Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 22
- Computer networks 19
- History 18
- Architecture 16
- Computer science 16
- Engineering 12
- City planning 11
- Technological innovations 11
- Information storage and retrieval systems 10
- Social aspects 10
- Application software 9
- Data processing 9
- Information technology 9
- Architecture and society 8
- Computational intelligence 8
- Design 7
- Computer network architectures 6
- Computers 6
- Data mining 6
- Economic aspects 6
- Business 5
- Cloud computing 5
- Decision making 5
- Environmental aspects 5
- Information society 5
- Mathematical models 5
- Philosophy 5
- Political aspects 5
- Telecommunication 5
- Architecture, Modern 4
Search alternatives:
radical architectures » naval architecture (Expand Search)
capital architecture » naval architecture (Expand Search)
radical architectures » naval architecture (Expand Search)
capital architecture » naval architecture (Expand Search)
-
161
-
162
Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition Casad, Joe.
Published 2011Full text (Wentworth users only)
Electronic eBook -
163
Hypermedia in 15 Minutes Amundsen, Mike.
Published 2017Streaming video (Wentworth users only)
Electronic Video -
164
Thirty years of China's economic reform : institutions, management organizations and foreign investment / Yue Wang and Prem Ramburuth, editors.
Published 2010Table of Contents: “…Chapter 4 CONTEMPORARY ENTREPRENEURS IN SOUTH CHINA: A DISCUSSION OF THEIR INDIVIDUAL VALUES -- ABSTRACT -- INTRODUCTION -- Defining "Entrepreneur" in Contemporary China -- Regulatory Definition of Entrepreneur -- Incubators -- THEORETICAL FRAMEWORK: CROSS-CULTURAL VALUES THEORY -- Individual Value Dimensions -- Ten Individual Values -- CHINESE VALUES -- Cultivation of the Self as a Member of the Community -- Importance of Family -- Extending Relationships beyond the Family -- Correct Behaviour -- Importance of History -- Participation in Society -- Universalism -- Business and Confucianism -- Values of Entrepreneurs -- Hierarchical Order of Schwartz" Value Dimensions from Past Studies in China -- VALUE DIMENSIONS AND ENTREPRENEURSHIP -- METHOD -- ANALYSIS AND RESULTS -- CULTURE AREAS -- CROSS-REGIONAL DIFFERENCES -- CONCLUSIONS -- REFERENCES -- PART II: ORGANISATIONAL CHANGES AND INNOVATIONS -- Chapter 5 UNDERSTANDING BUSINESS GROUP GOVERNANCE IN CHINA -- ABSTRACT -- INTRODUCTION -- RESEARCH BACKGROUND -- CONCEPTUALIZATIONS OF BUSINESS GROUPS -- THE CASE STUDY FINDINGS -- CONCLUSION -- REFERENCES -- Chapter 6 WORKER MOTIVATION DURING CHANGING PERIODS: THE ROLE OF PSYCHOLOGICAL CAPITAL IN CHINA"S ECONOMIC REFORM -- ABSTRACT -- INTRODUCTION -- HISTORICAL COMPARISONS: A FOUR-STAGE CYCLE -- CHINESE WORKERS" MOTIVATION AND PSYCHOLOGICAL CAPITAL -- Empirical Studies on Work Motivation at the Early Stage of China"s Economic Reforms -- Chinese Cultural Architecture and its Impact on Workplace Behaviour -- Psychological capital of Chinese Workers -- LONG MARCH AHEAD: MULITFACETED FEATURES OF HUMAN RESOURCES MANAGEMENT IN CHINA -- Workers in Enterprises with Different Types of Ownership -- Workers in State-Owned Enterprises -- Workers in Private-Owned Enterprises -- Workers in Village-Township Enterprises -- Workers in Foreign-Owned Companies.…”
Full text (Wentworth users only)
Electronic eBook -
165
Applied Regional Growth and Innovation Models
Published 2013Table of Contents: “…; Appendix; References; Chapter 3: The Spatial-Institutional Architecture of Innovative Behaviour; 3.1 Conceptual Framework; 3.1.1 The Trajectories of Technological Development; 3.1.2 Networking, the Strategic Choices of Firms and the Spatial Impacts; 3.2 Measurement of Institutions ́ Innovative Behaviour at a Regional Scale; 3.2.1 Technological Regimes; 3.2.2 A Meso-Economic Model to Evaluate the Structures of Innovation; 3.3 Application of the Firms ́ Innovative Behaviour Model; 3.3.1 Database.…”
Full text (Wentworth users only)
Electronic eBook -
166
-
167
Advances in Dependability Engineering of Complex Systems Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017,...
Published 2018Table of Contents: “…1.Detection of network attacks using hybrid ARIMA-GARCH model- 2.Towards mixed-mode risk management – a concept; Andrzej Bialas and Barbara Flisiuk -- 3.Software support of the Common Criteria vulnerability assessment -- 4.On the performance of some C# constructions -- 5.Deep Stacking Convex Neuro-Fuzzy System and its On-line Learning -- 6.Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7.Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk -- 8.Modelling an Optimal Capital Structure of the Telecommunication Company -- 9.Specification of constraints in a System-of-Systems configuration; Dariusz Caban and Tomasz Walkowiak -- 10.A Methodological Framework for Model-based Self-Management of Services and Components in Dependable Cyber-Physical Systems -- 11.Maintenance of wind turbine scheduling based on output power data and wind forecast -- 12.Deadlock detection in distributed systems using the IMDS formalism and Petri nets.- -- 13.Scheduling tasks in embedded systems based on NoC architecture using Simulated Annealing -- 14.Adaptation of Ant Colony Algorithm for CAD of complex systems with higher degree of dependability -- 15.Context-Aware Anomaly Detection in Embedded Systems;Fatemeh Ehsani-Besheli and Hamid R. …”
Full text (Wentworth users only)
Electronic eBook -
168
Design and Construction of Smart Cities Toward Sustainable Community / edited by Ibrahim El Dimeery, Moustafa Baraka, Syed M. Ahmed, Amin Akhnoukh, Mona B. Anwar, Mahmoud El Khafif...
Published 2021Table of Contents: “…-- A Case Study of the Application of BIM in China: Tianjin Chow Tai Fook Financial Center -- Identification of Wastes in Construction Projects: Case Study of Porto Sokhna Island Project -- The Role of Geoinformatics in Renewable EnergyPotential Estimation for Smart Cities - Emphasis on Solar and Wind Energy -- Smart City Developments Using A Bim-Oriented Workflow -- States DoT Roads and Bridges Network Inspection and Maintenance Practices -- Bim And Gis Synergy For Smart Cities -- Tolerance Management, Failure, and Defects In Construction -- Application of Modified Invasive Weed Algorithm for Condition-based Budget Allocation of Water Distribution Networks -- GIS-BIM Data Integration Towards A Smart Campus -- Risk Management Methodology for Green Building Construction Projects Using Fuzzy-Based Multi-Criteria Decision-Making -- Development of Wind and Flood Vulnerability Index for Residential Buildings -- Smart Cities - Policy and Regulatory Frameworks -- Energy-Efficient Layered IoT Smart Home System -- Smart City- Role of PMC in Circular Economy -- Self - X Concrete Applications in Smart Cities -- Infrastructure Systems and Management in Smart Cities -- Hydraulic Reliability Assessment of Water Distribution Networks Using Minimum Cut Set Method -- Trenchless Pipeline Rehabilitation in Smart Cities -- Evolution of A Smart City From The Challenge Of Flood Disaster: Case Study of New Owerri Capital City, South East Of Nigeria -- Correlation of Non-Destructive with Mechanical Tests for Self-Compacting Concrete (SCC) -- Investigating Barriers to Implement and Develop Sustainable Construction -- Potential of straw block as an eco - construction material -- The role of Energy Modelling in The Development of Sustainable Construction Regulations for Al-Madinah City Central District -- The Impacts of Climate Zone, Wall Insulation, and Window Types on Building Energy Performance -- Re-Imagining the Architecture of the City in the Autonomous Vehicles Era -- Key Challenges of Smart Railway Station -- A Smart-Left Decision Support System for Flashing Yellow Arrow Traffic Signals -- Using Computational Social Science Techniques to Identify Coordinated Cyber Threats to Smart City Networks -- LoRa Wide Area Network Pragmatic Heterogeneous IoT Applications Deployment using Different Spreading Factors -- Autonomous Vehicle Prototype for Closed-Campuses -- Model-Driven Decision Support System for Broadband Penetration in Nigeria: Smart City Challenge -- Perturbation-Based Analysis of Thin-Walled Steel Tubes Buckling Under Compression: Numerical And Experimental Study -- Axial Behavior of Concrete Filled Pultrutded FRP Box -- Compressive Strength of Revibrated Concrete Using Smart Combination of Sawdust Ash From Selected Wood Species To Partially Replace Cement -- Costs and benefits data mapping of BIM laser scan integration: A Case Study in Australia.…”
Full text (Wentworth users only)
Electronic eBook -
169
-
170
Handbook of Key Global Financial Markets, Institutions, and Infrastructure.
Published 2012Full text (Wentworth users only)
Electronic eBook -
171
London underground : a cultural geography / David Ashford.
Published 2013Full text (Wentworth users only)
Electronic eBook -
172
Proceedings of the Third International Conference on Soft Computing for Problem Solving SocProS 2013, Volume 1 / edited by Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bans...
Published 2014Table of Contents: “…Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified Shuffled Frog Leaping Algorithm for Long-term Generation Maintenance Scheduling -- Key-based Steganographic Textual Secret Sharing for Confidential Messaging -- AnimVSS: Frame-based Visual Secret Sharing -- Searching Partially Bounded Regions with P Systems -- Power System Stability Enhancement using Fuzzy Logic-based Power System Stabilizer -- An Improved Quantum Inspired Firefly Algorithm with Interpolation Operator -- Discrete Wavelet Transform Based Fault Detection and Classification in a Static Synchronous Series Compensated Transmission System -- SVM and Random Forest Classification of Satellite Image with NDVI as an Additional Attribute to the Dataset -- Bi-Directional Pixel-value Differencing Approach for Steganography -- Unsupervised Classification of Mixed Data Type of Attributes using Genetic Algorithm (Numeric, Categorical, Ordinal, Binary, Ratio-Scaled) -- RoHeMaSys: Medical Revolution with Design and Development of Humanoid for Supporting Healthcare -- Synergy of Differential Evolution and Particle Swarm Optimization -- Energy Management Routing in Wireless Sensor Networks -- Axially Symmetric Vibrations of Circular Sandwich Plates of Linearly Varying Thickness -- Solve Shortest Paths Problem by using Artificial Bee Colony Algorithm -- Speed Control of Three Phase Induction Motor Drive using Soft computing Technique -- Edge Detection in Images using Modified Bit-planes Sobel Operator -- Application of Rule based Fuzzy Inference System in Predicting the Quality and Quantity of Potato Crop Yield in Agra† -- A Novel Variant of Self-Organizing Migrating Algorithm for Global Optimization -- User Ranking by Monitoring Eye Gaze using Eye Tracker -- Invalidating Security Compromised Nodes by Releasing its Energy in MANETs -- Administrating MANETs via Brain Computer Interface (BCI) -- Parameter Estimation and Soft Computing Techniques -- Development of a Genetic Algorithm Toolkit in LabVIEW -- A soft Calibration Technique for Thermistor using Support Vector Machine -- Discrete Cuckoo Search Optimization Algorithm for Combinatorial Optimization of Vehicle Route in Graph Based Road Network -- Introducing a Novel Parameter in Generation of Course Timetable with Genetic Algorithm -- Application of AI techniques in Implementing Shunt APF in Aircraft Supply System -- Differential Evolution for Supplier Selection Problem: A DEA-based Approach -- Social Engineering Prevention by detecting Malicious URLs using Artificial Bee Colony Algorithm -- New Lightweight Conditional Encryption Schemes for Multimedia -- Comparative Study of Controller Optimization Techniques for a Robotic Manipulator -- Hybridization of P systems and Particle Swarm Optimization for Function Optimization -- Image Security using Cellular Automata Rules -- Cuckoo Search Algorithm for the Selection of Optimal Scaling Factors in Image Watermarking -- Identifying and Prioritizing Human Capital Measurement Indicators for Personnel Selection using Fuzzy MADM -- Application of ANN to Predict Liquefaction Potential of Soil Deposits for Chandigarh Region, India -- Survey of Curve and Surface Reconstruction Algorithms from a Set of Unorganized Points -- Reconstruction of Noisy Bezier Curves using Artificial Neural Networks -- SBM-DEA Model based Efficiency Assessment of Public Sector Hospitals in Uttarakhand, India -- Recognizability of Triangular Picture Languages by Triangular Wang Automata -- Role of Information Technology in Financial Inclusion -- Harmony Search based Algorithm for Complete Information Equilibrium Infinite Game -- A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc Network -- Multi-carrier based Radar Signal Optimization using Genetic Algorithm -- Additive and Multiplicative Inverse of Generalized Fuzzy Numbers with Different Left Heights and Right Heights -- Cryptanalysis of "A New Method of Cryptography using Laplace Transform" -- A Design of Longitudinal Control of an Aircraft using a Fuzzy Logic Based PID Controller -- Evaluation of Content-based Spam Filtering using Data Mining Approach Applied on Text and Image Corpus -- Comparison of Lattice form based and Direct form based Complex Adaptive Notch Filter -- An Ensemble Pruning Approach based on Reinforcement Learning in Presence of Multi-class Imbalanced Data -- Fusion of Fingerprint and Iris Biometrics using Binary Ant Colony Optimization -- Efficient Resource Allocation Strategies for Video on Demand Services -- A Novel Co-Swarm Gravitational Search Algorithm for Constrained Optimization -- An Analytical Investigation on Thermally Induced Vibrations of Non-homogeneous Tapered Rectangular Plate -- Building of a Competent Mobility Model for Ad Hoc Wireless Networks -- Single Axis Position Control of a Precision Gimbal -- An Investigation of Fuzzy PSO and Fuzzy SVD based RBF Neural Network for Multi-Label Classification -- A Peer-to-Peer Single Objective Particle Swarm Optimizer -- F-FDRPSO: A Novel Approach based on Hybridization of Fuzzy C-Means and FDRPSO for Gene Clustering -- Metaheuristic Approaches for Multiprocessor Scheduling -- Fuzzy Slack based Measure (SBM) of Data Envelopment Analysis: A Possibility Approach -- Application of Ant Algorithm Variants to Single Track Railway Scheduling Problem -- An ICA Mixture Model Based Approach for Sub-Pixel Classification of Hyperspectral Data -- Network Connectivity in VANETs -- Proposal and Survey of various Data Mining Aspects in Mobile Computing Environment -- Ant Colony Optimization Model for Discrete Tomography Problems -- Object Recognition using Gabor Wavelet Features with Various Classification Techniques -- Cryptanalytic Attacks and Countermeasures on RSA -- Applications of Genetic Algorithms in Cryptology -- An Ontology and Pattern Clustering Approach for Activity Recognition in Smart Environments -- A Note on Constructing Fuzzy Homomorphism Map for a given Fuzzy Formal Context -- Application of ratio property in searching of M-ambiguous words and its Generalization -- Two Storage Inventory Model for Deteriorating Items under Fuzzy Environment -- Fuzzy Optimal Solution of Interval-valued Fuzzy Transportation Problems -- Comparative Study for Brain Tumor Classification on MR/CT Images -- Anonymous Remote user Authentication and Key Agreement for Cloud Computing -- Automatic Identification of an Epileptic Spike Pattern in an EEG Signals using ANN.…”
Full text (Wentworth users only)
Electronic eBook -
173
Data Science and Social Research Epistemology, Methods, Technology and Applications / edited by N. Carlo Lauro, Enrica Amaturo, Maria Gabriella Grassia, Biagio Aragona, Marina Mari...
Published 2017Table of Contents: “….- Part II Methods, Software and Data Architectures: A Knowledge-based Model for Clustering and Hierarchical Disjoint Non-negative Factor Analysis; Mario Fordellone, Maurizio Vichi.- TaLTaC 3.0. …”
Full text (Wentworth users only)
Electronic eBook -
174
Bluetooth Low Energy The Developer’s Handbook / Heydon, Robin.
Published 2012Full text (Wentworth users only)
Electronic eBook -
175
-
176
Advances in cross-cultural decision making / [edited by] Dylan Schmorrow, Denise Nicholson.
Published 2010Table of Contents: “…A multi-scale model of cultural distinctions in technology adoption; 26. An architecture for socio-cultural modeling; 27. Cultural network analysis: Method and application; 28. …”
Full text (Wentworth users only)
Electronic eBook -
177
Advances in cross-cultural decision making / [edited by] Dylan Schmorrow, Denise Nicholson.
Published 2010Table of Contents: “…A multi-scale model of cultural distinctions in technology adoption; 26. An architecture for socio-cultural modeling; 27. Cultural network analysis: Method and application; 28. …”
Full text (WIT users only)
Electronic eBook -
178
Handbook of Key Global Financial Markets, Institutions, and Infrastructure.
Published 2012Full text (Wentworth users only)
Electronic eBook -
179
Internet of Things (IoT) Fundamentals Barton, Jerome.
Published 2017Streaming video (Wentworth users only)
Electronic Video -
180
Hands-On Penetration Testing with Python : Enhance Your Ethical Hacking Skills to Build Automated and Intelligent Systems.
Published 2019Table of Contents: “…Demonic and non-demonic processesProcess joins, enumeration, and termination; Multiprocess pooling; Subprocesses; Socket programming basics; Reverse TCP shells with Python; Summary; Questions; Further reading; Chapter 05: Vulnerability Scanner Python -- Part 1; Introducing Nmap; Building a network scanner with Python; Controlling the Nmap output with the script; Using the Nmap module to conduct Nmap port scanning; Objective and architectural overview; Port scanning; Service scanning; A closer look at the code; Getting started; Executing the code…”
Full text (Wentworth users only)
Electronic eBook