Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
395,201
result(s) for
"Personal Computer"
Sort by:
Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station
by
Liu, Yonghuai
,
Trovati, Marcello
,
Pereira, Ella
in
Accuracy
,
Artificial Intelligence
,
Computational Intelligence
2020
Non-predictive or inaccurate weather forecasting can severely impact the community of users such as farmers. Numerical weather prediction models run in major weather forecasting centers with several supercomputers to solve simultaneous complex nonlinear mathematical equations. Such models provide the medium-range weather forecasts, i.e., every 6 h up to 18 h with grid length of 10–20 km. However, farmers often depend on more detailed short-to medium-range forecasts with higher-resolution regional forecasting models. Therefore, this research aims to address this by developing and evaluating a lightweight and novel weather forecasting system, which consists of one or more local weather stations and state-of-the-art machine learning techniques for weather forecasting using time-series data from these weather stations. To this end, the system explores the state-of-the-art temporal convolutional network (TCN) and long short-term memory (LSTM) networks. Our experimental results show that the proposed model using TCN produces better forecasting compared to the LSTM and other classic machine learning approaches. The proposed model can be used as an efficient localized weather forecasting tool for the community of users, and it could be run on a stand-alone personal computer.
Journal Article
Personal finance with Python : using pandas, Requests, and Recurrent
Deal with data, build up financial formulas in code from scratch, and evaluate and think about money in your day-to-day life. This book is about Python and personal finance and how you can effectively mix the two together. In Personal Finance with Python you will learn Python and finance at the same time by creating a profit calculator, a currency converter, an amortization schedule, a budget, a portfolio rebalancer, and a purchase forecaster. Many of the examples use pandas, the main data manipulation tool in Python. Each chapter is hands-on, self-contained, and motivated by fun and interesting examples. Although this book assumes a minimal familiarity with programming and the Python language, if you don't have any, don't worry. Everything is built up piece-by-piece and the first chapters are conducted at a relaxed pace. You'll need Python 3.6 (or above) and all of the setup details are included. What You'll Learn Work with data in pandas Calculate Net Present Value and Internal Rate Return Query a third-party API with Requests Manage secrets Build efficient loops Parse English sentences with Recurrent Work with the YAML file format Fetch stock quotes and use Prophet to forecast the future Who This Book Is For Anyone interested in Python, personal finance, and/or both! This book is geared towards those who want to manage their money more effectively and to those who just want to learn or improve their Python.
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
2010
Although firms are expending substantial resources to develop technology and processes that can help safeguard the security of their computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. Unlike employees in a work setting, home users are not subject to training, nor are they protected by a technical staff dedicated to keeping security software and hardware current. Thus, with over one billion people with access to the Internet, individual home computer users represent a significant point of weakness in achieving the security of the cyber infrastructure. We study the phenomenon of conscientious cybercitizens, defined as individuals who are motivated to take the necessary precautions under their direct control to secure their own computer and the Internet in a home setting. Using a multidisciplinary, phased approach, we develop a conceptual model of the conscientious cybercitizen. We present results from two studies—a survey and an experiment—conducted to understand the drivers of intentions to perform security-related behavior, and the interventions that can positively influence these drivers. In the first study, we use protection motivation theory as the underlying conceptual foundation and extend the theory by drawing upon the public goods literature and the concept of psychological ownership. Results from a survey of 594 home computer users from a wide range of demographic and socioeconomic backgrounds suggest that a home computer user's intention to perform security-related behavior is influenced by a combination of cognitive, social, and psychological components. In the second study, we draw upon the concepts of goal framing and self-view to examine how the proximal drivers of intentions to perform security-related behavior identified in the first study can be influenced by appropriate messaging. An experiment with 101 subjects is used to test the research hypotheses. Overall, the two studies shed important new light on creating more conscientious cybercitizens. Theoretical and practical implications of the findings are discussed.
Journal Article
The secret genius of modern life. Season 1, Episode 3, Virtual assistant
by
Fry, Hannah
,
Inkson, Eileen
,
Bruce, Lyndon
in
Documentary television programs
,
Evaluation
,
Intelligent personal assistants (Computer software)
2022
Hannah Fry delves into the inner workings of virtual assistants.
Streaming Video
OneNote 2013 for dummies
OneNote lets you organize, access, and share notes on multiple devices. This guide shows you how to take full advantage of everything it offers-- text recognition, the ability to include data from other Office apps, and more!
Hardware implementation of pseudo-random number generators based on chaotic maps
by
Tlelo-Cuautle, Esteban
,
Torres-Pérez, Esteban
,
Mancillas-López, Cuauhtemoc
in
Automotive Engineering
,
Bifurcations
,
Chaos theory
2017
We show the usefulness of bifurcation diagrams to implement a pseudo-random number generator (PRNG) based on chaotic maps. We provide details on the selection of the best parameter values to obtain high entropy and positive Lyapunov exponent from the bifurcation diagram of four chaotic maps, namely: Bernoulli shift map, tent, zigzag, and Borujeni maps. The binary sequences obtained from these maps are analyzed to implement a PRNG both in software and in hardware. The software implementation is realized using 32 and 64 bits microprocessor architectures, and with floating point and fixed point computer arithmetic. The hardware implementation is done by using a field-programmable gate array (FPGA) architecture. We developed a serial communication interface between the PRNG on the FPGA and a personal computer to obtain the generated sequences. We validate the randomness of the generated binary sequences with the NIST test suite 800-22-a both in floating point and fixed point arithmetic. At the end, we show that those chaotic maps are suitable to implement a PRNG but according to the hardware resources, the one based on the Bernoulli shift map is better. In addition, another advantage is that the required initial value for the sequences can be within the whole interval
[
-
1
,
1
]
, including its bounds.
Journal Article
Outlook 2019 for dummies
Of the millions of people who use Outlook, most only use about two percent of its features. Don't stay in the dark! Outlook 2019 For Dummies shows you how to take advantage of often-overlooked tips and tricks to make it work even better for you. Inside, you'll find information on navigating the user interface; utilizing the To-Do bar; filtering junk email; smart scheduling; RSS support; using electronic business cards; accessing data with two-way sync and offline and cloud based access, and much more!
General mathematical model for energetic and informatic evaluated over natively producing surrounded systems
2021
Some joint (synthetic) closed in itself idea about the world and its being is expounded in the paper, which gives the opportunity to invent the parallel definitions of the energy and the information not exceeding the bounds of the united world. This allows us to introduce some sufficiently general notion of the evaluated (over natively) producing (transmission stream conservatively-dynamic) surrounded system, described by the proper system of evolutional equations. In the capacity of important partial cases of such systems the proper notions of the energetic evaluated producing surrounded system and the informatic* evaluated producing surrounded system are introduced. The explicitly analyzed earlier examples of the model of heating stove (as the energetic evaluated producing surrounded system) and the model of personal computer (as the informatic evaluated producing surrounded system) expose the applicability of proposed idea to a generalized and formalized description of some wide class of over native systems really existing.
Journal Article