Products related to Settings:
-
Analytics and Optimization for Renewable Energy Integration
The scope of this book covers the modeling and forecast of renewable energy and operation and planning of power system with renewable energy integration.The first part presents mathematical theories of stochastic mathematics; the second presents modeling and analytic techniques for renewable energy generation; the third provides solutions on how to handle the uncertainty of renewable energy in power system operation.It includes advanced stochastic unit commitment models to acquire the optimal generation schedule under uncertainty, efficient algorithms to calculate the probabilistic power, and an efficient operation strategy for renewable power plants participating in electricity markets.
Price: 45.99 £ | Shipping*: 0.00 £ -
Ignite Global Change : Creating innovation in low-resource settings
Price: 16.99 £ | Shipping*: 3.99 £ -
Software Test Automation : Software Test Automation
This book describes how to build and implement an automated testing regime for software development.It presents a detailed account of the principles of automated testing, practical techniques for designing a good automated testing regime, and advice on choosing and applying off-the-shelf testing tools to specific needs.This sound and practical introduction to automated testing comes from two authors well known for their seminars, consultancy and training in the field.
Price: 77.99 £ | Shipping*: 0.00 £ -
Predictive Analytics : Modeling and Optimization
Predictive analytics refers to making predictions about the future based on different parameters which are historical data, machine learning, and artificial intelligence.This book provides the most recent advances in the field along with case studies and real-world examples.It discusses predictive modeling and analytics in reliability engineering and introduces current achievements and applications of artificial intelligence, data mining, and other techniques in supply chain management.It covers applications to reliability engineering practice, presents numerous examples to illustrate the theoretical results, and considers and analyses case studies and real-word examples.The book is written for researchers and practitioners in the field of system reliability, quality, supply chain management, and logistics management.Students taking courses in these areas will also find this book of interest.
Price: 135.00 £ | Shipping*: 0.00 £
-
What are the security settings for a Microsoft account?
The security settings for a Microsoft account include options for two-step verification, which adds an extra layer of security by requiring a second form of authentication, such as a phone number or email address. Users can also manage their account security by reviewing recent activity, updating their password, and setting up security alerts for suspicious activity. Additionally, Microsoft accounts offer the option to use a security key for added protection. Overall, these security settings help users keep their Microsoft accounts safe from unauthorized access.
-
How do I change the security settings on Android?
To change the security settings on an Android device, you can go to the "Settings" app and then select "Security" or "Biometrics and security" depending on your device. From there, you can choose options such as screen lock type (pattern, PIN, password, or fingerprint), enable or disable features like Find My Device, and manage app permissions. You can also set up a secure lock screen, enable encryption, and manage device administrators. It's important to regularly review and update your security settings to ensure your device is protected.
-
Is the startup being prevented by internet security settings?
It is possible that internet security settings could be preventing the startup of a website or online service. Security settings such as firewalls, antivirus software, and browser security features can sometimes block access to certain websites or services if they are deemed to be potentially harmful or insecure. It is important to check the security settings on the device and network being used to access the startup, and to ensure that any necessary permissions or exceptions are in place to allow the startup to function properly. Additionally, the startup itself should also prioritize implementing strong security measures to ensure that it is not being blocked by internet security settings.
-
Which software do you find more beautiful, user-friendly, and better?
As an AI language model, I don't have personal preferences, but I can provide an objective comparison. The beauty and user-friendliness of software can be subjective and depend on individual preferences and needs. Some users may find one software more visually appealing and easier to use, while others may prefer a different software. It's important to consider the specific features, functionality, and usability of each software to determine which one is better for a particular use case.
Similar search terms for Settings:
-
Innovation in Energy Security and Long-Term Energy Efficiency
The sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency.
Price: 36.30 £ | Shipping*: 0.00 £ -
Data Plane Development Kit (DPDK) : A Software Optimization Guide to the User Space-Based Network Applications
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage.The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Price: 52.99 £ | Shipping*: 0.00 £ -
Human Systems Integration for Mining Automation
Human Systems Integration for Mining Automation is the professional’s guide to understanding the issues, approaches, and pitfalls associated with mining automation from a human perspective.This book delves into a timely and fast-developing issue in mining and the wider minerals industry - the design and deployment of automation.The book approaches this from a “Human Systems Integration” standpoint in which the technical and human-related aspects are jointly considered as part of an integrated, automated mining system.This accessible and readable title offers a wider Human Systems Integration framework that can be applied to mining projects.It is based on an established framework that has been developed and used successfully in other work.The framework is backed up with information obtained from mines in Australia, the USA, Canada, Sweden, and Chile and original equipment manufacturers such as Caterpillar, Komatsu, Sandvik and Epiroc.Every reader of this book will recognise the essential benefits of human systems integration for mining automation. This book will be an ideal read for industry professionals including systems engineers, safety engineers, mining engineers, human factors engineers, and engineers working on developing and deploying automation in mining and related industries including rail, road transport, and process control.It will also be of interest to students, researchers, and academics in related fields.
Price: 68.99 £ | Shipping*: 0.00 £ -
Healthcare Big Data Analytics : Computational Optimization and Cohesive Approaches
This book highlights how optimized big data applications can be used for patient monitoring and clinical diagnosis.In fact, IoT-based applications are data-driven and mostly employ modern optimization techniques.The book also explores challenges, opportunities, and future research directions, discussing the stages of data collection and pre-processing, as well as the associated challenges and issues in data handling and setup.
Price: 155.50 £ | Shipping*: 0.00 £
-
How can I adjust my Facebook security and login settings?
To adjust your Facebook security and login settings, you can start by going to the "Settings" tab on your Facebook account. From there, you can navigate to the "Security and Login" section where you can enable features such as two-factor authentication, login alerts, and trusted contacts. You can also review and manage the devices and browsers that are logged into your account, as well as set up login approvals for added security. Additionally, you can customize your privacy settings to control who can see your posts, friend requests, and personal information.
-
How can one adjust the microphone settings properly using software?
To adjust the microphone settings properly using software, you can start by accessing the sound settings on your computer. This can usually be done by right-clicking on the speaker icon in the taskbar and selecting "Open Sound settings" or "Recording devices." Once in the sound settings, you can select the microphone you want to adjust and click on "Properties" to access its specific settings. From there, you can adjust the microphone volume, levels, and other settings to ensure it is properly configured for your needs. Additionally, some software may also offer advanced settings for noise cancellation, echo reduction, and other features that can be adjusted to improve the microphone's performance.
-
In automation, which software is it?
In automation, the software used is typically referred to as automation software or automation tools. These tools are designed to automate repetitive tasks, streamline processes, and increase efficiency in various industries. Some popular examples of automation software include UiPath, Blue Prism, Automation Anywhere, and Selenium. These tools often use technologies such as robotic process automation (RPA) and artificial intelligence to mimic human actions and perform tasks with minimal human intervention.
-
'Which settings?'
The settings refer to the environment or location in which a story takes place. This can include physical locations such as a city, a forest, or a school, as well as more abstract settings like a dystopian society or a magical realm. Settings play a crucial role in shaping the mood, atmosphere, and overall tone of a story, and can also influence the actions and interactions of the characters within that setting.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.