Vi bøger
Levering: 1 - 2 hverdage

Informationsteknologi: generelle emner

Her finder du spændende bøger om Informationsteknologi: generelle emner. Nedenfor er et flot udvalg af over 3.594 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Frances Haugen
    165,95 kr.

  • af Johannes Ernesti
    612,95 kr.

    Ready to master Python? Learn to write effective code, whether you're a beginner or a professional programmer. Review core Python concepts, including functions, modularization, and object orientation and walk through the available data types. Then dive into more advanced topics, such as using Django and working with GUIs. With plenty of code examples throughout, this hands-on reference guide has everything you need to become proficient in Python!Highlights include:1) Functions2) Methods3) Attributes4) Data types5) GUIs6) Debugging7) Network communication8) Modularization9) Object orientation10) Iterators11) Generators12) Exception handling

  • af Scott La Counte
    227,95 kr.

    Capture your next adventureThe GoPro Hero is arguably the best action camera that money can buy. If you have dreams of recording your journeys, action shots, or more, then you will be dazzled by the quality of video that it produces. On paper, the spec sheet looks impressive. In practice, there's a lot to learn to get the most out of those features.This book will walk you through all the features that you need to know and get you on your way to a cinematic adventure! It is based on the Hero10, but if you have a Hero9 or Hero8, most of the features will still apply.It covers: - Recording Videos and Photos- Gestures- Power Tools- Protune- Looping- HiLight- Transferring Media- Custom Presets- Mounting- Software- Mods- And MoreThis book is not endorsed by GoPro, Inc. and should be considered unofficial.

  • af Stanley Lieber
    232,95 kr.

    9front is a fork of the Plan 9 from Bell Labs operating system. This publication is a print edition of the 9front Dash 1 manual. It is very likely outdated.

  • af Ashish Agrawal
    377,95 kr.

    Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level.Focus on the expertise measured by these objectives:Design identity, governance, and monitoring solutionsDesign data storage solutionsDesign business continuity solutionsDesign infrastructure solutionsThis Microsoft Exam Ref:Organizes its coverage by exam objectivesFeatures strategic, what-if scenarios to challenge youAssumes you have advanced experience and knowledge of IT operations, as well as experience in Azure administration, Azure development, and DevOps processesAbout the ExamExam AZ-305 focuses on knowledge needed to design logging, monitoring, authentication, and authorization solutions; design governance, identities, and application access; design relational and non-relational data storage solutions; design data integration; recommend data storage solutions; design backup and disaster recovery solutions; design for high availability; design compute and network solutions, application architecture, and migration.About Microsoft CertificationIf you hold Microsoft Certified: Azure Administrator Associate certification, passing this exam fulfills your requirements for the Microsoft Certified: Azure Solutions Architect Expert credential. Passing this exam demonstrates your expert-level skills in advising stakeholders and translating business requirements into designs for secure, scalable, and reliable Azure solutions; and in partnering with others to implement these solutions.See full details at: microsoft.com/learn

  • af Adam Moe Fejerskov
    32,95 - 56,95 kr.

    Startups og humanitære organisationer eksperimenterer verden over med ny, radikal teknologi i forsøget på at forbedre livsvilkårene for fattige og fordrevne. Håbet er, at nye digitale løsninger kan hjælpe folk til en bedre fremtid; at man med droner og biometriske registre kan levere mere effektiv nødhjælp, og at man med innovation kan understøtte den demokratiske udvikling og sikre menneskerettighederne.Men dataficerede tilgange til problemløsning er ikke garanti for fair eller objektiv behandling af hverken data eller mennesker. Når teknologien udvikles tusindvis af kilometer fra der, hvor den skal hjælpe mennesker i nød, har den ofte form af lappeløsninger, ligesom der sker læk med uoverskuelige konsekvenser for de mest udsatte.Vi har brug for en mere lige og kollektiv teknologiudvikling, der vender eksisterende hierarkier på hovedet og tænker i bredere forandring. Kun sådan kan vi sikre, at interventioner båret af ny teknologi er så relevante, effektive og bæredygtige som muligt.Adam Moe Fejerskov (f. 1987) er senior­forsker ved DIIS, hvor han beskæftiger sig med globale uligheders konsekvenser rundt om i verden, og hvordan uligheder formes af forhold som ny radikal teknologi.

  • - Elon Musk, Peter Thiel and the Company that Made the Modern Internet
    af Jimmy Soni
    105,95 - 185,95 kr.

    The gripping inside story of Paypal, the company that created the digital age as we know it.

  • - De nye monopoler vs. folkets vilje
    af Barry C. Lynn
    253,95 kr.

    Barry C. Lynn, en af Amerikas mest fremtrædende samtidstænkere, giver os en tydelig illustration af, hvor grelt det står til med friheden, efter den er blevet overtaget af Amerikas nye giga-monopoler. Amerikanere tørster efter frihed, og diskussioner om hvor meget frihed der skal til for at købe et våben, få en abort, gifte sig af kærlighed eller skifte køn fylder meget i medierne. Kampen for frisættelse fra statens reguleringer og oprør mod regeltyranni er et ideal for mange. Alligevel begynder amerikanerne først nu at indse det, som måske er den største trussel mod frihed i flere århundreder: Den ekstreme og hurtigvoksende koncentration af økonomisk magt. Store monopoler kontrollerer i dag næsten alle hjørner af den amerikanske økonomi. Konsekvensen er ikke kun lavere lønninger og højere priser, hvilket er et naturligt resultat af magtens og velstandens koncentration på meget få hænder. Også arbejdskraftens mobilitet, muligheden for at starte små virksomheder og se dem blomstre er udfordret. Kombineret med de store onlinemonopoler som Google og Amazons fremgang, skabes der grobund for en verden, hvor få, store konglomerater dels forringer den almindelige borgers generelle livskvalitet gennem dårligere lønninger og vilkår på arbejdspladsen, dels dikterer hvordan borgerne tænker, hvem de kommer i forbindelse med, og hvilket billede af omverdenen de præsenteres for. Hvordan stemmer det overens med USA’s fremherskende frihedsideal? Det undersøger Barry C. Lynn i Fri os fra alle herskere.

  • af Johannes Fibiger m.fl.
    77,95 kr.

    Inden for de senere år er skolen blevet gradvis meredigitaliseret. Digitaliseringen inviterer til nye læreprocesser, men udfordrerogså didaktik og dannelsessyn. Et nyt fag er under udvikling:Teknologiforståelse. Temanummeret giver bud på, hvor skolen står i forhold til dendigitale udvikling og belyser, hvilke muligheder og udfordringer der ligger i det nye fag.

  • - Excel til andet end forretningsprocesser og andre seriøse - og mere almindelige - anvendelser
    af Martin Georg Houlberg Jensen
    68,94 - 157,95 kr.

    Excel til andet end forretningsprocesser og andre seriøse - og mere almindelige - anvendelser Om at gøre regnearket til et værktøj der kan meget mere Om nye ideer, sjove indfald og at gøre det umulige muligt I denne omgang gælder det alt andet end noget seriøst, for ja, Excel kan sagtens benyttes til en masse underholdning og ikke kun anvendes forretningsmæssigt. Man skal nok være lidt ekstra vild med - eller skør med - Excel, kodning og at fordybe sig i denne tekniske og måske nok lidt smånørdede verden. Men når det er på plads, er der masser af sjove muligheder lige ved hånden. Formålet er stadig - ligesom de tidligere hæfter - at tænke alternativt, kigge udover hvad der i dag er muligt eller tænkeligt, og overgå det.

  • - Få mere ud af dit Apple Watch
    af Daniel Riegels
    114,95 kr.

    Lær alt om Apple Watch og hvordan uret kan hjælpe dig med i hverdagen, så du får det meste ud af din investering.Apple Watch gør det muligt (at se klokken) at læse mails, holde styr på aftaler og diktere beskeder. Uret kan endda hjælpe med at forbedre dit helbred. Derudover viser vi hvordan du bruger dit ur som:kamera fjernbetjeningfjernbetjening til din PowerPoint præsentationfjernbetjening til Apple TV. Apple Watch kan indstilles efter dine behov og vi viser dig hvordan. Vi gennemgår bl.a. hvilket Apple Watch du bør vælge, opsætning via din iPhone, tilpasning af urskive og hvordan du henter apps i App Store. Glimt visning lader dig tilgå vigtige funktioner fra de forskellige apps på dit Apple Watch lynhurtigt med en enkelt fingerbevægelse. Du lærer desuden hvordan du tjekker notifikationer, svarer hurtigt tilbage på mails og beskeder samt hvordan du benytter dig af de smarte funktioner Handoff og Siri.Gratis online adgang til hæftet medfølger.

  • af Tiko (Cape Peninsula University of Technology Iyamu
    447,95 - 1.464,95 kr.

  •  
    652,95 kr.

    Machine Learning (ML)-based Artificial Intelligence (AI) algorithms have the capability to learn from known examples, creating various abstract representations and models. When applied to unfamiliar examples, these algorithms can perform a range of tasks, including classification, regression, and forecasting, to name a few.Frequently, these highly effective ML representations are challenging to comprehend, especially in the case of Deep Learning models, which may involve millions of parameters. However, in many applications, it is crucial for stakeholders to grasp the reasoning behind the system's decisions to utilize them more effectively. This necessity has prompted extensive research efforts aimed at enhancing the transparency and interpretability of ML algorithms, forming the field of explainable Artificial Intelligence (XAI).The objectives of XAI encompass: introducing transparency to ML models by offering comprehensive insights into the rationale behind specific decisions; designing ML models that are both more interpretable and transparent, while maintaining high levels of performance;, and establishing methods for assessing the overall interpretability and transparency of models, quantifying their effectiveness for various stakeholders.This Special Issue gathers contributions on recent advancements and techniques within the domain of XAI.

  • af Bharat Nishad
    171,95 kr.

    Welcome to "Mastering PCI DSS: Foundation to Mastery," the ultimate Book for anyone seeking to dive deep into the world of payment card industry security. This highly engaging Book is designed to provide you with a thorough understanding of the latest PCI DSS requirements, and equip you with the knowledge and tools necessary to ensure your organization/clients achieves and maintains compliance.Drawing on the success of other highly-rated Books and programs, I have designed this Book to be both informative and captivating, utilizing real-world examples, expert insights, and interactive exercises to keep you fully immersed in the learning experience.Whether you are an IT professional, security consultant, or business owner, this Book offers the perfect blend of theoretical and practical knowledge to help you become an expert in PCI DSS compliance. Unlock the secrets of payment card industry security, ensuring the safety and trust of your customers' sensitive data.

  • af Stefan Kottwitz
    491,95 kr.

    Explore practical LaTeX examples across various fields like mathematics, physics, chemistry, and computer science, and learn to quickly create tables, diagrams, and plots for your thesis, presentations, and articlesKey FeaturesWork with ready-to-use document templates to write articles, books, a thesis, and moreRefine text, fonts, formulas, and tables, and optimize PDF propertiesCreate captivating graphics directly within LaTeX in 2D and 3DPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe second edition of LaTeX Cookbook offers improved and additional examples especially for users in science and academia, with a focus on new packages for creating graphics with LaTeX. This edition also features an additional chapter on ChatGPT use to improve content, streamline code, and automate tasks, thereby saving time. This book is a practical guide to utilizing the capabilities of modern document classes and exploring the functionalities of the newest LaTeX packages. Starting with familiar document types like articles, books, letters, posters, leaflets, and presentations, it contains detailed tutorials for refining text design, adjusting fonts, managing images, creating tables, and optimizing PDFs. It also covers elements such as the bibliography, glossary, and index. You'll learn to create graphics directly within LaTeX, including diagrams and plots, and explore LaTeX's application across various fields like mathematics, physics, chemistry, and computer science. The book's website offers online compilable code, an example gallery, and supplementary information related to the book, including the author's LaTeX forum, where you can get personal support. By the end of this book, you'll have the skills to optimize productivity through practical demonstrations of effective LaTeX usage in diverse scenarios.What you will learnUtilize various document classes and incorporate bibliography, glossary, and index sectionsHandle arranging and annotating images with easeCreate visually appealing tables and learn how to manage fonts efficientlyGenerate diverse and colorful graphics, including diagrams, flow charts, bar charts, trees, and both 2D and 3D plotsSolve writing and drawing tasks across various scientific disciplinesOptimize PDF output, enhancing it with metadata, annotations, popups, animations, and fill-in fieldsLeverage ChatGPT to improve content and codeWho this book is forIf you're a LaTeX user in school, academia, or industry with a foundational understanding of LaTeX basics, this book offers efficient solutions to expedite your tasks. Tailored to students, teachers, authors, and engineers, its example-driven format enables quick access to solutions. Familiarity with basic LaTeX syntax and using LaTeX with your preferred editor for compiling is recommended to make the most of this book.Table of ContentsExploring Various Document ClassesTuning the Text Adjusting Fonts Creating Tables Working with ImagesCreating GraphicsCreating Beautiful DesignsProducing Contents, Indexes, and BibliographiesOptimizing PDF FilesWriting Advanced MathematicsUsing LaTeX in Science and TechnologyGetting Support on the InternetUsing Artificial Intelligence with LaTeX

  • af Lindsay Weinberg
    272,95 kr.

    How surveillance perpetuates long-standing injustices woven into the fabric of higher education.Higher education increasingly relies on digital surveillance in the United States. Administrators, consulting firms, and education technology vendors are celebrating digital tools as a means of ushering in the age of "smart universities." By digitally monitoring and managing campus life, institutions can supposedly run their services more efficiently, strengthen the quality of higher education, and better prepare students for future roles in the digital economy. Yet in practice, these initiatives often perpetuate austerity, structural racism, and privatization at public universities under the guise of solving higher education's most intractable problems. In Smart University, Lindsay Weinberg evaluates how this latest era of tech solutions and systems in our schools impacts students' abilities to access opportunities and exercise autonomy on their campuses. Using historical and textual analysis of administrative discourses, university policies, conference proceedings, grant solicitations, news reports, tech industry marketing materials, and product demonstrations, Weinberg argues that these more recent transformations are best understood as part of a longer history of universities supporting the development of technologies that reproduce racial and economic injustice on their campuses and in their communities. For anyone concerned with the future of surveillance on higher education, Smart University empowers readers with the knowledge, tools, and frameworks for contesting and reimagining the role of digital technology on university campuses.

  • af Arjun Rhapsody
    385,95 kr.

    Imagine a world where words become stepping stones, connecting individuals across divides and fostering understanding. That's the vision behind "Building Bridges Through Literacy," a program designed to empower everyone, regardless of age, background, or ability, to unlock the transformative power of reading and writing. This inclusive initiative goes beyond traditional literacy programs. It builds bridges across cultures and generations, offering tailored learning pathways for adults seeking basic literacy skills, children eager to explore the written world, and anyone wanting to refine their communication abilities. Through engaging workshops, one-on-one tutoring, and vibrant community events, "Building Bridges" fosters a love for language. Imagine grandparents sharing stories with their grandchildren, immigrants confidently navigating daily life, and individuals with learning differences finding their voices through creative writing. This program isn't just about reading and writing; it's about building bridges of empathy, understanding, and opportunity. It empowers individuals to become active participants in their communities, break down barriers, and contribute to a richer, more inclusive society. Join us in "Building Bridges Through Literacy." Let's unlock the potential within each individual and pave the way for a brighter future, one word at a time.

  • af David R. Heffelfinger
    400,95 kr.

    Learn Jakarta EE by building real-world microservices with code examples, practical exercises, and the latest Jakarta EE featuresKey FeaturesCraft microservices using standard Jakarta EE technologies such as Jakarta RESTful Web Services, JSON Processing, and JSON BindingDesign web-based applications with Jakarta FacesHarness Jakarta EE technologies such as Jakarta Enterprise Beans and Jakarta Messaging to build enterprise applicationsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionJakarta EE stands as a robust standard with multiple implementations, presenting developers with a versatile toolkit for building enterprise applications. However, despite the advantages of enterprise application development, vendor lock-in remains a concern for many developers, limiting flexibility and interoperability across diverse environments.This Jakarta EE application development guide addresses the challenge of vendor lock-in by offering comprehensive coverage of the major Jakarta EE APIs and goes beyond the basics to help you develop applications deployable on any Jakarta EE compliant runtime. This book introduces you to JSON Processing and JSON Binding and shows you how the Model API and the Streaming API are used to process JSON data. You'll then explore additional Jakarta EE APIs, such as WebSocket and Messaging, for loosely coupled, asynchronous communication and discover ways to secure applications with the Jakarta EE Security API. Finally, you'll learn about Jakarta RESTful web service development and techniques to develop cloud-ready microservices in Jakarta EE.By the end of this book, you'll have developed the skills to craft secure, scalable, and cloud-native microservices that solve modern enterprise challenges.What you will learnDesign microservices architectures with a clear separation of concernsUnderstand the contexts and dependency injection (CDI) specification to develop Java EE applicationsUse Jakarta Faces to create interactive web applications using component-based developmentUnderstand the steps involved in handling JSON data with Jakarta JSON Processing and BindingDesign secure RESTful web services using server-sent events (SSE) for real-time data updatesSecure your applications with the Jakarta Security APIBuild message-driven applications with Jakarta MessagingWho this book is forThis book is for Java developers looking to learn Jakarta EE and expand their skill set. You'll also find this book useful if you are familiar with Java EE and want to stay abreast of the latest version of the Jakarta EE specification. Knowledge of core Java concepts such as OOP, data types, control flow, and basic collections will be beneficial.Table of ContentsIntroduction to Jakarta EEContexts and Dependency InjectionJakarta RESTful Web ServicesJSON Processing and JSON BindingMicroservices Development with Jakarta EEJakarta FacesAdditional Jakarta Faces FeaturesObject Relational Mapping with Jakarta PersistenceWebSocketsSecuring Jakarta EE ApplicationsServlet Development and DeploymentJakarta Enterprise BeansJakarta MessagingWeb Services with Jakarta XML Web ServicesPutting it All Together

  • af Theo Tenzer
    161,95 kr.

    Das vorliegende Buch bietet eine Übersicht an quell-offenen Software-Programmen und -Projekten zur Verschlüsselung. Sie sind zentral, um Bürger:innen einen Schutz vor Überwachung sowie eine Perspektive zur Absicherung des Briefgeheimnisses und ihrer Privatheit zu ermöglichen. Mit diesem Band "Open-Source Verschlüsselung - Quell-offene Software zur Demokratisierung von Kryptographie: Schutz vor Überwachung" legt der Verein Aktion Freiheit statt Angst e.V. (Freedom not Fear), Mitglied im Arbeitskreis Vorratsdatenspeicherung (AK Vorrat), die Publikation von Theo Tenzer über den kryptographischen Wandel "Super Secreto - Die dritte Epoche der Kryptographie" als eine Re-Print-Sonderausgabe des dritten Bandes seiner dreibändigen Ausgabe mit einem Vorwort des Vereins vor: Ein Übersichts-Taschen-Buch eben zu den wichtigen digitalen Verschlüsselungs-Apps und Privacy-Tools: Beginnend mit der Festplatten-Verschlüsselungs-Software VeraCrypt, weiterhin der Verschlüsselungs-Suite Spot-On, sowie Werkzeugen zur Verschlüsselung von Dateien und deren Transfer bis hin zu einem Überblick an quell-offenen Messengern mit Verschlüsselung und eigenen Chat-Servern, dem Quantum-Computing-sicheren McEliece-Messaging, dem anonymen Websurfen mit dem Tor-Browser - oder einem VPN oder Proxy ... etc. Die weiteren Bände CRYPTO-WARS und QUANTEN-COMPUTER zu dieser Drei-Bände-Reihe sind ebenso erhältlich.

  • af Kalaivani A
    322,95 kr.

    In recent years, MEMS and NEMS technologies are the new rising technologies for an assortment of applications because they posses many advantages such as low power consumption, reliability and low mass etc. The both hard and soft magnetic material which includes plays a significant role for the manufacturing of MEMS devices. In particular soft magnetic materials are the appropriate one for making MEMS devices because of their outstanding magnetic properties. Since the exploration basically centers around the magnetic properties of attractive NiFeP materials, let us discuss the fundamental ideas of magnetic materials in this chapter. The materials which can be magnetized by the application of external magnetic field are known as magnetic materials. Magnetic materials are commonly classified into five categories in terms of magnetic properties of the atomic dipoles and the interactions between them. 1. Diamagnetism 2. Para magnetism 3. Ferromagnetism 4. Antiferro magnetism 5. Ferri magnetism

  • af Saravanakumar S
    333,95 kr.

    Cloud computing, in general, is the delivery of hosted services over the internet. Private clouds use a company's own infrastructure, whereas public clouds use shared infrastructure. Since they are by definition hosted by a public cloud provider like AWS, Azure, or Google Cloud, public clouds reduce the burden of managing the infrastructure. Enterprise data and application code are stored on the servers of the cloud service provider in a public cloud deployment. On the other hand, private clouds are hosted on a business's internal network and are frequently firewalled and physically secured. Largely on-premises infrastructure-invested mature corporations frequently use that capital to build their private clouds. Other names for cloud computing include utility computing and on-demand computing. Cloud services fall under three major types or categories of cloud computing: Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS). The dynamic nature of infrastructure management, especially when increasing applications and services, can offer a variety of problems even when businesses adequately resource their departments. They can outsource many of the time-consuming IT-related duties as-a-service models. Understanding the security needs for data protection is crucial as organizations continue to shift to the cloud. The management of this infrastructure may be transferred to a third-party cloud service provider, but the accountability and security of data assets may not always follow.

  • af Manas Thakur
    322,95 kr.

    The world of twenty-¿rst century runs using computer programs. Whether it is a hand- held gadget or a powerful supercomputer, humans write programs, often in a high-level programming language (such as C, Java, Python, R, OCaml, and so on), to commu- nicate with these digital devices. However, in order to execute a program on a given machine, the program ¿rst has to be converted to a form that can be understood by that machine. Akin to the communication between any two persons who speak and under- stand different languages, human-computer interaction, thus, also requires a translator. Two primary examples of translators that convert the high-level language of computer programs to the low-level language of machines are interpreters and compilers. An interpreter executes a program instruction-by-instruction. On the other hand, typical compilers, while translating code from one form to another, perform a series of analyses on the input program. The results of these program analyses are used to drive a plethora of applications: understanding the semantics of a program, debugging an erroneous program, ¿nding out whether a program is secure, and optimizing the program in terms of the resources it may consume (time, memory, energy, etc.), to name a few. Depending on the time at which a compiler translates a program, there are two kinds of compilers and program analyses: static and just-in-time (or JIT).

  • af Ishteyaaq Ahmad
    350,95 kr.

    The realm of education is undergoing a profound transformation, catalyzed by the rapid advancements in technology and the growing needs of learners. In this dynamic landscape, Massive Open Online Courses (MOOCs) have emerged as a transformative force, redefining traditional educational paradigms and democratizing access to knowledge. MOOCs offer a promising avenue for learners across the globe to engage with high-quality educational content, transcending geographical and socio-economic barriers. As a result, they have garnered widespread attention for their potential to revolutionize the way education is delivered and consumed. However, alongside the remarkable promise of MOOCs, there also exists a critical challenge that has garnered attention from researchers, educators, and policy makers alike - the issue of high attrition rates within these online learning platforms. The allure of open access and flexibility that MOOCs offer is often accompanied by the concern of learners not completing the courses they enroll in. This challenge poses questions about the effectiveness of MOOCs in engaging learners and delivering meaningful learning expenences. This chapter serves as the gateway to an in-depth exploration of the multifaceted landscape of MOOCs and their challenges. It provides an overarching framework for understanding the research that follows, offering a comprehensive view of the issues, opportunities, and complexities inherent to the realm of online education and MOOCs. By navigating through the historical development of MOOCs, exploring the intricate factors contributing to attrition, and delving into the possibilities offered by artificial intelligence and machine learning, this chapter lays the foundation for unravelling the tapestry of MOOC attrition.

  • af Rachel Barr
    204,95 - 586,95 kr.

  • af Grainne Kirwan
    479,95 - 1.469,95 kr.

    An Introduction to Cyberpsychology provides a comprehensive introduction to this rapidly growing discipline. Fully updated in its second edition, the book encourages students to critically evaluate the psychology of online interactions, and to develop appropriate research methodologies to complete their own work in this field.

  • af Benjamin David
    215,95 kr.

    Silent Signals: Unlocking Communication with EchoNose," readers embark on a journey into the fascinating realm of silent speech recognition (SSR) and the groundbreaking technology known as EchoNose. Authored by leading experts in the field, this book delves deep into the innovative approach of EchoNose, which harnesses the interconnectedness of the upper respiratory tract to decipher silent speech through active acoustic sensing via the nose. Exploring the dual purpose of SSR, the book elucidates how SSR systems not only aid individuals grappling with speech disorders but also pave the way for futuristic human-computer interfaces. With the rise of wearable devices in the SSR domain, EchoNose emerges as a beacon of hope, promising enhanced performance without intrusive sensors or heavy instrumentation. Through meticulous research and user studies, the book showcases EchoNose's capability to track speech articulators and classify intricate speech activities, surpassing the limitations of conventional systems. As readers delve into the feasibility and potential applications of EchoNose, they are confronted with a compelling vision of a future where silent signals are seamlessly translated into meaningful communication, revolutionizing the way we interact with technology and each other. "Silent Signals" is a testament to the power of innovation and its transformative impact on communication and accessibility.

  • af Norman Morton
    176,95 kr.

    My novel is divided into two parts, or eras. The first era is set in the 1920s, and the second era in the 1960s, when computers come on the market.My novel, or story, shows that no matter what the era, scammers and charlatans use the same tactics: lies (big and small), theft, shamelessness, and a tenaciousness in their criminal behavior that is almost incomprehensible to the average citizen. We recognize these traits in our modern-day politicians.But what, exactly, is a charlatan?A charlatan is perhaps more dangerous than the usual scammer because he/she believes in their products at a certain level while their rational mind rationalizes their criminal behavior and lies. Their lies and schemes easily envelope the people nearest to them. They have elevated IQs too. In essence, they can think circles around the average citizen. They have no real friends, just acquaintances that they can use.Lastly, the \ch\ in charlatan is pronounced as \sh\.

  • af Vikram Singh
    333,95 kr.

    The dictionary meaning of the word 'restoration' is the act of bringing back a system, that existed previously. In data processing, 'restoration' refers to the task of recovering the original or clean data from the given corrupt data. In Computer Vision, restoration is considered to be an umbrella term as it spans over a variety of problems that depends upon the type of: • Data being restored. • Corruption, the data has to recover from. The most frequently dealt data in Computer Vision problems is either an image or a video, and the most typical form of corruption, found in this data is due to Blur, Noise, Haze, Rain, Missing-pixels or Low-resolution, among others. The restoration problems with the stated corruptions can be but not limited to Deblurring, Denoising, Dehazing, Deraining, Inpainting and Super-resolution. These can be applied either on an image or a video. The next section elaborates some of these problems that will be addressed in this thesis.

  • af Michael Thomas Rex F
    356,95 kr.

    In manufacturing of components, use of fixture is unavoidable. The proper fixture design is required to maintain the form and dimensional accuracy of the component under machining operations. In machining of the components, the fixtures are used to locate and constrain the workpiece to perform the machining effectively. The use of fixtures ensures the accuracy, reliability and interchangeability of the components. It enhances the economy of manufacturing by reducing setup time and can be handled by less skilled manpower. The effective machining is achieved by Workpiece Fixture System (WFS) in a batch or mass production system. The workpiece is located and constrained in WFS using number of locators and clamps. The arrangement of locators and clamps around the workpiece is termed as Fixture Layout Design (FLD). The effective FLD ensures the quality of the components by minimizing the elastic deformation of the workpiece under machining conditions. The key elements of fixture system used for any machining operations are Fixture body, locators and clamps. Fixture body acts as the base element of the fixture system on which the component is placed for performing machining.

  • af Manfred Chaluppa
    252,95 kr.

    Beginnend mit der Überwindung der Angst vor dem Feuer und dem Begreifen, wie man es zum Daseinserhalt weiter verwenden kann, wurde daraus die digitale Informationstechnik.Diese lange Entwicklung wird hier sachlich erzählend beschrieben.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.