Listing 1 - 10 of 109 | << page >> |
Sort by
|
Choose an application
Automatic control --- Relay control systems --- Embedded computer systems --- Feedback control systems --- Artificial intelligence --- Computer. Automation
Choose an application
This book constitutes the refereed proceedings of the 13th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2022, held in Caparica, Portugal, during June-July 2022. The 22 full papers presented were carefully reviewed and selected from 48 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. The papers are organized into the following topical sub-headings: Smart Systems Thinking; Cyber-physical Systems; health-related Digitalization; Electric Systems and Machines; Smart Devices; and Control and Digital Platforms.
Choose an application
This book describes the impact of Era 4.0 on the agricultural sector worldwide. It highlights the relationships between agriculture, food and industry (4.0). The main topics discussed are those associated with IoT in various sectors of the economy and its impact on farming sustainability. this book provides insights for policy makers, students, researchers and economic stakeholders.
Agronomy --- Computer. Automation --- landbouwbeleid --- algoritmen --- Sustainability. --- Agriculture—Economic aspects. --- Cooperating objects (Computer systems). --- Agricultural Economics. --- Cyber-Physical Systems.
Choose an application
"When it comes to delivering product design innovations to mobile device users, Nokia is the company against which all others are judged. Now, the philosophies and working methods by which Nokia revolutionized product usability are explained for the first time in Mobile Usability: How Nokia Changed the Face of the Mobile Phone."--Jacket.
Production management --- Product strategy --- Cell phones --- User interfaces (Computer systems) --- User-Computer Interface --- Cell Phone --- Nokia (Firm)
Choose an application
Computer security --- Electronic data processing departments --- Security measures --- Computer security. --- Security measures. --- Computer department security measures --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Mathematical Sciences --- Applied Mathematics --- Computer Science
Choose an application
Computer viruses --- Computer security --- Computer security. --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security measures --- Computer crimes --- Malware (Computer software) --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer Science
Choose an application
cybersecurity --- network security --- privacy technology --- malware analysis --- critical infrastructure security --- cryptography --- Computer. Automation --- Computer security --- Sécurité informatique --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Cognitive psychology --- Artificial intelligence. Robotics. Simulation. Graphics --- Artificial intelligence --- Cognitive science --- Neural computers --- Artificial Intelligence --- Cognition --- Computer Systems --- Models, Neurological --- Intelligence artificielle --- Sciences cognitives --- Ordinateurs neuronaux --- Periodicals --- periodicals --- Périodiques --- Connectionism --- Connexionnisme --- Artificial intelligence. --- Cognitive science. --- Connectionism. --- Neural computers. --- Arts and Humanities --- Mathematical Sciences --- Philosophy --- Applied Mathematics --- Périodiques --- EBSCOASP-E EJINFOR EPUB-ALPHA-C EPUB-PER-FT TAYFRA-E --- Connexionism --- Neural net computers --- Neural network computers --- Neurocomputers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- periodicals. --- Science --- Philosophy of mind --- Electronic digital computers --- Natural computation --- Bionics --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Artificial Intelligence. --- Research --- KI (kunstmatige intelligentie) --- Periodicals. --- Computer systems --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Computer systems. --- Cognition. --- Neurale netwerken. --- Kunstmatige intelligentie. --- Cognitiewetenschap. --- Cognitive Function --- Cognitions --- Cognitive Functions --- Function, Cognitive --- Functions, Cognitive --- Computational Intelligence --- AI (Artificial Intelligence) --- Computer Reasoning --- Computer Vision Systems --- Knowledge Acquisition (Computer) --- Knowledge Representation (Computer) --- Machine Intelligence --- Acquisition, Knowledge (Computer) --- Computer Vision System --- Intelligence, Computational --- Intelligence, Machine --- Knowledge Representations (Computer) --- Reasoning, Computer --- Representation, Knowledge (Computer) --- System, Computer Vision --- Systems, Computer Vision --- Vision System, Computer --- Vision Systems, Computer --- Heuristics --- Psychology --- Model, Neurological --- Neurologic Model --- Neurological Model --- Neurological Models --- Neurologic Models --- Model, Neurologic --- Models, Neurologic --- Organization, Computer Systems --- Computer Architecture --- Computer Systems Development --- Computer Systems Evaluation --- Computer Systems Organization --- Real-Time Systems --- Architecture, Computer --- Architectures, Computer --- Computer Architectures --- Computer System --- Computer Systems Evaluations --- Development, Computer Systems --- Evaluation, Computer Systems --- Evaluations, Computer Systems --- Real Time Systems --- Real-Time System --- System, Computer --- System, Real-Time --- Systems, Real-Time
Choose an application
Business enterprises --- Security systems --- Commercial crimes --- Computer security --- Computer security. --- Security systems. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Hacking --- Security measures --- Burglary protection --- Corporate crime --- Crimes, Financial --- Financial crimes --- Offenses affecting the public trade --- Crime --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Prevention --- Security measures. --- Prevention. --- Protection --- Organization theory --- Business, Economy and Management --- Business Management --- General and Others --- Organizational change and Development
Choose an application
Computer security --- Data protection --- Sécurité informatique --- Protection de l'information (Informatique) --- Periodicals. --- Périodiques --- Computer security. --- Data protection. --- Information technology --- Security measures --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- IT (Information technology) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- intelligence gathering --- data mining --- privacy --- network analysis --- cybercrime --- counter-terrorism --- Electronic data processing --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer. Automation
Listing 1 - 10 of 109 | << page >> |
Sort by
|