Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 453
- History 424
- Development 371
- Economics 297
- Application software 283
- Education 278
- Social aspects 255
- Historia 220
- Computer programs 214
- Engineering & Applied Sciences 209
- Cloud computing 206
- Data processing 200
- Computer networks 183
- Artificial intelligence 174
- Economic aspects 147
- Computer Science 139
- Information technology 134
- Security measures 134
- Technological innovations 133
- Database management 132
- Computer security 130
- Government policy 129
- Economic conditions 128
- Social Issues/Migration/Health 125
- Leadership 120
- Research 116
- Computer software 115
- Business & Economics 109
- Design 109
- Social conditions 109
-
10501Publicado 2017“…In addition, information on innovative experimental methods is scattered across scientific literature and only partially available in the form of textbooks or guidelines. …”
Libro electrónico -
10502Publicado 2009“…This book presents the state-of-the-art in visual media coding and transmission Visual Media Coding and Transmission Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and home platforms. …”
Libro electrónico -
10503Publicado 2018“…It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace"-- Provided by publisher…”
Libro electrónico -
10504Publicado 2017Tabla de Contenidos: “…Fong -- 12.1 Introduction 197 -- 12.2 Characteristics of Wireless Sensor Networks 198 -- 12.3 Distributed Computing 201 -- 12.4 Parallel Computing 202 -- 12.5 Self-Organizing Networks 205 -- 12.6 Operating Systems for Sensor Networks 206 -- 12.7 Web of Things (WoT) 207 -- 12.8 Wireless Sensor Network Architecture 208 -- 12.9 Modularizing the Wireless Sensor Nodes 209 -- 12.10 Conclusion 210 -- 13 Networking Protocols and Standards for Internet of Things 215 /Tara Salman and Raj Jain -- 13.1 Introduction 215 -- 13.2 IoT Data Link Protocols 218 -- 13.3 Network Layer Routing Protocols 224 -- 13.4 Network Layer Encapsulation Protocols 225 -- 13.5 Session Layer Protocols 227 -- 13.6 IoT Management Protocols 232 -- 13.7 Security in IoT Protocols 233 -- 13.8 IoT Challenges 234 -- 13.9 Summary 235 -- 14 IoT Architecture 239 /Shyam Varan Nath -- 14.1 Introduction 239 -- 14.2 Architectural Approaches 239 -- 14.3 Business Markitecture 242 -- 14.4 Functional Architecture 243 -- 14.5 Application Architecture 243 -- 14.6 Data and Analytics Architecture 246 -- 14.7 Technology Architecture 246 -- 14.8 Security and Governance 248 -- 15 A Designer's Guide to the Internet of Wearable Things 251 /David Hindman and Peter Burnham -- 15.1 Introduction 251 -- 15.2 Interface Glanceability 252 -- 15.3 The Right Data at the Right Time 254 -- 15.4 Consistency Across Channels 255 -- 15.5 From Public to Personal 260.…”
Libro electrónico -
10505Publicado 2017Tabla de Contenidos: “…Cognitive creolistics and semantic primes: A phylogenetic network analysis -- 13.1 Introduction -- 13.2 Exponents of semantic primes across creole languages -- 13.2.1 Materials -- 13.3 Character coding and phylogenetic algorithm -- 13.4 Results -- 13.5 Discussion -- 13.6 Concluding remarks -- Acknowledgments -- Notes -- References -- Chapter 14. …”
Libro electrónico -
10506Publicado 2007Tabla de Contenidos: “…Adding Additional Series to a Pivot Chart -- Returning to a Pivot Table for Advanced Operations -- Filtering a Pivot Table -- Filtering Using a Report Filter Field -- Using the Excel 2007 Filters for Axis and Legend Fields -- Creating a Chart for Every Customer -- Stratifying Invoice Amounts -- Next Steps -- 9 Presenting Data Visually Without Charts -- Creating Charts in the Worksheet Cells -- Using Data Bars to Create In-Cell Bar Charts -- Customizing Data Bars -- Controlling the Size of the Smallest/Largest Bar -- Showing Data Bars for a Subset of Cells -- Using Color Scales to Highlight Extremes -- Converting to Monochromatic Data Bars -- Troubleshooting Color Scales -- Using Icon Sets to Segregate Data -- Setting Up an Icon Set -- Moving Numbers Closer to Icons -- Reversing the Sequence of Icons -- Creating a Chart Using Conditional Formatting in Worksheet Cells -- Creating a Chart Using the REPT Function -- Creating a Chart Using Scrollbar Controls -- Creating Stem-and-Leaf Plots -- Creating a Stem-and-Leaf Plot with X's as the Leaves -- Creating a Stem-and-Leaf Plot with Digits as the Leaves Using a Long Formula -- Creating a Stem-and-Leaf Plot with Digits as the Leaves Using Sorting and Formulas -- Next Steps -- 10 Presenting Your Excel Data on a Map Using Microsoft MapPoint -- Plotting Data Geographically -- Building a Map in Excel -- Using a Chart on a Map -- Using Other Map Styles to Illustrate Data -- Mapping Your Customers -- Next Steps -- 11 Using SmartArt Graphics and Shapes -- Understanding SmartArt Graphics and Shapes -- Using SmartArt -- Elements Common Across Most SmartArt -- A Tour of the SmartArt Categories -- Inserting SmartArt -- Micromanaging SmartArt Elements -- Controlling SmartArt Shapes from the Text Pane -- Adding Images to SmartArt -- Special Considerations for Organization Charts -- Using Limited SmartArt…”
Libro electrónico -
10507Publicado 2012Tabla de Contenidos: “…7.5 Spectrum Sensing 190 -- 7.5.1 Multidimensional Spectrum Awareness 190 -- 7.5.2 Complexity of Spectrum Sensing 193 -- 7.5.3 Implementation of Spectrum Sensing 195 -- 7.5.4 Cooperative Spectrum Sensing 199 -- 7.5.5 Spectrum Sensing in Current Wireless Standards 200 -- 7.6 Security in Cognitive Radios 201 -- 7.7 Concluding Remarks 201 -- 7.7.1 Development of Cognitive Radios 201 -- 7.7.2 Modeling and Simulation of Cognitive Radios 202 -- 7.7.3 Historical Perspective 202 -- Bibliography 202 -- Part III THE OPEN ARCHITECTURE MODEL -- 8 Open Architecture in Tactical Networks 207 -- 8.1 Commercial Cellular Wireless Open Architecture Model 208 -- 8.2 Tactical Wireless Open Architecture Model 210 -- 8.3 Open Architecture Tactical Protocol Stack Model 211 -- 8.3.1 Tactical Wireless Open Architecture Model Entities 213 -- 8.3.2 Open Architecture Tactical Wireless Model ICDs 216 -- 8.4 The Tactical Edge 219 -- 8.4.1 Tactical Edge Definition 219 -- 8.4.2 Tactical Edge Analysis 220 -- 8.5 Historical Perspective 222 -- Bibliography 224 -- 9 Open Architecture Details 225 -- 9.1 The Plain Text IP Layer and the Tactical Edge 225 -- 9.2 Measurement Based Resource Management 227 -- 9.2.1 Advantages and Challenges of MBRM 228 -- 9.2.2 Congestion Severity Level 229 -- 9.2.3 Markov Chain Representation of MBAC 231 -- 9.2.4 Regulating the Flow of Traffic between Two Nodes 233 -- 9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233 -- 9.2.6 Packet Loss from the Physical Layer 234 -- 9.3 ICD I: Plain Text IP Layer to HAIPE 238 -- 9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239 -- 9.4.1 TCP Proxy over HAIPE 239 -- 9.4.2 VoIP Proxy over HAIPE 241 -- 9.4.3 Video Proxy over HAIPE 247 -- 9.4.4 RSVP Proxy over HAIPE 248 -- 9.4.5 Multicast Proxy over HAIPE 252 -- 9.5 ICD X Cross Layer Signaling across the HAIPE 255 -- 9.6 Concluding Remarks 258 -- 9.7 Historical Perspective 258 -- Bibliography 259 -- 10 Bringing Commercial Cellular Capabilities to Tactical Networks 261 -- 10.1 Tactical User Expectations 262.…”
Libro electrónico -
10508Publicado 2018Tabla de Contenidos: “…Reconciling Identifiers Across Institutions -- Section 8.5. Case Study: The Trusted Timestamp -- Section 8.6. …”
Libro electrónico -
10509Publicado 2009Tabla de Contenidos: “…Data Type Conversion -- The CAST Function -- CAST Versus Oracle's Conversion Functions -- Formatting Data -- Lab 5.5 Exercises -- Lab 5.5 Exercise Answers -- Lab 5.5 Quiz -- Workshop -- CHAPTER 6 Aggregate Functions, GROUP BY, and HAVING Clauses -- LAB 6.1 Aggregate Functions -- The COUNT Function -- The SUM Function -- The AVG Function -- The MIN and MAX Functions -- MIN and MAX with Different Data Types -- Aggregate Functions and Nulls -- Aggregate Functions and CASE -- Aggregate Function Syntax -- Lab 6.1 Exercises -- Lab 6.1 Exercise Answers -- Lab 6.1 Quiz -- LAB 6.2 The GROUP BY and HAVING Clauses -- The GROUP BY Clause -- The HAVING Clause -- Nesting Aggregate Functions -- Taking Aggregate Functions and Groups to the Next Level -- Lab 6.2 Exercises -- Lab 6.2 Exercise Answers -- Lab 6.2 Quiz -- Workshop -- CHAPTER 7 Equijoins -- LAB 7.1 The Two-Table Join -- Steps to Formulate the SQL Statement -- Table Aliases -- Narrowing Down Your Result Set -- Nulls and Joins -- ANSI Join Syntax -- The Cartesian Product -- Lab 7.1 Exercises -- Lab 7.1 Exercise Answers -- Lab 7.1 Quiz -- LAB 7.2 Joining Three or More Tables -- Joining Three or More Tables -- ANSI Join Syntax for Joining Three or More Tables -- Multicolumn Joins -- Joining Across Many Tables -- The ANSI Join Versus the Traditional Join Syntax -- Using SQL Developer's Query Builder -- Different Types of Joins -- Lab 7.2 Exercises -- Lab 7.2 Exercise Answers -- Lab 7.2 Quiz -- Workshop -- CHAPTER 8 Subqueries -- LAB 8.1 Simple Subqueries -- Scalar Subqueries -- Subqueries That Return Multiple Rows -- Nesting Multiple Subqueries -- Subqueries and Joins -- Subqueries That Return Multiple Columns -- Subqueries and Nulls -- ORDER BY Clause in Subqueries -- Lab 8.1 Exercises -- Lab 8.1 Exercise Answers -- Lab 8.1 Quiz -- LAB 8.2 Correlated Subqueries -- Reviewing Rows with Correlated Subqueries…”
Libro electrónico -
10510Publicado 2003Tabla de Contenidos: “…Cultural adoption and organizational readiness -- 16.1 Learning strategy in the organization -- 16.2 Share the vision across the organization -- 16.3 Lay the foundations for an e-Learning strategy -- 16.4 Implement the strategy -- 16.4.1 Integrate technologies -- 16.4.2 Do not "roll-out" -- 16.4.3 Culture change takes time -- 16.5 Transitioning to new roles -- 16.5.1 Overcoming resistance -- 16.5.2 Traditional training personnel in a new context -- 16.6 Assess the effectiveness of e-Learning -- 16.6.1 Ten things we know about good learning -- 16.6.2 Quality assurance -- Appendix A. …”
Libro electrónico -
10511Publicado 2021Tabla de Contenidos: “…-- 3.1.2 Softmax and probability distributions -- 3.1.3 Interpreting the success of active learning -- 3.2 Algorithms for uncertainty sampling -- 3.2.1 Least confidence sampling -- 3.2.2 Margin of confidence sampling -- 3.2.3 Ratio sampling -- 3.2.4 Entropy (classification entropy) -- 3.2.5 A deep dive on entropy -- 3.3 Identifying when different types of models are confused -- 3.3.1 Uncertainty sampling with logistic regression and MaxEnt models -- 3.3.2 Uncertainty sampling with SVMs -- 3.3.3 Uncertainty sampling with Bayesian models -- 3.3.4 Uncertainty sampling with decision trees and random forests -- 3.4 Measuring uncertainty across multiple predictions -- 3.4.1 Uncertainty sampling with ensemble models -- 3.4.2 Query by Committee and dropouts -- 3.4.3 The difference between aleatoric and epistemic uncertainty -- 3.4.4 Multilabeled and continuous value classification -- 3.5 Selecting the right number of items for human review -- 3.5.1 Budget-constrained uncertainty sampling -- 3.5.2 Time-constrained uncertainty sampling -- 3.5.3 When do I stop if I'm not time- or budget-constrained? …”
Libro electrónico -
10512Publicado 2017Tabla de Contenidos: “…4.5 Detecting Memory Objects Written by a Kernel -- 5 SnuCL extensions to OpenCL -- 6 Performance evaluation -- 6.1 Evaluation Methodology -- 6.2 Performance -- 6.2.1 Scalability on the medium-scale GPU cluster -- 6.2.2 Scalability on the large-scale CPU cluster -- 7 Conclusions -- Acknowledgments -- References -- Chapter 3: Thread communication and synchronization on massively parallel GPUs -- 1 Introduction -- 2 Coarse-Grained Communication and Synchronization -- 2.1 Global Barrier at the Kernel Level -- 2.2 Local Barrier at the Work-Group Level -- 2.3 Implicit Barrier at the Wavefront Level -- 3 Built-In Atomic Functions on Regular Variables -- 4 Fine-Grained Communication and Synchronization -- 4.1 Memory Consistency Model -- 4.1.1 Sequential consistency -- 4.1.2 Relaxed consistency -- 4.2 The OpenCL 2.0 Memory Model -- 4.2.1 Relationships between two memory operations -- 4.2.2 Special atomic operations and stand-alone memory fence -- 4.2.3 Release and acquire semantics -- 4.2.4 Memory order parameters -- 4.2.5 Memory scope parameters -- 5 Conclusion and Future Research Direction -- References -- Chapter 4: Software-level task scheduling on GPUs -- 1 Introduction, Problem Statement, and Context -- 2 Nondeterministic behaviors caused by the hardware -- 2.1 P1: Greedy -- 2.2 P2: Not Round-Robin -- 2.3 P3: Nondeterministic Across Runs -- 2.4 P4: Oblivious to Nonuniform Data Sharing -- 2.5 P5: Serializing Multikernel Co-Runs -- 3 SM-centric transformation -- 3.1 Core Ideas -- 3.1.1 SM-centric task selection -- Correctness issues -- 3.1.2 Filling-retreating scheme -- 3.2 Implementation -- 3.2.1 Details -- 4 Scheduling-enabled optimizations -- 4.1 Parallelism Control -- 4.2 Affinity-Based Scheduling -- 4.2.1 Evaluation -- 4.3 SM Partitioning for Multi-Kernel Co-Runs -- 4.3.1 Evaluation -- 5 Other scheduling work on GPUs -- 5.1 Software Approaches…”
Libro electrónico -
10513Publicado 2024Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: Fundamentals of AI-Based Smart Manufacturing -- Chapter 1: Machine Learning Fundamentals -- 1.1 Introduction -- 1.2 Classification -- 1.2.1 Linear Model -- 1.2.1.1 Logistic Regression -- 1.2.1.2 Support Vector Machine -- 1.2.2 Nonlinear Model -- 1.2.2.1 K-Nearest Neighbor -- 1.2.2.2 Naive Bayes -- 1.2.2.3 Decision Tree -- 1.2.2.4 Random Forest -- 1.3 Regression -- 1.3.1 Linear Regression -- 1.3.2 Multiple Linear Regression -- 1.3.3 Logistic Regression -- 1.3.3.1 Three Types of Logistic Regression -- 1.3.4 Polynomial Regression -- 1.3.5 Support Vector Regression -- 1.3.6 Decision Tree Regression -- 1.3.7 Random Forest Regression -- 1.3.7.1 Random Forest Algorithm in Practice -- 1.3.7.2 Random Forest Algorithm Application Examples -- 1.3.8 Lasso Regression -- 1.4 Clustering -- 1.4.1 Clustering Algorithms -- 1.4.2 K-Means Clustering Algorithm -- 1.4.3 Mean Shift Clustering Algorithm -- 1.4.4 DBSCAN Clustering -- 1.4.4.1 Two Elements Required by DBSCAN -- 1.4.4.2 Steps followed to do DBSCAN Algorithm -- 1.5 Conclusion -- References -- Chapter 2: Industry 4.0 in Manufacturing, Communication, Transportation, Healthcare -- 2.1 Introduction -- 2.1.1 The Significance of Industry 4.0 Across Multiple Domains -- 2.2 Industry 4.0 in Manufacturing: Overview -- 2.2.1 Benefits of Industry 4.0 in Manufacturing -- 2.2.2 Examples of Industry 4.0 in Manufacturing -- 2.2.3 Challenges in Implementation of Industry 4.0 in Manufacturing -- 2.3 Industry 4.0 in Communication: Overview -- 2.3.1 Benefits of Industry 4.0 in Communication -- 2.3.2 Examples of Industry 4.0 in Communication -- 2.3.3 Challenges of Implementing Industry 4.0 in Communication -- 2.4 Industry 4.0 in Transportation: Overview -- 2.4.1 Industry 4.0â€TMs Advantages for Transportation…”
Libro electrónico -
10514por Guidetti, OliverTabla de Contenidos: “…3.5.1 Example 4: authentication gaps: losing user trust to malicious exploits -- 3.5.2 Example 5: credential stuffing, blaming users for data theft -- 3.6 Cyber and cognitive resilience building -- 3.6.1 Humans need to know what they are doing to manage their cybersecurity -- 3.6.2 Humans need to understand what can go wrong -- 3.6.3 Humans need to be willing to learn from their (and others) experiences -- 3.6.4 Thinking under pressure: navigating the digital world -- 3.6.5 Humans need to adapt to the fast-moving digitisation of the world -- 3.7 Conclusion -- 3.8 Acknowledgement -- References -- 4 Cybersecurity in australian higher education curricula: the SFIA framework -- 4.1 Introduction -- 4.2 Curriculum design -- 4.3 Frameworks -- 4.4 Skills framework for the information age (SFIA) -- 4.5 Two examples of accrediting bodies -- 4.6 Other frameworks -- 4.6.1 NIST national initiative for cybersecurity education (NICE): the United States -- 4.6.2 CSEC2017 for cyber and CC2020 for computer science -- 4.6.3 The cybersecurity body of knowledge (CyBOK) - UK -- 4.6.4 Cybersecurity skills framework (SPARTA) - Europe -- 4.7 Discussion -- 4.8 Conclusion -- References -- 5 Dark echoes: the exploitative potential of generative AI in online harassment -- 5.1 Background -- 5.1.1 Introduction to generative AI -- 5.1.2 Applications across various domains -- 5.1.3 Fundamentals of generative AI algorithms -- 5.1.4 Autonomous creation of lifelike content -- 5.1.5 Ethical and security implications -- 5.1.6 Vulnerabilities exploited by malicious actors -- 5.2 Significance of the issue -- 5.2.1 Escalation of online harassment through generative AI -- 5.2.2 Legal and ethical quandaries -- 5.2.3 Strategies for detection, prevention, and redress -- 5.3 Generative AI and online harassment: an unholy alliance -- 5.3.1 Exploitative potential -- 5.3.2 Lifelike content creation…”
Publicado 2024
Libro electrónico -
10515Publicado 2014Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Copyright -- Contents -- Editor Bios -- Contributor Bios -- Acknowledgments -- Introductory Chapter: Asia Finance: The Emergence of Asia Economy and New Development in Finance -- Banking -- Market Developments and Governance Issues -- Sovereign Wealth Funds -- Summary of Individual Chapters in Volume 1 -- Disclaimers -- Part One: Banking -- 1 Risk Rating in Asian Banks -- 1.1 Introduction -- 1.2 PIT Versus Behavior Modeling -- 1.2.1 Transaction Behavior Data -- 1.2.2 Back-Testing -- 1.3 Transaction Behavior Scoring -- 1.3.1 Scoring Process -- 1.3.2 Validation -- 1.4 Simulation and Conclusion -- References -- 2 Private Wealth Management in Asia -- 2.1 Introduction -- 2.2 Global Market Distribution of Private Wealth -- 2.3 Asian Market Distribution of Private Wealth -- 2.4 Asian Private Wealth Management -- 2.5 Asian Centers of Private Wealth Management -- 2.5.1 Hong Kong and Singapore -- 2.5.2 China and India as Emerging Markets -- 2.5.3 Japan's Challenges -- 2.6 Swiss Private Banking Across Asia -- 2.7 Conclusion -- References -- 3 The Banking Networks of Asian Financial Centers -- 3.1 Introduction -- 3.2 The Roots of Asia's Banking Networks -- 3.3 Asia's Leading Financial Centers -- 3.3.1 The View from HSBC -- 3.3.2 The Ranking of Asia's Financial Centers -- 3.4 Asia's Exchanges -- 3.5 China's Financial Centers -- 3.6 Conclusion -- Acknowledgments -- References -- 4 Dynamics of House Prices and Bank Lending in Korea -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Apartment House Prices and Bank Lending: Stylized Facts in Regional Submarkets of House in Korea -- 4.4 Long-Run Analysis -- 4.5 Short-Run Relationship -- 4.6 Conclusion -- Appendix 1. …”
Libro electrónico -
10516Tabla de Contenidos: “…Tivoli Management Framework basics -- 2.1 Components of the basic Tivoli architecture -- 2.2 Tivoli user interfaces -- 2.2.1 Tivoli Desktop -- 2.2.2 Command line interface -- 2.2.3 Navigating the Tivoli Desktop -- 2.3 Tivoli resources -- 2.4 Authorization roles -- 2.4.1 Scope of authorization roles -- 2.5 Tivoli profiles -- 2.5.1 Profile managers and profile distribution -- 2.6 Multiplexed distribution services -- 2.6.1 MDist and MDist 2 -- 2.6.2 MDist 2 functions -- 2.6.3 MDist2 components -- 2.6.4 wmdist command -- 2.6.5 Using the Distribution Status console -- 2.7 Connecting multiple TMR regions -- 2.7.1 Benefits of connecting TMRs -- 2.7.2 Connection types -- 2.7.3 Name registry -- 2.7.4 Case study: Hub-spoke architecture -- 2.8 Endpoint login sequence -- 2.8.1 Initial login without a select_gateway_policy script -- 2.8.2 Initial login with a select_gateway_policy script -- 2.8.3 Normal login -- 2.8.4 Isolated login -- 2.8.5 Orphan login -- 2.8.6 Implementing policy scripts -- 2.9 Firewall Security Toolbox -- 2.9.1 Tivoli environment with a firewall -- 2.9.2 Tivoli environment with demilitarized zones -- 2.9.3 Sending events across firewalls -- 2.10 Installing Firewall Security Toolbox -- 2.10.1 Installing on UNIX operating systems…”
Libro electrónico -
10517Publicado 2018Tabla de Contenidos: “…-- 13.1.1 Independent runtimes -- 13.1.2 Independent updates -- 13.1.3 Designed for down -- 13.2 Each service is a bounded context -- 13.2.1 The importance of designing your API -- 13.2.2 Splitting monoliths -- 13.2.3 Semantics and evolving services -- 13.3 Sensitive data across services -- 13.3.1 CIA-T in a microservice architecture -- 13.3.2 Thinking "sensitive" -- 13.4 Logging in microservices…”
Libro electrónico -
10518Publicado 2024Tabla de Contenidos: “…-- 7.4.1 Features of Medicalchain -- 7.4.2 Flow of the Processes in Medicalchain -- 7.4.3 The Medicalchain Currency -- 7.5 Implementing Blockchain in SCM -- 7.5.1 Working of this Technique -- 7.6 Why Use Blockchain in SCM -- References -- Part 2: Smart Healthcare -- Chapter 8 Potential of Blockchain Technology in Healthcare, Finance, and IoT: Past, Present, and Future -- 8.1 Introduction -- 8.2 Types of Blockchain -- 8.3 Literature Review -- 8.3.1 Challenges of Blockchain -- 8.3.2 Working of Blockchain -- 8.4 Methodology and Data Sources -- 8.4.1 Eligibility Criteria -- 8.4.2 Search Strategy -- 8.4.3 Study Selection Process -- 8.5 The Application of Blockchain Technology Across Various Industries -- 8.5.1 Finance -- 8.5.2 Healthcare -- 8.5.3 Internet of Things (IoT) -- 8.6 Conclusion -- References -- Chapter 9 AI-Enabled Techniques for Intelligent Transportation System for Smarter Use of the Transport Network for Healthcare Services -- 9.1 Introduction -- 9.2 Artificial Intelligence…”
Libro electrónico -
10519Publicado 2020“…They are using LMR for a majority of their communications and as an outcome, public security has struggled to speak across jurisdictional and company lines This book will discuss the evolution of the public safety system requirements by providing a technical analysis of the existing public safety network, 4G LTE and its applications in public safety and security, a comprehensive analysis of 5G-network technology, the link between the most recent application of 4G and 5G, efficient utilization and the spectrum sharing for public safety communications systems"--…”
Libro electrónico -
10520Publicado 2018Tabla de Contenidos: “…Circuit With Snubber Across The Transformer -- 7.6.1.6. Practical Circuit -- 7.6.2. …”
Libro electrónico