feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Berlin International  (36)
  • Haus Wannsee-Konferenz  (16)
  • SB Ulrich Plenzdorf Seelow  (2)
  • SB Großräschen  (1)
  • SB Perleberg  (1)
Medientyp
Region
Bibliothek
Virtuelle Kataloge
Erscheinungszeitraum
  • 1
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949301335302882
    Umfang: 1 online resource (156 pages)
    ISBN: 9788132220145
    Serie: SpringerBriefs in Environmental Science Ser.
    Anmerkung: Intro -- Contents -- About the Authors -- About the Book -- Figures -- Tables -- Annexure Tables -- 1 Problem of Residue Management Due to Rice Wheat Crop Rotation in Punjab -- Abstract -- 1.1 Agricultural Growth in Punjab -- 1.2 Agricultural Residue Burning and Its Management -- 1.3 Main Objectives of the Study -- 1.4 An Overview -- References -- 2 The Extent and Management of Crop Stubble -- Abstract -- 2.1 Introduction -- 2.2 The Produce of Crop Stubble and Its Burning -- 2.2.1 StrawResidue to Grain Ratio -- 2.2.2 Chemical Composition of Rice and Wheat Stubble -- 2.3 Volume of Pollution Caused by Crop Stubble Burning -- 2.4 Effects of Crop Stubble Burning on the Fertility of the Soil -- 2.4.1 International Experience -- 2.5 Health Impacts of Pollution Due to Residue Burning -- 2.6 Management of Crop Stubble -- 2.6.1 In Situ Incorporation -- 2.6.2 Alternative Uses of Crop Stubble -- 2.6.3 Cost of Alternate Uses -- 2.6.4 End Use of Rice Residue in Different Districts of Punjab -- 2.7 Summary of the Chapter -- References -- 3 Valuation of the Health Effects -- Abstract -- 3.1 Introduction -- 3.2 Ambient Air Quality Level in Study Area -- 3.3 Household Survey Design and Data -- 3.4 The Survey Results -- 3.4.1 The Household and Farming Characteristics -- 3.4.2 Management of Stubble Among the Selected Farmers -- 3.4.3 The Effect of Crop Stubble Burning on Human Health -- 3.5 Methodology -- 3.5.1 Theoretical Model -- 3.5.2 Estimation Strategy -- 3.6 The Model Results -- 3.6.1 Welfare Loss -- 3.6.2 Increase in Medical Expenditure -- 3.6.3 Opportunity Cost of Increase in Workdays Lost -- 3.7 Summary of the Chapter -- References -- 4 Alternative Uses of Crop Stubble -- Abstract -- 4.1 Introduction -- 4.2 Disposal Pattern of Paddy Straw -- 4.3 Management of Agricultural Waste for Alternate Uses -- 4.3.1 Use of Rice Residue as Fodder for Animals. , 4.3.2 Use of Crop Residue in Bio Thermal Power Plants -- 4.3.3 Use of Rice Residue as Bedding Material for Cattle -- 4.3.4 Use of Crop Residue for Mushroom Cultivation -- 4.3.5 Use of Rice Residue in Paper Production -- 4.3.6 Use of Rice Residue for Making Bio Gas -- 4.3.7 In Situ -- 4.3.8 Incorporation of Paddy Straw in Soil -- 4.3.9 Production of Bio-oil from Straw and Other Agricultural Wastes -- 4.4 Agricultural Residues for Power Generation -- 4.4.1 Energy Technologies -- 4.4.2 Thermal Combustion -- 4.5 Summary of the Chapter -- References -- 5 Environmental Legislations: India and Punjab -- Abstract -- 5.1 Introduction -- 5.1.1 Ministry of Environment and Forest -- 5.1.2 Clean Technology Division -- 5.1.3 Control of Pollution Division -- 5.2 Various Laws to Control Pollution in India -- 5.2.1 Water Act (Prevention and Control of Pollution Act, 1974) -- 5.2.2 Air Prevention and Control of Pollution Act, 1981 -- 5.2.3 The Environment Protection Act, 1986 -- 5.2.4 The Environment (Protection) Rules, 1986 -- 5.2.5 The National Environment Tribunal Act, 1995 -- 5.2.6 The National Environment Appellate Authority Act, 1997 -- 5.2.7 The Noise Pollution (Regulation and Control) Rules, 2000 -- 5.2.8 Biological Diversity Act, 2002 -- 5.3 Central Pollution Control Board (CPCB) -- 5.3.1 Functions of the Central Board -- 5.3.2 National Ambient Air Monitoring Programme (NAMP) -- 5.3.3 Water Quality Monitoring and Surveillance Programme -- 5.4 Punjab Pollution Control Board (PPCB) -- 5.5 Punjab State Council for Science and Technology -- 5.6 Environment Division -- 5.7 Punjab Energy Development Agency (PEDA) -- 5.8 Punjab Biodiversity Board -- 5.9 Summary of the Chapter -- 6 Policies for Restricting the Agriculture Residue Burning in Punjab -- Abstract -- 6.1 Monitoring and Recording the Levels of Pollution in Punjab. , 6.2 Existing Policies to Control Air Pollution -- 6.2.1 Punjab Pollution Control Board (PPCB) -- 6.2.2 Agriculture Councils -- 6.2.3 Punjab State Council for Science and Technology -- 6.2.4 Department of Agriculture -- 6.2.5 Punjab Energy Development Agency (PEDA) -- 6.2.6 Department of Animal Husbandry -- 6.2.7 Punjab Agricultural University -- 6.2.8 Punjab State Farmers' Commission -- 6.2.9 Department of Rural Development and Panchayats -- 6.2.10 Agriculture Diversification -- 6.2.11 Promotion of Zero Tillage -- 6.2.12 Management of Agricultural Waste -- 6.2.13 Utilization of Straw and Husk -- 6.2.14 Use of Rice Residue as Fodder for Animals -- 6.2.15 Use of Crop Residue in Bio Thermal Power Plants -- 6.2.16 Use of Rice Residue as Bedding Material for Cattle -- 6.2.17 Use of Crop Residue for Mushroom Cultivation -- 6.2.18 Use of Rice Residue in Paper Production -- 6.2.19 Use of Rice Residue for Making Bio Gas -- 6.2.20 Other Measures -- 6.3 Summary of the Chapter -- Reference -- 7 Concluding Remarks and Policy Recommendations -- Abstract -- 7.1 Introduction -- 7.2 Summary of the Findings -- 7.3 Policy Recommendations and Research Needs -- Annexure -- Schedule 1 -- Schedule 2.
    Weitere Ausg.: Print version: Kumar, Parmod Socioeconomic and Environmental Implications of Agricultural Residue Burning New Delhi : Springer (India) Private Limited,c2014
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books.
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: FULL  ((Currently Only Available on Campus))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_BV043208288
    Umfang: 285 Seiten : , 64 Illustrationen, Diagramme ; , 22 cm x 16.5 cm, 500 g.
    ISBN: 978-3-902542-45-8 , 3-902542-45-4
    Sprache: Deutsch
    Fachgebiete: Geschichte
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Zweiter Weltkrieg ; Kriegsende ; Besetzung ; Nachkriegszeit ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung
    Mehr zum Autor: Kumar, Victoria.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9949568770802882
    Umfang: 1 online resource (576 pages)
    Ausgabe: 1st ed.
    ISBN: 9789464632224
    Serie: Atlantis Highlights in Intelligent Systems Series ; v.9
    Anmerkung: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Weitere Ausg.: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_BV048312162
    Umfang: 270 Seiten : , Illustrationen, Diagramm ; , 21 cm x 14.8 cm.
    ISBN: 978-3-7344-1456-5 , 3-7344-1456-3
    Serie: Antisemitismus und Bildung Band 4
    Anmerkung: Erscheint Open Access beim Verlag
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-7344-1457-2 10.46499/9783734414572
    Sprache: Deutsch
    Fachgebiete: Geschichte , Soziologie
    RVK:
    RVK:
    Schlagwort(e): Antisemitismus ; Diskriminierung ; Bildungswesen ; Prävention ; Lehrerbildung ; Religiöse Bildung ; Politische Bildung ; Geschichtsbild ; Geschichtsrevisionismus ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Mehr zum Autor: Gautschi, Peter 1959-
    Mehr zum Autor: Kumar, Victoria.
    Mehr zum Autor: Sauer, Linda.
    Mehr zum Autor: Dreier, Werner 1956-
    Mehr zum Autor: Sigel, Robert, 1947-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    gbv_689317697
    Umfang: X, 326 Seiten , zahlr. Ill., graph. Darst. , 24 cm
    ISBN: 9781118083468 , 1118083466
    Inhalt: Methoden, Designmethode, Designmethoden
    Anmerkung: Includes index
    Weitere Ausg.: ISBN 9781118330241
    Weitere Ausg.: ISBN 9781118330883
    Weitere Ausg.: ISBN 9781118333068
    Weitere Ausg.: ISBN 9781118392188
    Weitere Ausg.: ISBN 9781118392195
    Weitere Ausg.: Online-Ausg. Kumar, Vijay 101 design methods Hoboken, N.J : John Wiley & Sons, 2013 ISBN 9781118333068
    Weitere Ausg.: ISBN 9781283598859
    Weitere Ausg.: ISBN 128359885X
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Kumar, Vijay 101 Design Methods Hoboken : Wiley, 2012 ISBN 9781118333068
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften , Allgemeines
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Management ; Prozessorganisation ; Visualisierung ; Design Thinking ; Innovationsprozess ; Handbooks and manuals
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_9949176794902882
    Umfang: 1 online resource (486 pages) : , illustrations
    ISBN: 9781788390835 (e-book)
    Weitere Ausg.: Print version: Kumar, Abhishek. Serverless integration design patterns with azure : build powerful cloud solutions that sustain next-generation products. Birmingham ; Mumbai : Packt Publishing, 2019 ISBN 9781788399234
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    UID:
    almahu_9949319354502882
    Umfang: 1 online resource (109 pages)
    ISBN: 9781789246063
    Inhalt: The Ganges-Brahmaputra-Meghna deltas has newly emerged 'char' islands, which are very vulnerable, socially, institutionally and environmentally. This book explains how the Governments of Bangladesh and the Netherlands cooperated on a land-based rural development project to give settlers security and purpose.
    Anmerkung: Front Cover -- Title Page -- Copyright -- Contents -- Figures and Tables -- Contributors -- Glossary -- Acknowledgements -- 1. The Coastal Chars of Bangladesh -- 2. The Birth of CDSP-IV -- 3. Managing Char Development and Settlement: A Complex Process -- 4. Involving the Communities and Civil Society -- 5. Role of Women in Development -- 6. Developing the Infrastructure -- 7. The Land Settlement Process -- 8. The Power of Agriculture -- 9. Money Matters - Savings and Loans -- 10. Environmental Improvement with Trees -- 11. Income and Quality of Life -- 12. Our Pride -- 13. When the Project Leaves -- References -- Back Cover.
    Weitere Ausg.: Print version: Jenkins, Andrew New Land, New Life Oxford : CAB International,c2020 ISBN 9781789246049
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    kobvindex_WAN33263
    Umfang: XXX, 269 S. , Ill.
    ISBN: 0684865254
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Buch
    Buch
    Köln : DuMont Buchverlag
    UID:
    kobvindex_VBRD-i97838321623820128
    Umfang: 128 S. : überw. Ill.
    ISBN: 9783832162382
    Anmerkung: Comic
    Sprache: Deutsch
    Schlagwort(e): Graphic Novel ; Comic
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz