Showing 201 - 220 results of 235 for search '((((radical (architectures OR architectural)) OR (capital architecture))) OR (naval architecture)) (network OR networks )', query time: 0.29s Refine Results
  1. 201
  2. 202

    Data Science and Social Research Epistemology, Methods, Technology and Applications / edited by N. Carlo Lauro, Enrica Amaturo, Maria Gabriella Grassia, Biagio Aragona, Marina Mari...

    Published 2017
    Table of Contents: “….- Part II Methods, Software and Data Architectures: A Knowledge-based Model for Clustering and Hierarchical Disjoint Non-negative Factor Analysis; Mario Fordellone, Maurizio Vichi.- TaLTaC 3.0. …”
    Full text (Wentworth users only)
    Electronic eBook
  3. 203

    Disrupted cities : when infrastructure fails / edited by Stephen Graham.

    Published 2010
    Book
  4. 204

    Thirty years of China's economic reform : institutions, management organizations and foreign investment / Yue Wang and Prem Ramburuth, editors.

    Published 2010
    Table of Contents: “…Chapter 4 CONTEMPORARY ENTREPRENEURS IN SOUTH CHINA: A DISCUSSION OF THEIR INDIVIDUAL VALUES -- ABSTRACT -- INTRODUCTION -- Defining "Entrepreneur" in Contemporary China -- Regulatory Definition of Entrepreneur -- Incubators -- THEORETICAL FRAMEWORK: CROSS-CULTURAL VALUES THEORY -- Individual Value Dimensions -- Ten Individual Values -- CHINESE VALUES -- Cultivation of the Self as a Member of the Community -- Importance of Family -- Extending Relationships beyond the Family -- Correct Behaviour -- Importance of History -- Participation in Society -- Universalism -- Business and Confucianism -- Values of Entrepreneurs -- Hierarchical Order of Schwartz" Value Dimensions from Past Studies in China -- VALUE DIMENSIONS AND ENTREPRENEURSHIP -- METHOD -- ANALYSIS AND RESULTS -- CULTURE AREAS -- CROSS-REGIONAL DIFFERENCES -- CONCLUSIONS -- REFERENCES -- PART II: ORGANISATIONAL CHANGES AND INNOVATIONS -- Chapter 5 UNDERSTANDING BUSINESS GROUP GOVERNANCE IN CHINA -- ABSTRACT -- INTRODUCTION -- RESEARCH BACKGROUND -- CONCEPTUALIZATIONS OF BUSINESS GROUPS -- THE CASE STUDY FINDINGS -- CONCLUSION -- REFERENCES -- Chapter 6 WORKER MOTIVATION DURING CHANGING PERIODS: THE ROLE OF PSYCHOLOGICAL CAPITAL IN CHINA"S ECONOMIC REFORM -- ABSTRACT -- INTRODUCTION -- HISTORICAL COMPARISONS: A FOUR-STAGE CYCLE -- CHINESE WORKERS" MOTIVATION AND PSYCHOLOGICAL CAPITAL -- Empirical Studies on Work Motivation at the Early Stage of China"s Economic Reforms -- Chinese Cultural Architecture and its Impact on Workplace Behaviour -- Psychological capital of Chinese Workers -- LONG MARCH AHEAD: MULITFACETED FEATURES OF HUMAN RESOURCES MANAGEMENT IN CHINA -- Workers in Enterprises with Different Types of Ownership -- Workers in State-Owned Enterprises -- Workers in Private-Owned Enterprises -- Workers in Village-Township Enterprises -- Workers in Foreign-Owned Companies.…”
    Full text (Wentworth users only)
    Electronic eBook
  5. 205

    Asian cities : colonial to global / edited by Gregory Bracken.

    Published 2015
    Table of Contents: “…These aerial photographs show Ramna as a forest or park at the centre in sharp contrast to the dense urban morphology -- Figure 10.3 Open spaces in the capital. Ramna (number 10) is a vast open public space located at the heart of the capital -- Figure 10.4 Dhaka City Map, 1859 -- Figure 10.5 Map of the new Civil Station of Dhaka (1905) -- Figure 10.6 Neoclassical Dhaka College (left) and Indo-Saracenic Curzon Hall (right) -- Figure 10.7 The wave of new construction around Ramna -- Figure 10.8 Constantine Doxiadis's 1963 plan for the Teachers' Students' Centre (TSC), Ramna -- Figure 10.9 Ramna in 1952 (left) and 1960 (right) -- Figure 10.10 Pseudo-Islamic versus modern architecture in Ramna -- Figure 10.11 The gradual transformation of Ramna racecourse from a maidan (open space) to a children's park and the city's recreational Park Suhrawardy Uddyan (left) -- figure-ground plan of Ramna (right) -- Figure 10.12 The Design interventions of Liberation War Museum at the historical Ramna racecourse (present Suhrawardy Uddyan) -- Figure 10.13 Ramna holds a delicate balance between institutions, representative buildings, and monuments at the centre of the city -- Figure 11.1 New Songdo's high-rise towers, including the First World Complex, with real estate advertisements lining the streets -- Figure 11.2 IFEZ advertisements ('Developing the City at the Heart of South Korea's Leading Service Industries', right-hand poster translation) -- Figure 11.3 Compact Smart City Exhibit Building -- Figure 11.4 Model of New Songdo -- Figure 11.5 Show-model apartment in New Songdo's POSCO (The Sharp at Greenworks) -- Figure 11.6 New Songdo's border area -- Figure 11.7 Ja-ap Village near New Songdo being demolished -- Figure 12.1 Clarke Quay shophouses and the tourist boats -- Figure 12.2 Museum Fatahillah in Kota Tua (Old Town), Jakarta.…”
    Full text (Wentworth users only)
    Electronic eBook
  6. 206

    A CALCULUS OF IDEAS : a MATHEMATICAL STUDY OF HUMAN THOUGHT. by Grenander, Ulf

    Published 2012
    Full text (Wentworth users only)
    Electronic eBook
  7. 207

    Debates in the digital humanities 2016 / Matthew K. Gold and Lauren F. Klein, editors.

    Published 2016
    Table of Contents: “…The Emergence of the Digital Humanities (as the Network is Everting) / Steven E. Jones -- The "Whole Game": Digital Humanities at Community Colleges / Anne B. …”
    Full text (Wentworth users only)
    Electronic eBook
  8. 208
  9. 209

    Hands-On Penetration Testing with Python : Enhance Your Ethical Hacking Skills to Build Automated and Intelligent Systems. by Khan, Furqan

    Published 2019
    Table of Contents: “…Demonic and non-demonic processesProcess joins, enumeration, and termination; Multiprocess pooling; Subprocesses; Socket programming basics; Reverse TCP shells with Python; Summary; Questions; Further reading; Chapter 05: Vulnerability Scanner Python -- Part 1; Introducing Nmap; Building a network scanner with Python; Controlling the Nmap output with the script; Using the Nmap module to conduct Nmap port scanning; Objective and architectural overview; Port scanning; Service scanning; A closer look at the code; Getting started; Executing the code…”
    Full text (Wentworth users only)
    Electronic eBook
  10. 210

    Hands-On Penetration Testing with Python : Enhance Your Ethical Hacking Skills to Build Automated and Intelligent Systems. by Khan, Furqan

    Published 2019
    Table of Contents: “…Demonic and non-demonic processesProcess joins, enumeration, and termination; Multiprocess pooling; Subprocesses; Socket programming basics; Reverse TCP shells with Python; Summary; Questions; Further reading; Chapter 05: Vulnerability Scanner Python -- Part 1; Introducing Nmap; Building a network scanner with Python; Controlling the Nmap output with the script; Using the Nmap module to conduct Nmap port scanning; Objective and architectural overview; Port scanning; Service scanning; A closer look at the code; Getting started; Executing the code…”
    Full text (Wentworth users only)
    Electronic eBook
  11. 211

    MODERN TECHNOLOGIES AND TOOLS SUPPORTING THE DEVELOPMENT OF INDUSTRY 5.0

    Published 2024
    Full text (Wentworth users only)
    Electronic eBook
  12. 212

    Buddhist Landscapes in Central India : Sanchi Hill and Archaeologies of Religious and Social Change, C. Third Century BC to Fifth Century AD.

    Published 2013
    Table of Contents: “…Religious History and Religious Change in the Sanchi AreaIntroduction; Buddhism in the Sanchi area: building phases andpatronage networks; Brahmanical traditions; Pan-Indian religions and 'local' cults: models ofreligious change; Conclusion; 7. …”
    Full text (Wentworth users only)
    Electronic eBook
  13. 213
  14. 214

    Hypermedia in 15 Minutes Amundsen, Mike. by Amundsen, Mike

    Published 2017
    Streaming video (Wentworth users only)
    Electronic Video
  15. 215

    Advances in Informatics and Computing in Civil and Construction Engineering Proceedings of the 35th CIB W78 2018 Conference: IT in Design, Construction, and Management / edited by...

    Published 2019
    Table of Contents: “…Cyber-Physical-Systems -- Comparison Between Current Methods of Indoor Network Analysis for Emergency Response Through BIM-GIS Integration -- Instrumentation and Data Collection Methodology to Enhance Productivity in Construction Sites Using Embedded Systems and IoT Technologies -- A cyber-physical middleware platform for buildings in smart cities -- A Framework for CPS-based Real-time Mobile Crane Operations -- Drive towards real-time reasoning of building performance: Development of a live, cloud-based system -- Bayesian Network Modeling of Airport Runway Incursion Occurring Processes for Predictive Accident Control -- A Low Cost System For Monitoring Tower Crane Productivity Cycles Combining Inertial Measurement Units, Load Cells and Lora Networks -- The interface of a BIM-IoT prototype for Energy Consumption Monitoring -- Predicting Energy Consumption of Office Buildings: A Hybrid Machine Learning-Based Approach -- Part 6. …”
    Full text (Wentworth users only)
    Electronic eBook
  16. 216

    Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference. by Arena, Paolo, Fortuna, Luigi

    Published 2006
    Table of Contents: “…An immune symmetrical network-based service model in peer-to-peer network environment / X. …”
    Full text (Wentworth users only)
    Electronic eBook
  17. 217

    Modeling Economic Growth in Contemporary Malaysia

    Published 2021
    Table of Contents: “…Common Issues and Challenges of SMEs in Malaysia -- 5.1 Capital and Financing Issues -- 5.2 Financial Management Problems -- 5.3 Rising Cost of Running Business -- 5.4 Limited Market -- 5.5 Obstacles Obtaining Raw Material -- 5.6 Unskilled Labor -- 5.7 Reluctant to Attend Training -- 5.8 Lack of Facilities and Infrastructure -- 5.9 Low Networking with Large Firms -- 5.10 Limitations on Implementation of ICT or Digitalization -- 5.11 Other Issues and Challenges -- 6. …”
    Full text (Wentworth users only)
    Electronic eBook
  18. 218

    Encyclopedia of computer science and technology / Harry Henderson. by Henderson, Harry, 1951-

    Table of Contents: “…Nanotechnology -- Natural language processing -- Near field communication (NFC) -- Negroponte, Nicholas -- Net neutrality -- Etiquette in the digital world -- Netnews and newsgroups -- Network (computer science) -- Networked storage -- Neumann, John von -- Neural interfaces -- Neural network -- Nonprocedural languages -- Numeric data -- Object-oriented programming (OOP) -- Office automation -- Office suites (software) -- Omidyar, Pierre -- Online advertising -- Online auctions -- Online chat -- Online frauds and scams -- Online gambling -- Online games -- Online investing -- Online job searching and recruiting -- Online music and video distribution -- Online reputation -- Online research -- Online services -- Ontologies and data models -- Open-source movement -- Operating system (OS) -- Operators and expressions -- Optical character recognition (OCR) -- Optical computing -- Oracle Corporation -- OS X -- Package manager (software) -- Page, Larry -- Papert, Seymour -- Parallel port -- Parsing -- Pascal -- Pattern recognition -- Penetration testing -- Perl -- Personal computer (PC) -- Personal digital assistant (PDA) -- Personal health information management -- Personal information manager (PIM) -- Philosophical and spiritual aspects of computing -- Phishing and spoofing -- PHP -- PL/I -- Plug and play -- Plug-in -- Podcasting -- Pointers and indirection -- Political activism and the Internet -- Popular culture and computing -- Portable document format (PDF) -- Posthumanism and Transhumanism -- PostScript -- Power grid and computing -- Power management -- Powered exoskeleton -- PowerShell (Microsoft) -- Predictive analytics -- Presentation software -- Printers -- Privacy in the digital age -- Privacy policy -- Procedures and functions -- Program library -- Programming as a profession -- Programming environment -- Programming languages -- Project management software -- Prolog -- Pseudocode -- Psychology of computing -- Punched cards and paper tape -- Python -- Quantum computing -- Queue -- R (Programming Language) -- Radio frequency identification (RFID) -- Random number generation -- Raspberry Pi -- Raymond, Eric -- Real-time processing -- Recursion -- Reduced instruction set computer (RISC) -- Redundant array of inexpensive disks (RAID) -- Regular expression -- Representational state transfer (REST) -- Research laboratories in computing -- Reverse engineering -- Rheingold, Howard -- Rich Text Format (RTF) -- Risks of computing -- Ritchie, Dennis -- Robotics -- RPG -- RSS -- Ruby -- Rust (programming language) -- Sandbox -- SAP -- Satellite Internet service -- Scala (programming language) -- Scanner -- Scheduling and prioritization in computing -- Science fiction and computing -- Scientific computing applications -- Scripting languages -- Search engine -- Semantic web -- Senior citizens and computing -- Serial port -- Service-oriented architecture (SOA) -- Shannon, Claude E. -- Shareware and freeware -- Sharing economy -- Shell (computer science) -- Simonyi, Charles -- Simula -- Simulation -- Smalltalk -- Smart buildings and homes -- Smart card -- Smart TV -- Smart watch -- Smartphone -- Snowden, Edward -- SOAP -- Social graph -- Social impact of computing -- Social networking -- Social network games -- Social robots -- Social sciences and computing -- Software agent -- Software engineering -- Software piracy and counterfeiting -- Software quality assurance -- Solid state drive -- Sony -- Sorting and searching -- Sound file formats -- Space exploration and computers -- Spafford, Eugene H. -- Spam -- Speech recognition and synthesis -- Spreadsheet -- Spyware and adware -- Stack -- Stallman, Richard -- Standards in computing -- Statistics and computing -- Stoll, Clifford -- Streaming (computer science) -- Stroustrup, Bjarne -- Structured programming -- Structured query language (SQL) -- Sun Microsystems -- Supercomputer -- Supply chain management -- Surveillance capitalism -- Surveillance technologies -- Sutherland, Ivan Edward -- Swartz, Aaron -- Swift (programming language) -- System administrator -- Systems analyst -- Systems programming…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 219
  20. 220

    Leading the Web in Concurrent Engineering : Next Generation Concurrent Engineering / edited by Parisa Ghodous, Rose Dieng-Kuntz, and Geilson Loureiro.

    Published 2006
    Table of Contents: “…Cover -- Preface -- Organization -- Sponsors -- Contents -- Keynotes and Invited Papers -- The Ubiquitous Web -- Concurrent Engineering -- Past, Present and Future -- Product Life Cycle Management: A Solution to Manage Innovation for Manufacturing Companies -- Towards Systems Integration Technology -- Collaborative Product Development: EADS Pilot Based on ATHENA Results -- Wavelets to Enhance Computational Intelligence in Computer-Aided Engineering -- Visual Reasoning, an Underlying Cognitive Element of Design Creativity, and Its Intelligent Tutoring System -- Supporting System for Design and Production with Sharing and Access of Product Failure -- Service-Driven Web Manufacturing: A Roadmap from Methodology to Applications -- Workshop 1: Web Services in CE -- A Formal Model for Web Service Composition -- An Automaton-Based Approach for Web Service Mediation -- Workshop 2: Interoperability in CE -- Towards an Ontology-Enabled Approach Helping SMEs to Access the Single European Electronic Market -- Enabling Adoption of STEP Standards Through the Use of Popular Technologies -- Interoperability Issues in CONNIE: Creating a Network of Decentralised Portals -- Collaborative, Mobile and Multimodal Working Environment -- Autonomic Workflow Management in Agent-Based Structural Health Monitoring Systems Using Graph Theory -- Developing a Decision-Making Framework for Effective Collaborative Working -- An Assured Environment for Collaborative Engineering Using Web Services -- A New Collaborative Working Environment for Concurrent Engineering in Manufacturing Industry -- A Distributed Architecture for Collaborative Design -- WiPam -- Wireless Patient Management, a Novel Telemedicine Solution -- Supporting Interactive and Collaborative Product Configuration for Internet Commerce -- Towards PLM Based Digital Mock-Up Exchange in Collaborative Product Development -- Conflict Management in Design Process: Focus on Changes Impact -- Towards Agent-Based Collaborative Design -- Semantic Enterprise, Semantic Web and Ontologies in CE -- Ontology-Based Mediation System -- LCA and LCC Data Semantics Sharing Across Product Lifecycle Processes -- Managing Concurrent Engineering Design Processes and Associated Knowledge -- e-Collaboration Platform for Metal Forming Enterprises Based on the Semantic Web Technologies -- Combining Ontology Engineering with HTN Planning -- The Semantic Web for Improving Dynamic Tourist Packages Commercialisation -- Improving Mappings Discovery for Semantic Interoperability -- A Mapping from Pi-Calculus into BPEL -- Using Context to Improve Semantic Interoperability -- An Ontology-Based Approach for "Procedural CAD Models" Data Exchange -- Knowledge in CE -- Knowledge Acquisition for Generative Model Construction -- A Knowledge-Driven Data Warehouse Model for Analysis Evolution -- An Approach for Building Project Memories to Facilitate Design Process in a Concurrent Engineering Context -- Decomposition-Based Reasoning for Large Knowledge Bases in Description Logics -- Knowledge and Object Phylogenetic Production Cascades -- The TELOS Case -- Knowledge Management to Support Lean Product Development -- Capitalization of Knowledge from Projects -- Considerations of KMS Implementation in Concurrent Engineering -- Economic Per.…”
    Full text (Wentworth users only)
    Electronic Conference Proceeding eBook