Search alternatives:
radical architectures » naval architecture (Expand Search)
capital architecture » naval architecture (Expand Search)
Showing 161 - 180 results of 217 for search '((radical architectures) OR (capital architecture)) network', query time: 0.26s Refine Results
  1. 161
  2. 162

    Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition Casad, Joe. by Casad, Joe

    Published 2011
    Full text (Wentworth users only)
    Electronic eBook
  3. 163

    Hypermedia in 15 Minutes Amundsen, Mike. by Amundsen, Mike

    Published 2017
    Streaming video (Wentworth users only)
    Electronic Video
  4. 164

    Thirty years of China's economic reform : institutions, management organizations and foreign investment / Yue Wang and Prem Ramburuth, editors.

    Published 2010
    Table of Contents: “…Chapter 4 CONTEMPORARY ENTREPRENEURS IN SOUTH CHINA: A DISCUSSION OF THEIR INDIVIDUAL VALUES -- ABSTRACT -- INTRODUCTION -- Defining "Entrepreneur" in Contemporary China -- Regulatory Definition of Entrepreneur -- Incubators -- THEORETICAL FRAMEWORK: CROSS-CULTURAL VALUES THEORY -- Individual Value Dimensions -- Ten Individual Values -- CHINESE VALUES -- Cultivation of the Self as a Member of the Community -- Importance of Family -- Extending Relationships beyond the Family -- Correct Behaviour -- Importance of History -- Participation in Society -- Universalism -- Business and Confucianism -- Values of Entrepreneurs -- Hierarchical Order of Schwartz" Value Dimensions from Past Studies in China -- VALUE DIMENSIONS AND ENTREPRENEURSHIP -- METHOD -- ANALYSIS AND RESULTS -- CULTURE AREAS -- CROSS-REGIONAL DIFFERENCES -- CONCLUSIONS -- REFERENCES -- PART II: ORGANISATIONAL CHANGES AND INNOVATIONS -- Chapter 5 UNDERSTANDING BUSINESS GROUP GOVERNANCE IN CHINA -- ABSTRACT -- INTRODUCTION -- RESEARCH BACKGROUND -- CONCEPTUALIZATIONS OF BUSINESS GROUPS -- THE CASE STUDY FINDINGS -- CONCLUSION -- REFERENCES -- Chapter 6 WORKER MOTIVATION DURING CHANGING PERIODS: THE ROLE OF PSYCHOLOGICAL CAPITAL IN CHINA"S ECONOMIC REFORM -- ABSTRACT -- INTRODUCTION -- HISTORICAL COMPARISONS: A FOUR-STAGE CYCLE -- CHINESE WORKERS" MOTIVATION AND PSYCHOLOGICAL CAPITAL -- Empirical Studies on Work Motivation at the Early Stage of China"s Economic Reforms -- Chinese Cultural Architecture and its Impact on Workplace Behaviour -- Psychological capital of Chinese Workers -- LONG MARCH AHEAD: MULITFACETED FEATURES OF HUMAN RESOURCES MANAGEMENT IN CHINA -- Workers in Enterprises with Different Types of Ownership -- Workers in State-Owned Enterprises -- Workers in Private-Owned Enterprises -- Workers in Village-Township Enterprises -- Workers in Foreign-Owned Companies.…”
    Full text (Wentworth users only)
    Electronic eBook
  5. 165

    Applied Regional Growth and Innovation Models by Kourtit, Karima

    Published 2013
    Table of Contents: “…; Appendix; References; Chapter 3: The Spatial-Institutional Architecture of Innovative Behaviour; 3.1 Conceptual Framework; 3.1.1 The Trajectories of Technological Development; 3.1.2 Networking, the Strategic Choices of Firms and the Spatial Impacts; 3.2 Measurement of Institutions ́ Innovative Behaviour at a Regional Scale; 3.2.1 Technological Regimes; 3.2.2 A Meso-Economic Model to Evaluate the Structures of Innovation; 3.3 Application of the Firms ́ Innovative Behaviour Model; 3.3.1 Database.…”
    Full text (Wentworth users only)
    Electronic eBook
  6. 166
  7. 167

    Advances in Dependability Engineering of Complex Systems Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017,...

    Published 2018
    Table of Contents: “…1.Detection of network attacks using hybrid ARIMA-GARCH model- 2.Towards mixed-mode risk management – a concept; Andrzej Bialas and Barbara Flisiuk -- 3.Software support of the Common Criteria vulnerability assessment -- 4.On the performance of some C# constructions -- 5.Deep Stacking Convex Neuro-Fuzzy System and its On-line Learning -- 6.Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7.Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk -- 8.Modelling an Optimal Capital Structure of the Telecommunication Company -- 9.Specification of constraints in a System-of-Systems configuration; Dariusz Caban and Tomasz Walkowiak -- 10.A Methodological Framework for Model-based Self-Management of Services and Components in Dependable Cyber-Physical Systems -- 11.Maintenance of wind turbine scheduling based on output power data and wind forecast -- 12.Deadlock detection in distributed systems using the IMDS formalism and Petri nets.- -- 13.Scheduling tasks in embedded systems based on NoC architecture using Simulated Annealing -- 14.Adaptation of Ant Colony Algorithm for CAD of complex systems with higher degree of dependability -- 15.Context-Aware Anomaly Detection in Embedded Systems;Fatemeh Ehsani-Besheli and Hamid R. …”
    Full text (Wentworth users only)
    Electronic eBook
  8. 168

    Design and Construction of Smart Cities Toward Sustainable Community / edited by Ibrahim El Dimeery, Moustafa Baraka, Syed M. Ahmed, Amin Akhnoukh, Mona B. Anwar, Mahmoud El Khafif...

    Published 2021
    Table of Contents: “…-- A Case Study of the Application of BIM in China: Tianjin Chow Tai Fook Financial Center -- Identification of Wastes in Construction Projects: Case Study of Porto Sokhna Island Project -- The Role of Geoinformatics in Renewable EnergyPotential Estimation for Smart Cities - Emphasis on Solar and Wind Energy -- Smart City Developments Using A Bim-Oriented Workflow -- States DoT Roads and Bridges Network Inspection and Maintenance Practices -- Bim And Gis Synergy For Smart Cities -- Tolerance Management, Failure, and Defects In Construction -- Application of Modified Invasive Weed Algorithm for Condition-based Budget Allocation of Water Distribution Networks -- GIS-BIM Data Integration Towards A Smart Campus -- Risk Management Methodology for Green Building Construction Projects Using Fuzzy-Based Multi-Criteria Decision-Making -- Development of Wind and Flood Vulnerability Index for Residential Buildings -- Smart Cities - Policy and Regulatory Frameworks -- Energy-Efficient Layered IoT Smart Home System -- Smart City- Role of PMC in Circular Economy -- Self - X Concrete Applications in Smart Cities -- Infrastructure Systems and Management in Smart Cities -- Hydraulic Reliability Assessment of Water Distribution Networks Using Minimum Cut Set Method -- Trenchless Pipeline Rehabilitation in Smart Cities -- Evolution of A Smart City From The Challenge Of Flood Disaster: Case Study of New Owerri Capital City, South East Of Nigeria -- Correlation of Non-Destructive with Mechanical Tests for Self-Compacting Concrete (SCC) -- Investigating Barriers to Implement and Develop Sustainable Construction -- Potential of straw block as an eco - construction material -- The role of Energy Modelling in The Development of Sustainable Construction Regulations for Al-Madinah City Central District -- The Impacts of Climate Zone, Wall Insulation, and Window Types on Building Energy Performance -- Re-Imagining the Architecture of the City in the Autonomous Vehicles Era -- Key Challenges of Smart Railway Station -- A Smart-Left Decision Support System for Flashing Yellow Arrow Traffic Signals -- Using Computational Social Science Techniques to Identify Coordinated Cyber Threats to Smart City Networks -- LoRa Wide Area Network Pragmatic Heterogeneous IoT Applications Deployment using Different Spreading Factors -- Autonomous Vehicle Prototype for Closed-Campuses -- Model-Driven Decision Support System for Broadband Penetration in Nigeria: Smart City Challenge -- Perturbation-Based Analysis of Thin-Walled Steel Tubes Buckling Under Compression: Numerical And Experimental Study -- Axial Behavior of Concrete Filled Pultrutded FRP Box -- Compressive Strength of Revibrated Concrete Using Smart Combination of Sawdust Ash From Selected Wood Species To Partially Replace Cement -- Costs and benefits data mapping of BIM laser scan integration: A Case Study in Australia.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 169
  10. 170
  11. 171

    London underground : a cultural geography / David Ashford. by Ashford, David, Dr

    Published 2013
    Full text (Wentworth users only)
    Electronic eBook
  12. 172

    Proceedings of the Third International Conference on Soft Computing for Problem Solving SocProS 2013, Volume 1 / edited by Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bans... by Pant, Millie

    Published 2014
    Table of Contents: “…Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified Shuffled Frog Leaping Algorithm for Long-term Generation Maintenance Scheduling -- Key-based Steganographic Textual Secret Sharing for Confidential Messaging -- AnimVSS: Frame-based Visual Secret Sharing -- Searching Partially Bounded Regions with P Systems -- Power System Stability Enhancement using Fuzzy Logic-based Power System Stabilizer -- An Improved Quantum Inspired Firefly Algorithm with Interpolation Operator -- Discrete Wavelet Transform Based Fault Detection and Classification in a Static Synchronous Series Compensated Transmission System -- SVM and Random Forest Classification of Satellite Image with NDVI as an Additional Attribute to the Dataset -- Bi-Directional Pixel-value Differencing Approach for Steganography -- Unsupervised Classification of Mixed Data Type of Attributes using Genetic Algorithm (Numeric, Categorical, Ordinal, Binary, Ratio-Scaled) -- RoHeMaSys: Medical Revolution with Design and Development of Humanoid for Supporting Healthcare -- Synergy of Differential Evolution and Particle Swarm Optimization -- Energy Management Routing in Wireless Sensor Networks -- Axially Symmetric Vibrations of Circular Sandwich Plates of Linearly Varying Thickness -- Solve Shortest Paths Problem by using Artificial Bee Colony Algorithm -- Speed Control of Three Phase Induction Motor Drive using Soft computing Technique -- Edge Detection in Images using Modified Bit-planes Sobel Operator -- Application of Rule based Fuzzy Inference System in Predicting the Quality and Quantity of Potato Crop Yield in Agra† -- A Novel Variant of Self-Organizing Migrating Algorithm for Global Optimization -- User Ranking by Monitoring Eye Gaze using Eye Tracker -- Invalidating Security Compromised Nodes by Releasing its Energy in MANETs -- Administrating MANETs via Brain Computer Interface (BCI) -- Parameter Estimation and Soft Computing Techniques -- Development of a Genetic Algorithm Toolkit in LabVIEW -- A soft Calibration Technique for Thermistor using Support Vector Machine -- Discrete Cuckoo Search Optimization Algorithm for Combinatorial Optimization of Vehicle Route in Graph Based Road Network -- Introducing a Novel Parameter in Generation of Course Timetable with Genetic Algorithm -- Application of AI techniques in Implementing Shunt APF in Aircraft Supply System -- Differential Evolution for Supplier Selection Problem: A DEA-based Approach -- Social Engineering Prevention by detecting Malicious URLs using Artificial Bee Colony Algorithm -- New Lightweight Conditional Encryption Schemes for Multimedia -- Comparative Study of Controller Optimization Techniques for a Robotic Manipulator -- Hybridization of P systems and Particle Swarm Optimization for Function Optimization -- Image Security using Cellular Automata Rules -- Cuckoo Search Algorithm for the Selection of Optimal Scaling Factors in Image Watermarking -- Identifying and Prioritizing Human Capital Measurement Indicators for Personnel Selection using Fuzzy MADM -- Application of ANN to Predict Liquefaction Potential of Soil Deposits for Chandigarh Region, India -- Survey of Curve and Surface Reconstruction Algorithms from a Set of Unorganized Points -- Reconstruction of Noisy Bezier Curves using Artificial Neural Networks -- SBM-DEA Model based Efficiency Assessment of Public Sector Hospitals in Uttarakhand, India -- Recognizability of Triangular Picture Languages by Triangular Wang Automata -- Role of Information Technology in Financial Inclusion -- Harmony Search based Algorithm for Complete Information Equilibrium Infinite Game -- A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc Network -- Multi-carrier based Radar Signal Optimization using Genetic Algorithm -- Additive and Multiplicative Inverse of Generalized Fuzzy Numbers with Different Left Heights and Right Heights -- Cryptanalysis of "A New Method of Cryptography using Laplace Transform" -- A Design of Longitudinal Control of an Aircraft using a Fuzzy Logic Based PID Controller -- Evaluation of Content-based Spam Filtering using Data Mining Approach Applied on Text and Image Corpus -- Comparison of Lattice form based and Direct form based Complex Adaptive Notch Filter -- An Ensemble Pruning Approach based on Reinforcement Learning in Presence of Multi-class Imbalanced Data -- Fusion of Fingerprint and Iris Biometrics using Binary Ant Colony Optimization -- Efficient Resource Allocation Strategies for Video on Demand Services -- A Novel Co-Swarm Gravitational Search Algorithm for Constrained Optimization -- An Analytical Investigation on Thermally Induced Vibrations of Non-homogeneous Tapered Rectangular Plate -- Building of a Competent Mobility Model for Ad Hoc Wireless Networks -- Single Axis Position Control of a Precision Gimbal -- An Investigation of Fuzzy PSO and Fuzzy SVD based RBF Neural Network for Multi-Label Classification -- A Peer-to-Peer Single Objective Particle Swarm Optimizer -- F-FDRPSO: A Novel Approach based on Hybridization of Fuzzy C-Means and FDRPSO for Gene Clustering -- Metaheuristic Approaches for Multiprocessor Scheduling -- Fuzzy Slack based Measure (SBM) of Data Envelopment Analysis: A Possibility Approach -- Application of Ant Algorithm Variants to Single Track Railway Scheduling Problem -- An ICA Mixture Model Based Approach for Sub-Pixel Classification of Hyperspectral Data -- Network Connectivity in VANETs -- Proposal and Survey of various Data Mining Aspects in Mobile Computing Environment -- Ant Colony Optimization Model for Discrete Tomography Problems -- Object Recognition using Gabor Wavelet Features with Various Classification Techniques -- Cryptanalytic Attacks and Countermeasures on RSA -- Applications of Genetic Algorithms in Cryptology -- An Ontology and Pattern Clustering Approach for Activity Recognition in Smart Environments -- A Note on Constructing Fuzzy Homomorphism Map for a given Fuzzy Formal Context -- Application of ratio property in searching of M-ambiguous words and its Generalization -- Two Storage Inventory Model for Deteriorating Items under Fuzzy Environment -- Fuzzy Optimal Solution of Interval-valued Fuzzy Transportation Problems -- Comparative Study for Brain Tumor Classification on MR/CT Images -- Anonymous Remote user Authentication and Key Agreement for Cloud Computing -- Automatic Identification of an Epileptic Spike Pattern in an EEG Signals using ANN.…”
    Full text (Wentworth users only)
    Electronic eBook
  13. 173

    Data Science and Social Research Epistemology, Methods, Technology and Applications / edited by N. Carlo Lauro, Enrica Amaturo, Maria Gabriella Grassia, Biagio Aragona, Marina Mari...

    Published 2017
    Table of Contents: “….- Part II Methods, Software and Data Architectures: A Knowledge-based Model for Clustering and Hierarchical Disjoint Non-negative Factor Analysis; Mario Fordellone, Maurizio Vichi.- TaLTaC 3.0. …”
    Full text (Wentworth users only)
    Electronic eBook
  14. 174

    Bluetooth Low Energy The Developer’s Handbook / Heydon, Robin. by Heydon, Robin

    Published 2012
    Full text (Wentworth users only)
    Electronic eBook
  15. 175
  16. 176

    Advances in cross-cultural decision making / [edited by] Dylan Schmorrow, Denise Nicholson.

    Published 2010
    Table of Contents: “…A multi-scale model of cultural distinctions in technology adoption; 26. An architecture for socio-cultural modeling; 27. Cultural network analysis: Method and application; 28. …”
    Full text (Wentworth users only)
    Electronic eBook
  17. 177

    Advances in cross-cultural decision making / [edited by] Dylan Schmorrow, Denise Nicholson.

    Published 2010
    Table of Contents: “…A multi-scale model of cultural distinctions in technology adoption; 26. An architecture for socio-cultural modeling; 27. Cultural network analysis: Method and application; 28. …”
    Full text (WIT users only)
    Electronic eBook
  18. 178
  19. 179

    Internet of Things (IoT) Fundamentals Barton, Jerome. by Barton, Jerome

    Published 2017
    Streaming video (Wentworth users only)
    Electronic Video
  20. 180

    Hands-On Penetration Testing with Python : Enhance Your Ethical Hacking Skills to Build Automated and Intelligent Systems. by Khan, Furqan

    Published 2019
    Table of Contents: “…Demonic and non-demonic processesProcess joins, enumeration, and termination; Multiprocess pooling; Subprocesses; Socket programming basics; Reverse TCP shells with Python; Summary; Questions; Further reading; Chapter 05: Vulnerability Scanner Python -- Part 1; Introducing Nmap; Building a network scanner with Python; Controlling the Nmap output with the script; Using the Nmap module to conduct Nmap port scanning; Objective and architectural overview; Port scanning; Service scanning; A closer look at the code; Getting started; Executing the code…”
    Full text (Wentworth users only)
    Electronic eBook