Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

86 results (0,21761 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Privacy and Security for Mobile Crowdsourcing

Security Architecture – How & Why

Security Architecture – How & Why

Security Architecture or Enterprise Information security architecture as it was originally coined by Gartner back in 2006 has been applied to many things and different areas making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons not least because having an architecture makes working with cyber security a much easier job since we can now build on a hopefully solid foundation. Developing a security architecture is a daunting job for almost anyone and in a company that has not had a cyber security program implemented before the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone it absolutely must be aligned with the business in which it is being implemented. This book emphasizes the importance and the benefits of having a security architecture in place. The book will be aligned with most of the sub-frameworks in the general framework called SABSA or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills SABSA as a framework focuses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA the components will be described along with the introduction to each of the chapters. | Security Architecture – How & Why

GBP 94.99
1

Cryptography and Network Security

Explainable Artificial Intelligence for Biomedical Applications

Explainable Artificial Intelligence for Biomedical Applications

Since its first appearance artificial intelligence has been ensuring revolutionary outcomes in the context of real-world problems. At this point it has strong relations with biomedical and today’s intelligent systems compete with human capabilities in medical tasks. However advanced use of artificial intelligence causes intelligent systems to be black-box. That situation is not good for building trustworthy intelligent systems in medical applications. For a remarkable amount of time researchers have tried to solve the black-box issue by using modular additions which have led to the rise of the term: interpretable artificial intelligence. As the literature matured (as a result of in particular deep learning) that term transformed into explainable artificial intelligence (XAI). This book provides an essential edited work regarding the latest advancements in explainable artificial intelligence (XAI) for biomedical applications. It includes not only introductive perspectives but also applied touches and discussions regarding critical problems as well as future insights. Topics discussed in the book include: XAI for the applications with medical images XAI use cases for alternative medical data/task Different XAI methods for biomedical applications Reviews for the XAI research for critical biomedical problems. Explainable Artificial Intelligence for Biomedical Applications is ideal for academicians researchers students engineers and experts from the fields of computer science biomedical medical and health sciences. It also welcomes all readers of different fields to be informed about use cases of XAI in black-box artificial intelligence. In this sense the book can be used for both teaching and reference source purposes.

GBP 110.00
1

Cyber Resilience

Cyber Resilience

Modern cyber systems acquire more emergent system properties as far as their complexity increases: cyber resilience controllability self-organization proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system especially during the transition to the sixth technological stage and related Industry 4. 0 technologies: Artificial Intelligence (AI) Cloud and foggy computing 5G + IoT/IIoT Big Data and ETL Q-computing Blockchain VR/AR etc. We should even consider the cyber resilience as a primary one because the mentioned systems cannot exist without it. Indeed without the sustainable formation made of the interconnected components of the critical information infrastructure it does not make sense to discuss the existence of 4. 0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4. 0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity a potential danger of existing vulnerabilities and “sleep” hardware and software tabs as well as an inadequate efficiency of modern models methods and tools to ensure cyber security reliability response and recovery.

GBP 39.99
1

Plan for a Turbulent Future Your Roadmap to Personal Resilience for a Changing Climate

FM-UWB Transceivers for Autonomous Wireless Systems

Multirate Signal Processing for Communication Systems

Multirate Signal Processing for Communication Systems

Multirate Signal processing can improve system performance and reduce costs in applications ranging from laboratory instruments cable modems wireless systems satellites Radar Sonar and consumer entertainment products. This second edition continues to offer a systematic clear and intuitive introduction to multirate signal processing for working engineers and system designers. Significant new material and fresh concepts including Green Signal Processing techniques have been introduced. The author uses extensive examples and figures to illustrate a wide range of multirate techniques from basic resampling to leading-edge cascade and multi-stage filter structures. Along the way he draws on extensive research and consulting experience to introduce processing “tricks” shown to maximize performance and efficiency. Coverage includes:• Effect of sampling and resampling in time and frequency domains• Relationships between FIR filter specifications and filter length (# of taps)• Window design and equal-ripple (Remez) design techniques• Square-Root Nyquist and Half-band Filters including new enhancements• Polyphase FIR filters: up-sampling down-sampling• Polyphase M-path analysis and synthesis channelizers and cascade pairs• Polyphase interpolators for arbitrary sample rate changes• Dyadic half-band filters quadrature mirror filters• Channel banks for multiple arbitrary bandwidths and center frequencies • Comprehensive coverage of recursive all-pass filters and channelizers non-uniform and uniform phase mixed recursive and non-recursive• Comparisons with traditional DSP designs• Extensive applications coverage throughout | Multirate Signal Processing for Communication Systems

GBP 94.99
1

Challenges in Cybersecurity and Privacy - the European Research Landscape

Challenges in Cybersecurity and Privacy - the European Research Landscape

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

GBP 89.99
1

Photonic Interconnects for Computing Systems Understanding and Pushing Design Challenges

Photonic Interconnects for Computing Systems Understanding and Pushing Design Challenges

In recent years there has been a considerable amount of effort both in industry and academia focusing on the design implementation performance analysis evaluation and prediction of silicon photonic interconnects for inter- and intra-chip communication paving the way for the design and dimensioning of the next and future generation of high-performance computing systems. Photonic Interconnects for Computing Systems provides a comprehensive overview of the current state-of-the-art technology and research achievements in employing silicon photonics for interconnection networks and high-performance computing summarizing main opportunities and some challenges. The majority of the chapters were collected from presentations made at the International Workshop on Optical/Photonic Interconnects for Computing Systems (OPTICS) held over the past two years. The workshop invites internationally recognized speakers on the range of topics relevant to silicon photonics and computing systems. Technical topics discussed in the book include:Design and Implementation of Chip-Scale Photonic Interconnects;Developing Design Automation Solutions for Chip-Scale Photonic Interconnects;Design Space Exploration in Chip-Scale Photonic Interconnects;Thermal Analysis and Modeling in Photonic Interconnects;Design for Reliability;Fabrication Non-Uniformity in Photonic Interconnects;Photonic Interconnects for Computing Systems presents a compilation of outstanding contributions from leading research groups in the field. It presents a comprehensive overview of the design advantages challenges and requirements of photonic interconnects for computing systems. The selected contributions present important discussions and approaches related to the design and development of novel photonic interconnect architectures as well as various design solutions to improve the performance of such systems while considering different challenges. The book is ideal for personnel in computer/photonic industries as well as academic staff and master/graduate students in computer science and engineering electronic engineering electrical engineering and photonics. | Photonic Interconnects for Computing Systems Understanding and Pushing Design Challenges

GBP 79.99
1

A Holter for Parkinson’s Disease Motor Symptoms: STAT-On

A Holter for Parkinson’s Disease Motor Symptoms: STAT-On

A new information and communication technology (ICT) has been deployed in the battle against Parkinson’s disease a neurodegenerative disorder that is both progressive and disabling with significant impact on quality of life. This book explains the experience following from the achieved results in the REMPARK project on Parkinson’s disease management up to the launch of a new medical product to the European market STAT-ON™. The new medical device STAT-ON™ is a real Holter for the motor symptoms associated to PD. It provides objective information about the severity and distribution of PD motor symptoms and their fluctuations in daily life allowing for an unbiased and correct monitoring of the patient. This real-time remote monitoring solution gives additional information to neurologists opening up new possibilities for more effective treatment more accurate control in clinical trials and for early detection of motor complications. The number of PD patients is continuously rising adding complexity especially in the management at the level of public health. It is an incurable disease with a symptomatic treatment that tries to alleviate the associated symptoms through a correct adjustment of the medication. For this reason it is also very important to be aware of changes in the manifestation of the symptoms which may indicate the need for an adjustment or even a change in the therapy strategy. The intensive complementary use of STAT-ON™ by neurologists health professionals and researchers will increase the independence and quality of life of patients improving their disease management and contributing to a deeper understanding of the nature of the disease. The Open Access version of this book available at http://www. taylorfrancis. com has been made available under a Creative Commons [Attribution-Non-Commercial (CC-BY-NC)] 4. 0 license. | A Holter for Parkinson’s Disease Motor Symptoms: STAT-On™

GBP 94.99
1

ICML 55.2 – Guideline for the Optimized Lubrication of Mechanical Physical Assets

Energy Project Financing Resources and Strategies for Success

Electrical Engineering for Non-Electrical Engineers

Dielectric Materials for Energy Storage and Energy Harvesting Devices

ICML 55.1 – Requirements for the Optimized Lubrication of Mechanical Physical Assets

Solutions Manual for the Guide to Energy Management

Smart Antennas Electromagnetic Interference and Microwave Antennas for Wireless Communications

Machine Learning for Healthcare Systems Foundations and Applications

Machine Learning for Healthcare Systems Foundations and Applications

The introduction of digital technology in the healthcare industry is marked by ongoing difficulties with implementation and use. Slow progress has been made in unifying different healthcare systems and much of the world still lacks a fully integrated healthcare system. The intrinsic complexity and development of human biology as well as the differences across patients have repeatedly demonstrated the significance of the human element in the diagnosis and treatment of illnesses. But as digital technology develops healthcare providers will undoubtedly need to use it more and more to give patients the best treatment possible. The extensive use of machine learning in numerous industries including healthcare has been made possible by advancements in data technologies including storage capacity processing capability and data transit speeds. The need for a personalized medicine or precision medicine approach to healthcare has been highlighted by current trends in medicine due to the complexity of providing effective healthcare to each individual. Personalized medicine aims to identify forecast and analyze diagnostic decisions using vast volumes of healthcare data so that doctors may then apply them to each unique patient. These data may include but are not limited to information on a person’s genes or family history medical imaging data drug combinations patient health outcomes at the community level and natural language processing of pre-existing medical documentation. This book provides various insights into machine learning techniques in healthcare system data and its analysis. Recent technological advancements in the healthcare system represent cutting-edge innovations and global research successes in performance modelling analysis and applications. | Machine Learning for Healthcare Systems Foundations and Applications

GBP 99.99
1

Coiled Tubing and Other Stimulation Techniques Formation Damage Well Stimulation Techniques for Production Enhancement

Coiled Tubing and Other Stimulation Techniques Formation Damage Well Stimulation Techniques for Production Enhancement

Good engineers never stop looking for opportunities to improve the performance of their production systems. Performance enhancement methods are always carefully examined and production data is analyzed in order to identify determining factors affecting performance. The two main activities of the production engineer in the petroleum and related industries are reservoir stimulation and artificial lift. The classic solution to maximizing a well's productivity is to stimulate it. The basis for selecting stimulation candidates should be a review of the well's actual and theoretical IPR. Low permeability wells often need fracturing on initial completion. In low permeability zones additional post stimulation production can be significant to the economics however the production engineer needs to make management aware of the true long term potential or else overly optimistic projections can easily be made. The main purpose of stimulation is to enhance the property value by the faster delivery of the petroleum fluid and/or to increase ultimate economic recovery. The aim of reservoir stimulation is to bypass near-wellbore damage and return a well to its “natural” productivity / injectivity to extend a conductive path deep into a formation and thus increase productivity beyond the natural level and to produce hydrocarbon from tight formation. The importance of reservoir stimulation is increasing due to following reasons: • Hydrocarbon fields in their mid-life• Production in these fields are in declining trend• The thrust area: Enhancement of productionHence to improve productivity of the well matrix stimulation and hydraulic fracturing are intended to remedy or even improve the natural connection of the wellbore with the reservoir which could delay the need for artificial lift. This book presents procedures taken in the Oil & Gas Industry for identifying well problems and it suggests means of solving problems with the help of the Coil Tube unit which is used for improving well productivity and techniques like Acidizing and Hydraulic Fracturing. | Coiled Tubing and Other Stimulation Techniques Formation Damage Well Stimulation Techniques for Production Enhancement

GBP 94.99
1

Direct Nerve Stimulation for Induction of Sensation and Treatment of Phantom Limb Pain

Energy Calculations and Problem Solving Sourcebook A Practical Guide for the Certified Energy Manager Exam

Introduction to Blockchain Technology

6G Visions for a Sustainable and People-centric Future From Communications to Services the CONASENSE Perspective

6G Visions for a Sustainable and People-centric Future From Communications to Services the CONASENSE Perspective

6G is currently under definition being often addressed from a plain telecommunications perspective as an evolutionary paradigm that represents an extension of 5G. Having as a horizon 2030 6G initiatives are being deployed across the globe to further ignite the development of 6G services. At its philosophical core 6G embodies the human in the loop principle. The research effort being developed towards 6G requires an interdisciplinary approach that ignites discussion across different key technological sectors ranging from communications up to services and business cases. The contributions of this book to research in the field concern an evolutionary and interdisciplinary design of 6G as a paradigm that can be addressed by working together four different computational areas: communications; satellites and navigation; sensing; services. The book is derived from initial brainstorming that was developed during the 11th CONASENSE Symposium held in October 2021 in fortiss Munich Germany. Several international experts contribute to an overview of 6G key challenges new networking trends and challenges to be overcome and advanced 6G services. The book starts with a perspective on 6G challenges and use-cases beyond the 2030 horizon to then continue to address the role of non-terrestrial networks and cognitive service-centric satellite networks in future 6G services. Still with focus on 6G adaptive networking the book continues with a debate on the need to integrate social awareness based on an interdisciplinary approach in network operations. Then specific examples of advanced services (quantum imaging and holography; localization of the Internet of remote things) are discussed. The book is therefore intended to assist in developing critical thinking to back up novel networking applications and services towards 6G. | 6G Visions for a Sustainable and People-centric Future From Communications to Services the CONASENSE Perspective

GBP 94.99
1