Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 691
- Biblia 427
- Moral cristiana 281
- Teología dogmática 281
- Derecho canónico 258
- Teología 221
- Obras anteriores a 1800 201
- Iglesia Católica 197
- Documentales 187
- Data processing 165
- obras anteriores a 1800 163
- Sermones 155
- Management 154
- Computer networks 149
- Development 135
- Crítica e interpretación 115
- Tomás de Aquino 112
- Application software 109
- Computer programs 100
- Mathematical models 98
- Design and construction 96
- Engineering & Applied Sciences 95
- Derecho 93
- Derecho civil 91
- Historia eclesiástica 88
- Artificial intelligence 86
- Películas cinematográficas 83
- Security measures 83
- Filosofía 82
- WebSphere 81
-
1821por Symeonidis, VasileiosTabla de Contenidos: “…Weaving Practice, Research and Policymaking into Teachers' Preparation and Induction in Israel -- Abstract -- Keywords -- 1 Introduction -- 2 Literature Review -- 2.1 The Relationships between Policymaking and Research in Teacher Education -- 2.2 Factors that Impede Research Uptake in Policymaking -- 2.3 Factors that Can Support Collaboration between Teacher Educator Researchers and Policymakers -- 2.4 The Context of the Study: The MOFET Institute -- 3 Methodology -- 4 Findings -- 4.1 Case 1: Mentor Teachers' Preparation -- 4.1.1 Context and Background -- 4.1.2 Cultivating Relationships between Policymakers and Researchers: The Development of the Research Project -- 4.1.3 Methodology -- 4.1.4 Results -- 4.1.5 Policy Changes -- 4.2 Case 2: Retraining Former High-Tech Employees as High School Teachers -- 4.2.1 Context and Background -- 4.2.2 Forming Relationships between Policymakers and Researchers -- 4.2.3 The HTHS Evaluation Research Project -- 4.2.4 The Evaluation Study of the Community of Facilitators of SEMEL Professional Learning Communities -- 4.2.5 Policy Changes -- 4.3 Case 3: Preparing and Integrating Teachers of Ethiopian Descent -- 4.3.1 Context and Background -- 4.3.2 Forming Relations between Policymakers and Researchers -- 4.3.3 Methodology -- 4.3.4 Results -- 4.3.5 Policy Changes -- 5 Discussion…”
Publicado 2024
Libro electrónico -
1822Publicado 2010Tabla de Contenidos:Libro electrónico
-
1823Publicado 2023Tabla de Contenidos: “…3.2.2 Collection -- 3.2.3 Analysis and Processing -- 3.2.4 Production -- 3.2.5 Dissemination -- 3.2.6 Review -- 3.3 Situational Awareness -- 3.3.1 Example - 2013 Target Breach -- 3.4 Goal Oriented Security and Threat Modelling -- 3.5 Strategic, Operational, and Tactical Intelligence -- 3.5.1 Strategic Intelligence -- 3.5.1.1 Example - Lazarus Group -- 3.5.2 Operational Intelligence -- 3.5.2.1 Example - SamSam -- 3.5.3 Tactical Intelligence -- 3.5.3.1 Example - WannaCry -- 3.5.4 Sources of Intelligence Reports -- 3.5.4.1 Example - Shamoon -- 3.6 Incident Preparedness and Response -- 3.6.1 Preparation and Practice -- Summary -- References -- Chapter 4 Collecting Intelligence -- 4.1 Hierarchy of Evidence -- 4.1.1 Example - Smoking Tobacco Risk -- 4.2 Understanding Intelligence -- 4.2.1 Expressing Credibility -- 4.2.2 Expressing Confidence -- 4.2.3 Understanding Errors -- 4.2.3.1 Example - the WannaCry Email -- 4.2.3.2 Example - the Olympic Destroyer False Flags -- 4.3 Third Party Intelligence Reports -- 4.3.1 Tactical and Operational Reports -- 4.3.1.1 Example - Heartbleed -- 4.3.2 Strategic Threat Reports -- 4.4 Internal Incident Reports -- 4.5 Root Cause Analysis -- 4.6 Active Intelligence Gathering -- 4.6.1 Example - the Nightingale Floor -- 4.6.2 Example - the Macron Leaks -- Summary -- References -- Chapter 5 Generating Intelligence -- 5.1 The Intelligence Cycle in Practice -- 5.1.1 See it, Sense it, Share it, Use it -- 5.1.2 F3EAD Cycle -- 5.1.3 D3A Process -- 5.1.4 Applying the Intelligence Cycle -- 5.1.4.1 Planning and Requirements -- 5.1.4.2 Collection, Analysis, and Processing -- 5.1.4.3 Production and Dissemination -- 5.1.4.4 Feedback and Improvement -- 5.1.4.5 The Intelligence Cycle in Reverse -- 5.2 Sources of Data -- 5.3 Searching Data -- 5.4 Threat Hunting -- 5.4.1 Models of Threat Hunting -- 5.4.2 Analysing Data…”
Libro electrónico -
1824por Baumgartner, ManfredTabla de Contenidos: “…3.3.5 Exkurs: Realisierung in unterschiedlichen Vorgehensmodellen und Methoden -- Kompatibilität in agilen Projekten -- Synchronisierung durch BDD/ATDD -- Synchronisierung von unabhängigen SUT- und TAS-Entwicklungsprozessen -- 4 Risiken und Eventualitäten bei der Softwareverteilung -- 4.1 Auswahl des Testautomatisierungsansatzes und Planung von Verteilung/Rollout -- 4.1.1 Die Erprobung oder der Pilotversuch -- Ermittlung eines geeigneten Projekts -- Planen und Durchführen des Pilotversuchs -- Evaluierung des Pilotversuchs -- 4.1.2 Die Verteilung oder das Deployment -- Iterative und Inkrementelle Verteilungen sind hilfreich -- Unterstützung bei der Implementierung bereitstellen -- Kontinuierliche Verbesserung auf Basis von Nutzerfeedback -- Exkurs: Auf existierende Testprozesse aufbauen -- Exkurs: Auf bestehenden Erfahrungen und Artefakten aufbauen -- 4.2 Strategie für die Bewertung und Begrenzung von Risiken -- Typische Risiken -- Häufige Auslöser bzw. verstärkende Faktoren -- 4.2.1 Spezifische Risiken bei der Erstverteilung -- Zu lange Gesamtausführungszeit der Testsuites -- Installations- und Konfigurationsprobleme bei der Testumgebung -- 4.2.2 Spezifische Risiken bei der Wartungsverteilung -- Notwendige Änderungen an Testsuites und Testrahmen -- Unerwartete Seiteneffekte durch Änderungen von zentralen TAS-Komponenten -- Fehler durch Änderungen an der TAS-Infrastruktur -- Zusätzliche Fehler oder Performanzprobleme durch die Aktualisierung der TAS -- 4.3 Wartung der Testautomatisierung -- 4.3.1 Auslöser und Arten von Wartungsaktivitäten -- Adaptive Wartung -- Korrektive Wartung -- Verbessernde Wartung -- Präventive Wartung -- 4.3.2 Überlegungen zur Dokumentation der automatisierten Testmittel -- 4.3.3 Der Umfang von Wartungsaktivitäten -- 4.3.4 Wartung von Fremdkomponenten -- 4.3.5 Wartung von Schulungsmaterial -- 4.3.6 Verbesserung der Wartbarkeit…”
Publicado 2021
Libro electrónico -
1825por Nerukh, AlexanderTabla de Contenidos: “…3.4 The Evolution of an Electromagnetic Field in the Dielectric Layer after Its Creation -- 3.5 Electromagnetic Field in a Layer with Non-Linear and Time-Varying Medium -- 3.5.1 Integral Equation Representation for Numerical Calculation -- 3.5.2 Numerical Algorithm for Solving Integral Equations -- 3.5.3 Numerical Results -- 3.5.4 Comparison of the FDTD and Volterra Integral Equations in Time Domain Approaches -- 3.6 Triple Asymmetry in Time-Spatial Structure of an Airy Pulse in Non-Stationary Environment -- 3.6.1 The Problem Equations -- 3.6.2 Transformed Pulses -- 4: 3D+T Problems with Electromagnetic Transients -- 4.1 The 3D Resolvent for a Problem with a Plane Boundary of a Dielectric Half-Space -- 4.1.1 The Resolvent for the Inner Problem -- 4.1.2 The Resolvent for the External Problem -- 4.2 Fresnel's Formulae in Time-Domain for a Plane Interface between Two Dielectrics -- 4.3 Inclined Incidence of a Plane Wave on a Plane Boundary of the Time-Varying Medium -- 4.3.1 The Field Caused by the Permittivity Time Jump -- 4.3.2 The Field Caused by the Boundary Presence Only -- 4.3.3 The Evolution of the Refracted Field -- 4.3.4 The Field Outside the Non-Stationary Medium -- 4.4 Refocusing of Point Source Radiation by the Plane Boundary of a Time-Varying Dielectric -- 4.5 Formation of Point Source Image by Time Change of Plasma -- 4.6 Frequency Change of Partial Spherical Waves Induced by Time Change of Medium Permittivity -- 4.6.1 Field Representation -- 4.6.2 Analysis of the Inner Field -- 4.6.3 Analysis of the Exterior Field -- 4.7 Evolution of Waves after Plasma Ignition in a Sphere -- 4.7.1 Solution to the Problem -- 4.7.2 The Evolutionary Process -- 5: Non-Stationarity of Electromagnetic Waves Caused by the Movement of a Medium Boundary -- 5.1 Transformation of an Electromagnetic Wave by a Uniformly Moving Boundary of a Medium…”
Publicado 2018
Libro electrónico -
1826Publicado 2023Tabla de Contenidos:Libro electrónico
-
1827Publicado 2024Tabla de Contenidos: “…4.2.3.1 Wearable interstitial fluid (ISF) CGM -- 4.2.3.2 Wearable sweat CGM -- 4.2.3.3 Wearable tear CGM -- 4.2.3.4 Wearable saliva CGM -- 4.3 Computational intelligence in glucose monitoring -- 4.3.1 Machine learning -- 4.3.2 Recommender systems -- 4.3.3 Mobile and WebApp -- 4.3.4 TeleMedicine -- 4.3.5 Auto-administer therapy -- 4.4 Conclusion and future scope -- References -- Chapter 5: A semi-definite programming-based design of a robust depth control for a submersible autonomous robot through state feedback control -- 5.1 Introduction -- 5.2 Modeling of SAR in depth plane -- 5.2.1 Problem statement -- 5.3 Design of robust optimal control -- 5.3.1 Robust optimal state feedback for polytopic SAR system -- 5.3.1.1 Preliminaries: LMI-based LQR controller -- 5.3.1.2 Robust LMI-based optimal controller -- 5.4 Results and discussion -- 5.5 Conclusion -- Acknowledgments -- References -- Chapter 6: Embedded system with in-memory compute neuromorphic accelerator for multiple applications -- 6.1 Introduction -- 6.2 Accelerator for in-memory compute applications -- 6.2.1 Background -- 6.2.2 Design and implementation of standard 32×40×10 in-memory compute architecture -- 6.2.2.1 Working principle -- 6.2.3 Potential benefits of the accelerator in various applications -- 6.3 In-memory compute accelerator: An embedded system perspective for multiple applications -- 6.3.1 Climate technology -- 6.3.2 Social sciences -- 6.3.3 Medical sciences -- 6.3.4 Finance technology -- 6.3.5 Gaming technology (GT) -- 6.4 Results and discussion -- 6.4.1 Parametric analysis of ideal resistive memory and swish activation function -- 6.4.2 Inference analysis for the in-memory compute accelerator -- 6.4.3 Training analysis for the in-memory compute accelerator -- 6.5 Conclusion -- References…”
Libro electrónico -
1828por Choudhury, TanupriyaTabla de Contenidos: “…Blockchain in healthcare -- 4.3. Challenges of Blockchain in healthcare -- 4.3.1. …”
Publicado 2023
Libro electrónico -
1829por Sharma, A.KTabla de Contenidos: “…-- 2.3.2 Stepwise Refinement -- 2.3.3 Using Control Structures -- 2.4 Algorithm Analysis -- 2.4.1 Big-Oh Notation -- Chapter 3 : Arrays:Searching and Sorting -- 3.1 Introduction -- 3.2 One-dimensional Arrays -- 3.2.1 Traversal -- 3.2.2 Selection -- 3.2.3 Searching -- 3.2.4 Insertion and Deletion -- 3.2.5 Sorting -- 3.3 Multi-dimensional Arrays -- 3.4 Representation of Arrays in Physical Memory -- 3.4.1 Physical Address Computation of Elements of One-dimensional Arrays -- 3.4.2 Physical Address Computation of Elements of Two-dimensional Arrays -- 3.5 Applications of Arrays -- 3.5.1 Polynomial Representation and Operations -- 3.5.2 Sparse Matrix Representation -- Chapter 4 : Stacks and Queues -- 4.1 Stacks -- 4.1.1 Stack Operations -- 4.2 Applications of Stacks -- 4.2.1 Arithmetic Expressions -- 4.3 Queues -- 4.3.1 Queue Operations -- 4.3.2 Circular Queue -- 4.3.3 Priority Queue -- 4.3.4 The Deque -- Chapter 5 : Pointers -- 5.1 Introduction -- 5.1.1 The '&' Operator -- 5.1.2 The '*' Operator -- 5.2 Pointer Variables -- 5.2.1 Dangling Pointers -- 5.3 Pointers and Arrays -- 5.4 Array of Pointers -- 5.5 Pointers and Structures -- 5.6 Dynamic Allocation -- 5.6.1 Self Referential Structures -- Chapter 6 : Linked Lists -- 6.1 Introduction -- 6.2 Linked Lists -- 6.3 Operations on Linked Lists -- 6.3.1 Creation of a Linked List -- 6.3.2 Travelling a Linked List -- 6.3.3 Searching a Linked List -- 6.3.4 Insertion in a Linked List -- 6.3.5 Deleting a Node from a Linked List…”
Publicado 2013
Libro electrónico -
1830
-
1831Publicado 2005Tabla de Contenidos: “…3.4.2.3 Förderung befristeter Arbeitsverhältnisse -- 3.4.3 Sicherung der Rahmenbedingungen auf dem Arbeitsmarkt -- 3.4.3.1 Verhinderung oder Verringerung von Marktmacht auf dem Arbeitsmarkt -- 3.4.3.2 Befolgung der Regeln durch die Akteure -- 3.5 Zusammenfassung -- 4 Eine Abschätzung des neoklassisch begründeten Reformbedarfs: die Rigidität des argentinischen Arbeitsmarktes im lateinamerikanischen Kontext -- 4.1 Formale und faktische Arbeitsmarktrigidität -- 4.2 Die Messung formaler Arbeitsmarktrigiditäten -- 4.2.1 Lohnnebenkosten -- 4.2.2 Mindestlöhne -- 4.2.3 Kollektive Verhandlungen -- 4.2.4 Kündigungsschutz -- 4.2.5 Aggregierter Rigiditätsindikator -- 4.3 Die Messung faktischer Arbeitsmarktrigiditäten -- 4.3.1 Arbeitslosigkeit -- 4.3.2 Unterbeschäftigung und informeller Sektor -- 4.3.3 Beschäftigung -- 4.3.4 Lohnentwicklung -- 4.4 Zusammenfassung: Vergleichende Abschätzung des Reformbedarfs auf dem argentinischen Arbeitsmarkt -- TEIL 3 - POLITÖKONOMISCHE ASPEKTE DER ARBEITSMARKTREFORMEN IN ARGENTINIEN -- 5 Ein politökonomisches Modell zur Analyse von Arbeitsmarktreformen -- 5.1 Politökonomische Ansätze - ein Überblick -- 5.1.1 Strukturelle Ansätze -- 5.1.2 Wahlansätze -- 5.1.3 Interessengruppenansätze -- 5.2 Das Analysemodell -- 5.2.1 Grundannahmen -- 5.2.1.1 Kollektive Akteure -- 5.2.1.2 Unterscheidung von Gruppen und Organisationen -- 5.2.1.3 Unterscheidung von Reformverantwortlichen und Reformbetroffenen -- 5.2.2 Identifikation der für Arbeitsmarktreformen relevanten Akteure -- 5.2.2.1 Reformverantwortliche -- 5.2.2.2 Reformbetroffene -- 5.2.2.3 Zusammenfassung -- 5.2.3 Struktur des Analysemodells -- 5.2.3.1 Eigennutzen, Grundinteressen und Präferenzen -- 5.2.3.2 Durchsetzungsfähigkeit -- 5.2.3.3 Reformumfeld -- 5.2.3.4 Reformgegenstand und Präferenzintensität -- 5.2.4 Determinanten der strukturellen Durchsetzungsfähigkeit kollektiver Akteure…”
Libro electrónico -
1832por Seemann, MarkTabla de Contenidos: “…4.2.3 Lockerung der statischen Analyse -- 4.3 Von außen nach innen -- 4.3.1 JSON entgegennehmen -- 4.3.2 Eine Reservierung vornehmen -- 4.3.3 Unit-Test -- 4.3.4 DTO und Domänenmodell -- 4.3.5 Fake-Objekt -- 4.3.6 Schnittstelle für das Repository -- 4.3.7 Objekte im Repository erstellen -- 4.3.8 Abhängigkeiten konfigurieren -- 4.4 Vervollständigen Sie den Slice -- 4.4.1 Schema -- 4.4.2 SQL-Repository -- 4.4.3 Konfiguration mit der Datenbank -- 4.4.4 Führen Sie einen Smoke Test durch -- 4.4.5 Test der Außengrenze mit einer Fake-Datenbank -- 4.5 Fazit -- Kapitel 5: Kapselung -- 5.1 Speichern Sie die Daten -- 5.1.1 Prämisse der Priorität der Transformation -- 5.1.2 Parametrisierter Test -- 5.1.3 DTO ins Domänenmodell kopieren -- 5.2 Validierung -- 5.2.1 Ungültige oder fehlende Datumsangaben -- 5.2.2 Rot-Grün-Refactor -- 5.2.3 Natürliche Zahlen -- 5.2.4 Robustheitsgrundsatz -- 5.3 Schutz von Invarianten -- 5.3.1 Immer gültig -- 5.4 Fazit -- Kapitel 6: Triangulierung -- 6.1 Kurzzeit- und Langzeitgedächtnis -- 6.1.1 Legacy Code und Gedächtnis -- 6.2 Kapazität -- 6.2.1 Überbuchung -- 6.2.2 Advokat des Teufels -- 6.2.3 Vorhandene Reservierungen -- 6.2.4 Advokat des Teufels und Rot-Grün-Refactor -- 6.2.5 Wann haben Sie hinreichend viele Tests? …”
Publicado 2022
Libro electrónico -
1833Publicado 2018Tabla de Contenidos: “…3.3.1 Sporadic DAG Scheduling Model of Parallel Applications -- 3.3.2 Understanding the OpenMP Tasking Model -- 3.3.3 OpenMP and Timing Predictability -- 3.3.3.1 Extracting the DAG of an OpenMP program -- 3.3.3.2 WCET analysis is applied to tasks and task parts -- 3.3.3.3 DAG-based scheduling must not violate the TSCs -- 3.4 Extracting the Timing Information of an OpenMP Program -- 3.4.1 Parallel Structure Stage -- 3.4.1.1 Parallel control flow analysis -- 3.4.1.2 Induction variables analysis -- 3.4.1.3 Reaching definitions and range analysis -- 3.4.1.4 Putting all together: The wave-front example -- 3.4.2 Task Expansion Stage -- 3.4.2.1 Control flow expansion and synchronization predicate resolution -- 3.4.2.2 tid: A unique task instance identifier -- 3.4.2.3 Missing information when deriving the DAG -- 3.4.3 Compiler Complexity -- 3.5 Summary -- References -- Chapter 4 - Mapping, Scheduling, and Schedulability Analysis -- 4.1 Introduction -- 4.2 System Model -- 4.3 Partitioned Scheduler -- 4.3.1 The Optimality of EDF on Preemptive Uniprocessors -- 4.3.2 FP-scheduling Algorithms -- 4.3.3 Limited Preemption Scheduling -- 4.3.4 Limited Preemption Schedulability Analysis -- 4.4 Global Scheduler with Migration Support -- 4.4.1 Migration-based Scheduler -- 4.4.2 Putting All Together -- 4.4.3 Implementation of a Limited Preemption Scheduler -- 4.5 Overall Schedulability Analysis -- 4.5.1 Model Formalization -- 4.5.2 Critical Interference of cp-tasks -- 4.5.3 Response Time Analysis -- 4.5.3.1 Inter-task interference -- 4.5.3.2 Intra-task interference -- 4.5.3.3 Computation of cp-task parameters -- 4.5.4 Non-conditional DAG Tasks -- 4.5.5 Series-Parallel Conditional DAG Tasks -- 4.5.6 Schedulability Condition -- 4.6 Specializing Analysis for Limited Pre-emption Global/Dynamic Approach -- 4.6.1 Blocking Impact of the Largest NPRs (LP-max)…”
Libro electrónico -
1834Publicado 2017Tabla de Contenidos: “…Background -- Theoretical Methods -- Measurement Methods -- Proximity Effect -- 3.4.6 THE DANGER OF INDUCTIVE TRANSIENTS -- Relay Coils -- Transient Protection -- Protection Against Negative Transients -- AC Circuits -- 3.5 CRYSTALS AND RESONATORS -- Angle of Cut -- 3.5.1 RESONANCE -- 3.5.2 OSCILLATOR CIRCUITS -- Drive Level Resistance -- Series Circuit -- Layout -- 3.5.3 TEMPERATURE -- 3.5.4 CERAMIC RESONATORS -- 4 - Active Components -- 4.1 DIODES -- 4.1.1 FORWARD BIAS -- Forward Current -- Temperature Dependence of Forward Voltage -- 4.1.2 REVERSE BIAS -- Breakdown -- 4.1.3 LEAKAGE -- Leakage Variability -- 4.1.4 HIGH-FREQUENCY PERFORMANCE -- 4.1.5 SWITCHING TIMES -- Reverse Recovery -- Interference Due to Fast Recovery -- 4.1.6 SCHOTTKY DIODES -- General Purpose -- RF Mixers -- Rectifiers -- 4.1.7 ZENER DIODES -- Slope Resistance -- Leakage -- Temperature Coefficient -- Precision Zeners -- Zener Noise -- 4.1.8 THE ZENER AS A CLAMP -- An Application Example -- 4.2 THYRISTORS AND TRIACS -- 4.2.1 THYRISTOR VERSUS TRIAC -- 4.2.2 TRIGGERING CHARACTERISTICS -- 4.2.3 FALSE TRIGGERING -- 4.2.4 CONDUCTION -- 4.2.5 SWITCHING -- Turn-Off -- 4.2.6 SNUBBING -- Values for R and C -- 4.3 BIPOLAR TRANSISTORS -- 4.3.1 LEAKAGE -- A Simple Leakage Example -- Adding a Base-Emitter Resistor -- 4.3.2 SATURATION -- 4.3.3 THE DARLINGTON -- 4.3.4 SAFE OPERATING AREA -- Second Breakdown -- Safe Operating Area Curve -- 4.3.5 GAIN -- 4.3.6 SWITCHING AND HIGH-FREQUENCY PERFORMANCE -- Speeding Up the Turn-Off -- 4.3.7 GRADING -- 4.4 JUNCTION FIELD-EFFECT TRANSISTORS -- 4.4.1 PINCH-OFF -- 4.4.2 APPLICATIONS -- Analog Switches -- RF Circuits -- Current Regulators -- 4.4.3 HIGH-IMPEDANCE CIRCUITS -- The Gate Current Breakpoint -- Depressed Zin -- 4.5 MOSFETS -- 4.5.1 LOW-POWER MOSFETS -- Gate Breakdown -- Protection for the Gate -- MOSFET Trade-Offs…”
Libro electrónico -
1835Publicado 2017Tabla de Contenidos: “…2.11.1.1 The basic PSO algorithm -- 2.11.1.2 Improved PSO algorithm -- 2.11.2 Design Procedure of the PSO Algorithm -- 2.12 Genetic Algorithm -- 2.12.1 Basic Principle -- 2.12.2 Procedure of GA -- 2.12.2.1 Encoding scheme -- 2.12.2.2 Fitness techniques -- 2.12.2.3 Parent selection -- 2.12.2.4 Genetic operation -- 2.12.2.5 Replacement strategy -- 2.12.3 GA Control Realization -- 3 Active Intelligent Control -- 3.1 Principles and Classification -- 3.1.1 Buildup of Systems -- 3.1.2 Basic Principles -- 3.1.3 Classification -- 3.2 Active Mass Control System -- 3.2.1 Basic Principles -- 3.2.2 Construction and Design -- 3.2.3 Mathematical Models and Structural Analysis -- 3.2.4 Experiment and Engineering Example -- 3.3 Active Tendon System -- 3.3.1 Basic Principles -- 3.3.2 Construction and Design -- 3.3.3 Experiment and Engineering Example -- 3.4 Other Active Control System -- 3.4.1 Form and Principles -- 3.4.2 Analysis and Tests -- 4 Semiactive Intelligent Control -- 4.1 Principles and Classification -- 4.1.1 Basic Principles -- 4.1.2 Classification -- 4.2 MR Dampers -- 4.2.1 Basic Principles -- 4.2.1.1 Valve mode -- 4.2.1.2 Direct-shear mode -- 4.2.1.3 Squeeze mode -- 4.2.1.4 Magnetic gradient pinch mode -- 4.2.2 Construction and Design -- 4.2.3 Mathematical Models -- 4.2.3.1 Bingham model and modified Bingham model -- 4.2.3.2 Nonlinear hysteretic biviscous model -- 4.2.3.3 Bouc-Wen hysteresis model -- 4.2.3.4 Dahl model and modified Dahl model -- 4.2.3.5 Sigmoid model -- 4.2.3.6 Magnetic saturation mathematical model -- 4.2.4 Analysis and Design Methods -- 4.2.5 Tests and Engineering Applications -- 4.3 ER Dampers -- 4.3.1 Basic Principles -- 4.3.2 Construction and Design -- 4.3.3 Mathematical Models -- 4.3.3.1 Preyield mechanisms -- 4.3.3.2 Postyield mechanisms -- 4.3.3.3 Yield force -- 4.3.4 Analysis and Design Methods…”
Libro electrónico -
1836Publicado 2019Tabla de Contenidos: “…Finding Performance Bugs -- 4.3. Security Analysis -- 4.3.1. Automated Exploit Generation -- 4.3.2. …”
Libro electrónico -
1837Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Chapter 1 Introduction, Vision, and Opportunities -- 1.1 Background -- 1.2 E‐Waste -- 1.3 Outline -- References -- Chapter 2 e‐Waste Management and Practices in Developed and Developing Countries* -- 2.1 Introduction -- 2.2 Overview on WEEE Management and Practices -- 2.3 International WEEE Management and Transboundary Movement -- 2.4 WEEE Management and Practices - Developed and Developing Countries -- 2.5 Developed Countries -- 2.5.1 Switzerland -- 2.5.2 Japan -- 2.5.3 Australia -- 2.6 Developing Countries -- 2.6.1 Brazil -- 2.6.2 India -- 2.6.3 South Africa -- 2.6.4 Nigeria -- 2.6.5 Taiwan -- 2.7 Conclusions -- References -- Chapter 3 e‐Waste Transboundary Movement Regulations in Various Jurisdictions* -- 3.1 Background -- 3.2 International Legislation and Transboundary Movement -- 3.3 Extended Producer Responsibility (EPR) -- 3.4 Regulations in Various Jurisdictions -- 3.4.1 Europe -- 3.4.1.1 France -- 3.4.1.2 Germany -- 3.4.1.3 Switzerland -- 3.4.1.4 Norway -- 3.4.2 Americas -- 3.4.2.1 United States of America -- 3.4.2.2 Canada -- 3.4.2.3 Brazil -- 3.4.3 Asia -- 3.4.3.1 Japan -- 3.4.3.2 China -- 3.4.3.3 Taiwan -- 3.4.3.4 India -- 3.4.4 Africa -- 3.4.4.1 South Africa -- 3.4.4.2 Nigeria -- 3.4.5 Australia -- 3.5 Conclusions -- References -- Chapter 4 Approach for Estimating e‐Waste Generation -- 4.1 Background -- 4.2 Econometric Analysis -- 4.3 Consumption and Use/Leaching/Approximation 1 Method -- 4.4 The Sales/Approximation 2 Method -- 4.5 Market Supply Method -- 4.5.1 Simple Delay -- 4.5.2 Distribution Delay Method -- 4.5.3 Carnegie Mellon Method/Mass Balance Method -- 4.6 Time‐Step Method -- 4.7 Summary of Estimation Methods -- 4.8 Lifespan of Electronic Products -- 4.9 Global e‐Waste Estimation -- References…”
Libro electrónico -
1838Publicado 2023Tabla de Contenidos: “…3.3.1 Centralized System and Its Physiognomies -- 3.3.2 Advantages -- 3.3.3 Disadvantages of Centralized System -- 3.4 Distributed System Architecture -- 3.4.1 Advantages of Distributed System Architecture -- 3.4.2 Drawbacks of Distributed System Architecture -- 3.5 Data Communication Taking Place in Distributed IoT Environment -- 3.5.1 Internet of Things (IoT) Protocol -- 3.5.2 Constrained Application Protocol (CoAP) -- 3.5.3 Message Queuing Telemetry Transport (MQTT) -- 3.5.4 Wi-Fi -- 3.5.5 Zigbee -- 3.5.6 Extensible Messaging and Presence Protocol (XMPP) -- 3.5.7 Data Distribution Service (DDS) -- 3.5.8 Advanced Message Queuing Protocol (AMQP) -- 3.5.9 Smart Home and IoT Applications: An Example -- 3.5.10 IoT Services, Machines and Applications -- 3.5.11 Sensor-Based IoT Services -- 3.5.12 Application in IoT Environment -- 3.5.13 Future of IoT in a COVID-19 Pandemic -- 3.6 Conclusion -- References -- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction -- 4.1 Introduction -- 4.2 Cloud-Based Solutions -- 4.2.1 Information and Communications Technology -- 4.2.2 Artificial Intelligence and Machine Learning -- 4.2.3 Data Analytics and Business Intelligence -- 4.3 Impact of Industry 4.0 in the Cloud Computing Industry -- 4.3.1 Agriculture and Forestry -- 4.3.2 Entertainment, Media, and Hospitality -- 4.3.3 Robotics and Automation, Manufacturing and Maintenance -- 4.4 Significance and Impact of Cloud in the Pandemic Outbreak -- 4.5 Conclusion and Future Directions -- References -- Chapter 5 Network Security in Evolving Networking Technologies: Developments and Future Directions -- 5.1 Introduction -- 5.2 Background on Attacks, Security Services and Challenges -- 5.2.1 Types of Attacks Possible on Network -- 5.2.2 Security Services -- 5.2.3 Challenges…”
Libro electrónico -
1839Publicado 2004Tabla de Contenidos: “…Optimizing the UNIX System Services environment -- 4.1 UNIX System Services overview -- 4.1.1 UNIX overview -- 4.1.2 What people like about UNIX -- 4.1.3 What people do not like about UNIX -- 4.1.4 UNIX operating system -- 4.1.5 UNIX file system -- 4.1.6 MVS and UNIX functional comparison -- 4.1.7 z/OS UNIX System Services fundamentals -- 4.1.8 Address spaces -- 4.1.9 What people like about z/OS UNIX -- 4.1.10 What people do not like about z/OS UNIX -- 4.2 z/OS UNIX performance tuning -- 4.3 z/OS UNIX file systems -- 4.3.1 Hierarchical File System (HFS) -- 4.3.2 Network File System (NFS) -- 4.3.3 Temporary File System (TFS) -- 4.3.4 zSeries File System (zFS) -- 4.3.5 zFS aggregates -- 4.3.6 Installing a zFS -- 4.3.7 Tuning zFS -- 4.4 HFS and zFS comparison -- Chapter 5. …”
Libro electrónico -
1840Publicado 2003Tabla de Contenidos: “…4.2 Parallel System Support Programs (PSSP) -- 4.2.1 Administration and operation -- 4.2.2 Reliable Scalable Cluster Technology (RSCT) -- 4.2.3 IBM Virtual Shared Disk (VSD) -- 4.2.4 Security -- 4.2.5 Communication subsystem -- 4.2.6 Network Time Protocol (NTP) -- 4.2.7 System availability -- 4.2.8 Other PSSP services -- 4.2.9 New in PSSP 3.5 -- 4.2.10 Software requirements -- 4.2.11 Software compatibility matrix -- 4.2.12 Documentation references - PSSP -- 4.3 Cluster Systems Management (CSM) -- 4.3.1 Administration and operation -- 4.3.2 Reliable Scalable Cluster Technology (RSCT) -- 4.3.3 New in CSM 1.3.2 for AIX -- 4.3.4 Supported platform -- 4.3.5 PSSP-to-CSM transition -- 4.3.6 Documentation references - CSM -- 4.4 General Parallel File System (GPFS) -- 4.4.1 Architecture -- 4.4.2 Administration and operation -- 4.4.3 Higher performance/scalability -- 4.4.4 Recoverability -- 4.4.5 Migration -- 4.4.6 New in GPFS 2.1 for AIX 5L -- 4.4.7 Software requirements -- 4.4.8 Documentation references -- 4.5 LoadLeveler -- 4.5.1 Administration and operations -- 4.5.2 Capabilities -- 4.5.3 New in LoadLeveler 3.2 -- 4.5.4 New in LoadLeveler 3.1 -- 4.5.5 Software requirement -- 4.5.6 LoadLeveler configuration suggestions -- 4.5.7 Documentation references - LoadLeveler -- 4.6 Scientific subroutine libraries -- 4.6.1 Engineering and Scientific Subroutines Library (ESSL) family of products -- 4.6.2 Operations -- 4.6.3 New in ESSL 4.1 -- 4.6.4 New in Parallel ESSL 3.1 -- 4.6.5 Software requirements -- 4.6.6 Documentation references - ESSL and PESSL -- 4.6.7 Mathematical Acceleration Subsystem (MASS) -- 4.7 Parallel Environment (PE) -- 4.7.1 Parallel Programming support -- 4.7.2 Operation -- 4.7.3 New in PE 4.1 -- 4.7.4 Software requirements -- 4.7.5 Documentation references - Parallel Environment (PE)…”
Libro electrónico