Mostrando 27,621 - 27,640 Resultados de 32,516 Para Buscar '"Oriente"', tiempo de consulta: 0.13s Limitar resultados
  1. 27621
    Publicado 2021
    Tabla de Contenidos: “…Vers la reconnaissance d'un faciès oriental du Blicquy/Villeneuve-Saint-Germain -- 3.2. …”
    Libro electrónico
  2. 27622
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- 1 Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions -- 1.1 Introduction -- 1.2 Blockchain Preliminaries -- 1.2.1 Functioning of Blockchain -- 1.2.2 Design of Blockchain -- 1.2.3 Blockchain Elements -- 1.3 Key Technologies of Blockchain -- 1.3.1 Distributed Ledger -- 1.3.2 Cryptography -- 1.3.3 Consensus -- 1.3.4 Smart Contracts -- 1.3.5 Benchmarks -- 1.4 Consensus Algorithms of Blockchain -- 1.4.1 Proof of Work (PoW) -- 1.4.2 Proof of Stake (PoS) -- 1.4.3 BFT-Based Consensus Algorithms -- 1.4.4 Practical Byzantine Fault Tolerance (PBFT) -- 1.4.5 Sleepy Consensus -- 1.4.6 Proof of Elapsed Time (PoET) -- 1.4.7 Proof of Authority (PoA) -- 1.4.8 Proof of Reputation (PoR) -- 1.4.9 Deputized Proof of Stake (DPoS) -- 1.4.10 SCP Design -- 1.5 Internet of Things and Blockchain -- 1.5.1 Internet of Things -- 1.5.2 IoT Blockchain -- 1.5.3 Up-to-Date Tendency in IoT Blockchain Progress -- 1.6 Applications of Blockchain in Smart City -- 1.6.1 Digital Identity -- 1.6.2 Security of Private Information -- 1.6.3 Data Storing, Energy Ingesting, Hybrid Development -- 1.6.4 Citizens Plus Government Frame -- 1.6.5 Vehicle-Oriented Blockchain Appliances in Smart Cities -- 1.6.6 Financial Applications -- 1.7 Security and Privacy Properties of Blockchain -- 1.7.1 Security and Privacy Necessities of Online Business Transaction -- 1.7.2 Secrecy of Connections and Data Privacy -- 1.8 Privacy and Security Practices Employed in Blockchain -- 1.8.1 Mixing -- 1.8.2 Anonymous Signatures -- 1.8.3 Homomorphic Encryption (HE) -- 1.8.4 Attribute-Based Encryption (ABE) -- 1.8.5 Secure Multi-Party Computation (MPC) -- 1.8.6 Non-Interactive Zero-Knowledge (NIZK)…”
    Libro electrónico
  3. 27623
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 A Look at IIoT: The Perspective of IoT Technology Applied in the Industrial Field -- 1.1 Introduction -- 1.2 Relationship Between Artificial Intelligence and IoT -- 1.2.1 AI Concept -- 1.2.2 IoT Concept -- 1.3 IoT Ecosystem -- 1.3.1 Industry 4.0 Concept -- 1.3.2 Industrial Internet of Things -- 1.4 Discussion -- 1.5 Trends -- 1.6 Conclusions -- References -- 2 Analysis on Security in IoT Devices- An Overview -- 2.1 Introduction -- 2.2 Security Properties -- 2.3 Security Challenges of IoT -- 2.3.1 Classification of Security Levels -- 2.3.1.1 At Information Level -- 2.3.1.2 At Access Level -- 2.3.1.3 At Functional Level -- 2.3.2 Classification of IoT Layered Architecture -- 2.3.2.1 Edge Layer -- 2.3.2.2 Access Layer -- 2.3.2.3 Application Layer -- 2.4 IoT Security Threats -- 2.4.1 Physical Device Threats -- 2.4.1.1 Device-Threats -- 2.4.1.2 Resource Led Constraints -- 2.4.2 Network-Oriented Communication Assaults -- 2.4.2.1 Structure -- 2.4.2.2 Protocol -- 2.4.3 Data-Based Threats -- 2.4.3.1 Confidentiality -- 2.4.3.2 Availability -- 2.4.3.3 Integrity -- 2.5 Assaults in IoT Devices -- 2.5.1 Devices of IoT -- 2.5.2 Gateways and Networking Devices -- 2.5.3 Cloud Servers and Control Devices -- 2.6 Security Analysis of IoT Platforms -- 2.6.1 ARTIK -- 2.6.2 GiGA IoT Makers -- 2.6.3 AWS IoT -- 2.6.4 Azure IoT -- 2.6.5 Google Cloud IoT (GC IoT) -- 2.7 Future Research Approaches -- 2.7.1 Blockchain Technology -- 2.7.2 5G Technology -- 2.7.3 Fog Computing (FC) and Edge Computing (EC) -- References -- 3 Smart Automation, Smart Energy, and Grid Management Challenges -- 3.1 Introduction -- 3.2 Internet of Things and Smart Grids -- 3.2.1 Smart Grid in IoT -- 3.2.2 IoT Application -- 3.2.3 Trials and Imminent Investigation Guidelines…”
    Libro electrónico
  4. 27624
    Publicado 2022
    Tabla de Contenidos: “…3.3 Extended Defects in Homoepitaxial Layers -- 3.3.1 Classification of Extended Defects According to Glide Systems in 4H‐SiC -- 3.3.2 Dislocation Reactions During Epitaxial Growth -- 3.3.3 Characterization Methods for Extended Defects in 4H‐SiC Epilayers -- 3.4 Point Defects and Carrier Lifetime in Epilayers -- 3.4.1 Classification and General Properties of Point Defects in 4H‐SiC -- 3.4.2 Basics on Recombination Carrier Lifetime in 4H‐SiC -- 3.4.3 Carrier Lifetime‐Affecting Point Defects -- 3.4.4 Carrier Lifetime Measurement in Epiwafers and Devices -- 3.5 Conclusion -- Acknowledgments -- References -- Chapter 4 Industrial Perspective of SiC Epitaxy -- 4.1 Introduction -- 4.2 Background -- 4.3 The Basics of SiC Epitaxy -- 4.4 SiC Epi Historical Origins -- 4.5 Planetary Multi‐wafer Epitaxial Reactor Design Considerations -- 4.5.1 Rapidly Rotating Reactors -- 4.5.2 Horizontal Hot‐Wall Reactors -- 4.6 Latest High‐Throughput Epitaxial Reactor Status -- 4.7 Benefits and Challenges for Increasing Growth Rate in all Reactors -- 4.8 Increasing Wafer Diameters, Device Processing Considerations, and Projections -- 4.9 Summary -- Acknowledgment -- References -- Chapter 5 Status of 3C‐SiC Growth and Device Technology -- 5.1 Introduction, Motivation, Short Review on 3C‐SiC -- 5.2 Nucleation and Epitaxial Growth of 3C‐SC on Si -- 5.2.1 Growth Process -- 5.2.2 Defects -- 5.2.3 Stress -- 5.3 Bulk Growth of 3C‐SiC -- 5.3.1 Sublimation Growth of (111)‐oriented 3C‐SiC on Hexagonal SiC Substrates -- 5.3.2 Sublimation Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.3.3 Continuous Fast CVD Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.4 Processing and Testing of 3C‐SiC Based Power Electronic Devices -- 5.4.1 Prospects for 3C‐SiC Power Electronic Devices -- 5.4.2 3C‐SiC Device Processing -- 5.4.3 MOS Processing -- 5.4.4 3C‐SiC/SiO2 Interface Passivation…”
    Libro electrónico
  5. 27625
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright Page -- Contents -- Foreword 25 -- Preface 27 -- Before You Begin 47 -- 1 Introduction to Computers, the Internet and Java 53 -- 1.1 Introduction 54 -- 1.2 Hardware and Software 56 -- 1.2.1 Moore's Law 56 -- 1.2.2 Computer Organization 57 -- 1.3 Data Hierarchy 59 -- 1.4 Machine Languages, Assembly Languages and High-Level Languages 61 -- 1.5 Introduction to Object Technology 62 -- 1.5.1 Automobile as an Object 63 -- 1.5.2 Methods and Classes 63 -- 1.5.3 Instantiation 63 -- 1.5.4 Reuse 63 -- 1.5.5 Messages and Methopd Calls 64 -- 1.5.6 Attributes and Instance Variables 64 -- 1.5.7 Encapsulation and Information Hiding 64 -- 1.5.8 Inheritance 64 -- 1.5.9 Interfaces 65 -- 1.5.10 Object-Oriented Analysis and Design (OOAD) 65 -- 1.5.11 The UML (Unified Modeling Language) 65 -- 1.6 Operating Systems 66 -- 1.6.1 Windows-A Proprietary Operating System 66 -- 1.6.2 Linux-An Open-Source Operating System 66 -- 1.6.3 Apple's macOS and Apple's iOS for iPhone®, iPad® 67 -- 1.6.4 Google's Android 67 -- 1.7 Programming Languages 68 -- 1.8 Java 70 -- 1.9 A Typical Java Development Environment 71 -- 1.10 Test-Driving a Java Application 74 -- 1.11 Internet and World Wide Web 78 -- 1.11.1 Internet: A Network of Networks 79 -- 1.11.2 World Wide Web: Making the Internet User-Friendly 79 -- 1.11.3 Web Services and Mashups 79 -- 1.11.4 Internet of Things 80 -- 1.12 Software Technologies 81 -- 1.13 Getting Your Questions Answered 83 -- 2 Introduction to Java Applications -- Input/Output and Operators 87 -- 2.1 Introduction 88 -- 2.2 Your First Program in Java: Printing a Line of Text 88 -- 2.2.1 Compiling the Application 92 -- 2.2.2 Executing the Application 93 -- 2.3 Modifying Your First Java Program 94 -- 2.4 Displaying Text with printf 96 -- 2.5 Another Application: Adding Integers 97 -- 2.5.1 import Declarations 98.…”
    Libro electrónico
  6. 27626
    por Kamthane, Ashok N.
    Publicado 2011
    Tabla de Contenidos: “…7.2.3 Pseudocode -- Summary -- Exercises -- Chapter 8: Overview of C++ -- 8.1 Introduction -- 8.2 ANSI Standard -- 8.3 Object-oriented Technology -- 8.4 Disadvantages of Conventional Programming -- 8.5 Programming Paradigms -- 8.5.1 Monolithic Programming -- 8.5.2 Procedural Programming -- 8.5.3 Structured Programming Approach -- 8.6 Basic Concepts of C++ -- 8.7 Structure of C++ Program -- 8.7.1 Include Files Section -- 8.7.2 Class Declaration or Definition -- 8.7.3 Class Function Definitions -- 8.7.4 The main() Function -- 8.8 Creating Source File, Compiling and Linking in C++ -- 8.9 IDE and its Features -- 8.10 Character Set in C++ -- 8.11 Types of Tokens -- 8.12 Keywords -- 8.13 Identifiers -- 8.13.1 Variable Declaration and Initialization -- 8.14 Dynamic Initialization -- 8.15 Data Types in C++ -- 8.16 Basic Data Type -- 8.17 Derived Data Type -- 8.17.1 Pointers -- 8.17.2 Functions -- 8.17.3 Arrays -- 8.17.4 References -- 8.18 User-defined Data Type -- 8.18.1 Structure and Classes -- 8.18.2 Union -- 8.18.3 Enumerated Data Type -- 8.19 The void Data Type -- 8.20 Type Modifiers -- 8.21 Wrapping Around -- 8.22 Constants -- 8.22.1 Literal Constant -- 8.22.2 Symbolic Constant -- 8.23 Constant Pointers -- 8.23.1 Constant Pointer -- 8.23.2 Pointer to Constant -- 8.23.3 Pointer and Variable both Constants -- Summary -- Exercises -- Chapter 9: Operators and Expressions -- 9.1 Introduction -- 9.2 Precedence of Operators in C++ -- 9.3 Expressions and their Evaluation -- 9.4 Referencing (&amp -- ) and Dereferencing (*) Operators -- 9.5 Scope Access Operator -- 9.6 Memory Management Operators -- 9.7 Comma Operator -- 9.8 Comma in Place of Curly Braces -- 9.9 Type Conversion -- 9.9.1 Implicit Type Conversion -- 9.9.2 Explicit Type Conversion -- Summary -- Exercises -- Chapter 10: Input and Output in C++ -- 10.1 Introduction -- 10.2 Streams in C++…”
    Libro electrónico
  7. 27627
    Publicado 2006
    “…This journal aims to advance the systematic and rigorous study of international relations while including historical studies and policy-oriented research. Most of its articles are either related to China or have implication for Chinese foreign policy…”
    Revista digital
  8. 27628
    Publicado 2024
    “…This volume examines a multitude of characters in Matthew's gospel and provides an in-depth look at the different approaches currently employed by scholars working with literary and reader-oriented methods. Beginning with an introduction on 'the properties of character' and the several aspects involved in the creation of person, the contributors provide a close reading of numerous characters and character types in the Gospel of Matthew. …”
    Libro
  9. 27629
    Publicado 2020
    “…Results revealed that LGBTI employees reported experiencing greater discrimination in the workplace because of their sexual orientation, which in turn led to a greater incidence of work stress, mental disorders, and depression. …”
    Enlace del recurso
    Artículo digital
  10. 27630
    Publicado 2009
    “…While it is clear that given the rapid change of work, job-specific training for adults is clearly vital the world over, it is argued here that job-specific training needs re-orientation to include life-specific learning as well. …”
    Libro electrónico
  11. 27631
    Publicado 2013
    “…It delivers insights into practical approaches of developing STI policy measures oriented towards future societal and technological challenges based on evidence drawn from comparable policy measures worldwide. …”
    Libro electrónico
  12. 27632
    Publicado 1972
    “…Évolution et problèmes à moyen terme -Orientation et forme de la politique économique -Réalisations économiques -Problèmes de politique conjoncturelle -La balance des paiements et l'affectation des ressources II. …”
    Libro electrónico
  13. 27633
    Publicado 2001
    “…PostgreSQL Developer¿s Handbook provides a complete overview of the PostgreSQL database server and extensive coverage of its core features, including object orientation, PL/pgSQL, and the most important programming interfaces. …”
    Libro electrónico
  14. 27634
    Publicado 2021
    “…Readership: All interested in tangible heritage in Cairo and Damascus, visual Orientalism (including photography), Islamic art collecting, and anyone concerned with commodification and intercultural contact zones…”
    Libro electrónico
  15. 27635
    Publicado 1966
    Libro
  16. 27636
    Publicado 1965
    Seriadas
  17. 27637
    por Špidlík, Tomáš
    Publicado 1956
    Tesis
  18. 27638
    Publicado 1954
    Libro
  19. 27639
    Conectar con la versión electrónica
    Seriadas
  20. 27640
    Publicado 1996
    Libro