feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • HPol Brandenburg  (44)
  • Zentrum Info.arbeit Bundeswehr  (37)
  • SB Ulrich Plenzdorf Seelow  (2)
Type of Medium
Language
Region
Library
Virtual Catalogues
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    New York ; Oxford :Berghahn Books,
    UID:
    almahu_BV048636433
    Format: 1 Online-Ressource (vii, 205 Seiten) : , Diagramme.
    ISBN: 978-1-80073-773-0
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-801-0
    Language: English
    Keywords: Islam ; Fundamentalismus ; Terrorismus ; Radikalismus ; Rechtsradikalismus ; COVID-19 ; Pandemie
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: JSTOR
    URL: Cover
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Gunaratna, Rohan, 1961-,
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Amsterdam u.a. :North-Holland Publ. Co.,
    UID:
    almafu_BV000130428
    Format: XII, 323 S.
    ISBN: 0-444-86487-3
    Series Statement: Contributions to economic analysis 145
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Ethik ; Kollektiventscheidung ; Fürsorge ; Kollektiventscheidung ; Entscheidungstheorie ; Wohlfahrtstheorie ; Ökonometrisches Modell ; Wohlfahrtstheorie ; Kollektiventscheidung ; Wohlfahrtstheorie ; Entscheidungstheorie ; Wohlfahrtstheorie ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift
    Author information: Pattanaik, Prasanta K. 1943-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949517373702882
    Format: 1 online resource (177 pages)
    ISBN: 9781000791266
    Content: Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency.
    Additional Edition: Print version: Indrusiak, Leando Soares Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing Milton : River Publishers,c2016 ISBN 9788793519084
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1811055427
    Format: 294 Seiten , Illustrationen, Diagramme , 23 x 15 cm, 513 g
    ISBN: 9783837664157 , 3837664155
    Series Statement: Public history - angewandte Geschichte Band 19
    Note: "... Sammelband basiert auf der im September 2021 pandemiebedingt durchgeführten Tagung "Digital Memory - Digitale - History - Digital Mapping. Transformationen von Erinnerungskulturen und Holocaust-Education." (Seite 16) , Beiträge überwiegend deutsch, teilweise englisch
    Additional Edition: ISBN 9783839464151
    Additional Edition: Erscheint auch als Online-Ausgabe Erinnerungskultur und Holocaust Education im digitalen Wandel Bielefeld : transcript, 2024 ISBN 9783839464151
    Language: German
    Subjects: History , Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    Keywords: Kollektives Gedächtnis ; Judenvernichtung ; Geschichtsvermittlung ; Digitalisierung ; Geschichte 2000-2024 ; Kollektives Gedächtnis ; Digitalisierung ; Vermittlung ; Judenvernichtung ; Kollektives Gedächtnis ; Bildungsinhalt ; Digitalisierung ; Vermittlung ; Konferenzschrift ; Sammlung von Beiträgen ; Aufsatzsammlung ; Sammlung von Beiträgen ; Aufsatzsammlung ; Konferenzschrift
    URL: Cover
    Author information: Kumar, Victoria
    Author information: Lamprecht, Gerald 1973-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    Oxford :Blackwell,
    UID:
    almafu_BV000606282
    Format: IX, 155 S.
    Edition: 1. publ.
    ISBN: 0-631-13786-6
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Wirtschaftstheorie ; Geschichte
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949760277302882
    Format: 1 online resource (632 pages)
    Edition: 1st ed.
    ISBN: 1-003-47105-6 , 1-04-001723-1
    Content: The Second International Conference on Applied Data Science and Smart Systems (ADSSS-2023) was held on 15-16 December 2023 at Chitkara University, Punjab, India.
    Additional Edition: ISBN 1-03-274814-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949858790202882
    Format: 1 online resource (608 pages)
    Edition: 1st ed.
    ISBN: 94-6463-490-1
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.11
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- Research on evaluation system and method of EVs' development trend -- ChatGPT & -- RPG Game: A New Option for Student to Study with Artificial Intelligence -- Research on the evaluation of enterprise digital transformation maturity based on comprehensive evaluation model -- Optimizing Portfolio Management and Risk Assessment in Digital Assets Using Deep Learning for Predictive Analysis -- Design and implementation of a data-driven tobacco production line warning system -- Analysis of Spatial Structure of Digital Information Service Industry - Based on Social Network Model and Modified Gravity Model -- Design of electronic shelf label and Zigbee gateway based on electrophoretic display technology -- Overview of water supply operation and maintenance management service system -- Intelligent Foundation Pit based on Digital TwinTechnology Safety Monitoring and Prediction -- How do artificial intelligence applications affect the performance of intelligent manufacturing enterprises-- Research from the Perspective of Human Capital Structure -- 2 LITERATURE REVIEW -- 3 THEORETICAL ANALYSIS AND RESEARCH HYPOTHESIS -- 3.1 The direct impact of artificial intelligence applications on the performance of smart manufacturing companies -- 3.2 Indirect impact of artificial intelligence application on intelligent manufacturing enterprise performance -- 4 RESEARCH DESIGN -- 4.1 Model construction -- 4.2 Variable Selection and Explanation -- 4.3 Sample Selection and Data Sources -- 5 ANALYSIS OF EMPIRICAL RESULTS -- 5.1 Analysis of benchmark regression results -- 5.2 Robustness Tests -- 5.2.1 Endogeneity issues -- 5.2.2 Further Robustness Tests -- 5.3 Heterogeneity analysis -- 5.3.1 Analysis of regional heterogeneity -- 5.3.2 Analysis of Industry Heterogeneity -- 6 RESULTS. , 7 DISCUSSION AND CONCLUSION -- ACKNOWLEDGMENTS -- REFERENCES -- Research on fusion and integration method of BIM and GIS data -- Research on manufacturing service recommendation method based on Product-based Neural Network -- Research on Self-inspired Intelligent Question Answering Method Based on Socratic Questioning -- The Impact Factors of TikTok Live Shopping Features on Consumer Purchase Intentions: Evidence from China -- Combating Illegal Wildlife Trade through Big Data Monitoring and Management -- Research on Tourism Experience of Tourists in Natural Resource-based Scenic Spots in the Context of Big Data -- Practice and Exploration of Artificial Intelligence Ethics Education in Higher Education -- Hot topics and frontier evolution of strength training for physical health in older adults research: a bibliometric mapping from 2012 to 2021 -- Stock price forecast based on improved Transformer -- Analysis of China-Myanmar Energy Interconnection and Trade Cooperation via AHP-SWOT Approach -- Research and Implementation of Digital Transformation Methods for Process Manufacturing Enterprises Based on Employee Performance -- Selection of Excellent Digital Demonstration Units Based on Entropy Weight TOPSIS Method -- Construction of the Effectiveness Evaluation System for Digital Transformation of Power Grid Enterprises -- Revolutionizing Credit Card Marketing: Bank N's Journey with a Smart Credit Card Marketing Platform -- Data Statistics Applications in Regulating the Balance of the Wildlife Trade -- Untitled -- Innovative Chatbot Technologies and Trends -- Innovative Practice of Collaborative Education between Industry and Academia in Talent Cultivation in the Field of E-commerce Under the Background of Mass Entrepreneurship and Innovation -- A Study of the Impact of Digital Transformation on the Risk Level of Commercial Banks. , Research on the design of intelligent tourism auxiliary decision-making service platform based on local tourism big data -- Research on the Prediction of Overall Monthly Active Users of WeChat Mini Programs Based on Linear Regression -- A data-driven comprehensive evaluation method for Data Link -- Exploration and Research on the New Mode of Enterprise Innovation and Development Based on Big Data Analysis Technology -- Research on the Influence of Transnational Technology Merger and Acquisition on the Rate of Domestic Added Value of Chinese Enterprises' Exports -- Mining of Credit Risk Factors for New Agricultural Entities under the Big Data of Agricultural Economy in Jilin Province -- Development of Tourism Website Based on Java -- Application Research of RPA Technology in the Construction of Financial Robot Business Automation Processing Platform -- Web 3.0: the impact of virtual spokesperson generation characteristics on consumer brand attitudes -- Command Execution Bypassing Evasion Based on Win32Net Module -- A study on speech recognition of Tibetan Amdo based on whisper -- A Cross-Chain Scheme for Goods Atomicity in E-commerce Transactions -- Research on Carbon Emission Reduction of ICT Enabled Manufacturing Industry--A Case Study of China Telecom -- Synthesis of Tibetan Amdo based on VITS -- Research on the Interpretability Analysis Method of Transient Stability Assessment in Power Systems Based on Deep Learning -- Study on voluntary environmental regulation and ESG performance based on PSM-DID model -- Research on the Mechanism and Pathway of Digital Intelligence Technology Application in Collaborative Emission Reduction in the Chemical Industry -- Construction of information security literacy evaluation model for College students based on Analytic Hierarchy Process -- New Media Operation: Art of Content Innovation and User Interaction. , Analysis of Transportation Carbon Emissions in Xinjiang Based on the Carbon Emission Factor Method for Load Weights -- Research on the Innovative Model of Integrating Smart Tourism and Agricultural E-commerce in Shiyan City Based on Digital Enablement -- The Application and Challenges of Blockchain Technology in Accounting and Financial Information Systems -- Applying Machine Learning and Time Series to Predict Real Estate Valuations -- An Improved YOLOv8 Algorithm Model for Detection of Personal Protective Products in Chemical Plants -- Research on the Optimization of Picking Path Considering the Minimization of Goods Damage Cost -- Intelligent Operation and Maintenance Control Platform for Energy Internet Analysis -- Application of Video Artificial Intelligence in Smart Expressway Scenarios -- Research on Data Link Knowledge Graph Technology and Its Application Based on Data -- Analysing the theoretical connotation and practical path of blockchain technology affecting the digital economy--Evidence from China -- 2 RELATED WORK -- 3 PROPOSED METHODOLOGY -- 3.1 Data Set Construction -- 3.2 Detection Strategy -- 3.3 Training Design -- 4 EXPERIMENTS -- 4.1 Data Sets and Parameters -- 4.2 Experimental Results and Analysis -- 5 CONCLUSIONS -- REFERENCES -- Research on The Effect of UGC Characteristics on Consumers' Impulse Purchase Intention in Community E.commerce Platform -- Knowledge Graph Completion Model Based on Con-distillation -- Research and Application of Copyright Protection of Ethnic Cultural Resources Based on Blockchain.
    Additional Edition: ISBN 94-6463-489-8
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages