Mostrando 181,781 - 181,800 Resultados de 182,346 Para Buscar '"R$"', tiempo de consulta: 0.49s Limitar resultados
  1. 181781
    Libro electrónico
  2. 181782
    Libro electrónico
  3. 181783
    Publicado 2017
    Libro electrónico
  4. 181784
    Publicado 2016
    Tabla de Contenidos: “…5.4.1 L-H transition -- 5.4.2 Pedestal performance -- 5.4.3 Operation at trans-Greenwald density -- 5.4.4 Core transport -- 5.5 Power exhaust -- 5.5.1 Power decay length -- 5.5.2 ELM mitigation with magnetic perturbations -- 5.6 MHD modes and disruptions -- 5.6.1 NTM suppression -- 5.6.2 Disruption studies -- 5.7 Scenario development -- 5.7.1 ITER baseline operation -- 5.7.2 Type I ELMy H-Modes at highest P/R values -- 5.7.3 Scenarios at elevated central q -- 5.8 Summary and outlook -- Acknowledgements -- References -- 6 - The Tokamak Fusion Test Reactor -- 6.1 Introduction -- 6.2 TFTR design and capabilities -- 6.2.1 Magnets -- 6.2.2 Vacuum vessel, plasma-facing components, bakeout system, and other "conditioning" techniques -- 6.2.3 Heating systems -- 6.2.3.1 Neutral beam injection -- 6.2.3.2 Ion cyclotron heating -- 6.2.4 Fueling and impurity injection systems -- 6.2.5 Tritium handling, delivery, and exhaust systems -- 6.2.6 Tritium retention and removal -- 6.2.7 Shielding -- 6.2.8 Conduct of maintenance, installation, and final decommissioning -- 6.2.9 Diagnostics -- 6.3 TFTR operational regimes: requirements, characteristics and limitations -- 6.3.1 Ohmically heated plasmas -- 6.3.2 Neutral beam injection-heated plasmas -- 6.3.2.1 L-mode -- 6.3.2.2 Supershots in TFTR -- 6.3.2.3 H-mode -- 6.3.2.4 High internal inductance regime -- 6.3.2.5 Reversed shear and enhanced reversed shear -- 6.3.2.6 Detached plasmas and radiating mantles -- 6.3.3 ICRF heated -- 6.4 Main physics results from TFTR (not D-T specific) -- 6.4.1 Thermal energy and particle confinement -- 6.4.1.1 Confinement in ohmically heated plasmas -- 6.4.1.2 Confinement of plasmas with dominant auxiliary heating -- 6.4.1.3 Role of turbulent fluctuations -- 6.4.1.4 Heat pulse propagation and perturbative transport studies…”
    Libro electrónico
  5. 181785
    Publicado 2024
    “…Modeling and Optimization of Signals using Machine Learning Techniques is designed for researchers from academia, industries, and R&D organizations worldwide who are passionate about advancing machine learning methods, signal processing theory, data mining, artificial intelligence, and optimization. …”
    Libro electrónico
  6. 181786
    por Ebner, Jürgen
    Publicado 2023
    Tabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX‌ -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation‌ -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labo‌r einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinie‌n definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks‌ installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy‌ -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Service‌s (D‌oS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
    Libro electrónico
  7. 181787
  8. 181788
    Publicado 2003
    Tabla de Contenidos: “…Implementing the TotalStorage Expert in AIX -- 5.1 Preparing for the installation -- 5.1.1 Perform the following steps before starting the installation -- 5.1.2 Starting the installation program -- 5.2 AIX installation error troubleshooting -- 5.2.1 Diagnostic logfile locations -- 5.2.2 Known issues -- 5.2.3 Passwords for DB2 Universal Database and TotalStorage Expert -- 5.2.4 Verify the TotalStorage Expert V2.1 install -- 5.3 Setting up the TotalStorage Expert -- 5.3.1 Configuration Utility -- 5.4 TotalStorage Expert graphical user interfaces (GUIs) -- 5.4.1 The left pane shows a list of operations -- 5.4.2 The right pane shows the main information -- 5.5 TotalStorage Expert Configuration Utility -- 5.5.1 Basic configuration -- 5.5.2 Database setup -- 5.5.3 Define administrators -- 5.5.4 Enter License Key -- 5.5.5 Restart TotalStorage Expert -- 5.6 Migrating from IBM StorWatch V1R2 to TotalStorage Expert -- 5.6.1 Pre-migration steps -- 5.6.2 Migration process -- 5.7 SWExport and SWImport utilities -- 5.7.1 Migrating databases with SWExport and SWImport utilities -- 5.7.2 SWExport and SWImport installation requirements -- 5.7.3 SWImport on AIX -- 5.7.4 Starting and stopping the servers in AIX -- 5.7.5 Preparing for uninstalling TotalStorage Expert V2.1…”
    Libro electrónico
  9. 181789
    Publicado 2017
    Libro electrónico
  10. 181790
    por Moore, Bill
    Publicado 2003
    Libro electrónico
  11. 181791
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- 1 Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions -- 1.1 Introduction -- 1.2 Blockchain Preliminaries -- 1.2.1 Functioning of Blockchain -- 1.2.2 Design of Blockchain -- 1.2.3 Blockchain Elements -- 1.3 Key Technologies of Blockchain -- 1.3.1 Distributed Ledger -- 1.3.2 Cryptography -- 1.3.3 Consensus -- 1.3.4 Smart Contracts -- 1.3.5 Benchmarks -- 1.4 Consensus Algorithms of Blockchain -- 1.4.1 Proof of Work (PoW) -- 1.4.2 Proof of Stake (PoS) -- 1.4.3 BFT-Based Consensus Algorithms -- 1.4.4 Practical Byzantine Fault Tolerance (PBFT) -- 1.4.5 Sleepy Consensus -- 1.4.6 Proof of Elapsed Time (PoET) -- 1.4.7 Proof of Authority (PoA) -- 1.4.8 Proof of Reputation (PoR) -- 1.4.9 Deputized Proof of Stake (DPoS) -- 1.4.10 SCP Design -- 1.5 Internet of Things and Blockchain -- 1.5.1 Internet of Things -- 1.5.2 IoT Blockchain -- 1.5.3 Up-to-Date Tendency in IoT Blockchain Progress -- 1.6 Applications of Blockchain in Smart City -- 1.6.1 Digital Identity -- 1.6.2 Security of Private Information -- 1.6.3 Data Storing, Energy Ingesting, Hybrid Development -- 1.6.4 Citizens Plus Government Frame -- 1.6.5 Vehicle-Oriented Blockchain Appliances in Smart Cities -- 1.6.6 Financial Applications -- 1.7 Security and Privacy Properties of Blockchain -- 1.7.1 Security and Privacy Necessities of Online Business Transaction -- 1.7.2 Secrecy of Connections and Data Privacy -- 1.8 Privacy and Security Practices Employed in Blockchain -- 1.8.1 Mixing -- 1.8.2 Anonymous Signatures -- 1.8.3 Homomorphic Encryption (HE) -- 1.8.4 Attribute-Based Encryption (ABE) -- 1.8.5 Secure Multi-Party Computation (MPC) -- 1.8.6 Non-Interactive Zero-Knowledge (NIZK)…”
    Libro electrónico
  12. 181792
    por Khare, Vikas
    Publicado 2024
    Tabla de Contenidos: “…. -- 2.17.7 Case study: short-term memory -- 2.17.8 Case study: Butterworth B., Campbell R., Howard D., "The Uses of Short-Term Memory: A Case Study," The Quarterly Jou... -- 2.18 Exercise -- 2.19 Assessment question -- Further reading -- 3 Data theory and taxonomy of data -- Abbreviations -- 3.1 Introduction -- 3.2 Data as a whole -- 3.2.1 Structured data -- 3.2.2 Semistructured data -- 3.2.3 Unstructured data -- 3.2.4 Quantitative and qualitative data analysis -- 3.2.4.1 Qualitative data -- 3.2.4.1.1 Types of qualitative data -- 3.2.4.1.2 Importance of qualitative data -- 3.2.4.1.3 Role of qualitative data in the industry 4.0 -- 3.2.4.1.4 Main approaches to qualitative data analysis -- 3.2.4.1.5 Steps to qualitative data analysis -- 3.2.4.1.6 Qualitative data collection methods -- 3.2.4.2 Quantitative data -- 3.2.4.2.1 Types of Quantitative Data -- Discrete data -- Continuous data -- Interval data -- Trend analysis -- Conjoint analysis -- TURF analysis -- 3.2.4.2.2 Quantitative data collection methods -- Probability sampling -- Surveys/questionnaires -- Web-based questionnaire -- Mail questionnaire -- Observations -- Document review in quantitative data collection -- 3.3 Views of data -- 3.3.1 Types of statistical analysis -- 3.3.1.1 Descriptive analysis -- 3.3.1.2 Inferential analysis -- 3.3.1.3 Predictive analysis -- 3.3.1.4 Prescriptive analysis -- 3.3.1.5 Exploratory data analysis -- 3.3.1.6 Causal analysis…”
    Libro electrónico
  13. 181793
  14. 181794
  15. 181795
  16. 181796
  17. 181797
  18. 181798
  19. 181799
  20. 181800