Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 350
- Application software 286
- History 232
- Management 198
- Engineering & Applied Sciences 180
- Economics 167
- Historia 159
- Social aspects 145
- Education 137
- Data processing 119
- Computer Science 117
- Microsoft .NET Framework 110
- Computer networks 109
- Security measures 102
- Computer security 97
- Design 96
- RELIGION 95
- Python (Computer program language) 93
- Programming 92
- Web sites 92
- Cross-cultural studies 89
- Web site development 83
- Cloud computing 78
- Computer programs 78
- Machine learning 78
- Computer programming 74
- JavaScript (Computer program language) 71
- History and criticism 66
- Research 65
- Computer software 64
-
6261Publicado 1995Tabla de Contenidos: “…Blood Supply System -- INTRODUCTION -- BLOOD AND BLOOD PRODUCTS -- Whole Blood and Components -- Plasma and Derivatives -- Plasma Collection -- Plasma Processing -- Blood and Blood Components Distribution -- BLOOD COLLECTION ORGANIZATIONS -- Community Blood Banks -- The American Red Cross Service -- Hospital Blood Banks -- PROFESSIONAL ASSOCIATIONS -- American Association of Blood Banks -- AABB Inspection and Accreditation Program -- Council of Community Blood Centers -- American Blood Resources Association -- HEMOPHILIA ORGANIZATIONS -- The Nature of Hemophilia -- Hemophilia Treatment Centers -- National Hemophilia Foundation -- Medical and Scientific Advisory Council -- ROLE OF THE U.S. …”
Libro electrónico -
6262Publicado 2024Tabla de Contenidos: “…Executive Order 13873 - Securing the Information and Communications Technology and Services Supply Chain (2019) -- Executive Order 13870 - America's Cybersecurity Workforce (2019) -- Executive Order 13865 - Coordinating National Resilience to Electromagnetic Pulses (2019) -- Executive Order 13905 - Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services (2020) -- Executive Order 14028 - Improving the Nation's Cybersecurity (2021) -- Executive Order 14110 - Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023) -- Summary -- References -- Part 4: What's Next -- Chapter 9: The Future of CI -- Increment and innovation of cybersecurity measures -- More robust encryption implementation -- Human factor and training -- PPPs -- Resilience and recovery -- Integration of IoT and smart technologies -- Supply chain security -- Advancements in threat detection technologies -- Greater regulatory and compliance requirements -- Cross-sector collaboration -- Summary -- Conclusion -- References -- Index -- Other Books You May Enjoy…”
Libro electrónico -
6263
-
6264
-
6265
-
6266Publicado 2014Tabla de Contenidos: “…3.1.2 Coded Modulation 41 -- 3.1.3 Coded OFDM 42 -- 3.2 Nonbinary LDPC Codes 43 -- 3.2.1 Nonbinary Regular Cycle Codes 44 -- 3.2.2 Nonbinary Irregular LDPC Codes 45 -- 3.3 Encoding 46 -- 3.4 Decoding 48 -- 3.4.1 Initialization 48 -- 3.4.2 Variable-to-Check-Node Update 49 -- 3.4.3 Check-to-Variable-Node Update 50 -- 3.4.4 Tentative Decision and Decoder Outputs 51 -- 3.5 Code Design 52 -- 3.5.1 Design of Regular Cycle codes 53 -- 3.5.2 Design of Irregular LDPC Codes 53 -- 3.5.3 Quasi-Cyclic Nonbinary LDPC codes 55 -- 3.6 Simulation Results of Coded OFDM 58 -- 3.7 Bibliographical Notes 59 -- 4 PAPR Control 63 -- 4.1 PAPR Comparison 63 -- 4.2 PAPR Reduction 65 -- 4.2.1 Clipping 65 -- 4.2.2 Selective Mapping 67 -- 4.2.3 Peak Reduction Subcarriers 69 -- 4.3 Bibliographical Notes 69 -- 5 Receiver Overview and Preprocessing 71 -- 5.1 OFDM Receiver Overview 72 -- 5.2 Receiver Preprocessing 73 -- 5.2.1 Receiver Preprocessing 73 -- 5.2.2 Digital Implementation 74 -- 5.2.3 Frequency-Domain Oversampling 77 -- 5.3 Frequency-Domain Input / Output Relationship 78 -- 5.3.1 Single-Input Single-Output Channel 78 -- 5.3.2 Single-Input Multi-Output Channel 79 -- 5.3.3 Multi-Input Multi-Output Channel 80 -- 5.3.4 Channel Matrix Structure 81 -- 5.4 OFDM Receiver Categorization 82 -- 5.4.1 ICI-Ignorant Receiver 82 -- 5.4.2 ICI-Aware Receiver 83 -- 5.4.3 Block-by-Block Processing 85 -- 5.4.4 Block-to-Block Processing 85 -- 5.4.5 Discussion 85 -- 5.5 Receiver Performance Bound with Simulated Channels 85 -- 5.5.1 Simulating Underwater Acoustic Channels 86 -- 5.5.2 ICI Effect in Time-Varying Channels 86 -- 5.5.3 Outage Performance of SISO Channel 87 -- 5.6 Extension to CP-OFDM 88 -- 5.6.1 Receiver Preprocessing 88 -- 5.6.2 Frequency-Domain Input / Output Relationship 89 -- 5.7 Bibliographical Notes 89 -- 6 Detection, Synchronization and Doppler Scale Estimation 91 -- 6.1 Cross-Correlation Based Methods 92 -- 6.1.1 Cross-Correlation Based Detection 92 -- 6.1.2 Cross-Correlation Based Synchronization and Doppler Scale Estimation 96.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6267
-
6268Publicado 2018Tabla de Contenidos: “…-- Using IDisposable -- When to implement the IDisposable interface -- Finalizer and Dispose -- Summary -- Securing and Implementing Resilience in .NET Core Applications -- Introduction to resilient applications -- Resilient policies -- Reactive policies -- Implementing the retry pattern -- Implementing circuit breaker -- Wrapping the circuit breaker with retry -- Fallback policy with circuit breaker and retry -- Proactive policies -- Implementing timeout -- Implementing caching -- Implementing health checks -- Storing sensitive information using Application Secrets -- Protecting ASP.NET Core APIs -- SSL (Secure Socket Layer) -- Enabling SSL in an ASP.NET Core application -- Preventing CSRF (Cross-Site Request Forgery) attacks -- Reinforcing security headers -- Adding the HTTP strict transport security header -- Adding the X-Content-Type-Options header -- Adding the X-Frame-Options header -- Adding the X-Xss-Protection header -- Adding the Content-Security-Policy header -- Adding the referrer-policy header -- Enabling CORS in the ASP.NET Core application -- Authentication and authorization -- Using ASP.NET Core Identity for authentication and authorization…”
Libro electrónico -
6269Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Chapter 1 Introduction -- 1.1 Matrices -- Definitions -- Determinant -- Inverse and Orthogonality -- Matrix Operations -- 1.2 Vectors -- Dot Product -- Cross Product -- Dyadic Product -- Projection -- 1.3 Summation Convention -- Unit Dyads -- 1.4 Cartesian Tensors -- Double Product or Double Contraction -- Invariants of the Second-Order Tensor -- Symmetric Tensors -- Higher-Order Tensors -- 1.5 Polar Decomposition Theorem -- Other Decompositions -- 1.6 D'Alembert's Principle -- Particle Mechanics -- Rigid-Body Kinematics -- Application of D'Alembert's Principle -- Continuum Forces -- 1.7 Virtual Work Principle -- Relationship with D'Alembert's Principle -- 1.8 Approximation Methods -- 1.9 Discrete Equations -- 1.10 Momentum, Work, and Energy -- Linear and Angular Momentum -- Work and Energy -- 1.11 Parameter Change and Coordinate Transformation -- Change of Parameters -- Coordinate Transformation -- Deformation and Strains -- Position Vector Gradients and Rigid Body Kinematics -- Problems -- Chapter 2 Kinematics -- 2.1 Motion Description -- Line Elements -- Rigid-Body Motion -- Floating Frame of Reference (FFR) -- Displacement Vector Gradients -- 2.2 Strain Components -- Geometric Interpretation of the Strains -- Eulerian Strain Tensor -- 2.3 Other Deformation Measures -- Right and Left Cauchy-Green Deformation Tensors -- Infinitesimal Strain Tensor -- 2.4 Decomposition of Displacement -- Homogeneous Motion -- Nonhomogeneous Motion -- 2.5 Velocity and Acceleration -- Eulerian Description -- Rate of Deformation and Spin Tensors -- Rate of Change of the Green-Lagrange Strain -- 2.6 Coordinate Transformation -- Strain Transformation -- Gradients and Strains -- Principal Strains -- Strain Invariants -- 2.7 Objectivity -- 2.8 Change of Volume and Area -- Volume -- Area…”
Libro electrónico -
6270Publicado 2021Tabla de Contenidos: “…What I've Seen So Far in the Organizations I Work With -- Getting On and Around -- Agile Community Events and Meetups -- Chapter 11: United Arab Emirates (Dubai) -- History -- Insights -- Getting On and Around -- Agile Community Events and Meetups -- Part IV: Europe -- Agile Community Events and Meetups -- Chapter 12: Germany -- History -- Insights -- Filestage: Streamlining the Creative Workflow, Based on Customer Feedback5 -- Tips for Agile Managers -- Give Context, Not Just Skills -- Figure Out What People Want or Need -- Building Momentum for Change As an Indian Scrum Master in a German Company -- Getting On and Around -- A Recipe for Cross-Cultural Integration -- Challenges -- The Idea…”
Libro electrónico -
6271Publicado 2021Tabla de Contenidos: “…Do Give LinkedIn Messages Equal Importance -- Don't Spam -- Do Make New Connections -- Do Cross-Promote -- Do Add Value to the Process -- Don't Confuse Quantity with Quality -- Chapter 21 Ten LinkedIn Resources -- The Official LinkedIn Blog -- LinkedIn Integrations with Zapier -- LinkedIn Marketing Solutions -- LinkedIn YouTube Channel -- Linked Intelligence -- LinkedIn Speaker Series Podcast -- LinkedIn Plugins -- Social Media Examiner -- TextExpander -- Buffer -- Index -- EULA…”
Libro electrónico -
6272Publicado 2018Tabla de Contenidos: “…- Birgit Fischer, Kirsten Hoyer und Stefan Höcherl -- 3 Innovative Arzneimittelversorgung - Christian Buse -- VII Pflege -- 1 Marktplätze in der Pflege - Konsolidierung und Effizienzsteigerung durch Digitalisierung - Maximilian Greschke -- 2 Pflege mit Plan - Digitalisierung entlastet Angehörige - Frank Neumann -- 3 Ein Plädoyer für ein Bewusstsein für die Qualität und Bedeutsamkeit der Sprache auch im Prozess der Digitalisierung in der Pflege - Britta March -- 4 Lean Nursing - Effiziente Pflege auf digitalen Workflows - Heiko Mania -- VIII Dienstleistung und Medizintechnik -- 1 Crossing the paper chasm: Warum Digitalisierung den Point of Care erreichen muss - oder nicht stattfindet - Holger Cordes -- 2 Vom Stethoskop zur Blockchain - Technologische Disruption im Gesundheitswesen - Sebastian Krolop -- 3 Technik, bis der Arzt kommt? …”
Libro electrónico -
6273Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents -- Foreword -- Introduction -- Why Web Development Requires Polyglot Developers -- The Right Tool for the Job -- Cross Pollination -- Growing Your Comfort Zone -- Who This Book is for -- What This Book Covers -- How This Book is Structured -- What you Need to use This Book -- Conventions -- Source Code -- Errata -- Chapter 1: What's New in ASP.NET Core MVC -- Getting the Names Right -- ASP.NET Core -- .NET Core -- Visual Studio Code -- Visual Studio 2017 -- Versions Covered in this Book -- A Brief History of the Microsoft .NET Web Stack -- ASP.NET Web Forms -- ASP.NET MVC -- ASP.NET Web API -- OWIN and Katana -- The Emergence of ASP.NET Core and .NET Core -- .NET Core -- Getting Started with .NET Core -- The dotnet Command Line -- Introducing ASP.NET Core -- Overview of the New ASP.NET Core Web Application Project -- Owin -- OWIN Layers -- OWIN Communication Interface -- A Better Look at Middleware -- Anatomy of an ASP.NET Core Application -- Host Builder Console Application -- ASP.NET Core Startup Class -- New Fundamental Features of ASP.NET Core -- Environments -- Dependency Injection -- What Is Dependency Injection? …”
Libro electrónico -
6274Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started -- Understanding deep learning -- Perceptron -- Activation functions -- Sigmoid -- The hyperbolic tangent function -- The Rectified Linear Unit (ReLU) -- Artificial neural network (ANN) -- One-hot encoding -- Softmax -- Cross-entropy -- Dropout -- Batch normalization -- L1 and L2 regularization -- Training neural networks -- Backpropagation -- Gradient descent -- Stochastic gradient descent -- Playing with TensorFlow playground -- Convolutional neural network -- Kernel -- Max pooling -- Recurrent neural networks (RNN) -- Long short-term memory (LSTM) -- Deep learning for computer vision -- Classification -- Detection or localization and segmentation -- Similarity learning -- Image captioning -- Generative models -- Video analysis -- Development environment setup -- Hardware and Operating Systems - OS -- General Purpose - Graphics Processing Unit (GP-GPU) -- Computer Unified Device Architecture - CUDA -- CUDA Deep Neural Network - CUDNN -- Installing software packages -- Python -- Open Computer Vision - OpenCV -- The TensorFlow library -- Installing TensorFlow -- TensorFlow example to print Hello, TensorFlow -- TensorFlow example for adding two numbers -- TensorBoard -- The TensorFlow Serving tool -- The Keras library -- Summary -- Chapter 2: Image Classification -- Training the MNIST model in TensorFlow -- The MNIST datasets -- Loading the MNIST data -- Building a perceptron -- Defining placeholders for input data and targets -- Defining the variables for a fully connected layer -- Training the model with data -- Building a multilayer convolutional network -- Utilizing TensorBoard in deep learning -- Training the MNIST model in Keras -- Preparing the dataset -- Building the model…”
Libro electrónico -
6275Publicado 2017Tabla de Contenidos: “…-- What Employees Go Through -- What Managers Are Up Against -- What Managers Can Do -- Phase 2: Anxiety Surfaces -- What Employees Go Through -- What Managers Are Up against -- What Managers Can Do -- Phase 3: Turmoil, but also Glimmers of Something Better -- What Employees Go Through -- What Managers Are Up Against -- What Managers Can Do -- Chapter 16: The Human Element: Getting People Ready, Willing, and Able to Change -- Elements of a Culture-Led Change Management Program -- Align Leaders -- Communicate Changes -- Engage Stakeholders -- Train Employees -- Drive New Behaviors -- Phase 1: Diagnostic and Case for Change -- Develop the Case for Change -- Assess the Culture -- Align Leadership -- Phase 2: Detailed Design -- Prepare for the Change -- Stakeholder Engagement -- Employee Impact Assessment -- Communications and Engagement Plan -- Training Plan -- Culture Impacts and Critical Behaviors -- Phase 3: Execution -- Leadership Engagement -- Critical Few Behaviors -- Informal Leaders -- Delivering Communications -- Delivering Training -- Measuring Change Adoption -- Chapter 17: Staying Fit for Growth -- Strategic Levers: Translating Strategy into Performance -- Revise Resource Allocation to Funnel Investment to Strategic Priorities -- Adopt a Dynamic "Sense and Adjust" Planning Process -- Operational Levers: Executing Against the Plan -- Educate Employees on "Good" Costs versus "Bad" Costs -- Build a Continuous Improvement Capability -- Assign Cross-Functional Process Owners -- Organizational Levers: Assign Accountability and Reward Cost Consciousness -- Clarify Roles and Decision Rights to Reinforce Cost Accountability -- Motivate Performance, Not Politics -- Cultural Levers: Unleashing the Individual…”
Libro electrónico -
6276Publicado 2017Tabla de Contenidos: “…-- Organization of This Book -- Acknowledgments -- A Final Note -- Chapter 1: C# Crash Course -- Choosing an IDE -- A Simple Example -- Introducing Classes and Interfaces -- Creating a Class -- Creating an Interface -- Subclassing from an Abstract Class and Implementing an Interface -- Tying Everything Together with the Main() Method -- Running the Main() Method -- Anonymous Methods -- Assigning a Delegate to a Method -- Updating the Firefighter Class -- Creating Optional Arguments -- Updating the Main() Method -- Running the Updated Main() Method -- Integrating with Native Libraries -- Conclusion -- Chapter 2: Fuzzing and Exploiting XSS and SQL Injection -- Setting Up the Virtual Machine -- Adding a Host-Only Virtual Network -- Creating the Virtual Machine -- Booting the Virtual Machine from the BadStore ISO -- SQL Injections -- Cross-Site Scripting -- Fuzzing GET Requests with a Mutational Fuzzer -- Tainting the Parameters and Testing for Vulnerabilities -- Building the HTTP Requests -- Testing the Fuzzing Code -- Fuzzing POST Requests -- Writing a POST Request Fuzzer -- The Fuzzing Begins -- Fuzzing Parameters -- Fuzzing JSON -- Setting Up the Vulnerable Appliance -- Capturing a Vulnerable JSON Request -- Creating the JSON Fuzzer -- Testing the JSON Fuzzer -- Exploiting SQL Injections -- Performing a UNION-Based Exploit by Hand -- Performing a UNION-Based Exploit Programmatically -- Exploiting Boolean-Blind SQL Vulnerabilities -- Conclusion -- Chapter 3: Fuzzing SOAP Endpoints -- Setting Up the Vulnerable Endpoint -- Parsing the WSDL -- Creating a Class for the WSDL Document -- Writing the Initial Parsing Methods -- Writing a Class for the SOAP Type and Parameters…”
Libro electrónico -
6277Publicado 2019Tabla de Contenidos: “…Programming and Documentation Conventions -- Naming and Capitalization Conventions -- Practical Naming -- Java Documentation Comments -- Structure of a Doc Comment -- Doc-Comment Tags -- Inline Doc-Comment Tags -- Cross-References in Doc Comments -- Doc Comments for Packages -- Doclets -- Conventions for Portable Programs -- Chapter 8. …”
Libro electrónico -
6278Publicado 2019Tabla de Contenidos: “…Chapter 23 Hydropower Flexibility for Power Systems with Variable Renewable Energy Sources: An IEA Task 25 Collaboration -- INTRODUCTION -- HYDROPOWER FLEXIBILITY -- PRACTICAL EXPERIENCE IN USING HYDRO FLEXIBILITY FOR INTEGRATION OF VARIABLE GENERATION -- STUDYING POSSIBILITIES OF HYDROPOWER IN WIND INTEGRATION -- SIMULATION CHALLENGES -- CONCLUSIONS -- REFERENCES -- Chapter 24 Contribution of Bulk Energy Storage to Integrating Variable Renewable Energies in Future European Electricity Systems -- INTRODUCTION -- ANALYSIS OF THE EUROPEAN ELECTRICITY MARKET REGIONS -- SETUP AND INPUT DATA -- RESULTS FOR THE CENTRAL WESTERN EUROPE REGION -- RESULTS FOR THE IBERIAN PENINSULA -- ROLE OF CROSS‐BORDER TRANSMISSION GRID EXPANSION AND EXTREME WEATHER EVENTS IN THE EUROPEAN ELECTRICITY MARKET REGIONS -- SUMMARY AND CONCLUSIONS -- REFERENCES -- FURTHER READING -- Chapter 25 Characterization of Demand Response in the Commercial, Industrial, and Residential Sectors in the United States -- OVERVIEW OF DEMAND RESPONSE IN THE UNITED STATES -- END USES CONSIDERED FOR DR -- DR ATTRIBUTES -- CONCLUSION -- ACKNOWLEDGMENTS -- REFERENCES -- FURTHER READING -- Chapter 26 Simplified Analysis of Balancing Challenges in Sustainable and Smart Energy Systems with 100% Renewable Power Supply -- INTRODUCTION -- KEEPING THE CONTINUOUS SHORT‐TERM POWER BALANCE -- LEVEL 1 ANALYSIS: MAXIMAL SHARE OF VARIABLE RENEWABLE -- LEVEL 2 ANALYSIS: TRANSITION DIAGRAMS -- LEVEL 3 ANALYSIS: TIME SERIES ANALYSIS -- CONCLUSIONS -- REFERENCES -- Part IV Changing Electricity Markets -- Chapter 27 Who Gains from Hourly Time-of-Use Retail Prices on Electricity? …”
Libro electrónico -
6279por Sandström, RolfTabla de Contenidos: “…Intro -- Preface -- Contents -- 1 The Role of Fundamental Modeling -- 1.1 Background -- 1.2 Description -- 1.3 Objectives -- 1.4 Layout -- 1.5 Supplementary Material -- References -- 2 Stationary Creep -- 2.1 The Creep Process -- 2.2 Empirical Models of Secondary Creep -- 2.3 Dislocation Model -- 2.3.1 Work Hardening -- 2.3.2 Dynamic Recovery -- 2.3.3 Static Recovery -- 2.3.4 Accumulated Dislocation Model -- 2.4 The cL Parameter -- 2.5 Secondary Creep Rate -- 2.6 Dislocation Mobility -- 2.6.1 Climb Mobility -- 2.6.2 The Glide Mobility -- 2.6.3 Cross-Slip Mobility -- 2.6.4 The Climb Glide Mobility -- 2.7 Application to Aluminum -- 2.8 Application to Nickel -- 2.9 Summary -- References -- 3 Stress Strain Curves -- 3.1 General -- 3.2 Empirical Methods to Describe Stress Strain Curves -- 3.3 Basic Model -- 3.3.1 The Model -- 3.3.2 Application to Parent Metal -- 3.3.3 Application to Welds -- 3.4 The ω Parameter in Dynamic Recovery -- 3.5 Summary -- References -- 4 Primary Creep -- 4.1 General -- 4.2 Empirical Models for Creep Strain Curves -- 4.3 Dislocation Controlled Primary Creep -- 4.4 Stress Adaptation -- 4.4.1 Model -- 4.4.2 Numerical Integration -- 4.4.3 Applications -- 4.5 12% Cr Steels -- 4.5.1 Dislocation Model -- 4.5.2 Simulated Creep Curves -- 4.6 Summary -- References -- 5 Creep with Low Stress Exponents -- 5.1 General -- 5.2 Model for Diffusional Creep -- 5.3 Grain Boundary Creep -- 5.4 Constrained Grain Boundary Creep -- 5.5 Primary Creep at Low Stresses -- 5.6 Creep at Low Stresses in an Austenitic Stainless Steel -- 5.7 Creep in Aluminium at Very Low Stresses (Harper-Dorn Creep) -- 5.8 Creep in Copper at Low Stresses -- 5.8.1 Creep of Cu-OFP at 600 °C -- 5.8.2 Creep of Copper at 820 °C -- 5.8.3 Creep of Copper at 480 °C -- 5.9 Summary -- References -- 6 Solid Solution Hardening -- 6.1 General -- 6.2 The Classical Picture…”
Publicado 2024
Libro electrónico -
6280Publicado 2025Tabla de Contenidos: “…3.4 Utilizations of Data Science to CR-IoV -- 3.5 Machine Learning in Conjunction with Data Science for CR-IoV -- 3.6 Patterns Identification from CR-IoV Data using Data Science and Machine Learning -- 3.7 Conclusion -- References -- Section 4 Data Science Applications -- 4 Minimized Channel Switching and Routing Protocol for Cognitive Radio-Based Internet of Vehicles -- 4.1 Introduction -- 4.1.1 Cognitive Radio Architecture -- 4.1.2 Cognitive Radio in the IoV -- 4.1.3 Channel Assignment in Cognitive Radio -- 4.2 Literature Review -- 4.3 Problem Statement -- 4.4 Research Questions -- 4.5 Proposed MCSR -- 4.5.1 Channel Assignment Algorithm -- 4.5.2 Case Study -- 4.6 Performance Evaluation -- 4.6.1 Simulation Environment -- 4.6.2 Results and Discussion -- 4.6.3 Conclusion and Future Work -- References -- 5 Time Synchronization in Cognitive Radio-Based Internet of Vehicles -- 5.1 Time Synchronization and Its Importance -- 5.2 Fundamentals -- 5.2.1 Clocks -- 5.2.2 Physical/Hardware Clocks -- 5.2.3 Logical/Software Clocks -- 5.2.4 Imperfections of Clocks -- 5.2.5 Synchronized Clocks -- 5.2.6 Clock Adjustments -- 5.3 Synchronization Concerns -- 5.3.1 Global Time Access -- 5.3.2 Limitations -- 5.3.3 Critical Metrics -- 5.3.4 Basic Principles -- 5.3.5 Challenges -- 5.3.6 Various Types -- 5.4 Approaches to Time Synchronization in Wired Media -- 5.5 Approaches to Time Synchronization in Wireless Media and the CR-IoV -- 5.5.1 Protocols -- 5.5.2 Significance in the CR-IoV -- 5.5.3 Requirement Analysis for Time Synchronization in the CR-IoV -- 5.6 Advances towards CR-IoV Time Synchronization -- 5.6.1 Timing Synchronization Function-Based Synchronization in the CR-IoV -- 5.6.2 Global Navigation Satellite System-Based Synchronization in the CR-IoV -- 5.6.3 Single Timestamp-Based Cross-Layer Synchronization in the CR-IoV…”
Libro electrónico