Narrow your search

Library

FARO (2)

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (4)


Language

English (4)


Year
From To Submit

2022 (3)

2020 (1)

Listing 1 - 4 of 4
Sort by

Book
District Heating and Cooling Networks
Authors: --- ---
ISBN: 3039288407 3039288393 Year: 2020 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Conventional thermal power generating plants reject a large amount of energy every year. If this rejected heat were to be used through district heating networks, given prior energy valorisation, there would be a noticeable decrease in the amount of fossil fuels imported for heating. As a consequence, benefits would be experienced in the form of an increase in energy efficiency, an improvement in energy security, and a minimisation of emitted greenhouse gases. Given that heat demand is not expected to decrease significantly in the medium term, district heating networks show the greatest potential for the development of cogeneration. Due to their cost competitiveness, flexibility in terms of the ability to use renewable energy resources (such as geothermal or solar thermal) and fossil fuels (more specifically the residual heat from combustion), and the fact that, in some cases, losses to a country/region’s energy balance can be easily integrated into district heating networks (which would not be the case in a “fully electric” future), district heating (and cooling) networks and cogeneration could become a key element for a future with greater energy security, while being more sustainable, if appropriate measures were implemented. This book therefore seeks to propose an energy strategy for a number of cities/regions/countries by proposing appropriate measures supported by detailed case studies.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.

Keywords

fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing --- fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing

Listing 1 - 4 of 4
Sort by