Listing 1 - 3 of 3 |
Sort by
|
Choose an application
In der klassischen Ökonomik ist in der Regel der statische Gleichgewichtszustand einer einfachen Wirtschaft der zentrale Betrachtungsgegenstand. Mit dem Simulationsprogramm EconSim entwickelt der Autor ein Modell, das es Ökonomen ermöglichen soll, deutlich komplexere Abbilder realer Wirtschaften zu erschaffen und diese konsistent und systematisch zu analysieren. Dabei ist der zentrale Gedanke die Schaffung eines möglichst modularen Werkzeugs, das es erlaubt eine große Vielzahl verschiedener Situationen und Zusammenhänge abzubilden und jederzeit weitere Elemente hinzuzufügen. Janis Kesten-Kühne analysiert wesentliche ökonomische Merkmale von Marktprozessen für bestimmte Marktvermittlungsformen und stellt sie entsprechenden Ergebnissen standardökonomischer Gleichgewichtsmodelle gegenüber. Der verfolgte Ansatz des Autors ist ein wichtiger Beitrag zur ökonomischen Forschung. Der Inhalt Theoretische Grundlagen Modellbildung Semantische Mächtigkeit Simulationsstudien Die Zielgruppen Dozent*innen und Student*innen der Wirtschaftswissenschaften, Wirtschaftsinformatik, Informatik Fach- und Führungskräfte mit Bezug zu Angewandter BWL in Richtung strategisches Management und Entscheidungsunterstützung Der Autor Janis Kesten-Kühne hat Maschinenbau und Wirtschaftsingenieurwesen an der TU Clausthal studiert. Anschließend promovierte er am Lehrstuhl für Volkswirtschaftslehre am Institut für Wirtschaftswissenschaft der TU Clausthal und ist dort derzeit als Postdoc tätig.
Multiagent systems. --- Modularity (Engineering) --- Economics --- Psychological aspects.
Choose an application
"This book examines the role of the modular approach for the back end of the energy industry- energy usage management. It outlines the use of modular approaches for the processes used to improve energy conservation and efficiency, which are the preludes to the prudent use of energy. Since energy consumption is conventionally broken down into four sectors, residential, transportation, industrial, and commercial, the discussions on energy usage management are also broken down in these four sectors in the book. The book examines the use of modular systems for five areas that cover all sectors described above: buildings, vehicles, computer and electrical/electronic products, district heating, and waste water treatment and desalination. The book also discusses the use of modular approach for energy storage and transportation. Finally, the book describes how modular approach facilitates bottom up, top down and hybrid simulation and modeling, of the energy systems from various scientific and socio/economic perspectives. Aimed at industry professionals and researchers involved in the energy industry, the book illustrates in detail how modular approach can facilitate the management of energy usage with the help of concrete industrial examples" [Publisher]
Energy conservation. --- Conservation of energy resources --- Conservation of power resources --- Rational use of energy --- RUE (Rational use of energy) --- Conservation of natural resources --- Power resources --- Energy consumption --- Energy policy --- Recycling (Waste, etc.) --- Économies d'énergie. --- Energy consumption. --- Consommation d'énergie. --- Modularity (Engineering) --- Économies d'énergie. --- Consommation d'énergie.
Choose an application
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security. .
Application-specific integrated circuits --- Systems on a chip. --- Modularity (Engineering) --- Design and construction. --- Modular design --- Modularization --- Modularizing --- SOC design --- Systems on chip --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Electronic Circuits and Devices. --- Embedded computer systems --- Engineering design --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics
Listing 1 - 3 of 3 |
Sort by
|