Catalogue Search | MBRL
نتائج البحث
MBRLSearchResults
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إضافة العنوان إلى الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
-
الضبطالضبط
-
مُحَكَّمةمُحَكَّمة
-
السلسلةالسلسلة
-
مستوى القراءةمستوى القراءة
-
السنةمن:-إلى:
-
المزيد من المرشحاتالمزيد من المرشحاتنوع المحتوىنوع العنصرنوع الدرجةلديه النص الكاملالموضوعبلد النشرالناشرالمصدرالمؤسسة المانحةالجمهور المستهدفالمتبرعاللغةمكان النشرالمؤلفينموقع
منجز
مرشحات
إعادة تعيين
1,633,175
نتائج ل
"processing"
صنف حسب:
Big Data, Little Data, No Data
بواسطة
Borgman, Christine L
في
Big data
,
Communication in learning and scholarship
,
Communication in learning and scholarship -- Technological innovations
2015,2016,2017
\"Big Data\" is on the covers ofScience, Nature, theEconomist, andWiredmagazines, on the front pages of theWall Street Journaland theNew York Times.But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines.Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six \"provocations\" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship.
eBook
Structural equation modeling : applications using Mplus
2012
A reference guide for applications of SEM using Mplus Structural Equation Modeling: Applications Using Mplus is intended as both a teaching resource and a reference guide. Written in non-mathematical terms, this book focuses on the conceptual and practical aspects of Structural Equation Modeling (SEM). Basic concepts and examples of various SEM models are demonstrated along with recently developed advanced methods, such as mixture modeling and model-based power analysis and sample size estimate for SEM. The statistical modeling program, Mplus, is also featured and provides researchers with a flexible tool to analyze their data with an easy-to-use interface and graphical displays of data and analysis results. Key features: Presents a useful reference guide for applications of SEM whilst systematically demonstrating various advanced SEM models, such as multi-group and mixture models using Mplus. Discusses and demonstrates various SEM models using both cross-sectional and longitudinal data with both continuous and categorical outcomes. Provides step-by-step instructions of model specification and estimation, as well as detail interpretation of Mplus results. Explores different methods for sample size estimate and statistical power analysis for SEM. By following the examples provided in this book, readers will be able to build their own SEM models using Mplus. Teachers, graduate students, and researchers in social sciences and health studies will also benefit from this book.
eBook
Distributed computing pearls
\"Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce. One of the most challenging problems in computer science for the 21st century is to improve the design of distributed systems where computing devices have to work together as a team to achieve common goals. In this book, the author has tried to gently introduce the general reader to some of the most fundamental issues and classical results of computer science underlying the design of algorithms for distributed systems, so that the reader can get a feel of the nature of this exciting and fascinating field called distributed computing. The book will appeal to the educated layperson, while computer-knowledgeable readers will be able to learn something new.\"--Page 4 of cover.
Petri nets
2010,2009,2013
A Petri net is a mathematical representation of a network. This book first introduces the basic models including time and stochastic extensions, in particular place-transition and high level Petri nets. Their modeling and design capabilities are illustrated by a set of representations of interest in operating and communication systems. The volume then addresses the related verification problems and proposes corresponding solutions by introducing the main notions needed to fully understand the behavior and properties behind Petri nets. Particular attention is devoted to how systems can be fully represented and analyzed in terms of their behavioral, time, and stochastic aspects by using the same formal approach and semantic basis. Finally, illustrative examples are presented in the important fields of interoperability in telecommunication services, programming languages, multimedia architectures, manufacturing systems, and communication protocols.
eBook
A real-time in-memory discovery service : leveraging hierarchical packaging information in a unique identifier network to retrieve track and trace information
The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called \"Discovery Service\" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
بواسطة
Mishra, Brojo Kishore
,
Khari, Manju
,
Kumar, Raghvendra
في
Computer networks
,
Computer networks -- Security measures
,
Computer security
2019
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field.
eBook
Quantum Information Theory
بواسطة
Wilde, Mark M.
في
COMPUTERS / Security / Cryptography. bisacsh
,
Data processing
,
Electronic data processing
2013
Finally, here is a modern, self-contained text on quantum information theory suitable for graduate-level courses. Developing the subject 'from the ground up' it covers classical results as well as major advances of the past decade. Beginning with an extensive overview of classical information theory suitable for the non-expert, the author then turns his attention to quantum mechanics for quantum information theory, and the important protocols of teleportation, super-dense coding and entanglement distribution. He develops all of the tools necessary for understanding important results in quantum information theory, including capacity theorems for classical, entanglement-assisted, private and quantum communication. The book also covers important recent developments such as superadditivity of private, coherent and Holevo information, and the superactivation of quantum capacity. This book will be warmly welcomed by the upcoming generation of quantum information theorists and the already established community of classical information theorists.
eBook