Mostrando 23,021 - 23,040 Resultados de 23,350 Para Buscar '"'39"', tiempo de consulta: 0.18s Limitar resultados
  1. 23021
    Publicado 2023
    Tabla de Contenidos: “…-- 2.2 A Short History of Container Technology -- 2.2.1 From Emulators to Virtual Machines -- 2.2.2 Increasing Isolation Inside the Operating System -- 2.2.3 The Birth of Containers -- 2.2.4 The Union Filesystem -- 2.2.5 The Rise of Docker -- 2.3 Summary -- Chapter 3: A Docker Interactive Tutorial -- 3.1 Registries, Repositories, and Tags -- 3.2 Running Your First Container -- 3.3 Running a Docker Service -- 3.4 Running a Whole Operating System -- 3.5 Copying Files to and from the Container -- 3.6 Creating a New Docker Image -- 3.7 Creating Docker Images Using a Recipe -- 3.8 Pushing the Image to Docker Hub -- 3.9 Logging into a Running Docker Container -- 3.10 Summary -- Chapter 4: Best Practices for Building Containers -- 4.1 How Not to Build a Container -- 4.1.1 Don't Make a Container Perform Multiple Tasks -- 4.1.2 Don't Include an Entire Operating System -- 4.2 Base Images -- 4.3 Alpine Distributions -- 4.4 Avoid Bloated Images from Deleted Files -- 4.5 Make Your Containers Configurable -- 4.6 Be Clear About Your Statefulness -- 4.7 Final Tips -- 4.8 Summary -- Part II: Introducing Kubernetes…”
    Libro electrónico
  2. 23022
    por Cox, Christopher 1965-
    Publicado 2014
    Tabla de Contenidos: “…2.7.3 Bearer Implementation Using GTP 38 -- 2.7.4 Bearer Implementation Using GRE and PMIP 39 -- 2.7.5 Signalling Radio Bearers 39 -- 2.8 State Diagrams 40 -- 2.8.1 EPS Mobility Management 40 -- 2.8.2 EPS Connection Management 40 -- 2.8.3 Radio Resource Control 41 -- 2.9 Spectrum Allocation 43 -- References 45 -- 3 Digital Wireless Communications 49 -- 3.1 Radio Transmission and Reception 49 -- 3.1.1 Carrier Signal 49 -- 3.1.2 Modulation Techniques 50 -- 3.1.3 The Modulation Process 51 -- 3.1.4 The Demodulation Process 53 -- 3.1.5 Channel Estimation 55 -- 3.1.6 Bandwidth of the Modulated Signal 55 -- 3.2 Radio Transmission in a Mobile Cellular Network 56 -- 3.2.1 Multiple Access Techniques 56 -- 3.2.2 FDD and TDD Modes 56 -- 3.3 Impairments to the Received Signal 58 -- 3.3.1 Propagation Loss 58 -- 3.3.2 Noise and Interference 58 -- 3.3.3 Multipath and Fading 58 -- 3.3.4 Inter-symbol Interference 60 -- 3.4 Error Management 61 -- 3.4.1 Forward Error Correction 61 -- 3.4.2 Automatic Repeat Request 62 -- 3.4.3 Hybrid ARQ 63 -- References 65 -- 4 Orthogonal Frequency Division Multiple Access 67 -- 4.1 Principles of OFDMA 67 -- 4.1.1 Sub-carriers 67 -- 4.1.2 The OFDM Transmitter 68 -- 4.1.3 The OFDM Receiver 70 -- 4.1.4 The Fast Fourier Transform 72 -- 4.1.5 Block Diagram of OFDMA 72 -- 4.1.6 Details of the Fourier Transform 73 -- 4.2 Benefits and Additional Features of OFDMA 75 -- 4.2.1 Orthogonal Sub-carriers 75 -- 4.2.2 Choice of Sub-carrier Spacing 75 -- 4.2.3 Frequency-Specific Scheduling 77 -- 4.2.4 Reduction of Inter-symbol Interference 78 -- 4.2.5 Cyclic Prefix Insertion 79 -- 4.2.6 Choice of Symbol Duration 80 -- 4.2.7 Fractional Frequency Re-use 81 -- 4.3 Single Carrier Frequency Division Multiple Access 82 -- 4.3.1 Power Variations From OFDMA 82 -- 4.3.2 Block Diagram of SC-FDMA 83 -- References 85 -- 5 Multiple Antenna Techniques 87 -- 5.1 Diversity Processing 87 -- 5.1.1 Receive Diversity 87 -- 5.1.2 Closed Loop Transmit Diversity 88 -- 5.1.3 Open Loop Transmit Diversity 89.…”
    Libro electrónico
  3. 23023
    por Huidobro, José Manuel
    Publicado 2014
    Tabla de Contenidos: “…3.4.3 GPON (Gigabit PON) -- 3.5 TRATAMIENTO DE LA SEÑAL -- 3.5.1 La digitalización -- 3.5.2 La compresión -- 3.5.2.1 Compresión de audio -- 3.5.2.2 Compresión de vídeo -- 3.5.2.3 Compresión de datos -- 3.6 CODIFICACIÓN XDSL -- 3.6.1 IDSL -- 3.6.2 HDSL -- 3.6.3 ADSL -- 3.6.3.1 ADSL2+ -- 3.6.4 VDSL -- 3.7 LA MODULACIÓN -- 3.7.1 Modulación de Amplitud (AM) -- 3.7.2 Modulación de Frecuencia (FM) -- 3.7.3 Modulación Digital de Amplitud (ASK) -- 3.7.4 Modulación Digital de Frecuencia (FSK) -- 3.7.5 Modulación Digital de Fase (PSK) -- 3.8 EL MÓDEM -- 3.8.1 Métodos para el envío de la señal -- 3.8.1.1 Transmisión serie y paralelo 3.8.1.1 Transmisión serie y paralelo -- 3.8.1.2 Transmisión semidúplex y dúplex -- 3.8.1.3 Transmisión asíncrona y síncrona -- 3.8.1.4 Transmisión a 2 y 4 hilos -- 3.8.1.5 Tasa de error -- 3.8.2 Normativa de la UIT-T (CCITT) -- 3.8.3 Módems asíncronos y síncronos -- 3.8.3.1 Transmisión asíncrona -- 3.8.3.2 Transmisión síncrona -- 3.9 LA INTERFAZ DE COMUNICACIONES -- 3.9.1 V.24. …”
    Libro electrónico
  4. 23024
    por Coronel, Carlos
    Publicado 2011
    Tabla de Contenidos: “…2.6.2 El modelo conceptual -- 2.6.3 El modelo interno -- 2.6.4 El modelo físico -- Resumen -- Términos clave -- Preguntas de repaso -- Problemas -- PARTE II CONCEPTOS DE DISEÑO -- Viñeta de negocio: Iniciativa de BP para modelar datos -- Capítulo 3 El modelo de bases de datos relacional -- 3.1 Una vista lógica de los datos -- 3.1.1 Tablas y sus características -- 3.2 Llaves -- 3.3 Reglas de integridad -- 3.4 Operadores de conjunto relacionales -- 3.5 El diccionario de datos y el catálogo del sistema -- 3.6 Relaciones dentro de la base de datos relacional -- 3.6.1 La relación 1:M -- 3.6.2 La relación 1:1 -- 3.6.3 La relación M:N -- 3.7 Repaso de redundancia de datos -- 3.8 Índices -- 3.9 Las reglas Codd para una base de datos relacional -- Resumen -- Términos clave -- Preguntas de repaso -- Problemas -- Capítulo 4 Modelado entidad-relación (ER) -- 4.1 El modelo entidad-relación (ERM) -- 4.1.1 Entidades -- 4.1.2 Atributos -- 4.1.3 Relaciones -- 4.1.4 Conectividad y cardinalidad -- 4.1.5 Dependencia de existencia -- 4.1.6 Fuerza de relación -- 4.1.7 Entidades débiles -- 4.1.8 Participación de relación -- 4.1.9 Grado de relación -- 4.1.10 Relaciones recursivas -- 4.1.11 Entidades asociativas (compuestas) -- 4.2 Desarrollo de un diagrama ER -- 4.3 Desafíos de diseño de bases de datos: objetivos en conflicto -- Resumen -- Términos clave -- Preguntas de repaso -- Problemas -- Casos -- Capítulo 5 Modelado avanzado de datos -- 5.1 El modelo de entidad de relación extendido -- 5.1.1 Supertipos y subtipos de entidad -- 5.1.2 Jerarquía de especialización -- 5.1.3 Herencia -- 5.1.4 Discriminador de subtipo -- 5.1.5 Restricciones disjuntas y traslapadas -- 5.1.6 Restricción de plenitud -- 5.1.7 Especialización y generalización -- 5.2 Agrupación de entidad -- 5.3 Integridad de entidad: seleccionar llaves primarias -- 5.3.1 Llaves naturales y llaves primarias…”
    Libro electrónico
  5. 23025
    por Zaldívar Navarro, Daniel
    Publicado 2014
    Tabla de Contenidos: “….) -- 3.6.1 Robot cilíndrico -- 3.6.2 Robot antropomórfico -- 3.6.3 Eslabón esférico -- 3.6.4 Robot TQ MA2000 -- 3.6.5 Robot manipulador Stanford -- 3.6.6 Robot manipulador SCARA -- 3.6.7 Robot humanoide Dany Walker -- 3.7 RESUMEN DEL CAPÍTULO -- 3.8 EJERCICIOS RECOMENDADOS -- 3.9 LECTURAS RECOMENDADAS -- 4 CINEMÁTICA INVERSA -- 4.1 EL PROBLEMA DE LA CINEMÁTICA INVERSA -- 4.1.1 Solución al problema de cinemática inversa -- 4.1.2 Método geométrico -- 4.1.3 Distancias de ajuste -- 4.1.4 Desacoplamiento cinemático -- 4.1.5 Solución para el robot antropomórfico de 6-DOF -- 4.1.6 Solución del robot SCARA -- 4.1.7 Solución del robot SCARA en Matlab© -- 4.2 MÉTODOS ANALÍTICOS E ITERATIVOS -- 4.3 SOLUCIÓN ITERATIVA DEL PROBLEMA DE CINEMÁTICA INVERSA -- 4.3.1 Convergencia de la solución iterativa -- 4.3.2 Cálculo de la cinemática inversa en Matlab© -- 4.4 RESUMEN DEL CAPÍTULO -- 4.5 EJERCICIOS PROPUESTOS -- 4.6 BIBLIOGRAFÍA RECOMENDADA -- 5 CINEMÁTICA DIFERENCIAL -- 5.1 VELOCIDAD LINEAL Y ROTACIONAL -- 5.1.1 Velocidad lineal -- 5.1.2 Velocidad rotacional -- 5.2 EL VECTOR DE VELOCIDAD -- 5.2.1 Simulación del vector de velocidad en Matlab©…”
    Libro electrónico
  6. 23026
    Publicado 2012
    Tabla de Contenidos: “…-- Petite mécanique de l'oiseau -- 39 Qu'est-ce qu'une plume ? -- 40 À quoi sert le plumage des oiseaux ? …”
    Libro electrónico
  7. 23027
    por Wolf, Henning
    Publicado 2021
    Tabla de Contenidos: “…. -- 3.6.3 Größe des Product Backlog -- 3.7 Definition of Ready -- 3.8 Product Backlog Board -- Abb. 3-13 Product Backlog Board nach Roman Pichler -- 3.8.1 Überführung in den »Ready for Sprint«-Bereich -- 3.8.2 Inhomogene Product Backlog Items -- 3.8.3 Physikalisches Board -- 3.9 Priorisierung -- 3.9.1 Priorisierung nach Kosten-Wert -- Abb. 3-14 Priorisierung nach Kosten-Wert -- Abb. 3-15 Paarweiser Vergleich bei der Priorisierung nach Kosten-Wert -- 3.9.2 Priorisierung nach Risiko-Wert -- Abb. 3-16 Priorisierung nach Risiko-Wert -- 3.9.3 Priorisierung mit Verzögerungskosten (Cost of Delay) -- Abb. 3-17 Konstante Verzögerungskosten -- Abb. 3-18 Verzögerungskosten mit Stichtag -- Abb. 3-19 A, B ist günstiger als B, A. -- 3.9.4 Wert bzw. …”
    Libro electrónico
  8. 23028
    Publicado 2019
    Tabla de Contenidos: “…3.5.3 The Firing Solution -- 3.5.4 Projectiles with Drag -- 3.5.5 Iterative Targeting -- 3.6 Jumping -- 3.6.1 Jump Points -- 3.6.2 Landing Pads -- 3.6.3 Hole Fillers -- 3.7 Coordinated Movement -- 3.7.1 Fixed Formations -- 3.7.2 Scalable Formations -- 3.7.3 Emergent Formations -- 3.7.4 Two-Level Formation Steering -- 3.7.5 Implementation -- 3.7.6 Extending to More Than Two Levels -- 3.7.7 Slot Roles and Better Assignment -- 3.7.8 Slot Assignment -- 3.7.9 Dynamic Slots and Plays -- 3.7.10 Tactical Movement -- 3.8 Motor Control -- 3.8.1 Output Filtering -- 3.8.2 Capability-Sensitive Steering -- 3.8.3 Common Actuation Properties -- 3.9 Movement in the Third Dimension -- 3.9.1 Rotation in Three Dimensions -- 3.9.2 Converting Steering Behaviors to Three Dimensions -- 3.9.3 Align -- 3.9.4 Align to Vector -- 3.9.5 Face -- 3.9.6 Look Where You're Going -- 3.9.7 Wander -- 3.9.8 Faking Rotation Axes -- CHAPTER 4: PATHFINDING -- 4.1 The Pathfinding Graph -- 4.1.1 Graphs -- 4.1.2 Weighted Graphs -- 4.1.3 Directed Weighted Graphs -- 4.1.4 Terminology -- 4.1.5 Representation -- 4.2 Dijkstra -- 4.2.1 The Problem -- 4.2.2 The Algorithm -- 4.2.3 Pseudo-Code -- 4.2.4 Data Structures and Interfaces -- 4.2.5 Performance of Dijkstra -- 4.2.6 Weaknesses -- 4.3 A* -- 4.3.1 The Problem -- 4.3.2 The Algorithm -- 4.3.3 Pseudo-Code -- 4.3.4 Data Structures and Interfaces -- 4.3.5 Implementation Notes -- 4.3.6 Algorithm Performance -- 4.3.7 Node Array A* -- 4.3.8 Choosing a Heuristic -- 4.4 World Representations -- 4.4.1 Tile Graphs -- 4.4.2 Dirichlet Domains -- 4.4.3 Points of Visibility -- 4.4.4 Navigation Meshes -- 4.4.5 Non-Translational Problems -- 4.4.6 Cost Functions -- 4.4.7 Path Smoothing -- 4.5 Improving on A* -- 4.6 Hierarchical Pathfinding -- 4.6.1 The Hierarchical Pathfinding Graph -- 4.6.2 Pathfinding on the Hierarchical Graph…”
    Libro electrónico
  9. 23029
    Tabla de Contenidos: “…Survol du personnel qualifié de l'EAJE dans les centres et en milieu scolaire -- Tendance à une formation initiale plus longue et à des niveaux plus élevés -- Formation initiale : ce qu'elle recouvre et ce qu'elle ne recouvre pas -- Formation continue et développement professionnel : des occasions inégales -- Encadré 3.9. BUPL - Danemark : un partenaire de poids pour améliorer la qualité -- Préoccupations au sujet des conditions de travail, des statuts et des rémunérations -- Recrutement et fidélisation des personnels : qui travaillera pour la petite enfance dans le futur ? …”
    Libro electrónico
  10. 23030
    Tabla de Contenidos: “…Protection assurée par les contingents tarifaires : résultats qualitatifs 39 -- 2.10. Contingents tarifaires par méthode d'administration, 1995-99 40 -- 2.11. …”
    Libro electrónico
  11. 23031
    Publicado 1998
    Seriada digital
  12. 23032
    Publicado 2017
    Tabla de Contenidos: “…. -- 3.7 Zusammenfassung -- 3.8 Prüfungstipps -- 3.9 Wiederholungsfragen, Übungen und Aufgaben -- 3.10 Lösungen -- Kapitel 4: ARP und ICMP -- 4.1 Die Laborumgebung -- 4.2 ARP - die Wahrheit über die Netzwerk-Kommunikation -- 4.2.1 Workshop: Einführung in ARP -- 4.2.2 Was ist nun eigentlich eine MAC-Adresse? …”
    Libro electrónico
  13. 23033
    Libro
  14. 23034
    Introduction to digital mobile communication
    Introduction to Digital Mobile Communication
    Publicado 2015
    Tabla de Contenidos: “…Band Complex Expression 36 -- 2.2 Noise Analysis 37 -- 2.2.1 Noise in Communication System 37 -- 2.2.2 Statistics of Noise 39 -- 2.2.3 Power Spectral Density of Noise 42 -- 2.2.4 Autocorrelation Function of Filtered Noise 43 -- 2.2.5 Bandpass Noise 44 -- 2.2.6 Envelope and Phase of a Sinusoidal Signal in -- Bandpass Noise 48 -- 2.2.7 Generation of Correlated Noises and its Probability -- Density Function 49 -- 2.2.8 Sums of Random Variables and the Central -- Limit Theorem 51 -- 2.3 Linear System 55 -- 2.3.1 Linear Time?]…”
    Libro electrónico
  15. 23035
    Publicado 2010
    Tabla de Contenidos: “…B.13 Background() -- B.14 BackgroundDetect() -- B.15 Bridge() -- B.16 Busy() -- B.17 ChangeMonitor() -- B.18 ChanIsAvail() -- B.19 ChannelRedirect() -- B.20 ChanSpy() -- B.21 CheckGroup() -- B.22 ClearHash() -- B.23 Congestion() -- B.24 ContinueWhile() -- B.25 ControlPlayback() -- B.26 Curl() -- B.27 Cut() -- B.28 DAHDIBarge() -- B.29 DAHDIRAS() -- B.30 DAHDIScan() -- B.31 DAHDISendKeypadFacility() -- B.32 DateTime() -- B.33 DBdel() -- B.34 DBdeltree() -- B.35 DBget() -- B.36 DBput() -- B.37 DeadAGI() -- B.38 Dial() -- B.39 Dictate() -- B.40 DigitTimeout() -- B.41 Directory() -- B.42 DISA() -- B.43 DumpChan() -- B.44 DUNDiLookup() -- B.45 EAGI() -- B.46 Echo() -- B.47 EndWhile() -- B.48 EnumLookup() -- B.49 Eval() -- B.50 Exec() -- B.51 ExecIf() -- B.52 ExecIfTime() -- B.53 ExitWhile() -- B.54 ExtenSpy() -- B.55 ExternalIVR() -- B.56 FastAGI() -- B.57 Festival() -- B.58 Flash() -- B.59 FollowMe() -- B.60 ForkCDR() -- B.61 GetCPEID() -- B.62 GetGroupCount() -- B.63 GetGroupMatchCount() -- B.64 Gosub() -- B.65 GosubIf() -- B.66 Goto() -- B.67 GotoIf() -- B.68 GotoIfTime() -- B.69 Hangup() -- B.70 HasNewVoicemail() -- B.71 HasVoicemail() -- B.72 IAX2Provision() -- B.73 ICES() -- B.74 ImportVar() -- B.75 Incomplete() -- B.76 JabberSend() -- B.77 JabberStatus() -- B.78 KeepAlive() -- B.79 Log() -- B.80 LookupBlacklist() -- B.81 LookupCIDName() -- B.82 Macro() -- B.83 MacroExclusive() -- B.84 MacroExit() -- B.85 MacroIf() -- B.86 mailboxExists() -- B.87 Math() -- B.88 MD5() -- B.89 MD5Check() -- B.90 MeetMe() -- B.91 MeetMeAdmin() -- B.92 MeetMeChannelAdmin() -- B.93 MeetMeCount() -- B.94 Milliwatt() -- B.95 MinivmAccMess() -- B.96 MinivmDelete() -- B.97 MinivmGreet() -- B.98 MinivmNotify() -- B.99 MinivmRecord() -- B.100 MixMonitor() -- B.101 Monitor() -- B.102 Morsecode() -- B.103 MP3Player() -- B.104 MSet() -- B.105 MusicOnHold() -- B.106 NBScat()…”
    Libro electrónico
  16. 23036
    por Tate, Jon
    Publicado 2005
    Tabla de Contenidos: “…-- 3.7.8 FC-PH-2 and speed -- 3.7.9 1, 2 and 4 Gbps and beyond -- 3.7.10 FC-PH, FC-PH-2, and FC-PH-3 -- 3.7.11 Layers -- 3.8 Zoning -- 3.8.1 Hardware zoning -- 3.8.2 Software zoning -- 3.9 Trunking -- 3.9.1 Frame filtering -- 3.9.2 Oversubscription -- 3.9.3 Congestion -- 3.9.4 Information units -- 3.9.5 The movement of data -- 3.9.6 Data encoding -- 3.10 Ordered set, frames, sequences, and exchanges -- 3.10.1 Ordered set -- 3.10.2 Frames -- 3.10.3 Sequences -- 3.10.4 Exchanges -- 3.10.5 Frames -- 3.10.6 In order and out of order -- 3.10.7 Latency -- 3.10.8 Heterogeneousness -- 3.10.9 Open Fiber Control -- 3.11 Fibre Channel Arbitrated Loop (FC-AL) -- 3.11.1 Loop protocols -- 3.11.2 Fairness algorithm -- 3.11.3 Loop addressing -- 3.11.4 Private devices on NL_Ports -- 3.12 Factors and considerations -- 3.12.1 Limits -- 3.12.2 Security -- 3.12.3 Interoperability -- 3.13 Standards -- 3.14 SAN industry associations and organizations -- 3.14.1 Storage Networking Industry Association -- 3.14.2 Fibre Channel Industry Association -- 3.14.3 SCSI Trade Association -- 3.14.4 International Committee for Information Technology Standards -- 3.14.5 INCITS technical committee T11…”
    Libro electrónico
  17. 23037
    Publicado 2004
    Tabla de Contenidos: “…3.7 Planning for WebSphere Application Server and WebSphere Portal -- 3.7.1 An existing WebSphere Application Server -- 3.7.2 Coexisting WebSphere Application Servers -- 3.7.3 Multiple instances of WebSphere Portal on the same machine -- 3.7.4 Installation without a configuration -- 3.7.5 Default virtual host consideration -- 3.7.6 Installing an empty Portal -- 3.7.7 Context root planning -- 3.7.8 If a firewall exists -- 3.7.9 WebSphere Application Server Enterprise Edition prerequisites -- 3.8 Planning for WebSphere Portal security -- 3.8.1 Authentication and the user registry -- 3.8.2 External authentication -- 3.8.3 External authorization -- 3.8.4 Supported external security software -- 3.8.5 Secure Sockets Layer (SSL) -- 3.8.6 Certificate consideration -- 3.8.7 Deleting passwords -- 3.8.8 Tivoli Access Manager -- 3.9 Planning for the clustering -- 3.9.1 Vertical clustering -- 3.9.2 Horizontal clustering -- 3.9.3 Cross-platform clustering -- 3.10 Planning for content publishing -- 3.11 Planning Lotus Collaborative Components -- 3.11.1 Sametime and QuickPlace -- 3.11.2 IBM WebSphere Portal Collaboration Center -- 3.12 Translation server and transcoding -- 3.13 Typical scenarios -- 3.13.1 Quick install -- 3.13.2 WebSphere Portal install with existing WebSphere environment -- 3.13.3 WebSphere Portal install with existing WebSphere environment and security enabled -- 3.13.4 WebSphere Portal install with remote robust database -- 3.13.5 WebSphere Portal with remote robust database and extended security using an LDAP directory -- 3.13.6 WebSphere Portal with Lotus Collaborative Components -- 3.13.7 WebSphere Portal with WebSphere Portal content publishing -- 3.13.8 WebSphere Portal with extended security using an external security manager -- 3.13.9 WebSphere Portal in a cluster environment -- 3.13.10 Remote server attach portlet development environment…”
    Libro electrónico
  18. 23038
    Publicado 2015
    Tabla de Contenidos: “…3.5.2 Abnormal level earthquake requirements -- 3.5.3 ALE structural and foundation modeling -- 3.5.3.1 Topside appurtenances and equipment -- 3.6 Ice loads -- 3.7 Other loads -- 3.7.1 Marine growth -- 3.7.2 Scour -- 3.8 Design for ultimate limit state -- 3.8.1 Load factors -- 3.8.1.1 In-place analysis by ISO19902 -- 3.8.1.2 Extreme environmental situation for fixed offshore platforms -- 3.8.1.2.1 Example 3.6 -- 3.8.1.2.2 Example 3.7 -- 3.8.1.3 Operating environmental situations for fixed platforms -- 3.8.2 Partial action factors -- 3.9 Collision events -- 3.10 Material strength -- 3.11 Cement grout -- Further reading -- 4 Offshore structures design -- 4.1 Introduction -- 4.2 Guide for preliminary design -- 4.2.1 Approximate dimensions -- 4.2.2 Bracing system -- 4.2.3 Jacket design -- 4.3 Structure analysis -- 4.3.1 Global structure analysis -- 4.3.2 The loads on the piles -- Example 4.1 -- Solution -- 4.3.3 Modeling techniques -- 4.3.3.1 Joint coordinates -- 4.3.3.2 Local member axes -- 4.3.3.3 Member effective lengths -- 4.3.3.4 Joint eccentricities -- 4.4 Dynamic structure analysis -- 4.4.1 Natural frequency -- Example 4.2 -- 4.5 Cylinder member strength -- 4.5.1 Cylinder member strength calculation by ISO19902 -- 4.5.1.1 Axial tension -- 4.5.1.2 Axial compression -- 4.5.1.3 Column buckling -- 4.5.1.4 Local buckling -- 4.5.1.5 Bending -- 4.5.1.6 Shear -- 4.5.1.7 Torsional shear -- 4.5.1.8 Hydrostatic pressure -- 4.5.1.9 Hoop buckling -- 4.5.1.10 Tubular members subjected to combined forces without hydrostatic pressure -- 4.5.1.10.1 Axial tension and bending -- 4.5.1.10.2 Axial compression and bending -- 4.5.1.11 Tubular members subjected to combined forces with hydrostatic pressure -- 4.5.1.11.1 Axial tension, bending, and hydrostatic pressure -- 4.5.1.11.2 Axial compression, bending, and hydrostatic pressure…”
    Libro electrónico
  19. 23039
    Publicado 2005
    Tabla de Contenidos: “…3.2.6 WebSphere Application Server licensing and platforms -- 3.2.7 New in WebSphere Application Server - Express V6 -- 3.2.8 Physical Packaging -- 3.3 WebSphere Application Server architecture -- 3.4 Application server configurations -- 3.4.1 Standalone server configuration -- 3.4.2 Distributed server configuration -- 3.5 Cells, nodes and servers -- 3.6 Servers -- 3.6.1 Application server -- 3.6.2 Clusters -- 3.6.3 JMS servers (V5) -- 3.6.4 External servers -- 3.7 Containers -- 3.7.1 Web container -- 3.7.2 EJB container -- 3.7.3 Client application container -- 3.8 Application server services -- 3.8.1 JCA services -- 3.8.2 Transaction service -- 3.8.3 Dynamic cache service -- 3.8.4 Message listener service -- 3.8.5 Object Request Broker service -- 3.8.6 Admin service -- 3.8.7 Name service -- 3.8.8 PMI service -- 3.8.9 Security service -- 3.9 Data Replication Service (DRS) -- 3.10 Virtual hosts -- 3.11 Session management -- 3.11.1 HTTP Session persistence -- 3.11.2 Stateful session EJB persistence -- 3.12 Web services -- 3.12.1 Enterprise services (JCA Web services) -- 3.12.2 Web service client -- 3.12.3 Web service provider -- 3.12.4 Enterprise Web Services -- 3.12.5 IBM WebSphere UDDI Registry -- 3.12.6 Web Services Gateway -- 3.13 Service integration bus -- 3.13.1 Application support -- 3.13.2 Service integration bus and messaging -- 3.13.3 Web services and the integration bus -- 3.14 Security -- 3.14.1 User registry -- 3.14.2 Authentication -- 3.14.3 Authorization -- 3.14.4 Security components -- 3.14.5 Security flows -- 3.15 Resource providers -- 3.15.1 JDBC resources -- 3.15.2 Mail providers -- 3.15.3 JCA resource adapters -- 3.15.4 URL providers -- 3.15.5 JMS providers -- 3.15.6 Resource environment providers -- 3.16 Workload management -- 3.17 High availability -- 3.18 Administration -- 3.18.1 Administration tools…”
    Libro electrónico
  20. 23040
    Publicado 2020
    Tabla de Contenidos: “…Preface xvii -- Acknowledgment xix -- 1 Public Safety Networks from TETRA to Commercial Cellular Networks 1 -- 1.1 Introduction 1 -- 1.2 Evaluation of TETRA and TETRAPOL 3 -- 1.3 Understanding TETRA Modes of Operation 4 -- 1.3.1 TETRA Security 4 -- 1.3.2 Evaluating the Challenge of Data Transmission and Possible Solutions on TETRA Networks 5 -- 1.3.3 Comparing Public Safety Networks to the Commercial Cellular Networks 6 -- 1.3.3.1 Services 6 -- 1.3.3.2 Networks 6 -- 1.3.4 How to Overcome These Differences 7 -- 1.3.4.1 Limitations of TETRA 7 -- 1.3.4.2 Need for Broadband 8 -- 1.4 Unifying the Two Worlds of Public Safety Networks and Commercial Networks 8 -- 1.4.1 User Requirements 8 -- 1.4.2 Public Safety Network Migration 9 -- 1.4.3 Deployment Models 9 -- 1.5 The Transition from TETRA to LTE and the Current Initiatives 10 -- 1.5.1 Network Softwarization 10 -- 1.5.2 LTE Technology for Public Safety Communications 10 -- 1.5.3 LTE as a Public Safety Mobile Broadband Standard 11 -- 1.5.4 Security Enhancements for Public Safety LTE Features 11 -- 1.6 Conclusion 12 -- References 12 -- 2 Public Safety Networks Evolution Toward Broadband and Interoperability 15 -- 2.1 Introduction 15 -- 2.1.1 Communication Technology 15 -- 2.1.2 Wireless Communication Systems 16 -- 2.1.3 Government Involvement 17 -- 2.2 Evolution to Broadband Systems 18 -- 2.2.1 Determining Factors 19 -- 2.2.2 Evolution Process 21 -- 2.2.3 Broadband System Architecture 22 -- 2.2.4 Advantages of Broadband Systems 25 -- 2.3 Interoperability 28 -- 2.3.1 Developing an Interoperability Public Safety System 28 -- 2.3.2 Platform and Technology 29 -- 2.3.3 Benefits of Evolution 32 -- 2.4 Conclusion 33 -- 2.5 Recommendations 34 -- References 35 -- 3 Public Safety Communication Evolution 37 -- 3.1 Introduction 37 -- 3.1.1 Public Safety Network and Emergency Communication Networks 37 -- 3.2 Public Safety Standardization 39 -- 3.3 Evolution of Public Safety Communication 39 -- 3.3.1 Mission-Critical Voice 40 -- 3.3.2 Mission-Critical Data 41.…”
    Libro electrónico