Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
7,028 result(s) for "Programm"
Sort by:
Apollo to the Moon: a history in 50 objects
\"A celebration of the 50th anniversary of NASA's Apollo missions to the moon, this narrative uses 50 key artifacts from the Smithsonian archives to tell the story of the groundbreaking space exploration program. Bold photographs, fascinating graphics, and engaging stories commemorate the 20th century's most important space endeavor: NASA's Apollo program to reach the moon. From the lunar rover and an emergency oxygen mask to space food and moon rocks, it's a carefully curated array of objects--complete with intriguing back stories and profiles of key participants. This book showcases the historic space exploration program that landed humans on the moon, advanced the world's capabilities for space travel, and revolutionized our sense of humanity's place in the universe. Each historic accomplishment is symbolized by a different object, from a Russian stamp honoring Yuri Gagarin and plastic astronaut action figures to the Apollo 11 command module, piloted by Michael Collins as Armstrong and Aldrin made the first moonwalk, together with the monumental art inspired by these moon missions. Throughout, Apollo to the Moon also tells the story of people who made the journey possible: the heroic astronauts as well as their supporters, including President John F. Kennedy, newsman Walter Cronkite, and NASA scientists such as Margaret Hamilton\"-- Provided by publisher.
Computer program for single sampling plans by variables with known lot standard deviation
The paper presents a computer program that can be used at design and application of single sampling plans by variables when the standard deviation of the lot is known. The developed program may be applied for quality characteristics with one single or two specification limits. When the quality characteristics have two specification limits, the program determines if two separate plans with one specification limit may be applied for making the decision about the lot acceptance or rejection, and takes into account all the cases that may appear in this situation. The computer program calculates first the plan parameters and then, using the sample measurements, makes the decision about the lot acceptance or rejection. Besides the program presentation, the paper also presents several examples that cover all cases of its utilization.
Trauma-Informed Social Work Practice
Social workers frequently encounter clients with a history of trauma. Trauma-informed care is a way of providing services by which social workers recognize the prevalence of early adversity in the lives of clients, view presenting problems as symptoms of maladaptive coping, and understand how early trauma shapes a client's fundamental beliefs about the world and affects his or her psychosocial functioning across the life span. Trauma-informed social work incorporates core principles of safety, trust, collaboration, choice, and empowerment and delivers services in a manner that avoids inadvertently repeating unhealthy interpersonal dynamics in the helping relationship. Trauma-informed social work can be integrated into all sorts of existing models of evidence-based services across populations and agency settings, can strengthen the therapeutic alliance, and facilitates posttraumatic growth.
Catalog of energy patterns for mobile applications
Software engineers make use of design patterns for reasons that range from performance to code comprehensibility. Several design patterns capturing the body of knowledge of best practices have been proposed in the past, namely creational, structural and behavioral patterns. However, with the advent of mobile devices, it becomes a necessity a catalog of design patterns for energy efficiency. In this work, we inspect commits, issues and pull requests of 1027 Android and 756 iOS apps to identify common practices when improving energy efficiency. This analysis yielded a catalog, available online, with 22 design patterns related to improving the energy efficiency of mobile apps. We argue that this catalog might be of relevance to other domains such as Cyber-Physical Systems and Internet of Things. As a side contribution, an analysis of the differences between Android and iOS devices shows that the Android community is more energy-aware.
Development of Tic-Tac-Toe Game Using Heuristic Search
Tic-tac-toe is a fun game played by two players. Before starting the game, a 3x3 square grid is formed using two vertical and two horizontal lines. The player who succeeds in placing three of their marks in a horizontal, vertical, or diagonal row is the winner. In this study, we develop a computer program where a player can challenge artificial intelligent heuristic approach (opponent) to win the game. We want to prove that artificial intelligent heuristic approach enables in giving a great performance for development of tic-tac-toe game.
Anomaly detection via blockchained deep learning smart contracts in industry 4.0
The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. Therefore, alternative, intelligent solutions should be used to detect anomalies in the operating parameters of the infrastructures concerned, while ensuring the anonymity and confidentiality of industrial information. Blockchain is an encrypted, distributed archiving system designed to allow for the creation of real-time log files that are unequivocally linked. This ensures the security and transparency of transactions. This research presents, for the first time in the literature, an innovative Blockchain Security Architecture that aims to ensure network communication between traded Industrial Internet of Things devices, following the Industry 4.0 standard and based on Deep Learning Smart Contracts . The proposed smart contracts are implementing (via computer programming) a bilateral traffic control agreement to detect anomalies based on a trained Deep Autoencoder Neural Network. This architecture enables the creation of a secure distributed platform that can control and complete associated transactions in critical infrastructure networks, without the intervention of a single central authority. It is a novel approach that fuses artificial intelligence in the Blockchain, not as a supportive framework that enhances the capabilities of the network, but as an active structural element, indispensable and necessary for its completion.
Research of A Macro Program for Bolt Hole Patterns Based on EXCEL
EXCEL® is a Microsoft Office software product, which has excellent numerical and logic calculation and analysis functions. The method of programming a CNC macro program using EXCEL® is being presented in this paper for the first time. By defining the locations of a hole pattern geometrically, and simulating the programming of a macro, it can be demonstrated that a CNC program using macros is simple and easy to understand, and the program is flexible, generic and portable.
Exploring young consumers’ intention toward green products: applying an extended theory of planned behavior
The present study is an attempt to examine young consumers’ intention toward green products using an extended version of the theory of planned behavior (TPB), which incorporates willingness to pay premium and environmental concern. This study was tested empirically using survey data collected from 316 respondents in India and the data were analyzed using SPSS and STATA computer program. The empirical results suggested that extended version of the TPB influenced the intention of the young consumers’ toward green products. Further, all hypotheses were accepted and there is a strong correlation between the five examined factors in buying green products. In addition, the results also validated the appropriateness of the extended TPD for exploring young consumers’ toward green products. This study offers insights from the perspective of an emerging economy and future research directions on young consumers’ intention toward green products. Based on the results, future research directions are likewise discussed.
Detection, assessment and mitigation of vulnerabilities in open source dependencies
Open source software (OSS) libraries are widely used in the industry to speed up the development of software products. However, these libraries are subject to an ever-increasing number of vulnerabilities that are publicly disclosed. It is thus crucial for application developers to detect dependencies on vulnerable libraries in a timely manner, to precisely assess their impact, and to mitigate any potential risk. This paper presents a novel method to detect, assess and mitigate OSS vulnerabilities. Differently from state-of-the-art approaches that depend on metadata to identify vulnerable OSS dependencies, our solution is code-centric, and combines static and dynamic analyses to determine the reachability of the vulnerable portion of libraries, in the context of a given application. Our approach also supports developers in choosing among the existing non-vulnerable library versions, with the goal to determine and minimize incompatibilities. Eclipse Steady, the open source implementation of our code-centric and usage-based approach is the tool recommended to scan Java software products at SAP; it has been successfully used to perform more than one million scans of about 1500 applications. In this paper we report on the lessons learned when maturing the tool from a research prototype to an industrial-grade solution. To evaluate Eclipse Steady, we conducted an empirical study to compare its detection capabilities with those of OWASP Dependency Check (OWASP DC), scanning 300 large enterprise applications under development with a total of 78165 dependencies. Reviewing a sample of the findings reported only by one of the two tools revealed that all Steady findings are true positives, while 88.8% of the findings of OWASP DC for vulnerabilities covered by our code-centric approach are false positives. For vulnerabilities not caused by code but due, e.g., to erroneous configuration, 63.3% of OWASP DC findings are true positives.
The socioeconomic and environmental drivers of the COVID-19 pandemic
In recent decades, there has been an intensification of the socioeconomic and environmental drivers of pandemics, including ecosystem conversion, meat consumption, urbanization, and connectivity among cities and countries. This paper reviews how these four systemic drivers help explain the dynamics of the COVID-19 pandemic and other recent emerging infectious diseases, and the policies that can be adopted to mitigate their risks. Land-use change and meat consumption increase the likelihood of pathogen spillover from animals to people. The risk that such zoonotic outbreaks will then spread to become pandemics is magnified by growing urban populations and the networks of trade and travel within and among countries. Zoonotic spillover can be mitigated through habitat protection and restrictions on the wildlife trade. Containing infectious disease spread requires a high degree of coordination among institutions across geographic jurisdictions and economic sectors, all backed by international investment and cooperation.