Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Oil reservoir engineering. --- Petroleum engineering --- TNT (Chemical) --- Fossil fuels. --- Power resources. --- Energy --- Energy resources --- Power supply --- Natural resources --- Energy harvesting --- Energy industries --- Fossil energy --- Fuel --- Energy minerals --- Methyltrinitrobenzene --- Trinitrotoluene --- Trinitrotoluol --- Trotyl --- Explosives --- Organonitrogen compounds --- Toluene --- Hydrocarbon reservoirs.
Choose an application
This is the first book in the petroleum sector that sheds light on the real obstacles to sustainable developmentand provides solutions to each problem encountered. Each solution is complete with an economic analysisthat clarifies why petroleum operations can continue with even greater profit than before while ensuring thatthe negative environmental impact is diminished. The new screening tools and models proposed in this bookwill provide one with proper guidelines to achieve true sustainability in both technology development andmanagement of the petroleum sector.
Choose an application
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.
Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Intelligence, Computational --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Construction --- Artificial intelligence --- Soft computing --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Industrial arts --- Technology --- Computer security --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Artificial Intelligence.
Choose an application
In this highly anticipated volume, the world-renowned authors take a basic approach to present theprinciples of petroleum reservoir simulation in an easy-to-use and accessible format. Applicable toany oil and gas recovery method, this book uses a block-centered grid and a point-distributed grid.It treats various boundary conditions as fictitious wells, gives algebraic equations for their flowratesand presents an elaborate treatment of radial grid for single-well simulation to analyze well test resultsand to create well pseudo-functions necessary in conducting a practical re
Petroleum --- Hydrocarbon reservoirs --- Petroleum engineering --- Reservoirs, Hydrocarbon --- Traps (Petroleum geology) --- Mining engineering --- Coal-oil --- Crude oil --- Oil --- Caustobioliths --- Mineral oils --- Geology --- Simulation methods --- Mathematical models --- Mathematics
Choose an application
Petroleum reserves. --- Oil reserves --- Oil supply --- Petroleum --- Petroleum supply --- Reserves of petroleum --- Oil fields --- Reserves
Choose an application
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.
Computer security --- Computer crimes --- Engineering. --- Artificial intelligence. --- Computational Intelligence. --- Artificial Intelligence. --- Construction --- Industrial arts --- Technology --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing
Choose an application
This book constitutes the refereed proceedings of the 16th Australasian Conference on Data Mining, AusDM 2018, held in Bathurst, NSW, Australia, in November 2018. The 27 revised full papers presented together with 3 short papers were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on classification task; transport, environment, and energy; applied data mining; privacy and clustering; statistics in data science; health, software and smartphone; image data mining; industry showcase.
Data mining. --- Machine learning. --- Computer security. --- Data Mining and Knowledge Discovery. --- Machine Learning. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Learning, Machine --- Artificial intelligence --- Machine theory --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Protection --- Security measures --- Computer Science/IT. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.
Cyber intelligence (Computer security) --- Engineering. --- Artificial intelligence. --- Computational Intelligence. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing
Listing 1 - 8 of 8 |
Sort by
|