Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

994 tulosta hakusanalla Geetha Iyer

Cyber c und Ermittlungen - Ausgabe 2

Cyber c und Ermittlungen - Ausgabe 2

Rajapraveen K N; Geetha G; Santha Kumar

Verlag Unser Wissen
2023
pokkari
Computerforensik ist die Anwendung von Untersuchungs- und Analysetechniken, um Beweise von einem bestimmten Computerger t so zu sammeln und zu sichern, dass sie vor Gericht vorgelegt werden k nnen. Ziel der Computerforensik ist es, eine strukturierte Untersuchung durchzuf hren und eine dokumentierte Beweiskette zu f hren, um herauszufinden, was genau auf einem Computerger t passiert ist und wer daf r verantwortlich war.
Cyberc et enquête - édition 2

Cyberc et enquête - édition 2

Rajapraveen K N; Geetha G; Santha Kumar

Editions Notre Savoir
2023
pokkari
L'informatique l gale est l'application de techniques d'investigation et d'analyse visant rassembler et pr server les preuves provenant d'un appareil informatique particulier de mani re ce qu'elles puissent tre pr sent es devant un tribunal. L'objectif de l'informatique l gale est de mener une enqu te structur e et de maintenir une cha ne de preuves document e afin de d couvrir exactement ce qui s'est pass sur un appareil informatique et qui en est responsable.
Cyber c e investigazione - Edizione 2

Cyber c e investigazione - Edizione 2

Rajapraveen K N; Geetha G; Santha Kumar

Edizioni Sapienza
2023
pokkari
La computer forensics l'applicazione di tecniche di indagine e analisi per raccogliere e conservare le prove di un particolare dispositivo informatico in modo da poterle presentare in tribunale. L'obiettivo della computer forensics quello di eseguire un'indagine strutturata e di mantenere una catena documentata di prove per scoprire esattamente cosa successo su un dispositivo informatico e chi ne responsabile.
Cyber c e Investigação - Condição 2

Cyber c e Investigação - Condição 2

Rajapraveen K N; Geetha G; Santha Kumar

Edicoes Nosso Conhecimento
2023
pokkari
A per cia inform tica a aplica o de t cnicas de investiga o e an lise para recolher e preservar provas de um determinado dispositivo inform tico de uma forma que seja adequada para apresenta o em tribunal. O objectivo da per cia inform tica realizar uma investiga o estruturada e manter uma cadeia documentada de provas para descobrir exactamente o que aconteceu num dispositivo inform tico e quem foi respons vel por ele.
Quality of Work Life

Quality of Work Life

Y Benazir; K Geetha

Lap Lambert Academic Publishing
2023
pokkari
"A STUDY ON QUALITY OF WORK LIFE OF EMPLOYEES" has been conducted with an objective to understand the negative factors that prevented employees form enjoying a better quality of work life and to identify the factors that contributed to the employees' quality of work life.The analysis is mainly based on the primary data that is with help of structured questionnaire. The researcher has taken a census sampling of 143 respondents.The researcher has used simple percentage analysis, chi-square test, for this analysis and the findings of the research showed that majority of the respondents are satisfied with the quality of work life. This can be maintained by providing a better quality of work life which is now present in the company except for a few barriers that are sound. Based on the findings, the researcher has made suggestion to the management to maintain quality of work life.
Cyber c and Investigation-Edition 2

Cyber c and Investigation-Edition 2

Rajapraveen K N; Geetha G; Santha Kumar

Lap Lambert Academic Publishing
2023
pokkari
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Ein Mechanismus zur Bestimmung eines Wechselkurssystems

Ein Mechanismus zur Bestimmung eines Wechselkurssystems

Yet Huat Sam; Caroline Geetha A/P Arokiadasan; Vivin Vincent Chandran A/L Munusamy

Verlag Unser Wissen
2023
pokkari
Die Debatte ber die Rechtfertigung des Regimewechsels im Jahr 2005, der die Aufgabe des Systems fester Wechselkurse in Malaysia beinhaltet, ist noch nicht abgeschlossen. Daher wurden in dieser Studie eine Reihe konometrischer Methoden vorgeschlagen, um die Eignung des Wechselkurssystems zu untersuchen, das im Kontext von Malaysia und den ASEAN-L ndern umgesetzt wird. Die Ergebnisse der Studie unterst tzen die Theorie des optimalen W hrungsraums. Dieses Buch hat eine Reihe von empirischen Methoden vorgeschlagen, die politischen Entscheidungstr gern als Leitfaden f r die Bestimmung eines geeigneten Wechselkurssystems in einem Land dienen.
Un meccanismo per determinare il regime di cambio

Un meccanismo per determinare il regime di cambio

Yet Huat Sam; Caroline Geetha A/P Arokiadasan; Vivin Vincent Chandran A/L Munusamy

Edizioni Sapienza
2023
pokkari
Il dibattito sulla giustificazione del cambio di regime del 2005, che ha comportato l'abbandono del regime di cambio fisso in Malaysia, non ancora stato risolto. Pertanto, in questo studio sono stati proposti una serie di metodi econometrici per esaminare l'adeguatezza del regime di cambio che si sta attuando nel contesto della Malesia e dei Paesi ASEAN. I risultati dello studio supportano la teoria dell'area valutaria ottimale. Questo libro ha proposto una sequenza di metodologie empiriche che hanno fornito una linea guida per i policy maker su come prendere una decisione sulla determinazione di un regime di cambio adeguato in una nazione.
Um mecanismo para determinar um regime de taxa de câmbio

Um mecanismo para determinar um regime de taxa de câmbio

Yet Huat Sam; Caroline Geetha A/P Arokiadasan; Vivin Vincent Chandran A/L Munusamy

Edicoes Nosso Conhecimento
2023
pokkari
O debate sobre a justifica o da mudan a de regime em 2005, que envolve o abandono do regime de taxa de c mbio fixa na Mal sia, ainda n o foi resolvido. Assim, neste estudo, foi proposta uma s rie de m todos econom tricos para examinar a adequa o do regime cambial que est a ser implementado no contexto da Mal sia e dos pa ses da ASEAN. Os resultados do estudo apoiaram a teoria da rea Monet ria ptima. Este livro prop s uma sequ ncia de metodologia emp rica que fornece orienta es aos decisores pol ticos sobre a forma de tomar uma decis o sobre a determina o de um regime de taxas de c mbio adequado numa na o.
Outlier Detection using Soft Computing Techniques

Outlier Detection using Soft Computing Techniques

T Sangeetha; Geetha Mary Amalanathan

Lap Lambert Academic Publishing
2024
pokkari
With the growth of the digital era, data is largely available, so knowledge retrieval from those data is done by data mining algorithms. Among various data mining algorithms, finding outliers is crucial as their occurrence degrades system efficiency. The majority of the research was limited to detecting outliers in a single universe with a single granulation for numerical or categorical data. The existing machine learning outlier detection algorithms work well for quantitative data but they are not directly applied to qualitative, vague and imprecise data which produces ineffective results. There is also ambiguous, uncertain, incomplete, and indeterminate information that persists in this real world. These problems are handled in this research work using rough set theory, intuitionistic fuzzy, and neutrosophic sets. The proposed methodology rough entropy based weighted density outlier detection method has been designed to detect outliers for various information systems. The weighted density value for each object and attribute has been determined to detect outliers. So a true object will never be treated as an outlier.
New Age Master Data Management in Synergy with Big Data Analytics

New Age Master Data Management in Synergy with Big Data Analytics

Venkatram Kari; Geetha Mary Amalanathan

Lap Lambert Academic Publishing
2024
pokkari
In this digital transformation era, data is growing exponentially due to substantial online transactions and the internet of things, etc. As data is growing, it needs efficient data management and scalable storage mechanisms to deal with the vast data that is generated. Now plenty of tools, technologies, and frameworks are available that can handle this kind of Big Data scenario with distributed systems that can scale horizontally on the cloud platforms. Master Data Management (MDM) is a technology-enabled discipline in which the information technologies team works closely with business teams to ensure data accountability to achieve uniformity, accuracy, consistency, a single source of truth, etc. Current MDM systems cannot address quality-related issues such as reliable, real-time data synchronization, deduplication, entity resolution, etc., due to multi-folded data growth. The following four major gaps from the above quality barriers can be drawn as gaps in the research and have been addressed in this book. - Unclear master data definition- Lack of responsibilities in data maintenance- Inaccurate data matching- Immature data deduplication process.
Posterior Composite Resins

Posterior Composite Resins

Ranjini M a; Geetha V; Vedavathi B

Lap Lambert Academic Publishing
2024
pokkari
Dental composite resins have advanced tremendously to become the most preferred material for direct restorations in both anterior and posterior teeth. The advances in material sciences and adhesive dentistry along with the increasing patient demand for tooth-colored restorations have made dental composite resin the material of choice for restoration of carious lesions. The wide range of viscosities, colors, shades, translucencies, opacities, fluorescence, etc., available with the present generation of composite resins has enabled the clinician to provide a restoration that mimics natural tooth structure and optimizes function as well.
Essential Periodontal Instruments

Essential Periodontal Instruments

Nafisa Najiar; Geetha K Bhat

Lap Lambert Academic Publishing
2024
pokkari
Periodontal instruments are essential tools used to treat and manage periodontal diseases by addressing local factors and diseased tissue around the teeth. Effective treatment relies on using specialized instruments to remove calculus, plane root surfaces, and eliminate diseased tissue. This book provides a comprehensive guide to various periodontal instruments, including ultrasonic devices, sickles, hoes, chisels, and curettes. It covers the importance of understanding instrument design-such as the cutting edge, ergonomic handles, and balanced instruments-to improve clinical outcomes. The book outlines the parts of instruments, their design influences, and maintenance tips, enhancing clinician skills and patient care. It also discusses the history, classification, and advancements in periodontal instruments, including future prospects like computer-assisted imaging and robotics. By mastering the use and maintenance of these tools, clinicians can enhance their efficiency and the quality of patient treatment.
Erkennung von Ausreißern mit Soft-Computing-Techniken

Erkennung von Ausreißern mit Soft-Computing-Techniken

T Sangeetha; Geetha Mary Amalanathan

Verlag Unser Wissen
2024
pokkari
Mit dem Wachstum des digitalen Zeitalters sind Daten in gro em Umfang verf gbar, so dass das Abrufen von Wissen aus diesen Daten durch Data-Mining-Algorithmen erfolgt. Unter den verschiedenen Data-Mining-Algorithmen ist die Erkennung von Ausrei ern von entscheidender Bedeutung, da ihr Auftreten die Effizienz des Systems beeintr chtigt. Die meisten Forschungsarbeiten beschr nken sich auf die Erkennung von Ausrei ern in einem einzigen Universum mit einer einzigen Granulation f r numerische oder kategoriale Daten. Die vorhandenen Algorithmen zur Erkennung von Ausrei ern durch maschinelles Lernen funktionieren gut bei quantitativen Daten, lassen sich aber nicht direkt auf qualitative, vage und ungenaue Daten anwenden, was zu ineffektiven Ergebnissen f hrt. In der realen Welt gibt es auch mehrdeutige, unsichere, unvollst ndige und unbestimmte Informationen . Diese Probleme werden in dieser Forschungsarbeit mit Hilfe der Theorie der groben Mengen, der intuitionistischen Fuzzy-Mengen und der neutrosophischen Mengen behandelt . Die vorgeschlagene Methode zur Erkennung von Ausrei ern auf der Grundlage von grober Entropie und gewichteter Dichte wurde entwickelt, um Ausrei er in verschiedenen Informationssystemen zu erkennen . Der gewichtete Dichtewert f r jedes Objekt und jedes Attribut wurde bestimmt, um Ausrei er zu erkennen. So wird ein echtes Objekt niemals als Ausrei erbehandelt.
Détection des valeurs aberrantes à l'aide de techniques informatiques douces

Détection des valeurs aberrantes à l'aide de techniques informatiques douces

T Sangeetha; Geetha Mary Amalanathan

Editions Notre Savoir
2024
pokkari
Avec la croissance de l' re num rique, les donn es sont largement disponibles, de sorte que la recherche de connaissances partir de ces donn es est effectu e par des algorithmes d'exploration de donn es. Parmi les diff rents algorithmes d'exploration de donn es, la d tection des valeurs aberrantes est cruciale, car leur pr sence d grade l'efficacit du syst me. La majorit des recherches se sont limit es la d tection des valeurs aberrantes dans un seul univers avec une seule granulation pour les donn es num riques ou cat gorielles. Les algorithmes existants de d tection des valeurs aberrantes par apprentissage automatique fonctionnent bien pour les donn es quantitatives, mais ils ne sont pas directement appliqu s aux donn es qualitatives, vagues et impr cises, ce qui produit des r sultats inefficaces. Il existe galement des informations ambigu s, incertaines, incompl tes et ind termin es qui persistent dans le monde r el. Ces probl mes sont trait s dans ce travail de recherche l'aide de la th orie des ensembles rugueux, des ensembles flous intuitionnistes et des ensembles neutrosophiques. La m thodologie propos e, la m thode de d tection des valeurs aberrantes densit pond r e bas e sur l'entropie grossi re, a t con ue pour d tecter les valeurs aberrantes dans divers syst mes d'information.
Rilevamento dei valori anomali mediante tecniche di soft computing

Rilevamento dei valori anomali mediante tecniche di soft computing

T Sangeetha; Geetha Mary Amalanathan

Edizioni Sapienza
2024
pokkari
Con la crescita dell'era digitale, i dati sono ampiamente disponibili e il recupero della conoscenza da questi dati viene effettuato con algoritmi di data mining. Tra i vari algoritmi di data mining, l'individuazione degli outlier fondamentale, poich la loro presenza degrada l'efficienza del sistema. La maggior parte della ricerca si limitata a rilevare gli outlier in un singolo universo con una singola granulazione per dati numerici o categorici. Gli algoritmi di rilevamento degli outlier di apprendimento automatico esistenti funzionano bene per i dati quantitativi, ma non sono direttamente applicabili a dati qualitativi, vaghi e imprecisi, il che produce risultati inefficaci. Nel mondo reale esistono anche informazioni ambigue, incerte, incomplete e indeterminate . Questi problemi vengono affrontati in questo lavoro di ricerca utilizzando la teoria degli insiemi grezzi, gli insiemi fuzzy intuitivisti e neutrosofici. La metodologia proposta, basata sull'entropia grezza e sulla densit ponderata, stata progettata per rilevare gli outlier in vari sistemi informativi. Il valore della densit ponderata per ogni oggetto e attributo stato determinato per rilevare gli outlier. In questo modo, un oggetto vero non sar mai trattato come un outlier.
Deteção de valores atípicos utilizando técnicas de computação suave

Deteção de valores atípicos utilizando técnicas de computação suave

T Sangeetha; Geetha Mary Amalanathan

Edicoes Nosso Conhecimento
2024
pokkari
Com o crescimento da era digital, os dados est o amplamente dispon veis, pelo que a recupera o de conhecimentos a partir desses dados efectuada atrav s de algoritmos de extra o de dados. Entre os v rios algoritmos de extra o de dados, a dete o de valores an malos crucial, uma vez que a sua ocorr ncia degrada a efici ncia do sistema. A maior parte da investiga o limitou-se dete o de valores at picos num nico universo com uma nica granula o para dados num ricos ou categ ricos. Os algoritmos de dete o de valores at picos de aprendizagem autom tica existentes funcionam bem para dados quantitativos, mas n o s o diretamente aplicados a dados qualitativos, vagos e imprecisos, o que produz resultados ineficazes. H tamb m informa es amb guas, incertas, incompletas e indeterminadas que persistem no mundo real. Estes problemas s o tratados neste trabalho de investiga o utilizando a teoria dos conjuntos aproximados, os conjuntos difusos intuicionistas e os conjuntos neutros ficos. A metodologia proposta, baseada na entropia grosseira e no m todo de dete o de valores aberrantes de densidade ponderada, foi concebida para detetar valores aberrantes em v rios sistemas de informa o. O valor da densidade ponderada para cada objeto e atributo foi determinado para detetar anomalias. Assim, um objeto verdadeiro nunca ser tratado como um outlier.