Mostrando 1,686,381 - 1,686,400 Resultados de 1,711,902 Para Buscar '"A', tiempo de consulta: 3.88s Limitar resultados
  1. 1686381
    Publicado 2017
    Tabla de Contenidos: “…Vook, Amitava Ghosh, and Timothy A. Thomas -- 15.1 Introduction 342 -- 15.2 Overview of Multi‐Antenna Techniques in LTE 343 -- 15.3 Moving to 5G Cellular with Large‐scale Antenna Arrays 345 -- 15.4 Antenna‐array Architectures for 5G Cellular 348 -- 15.5 Massive MIMO for Evolved LTE Systems (Below 6 GHz) 349 -- 15.6 Massive MIMO for cmWave and mmWave Systems (Above 6 GHz) 358 -- 15.7 Conclusion 362 -- References 363 -- 16 Full‐duplex Radios 365 / Dinesh Bharadia and Sachin Katti -- 16.1 The Problem 367.…”
    Libro electrónico
  2. 1686382
    Publicado 2024
    Tabla de Contenidos: “…10.3 Details of Computational Intelligence -- 10.3.1 Branches of Computational Intelligence -- 10.3.2 Principles of CI and Application -- 10.3.2.1 Fuzzy Logic -- 10.3.2.2 Neural Networks -- 10.3.2.3 Evolutionary Computation -- 10.3.2.4 Natural Language Processing -- 10.3.2.5 Probabilistic Methods -- 10.3.3 Implementation of CI -- 10.3.3.1 Using a Mobile Phone as an Example -- 10.4 Computational Intelligence in Communication Network -- 10.5 Conclusion -- References -- Index…”
    Libro electrónico
  3. 1686383
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- About the Author -- Abbreviations -- Endorsements for Martin Lee's Book -- Chapter 1 Introduction -- 1.1 Definitions -- 1.1.1 Intelligence -- 1.1.2 Cyber Threat -- 1.1.3 Cyber Threat Intelligence -- 1.2 History of Threat Intelligence -- 1.2.1 Antiquity -- 1.2.2 Ancient Rome -- 1.2.3 Medieval and Renaissance Age -- 1.2.4 Industrial Age -- 1.2.5 World War I -- 1.2.6 World War II -- 1.2.7 Post War Intelligence -- 1.2.8 Cyber Threat Intelligence -- 1.2.9 Emergence of Private Sector Intelligence Sharing -- 1.3 Utility of Threat Intelligence -- 1.3.1 Developing Cyber Threat Intelligence -- Summary -- References -- Chapter 2 Threat Environment -- 2.1 Threat -- 2.1.1 Threat Classification -- 2.2 Risk and Vulnerability -- 2.2.1 Human Vulnerabilities -- 2.2.1.1 Example - Business Email Compromise -- 2.2.2 Configuration Vulnerabilities -- 2.2.2.1 Example - Misconfiguration of Cloud Storage -- 2.2.3 Software Vulnerabilities -- 2.2.3.1 Example - Log4j Vulnerabilities -- 2.3 Threat Actors -- 2.3.1 Example - Operation Payback -- 2.3.2 Example - Stuxnet -- 2.3.3 Tracking Threat Actors -- 2.4 TTPs - Tactics, Techniques, and Procedures -- 2.5 Victimology -- 2.5.1 Diamond Model -- 2.6 Threat Landscape -- 2.6.1 Example - Ransomware -- 2.7 Attack Vectors, Vulnerabilities, and Exploits -- 2.7.1 Email Attack Vectors -- 2.7.2 Web-Based Attacks -- 2.7.3 Network Service Attacks -- 2.7.4 Supply Chain Attacks -- 2.8 The Kill Chain -- 2.9 Untargeted versus Targeted Attacks -- 2.10 Persistence -- 2.11 Thinking Like a Threat Actor -- Summary -- References -- Chapter 3 Applying Intelligence -- 3.1 Planning Intelligence Gathering -- 3.1.1 The Intelligence Programme -- 3.1.2 Principles of Intelligence -- 3.1.3 Intelligence Metrics -- 3.2 The Intelligence Cycle -- 3.2.1 Planning, Requirements, and Direction…”
    Libro electrónico
  4. 1686384
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Chapter 1 Introduction to Fractional Calculus -- 1.1 Introduction -- 1.2 Birth of Fractional Calculus -- 1.3 Useful Mathematical Functions -- 1.3.1 The Gamma Function -- 1.3.2 The Beta Function -- 1.3.3 The Mittag-Leffler Function -- 1.3.4 The Mellin-Ross Function -- 1.3.5 The Wright Function -- 1.3.6 The Error Function -- 1.3.7 The Hypergeometric Function -- 1.3.8 The H-Function -- 1.4 Riemann-Liouville (R-L) Fractional Integral and Derivative -- 1.5 Caputo Fractional Derivative -- 1.6 Grünwald-Letnikov Fractional Derivative and Integral -- 1.7 Riesz Fractional Derivative and Integral -- 1.8 Modified Riemann-Liouville Derivative -- 1.9 Local Fractional Derivative -- 1.9.1 Local Fractional Continuity of a Function -- 1.9.2 Local Fractional Derivative -- References -- Chapter 2 Recent Trends in Fractional Dynamical Models and Mathematical Methods -- 2.1 Introduction -- 2.2 Fractional Calculus: A Generalization of Integer-Order Calculus -- 2.3 Fractional Derivatives of Some Functions and Their Graphical Illustrations -- 2.4 Applications of Fractional Calculus -- 2.4.1 N.H. …”
    Libro electrónico
  5. 1686385
    por Ramírez, Marleni
    Publicado 2019
    Tabla de Contenidos: “…PREPARARSE PARA UN ANÁLISIS DE PUESTOS -- 1.10. LLEVAR A CABO EL ANÁLISIS DE PUESTOS -- 1.11. PROCESOS DEL ANÁLISIS DE PUESTOS -- 1.12. …”
    Libro electrónico
  6. 1686386
    por Padilla, Yudelka
    Publicado 2014
    Tabla de Contenidos: “…-- 14.7 Condiciones de forma de la adopción privilegiada -- 14.8 Procedimiento de la adopción -- 14.8.1 Convivencia provisional del adoptante y adoptado -- 14.8.2 Asignación de familias a niños (...) -- 14.8.3 Fase administrativa jurisdiccional de la adopción -- 14.9 Impugnación de la adopción. …”
    Libro electrónico
  7. 1686387
    Publicado 2014
    Tabla de Contenidos: “…4.3.1.2 CEN technical bodies -- 4.3.1.3 European standards -- 4.3.1.4 Technical specifications -- 4.3.1.6 CENELEC workshop agreements (CWA) -- 4.3.1.7 CEN members -- 4.3.1.8 CEN/TC 225 -- 4.3.1.9 CENELEC -- 4.3.1.10 Smart grids: EC Mandate M/490 -- 4.3.1.11 ISO/IEC JTC 1/SWG 05 on the Internet of Things (IoT) -- 4.3.1.12 ISO/IEC JTC 1/WG 7 Sensor Networks -- 4.3.1.13 ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques -- 4.3.2 ETSI -- 4.3.3 IEEE -- 4.3.3.1 Overview -- 4.3.3.2 Cloud Computing -- 4.3.3.3 eHealth -- 4.3.3.4 eLearning -- 4.3.3.5 Intelligent Transportation Systems (ITS) -- 4.3.3.6 Network and Information Security (NIS) -- 4.3.3.7 Smart Grid -- 4.3.4 IETF -- 4.3.5 ITU-T -- 4.3.6 OASIS -- 4.3.6.1 Transactional Reliability -- 4.3.6.2 Modularity, reusability, and devices in the cloud -- 4.3.6.3 All that big data from all those things: access control, cybersecurity and privacy -- 4.3.6.4 Access control -- 4.3.6.5 Encryption and cybersecurity -- 4.3.6.6 Privacy -- 4.3.7 OGC -- 4.3.8 oneM2M -- 4.3.9 GS1 -- 4.3.9.1 The Role of Standards -- 4.3.9.2 GS1 Standards: Identify, Capture, Share -- 4.3.9.3 Looking forward -- 4.4 IERC Research Projects Positions -- 4.4.1 BETaaS Advisory Board Experts Position -- 4.4.2 IoT6 Position -- 4.5 Conclusions -- References -- 5 Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework -- 5.1 Introduction -- 5.2 BackgroundWork -- 5.3 Main Concepts and Motivation of the Framework -- 5.3.1 Identity Management -- 5.3.2 Size and Heterogeneity of the System -- 5.3.3 Anonymization of User Data and Metadata -- 5.3.4 Action's Control -- 5.3.5 Privacy by Design -- 5.3.6 Context Awareness -- 5.3.7 Summary -- 5.4 A Policy-based Framework for Security and Privacy in Internet of Things -- 5.4.1 Deployment in a Scenario -- 5.4.2 Policies and Context Switching…”
    Libro electrónico
  8. 1686388
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…Part des femmes dans la population active occupée à temps partiel -- Tableau 26. Femmes actives occupées à temps partiel en pourcentage de l'emploi des femmes -- Tableau 27. …”
    Libro electrónico
  9. 1686389
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Part des femmes dans la population active occupée à temps partiel -- Tableau 26. Femmes actives occupées à temps partiel en pourcentage de l'emploi des femmes -- Tableau 27. …”
    Libro electrónico
  10. 1686390
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…Part des femmes dans la population active occupée à temps partiel -- Tableau 26. Femmes actives occupées à temps partiel en pourcentage de l'emploi des femmes -- Tableau 27. …”
    Libro electrónico
  11. 1686391
    por Bhardwaj, Uma
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- About the Authors -- Chapter 1: Introduction: Composition and Function of Cell -- 1.1 Introduction to and Importance of Biochemistry -- 1.2 Structure, Composition and Function of Cell -- 1.2.1 Cell Wall -- 1.2.2 Bacterial Cell Wall -- 1.2.3 The Bacterial Cytoplasmic Membrane -- 1.2.4 Fimbrae and Pili -- 1.2.5 Capsules and Slime Layers -- 1.2.6 Flagellum (Singular) -- 1.2.7 Cell Membrane -- 1.2.8 Cytoplasm -- 1.3 Cell Organelles -- 1.3.1 Chloroplasts -- 1.3.2 Vacuole -- 1.3.3 Cytoskeleton -- 1.3.4 Endoplasmic Reticulum (ER) -- 1.3.5 Golgi Apparatus -- 1.3.6 Ribosomes -- 1.3.7 Mitochondrion -- 1.3.8 Lysosomes -- 1.3.9 Peroxisome -- 1.3.10 Centrioles -- 1.3.11 Nucleus -- 1.4 Cellular Organization: Prokaryotic and Eukaryotic Cell -- 1.4.1 Prokaryotic Cells -- 1.4.2 Eukaryotic Cells -- 1.4.3 Similarities Between Prokaryotic Cell and a Eukaryotic Cell -- 1.5 Microscopy -- 1.5.1 Light Microscopy -- 1.5.2 Bright Field Microscopy -- 1.5.3 Dark Field Microscopy -- 1.5.4 Phase Contrast Microscopy -- 1.5.5 Differential Interference Contrast Microscopy -- 1.5.6 Fluorescence Microscopy -- 1.5.7 Electron Microscopy -- Exercises -- Multiple Choice Questions -- Chapter 2: Structure and Functions of Cell Membrane -- 2.1 Fluid-Mosaic Model -- 2.2 Cytoskeleton and Cell-Cell Interaction -- 2.3 Transport Mechanism Across Plasma Membrane -- 2.3.1 Diffusion -- 2.3.2 Osmosis -- 2.3.3 Facilitated Diffusion -- 2.3.4 Membrane Channels -- 2.3.5 M embrane Transporters -- 2.3.6 Active Transport: Na+-K+ Pump -- 2.4 Acid-Base Balance: Blood pH, Buffering and Diagnosis -- 2.4.1 Symptoms and Diagnosis -- 2.5 Chemistry of Water, pH and Buffers -- 2.5.1 Buffers -- 2.5.2 Buffering Action -- 2.6 Water Electrolyte Balance -- Exercises -- Multiple Choice Questions -- Chapter 3: Composition and Metabolism of Carbohydrates…”
    Libro electrónico
  12. 1686392
    Publicado 2022
    Tabla de Contenidos: “…5.4.3.2 Optimization of Φ under fixed F and Vm[k] -- 5.4.4 Numerical results -- 5.4.5 Conclusion -- 5.4.6 Proof of Theorem 5.4.1 -- References -- 6 Artificial intelligence technology in the Internet of things -- 6.1 Introduction -- 6.2 Exploiting deep learning for secure transmission in an underlay cognitive radio network -- 6.2.1 System model and problem formulation -- 6.2.2 Conventional optimization based power allocation approach -- 6.2.2.1 Perfect CSI -- 6.3 Q-learning based task offloading and resources optimization for a collaborative computing system -- 6.3.1 System model and problem formulation -- 6.3.1.1 System model -- 6.3.1.2 Computation model -- 6.3.1.3 Local computing -- 6.3.1.4 Collaborative cloud computing -- 6.3.2 Wireless communication model -- 6.3.3 MDP model of offloading decision process -- 6.3.3.1 State space S -- 6.3.3.2 Action set A -- 6.3.3.3 Policy -- 6.3.3.4 Loss function and reward -- 6.3.4 Communication and computation resources optimization -- 6.3.4.1 Uplink transmission power allocation -- References -- 7 Fog/edge computing technology and big data system with IoT -- 7.1 Introduction -- 7.1.1 MEC: overview and resource allocation -- 7.1.1.1 MEC: overview -- 7.1.1.2 Single-user and multiuser MEC -- 7.1.1.3 MIMO-assisted MEC -- 7.1.2 Massive MIMO-assisted MEC -- 7.1.2.1 Motivation -- 7.1.2.2 State-of-the-art -- 7.2 Edge cache-assisted secure low-latency millimeter wave transmission -- 7.2.1 Related works -- 7.2.2 System model and problem formulation -- 7.2.2.1 System model -- 7.2.3 Problem formulation -- 7.2.3.1 Problem solution -- 7.2.3.2 Beamforming design at the fronthaul link -- 7.2.3.3 Beamforming design at the access link -- 7.2.4 Numerical results -- 7.2.5 Conclusion -- 7.3 Delay minimization for massive MIMO assisted mobile edge computing -- 7.3.1 System model and problem formulation -- 7.3.1.1 System model…”
    Libro electrónico
  13. 1686393
    por Ordóñez, Javier Luque
    Publicado 2014
    Tabla de Contenidos: “…UMTS-CDMA -- 7.5.6 Telefonía móvil 4G. LTE y LTE-A -- 7.5.7 Terminales móviles -- 7.5.8 Comunicaciones móviles por satélite -- 7.6 REDES HETEROGÉNEAS Y SMALL CELLS -- 7.6.1 Crecimiento del tráfico de datos -- 7.6.2 La solución de las small cells -- 7.7 SERVICIOS MARÍTIMOS -- 7.7.1 Bandas de frecuencias -- 7.7.2 Sistema mundial de socorro y seguridad marítima -- 7.7.3 COSPAS - SARSAT -- 7.8 SERVICIOS AERONÁUTICOS -- 7.8.1 Bandas de frecuencias -- 7.8.2 Estaciones aeronáuticas -- 8 REDES INALÁMBRICAS -- 8.1 RED INALÁMBRICA. …”
    Libro electrónico
  14. 1686394
    Publicado 2014
    Tabla de Contenidos: “…-- 7.6 MEMORY VIRTUALIZATION -- 7.7 I/O VIRTUALIZATION -- 7.8 VIRTUAL APPLIANCES -- 7.9 VIRTUAL MACHINES ON MULTICORE CPUS -- 7.10 LICENSING ISSUES -- 7.11 CLOUDS -- 7.11.1 Clouds as a Service -- 7.11.2 Virtual Machine Migration -- 7.11.3 Checkpointing -- 7.12 CASE STUDY: VMWARE -- 7.12.1 The Early History of VMware -- 7.12.2 VMware Workstation -- 7.12.3 Challenges in Bringing Virtualization to the x86 -- 7.12.4 VMware Workstation: Solution Overview -- 7.12.5 The Evolution of VMware Workstation -- 7.12.6 ESX Server: VMware's type 1 Hypervisor -- 7.13 RESEARCH ON VIRTUALIZATION AND THE CLOUD -- 8 MULTIPLE PROCESSOR SYSTEMS -- 8.1 MULTIPROCESSORS -- 8.1.1 Multiprocessor Hardware -- 8.1.2 Multiprocessor Operating System Types -- 8.1.3 Multiprocessor Synchronization -- 8.1.4 Multiprocessor Scheduling -- 8.2 MULTICOMPUTERS -- 8.2.1 Multicomputer Hardware -- 8.2.2 Low-Level Communication Software -- 8.2.3 User-Level Communication Software -- 8.2.4 Remote Procedure Call -- 8.2.5 Distributed Shared Memory -- 8.2.6 Multicomputer Scheduling -- 8.3 DISTRIBUTED SYSTEMS -- 8.3.1 Network Hardware -- 8.3.2 Network Services and Protocols -- 8.3.3 Document-Based Middleware…”
    Libro electrónico
  15. 1686395
  16. 1686396
    Publicado 2024
    “…Con un enfoque interdisciplinario, este libro es una lectura esencial para estudiantes, académicos y profesionales del campo de la Comunicación, así como para cualquier persona interesada en comprender las complejidades de nuestra sociedad interconectada. A través de sus páginas, Conexiones digitales invita a reflexionar sobre el futuro de la comunicación, desafiando a los lectores a considerar cómo podemos navegar y moldear este nuevo paisaje digital de manera que fomente una sociedad más informada, inclusiva y empática…”
    Libro
  17. 1686397
    Publicado 2018
    “…Para ello, en beneficio de los agentes investigadores, ahondan en la pregunta por el método en los procesos de investigación jurídica desde la lógica, la teoría jurídica, la racionalidad legislativa, el análisis económico del derecho, la argumentación jurídica, y la visión formalista e instrumental de derecho privado La obra abogada por la necesidad de un dualismo metodológico y el uso articulado de diversos métodos de investigación, lo que da lugar a una nueva triangulación de métodos entre las disciplinas que conforman las ciencias sociales…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  18. 1686398
    Publicado 2018
    “…Para ello, en beneficio de los agentes investigadores, ahondan en la pregunta por el método en los procesos de investigación jurídica desde la lógica, la teoría jurídica, la racionalidad legislativa, el análisis económico del derecho, la argumentación jurídica, y la visión formalista e instrumental de derecho privado La obra abogada por la necesidad de un dualismo metodológico y el uso articulado de diversos métodos de investigación, lo que da lugar a una nueva triangulación de métodos entre las disciplinas que conforman las ciencias sociales…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  19. 1686399
  20. 1686400
    Publicado 2015
    “…Written by leading orthopaedic surgeons from around the world, the revised and expanded 8th edition of this classic bestselling text presents complete, up-to-date coverage of all types of children's fractures. A must-read for pediatric orthopedic surgeons and orthopedic residents. …”
    Enlace del recurso
    Libro electrónico