Mostrando 20,261 - 20,280 Resultados de 20,705 Para Buscar '" 44"', tiempo de consulta: 0.18s Limitar resultados
  1. 20261
    por Hendrycks, Dan
    Publicado 2024
    Tabla de Contenidos: “…Review of Safe Design Principles -- 4.4. COMPONENT FAILURE ACCIDENT MODELS AND METHODS -- 4.4.1. …”
    Libro electrónico
  2. 20262
    Publicado 2017
    Tabla de Contenidos: “…-- 2.3.1 The Standards-Making Process of OMG -- 2.3.2 The History of UML -- 2.4 Modeling -- 2.4.1 What Kind of Modeling -- 2.4.2 Purposes for UML Modeling -- 2.4.2.1 Analysis -- 2.4.2.2 Design -- 2.4.2.3 Implementation -- 2.4.2.4 Communication -- 2.4.3 Principles of Modeling -- 2.4.3.1 Risk Mitigation -- 2.4.3.2 Information Hiding and Simplicity -- 2.4.3.3 Whole-Part Relationships -- 2.4.3.4 Classification and Generalization -- 3 Questions for Chapter 2 -- Answers for Chapter 2 -- 4 The Organization of UML -- 4.1 The UML 2.5 Specification -- 4.1.1 Target Audience -- 4.1.2 The Document Layout -- 4.2 The Language Definition-The Clauses -- 4.3 The Subclauses -- 4.4 The Abstract Syntax -- 4.5 The Layered Metamodel -- 4.6 Diagrams -- 4.6.1 Structure Diagrams -- 4.6.2 Behavior Diagrams…”
    Libro electrónico
  3. 20263
    Publicado 2017
    Tabla de Contenidos: “…3.3.4 Development of the Kinematic Trajectory-Tracking Error Model -- 3.3.5 Linear Controller -- 3.3.6 Lyapunov-Based Control Design -- 3.3.7 Takagi-Sugeno Fuzzy Control Design in the LMI Framework -- Takagi-Sugeno Fuzzy Error Model of a Differentially Driven Wheeled Mobile Robot -- PDC Control of a Differentially Driven Wheeled Mobile Robot -- 3.3.8 Model-Based Predictive Control -- Discrete MPC -- 3.3.9 Particle Swarm Optimization-Based Control -- MPC With PSO -- 3.3.10 Visual Servoing Approaches for Solving the Control Problems in Mobile Robotics -- 3.4 Optimal Velocity Profile Estimation for a Known Path -- References -- Chapter 4: Path Planning -- 4.1 Introduction -- 4.1.1 Robot Environment -- 4.1.2 Path Planning -- 4.1.3 Configuration and Configuration Space -- 4.1.4 Mathematical Description of Obstacle Shape and Pose in the Environment -- Border-Based Description of Obstacles -- Obstacle Description Using Intersecting Half-Planes -- 4.2 Environment Presentation for Path Planning Purposes -- 4.2.1 Graph Representation -- 4.2.2 Cell Decomposition -- Accurate Decomposition to Cells -- Approximate Decomposition to Cells -- 4.2.3 Roadmap -- Visibility Graph -- Voronoi Graph -- Triangulation -- 4.2.4 Potential Field -- 4.2.5 Sampling-Based Path-Planning -- RRT Method -- PRM Method -- 4.3 Simple Path Planning Algorithms:Bug Algorithms -- 4.3.1 Bug0 Algorithm -- 4.3.2 Bug1 Algorithm -- 4.3.3 Bug2 Algorithm -- 4.4 Graph-Based Path Planning Methods -- 4.4.1 Breadth-First Search -- 4.4.2 Depth-First Search -- 4.4.3 Iterative Deepening Depth-First Search -- 4.4.4 Dijkstra's Algorithm -- 4.4.5 A∗ Algorithm -- 4.4.6 Greedy Best-First Search -- References -- Chapter 5: Sensors Used in Mobile Systems -- 5.1 Introduction -- 5.2 Coordinate Frame Transformations -- 5.2.1 Orientation and Rotation -- 5.2.2 Translation and Rotation…”
    Libro electrónico
  4. 20264
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Media Table of Contents -- Chapter 1: Introducing the Office Web Apps -- Tell Me: More Media 1.1-Understanding Cloud Computing -- Show Me: Media 1.2-Signing Up for a Windows Live ID -- Show Me: Media 1.3-Installing Silverlight in Firefox -- Show Me: Media 1.4-Signing in to SkyDrive -- Chapter 2: Learning Windows Live SkyDrive Essentials -- Show Me: Media 2.1-Applying a Windows Live Theme -- Tell Me: More Media 2.2-Organizing Your SkyDrive Folders -- Show Me: Media 2.3-Saving a Word 2010 Document to SkyDrive -- Show Me: Media 2.4-Disabling File Comments -- Chapter 3: Learning SharePoint 2010 Essentials -- Tell Me: More Media 3.1-Organizing Your SharePoint Libraries -- Show Me: Media 3.2-Filtering and Grouping a SharePoint Library -- Show Me: Media 3.3-Saving a Word 2010 Document to SharePoint -- Show Me: Media 3.4-Converting an Office Document for Editing in an Office Web App -- Chapter 4: Collaborating with the Office Web Apps -- Tell Me: More Media 4.1-Understanding SkyDrive Permissions -- Show Me: Media 4.2-Inviting Your Facebook Friends to Your SkyDrive Network -- Show Me: Media 4.3-Adding the SkyDrive Public RSS Feed to Google Reader -- Tell Me: More Media 4.4-Creating Unique SharePoint Permissions -- Show Me: Media 4.5-Creating a Custom SharePoint Group -- Show Me: Media 4.6-Viewing a SharePoint Library as an RSS Feed -- Chapter 5: Formatting Your Office Web Apps Documents -- Show Me: Media 5.1-Applying Text and Fill Colors in the Excel Web App -- Tell Me: More Media 5.2-Using Fonts Wisely -- Show Me: Media 5.3-Converting an Existing List of Items to a Bulleted List -- Chapter 6: Working with the Office Web Apps File Features -- Tell Me: More Media 6.1-Why You Need to Save Files -- Show Me: Media 6.2-Saving a Copy of a File in the Excel Web App -- Show Me: Media 6.3-Downloading a Snapshot of an Excel Workbook…”
    Libro electrónico
  5. 20265
    Publicado 2023
    Tabla de Contenidos: “…3.3.1 Centralized System and Its Physiognomies -- 3.3.2 Advantages -- 3.3.3 Disadvantages of Centralized System -- 3.4 Distributed System Architecture -- 3.4.1 Advantages of Distributed System Architecture -- 3.4.2 Drawbacks of Distributed System Architecture -- 3.5 Data Communication Taking Place in Distributed IoT Environment -- 3.5.1 Internet of Things (IoT) Protocol -- 3.5.2 Constrained Application Protocol (CoAP) -- 3.5.3 Message Queuing Telemetry Transport (MQTT) -- 3.5.4 Wi-Fi -- 3.5.5 Zigbee -- 3.5.6 Extensible Messaging and Presence Protocol (XMPP) -- 3.5.7 Data Distribution Service (DDS) -- 3.5.8 Advanced Message Queuing Protocol (AMQP) -- 3.5.9 Smart Home and IoT Applications: An Example -- 3.5.10 IoT Services, Machines and Applications -- 3.5.11 Sensor-Based IoT Services -- 3.5.12 Application in IoT Environment -- 3.5.13 Future of IoT in a COVID-19 Pandemic -- 3.6 Conclusion -- References -- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction -- 4.1 Introduction -- 4.2 Cloud-Based Solutions -- 4.2.1 Information and Communications Technology -- 4.2.2 Artificial Intelligence and Machine Learning -- 4.2.3 Data Analytics and Business Intelligence -- 4.3 Impact of Industry 4.0 in the Cloud Computing Industry -- 4.3.1 Agriculture and Forestry -- 4.3.2 Entertainment, Media, and Hospitality -- 4.3.3 Robotics and Automation, Manufacturing and Maintenance -- 4.4 Significance and Impact of Cloud in the Pandemic Outbreak -- 4.5 Conclusion and Future Directions -- References -- Chapter 5 Network Security in Evolving Networking Technologies: Developments and Future Directions -- 5.1 Introduction -- 5.2 Background on Attacks, Security Services and Challenges -- 5.2.1 Types of Attacks Possible on Network -- 5.2.2 Security Services -- 5.2.3 Challenges…”
    Libro electrónico
  6. 20266
    Publicado 2023
    Tabla de Contenidos: “…3.2 Hierarchical Structuring of Matter: Diatom Algae and the Bio-Assisted Nanostructured Additive Manufacturing Paradigm -- 3.3 Structural Design of Diatom Frustules -- 3.4 Mechanical Performance of Diatom Frustules - Experimental Characterization -- 3.4.1 Nanoindentation Testing of Diatom Frustules -- 3.4.2 AFM Studies of Diatom Frustules -- 3.5 Engineering Applications of Diatomaceous Earth -- 3.6 NEMS/MEMS Perspective -- 3.7 On the Mathematical Description of Self-Organized Diatom Frustule Growth -- 3.8 On the Kinetics of Diatom Colony Growth -- 3.9 Advanced Pattern Analysis of the Hierarchical Structure of Diatom Frustules -- 3.10 Concluding Remarks -- Acknowledgement -- References -- Part II: Diatom Development, Growth and Metabolism -- Chapter 4 Ring to the Linear: Valve Ontogeny Indicates Two Potential Evolutionary Pathways of Core Araphid Diatoms -- 4.1 Introduction -- 4.2 Material and Methods -- 4.2.1 Fragilaria mesolepta -- 4.2.2 Staurosira binodis -- 4.2.3 Induction of Synchronous Division -- 4.2.4 Electron Microscopy -- 4.3 Results -- 4.3.1 Fragilaria mesolepta -- 4.3.2 Staurosira binodis -- 4.4 Discussion -- 4.5 Conclusion -- References -- Chapter 5 Mathematical Basis for Diatom Growth Modeling -- 5.1 Introduction -- 5.2 General Physiology of Diatoms -- 5.3 Mathematical View of Diatom Growth -- 5.4 Physical Basis for Diatom Modeling -- 5.4.1 Diatom Dimensions -- 5.4.2 Ambient Temperature -- 5.4.3 Light Intensity and Duration -- 5.5 Review of Existing Mathematical Models -- 5.5.1 Gompertz Model -- 5.5.2 Monod Model -- 5.5.3 Michaelis-Menten Model -- 5.5.4 Droop Model -- 5.5.5 Aquaphy Model -- 5.5.6 Mechanistic Model -- 5.6 Results -- 5.7 Conclusion -- 5.8 Prospects -- References -- Chapter 6 Diatom Growth: How to Improve the Analysis of Noisy Data -- 6.1 Introduction -- 6.1.1 What is a Growth Curve? …”
    Libro electrónico
  7. 20267
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Part I Update of SRF Fundamentals -- Chapter 1 Introduction -- Chapter 2 SRF Fundamentals Review -- 2.1 SRF Basics -- 2.2 Fabrication and Processing on Nb‐Based SRF Structures -- 2.2.1 Cavity Fabrication -- 2.2.2 Preparation -- 2.2.3 A Decade of Progress -- 2.3 SRF Physics -- 2.3.1 Zero DC Resistance -- 2.3.2 Meissner Effect -- 2.3.3 Surface Resistance and Surface Impedance in RF Fields -- 2.3.4 Nonlocal Response of Supercurrent -- 2.3.5 BCS -- 2.3.6 Residual Resistance -- 2.3.7 Smearing of Density of States -- 2.3.8 Ginzburg-Landau (GL) Theory -- 2.3.9 Critical Fields -- 2.3.10 Comparison Between Ginzburg-Landau and BCS -- 2.3.11 Derivation of Rs and Xs -- Part II High Q Frontier: Performance Advances and Understanding -- Chapter 3 Nitrogen‐Doping -- 3.1 Introduction -- 3.2 N‐Doping Discovery -- 3.3 Surface Nitride -- 3.4 Interstitial N -- 3.5 Electron Mean Free Path Dependence -- 3.5.1 LE‐μSR Measurements of Mean Free path -- 3.6 Anti‐Q‐Slope Origins from BCS Resistance -- 3.7 N‐Doping and Residual Resistance -- 3.7.1 Trapped DC Flux Losses -- 3.7.2 Residual Resistance from Hydride Losses -- 3.7.3 Tunneling Measurements -- 3.8 RF Field Dependence of the Energy Gap -- 3.9 Frequency dependence of Anti‐Q‐Slope -- 3.10 Theories for Anti‐Q‐Slope -- 3.10.1 Xiao Theory -- 3.10.2 Gurevich Theory -- 3.10.3 Nonequilibrium Superconductivity -- 3.10.4 Two‐Fluid Model‐Based on Weak Defects -- 3.11 Quench Field of N‐Doped Cavities -- 3.12 Evolution and Comparison of N‐doping Recipes -- 3.13 High Q and Gradient R&amp -- D Program for LCLS‐HE -- 3.14 N‐Doping at Other Labs -- 3.15 Summary of N‐doping -- Chapter 4 High Q via 300 °C Bake (Mid‐T‐Bake) -- 4.1 A Surprise Discovery -- 4.2 Similarities to N‐Doping -- 4.3 Mid‐T Baking at Other Labs -- 4.4 The Low‐Field Q‐Slope (LFQS) and 340 °C Baking Cures…”
    Libro electrónico
  8. 20268
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Come possono i Paesi passare da un approccio reattivo a un approccio proattivo ai rischi naturali: approfondimenti tratti dai case study nazionali -- 4.4. Un approccio inclusivo, olistico e multirischio alla governance del rischio di calamità naturali per la resilienza -- 4.5. …”
    Libro electrónico
  9. 20269
    por Lens, Piet
    Publicado 2023
    Tabla de Contenidos: “…4.2.1.1 Structure and components -- 4.2.1.2 Electrochemical reactions in batteries -- 4.2.2 Battery performance metrics -- 4.2.2.1 Cell, module, and pack level -- 4.2.2.2 Energy density -- 4.2.2.3 Power density -- 4.2.2.4 Specific energy (or gravimetric energy density) -- 4.2.2.5 Specific power (or gravimetric power density) -- 4.2.2.6 Cycle life -- 4.2.2.7 Charge-discharge efficiency -- 4.2.2.8 Self-discharge rate -- 4.2.2.9 Operating temperature -- 4.2.2.10 Impedance -- 4.2.2.11 Round-trip efficiency -- 4.3 Types of Batteries -- 4.3.1 Nickel-cadmium batteries -- 4.3.2 Lead-acid batteries -- 4.3.2.1 Lead-acid battery composition -- 4.3.2.2 Working principle of lead acid battery -- 4.3.2.3 Market perspective -- 4.3.3 Lithium-ion batteries -- 4.3.3.1 Lithium-ion battery composition -- 4.3.3.2 Working principle of lithium-ion battery -- 4.3.3.3 Market perspective -- 4.3.4 Sodium-ion batteries -- 4.3.5 Zinc-air batteries -- 4.4 Supercapacitors -- 4.4.1 Principles and operations -- 4.4.1.1 Electric double-layer capacitance -- 4.4.1.2 Faradaic capacitance -- 4.4.2 Supercapacitor electrode materials -- 4.4.2.1 Electrode materials for EDLC -- 4.4.2.2 Electrode materials for pseudocapacitor -- 4.4.2.3 Electrode materials for hybrid supercapacitor -- 4.5 Types of Supercapacitors -- 4.5.1 Electrochemical double-layer capacitors -- 4.5.2 Pseudocapacitors -- 4.5.3 Hybrid capacitor -- 4.6 Applications of Batteries and Supercapacitors -- 4.6.1 Portable electronics and consumer applications -- 4.6.2 Mobility of the future -- 4.6.2.1 Electric vehicles and hybrid vehicles -- 4.6.2.2 Aerospace applications -- 4.6.3 New energy technologies -- 4.6.3.1 Renewable energy integration…”
    Libro electrónico
  10. 20270
    por Zimmermann, Tobias
    Publicado 2024
    Tabla de Contenidos: “…-- 4.1 Zwei Lernexperimente -- 4.2 Lernen ist Konstruktion in einem Netzwerk -- 4.3 Neuronale Netzwerke -- 4.4 Drei zentrale Lernmechanismen in neuronalen Netzwerken -- 4.4.1 Lernen durch Vorhersagefehler -- 4.4.2 Aktivierung von Vorwissen -- 4.4.3 Schemata -- 4.5 Gefühle, Motivation und Bedeutsamkeit -- 4.5.1 Motivation und die Steuerung des Lernens -- 4.5.2 Die Selbstbestimmungstheorie der Motivation -- 4.6 Aufbau komplexer Wissensstrukturen: Zeit und Expertise -- 4.6.1 Lernen braucht Zeit -- 4.6.2 Langfristiger Aufbau von Expertise -- 4.7 Argumentatives Schlussfolgern als sozialer Prozess -- 4.8 Überleitung zum zweiten Teil des Buches -- Teil II: Anwendung…”
    Libro electrónico
  11. 20271
    Publicado 2024
    Tabla de Contenidos: “…3 The Impact of Distributed Computing on Data Analytics and Business Insights -- 3.1 Introduction -- 3.1.1 Role of Distributed Computing in Data Analytics -- 3.1.2 Importance of Business Insights in Decision-Making -- 3.1.3 Overview of Distributed Computing and Data Analytics -- 3.2 Distributed Computing and Data Analytics -- 3.2.1 Distributed Computing -- 3.2.2 Overview of Data Analytics -- 3.2.3 Distributed Computing in Data Analytics -- 3.3 Business Insights and Decision-Making -- 3.3.1 Definition of Business Insights -- 3.3.2 Importance of Business Insights in Decision-Making -- 3.3.3 Applications of Business Insights and their Impact -- 3.4 Challenges and Limitations -- 3.5 The Impact of Distributed Computing on Data Analytics -- 3.5.1 Distributed Computing in Improvising Data Analytics -- 3.6 Conclusion -- References -- 4 Machine Learning and Its Application in Educational Area -- 4.1 Introduction -- 4.2 Previous Work -- 4.3 Technique -- 4.3.1 Machine Learning -- 4.3.2 Supervised Learning -- 4.3.3 Unsupervised Learning -- 4.4 Analysis of Data -- 4.5 Educational Data Mining -- 4.6 Hadoop Approach -- 4.7 Artificial Neural Network (ANN) -- 4.8 Decision Tree -- 4.9 Results/Discussion -- 4.9.1 Personalized Learning Through Adaptive Learning -- 4.10 Increasing Efficiency Using Learning Analytics -- 4.11 Predictive Analysis for Better Assessment Evaluation -- 4.12 Future Scope -- 4.13 Conclusion -- References -- 5 Approaches and Methodologies for Distributed Systems: Threats, Challenges, and Future Directions -- 5.1 Introduction -- 5.2 Distributed Systems -- 5.3 Literature Review -- 5.4 Threats to Distributed Systems Security -- 5.4.1 Hacking -- 5.4.2 Malware -- 5.4.3 Denial of Service (DoS) Attacks -- 5.4.4 Man-in-the-Middle (MitM) Attacks -- 5.4.5 Advanced Persistent Threats (APTs) -- 5.4.6 Insider Threats -- 5.4.7 Phishing -- 5.4.8 Ransomware…”
    Libro electrónico
  12. 20272
    Publicado 2024
    Tabla de Contenidos: “…Towards Big Data in healthcare IoT -- 4.4. Impact of smartphones on edge computing -- 4.4.1. …”
    Libro electrónico
  13. 20273
    Publicado 2004
    Tabla de Contenidos: “…Optimizing the UNIX System Services environment -- 4.1 UNIX System Services overview -- 4.1.1 UNIX overview -- 4.1.2 What people like about UNIX -- 4.1.3 What people do not like about UNIX -- 4.1.4 UNIX operating system -- 4.1.5 UNIX file system -- 4.1.6 MVS and UNIX functional comparison -- 4.1.7 z/OS UNIX System Services fundamentals -- 4.1.8 Address spaces -- 4.1.9 What people like about z/OS UNIX -- 4.1.10 What people do not like about z/OS UNIX -- 4.2 z/OS UNIX performance tuning -- 4.3 z/OS UNIX file systems -- 4.3.1 Hierarchical File System (HFS) -- 4.3.2 Network File System (NFS) -- 4.3.3 Temporary File System (TFS) -- 4.3.4 zSeries File System (zFS) -- 4.3.5 zFS aggregates -- 4.3.6 Installing a zFS -- 4.3.7 Tuning zFS -- 4.4 HFS and zFS comparison -- Chapter 5. Using Tivoli Workload Scheduler for z/OS effectively -- 5.1 Prioritizing the batch flows -- 5.1.1 Why do you need this? …”
    Libro electrónico
  14. 20274
    por Kovari, Peter
    Publicado 2004
    Tabla de Contenidos: “…Technical coexistence scenarios -- 4.1 Introduction -- 4.2 Fundamental interaction classifications -- 4.2.1 Stateful synchronous interaction -- 4.2.2 Stateless synchronous interaction -- 4.2.3 Stateless asynchronous interaction -- 4.2.4 Stateful asynchronous interaction -- 4.2.5 RPC interface style -- 4.2.6 Document interface style -- 4.2.7 Argument by value paradigm -- 4.2.8 Argument by reference paradigm -- 4.2.9 Distributed object architecture -- 4.2.10 Message Oriented Architecture -- 4.2.11 Service-oriented architecture -- 4.2.12 Conclusions and recommendations -- 4.3 Layer interaction classifications -- 4.3.1 Interaction case a: client logic to client logic -- 4.3.2 Interaction case b: client logic to presentation logic -- 4.3.3 Interaction case c: client logic to business logic -- 4.3.4 Interaction case d: presentation logic to presentation logic -- 4.3.5 Interaction case e: presentation logic to business logic -- 4.3.6 Interaction case f: business logic to business logic -- 4.3.7 Interaction case g: business logic to resource -- 4.3.8 Interaction case h: resource to resource -- 4.3.9 Conclusion and recommendations -- 4.4 Technical solution mapping -- 4.4.1 Stateful synchronous integration solution candidates -- 4.4.2 Stateless synchronous integration solution candidates -- 4.4.3 Stateful asynchronous integration solution candidates -- 4.4.4 Other potential candidate technical solutions (to be proven) -- 4.4.5 Some last resource integration technologies -- Chapter 5. …”
    Libro electrónico
  15. 20275
    por Hayashi, Kumiko, 1958-
    Publicado 2005
    Tabla de Contenidos: “…CPU analysis and tuning -- 4.1 CPU overview -- 4.1.1 Performance considerations with POWER4-based systems -- 4.1.2 Performance considerations with POWER5-based systems -- 4.2 CPU monitoring -- 4.2.1 The lparstat command -- 4.2.2 The mpstat command -- 4.2.3 The procmon tool -- 4.2.4 The topas command -- 4.2.5 The sar command -- 4.2.6 The iostat command -- 4.2.7 The vmstat command -- 4.2.8 The ps command -- 4.2.9 The trace tool -- 4.2.10 The curt command -- 4.2.11 The splat command -- 4.2.12 The truss command -- 4.2.13 The gprof command -- 4.2.14 The pprof command -- 4.2.15 The prof command -- 4.2.16 The tprof command -- 4.2.17 The time command -- 4.2.18 The timex command -- 4.3 CPU related tuning tools and techniques -- 4.3.1 The smtctl command -- 4.3.2 The bindintcpu command -- 4.3.3 The bindprocessor command -- 4.3.4 The schedo command -- 4.3.5 The nice command -- 4.3.6 The renice command -- 4.4 CPU summary -- 4.4.1 Other useful commands for CPU monitoring -- Chapter 5. …”
    Libro electrónico
  16. 20276
    Publicado 2003
    Tabla de Contenidos: “…Planning and prerequisites overview -- 4.1 IBM Web Infrastructure Orchestration implementation flow -- 4.2 Web infrastructure provisioning lab environment -- 4.3 Initial provisioning planning -- 4.3.1 Hardware -- 4.3.2 Software -- 4.4 Application provisioning -- 4.4.1 Planning for orchestration and provisioning of applications -- Chapter 5. …”
    Libro electrónico
  17. 20277
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Acknowledgements -- 1 Overview of the Book -- 2 Background -- 2.1 Evolution of Cellular Systems -- 2.1.1 Third-generation Network Architecture -- 2.1.2 Important Elements of the 3G Architecture -- 2.1.3 Functions and Protocols in the 3GPP System -- 2.1.4 The EPS System -- 2.2 Basic Security Concepts -- 2.2.1 Information Security -- 2.2.2 Design Principles -- 2.2.3 Communication Security Features -- 2.3 Basic Cryptographic Concepts -- 2.3.1 Cryptographic Functions -- 2.3.2 Securing Systems with Cryptographic Methods -- 2.3.3 Symmetric Encryption Methods -- 2.3.4 Hash Functions -- 2.3.5 Public-key Cryptography and PKI -- 2.3.6 Cryptanalysis -- 2.4 Introduction to LTE Standardization -- 2.4.1 Working Procedures in 3GPP -- 2.5 Notes on Terminology and Specification Language -- 2.5.1 Terminology -- 2.5.2 Specification Language -- 3 GSM Security -- 3.1 Principles of GSM Security -- 3.2 The Role of the SIM -- 3.3 Mechanisms of GSM Security -- 3.3.1 Subscriber Authentication in GSM -- 3.3.2 GSM Encryption -- 3.3.3 GPRS Encryption -- 3.3.4 Subscriber Identity Confidentiality -- 3.4 GSM Cryptographic Algorithms -- 4 Third-generation Security (UMTS) -- 4.1 Principles of Third-generation Security -- 4.1.1 Elements of GSM Security Carried Over to 3G -- 4.1.2 Weaknesses in GSM Security -- 4.1.3 Higher Level Objectives -- 4.2 Third-generation Security Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2 Ciphering Mechanism -- 4.2.3 Integrity Protection Mechanism -- 4.2.4 Identity Confidentiality Mechanism -- 4.3 Third-generation Cryptographic Algorithms -- 4.3.1 KASUMI -- 4.3.2 UEA1 and UIA1 -- 4.3.3 SNOW3G, UEA2 and UIA2 -- 4.3.4 MILENAGE -- 4.3.5 Hash Functions -- 4.4 Interworking between GSM and 3G security -- 4.4.1 Interworking Scenarios -- 4.4.2 Cases with SIM -- 4.4.3 Cases with USIM…”
    Libro electrónico
  18. 20278
    Publicado 2012
    Tabla de Contenidos: “…-- List of Contributors xiii -- Preface xv -- Acknowledgements xvii -- List of Abbreviations xix -- 1 Introduction 1 /Harri Holma and Antti Toskala -- 1.1 Introduction 1 -- 1.2 Radio Technology Convergence Towards LTE 1 -- 1.3 LTE Capabilities 3 -- 1.4 Underlying Technology Evolution 4 -- 1.5 Traffic Growth 4 -- 1.6 LTE-Advanced Schedule 6 -- 1.7 LTE-Advanced Overview 6 -- 1.8 Summary 7 -- 2 LTE-Advanced Standardization 8 /Antti Toskala -- 2.1 Introduction 8 -- 2.2 LTE-Advanced and IMT-Advanced 8 -- 2.3 LTE-Advanced Requirements 9 -- 2.4 LTE-Advanced Study and Specification Phases 10 -- 2.5 Further LTE-Advanced 3GPP Releases 11 -- 2.6 LTE-Advanced Specifications 11 -- 2.7 Conclusions 12 -- References 12 -- 3 LTE Release 8 and 9 Overview 14 /Antti Toskala -- 3.1 Introduction 14 -- 3.2 Physical Layer 14 -- 3.3 Architecture 22 -- 3.4 Protocols 23 -- 3.5 EPC and IMS 26 -- 3.6 UE Capability and Differences in Release 8 and 9 27 -- 3.7 Conclusions 28 -- References 29 -- 4 Downlink Carrier Aggregation 30 /Mieszko Chmiel and Antti Toskala -- 4.1 Introduction 30 -- 4.2 Carrier Aggregation Principle 30 -- 4.3 Protocol Impact from Carrier Aggregation 33 -- 4.4 Physical Layer Impact from Carrier Aggregation 38 -- 4.5 Performance 42 -- 4.6 Band Combinations for Carrier Aggregation 46 -- 4.7 Conclusions 48 -- Reference 49 -- 5 Uplink Carrier Aggregation 50 /Jari Lindholm, Claudio Rosa, Hua Wang and Antti Toskala -- 5.1 Introduction 50 -- 5.2 Uplink Carrier Aggregation Principle 50 -- 5.3 Protocol Impacts from Uplink Carrier Aggregation 51 -- 5.4 Physical Layer Impact from Uplink Carrier Aggregation 52 -- 5.5 Performance 56 -- 5.6 Band Combinations for Carrier Aggregation 61 -- 5.7 Conclusions 62 -- References 62 -- 6 Downlink MIMO 63 /Timo Lunttila, Peter Skov and Antti Toskala -- 6.1 Introduction 63 -- 6.2 Downlink MIMO Enhancements Overview 63 -- 6.3 Protocol Impact from Downlink MIMO Enhancements 64 -- 6.4 Physical Layer Impact from Downlink MIMO 65 -- 6.5 Performance 70 -- 6.6 Conclusions 73.…”
    Libro electrónico
  19. 20279
    por Seo, Jin Keun
    Publicado 2013
    Tabla de Contenidos: “…Machine generated contents note: Preface List of Abbreviations 1 Introduction 1.1 Forward Problem 1.2 Inverse Problem 1.3 Issues in Inverse Problem Solving 1.4 Linear, Nonlinear and Linearized Problems 2 Signal and System as Vectors 2.1 Vector Space 2.1.1 Vector Space and Subspace 2.1.2 Basis, Norm and Inner Product 2.1.3 Hilbert Space 2.2 Vector Calculus 2.2.1 Gradient 2.2.2 Divergence 2.2.3 Curl 2.2.4 Curve 2.2.5 Curvature 2.3 Taylor's Expansion 2.4 Linear System of Equations 2.4.1 Linear System and Transform 2.4.2 Vector Space of Matrix 2.4.3 Least Square Solution 2.4.4 Singular Value Decomposition (SVD) 2.4.5 Pseudo-inverse 2.5 Fourier Transform 2.5.1 Series Expansion 2.5.2 Fourier Transform 2.5.3 Discrete Fourier Transform (DFT) 2.5.4 Fast Fourier Transform (FFT) 2.5.5 Two-dimensional Fourier Transform References 3 Basics for Forward Problem 3.1 Understanding PDE using Images as Examples 3.2 Heat Equation 3.2.1 Formulation of Heat Equation 3.2.2 One-dimensional Heat Equation 3.2.3 Two-dimensional Heat Equation and Isotropic Diffusion 3.2.4 Boundary Conditions 3.3 Wave Equation 3.4 Laplace and Poisson Equations 3.4.1 Boundary Value Problem 3.4.2 Laplace Equation in a Circle 3.4.3 Laplace Equation in Three-dimensional Domain 3.4.4 Representation Formula for Poisson Equation References 4 Analysis for Inverse Problem 4.1 Examples of Inverse Problems in Medical Imaging 4.1.1 Electrical Property Imaging 4.1.2 Mechanical Property Imaging 4.1.3 Image Restoration 4.2 Basic Analysis 4.2.1 Sobolev Space 4.2.2 Some Important Estimates 4.2.3 Helmholtz Decomposition 4.3 Variational Problems 4.3.1 Lax-Milgram Theorem 4.3.2 Ritz Approach 4.3.3 Euler-Lagrange Equations 4.3.4 Regularity Theory and Asymptotic Analysis 4.4 Tikhonov Regularization and Spectral Analysis 4.4.1 Overview of Tikhonov Regularization 4.4.2 Bounded Linear Operators in Banach Space 4.4.3 Regularization in Hilbert Space or Banach Space 4.5 Basics of Real Analysis 4.5.1 Riemann Integrable 4.5.2 Measure Space 4.5.3 Lebesgue Measurable Function 4.5.4 Pointwise, Uniform, Norm Convergence and Convergence in Measure 4.5.5 Differentiation Theory References 5 Numerical Methods 5.1 Iterative Method for Nonlinear Problem 5.2 Numerical Computation of One-dimensional Heat equation 5.2.1 Explicit Scheme 5.2.2 Implicit Scheme 5.2.3 Crank-Nicolson Method 5.3 Numerical Solution of Linear System of Equations 5.3.1 Direct Method using LU Factorization 5.3.2 Iterative Method using Matrix Splitting 5.3.3 Iterative Method using Steepest Descent Minimization 5.3.4 Conjugate Gradient (CG) Method 5.4 Finite Difference Method (FDM) 5.4.1 Poisson Equation 5.4.2 Elliptic Equation 5.5 Finite Element Method (FEM) 5.5.1 One-dimensional Model 5.5.2 Two-dimensional Model 5.5.3 Numerical Examples References 6 CT, MRI and Image Processing Problems 6.1 X-ray CT 6.1.1 Inverse Problem 6.1.2 Basic Principle and Nonlinear Effects 6.1.3 Inverse Radon Transform 6.1.4 Artifacts in CT 6.2 MRI 6.2.1 Basic Principle 6.2.2 K-space Data 6.2.3 Image Reconstruction 6.3 Image Restoration 6.3.1 Role of p in (6.35) 6.3.2 Total Variation Restoration 6.3.3 Anisotropic Edge-preserving Diffusion 6.3.4 Sparse Sensing 6.4 Segmentation 6.4.1 Active Contour Method 6.4.2 Level Set Method 6.4.3 Motion Tracking for Echocardiography References 7 Electrical Impedance Tomography 7.1 Introduction 7.2 Measurement Method and Data 7.2.1 Conductivity and Resistance 7.2.2 Permittivity and Capacitance 7.2.3 Phasor and Impedance 7.2.4 Admittivity and Trans-impedance 7.2.5 Electrode Contact Impedance 7.2.6 EIT System 7.2.7 Data Collection Protocol and Data Set 7.2.8 Linearity between Current and Voltage 7.3 Representation of Physical Phenomena 7.3.1 Derivation of Elliptic PDE 7.3.2 Elliptic PDE for Four-electrode Method 7.3.3 Elliptic PDE for Two-electrode Method 7.3.4 Min-max Property of Complex Potential 7.4 Forward Problem and Model 7.4.1 Continuous Neumann-to-Dirichlet Data 7.4.2 Discrete Neumann-to-Dirichlet Data 7.4.3 Nonlinearity between Admittivity and Voltage 7.5 Uniqueness Theory and Direct Reconstruction Method 7.5.1 Calderon's Approach 7.5.2 Uniqueness and Three-dimensional Reconstruction: Infinite Measurements 7.5.3 Nachmann's D-bar Method in Two Dimension 7.6 Backprojection Algorithm 7.7 Sensitivity and Sensitivity Matrix 7.7.1 Perturbation and Sensitivity 7.7.2 Sensitivity Matrix 7.7.3 Linearization 7.7.4 Quality of Sensitivity Matrix 7.8 Inverse Problem of EIT 7.8.1 Inverse Problem of RC Circuit 7.8.2 Formulation of EIT Inverse Problem 7.8.3 Ill-posedness of EIT Inverse Problem 7.9 Static Imaging 7.9.1 Iterative Data Fitting Method 7.9.2 Static Imaging using 4-channel EIT System 7.9.3 Regularization 7.9.4 Technical Difficulty of Static Imaging 7.10 Time-difference Imaging 7.10.1 Data Sets for Time-difference Imaging 7.10.2 Equivalent Homogeneous Admittivity 7.10.3 Linear Time-difference Algorithm using Sensitivity Matrix 7.10.4 Interpretation of Time-difference Image 7.11 Frequency-difference Imaging 7.11.1 Data Sets for Frequency-difference Imaging 7.11.2 Simple Difference Ft,ω2− Ft,ω1 7.11.3 Weighted Difference Ft,ω2− [alpha] Ft,ω1 7.11.4 Linear Frequency-difference Algorithm using Sensitivity Matrix 7.11.5 Interpretation of Frequency-difference Image References 8 Anomaly Estimation and Layer Potential Techniques 8.1 Harmonic Analysis and Potential Theory 8.1.1 Layer Potentials and Boundary Value Problems for Laplace Equation 8.1.2 Regularity for Solution of Elliptic Equation along Boundary of Inhomogeneity 8.2 Anomaly Estimation using EIT 8.2.1 Size Estimation Method 8.2.2 Location Search Method 8.3 Anomaly Estimation using Planar Probe 8.3.1 Mathematical Formulation 8.3.2 Representation Formula References 9 Magnetic Resonance Electrical Impedance Tomography 9.1 Data Collection using MRI 9.1.1 Measurement of Bz 9.1.2 Noise in Measured Bz Data 9.1.3 Measurement of B = (Bx,By,Bz) 9.2 Forward Problem and Model Construction 9.2.1 Relation between J , Bz and σ 9.2.2 Three Key Observations 9.2.3 Data Bz Traces σ∇u © e z-directional Change of σ 9.2.4 Mathematical Analysis toward MREIT Model 9.3 Inverse Problem Formulation using B or J 9.4 Inverse Problem Formulation using Bz 9.4.1 Model with Two Linearly Independent Currents 9.4.2 Uniqueness 9.4.3 Defected Bz Data in a Local Region 9.5 Image Reconstruction Algorithm 9.5.1 J-substitution Algorithm 9.5.2 Harmonic Bz Algorithm 9.5.3 Gradient Bz Decomposition and Variational Bz Algorithm 9.5.4 Local Harmonic Bz Algorithm 9.5.5 Sensitivity Matrix Based Algorithm 9.5.6 Anisotropic Conductivity Reconstruction Algorithm 9.5.7 Other Algorithms 9.6 Validation and Interpretation 9.6.1 Image Reconstruction Procedure using Harmonic Bz Algorithm 9.6.2 Conductivity Phantom Imaging 9.6.3 Animal Imaging 9.6.4 Human Imaging 9.7 Applications References 10 Magnetic Resonance Elastography 10.1 Representation of Physical Phenomena 10.1.1 Overview of Hooke's Law 10.1.2 Strain Tensor in Lagrangian Coordinates 10.2 Forward Problem and Model 10.3 Inverse Problem in MRE 10.4 Reconstruction Algorithms 10.4.1 Reconstruction of [mu] with the Assumption of Local Homogeneity 10.4.2 Reconstruction of [mu] without the Assumption of Local Homogeneity 10.4.3 Anisotropic Elastic Moduli Reconstruction 10.5 Technical Issues in MRE References…”
    Libro electrónico
  20. 20280
    Publicado 2012
    Tabla de Contenidos: “…-- 4.2.2 ETSI M2M Work on Use Cases -- 4.2.3 Methodology for Developing Use Cases -- 4.3 Smart Metering Approach in ETSI M2M -- 4.3.1 Introduction -- 4.3.2 Typical Smart Metering Deployment Scenario -- 4.4 eHealth Approach in ETSI M2M -- 4.4.1 Introduction -- 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments -- 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design -- 4.6.1 Why Focus on Wireless Networks? …”
    Libro electrónico