feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1603151699
    Format: IX, 143 S.
    ISBN: 0701202971
    Series Statement: The international psycho-analytical library 75
    Note: Enthält Bibliogr
    Language: English
    Subjects: Psychology
    RVK:
    Keywords: Psychoanalyse ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    edochu_18452_11053
    ISSN: 1437-4331 , 1437-4331
    Content: Peer Reviewed
    In: Clinical Chemistry and Laboratory Medicine, : de Gruyter, 2009, 18,1980,1, Seiten 23-26, 1437-4331
    Language: Undetermined
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Lucknow : Environmental Information System (ENVIS) [u.a.]
    UID:
    gbv_434705500
    Format: III, 215 Bl.
    Series Statement: Subject bibliography series 5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949501451502882
    Format: 1 online resource
    ISBN: 9781000688993 , 1000688992 , 9781003323426 , 1003323421 , 9781000689020 , 1000689026
    Series Statement: Wireless communications and networking technologies
    Content: Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
    Additional Edition: Print version: ISBN 103208166X
    Additional Edition: ISBN 9781032081663
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Boca Raton, FL :Chapman & Hall/CRC Press,
    UID:
    almahu_9949464638602882
    Format: 1 online resource
    Edition: First edition.
    ISBN: 9781003330516 , 1003330517 , 9781000832624 , 1000832627 , 9781000832594 , 1000832597
    Content: "Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more"--
    Additional Edition: Print version: Khan, Suhel Ahmad. Software security Boca Raton, FL : Chapman & Hall/CRC Press, 2023 ISBN 9781032356310
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    New York, NY :Springer US :
    UID:
    almahu_9949198903802882
    Format: XV, 183 p. , online resource.
    Edition: 1st ed. 1993.
    ISBN: 9781461531142
    Content: amounts can produce a deleterious effect on animals. In an attempt to quantify this potential for toxicity and to give sufficient margin for safety, JECFA has introduced an acceptable daily intake (ADI) level for food additives. For example, the ADI values granted for saccharin, aspartame, cyclamate, acesulfame-K and sucralose are 2. 5, 40, 11,9 and 1 3. 5 mg kg- body weight per day, respectively. Chapter 2 on regulatory aspects of low-calorie food elaborates these points. The additives that are to be consumed in large amounts, such as a fat replacement product like 'Olestra' or a new bulking material like 'polydextrose', present a more complex problem as far as the evaluation of their toxicity is concerned. Normal safety testing of an additive, such as a high-intensity sweetener, requires that the test animals are fed with a sufficiently high dosage in order to produce an effect and then on that basis an ADI value is calculated. In cases like 'Olestra' and 'polydex­ trose', which are not normally present in diet or metabolised to dietary constituents, such an approach will obviously not be applicable, or of any use, in calculating an ADI value. Due to these factors the regulatory authorities have not yet been able to produce any guidelines for toxicity trials for additives that are to be taken in food in large quantities.
    Note: 1 Low-calorie foods: relevance for body weight control -- 1.1 Overconsumption and low-calorie foods -- 1.2 Appetite and the regulation of body weight -- 1.3 Appetite control and the satiety cascade -- 1.4 Nutrition and satiety -- 1.5 Relationship between body weight and use of carbohydrate or high-intensity sweeteners -- 1.6 Dietary fat and appetite control -- 1.7 Low-calorie products - physiological responses -- 1.8 Low-calorie products - psychological responses -- 1.9 Summary -- References -- 2 Regulatory aspects of low-calorie food -- 2.1 Introduction -- 2.2 Regulatory bodies -- 2.3 Controls on the components of low-calorie foods -- 2.4 Controls on the composition of low-calorie foods -- 2.5 Novel foods -- 2.6 Labelling of low-calorie foods -- 2.7 Conclusion -- References -- 3 Low-calorie bulk sweeteners: nutrition and metabolism -- 3.1 Introduction -- 3.2 Sugar alcohols -- 3.3 Physicochemical and functional properties of sugar alcohols -- 3.4 Fructo-oligosaccharides -- 3.5 Nutritional properties -- 3.6 Conclusions -- References -- 4 Low-calorie bulking ingredients: nutrition and metabolism -- 4.1 Introduction -- 4.2 Dietary fibres -- 4.3 Low-calorie polysaccharides -- 4.4 Nutrition and metabolism -- 4.5 Conclusions -- References -- 5 Fat replacer ingredients and the markets for fat-reduced foods -- 5.1 Introduction -- 5.2 Some issues surrounding fat substitution -- 5.3 Fat substitutes and replacers -- 5.4 Markets for fat-reduced foods and fat replacer ingredients -- 5.5 Conclusions -- References -- 6 Fat and calorie-modified bakery products -- 6.1 Introduction -- 6.2 Marketing overview -- 6.3 Technical overview -- 6.4 Conclusion -- References -- 7 High-intensity, low-calorie sweeteners -- 7.1 Introduction -- 7.2 Approved artificial sweeteners -- 7.3 High-intensity sweeteners under development -- 7.4 Conclusions -- Acknowledgement -- References -- 8 Low-calorie soft drinks -- 8.1 Introduction -- 8.2 Market and technical needs -- 8.3 Formulation of low-calorie soft drinks -- 8.4 Commercial artificial sweeteners -- 8.5 Conclusion -- References.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9780751400045
    Additional Edition: Printed edition: ISBN 9781461363620
    Additional Edition: Printed edition: ISBN 9781461531159
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Boca Raton, FL :CRC Press,
    UID:
    almahu_9949501739202882
    Format: 1 online resource
    Edition: First edition.
    ISBN: 9781000887051 , 1000887057 , 9781003322351 , 1003322352 , 9781000887075 , 1000887073
    Content: Software evolution is a time-consuming and costly process due to its complex architecture. Software designers need to produce software that is effective as well as durable. Durability and effectiveness of software are the foremost priorities and challenges for developers. This book comprises real-life case studies of durability issues and their solutions that bring to light loopholes and show how to fix them, to enhance durability. Existing literature on software durability tells us that the first step is to recognise the problem. It gives information about durability, risk, estimation, knowledge, and governance based on five main characteristics: dependability, trustworthiness, usability, security, and human trust. The book serves as a complete package to get acquainted with assurance and risk management from a software durability perspective. It enhances our understanding of the concept of durability, its multi-dimensional approach, threats and their types, risk, mitigation techniques, and suggestive measures. The book reviews the emerging trends in the software development process in the context of durability concepts such as automated code reviews, coding standards, and software durability standards and their testing, cost management solutions, low-code or no-code solutions, and durability assurance.
    Additional Edition: Print version: ISBN 9781032344782
    Additional Edition: ISBN 1032344784
    Additional Edition: ISBN 9781032344805
    Additional Edition: ISBN 1032344806
    Additional Edition: ISBN 9781003322351
    Additional Edition: ISBN 1003322352
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages