- 12.3 Motivation -- 12.4 Fog Computing -- 12.4.1 Fog Node -- 12.4.2 Characteristics of Fog Computing -- 12.4.3 Attributes of Fog Node -- 12.4.4 Fog Computing Service Model -- 12.4.5 Fog Computing Architecture -- 12.4.6 Data Flow and Control Flow in Fog Architecture -- 12.4.7 Fog Deployment Models -- 12.5 Big Data -- 12.5.1 What is Big Data? …”
    Libro electrónico
  4. 43184
    Tabla de Contenidos: “…Preparing the environment -- 3.1 DFSMSrmm implementation -- 3.1.1 Installation wizards -- 3.1.2 Updating the installation-wide exits -- 3.1.3 Updating and validating the PARMLIB members -- 3.1.4 Creating a starting procedure -- 3.1.5 Defining an alias for high-level qualifier RMM -- 3.1.6 Protecting DFSMSrmm resources -- 3.1.7 Defining RACF groups for DFSMSrmm -- 3.1.8 Creating the DFSMSrmm CDS -- 3.1.9 Creating the DFSMSrmm CDS as extended format -- 3.1.10 Creating the DFSMSrmm journal -- 3.1.11 Restarting MVS with DFSMSrmm implemented -- 3.1.12 Starting and restarting DFSMSrmm -- 3.1.13 Stopping DFSMSrmm -- 3.1.14 Setting up DFSMSrmm utilities -- 3.1.15 Running the installation verification program -- 3.2 Tailoring the DFSMSrmm ISPF dialog -- 3.2.1 Adding DFSMSrmm to ISPF panels -- 3.2.2 Modifying the DFSMSrmm panel -- 3.2.3 Other changes -- 3.3 Making TSO HELP information available to users -- 3.4 Verifying your DFSMSrmm implementation -- 3.4.1 Displaying the PARMLIB options and control information -- 3.4.2 Adding owner information -- 3.4.3 Adding racks to DFSMSrmm -- 3.4.4 Adding volumes to DFSMSrmm -- 3.4.5 Adding bins to DFSMSrmm -- 3.4.6 Adding a VRS to DFSMSrmm -- 3.4.7 Creating tape data sets -- 3.4.8 Allocating inventory management data sets -- 3.4.9 Running inventory management -- 3.4.10 Confirming movements -- 3.4.11 Creating reports…”
    Libro electrónico
  5. 43185
    Publicado 2004
    Tabla de Contenidos: “…Post-migration steps -- 7.1 Setting up aliases -- 7.2 Migrating custom code -- 7.2.1 Access control -- 7.2.2 Command parameter validation -- 7.2.3 User registration -- 7.2.4 Logon command -- 7.2.5 Calculation usage framework -- 7.2.6 Configuration and code changes for migrated EJBs -- 7.2.7 J2EE Connector Architecture -- 7.2.8 Pricing -- 7.2.9 Product Advisor -- 7.2.10 Rule server administration commands -- 7.2.11 JSP and property file changes -- Part 3 Production environment -- Chapter 8. …”
    Libro electrónico
  6. 43186
    por Kapil, Sheeba
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Preface -- Unit I: Introduction to Corporate Finance -- Chapter 1: Introduction to Financial Management -- 1.1 Introduction -- 1.2 Finance Functions -- 1.2.1 Financing Decisions -- 1.2.2 Investment Decisions -- 1.2.3 Liquidity Decisions -- 1.2.4 Dividend Decisions -- 1.2.5 Decisions Regarding the Reporting, Monitoring and Controlling of Funds -- 1.3 The Role of the Finance Manager -- 1.3.1 The Functions of a Finance Manager -- 1.3.1.1 Forecasting and planning -- 1.3.1.2 Analysing and evaluating the investment activities -- 1.3.1.3 Coordination and control -- 1.3.1.4 Understanding the finance market -- 1.3.1.5 Risk management -- 1.3.1.6 Performance measurement -- 1.3.2 The Role of a Finance Manager in the Indian Context -- 1.4 The Goals of a Firm -- Business Insight 1.1: Difference Between Financial Services and Corporate Finance -- 1.4.1 Non-financial Goals -- 1.4.1.1 Enhancing employee satisfaction and welfare -- 1.4.1.2 Management satisfaction -- 1.4.1.3 Social objective -- 1.4.1.4 Quality service to customers -- 1.4.2 Financial Goals -- 1.4.2.1 Target market share -- 1.4.2.2 Sustaining and maintaining the business position -- 1.4.2.3 Maintaining financial liquidity and solvency -- 1.4.2.4 Profit maximization -- 1.4.2.5 Maximizing shareholders' wealth -- Business Snapshot 1.1: Vision, Mission and Objectives of Hindustan Aeronautics Limited (HAL) -- Business Snapshot 1.2: Tata Tea Aims to Increase its Market Share -- Business Insight 1.2: Understanding Solvency -- 1.5 Profit and Wealth Maximization -- 1.5.1 Profit Maximization -- Business Snapshot 1.3: Godrej and EVA -- 1.5.2 Wealth Maximization -- 1.6 Management Versus Shareholders -- 1.7 Fields Related to Finance -- 1.7.1 Economics -- 1.7.2 Accounting -- 1.8 Finance and Other Functional Areas -- 1.8.1 Marketing -- 1.8.2 Distribution and Selling…”
    Libro electrónico
  7. 43187
    por Chiueh, Tzi-Dar, 1960-
    Publicado 2012
    Tabla de Contenidos: “…Mobile MIMO WiMAX System-on-Chip Design 321 -- 11.1 Introduction of WiMAX Standard 321 -- 11.2 Mobile WiMAX OFDMA and Frame Structure 322 -- 11.3 WiMAX Baseband Receiver Design 325 -- 11.3.1 Automatic Gain Control (AGC) 325 -- 11.3.2 Packet Detection (PKD) 326 -- 11.3.3 Symbol Timing Recovery (STR) 328 -- 11.3.4 Carrier Frequency Offset (CFO) Compensation 328 -- 11.3.5 Channel Estimation 330 -- 11.3.6 MIMO Detection 330 -- 11.3.7 Outer Receiver 333 -- 11.4 WiMAX Media Access Control (MAC) Design 333 -- 11.5 Implementation and Field Trial of the WiMAX SoC 336 -- 11.5.1 Laboratory Testing and Performance Evaluation 338.…”
    Libro electrónico
  8. 43188
    por Burns, Brendan
    Publicado 2020
    Tabla de Contenidos: “…-- 7.2 Das Service-Objekt -- Listing 7-1 alpaca-prod.yaml -- Listing 7-2 bandicoot-prod.yaml -- 7.2.1 Service-DNS -- 7.2.2 Readiness-Checks -- 7.3 Über das Cluster hinausschauen -- 7.4 Cloud-Integration -- Tipp -- 7.5 Weitere Details -- 7.5.1 Endpunkte -- 7.5.2 Manuelle Service-Discovery -- 7.5.3 kube-proxy und Cluster-IPs -- Abb. 7-1 Konfigurieren und Verwenden einer Cluster-IP -- Tipp -- 7.5.4 Umgebungsvariablen zur Cluster-IP -- Tab. 7-1 Umgebungsvariablen des Service -- 7.6 Mit anderen Umgebungen verbinden -- 7.7 Aufräumen -- 7.8 Zusammenfassung -- 8 HTTP Load Balancing mit Ingress -- Abb. 8-1 Eine typische Ingress-Konfiguration -- 8.1 Ingress-Spec versus Ingress-Controller -- 8.2 Contour installieren -- Tipp -- 8.2.1 DNS konfigurieren…”
    Libro electrónico
  9. 43189
    Publicado 2020
    Tabla de Contenidos: “…Information gathering -- 2 Discovering network hosts -- 2.1 Understanding your engagement scope -- 2.1.1 Black-box, white-box, and grey-box scoping -- 2.1.2 Capsulecorp -- 2.1.3 Setting up the Capsulecorp Pentest environment -- 2.2 Internet Control Message Protocol -- 2.2.1 Using the ping command -- 2.2.2 Using bash to pingsweep a network range -- 2.2.3 Limitations of using the ping command -- 2.3 Discovering hosts with Nmap -- 2.3.1 Primary output formats -- 2.3.2 Using remote management interface ports -- 2.3.3 Increasing Nmap scan performance -- 2.4 Additional host-discovery methods -- 2.4.1 DNS brute-forcing -- 2.4.2 Packet capture and analysis -- 2.4.3 Hunting for subnets -- Summary -- 3 Discovering network services…”
    Libro electrónico
  10. 43190
    por Lal Kishore, K.
    Publicado 2009
    Tabla de Contenidos: “…1.26 True RMS-Responding Voltmeter -- 1.27 Balanced Bridge Voltmeter (VTVM) -- 1.27.1 Advantages -- 1.27.2 Disadvantages -- 1.28 Transistor Voltmeter (TVM) -- 1.29 Electronic Multimeter -- 1.29.1 Resistance Ranges -- 1.30 AC Current Measurement -- 1.30.1 Differential Voltmeter -- 1.31 Differential Amplifier -- 1.32 Alternating Current Instruments (AC Meters) -- 1.32.1 D'Arsonval Meter Movement for AC Circuit -- 1.32.2 Modified Circuit for AC Measurements -- 1.32.3 D'Arsonval Meter Movement Circuit (FWR) -- 1.33 Electrodynamometer Movement -- 1.33.1 Transfer Instruments -- 1.33.2 Iron Vane-Meter Movement -- 1.34 Thermocouple Meter -- 1.34.1 Constant Voltage Source -- 1.34.2 Constant Current Source -- 1.34.3 Volt Box -- 1.34.4 Factors to be Considered in the Selection of an Analog Voltmeter -- 1.35 Digital Voltmeters -- 1.35.1 General Specifications -- 1.36 Ramp-Type DVM -- 1.37 Staircase Ramp-Type DVM -- 1.38 Dual Slope Integrating-Type DVM -- 1.39 Successive-Approximation Conversion (SAC) -- 1.39.1 Block Schematic -- 1.40 Continuous Balance-Type DVM -- 1.41 Automatic Polarity Indication for DVM -- 1.42 Autoranging for DVM -- 1.42.1 Typical Case -- 1.43 3 3 4 Digit Display -- 1.44 Picoammeter -- 1.44.1 Applications -- 1.45 Low-Current Ammeter Applications -- 1.45.1 Wafer-Level Photodiode Testing -- 1.45.2 Monitoring and Control of Focused Ion Beam Currents -- 1.46 High-Resistance Measurements -- 1.47 Summary -- Points to Remember -- Objective-type Questions -- Review Questions -- Unsolved Problems -- Chapter 2: Waveform Generators -- 2.1 Introduction -- 2.2 Considerations in Choosing an Oscillator or Signal Generator -- 2.3 Sine Wave Generator -- 2.4 Oscillator Circuit -- 2.5 Attenuator -- 2.6 Frequency-Synthesised Signal Generator -- 2.7 Sweep-Frequency Generator -- 2.8 Pulse and Square Wave Generator -- 2.9 Function Generator…”
    Libro electrónico
  11. 43191
    por Ballard, Chuck
    Publicado 2005
    Tabla de Contenidos: “…10.4.2 Enhancing the Model portion of our existing code -- 10.4.3 Detailed code review of Model portion -- 10.4.4 Modifying Page Handler of UpdateCustomer.jsp -- 10.4.5 Detailed code review of Controller portion -- 10.4.6 Associating a visual page control with a Page Handler function -- 10.4.7 Testing and final results -- 10.4.8 Final modifications -- 10.5 Checkpoint -- Part 3 Informix 4GL to EGL conversion -- Chapter 11. …”
    Libro electrónico
  12. 43192
    por Cook, Jim
    Publicado 2003
    Tabla de Contenidos: “…Backup Recovery and Media Services up and running -- 8.1 BRMS operations -- 8.1.1 Policies -- 8.1.2 Setting up BRMS in logical order -- 8.1.3 lnitializing BRMS -- 8.1.4 Media -- 8.1.5 Single backups using BRMS commands -- 8.1.6 Regular backups using control groups -- 8.1.7 Control groups and policies -- 8.1.8 Full versus incremental backups…”
    Libro electrónico
  13. 43193
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 Post Pandemic: The New Advanced Society -- 1.1 Introduction -- 1.1.1 Themes -- 1.1.1.1 Theme: Areas of Management -- 1.1.1.2 Theme: Financial Institutions Cyber Crime -- 1.1.1.3 Theme: Economic Notion -- 1.1.1.4 Theme: Human Depression -- 1.1.1.5 Theme: Migrant Labor -- 1.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions -- 1.1.1.7 School and College Closures -- 1.2 Conclusions -- References -- 2 Distributed Ledger Technology in the Construction Industry Using Corda -- 2.1 Introduction -- 2.2 Prerequisites -- 2.2.1 DLT vs Blockchain -- 2.3 Key Points of Corda -- 2.3.1 Some Salient Features of Corda -- 2.3.2 States -- 2.3.3 Contract -- 2.3.3.1 Create and Assign Task (CAT) Contract -- 2.3.3.2 Request for Cash (RT) Contract -- 2.3.3.3 Transfer of Cash (TT) Contract -- 2.3.3.4 Updation of the Task (UOT) Contract -- 2.3.4 Flows -- 2.3.4.1 Flow Associated With CAT Contract -- 2.3.4.2 Flow Associated With RT Contract -- 2.3.4.3 Flow Associated With TT Contract -- 2.3.4.4 Flow Associated With UOT Contract -- 2.4 Implementation -- 2.4.1 System Overview -- 2.4.2 Working Flowchart -- 2.4.3 Experimental Demonstration -- 2.5 Future Work -- 2.6 Conclusion -- References -- 3 Identity and Access Management for Internet of Things Cloud -- 3.1 Introduction -- 3.2 Internet of Things (IoT) Security -- 3.2.1 IoT Security Overview -- 3.2.2 IoT Security Requirements -- 3.2.3 Securing the IoT Infrastructure -- 3.3 IoT Cloud -- 3.3.1 Cloudification of IoT -- 3.3.2 Commercial IoT Clouds -- 3.3.3 IAM of IoT Clouds -- 3.4 IoT Cloud Related Developments -- 3.5 Proposed Method for IoT Cloud IAM -- 3.5.1 Distributed Ledger Approach for IoT Security -- 3.5.2 Blockchain for IoT Security Solution…”
    Libro electrónico
  14. 43194
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 A Look at IIoT: The Perspective of IoT Technology Applied in the Industrial Field -- 1.1 Introduction -- 1.2 Relationship Between Artificial Intelligence and IoT -- 1.2.1 AI Concept -- 1.2.2 IoT Concept -- 1.3 IoT Ecosystem -- 1.3.1 Industry 4.0 Concept -- 1.3.2 Industrial Internet of Things -- 1.4 Discussion -- 1.5 Trends -- 1.6 Conclusions -- References -- 2 Analysis on Security in IoT Devices- An Overview -- 2.1 Introduction -- 2.2 Security Properties -- 2.3 Security Challenges of IoT -- 2.3.1 Classification of Security Levels -- 2.3.1.1 At Information Level -- 2.3.1.2 At Access Level -- 2.3.1.3 At Functional Level -- 2.3.2 Classification of IoT Layered Architecture -- 2.3.2.1 Edge Layer -- 2.3.2.2 Access Layer -- 2.3.2.3 Application Layer -- 2.4 IoT Security Threats -- 2.4.1 Physical Device Threats -- 2.4.1.1 Device-Threats -- 2.4.1.2 Resource Led Constraints -- 2.4.2 Network-Oriented Communication Assaults -- 2.4.2.1 Structure -- 2.4.2.2 Protocol -- 2.4.3 Data-Based Threats -- 2.4.3.1 Confidentiality -- 2.4.3.2 Availability -- 2.4.3.3 Integrity -- 2.5 Assaults in IoT Devices -- 2.5.1 Devices of IoT -- 2.5.2 Gateways and Networking Devices -- 2.5.3 Cloud Servers and Control Devices -- 2.6 Security Analysis of IoT Platforms -- 2.6.1 ARTIK -- 2.6.2 GiGA IoT Makers -- 2.6.3 AWS IoT -- 2.6.4 Azure IoT -- 2.6.5 Google Cloud IoT (GC IoT) -- 2.7 Future Research Approaches -- 2.7.1 Blockchain Technology -- 2.7.2 5G Technology -- 2.7.3 Fog Computing (FC) and Edge Computing (EC) -- References -- 3 Smart Automation, Smart Energy, and Grid Management Challenges -- 3.1 Introduction -- 3.2 Internet of Things and Smart Grids -- 3.2.1 Smart Grid in IoT -- 3.2.2 IoT Application -- 3.2.3 Trials and Imminent Investigation Guidelines…”
    Libro electrónico
  15. 43195
    por Putte, Geert van de
    Publicado 2005
    Tabla de Contenidos: “…Aspects of security -- 3.1 Overview -- 3.2 Areas of B2B security -- 3.2.1 Deployment security -- 3.2.2 Connection security -- 3.2.3 Document security -- 3.2.4 Access control -- 3.3 Security technologies -- 3.3.1 Reverse proxy server -- 3.3.2 Firewalls -- 3.3.3 Network Address Translation -- 3.3.4 Port Address Translation -- Chapter 4. …”
    Libro electrónico
  16. 43196
    Publicado 2022
    Tabla de Contenidos: “…10.5.5 Isolating Box -- 10.5.6 Rules of Noise Control -- Bibliography -- 11 Hybrid Systems -- 11.1 Hybrid SEA Matrix -- 11.2 Twin Chamber -- 11.2.1 Step 1 - Setting up System Configurations -- 11.2.2 Step 2 - Setting up System Matrices and Coupling Loss Factors -- 11.2.3 Step 3 - External Loads -- 11.2.4 Step 4 - Solving System Matrices -- 11.2.5 Step 5 - Adding the Results -- 11.3 Trim in Hybrid Theory -- 11.3.1 The Trim Stiffness Matrix -- 11.3.2 Hybrid Modal Formulation of Trim and Plate -- 11.3.3 Modal Space -- 11.3.4 Plate Example with Trim -- Bibliography -- 12 Industrial Cases -- 12.1 Simulation Strategy -- 12.1.1 Motivation -- 12.1.2 Choice of Simulation Method -- 12.2 Aircraft -- 12.2.1 Excitation -- 12.2.2 Simulation Strategy -- 12.2.3 Fuselage Sidewall -- 12.2.4 SEA Model of a Fuselage Section -- 12.3 Automotive -- 12.3.1 Simulation Strategy -- 12.3.2 Excitation -- 12.3.3 Rear Carbody -- 12.3.4 Full Scale SEA Models -- 12.4 Trains -- 12.4.1 Structural Design -- 12.4.2 Interior Design -- 12.4.3 Excitation and Transmission Paths -- 12.4.4 Simulation Strategy -- 12.4.5 Applications to Rail Structures - Double Walls -- 12.4.6 Carbody Sections - High Speed Applications -- 12.5 Summary -- Bibliography -- 13 Conclusions and Outlook -- 13.1 Conclusions -- 13.2 What Comes Next? …”
    Libro electrónico
  17. 43197
    por Amberg, Eric
    Publicado 2024
    Tabla de Contenidos: “…. - Layer-2-Technologien -- 7.2.3 Das Internet Protocol (IPv4) -- 7.2.4 Das Internet Control Message Protocol (ICMP) -- 7.2.5 Das User Datagram Protocol (UDP) -- 7.2.6 Das Transmission Control Protocol (TCP) -- 7.3 Nmap - DER Portscanner -- 7.3.1 Host Discovery -- 7.3.2 Normale Portscans -- 7.3.3 Zu scannende Ports festlegen -- 7.3.4 Besondere Portscans -- 7.3.5 Dienst- und Versionserkennung -- 7.3.6 Betriebssystem-Erkennung -- 7.3.7 Firewall/IDS-Vermeidung (Evasion) -- 7.3.8 Ausgabe-Optionen -- 7.3.9 Die Nmap Scripting Engine (NSE) -- 7.3.10 Weitere wichtige Optionen -- 7.3.11 Zenmap -- 7.4 Scannen mit Metasploit -- 7.4.1 Was ist Metasploit? …”
    Libro electrónico
  18. 43198
    Publicado 2024
    Tabla de Contenidos: “…Elections -- 8.1.3.4 2022 Albanian Cyber Attack by Iran -- 8.1.4 Iranian Cyber Operations Wrap-up -- 8.A Cost of Iranian Cyber Attacks -- Bibliography -- Chapter 9 Independent Cyber Operators -- 9.1 Independent Cyber Operations -- 9.1.1 Hackers -- 9.1.1.1 Star Wars, Computer Networks, and the Former Soviet Union's KGB (mid-1980s) -- 9.1.1.2 Morris Worm (1988) -- 9.1.1.3 Jester - Air Traffic Control and Telephone Service (1997) -- 9.1.1.4 Chinese Hacktivists (1998) -- 9.1.1.5 Maroochy Shire (2000)…”
    Libro electrónico
  19. 43199
    Publicado 2023
    Tabla de Contenidos: “…2.7 Role of 5G for Transit Operations -- 2.8 Role of 5G in Advanced Driver Assistance Systems (ADAS) -- 2.9 Role of 5G in Logistics Operations -- 2.10 Summary -- References -- Chapter 3 Network Management in Smart Cities -- 3.1 Introduction -- 3.2 Forensics -- 3.2.1 Digital Device Forensics -- 3.2.2 Other Digital Forensics -- 3.2.3 The Need for IoT Forensics -- 3.3 Challenges in IoT Forensics -- 3.3.1 General Issues -- 3.3.2 Evidence Identification, Collection, and Preservation -- 3.3.3 Evidence Analysis and Correlation -- 3.3.4 Presentation -- 3.4 Opportunities of IoT Forensics -- 3.5 Cloud Computing Security -- 3.5.1 Effectively Manage Identities -- 3.5.2 Key Concerns about Cloud Computing -- 3.5.3 Trends in Big Data as an Enabling Technology -- 3.6 Smart Cities -- 3.6.1 Smart City Concept -- 3.6.2 Cloud Computing Benefits in the Context of Smart City -- 3.7 Smarter Grid -- 3.8 Smart Home -- 3.9 Smart City Data Plan Challenges -- 3.9.1 Compatibility between Smart City Devices -- 3.9.2 Simplicity -- 3.9.3 Mobility and Geographic Control -- 3.10 Software-Defined Network-Based Smart City Network Management -- 3.10.1 Centralized Control -- 3.10.2 Simplicity and Inerrability -- 3.10.3 Virtualization -- 3.10.4 Compatibility -- 3.10.5 Challenges of SDN in Smart City Applications -- 3.11 Software-Defined Things Framework -- 3.11.1 Reactive Smart City Device Management -- 3.11.2 Smart Mobility and Smart Traffic Management -- 3.11.3 Smart Environment -- 3.11.4 Security -- 3.11.5 Advanced Optical Network Architecture for Next-Generation Internet Access -- 3.12 Conclusion and Future Work -- References -- Chapter 4 Energy-Efficient Reinforcement Learning in Wireless Sensor Networks Using 5G for Smart Cities -- 4.1 Introduction -- 4.1.1 Problem Statement -- 4.1.2 Objectives -- 4.2 Literature Review -- 4.2.1 Wireless Sensor Network…”
    Libro electrónico
  20. 43200
    por Akepogu, Ananda Rao
    Publicado 1900
    Tabla de Contenidos: “…Cover -- Data Structures and Algorithms Using C++ -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgements -- Chapter 1 Introduction to C++ -- 1.1 Introduction -- 1.2 Class Overview -- 1.2.1 Class -- 1.2.2 Objects -- 1.2.3 Class Members -- 1.3 I/O Streams -- 1.4 Access Control -- 1.5 Class Scope -- 1.6 Static Class Members -- 1.6.1 Static Member Variables -- 1.6.2 Static Member Function -- 1.6.3 Static Object -- 1.7 Functions -- 1.7.1 Parameter Passing Methods -- 1.7.2 Inline Functions -- 1.7.3 The friend Function -- 1.7.4 Function Overloading -- 1.8 The this Pointer -- 1.9 Dynamic Memory Allocation and Deallocation -- 1.9.1 The new Operator -- 1.9.2 The delete Operator -- 1.10 Exception Handling -- Summary -- Exercises -- Chapter 2 Object Oriented Concepts -- 2.1 Goals and Principles -- 2.1.1 Object Oriented Design Goals -- 2.1.2 Object Oriented Design Principles -- 2.2 Constructors and Destructors -- 2.2.1 Constructors -- 2.2.2 Constructor Overloading -- 2.2.3 Destructors -- 2.3 Operator Overloading -- 2.3.1 Overloading the Plus (+) Operator -- 2.3.2 Overloading the Minus (-) Operator -- 2.3.3 Overloading Unary Operators -- 2.3.4 Postfix Form of Overloading the Unary Operator ++ -- 2.3.5 Prefix Form of Overloading the Unary Operator -- -- 2.3.6 Postfix Form of Overloading the Unary Operator -- -- 2.4 Inheritance -- 2.4.1 Base Class Access Control -- 2.4.2 Types of Inheritance -- 2.4.3 Reasons for the Usage of Inheritance -- 2.4.4 Advantages -- 2.4.5 Disadvantages -- 2.4.6 Delegation -- 2.5 Polymorphism -- 2.5.1 Virtual Functions -- 2.5.2 Pure Virtual Functions -- 2.6 Abstract Classes -- 2.7 Generic Programming with Templates -- 2.7.1 Function Templates -- 2.7.2 Class Templates -- 2.8 Recursion -- Summary -- Exercises -- Chapter 3 Algorithms -- 3.1 Introduction -- 3.2 Basic Notations -- 3.2.1 Pseudo Code…”
    Libro electrónico