feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Ibero-Amerik. Institut  (77)
  • HPol Brandenburg  (43)
  • Bundesarchiv  (19)
  • Kreismedienzentrum Teltow-Fläming  (1)
  • SB Senftenberg  (1)
Region
Bibliothek
Virtuelle Kataloge
  • 1
    UID:
    almahu_9949687543102882
    Umfang: 1 online resource (296 p.)
    ISBN: 9783839464151
    Serie: Public History - Angewandte Geschichte ; 19
    Inhalt: Die Erinnerung an den Nationalsozialismus und den Holocaust ist in stetiger Transformation begriffen. Dieser Wandel gewinnt ebenso an Bedeutung wie die Entwicklung der digitalen Holocaust Education. Dies zeigt sich nicht zuletzt an immer neuen digitalen Vermittlungsangeboten und georeferenzierten Webapplikationen, in denen Erinnerungsorte auf digitalen Landkarten markiert und im Sinne des Deep Mappings mit weiterführenden Informationen versehen werden. Die Beiträger*innen diskutieren diese Entwicklungen kritisch und stellen die unterschiedlichen Aspekte von digitalen georeferenzierten Dokumentations-, Erinnerungs- und Vermittlungsprojekten vor.
    Anmerkung: Frontmatter -- , Inhalt -- , Digital Memory - Digital History - Digital Mapping -- , Raum, Vergangenheits(re-)konstruktion, digitale Technologien und Authentizitätserwartungen -- , Überlegungen zu einer kritischen Kartographie traumatischer Orte des Holocaust -- , The AesthEt(h)ics of the Fragment -- , What's in a Name? From People to Data and Back -- , On Fragments: of Life and Death -- , Digitale Lerntools auf Basis von Zeitzeug:innen-Interviews bei ERINNERN:AT -- , Simulation und Emotion -- , Vermittlung und Vermittlungsperspektiven im Digitalen -- , Historisches Lernen mit der Digitalen Erinnerungslandschaft DERLA -- , Reiseberichte aus (Post)Digitalien -- , Geschichte ist Beziehung -- , GAMS, DERLA und Data Science -- , Inhalte explorativ durchsuchen -- , Der Virtuelle Guide der KZ-Gedenkstätte Mauthausen -- , Jewish Places: Die bundesweite Website zu jüdischer Lokalgeschichte -- , avArc. A Landscape of Memory and Temporalities -- , Autor:innen , In German.
    Sprache: Deutsch
    Schlagwort(e): Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Singapore :Springer,
    UID:
    almahu_9949568766902882
    Umfang: 1 online resource (310 pages)
    Ausgabe: 1st ed.
    ISBN: 9789819936687
    Serie: Springer Tracts in Electrical and Electronics Engineering Series
    Anmerkung: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Weitere Ausg.: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    New York ; Oxford :Berghahn Books,
    UID:
    almahu_BV048636433
    Umfang: 1 Online-Ressource (vii, 205 Seiten) : , Diagramme.
    ISBN: 978-1-80073-773-0
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-801-0
    Sprache: Englisch
    Schlagwort(e): Islam ; Fundamentalismus ; Terrorismus ; Radikalismus ; Rechtsradikalismus ; COVID-19 ; Pandemie
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: JSTOR
    URL: Cover
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9949517373702882
    Umfang: 1 online resource (177 pages)
    ISBN: 9781000791266
    Inhalt: Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency.
    Weitere Ausg.: Print version: Indrusiak, Leando Soares Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing Milton : River Publishers,c2016 ISBN 9788793519084
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Umfang: 1 online resource (396 pages)
    Ausgabe: 1st ed.
    ISBN: 9781803556260
    Weitere Ausg.: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_9949760277302882
    Umfang: 1 online resource (632 pages)
    Ausgabe: 1st ed.
    ISBN: 1-003-47105-6 , 1-04-001723-1
    Inhalt: The Second International Conference on Applied Data Science and Smart Systems (ADSSS-2023) was held on 15-16 December 2023 at Chitkara University, Punjab, India.
    Weitere Ausg.: ISBN 1-03-274814-1
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    UID:
    b3kat_BV043569484
    Umfang: 216 Seiten , 23.4 cm x 15.6 cm
    ISBN: 9783706554190
    Serie: Schriften des Centrums für Jüdische Studien Band 26
    Sprache: Deutsch
    Fachgebiete: Geschichte
    RVK:
    Schlagwort(e): Palästina ; Einwanderung ; Juden ; Österreich ; Geschichte 1920-1945
    Mehr zum Autor: Kumar, Victoria
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    almahu_9949858790202882
    Umfang: 1 online resource (608 pages)
    Ausgabe: 1st ed.
    ISBN: 94-6463-490-1
    Serie: Atlantis Highlights in Intelligent Systems Series ; v.11
    Anmerkung: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- Research on evaluation system and method of EVs' development trend -- ChatGPT & -- RPG Game: A New Option for Student to Study with Artificial Intelligence -- Research on the evaluation of enterprise digital transformation maturity based on comprehensive evaluation model -- Optimizing Portfolio Management and Risk Assessment in Digital Assets Using Deep Learning for Predictive Analysis -- Design and implementation of a data-driven tobacco production line warning system -- Analysis of Spatial Structure of Digital Information Service Industry - Based on Social Network Model and Modified Gravity Model -- Design of electronic shelf label and Zigbee gateway based on electrophoretic display technology -- Overview of water supply operation and maintenance management service system -- Intelligent Foundation Pit based on Digital TwinTechnology Safety Monitoring and Prediction -- How do artificial intelligence applications affect the performance of intelligent manufacturing enterprises-- Research from the Perspective of Human Capital Structure -- 2 LITERATURE REVIEW -- 3 THEORETICAL ANALYSIS AND RESEARCH HYPOTHESIS -- 3.1 The direct impact of artificial intelligence applications on the performance of smart manufacturing companies -- 3.2 Indirect impact of artificial intelligence application on intelligent manufacturing enterprise performance -- 4 RESEARCH DESIGN -- 4.1 Model construction -- 4.2 Variable Selection and Explanation -- 4.3 Sample Selection and Data Sources -- 5 ANALYSIS OF EMPIRICAL RESULTS -- 5.1 Analysis of benchmark regression results -- 5.2 Robustness Tests -- 5.2.1 Endogeneity issues -- 5.2.2 Further Robustness Tests -- 5.3 Heterogeneity analysis -- 5.3.1 Analysis of regional heterogeneity -- 5.3.2 Analysis of Industry Heterogeneity -- 6 RESULTS. , 7 DISCUSSION AND CONCLUSION -- ACKNOWLEDGMENTS -- REFERENCES -- Research on fusion and integration method of BIM and GIS data -- Research on manufacturing service recommendation method based on Product-based Neural Network -- Research on Self-inspired Intelligent Question Answering Method Based on Socratic Questioning -- The Impact Factors of TikTok Live Shopping Features on Consumer Purchase Intentions: Evidence from China -- Combating Illegal Wildlife Trade through Big Data Monitoring and Management -- Research on Tourism Experience of Tourists in Natural Resource-based Scenic Spots in the Context of Big Data -- Practice and Exploration of Artificial Intelligence Ethics Education in Higher Education -- Hot topics and frontier evolution of strength training for physical health in older adults research: a bibliometric mapping from 2012 to 2021 -- Stock price forecast based on improved Transformer -- Analysis of China-Myanmar Energy Interconnection and Trade Cooperation via AHP-SWOT Approach -- Research and Implementation of Digital Transformation Methods for Process Manufacturing Enterprises Based on Employee Performance -- Selection of Excellent Digital Demonstration Units Based on Entropy Weight TOPSIS Method -- Construction of the Effectiveness Evaluation System for Digital Transformation of Power Grid Enterprises -- Revolutionizing Credit Card Marketing: Bank N's Journey with a Smart Credit Card Marketing Platform -- Data Statistics Applications in Regulating the Balance of the Wildlife Trade -- Untitled -- Innovative Chatbot Technologies and Trends -- Innovative Practice of Collaborative Education between Industry and Academia in Talent Cultivation in the Field of E-commerce Under the Background of Mass Entrepreneurship and Innovation -- A Study of the Impact of Digital Transformation on the Risk Level of Commercial Banks. , Research on the design of intelligent tourism auxiliary decision-making service platform based on local tourism big data -- Research on the Prediction of Overall Monthly Active Users of WeChat Mini Programs Based on Linear Regression -- A data-driven comprehensive evaluation method for Data Link -- Exploration and Research on the New Mode of Enterprise Innovation and Development Based on Big Data Analysis Technology -- Research on the Influence of Transnational Technology Merger and Acquisition on the Rate of Domestic Added Value of Chinese Enterprises' Exports -- Mining of Credit Risk Factors for New Agricultural Entities under the Big Data of Agricultural Economy in Jilin Province -- Development of Tourism Website Based on Java -- Application Research of RPA Technology in the Construction of Financial Robot Business Automation Processing Platform -- Web 3.0: the impact of virtual spokesperson generation characteristics on consumer brand attitudes -- Command Execution Bypassing Evasion Based on Win32Net Module -- A study on speech recognition of Tibetan Amdo based on whisper -- A Cross-Chain Scheme for Goods Atomicity in E-commerce Transactions -- Research on Carbon Emission Reduction of ICT Enabled Manufacturing Industry--A Case Study of China Telecom -- Synthesis of Tibetan Amdo based on VITS -- Research on the Interpretability Analysis Method of Transient Stability Assessment in Power Systems Based on Deep Learning -- Study on voluntary environmental regulation and ESG performance based on PSM-DID model -- Research on the Mechanism and Pathway of Digital Intelligence Technology Application in Collaborative Emission Reduction in the Chemical Industry -- Construction of information security literacy evaluation model for College students based on Analytic Hierarchy Process -- New Media Operation: Art of Content Innovation and User Interaction. , Analysis of Transportation Carbon Emissions in Xinjiang Based on the Carbon Emission Factor Method for Load Weights -- Research on the Innovative Model of Integrating Smart Tourism and Agricultural E-commerce in Shiyan City Based on Digital Enablement -- The Application and Challenges of Blockchain Technology in Accounting and Financial Information Systems -- Applying Machine Learning and Time Series to Predict Real Estate Valuations -- An Improved YOLOv8 Algorithm Model for Detection of Personal Protective Products in Chemical Plants -- Research on the Optimization of Picking Path Considering the Minimization of Goods Damage Cost -- Intelligent Operation and Maintenance Control Platform for Energy Internet Analysis -- Application of Video Artificial Intelligence in Smart Expressway Scenarios -- Research on Data Link Knowledge Graph Technology and Its Application Based on Data -- Analysing the theoretical connotation and practical path of blockchain technology affecting the digital economy--Evidence from China -- 2 RELATED WORK -- 3 PROPOSED METHODOLOGY -- 3.1 Data Set Construction -- 3.2 Detection Strategy -- 3.3 Training Design -- 4 EXPERIMENTS -- 4.1 Data Sets and Parameters -- 4.2 Experimental Results and Analysis -- 5 CONCLUSIONS -- REFERENCES -- Research on The Effect of UGC Characteristics on Consumers' Impulse Purchase Intention in Community E.commerce Platform -- Knowledge Graph Completion Model Based on Con-distillation -- Research and Application of Copyright Protection of Ethnic Cultural Resources Based on Blockchain.
    Weitere Ausg.: ISBN 94-6463-489-8
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    UID:
    almahu_BV043208288
    Umfang: 285 Seiten : , 64 Illustrationen, Diagramme ; , 22 cm x 16.5 cm, 500 g.
    ISBN: 978-3-902542-45-8 , 3-902542-45-4
    Sprache: Deutsch
    Fachgebiete: Geschichte
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Zweiter Weltkrieg ; Kriegsende ; Besetzung ; Nachkriegszeit ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung
    Mehr zum Autor: Kumar, Victoria.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz