Mostrando 3,621 - 3,640 Resultados de 3,668 Para Buscar '"AS355"', tiempo de consulta: 0.15s Limitar resultados
  1. 3621
    por Gómez Gutiérrez, Juan Antonio
    Publicado 2017
    Tabla de Contenidos: “….) -- 3.5 MAPA 3D -- 3.5.1 CINTA DE OPCIONES -- 3.5.2 PASEO -- 3.5.3 ESCENA -- 3.5.4 CAPA -- 3.5.5 MAPA -- 3.5.6 INSERTAR -- 3.5.7 HORA -- 3.5.8 VER -- 3.6 MINIGRÁFICOS -- 3.6.1 LÍNEA -- 3.6.2 COLUMNA -- 3.6.3 +/- -- 3.7 FILTROS -- 3.7.1 SEGMENTACIÓN DE DATOS -- 3.7.2 ESCALA DE TIEMPO -- 3.8 VÍNCULOS -- 3.8.1 HIPERVÍNCULO -- 3.9 TEXTO -- 3.9.1 CUADRO DE TEXTO -- 3.9.2 ENCABEZADO PIE PÁGINA -- 3.9.3 WORDART -- 3.9.4 LÍNEA DE FIRMA -- 3.9.5 OBJETO -- 3.10 SÍMBOLOS -- 3.10.1 ECUACIÓN -- 3.10.2 SÍMBOLO -- 4. …”
    Libro electrónico
  2. 3622
    por Ordóñez, Javier Luque
    Publicado 2014
    Tabla de Contenidos: “…3.2.7 Antenas con reflector (parabólicas) -- 3.2.8 Arrays -- 3.2.9 Antenas inteligentes -- 3.2.10 Diagrama de radiación de una antena -- 3.3 EL CANAL RADIOELÉCTRICO -- 3.3.1 Tipos de canal radioeléctrico -- 3.3.2 Radioenlaces -- 3.3.3 Modelos de representación de canal -- 3.3.4 Zona de Fresnel -- 3.4 RUIDO E INTERFERENCIA -- 3.5 EFECTOS DE RADIOPROPAGACIÓN -- 3.5.1 Absorción -- 3.5.2 Dispersión -- 3.5.3 Reflexión -- 3.5.4 Refracción -- 3.5.5 Difracción -- 3.5.6 Desvanecimiento -- 3.5.7 Efecto doppler -- 3.5.8 Despolarización -- 3.5.9 Diversidad y multitrayecto -- 3.5.10 Climatología -- 3.6 PARÁMETROS DE RADIACIÓN DE UN SISTEMA -- 3.6.1 Parámetros de emisión -- 3.6.2 Denominación de las emisiones -- 3.6.3 Características de propagación -- 3.6.4 Parámetros de recepción y explotación -- 4 COMUNICACIONES POR SATÉLITE -- 4.1 SATÉLITES. …”
    Libro electrónico
  3. 3623
    por Zaldívar Navarro, Daniel
    Publicado 2014
    Tabla de Contenidos: “….) -- 3.5.4 Robot 3R (...) -- 3.5.5 La tabla de parámetros DH -- 3.5.6 Cálculo de la cinemática directa a partir de la tabla DH -- 3.5.7 Convención DH en Matlab© -- 3.5.8 Construcción de un sistema robótico en Matlab© -- 3.5.9 Gráfica de un sistema robótico en Matlab© -- 3.5.10 Cálculo de la cinemática directa en Matlab© -- 3.5.11 Modificación de cinemática directa en Matlab© -- 3.6 EJEMPLOS DEL CÁLCULO DE LA CINEMÁTICA (...) -- 3.6.1 Robot cilíndrico -- 3.6.2 Robot antropomórfico -- 3.6.3 Eslabón esférico -- 3.6.4 Robot TQ MA2000 -- 3.6.5 Robot manipulador Stanford -- 3.6.6 Robot manipulador SCARA -- 3.6.7 Robot humanoide Dany Walker -- 3.7 RESUMEN DEL CAPÍTULO -- 3.8 EJERCICIOS RECOMENDADOS -- 3.9 LECTURAS RECOMENDADAS -- 4 CINEMÁTICA INVERSA -- 4.1 EL PROBLEMA DE LA CINEMÁTICA INVERSA -- 4.1.1 Solución al problema de cinemática inversa -- 4.1.2 Método geométrico -- 4.1.3 Distancias de ajuste -- 4.1.4 Desacoplamiento cinemático -- 4.1.5 Solución para el robot antropomórfico de 6-DOF -- 4.1.6 Solución del robot SCARA -- 4.1.7 Solución del robot SCARA en Matlab© -- 4.2 MÉTODOS ANALÍTICOS E ITERATIVOS -- 4.3 SOLUCIÓN ITERATIVA DEL PROBLEMA DE CINEMÁTICA INVERSA -- 4.3.1 Convergencia de la solución iterativa -- 4.3.2 Cálculo de la cinemática inversa en Matlab© -- 4.4 RESUMEN DEL CAPÍTULO -- 4.5 EJERCICIOS PROPUESTOS -- 4.6 BIBLIOGRAFÍA RECOMENDADA -- 5 CINEMÁTICA DIFERENCIAL -- 5.1 VELOCIDAD LINEAL Y ROTACIONAL -- 5.1.1 Velocidad lineal -- 5.1.2 Velocidad rotacional -- 5.2 EL VECTOR DE VELOCIDAD -- 5.2.1 Simulación del vector de velocidad en Matlab©…”
    Libro electrónico
  4. 3624
    Publicado 2014
    Tabla de Contenidos: “…3.4.4 The Second-Chance Page Replacement Algorithm -- 3.4.5 The Clock Page Replacement Algorithm -- 3.4.6 The Least Recently Used (LRU) Page Replacement Algorithm -- 3.4.7 Simulating LRU in Software -- 3.4.8 The Working Set Page Replacement Algorithm -- 3.4.9 The WSClock Page Replacement Algorithm -- 3.4.10 Summary of Page Replacement Algorithms -- 3.5 DESIGN ISSUES FOR PAGING SYSTEMS -- 3.5.1 Local versus Global Allocation Policies -- 3.5.2 Load Control -- 3.5.3 Page Size -- 3.5.4 Separate Instruction and Data Spaces -- 3.5.5 Shared Pages -- 3.5.6 Shared Libraries -- 3.5.7 Mapped Files -- 3.5.8 Cleaning Policy -- 3.5.9 Virtual Memory Interface -- 3.6 IMPLEMENTATION ISSUES -- 3.6.1 Operating System Involvement with Paging -- 3.6.2 Page Fault Handling -- 3.6.3 Instruction Backup -- 3.6.4 Locking Pages in Memory -- 3.6.5 Backing Store -- 3.6.6 Separation of Policy and Mechanism -- 3.7 SEGMENTATION -- 3.7.1 Implementation of Pure Segmentation -- 3.7.2 Segmentation with Paging: MULTICS -- 3.7.3 Segmentation with Paging: The Intel x86 -- 3.8 RESEARCH ON MEMORY MANAGEMENT -- 3.9 SUMMARY -- 4 FILE SYSTEMS -- 4.1 FILES -- 4.1.1 File Naming -- 4.1.2 File Structure -- 4.1.3 File Types -- 4.1.4 File Access -- 4.1.5 File Attributes -- 4.1.6 File Operations -- 4.1.7 An Example Program Using File-System Calls -- 4.2 DIRECTORIES -- 4.2.1 Single-Level Directory Systems -- 4.2.2 Hierarchical Directory Systems -- 4.2.3 Path Names -- 4.2.4 Directory Operations -- 4.3 FILE-SYSTEM IMPLEMENTATION -- 4.3.1 File-System Layout -- 4.3.2 Implementing Files -- 4.3.3 Implementing Directories -- 4.3.4 Shared Files -- 4.3.5 Log-Structured File Systems -- 4.3.6 Journaling File Systems -- 4.3.7 Virtual File Systems -- 4.4 FILE-SYSTEM MANAGEMENT AND OPTIMIZATION -- 4.4.1 Disk-Space Management -- 4.4.2 File-System Backups -- 4.4.3 File-System Consistency…”
    Libro electrónico
  5. 3625
    Publicado 2019
    Tabla de Contenidos: “…3.5.3 The Firing Solution -- 3.5.4 Projectiles with Drag -- 3.5.5 Iterative Targeting -- 3.6 Jumping -- 3.6.1 Jump Points -- 3.6.2 Landing Pads -- 3.6.3 Hole Fillers -- 3.7 Coordinated Movement -- 3.7.1 Fixed Formations -- 3.7.2 Scalable Formations -- 3.7.3 Emergent Formations -- 3.7.4 Two-Level Formation Steering -- 3.7.5 Implementation -- 3.7.6 Extending to More Than Two Levels -- 3.7.7 Slot Roles and Better Assignment -- 3.7.8 Slot Assignment -- 3.7.9 Dynamic Slots and Plays -- 3.7.10 Tactical Movement -- 3.8 Motor Control -- 3.8.1 Output Filtering -- 3.8.2 Capability-Sensitive Steering -- 3.8.3 Common Actuation Properties -- 3.9 Movement in the Third Dimension -- 3.9.1 Rotation in Three Dimensions -- 3.9.2 Converting Steering Behaviors to Three Dimensions -- 3.9.3 Align -- 3.9.4 Align to Vector -- 3.9.5 Face -- 3.9.6 Look Where You're Going -- 3.9.7 Wander -- 3.9.8 Faking Rotation Axes -- CHAPTER 4: PATHFINDING -- 4.1 The Pathfinding Graph -- 4.1.1 Graphs -- 4.1.2 Weighted Graphs -- 4.1.3 Directed Weighted Graphs -- 4.1.4 Terminology -- 4.1.5 Representation -- 4.2 Dijkstra -- 4.2.1 The Problem -- 4.2.2 The Algorithm -- 4.2.3 Pseudo-Code -- 4.2.4 Data Structures and Interfaces -- 4.2.5 Performance of Dijkstra -- 4.2.6 Weaknesses -- 4.3 A* -- 4.3.1 The Problem -- 4.3.2 The Algorithm -- 4.3.3 Pseudo-Code -- 4.3.4 Data Structures and Interfaces -- 4.3.5 Implementation Notes -- 4.3.6 Algorithm Performance -- 4.3.7 Node Array A* -- 4.3.8 Choosing a Heuristic -- 4.4 World Representations -- 4.4.1 Tile Graphs -- 4.4.2 Dirichlet Domains -- 4.4.3 Points of Visibility -- 4.4.4 Navigation Meshes -- 4.4.5 Non-Translational Problems -- 4.4.6 Cost Functions -- 4.4.7 Path Smoothing -- 4.5 Improving on A* -- 4.6 Hierarchical Pathfinding -- 4.6.1 The Hierarchical Pathfinding Graph -- 4.6.2 Pathfinding on the Hierarchical Graph…”
    Libro electrónico
  6. 3626
    por Jayaweera, Sudharman K., 1972-
    Publicado 2015
    Tabla de Contenidos: “…9.6.6 Optimal Myopic Sensing Decision Policies, 354 -- 9.7 A Reduced Complexity Optimal Subband Selection Framework with an Alternative Reward Function, 355 -- 9.7.1 A New Model for Subband Dynamics, 357 -- 9.7.2 A Simplified Reward Function and a Reduced-Complexity Optimal Policy, 359 -- 9.7.3 A Reduced Complexity Optimal Policy for Independent Subbands, 362 -- 9.7.4 Optimal Myopic Policies with Reduced Dimensional Subband State Vectors, 363 -- 9.8 Machine-Learning Aided Subband Selection Policies, 364 -- 9.8.1 Q-Learning, 365 -- 9.8.2 Q-Learning in a POMDP: A Q-Learning Algorithm for Subband Selection, 368 -- 9.9 Summary, 372 -- 10 Spectral Activity Detection inWideband Cognitive Radios 377 -- 10.1 Introduction, 377 -- 10.2 Optimal Wideband Spectral Activity Detection, 379 -- 10.3 Wideband Spectral Activity Detection, 386 -- 10.4 Wavelet Transform-Based Wideband Spectral Activity Detection, 392 -- 10.4.1 Wavelet Transform, 394 -- 10.4.2 Edge Detection with Wavelet Transform, 395 -- 10.4.3 Spectral Activity Detection Based on Edge Detection, 397 -- 10.5 Wideband Spectral Activity Detection in Non-Gaussian Noise, 398 -- 10.5.1 Arbitrary but Known Noise Distribution, 399 -- 10.5.2 Robust Spectral Activity Detection, 406 -- 10.6 Wideband Spectral Activity Detection with Compressive Sampling, 413 -- 10.6.1 Compressive Sampling, 415 -- 10.6.2 Compressive Sensing of Wideband Spectrum, 419 -- 10.7 Summary, 421 -- 11 Signal Classification inWideband Cognitive Radios 429 -- 11.1 Introduction, 429 -- 11.2 Signal Classification Problem in a Wideband Cognitive Radio, 431 -- 11.3 Feature Extraction for Signal Classification, 435 -- 11.3.1 Carrier/Center Frequency, 435 -- 11.3.2 Cyclostationary Features, 436 -- 11.3.3 Modulation Type and Order Features, 441 -- 11.4 A Signal Classification Architecture for a Wideband Cognitive Radio, 445 -- 11.5 Bayesian Nonparametric Signal Classification, 447 -- 11.6 Sequential Bayesian Nonparametric Signal Classification, 462 -- 11.7 Summary, 469.…”
    Libro electrónico
  7. 3627
    por Tate, Jon
    Publicado 2005
    Tabla de Contenidos: “…3.2.8 Communication -- 3.3 Buffers -- 3.4 Addressing -- 3.4.1 World Wide Name -- 3.4.2 WWN and WWPN -- 3.4.3 24-bit port address -- 3.4.4 Loop address -- 3.4.5 FICON addressing -- 3.5 Fabric services -- 3.5.1 Management services -- 3.5.2 Time services -- 3.5.3 Name services -- 3.5.4 Login services -- 3.5.5 Registered State Change Notification -- 3.6 Logins -- 3.6.1 Fabric login -- 3.6.2 Port login -- 3.6.3 Process login -- 3.7 Path routing mechanisms -- 3.7.1 Spanning tree -- 3.7.2 Fabric Shortest Path First -- 3.7.3 What is FSPF? …”
    Libro electrónico
  8. 3628
    Publicado 2005
    Tabla de Contenidos: “…WebSphere - DB2 environment -- 3.1 Introduction to the sample scenario setup -- 3.2 Introduction to DB2 drivers for Java -- 3.3 Data source definitions in WAS V5 -- 3.4 The IBM DB2 Universal Driver for SQLJ and JDBC -- 3.4.1 Summary of WAS z/OS external changes for the Universal Driver -- 3.5 Configuring Universal JDBC Driver type 2 connectivity -- 3.5.1 Specifying the Universal JDBC Driver provider -- 3.5.2 Defining Data Sources under this provider -- 3.5.3 Setting/verifying the symbolic environment variables -- 3.5.4 Defining DB2 Universal Driver - General properties -- 3.5.5 Searching for the package to execute -- 3.5.6 Linking to the DB2 libraries -- 3.5.7 Creating a new Application Server -- 3.6 Configuring Universal JDBC Driver type 4 connectivity -- 3.6.1 Using the Universal Driver for type 4 (non-XA) -- 3.6.2 Using the Universal Driver for type 4 (XA) connectivity -- 3.7 Summary -- Chapter 4. …”
    Libro electrónico
  9. 3629
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…Introduction to Fault Analyzer -- 3.1 Start by validating your software levels -- 3.1.1 Fault Analyzer software level -- 3.2 How Fault Analyzer works -- 3.3 Preparing your programs for Fault Analyzer -- 3.3.1 Compiler options -- 3.4 Introduction to Fault Analyzer main screen -- 3.4.1 Content of Fault Entry List panel -- 3.4.2 Customization of Fault Entry List panel -- 3.5 Using FA to analyze an abend -- 3.5.1 Interactive reanalysis -- 3.5.2 Synopsis section -- 3.5.3 Point of failure section -- 3.5.4 Events section -- 3.5.5 System-wide information section -- 3.5.6 Abend job information -- 3.5.7 Options in effect section -- 3.5.8 Batch reanalysis -- 3.5.9 Real-time report -- 3.5.10 The fast-path for solving this dump -- 3.5.11 DB2 related information -- 3.5.12 CICS related information -- 3.5.13 IMS related information -- 3.6 Some very useful functions -- 3.6.1 Adding user title to a fault entry -- 3.6.2 Creating user notes in a dump -- 3.6.3 DSECT mapping -- 3.7 Customizing Fault Analyzer -- 3.7.1 User options file -- 3.7.2 Notification when program abends -- 3.7.3 Placing abends in different history files -- 3.8 Analyzing a CICS system dump -- Part 1 Application Monitor -- Chapter 4. …”
    Libro electrónico
  10. 3630
    Publicado 2001
    Tabla de Contenidos: “…Deployment architecture -- 3.1 Overview -- 3.2 Fibre Channel standards -- 3.2.1 Interoperability -- 3.2.2 Standards -- 3.3 Hardware overview -- 3.3.1 Host Bus Adapter -- 3.3.2 Cabling -- 3.4 Topologies -- 3.4.1 Point-to-point -- 3.4.2 Arbitrated loop -- 3.4.3 Switched fabrics -- 3.5 IBM Tivoli SAN Manager components -- 3.5.1 DB2 -- 3.5.2 IBM Tivoli SAN Manager Console (NetView) -- 3.5.3 Tivoli SAN Manager Agents -- 3.5.4 Tivoli SAN Manager Server -- 3.5.5 SAN physical view -- 3.6 Management -- 3.6.1 Inband management -- 3.6.2 Outband management -- 3.7 Deployment considerations -- 3.7.1 Tivoli SAN Manager Server -- 3.7.2 iSCSI management -- 3.7.3 Other considerations -- 3.7.4 Tivoli SAN Manager Agent (Managed Host) -- 3.8 Deployment scenarios -- 3.8.1 Example 1: Outband only -- 3.8.2 Example 2: Inband only -- 3.8.3 Example 3: Inband and outband -- 3.8.4 Additional considerations -- 3.9 High Availability for Tivoli SAN Manager -- 3.9.1 Standalone server failover -- 3.9.2 Summary -- Part 3 Installation and basic operations -- Chapter 4. …”
    Libro electrónico
  11. 3631
    por Zhu, Wel-Dong
    Publicado 2005
    Tabla de Contenidos: “…3.3.1 Java interface -- 3.3.2 Non-visual bean interface -- 3.3.3 Visual bean interface -- 3.3.4 Content Manager Toolkit for z/OS package imports -- 3.3.5 Error or exception handling -- 3.4 Compiling and running the sample programs -- 3.4.1 Compiling and executing ICM sample programs -- 3.4.2 Compiling and executing non-visual bean samples -- 3.5 Sample ICM programs provided on z/OS -- 3.5.1 Preparing the ICM sample programs -- 3.5.2 Transaction sample: STransactionsICM.java -- 3.5.3 Item creation sample: SItemCreationICM.java -- 3.5.4 Item deletion sample: SItemDeletionICM.java -- 3.5.5 Item retrieval sample: SItemRetrievalICM.java -- 3.5.6 Item modification sample: SItemUpdateICM.java -- 3.5.7 Folder manipulation sample: SFolderICM.java -- 3.5.8 Link manipulation sample: SLinksICM.java -- 3.5.9 Search sample: SSearchICM.java -- 3.5.10 Document routing sample: SDocRoutingListingICM.java -- 3.5.11 Deleting sample data -- 3.6 Sample Java bean programs provided on z/OS -- 3.6.1 Link item sample: TAddLink.java -- 3.6.2 Folder creation sample: TCreateFolder.java -- 3.6.3 Item creation sample: TCreateItem.java -- 3.6.4 Deletion sample: TDelete.java -- 3.6.5 Attribute update sample: TEditAttributes.java -- 3.6.6 Entity listing sample: TListEntities.java -- 3.6.7 Link listing sample: TListLinks.java -- 3.6.8 Search sample: TSearch.java -- 3.6.9 Link removal sample: TRemoveLink.java -- 3.7 Using Content Manager Toolkit for z/OS from a batch environment -- 3.7.1 Setting up data and a data model for the batch process -- 3.7.2 Setting up JCL for batch process -- 3.7.3 Developing business logic in a Java program -- 3.7.4 Calling a Java program -- 3.8 Using Content Manager Toolkit for z/OS from a Web environment -- 3.8.1 Using WebSphere -- Chapter 4. …”
    Libro electrónico
  12. 3632
  13. 3633
    por Ortega Candel, José Manuel
    Publicado 2018
    Tabla de Contenidos: “….) -- 2.7.2 LISTAS NEGRAS -- 2.7.3 LISTAS BLANCAS -- 2.7.4 EXPRESIONES REGULARES -- 2.7.5 FILTROS -- 2.8 GUÍA OWASP DE DESARROLLO SEGURO -- 2.9 EJERCICIOS -- 2.10 RESUMEN -- 2.11 BIBLIOGRAFÍA -- 2.12 AUTOEVALUACIÓN UNIDAD 2 -- 2.13 LECTURAS RECOMENDADAS -- 2.14 GLOSARIO DE TÉRMINOS -- 3 PROGRAMACIÓN SEGURA EN SERVICIOS WEB -- INTRODUCCIÓN -- OBJETIVOS DE LA UNIDAD DIDÁCTICA -- 3.1 CARACTERÍSTICAS DE LOS SERVICIOS WEB -- 3.2 ARQUITECTURAS ORIENTADAS A SERVICIOS -- 3.3 ARQUITECTURA DE LOS SERVICIOS WEB -- 3.4 TECNOLOGÍAS -- 3.4.1 XML -- 3.4.2 SOAP -- 3.4.3 WSDL -- 3.4.4 AJAX -- 3.4.5 SERVICIOS REST -- 3.4.6 TECNOLOGÍAS DE SEGUNDA GENERACIÓN -- 3.5 TECNOLOGÍAS J2EE PARA SERVICIOS WEB -- 3.5.1 JAXP -- 3.5.2 JAXM -- 3.5.3 JAX-RPC / JAX-WS -- 3.5.4 JAXR -- 3.5.5 JAXB -- 3.5.6 OTRAS LIBRERÍAS -- 3.6 IMPLEMENTACIÓN DE LOS SERVICIOS WEB (...) -- 3.6.1 TIPOS DE DATOS -- 3.6.2 ANOTACIONES -- 3.7 SERVICIOS WEB AVANZADOS -- 3.7.1 OPTIMIZACIÓN DE MENSAJES -- 3.7.2 SERVICIOS WEB SEGUROS -- 3.7.3 CONFIDENCIALIDAD E INTEGRIDAD -- 3.7.4 AUTENTICACIÓN EN SERVICIOS WEB -- 3.8 FRAMEWORKS JAVA PARA SERVICIOS WEB (...) -- 3.8.1 AXIS 2 -- 3.8.2 CXF -- 3.8.3 JAX-WS -- 3.9 SEGURIDAD EN API REST CON JAVA JAX-RS -- 3.9.1 AUTENTICACIÓN EN JAX-RS -- 3.9.2 AUTORIZACIÓN EN JAX-RS…”
    Libro electrónico
  14. 3634
    Publicado 2017
    Tabla de Contenidos: “…2.24.1.9 - Availability of Staff -- 2.24.2 - Factors Affecting the Military Maintenance System -- Chapter 3 - Aircraft Reliability and Maintainability Analysis and Design -- 3.1 - Reliability fundamental mathematics -- 3.1.1 - Density Function -- 3.1.2 - Failure Probability Function -- 3.1.3 - Failure Rate -- 3.1.4 - Reliability Function -- 3.1.5 - Bathtub Curve -- 3.1.6 - MTTF -- 3.2 - Some common failure distributions -- 3.2.1 - Exponential Distribution -- 3.2.2 - Weibull Distribution -- 3.2.3 - Normal Distribution -- 3.2.4 - Lognormal Distribution -- 3.2.5 - Summary of Often Used Distributions -- 3.3 - Binary system reliability models -- 3.3.1 - Series System -- 3.3.2 - Parallel System -- 3.3.3 - Standby Redundancy System -- 3.4 - Mechanical reliability-Stress-strength interference model -- 3.4.1 - Introduction of Theory -- 3.4.2 - Analytical Results -- 3.4.3 - Example -- 3.5 - Fuzzy reliability theory -- 3.5.1 - Irrationality of Conventional Reliability Theory -- 3.5.2 - Fuzzy Reliability Basic Theories -- 3.5.3 - Fuzzy Reliability -- 3.5.4 - Fuzzy Failure Rate -- 3.5.5 - Fuzzy MTBF -- 3.6 - Hardware reliability -- 3.6.1 - Failure Mechanisms and Damage Models -- 3.6.2 - Incorrect Mechanical Performance -- 3.6.3 - Incorrect Thermal Performance -- 3.6.4 - Incorrect Electrical Performance -- 3.6.5 - Electromagnetic Interference -- 3.6.6 - Particle Radiation -- 3.6.7 - Yield -- 3.6.8 - Buckling -- 3.6.9 - Fracture -- 3.6.10 - Interfacial Deadhesion -- 3.6.11 - Fatigue -- 3.6.12 - Creep -- 3.6.13 - Wear -- 3.6.14 - Aging Due to Interdiffusion -- 3.6.15 - Aging Due to Particle Radiation -- 3.6.16 - Other Forms of Aging -- 3.6.17 - Corrosion -- 3.6.18 - Metal Migration -- 3.7 - Maintainability analysis and design -- 3.7.1 - Definitions Used in Maintainability Engineering -- 3.7.2 - Measurements -- 3.7.3 - Maintainability Function…”
    Libro electrónico
  15. 3635
    Publicado 2016
    Tabla de Contenidos: “…Higher-Layer Protocols That Use UDP as a Transport Protocol -- 3.5.5. TCP and UDP Compared -- 3.5.6. Choosing Between TCP and UDP -- 3.6. …”
    Libro electrónico
  16. 3636
    por Gucer, Vasfi
    Publicado 2004
    Tabla de Contenidos: “…Planning end-to-end scheduling with Tivoli Workload Scheduler 8.2 -- 3.1 Different ways to do end-to-end scheduling -- 3.2 The rationale behind end-to-end scheduling -- 3.3 Before you start the installation -- 3.3.1 How to order the Tivoli Workload Scheduler software -- 3.3.2 Where to find more information for planning -- 3.4 Planning end-to-end scheduling with Tivoli Workload Scheduler for z/OS -- 3.4.1 Tivoli Workload Scheduler for z/OS documentation -- 3.4.2 Service updates (PSP bucket, APARs, and PTFs) -- 3.4.3 Tivoli Workload Scheduler for z/OS started tasks for end-to-end scheduling -- 3.4.4 Hierarchical File System (HFS) cluster -- 3.4.5 Data sets related to end-to-end scheduling -- 3.4.6 TCP/IP considerations for end-to-end server in sysplex -- 3.4.7 Upgrading from Tivoli Workload Scheduler for z/OS 8.1 end-to-end scheduling -- 3.5 Planning for end-to-end scheduling with Tivoli Workload Scheduler -- 3.5.1 Tivoli Workload Scheduler publications and documentation -- 3.5.2 Tivoli Workload Scheduler service updates (fix packs) -- 3.5.3 System and software requirements -- 3.5.4 Network planning and considerations -- 3.5.5 Backup domain manager -- 3.5.6 Performance considerations -- 3.5.7 Fault-tolerant agent (FTA) naming conventions…”
    Libro electrónico
  17. 3637
    por Basu, S. K.
    Publicado 2009
    Tabla de Contenidos: “…-- 1.9 Object of an Audit -- 1.10 Errors and Frauds in Accounting -- 1.11 Role of Auditors in Detecting Errors and Frauds -- 1.12 Relation Between Book-Keeping, Accountancy and Auditing -- 1.13 Basic Principles Governing an Audit -- 1.14 Scope and Procedures of Audit -- 1.15 Advantages of Auditing -- 1.16 Limitations of Auditing -- 1.17 Relationship Between Auditing with Other Subjects -- 1.18 Qualities of an Auditor -- 1.19 Auditing and Other Services -- Chapter 2: Types of Audit -- 2.1 Introduction -- 2.2 Classification of Audit -- 2.2.1 Classification of Audit on the Basis of Organisation -- 2.2.2 Classification on the Basis of Function -- 2.2.3 Classification on the Basis of Practical Approach -- 2.2.4 Classification on the Basis of Audit Dimension -- Chapter 3: Techniques and Procedures of Auditing -- 3.1 Introduction -- 3.2 Preparatory Steps Before Commencement of New Audit -- 3.3 Audit Activities -- 3.4 Audit Engagement Letter -- 3.4.1 Concept -- 3.4.2 Form and Content -- 3.4.3 Revision of Engagement Letters -- 3.5 Preparation by the Auditor -- 3.5.1 Audit Planning -- 3.5.2 Audit Programme -- 3.5.3 Audit Note Book -- 3.5.4 Audit Working Papers -- 3.5.5 Audit Files -- 3.5.6 Audit Manual -- 3.5.7 Audit Memorandum -- 3.6 Principles and Techniques of Auditing -- 3.6.1 Important Audit Techniques -- 3.7 Procedures Followed in Course of Audit -- 3.7.1 Audit Evidence -- 3.7.2 Analytical Procedures -- 3.7.3 Routine Checking -- 3.7.4 Test Checking -- 3.7.5 Auditing in Depth -- 3.7.6 Walk-Through Tests -- 3.7.7 Rotational Tests…”
    Libro electrónico
  18. 3638
    Publicado 2020
    Tabla de Contenidos: “…Image and Its Properties -- 3.1 Introduction -- 3.2 Image and Its Properties -- 3.2.1 Bit-Depth -- 3.2.2 Pixel and Voxel -- 3.2.3 Image Histogram -- 3.2.4 Window and Level -- 3.2.5 Connectivity: 4 or 8 Pixels -- 3.3 Image Types -- 3.3.1 JPEG -- 3.3.2 TIFF -- 3.3.3 DICOM -- 3.4 Data Structures for Image Analysis -- 3.5 Reading, Writing and Displaying Images -- 3.5.1 Reading Images -- 3.5.2 Reading DICOM Images using pyDICOM -- 3.5.3 Writing Images -- 3.5.4 Writing DICOM Images using pyDICOM -- 3.5.5 Displaying Images -- 3.6 Programming Paradigm -- 3.7 Summary -- 3.8 Exercises -- Part II: Image Processing using Python -- 4. …”
    Libro electrónico
  19. 3639
    Publicado 2004
    Tabla de Contenidos: “…3.2 IBM Tivoli Business Systems Manager -- 3.2.1 Business goals -- 3.2.2 High level description and main functions -- 3.2.3 Benefits of using IBM Tivoli Business Systems Manager -- 3.2.4 Key concepts in IBM Tivoli Business Systems Manager -- 3.2.5 IBM Tivoli Business Systems Manager architecture -- 3.3 IBM Tivoli Data Warehouse -- 3.3.1 Business goals -- 3.3.2 High level description and main functions -- 3.3.3 Benefits of using Tivoli Data Warehouse -- 3.3.4 Key concepts in Tivoli Data Warehouse -- 3.3.5 Tivoli Data Warehouse architecture -- 3.4 IBM Tivoli Service Level Advisor -- 3.4.1 Business goals -- 3.4.2 High level description and main functions -- 3.4.3 Benefits of using IBM Tivoli Service Level Advisor -- 3.4.4 Key concepts in IBM Tivoli Service Level Advisor -- 3.4.5 IBM Tivoli Service Level Advisor architecture -- 3.5 IBM Tivoli Monitoring for Transaction Performance -- 3.5.1 Business goals -- 3.5.2 High level description and main functions -- 3.5.3 Benefits of using IBM Tivoli Monitoring for Transaction Performance -- 3.5.4 Key concepts in IBM Tivoli Monitoring for Transaction Performance -- 3.5.5 IBM Tivoli Monitoring for Transaction Performance architecture -- 3.6 IBM Tivoli Enterprise Console -- 3.6.1 Business goals -- 3.6.2 High level description and main functions -- 3.6.3 Benefits of using IBM Tivoli Enterprise Console -- 3.6.4 Key concepts of event groups in IBM Tivoli Enterprise Console -- 3.6.5 IBM Tivoli Enterprise Console architecture -- 3.7 IBM Tivoli Monitoring -- 3.7.1 Business goals -- 3.7.2 High level description and main functions -- 3.7.3 Benefits of using IBM Tivoli Monitoring -- 3.7.4 Key concepts in IBM Tivoli Monitoring -- 3.7.5 IBM Tivoli Monitoring architecture -- 3.8 Bringing it all together in support of SLM processes -- 3.8.1 Service definitions -- 3.8.2 Real-time monitoring -- 3.8.3 Historical monitoring…”
    Libro electrónico
  20. 3640
    Publicado 2022
    Tabla de Contenidos: “…Bearbeitungsfunktionen der Basiselemente -- 3.1 3D-Ansicht für einzelne Geschosse erstellen -- 3.2 3D-Ansicht für ein Geschoss über View Cube -- 3.3 Das Register »Ändern« -- 3.3.1 Gruppe »Auswählen« -- 3.3.2 Gruppe »Eigenschaften« -- 3.3.3 Gruppe »Zwischenablage« -- 3.3.4 Gruppe »Geometrie« -- 3.3.5 Gruppe »Steuerelemente« -- 3.3.6 Gruppe »Ändern« -- 3.3.7 Gruppe »Ansicht« -- 3.3.8 Gruppe »Messen« -- 3.3.9 Gruppe »Erstellen« -- 3.4 Geschossdecken bearbeiten -- 3.4.1 Geschossdecke am Dach begrenzen -- 3.4.2 Bodenplatte im Keller bearbeiten -- 3.5 Wände bearbeiten -- 3.5.1 Die Schnitthöhe für Geschossansichten -- 3.5.2 Wandtyp ändern -- 3.5.3 Wände Löschen, ergänzen und verschieben -- 3.5.4 Verschieben mit und ohne Befehl -- 3.5.5 Wände fixieren, Profil anpassen und Verbinden-Werkzeug -- 3.5.6 Wände in Laufrichtung verbinden -- 3.5.7 Geneigte und verjüngte Wände -- 3.6 Fenster bearbeiten -- 3.6.1 Eigenschaften bearbeiten -- 3.6.2 Fenster aus Bibliotheken -- 3.7 Türen bearbeiten -- 3.8 Verwendung globaler Parameter -- 3.9 Übungsfragen -- Kapitel 4. …”
    Libro electrónico