Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 591
- History 266
- Història 209
- Management 153
- Filosofía 151
- Data processing 131
- Literature, Romance 124
- Computer networks 122
- Biblia 119
- Crítica e interpretación 116
- Música 116
- Development 114
- Bíblia 110
- Education 104
- Engineering & Applied Sciences 98
- Ciencias sociales 91
- Humanities, Multidisciplinary 90
- Culture 87
- Artificial intelligence 86
- Social Sciences, Interdisciplinary 86
- Application software 85
- Cultura 83
- Església Catòlica 81
- Colecciones 79
- Religion 79
- Business & Economics 78
- Computer programs 78
- Humanities 78
- César, Cayo Julio 77
- Philosophy 77
-
20141por Aichinger, Michael, 1979-Tabla de Contenidos: “…Intro -- A Workout in Computational Finance -- Contents -- Acknowledgements -- About the Authors -- 1 Introduction and Reading Guide -- 2 Binomial Trees -- 2.1 Equities and Basic Options -- 2.2 The One Period Model -- 2.3 The Multiperiod Binomial Model -- 2.4 Black-Scholes and Trees -- 2.5 Strengths and Weaknesses of Binomial Trees -- 2.5.1 Ease of Implementation -- 2.5.2 Oscillations -- 2.5.3 Non-recombining Trees -- 2.5.4 Exotic Options and Trees -- 2.5.5 Greeks and Binomial Trees -- 2.5.6 Grid Adaptivity and Trees -- 2.6 Conclusion -- 3 Finite Differences and the Black-Scholes PDE -- 3.1 A Continuous Time Model for Equity Prices -- 3.2 Black-Scholes Model: From the SDE to the PDE -- 3.3 Finite Differences -- 3.4 Time Discretization -- 3.5 Stability Considerations -- 3.6 Finite Differences and the Heat Equation -- 3.6.1 Numerical Results -- 3.7 Appendix: Error Analysis -- 4 Mean Reversion and Trinomial Trees -- 4.1 Some Fixed Income Terms -- 4.1.1 Interest Rates and Compounding -- 4.1.2 Libor Rates and Vanilla Interest Rate Swaps -- 4.2 Black76 for Caps and Swaptions -- 4.3 One-Factor Short Rate Models -- 4.3.1 Prominent Short Rate Models -- 4.4 The Hull-White Model in More Detail -- 4.5 Trinomial Trees -- 5 Upwinding Techniques for Short Rate Models -- 5.1 Derivation of a PDE for Short Rate Models -- 5.2 Upwind Schemes -- 5.2.1 Model Equation -- 5.3 A Puttable Fixed Rate Bond under the Hull-White One Factor Model -- 5.3.1 Bond Details -- 5.3.2 Model Details -- 5.3.3 Numerical Method -- 5.3.4 An Algorithm in Pseudocode -- 5.3.5 Results -- 6 Boundary, Terminal and Interface Conditions and their Influence -- 6.1 Terminal Conditions for Equity Options -- 6.2 Terminal Conditions for Fixed Income Instruments -- 6.3 Callability and Bermudan Options -- 6.4 Dividends -- 6.5 Snowballs and TARNs -- 6.6 Boundary Conditions…”
Publicado 2013
Libro electrónico -
20142Publicado 2017Tabla de Contenidos: “…3.1 3D-Ansicht für einzelne Geschosse erstellen -- 3.2 3D-Ansicht für ein Geschoss über View Cube -- 3.3 Das Register »Ändern« -- 3.3.1 Gruppe »Auswählen« -- 3.3.2 Gruppe »Eigenschaften« -- 3.3.3 Gruppe »Zwischenablage« -- 3.3.4 Gruppe »Geometrie« -- 3.3.5 Gruppe »Ändern« -- 3.3.6 Gruppe »Ansicht« -- 3.3.7 Gruppe »Messen« -- 3.3.8 Gruppe »Erstellen« -- 3.4 Geschossdecken bearbeiten -- 3.4.1 Geschossdecke am Dach begrenzen -- 3.4.2 Bodenplatte im Keller bearbeiten -- 3.5 Wände bearbeiten -- 3.5.1 Die Schnitthöhe für Geschossansichten -- 3.5.2 Wandtyp ändern -- 3.5.3 Wände löschen, ergänzen und verschieben -- 3.5.4 Verschieben mit und ohne Befehl -- 3.5.5 Wände fixieren, Profil anpassen und Verbinden-Werkzeug -- 3.5.6 Wände in Laufrichtung verbinden -- 3.6 Fenster bearbeiten -- 3.6.1 Eigenschaften bearbeiten -- 3.6.2 Fenster aus Bibliotheken -- 3.7 Türen bearbeiten -- 3.8 Geschosse kopieren -- 3.9 Übungsfragen -- Bemaßungen, Höhenkoten, Texte und Beschriftungen -- 4.1 Die Bemaßungsbefehle -- 4.2 Die ausgerichtete Bemaßung -- 4.2.1 Beispiel für ausgerichtete Bemaßung -- 4.2.2 Maßkette bearbeiten -- 4.2.3 Weitere Maßketten -- 4.2.4 Bemaßung mit Referenzlinie -- 4.2.5 Maßkette mit gleichen Abständen -- 4.3 Die lineare Bemaßung -- 4.4 Winkelbemaßung -- 4.5 Radius- und Durchmesserbemaßungen -- 4.6 Bogenlängenbemaßung -- 4.7 Höhenkoten -- 4.8 Punktkoordinate -- 4.9 Neigungskote -- 4.10 Text und Hinweistext -- 4.11 Bauteile beschriften -- 4.11.1 Automatische Element-Beschriftungen -- 4.11.2 Element-Bauelement -- 4.11.3 Material-Bauelement -- 4.12 Übungsfragen -- Gelände, Höhenausrichtung, Nord-Richtung -- 5.1 Gelände -- 5.2 Kellersohle -- 5.3 Baugrube -- 5.4 Weitere Geländewerkzeuge -- 5.5 Geografische Position -- 5.6 Projekt auf echte Höhe verschieben -- 5.7 Ausrichten nach der Himmelsrichtung -- 5.7.1 Nordpfeil -- 5.8 Übungsfragen…”
Libro electrónico -
20143por Schilling, MartinTabla de Contenidos: “…Practice 30: Creating a crystal-clear picture of your target customers -- Practice 31: Aligning your product value proposition with the underserved needs of your customers -- Practice 32: Developing your roadmap as a communication tool with the right prioritization logic -- Product management basics -- Practice 33: Getting the brand and product design right early on -- Practice 34: Building a thriving user research engine quickly -- Practice 35: Implementing best-in-class product management tools -- 6 Technology Excellence: Creating scalable and secure tech platforms for future growth -- Practice 36: Establishing the right technology OKRs -- Organzational charts and roles -- Practice 37: Defining the roles & -- responsibilities for a technology function -- Practice 38: Scaling the right technology roles at the right time -- Your way of agile development -- Practice 39: Creating your own version of agile development -- Development operations (DevOps) -- Practice 40: Establishing lean software development principles -- Practice 41: Establishing technical DevOps practices for continuous delivery -- Practice 42: Enabling a team of doers through the right DevOps culture -- Scalable architecture -- Practice 43: Creating a "good enough" software architecture that can evolve over time -- Practice 44: Establishing a resilient cloud architecture -- Information security -- Practice 45: Mitigating the top 10 web applications' security risks -- Practice 46: Integrating the key information security practices into design, development and deployment early on -- Data management -- Practice 47: Democratizing data with self-service data tools while building a scalable data architecture -- 7 B2C Marketing Excellence: Scaling up with minimal expense and maximum customer retention -- OKRs -- Practice 48: Establishing the right marketing OKRs…”
Publicado 2022
Libro electrónico -
20144Publicado 2022Tabla de Contenidos: “…The A* algorithm -- 4.3.2. Fuzzy logic -- 4.4. Energy optimization in the IoT -- 4.4.1. Characteristics of the IoT -- 4.4.2. …”
Libro electrónico -
20145Publicado 2023Tabla de Contenidos: “…3.3 Grainsize Characterization -- 4 Conclusions -- References -- High Precision Fabrication of an Innovative Fiber-Optic Displacement Sensor -- 1 Introduction -- 2 Sensor Principle -- 3 High Precision Machining Technique -- 3.1 The High Precision Turning Machine -- 3.2 The Machining Strategy of the Cones Assembled Grating -- 4 Conclusion -- References -- 3D Printing of Hydrogel-Based Seed Planter for In-Space Seed Nursery -- 1 Introduction -- 2 Materials and Method -- 2.1 Materials -- 2.2 Hydrogel Printing -- 2.3 Seed Planting -- 3 Results and Discussion -- 3.1 Hydrogel Printing Quality Control and Mass Evaluation -- 3.2 Volume Evaluation -- 3.3 Soybean Density Evaluation -- 4 Conclusions -- References -- Modelling and Simulation of Automated Hydraulic Press Brake -- 1 Introduction -- 2 Methodology -- 2.1 Computer Aided Modelling and Simulation -- 2.2 Model Control of Triplet Cylinder -- 2.3 The Operational Model of the Triplet Cylinder -- 3 Results and Discussion -- 4 Conclusion -- References -- Assessment of Reconfigurable Vibrating Screen Technology for the Mining Industries -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Manufacturing Systems -- Deep Anomaly Detection for Endoscopic Inspection of Cast Iron Parts -- 1 Introduction -- 2 Related Work -- 2.1 One-Class Classification (OCC) for Visual Anomaly Detection -- 2.2 One-Class Classification Anomaly Detection for Industrial Inspection -- 3 Use Case 'Endoscopic Cavity Inspection of Cast Iron Part' -- 4 Proposed Approach -- 4.1 Experimental Setup -- 4.2 Experimental Results -- 4.3 Threshold Selection and Comparison with Supervised Learning -- 4.4 Discussion -- 5 Conclusion and Outlook -- References -- Classification and Detection of Malicious Attacks in Industrial IoT Devices via Machine Learning -- 1 Introduction -- 2 Background…”
Libro electrónico -
20146Publicado 2023Tabla de Contenidos: “…3.2.2 Collection -- 3.2.3 Analysis and Processing -- 3.2.4 Production -- 3.2.5 Dissemination -- 3.2.6 Review -- 3.3 Situational Awareness -- 3.3.1 Example - 2013 Target Breach -- 3.4 Goal Oriented Security and Threat Modelling -- 3.5 Strategic, Operational, and Tactical Intelligence -- 3.5.1 Strategic Intelligence -- 3.5.1.1 Example - Lazarus Group -- 3.5.2 Operational Intelligence -- 3.5.2.1 Example - SamSam -- 3.5.3 Tactical Intelligence -- 3.5.3.1 Example - WannaCry -- 3.5.4 Sources of Intelligence Reports -- 3.5.4.1 Example - Shamoon -- 3.6 Incident Preparedness and Response -- 3.6.1 Preparation and Practice -- Summary -- References -- Chapter 4 Collecting Intelligence -- 4.1 Hierarchy of Evidence -- 4.1.1 Example - Smoking Tobacco Risk -- 4.2 Understanding Intelligence -- 4.2.1 Expressing Credibility -- 4.2.2 Expressing Confidence -- 4.2.3 Understanding Errors -- 4.2.3.1 Example - the WannaCry Email -- 4.2.3.2 Example - the Olympic Destroyer False Flags -- 4.3 Third Party Intelligence Reports -- 4.3.1 Tactical and Operational Reports -- 4.3.1.1 Example - Heartbleed -- 4.3.2 Strategic Threat Reports -- 4.4 Internal Incident Reports -- 4.5 Root Cause Analysis -- 4.6 Active Intelligence Gathering -- 4.6.1 Example - the Nightingale Floor -- 4.6.2 Example - the Macron Leaks -- Summary -- References -- Chapter 5 Generating Intelligence -- 5.1 The Intelligence Cycle in Practice -- 5.1.1 See it, Sense it, Share it, Use it -- 5.1.2 F3EAD Cycle -- 5.1.3 D3A Process -- 5.1.4 Applying the Intelligence Cycle -- 5.1.4.1 Planning and Requirements -- 5.1.4.2 Collection, Analysis, and Processing -- 5.1.4.3 Production and Dissemination -- 5.1.4.4 Feedback and Improvement -- 5.1.4.5 The Intelligence Cycle in Reverse -- 5.2 Sources of Data -- 5.3 Searching Data -- 5.4 Threat Hunting -- 5.4.1 Models of Threat Hunting -- 5.4.2 Analysing Data…”
Libro electrónico -
20147Publicado 2016Tabla de Contenidos: “…-- Monopsony -- Dominant Firm with a Competitive Fringe -- Why Some Firms Are Dominant -- The No-Entry Model -- The Dominant Firm-Competitive Fringe Equilibrium -- A Model with Free, Instantaneous Entry -- Summary -- Problems -- Suggested Readings -- EXAMPLE 4.1 Monopoly Newspaper Ad Prices -- EXAMPLE 4.2 Monopolizing by Merging -- EXAMPLE 4.3 Controlling a Key Ingredient -- EXAMPLE 4.4 Preventing Imitation-Cat Got Your Tongue? -- EXAMPLE 4.5 Protecting a Monopoly -- EXAMPLE 4.6 EU Allows Merger to Eliminate Losses…”
Libro electrónico -
20148por M. Eloundou-Enyegue, ParfaitTabla de Contenidos: “…2.3 Influence of extraterritorial powers and international environment -- 2.4 Limited contacts -- 3 Establishment of Diplomatic Relations between China and Thailand -- 3.1 The transformation and concreate practice at the early stage of the establishment of diplomatic relations -- 3.1.1 Political exchanges between China and Thailand -- 3.1.2 Economic cooperation and trade between China and Thailand -- 3.2 Impact of the changes in the international situation -- 3.2.1 The Sino-Soviet split and the wave of establishing diplomatic relations -- 3.2.2 The non-aligned movement and the rise of third world countries -- 3.2.3 Geopolitics of the Indo-China peninsula -- 3.2.4 Impact of changes in the international situation on Thailand -- 3.3 The wave of establishing diplomatic relations in China -- 4 Conclusion -- Author Contribution -- References -- Collaborative security model in East Asia: Possibilities and challenges -- 1 Introduction -- 2 Background of Chinese Collaborative Security Model -- 3 Possibilities of Chinese Collaborative Security in East Asia -- 3.1 The rise of China and its influence on collaborative security -- 3.2 China& -- x00027 -- s adherence to the principle of equality -- 4 Challenges of Chinese Collaborative Security in East Asia -- 4.1 China-US competition -- 4.2 Historical entanglement -- 4.3 Territorial disputes -- 4.4 Lack of cooperating motivation in other East Asian countries -- 4.5 Lack of dialogue and cooperation mechanism -- 5 Conclusion -- Author Contribution -- References -- Vietnam's construction of historical memory of China and its impact on bilateral relations -- 1 Introduction -- 2 Confucianism, War and Tribute Relations -- 3 Vietnamese Reinterpretation of Sino-Vietnamese History during the French Colonization -- 4 Changing Views on Vietnam& -- x00027 -- s History of China during the Cold War -- 5 Conclusion…”
Publicado 2024
Libro electrónico -
20149Publicado 2003Tabla de Contenidos: “…Data management considerations -- 4.1 Data criteria -- 4.1.1 Individual/separated data per job -- 4.1.2 Shared data access -- 4.1.3 Locking -- 4.1.4 Temporary data spaces -- 4.1.5 Size of data -- 4.1.6 Network bandwidth -- 4.1.7 Time-sensitive data -- 4.1.8 Data topology -- 4.1.9 Data types -- 4.1.10 Data volume and grid scalability -- 4.1.11 Encrypted data -- 4.2 Data management techniques and solutions -- 4.2.1 Shared file system -- 4.2.2 Databases -- 4.2.3 Replication (distribution of files across a set of nodes) -- 4.2.4 Mirroring -- 4.2.5 Caching -- 4.2.6 Transfer agent -- 4.2.7 Access Control System -- 4.2.8 Peer-to-peer data transfer -- 4.2.9 Sandboxing -- 4.2.10 Data brokering -- 4.2.11 Global file system approach -- 4.2.12 SAN approach -- 4.2.13 Distributed approach -- 4.2.14 Database solutions for grids -- 4.2.15 Data brokering -- 4.3 Some data grid projects in the Globus community -- 4.3.1 EU DataGrid -- 4.3.2 GriPhyn -- 4.3.3 Particle Physics Data Grid -- 4.4 Summary -- Chapter 5. Getting started with development in C/C++ -- 5.1 Overview of programming environment -- 5.1.1 Globus libc APIs -- 5.1.2 Makefile -- 5.1.3 Globus module -- 5.1.4 Callbacks -- 5.2 Submitting a job -- 5.2.1 Shells commands -- 5.2.2 globusrun -- 5.2.3 GSIssh -- 5.2.4 Job submission skeleton for C/C++ applications -- 5.2.5 Simple broker -- 5.3 Summary -- Chapter 6. …”
Libro electrónico -
20150Publicado 2012Tabla de Contenidos: “…Objective 802: 1.5 Given a Scenario, Use Control Panel Utilities -- Quick Answer Key -- In-Depth Answers -- Chapter 8: Client-Side Virtualization -- Questions -- Objective 802: 1.9 Explain the Basics of Client-Side Virtualization -- Quick Answer Key -- In-Depth Answers -- Chapter 9: Upgrading, Installing, and Configuring Windows -- Questions -- Objective 802: 1.2 Given a Scenario, Install and Configure the Operating System Using the Most Appropriate Method -- Objective 802: 1.4 Given a Scenario, Use Appropriate Operating System Features and Tools -- Objective 802: 1.5 Given a Scenario, Use Control Panel Utilities (the Items Are Organized by "Classic View/Large Icons" in Windows) -- Quick Answer Key -- In-Depth Answers -- Chapter 10: Disk and File Management -- Questions -- Objective 802: 1.1 Compare and Contrast the Features and Requirements of Various Microsoft Operating Systems -- Objective 802: 1.2 Given a Scenario, Install and Configure the Operating System Using the Most Appropriate Method -- Objective 802: 1.3 Given a Scenario, Use Appropriate Command-Line Tools -- Objective 802: 1.4 Given a Scenario, Use Appropriate Operating System Features and Tools -- Objective 802: 1.8 Explain the Differences Among Basic OS Security Settings -- Quick Answer Key -- In-Depth Answers -- Chapter 11: Troubleshooting, Repair, and Maintenance of PCs -- Questions -- Objective 802: 4.1 Given a Scenario, Explain the Troubleshooting Theory -- Objective 802: 4.2 Given a Scenario, Troubleshoot Common Problems Related to Motherboards, RAM, CPU, and Power with Appropriate Tools -- Objective 802: 4.3 Given a Scenario, Troubleshoot Hard Drives and RAID Arrays with Appropriate Tools -- Objective 802: 4.4 Given a Scenario, Troubleshoot Common Video and Display Issues -- Quick Answer Key -- In-Depth Answers…”
Libro electrónico -
20151por Camarillo, GonzaloTabla de Contenidos: “…-- 1.4 Relation between IMS and non-IMS Services -- 2 The History of the IMS Standardization -- 2.1 Relations between IMS-related Standardization Bodies -- 2.3 Third Generation Partnership Project -- 2.4 Third Generation Partnership Project 2 -- 2.5 IETF-3GPP/3GPP2 Collaboration -- 2.6 Open Mobile Alliance -- 3 General Principles of the IMS Architecture -- 3.1 From Circuit-switched to Packet-switched -- 3.2 IMS Requirements -- 3.3 Overview of Protocols used in the IMS -- 3.4 Overview of IMS Architecture -- 3.5 Identification in the IMS -- 3.6 SIM, USIM, and ISIM in 3GPP -- 3.7 Next Generation Networks (NGN) -- Part II The Signaling Plane in the IMS -- 4 Session Control on the Internet -- 4.1 SIP Functionality -- 4.2 SIP Entities -- 4.3 Message Format -- 4.4 The Start Line in SIP Responses: the Status Line -- 4.5 The Start Line in SIP Requests: the Request Line -- 4.6 Header Fields -- 4.7 Message Body -- 4.8 SIP Transactions -- 4.9 Message Flow for Session Establishment -- 4.10 SIP Dialogs -- 4.11 Extending SIP -- 4.12 Caller Preferences and User Agent Capabilities -- 4.13 Reliability of Provisional Responses -- 4.14 Preconditions -- 4.15 Event Notification -- 4.16 Signaling Compression -- 4.17 Content Indirection -- 4.18 The REFER Method -- 4.19 Globally Routable User- Agent URIs (GRUU) -- 4.20 NAT Traversal -- 5 Session Control in the IMS -- 5.1 Prerequisites for Operation in the IMS -- 5.2 IPv4 and IPv6 in the IMS -- 5.3 IP Connectivity Access Network -- 5.4 P-CSCF Discovery -- 5.5 IMS-level Registration -- 5.6 Subscription to the reg Event State -- 5.7 Basic Session Setup -- 5.8 Application Servers: Providing Services to Users…”
Publicado 2008
Libro electrónico -
20152Publicado 2011Tabla de Contenidos: “…-- 4.1.Viewing projects -- Writing a feature -- The Factory Girl -- Adding a link to a project -- 4.2.Editing projects -- The edit action -- The update action -- 4.3.Deleting projects -- Writing a feature -- Adding a destroy action -- Looking for what isn't there -- 4.4.Summary -- 5.Nested resources -- 5.1.Creating tickets -- Nested routing helpers -- Creating a tickets controller -- Defining a has_many association -- Creating tickets within a project -- Finding tickets scoped by project -- Ticket validations -- 5.2.Viewing tickets -- Listing tickets -- Culling tickets -- 5.3.Editing tickets -- Adding the edit action -- Adding the update action -- 5.4.Deleting tickets -- 5.5.Summary -- 6.Authentication and basic authorization -- 6.1.What Devise does -- Installing Devise -- 6.2.User signup -- 6.3.Confirmation link sign-in -- Testing email -- Confirming confirmation -- 6.4.Form sign-in -- 6.5.Linking tickets to users -- Attributing tickets to users -- We broke something! …”
Libro electrónico -
20153Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Preface -- About the Authors -- Unit - 1 -- Chapter 1: Sets and Relations -- 1.1 Sets -- 1.2 Exercise -- 1.3 Algebra of Sets -- 1.4 Exercise -- 1.5 Binary Relation -- Graph of a Relation -- Properties of Binary Relation on a Set -- Equivalence Relation -- Graph of an Equivalence Relation -- 1.6 Exercise -- 1.7 Supplementary Exercises -- 1.8 Answers to Exercises -- Chapter 2: Binary Operations -- 2.1 Definition and Examples -- The multiplication table (Cayley table) -- Properties of binary operations -- Operation with Identity Element -- 2.2 Exercise -- 2.3 Introduction to Groups -- 2.4 Symmetries -- Symmetries of Non-square Rectangle -- Symmetries of an Equilateral Triangle -- Dihedral group -- 2.5 Exercise -- 2.6 Solved Problems -- 2.7 Supplementary Exercises -- 2.8 Answers to Exercises -- Chapter 3: Functions -- 3.1 Definition and Representation -- Arrow Diagram for Function -- Representation of a Function -- 3.2 Images and Inverse Images -- Inverse Images -- Inverse image of a set -- 3.3 Types of Functions -- 3.4 Real Valued Functions -- 3.5 Some Functions on the Set of Real Numbers -- 3.6 Exercise -- 3.7 Inverse of a Function -- 3.8 Composition of Functions -- 3.9 Solved Problems -- 3.10 Exercise -- 3.11 Cardinality of a Set -- 3.12 Countable Sets -- 3.13 Exercise -- 3.14 Solved Problems -- 3.15 Supplementary Exercise -- 3.16 Answers to Exercises -- Chapter 4: Number System -- 4.1 Number Systems -- Algebraic Properties of Natural Numbers -- Order Properties of Natural Numbers -- Algebraic Properties of Integers -- Order Properties of Integers -- Divisibility -- 4.2 Division Algorithm -- 4.3 Exercise -- 4.4 Greatest Common Divisor -- Euclidean Algorithm -- Working Rule -- 4.5 Least Common Multiple -- 4.6 Exercise -- 4.7 Congruence Relation -- 4.8 Exercise -- 4.9 Supplementary Problems -- 4.10 Answers to Exercises…”
Libro electrónico -
20154por Ramana, N. V.Tabla de Contenidos: “…Competitive Examination Questions -- Chapter 3: Power System Network Matrices-2 -- 3.1 Introduction -- 3.2 Partial Network -- 3.3 Case Studies in Zbus Algorithm -- 3.4 Algorithm for Formation of Bus Impedance Matrix-No Mutual Coupling between the Elements -- 3.4.1 Type-1 Modification -- 3.4.2 Type-2 Modification -- 3.4.3 Type-3 Modification -- 3.4.4 Type-4 Modification -- 3.4.5 MATLAB Program for Zbus Formation -- 3.5 Algorithm for the Formation of Zbus- Consideration of Mutually Coupled Elements -- 3.5.1 Type-1 and Type-2 Modifications -- 3.5.2 Type-3 and Type-4 Modifications -- 3.5.3 Summary of Formulas -- 3.6 Modifications In Zbus for Changes in the Network -- Questions from Previous Question Papers -- Competitive Examination Questions -- Chapter 4: Power Flow Studies-1 -- 4.1 Introduction -- 4.1.1 Basic Applications of Power Flow Studies and its Significance in Power System Operation and Control: -- 4.1.2 Data Preparation: -- 4.2 Network Modelling -- 4.3 Mathematical Modelling -- 4.3.1 Mathematical Model for Stage-1 Quantities -- 4.3.2 Mathematical Modeling for Stage-2 Quantities -- 4.4 Gauss-Seidel Iterative Method -- 4.5 Classification of Buses -- 4.5.1 PQ Bus or Load Bus -- 4.5.2 PV Bus or Generator Bus -- 4.5.3 Voltage Controlled Buses -- 4.5.4 Slack Bus/Swing Bus/Reference Bus -- 4.6 Case Studies in Power Flow Problem -- 4.7 Algorithm for Power Flow Solution by the Gauss-Seidel Method -- 4.7.1 Case-1: GS Method to obtain Bus Quantities when the PV Buses are Absent -- 4.7.2 Case-2: GS Method to obtain Bus Quantities when the PV Buses are Present -- 4.7.3 Flow Chart: Power Flow Solution by GS Method -- 4.8 Conclusion -- Questions from Previous Question Papers -- Competitive Examination Questions -- Chapter 5: Power Flow Studies-2 -- 5.1 Introduction -- 5.2 Newton-Raphson Method -- 5.2.1 NR Method for Single-Valued Functions…”
Publicado 2010
Libro electrónico -
20155Publicado 2011Tabla de Contenidos: “…Cover -- Preface to the Second Edition -- Preface to the First Edition -- Contents -- About the Author -- Chapter 1: Analysis of Stress -- 1.1 Introduction -- 1.2 Classification of Load -- 1.3 Stress -- 1.4 Concept of Stress at a Point -- 1.5 State of Plane Stress -- 1.6 Principal Stresses -- 1.7 Mohr's Circle -- 1.8 Stress Concentration -- Problems -- Objective Questions -- Answers -- Chapter 2: Analysis of Strain -- 2.1 Concept of Strain -- 2.2 Direct and Shearing Strain -- 2.2.1 Shearing Strain -- 2.3 State of Strain at a Point -- 2.4 State of Plane Strain -- 2.5 Strain Gauge -- 2.6 Strain Gauge Application -- Problems -- Objective Questions -- Answers -- Chapter 3: Stress-Strain Relationship -- 3.1 Hooke's Law -- 3.2 Three Dimensional Hooke's Law -- 3.3 Stress-Strain Relationships for Plane Stress -- 3.4 Stress-Strain Relationships for Plane Strain -- 3.5 Bulk Modulus -- 3.6 Relation Between E and G -- 3.7 Generalized Hooke's Law -- 3.8 Relationship Among Elastic Constants for an Isotropic Homogeneous Elastic Material -- Problems -- Objective Questions -- Answers -- Chapter 4: Axial Loading -- 4.1 Introduction -- 4.2 Stress and Strain Under Axial Load -- 4.3 Static Properties of Materials -- 4.4 Elastic Stress-Strain Relationship -- 4.5 Mechanical Strengths -- 4.6 Strain Hardening -- 4.7 Yielding, Yield Strength and Proof Stress -- 4.8 Fracture Mode -- 4.9 Strain Energy -- 4.10 Resilience and Toughness -- 4.11 Deformation of Axially Loaded Members -- 4.12 Bars of Varying Cross-Section -- 4.13 Factor of Safety -- 4.14 Temperature Effects -- 4.15 Statically Indeterminate Axially Loaded Members -- 4.16 Composite Bars -- Problems -- Objective Questions -- Answers -- Chapter 5: Thin-Walled Pressure Vessels -- 5.1 Introduction -- 5.2 Stresses in Thin Cylinders -- 5.3 Strain and Change in Volume -- 5.4 Strengthening of Thin Cylinders…”
Libro electrónico -
20156Publicado 2018Tabla de Contenidos: “…PREFACE xi ACKNOWLEDGMENTS xiii FOREWORD xv CHAPTER 1 INTRODUCTION 1 1.1 Introduction 1 Bibliography 4 CHAPTER 2 ELECTRIC NETWORK ANALYSIS IN ENERGY PROCESSING AND SMART GRID 5 2.1 Introduction 5 2.2 Complex Power Concepts 5 2.3 Review of AC-Circuit Analysis Using Phasor Diagrams 8 2.4 Polyphase Systems 9 2.5 Three-Phase Loads with Impedence Loads 13 2.6 Transformation of Y to Delta and Delta to Y 17 2.7 Summary of Phase and Line Voltages/Currents for Balanced Three-Phase Systems 19 2.8 Per-Unit Systems 22 2.9 Chapter Summary 27 Exercises 27 Bibliography 29 CHAPTER 3 MAGNETIC SYSTEMS FOR ENERGY PROCESSING 31 3.1 Introduction 31 3.2 Magnetic Fields 31 3.3 Equivalent Magnetic and Electric Circuits 34 3.4 Overview of Magnetic Materials 35 3.5 Hysteresis Loops and Hysteresis Losses in Ferromagnetic Materials 35 3.6 Definitions 38 3.7 Magnetic Circuit Losses 38 3.8 Producing Magnetic Flux in Air Gap 40 3.9 Rectangular-Shaped Magnetic Circuits 41 3.10 Chapter Summary 45 Exercises 45 Bibliography 47 CHAPTER 4 TRANSFORMERS 49 4.1 Introduction 49 4.2 First Two Maxwell's Laws 50 4.3 Transformers 51 4.4 Ideal Single-Phase Transformer Models 56 4.5 Modeling a Transformer into Equivalent Circuits 59 4.6 Transformer Testing 65 4.7 Transformer Specifications 71 4.8 Three-Phase Power Transformers 72 4.9 New Advances in Transformer Technology: Solid-State Transformers 72 4.10 Chapter Summary 78 Exercises 78 Bibliography 82 CHAPTER 5 INDUCTION MACHINES 83 5.1 Introduction 83 5.2 Construction and Types of Induction Motors 83 5.3 Operating Principle 85 5.4 Basic Induction-Motor Concepts 86 5.5 Induction-Motor Slip 88 5.6 Rotor Current and Leakage Reactance 88 5.7 Rotor Copper Loss 91 5.8 Developing the Equivalent Circuit of Polyphase, Wound-Rotor Induction Motors 92 5.9 Computing Corresponding Torque of Induction Motors 96 5.10 Approximation Model for Induction Machines 97 5.11 Speed Control of Induction Motors 100 5.12 Application of Induction Motors 101 5.13 induction-Generator Principles 101 5.14 Chapter Summary 103 Exercises 104 Bibliography 106 CHAPTER 6 SYNCHRONOUS MACHINES 107 6.1 Introduction 107 6.2 Synchronous-Generator Construction 107 6.3 Exciters 108 6.4 Governors 110 6.5 Synchronous Generator Operating Principle 110 6.6 Equivalent Circuit of Synchronous Machines 112 6.7 Synchronous Generator Equivalent Circuits 113 6.8 Over Excitation and Under Excitation 114 6.9 Open-Circuit and Short-Circuit Characteristics 115 6.10 Performance Characteristics of Synchronous Machines 118 6.11 Generator Compounding Curve 122 6.12 Synchronous Generator Operating Alone: Concept of Infinite Bus 122 6.13 Initial Elementary Facts about Synchronous Machines 123 6.14 Cylindrical-Rotor Machines for Turbo Generators 125 6.15 Synchronous Machines with Effects of Saliency: Two-Reactance Theory 125 6.16 The Salient-Pole Machine 126 6.17 Synchronous Motors 128 6.18 Synchronous Machines and System Stability 131 6.19 Chapter Summary 135 Exercises 136 Bibliography 137 CHAPTER 7 DC MACHINES 139 7.1 Introduction 139 7.2 Conductor Moving in a Uniform Magnetic Field 139 7.3 Current-Carrying Conductor in a Uniform Magnetic Field 139 7.4 DC-Machine Construction and Nameplate Parameters 141 7.5 DC Machine Pertinent Nameplate Parameters 142 7.6 Development and Configuration of Equivalent Circuits of DC Machines 142 7.7 Classification of DC Machines 147 7.8 Voltage Regulation 151 7.9 Power Computation for DC Machines 151 7.10 Power Flow and Efficiency 152 7.11 DC Motors 155 7.12 Computation of Speed of DC Motors 155 7.13 DC-Machine Speed-Control Methods 163 7.14 Ward Leonard System 164 7.15 Chapter Summary 166 Exercises 167 Bibliography 168 CHAPTER 8 PERMANENT-MAGNET MOTORS 169 8.1 Introduction 169 8.2 Permanent-Magnet DC Motors 169 8.3 Permanent-Magnet Synchronous Motors 177 8.4 Variants of Permanent-Magnet Synchronous Motors 186 8.5 Chapter Summary 190 Bibliography 190 CHAPTER 9 RENEWABLE ENERGY RESOURCES 193 9.1 Introduction 193 9.2 Distributed Generation Concepts 193 9.3 DG Benefits 194 9.4 Working Definitions and Classifications of Renewable Energy 195 9.5 Renewable-Energy Penetration 218 9.6 Maximum Penetration Limits of Renewable-Energy Resources 218 9.7 Constraints to Implementation of Renewable Energy 219 Exercises 221 Bibliography 222 CHAPTER 10 STORAGE SYSTEMS IN THE SMART GRID 223 10.1 Introduction 223 10.2 Forms of Energy 223 10.3 Energy Storage Systems 223 10.4 Cost Benefits of Storage 239 10.5 Chapter Summary 244 Bibliography 244 CHAPTER 11 POWER ELECTRONICS 247 11.1 Introduction 247 11.2 Power Systems with Power Electronics Architecture 248 11.3 Elements of Power Electronics 249 11.4 Power Semiconductor Devices 249 11.5 Applications of Power Electronics Devices to Machine Control 276 11.6 Applications of Power Electronics Devices to Power System Devices 280 11.7 Applications of Power Electronics to Utility, Aerospace, and Shipping 281 11.8 Facts 282 11.9 Chapter Summary 286 Bibliography 287 CHAPTER 12 CONVERTERS AND INVERTERS 289 12.1 Introduction 289 12.2 Definitions 289 12.3 DC-DC Converters 290 12.4 Inverters 296 12.5 Rectifiers 301 12.6 Applications 312 12.7 Chapter Summary 320 Exercises 320 Bibliography 322 CHAPTER 13 MICROGRID APPLICATION DESIGN AND TECHNOLOGY 323 13.1 Introduction to Microgrids 323 13.2 Types of Microgrids 324 13.3 Microgrid Architecture 325 13.4 Modeling of a Microgrid 330 13.5 Chapter Summary 332 Bibliography 333 CHAPTER 14 MICROGRID OPERATIONAL MANAGEMENT 335 14.1 Perfomance Tools of a Microgrid 335 14.2 Microgrid Functions 337 14.3 IEEE Standards for Microgrids 344 14.4 Microgrid Benefits 346 14.5 Chapter Summary 349 Bibliography 349 CHAPTER 15 THE SMART GRID: AN INTRODUCTION 351 15.1 Evolution, Drivers, and the Need for Smart Grid 351 15.2 Comparison of Smart Grid with the Current Grid System 352 15.3 Architecture of a Smart Grid 353 15.4 Design for Smart-Grid Function for Bulk Power Systems 353 15.5 Smart-Grid Challenges 362 15.6 Design Structure and Procedure for Smart-Grid Best Practices 363 15.7 Chapter Summary 365 Bibliography 365 CHAPTER 16 SMART-GRID LAYERS AND CONTROL 367 16.1 Introduction 367 16.2 Controls for the Smart Grid 367 16.3 Layers of Smart Grid Within the Grid 373 16.4 Command, Control, and Communication Applications in Real Time 390 16.5 Hardware-in-the-Loop for Energy Processing and the Smart Grid 394 16.6 Evolution of Cyber-Physical Systems 394 16.7 Chapter Summary 396 Bibliography 397 CHAPTER 17 ENERGY PROCESSING AND SMART-GRID TEST BEDS 401 17.1 Introduction 401 17.2 Study of Available Test Beds for the Smart Grid 401 17.3 Smart Microgrid Test-Bed Design 403 17.4 Smart-Grid Test Beds 404 17.5 Smart-Grid Case Studies 405 17.6 Simulation Tools, Hardware, and Embedded Systems 408 17.7 Limitations of Existing Smart-Grid Test Beds 411 17.8 Chapter Summary 412 Bibliography 412 INDEX 415.…”
Libro electrónico -
20157Publicado 2020Tabla de Contenidos: “…Intro -- Inhalt -- Vorwort -- Danksagung -- Einführung -- Wer dieses Buch lesen sollte -- Wie man dieses Buch liest -- Was Sie in diesem Buch finden -- Ein Disclaimer zum Hacking -- Kapitel 1: Bug-Bounty-Grundlagen -- 1.1 Schwachstellen und Bug-Bounties -- 1.2 Client und Server -- 1.3 Was beim Besuch einer Website passiert -- 1.3.1 Schritt 1: Extrahieren des Domainnamens -- 1.3.2 Schritt 2: Auflösen der IP-Adresse -- 1.3.3 Schritt 3: Herstellen einer TCP-Verbindung -- 1.3.4 Schritt 4: Senden eines HTTP-Requests -- 1.3.5 Schritt 5: Die Response des Servers -- 1.3.6 Schritt 6: Rendering der Response -- 1.4 HTTP-Requests -- 1.4.1 Request-Methoden -- 1.4.2 HTTP ist zustandslos -- 1.5 Zusammenfassung -- Kapitel 2: Offene Redirects -- 2.1 Wie offene Redirects funktionieren -- 2.2 Offener Redirect bei Shopify-Theme-Installation -- 2.3 Offener Redirect bei Shopify-Log-in -- 2.4 Interstitieller Redirect bei HackerOne -- 2.5 Zusammenfassung -- Kapitel 3: HTTP Parameter Pollution -- 3.1 Serverseitiges HPP -- 3.2 Clientseitiges HPP -- 3.3 HackerOnes Social-Media-Buttons -- 3.4 Abmelden von Benachrichtigungen bei Twitter -- 3.5 Twitter Web Intents -- 3.6 Zusammenfassung -- Kapitel 4: Cross Site Request Forgery -- 4.1 Authentifizierung -- 4.2 CSRF mit GET-Requests -- 4.3 CSRF mit POST-Requests -- 4.4 Schutz vor CSRF-Angriffen -- 4.5 Twitter-Abmeldung bei Shopify -- 4.6 Instacart-Zonen eines Nutzers ändern -- 4.7 Vollständige Übernahme eines Badoo-Accounts -- 4.8 Zusammenfassung -- Kapitel 5: HTML Injection und Content Spoofing -- 5.1 Coinbase: Kommentare einfügen durch Zeichencodierung -- 5.2 Ungewolltes Einbinden von HTML bei HackerOne -- 5.3 Den Fix zu obigem Bug bei HackerOne umgehen -- 5.4 Content Spoofing bei Within Security -- 5.5 Zusammenfassung -- Kapitel 6: Carriage Return/Line Feed Injection -- 6.1 HTTP Request Smuggling…”
Libro electrónico -
20158Publicado 2020Tabla de Contenidos: “…2.7.8 Vergleich mit Europa -- 2.8 Weitere internationale Behörden -- 3 Qualitätsmanagement -- 3.1 Aufbau der Norm ISO 13485 -- 3.2 Prozessorientierter Ansatz -- 3.3 Dokumentationsanforderungen -- 3.3.1 Qualitätsmanagement-Handbuch -- 3.3.2 Zu dokumentierende Verfahren -- 3.3.3 Dokumente und Aufzeichnungen -- 3.4 Verantwortung der Leitung -- 3.5 Management von Ressourcen -- 3.6 Produktrealisierung -- 3.6.1 Planung -- 3.6.2 Einbindung des Kunden -- 3.6.3 Design und Entwicklung -- 3.6.4 Beschaffung -- 3.6.5 Produktion und Dienstleistungserbringung -- 3.6.6 Umgang mit Kundeneigentum -- 3.6.7 Überwachung von Messmitteln -- 3.7 Messung, Analyse und Verbesserung -- 3.7.1 Sammeln von Rückmeldungen -- 3.7.2 Internes Audit -- 3.7.3 Messung von Prozessen -- 3.7.4 Fehlerhafte Produkte -- 3.7.5 Verbesserung -- 4 Risikomanagement -- 4.1 Einführung -- 4.1.1 Regulatorischer Rahmen -- 4.1.2 Bedeutung des Risikomanagements -- 4.1.3 Begriffe -- 4.2 Die Risikobewertungsmatrix -- 4.2.1 Definition der Achsen -- 4.2.2 Risikoakzeptanz -- 4.3 Verfahren zur Risikoanalyse -- 4.3.1 Vorläufige Gefährdungsanalyse (PHA) -- 4.3.2 Fehlerbaumanalyse (FTA) -- 4.3.3 Fehlermöglichkeits- und -einflussanalyse (FMEA) -- 4.3.4 Abschätzen von Wahrscheinlichkeit und Schweregrad -- 4.4 Die ISO 14971 -- 4.4.1 Allgemeine Anforderungen an das Risikomanagement -- 4.4.2 Der Risikomanagementprozess -- 4.4.3 Dokumentation -- 4.5 Zusammenspiel mit anderen Normen -- 4.5.1 Zusammenspiel mit der ISO 13485 -- 4.5.2 Zusammenspiel mit der IEC 62304 -- 4.5.3 Zusammenspiel mit der IEC 62366-1 -- 4.6 Risikomanagement bei Software -- 4.6.1 Definition Softwaresicherheitsklassen -- 4.6.2 Wahrscheinlichkeit und Softwaresicherheitsklassen -- 4.6.3 Dekomposition des Softwaresystems -- 4.6.4 Einflüsse auf die Architektur -- 4.7 Zusammenfassung -- 5 Lebenszyklus medizinischer Software…”
Libro electrónico -
20159Publicado 2021Tabla de Contenidos: “…Control Structures -- for Loops and for Expressions -- if/then/else-if Expressions -- match Expressions and Pattern Matching -- try/catch/finally Blocks -- while Loops -- Control Structures as a Defining Feature of Programming Languages -- 4.1 Looping over Data Structures with for -- Problem -- Solution -- Discussion -- See Also -- 4.2 Using for Loops with Multiple Counters -- Problem -- Solution -- Discussion -- See Also -- 4.3 Using a for Loop with Embedded if Statements (Guards) -- Problem -- Solution -- Discussion -- 4.4 Creating a New Collection from an Existing Collection with for/yield -- Problem -- Solution -- Discussion -- See Also -- 4.5 Using the if Construct Like a Ternary Operator -- Problem -- Solution -- Discussion -- 4.6 Using a Match Expression Like a switch Statement -- Problem -- Solution -- Discussion -- See Also -- 4.7 Matching Multiple Conditions with One Case Statement -- Problem -- Solution -- See Also…”
Libro electrónico -
20160Publicado 2020Tabla de Contenidos: “…-- 3.5.3 The hurdles of log aggregation -- Summary -- 4 Data instead of information -- 4.1 Start with the user, not the data -- 4.2 Widgets, the dashboard building blocks -- 4.2.1 The line graph -- 4.2.2 The bar graph -- 4.2.3 The gauge -- 4.3 Giving context to your widgets -- 4.3.1 Giving context through color -- 4.3.2 Giving context through threshold lines -- 4.3.3 Giving context through time comparisons -- 4.4 Organizing your dashboard -- 4.4.1 Working with dashboard rows…”
Libro electrónico