Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
7,028
result(s) for
"Programm"
Sort by:
Apollo to the Moon: a history in 50 objects
by
Muir-Harmony, Teasel E., author
,
Collins, Michael, 1930- author of introduction, etc
,
National Air and Space Museum
in
Project Apollo (U.S.) History.
,
Project Apollo (U.S.)
,
Space flight to the moon History.
2018
\"A celebration of the 50th anniversary of NASA's Apollo missions to the moon, this narrative uses 50 key artifacts from the Smithsonian archives to tell the story of the groundbreaking space exploration program. Bold photographs, fascinating graphics, and engaging stories commemorate the 20th century's most important space endeavor: NASA's Apollo program to reach the moon. From the lunar rover and an emergency oxygen mask to space food and moon rocks, it's a carefully curated array of objects--complete with intriguing back stories and profiles of key participants. This book showcases the historic space exploration program that landed humans on the moon, advanced the world's capabilities for space travel, and revolutionized our sense of humanity's place in the universe. Each historic accomplishment is symbolized by a different object, from a Russian stamp honoring Yuri Gagarin and plastic astronaut action figures to the Apollo 11 command module, piloted by Michael Collins as Armstrong and Aldrin made the first moonwalk, together with the monumental art inspired by these moon missions. Throughout, Apollo to the Moon also tells the story of people who made the journey possible: the heroic astronauts as well as their supporters, including President John F. Kennedy, newsman Walter Cronkite, and NASA scientists such as Margaret Hamilton\"-- Provided by publisher.
Computer program for single sampling plans by variables with known lot standard deviation
by
Eftimie, N
2021
The paper presents a computer program that can be used at design and application of single sampling plans by variables when the standard deviation of the lot is known. The developed program may be applied for quality characteristics with one single or two specification limits. When the quality characteristics have two specification limits, the program determines if two separate plans with one specification limit may be applied for making the decision about the lot acceptance or rejection, and takes into account all the cases that may appear in this situation. The computer program calculates first the plan parameters and then, using the sample measurements, makes the decision about the lot acceptance or rejection. Besides the program presentation, the paper also presents several examples that cover all cases of its utilization.
Journal Article
Trauma-Informed Social Work Practice
2017
Social workers frequently encounter clients with a history of trauma. Trauma-informed care is a way of providing services by which social workers recognize the prevalence of early adversity in the lives of clients, view presenting problems as symptoms of maladaptive coping, and understand how early trauma shapes a client's fundamental beliefs about the world and affects his or her psychosocial functioning across the life span. Trauma-informed social work incorporates core principles of safety, trust, collaboration, choice, and empowerment and delivers services in a manner that avoids inadvertently repeating unhealthy interpersonal dynamics in the helping relationship. Trauma-informed social work can be integrated into all sorts of existing models of evidence-based services across populations and agency settings, can strengthen the therapeutic alliance, and facilitates posttraumatic growth.
Journal Article
Catalog of energy patterns for mobile applications
2019
Software engineers make use of design patterns for reasons that range from performance to code comprehensibility. Several design patterns capturing the body of knowledge of best practices have been proposed in the past, namely creational, structural and behavioral patterns. However, with the advent of mobile devices, it becomes a necessity a catalog of design patterns for energy efficiency. In this work, we inspect commits, issues and pull requests of 1027 Android and 756 iOS apps to identify common practices when improving energy efficiency. This analysis yielded a catalog, available online, with 22 design patterns related to improving the energy efficiency of mobile apps. We argue that this catalog might be of relevance to other domains such as Cyber-Physical Systems and Internet of Things. As a side contribution, an analysis of the differences between Android and iOS devices shows that the Android community is more energy-aware.
Journal Article
Development of Tic-Tac-Toe Game Using Heuristic Search
Tic-tac-toe is a fun game played by two players. Before starting the game, a 3x3 square grid is formed using two vertical and two horizontal lines. The player who succeeds in placing three of their marks in a horizontal, vertical, or diagonal row is the winner. In this study, we develop a computer program where a player can challenge artificial intelligent heuristic approach (opponent) to win the game. We want to prove that artificial intelligent heuristic approach enables in giving a great performance for development of tic-tac-toe game.
Journal Article
Anomaly detection via blockchained deep learning smart contracts in industry 4.0
by
Iliadis, Lazaros
,
Demertzis, Konstantinos
,
Tziritas, Nikos
in
Anomalies
,
Archiving
,
Artificial Intelligence
2020
The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. Therefore, alternative, intelligent solutions should be used to detect anomalies in the operating parameters of the infrastructures concerned, while ensuring the anonymity and confidentiality of industrial information.
Blockchain
is an encrypted, distributed archiving system designed to allow for the creation of real-time log files that are unequivocally linked. This ensures the security and transparency of transactions. This research presents, for the first time in the literature, an innovative
Blockchain Security Architecture
that aims to ensure network communication between traded Industrial Internet of Things devices, following the Industry 4.0 standard and based on
Deep Learning Smart Contracts
. The proposed smart contracts are implementing (via computer programming) a bilateral traffic control agreement to detect anomalies based on a trained Deep Autoencoder Neural Network. This architecture enables the creation of a secure distributed platform that can control and complete associated transactions in critical infrastructure networks, without the intervention of a single central authority. It is a novel approach that fuses artificial intelligence in the Blockchain, not as a supportive framework that enhances the capabilities of the network, but as an active structural element, indispensable and necessary for its completion.
Journal Article
Research of A Macro Program for Bolt Hole Patterns Based on EXCEL
2020
EXCEL® is a Microsoft Office software product, which has excellent numerical and logic calculation and analysis functions. The method of programming a CNC macro program using EXCEL® is being presented in this paper for the first time. By defining the locations of a hole pattern geometrically, and simulating the programming of a macro, it can be demonstrated that a CNC program using macros is simple and easy to understand, and the program is flexible, generic and portable.
Journal Article
Exploring young consumers’ intention toward green products: applying an extended theory of planned behavior
by
Sophayo, Khamrang
,
Varah Franky
,
Pani Balaram
in
Consumers
,
Economic research
,
Empirical analysis
2021
The present study is an attempt to examine young consumers’ intention toward green products using an extended version of the theory of planned behavior (TPB), which incorporates willingness to pay premium and environmental concern. This study was tested empirically using survey data collected from 316 respondents in India and the data were analyzed using SPSS and STATA computer program. The empirical results suggested that extended version of the TPB influenced the intention of the young consumers’ toward green products. Further, all hypotheses were accepted and there is a strong correlation between the five examined factors in buying green products. In addition, the results also validated the appropriateness of the extended TPD for exploring young consumers’ toward green products. This study offers insights from the perspective of an emerging economy and future research directions on young consumers’ intention toward green products. Based on the results, future research directions are likewise discussed.
Journal Article
Detection, assessment and mitigation of vulnerabilities in open source dependencies
by
Sabetta Antonino
,
Plate Henrik
,
Ponta, Serena Elisa
in
Empirical analysis
,
Libraries
,
Open source software
2020
Open source software (OSS) libraries are widely used in the industry to speed up the development of software products. However, these libraries are subject to an ever-increasing number of vulnerabilities that are publicly disclosed. It is thus crucial for application developers to detect dependencies on vulnerable libraries in a timely manner, to precisely assess their impact, and to mitigate any potential risk. This paper presents a novel method to detect, assess and mitigate OSS vulnerabilities. Differently from state-of-the-art approaches that depend on metadata to identify vulnerable OSS dependencies, our solution is code-centric, and combines static and dynamic analyses to determine the reachability of the vulnerable portion of libraries, in the context of a given application. Our approach also supports developers in choosing among the existing non-vulnerable library versions, with the goal to determine and minimize incompatibilities. Eclipse Steady, the open source implementation of our code-centric and usage-based approach is the tool recommended to scan Java software products at SAP; it has been successfully used to perform more than one million scans of about 1500 applications. In this paper we report on the lessons learned when maturing the tool from a research prototype to an industrial-grade solution. To evaluate Eclipse Steady, we conducted an empirical study to compare its detection capabilities with those of OWASP Dependency Check (OWASP DC), scanning 300 large enterprise applications under development with a total of 78165 dependencies. Reviewing a sample of the findings reported only by one of the two tools revealed that all Steady findings are true positives, while 88.8% of the findings of OWASP DC for vulnerabilities covered by our code-centric approach are false positives. For vulnerabilities not caused by code but due, e.g., to erroneous configuration, 63.3% of OWASP DC findings are true positives.
Journal Article
The socioeconomic and environmental drivers of the COVID-19 pandemic
2021
In recent decades, there has been an intensification of the socioeconomic and environmental drivers of pandemics, including ecosystem conversion, meat consumption, urbanization, and connectivity among cities and countries. This paper reviews how these four systemic drivers help explain the dynamics of the COVID-19 pandemic and other recent emerging infectious diseases, and the policies that can be adopted to mitigate their risks. Land-use change and meat consumption increase the likelihood of pathogen spillover from animals to people. The risk that such zoonotic outbreaks will then spread to become pandemics is magnified by growing urban populations and the networks of trade and travel within and among countries. Zoonotic spillover can be mitigated through habitat protection and restrictions on the wildlife trade. Containing infectious disease spread requires a high degree of coordination among institutions across geographic jurisdictions and economic sectors, all backed by international investment and cooperation.
Journal Article