Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (7)
  • Daimi, Kevin  (5)
  • Safari, an O'Reilly Media Company.  (5)
  • Engineering  (13)
  • Computer security ; Management
Datasource
Material
Language
Years
Author, Corporation
  • 1
    ISBN: 9783031569500
    Language: English
    Pages: 1 Online-Ressource(XIX, 563 p. 220 illus., 174 illus. in color.)
    Edition: 1st ed. 2024.
    Series Statement: Lecture Notes in Networks and Systems 956
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Cooperating objects (Computer systems). ; Engineering ; Medical informatics.
    Abstract: This book concentrates on advances in research in the areas of computational intelligence, cybersecurity engineering, data analytics, network and communications, cloud and mobile computing, and robotics and automation. The Second International Conference on Advances in Computing Research (ACR’24), June 3–5, 2024, in Madrid, brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. It introduces the concepts, techniques, methods, approaches, and trends needed by researchers, graduate students, specialists, and educators for keeping current and enhancing their research and knowledge in these areas.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783031353086
    Language: English
    Pages: 1 Online-Ressource(XVIII, 452 p. 148 illus., 105 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Lecture Notes in Networks and Systems 721
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Computational intelligence. ; Cooperating objects (Computer systems). ; Medical informatics. ; Engineering
    Abstract: The Second International Conference on Innovations in Computing Research (ICR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the innovations in computing technologies. The conference is aptly segmented into six tracks: Data Science, Computer and Network Security, Health Informatics and Medical Imaging, Computer Science and Computer Engineering Education, Internet of Things, and Smart Cities/Smart Energy. These tracks aim to promote a birds-of-the-same-feather congregation and maximize participation. The Data Science track covers a wide range of topics including complexity score for missing data, deep learning and fake news, cyberbullying and hate speech, surface area estimation, analysis of gambling data, car accidents predication model, augmenting character designers’ creativity, deep learning for road safety, effect of sleep disturbances on the quality of sleep, deep learning-based path-planning, vehicle data collection and analysis, predicting future stocks prices, and trading robot for foreign exchange. Computer and Network Security track is dedicated to various areas of cybersecurity. Among these are decentralized solution for secure management of IoT access rights, multi-factor authentication as a service (MFAaaS) for federated cloud environments, user attitude toward personal data privacy and data privacy economy, host IP obfuscation and performance analysis, and vehicle OBD-II port countermeasures. The Computer Science and Engineering Education track enfolds various educational areas, such as data management in industry–academia joint research: a perspective of conflicts and coordination in Japan, security culture and security education, training and awareness (SETA), influencing information security management, engaging undergraduate students in developing graphical user interfaces for NSF funded research project, and emotional intelligence of computer science teachers in higher education. On the Internet of Things (IoT) track, the focus is on industrial air quality sensor visual analytics, social spider optimization meta-heuristic for node localization optimization in wireless sensor networks, and privacy aware IoT-based fall detection with infrared sensors and deep learning. The Smart Cities and Smart Energy track spans various areas, which include, among others, research topics on heterogeneous transfer learning in structural health monitoring for high-rise structures and energy routing in energy Internet using the firefly algorithm.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783031421129
    Language: English
    Pages: 1 Online-Ressource(XVII, 377 p. 131 illus., 98 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Studies in Computational Intelligence 1112
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Biomedical engineering. ; Engineering
    Abstract: Medical Imaging and 3D/4D Surgical Visualization -- Healthcare/Medical Information Systems Supporting Patients and the Public -- Management of Healthcare and Medical Information Systems -- Design and Analysis of Health/Medical Records -- Healthcare/Medical Networking and Care Sharing -- Healthcare/Medical Data Representation and Analysis -- Simulation and Modelling in Healthcare -- Health and Medical Informatics Education.
    Abstract: This book is comprehensive with most of its contents following the recommendations of international health and medical informatics associations and societies. To this extent it covers the areas of healthcare and medical information systems, management of healthcare and medical information systems, healthcare/medical information systems supporting patients and the public, healthcare/medical networking and care sharing, medical imaging and 3D/4D surgical visualization, design and analysis of health/medical records, health/medical data representation and analysis, simulation and modeling in healthcare, and health and medical informatics education. The book provides an excellent professional development resource for educators and practitioners on the state-of-the-art Health and Medical Informatics. It covers many areas and topics of Health and Medical Informatics and contributes toward the enhancement of the community outreach and engagement component of Health and Medical Informatics. Various techniques, methods, and approaches adopted by Health and Medical Informatics experts in the field are introduced. Furthermore, it provides detailed explanation of the Health and Medical Informatics concepts that are aptly reinforced by applications and some practical examples and a road map of future trends that are suitable for innovative Health and Medical Informatics.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9783031337437
    Language: English
    Pages: 1 Online-Ressource(XVIII, 659 p. 211 illus., 178 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Lecture Notes in Networks and Systems 700
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Computational intelligence. ; Cooperating objects (Computer systems). ; Medical informatics. ; Engineering
    Abstract: Community Opinion Network Maximization for Mining Top K Seed Social Network Users -- Taxonomy for an Automated Sleep Stage Scoring -- Convolutional Neural Networks Based Classification of Mammograms -- Finding Insights in Florida Voter Participation -- HealthCare Text Analytics using Recent ML Techniques -- Emotion Recognition Techniques with IoT and Deep Learning Technologies -- Augmented Reality for Cognitive Impairment and Dementia -- Analysis on Malicious Intruder Threats to Data Integrity -- Smart Product Recommendation System -- Detection and Prediction of Epileptic Seizures Using Machine Learning Model. .
    Abstract: This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing. .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9783031441271
    Language: English
    Pages: 1 Online-Ressource(XV, 354 p. 149 illus., 124 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Studies in Computational Intelligence 1118
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Artificial intelligence. ; Engineering
    Abstract: Brain-Computer Interfaces: High-Tech Race to Merge Minds and Machines -- Using Artificial Neural Networks to Predict Critical Displacement and Stress Values in The Proximal Femur for Distinct Geometries and Load Cases -- An Integrated Model for Automated Identification and Learning of Conversational Gestures in Human-Robot Interaction -- Computational Intelligence Methods for User Matching -- ATIAS: A Model for Understanding Intentions to Use AI Technology -- Electronics Engineering Perspectives on Computer Vision Applications: An Overview of Techniques, Sub Areas, Advancements and Future Challenges -- Feature Importance Study for Biogas Production from POME Treatment Plants Using Out-Of-Bag Permutation -- Convolutional Neural Networks for Part Orientation in Additive Manufacturing -- SINATRA: A Music Genre Classifier based on Clustering and Graph Analysis -- Towards an Enhanced and Lightweight Face Authentication System -- Conceptual Intelligence, Digital Transformation, and Leadership Skills: Key Concepts for Modern Business Success -- GEMM-SAFIN (FRIE)++: Explainable Artificial Intelligence Visualization System with Episodic Memory -- Traffic Sign Recognition Robustness in Autonomous Vehicles Under Physical Adversarial Attacks -- CI in Smart Cities and Smart Energy Systems -- Ontology-based Similarity Estimates for Fuzzy Data: Semantic Wiki Approach.
    Abstract: The book delivers an excellent professional development resource for educators and practitioners on the cutting-edge computational intelligence techniques and applications. It covers many areas and topics of computational intelligence techniques and applications proposed by computational intelligence experts and researchers and furthers the enhancement of the community outreach and engagement component of computational intelligence techniques and applications. Furthermore, it presents a rich collection of manuscripts in highly regarded computational intelligence techniques and applications topics that have been creatively compiled. Computers are capable of learning from data and observations and providing solutions to real-life complex problems, following the same reasoning approach of human experts in various fields. This book endows a rich collection of applications in widespread areas. Among the areas addressed in this book are Computational Intelligence Principles and Techniques; CI in Manufacturing, Engineering, and Industry; CI in Recognition and Processing; CI in Robotics and Automation; CI in Communications and Networking; CI in Traditional Vehicles, Electric Vehicles, and Autonomous Vehicles; CI in Smart Cities and Smart Energy Systems; and CI in Finance, Business, Economics, and Education. These areas span many topics including repetitive manufacturing, discrete manufacturing, process manufacturing, electronic systems, speech recognition, pattern recognition, signal processing, image processing, industrial monitoring, vision systems for automation and robotics, cooperative and network robotics, perception, planning, control, urban traffic networks control, vehicle-to-roadside communications, smart buildings, smart urbanism, smart infrastructure, smart connected communities, smart energy, security, arts, and music.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781482257700
    Language: English
    Pages: 1 online resource (770 pages)
    Edition: 4th edition
    DDC: 681.4
    Keywords: Optical instruments Design and construction ; Mechanics, Applied ; Engineering ; Electronic books ; local ; Mécanique appliquée ; Mechanics, Applied ; Optical instruments ; Design and construction
    Abstract: Opto-Mechanical Systems Design, Fourth Edition is different in many ways from its three earlier editions: coauthor Daniel Vukobratovich has brought his broad expertise in materials, opto-mechanical design, analysis of optical instruments, large mirrors, and structures to bear throughout the book; Jan Nijenhuis has contributed a comprehensive new chapter on kinematics and applications of flexures; and several other experts in special aspects of opto-mechanics have contributed portions of other chapters. An expanded feature—a total of 110 worked-out design examples—has been added to several chapters to show how the theory, equations, and analytical methods can be applied by the reader. Finally, the extended text, new illustrations, new tables of data, and new references have warranted publication of this work in the form of two separate but closely entwined volumes. This first volume, Design and Analysis of Opto-Mechanical Assemblies , addresses topics pertaining primarily to optics smaller than 50 cm aperture. It summarizes the opto-mechanical design process, considers pertinent environmental influences, lists and updates key parameters for materials, illustrates numerous ways for mounting individual and multiple lenses, shows typical ways to design and mount windows and similar components, details designs for many types of prisms and techniques for mounting them, suggests designs and mounting techniques for small mirrors, explains the benefits of kinematic design and uses of flexures, describes how to analyze various types of opto-mechanical interfaces, demonstrates how the strength of glass can be determined and how to estimate stress generated in optics, and explains how changing temperature affects opto-mechanical assemblies.
    Note: Online resource; Title from title page (viewed March 19, 2015) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Engineering ; Electronic books ; local
    Abstract: Many areas of mining engineering gather and use statistical information, provided by observing the actual operation of equipment, their systems, the development of mining works, surface subsidence that accompanies underground mining, displacement of rocks surrounding surface pits and underground drives and longwalls, amongst others. In addition, the actual modern machines used in surface mining are equipped with diagnostic systems that automatically trace all important machine parameters and send this information to the main producer's computer. Such data not only provide information on the technical properties of the machine but they also have a statistical character. Furthermore, all information gathered during stand and lab investigations where parts, assemblies and whole devices are tested in order to prove their usefulness, have a stochastic character. All of these materials need to be developed statistically and, more importantly, based on these results mining engineers must make decisions whether to undertake actions, connected with the further operation of the machines, the further development of the works, etc. For these reasons, knowledge of modern statistics is necessary for mining engineers; not only as to how statistical analysis of data should be conducted and statistical synthesis should be done, but also as to understanding the results obtained and how to use them to make appropriate decisions in relation to the mining operation. This book on statistical analysis and synthesis starts with a short repetition of probability theory and also includes a special section on statistical prediction. The text is illustrated with many examples taken from mining practice; moreover the tables required to conduct statistical inference are included.
    Note: Online resource; Title from title page (viewed January 14, 2014) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Language: English
    Pages: 1 online resource (1308 pages)
    Edition: 3rd edition
    Keywords: Engineering ; Electronic books ; local
    Abstract: Building on the success of its 2006 predecessor, this 3rd edition of Open Pit Mine Planning and Design has been both updated and extended, ensuring that it remains the most complete and authoritative account of modern open pit mining available. Five new chapters on unit operations have been added, the revenues and costs chapter has been substantially revised and updated, and the references have been brought fully up to date. In addition, the pack now also includes a fully working version of the MicroMODEL mine planning software package. Volume 1 deals with the fundamental concepts involved in the planning and design of open pit mines. Subjects covered are mine planning, mining revenues and costs, orebody description, geometrical considerations, pit limits, production planning, mineral resources and ore reserves, responsible mining, rock blasting, rotary drilling, shovel loading, haulage trucks and machine availability and utilization. Volume 2 includes CSMine and MicroMODEL, user-friendly mine planning and design software packages developed specifically to illustrate the practical application of the involved principles. It also comprises the CSMine and MicroMODEL tutorials and user's manuals and eight orebody case examples, including drillhole data sets for performing a complete open pit mine evaluation. Open Pit Mine Planning and Design is an excellent textbook for courses in surface mine design, open pit design, geological and excavation engineering, and in advanced open pit mine planning and design. The principles described apply worldwide. In addition, the work can be used as a practical reference by professionals. The step-by-step approach to mine design and planning offers a fast-path approach to the material for both undergraduate and graduate students. The outstanding software guides the student through the planning and design steps, and the eight drillhole data sets allow the student to practice the described principles on different mining properties (three copper properties, three iron properties and two gold properties). The well-written text, the large number of illustrative examples and case studies, the included software, the review questions and exercises and the reference lists included at the end of each chapter provide the student with all the material needed to effectively learn the theory and application of open pit mine planning and design.
    Note: Online resource; Title from title page (viewed July 31, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (294 pages)
    Edition: 1st edition
    Keywords: Engineering ; Electronic books ; local
    Abstract: W. Edwards Deming’s central premise was that improvements in product quality would increase productivity, improve competitive position, and help ensure long-term survival. Point 12 of his landmark 14 Points for Management says that management’s job is to remove the barriers that keep people from taking pride in their work. That’s exactly what this book is about. Shedding new light on Deming’s 14 Points, Removing the Barriers to Efficient Manufacturing: Real-World Applications of Lean Productivity outlines time-tested organizational structures and methods to help you reduce variability and deliver high-quality products consistently. It describes the financial losses that can occur as a result of variability and details the specific activities management must engage in to avoid these losses and ensure long-term success. Instead of taking you on a "random walk," the book supplies each manufacturing group in your organization with straightforward directions for creating a smooth-running facility with reduced variability. It includes "work assignments" in each chapter that, if completed in the order presented, will guide you through the creation of the Model Vision for your manufacturing facility. It also: Covers key topics on working with people, including training and retraining Supplies pointers for working with unions Considers Single Minute Exchange of Die (SMED) Describes how to put it all together with action plans The book includes a write up on Deming’s famous Red Bead Experiment as well as an introduction to statistical process control techniques in the appendices. Filled with real-world examples and a case study to illustrate essential concepts, the book arms you with the insight and common-sense approaches required to build on Deming’s fundamental principles and consistently deliver high-quality products that instill a sense of pride in your workforce.
    Note: Online resource; Title from title page (viewed January 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781466597754 , 1466597755 , 9781466557970 , 1466557974 , 9781466597723 , 1466597720 , 9780429088216 , 0429088213
    Language: English
    Pages: 1 online resource (502 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: High resolution imaging ; Image reconstruction ; Interpolation ; Engineering ; Electronic books ; local ; Imagerie à haute résolution ; Reconstruction d'image ; Interpolation ; COMPUTERS ; Computer Graphics ; TECHNOLOGY & ENGINEERING ; Imaging Systems ; High resolution imaging ; Image reconstruction ; Interpolation
    Abstract: This book is devoted to the issue of image super-resolution-obtaining high-resolution images from single or multiple low-resolution images. Although there are numerous algorithms available for image interpolation and super-resolution, there's been a need for a book that establishes a common thread between the two processes. Filling this need, Image Super-Resolution and Applications presents image interpolation as a building block in the super-resolution reconstruction process. Instead of approaching image interpolation as either a polynomial-based problem or an inverse problem, this book breaks the mold and compares and contrasts the two approaches. It presents two directions for image super-resolution: super-resolution with a priori information and blind super-resolution reconstruction of images. It also devotes chapters to the two complementary steps used to obtain high-resolution images: image registration and image fusion. Details techniques for color image interpolation and interpolation for pattern recognition Analyzes image interpolation as an inverse problem Presents image registration methodologies Considers image fusion and its application in image super resolution Includes simulation experiments along with the required MATLAB® code Supplying complete coverage of image-super resolution and its applications, the book illustrates applications for image interpolation and super-resolution in medical and satellite image processing. It uses MATLAB® programs to present various techniques, including polynomial image interpolation and adaptive polynomial image interpolation. MATLAB codes for most of the simulation experiments supplied in the book are included in the appendix.
    Note: Online resource; Title from title page (viewed December 15, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (108 pages)
    Edition: 1st edition
    Keywords: Engineering ; Electronic books ; local
    Abstract: Self-Balancing is not just a tweak or change to assembly line balancing, but a completely transformed method for achieving continuous flow. Among the reasons you should try Self-Balancing is that you can expect a productivity improvement of at least 30 percent—with improvements of 50-60 percent quite common. Using a well-tested method for successful improvements initiated by the author, The Basics of Self-Balancing Processes: True Lean Continuous Flow is the first book to explain how to achieve continuous flow in both simple and complex manufacturing environments. It describes how to recognize and resolve weak links to ensure continuous flow in your manufacturing operations. The book offers rules, tools, and guidelines to help you not only solve problems at the root, but even eliminate them before they start. It reviews the shortcomings of traditional assembly line balancing and walks readers through the new paradigm of Self-Balancing. The text includes a comprehensive overview that demonstrates the power, flexibility, and breakthroughs possible with this method. Offering solutions to the shortcomings associated with standard line balancing—including inventory buffers, variation, and operator pace—it provides you with the tools and understanding required to deal with batch and off-line processes, debug your line, arrange your parts and tools, and design your own Self-Balanced cells. Watch Gordon Ghirann discuss how his book can increase the productivity of your business. http://www.youtube.com/watch?v=yte0622XbcI&feature=youtu.be
    Note: Online resource; Title from title page (viewed February 13, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley-IEEE Press
    ISBN: 9781118171172 , 1118171179 , 9780470915660
    Language: English
    Pages: 1 online resource (312 pages)
    Edition: 1st edition.
    DDC: 621.3815486
    Keywords: Engineering ; Engineering ; Electronic books
    Abstract: The latest frequency synthesis techniques, including sigma-delta, Diophantine, and all-digital Sigma-delta is a frequency synthesis technique that has risen in popularity over the past decade due to its intensely digital nature and its ability to promote miniaturization. A continuation of the popular Frequency Synthesis by Phase Lock, Second Edition, this timely resource provides a broad introduction to sigma-delta by pairing practical simulation results with cutting-edge research. Advanced Frequency Synthesis by Phase Lock discusses both sigma-delta and fractional-n-the still-in-use forerunner to sigma-delta-employing Simulink® models and detailed simulations of results to promote a deeper understanding. After a brief introduction, the book shows how spurs are produced at the synthesizer output by the basic process and different methods for overcoming them. It investigates how various defects in sigma-delta synthesis contribute to spurs or noise in the synthesized signal. Synthesizer configurations are analyzed, and it is revealed how to trade off the various noise sources by choosing loop parameters. Other sigma-delta synthesis architectures are then reviewed. The Simulink simulation models that provided data for the preceding discussions are described, providing guidance in making use of such models for further exploration. Next, another method for achieving wide loop bandwidth simultaneously with fine resolution-the Diophantine Frequency Synthesizer-is introduced. Operation at extreme bandwidths is also covered, further describing the analysis of synthesizers that push their bandwidths close to the sampling-frequency limit. Lastly, the book reviews a newly important technology that is poised to become widely used in high-production consumer electronics-all-digital frequency synthesis. Detailed appendices provide in-depth discussion on various stages of development, and many related resources are available for download, including Simulink models, MATLAB® scripts, spreadsheets, and executable programs. All these features make this authoritative reference ideal for electrical engineers who want to achieve an understanding of sigma-delta frequency synthesis and an awareness of the latest developments in the field.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (634 pages)
    Edition: 2nd edition
    Keywords: Engineering ; Electronic books ; local
    Abstract: Completely revised and updated, A First Course in Quality Engineering: Integrating Statistical and Management Methods of Quality, Second Edition contains virtually all the information an engineer needs to function as a quality engineer. The authors not only break things down very simply but also give a full understanding of why each topic covered is essential to learning proper quality management. They present the information in a manner that builds a strong foundation in quality management without overwhelming readers. See what’s new in the new edition: Reflects changes in the latest revision of the ISO 9000 Standards and the Baldrige Award criteria Includes new mini-projects and examples throughout Incorporates Lean methods for reducing cycle time, increasing throughput, and reducing waste Contains increased coverage of strategic planning This text covers management and statistical methods of quality engineering in an integrative manner, unlike other books on the subject that focus primarily on one of the two areas of quality. The authors illustrate the use of quality methods with examples drawn from their consulting work, using a reader-friendly style that makes the material approachable and encourages self-study. They cover the must-know fundamentals of probability and statistics and make extensive use of computer software to illustrate the use of the computer in solving quality problems. Reorganized to make the book suitable for self study, the second edition discusses how to design Total Quality System that works. With detailed coverage of the management and statistical tools needed to make the system perform well, the book provides a useful reference for professionals who need to implement quality systems in any environment and candidates preparing for the exams to qualify as a certified quality engineer (CQE).
    Note: Online resource; Title from title page (viewed August 29, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...