Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Politics 74
- Sociology 72
- Political Science 62
- Philosophy 52
- Historia 48
- Cultural Studies 47
- Culture 47
- Literatura alemana 45
- History 38
- Data processing 35
- WebSphere 35
- Society 34
- Computer programs 33
- Història 33
- Media 33
- Cultural History 29
- Literature 28
- Body 26
- Management 25
- Political Sociology 25
- Political Theory 25
- Biblia 24
- Computer networks 24
- Artificial intelligence 23
- Literary Studies 23
- Education 22
- Filosofía 22
- Political Philosophy 22
- Development 21
- Media Studies 21
-
2381por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Acquisitions moins cessions d'objets de valeur -- 5.6.7. Importations et exportations de biens et de services -- 5.7. …”
Publicado 2003
Libro electrónico -
2382Publicado 2017Tabla de Contenidos: “…4.2.1 PHA Procedure Outline -- 4.3 ALARP Principles -- 4.3.1 ALARP Point -- 4.3.2 ALARP Discussions -- 4.3.3 ALARP Process -- 4.3.4 ALARP Demonstration -- 4.3.5 ALARP Assessment -- 4.3.6 Good Practices -- 4.3.7 Cost Benefit Analysis and Gross Disproportionate -- 4.3.8 ALARP Pros and Cons -- 5.0 BASICS OF MATHEMATICS -- 5.1 Logic Gates -- 5.1.1 OR Gate -- 5.1.2 AND Gate -- 5.1.3 NOT Gate -- 5.1.4 Logic Gate Discussions -- 5.1.5 Binary Decision Diagram -- 5.2 Set Theory -- 5.2.1 Important Laws of Algebraic Sets -- 5.2.2 Relation and Mapping -- 5.3 Probability -- 5.3.1 Probability Definition -- 5.3.2 Algebraic Operation of Probability -- 5.3.3 Probability Mass Function -- 5.3.4 Cumulative Distribution Function -- 5.3.5 Probability Density Function -- 6.0 FAULT TOLERANCE AND PLANT AGEING -- 6.1 Fault Tolerance -- 6.1.1 Fault and Fault Tolerance -- 6.1.2 Redundancy and Replica -- 6.2 Plant Ageing -- 6.2.1 Contributing Factors -- 6.2.2 Aging Management -- 6.2.3 Various Plant Ageing Componts -- 6.2.4 Plant Ageing Indicator -- 6.2.5 Factors -- 6.2.6 Operator Action -- 6.2.7 Inspection Teamwork -- 6.2.8 Plant Ageing Control Discussions -- 6.2.9 Progressive Ageing -- 7.0 SAFETY INSTRUMENTATION -- 7.1 Commonly Used Terms -- 7.1.1 BPCS -- 7.1.2 SIS -- 7.1.3 SIF -- 7.1.4 Functional Safety -- 7.1.5 SIL -- 7.1.6 PFD -- 7.1.7 MTBF -- 7.1.8 SIS Implementation -- 7.2 Control Objective and Layers of Protections -- 7.2.1 Control Objectives -- 7.2.2 Layers of Protections -- 7.3 SIS Boundary and Layout -- 7.4 SIS Related Issues -- 7.4.1 Hardware Issues -- 7.4.2 Software Issues -- 7.4.3 Company Issues -- 8.0 FUNCTIONAL SAFETY AND SAFETY INTEGRITY LEVEL -- 8.1 Normally Used Terms -- 8.1.1 Functional Safety -- 8.1.2 EUC -- 8.1.3 E/E/PEs -- 8.1.4 Safety Integrity Level (SIL) -- 8.1.5 SIF -- 8.2 Functional Safety Discussions -- 8.2.1 Functional Safety Concept…”
Libro electrónico -
2383Publicado 2017Tabla de Contenidos: “…-- 7.2.4 netstat - ein Schweizer Messer -- 7.2.5 telnet - mehr als ein Remote Terminal -- 7.2.6 nslookup - Überprüfen der Namensauflösung -- 7.3 Netzwerk-Sniffer Wireshark richtig lesen -- 7.4 Zusammenfassung -- 7.5 Prüfungstipps -- 7.6 Wiederholungsfragen, Übungen und Aufgaben -- 7.7 Lösungen -- Teil II: Ethernet-LANs -- Kapitel 8: Ethernet und Switching-Grundlagen -- 8.1 Das Szenario…”
Libro electrónico -
2384
-
2385Publicado 2016Tabla de Contenidos: “…-- 7.3.3 Vollbildmodus -- 7.3.4 Event-Verarbeitung -- 7.3.5 Autostart -- 7.4 Projekt: Ein digitaler Bilderrahmen -- 7.4.1 Zugriff auf das Dateisystem: Das Modul os -- 7.4.2 Python Imaging Library (PIL) -- 7.4.3 Die Programmierung -- 7.5 Projekt: Wahrnehmungstest -- 7.5.1 Die Programmierung -- 7.6 Projekt: Stoppuhr mit Gong -- 7.7 Aufgaben -- 7.8 Lösungen -- Kapitel 8: Objektorientierte Programmierung -- 8.1 Überall Objekte -- 8.2 Klassen und Vererbung bei Python -- 8.2.1 Einführendes Beispiel: Alphabet -- 8.2.2 Qualitätsmerkmal Änderbarkeit -- 8.2.3 Vererbung -- 8.3 Pong revisited -- 8.3.1 Bau eines Fußschalters -- 8.3.2 Die Klasse Canvas -- 8.3.3 Die Programmierung -- 8.4 Renn, Lola renn! …”
Libro electrónico -
2386Publicado 2019Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- About the Author -- Acknowledgement -- Part I Concept of Food Frying -- Chapter 1 Food Frying: The Concept -- 1.1 Introduction -- 1.2 History of Frying -- 1.3 Mechanism of Frying -- 1.3.1 Heat and Mass Transfer -- 1.3.2 Oil Uptake -- 1.3.3 Mechanism of Oil Absorption -- 1.3.3.1 Water Escape and Oil Uptake -- 1.3.3.2 Capillary Pressure and Oil Uptake -- 1.3.3.3 Vapour Condensation and Vacuum Effect -- 1.3.3.4 Adherence and Drainage of Oil -- 1.3.4 Product Properties Affecting Oil Uptake -- 1.3.4.1 Size, Shape, and Surface of the Product -- 1.3.4.2 Composition and Density of the Product -- 1.3.5 Frying Oil Properties and Oil Uptake -- 1.3.5.1 Oil Type -- 1.3.5.2 Oil Ageing -- 1.3.6 Process Factors -- 1.3.6.1 Pre-processing Factors Affecting Oil Uptake -- 1.3.6.2 Post-frying Conditions -- 1.3.7 Chemical and Physical Changes of the Frying Medium -- 1.4 Why We Fry Foods -- 1.5 Key Concepts -- References -- Chapter 2 Frying Techniques -- 2.1 Introduction -- 2.2 Concept of Deep Frying -- 2.3 Tools Used in Frying -- 2.4 Optimized Conditions -- 2.4.1 External Factors -- 2.4.1.1 Accessibility of Oxygen -- 2.4.1.2 Temperature -- 2.4.1.3 Duration of Frying -- 2.4.1.4 Size, Dimensions, and Composition of Food -- 2.4.2 Internal Factors -- 2.4.2.1 Fatty Acid Composition and Distribution -- 2.4.2.2 Antioxidative Minor Components -- 2.5 Types of Frying -- 2.5.1 Pan Frying -- 2.5.1.1 Quality Characteristics in Pan Frying -- 2.5.2 Vacuum Frying -- 2.5.2.1 Vacuum Frying Systems -- 2.5.2.2 Fried Product Characteristics -- 2.5.2.3 Frying Temperature and Final Oil Content -- 2.5.2.4 Vacuum Pressure and Final Oil Content -- 2.5.2.5 Pretreatment and Final Oil Content -- 2.5.2.6 Pressurization Period and De‐oiling Period -- 2.5.2.7 Vacuum Frying and Product Quality Attributes -- 2.5.3 Air Frying…”
Libro electrónico -
2387Publicado 2017Tabla de Contenidos: “…6.5.2 Restricted Access Zone Classification -- 6.5.3 Classification of Flammable Liquid Storage Facilities -- 6.5.4 Classification of Firefighting Equipment -- 6.5.5 Spacings by Mond Index -- 6.6 Mathematical Modeling -- 6.7 Software -- 6.8 Critical Examination Review -- 6.9 Combined Application of Methods: Base Case -- 6.9.1 Conceptual/FEED Layout Methodology -- 6.9.2 Detailed Layout Methodology -- 6.9.3 "For Construction" Layout Methodology -- 7 Layout Analogues and Visual Aids -- 7.1 General -- 7.2 Abbreviations/Standards and Codes/Terminology -- 7.2.1 Abbreviations -- 7.2.2 Standards and Codes -- 7.2.2.1 British Standards and Codes -- 7.2.2.2 US Standards -- 7.2.3 Terminology -- 7.3 Coordinate Dimensioning -- 7.4 Drawings -- 7.4.1 Site-Wide General Arrangement (GA) Drawings -- 7.4.2 Plot GA Drawings -- 7.4.3 Piping and Arrangement Study Drawings -- 7.4.4 Piping General Arrangement Drawings -- 7.4.5 Piping Isometrics -- 7.4.6 Miscellaneous Drawings -- 7.4.6.1 Battery Limit Drawings -- 7.4.6.2 Drainage Drawings -- 7.4.6.3 Electrical or Hazardous Area Classification Drawings -- 7.4.6.4 Hazard Area and Separation Drawings -- 7.4.6.5 Emergency Provision Drawings (Also Known as Escape Route Layout Drawings) -- 7.4.6.6 Perspective Sketches -- 7.5 Models -- 7.5.1 Cutouts -- 7.5.2 Block Models -- 7.6 Photography -- 7.7 Computer Models -- 8 Hazard Assessment of Plant Layout -- 8.1 General -- 8.2 Abbreviations/Standards and Codes/Terminology -- 8.2.1 Abbreviations -- 8.2.2 Standards and Codes -- 8.2.2.1 International Standards -- 8.2.2.2 European Standards -- 8.2.2.3 British Standards and Codes -- 8.2.2.4 American Standards and Codes -- 8.2.2.5 Other Books and Research -- 8.2.3 Terminology -- 8.3 Relevant Hazards -- 8.3.1 Release of Material -- 8.3.1.1 Instantaneous Release -- 8.3.1.2 Continuous Release -- 8.3.2 Behavior of Material at Release…”
Libro electrónico -
2388Publicado 2017Tabla de Contenidos: “…1.6 MAIN CONTENT OF THIS BOOK -- REFERENCES -- 2 - Lossless Information Hiding in Images on the Spatial Domain -- 2.1 OVERVIEW OF SPATIAL DOMAIN-BASED INFORMATION HIDING -- 2.2 MODULO ADDITION-BASED SCHEME -- 2.2.1 EMBEDDING PROCESS -- 2.2.2 AUTHENTICATION PROCESS -- 2.2.3 EXPLANATION OF THE MODULO ADDITION OPERATION -- 2.3 DIFFERENCE EXPANSION-BASED SCHEMES -- 2.3.1 TIAN'S SCHEME -- 2.3.2 ALATTER'S SCHEME -- 2.4 HISTOGRAM MODIFICATION-BASED SCHEMES -- 2.4.1 ORIGINAL HISTOGRAM SHIFTING-BASED SCHEME -- 2.4.2 ADJACENT PIXEL DIFFERENCE-BASED SCHEME -- 2.4.3 MULTILEVEL HISTOGRAM MODIFICATION-BASED SCHEME -- 2.4.3.1 Data Embedding -- 2.4.3.2 Data Extraction and Image Recovery -- 2.4.3.3 Examples -- 2.4.3.3.1 EL=0 -- 2.4.3.3.2 EL=2 -- 2.4.3.4 Discussion -- 2.4.3.4.1 Capacity Estimation -- 2.4.3.4.2 Overflow and Underflow Prevention -- 2.4.3.5 Experimental Results and Comparison With Other Schemes -- 2.4.4 HYBRID PREDICTION AND INTERLEAVING HISTOGRAM MODIFICATION-BASED SCHEME -- 2.4.4.1 Data Embedding -- 2.4.4.2 Data Extraction and Image Recovery -- 2.4.4.3 Experimental Results and Comparisons -- 2.5 LOSSLESS COMPRESSION-BASED SCHEMES -- 2.5.1 LOSSLESS BIT-PLANE COMPRESSION IN THE SPATIAL DOMAIN -- 2.5.2 LOSSLESS RS-DATA EMBEDDING METHOD -- 2.5.3 LOSSLESS G-LSB DATA EMBEDDING METHOD -- 2.5.3.1 G-LSB Embedding -- 2.5.3.2 Lossless G-LSB Data Embedding and Extraction -- 2.5.4 LOOK-UP TABLE-BASED SCHEME FOR ERROR DIFFUSED HALFTONE IMAGES -- 2.5.4.1 Pattern Histogram -- 2.5.4.2 Human Visual System Characteristics -- 2.5.4.3 Look-Up Table Construction -- 2.5.4.4 Data Hiding -- 2.5.4.5 Look-Up Table Embedding -- 2.5.4.6 Data Extraction -- 2.5.4.7 Experimental Results -- 2.6 REVERSIBLE SECRET SHARING-BASED SCHEMES -- 2.6.1 DATA HIDING IN REVERSIBLE SECRET SHARING -- 2.6.1.1 Related Work -- 2.6.1.2 Proposed Scheme -- 2.6.1.2.1 Encoding Stage…”
Libro electrónico -
2389Publicado 2015Tabla de Contenidos: “…4.5.2 The task Directive -- 4.6 Synchronization Constructs -- 4.7 Correctness and Optimization Issues -- 4.7.1 Thread Safety -- 4.7.2 False Sharing -- 4.8 A Case Study: Sorting in OpenMP -- 4.8.1 Bottom-Up Mergesort in OpenMP -- 4.8.2 Top-Down Mergesort in OpenMP -- 4.8.3 Performance Comparison -- Exercises -- Chapter 5: Distributed memory programming -- 5.1 Communicating Processes -- 5.2 MPI -- 5.3 Core concepts -- 5.4 Your first MPI program -- 5.5 Program architecture -- 5.5.1 SPMD -- 5.5.2 MPMD -- 5.6 Point-to-Point communication -- 5.7 Alternative Point-to-Point communication modes -- 5.7.1 Buffered Communications -- 5.8 Non blocking communications -- 5.9 Point-to-Point Communications: Summary -- 5.10 Error reporting and handling -- 5.11 Collective communications -- 5.11.1 Scattering -- 5.11.2 Gathering -- 5.11.3 Reduction -- 5.11.4 All-to-All Gathering -- 5.11.5 All-to-All Scattering -- 5.11.6 All-to-All Reduction -- 5.11.7 Global Synchronization -- 5.12 Communicating objects -- 5.12.1 Derived Datatypes -- 5.12.2 Packing/Unpacking -- 5.13 Node management: communicators and groups -- 5.13.1 Creating Groups -- 5.13.2 Creating Intra-Communicators -- 5.14 One-sided communications -- 5.14.1 RMA Communication Functions -- 5.14.2 RMA Synchronization Functions -- 5.15 I/O considerations -- 5.16 Combining MPI processes with threads -- 5.17 Timing and Performance Measurements -- 5.18 Debugging and profiling MPI programs -- 5.19 The Boost.MPI library -- 5.19.1 Blocking and non blocking Communications -- 5.19.2 Data Serialization -- 5.19.3 Collective Operations -- 5.20 A case study: diffusion-limited aggregation -- 5.21 A case study: brute-force encryption cracking -- 5.21.1 Version #1 : "plain-vanilla'' MPI -- 5.21.2 Version #2 : combining MPI and OpenMP -- 5.22 A Case Study: MPI Implementation of the Master-Worker Pattern…”
Libro electrónico -
2390Publicado 2016Tabla de Contenidos: “…4.3.1.3 - Scope of Business Keys -- 4.3.1.4 - Difference between Business Keys and Surrogate Keys -- 4.3.2 - Hub Entity Structure -- 4.3.2.1 - Hash Key -- 4.3.2.2 - Business Key -- 4.3.2.3 - Load Date -- 4.3.2.4 - Record Source -- 4.3.2.5 - Last Seen Date -- 4.3.3 - Hub Examples -- 4.4 - Link Definition -- 4.4.1 - Reasons for Many-to-Many Relationships -- 4.4.2 - Flexibility of Links -- 4.4.3 - Granularity of Links -- 4.4.4 - Link Unit-of-Work -- 4.4.5 - Link Entity Structure -- 4.4.5.1 - Hash Key -- 4.4.5.2 - Dependent Child Key -- 4.4.6 - Link Examples -- 4.5 - Satellite Definition -- 4.5.1 - Importance of Keeping History -- 4.5.2 - Splitting Satellites -- 4.5.2.1 - Splitting by Source System -- 4.5.2.2 - Splitting by Rate of Change -- 4.5.3 - Satellite Entity Structure -- 4.5.3.1 - Parent Hash Key -- 4.5.3.2 - Load Date -- 4.5.3.3 - Load End Date -- 4.5.3.4 - Hash Difference -- 4.5.3.5 - Extract Date -- 4.5.4 - Satellite Examples -- 4.5.5 - Link Driving Key -- References -- Chapter 5 - Intermediate Data Vault Modeling -- 5.1 - Hub Applications -- 5.1.1 - Business Key Consolidation -- 5.2 - Link Applications -- 5.2.1 - Link-on-link -- 5.2.2 - Same-as Links -- 5.2.3 - Hierarchical Links -- 5.2.4 - Nonhistorized Links -- 5.2.5 - Nondescriptive Links -- 5.2.6 - Computed Aggregate Links -- 5.2.7 - Exploration Links -- 5.3 - Satellite Applications -- 5.3.1 - Overloaded Satellites -- 5.3.2 - Multi-Active Satellites -- 5.3.3 - Status Tracking Satellites -- 5.3.4 - Effectivity Satellites -- 5.3.5 - Record Tracking Satellites -- 5.3.6 - Computed Satellites -- References -- Chapter 6 - Advanced Data Vault Modeling -- 6.1 - Point-in-Time Tables -- 6.1.1 - Point-in-Time Table Structure -- 6.1.2 - Managed PIT Window -- 6.2 - Bridge Tables -- 6.2.1 - Bridge Table Structure -- 6.2.2 - Comparing PIT Tables with Bridge Tables -- 6.3 - Reference Tables…”
Libro electrónico -
2391Publicado 2016Tabla de Contenidos: “…4.1.2.2.2 Conditional MRP -- 4.1.2.3 Research discussions on ERP -- 4.1.2.4 Variations in risk premium estimations -- 4.1.2.5 Risk premiums in other markets -- 4.1.2.5.1 Estimation of country risk premium from default spread -- 4.1.2.5.2 Country risk premium from volatility of stock prices -- 4.1.2.5.3 Estimation of default spread from bonds -- 4.1.3 Estimation of cost of equity -- 4.1.4 Beta estimation -- 4.1.4.1 Historical beta estimation -- 4.1.4.1.1 Regression beta calculation -- 4.1.4.2 Fundamental beta estimation -- 4.1.4.2.1 Fundamental beta -- 4.1.4.2.2 Determinants of beta -- 4.1.4.2.3 Bottom-up approach for beta estimation -- 4.1.4.2.4 Steps in bottom-up beta estimation -- 4.1.4.3 Accounting betas -- 4.1.5 Cost of equity -- 4.1.6 Cost of capital -- 4.1.6.1 Cost of debt calculation -- 4.1.6.2 Cost of preferred stocks -- 4.1.6.2.1 Estimation of Weighted Average Cost of Capital (WACC) -- 4.1.6.2.2 Estimation of values of capital components -- 4.1.6.2.3 Estimations of components of debt capital -- 4.1.7 Estimation of cost of capital-industry practices -- 4.1.8 Estimation of WACC-Johnson & -- Johnson -- 4.1.8.1 Estimation of cost of capital of Chevron corporation -- References -- 5 Principles of cash flow estimation -- 5.1 Introduction -- 5.2 Adjustments to financial statements -- 5.2.1 Invested capital -- 5.2.2 Debt -- 5.2.3 Equity -- 5.2.4 Return on Invested Capital -- 5.2.5 Free cash flow -- 5.2.6 Operating working capital -- 5.2.7 Net capital expenditure -- 5.2.8 Provisions and reserves -- 5.2.9 Earnings adjustments -- 5.3 Adjustments of expensed investments -- 5.3.1 Adjustment for financing expenses: case of operating leases -- 5.3.2 Adjustment for operating lease: case of IBM in 2013 -- 5.3.3 Summary of adjustments for operating income -- 5.4 Reflections on managed earnings -- 5.4.1 Tax effect on valuation…”
Libro electrónico -
2392Publicado 2004Tabla de Contenidos: “…Implement the development environment -- 7.1 Development environment configuration options -- 7.1.1 Motivation for an end-to-end development environment -- 7.1.2 Solution overview for an end-to-end development environment -- 7.1.3 ITSO WDME development environment nodes -- 7.1.4 ITSO WDME development environment hardware -- 7.1.5 Development environment limitations -- 7.2 WebSphere Commerce Studio implementation -- 7.2.1 Windows 2000 installation -- 7.2.2 Install WebSphere Commerce Studio V5.5 -- 7.2.3 Install WebSphere Studio Application Developer V5.0.1 PTF -- 7.2.4 Install WebSphere Test Environment V5.0.1…”
Libro electrónico -
2393Publicado 2003Tabla de Contenidos: “…Site and store administration -- 5.1 Administration tools -- 5.1.1 WebSphere Commerce Configuration Manager -- 5.1.2 WebSphere Commerce Administration Console -- 5.1.3 WebSphere Commerce Accelerator -- 5.1.4 WebSphere Commerce Organization Administration Console -- 5.1.5 WebSphere Commerce Loader Package -- 5.1.6 WebSphere Commerce Scheduler -- 5.1.7 WebSphere Commerce Payments Console -- 5.1.8 WebSphere Application Server Administration Console -- 5.1.9 DB2 Control Center -- 5.2 Key operational categories to manage -- 5.3 IT specialist roles and tools -- 5.3.1 System administrator -- 5.3.2 Site administrator -- 5.3.3 Store administrator -- 5.3.4 Database administrator -- 5.4 Line-of-business user roles and tools…”
Libro electrónico -
2394por McLean, Doug, 1943-Tabla de Contenidos: “…Multielement airfoils and the slot effect 7.4.5 ... Cascades 7.4.6 ... Low-drag airfoils with laminar flow 7.4.7 ... …”
Publicado 2013
Libro electrónico -
2395Publicado 2023Tabla de Contenidos: “…6.8.4.3 Adam -- 6.9 Coordinate Descent Methods -- 6.10 Interior‐Point Methods -- 6.10.1 Path‐Following Method -- 6.10.2 Generalized Inequalities -- 6.11 Augmented Lagrangian Methods -- 6.11.1 Method of Multipliers -- 6.11.2 Alternating Direction Method of Multipliers -- 6.11.3 Variable Splitting -- Exercises -- Part III Optimal Control -- Chapter 7 Calculus of Variations -- 7.1 Extremum of Functionals -- 7.1.1 Necessary Condition for Extremum -- 7.1.2 Sufficient Condition for Optimality -- 7.1.3 Constrained Problem -- 7.1.4 Du Bois-Reymond Lemma -- 7.1.5 Generalizations -- 7.2 The Pontryagin Maximum Principle -- 7.2.1 Linear Quadratic Control -- 7.2.2 The Riccati Equation -- 7.3 The Euler-Lagrange Equations -- 7.3.1 Beltrami's Identity -- 7.4 Extensions -- 7.5 Numerical Solutions -- 7.5.1 The Gradient Method -- 7.5.2 The Shooting Method -- 7.5.3 The Discretization Method -- 7.5.4 The Multiple Shooting Method -- 7.5.5 The Collocation Method -- Exercises -- Chapter 8 Dynamic Programming -- 8.1 Finite Horizon Optimal Control -- 8.1.1 Standard Optimization Problem -- 8.1.2 Dynamic Programming -- 8.2 Parametric Approximations -- 8.2.1 Fitted‐Value Iteration -- 8.3 Infinite Horizon Optimal Control -- 8.3.1 Bellman Equation -- 8.4 Value Iterations -- 8.5 Policy Iterations -- 8.5.1 Approximation -- 8.6 Linear Programming Formulation -- 8.6.1 Approximations -- 8.7 Model Predictive Control -- 8.7.1 Infinite Horizon Problem -- 8.7.2 Guessing the Value Function -- 8.7.3 Finite Horizon Approximation -- 8.7.4 Receding Horizon Approximation -- 8.8 Explicit MPC -- 8.9 Markov Decision Processes -- 8.9.1 Stochastic Dynamic Programming -- 8.9.2 Infinite Time Horizon -- 8.9.3 Stochastic Bellman Equation -- 8.10 Appendix -- 8.10.1 Stability and Optimality of Infinite Horizon Problem -- 8.10.2 Stability and Optimality of Stochastic Infinite Time Horizon Problem…”
Libro electrónico -
2396por Abualigah, LaithTabla de Contenidos: “…5.3.3 Analytical process -- 5.3.4 Global optimization -- 5.3.5 Medical disease diagnosis -- 5.3.6 Data clustering -- 5.3.7 Shape and size optimization -- 5.3.8 Investment decisions -- 5.3.9 Large graph coloring problems -- 5.4 Discussion and future works -- 5.5 Conclusion -- References -- 6 Arithmetic optimization algorithm: a review and analysis -- 6.1 Introduction -- 6.2 Arithmetic optimization algorithm -- 6.2.1 Initialization -- 6.2.2 Exploration -- 6.2.3 Exploitation -- 6.3 Related Works -- 6.3.1 Engineering application -- 6.3.2 Artificial intelligence -- 6.3.3 Chemistry -- 6.3.4 Machine learning -- 6.3.5 Network -- 6.3.6 Other applications -- 6.4 Discussion -- 6.5 Conclusion and future work -- References -- 7 Aquila optimizer: review, results and applications -- 7.1 Introduction -- 7.2 Procedure -- 7.2.1 Step1: (X1) -- 7.2.2 Step 2: (X2) -- 7.2.3 Step 3: (X3) -- 7.2.4 Step 4: (X4) -- 7.2.5 Aquila Optimizer Pseudocode -- 7.3 Related works -- 7.4 Discussion -- 7.5 Conclusion -- References -- 8 Whale optimization algorithm: analysis and full survey -- 8.1 Introduction -- 8.2 The whale optimization algorithm -- 8.2.1 Inspiration -- 8.2.2 Mathematical model and the optimization algorithm -- 8.2.2.1 Encircling prey -- 8.2.2.2 Bubble-net attacking method -- 8.2.2.3 Exploration phase: searching for a prey -- 8.3 Related work -- 8.3.1 Computer networks -- 8.3.2 Network security -- 8.3.3 Clustering -- 8.3.4 Image processing -- 8.3.5 Feature selection -- 8.3.6 Electrical power and energy systems -- 8.4 Discussion -- 8.5 Conclusion and future work -- References -- 9 Spider monkey optimizations: application review and results -- 9.1 Introduction -- 9.2 Spider monkey optimization algorithm -- 9.2.1 The behavior of spider monkey optimization -- 9.2.2 The spider monkey optimization algorithm -- 9.2.2.1 Preparation of the community…”
Publicado 2024
Libro electrónico -
2397Publicado 2003Tabla de Contenidos: “…Operations: Policy, Quotas, and Alerts -- 5.1 OS Monitoring -- 5.1.1 Navigation tree -- 5.1.2 Groups -- 5.1.3 Discovery -- 5.1.4 Pings -- 5.1.5 Probes -- 5.1.6 Profiles -- 5.1.7 Scans -- 5.2 OS Alerts -- 5.2.1 Alerting navigation tree -- 5.2.2 Computer Alerts -- 5.2.3 Filesystem Alerts -- 5.2.4 Directory Alerts -- 5.2.5 Alert logs -- 5.3 Policy management -- 5.3.1 Filesystem extension and LUN provisioning -- 5.3.2 Quotas -- 5.3.3 Network Appliance Quotas -- 5.3.4 Constraints -- 5.3.5 Scheduled actions -- 5.4 Database monitoring -- 5.4.1 Groups -- 5.4.2 Probes -- 5.4.3 Profiles -- 5.4.4 Scans -- 5.5 Database Alerts -- 5.5.1 Instance Alerts -- 5.5.2 Database-Tablespace Alerts -- 5.5.3 Table Alerts -- 5.5.4 Alert log -- 5.6 Databases policy management -- 5.6.1 Network Quotas -- 5.6.2 Instance Quota -- 5.6.3 Database Quota -- 5.7 Database administration samples -- 5.7.1 Database up -- 5.7.2 Database utilization -- 5.7.3 Need for reorganization -- Part 4 Customizing and advanced operations -- Chapter 6. …”
Libro electrónico -
2398Publicado 2003Tabla de Contenidos: “…Using DCE objects with IBM Tivoli Access Manager -- 5.1 Introduction -- 5.2 Data representation -- 5.3 Configuration scenarios -- 5.3.1 Scenario 1 -- 5.3.2 Scenario 2 -- 5.3.3 Scenario 3 -- 5.4 Managing objects in a shared environment -- 5.4.1 Creating a user with IBM Tivoli Access Manager -- 5.4.2 Creating a group with IBM Tivoli Access Manager -- 5.4.3 Adding a member to a group using IBM Tivoli Access Manager -- 5.4.4 Deleting a user using IBM Tivoli Access Manager -- 5.4.5 Deleting a group using IBM Tivoli Access Manager -- 5.4.6 Removing a member from an IBM Tivoli Access Manager group -- 5.4.7 Creating a principal with DCE -- 5.4.8 Creating a DCE group -- 5.4.9 Adding a member to a group using DCE -- 5.4.10 Deleting a user using DCE…”
Libro electrónico -
2399Publicado 2004Tabla de Contenidos: “…5.3.2 Create LDIF file containing users and groups -- 5.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 5.3.4 Enable LDAP security for WebSphere Portal -- 5.3.5 Verify the LDAP configuration -- 5.4 Configure DB2 Content Manager for LDAP -- 5.4.1 Prerequisite software for LDAP user authentication -- 5.4.2 Backup the DB2 Content Manager databases -- 5.4.3 Generate the cmbcmenv.properties file -- 5.4.4 Copy the cmbcmenv.properties file -- 5.4.5 Copy the icmxlslg.dll (user exit) -- 5.4.6 Enable trusted logons for Library Server -- 5.4.7 Create the ClientUserEditSSO privilege set -- 5.4.8 Set UserDB2TrustedConnect privilege set for ICMCONCT user -- 5.4.9 Configure LDAP User Import Scheduler -- 5.4.10 Verify the DB2 Content Manager LDAP configuration -- 5.5 SSL for LDAP server communication -- Chapter 6. …”
Libro electrónico -
2400Publicado 2003Tabla de Contenidos: “…-- 5.2.1 Reducing the batch window -- 5.2.2 Eliminating the batch window -- 5.2.3 New applications -- 5.2.4 Vendor applications -- 5.3 What to look for in a batch job -- 5.3.1 Value of scheduling flexibility -- 5.3.2 Degree of VSAM use -- 5.3.3 Read/write profile -- 5.3.4 Pattern of access to data -- 5.3.5 Capable of parallelization -- 5.3.6 Random or sequential access -- 5.3.7 Elapsed time -- 5.3.8 Program structure -- 5.3.9 Database use -- 5.3.10 Functions not supported by DFSMStvs -- 5.3.11 Checklist -- 5.4 Examining batch jobs -- 5.4.1 CICS file resource definitions -- 5.4.2 Operational documentation…”
Libro electrónico