Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
393,751 result(s) for "personal computers"
Sort by:
Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station
Non-predictive or inaccurate weather forecasting can severely impact the community of users such as farmers. Numerical weather prediction models run in major weather forecasting centers with several supercomputers to solve simultaneous complex nonlinear mathematical equations. Such models provide the medium-range weather forecasts, i.e., every 6 h up to 18 h with grid length of 10–20 km. However, farmers often depend on more detailed short-to medium-range forecasts with higher-resolution regional forecasting models. Therefore, this research aims to address this by developing and evaluating a lightweight and novel weather forecasting system, which consists of one or more local weather stations and state-of-the-art machine learning techniques for weather forecasting using time-series data from these weather stations. To this end, the system explores the state-of-the-art temporal convolutional network (TCN) and long short-term memory (LSTM) networks. Our experimental results show that the proposed model using TCN produces better forecasting compared to the LSTM and other classic machine learning approaches. The proposed model can be used as an efficient localized weather forecasting tool for the community of users, and it could be run on a stand-alone personal computer.
Scam me if you can : simple strategies to outsmart today's rip-off artists
\"Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks. Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life. As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: The best way to protect your phone from being hacked; The only time you should ever use a debit card; The one type of photo you should never post on social media; The only conditions under which you should use WiFi networks at the airport; The safest way to use an ATM. With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet\"-- Amazon.com.
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Although firms are expending substantial resources to develop technology and processes that can help safeguard the security of their computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. Unlike employees in a work setting, home users are not subject to training, nor are they protected by a technical staff dedicated to keeping security software and hardware current. Thus, with over one billion people with access to the Internet, individual home computer users represent a significant point of weakness in achieving the security of the cyber infrastructure. We study the phenomenon of conscientious cybercitizens, defined as individuals who are motivated to take the necessary precautions under their direct control to secure their own computer and the Internet in a home setting. Using a multidisciplinary, phased approach, we develop a conceptual model of the conscientious cybercitizen. We present results from two studies—a survey and an experiment—conducted to understand the drivers of intentions to perform security-related behavior, and the interventions that can positively influence these drivers. In the first study, we use protection motivation theory as the underlying conceptual foundation and extend the theory by drawing upon the public goods literature and the concept of psychological ownership. Results from a survey of 594 home computer users from a wide range of demographic and socioeconomic backgrounds suggest that a home computer user's intention to perform security-related behavior is influenced by a combination of cognitive, social, and psychological components. In the second study, we draw upon the concepts of goal framing and self-view to examine how the proximal drivers of intentions to perform security-related behavior identified in the first study can be influenced by appropriate messaging. An experiment with 101 subjects is used to test the research hypotheses. Overall, the two studies shed important new light on creating more conscientious cybercitizens. Theoretical and practical implications of the findings are discussed.
Gray day : my undercover mission to expose America's first cyber spy
\"A cybersecurity expert and former FBI 'ghost' tells the ... story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyberspy\"-- Provided by publisher.
Hardware implementation of pseudo-random number generators based on chaotic maps
We show the usefulness of bifurcation diagrams to implement a pseudo-random number generator (PRNG) based on chaotic maps. We provide details on the selection of the best parameter values to obtain high entropy and positive Lyapunov exponent from the bifurcation diagram of four chaotic maps, namely: Bernoulli shift map, tent, zigzag, and Borujeni maps. The binary sequences obtained from these maps are analyzed to implement a PRNG both in software and in hardware. The software implementation is realized using 32 and 64 bits microprocessor architectures, and with floating point and fixed point computer arithmetic. The hardware implementation is done by using a field-programmable gate array (FPGA) architecture. We developed a serial communication interface between the PRNG on the FPGA and a personal computer to obtain the generated sequences. We validate the randomness of the generated binary sequences with the NIST test suite 800-22-a both in floating point and fixed point arithmetic. At the end, we show that those chaotic maps are suitable to implement a PRNG but according to the hardware resources, the one based on the Bernoulli shift map is better. In addition, another advantage is that the required initial value for the sequences can be within the whole interval [ - 1 , 1 ] , including its bounds.
Emergency Response to Urban Flooding: An Assessment of Mitigation Performance and Cost-Effectiveness in Sponge City Construction
Extreme rainfall events have triggered urban flooding, posing substantial threats to urban sustainability and public safety. The effectiveness of sponge city initiatives in mitigating urban flooding has garnered considerable attention. This study developed a one-dimensional and two-dimensional urban flood model using the Storm Water Management Model (SWMM) and Personal Computer (PC) SWMM to simulate and analyze urban flooding under various rainfall recurrence intervals. The effectiveness of three Low Impact Development (LID) combinations for sponge city implementation was evaluated, and the associated construction costs were calculated. The results indicated that the LID combinations significantly reduced surface runoff and pipe overflow, with the runoff coefficient decreasing to as low as 19.01%. However, the improvement under extreme storm conditions was limited. Considering both urban flood mitigation and life cycle costs, a combination of permeable paving, green roofs, and rain gardens was identified as the most effective LID measure. This study aims to provide technical guidance for urban flood management and planning practices.
General mathematical model for energetic and informatic evaluated over natively producing surrounded systems
Some joint (synthetic) closed in itself idea about the world and its being is expounded in the paper, which gives the opportunity to invent the parallel definitions of the energy and the information not exceeding the bounds of the united world. This allows us to introduce some sufficiently general notion of the evaluated (over natively) producing (transmission stream conservatively-dynamic) surrounded system, described by the proper system of evolutional equations. In the capacity of important partial cases of such systems the proper notions of the energetic evaluated producing surrounded system and the informatic* evaluated producing surrounded system are introduced. The explicitly analyzed earlier examples of the model of heating stove (as the energetic evaluated producing surrounded system) and the model of personal computer (as the informatic evaluated producing surrounded system) expose the applicability of proposed idea to a generalized and formalized description of some wide class of over native systems really existing.
Limited Information and Advertising in the U.S. Personal Computer Industry
Traditional discrete-choice models assume buyers are aware of all products for sale. In markets where products change rapidly, the full information assumption is untenable. I present a discrete-choice model of limited consumer information, where advertising influences the set of products from which consumers choose to purchase. I apply the model to the U.S. personal computer market where top firms spend over $2 billion annually on advertising. I find estimated markups of 19% over production costs, where top firms advertise more than average and earn higher than average markups. High markups are explained to a large extent by informational asymmetries across consumers, where full information models predict markups of one-fourth the magnitude. I find that estimated product demand curves are biased toward being too elastic under traditional models. I show how to use data on media exposure to improve estimated price elasticities in the absence of micro ad data.
Quantifying the carbon footprint reduction potential of lifestyle choices in Japan
Numerous studies have investigated the hotspots for reducing carbon emissions associated with household consumption, including reducing household carbon footprints (CFs) and greener lifestyle choices, such as living car-free, eating less meat, and having one less child. However, estimating the effect of each of these actions requires the simultaneous consideration of lifestyle choices and household characteristics that could also affect the household CF. Here, we quantify the reduction in household CFs for 25 factors associated with individual lifestyle choices or socioeconomic characteristics. This study linked approximately 42 000 microdata on consumption expenditure with the Japanese subnational 47 prefecture-level multi-regional input–output table, which are both the finest-scale data currently available. We improved the accuracy of household CF calculations by considering regional heterogeneity, and successfully estimated the magnitude of household CF reduction associated with individual lifestyle choices and socioeconomics. For example, it was found that moving from a cold region to a region with mild climate would have considerable potential for reducing the CO 2 emissions of a household, all other factors being equal. In addition, a household residing in a house that meets the most recent energy standards emits 1150 kg less CO 2 per year than if they reside in a house that meets previous energy standards. Ownership and use of durable goods also had the potential for reducing the CO 2 emissions of a household; a normal-sized car, a personal computer, a compact car, and a bidet were associated with CO 2 emissions of 922, 712, 421, and 345 kg per year, respectively. The findings therefore have important implications for climate change mitigation and policy measures associated with lifestyle.