Mostrando 4,941 - 4,960 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.76s Limitar resultados
  1. 4941
    Publicado 2016
    Tabla de Contenidos: “…2.4.2 It Is Now Necessary to Address the Maximum Tolerable Risk -- 2.4.3 The Propagation to Fatality -- 2.4.4 Scenarios with Both Societal and Individual Implications -- 2.5 Example Involving Both Individual and Societal Risk -- 2.5.1 Individual Risk Argument -- 2.5.2 Societal Risk Argument -- 2.5.3 Conclusion -- 3 - Meeting IEC 61508 Part 2 -- 3.1 Organizing and Managing the Life Cycle -- Sections 7.1 of the Standard: Table '1' -- 3.2 Requirements Involving the Specification -- Section 7.2 of the Standard: Table B1 (avoidance) -- (a) The safety requirements specification -- (b) Separation of functions -- 3.3 Requirements for Design and Development -- Section 7.4 of the Standard: Table B2 (avoidance) -- 3.3.1 Features of the Design -- Sections 7.4.1-7.4.11 excluding 7.4.4 and 7.4.5 -- 3.3.2 Architectures (i.e., SFF) -- Section 7.4.4 Tables '2' and '3' -- 3.3.3 Random Hardware Failures -- Section 7.4.5 -- 3.4 Integration and Test (Referred to as Verification) -- Section 7.5 and 7.9 of the Standard Table B3 (avoidance) -- 3.5 Operations and Maintenance -- Section 7.6 Table B4 (avoidance) -- 3.6 Validation (Meaning Overall Acceptance Test and the Close Out of Actions) -- Section 7.3 and 7.7: Table B5 -- 3.7 Safety Manuals -- Section 7.4.9.3-7 and App D -- 3.8 Modifications -- Section 7.8 -- 3.9 Acquired Subsystems -- 3.10 "Proven in Use" (Referred to as Route 2s in the Standard) -- 3.11 ASICs and CPU Chips -- (a) Digital ASICs and User Programmable ICs -- Section 7.4.6.7 and Annex F of the Standard -- (b) Digital ICs with On-Chip Redundancy (up to SIL 3) -- Annex E of the Standard -- 3.12 Conformance Demonstration Template -- IEC 61508 Part 2 -- 4 - Meeting IEC 61508 Part 3 -- 4.1 Organizing and Managing the Software Engineering -- 4.1.1 Section 7.1 and Annex G of the Standard Table "1" -- 4.2 Requirements Involving the Specification…”
    Libro electrónico
  2. 4942
    Publicado 2024
    Tabla de Contenidos: “…References -- Chapter 3 Safe and Reliable Smart City Design Based on Blockchain Technology -- 3.1 Introduction -- 3.1.1 Blockchain Technology -- 3.1.2 Use of Blockchain in Smart City -- 3.1.3 Objective of Work -- 3.2 Related Work -- 3.2.1 Problem Statement -- 3.3 Blockchain Technology for Smart Cities -- 3.3.1 Application of the System -- 3.3.2 Blockchain Technology's Many Advantages in the Modern Smart City -- 3.4 Methods -- 3.4.1 Blockchain-Based Smart City Infrastructure -- 3.5 Conclusion -- References -- Chapter 4 Blockchain and Digital Twin for Enhancing Personal Security in Modern Cities -- 4.1 Introduction -- 4.2 Digital Twin -- 4.2.1 Digital Twins in Manufacturing Industry -- 4.2.2 Integration with Emerging Technologies -- 4.2.3 Real-World Reflection Through Sensors -- 4.2.4 Land Management and Global Concerns -- 4.2.5 Increasing Importance of Information Technologies -- 4.2.6 Advancements in IoT and Connectivity -- 4.2.7 Role of Artificial Intelligence (AI) in Digital Twins -- 4.2.8 Cloud Computing Empowering Digital Twins -- 4.2.9 Impact of 5G Technology -- 4.2.10 Smart Cities and the Growing Application Field -- 4.2.11 Big Data's Role in Informed Decision Making -- 4.3 Digital Twin and Metaverse -- 4.3.1 Virtual Prototyping and Design Optimization -- 4.3.2 Healthcare Integration for Personalized Medicine -- 4.3.3 The Intersection of Digital Twins and the Metaverse -- 4.3.4 Immersive Collaborative Environments -- 4.3.5 Enhanced Virtual Experiences Through Data Fusion -- 4.3.6 Challenges and Future Developments -- 4.3.7 Data Privacy and Security Concerns -- 4.3.8 Standardization and Interoperability -- 4.4 Blockchain Technology -- 4.4.1 Overview of Blockchain Technology -- 4.4.2 Data Checking and Analysis -- 4.4.3 Immutable History -- 4.4.4 Potential Problem Solving -- 4.4.5 Rapid Adoption by Major Companies…”
    Libro electrónico
  3. 4943
    Publicado 2025
    Tabla de Contenidos: “…5.4.1 Different deployment strategies for UAVs in healthcare -- 5.4.2 Logistical considerations -- 5.5 Security challenges and solutions -- 5.5.1 Security challenges associated with UAVs in healthcare -- 5.5.2 Potential solutions and mitigation strategies -- 5.5.3 Importance of regulatory compliance and adherence to safety standards -- 5.6 Regulatory and legal framework -- 5.6.1 Need for standardized regulations and guidelines to ensure safe and ethical use of UAVs -- 5.7 Conclusion and future scope -- References -- Chapter 6: Blockchain technologies using machine learning -- 6.1 Introduction -- 6.2 Understanding blockchain technologies -- 6.2.1 Introduction to blockchain -- 6.2.2 Key components of a blockchain network -- 6.2.3 Consensus mechanisms and their impact -- 6.2.4 Benefits and limitations of BCT -- 6.2.4.1 Benefits of BCT -- 6.2.4.2 Limitations of BCT -- 6.3 ML fundamentals -- 6.3.1 Overview of ML -- 6.3.2 Types of ML algorithms -- 6.3.2.1 Supervised learning algorithms -- 6.3.2.2 Unsupervised learning algorithms -- 6.3.2.3 Semi-supervised learning algorithms -- 6.3.2.4 Reinforcement learning algorithms -- 6.3.2.5 Deep learning algorithms -- 6.3.3 Data pre-processing and feature engineering -- 6.3.3.1 Data pre-processing -- 6.3.3.2 Feature engineering -- 6.4 Evaluating ML models -- 6.4.1 Common evaluation metrics -- 6.5 Synergies between blockchain and ML -- 6.5.1 Combining ML models on the blockchain -- 6.6 Applications of blockchain and ML integration -- 6.7 Challenges and limitations in BCT and ML integration -- 6.7.1 Scalability issues -- 6.7.2 Data availability and quality -- 6.7.3 Regulatory and legal challenges -- 6.7.4 Trusted oracles and data feeds -- 6.7.5 Energy efficiency concerns -- 6.8 Future prospects and research directions -- 6.8.1 Federated learning on blockchain networks…”
    Libro electrónico
  4. 4944
    Publicado 2023
    Tabla de Contenidos: “…Chapter 10 An Introduction to Security in Internet of Things (IoT) and Big Data -- 10.1 Introduction -- 10.2 Allusion Design of IoT -- 10.2.1 Stage 1-Edge Tool -- 10.2.2 Stage 2-Connectivity -- 10.2.3 Stage 3-Fog Computing -- 10.2.4 Stage 4-Data Collection -- 10.2.5 Stage 5-Data Abstraction -- 10.2.6 Stage 6-Applications -- 10.2.7 Stage 7-Cooperation and Processes -- 10.3 Vulnerabilities of IoT -- 10.3.1 The Properties and Relationships of Various IoT Networks -- 10.3.2 Device Attacks -- 10.3.3 Attacks on Network -- 10.3.4 Some Other Issues -- 10.3.4.1 Customer Delivery Value -- 10.3.4.2 Compatibility Problems With Equipment -- 10.3.4.3 Compatibility and Maintenance -- 10.3.4.4 Connectivity Issues in the Field of Data -- 10.3.4.5 Incorrect Data Collection and Difficulties -- 10.3.4.6 Security Concern -- 10.3.4.7 Problems in Computer Confidentiality -- 10.4 Challenges in Technology -- 10.4.1 Skepticism of Consumers -- 10.5 Analysis of IoT Security -- 10.5.1 Sensing Layer Security Threats -- 10.5.1.1 Node Capturing -- 10.5.1.2 Malicious Attack by Code Injection -- 10.5.1.3 Attack by Fake Data Injection -- 10.5.1.4 Sidelines Assaults -- 10.5.1.5 Attacks During Booting Process -- 10.5.2 Network Layer Safety Issues -- 10.5.2.1 Attack on Phishing Page -- 10.5.2.2 Attacks on Access -- 10.5.2.3 Attacks on Data Transmission -- 10.5.2.4 Attacks on Routing -- 10.5.3 Middleware Layer Safety Issues -- 10.5.3.1 Attack by SQL Injection -- 10.5.3.2 Attack by Signature Wrapping -- 10.5.3.3 Cloud Attack Injection with Malware -- 10.5.3.4 Cloud Flooding Attack -- 10.5.4 Gateways Safety Issues -- 10.5.4.1 On-Boarding Safely -- 10.5.4.2 Additional Interfaces -- 10.5.4.3 Encrypting End-to-End -- 10.5.5 Application Layer Safety Issues -- 10.5.5.1 Theft of Data -- 10.5.5.2 Attacks at Interruption in Service -- 10.5.5.3 Malicious Code Injection Attack…”
    Libro electrónico
  5. 4945
    por Smyth, Neil
    Publicado 2020
    Tabla de Contenidos: “…Kotlin Data Types,Variables and Nullability -- 12.1 Kotlin Data Types -- 12.1.1 Integer Data Types -- 12.1.2 Floating Point Data Types -- 12.1.3 Boolean Data Type -- 12.1.4 Character Data Type -- 12.1.5 String Data Type -- 12.1.6 Escape Sequences -- 12.2 Mutable Variables -- 12.3 Immutable Variables -- 12.4 Declaring Mutable and Immutable Variables -- 12.5 Data Types are Objects -- 12.6 Type Annotations and Type Inference -- 12.7 Nullable Type -- 12.8 The Safe Call Operator -- 12.9 Not-Null Assertion -- 12.10 Nullable Types and the let Function -- 12.11 Late Initialization (lateinit) -- 12.12 The Elvis Operator -- 12.13 Type Casting and Type Checking -- 12.14 Summary -- 13. …”
    Libro electrónico
  6. 4946
    por Ebel, Nadin
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Geleitwort von Per Kall -- Geleitwort von Martin Bucksteeg und Ralf Engler -- Vorwort -- Teil I - Grundlagen zum IT Service Management, ITIL und ITIL 4 -- 1 ITIL und IT Service Management -- 1.1 ITIL - ein erster Überblick -- 1.2 Grundlegende Begriffe im Service Management -- 1.2.1 Dienstleistungen (Services) -- 1.2.1.1 Wertschöpfungskonfiguration -- 1.2.1.2 Gestaltung von Dienstleistungsprozessen -- 1.2.2 Dienstleistungen in der IT (IT Services) -- 1.3 IT-Dienstleistungsmanagement mit ITIL -- 1.3.1 ITIL als Best Practice -- 1.3.2 Chancen und Vorteile -- 1.3.3 Risiken und Hemmnisse -- 1.4 Die Inhalte des ITIL 4 Frameworks -- 1.4.1 ITIL Service Value System -- 1.4.2 Vier-Dimensionen-Modell -- 1.5 Enterprise Service Management (ESM) -- 1.6 Zusammenfassung -- 1.7 Beispielfragen -- 2 ITIL und ITSM-Veröffentlichungen im Überblick -- 2.1 Die ITIL-Historie -- 2.1.1 ITIL V 1 -- 2.1.2 ITIL V 2 -- 2.1.3 ITIL V 3, ITIL Edition 2007 -- 2.1.4 ITIL V 3, ITIL Edition 2011 -- 2.1.5 ITIL Practitioner -- 2.1.6 ITIL 4 -- 2.2 Frameworks und Best Practices als ITIL-Inhalte -- 2.3 Weitere nicht proprietäre und proprietäre ITSM Frameworks -- 2.3.1 FitSM -- 2.3.2 YaSM -- 2.3.3 VeriSM -- 2.3.4 BSM -- 2.3.4.1 Services und Service Management -- 2.3.4.2 Menschen und Mitarbeiter -- 2.3.4.3 Practices -- 2.3.4.4 Tools und Technik der IT -- 2.3.5 CMMI-SVC -- 2.3.5.1 CMMI-Modelle -- 2.3.5.2 CMMI für Dienstleistungen -- 2.3.6 USMBOK -- 2.3.7 IT4IT -- 2.3.8 Agile Skalierungsframeworks -- 2.3.8.1 SAFe -- 2.3.8.2 Large Scale Scrum (LeSS) -- 2.4 Zusammenfassung -- Teil II - ITL 4 -- 3 Schlüsselkonzepte in ITIL 4 -- 3.1 Service Management und der Wertbeitrag für den Kunden -- 3.2 Stakeholder -- 3.3 Services und Produkte für die Wertschöpfung -- 3.4 Service-Beziehungen -- 3.5 Bestandteile des (Mehr-)Werts -- 3.5.1 Output und Ergebnis (Outcome) -- 3.5.2 Kosten -- 3.5.3 Risiken…”
    Libro electrónico
  7. 4947
    Publicado 2023
    Tabla de Contenidos: “…-- 1.1.3 Why a BMS Is Required in Any Energy Storage System -- 1.1.4 How a BMS Makes a Storage System Efficient, Safe, and Dependable -- 1.2 Example of a BMS in a Real System -- 1.2.1 LabView Based BMS -- 1.2.2 PLC Based BMS -- 1.2.3 Microprocessor Based BMS -- 1.2.4 Microcontroller Based BMS -- 1.3 System Failures Due to the Absence of a BMS -- 1.3.1 Dreamline Boeing Fire Incidences -- 1.3.2 Fire Accident at the Hawaii Grid Connected Energy Storage -- 1.3.3 Fire Accidents in Electric Vehicles -- References -- 2 General Requirements (Functions and Features) -- 2.1 Basic Functions of a BMS -- 2.1.1 Key Parameter Monitoring -- 2.1.2 Battery State Analysis -- 2.1.3 Safety Management -- 2.1.4 Energy Control Management -- 2.1.5 Information Management -- 2.2 Topological Structure of a BMS -- 2.2.1 Relationship Between a BMC and a Cell -- 2.2.2 Relationship Between a BCU and a BMC -- References -- 3 General Procedure of the BMS Design -- 3.1 Universal Battery Management System and Customized Battery Management System -- 3.1.1 Ideal Condition -- 3.1.2 Feasible Solution -- 3.1.3 Discussion of Universality -- 3.2 General Development Flow of the Power Battery Management System -- 3.2.1 Applicable Standards for BMS Development -- 3.2.2 Boundary of BMS Development -- 3.2.3 Battery Characteristic Test Is Essential to BMS Development -- 3.3 Core Status of Battery Modeling in the BMS Development Process -- References -- Part II Li-Ion Batteries -- 4 Introduction to Li-Ion Batteries -- 4.1 Components of Li-Ion Batteries: Electrodes, Electrolytes, Separators, and Cell Packing -- 4.2 Li-Ion Electrode Manufacturing…”
    Libro electrónico
  8. 4948
    Publicado 2023
    Tabla de Contenidos: “…9.4.2 Calculation for Even Numbers -- 9.4.3 Corollaries -- 9.4.4 Code Snippet -- 9.4.5 Output -- 9.5 Conclusion -- References -- Chapter 10 Solution of Matrix Games With Pay.Offs of Single-Valued Neutrosophic Numbers and Its Application to Market Share Problem -- 10.1 Introduction -- 10.2 Preliminaries -- 10.3 Matrix Games With SVNN Pay-Offs and Concept of Solution -- 10.4 Mathematical Model Construction for SVNNMG -- 10.4.1 Algorithm for Solving SVNNMG -- 10.5 Numerical Example -- 10.5.1 A Market Share Problem -- 10.5.2 The Solution Procedure and Result Discussion -- 10.5.3 Analysis and Comparison of Results With Li and Nanfs Approach -- 10.6 Conclusion -- References -- Chapter 11 A Novel Score Function-Based EDAS Method for the Selection of a Vacant Post of a Company with q-Rung Orthopair Fuzzy Data -- 11.1 Introduction -- 11.2 Preliminaries -- 11.3 A Novel Score Function of q-ROFNs -- 11.3.1 Some Existing q-ROF Score Functions -- 11.3.2 A Novel Score Function of q-ROFNs -- 11.4 EDAS Method for q-ROF MADM Problem -- 11.5 Numerical Example -- 11.6 Comparative Analysis -- 11.7 Conclusions -- Acknowledgments -- References -- Chapter 12 Complete Generalized Soft Lattice -- 12.1 Introduction -- 12.2 Soft Sets and Soft Elements.Some Basic Concepts -- 12.3 gs-Posets and gs-Chains -- 12.4 Soft Isomorphism and Duality of gs-Posets -- 12.5 gs-Lattices and Complete gs-Lattices -- 12.6 s-Closure System and s-Moore Family -- 12.7 Complete gs-Lattices From s-Closure Systems -- 12.8 A Representation Theorem of a Complete gs-Lattice as an s-Closure System -- 12.9 gs-Lattices and Fixed Point Theorem -- References -- Chapter 13 Data Representation and Performance in a Prediction Model -- 13.1 Introduction -- 13.1.1 Various Methods for Predictive Modeling -- 13.1.2 Problem Definition -- 13.2 Data Description and Representations -- 13.3 Experiment and Result…”
    Libro electrónico
  9. 4949
    Publicado 2023
    Tabla de Contenidos: “…4.7.7 Sample Data Flow for Exception Handling -- 4.7.8 Sample Data Flow through Digital Twin Applications -- 4.7.9 Development Considerations -- 4.8 Database Considerations -- 4.9 Messaging -- 4.10 Interfaces -- 4.11 User Experience -- 4.12 Cyber Security -- 4.13 Use Case Coverage -- 4.14 Future Direction and Trends -- 4.15 Conclusion -- References -- Chapter 5 Role of Digital Twin Technology in Medical Sector-Toward Ensuring Safe Healthcare -- 5.1 Introduction to Digital Twin -- 5.2 Generic Applications of Digital Twin -- 5.3 Digital Twin Applications in Medical Field -- 5.3.1 Biosignal and Physiological Parameters Analysis for Body Area Network -- 5.3.2 Medicinal Drug Delivery -- 5.3.3 Surgical Preplanning -- 5.3.4 COVID 19 Screening and Diagnosis -- 5.4 Ongoing and Future Applications of Digital Twin in Healthcare Sector -- 5.5 Conclusion -- Acknowledgments -- References -- Chapter 6 Digital Twin as a Revamping Tool for Construction Industry -- 6.1 Introduction -- 6.2 Introduction to Digital Twin -- 6.3 Overview of Digital Twin in Construction -- 6.4 The Perks of Digital Twin -- 6.5 The Evolution of Digital Twin -- 6.6 Application of Digital Twin Technology in Construction Industry -- 6.7 Digital Twins Application for Construction Working Personnel Safety -- 6.8 Digital Twin Applications in Smart City Construction -- 6.9 Discussion -- 6.10 Conclusion -- References -- Chapter 7 Digital Twin Applications and Challenges in Healthcare -- 7.1 Introduction -- 7.2 Digital Twin -- 7.3 Applications of Digital Twin -- 7.3.1 Smart Cities -- 7.3.2 Manufacturing Sector -- 7.3.3 Healthcare -- 7.3.4 Aviation -- 7.3.5 The Disney Park -- 7.4 Challenges with Digital Twin -- 7.5 Digital Twin in Healthcare -- 7.5.1 Digital Twin for Hospital Workflow Management -- 7.5.2 Digital Twin for a Healthcare Facility…”
    Libro electrónico
  10. 4950
    por Srinivasan, A.
    Publicado 2014
    Tabla de Contenidos: “…-- Summary -- Key Terms -- Review Questions -- Chapter 2: Move to Cloud Computing -- 2.1 Pros and Cons of Cloud Computing -- 2.1.1 Advantages of Cloud Computing in IT Field -- 2.1.2 The Fixed Cost Advantage -- 2.1.3 Keeping Data Safe -- 2.1.4 The Possible Disadvantages of Cloud Computing -- 2.1.5 Advantages of Cloud Computing -- 2.1.6 Disadvantages of Cloud Computing -- 2.2 Nature of the Cloud -- 2.2.1 Leveraging the Internet to Change the World -- 2.3 Technologies in Cloud Computing -- 2.3.1 Other Cloud-related Technologies -- 2.3.2 Working of Cloud -- 2.3.3 Key Characteristic of Cloud and its Role -- 2.4 Migrating into the Cloud -- 2.4.1 Cloud Computing Migration Issues: What You Need to Know? …”
    Libro electrónico
  11. 4951
    Publicado 2015
    Tabla de Contenidos: “…Cover; Title; Copyright; Contents; 1 The Stay Interview; 2 Preparing to Conduct Stay Interviews; 3 Four Essential Skills; 4 Managing the Exchange; 5 Developing Stay Plans; 6 Closing and Forecasting; 7 Avoiding the Thirteen Stay Interview Traps; 8 Experienced Managers Tell Their Tales; 9 Based on a True Story; Index; A; B; C; D; E; F; G; H; I; L; M; N; O; P; Q; R; S; T; U; V; W; About the Author; Free Sample Chapter from 101 Tough Conversations to Have with Employees by Paul Falcone…”
    Libro electrónico
  12. 4952
    Publicado 2014
    “…"Bestselling author and top business consultant D.A. Benton shows how to stay relevant and competitive in any stage of your career in today's fast-changing business environment The CEO Difference describes how to keep your career on an upwards trajectory through positively differentiating yourself, openness to change, self-motivation, and staying intellectually curious.Debra Benton is an internationally known speaker, consultant, and bestselling author. …”
    Libro electrónico
  13. 4953
    por Lambert, Joan
    Publicado 2013
    “…Experience learning made easy—and quickly teach yourself how to stay organized and stay connected using Outlook 2013. …”
    Libro electrónico
  14. 4954
    por Williams, Todd C.
    Publicado 2011
    “…Back from the brink-the first fail-safe recovery plan for turning around troubled projects…”
    Libro electrónico
  15. 4955
    por Falcone, Paul
    Publicado 2001
    “…Fast answers to the most pressing questions about how to safely, effectively hire and fire employees…”
    Libro electrónico
  16. 4956
    por Wallace, Michael, 1960-
    Publicado 2010
    “…No organization is safe without a disaster recovery plan in place. Expanded and up to date, this is the ultimate resource…”
    Libro electrónico
  17. 4957
    Publicado 2013
    “…Also for clinical application we need to understand better, their separation methods and safe manipulation. This book is written to clarify some aspects of stem cell biology, their characteristics, assessment of damage to cells during ex vivo manipulation and also their role in a model of cancers (chronic myeloid leukemia)…”
    Libro electrónico
  18. 4958
    Publicado 2020
    “…Veterinary pharmaceuticals provide animals with the requisite, complete animal health care. The availability of safe and good quality medicines in the right amounts is needed in achieving optimum animal health care. …”
    Libro electrónico
  19. 4959
    Publicado 2023
    “…"In a psychologically safe workplace, people feel free to share ideas, mistakes, and criticisms. …”
    Grabación no musical
  20. 4960
    Publicado 2023
    “…Welcome to Assemble You Audio Learning. In a psychologically safe work environment, people feel free to share ideas, mistakes and criticisms. …”
    Grabación no musical