Mostrando 1,621 - 1,640 Resultados de 2,017 Para Buscar 'Raunk.~', tiempo de consulta: 1.13s Limitar resultados
  1. 1621
    Publicado 2017
    Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
    Libro
  2. 1622
    por Cañizal i Villarino, Màrius
    Publicado 2007
    Libro
  3. 1623
    Publicado 2001
    Libro
  4. 1624
    Publicado 1965
    Microfilme
  5. 1625
    Publicado 2014
    “…Creators of Thinkers50--the world's most respected ranking of business thinkers--Des Dearlove and Stuart Crainer bring you the very latest thinking on the future of business. …”
    Libro electrónico
  6. 1626
    Publicado 2006
    “…Cederrón de sencillo manejo que permite usar de forma interactiva los datos estadísticos, elaborando rankings, comparaciones y combinaciones de datos, e imprimir o exportar la información obtenida a cualquier otra aplicación en diferentes formatos…”
    CDROM
  7. 1627
    Publicado 2008
    “…Cederrón de sencillo manejo que permite usar de forma interactiva los datos estadísticos, elaborando rankings, comparaciones y combinaciones de datos, e imprimir o exportar la información obtenida a cualquier otra aplicación en diferentes formatos…”
    CDROM
  8. 1628
    por Loyola, Martín Ignacio de
    Publicado 2011
    “…Throughout his travels he faced dangerous natives and worked to establish Franciscan, achieving many high ranking titles…”
    Libro electrónico
  9. 1629
    por Haji, Ishtiyaque
    Publicado 2009
    “…, and world-ranking judgments (when is a possible world intrinsically better than another?). …”
    Libro electrónico
  10. 1630
    Publicado 2020
    “…La Universidad Pontificia de Salamanca se sitúa entre las tres mejores universidades de España (primera de Castilla y León) en "Enseñanza y aprendizaje", en el prestigioso ranking CYD, elaborado por la Fundación Conocimiento y Desarrollo…”
    Acceso restringido UPSA
    Video
  11. 1631
    Publicado 2017
    “…"ChemPhotoChem is aimed to become a top-ranking photochemistry journal for primary research papers and critical secondary information from authors across the world. …”
    Revista digital
  12. 1632
    Publicado 2013
    Libro
  13. 1633
    por Jalée, Pierre
    Publicado 1971
    Libro
  14. 1634
    Publicado 2014
    “…Creators of the Thinkers50--the world's most respected ranking of business thinkers--Des Dearlove and Stuart Crainer bring you the very latest from India's leading business thinkers. …”
    Libro electrónico
  15. 1635
    “…Charles Dickens' work is ranked among the finest writing in the Western canon, and the author specialized in seasonal stories to warm the hearts of his adoring fans during the holiday season. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  16. 1636
    Publicado 2010
    “…Why you'd better not rely on the college rankings! A cautionary tale ... and a better way to find the right college for your child."…”
    Libro electrónico
  17. 1637
    por Pollak, Joel B.
    Publicado 2009
    “…In 2007, Minister Ronnie Kasrils, the highest-ranking Jew in South Africa's post-apartheid government, launched a campaign against Israeli policy in the occupied territories. …”
    Libro electrónico
  18. 1638
    por Benninga, Simon
    Publicado 2015
    Tabla de Contenidos: “…¿TIR y VAN producen el mismo ranking de proyectos?…”
    Libro electrónico
  19. 1639
    Publicado 2017
    Tabla de Contenidos: “…Real Time Bidding (RTB) -- 7.3.8 CRM-Targeting oder internes Targeting -- 7.3.9 Targeting nach der DSGVO -- 7.4 Haftung für Seiten, auf denen die Werbung eingeblendet wird -- 7.5 Hersteller-Vorgaben für das Online-Marketing -- 7.5.1 Preisvorgaben des Herstellers -- 7.5.2 Plattformverbote -- 7.5.3 Verbot bestimmter Online-Marketing-Maßnahmen -- 7.6 Klick-Betrug -- 7.7 Besonderheiten des Mobile Marketing -- 7.7.1 Besonderheiten bei Pflichtangaben -- 7.7.2 Push-Nachrichten -- 7.7.3 Bluetooth-Nachrichten -- 7.7.4 Location Based Ads -- 7.7.5 Mobile Targeting -- 7.7.6 Besonderheiten bei der Werbung mit/in Apps -- Kapitel 8: Suchmaschinen-Werbung -- 8.1 SEO - Suchmaschinen-Optimierung -- 8.1.1 Grundlagen -- 8.1.2 Google-Richtlinien -- 8.1.3 Meta-Tags, URLs und Hidden Content -- 8.1.4 Snippets -- 8.1.5 Interne Suchmaschinen -- 8.1.6 Doorway-Pages, SEO-Seiten und Cloaking -- 8.1.7 Linkbuilding -- 8.1.8 Negative SEO -- 8.1.9 Recht auf Vergessen -- 8.2 Rechtsfragen bei der Suche in Plattformen -- 8.2.1 Die Produktseite bei Amazon -- 8.2.2 Conversion-Rate als Ranking-Faktor -- 8.3 SEA - Google AdWords -- 8.3.1 Funktionsweise von Google AdWords -- 8.3.2 Fremde Marken oder Namen als Keywords -- 8.3.3 Fremde Marken oder Namen in der Anzeige selbst -- 8.3.4 Berechtigung zur Nutzung der Marke -- 8.3.5 Google-Markenbeschwerde und Pflicht der Brand zu Duldung von AdWords -- 8.3.6 Sonderfälle -- 8.3.7 Gestaltung der Werbeanzeige -- 8.4 Preissuchmaschinen -- 8.4.1 Aktualität von Preissuchdiensten -- 8.4.2 Versandkosten und Preissuche -- 8.4.3 Preissuche in Portalen…”
    Libro electrónico
  20. 1640
    Publicado 2025
    Tabla de Contenidos: “…-- 9.2 Hyperparameter Optimization Techniques -- 9.2.1 Model-Free Algorithms -- 9.2.1.1 Trial-and-Error (Manual Testing) -- 9.2.1.2 Grid Search -- 9.2.1.3 Random Search -- 9.2.2 Gradient-Based Optimization -- 9.2.3 Bayesian Optimization -- 9.2.4 Multifidelity Optimization -- 9.2.4.1 Successive Halving -- 9.2.4.2 Hyperband -- 9.2.5 Metaheuristic Algorithms -- 9.2.5.1 Genetic Algorithm -- 9.2.5.2 Particle Swarm Optimization -- 9.3 Challenges in Hyperparameter Optimization -- 9.4 Concluding Remarks -- References -- Chapter 10 Accuracy Assessment and Model Explainability -- 10.1 Accuracy Assessment -- 10.1.1 Sampling Scheme and Spatial Autocorrelation -- 10.1.2 Sample Size, Scale, and Spatial Variability -- 10.1.3 Adequacy of Training and Testing Data -- 10.1.4 Conventional Accuracy Analysis -- 10.1.5 Accuracy Analysis for Machine Learning -- 10.1.6 Fuzzy Accuracy Assessment -- 10.1.7 Object-Based Accuracy Assessment -- 10.2 Comparison of Thematic Maps -- 10.2.1 McNemar's Test -- 10.2.2 z-Test -- 10.2.3 Wilcoxon Signed-Ranks Test -- 10.2.4 5×2-Cross-Validation t-Test -- 10.2.5 Friedman Test -- 10.3 Explainability Methods -- 10.3.1 SHapley Additive exPlanations -- 10.3.2 Partial Dependence Plot -- 10.3.3 Pairwise Interaction Importance -- 10.3.4 Permutation-Based Feature Importance…”
    Libro electrónico