Strona Główna » Materiały dla 12.09.2022 » Strona 19

Lean Supply Chain Management in Fashion and Textile Industry (Textile Science and Clothing Technology)

Lean Supply Chain Management in Fashion and Textile Industry (Textile Science and Clothing Technology)
English | 2022 | ISBN: 9811921075 | 321 pages | True PDF EPUB | 34.23 MB
This book highlights the concepts of lean manufacturing that help to achieve the objectives of sustainability in a global competitive atmosphere. Lean can help to lower the manufacturing cost in the rising labour and material cost market. Lean is based on various fundamental concepts such as Kaizen, Kanban, Zidoka, 5S and Six Sigma, which aim at reducing process waste for efficiency and productivity that are discussed in this book. In addition, the technological changes such as introduction of Internet technologies and Industry 4.0 are taken care by the lean concepts, which are also addressed in this book.

Czytaj więcej

Layout Techniques for Integrated Circuit Designers

Layout Techniques for Integrated Circuit Designers
English | 2022 | ISBN: 978-1630819101 | 355 pages | True PDF | 15.53 MB
This book provides complete step-by-step guidance on the physical implementation of modern integrated circuits, showing you their limitations and guiding you through their common remedies. The book describes today's manufacturing techniques and how they impact design rules. You will understand how to build common high frequency devices such as inductors, capacitors and T-coils, and will also learn strategies for dealing with high-speed routing both on package level and on-chip applications. Numerous algorithms implemented in Python are provided to guide you through how extraction, netlist comparison and design rule checkers can be built. The book also helps you unravel complexities that effect circuit design, including signal integrity, matching, IR drop, parasitic impedance and more, saving you time in addressing these effects directly. You will also find detailed descriptions of software tools used to analyze a layout database, showing you how devices can be recognized and connectivity accurately assessed. The book removes much of fog that often hides the inner workings of layout related software tools and helps you better understand: the physics of advanced nodes, high speed techniques used in modern integrated technologies, and the inner working of software used to analyze layout databases. This is an excellent resource for circuit designers implementing a schematic in a layout database, especially those involved in deep submicron designs, as well as layout designers wishing to deepen their understanding of modern layout rules.

Czytaj więcej

Islam & Economics Shah Wali-Allah's Approach

Islam & Economics Shah Wali-Allah's Approach
English | 2022 | ISBN: 0860378519 | 355 pages | True EPUB | 5.6 MB
Shah Wali-Allah was a great sufi scholar born in the Indian Sub-Continent in the 1700's. He had a deep understanding of Qur'an, Hadith and Fiqh. This book is unique as it focussing on Shah Wali-Allah's thought from an economic perspective. Chapters discuss his economic ideas, his contribution to Tadbir al-Manzil (household management), money and interest, as well as public finance and socio-economic development.

Czytaj więcej

IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools

IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools
English | 2022 | ISBN: 3031084799 | 142 pages | True PDF EPUB | 17.16 MB
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation.

Czytaj więcej

Introduction to Network of Networks

Introduction to Network of Networks
English | 2022 | ISBN: 0750310472 | 176 pages | True PDF EPUB MOBI | 62.56 MB
The interdisciplinary field of network science has attracted enormous attention in recent years, although most results in the field have been obtained by analysing isolated networks. However, many real-world networks do interact with and depend on other networks. In such a network of interacting networks, the system displays surprising and rich behaviour where the failure of nodes in one network may lead to the failure of dependent nodes in other networks. This may happen recursively and can lead to a cascade of failures. In fact, a failure of a very small fraction of nodes in one network may lead to the complete fragmentation of a system of several interdependent networks. Such networks of networks are common and diverse critical infrastructures are frequently coupled together, including systems such as water, food and fuel supply, communications, financial markets and power supply. Different systems in our body, the brain, the respiratory and cardiac systems etc, regularly interact and are interdependent on each other. Moreover, social networks, such as Facebook and Twitter, which play an important role in our life, connect us to a huge system of interacting networks. Thus, understanding network of networks is important for many disciplines and has real-world applications. This book will be the first to discuss this new developing and exciting topic – robustness of network of networks – which can be regarded as a second revolution in network science and will be essential reading for a wide range of physicists, mathematicians, computer scientists, biologists, engineers and social scientists. It is expected to help both students and researchers in the network science field to discover the new fascinating phenomenon in the emerging field of network of networks.

Czytaj więcej

Introduction to Machine Learning with Applications in Information Security, 2nd Edition

Introduction to Machine Learning with Applications in Information Security, 2nd Edition
English | 2023 | ISBN: 1032204923 | 549 pages | True PDF EPUB | 332.41 MB
Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book. Instructor resources, including PowerPoint slides, lecture videos, and other relevant material are provided on an accompanying website:http://www.cs.sjsu.edu/˜stamp/ML/.

Czytaj więcej
strzałka do góry