Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 169
- Padres latinos 71
- Crítica e interpretación 47
- Història 45
- Filosofía 39
- Historia y crítica 25
- Biblia 23
- Política y gobierno 23
- Església Catòlica 22
- Teología 22
- History 20
- Bíblia 18
- Paulí 15
- Derecho 14
- Economía 14
- Política 14
- Biografías 13
- Colecciones 13
- Comentaris 13
- Management 13
- Computer networks 12
- Litúrgia 12
- Crítica i interpretació 11
- Iglesia Católica 11
- Turismo 11
- Antonio 10
- Educación 10
- Sociology 10
- historia 10
- Capuchinos 9
-
3621por Gómez Gutiérrez, Juan AntonioTabla de Contenidos: “….) -- 3.5 MAPA 3D -- 3.5.1 CINTA DE OPCIONES -- 3.5.2 PASEO -- 3.5.3 ESCENA -- 3.5.4 CAPA -- 3.5.5 MAPA -- 3.5.6 INSERTAR -- 3.5.7 HORA -- 3.5.8 VER -- 3.6 MINIGRÁFICOS -- 3.6.1 LÍNEA -- 3.6.2 COLUMNA -- 3.6.3 +/- -- 3.7 FILTROS -- 3.7.1 SEGMENTACIÓN DE DATOS -- 3.7.2 ESCALA DE TIEMPO -- 3.8 VÍNCULOS -- 3.8.1 HIPERVÍNCULO -- 3.9 TEXTO -- 3.9.1 CUADRO DE TEXTO -- 3.9.2 ENCABEZADO PIE PÁGINA -- 3.9.3 WORDART -- 3.9.4 LÍNEA DE FIRMA -- 3.9.5 OBJETO -- 3.10 SÍMBOLOS -- 3.10.1 ECUACIÓN -- 3.10.2 SÍMBOLO -- 4. …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3622por Ordóñez, Javier LuqueTabla de Contenidos: “…3.2.7 Antenas con reflector (parabólicas) -- 3.2.8 Arrays -- 3.2.9 Antenas inteligentes -- 3.2.10 Diagrama de radiación de una antena -- 3.3 EL CANAL RADIOELÉCTRICO -- 3.3.1 Tipos de canal radioeléctrico -- 3.3.2 Radioenlaces -- 3.3.3 Modelos de representación de canal -- 3.3.4 Zona de Fresnel -- 3.4 RUIDO E INTERFERENCIA -- 3.5 EFECTOS DE RADIOPROPAGACIÓN -- 3.5.1 Absorción -- 3.5.2 Dispersión -- 3.5.3 Reflexión -- 3.5.4 Refracción -- 3.5.5 Difracción -- 3.5.6 Desvanecimiento -- 3.5.7 Efecto doppler -- 3.5.8 Despolarización -- 3.5.9 Diversidad y multitrayecto -- 3.5.10 Climatología -- 3.6 PARÁMETROS DE RADIACIÓN DE UN SISTEMA -- 3.6.1 Parámetros de emisión -- 3.6.2 Denominación de las emisiones -- 3.6.3 Características de propagación -- 3.6.4 Parámetros de recepción y explotación -- 4 COMUNICACIONES POR SATÉLITE -- 4.1 SATÉLITES. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3623por Zaldívar Navarro, DanielTabla de Contenidos: “….) -- 3.5.4 Robot 3R (...) -- 3.5.5 La tabla de parámetros DH -- 3.5.6 Cálculo de la cinemática directa a partir de la tabla DH -- 3.5.7 Convención DH en Matlab© -- 3.5.8 Construcción de un sistema robótico en Matlab© -- 3.5.9 Gráfica de un sistema robótico en Matlab© -- 3.5.10 Cálculo de la cinemática directa en Matlab© -- 3.5.11 Modificación de cinemática directa en Matlab© -- 3.6 EJEMPLOS DEL CÁLCULO DE LA CINEMÁTICA (...) -- 3.6.1 Robot cilíndrico -- 3.6.2 Robot antropomórfico -- 3.6.3 Eslabón esférico -- 3.6.4 Robot TQ MA2000 -- 3.6.5 Robot manipulador Stanford -- 3.6.6 Robot manipulador SCARA -- 3.6.7 Robot humanoide Dany Walker -- 3.7 RESUMEN DEL CAPÍTULO -- 3.8 EJERCICIOS RECOMENDADOS -- 3.9 LECTURAS RECOMENDADAS -- 4 CINEMÁTICA INVERSA -- 4.1 EL PROBLEMA DE LA CINEMÁTICA INVERSA -- 4.1.1 Solución al problema de cinemática inversa -- 4.1.2 Método geométrico -- 4.1.3 Distancias de ajuste -- 4.1.4 Desacoplamiento cinemático -- 4.1.5 Solución para el robot antropomórfico de 6-DOF -- 4.1.6 Solución del robot SCARA -- 4.1.7 Solución del robot SCARA en Matlab© -- 4.2 MÉTODOS ANALÍTICOS E ITERATIVOS -- 4.3 SOLUCIÓN ITERATIVA DEL PROBLEMA DE CINEMÁTICA INVERSA -- 4.3.1 Convergencia de la solución iterativa -- 4.3.2 Cálculo de la cinemática inversa en Matlab© -- 4.4 RESUMEN DEL CAPÍTULO -- 4.5 EJERCICIOS PROPUESTOS -- 4.6 BIBLIOGRAFÍA RECOMENDADA -- 5 CINEMÁTICA DIFERENCIAL -- 5.1 VELOCIDAD LINEAL Y ROTACIONAL -- 5.1.1 Velocidad lineal -- 5.1.2 Velocidad rotacional -- 5.2 EL VECTOR DE VELOCIDAD -- 5.2.1 Simulación del vector de velocidad en Matlab©…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3624Publicado 2014Tabla de Contenidos: “…3.4.4 The Second-Chance Page Replacement Algorithm -- 3.4.5 The Clock Page Replacement Algorithm -- 3.4.6 The Least Recently Used (LRU) Page Replacement Algorithm -- 3.4.7 Simulating LRU in Software -- 3.4.8 The Working Set Page Replacement Algorithm -- 3.4.9 The WSClock Page Replacement Algorithm -- 3.4.10 Summary of Page Replacement Algorithms -- 3.5 DESIGN ISSUES FOR PAGING SYSTEMS -- 3.5.1 Local versus Global Allocation Policies -- 3.5.2 Load Control -- 3.5.3 Page Size -- 3.5.4 Separate Instruction and Data Spaces -- 3.5.5 Shared Pages -- 3.5.6 Shared Libraries -- 3.5.7 Mapped Files -- 3.5.8 Cleaning Policy -- 3.5.9 Virtual Memory Interface -- 3.6 IMPLEMENTATION ISSUES -- 3.6.1 Operating System Involvement with Paging -- 3.6.2 Page Fault Handling -- 3.6.3 Instruction Backup -- 3.6.4 Locking Pages in Memory -- 3.6.5 Backing Store -- 3.6.6 Separation of Policy and Mechanism -- 3.7 SEGMENTATION -- 3.7.1 Implementation of Pure Segmentation -- 3.7.2 Segmentation with Paging: MULTICS -- 3.7.3 Segmentation with Paging: The Intel x86 -- 3.8 RESEARCH ON MEMORY MANAGEMENT -- 3.9 SUMMARY -- 4 FILE SYSTEMS -- 4.1 FILES -- 4.1.1 File Naming -- 4.1.2 File Structure -- 4.1.3 File Types -- 4.1.4 File Access -- 4.1.5 File Attributes -- 4.1.6 File Operations -- 4.1.7 An Example Program Using File-System Calls -- 4.2 DIRECTORIES -- 4.2.1 Single-Level Directory Systems -- 4.2.2 Hierarchical Directory Systems -- 4.2.3 Path Names -- 4.2.4 Directory Operations -- 4.3 FILE-SYSTEM IMPLEMENTATION -- 4.3.1 File-System Layout -- 4.3.2 Implementing Files -- 4.3.3 Implementing Directories -- 4.3.4 Shared Files -- 4.3.5 Log-Structured File Systems -- 4.3.6 Journaling File Systems -- 4.3.7 Virtual File Systems -- 4.4 FILE-SYSTEM MANAGEMENT AND OPTIMIZATION -- 4.4.1 Disk-Space Management -- 4.4.2 File-System Backups -- 4.4.3 File-System Consistency…”
Libro electrónico -
3625Publicado 2019Tabla de Contenidos: “…3.5.3 The Firing Solution -- 3.5.4 Projectiles with Drag -- 3.5.5 Iterative Targeting -- 3.6 Jumping -- 3.6.1 Jump Points -- 3.6.2 Landing Pads -- 3.6.3 Hole Fillers -- 3.7 Coordinated Movement -- 3.7.1 Fixed Formations -- 3.7.2 Scalable Formations -- 3.7.3 Emergent Formations -- 3.7.4 Two-Level Formation Steering -- 3.7.5 Implementation -- 3.7.6 Extending to More Than Two Levels -- 3.7.7 Slot Roles and Better Assignment -- 3.7.8 Slot Assignment -- 3.7.9 Dynamic Slots and Plays -- 3.7.10 Tactical Movement -- 3.8 Motor Control -- 3.8.1 Output Filtering -- 3.8.2 Capability-Sensitive Steering -- 3.8.3 Common Actuation Properties -- 3.9 Movement in the Third Dimension -- 3.9.1 Rotation in Three Dimensions -- 3.9.2 Converting Steering Behaviors to Three Dimensions -- 3.9.3 Align -- 3.9.4 Align to Vector -- 3.9.5 Face -- 3.9.6 Look Where You're Going -- 3.9.7 Wander -- 3.9.8 Faking Rotation Axes -- CHAPTER 4: PATHFINDING -- 4.1 The Pathfinding Graph -- 4.1.1 Graphs -- 4.1.2 Weighted Graphs -- 4.1.3 Directed Weighted Graphs -- 4.1.4 Terminology -- 4.1.5 Representation -- 4.2 Dijkstra -- 4.2.1 The Problem -- 4.2.2 The Algorithm -- 4.2.3 Pseudo-Code -- 4.2.4 Data Structures and Interfaces -- 4.2.5 Performance of Dijkstra -- 4.2.6 Weaknesses -- 4.3 A* -- 4.3.1 The Problem -- 4.3.2 The Algorithm -- 4.3.3 Pseudo-Code -- 4.3.4 Data Structures and Interfaces -- 4.3.5 Implementation Notes -- 4.3.6 Algorithm Performance -- 4.3.7 Node Array A* -- 4.3.8 Choosing a Heuristic -- 4.4 World Representations -- 4.4.1 Tile Graphs -- 4.4.2 Dirichlet Domains -- 4.4.3 Points of Visibility -- 4.4.4 Navigation Meshes -- 4.4.5 Non-Translational Problems -- 4.4.6 Cost Functions -- 4.4.7 Path Smoothing -- 4.5 Improving on A* -- 4.6 Hierarchical Pathfinding -- 4.6.1 The Hierarchical Pathfinding Graph -- 4.6.2 Pathfinding on the Hierarchical Graph…”
Libro electrónico -
3626por Jayaweera, Sudharman K., 1972-Tabla de Contenidos: “…9.6.6 Optimal Myopic Sensing Decision Policies, 354 -- 9.7 A Reduced Complexity Optimal Subband Selection Framework with an Alternative Reward Function, 355 -- 9.7.1 A New Model for Subband Dynamics, 357 -- 9.7.2 A Simplified Reward Function and a Reduced-Complexity Optimal Policy, 359 -- 9.7.3 A Reduced Complexity Optimal Policy for Independent Subbands, 362 -- 9.7.4 Optimal Myopic Policies with Reduced Dimensional Subband State Vectors, 363 -- 9.8 Machine-Learning Aided Subband Selection Policies, 364 -- 9.8.1 Q-Learning, 365 -- 9.8.2 Q-Learning in a POMDP: A Q-Learning Algorithm for Subband Selection, 368 -- 9.9 Summary, 372 -- 10 Spectral Activity Detection inWideband Cognitive Radios 377 -- 10.1 Introduction, 377 -- 10.2 Optimal Wideband Spectral Activity Detection, 379 -- 10.3 Wideband Spectral Activity Detection, 386 -- 10.4 Wavelet Transform-Based Wideband Spectral Activity Detection, 392 -- 10.4.1 Wavelet Transform, 394 -- 10.4.2 Edge Detection with Wavelet Transform, 395 -- 10.4.3 Spectral Activity Detection Based on Edge Detection, 397 -- 10.5 Wideband Spectral Activity Detection in Non-Gaussian Noise, 398 -- 10.5.1 Arbitrary but Known Noise Distribution, 399 -- 10.5.2 Robust Spectral Activity Detection, 406 -- 10.6 Wideband Spectral Activity Detection with Compressive Sampling, 413 -- 10.6.1 Compressive Sampling, 415 -- 10.6.2 Compressive Sensing of Wideband Spectrum, 419 -- 10.7 Summary, 421 -- 11 Signal Classification inWideband Cognitive Radios 429 -- 11.1 Introduction, 429 -- 11.2 Signal Classification Problem in a Wideband Cognitive Radio, 431 -- 11.3 Feature Extraction for Signal Classification, 435 -- 11.3.1 Carrier/Center Frequency, 435 -- 11.3.2 Cyclostationary Features, 436 -- 11.3.3 Modulation Type and Order Features, 441 -- 11.4 A Signal Classification Architecture for a Wideband Cognitive Radio, 445 -- 11.5 Bayesian Nonparametric Signal Classification, 447 -- 11.6 Sequential Bayesian Nonparametric Signal Classification, 462 -- 11.7 Summary, 469.…”
Publicado 2015
Libro electrónico -
3627por Tate, JonTabla de Contenidos: “…3.2.8 Communication -- 3.3 Buffers -- 3.4 Addressing -- 3.4.1 World Wide Name -- 3.4.2 WWN and WWPN -- 3.4.3 24-bit port address -- 3.4.4 Loop address -- 3.4.5 FICON addressing -- 3.5 Fabric services -- 3.5.1 Management services -- 3.5.2 Time services -- 3.5.3 Name services -- 3.5.4 Login services -- 3.5.5 Registered State Change Notification -- 3.6 Logins -- 3.6.1 Fabric login -- 3.6.2 Port login -- 3.6.3 Process login -- 3.7 Path routing mechanisms -- 3.7.1 Spanning tree -- 3.7.2 Fabric Shortest Path First -- 3.7.3 What is FSPF? …”
Publicado 2005
Libro electrónico -
3628Publicado 2005Tabla de Contenidos: “…WebSphere - DB2 environment -- 3.1 Introduction to the sample scenario setup -- 3.2 Introduction to DB2 drivers for Java -- 3.3 Data source definitions in WAS V5 -- 3.4 The IBM DB2 Universal Driver for SQLJ and JDBC -- 3.4.1 Summary of WAS z/OS external changes for the Universal Driver -- 3.5 Configuring Universal JDBC Driver type 2 connectivity -- 3.5.1 Specifying the Universal JDBC Driver provider -- 3.5.2 Defining Data Sources under this provider -- 3.5.3 Setting/verifying the symbolic environment variables -- 3.5.4 Defining DB2 Universal Driver - General properties -- 3.5.5 Searching for the package to execute -- 3.5.6 Linking to the DB2 libraries -- 3.5.7 Creating a new Application Server -- 3.6 Configuring Universal JDBC Driver type 4 connectivity -- 3.6.1 Using the Universal Driver for type 4 (non-XA) -- 3.6.2 Using the Universal Driver for type 4 (XA) connectivity -- 3.7 Summary -- Chapter 4. …”
Libro electrónico -
3629por Henningsen, PeterTabla de Contenidos: “…Introduction to Fault Analyzer -- 3.1 Start by validating your software levels -- 3.1.1 Fault Analyzer software level -- 3.2 How Fault Analyzer works -- 3.3 Preparing your programs for Fault Analyzer -- 3.3.1 Compiler options -- 3.4 Introduction to Fault Analyzer main screen -- 3.4.1 Content of Fault Entry List panel -- 3.4.2 Customization of Fault Entry List panel -- 3.5 Using FA to analyze an abend -- 3.5.1 Interactive reanalysis -- 3.5.2 Synopsis section -- 3.5.3 Point of failure section -- 3.5.4 Events section -- 3.5.5 System-wide information section -- 3.5.6 Abend job information -- 3.5.7 Options in effect section -- 3.5.8 Batch reanalysis -- 3.5.9 Real-time report -- 3.5.10 The fast-path for solving this dump -- 3.5.11 DB2 related information -- 3.5.12 CICS related information -- 3.5.13 IMS related information -- 3.6 Some very useful functions -- 3.6.1 Adding user title to a fault entry -- 3.6.2 Creating user notes in a dump -- 3.6.3 DSECT mapping -- 3.7 Customizing Fault Analyzer -- 3.7.1 User options file -- 3.7.2 Notification when program abends -- 3.7.3 Placing abends in different history files -- 3.8 Analyzing a CICS system dump -- Part 1 Application Monitor -- Chapter 4. …”
Publicado 2004
Libro electrónico -
3630Publicado 2001Tabla de Contenidos: “…Deployment architecture -- 3.1 Overview -- 3.2 Fibre Channel standards -- 3.2.1 Interoperability -- 3.2.2 Standards -- 3.3 Hardware overview -- 3.3.1 Host Bus Adapter -- 3.3.2 Cabling -- 3.4 Topologies -- 3.4.1 Point-to-point -- 3.4.2 Arbitrated loop -- 3.4.3 Switched fabrics -- 3.5 IBM Tivoli SAN Manager components -- 3.5.1 DB2 -- 3.5.2 IBM Tivoli SAN Manager Console (NetView) -- 3.5.3 Tivoli SAN Manager Agents -- 3.5.4 Tivoli SAN Manager Server -- 3.5.5 SAN physical view -- 3.6 Management -- 3.6.1 Inband management -- 3.6.2 Outband management -- 3.7 Deployment considerations -- 3.7.1 Tivoli SAN Manager Server -- 3.7.2 iSCSI management -- 3.7.3 Other considerations -- 3.7.4 Tivoli SAN Manager Agent (Managed Host) -- 3.8 Deployment scenarios -- 3.8.1 Example 1: Outband only -- 3.8.2 Example 2: Inband only -- 3.8.3 Example 3: Inband and outband -- 3.8.4 Additional considerations -- 3.9 High Availability for Tivoli SAN Manager -- 3.9.1 Standalone server failover -- 3.9.2 Summary -- Part 3 Installation and basic operations -- Chapter 4. …”
Libro electrónico -
3631por Zhu, Wel-DongTabla de Contenidos: “…3.3.1 Java interface -- 3.3.2 Non-visual bean interface -- 3.3.3 Visual bean interface -- 3.3.4 Content Manager Toolkit for z/OS package imports -- 3.3.5 Error or exception handling -- 3.4 Compiling and running the sample programs -- 3.4.1 Compiling and executing ICM sample programs -- 3.4.2 Compiling and executing non-visual bean samples -- 3.5 Sample ICM programs provided on z/OS -- 3.5.1 Preparing the ICM sample programs -- 3.5.2 Transaction sample: STransactionsICM.java -- 3.5.3 Item creation sample: SItemCreationICM.java -- 3.5.4 Item deletion sample: SItemDeletionICM.java -- 3.5.5 Item retrieval sample: SItemRetrievalICM.java -- 3.5.6 Item modification sample: SItemUpdateICM.java -- 3.5.7 Folder manipulation sample: SFolderICM.java -- 3.5.8 Link manipulation sample: SLinksICM.java -- 3.5.9 Search sample: SSearchICM.java -- 3.5.10 Document routing sample: SDocRoutingListingICM.java -- 3.5.11 Deleting sample data -- 3.6 Sample Java bean programs provided on z/OS -- 3.6.1 Link item sample: TAddLink.java -- 3.6.2 Folder creation sample: TCreateFolder.java -- 3.6.3 Item creation sample: TCreateItem.java -- 3.6.4 Deletion sample: TDelete.java -- 3.6.5 Attribute update sample: TEditAttributes.java -- 3.6.6 Entity listing sample: TListEntities.java -- 3.6.7 Link listing sample: TListLinks.java -- 3.6.8 Search sample: TSearch.java -- 3.6.9 Link removal sample: TRemoveLink.java -- 3.7 Using Content Manager Toolkit for z/OS from a batch environment -- 3.7.1 Setting up data and a data model for the batch process -- 3.7.2 Setting up JCL for batch process -- 3.7.3 Developing business logic in a Java program -- 3.7.4 Calling a Java program -- 3.8 Using Content Manager Toolkit for z/OS from a Web environment -- 3.8.1 Using WebSphere -- Chapter 4. …”
Publicado 2005
Libro electrónico -
3632Publicado 2002Red de bibliotecas Iglesia Navarra (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universidad Eclesiástica San Dámaso, Universidad Loyola - Universidad Loyola Granada, Biblioteca Pública Episcopal del Seminario de Barcelona, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca Diocesana de Salamanca, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Universitat Ramon Llull, Biblioteca Universidad de Deusto, Biblioteca Central de Capuchinos de España, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro
-
3633por Ortega Candel, José ManuelTabla de Contenidos: “….) -- 2.7.2 LISTAS NEGRAS -- 2.7.3 LISTAS BLANCAS -- 2.7.4 EXPRESIONES REGULARES -- 2.7.5 FILTROS -- 2.8 GUÍA OWASP DE DESARROLLO SEGURO -- 2.9 EJERCICIOS -- 2.10 RESUMEN -- 2.11 BIBLIOGRAFÍA -- 2.12 AUTOEVALUACIÓN UNIDAD 2 -- 2.13 LECTURAS RECOMENDADAS -- 2.14 GLOSARIO DE TÉRMINOS -- 3 PROGRAMACIÓN SEGURA EN SERVICIOS WEB -- INTRODUCCIÓN -- OBJETIVOS DE LA UNIDAD DIDÁCTICA -- 3.1 CARACTERÍSTICAS DE LOS SERVICIOS WEB -- 3.2 ARQUITECTURAS ORIENTADAS A SERVICIOS -- 3.3 ARQUITECTURA DE LOS SERVICIOS WEB -- 3.4 TECNOLOGÍAS -- 3.4.1 XML -- 3.4.2 SOAP -- 3.4.3 WSDL -- 3.4.4 AJAX -- 3.4.5 SERVICIOS REST -- 3.4.6 TECNOLOGÍAS DE SEGUNDA GENERACIÓN -- 3.5 TECNOLOGÍAS J2EE PARA SERVICIOS WEB -- 3.5.1 JAXP -- 3.5.2 JAXM -- 3.5.3 JAX-RPC / JAX-WS -- 3.5.4 JAXR -- 3.5.5 JAXB -- 3.5.6 OTRAS LIBRERÍAS -- 3.6 IMPLEMENTACIÓN DE LOS SERVICIOS WEB (...) -- 3.6.1 TIPOS DE DATOS -- 3.6.2 ANOTACIONES -- 3.7 SERVICIOS WEB AVANZADOS -- 3.7.1 OPTIMIZACIÓN DE MENSAJES -- 3.7.2 SERVICIOS WEB SEGUROS -- 3.7.3 CONFIDENCIALIDAD E INTEGRIDAD -- 3.7.4 AUTENTICACIÓN EN SERVICIOS WEB -- 3.8 FRAMEWORKS JAVA PARA SERVICIOS WEB (...) -- 3.8.1 AXIS 2 -- 3.8.2 CXF -- 3.8.3 JAX-WS -- 3.9 SEGURIDAD EN API REST CON JAVA JAX-RS -- 3.9.1 AUTENTICACIÓN EN JAX-RS -- 3.9.2 AUTORIZACIÓN EN JAX-RS…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3634Publicado 2017Tabla de Contenidos: “…2.24.1.9 - Availability of Staff -- 2.24.2 - Factors Affecting the Military Maintenance System -- Chapter 3 - Aircraft Reliability and Maintainability Analysis and Design -- 3.1 - Reliability fundamental mathematics -- 3.1.1 - Density Function -- 3.1.2 - Failure Probability Function -- 3.1.3 - Failure Rate -- 3.1.4 - Reliability Function -- 3.1.5 - Bathtub Curve -- 3.1.6 - MTTF -- 3.2 - Some common failure distributions -- 3.2.1 - Exponential Distribution -- 3.2.2 - Weibull Distribution -- 3.2.3 - Normal Distribution -- 3.2.4 - Lognormal Distribution -- 3.2.5 - Summary of Often Used Distributions -- 3.3 - Binary system reliability models -- 3.3.1 - Series System -- 3.3.2 - Parallel System -- 3.3.3 - Standby Redundancy System -- 3.4 - Mechanical reliability-Stress-strength interference model -- 3.4.1 - Introduction of Theory -- 3.4.2 - Analytical Results -- 3.4.3 - Example -- 3.5 - Fuzzy reliability theory -- 3.5.1 - Irrationality of Conventional Reliability Theory -- 3.5.2 - Fuzzy Reliability Basic Theories -- 3.5.3 - Fuzzy Reliability -- 3.5.4 - Fuzzy Failure Rate -- 3.5.5 - Fuzzy MTBF -- 3.6 - Hardware reliability -- 3.6.1 - Failure Mechanisms and Damage Models -- 3.6.2 - Incorrect Mechanical Performance -- 3.6.3 - Incorrect Thermal Performance -- 3.6.4 - Incorrect Electrical Performance -- 3.6.5 - Electromagnetic Interference -- 3.6.6 - Particle Radiation -- 3.6.7 - Yield -- 3.6.8 - Buckling -- 3.6.9 - Fracture -- 3.6.10 - Interfacial Deadhesion -- 3.6.11 - Fatigue -- 3.6.12 - Creep -- 3.6.13 - Wear -- 3.6.14 - Aging Due to Interdiffusion -- 3.6.15 - Aging Due to Particle Radiation -- 3.6.16 - Other Forms of Aging -- 3.6.17 - Corrosion -- 3.6.18 - Metal Migration -- 3.7 - Maintainability analysis and design -- 3.7.1 - Definitions Used in Maintainability Engineering -- 3.7.2 - Measurements -- 3.7.3 - Maintainability Function…”
Libro electrónico -
3635Publicado 2016Tabla de Contenidos: “…Higher-Layer Protocols That Use UDP as a Transport Protocol -- 3.5.5. TCP and UDP Compared -- 3.5.6. Choosing Between TCP and UDP -- 3.6. …”
Libro electrónico -
3636por Gucer, VasfiTabla de Contenidos: “…Planning end-to-end scheduling with Tivoli Workload Scheduler 8.2 -- 3.1 Different ways to do end-to-end scheduling -- 3.2 The rationale behind end-to-end scheduling -- 3.3 Before you start the installation -- 3.3.1 How to order the Tivoli Workload Scheduler software -- 3.3.2 Where to find more information for planning -- 3.4 Planning end-to-end scheduling with Tivoli Workload Scheduler for z/OS -- 3.4.1 Tivoli Workload Scheduler for z/OS documentation -- 3.4.2 Service updates (PSP bucket, APARs, and PTFs) -- 3.4.3 Tivoli Workload Scheduler for z/OS started tasks for end-to-end scheduling -- 3.4.4 Hierarchical File System (HFS) cluster -- 3.4.5 Data sets related to end-to-end scheduling -- 3.4.6 TCP/IP considerations for end-to-end server in sysplex -- 3.4.7 Upgrading from Tivoli Workload Scheduler for z/OS 8.1 end-to-end scheduling -- 3.5 Planning for end-to-end scheduling with Tivoli Workload Scheduler -- 3.5.1 Tivoli Workload Scheduler publications and documentation -- 3.5.2 Tivoli Workload Scheduler service updates (fix packs) -- 3.5.3 System and software requirements -- 3.5.4 Network planning and considerations -- 3.5.5 Backup domain manager -- 3.5.6 Performance considerations -- 3.5.7 Fault-tolerant agent (FTA) naming conventions…”
Publicado 2004
Libro electrónico -
3637por Basu, S. K.Tabla de Contenidos: “…-- 1.9 Object of an Audit -- 1.10 Errors and Frauds in Accounting -- 1.11 Role of Auditors in Detecting Errors and Frauds -- 1.12 Relation Between Book-Keeping, Accountancy and Auditing -- 1.13 Basic Principles Governing an Audit -- 1.14 Scope and Procedures of Audit -- 1.15 Advantages of Auditing -- 1.16 Limitations of Auditing -- 1.17 Relationship Between Auditing with Other Subjects -- 1.18 Qualities of an Auditor -- 1.19 Auditing and Other Services -- Chapter 2: Types of Audit -- 2.1 Introduction -- 2.2 Classification of Audit -- 2.2.1 Classification of Audit on the Basis of Organisation -- 2.2.2 Classification on the Basis of Function -- 2.2.3 Classification on the Basis of Practical Approach -- 2.2.4 Classification on the Basis of Audit Dimension -- Chapter 3: Techniques and Procedures of Auditing -- 3.1 Introduction -- 3.2 Preparatory Steps Before Commencement of New Audit -- 3.3 Audit Activities -- 3.4 Audit Engagement Letter -- 3.4.1 Concept -- 3.4.2 Form and Content -- 3.4.3 Revision of Engagement Letters -- 3.5 Preparation by the Auditor -- 3.5.1 Audit Planning -- 3.5.2 Audit Programme -- 3.5.3 Audit Note Book -- 3.5.4 Audit Working Papers -- 3.5.5 Audit Files -- 3.5.6 Audit Manual -- 3.5.7 Audit Memorandum -- 3.6 Principles and Techniques of Auditing -- 3.6.1 Important Audit Techniques -- 3.7 Procedures Followed in Course of Audit -- 3.7.1 Audit Evidence -- 3.7.2 Analytical Procedures -- 3.7.3 Routine Checking -- 3.7.4 Test Checking -- 3.7.5 Auditing in Depth -- 3.7.6 Walk-Through Tests -- 3.7.7 Rotational Tests…”
Publicado 2009
Libro electrónico -
3638Publicado 2020Tabla de Contenidos: “…Image and Its Properties -- 3.1 Introduction -- 3.2 Image and Its Properties -- 3.2.1 Bit-Depth -- 3.2.2 Pixel and Voxel -- 3.2.3 Image Histogram -- 3.2.4 Window and Level -- 3.2.5 Connectivity: 4 or 8 Pixels -- 3.3 Image Types -- 3.3.1 JPEG -- 3.3.2 TIFF -- 3.3.3 DICOM -- 3.4 Data Structures for Image Analysis -- 3.5 Reading, Writing and Displaying Images -- 3.5.1 Reading Images -- 3.5.2 Reading DICOM Images using pyDICOM -- 3.5.3 Writing Images -- 3.5.4 Writing DICOM Images using pyDICOM -- 3.5.5 Displaying Images -- 3.6 Programming Paradigm -- 3.7 Summary -- 3.8 Exercises -- Part II: Image Processing using Python -- 4. …”
Libro electrónico -
3639Publicado 2004Tabla de Contenidos: “…3.2 IBM Tivoli Business Systems Manager -- 3.2.1 Business goals -- 3.2.2 High level description and main functions -- 3.2.3 Benefits of using IBM Tivoli Business Systems Manager -- 3.2.4 Key concepts in IBM Tivoli Business Systems Manager -- 3.2.5 IBM Tivoli Business Systems Manager architecture -- 3.3 IBM Tivoli Data Warehouse -- 3.3.1 Business goals -- 3.3.2 High level description and main functions -- 3.3.3 Benefits of using Tivoli Data Warehouse -- 3.3.4 Key concepts in Tivoli Data Warehouse -- 3.3.5 Tivoli Data Warehouse architecture -- 3.4 IBM Tivoli Service Level Advisor -- 3.4.1 Business goals -- 3.4.2 High level description and main functions -- 3.4.3 Benefits of using IBM Tivoli Service Level Advisor -- 3.4.4 Key concepts in IBM Tivoli Service Level Advisor -- 3.4.5 IBM Tivoli Service Level Advisor architecture -- 3.5 IBM Tivoli Monitoring for Transaction Performance -- 3.5.1 Business goals -- 3.5.2 High level description and main functions -- 3.5.3 Benefits of using IBM Tivoli Monitoring for Transaction Performance -- 3.5.4 Key concepts in IBM Tivoli Monitoring for Transaction Performance -- 3.5.5 IBM Tivoli Monitoring for Transaction Performance architecture -- 3.6 IBM Tivoli Enterprise Console -- 3.6.1 Business goals -- 3.6.2 High level description and main functions -- 3.6.3 Benefits of using IBM Tivoli Enterprise Console -- 3.6.4 Key concepts of event groups in IBM Tivoli Enterprise Console -- 3.6.5 IBM Tivoli Enterprise Console architecture -- 3.7 IBM Tivoli Monitoring -- 3.7.1 Business goals -- 3.7.2 High level description and main functions -- 3.7.3 Benefits of using IBM Tivoli Monitoring -- 3.7.4 Key concepts in IBM Tivoli Monitoring -- 3.7.5 IBM Tivoli Monitoring architecture -- 3.8 Bringing it all together in support of SLM processes -- 3.8.1 Service definitions -- 3.8.2 Real-time monitoring -- 3.8.3 Historical monitoring…”
Libro electrónico -
3640Publicado 2022Tabla de Contenidos: “…Bearbeitungsfunktionen der Basiselemente -- 3.1 3D-Ansicht für einzelne Geschosse erstellen -- 3.2 3D-Ansicht für ein Geschoss über View Cube -- 3.3 Das Register »Ändern« -- 3.3.1 Gruppe »Auswählen« -- 3.3.2 Gruppe »Eigenschaften« -- 3.3.3 Gruppe »Zwischenablage« -- 3.3.4 Gruppe »Geometrie« -- 3.3.5 Gruppe »Steuerelemente« -- 3.3.6 Gruppe »Ändern« -- 3.3.7 Gruppe »Ansicht« -- 3.3.8 Gruppe »Messen« -- 3.3.9 Gruppe »Erstellen« -- 3.4 Geschossdecken bearbeiten -- 3.4.1 Geschossdecke am Dach begrenzen -- 3.4.2 Bodenplatte im Keller bearbeiten -- 3.5 Wände bearbeiten -- 3.5.1 Die Schnitthöhe für Geschossansichten -- 3.5.2 Wandtyp ändern -- 3.5.3 Wände Löschen, ergänzen und verschieben -- 3.5.4 Verschieben mit und ohne Befehl -- 3.5.5 Wände fixieren, Profil anpassen und Verbinden-Werkzeug -- 3.5.6 Wände in Laufrichtung verbinden -- 3.5.7 Geneigte und verjüngte Wände -- 3.6 Fenster bearbeiten -- 3.6.1 Eigenschaften bearbeiten -- 3.6.2 Fenster aus Bibliotheken -- 3.7 Türen bearbeiten -- 3.8 Verwendung globaler Parameter -- 3.9 Übungsfragen -- Kapitel 4. …”
Libro electrónico