01185nam 2200337Ia 450 99638517330331620200824132419.0(CKB)4940000000076433(EEBO)2241003352(OCoLC)ocm12306204e(OCoLC)12306204(EXLCZ)99494000000007643319850725d1696 uy |engurbn||||a|bb|The making of rockets[electronic resource] in two parts, the first containing the making of rockets for the meanest capacity, the other to make rockets by a duplicate proposition, to 1000 pound weight or higher /experimentally and mathematically demonstrated, by Robert AndersonLondon Printed for Robert Morden ...1696[17], 48 p. illReproduction of original in British Library.eebo-0018FireworksEarly works to 1800FireworksAnderson Robertfl. 1668-1696.1007023EAAEAAm/cWaOLNBOOK996385173303316The making of rockets2331432UNISA03696nam 22007095 450 991086314360332120251230063955.03-030-62746-210.1007/978-3-030-62746-1(CKB)4100000011558813(MiAaPQ)EBC6384943(DE-He213)978-3-030-62746-1(PPN)252504496(EXLCZ)99410000001155881320201104d2021 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierThe 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy SPIoT-2020, Volume 2 /edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.)Advances in Intelligent Systems and Computing,2194-5365 ;1283Includes index.3-030-62745-4 3-030-62745-4 This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.Advances in Intelligent Systems and Computing,2194-5365 ;1283EngineeringData processingCooperating objects (Computer systems)Computational intelligenceMachine learningBig dataData EngineeringCyber-Physical SystemsComputational IntelligenceMachine LearningBig DataEngineeringData processing.Cooperating objects (Computer systems)Computational intelligence.Machine learning.Big data.Data Engineering.Cyber-Physical Systems.Computational Intelligence.Machine Learning.Big Data.004.678Zhao JinghuaMa XiaomengMcIntyre John1916-2005,International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy.MiAaPQMiAaPQMiAaPQBOOK9910863143603321The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy4166894UNINA