feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Berlin International  (27)
  • SB Großräschen
  • Collegium Polonicum
  • Haus Wannsee-Konferenz
  • Jüdisches Museum
  • Electronic books  (27)
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Fachgebiete(RVK)
  • 1
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949568770802882
    Umfang: 1 online resource (576 pages)
    Ausgabe: 1st ed.
    ISBN: 9789464632224
    Serie: Atlantis Highlights in Intelligent Systems Series ; v.9
    Anmerkung: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Weitere Ausg.: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949319354502882
    Umfang: 1 online resource (109 pages)
    ISBN: 9781789246063
    Inhalt: The Ganges-Brahmaputra-Meghna deltas has newly emerged 'char' islands, which are very vulnerable, socially, institutionally and environmentally. This book explains how the Governments of Bangladesh and the Netherlands cooperated on a land-based rural development project to give settlers security and purpose.
    Anmerkung: Front Cover -- Title Page -- Copyright -- Contents -- Figures and Tables -- Contributors -- Glossary -- Acknowledgements -- 1. The Coastal Chars of Bangladesh -- 2. The Birth of CDSP-IV -- 3. Managing Char Development and Settlement: A Complex Process -- 4. Involving the Communities and Civil Society -- 5. Role of Women in Development -- 6. Developing the Infrastructure -- 7. The Land Settlement Process -- 8. The Power of Agriculture -- 9. Money Matters - Savings and Loans -- 10. Environmental Improvement with Trees -- 11. Income and Quality of Life -- 12. Our Pride -- 13. When the Project Leaves -- References -- Back Cover.
    Weitere Ausg.: Print version: Jenkins, Andrew New Land, New Life Oxford : CAB International,c2020 ISBN 9781789246049
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9949176794902882
    Umfang: 1 online resource (486 pages) : , illustrations
    ISBN: 9781788390835 (e-book)
    Weitere Ausg.: Print version: Kumar, Abhishek. Serverless integration design patterns with azure : build powerful cloud solutions that sustain next-generation products. Birmingham ; Mumbai : Packt Publishing, 2019 ISBN 9781788399234
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9949369733502882
    Umfang: 1 online resource (348 pages)
    ISBN: 9781000793550
    Serie: River Publishers Series in Information Science and Technology Ser.
    Inhalt: This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics.The book will serve as a reference for Data Scientists, systems architects, developers, new researchers and graduate level students in Computer and Data Science. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.
    Anmerkung: Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- 1: Pattern Analysis of COVID-19 Death and Recovery Cases Data of Countries Using Greedy Biclustering Algorithm -- 1.1 Introduction -- 1.2 Problem Description -- 1.2.1 Greedy Approach: Bicluster Size Maximization Based Fitness Function -- 1.2.2 Data Description -- 1.3 Proposed Work: COVID 19 Pattern Identification Using Greedy Biclustering -- 1.4 Results and Discussions -- 1.5 Conclusion -- 1.6 Acknowledgements -- References -- 2: Artificial Fish Swarm Optimization Algorithm with Hill Climbing Based Clustering Technique for Throughput Maximization in Wireless Multimedia Sensor Network -- 2.1 Introduction -- 2.2 The Proposed AFSA-HC Technique -- 2.2.1 AFSA-HC Based Clustering Phase -- 2.2.2 Deflate-Based Data Aggregation Phase -- 2.2.3 Hybrid Data Transmission Phase -- 2.3 Performance Validation -- 2.4 Conclusion -- References -- 3: Analysis of Machine Learning Techniques for Spam Detection -- 3.1 Introduction -- 3.1.1 Ham Messages -- 3.1.2 Spam Messages -- 3.2 Types of Spam Attack -- 3.2.1 Email Phishing -- 3.2.2 Spear Phishing -- 3.2.3 Whaling -- 3.3 Spammer Methods -- 3.4 Some Prevention Methods From User End -- 3.4.1 Protect Email Addresses -- 3.4.2 Preventing Spam from Being Sent -- 3.4.3 Block Spam to be Delivered -- 3.4.4 Identify and Separate Spam After Delivery -- 3.4.4.1 Targeted Link Analysis -- 3.4.4.2 Bayesian Filters -- 3.4.5 Report Spam -- 3.5 Machine Learning Algorithms -- 3.5.1 Naïve Bayes (NB) -- 3.5.2 Random Forests (RF) -- 3.5.3 Support Vector Machine (SVM) -- 3.5.4 Logistic Regression (LR) -- 3.6 Methodology -- 3.6.1 Database Used -- 3.6.2 Work Flow -- 3.7 Results and Analysis -- 3.7.1 Performance Metric -- 3.7.2 Experimental Results. , 3.7.2.1 Cleaning Data by Removing Punctuations, White Spaces, and Stop Words -- 3.7.2.2 Stemming the Messages -- 3.7.2.3 Analyzing the Common Words from the Spam and Ham Messages -- 3.7.3 Analyses of Machine Learning Algorithms -- 3.7.3.1 Accuracy Score Before Stemming -- 3.7.3.2 Accuracy Score After Stemming -- 3.7.3.3 Splitting Dataset into Train and Test Data -- 3.7.3.4 Mapping Confusion Matrix -- 3.7.3.5 Accuracy -- 3.8 Conclusion and Future Work -- References -- 4: Smart Sensor Based Prognostication of Cardiac Disease Prediction Using Machine Learning Techniques -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Proposed Method -- 4.4 Data Collection in IoT -- 4.4.1 Fetching Data from Sensors -- 4.4.2 K-Nearest Neighbor Classifier -- 4.4.3 Random Forest Classifier -- 4.4.4 Decision Tree Classifier -- 4.4.5 Extreme Gradient Boost Classifier -- 4.5 Results and Discussions -- 4.6 Conclusion -- 4.7 Acknowledgements -- References -- 5: Assimilate Machine Learning Algorithms in Big Data Analytics: Review -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Big Data -- 5.4 Machine Learning -- 5.5 File Categories -- 5.6 Storage And Expenses -- 5.7 The Device Learning Anatomy -- 5.8 Machine Learning Technology Methods in Big Data Analytics -- 5.9 Structure Mapreduce -- 5.10 Associated Investigations -- 5.11 Multivariate Data Coterie in Machine Learning -- 5.12 Machine Learning Algorithm -- 5.12.1 Machine Learning Framework -- 5.12.2 Parametric and Non-Parametric Techniques in Machine Learning -- 5.12.2.1 Bias -- 5.12.2.2 Variance -- 5.12.3 Parametric Techniques -- 5.12.3.1 Linear Regression -- 5.12.3.2 Decision Tree -- 5.12.3.3 Naive Bayes -- 5.12.3.4 Support Vector Machine -- 5.12.3.5 Random Forest -- 5.12.3.6 K-Nearest Neighbor -- 5.12.3.7 Deep Learning -- 5.12.3.8 Linear Vector Quantization (LVQ) -- 5.12.3.9 Transfer Learning. , 5.12.4 Non-Parametric Techniques -- 5.12.4.1 K-Means Clustering -- 5.12.4.2 Principal Component Analysis -- 5.12.4.3 A Priori Algorithm -- 5.12.4.4 Reinforcement Learning (RL) -- 5.12.4.5 Semi-Supervised Learning -- 5.13 Machine Learning Technology Assessment Parameters -- 5.13.1 Ranking Performance -- 5.13.2 Loss in Logarithmic Form -- 5.13.3 Assessment Measures -- 5.13.3.1 Accuracy -- 5.13.3.2 Precision/Specificity -- 5.13.3.3 Recall -- 5.13.3.4 F-Measure -- 5.13.4 Mean Definite Error (MAE) -- 5.13.5 Mean Quadruple Error (MSE) -- 5.14 Correlation of Outcomes of ML Algorithms -- 5.15 Applications -- 5.15.1 Economical Facilities -- 5.15.2 Business and Endorsement -- 5.15.3 Government Bodies -- 5.15.4 Hygiene -- 5.15.5 Transport -- 5.15.6 Fuel and Energy -- 5.15.7 Spoken Validation -- 5.15.8 Perception of the Device -- 5.15.9 Bio-Surveillance -- 5.15.10 Mechanization or Realigning -- 5.15.11 Mining Text -- 5.16 Conclusion -- References -- 6: Resource Allocation Methodologies in Cloud Computing: A Review and Analysis -- 6.1 Introduction -- 6.1.1 Cloud Services Models -- 6.1.1.1 Infrastructure as a Service -- 6.1.1.2 Platform as a Service -- 6.1.1.3 Software as a Service -- 6.1.2 Types of Cloud Computing -- 6.1.2.1 Public Cloud -- 6.1.2.2 Private Cloud -- 6.1.2.3 Community Cloud -- 6.1.2.4 Hybrid Cloud -- 6.2 Resource Allocations in Cloud Computing -- 6.2.1 Static Allocation -- 6.2.2 Dynamic Allocation -- 6.3 Dynamic Resource Allocation Models in Cloud Computing -- 6.3.1 Service-Level Agreement Based Dynamic Resource Allocation Models -- 6.3.2 Market-Based Dynamic Resource Allocation Models -- 6.3.3 Utilization-Based Dynamic Resource Allocation Models -- 6.3.4 Task Scheduling in Cloud Computing -- 6.4 Research Challenges -- 6.5 Future Research Paths -- 6.6 Advantages and Disadvantages -- 6.7 Conclusion -- References. , 7: Role of Machine Learning in Big Data -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Tools in Big Data -- 7.3.1 Batch Analysis Big Data Tools -- 7.3.2 Stream Analysis Big Data Tools -- 7.3.3 Interactive Analysis Big Data Tools -- 7.4 Machine Learning Algorithms in Big Data -- 7.5 Applications of Machine Learning in Big Data -- 7.6 Challenges of Machine Learning in Big Data -- 7.6.1 Volume -- 7.6.2 Variety -- 7.6.3 Velocity -- 7.6.4 Veracity -- 7.7 Conclusion -- References -- 8: Healthcare System for COVID-19: Challenges and Developments -- 8.1 Introduction -- 8.2 Related Work -- 8.3 IoT with Architecture -- 8.4 IoHT Security Requirements and Challenges -- 8.5 COVID-19 (Coronavirus Disease 2019) -- 8.6 The Potential of IoHT in COVID-19 Like Disease Control -- 8.7 The Current Applications of IoHT During COVID-19 -- 8.7.1 Using IoHT to Dissect an Outbreak -- 8.7.2 Using IoHT to Ensure Compliance to Quarantine -- 8.7.3 Using IoHT to Manage Patient Care -- 8.8 IoHT Development for COVID-19 -- 8.8.1 Smart Home -- 8.8.2 Smart Office -- 8.8.3 Smart Hotel -- 8.8.4 Smart Hospitals -- 8.9 Conclusion -- References -- 9: An Integrated Approach of Blockchain & -- Big Data in Health Care Sector -- 9.1 Introduction -- 9.2 Blockchain for Health care -- 9.2.1 Healthcare Data Sharing through Gem Network -- 9.2.2 OmniPHR -- 9.2.3 Medrec -- 9.2.4 PSN (Pervasive Social Network) System -- 9.2.5 Healthcare Data Gateway -- 9.2.6 Resources that are Virtual -- 9.3 Overview of Blockchain & -- Big Data in Health Care -- 9.3.1 Big Data in Healthcare -- 9.3.2 Blockchain in Health Care -- 9.3.3 Benefits of Blockchain in Healthcare -- 9.3.3.1 Master Patient Indices -- 9.3.3.2 Supply Chain Management -- 9.3.3.3 Claims Adjudication -- 9.3.3.4 Interoperability -- 9.3.3.5 Single, Longitudinal Patient Records -- 9.4 Application of Big Data for Blockchain -- 9.4.1 Smart Ecosystem. , 9.4.2 Digital Trust -- 9.4.3 Cybersecurity -- 9.4.4 Fighting Drugs -- 9.4.5 Online Accessing of Patient's Data -- 9.4.6 Research as well as Development -- 9.4.7 Management of Data -- 9.4.8 Due to Privacy Storing of Off-Chain Data -- 9.4.9 Collaboration of Patient Data -- 9.5 Solutions of Blockchain For Big Data in Health Care -- 9.6 Conclusion and Future Scope -- References -- 10: Cloud Resource Management for Network Cameras -- 10.1 Introduction -- 10.2 Resource Analysis -- 10.2.1 Network Cameras -- 10.2.2 Resource Management on Cloud Environment -- 10.2.3 Image and Video Analysis -- 10.3 Cloud Resource Management Problems -- 10.4 Cloud Resource Manager -- 10.4.1 Evaluation of Performance -- 10.4.2 View of Resource Requirements -- 10.5 Bin Packing -- 10.5.1 Analysis of Dynamic Bin Packing -- 10.5.2 MinTotal DBP Problem -- 10.6 Resource Monitoring and Scaling -- 10.7 Conclusion -- References -- 11: Software-Defined Networking for Healthcare Internet of Things -- 11.1 Introduction -- 11.2 Healthcare Internet of Things -- 11.2.1 Challenges in H-IoT -- 11.3 Software-Defined Networking -- 11.4 Opportunities, Challenges, and Possible Solutions -- 11.5 Conclusion -- References -- 12: Cloud Computing in the Public Sector: A Study -- 12.1 Introduction -- 12.2 History and Evolution of Cloud Computing -- 12.3 Application of Cloud Computing -- 12.4 Advantages of Cloud Computing -- 12.5 Challenges -- 12.6 Conclusion -- 13: Big Data Analytics: An overview -- 13.1 Introduction -- 13.2 Related Work -- 13.2.1 Big Data: What Is It? -- 13.2.1.1 Characteristics of Big Data -- 13.2.2 Big Data Analytics: What Is It? -- 13.3 Hadoop and Big Data -- 13.4 Big Data Analytics Framework -- 13.5 Big Data Analytics Techniques -- 13.5.1 Partitioning on Big Data -- 13.5.2 Sampling on Big Data -- 13.5.3 Sampling-Based Approximation -- 13.6 Big Social Data Analytics. , 13.7 Applications.
    Weitere Ausg.: Print version: Pani, Subhendu Kumar Applications of Machine Learning in Big-Data Analytics and Cloud Computing Aalborg : River Publishers,c2021 ISBN 9788770221825
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books ; Electronic books ; Electronic books ; Electronic books ; Electronic books.
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    kobvindex_INT59022
    Umfang: 1 online resource (342 pages)
    Ausgabe: 1st ed.
    ISBN: 9781789535624
    Inhalt: This book provides practical knowledge about the main pillars of EDA including data cleaning, data preparation, data exploration, and data visualization. You can leverage the power of Python to understand, summarize and investigate your data in the best way possible. The book presents a unique approach to exploring hidden features in your data
    Anmerkung: Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: The Fundamentals of EDA -- Chapter 01: Exploratory Data Analysis Fundamentals -- Understanding data science -- The significance of EDA -- Steps in EDA -- Making sense of data -- Numerical data -- Discrete data -- Continuous data -- Categorical data -- Measurement scales -- Nominal -- Ordinal -- Interval -- Ratio -- Comparing EDA with classical and Bayesian analysis -- Software tools available for EDA -- Getting started with EDA -- NumPy -- Pandas -- SciPy -- Matplotlib -- Summary -- Further reading -- Chapter 02: Visual Aids for EDA -- Technical requirements -- Line chart -- Steps involved -- Bar charts -- Scatter plot -- Bubble chart -- Scatter plot using seaborn -- Area plot and stacked plot -- Pie chart -- Table chart -- Polar chart -- Histogram -- Lollipop chart -- Choosing the best chart -- Other libraries to explore -- Summary -- Further reading -- Chapter 03: EDA with Personal Email -- Technical requirements -- Loading the dataset -- Data transformation -- Data cleansing -- Loading the CSV file -- Converting the date -- Removing NaN values -- Applying descriptive statistics -- Data refactoring -- Dropping columns -- Refactoring timezones -- Data analysis -- Number of emails -- Time of day -- Average emails per day and hour -- Number of emails per day -- Most frequently used words -- Summary -- Further reading -- Chapter 04: Data Transformation -- Technical requirements -- Background -- Merging database-style dataframes -- Concatenating along with an axis -- Using df.merge with an inner join -- Using the pd.merge() method with a left join -- Using the pd.merge() method with a right join -- Using pd.merge() methods with outer join -- Merging on index -- Reshaping and pivoting -- Transformation techniques , Discussing multivariate analysis using the Titanic dataset -- Outlining Simpson's paradox -- Correlation does not imply causation -- Summary -- Further reading -- Chapter 08: Time Series Analysis -- Technical requirements -- Understanding the time series dataset -- Fundamentals of TSA -- Univariate time series -- Characteristics of time series data -- TSA with Open Power System Data -- Data cleaning -- Time-based indexing -- Visualizing time series -- Grouping time series data -- Resampling time series data -- Summary -- Further reading -- Section 3: Model Development and Evaluation -- Chapter 09: Hypothesis Testing and Regression -- Technical requirements -- Hypothesis testing -- Hypothesis testing principle -- statsmodels library -- Average reading time -- Types of hypothesis testing -- T-test -- p-hacking -- Understanding regression -- Types of regression -- Simple linear regression -- Multiple linear regression -- Nonlinear regression -- Model development and evaluation -- Constructing a linear regression model -- Model evaluation -- Computing accuracy -- Understanding accuracy -- Implementing a multiple linear regression model -- Summary -- Further reading -- Chapter 10: Model Development and Evaluation -- Technical requirements -- Types of machine learning -- Understanding supervised learning -- Regression -- Classification -- Understanding unsupervised learning -- Applications of unsupervised learning -- Clustering using MiniBatch K-means clustering -- Extracting keywords -- Plotting clusters -- Word cloud -- Understanding reinforcement learning -- Difference between supervised and reinforcement learning -- Applications of reinforcement learning -- Unified machine learning workflow -- Data preprocessing -- Data collection -- Data analysis -- Data cleaning, normalization, and transformation -- Data preparation , Performing data deduplication -- Replacing values -- Handling missing data -- NaN values in pandas objects -- Dropping missing values -- Dropping by rows -- Dropping by columns -- Mathematical operations with NaN -- Filling missing values -- Backward and forward filling -- Interpolating missing values -- Renaming axis indexes -- Discretization and binning -- Outlier detection and filtering -- Permutation and random sampling -- Random sampling without replacement -- Random sampling with replacement -- Computing indicators/dummy variables -- String manipulation -- Benefits of data transformation -- Challenges -- Summary -- Further reading -- Section 2: Descriptive Statistics -- Chapter 05: Descriptive Statistics -- Technical requirements -- Understanding statistics -- Distribution function -- Uniform distribution -- Normal distribution -- Exponential distribution -- Binomial distribution -- Cumulative distribution function -- Descriptive statistics -- Measures of central tendency -- Mean/average -- Median -- Mode -- Measures of dispersion -- Standard deviation -- Variance -- Skewness -- Kurtosis -- Types of kurtosis -- Calculating percentiles -- Quartiles -- Visualizing quartiles -- Summary -- Further reading -- Chapter 06: Grouping Datasets -- Technical requirements -- Understanding groupby() -- Groupby mechanics -- Selecting a subset of columns -- Max and min -- Mean -- Data aggregation -- Group-wise operations -- Renaming grouped aggregation columns -- Group-wise transformations -- Pivot tables and cross-tabulations -- Pivot tables -- Cross-tabulations -- Summary -- Further reading -- Chapter 07: Correlation -- Technical requirements -- Introducing correlation -- Types of analysis -- Understanding univariate analysis -- Understanding bivariate analysis -- Understanding multivariate analysis , Training sets and corpus creation -- Model creation and training -- Model evaluation -- Best model selection and evaluation -- Model deployment -- Summary -- Further reading -- Chapter 11: EDA on Wine Quality Data Analysis -- Technical requirements -- Disclosing the wine quality dataset -- Loading the dataset -- Descriptive statistics -- Data wrangling -- Analyzing red wine -- Finding correlated columns -- Alcohol versus quality -- Alcohol versus pH -- Analyzing white wine -- Red wine versus white wine -- Adding a new attribute -- Converting into a categorical column -- Concatenating dataframes -- Grouping columns -- Univariate analysis -- Multivariate analysis on the combined dataframe -- Discrete categorical attributes -- 3-D visualization -- Model development and evaluation -- Summary -- Further reading -- Appendix -- String manipulation -- Creating strings -- Accessing characters in Python -- String slicing -- Deleting/updating from a string -- Escape sequencing in Python -- Formatting strings -- Using pandas vectorized string functions -- Using string functions with a pandas DataFrame -- Using regular expressions -- Further reading -- Other Books You May Enjoy -- Index
    Weitere Ausg.: Print version Mukhiya, Suresh Kumar Hands-On Exploratory Data Analysis with Python Birmingham : Packt Publishing, Limited,c2020 ISBN 9781789537253
    Sprache: Englisch
    Schlagwort(e): Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    kobvindex_INT71649
    Umfang: 1 online resource (254 pages)
    Ausgabe: 1st ed.
    ISBN: 9780415624077 , 9781136251498
    Serie: Earthscan Studies in Water Resource Management Series
    Inhalt: India is a fast developing economy whose natural resource base, comprising land and water supporting agricultural production, are not only under enormous stress, but also complex and not amenable to a uniform strategy. This book addresses strategies for food security and sustainable agriculture in India, including lessons to be learned in other developing economies across the world
    Anmerkung: Cover -- Water Management, Food Security and Sustainable Agriculture in Developing Economies -- Copyright -- Contents -- Figures -- Tables -- Contributors -- Acknowledgments -- Acronyms and abbreviations -- 1 Food security and sustainable agriculture in developing economies: The water challenge -- 2 Key issues in Indian irrigation -- 3 Food security challenges in India: Exploring the nexus between water, land and agricultural production -- 4 Redefining the objectives and criteria for the evaluation of large storages in developing economies -- 5 Sector reforms and efficiency improvement: Pointers for canal irrigation management -- 6 Rebuilding traditional water harnessing systems for livelihood enhancement in arid western Rajasthan -- 7 The hydrological and farming system impacts of agricultural water management interventions in north Gujarat, India -- 8 Technology choices and institutions for improving the economic and livelihood benefits from multiple-use tanks in western Odisha -- 9 Future strategies for agricultural growth in India -- 10 Investment strategies and technology options for sustainable agricultural development in Asia: Challenges in the emerging context -- 11 Water management for food security and sustainable agriculture: Strategic lessons for developing economies -- Index
    Weitere Ausg.: Print version Kumar, M. Dinesh Water Management, Food Security and Sustainable Agriculture in Developing Economies Oxford : Taylor & Francis Group,c2012 ISBN 9780415624077
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    London : Taylor and Francis Group
    UID:
    kobvindex_INT72637
    Umfang: 1 online resource (337 pages)
    Ausgabe: 1st ed.
    ISBN: 9781138020191 , 9781317580041
    Inhalt: Post-reform India has seen a decline in agricultural growth as well as supplyâdemand imbalance and rising prices. This book presents a comprehensive analysis of domestic and international prices and trade since 1980â81, covering the past quarter of a century. Backed with rich data, it provides comparisons between the pre- and post-liberalisation policies and their effect on farm profitability, domestic prices and prices variability, and examines their possible role in determining the trajectory of agricultural growth since 1991. The book will appeal to students, scholars and researchers of agriculture studies, economics, finance, and development studies, as well as policy makers and agriculture experts
    Anmerkung: Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Tables -- List of Figures -- Abbreviations -- Foreword -- Acknowledgements -- 1. Introduction -- 2. Indian Agriculture under Economic Reforms: A Preliminary Review -- 3. Agricultural Price Policy and Farm Profitability: Examining Linkages -- 4. International Price Trends and Volatility -- 5. Agricultural Trade: Policies and Patterns -- 6. Trade Competitiveness of Indian Agriculture: A Comparison of Domestic and World Prices -- 7. Decomposing Variability in Agricultural Prices -- 8. Evaluation and Conclusion -- Appendix I: Methodology for Measuring Price Volatility -- Appendix II: The Decomposition Model -- Appendix III: Tables -- Appendix IV: Figures -- Bibliography -- About the Author -- Index
    Weitere Ausg.: Print version Tripathi, Ashutosh Kumar Agricultural Prices and Production in Post-Reform India London : Taylor & Francis Group,c2014 ISBN 9781138020191
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    kobvindex_INT70865
    Umfang: 1 online resource (385 pages)
    Ausgabe: 1st ed.
    ISBN: 9780415592406 , 9780203840467
    Serie: Routledge Library Editions: Development Series
    Inhalt: Initially published in 1983, in association with the International Labour Organisation (ILO), this book is about the meaning, relevance and process of agrarian reform in contemporary developing countries. It includes seven detailed case studies - one each on Ethiopia, Peru, Chile, Nicaragua, Iran, Kerala, (India) and West Bengal (India). In all the cases, serious contemporary efforts were made to implement agrarian reform programmes and the case studies focus upon selected aspects of this reform process - origins, basic characteristics, problems of implementation and immediate consequences. Each region differs considerably in terms of socio-economic and administrative conditions, but when the reform efforts are placed in their respective historical contexts, several common themes emerge which are dealt with in detail. In all cases, it is clear that agrarian reform is essentially a political process, requiring major social movements and that piecemeal reforms will not solve the grave problems of growth, distribution and poverty in the Third World
    Anmerkung: Intro -- AGRARIAN REFORM IN CONTEMPORARY DEVELOPING COUNTRIES A study prepared for the International Labour Office within the framework of the World Employment Programme -- Copyright -- Agrarian Reform in Contemporary Developing Countries A Study Prepared for the International Labour Office Within the Framework of the World Employment Programme -- Copyright -- Contents -- Acknowledgements -- Preface -- Part One: Introduction -- 1. Agrarian Reform in Developing Countries: Issues of Theory and Problems of Practice -- Part Two: Towards Peasant Economy Systems -- 2. Agrarian Reform in Kerala and its Impact on the Rural Economy - A Preliminary Assessment -- 3. Agrarian Reform in West Bengal: Objectives, Achievements and Limitations -- Part Three: On the Road to Collectivism -- 4. Agrarian Reform, Structural Changes and Rural Development in Ethiopia -- 5. The Agrarian Reform in Peru: an Assessment Cristóbal Kay -- 6. Agrarian Reform and Structural Change in Chile, 1965-79 -- 7. Agrarian Reform and Rural Development in Nicaragua, 1979-81 -- Part Four: In Search of Modernism -- 8. The Agrarian Question in Iran Homa Katouzian -- Notes on Contributors -- Index
    Weitere Ausg.: Print version Ghose, Ajit Kumar Agrarian Reform in Contemporary Developing Countries Oxford : Taylor & Francis Group,c2011 ISBN 9780415592406
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Milton : Taylor and Francis Group
    UID:
    kobvindex_INT73415
    Umfang: 1 online resource (115 pages)
    Ausgabe: 1st ed.
    ISBN: 9781138365483 , 9780429773747
    Serie: Advances in Mathematics and Engineering Series
    Inhalt: Sustainable procurement is the pursuit of sustainable development objectives through the purchasing and supply process, while balancing environmental, social, and economic objectives. This book will help readers develop new innovative tools and techniques to achieve sustainability in public as well as private procurement practices
    Anmerkung: Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Chapter 1: Business Model Innovation in Sustainable Procurement: A Case Study on Organic Farming in India -- 1.1 Introduction -- 1.2 Literature Review -- 1.2.1 Sustainability and Sustainable Procurement -- 1.2.2 The "Poor", the Bottom of the Pyramid, and Shared Value -- 1.3 Research Methodology -- 1.3.1 Rationale for Single Case Study Method -- 1.3.2 Case Organization -- 1.3.3 Data Collection and Analysis Method -- 1.4 Analysis and Findings -- 1.5 Discussion -- 1.5.1 Research Implications -- 1.5.2 Practice and Social Implications -- 1.5.3 Limitations -- References -- Chapter 2: Additive Manufacturing -- 2.1 Additive Manufacturing -- 2.1.1 Global Value of Additive Manufacturing -- 2.1.2 Additive Manufacturing Process -- 2.1.3 Classification of Additive Manufacturing Technologies -- 2.1.3.1 Binder Jetting -- 2.1.3.2 Direct Energy Deposition -- 2.1.3.3 Material Extrusion -- 2.1.3.4 Material Jetting -- 2.1.3.5 Powder Bed Fusion -- 2.1.3.6 Sheet Lamination -- 2.1.3.7 Vat Photopolymerization -- 2.2 Mass Customization -- 2.3 AM Technologies and Supply Chain Management -- 2.4 Additive Manufacturing and Sustainability (AMS) -- 2.4.1 Environmental Sustainability -- 2.4.2 Economic Sustainability -- 2.4.3 Societal Sustainability -- 2.5 Additive Manufacturing Materials and Procurement -- 2.6 Process Variables of Additive Manufacturing -- 2.6.1 AM Process Parameters and Material Sustainability -- 2.6.2 AM Process Variables and Energy Sustainability -- 2.6.3 AM Process Parameters and Production Time -- 2.6.4 AM Process Variables and Product Properties -- 2.7 Conclusions -- References -- Chapter 3: Evaluation of Motivational Factors for Sustainable Supplier Collaboration in Indian Industries -- 3.1 Introduction , 3.2 Literature Review -- 3.3 Problem Description -- 3.4 Research Methodology -- 3.5 Case Illustration -- 3.5.1 Research Design -- 3.5.2 Application of BWM for the Case -- 3.6 Results and Discussions -- 3.7 Managerial Implications -- 3.7.1 Theoretical Relevance -- 3.7.2 Policy Suggestions -- 3.8 Conclusions and Recommendations -- References -- Chapter 4: Innovative Procurement Practices Increase Productivity: Indian Dairy Industries -- 4.1 Introduction -- 4.2 Motivation and Aims -- 4.3 Literature Review -- 4.4 Innovative Practices in the Indian Dairy Industry -- 4.4.1 Supply Chain Consolidation for Village-Based Milk Procurement -- 4.4.2 Framework Agreements for Decentralized Procurement of Equipment -- 4.4.3 Procurement Error and Quality Assurance -- 4.5 Endorsements -- 4.5.1 Formation of Special Dairy Zones -- 4.5.2 Implementation of Self-Motivated Milk Procurement Methods -- 4.5.3 Establishment of Cooperative Societies -- 4.5.4 Construction of Feed Banks and Increasing of Feed Productivity -- 4.6 Conclusion -- 4.7 Future Scope -- Acknowledgment -- References -- Index
    Weitere Ausg.: Print version Mangla, Sachin Kumar Sustainability, Innovation and Procurement Milton : Taylor & Francis Group,c2019 ISBN 9781138365483
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz