Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 114
- Po 80
- Biografa 70
- Literatura cristiana oriental 54
- Patrística oriental 49
- Colecciones 45
- Història 42
- History 36
- Informática 32
- Catecismos 27
- Església Catòlica 26
- Procedimiento penal 22
- Development 21
- Filosofía 21
- Humanidades 21
- Application software 18
- Crtica e interpretaciðn 17
- Espiritualidad 17
- Política y gobierno 17
- Politics and government 16
- Obres anteriors al 1800 14
- Electronic data processing 13
- Meditaciones 13
- Python (Computer program language) 13
- Culto 12
- Design 12
- Lengua rusa 12
- Política 12
- Blockchains (Databases) 11
- Computer networks 11
-
3301por Iglesia católica
Publicado 1791Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Central de Capuchinos de España, Biblioteca de la Universidad de Navarra, Biblioteca Diocesana Bilbao, Biblioteca Seminario Metropolitano de Oviedo, Red de bibliotecas Iglesia Navarra)Libro -
3302por Hernández Andreu, JuanTabla de Contenidos: “…KEYNES Y EL MERCANTILISMO -- AQUEL FUNDAMENTO FILOSÓFICO Y DE MÉTODO LO ROMPIÓ ADAM SMITH AL INTRODUCIR UNA APROXIMACIÓN ONTOLÓGICA EN SU TEORÍA DE LA DISTRI -- ASÍ SEÑALA KEYNES: -- LOS MERCANTILISTAS SE DIERON CUENTA DE QUE EL TIPO DE IN-TERÉS DEPENDÍA DE LA PREFERENCIA POR LA LIQUIDEZ Y DE LA CANTIDAD DE DI -- LOS MERCANTILISTAS ADVIRTIERON EL PELIGRO DE QUE UNA COM-PETENCIA EXCESIVA PUDIERA HACER QUE LA RELACIÓN DE INTER-CAMBIO SE VOLV -- ASIMISMO, SE DIERON CUENTA DE QUE SU POLÍTICA LIBERABA AL PAÍS DE UN INDESEADO SOBRANTE DE MERCANCÍAS, EN EL QUE, SEGÚN SE CREÍA -- SE EQUIVOCAN QUIENES ATRIBUYEN A LOS MERCANTILISTAS UNA FILOSOFÍA NACIONALISTA Y PROPICIA A PROMOVER LA GUERRA -- EN -- CAMBIO PODEMOS CRITICAR A QUIENES ACEPTABAN CON INDIFE-RENCIA EL SISTEMA MONETARIO INTERNACIONAL VIGENTE DU-RANTE EL PERIODO COM -- EN MA-TERIA DE CRÉDITO INTERNACIONAL, COMO POLÍTICA QUE MEJOR PROMOVÍA LA PAZ -- POR EL CONTRARIO EN EL MERCANTILISMO EN-CONTRAMOS -- TAL COMO ESTÁN LOS HORIZONTES AL RESPECTO, AÚN CON EL GIRO PO-LÍTICO QUE SUPONE EL PLAN DEL CONSEJO EUROPEO DE 21 DE JULIO DE 20 -- EN KEYNES EL OBJETIVO ES EL EMPLEO Y LA RENTA, CUYO CRECIMIENTO SE HA DE OBTENER DEL LADO DE LA DEMANDA DE INVERSIÓN Y DE LA INN…”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3303Publicado 2016Tabla de Contenidos: “…Adding UARTs to the RPi -- Summary -- Chapter 10 Interacting with the Physical Environment -- Interfacing to Actuators -- DC Motors -- Stepper Motors -- Relays -- Interfacing to Analog Sensors -- Linear Analog Sensors -- Nonlinear Analog Sensors -- Analog Sensor Signal Conditioning -- Interfacing to an Analog Accelerometer -- Interfacing to Local Displays -- MAX7219 Display Modules -- Character LCD Modules -- OLED Dot-Matrix Display -- Building C/C++ Libraries -- Makefiles -- CMake -- Summary -- Chapter 11 Real-Time Interfacing Using the Arduino -- The Arduino -- An Arduino Serial Slave -- A UART Echo Test Example -- UART Command Control of an Arduino -- An Arduino I2C Slave -- An I2C Test Circuit -- I2C Register Echo Example -- I2C Temperature Sensor Example -- I2C Temperature Sensor with a Warning LED -- Arduino Slave Communication Using C/C++ -- An I2C Ultrasonic Sensor Application -- An Arduino SPI Slave -- Programming the Arduino from the RPi Command Line -- Summary -- Part III Advanced Interfacing and Interaction -- Chapter 12 The Internet of Things -- The Internet of Things (IoT) -- The RPi as an IoT Sensor -- The RPi as a Sensor Web Server -- Nginx -- GNU Cgicc Applications (Advanced) -- A C/C++ Web Client -- Network Communications Primer -- A C/C++ Web Client -- Secure Communication Using OpenSSL -- The RPi as a "Thing" -- ThingSpeak -- The Linux Cron Scheduler -- Sending E-mail from the RPi -- If This Then That (IFTTT) -- Large-Scale IoT Frameworks -- MQ Telemetry Transport (MQTT) -- IBM Bluemix Internet of Things -- An IBM IoT MQTT Node.js Publish Example -- An IBM IoT MQTT C++ Publish Example -- Visualize Data Using IBM Quickstart -- The C++ Client/Server -- IoT Device Management -- Remote Monitoring of the RPi -- RPi Watchdog Timers -- Static IP Addresses -- Power over Ethernet (PoE) -- Summary…”
Libro electrónico -
3304Publicado 2011Tabla de Contenidos: “…14.1 Introduction 409 -- 14.2 Standardization 412 -- 14.3 Frequency Bands 415 -- 14.4 Architecture 417 -- 14.5 Wireless Message Flow and Protocol Stack 424 -- 14.6 Wireline Message Flow and Protocol Stacks 433 -- 14.7 Identifiers 434 -- 14.8 HARQ Procedure 435 -- 14.9 Scrambling Sequences 439 -- 14.10 Physical Layer (PHY) 439 -- 14.11 PHY Structure 444 -- 14.12 PHY TDD 457 -- 14.13 Multimedia Broadcast/Multicast Service (MBMS) 457 -- 14.14 Call Placement Scenario 461 -- 14.15 PHY Characteristics and Performance 463 -- 14.16 Multiple Antennas in LTE 466 -- 14.17 Resource Planning in LTE 472 -- 14.18 Self-Organizing Network (SON) 473 -- 14.19 RAT (Radio Access Technology) Internetworking 475 -- 14.20 LTE Radio Propagation Channel Considerations 475 -- 14.21 Handover Procedures in LTE 481 -- 14.22 Measurements 482 -- 14.23 LTE Practical System Capacity 483 -- 14.24 Synchronization 486 -- 14.25 Beyond 4G 486 -- 15 Broadband Standards Comparison 489 -- 15.1 Introduction 489 -- 15.2 Performance Tables 489 -- 16 Wireless Network Design 513 -- 16.1 Introduction 513 -- 16.2 Wireless Market Modeling 513 -- 16.3 Wireless Network Strategy 515 -- 16.4 Wireless Network Design 516 -- 16.5 Wireless Network Optimization 517 -- 16.6 Wireless Network Performance Assessment 517 -- 17 Wireless Market Modeling 519 -- 17.1 Findings Phase 519 -- 17.2 Area of Interest (AoI) Modeling 519 -- 17.3 Terrain Databases (GIS Geographic Information System) 519 -- 17.4 Demographic Databases 530 -- 17.5 Service Modeling 533 -- 17.6 Environment Modeling 536 -- 17.7 User Terminal Modeling 537 -- 17.8 Service Class Modeling 538 -- 17.9 User Distribution Modeling 542 -- 17.10 Traffic Distribution Modeling 551 -- 18 Wireless Network Strategy 553 -- 18.1 Define Spectrum Usage Strategy 553 -- 18.2 Deployment Strategy 555 -- 18.3 Core Equipment 555 -- 18.4 Base Station Equipment 555 -- 18.5 Customer Premises Equipment (CPE) 563 -- 18.6 Link Budget 565 -- 18.7 Backhaul Equipment 565 -- 18.8 Land Line Access Points of Presence (PoP) 570.…”
Libro electrónico -
3305Publicado 2022Tabla de Contenidos: “…UDP -- Exam essentials -- 2.2 Compare and contrast common networking hardware -- Routers -- Switches -- Access points -- Patch panel -- Firewall -- Power over Ethernet (PoE) -- Hub -- Cable modem -- Digital subscriber line (DSL) -- Optical network terminal (ONT) -- Network interface card (NIC) -- Software-defined networking (SDN) -- Exam essentials -- 2.3 Compare and contrast protocols for wireless networking -- Frequencies -- Channels -- Bluetooth -- 802.11 -- Long-range fixed wireless -- NFC -- Radio-frequency identification (RFID)…”
Libro electrónico -
3306Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: NLP Basics -- Chapter 1: Introduction to NLP -- Introduction to natural language processing -- NLU + NLG = NLP -- NLU -- NLG -- Gensim and its NLP modeling techniques -- BoW and TF-IDF -- LSA/LSI -- Word2Vec -- Doc2Vec -- LDA -- Ensemble LDA -- Topic modeling with BERTopic -- Common NLP Python modules included in this book -- spaCy -- NLTK -- Summary -- Questions -- References -- Chapter 2: Text Representation -- Technical requirements -- What word embedding is -- Simple encoding methods -- One-hot encoding -- BoW -- Bag-of-N-grams -- What TF-IDF is -- Shining applications of BoW and TF-IDF -- Coding - BoW -- Gensim for BoW -- scikit-learn for BoW (CountVectorizer) -- Coding - Bag-of-N-grams -- Gensim for N-grams -- scikit-learn for N-grams -- NLTK for N-grams -- Coding - TF-IDF -- Gensim for TF-IDF -- scikit-learn for TF-IDF -- Summary -- Questions -- References -- Chapter 3: Text Wrangling and Preprocessing -- Technical requirements -- Key steps in NLP preprocessing -- Tokenization -- Lowercase conversion -- Stop word removal -- Punctuation removal -- Stemming -- Lemmatization -- Coding with spaCy -- spaCy for lemmatization -- spaCy for PoS -- Coding with NLTK -- NLTK for tokenization -- NLTK for stop-word removal -- NLTK for lemmatization -- Coding with Gensim -- Gensim for preprocessing -- Gensim for stop-word removal -- Gensim for stemming -- Building a pipeline with spaCy -- Summary -- Questions -- References -- Part 2: Latent Semantic Analysis/Latent Semantic Indexing -- Chapter 4: Latent Semantic Analysis with scikit-learn -- Technical requirements -- Understanding matrix operations -- An orthogonal matrix -- The determinant of a matrix -- Understanding a transformation matrix -- A transformation matrix in daily life examples…”
Libro electrónico -
3307
-
3308
-
3309
-
3310
-
3311por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Quelques interrogations touchant la forme des gouvernements de demain -- Le gouvernement du savoir -- De l'État-nation à l'État des nations -- Démocratie et instantanéité -- Les personnes et les valeurs comptent dans la recherche d'une bonne gouvernance -- Opportunité, stratégie et tactique pour la réforme de la gestion publique -- Les voies que l'on n'emprunte plus -- La réforme moderne se veut plus globale que fragmentaire -- La réforme moderne ne se limite pas à tel ou tel processus administratif -- La réforme contem po raine est plus soucieuse de déléguer que de concen trer l'autorité de gestion -- La réforme moderne se fie aux incitations plutôt qu'aux règles formelles pour modifier... -- La réforme moderne est centrée sur les opérations et sur la prestation de services -- Opportunité -- Choix du moment opportun -- Gouvernement -- Idées -- Personnalités novatrices -- Crises -- Stratégie -- La stratégie de marché -- La stratégie managériale -- Stratégie axée sur les politiques publiques -- La stratégie « progressive » -- Tactique -- Les voies du futur -- Retour à une gestion publique fondée sur le contrô le et la conformité -- Amélioration permanente -- Le bon dosage des stratégies de réformes -- Le rôle des services centraux -- Renforcer la responsabilité et la redevabilité -- La génération suivante -- Repenser le centre : initiative, examen stratégique et cohérence dans la réforme du secteur public -- Introduction -- Consensus sur la réforme -- Des difficultés subsistent -- Malaise au centre -- Vue d'ensemble et historique -- Biais anglo-américain ? …”
Publicado 2001
Libro electrónico -
3312Publicado 2017Libro electrónico
-
3313Publicado 1781991006220169706719
-
3314
-
3315Publicado 2003Libro electrónico
-
3316Publicado 2022Tabla de Contenidos: “…Objective 18 Summarize cloud concepts and connectivity options -- Deployment Models -- Public -- Private -- Hybrid -- Community -- Service Models -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Infrastructure as Code -- Automation/Orchestration -- Connectivity Options -- Virtual Private Network (VPN) -- Private-Direct Connection to Cloud Provider -- Multitenancy -- Scalability -- 00-FMindd 15 22/04/22 11:12 AM -- xvi Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Elasticity -- Security Implications -- REVIEW -- 18 QUESTIONS -- 18 ANSWERS -- 20 Network Implementations -- Objective 21 Compare and contrast various devices, their features, -- and their appropriate placement on the network -- Networking Devices -- Layer 2 Switch -- Layer 3 Capable Switch -- Router -- Hub -- Access Point -- Bridge -- Wireless LAN Controller -- Load Balancer -- Proxy Server -- Cable Modem -- DSL Modem -- Repeater -- Voice Gateway -- Media Converter -- Firewall -- Intrusion Prevention System(IPS)/Intrusion Detection System (IDS) Device -- VPN Headend -- Networked Devices -- Voice over Internet Protocol (VoIP) Phone -- Printer -- Physical Access Control Devices -- Cameras -- Heating, Ventilation, and Air Conditioning (HVAC) Sensors -- Internet of Things (IoT) -- Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) -- REVIEW -- 21 QUESTIONS -- 21 ANSWERS -- Objective 22 Compare and contrast routing technologies -- and bandwidth management concepts -- Routing -- Dynamic Routing -- Static Routing -- 00-FMindd 16 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Default Route -- Administrative Distance -- Exterior vs Interior -- Time to Live -- Bandwidth Management -- Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23 Given a scenario, configure and deploy common -- Ethernet switching features -- Data Virtual Local Area Network (VLAN) -- Voice VLAN -- Port Configurations -- Port Tagging/8021Q -- Port Aggregation -- Duplex -- Speed -- Flow Control -- Port Mirroring -- Port Security -- Jumbo Frames -- Auto-Medium-Dependent Interface Crossover (MDI-X) -- Media Access Control (MAC) Address Tables -- Power over Ethernet (PoE)/Power over Ethernet Plus (PoE+) -- Spanning Tree Protocol -- Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) -- Address Resolution Protocol (ARP) -- Neighbor Discovery Protocol -- REVIEW -- 23 QUESTIONS -- 23 ANSWERS -- Objective 24 Given a scenario, install and configure the appropriate -- wireless standards and technologies -- 80211 Standards -- a -- b -- g -- n (Wi-Fi 4) -- ac (Wi-Fi 5) -- ax (Wi-Fi 6) -- 00-FMindd 17 22/04/22 11:12 AM -- xviii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Frequencies and Range -- 24 GHz -- 50 GHz -- Channels -- Regulatory Impacts -- Channel Bonding -- Service Set Identifier (SSID) -- Basic Service Set -- Independent Basic Service Set (Ad-hoc) -- Extended Service Set -- Roaming -- Antenna Types -- Omni -- Directional -- Encryption Standards -- Wi-Fi Protected Access (WPA)/WPA2 Personal [Advanced Encryption -- Standard (AES)/Temporal Key Integrity Protocol (TKIP)] -- WPA/WPA2 Enterprise (AES/TKIP) -- Cellular Technologies -- Global System for Mobile Communications (GSM) -- Code-Division Multiple Access (CDMA) -- Long-Term Evolution (LTE) -- 3G, 4G, 5G -- Multiple Input, Multiple Output (MIMO) and Multi-user MIMO (MU-MIMO) -- REVIEW -- 24 QUESTIONS -- 24 ANSWERS -- 30 Network Operations -- Objective 31 Given a scenario, use the appropriate statistics -- and sensors to ensure network availability -- Performance Metrics/Sensors -- Device/Chassis -- Network Metrics -- SNMP -- Management Information Bases (MIBs) -- Object Identifiers (OIDs) -- Traps -- Network Device Logs -- Log Reviews…”
Libro electrónico -
3317Publicado 2012Tabla de Contenidos: “…-- 4.7 Description of M2M Market Segments/Applications -- 4.7.1 Automotive -- 4.7.2 Smart Telemetry -- 4.7.3 Surveillance and Security -- 4.7.4 Point of Sale (PoS) -- 4.7.5 Vending Machines…”
Libro electrónico -
3318por Guerra Soto, MarioTabla de Contenidos: “…LINK AGGREGATION -- 8.5. POWER OVER ETHERNET (PoE) -- 8.6. PORT MIRRORING -- 9 CIFRADO DE LA INFORMACIÓN -- 9.1 ESTEGANOGRAFÍA -- 9.2 CRIPTOLOGÍA -- 9.3 CRIPTOGRAFÍA -- 9..4. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3319por Castro González, Javier Manuel
Publicado 2017Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3320Publicado 2016Libro electrónico