Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 87
- Padres latinos 71
- Història 50
- Crítica e interpretación 27
- Església Catòlica 23
- Biblia 22
- History 20
- Bíblia 18
- Filosofía 18
- Economía 16
- Teología 16
- Paulí 15
- Comentaris 13
- Management 13
- historia 13
- Antonio 12
- Computer networks 12
- Litúrgia 12
- Política 12
- Sociedad 12
- Crítica i interpretació 11
- Iglesia Católica 11
- Turismo 11
- Biografías 10
- Sociology 10
- Capuchinos 9
- Database management 9
- Design and construction 9
- Emigración e inmigración 9
- History and criticism 9
-
3001Publicado 2019Tabla de Contenidos: “…3.2.5 Finite-sample breakdown point 61 -- 3.3 Maximum asymptotic bias 62 -- 3.4 Balancing robustness and efficiency 64 -- 3.5 *“Optimal” robustness 66 -- 3.5.1 Bias- and variance-optimality of location estimators 66 -- 3.5.2 Bias optimality of scale and dispersion estimators 66 -- 3.5.3 The infinitesimal approach 67 -- 3.5.4 The Hampel approach 68 -- 3.5.5 Balancing bias and variance: the general problem 70 -- 3.6 Multidimensional parameters 70 -- 3.7 *Estimators as functionals 72 -- 3.8 Appendix: Proofs of results 76 -- 3.8.1 IF of general M-estimators 76 -- 3.8.2 Maximum BP of location estimators 76 -- 3.8.3 BP of location M-estimators 77 -- 3.8.4 Maximum bias of location M-estimators 79 -- 3.8.5 The minimax bias property of the median 80 -- 3.8.6 Minimizing the GES 80 -- 3.8.7 Hampel optimality 82 -- 3.9 Problems 85 -- 4 Linear Regression 1 87 -- 4.1 Introduction 87 -- 4.2 Review of the least squares method 91 -- 4.3 Classical methods for outlier detection 94 -- 4.4 Regression M-estimators 97 -- 4.4.1 M-estimators with known scale 99 -- 4.4.2 M-estimators with preliminary scale 100 -- 4.4.3 Simultaneous estimation of regression and scale 102 -- 4.5 Numerical computing of monotone M-estimators 103 -- 4.5.1 The L1 estimator 103 -- 4.5.2 M-estimators with smooth 𝜓-function 104 -- 4.6 BP of monotone regression estimators 104 -- 4.7 Robust tests for linear hypothesis 106 -- 4.7.1 Review of the classical theory 106 -- 4.7.2 Robust tests using M-estimators 108 -- 4.8 *Regression quantiles 109 -- 4.9 Appendix: Proofs and complements 110 -- 4.9.1 Why equivariance? …”
Libro electrónico -
3002Publicado 2023Tabla de Contenidos: “…Intro -- Blockchain for Real World Applications -- Contents -- Illustrations -- Foreword -- Preface -- 1 Introduction -- 2 Distributed Ledger Technology -- 2.1 Different Types of Distributed Ledger Technology -- 2.1.1 Blockchain -- 2.1.2 Directed Acyclic Graph -- 2.1.3 Hashgraph -- 2.1.4 Holochain -- 2.1.5 Tempo (Radix) -- 2.2 Chronological Evolution -- 2.2.1 Blockchain 1.0 -- 2.2.2 Blockchain 2.0 -- 2.2.3 Blockchain 3.0 -- 2.2.4 Blockchain 4.0 -- 2.3 Blockchain Architecture -- 2.3.1 Block -- 2.3.2 Hash Function -- 2.3.3 Encryption -- 2.3.3.1 Problems -- 2.3.4 Keys: Public and Private -- 2.3.5 Decentralized Identifier -- 3 Blockchain Ecosystem -- 3.1 Working of Blockchain -- 3.2 Key Characteristics -- 3.2.1 Decentralization -- 3.2.2 Persistence -- 3.2.3 Anonymity -- 3.2.4 Auditability -- 3.3 Unspent Transaction Output -- 3.4 Classification of Blockchain on Access Management -- 3.4.1 Public Blockchain -- 3.4.2 Private Blockchain -- 3.4.3 Consortium Blockchain -- 3.5 Consensus -- 3.5.1 Proof-of-Work -- 3.5.2 Proof-of-Stake -- 3.5.3 Peercoin -- 3.5.4 Practical Byzantine Fault Tolerance -- 3.5.5 Delegated Proof-of-Stake -- 3.5.6 Ripple -- 3.5.7 Tendermint -- 3.5.8 Consensus Algorithms: A Comparison -- 3.5.8.1 Node Identity Management -- 3.5.8.2 Energy Saving -- 3.5.8.3 Tolerated Power of Adversary -- 3.5.9 Advances in Consensus Algorithms -- 3.6 Payment Verification in Blockchain -- 3.6.1 Simple Payment Verification -- 3.6.1.1 Key Features -- 3.6.2 Full Payment Verification -- 3.6.2.1 Key Features -- 3.7 Hashgraph -- 3.7.1 Elements of Hashgraph -- 3.7.2 Diagrammatic Representation -- 3.7.3 How Does Hashgraph Work? …”
Libro electrónico -
3003Publicado 2018Tabla de Contenidos: “…12.7.2 Matlab Code for Phase Feature Extraction 321 -- References 324 -- Part IV Applications 327 -- 13 Upmixing and Beamforming in Professional Audio 329 /Christof Faller -- 13.1 Introduction 329 -- 13.2 Stereo-to-Multichannel Upmix Processor 329 -- 13.2.1 Product Description 329 -- 13.2.2 Considerations for Professional Audio and Broadcast 331 -- 13.2.3 Signal Processing 332 -- 13.3 Digitally Enhanced Shotgun Microphone 336 -- 13.3.1 Product Description 336 -- 13.3.2 Concept 336 -- 13.3.3 Signal Processing 336 -- 13.3.4 Evaluations and Measurements 339 -- 13.4 Surround Microphone System Based on Two Microphone Elements 341 -- 13.4.1 Product Description 341 -- 13.4.2 Concept 344 -- 13.5 Summary 345 -- References 345 -- 14 Spatial Sound Scene Synthesis and Manipulation for Virtual Reality and Audio Effects 347 /Ville Pulkki, Archontis Politis, Tapani Pihlajama¨ki, and Mikko-Ville Laitinen -- 14.1 Introduction 347 -- 14.2 Parametric Sound Scene Synthesis for Virtual Reality 348 -- 14.2.1 Overall Structure 348 -- 14.2.2 Synthesis of Virtual Sources 350 -- 14.2.3 Synthesis of Room Reverberation 352 -- 14.2.4 Augmentation of Virtual Reality with Real Spatial Recordings 352 -- 14.2.5 Higher-Order Processing 353 -- 14.2.6 Loudspeaker-Signal Bus 354 -- 14.3 Spatial Manipulation of Sound Scenes 355 -- 14.3.1 Parametric Directional Transformations 356 -- 14.3.2 Sweet-Spot Translation and Zooming 356 -- 14.3.3 Spatial Filtering 356 -- 14.3.4 Spatial Modulation 357 -- 14.3.5 Diffuse Field Level Control 358 -- 14.3.6 Ambience Extraction 359 -- 14.3.7 Spatialization of Monophonic Signals 360 -- 14.4 Summary 360 -- References 361 -- 15 Parametric Spatial Audio Techniques in Teleconferencing and Remote Presence 363 /Anastasios Alexandridis, Despoina Pavlidi, Nikolaos Stefanakis, and Athanasios Mouchtaris -- 15.1 Introduction and Motivation 363 -- 15.2 Background 365 -- 15.3 Immersive Audio Communication System (ImmACS) 366 -- 15.3.1 Encoder 366 -- 15.3.2 Decoder 373 -- 15.4 Capture and Reproduction of Crowded Acoustic Environments 376.…”
Libro electrónico -
3004Publicado 2022Tabla de Contenidos: “…. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 355. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 356. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 357. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 358. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 359.- ANDRÉ GIDE à ANDRÉ RUYTERS -- 360. - ANDRÉ RUYTERS à ANDRÉ GIDE -- [ÉMILE VERHAEREN à ANDRÉ RUYTERS] -- [ANDRÉ RUYTERS à ÉMILE VERHAEREN] -- 361. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 362. - ANDRÉ RUYTERS à ANDRÉ GIDE -- [ANDRÉ RUYTERS à ÉMILE VERHAEREN] -- 363. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 364. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 365. - GEORGINA RUYTERS à ANDRÉ GIDE -- 366. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 367. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 368. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 369. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 370. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 371. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 372. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 373. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 374. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 375. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 376. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 377. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 378. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 379. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 380. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 381. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 382. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 383. - ANDRÉ GIDE à ANDRÉ et GEORGINA RUYTERS -- 384. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 385. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 386. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 387. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 388. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 389. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 390. - ANDRÉ GIDE à ANDRÉ RUYTERS -- Année 1910 -- 391. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 392. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 393. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 394. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 395. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 396. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 397. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 398. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 399. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 400. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 401. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 402. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 403. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 404. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 405. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 406. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 407. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 408. - ANDRÉ RUYTERS à MADELEINE GIDE -- 409. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 410. - ANDRÉ GIDE à ANDRÉ RUYTERS -- 411- ANDRÉ GIDE à ANDRÉ RUYTERS -- 412. - ANDRÉ RUYTERS à ANDRÉ GIDE -- 413. - ANDRÉ RUYTERS à ANDRÉ GIDE -- Année 1911 -- 414. …”
Electrónico -
3005Publicado 2017Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
Libro electrónico -
3006Publicado 2019Tabla de Contenidos: “…3.2 建立 定义 料库 -- 3.2.1 准备工作 -- 3.2.2 工作方式 -- 3.2.3 工作原理 -- 3.2.4 更多信息 -- 3.2.5 参 -- 3.3 创建 汇 料库 -- 3.3.1 准备工作 -- 3.3.2 工作方式 -- 3.3.3 工作原理 -- 3.3.4 更多信息 -- 3.3.5 参 -- 3.4 创建已标 性单 的 料库 -- 3.4.1 准备工作 -- 3.4.2 工作方式 -- 3.4.3 工作原理 -- 3.4.4 更多信息 -- 3.4.5 参 -- 3.5 创建已组块短 的 料库 -- 3.5.1 准备工作 -- 3.5.2 工作方式 -- 3.5.3 工作原理 -- 3.5.4 更多信息 -- 3.5.5 参 -- 3.6 创建已分类文本的 料库 -- 3.6.1 准备工作 -- 3.6.2 工作方式 -- 3.6.3 工作原理 -- 3.6.4 更多信息 -- 3.6.5 参 -- 3.7 创建已分类组块 料库 取器 -- 3.7.1 准备工作 -- 3.7.2 工作方式 -- 3.7.3 工作原理 -- 3.7.4 更多信息 -- 3.7.5 参 -- 3.8 懒惰 料库加 -- 3.8.1 工作方式 -- 3.8.2 工作原理 -- 3.8.3 更多信息 -- 3.9 创建 定义 料库 图 -- 3.9.1 工作方式 -- 3.9.2 工作原理 -- 3.9.3 更多信息 -- 3.9.4 参 -- 3.10 创建基于MongoDB 的 料库 取器 -- 3.10.1 准备工作 -- 3.10.2 工作方式 -- 3.10.3 工作原理 -- 3.10.4 更多信息 -- 3.10.5 参 -- 3.11 在加 文件的情况下编 料库 -- 3.11.1 准备工作 -- 3.11.2 工作方式 -- 3.11.3 工作原理 -- 第4章 性标注 -- 4.1 引 -- 4.2 标注 -- 4.2.1 准备工作 -- 4.2.2 工作方式 -- 4.2.3 工作原理 -- 4.2.4 更多信息 -- 4.2.5 参 -- 4.3 练一元组 性标注器 -- 4.3.1 工作方式 -- 4.3.2 工作原理 -- 4.3.3 更多信息 -- 4.3.4 参 -- 4.4 回 标注的组合标注器 -- 4.4.1 工作方式 -- 4.4.2 工作原理 -- 4.4.3 更多信息 -- 4.4.4 参 -- 4.5 练和组合N元标注器 -- 4.5.1 准备工作 -- 4.5.2 工作方式 -- 4.5.3 工作原理 -- 4.5.4 更多信息 -- 4.5.5 参 -- 4.6 创建似然单 标签的模型 -- 4.6.1 工作方式 -- 4.6.2 工作原理 -- 4.6.3 更多信息 -- 4.6.4 参 -- 4.7 使用正则 式标注 -- 4.7.1 准备工作 -- 4.7.2 工作方式 -- 4.7.3 工作原理 -- 4.7.4 更多信息 -- 4.7.5 参 -- 4.8 缀标签 -- 4.8.1 工作方式 -- 4.8.2 工作原理 -- 4.8.3 更多信息 -- 4.8.4 参 -- 4.9 练布 尔标注器 -- 4.9.1 工作方式 -- 4.9.2 工作原理 -- 4.9.3 更多信息 -- 4.9.4 参 -- 4.10 练TnT 标注器 -- 4.10.1 工作方式 -- 4.10.2 工作原理 -- 4.10.3 更多信息 -- 4.10.4 参 -- 4.11 使用WordNet 标注 -- 4.11.1 准备工作 -- 4.11.2 工作方式 -- 4.11.3 工作原理 -- 4.11.4 参 -- 4.12 标注专有名 -- 4.12.1 工作方式 -- 4.12.2 工作原理 -- 4.12.3 参 -- 4.13 基于分类器的标注 -- 4.13.1 工作方式 -- 4.13.2 工作原理 -- 4.13.3 更多信息 -- 4.13.4 参 -- 4.14 使用NLTK 练器 练标注器…”
Libro electrónico -
3007Publicado 2005Tabla de Contenidos: “…Enrique Ortega Toro, Aurelio Olmedilla Zafra y Carmen Puigcerver Mula. -- 3.5.5.Efecto de las técnicas cognitivo conductuales en la ansiedad ante deportes, en niños que entrenan karate. …”
Libro -
3008Publicado 2017Tabla de Contenidos: “…Cecil -- 33.1 Introduction 545 -- 33.2 Manufacturing and Medical Application Contexts 546 -- 33.3 Overview of IoT-Based Cyber / Physical Framework 548 -- 33.4 Case Studies in Manufacturing and Medicine 548 -- 33.5 Conclusion: Challenges, Road Map for the Future 556 -- Part V IoT/DATA ANALYTICS CASE STUDIES 563 -- 34 Defragmenting Intelligent Transportation: A Practical Case Study 565 /Alan Carlton, Rafael Cepeda and Tim Gammons -- 34.1 Introduction 565 -- 34.2 The Transport Industry and Some Lessons from the Past 566 -- 34.3 The Transport Industry: a Long Road Traveled 567 -- 34.4 The Transpoprt Industry: Current Status and Outlook 570 -- 34.5 Use Case: oneTRANSPORT - a Solution to Today's Transport Fragmentation 572 -- 34.6 oneTRANSPORT: Business Model 575 -- 34.7 Conclusion 578 -- 35 Connected and Autonomous Vehicles 581 /Levent Guvenc, Bilin Aksun Guvenc and Mumin Tolga Emirler -- 35.1 Brief History of Automated and Connected Driving 581 -- 35.2 Automated Driving Technology 583 -- 35.3 Connected Vehicle Technology and the Cv Pilots 587 -- 35.4 Automated Truck Convoys 589 -- 35.5 On-Demand Automated Shuttles for a Smart City 590 -- 35.6 A Unified Design Approach 591 -- 35.7 Acronym and Description 592 -- 36 Transit Hub: A Smart Decision Support System for Public Transit Operations 597 /Shashank Shekhar, Fangzhou Sun, Abhishek Dubey, Aniruddha Gokhale, Himanshu Neema, Martin Lehofer and Dan Freudberg -- 36.1 Introduction 597 -- 36.2 Challenges 600 -- 36.3 Integrated Sensors 600 -- 36.4 Transit Hub System with Mobile Apps and Smart Kiosks 601 -- 36.5 Conclusion 610 -- 37 Smart Home Services Using the Internet of Things 613 /Gene Wang and Danielle Song -- 37.1 Introduction 613 -- 37.2 What Matters? …”
Libro electrónico -
3009Publicado 2014Tabla de Contenidos: “…17.3 Outage Probability Bounds in Time-Invariant Channels 309 -- 17.4 Simulation Results 310 -- 17.4.1 The Single-Path Time-Invariant Channel 311 -- 17.4.2 The Multipath Time-Invariant Channel 311 -- 17.4.3 The Multipath Time-Varying Channel 313 -- 17.5 Experimental Results: SPACE08 314 -- 17.6 Bibliographical Notes 315 -- 18 OFDM Modem Development 317 -- 18.1 Components of an Acoustic Modem 317 -- 18.2 OFDM Acoustic Modem in Air 318 -- 18.3 OFDM Lab Modem 318 -- 18.4 AquaSeNT OFDM Modem 320 -- 18.5 Bibliographical Notes 321 -- 19 Underwater Ranging and Localization 323 -- 19.1 Ranging 324 -- 19.1.1 One-Way Signaling 324 -- 19.1.2 Two-Way Signaling 324 -- 19.1.3 Challenges for High-Precision Ranging 325 -- 19.2 Underwater GPS 325 -- 19.2.1 System Overview 325 -- 19.2.2 One-Way Travel Time Estimation 326 -- 19.2.3 Localization 327 -- 19.2.4 Tracking Algorithms 329 -- 19.2.5 Simulation Results 334 -- 19.2.6 Field Test in a Local Lake 335 -- 19.3 On-Demand Asynchronous Localization 336 -- 19.3.1 Localization Procedure 337 -- 19.3.2 Localization Algorithm for the Initiator 338 -- 19.3.3 Localization Algorithm for a Passive Node 340 -- 19.3.4 Localization Performance Results in a Lake 341 -- 19.4 Bibliographical Notes 344 -- Appendix A Compressive Sensing 345 -- A.1 Compressive Sensing 346 -- A.1.1 Sparse Representation 346 -- A.1.2 Exactly and Approximately Sparse Signals 346 -- A.1.3 Sensing 346 -- A.1.4 Signal Recovery and RIP 347 -- A.1.5 Sensing Matrices 348 -- A.2 Sparse Recovery Algorithms 348 -- A.2.1 Matching Pursuits 349 -- A.2.2 1-Norm Minimization 349 -- A.3 Applications of Compressive Sensing 350 -- A.3.1 Applications of Compressive Sensing in Communications 350 -- A.3.2 Compressive Sensing in Underwater Acoustic Channels 351 -- Appendix B Experiment Description 353 -- B.1 SPACE08 Experiment 353 -- B.2 MACE10 Experiment 354 -- B.2.1 Experiment Setup 355 -- B.2.2 Mobility Estimation 356 -- References 359 -- Index 383.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico