feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (33)
  • Grünes Gedächtnis
  • Bildungsgesch. Forschung
  • Electronic books  (33)
Type of Medium
Language
Region
Person/Organisation
Access
  • 1
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947918253902882
    Format: XLI, 272 p. , online resource.
    ISBN: 9780230594326
    Series Statement: Finance and Capital Markets Series
    Content: This book addresses key topics relating to international trade; letters of credit mechanism, collections of bills, trade customs and practice. Dealing with complicated implementation issues in a forthright and comprehensive fashion, it is an essential tool for navigating the procedures of international trade finance.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9781349363605
    Language: English
    Keywords: Electronic books
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949568770802882
    Format: 1 online resource (576 pages)
    Edition: 1st ed.
    ISBN: 9789464632224
    Series Statement: Atlantis Highlights in Intelligent Systems Series ; v.9
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Additional Edition: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Durham :Duke University Press,
    UID:
    almahu_9949065569902882
    Format: 1 online resource (256 p.)
    ISBN: 9781478007197 , 9783110696318
    Content: Amitava Kumar's Every Day I Write the Book is for academic writers what Annie Dillard's The Writing Life and Stephen King's On Writing are for creative writers. Alongside Kumar's interviews with an array of scholars whose distinct writing offers inspiring examples for students and academics alike, the book's pages are full of practical advice about everything from how to write criticism to making use of a kitchen timer. Communication, engagement, honesty: these are the aims and sources of good writing. Storytelling, attention to organization, solid work habits: these are its tools. Kumar's own voice is present in his essays about the writing process and in his perceptive and witty observations on the academic world. A writing manual as well as a manifesto, Every Day I Write the Book will interest and guide aspiring writers everywhere.
    Note: Frontmatter -- , Contents -- , Introduction. The 90-Day Book -- , Part I. Self-Help -- , Part II. Writing a Book: A Brief History -- , Part III. Credos -- , Part IV. Form -- , Part V. Academic Interest -- , Part VI. Style -- , Part VII. Exercises -- , Part VIII. The Groves of Academe -- , Part IX. Materials -- , Acknowledgments -- , Appendix A. Ten Rules of Writing -- , Appendix B. PEN Ten Interview -- , Notes -- , Index , Mode of access: Internet via World Wide Web. , In English.
    In: DUP Frontlist eBook-Package 2020, De Gruyter, 9783110696318
    In: EBOOK PACKAGE COMPLETE 2020 English, De Gruyter, 9783110704716
    In: EBOOK PACKAGE COMPLETE 2020, De Gruyter, 9783110704518
    In: EBOOK PACKAGE Linguistics 2020 English, De Gruyter, 9783110704761
    In: EBOOK PACKAGE Linguistics 2020, De Gruyter, 9783110704563
    Language: English
    Subjects: General works , English Studies
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books
    URL: Cover
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cambridge :Cambridge University Press,
    UID:
    almahu_9948234306002882
    Format: 1 online resource (xix, 569 pages) : , digital, PDF file(s).
    ISBN: 9781139151825 (ebook)
    Content: This book presents topics in a single source format using unified spectral theory of computing. With developments of DNS and LES, practitioners are rediscovering waves as important in fluid flows, and capturing these numerically is central to high accuracy computing. Analysis of waves and its use in numerical methods in propagating energy at the right velocity (dispersion effects) and with right amplitude (dissipation) are essential. Most industrial codes using Reynolds-averaged Navier-Stokes equations with turbulence models cannot conceive of capturing waves. The new themes covered in this book are: • Correct error propagation analysis • Practical compact schemes and global analysis tool • Aliasing error and its alleviation • Spurious upstream propagating q-waves • Explanation of the Gibbs phenomenon • New 1D and 2D filters for LES/DNS without SGS modelling • Anisotropic skewed wave propagation • Development and analysis of dispersion relation preservation (DRP) schemes • Flow instabilities and wave propagation phenomena
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Machine generated contents note: ch. 1 Basic Ideas of Scientific Computing -- 1.1.Overview on Scientific Computing -- 1.2.Major Milestones in Electronic Computing -- 1.3.Supercomputing and High Performance Computing -- 1.3.1.Parallel and cluster computing -- 1.3.2.Algorithmic issues of HPC -- 1.4.Computational Fluid Mechanics -- 1.5.Role of Computational Fluid Mechanics -- ch. 2 Governing Equations in Fluid Mechanics -- 2.1.Introduction -- 2.2.Basic Equations of Fluid Mechanics -- 2.2.1.Finite control volume -- 2.2.2.Infinitesimal fluid element -- 2.2.3.Substantive derivative -- 2.3.Equation of Continuity -- 2.4.Momentum Conservation Equation -- 2.5.Energy Conservation Equation -- 2.6.Alternate Forms of Energy Equation -- 2.7.The Energy Equation in Conservation Form -- 2.8.Notes on Governing Equations -- 2.9.Strong Conservation and Weak Conservation Forms -- 2.10.Boundary and Initial Conditions (Auxiliary Conditions) -- 2.11.Equations of Motion in Non-Inertial Frame -- 2.12.Equations of Motion in Terms of Derived Variables -- 2.13.Vorticity-Vector Potential Formulation -- 2.14.Pressure Poisson Equation -- 2.15.Comparison of Different Formulations -- 2.16.Other Forms of Navier-Stokes Equation -- ch. 3 Classification of Quasi-Linear Partial Differential Equations -- 3.1.Introduction -- 3.2.Classification of Partial Differential Equations -- 3.3.Relationship of Numerical Solution Procedure and Equation Type -- 3.4.Nature of Well-Posed Problems -- 3.5.Non-Dimensional Form of Equations -- ch. 4 Waves and Space-Time Dependence in Computing -- 4.1.Introduction -- 4.2.The Wave Equation -- 4.2.1.Plane waves -- 4.2.2.Three-dimensional axisymmetric wave -- 4.2.3.Doppler shift -- 4.2.4.Surface gravity waves -- 4.3.Deep and Shallow Water Waves -- 4.4.Group Velocity and Energy Flux -- 4.4.1.Physical and computational implications of group velocity -- 4.4.2.Wave-packets and their propagation -- 4.4.3.Waves over layer of constant depth -- 4.4.4.Waves over layer of variable depth H(x) -- 4.4.5.Wave refraction in shallow waters -- 4.4.6.Finite amplitude waves of unchanging form in dispersive medium -- 4.5.Internal Waves at Fluid Interface: Rayleigh-Taylor Problem -- 4.5.1.Internal and surface waves in finite over an infinite deep layer of fluid -- 4.5.2.Barotropic or surface mode -- 4.5.3.Baroclinic or internal mode -- 4.5.4.Rotating shallow water equation and wave dynamics -- 4.6.Shallow Water Equation (SWE) -- 4.6.1.Various frequency regimes of SWE -- 4.7.Additional Issues of Computing: Space-Time Resolution of Flows -- 4.7.1.Spatial scales in turbulent flows -- 4.8.Two- and Three-Dimensional DNS -- 4.9.Temporal Scales in Turbulent Flows -- 4.10.Computing Time-Averaged and Unsteady Flows -- ch. 5 Spatial and Temporal Discretizations of Partial Differential Equations -- 5.1.Introduction -- 5.2.Discretization of Differential Operators -- 5.2.1.Functional representation by the Taylor series -- 5.2.2.Polynomial representation of function -- 5.3.Discretization in Non-Uniform Grids -- 5.4.Higher Order Representation of Derivatives Using Operators -- 5.5.Higher Order Upwind Differences -- 5.5.1.Symmetric stencil for higher derivatives -- 5.6.Numerical Errors -- 5.7.Time Integration -- 5.7.1.Single-step methods -- 5.7.2.Single-step multi-stage methods -- 5.7.3.Runge-Kutta methods -- 5.7.4.Multi-step time integration schemes -- ch. 6 Solution Methods for Parabolic Partial Differential Equations -- 6.1.Introduction -- 6.2.Theoretical Analysis of the Heat Equation -- 6.3.A Classical Algorithm for Solution of the Heat Equation -- 6.4.Spectral Analysis of Numerical Methods -- 6.4.1.A higher order method or Milne's method -- 6.5.Treating Derivative Boundary Condition -- 6.6.Stability, Accuracy and Consistency of Numerical Methods -- 6.6.1.Richardson's method -- 6.6.2.Du Fort -- Frankel method -- 6.7.Implicit Methods -- 6.8.Spectral Stability Analysis of Implicit Methods -- Appendix I -- ch. 7 Solution Methods for Elliptic Partial Differential Equations -- 7.1.Introduction -- 7.2.Jacobi or Richardson Iteration -- 7.3.Interpretation of Classical Iterations -- 7.4.Different Point and Line Iterative Methods -- 7.4.1.Gauss-Seidel point iterative method -- 7.4.2.Line Jacobi method -- 7.4.3.Explanation of line iteration methods -- 7.5.Analysis of Iterative Methods -- 7.6.Convergence Theorem for Stationary Linear Iteration -- 7.7.Relaxation Methods -- 7.8.Efficiency of Iterative Methods and Rate of Convergence -- 7.8.1.Method of acceleration due to Lyusternik -- 7.9.Alternate Direction Implicit (ADI) Method -- 7.9.1.Analysis of ADI method -- 7.9.2.Choice of acceleration parameters -- 7.9.3.Estimates of maximum and minimum eigenvalues -- 7.9.4.Explanatory notes on ADI and other variant methods -- 7.10.Method of Fractional Steps -- 7.11.Multi-Grid Methods -- 7.11.1.Two-Grid method -- 7.11.2.Multi-Grid method -- 7.11.3.Other classifications of multi-grid method -- ch. 8 Solution of Hyperbolic PDEs: Signal and Error Propagation -- 8.1.Introduction -- 8.2.Classical Methods of Solving Hyperbolic Equations -- 8.2.1.Explicit methods -- 8.3.Implicit Methods -- 8.4.General Characteristics of Various Methods for Linear Problems -- 8.5.Non-linear Hyperbolic Problems -- 8.6.Error Dynamics: Beyond von Neumann Analysis -- 8.6.1.Dispersion error and its quantification -- 8.7.Role of Group Velocity and Focussing -- 8.7.1.Focussing phenomenon -- ch. 9 Curvilinear Coordinate and Grid Generation -- 9.1.Introduction -- 9.2.Generalized Curvilinear Scheme -- 9.3.Reciprocal or Dual Base Vectors -- 9.4.Geometric Interpretation of Metrics -- 9.5.Orthogonal Grid System -- 9.6.Generalized Coordinate Transformation -- 9.7.Equations for the Metrics -- 9.8.Navier-Stokes Equation in the Transformed Plane -- 9.9.Linearization of Fluxes -- 9.10.Thin Layer Navier-Stokes Equation -- 9.11.Grid Generation -- 9.12.Types of Grid -- 9.13.Grid Generation Methods -- 9.14.Algebraic Grid Generation Method -- 9.14.1.One-dimensional stretching functions -- 9.15.Grid Generation by Solving Partial Differential Equations -- 9.16.Elliptic Grid Generators -- 9.17.Hyperbolic Grid Generation Method -- 9.18.Orthogonal Grid Generation for Navier-Stokes Computations -- 9.19.Coordinate Transformations and Governing Equations in Orthogonal System -- 9.19.1.Gradient operator -- 9.19.2.Divergence operator -- 9.19.3.The Laplacian operator -- 9.19.4.The curl operator -- 9.19.5.The line integral -- 9.19.6.The surface integral -- 9.19.7.The volume integral -- 9.20.The Gradient and Laplacian of Scalar Function -- 9.21.Vector Operators of a Vector Function -- 9.22.Plane Polar Coordinates -- 9.23.Navier-Stokes Equation in Orthogonal Formulation -- 9.24.Improved Orthogonal Grid Generation Method for Cambered Airfoils -- 9.24.1.Orthogonal grid generation for GA(W)-1 airfoil -- 9.24.2.Orthogonal grid generation for an airfoil with roughness element -- 9.24.3.Solutions of Navier-Stokes equation for flow past SHM-1 airfoil -- 9.24.4.Compressible flow past NACA 0012 airfoil -- 9.25.Governing Euler Equation, Auxiliary Conditions, Numerical Methods and Results -- 9.26.Flow Field Calculation Using Overset or Chimera Grid Technique -- ch. , 10 Spectral Analysis of Numerical Schemes and Aliasing Error -- 10.1.Introduction -- 10.2.Spatial Discretization of First Derivatives -- 10.2.1.Second order central differencing (CD2) scheme -- 10.3.Discrete Computing and Nyquist Criterion -- 10.4.Spectral Accuracy of Differentiation -- 10.5.Spectral Analysis of Fourth Order Central Difference Scheme -- 10.6.Role of Upwinding -- 10.6.1.First order upwind scheme (UD1) -- 10.6.2.Third order upwind scheme (UD3) -- 10.7.Numerical Stability and Concept of Feedback -- 10.8.Spectral Stability Analysis -- 10.9.High Accuracy Schemes for Spatial Derivatives -- 10.10.Temporal Discretization Schemes -- 10.10.1.Euler time integration scheme -- 10.10.2.Four-stage Runge-Kutta (RK4) method -- 10.11.Multi-Time Level Discretization Schemes -- 10.11.1.Mid-point leapfrog scheme -- 10.11.2.Second order Adams-Bashforth scheme -- 10.12.Aliasing Error -- 10.12.1.Why aliasing error is important? -- 10.12.2.Estimation of aliased component -- 10.13.Numerical Estimates of Aliasing Error -- 10.14.Controlling Aliasing Error -- 10.14.1.Aliasing removal by zero padding -- 10.14.2.Aliasing removal by phase shifts and grid-staggering -- ch. 11 Higher Accuracy Methods -- 11.1.Introduction -- 11.2.The General Compact Schemes -- 11.2.1.Approximating first derivatives by central scheme -- 11.3.Method for Solving Periodic Tridiagonal Matrix Equation -- 11.4.An Example of a Sixth Order Scheme -- 11.5.Order of Approximation versus Resolution -- 11.6.Optimization Problem Associated with Discrete Evaluation of First Derivatives -- 11.7.An Optimized Compact Scheme For First Derivative by Grid Search Method -- 11.8.Upwind Compact Schemes -- 11.9.Compact Schemes with Improved Numerical Properties -- 11.9.1.OUCS1 scheme -- 11.9.2.OUCS2 scheme -- 11.9.3.OUCS3 scheme -- 11.9.4.OUCS4 scheme -- 11.10.Approximating Second Derivatives -- 11.11.Optimization Problem for Evaluation of the Second Derivatives -- 11.12.Solution of One-Dimensional Convection Equation -- 11.13.Symmetrized Compact Difference Schemes -- 11.13.1.High accuracy symmetrized compact scheme -- 11.13.2.Solving bidirectional wave equation -- 11.13.3.Transitional channel flow -- 11.13.3.1.Establishment of equilibrium flow -- 11.13.3.2.Receptivity of channel flow to convecting single viscous vortex -- 11.13.4.Transitional channel flow created by vortex street -- 11.14.Combined Compact Difference (CCD) Schemes -- 11.14.1.A new combined compact difference (NCCD) scheme -- 11.14.2.Solving the Stommel Ocean Model problem -- 11.14.3.Operational aspects of the CCD schemes -- 11.14.4.Calibrating NCCD method to solve Navier-Stokes equation for 2D lid-driven cavity problem -- 11.15.Diffusion Discretization and Dealiasing Properties of Compact Schemes -- 11.15.1.Dynamics and aliasing in square LDC problem --
    Additional Edition: Print version: ISBN 9781107023635
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949319354502882
    Format: 1 online resource (109 pages)
    ISBN: 9781789246063
    Content: The Ganges-Brahmaputra-Meghna deltas has newly emerged 'char' islands, which are very vulnerable, socially, institutionally and environmentally. This book explains how the Governments of Bangladesh and the Netherlands cooperated on a land-based rural development project to give settlers security and purpose.
    Note: Front Cover -- Title Page -- Copyright -- Contents -- Figures and Tables -- Contributors -- Glossary -- Acknowledgements -- 1. The Coastal Chars of Bangladesh -- 2. The Birth of CDSP-IV -- 3. Managing Char Development and Settlement: A Complex Process -- 4. Involving the Communities and Civil Society -- 5. Role of Women in Development -- 6. Developing the Infrastructure -- 7. The Land Settlement Process -- 8. The Power of Agriculture -- 9. Money Matters - Savings and Loans -- 10. Environmental Improvement with Trees -- 11. Income and Quality of Life -- 12. Our Pride -- 13. When the Project Leaves -- References -- Back Cover.
    Additional Edition: Print version: Jenkins, Andrew New Land, New Life Oxford : CAB International,c2020 ISBN 9781789246049
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    San Diego [u.a.] : Academic Press
    UID:
    gbv_1645916502
    Format: Online Ressource (xiv, 435 p.)
    Edition: 2. ed.
    Edition: ScienceDirect
    ISBN: 0585492298 , 9780585492292 , 9780126423501 , 0126423504
    Series Statement: Probability and mathematical statistics
    Content: Introduction and Coverage. Preliminaries. Elementary Theory of Rank Tests. Selected Rank Tests. Computation of Null Exact Distributions. Limiting Null Distributions. Limiting Non-Null Distributions. Asymptotic Optimality and Efficiency. Rank Estimates and Asymptotic Linearity
    Content: The first edition of Theory of Rank Tests (1967) has been the precursor to a unified and theoretically motivated treatise of the basic theory of tests based on ranks of the sample observations. For more than 25 years, it helped raise a generation of statisticians in cultivating their theoretical research in this fertile area, as well as in using these tools in their application oriented research. The present edition not only aims to revive this classical text by updating the findings but also by incorporating several other important areas which were either not properly developed before 1965 or have gone through an evolutionary development during the past 30 years. This edition therefore aims to fulfill the needs of academic as well as professional statisticians who want to pursue nonparametrics in their academic projects, consultation, and applied research works. Key Features * Asymptotic Methods * Nonparametrics * Convergence of Probability Measures * Statistical Inference
    Note: Includes bibliographical references (p. [407]-424) and indexes. - Description based on print version record
    Additional Edition: ISBN 0126423504
    Additional Edition: Druckausg. Hájek, Jaroslav, 1926 - 1974 Theory of rank tests San Diego, Calif. [u.a.] : Academic Press, 1999 ISBN 0126423504
    Language: English
    Subjects: Economics , Mathematics
    RVK:
    RVK:
    Keywords: Statistischer Test ; Rangstatistik ; Testauswertung ; Electronic books ; Electronic books
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_792481259
    Format: 1 Online-Ressource (633 Seiten)
    ISBN: 9780444829146 , 0444829148
    Series Statement: Handbooks in economics 19
    Content: The Handbook of Social Choice and Welfare presents, in two volumes, essays on past and on-going work in social choice theory and welfare economics. The first volume consists of four parts. In Part 1 (Arrovian Impossibility Theorems), various aspects of Arrovian general impossibility theorems, illustrated by the simple majority cycle first identified by Condorcet, are expounded and evaluated. It also provides a critical survey of the work on different escape routes from impossibility results of this kind. In Part 2 (Voting Schemes and Mechanisms), the operation and performance of voting schemes and cost-sharing mechanisms are examined axiomatically, and some aspects of the modern theory of incentives and mechanism design are expounded and surveyed. In Part 3 (structure of social choice rules), the positional rules of collective decision-making (the origin of which can be traced back to a seminal proposal by Borda), the game-theoretic aspects of voting in committees, and the implications of making use of interpersonal comparisons of welfare (with or without cardinal measurability) are expounded, and the status of utilitarianism as a theory of justice is critically examined. It also provides an analytical survey of the foundations of measurement of inequality and poverty. In order to place these broad issues (as well as further issues to be discussed in the second volume of the Handbook) in perspective, Kotaro Suzumura has written an extensive introduction, discussing the historical background of social choice theory, the vistas opened by Arrow's Social Choice and Individual Values, the famous "socialist planning" controversy, and the theoretical and practical significance of social choice theory. The primary purpose of this Handbook is to provide an accessible introduction to the current state of the art in social choice theory and welfare economics. The expounded theory has a strong and constructive message for pursuing human well-being and facilitating collective decision-making. *Advances economists' understanding of recent advances in social choice and welfare *Distills and applies research to a wide range of social issues *Provides analytical material for evaluating new scholarship *Offers consolidated reviews and analyses of scholarship in a framework that encourages synthesis
    Content: The Handbook of Social Choice and Welfare presents, in two volumes, essays on past and on-going work in social choice theory and welfare economics. The first volume consists of four parts. In Part 1 (Arrovian Impossibility Theorems), various aspects of Arrovian general impossibility theorems, illustrated by the simple majority cycle first identified by Condorcet, are expounded and evaluated. It also provides a critical survey of the work on different escape routes from impossibility results of this kind. In Part 2 (Voting Schemes and Mechanisms), the operation and performance of voting schemes and cost-sharing mechanisms are examined axiomatically, and some aspects of the modern theory of incentives and mechanism design are expounded and surveyed. In Part 3 (structure of social choice rules), the positional rules of collective decision-making (the origin of which can be traced back to a seminal proposal by Borda), the game-theoretic aspects of voting in committees, and the implications of making use of interpersonal comparisons of welfare (with or without cardinal measurability) are expounded, and the status of utilitarianism as a theory of justice is critically examined. It also provides an analytical survey of the foundations of measurement of inequality and poverty. In order to place these broad issues (as well as further issues to be discussed in the second volume of the Handbook) in perspective, Kotaro Suzumura has written an extensive introduction, discussing the historical background of social choice theory, the vistas opened by Arrow's Social Choice and Individual Values, the famous "socialist planning" controversy, and the theoretical and practical significance of social choice theory. The primary purpose of this Handbook is to provide an accessible introduction to the current state of the art in social choice theory and welfare economics. The expounded theory has a strong and constructive message for pursuing human well-being and facilitating collective decision-making. *Advances economists' understanding of recent advances in social choice and welfare *Distills and applies research to a wide range of social issues *Provides analytical material for evaluating new scholarship *Offers consolidated reviews and analyses of scholarship in a framework that encourages synthesis
    Note: Includes bibliographical references and indexes , Use copy Restrictions unspecified star MiAaHDL , Preface to Volume 1 (K. Arrow, A. Sen, K. Suzumura). Introduction (K. Suzumura). Part 1. Arrovian Impossibility Theorems. 1. Impossibility theorems in the Arrovian framework (D. Campbell, J. Kelly). 2. Categories of Arrovian voting schemes (F. Aleskerov). 3. Domain restrictions (W. Gaertner). Part 2. Voting Schemes and Mechanisms. 4. Voting procedures (S. Brams, P. Fishburn). 5. Implementation theory (E. Maskin, T. Sj & ouml;str & ouml;m). 6. Axiomatic cost and surplus-sharing (H. Moulin). Part 3. Structure of Social Choice Rules. 7. Positional rules of collective decision-making (P. Pattanaik). 8. Game-Theoretic Analysis of voting in committees (B. Peleg). 9. Representative democracy and social choice theory (N. Schofield). Part 4. Welfare, Justice and Poverty. 10. Social welfare functionals and interpersonal comparability (C. d'Aspremont, L. Gevers). 11. Utilitarianism and the theory of justice (C. Blackorby, W. Bossert, D. Donaldson). 12. Inequality, poverty and welfare (B. Dutta). , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Additional Edition: ISBN 0444829148
    Additional Edition: ISBN 9780444829146
    Additional Edition: Erscheint auch als Druck-Ausgabe Handbook of social choice and welfare Amsterdam ; Boston : Elsevier, 2002-
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Arrow-Paradoxon ; Abstimmung ; Kollektiventscheidung ; Wirtschaftstheorie ; Electronic books ; Aufsatzsammlung
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Author information: Sen, Amartya 1933-
    Author information: Suzumura, Kōtarō 1944-2020
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1655665057
    Format: Online Ressource (xx, 962 Seiten) , Illustrationen
    Edition: Online-Ausg.
    ISBN: 0080929826 , 9780080929828 , 9780444508942
    Series Statement: Handbooks in economics 19
    Content: This second part of a two-volume set continues to describe economists' efforts to quantify the social decisions people necessarily make and the philosophies that those choices define.€ Contributors draw on lessons from€philosophy, history, and other disciplines, but they ultimately use editor Kenneth Arrow's seminal work on social choice as a jumping-off point for discussing ways to incentivize, punish, and distribute€goods.€ Develops many subjects from Volume 1 (2002) while introducing new themes in welfare economics and social choice
    Note: Includes bibliographical references and index. - Print version record , pt. 5. Foundations -- pt. 6. Developments of the basic arrovian schemes -- pt. 7. Fairness and rights -- pt. 8. Voting and manipulation.
    Additional Edition: ISBN 0444829148
    Additional Edition: Erscheint auch als Druck-Ausgabe Handbook of social choice and welfare Amsterdam ; Boston : Elsevier, 2002-©2011
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Wohlfahrtstheorie ; Kollektiventscheidung ; Electronic books
    URL: Volltext  (Deutschlandweit zugänglich)
    Author information: Sen, Amartya 1933-
    Author information: Suzumura, Kōtarō 1944-2020
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cambridge : Open Book Publishers
    UID:
    gbv_83701106X
    Format: Online-Ressource (166 p)
    ISBN: 9781906924409
    Series Statement: Open Reports Ser. v.1
    Content: Intro -- Contents -- Violence and Civil Society -- Civil Paths to Peace -- Members of the Commonwealth Commission on Respect and Understanding -- Executive Summary -- 1. Why Do Respect and Understanding Matter? -- 2. The Nature and Nurture of Violence -- 3. Poverty, Inequality and Humiliation -- 4. History, Grievance and Conflict -- 5. Political Participation -- 6. The Role of the Media and Communication -- 7. Young People and Education -- 8. Multilateralism and the International Order -- 9. The Way Forward -- Original preface -- Letter of presentation to the report -- References -- Bibliography -- Written submissions to the Commonwealth Commission on Respect and Understanding -- Index.
    Note: Description based upon print version of record , ""Contents""; ""Violence and Civil Society""; ""Civil Paths to Peace""; ""Members of the Commonwealth Commission on Respect and Understanding""; ""Executive Summary""; ""1. Why Do Respect and Understanding Matter?""; ""2. The Nature and Nurture of Violence""; ""3. Poverty, Inequality and Humiliation""; ""4. History, Grievance and Conflict""; ""5. Political Participation""; ""6. The Role of the Media and Communication""; ""7. Young People and Education""; ""8. Multilateralism and the International Order""; ""9. The Way Forward""; ""Original preface""; ""Letter of presentation to the report"" , ""References""""Bibliography""; ""Written submissions to the Commonwealth Commission on Respect and Understanding""; ""Index""
    Additional Edition: ISBN 9781906924416
    Additional Edition: ISBN 9781906924409
    Additional Edition: Erscheint auch als Druck-Ausgabe Peace and Democratic Society
    Language: English
    Keywords: Friede ; Demokratie ; Zivilgesellschaft ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    Author information: Sen, Amartya 1933-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages