Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Politics 74
- Sociology 72
- Political Science 62
- Philosophy 52
- Historia 48
- Cultural Studies 47
- Culture 47
- Literatura alemana 45
- History 38
- Data processing 35
- WebSphere 35
- Society 34
- Computer programs 33
- Història 33
- Media 33
- Cultural History 29
- Literature 28
- Body 26
- Management 25
- Political Sociology 25
- Political Theory 25
- Biblia 24
- Computer networks 24
- Artificial intelligence 23
- Literary Studies 23
- Education 22
- Filosofía 22
- Political Philosophy 22
- Development 21
- Media Studies 21
-
2401Tabla de Contenidos: “…Policy management -- 5.1 VRS related PARMLIB options -- 5.1.1 CATRETPD -- 5.1.2 MOVEBY -- 5.1.3 RETAINBY -- 5.1.4 REUSEBIN -- 5.1.5 VRSCHANGE -- 5.1.6 VRSJOBNAME -- 5.1.7 VRSMIN -- 5.1.8 VRSEL -- 5.2 VRS types -- 5.2.1 Data set VRS -- 5.2.2 Volume VRS -- 5.2.3 Name VRS -- 5.3 Specifying the VRS parameters -- 5.3.1 DSNAME and NAME retention types -- 5.3.2 Special NAME retention type -- 5.3.3 Volume retention types -- 5.3.4 Retention limits -- 5.3.5 Movement policies -- 5.3.6 Release options -- 5.4 Chaining VRSs -- 5.4.1 VRS chain and subchain -- 5.5 Managing DFSMShsm tapes -- 5.6 DFSMS ACS support -- 5.7 Modifying VRS -- 5.8 Deleting VRS -- 5.9 Trial run -- 5.10 VRS examples -- 5.10.1 ADDVRS operand defaults -- 5.10.2 Adding a single VRS -- 5.10.3 VRS chain with one NEXTVRS operand -- 5.10.4 VRS chain with two ANDVRS operands -- 5.10.5 VRS chain with two subchains -- 5.11 Complex VRS chain with three subchains -- 5.12 VRS hints and tips -- Chapter 6. …”
Libro electrónico -
2402Publicado 2004Tabla de Contenidos: “…ITDS installation and basic configuration - Windows -- 5.1 Installable components -- 5.2 Installation and configuration checklist -- 5.3 System and software requirements -- 5.3.1 ITDS Client -- 5.3.2 ITDS Server (including client) -- 5.3.3 Web Administration Tool -- 5.4 Installing the server -- 5.4.1 Create a user ID for ITDS -- 5.4.2 Installing ITDS with the Installshield GUI -- 5.4.3 Configuring the Administrator DN and password -- 5.4.4 Configuring the database -- 5.4.5 Adding a suffix -- 5.4.6 Removing or reconfiguring a database -- 5.4.7 Enabling and disabling the change log -- 5.5 Starting ITDS -- Chapter 6. …”
Libro electrónico -
2403Publicado 2004Tabla de Contenidos: “…5.2.3 Merging EJB groups -- 5.2.4 Exporting code from VisualAge for Java V3.5.3 -- 5.3 Preparing the database -- 5.3.1 Updating the database configuration values -- 5.3.2 Unsent messages -- 5.3.3 Order status -- 5.3.4 Catalog -- 5.3.5 Members -- 5.3.6 Custom message types -- 5.3.7 Dropping foreign key references -- 5.3.8 Erroneous data in encrypted fields -- Chapter 6. …”
Libro electrónico -
2404Publicado 2004Tabla de Contenidos: “…5.1 Overview of WebSphere Portal installation on Linux -- 5.2 Preparing the machines for installation -- 5.3 WebSphere Portal installation -- 5.3.1 Installing WebSphere Portal V5.0 -- 5.3.2 Installing manual fixes for WebSphere Application Server V5.0 -- 5.4 IBM HTTP Server installation -- 5.4.1 IBM HTTP Server installation -- 5.4.2 Installing WebSphere Plug-in Cumulative Fix for versions 5.0.0, 5.0.1, and 5.0.22 -- 5.4.3 Verifying the installation -- 5.4.4 Configuring WebSphere Portal with a remote IBM HTTP Server -- 5.5 Installing IBM DB2 V8.1 for WebSphere Portal -- 5.5.1 Installation of IBM DB2 Server V8.1 -- 5.5.2 Installing IBM DB2 administration client V8.1 -- 5.5.3 Installing IBM DB2 V8.1 FP1 -- 5.5.4 Migrating databases from Cloudscape to IBM DB2 -- 5.5.5 Configuring WebSphere Portal for IBM DB2 -- 5.6 Lotus Domino V5.0.12 installation -- 5.6.1 Installing Lotus Domino Enterprise Server V5.0.12 -- 5.6.2 Configuring Domino Server settings -- 5.6.3 Installing Domino Administrator -- 5.6.4 Configuring Domino Administrator -- 5.6.5 Setting up Domino Directory -- 5.6.6 Configuring WebSphere Portal for Domino Directory -- 5.6.7 Verifying the LDAP configuration -- Chapter 6. …”
Libro electrónico -
2405por Gavin, LeeTabla de Contenidos: “…Migrating resources (common to all platforms) -- 7.1 DB2 backup -- 7.2 Message flow export from Version 2 -- 7.3 Message flow import into Version 5 -- 7.4 Message flow migration notes -- 7.4.1 Promoted property name -- 7.4.2 Converting Version 2.1 names that are not valid -- 7.5 Message set export from Version 2 -- 7.6 Message set import into Version 5 -- 7.7 Message set migration notes -- 7.7.1 What the mqsimigratemsgsets command creates -- 7.7.2 Embedded simple type -- 7.7.3 Compound type with an MRM base type -- 7.7.4 Migrating the message sets -- 7.8 Post migration activities -- 7.9 Checkpoint -- Chapter 8. …”
Publicado 2004
Libro electrónico -
2406Publicado 2009Tabla de Contenidos: “…3.3.1 Entropy and Mutual Information 65 -- 3.3.2 Encoding of an Information Source 66 -- 3.3.3 Variable Length Coding 68 -- 3.3.4 Quantization 71 -- 3.4 Encoder Architectures 73 -- 3.4.1 DPCM 73 -- 3.4.2 Hybrid Transform-DPCM Architecture 77 -- 3.4.3 A Typical Hybrid Transform DPCM-based Video Codec 79 -- 3.4.4 Motion Compensation 82 -- 3.4.5 DCT and Quantization 83 -- 3.4.6 Procedures Performed at the Decoder 84 -- 3.5 Wavelet-Based Video Compression 86 -- 3.5.1 Motion-Compensated Temporal Wavelet Transform Using Lifting 90 -- References 94 -- 4 4G Wireless Communications and Networking 97 -- 4.1 IMT-Advanced and 4G 97 -- 4.2 LTE 99 -- 4.2.1 Introduction 101 -- 4.2.2 Protocol Architecture 102 -- 4.2.3 LTE Layer 2 107 -- 4.2.4 The Evolution of Architecture 110 -- 4.2.5 LTE Standardization 110 -- 4.3 WIMAX-IEEE 802.16m 112 -- 4.3.1 Network Architecture 113 -- 4.3.2 System Reference Model 114 -- 4.3.3 Protocol Structure 114 -- 4.3.4 Other Functions Supported by IEEE 802.16m for Further Study 125 -- 4.4 3GPP2 UMB 125 -- 4.4.1 Architecture Reference Model 126 -- 4.4.2 Layering Architecture and Protocols 127 -- Acknowledgements 133 -- References 133 -- 5 Advanced Video Coding (AVC)/H.264 Standard 135 -- 5.1 Digital Video Compression Standards 135 -- 5.2 AVC/H.264 Coding Algorithm 138 -- 5.2.1 Temporal Prediction 139 -- 5.2.2 Spatial Prediction 147 -- 5.2.3 The Transform 148 -- 5.2.4 Quantization and Scaling 151 -- 5.2.5 Scanning 151 -- 5.2.6 Variable Length Lossless Codecs 152 -- 5.2.7 Deblocking Filter 155 -- 5.2.8 Hierarchy in the Coded Video 156 -- 5.2.9 Buffers 158 -- 5.2.10 Encapsulation/Packetization 159 -- 5.2.11 Profiles 160 -- 5.2.12 Levels 163 -- 5.2.13 Parameter Sets 167 -- 5.2.14 Supplemental Enhancement Information (SEI) 167 -- 5.2.15 Subjective Tests 168 -- References 168 -- 6 Content Analysis for Communications 171 -- 6.1 Introduction 171 -- 6.2 Content Analysis 173 -- 6.2.1 Low-Level Feature Extraction 174 -- 6.2.2 Image Segmentation 179 -- 6.2.3 Video Object Segmentation 185.…”
Libro electrónico -
2407por Steegmans, BartTabla de Contenidos: “…-- 5.1.2 Prerequisites for log analysis -- 5.1.3 Accessing log analysis -- 5.2 Scenario A: Recovery using log analysis -- 5.2.1 Scenario description -- 5.2.2 Prerequisites for the scenario -- 5.2.3 Scenario time line -- 5.2.4 Recovery options without DB2 Recovery Expert -- 5.3 The DB2 log analysis tool -- 5.3.1 Getting started with the DB2 log analysis tool -- 5.3.2 Analyzing changes to a single table -- 5.3.3 Analyzing changes to all tables -- 5.3.4 Problem resolved -- 5.4 The command line interface: db2la -- 5.4.1 Analyzing changes to the EMPLOYEE table -- 5.4.2 Analyzing changes to all tables -- 5.5 Considerations -- 5.5.1 Recovery Expert quiesces the table space -- 5.5.2 Recovery Expert works one row at a time -- 5.5.3 Redo SQL will not necessarily be the same as the original SQL -- 5.5.4 Masked update reconstruction -- 5.5.5 It only shows committed transactions -- 5.5.6 DATA CAPTURE CHANGES -- 5.5.7 Referential Integrity -- 5.5.8 GENERATED ALWAYS columns…”
Publicado 2002
Libro electrónico -
2408Publicado 2018Tabla de Contenidos: “…4.7 Core Network Optimisation -- 4.7.1 Basics of the Optimisation Process -- 4.7.2 Data Collection and Analysis -- 4.7.3 Core Network Optimization Plan -- 4.8 GPRS Core Network Planning -- 4.8.1 Packet Core Network Planning -- 4.8.2 Basics of IP Addressing -- 4.8.3 IP Routing -- 4.9 EDGE Core Network Planning -- Part II: 3G UMTS Network Planning and Optimisation -- Chapter 5 3G Radio Network Planning and Optimisation -- 5.1 Basics of Radio Network Planning -- 5.1.1 Scope of Radio Network Planning -- 5.1.2 3G System Requirements -- 5.1.3 WCDMA Radio Fundamentals -- 5.1.4 Service Classes in UMTS -- 5.1.5 Element in a WCDMA Radio Network -- 5.2 Radio Interface Protocol Architecture -- 5.2.1 Protocol Structure for Universal Terrestrial Radio Access Network (UTRAN) -- 5.2.2 Channel Configuration in WCDMA Radio Network -- 5.3 Spreading Phenomenon -- 5.3.1 Scrambling Code -- 5.3.2 Channelisation Code -- 5.4 Multipath Propagation -- 5.5 Radio Network Planning Process -- 5.5.1 Pre-Planning Phase -- 5.5.2 Structure and Performance of the Physical Layer -- 5.5.3 Uplink and Downlink Modulation -- 5.5.4 Uplink and Downlink Spreading -- 5.5.5 Code Planning -- 5.5.6 Power Control in WCDMA Radio Networks -- 5.5.7 Handover in WCDMA Radio Networks -- 5.5.8 Coverage Planning -- 5.5.9 Capacity Planning -- 5.5.10 AMR -- 5.6 Detailed Planning -- 5.6.1 Coverage and Capacity -- 5.6.2 Radio Resource Management -- 5.7 High Speed Packet Access -- 5.7.1 HSDPA -- 5.7.2 HSUPA (High Speed Uplink Packer Access) -- 5.8 WCDMA Radio Network Optimisation -- 5.8.1 Key Performance Indicators -- 5.8.2 Network Performance Monitoring -- 5.8.3 Coverage, Capacity and Quality Enhancements -- 5.8.4 Parameter Tuning -- Chapter 6 3G Transmission Network Planning and Optimisation -- 6.1 Basics of 3G (WCDMA) Transmission Network Planning -- 6.1.1 Scope of Transmission Network Planning…”
Libro electrónico -
2409Publicado 2020Tabla de Contenidos: “…5.2.5 Populating a blockchain wallet -- 5.2.6 Deploying and transacting on Ropsten -- 5.3 Hashing basics -- 5.3.1 Digital signing of documents -- 5.3.2 Hashed data on distributed ledger -- 5.3.3 Hashes in Ethereum block header -- 5.3.4 Solidity hashing functions -- 5.4 Application of hashing -- 5.4.1 Blind auction design -- 5.4.2 Blind auction smart contract -- 5.4.3 Privacy and security aspects -- 5.4.4 Testing the BlindAuction contract -- 5.4.5 Test plan -- 5.5 Retrospective -- 5.6 Best practices -- 5.7 Summary -- 6 On-chain and off-chain data -- 6.1 On-chain data -- 6.2 Blind auction use case -- 6.2.1 On-chain event data -- 6.2.2 Blind auction with events -- 6.2.3 Testing with the web UI -- 6.2.4 Accessing on-chain data using the web3 API -- 6.3 Off-chain data: External data sources -- 6.4 ASK airline system -- 6.4.1 ASK concept -- 6.4.2 Airlines smart contract -- 6.4.3 ASK on-chain data -- 6.4.4 ASK off-chain data -- 6.4.5 ASK Dapp development process -- 6.4.6 ASK web user interface -- 6.4.7 Putting it all together -- 6.4.8 Interacting with ASK Dapp -- 6.5 Retrospective -- 6.6 Best practices -- 6.7 Summary -- 7 Web3 and a channel Dapp -- 7.1 Web3 API -- 7.1.1 Web3 in Dapp stack -- 7.1.2 Web3 packages -- 7.2 The channel concept -- 7.3 Micropayment channel -- 7.4 Micropayment channel use case -- 7.4.1 Traditional banking solution -- 7.4.2 Users and roles -- 7.4.3 On-chain and off-chain operations -- 7.4.4 MPC smart contract (MPC-contract) -- 7.4.5 MPC application development (MPC-app) -- 7.4.6 MPC sequence diagram -- 7.4.7 Demonstration of MPC execution -- 7.4.8 Accessing the web3 provider -- 7.4.9 Extensions of MPC -- 7.4.10 The relevance of the micropayment channel -- 7.4.11 Other web3 packages of interest -- 7.5 Retrospective -- 7.6 Best practices -- 7.7 Summary -- 8 Going public with Infura -- 8.1 Nodes and networks…”
Libro electrónico -
2410Publicado 2010Tabla de Contenidos: “…7.1.2 Passing struct Objects to Functions -- 7.1.3 Life Cycle of a struct Object -- 7.1.4 Static Constructors and Destructors -- 7.1.5 Methods -- 7.1.6 Static Members -- 7.1.7 Access Specifiers -- 7.1.8 Nesting structs and classes -- 7.1.9 Nesting structs inside Functions -- 7.1.10 Subtyping with structs. …”
Libro electrónico -
2411por Cook, JimTabla de Contenidos: “…First steps: IBM Tivoli Storage Manager server basic configuration -- 5.1 Starting and stopping the IBM Tivoli Storage Manager server -- 5.1.1 Starting and ending the IBM Tivoli Storage Manager server for the first time -- 5.1.2 Starting IBM Tivoli Storage Manager server in batch mode -- 5.2 IBM Tivoli Storage Manager administration interfaces -- 5.2.1 IBM Tivoli Storage Manager Web administrative client interface -- 5.3 IBM Tivoli Storage Manager server configuration -- 5.3.1 Changing the default admin password -- 5.3.2 Changing IBM Tivoli Storage Manager Web administrative client interface time-out value -- 5.3.3 Registering IBM Tivoli Storage Manager licenses -- 5.3.4 Querying IBM Tivoli Storage Manager licensed information -- 5.3.5 Creating an IFS file structure for IBM Tivoli Storage Manager -- 5.3.6 Increasing the IBM Tivoli Storage Manager database size -- 5.3.7 Increasing the IBM Tivoli Storage Manager recovery log size -- 5.3.8 Removing the IBM Tivoli Storage Manager default database volume -- 5.3.9 Removing the IBM Tivoli Storage Manager default recovery log volume -- 5.3.10 IBM Tivoli Storage Manager server option file -- 5.3.11 IBM Tivoli Storage Manager server run-time options -- 5.3.12 IBM Tivoli Storage Manager disk storage pools -- 5.3.13 Increasing the IBM Tivoli Storage Manager BACKUPPOOL size -- 5.3.14 Removing the IBM Tivoli Storage Manager initial BACKUPPOOL volume…”
Publicado 2003
Libro electrónico -
2412Publicado 2022Tabla de Contenidos: “…1.8.7 The Trusted Execution Environment (TEE) -- 1.8.8 Game-Based Smart Contracts (GBSC) -- 1.9 Challenges of Blockchain -- 1.9.1 Scalability -- 1.9.2 Privacy Outflow -- 1.9.3 Selfish Mining -- 1.9.4 Security -- 1.10 Conclusion -- References -- 2 Toward Smart Cities Based on the Internet of Things -- 2.1 Introduction -- 2.2 Smart City Emergence -- 2.2.1 A Term Popularized by Private Foundations -- 2.2.2 Continuation of Ancient Reflections on the City of the Future -- 2.3 Smart and Sustainable City -- 2.4 Smart City Areas (Sub-Areas) -- 2.4.1 Technology and Data -- 2.4.2 Economy -- 2.4.3 Population -- 2.5 IoT -- 2.5.1 A New Dimension for the Internet and Objects -- 2.5.2 Issues Raised by the IoT -- 2.5.2.1 IoT Scale -- 2.5.2.2 IoT Heterogeneity -- 2.5.2.3 Physical World Influence on the IoT -- 2.5.2.4 Security and Privacy -- 2.5.3 Applications of the IoT That Revolutionize Society -- 2.5.3.1 IoT in the Field of Health -- 2.5.3.2 Digital Revolution in Response to Energy Imperatives -- 2.5.3.3 Home Automation (Connected Home) -- 2.5.3.4 Connected Industry -- 2.5.3.5 IoT in Agriculture -- 2.5.3.6 Smart Retail or Trendy Supermarkets -- 2.5.3.7 Smart and Connected Cities -- 2.5.3.8 IoT at the Service of Road Safety -- 2.5.3.9 Security Systems -- 2.5.3.10 Waste Management -- 2.6 Examples of Smart Cities -- 2.6.1 Barcelona, a Model Smart City -- 2.6.2 Vienna, the Smartest City in the World -- 2.7 Smart City Benefits -- 2.7.1 Security -- 2.7.2 Optimized Management of Drinking and Wastewater -- 2.7.3 Better Visibility of Traffic/Infrastructure Issues -- 2.7.4 Transport -- 2.8 Analysis and Discussion -- 2.9 Conclusion and Perspectives -- References -- 3 Integration of Blockchain and Artificial Intelligence in Smart City Perspectives -- 3.1 Introduction -- 3.2 Concept of Smart Cities, Blockchain Technology, and Artificial Intelligence…”
Libro electrónico -
2413Publicado 2022Tabla de Contenidos: “…5.2.5 Fuzzy Microgrid Wind -- 5.3 Genetic Algorithm -- 5.3.1 Important Aspects of Genetic Algorithm -- 5.3.2 Standard Genetic Algorithm -- 5.3.3 Genetic Algorithm and Its Application -- 5.3.4 Power System and Genetic Algorithm -- 5.3.5 Economic Dispatch Using Genetic Algorithm -- 5.4 Artificial Neural Network -- 5.4.1 The Biological Neuron -- 5.4.2 A Formal Definition of Neural Network -- 5.4.3 Neural Network Models -- 5.4.4 Rosenblatt's Perceptron -- 5.4.5 Feedforward and Recurrent Networks -- 5.4.6 Back Propagation Algorithm -- 5.4.7 Forward Propagation -- 5.4.8 Algorithm -- 5.4.9 Recurrent Network -- 5.4.10 Examples of Neural Networks -- 5.4.10.1 AND Operation -- 5.4.10.2 OR Operation -- 5.4.10.3 XOR Operation -- 5.4.11 Key Components of an Artificial Neuron Network -- 5.4.12 Neural Network Training -- 5.4.13 Training Types -- 5.4.13.1 Supervised Training -- 5.4.13.2 Unsupervised Training -- 5.4.14 Learning Rates -- 5.4.15 Learning Laws -- 5.4.16 Restructured Power System -- 5.4.17 Advantages of Precise Forecasting of the Price -- 5.5 Conclusion -- References -- 6 Recent Advances in Wearable Antennas: A Survey -- 6.1 Introduction -- 6.2 Types of Antennas -- 6.2.1 Description of Wearable Antennas -- 6.2.1.1 Microstrip Patch Antenna -- 6.2.1.2 Substrate Integrated Waveguide Antenna -- 6.2.1.3 Planar Inverted-F Antenna -- 6.2.1.4 Monopole Antenna -- 6.2.1.5 Metasurface Loaded Antenna -- 6.3 Design of Wearable Antennas -- 6.3.1 Effect of Substrate and Ground Geometries on Antenna Design -- 6.3.1.1 Conducting Coating on Substrate -- 6.3.1.2 Ground Plane With Spiral Metamaterial Meandered Structure -- 6.3.1.3 Partial Ground Plane -- 6.3.2 Logo Antennas -- 6.3.3 Embroidered Antenna -- 6.3.4 Wearable Antenna Based on Electromagnetic Band Gap -- 6.3.5 Wearable Reconfigurable Antenna -- 6.4 Textile Antennas -- 6.5 Comparison of Wearable Antenna Designs…”
Libro electrónico -
2414por Kobilke, KristinaTabla de Contenidos: “…4.9 Verwendung von Stockfotos, -videos und -icons -- 4.10 Content Planung -- 4.10.1 Redaktionsplanung mit Tools -- 4.10.2 Beiträge vorausplanen -- 4.10.3 Content Erstellung aus Long-Form-Content -- 4.10.4 Content Recycling -- Kapitel 5: Aufbau einer Community auf Instagram -- 5.1 Eigene Webpräsenzen -- 5.2 Soziale Netzwerke -- 5.3 Community Management -- 5.3.1 Kommentieren -- 5.3.2 Anderen Nutzern folgen -- 5.3.3 »Gefällt mir«-Angaben -- 5.3.4 Fragen beantworten -- 5.3.5 Bleiben Sie sich selbst treu -- 5.3.6 Suche passender Profile und Beiträge über Hashtags -- 5.3.7 Standorte -- 5.3.8 Interaktionen fördern -- 5.3.9 Tool-Tipp Hootsuite -- 5.4 Fan-Communities -- 5.5 Challenges -- 5.6 Shoutouts -- 5.7 Werbung auf Instagram schalten -- 5.8 Influencer-Generated-Content -- 5.9 InstaMeets -- 5.9.1 Instagramers -- 5.9.2 Weltweite InstaMeets -- 5.9.3 Persönliche Treffen und Freundschaften -- 5.10 Community-Regeln -- 5.10.1 Eigene Fotos und Videos posten -- 5.10.2 Fotos anderer Instagrammer bearbeiten und teilen -- 5.10.3 Authentizität, Humor und Menschlichkeit -- 5.10.4 Nutzer blockieren und Inhalte melden -- 5.11 Gewinnspiele -- 5.12 Unseriöse Methoden zum Follower-Aufbau -- 5.12.1 Follower- und Like-Apps -- 5.12.2 Like-Bots -- 5.12.3 Follower kaufen -- 5.12.4 Instagram Pods -- Kapitel 6: Influencer-Marketing -- 6.1 Relevanz von Influencer-Marketing auf Instagram -- 6.1.1 Sichtbarkeit und Relevanz in der Aufmerksamkeitsökonomie -- 6.1.2 Umgehen von realen (und mentalen) AdBlockern -- 6.1.3 Zugang zu relevanten Zielgruppen -- 6.1.4 Relevante Reichweite -- 6.1.5 Glaubwürdigkeit, Authentizität und Vertrauen -- 6.1.6 Kunden mit einem höheren Lifetime Value -- 6.1.7 Content-Kreation -- 6.1.8 Medien- und Storytelling-Kompetenz -- 6.1.9 Differenzierung zum Wettbewerb -- 6.1.10 Langlebige Partnerschaften mit großem Potenzial…”
Publicado 2022
Libro electrónico -
2415por Putte, Geert van deTabla de Contenidos: “…Introduction to B2B projects -- 5.1 B2B deployment methodology overview -- 5.1.1 Knowledge transfer and training -- 5.1.2 Discovery -- 5.1.3 Planning -- 5.1.4 Installation -- 5.1.5 Customization -- 5.1.6 Testing -- 5.1.7 Production deployment -- 5.1.8 Partner ramping -- 5.1.9 Support -- 5.2 B2B project scenario overview -- 5.2.1 Overview of Company E -- 5.2.2 Business environment -- 5.2.3 Technical environment -- 5.2.4 Organizational challenges -- 5.2.5 New business strategy -- 5.2.6 Current projects -- Chapter 6. …”
Publicado 2005
Libro electrónico -
2416Publicado 2022Tabla de Contenidos: “…5.4.5 Surface Morphology Effects on 3C‐SiC Thermal Oxidation -- 5.4.6 Thermal Oxidation Temperature Effects for 3C‐SiC -- 5.4.7 Ohmic Contact Metalization -- 5.4.8 N‐type 3C‐SiC Ohmic Contacts -- 5.4.9 Ion Implantation -- 5.5 Summary -- Acknowledgements -- References -- Chapter 6 Intrinsic and Extrinsic Electrically Active Point Defects in SiC -- 6.1 Characterization of Electrically Active Defects -- 6.1.1 Deep Level Transient Spectroscopy -- 6.1.1.1 Profile Measurements -- 6.1.1.2 Poole-Frenkel Effect -- 6.1.1.3 Laplace DLTS -- 6.1.2 Low‐energy Muon Spin Rotation Spectroscopy -- 6.1.2.1 μSR and Semiconductors -- 6.1.3 Density Functional Theory -- 6.2 Intrinsic Electrically Active Defects in SiC -- 6.2.1 The Carbon Vacancy, VC -- 6.2.2 The Silicon Vacancy, VSi -- 6.3 Transition Metal and Other Impurity Levels in SiC -- 6.4 Summary -- References -- Chapter 7 Dislocations in 4H‐SiC Substrates and Epilayers -- 7.1 Introduction -- 7.2 Dislocations in Bulk 4H‐SiC -- 7.2.1 Micropipes (MPs) and Closed‐core Threading Screw Dislocations (TSDs) -- 7.2.2 Basal Plane Dislocations (BPDs) -- 7.2.3 Threading Edge Dislocations (TEDs) -- 7.2.4 Interaction between BPDs and TEDs -- 7.2.4.1 Hopping Frank-Read Source of BPDs -- 7.2.5 Threading Mixed Dislocations (TMDs) in 4H‐SiC -- 7.2.5.1 Reaction Between Threading Dislocations with Burgers Vectors of −c + a and c + a Wherein the Opposite c‐Components Annihilate Leaving Behind the Two a‐Components -- 7.2.5.2 Reaction Between Threading Dislocations with Burgers Vectors of −c and c + a Leaving Behind the a‐Component -- 7.2.5.3 Reaction Between Opposite‐sign Threading Screw Dislocations with Burgers Vectors c and −c -- 7.2.5.4 Nucleation of Opposite Pair of c + a Dislocations and Their Deflection -- 7.2.5.5 Deflection of Threading c + a, c and Creation of Stacking Faults…”
Libro electrónico -
2417Publicado 2023Tabla de Contenidos: “…5.1.3.3 Type II Censoring -- 5.2 Reliability Data Sources -- 5.3 Nonparametric and Plotting Methods for Reliability Functions -- 5.3.1 Nonparametric Procedures for Reliability Functions -- 5.3.1.1 Nonparametric Component Reliability Estimation Using Small Samples -- 5.3.1.2 Nonparametric Component Reliability Estimation Using Large Samples -- 5.3.2 Probability Distribution Plotting Using Life Data -- 5.3.2.1 Exponential Distribution Probability Plotting -- 5.3.2.2 Weibull Distribution Probability Plotting -- 5.3.2.3 Normal and Lognormal Distribution Probability Plotting -- 5.4 Maximum Likelihood Estimation of Reliability Distribution Parameters -- 5.4.1 Elements of MLE Using Reliability Data -- 5.4.2 Exponential Distribution MLE Point Estimation -- 5.4.2.1 Type I Life Test with Replacement -- 5.4.2.2 Type I Life Test without Replacement -- 5.4.2.3 Type II Life Test with Replacement -- 5.4.2.4 Type II Life Test without Replacement -- 5.4.3 Exponential Distribution Interval Estimation -- 5.4.4 Normal Distribution -- 5.4.5 Lognormal Distribution -- 5.4.6 Weibull Distribution -- 5.4.7 Binomial Distribution -- 5.5 Classical Nonparametric Distribution Estimation -- 5.5.1 Confidence Intervals for cdf and Reliability Function for Complete and Censored Data -- 5.5.2 Confidence Intervals of Reliability Function for Censored Data -- 5.6 Bayesian Estimation Procedures -- 5.6.1 Estimation of the Parameter of Exponential Distribution -- 5.6.1.1 Selecting Hyperparameters for the Gamma Prior Distribution -- 5.6.1.2 Uniform Prior Distribution -- 5.6.1.3 Jeffrey's Prior Distribution -- 5.6.2 Bayesian Estimation of the Parameter of Binomial Distribution -- 5.6.2.1 Standard Uniform Prior Distribution -- 5.6.2.2 Beta Prior Distribution -- 5.6.2.3 Jeffrey's Prior Distribution -- 5.6.2.4 Lognormal Prior Distribution -- 5.6.3 Bayesian Estimation of Other Distributions…”
Libro electrónico -
2418Publicado 2024Tabla de Contenidos: “…6.1.3.6 2022 Booz Allen Hamilton (BAH) Cyber Analytic Framework for China -- 6.1.4 Chinese Cyber Operations Wrap-up -- Bibliography -- Chapter 7 DPRK Cyber Operations -- 7.1 DPRK Cyber Operations -- 7.1.1 DPRK Policy Development -- 7.1.1.1 Kim Il Sung (1948-1994) -- 7.1.1.2 Kim Jong Il (1994-2011) -- 7.1.1.3 Kim Jong Un (2011-present) -- 7.1.2 DPRK Intelligence Structure -- 7.1.2.1 Ministry of State Security -- 7.1.2.2 Worker's Party of Korea -- 7.1.2.3 Reconnaissance General Bureau (APT 43) -- 7.1.3 Example DPRK Cyber Operations -- 7.1.3.1 Sony Hack (2014) -- 7.1.3.2 Bangladesh Bank Heist (2016) -- 7.1.3.3 Operation FashCash (2018) -- 7.1.3.4 WannaCry Ransomware Attack (2017) -- 7.1.3.5 Cryptocurrency -- 7.1.4 DPRK Cyber Operations Wrap-up -- Bibliography -- Chapter 8 Iranian Cyber Operations -- 8.1 Iranian Cyber Operations -- 8.1.1 Iranian Cyber Operations Background -- 8.1.2 Iranian Cyber Support - Contractors, Proxies, and International Partners -- 8.1.2.1 Iranian Cyber Contractors (Internal to Iran) -- 8.1.2.2 Iranian Cyber Proxies (External to Iran) -- 8.1.2.3 Iranian Cyber Partners (External to Iran) -- 8.1.3 Iranian Cyber Teams and Targets -- 8.1.3.1 Iranian Cyber Teams (APTs) -- 8.1.3.2 2012-2014 Navy-Marine Corps Internet (NMCI) Attack -- 8.1.3.3 2020 U.S. …”
Libro electrónico -
2419Publicado 2023Tabla de Contenidos: “…6.3.3.2 Gradient Boosting Classifier -- 6.3.3.3 K-Nearest Neighbors -- 6.3.3.4 Logistic Regression -- 6.3.3.5 Artificial Neural Networks -- 6.3.3.6 Support Vector Machines (SVM) -- 6.3.3.7 Naïve Bayes Classifier -- 6.4 Results -- 6.5 Conclusions -- References -- Chapter 7 Detection of Malicious Emails and URLs Using Text Mining -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Dataset Description -- 7.4 Proposed Architecture -- 7.5 Methodology -- 7.5.1 Methodology for the URL Dataset -- 7.5.2 Methodology for the Email Dataset -- 7.5.2.1 Overcoming the Overfitting Problem -- 7.5.2.2 Tokenization -- 7.5.2.3 Applying Machine Learning Algorithms -- 7.5.3 Detecting Presence of Malicious URLs in Otherwise Non-Malicious Emails -- 7.5.3.1 Preparation of Dataset -- 7.5.3.2 Creation of Features -- 7.5.3.3 Applying Machine Learning Algorithms -- 7.6 Results -- 7.6.1 URL Dataset -- 7.6.2 Email Dataset -- 7.6.3 Final Dataset -- 7.7 Conclusion -- References -- Chapter 8 Quantum Data Traffic Analysis for Intrusion Detection System -- 8.1 Introduction -- 8.2 Literature Overview -- 8.3 Methodology -- 8.3.1 Autoviz -- 8.3.2 Dataset -- 8.3.3 Proposed Models -- 8.3.3.1 Decision Tree -- 8.3.3.2 Random Forest Classifier Algorithm -- 8.3.3.3 AdaBoost Classifier -- 8.3.3.4 Ridge Classifier -- 8.3.3.5 Logistic Regression -- 8.3.3.6 SVM-Linear Kernel -- 8.3.3.7 Naive Bayes -- 8.3.3.8 Quadratic Discriminant Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- Chapter 9 Quantum Computing in Netnomy: A Networking Paradigm in e-Pharmaceutical Setting -- 9.1 Introduction -- 9.2 Discussion -- 9.2.1 Exploring Market Functioning via Quantum Network Economy -- 9.2.1.1 Internal Networking Marketing -- 9.2.1.2 Layered Marketing -- 9.2.1.3 Role of Marketing in Pharma Network Organizations -- 9.2.1.4 Role of Marketing in Vertical Networking Organizations…”
Libro electrónico -
2420Publicado 2018Tabla de Contenidos: “…5.4 Examples Using the for Statement 222 -- 5.4.1 Application: Summing the Even Integers from 2 to 20 223 -- 5.4.2 Application: Compound-Interest Calculations 224 -- 5.5 do...while Iteration Statement 227 -- 5.6 switch Multiple-Selection Statement 228 -- 5.7 Class AutoPolicy Case Study: Strings in switch Statements 234 -- 5.8 break and continue Statements 237 -- 5.8.1 break Statement 237 -- 5.8.2 continue Statement 238 -- 5.9 Logical Operators 239 -- 5.9.1 Conditional AND (& -- & -- ) Operator 239 -- 5.9.2 Conditional OR (||) Operator 240 -- 5.9.3 Short-Circuit Evaluation of Complex Conditions 241 -- 5.9.4 Boolean Logical AND (& -- ) and Boolean Logical Inclusive OR (|)Operators 241 -- 5.9.5 Boolean Logical Exclusive OR (^) 242 -- 5.9.6 Logical Negation (!) Operator 242 -- 5.9.7 Logical Operators Example 243 -- 5.10 Structured-Programming Summary 245 -- 5.11 (Optional) GUI and Graphics Case Study: Drawing Rectangles and Ovals 250 -- 5.12 Wrap-Up 253 -- 6 Methods: A Deeper Look 264 -- 6.1 Introduction 265 -- 6.2 Program Units in Java 265 -- 6.3 static Methods, static Fields and Class Math 267 -- 6.4 Methods with Multiple Parameters 269 -- 6.5 Notes on Declaring and Using Methods 273 -- 6.6 Method-Call Stack and Activation Records 274 -- 6.6.1 Method-Call Stack 274 -- 6.6.2 Stack Frames 274 -- 6.6.3 Local Variables and Stack Frames 274 -- 6.6.4 Stack Overflow 275 -- 6.7 Argument Promotion and Casting 275 -- 6.8 Java API Packages 276 -- 6.9 Case Study: Secure Random-Number Generation 278 -- 6.10 Case Study: A Game of Chance -- Introducing enum Types 283 -- 6.11 Scope of Declarations 288 -- 6.12 Method Overloading 290 -- 6.12.1 Declaring Overloaded Methods 290 -- 6.12.2 Distinguishing Between Overloaded Methods 291 -- 6.12.3 Return Types of Overloaded Methods 292 -- 6.13 (Optional) GUI and Graphics Case Study: Colors and Filled Shapes 292.…”
Libro electrónico