Sign in to get complete results and place requests.
Showing 1 - 20 results of 724 for search 'relations united states', query time: 0.14s Refine Results
  1. 1

    'The Bell curve' in perspective : race, meritocracy, inequality and politics / by Tucker, William H., 1940-

    Published 2024
    “…United States Race relations Political aspects History 20th century.…”
    Call Number: Located:
    Find It
    Online Book
  2. 2

    Metabolic syndrome : a comprehensive textbook /

    Published 2024
    Table of Contents: “…Intro -- Preface to the Second Edition -- Preface to the First Edition -- Acknowledgments -- Contents -- About the Editor -- Contributors -- Part I: Epidemiology -- 1 Overview of Metabolic Syndrome -- References -- 2 Obesity and Metabolic Syndrome in the United States -- Introduction -- Epidemiology of Obesity and Metabolic Syndrome in the United States -- Historical Trends in Obesity -- Current Obesity Burden -- Trends in Metabolic Syndrome -- Sociodemographic/Geographic Correlates -- Race/Ethnic Differences -- Environmental/Behavioral Factors -- Behavioral Factors -- Socioeconomic Factors…”
    Call Number: Located:
    Find It
    Online Book
  3. 3

    Spaceflight and the central nervous system : clinical and scientific aspects /

    Published 2023
    Table of Contents: “…Intro -- Contents -- 1: History of Spaceflight and the Central Nervous System -- Introduction -- Early Discoveries -- Early Rocket Science -- Early Space Exploration -- The Soviet Union -- The United States -- Early Space Stations -- International Cooperation -- Development of International Organizations -- The International Space Station -- History of Spaceflight Medicine -- Aerospace Medicine Organizations -- Initial Spaceflight Medical Problems -- Long-Duration Spaceflight -- Conclusion -- References -- 2: Cardiovascular Physiology and Fluid Shifts in Space…”
    Call Number: Located:
    Find It
    Online Book
  4. 4

    Innovations in signal processing and embedded systems : proceedings of ICISPES 2021 /

    Published 2023
    Table of Contents: “…2 Suggested FULL ADDER Unit -- 3 Simulation Setup -- 4 Simulation Results Assessment and Comparison -- 5 Conclusion -- References -- Double MAC Supported CNN Accelerator -- 1 Introduction -- 2 Existing System -- 2.1 CNN Accelerator -- 2.2 Related Work -- 3 Proposed System -- 3.1 Proposed Double MAC Architecture -- 3.2 SIMD Multiplication of Unsigned Numbers -- 3.3 Accumulation and Double MAC Architecture -- 4 CNN Accelerator Based on Double MAC -- 5 Results -- 5.1 Modified DSP Block with Double MAC -- 5.2 RTL Schematic of CNN Accelerator -- 5.3 Timing Report -- 6 Conclusion -- References…”
    Call Number: Located:
    Find It
    Online Conference Proceeding Book
  5. 5

    Entrepreneurial women in the Caribbean : critical insights and policy implications / by Esnard, Talia

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  6. 6

    Social work practice with fathers : engagement, assessment, and intervention /

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  7. 7

    Advancing the science of cancer in Latinos : building collaboration for action /

    Published 2023
    Call Number: Located:
    Find It
    Online Conference Proceeding Book
  8. 8

    SFPE guide to fire risk assessment : SFPE Task Group on Fire Risk Assessment /

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  9. 9
  10. 10

    Family literacy practices in Asian and Latinx families : educational and cultural considerations /

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  11. 11

    Disability in the workplace : a Caribbean perspective / by Stephenson, Jacqueline H.

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  12. 12
  13. 13

    Solid state theory. Volume 1, Basics : phonons and electrons in crystals / by Czycholl, Gerd

    Published 2023
    Table of Contents:
    Call Number: Located:
    Find It
    Online Book
  14. 14

    Countering cyberterrorism : the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity / by Montasari, Reza

    Published 2023
    Table of Contents: “…Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Governments Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .…”
    Call Number: Located:
    Find It
    Online Book
  15. 15

    China, Latin America, and the global economy : economic, historical, and national issues /

    Published 2023
    Call Number: Located:
    Find It
    Online Book
  16. 16

    Solar-terrestrial environmental prediction /

    Published 2023
    Table of Contents: “…2.1.3.2 GNSS Positioning Methods and Ionospheric Effects -- 2.1.3.3 GNSS Applications in Air Navigation -- 2.1.3.4 Occurrence Frequencies of Ionospheric Phenomena that Degrade Positioning Accuracy -- 2.2 Electric Power -- 2.2.1 Introduction -- 2.2.2 Impacts of GIC on High-Voltage Transmission Network -- 2.2.3 Prevention of Hazards Due to GIC -- 2.2.3.1 United States of America -- 2.2.3.2 Canada -- 2.2.3.3 United Kingdom -- 2.2.3.4 Finland -- 2.2.3.5 European Union -- 2.2.3.6 Australia -- 2.2.3.7 Japan -- 2.2.4 Causes of GIC -- 2.2.4.1 Sun -- 2.2.4.2 Solar Wind…”
    Call Number: Located:
    Find It
    Online Book
  17. 17

    Data Mining and Big Data : Seventh International Conference, DMBD 2022, Beijing, China, November 21-24, 2022, proceedings. Part II /

    Published 2023
    Table of Contents: “…Identification and Recognition Methods -- Complementary Convolutional Restricted Boltzmann Machine and Its Applications in Image Recognition -- Text-independent Speaker Identification Using a Single-scale SincNet-DCGAN Model -- Genome-wide Feature Selection of Robust mRNA Biomarkers for Body Fluid Identification -- HOS-YOLOv5: An Improved High-precision Remote Sensing Image Target Detection Algorithm Based on YOLOv5 -- A Multi-Module 3D U-Net Learning Architecture for Brain Tumor Segmentation -- Problems with Regression-line in Data-mining Applications and A Better Alternate Linear-model -- Research on Hot Spot Mining Technology for Network Public Opinion -- Research Hotspots, Emerging Trend and Front of Fraud Detection Rearch: A Scientometric Analysis (1984 - 2021) -- Optimization Methods -- An Algorithm of Set-Based Differential Evolution for Discrete Optimization Problem -- Multi-objective Optimization Technique for RSU Deployment -- Knowledge Learning-based Brain Storm Optimization Algorithm for Multimodal Optimization -- Market Investment Methods -- Non-Local Graph Aggregation for Diversified Stock Recommendation -- Novel Sentiment Analysis from Twitter for Stock Change Prediction -- A Novel Investment Strategy for Mixed Asset Allocation Based on Entropy-based Time Series Prediction -- A Novel Investment Strategy for Mixed Asset Allocation Based on Entropy-based Time Series Prediction -- Community Detection and Diagnosis Systems -- A Self-Adaptive Two-Stage Local Expansion Algorithm for Community Detection on Complex Networks -- Supervised Prototypical Variational Autoencdoer for Shilling Attack Detection in Recommender Systems -- Knowledge Graph based Chicken Disease Diagnosis Question Answering System -- Therapeutic effects of corticosteroids for critical and severe COVID-19 patients -- Big Data Analysis -- Secure Cross-User Fuzzy Deduplication for Images in Cloud Storage -- Blockchain-based Integrity Auditing with Secure Deduplication in Cloud Storage -- Name Disambiguation Based on Entity Relationship Graph in Big Data -- Ontology-based metadata model design of data governance system -- Ontology-based Combat Force Modeling and Its Intelligent Planning Using Genetic Algorithm -- Research on Multi-channel Retrieve Mechanism Based on Heuristic -- Big-Model Methods -- PoetryBERT: Pre-Training with Sememe Knowledge for Classical Chinese Poetry -- Image hide with Invertible Network and Swin Transformer -- Modeling and Analysis of Combat System Confrontation Based on Large-scale Knowledge Graph Network -- Generating Aversarial Exmaples and Other Applications -- Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN -- Defending Adversarial Examples by Negative Correlation Ensemble -- Accurate Decision-Making Method for Air Combat Pilots based on Data-Driven -- Establishment of Empirical Expression of Atmospheric Scattering Coefficient for Line-of-sight Ultraviolet Propagation in Coastal Area -- Deep Reinforcement Learning Approach -- Heterogeneous Multi-unit Control with Curriculum Learning for Multi-agent Reinforcement Learning -- A Deep Reinforcement Learning Approach for Cooperative Target Defense -- Particle Swarm Based Reinforcement Learning -- Users Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center -- SMPG: Adaptive Soft Update for Masked MADDPG -- Attentive Relational State Representation for Intelligent Joint Operation Simulation -- Graph Neural Networks -- Flow Prediction via Multi-view Spatial-temporal Graph Neural Network -- RotatSAGE: A Scalable Knowledge Graph Embedding Model based on Translation Assumptions and Graph Neural Networks -- Denoise Network Structure for User Alignment across Networks via Graph Structure Learning -- OLPGP: An optimized label propagation-based distributed graph partitioning algorithm -- Deep Neural Networks -- DRGS: Low-Precision Full Quantization of Deep Neural Network with Dynamic Rounding and Gradient Scaling for Object Detection -- Emotion Recognition Based on Multi-scale Convolutional Neural Network.…”
    Call Number: Located:
    Find It
    Online Conference Proceeding Book
  18. 18

    Data mining and big data : seventh International Conference, DMBD 2022, Beijing, China, November 21-24, 2022, proceedings. Part I /

    Published 2023
    Table of Contents: “…Deep Reinforcement Learning Approach -- Heterogeneous Multi-unit Control with Curriculum Learning for Multi-agent Reinforcement Learning -- A Deep Reinforcement Learning Approach for Cooperative Target Defense -- Particle Swarm Based Reinforcement Learning -- Users Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center. - SMPG: Adaptive Soft Update for Masked MADDPG -- Attentive Relational State Representation for Intelligent Joint Operation Simulation -- Graph Neural Networks -- Flow Prediction via Multi-view Spatial-temporal Graph Neural Network -- RotatSAGE: A Scalable Knowledge Graph Embedding Model based on Translation Assumptions and Graph Neural Networks -- Denoise Network Structure for User Alignment across Networks via Graph Structure Learning -- OLPGP: An optimized label propagation-based distributed graph partitioning algorithm -- Deep Neural Networks -- DRGS: Low-Precision Full Quantization of Deep Neural Network with Dynamic Rounding and Gradient Scaling for Object Detection -- Emotion Recognition Based on Multi-scale Convolutional Neural Network -- Pose Sequence Model Using the Encoder-decoder Structure for 3d Pose Estimation -- Research and Analysis of Video-Based Human Pose Estimation -- Action Recognition for Solo-militant Based on ResNet and Rule Matching -- Multiple Residual Quantization of Pruning -- Clustering Methods -- Deep Structured Graph Clustering Network -- Improved Clustering Strategies for Learning Style Identication in Massive Open Online Courses -- CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data -- Prediction Methods -- An Improved Multi-Source Spatiotemporal Data Fusion Model based on the Nearest Neighbor Grids for PM2.5 Concentration Interpolation and Prediction -- Study on the Prediction of Rice Noodle Raw Material Index Content by Deep Feature Fusion -- GAP: Goal-Aware Prediction with Hierarchical Interactive Representation for Vehicle Trajectory -- Multi-Cause Learning for Diagnosis Prediction -- Prediction of Postoperative Survival Level of Esophageal Cancer Patients Based on Kaplan-Meier(K-M) Survival Analysis and Gray Wolf Optimization (GWO)-BP Model -- Classification Methods -- Possibilistic Reject-Classication based on Contrastive Learning in Vector Quantization Networks -- A Classication Method for Imbalanced Data Based on Ant Lion Optimizer -- Learnable Relation With Triplet Formulation For Semi-supervised Medical Image Classication -- Multi-view Classication via Twin Projection Vector Machine with Application to EEG-based Driving Fatigue Detection -- An Interpretable Conditional Augmentation Classication Approach for Imbalanced EHRs Mortality Prediction -- Combining Statistical and Semantic Features For Trajectory Point Classication -- Identification and Recognition Methods -- Complementary Convolutional Restricted Boltzmann Machine and Its Applications in Image Recognition -- Text-independent Speaker Identication Using a Single-scale SincNet-DCGAN Model -- Genome-wide Feature Selection of Robust mRNA Biomarkers for Body Fluid Identication -- HOS-YOLOv5: An Improved High-precision Remote Sensing Image Target Detection Algorithm Based on YOLOv5 -- A Multi-Module 3D U-Net Learning Architecture for Brain Tumor Segmentation -- Problems with Regression-line in Data-mining Applications and A Better Alternate Linear-model -- Research on Hot Spot Mining Technology for Network Public Opinion -- Research Hotspots, Emerging Trend and Front of Fraud Detection Rearch: A Scientometric Analysis (1984 - 2021) -- Optimization Methods -- An Algorithm of Set-Based Dierential Evolution for Discrete Optimization Problem -- Multi-objective Optimization Technique for RSU Deployment -- Knowledge Learning-based Brain Storm Optimization Algorithm for Multimodal Optimization -- Market Investment Methods -- Non-Local Graph Aggregation for Diversied Stock Recommendation -- Novel Sentiment Analysis from Twitter for Stock Change Prediction -- A Novel Investment Strategy for Mixed Asset Allocation Based on Entropy-based Time Series Prediction -- The Framework of Hammer Credit Rating System for Enterprises in Capital Markets of China with International Standards -- Community Detection and Diagnosis Systems -- A Self-Adaptive Two-Stage Local Expansion Algorithm for Community Detection on Complex Networks -- Supervised Prototypical Variational Autoencdoer for Shilling Attack Detection in Recommender Systems -- Knowledge Graph based Chicken Disease Diagnosis Question Answering System -- Therapeutic eects of corticosteroids for critical and severe COVID-19 patients -- Big Data Analysis -- Secure Cross-User Fuzzy Deduplication for Images in Cloud Storage -- Blockchain-based Integrity Auditing with Secure Deduplication in Cloud Storage -- Name Disambiguation Based on Entity Relationship Graph in Big Data -- Ontology-based metadata model design of data governance system -- Ontology-based Combat Force Modeling and Its Intelligent Planning Using Genetic Algorithm -- Research on Multi-channel Retrieve Mechanism Based on Heuristic -- Big-Model Methods -- PoetryBERT: Pre-Training with Sememe Knowledge for Classical Chinese Poetry -- Image hide with Invertible Network and Swin Transformer -- Modeling and Analysis of Combat System Confrontation Based on Large-scale Knowledge Graph Network -- Generating Aversarial Exmaples and Other Applications -- Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN -- Defending Adversarial Examples by Negative Correlation Ensemble -- Accurate Decision-Making Method for Air Combat Pilots based on Data-Driven -- Establishment of Empirical Expression of Atmospheric Scattering Coecient for Line-of-sight Ultraviolet Propagation in Coastal Area.…”
    Call Number: Located:
    Find It
    Online Conference Proceeding Book
  19. 19

    Digital quantum information processing with continuous-variable systems / by Matsuura, Takaya

    Published 2023
    Table of Contents: “…Intro -- Supervisor's Foreword -- Preface -- List of Publications -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 Background of the Research -- 1.2 What is Studied in This Thesis -- 1.3 The Organization of This Thesis -- References -- 2 Preliminaries -- 2.1 The Basic Principles of Quantum Information Theory -- 2.1.1 Linear Operator and Quantum State -- 2.1.2 Quantum Operation and Quantum Channel -- 2.1.3 Quantum Measurement and Quantum Instrument -- 2.1.4 Qubit as an Information Unit -- 2.2 Measures for the Closeness of Quantum States -- 2.2.1 The Trace Norm and The Trace Distance…”
    Call Number: Located:
    Find It
    Online Book
  20. 20

    Placemaking and cultural landscapes /

    Published 2023
    Call Number: Located:
    Find It
    Online Book