Mostrando 2,761 - 2,780 Resultados de 2,860 Para Buscar '".ec"', tiempo de consulta: 0.11s Limitar resultados
  1. 2761
    por Feng, Guangliang
    Publicado 2024
    Tabla de Contenidos: “…Evaluation and Analysis of the Effect of Anti-slide Piles Around Pile Foundations of Super Large and Large Span Projects -- 1 Introduction -- 2 Three-Dimensional Finite Element Simulation -- 2.1 Engineering Situation -- 2.2 Calculated Operating Condition -- 2.3 Wind Load Condition -- 2.4 Finite Element Mesh and Boundary Condition -- 2.5 Constitutive Model and Soil Layer Parameters -- 3 Influence of the Length of Anti-Slide Pile -- 3.1 Effect of Anti-Slide Pile Length on Three-Dimensional Deformation of Foundation -- 3.2 Effect of Anti-Slide Pile Length on Three-Dimensional Deformation of Pile Foundation -- 3.3 Effect of Anti-Slide Pile Length on Maximum Deformation of Pile Foundation -- 4 Influence of Anti-Slide Pile Row Number -- 4.1 Effect of Different Anti-Slide Pile Rows on Three-Dimensional Deformation of Foundation -- 4.2 Effect of Different Anti-Slide Pile Rows on Three-Dimensional Deformation of Pile Foundation -- 5 Conclusion -- References -- Research on Geological Information Updating and Prediction of Tunnel Surrounding Rocks Based on Machine Learning -- 1 Introduction -- 2 Tunnel Surrounding Rock Geological Information Updating and Prediction Model Based on RNN -- 2.1 Recurrent Neural Network Theory -- 2.2 Prediction and Updating Process of Surrounding Rock Geological Information -- 3 Engineering Application -- 3.1 Data Processing -- 3.2 Model Construction -- 3.3 Model Validation -- 4 Conclusions -- References -- Planosol Soil Condition Improvement Effect of a New Plow of Three-Stage Subsoil Interval Mixing -- 1 Introduction -- 2 Materials and Methods -- 2.1 Albic Soil Structure and TSIMF -- 2.2 Soil Section -- 2.3 Traction Force (Draught) Test -- 2.4 Test Fields -- 2.5 Soil Properties -- 2.6 Yield -- 3 Results and Discussions -- 3.1 Soil Profile -- 3.2 Measured Traction Force (Draught) -- 3.3 Soil Water Content -- 3.4 EC Value…”
    Libro electrónico
  2. 2762
    por Alarcón García, Gloria
    Publicado 2020
    Libro electrónico
  3. 2763
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…La méthode hybride BES-EC -- 7.3.3. Remarques finales -- Référence -- Partie II. …”
    Libro electrónico
  4. 2764
    Libro electrónico
  5. 2765
    Publicado 1781
    991006220169706719
  6. 2766
    Publicado 2023
    Tabla de Contenidos: “…10.3.5 Time-Based Charging -- 10.3.6 Pulse Charging -- 10.3.7 Trickle Charging -- 10.4 Effect of Charge Control on Battery Performance -- 10.5 Charging Circuits -- 10.5.1 Half-Bridge and Full-Bridge Circuits -- 10.5.2 On-Board Charger (Level 1 and Level 2 Chargers) -- 10.5.3 Off-Board Charger (Level 3) -- 10.5.4 Fast Charger -- 10.5.5 Ultra-Fast Charger -- 10.6 Infrastructure Development and Challenges -- 10.6.1 Home Charging Station -- 10.6.2 Workplace Charging Station -- 10.6.3 Community and Highways EV Charging Station -- 10.6.4 Electrical Infrastructure Upgrades -- 10.6.5 Infrastructure Challenges and Issues -- 10.6.6 Commercially Available Charges -- 10.7 Isolation and Safety Requirement for EC Chargers -- References -- 11 Balancing/Balancing Control -- 11.1 Balancing Control Management and Its Significance -- 11.1.1 Two Expressions of Battery Capacity and SoC Inconsistency -- 11.1.2 Significance of Balancing Control Management -- 11.2 Classification of Balancing Control Management -- 11.2.1 Centralized Balancing and Distributed Balancing -- 11.2.2 Discharge Balancing, Charge Balancing, and Bidirectional Balancing -- 11.2.3 Passive Balancing and Active Balancing -- 11.3 Review and Analysis of Active Balancing Technologies -- 11.3.1 Independent-Charge Active Balancing Control -- 11.3.2 Energy-Transfer Active Balancing Control -- 11.3.3 How to Evaluate the Advantages and Disadvantages of an Active Balancing Control Scheme (an Efficiency Problem of Active B -- 11.4 Balancing Strategy Study -- 11.4.1 Balancing Time -- 11.4.2 Variable for Balancing -- 11.5 Two Active Balancing Control Strategies -- 11.5.1 Topologies of Two Active Balancing Schemes -- 11.5.2 Hierarchical Balancing Control Strategy -- 11.5.3 Lead-Acid Battery Transfer Balancing Control Strategy -- 11.6 Evaluation and Comparison of Balancing Control Strategies…”
    Libro electrónico
  7. 2767
    Publicado 2014
    Tabla de Contenidos: “…4.3.1.2 CEN technical bodies -- 4.3.1.3 European standards -- 4.3.1.4 Technical specifications -- 4.3.1.6 CENELEC workshop agreements (CWA) -- 4.3.1.7 CEN members -- 4.3.1.8 CEN/TC 225 -- 4.3.1.9 CENELEC -- 4.3.1.10 Smart grids: EC Mandate M/490 -- 4.3.1.11 ISO/IEC JTC 1/SWG 05 on the Internet of Things (IoT) -- 4.3.1.12 ISO/IEC JTC 1/WG 7 Sensor Networks -- 4.3.1.13 ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques -- 4.3.2 ETSI -- 4.3.3 IEEE -- 4.3.3.1 Overview -- 4.3.3.2 Cloud Computing -- 4.3.3.3 eHealth -- 4.3.3.4 eLearning -- 4.3.3.5 Intelligent Transportation Systems (ITS) -- 4.3.3.6 Network and Information Security (NIS) -- 4.3.3.7 Smart Grid -- 4.3.4 IETF -- 4.3.5 ITU-T -- 4.3.6 OASIS -- 4.3.6.1 Transactional Reliability -- 4.3.6.2 Modularity, reusability, and devices in the cloud -- 4.3.6.3 All that big data from all those things: access control, cybersecurity and privacy -- 4.3.6.4 Access control -- 4.3.6.5 Encryption and cybersecurity -- 4.3.6.6 Privacy -- 4.3.7 OGC -- 4.3.8 oneM2M -- 4.3.9 GS1 -- 4.3.9.1 The Role of Standards -- 4.3.9.2 GS1 Standards: Identify, Capture, Share -- 4.3.9.3 Looking forward -- 4.4 IERC Research Projects Positions -- 4.4.1 BETaaS Advisory Board Experts Position -- 4.4.2 IoT6 Position -- 4.5 Conclusions -- References -- 5 Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework -- 5.1 Introduction -- 5.2 BackgroundWork -- 5.3 Main Concepts and Motivation of the Framework -- 5.3.1 Identity Management -- 5.3.2 Size and Heterogeneity of the System -- 5.3.3 Anonymization of User Data and Metadata -- 5.3.4 Action's Control -- 5.3.5 Privacy by Design -- 5.3.6 Context Awareness -- 5.3.7 Summary -- 5.4 A Policy-based Framework for Security and Privacy in Internet of Things -- 5.4.1 Deployment in a Scenario -- 5.4.2 Policies and Context Switching…”
    Libro electrónico
  8. 2768
    Publicado 2018
    “…You will learn about Amazon EC2 service and deploy an app using Amazon EC2.You will also get well versed with container service which is Amazon EC2 Container Service (Amazon ECS) and you will learn to deploy an app using Amazon ECS. …”
    Libro electrónico
  9. 2769
    Tabla de Contenidos: “…Prix des actions pour les entreprises de la « nouvelle » et de « l'ancienne » éc... -- Graphique I.16. Demande récente et croissante de la production aux États- Unis -- Graphique I.17. …”
    Libro electrónico
  10. 2770
    por Russo, Raffaele
    Publicado 2007
    991004132719706719
  11. 2771
    Publicado 2021
    Tabla de Contenidos: “…Preparing the environment -- A.1 Installing Python and Anaconda -- A.1.1 Installing Python and Anaconda on Linux -- A.1.2 Installing Python and Anaconda on Windows -- A.1.3 Installing Python and Anaconda on macOS -- A.2 Running Jupyter -- A.2.1 Running Jupyter on Linux -- A.2.2 Running Jupyter on Windows -- A.2.3 Running Jupyter on MacOS -- A.3 Installing the Kaggle CLI -- A.4 Accessing the source code -- A.5 Installing Docker -- A.5.1 Installing Docker on Linux -- A.5.2 Installing Docker on Windows -- A.5.3 Installing Docker on MacOS -- A.6 Renting a server on AWS -- A.6.1 Registering on AWS -- A.6.2 Accessing billing information -- A.6.3 Creating an EC2 instance -- A.6.4 Connecting to the instance -- A.6.5 Shutting down the instance -- A.6.6 Configuring AWS CLI -- Appendix B. …”
    Libro electrónico
  12. 2772
    Publicado 2024
    Tabla de Contenidos: “…JavaScript analysis -- Specialized web technology fingerprinting libraries -- Proactive web security measures with Python -- Input validation and data sanitization -- Secure authentication and authorization -- Secure session management -- Secure coding practices -- Implementing security headers -- Summary -- Chapter 4: Exploiting Web Vulnerabilities Using Python -- Web application vulnerabilities - an overview -- SQL injection -- XSS -- IDOR -- A case study concerning web application security -- SQL injection attacks and Python exploitation -- Features of SQLMap -- How SQLMap works -- Basic usage of SQLMap -- Intercepting with MITMProxy -- XSS exploitation with Python -- Understanding how XSS works -- Reflected XSS (non-persistent) -- Stored XSS (persistent) -- Python for data breaches and privacy exploitation -- XPath -- CSS Selectors -- Summary -- Chapter 5: Cloud Espionage - Python for Cloud Offensive Security -- Cloud security fundamentals -- Shared Responsibility Model -- Cloud deployment models and security implications -- Encryption, access controls, and IdM -- Security measures offered by major cloud providers -- Access control in cloud environments -- Impact of malicious activities -- Python-based cloud data extraction and analysis -- Risks of hardcoded sensitive data and detecting hardcoded access keys -- Enumerating EC2 instances using Python (boto3) -- Exploiting misconfigurations in cloud environments -- Types of misconfigurations -- Identifying misconfigurations -- Exploring Prowler's functionality -- Enhancing security, Python in serverless, and infrastructure as code (IaC) -- Introducing serverless computing -- Introduction to IaC -- Summary -- Part 3: Python Automation for Advanced Security Tasks -- Chapter 6: Building Automated Security Pipelines with Python Using Third-Party Tools…”
    Libro electrónico
  13. 2773
    “…When the difference in respiration rates between the lower treatment and control is equal to or less than 25 % at any sampling time after day 28, agrochemicals can be evaluated as having no long-term influence on carbon transformation in soils. The EC50, EC25 and/or EC10 values are used for non agrochemicals…”
    Libro electrónico
  14. 2774
    por Església Catòlica.
    Publicado 1728
    Libro
  15. 2775
    Publicado 2009
    Tabla de Contenidos: “…6.5.3 Performance Evaluation 219 -- 6.5.4 Conclusions and Further Work 222 -- References 222 -- 7 Introduction to Multimedia Communications 225 -- 7.1 Introduction 225 -- 7.2 State of the Art: Wireless Multimedia Communications 228 -- 7.2.1 QoS in Wireless Networks 228 -- 7.2.2 Constraints on Wireless Multimedia Communications 231 -- 7.2.3 Multimedia Compression Technologies 234 -- 7.2.4 Multimedia Transmission Issues in Wireless Networks 235 -- 7.2.5 Resource Management Strategy in Wireless Multimedia Communications 239 -- 7.3 Conclusions 244 -- References 244 -- 8 Wireless Channel Models 247 -- 8.1 Introduction 247 -- 8.2 GPRS/EGPRS Channel Simulator 247 -- 8.2.1 GSM/EDGE Radio Access Network (GERAN) 247 -- 8.2.2 GPRS Physical Link Layer Model Description 250 -- 8.2.3 EGPRS Physical Link Layer Model Description 252 -- 8.2.4 GPRS Physical Link Layer Simulator 256 -- 8.2.5 EGPRS Physical Link Layer Simulator 261 -- 8.2.6 E/GPRS Radio Interface Data Flow Model 268 -- 8.2.7 Real-time GERAN Emulator 270 -- 8.2.8 Conclusion 271 -- 8.3 UMTS Channel Simulator 272 -- 8.3.1 UMTS Terrestrial Radio Access Network (UTRAN) 272 -- 8.3.2 UMTS Physical Link Layer Model Description 279 -- 8.3.3 Model Verification for Forward Link 290 -- 8.3.4 UMTS Physical Link Layer Simulator 298 -- 8.3.5 Performance Enhancement Techniques 307 -- 8.3.6 UMTS Radio Interface Data Flow Model 309 -- 8.3.7 Real-time UTRAN Emulator 312 -- 8.3.8 Conclusion 313 -- 8.4 WiMAX IEEE 802.16e Modeling 316 -- 8.4.1 Introduction 316 -- 8.4.2 WIMAX System Description 317 -- 8.4.3 Physical Layer Simulation Results and Analysis 323 -- 8.4.4 Error Pattern Files Generation 324 -- 8.5 Conclusions 328 -- 8.6 Appendix: Eb/No and DPCH_Ec/Io Calculation 329 -- References 330 -- 9 Enhancement Schemes for Multimedia Transmission over Wireless Networks 333 -- 9.1 Introduction 333 -- 9.1.1 3G Real-time Audiovisual Requirements 333 -- 9.1.2 Video Transmission over Mobile Communication Systems 335 -- 9.1.3 Circuit-switched Bearers 339.…”
    Libro electrónico
  16. 2776
    Libro
  17. 2777
    por Gibson, Edgar C. S. 1848-1924
    Publicado 1899
    Libro
  18. 2778
    Publicado 1950
    Libro
  19. 2779
    por Lingamallu, Phani Kumar
    Publicado 2023
    “…Basic understanding of AWS cloud fundamentals and different AWS cloud services used to run applications such as EC2, container solutions such as ECS, and EKS will be helpful when using this book…”
    Libro electrónico
  20. 2780
    Publicado 2022
    Tabla de Contenidos: “…1.17 CPU caches -- 1.18 Multiprogrammed computer systems -- 1.19 Timesharing systems -- 1.20 Mean response with FCFS and processor-sharing scheduling -- 1.21 Analysis of open and closed queueing network models -- 1.22 Bottleneck analysis and balanced job bounds -- 1.23 Performance analyses of I/O subsystems -- 1.24 Vector supercomputers -- 1.25 Parallel computers -- 1.25.1 The ILLIAC IV computer -- 1.25.2 Thinking Machines Connection Machine -- 1.25.3 Kendall Square Research's KSR-1 -- 1.25.4 Goodyear Massively Parallel Processor - MPP -- 1.25.5 MasPar -- 1.25.6 NCUBE -- 1.25.7 Meiko -- 1.25.8 SUPRENUM -- 1.25.9 Parsytec -- 1.25.10 Intel Personal SuperComputer - iPSC -- 1.25.11 IBM's BlueGene supercomputer -- 1.25.12 Tesla Dojo supercomputer for AI training -- 1.26 The future of supercomputing -- 1.27 Microprocessor CPUs, GPUs, FPGAs, and ASICs -- 1.28 RISCV and other microprocessors -- 1.29 The IBM PC and its compatibles -- 1.29.1 Experience with IBM workstations -- 1.30 Storage studies by Alan Jay Smith at Berkeley -- 1.31 Prefetching -- 1.32 Database buffers -- 1.33 Checkpointing in processing large jobs -- 1.34 Computer related rule of thumb -- 1.34.1 Amdahl rules in developing S/360 computers -- 1.34.2 Amdahl's law in the era of multicore -- 1.34.3 Amazon optimal configurations for x86-based EC2 instances -- 1.34.4 Kung's law -- 1.34.5 Brooks' law -- 1.34.6 Patterson et al.'…”
    Libro electrónico