Mostrando 461 - 480 Resultados de 530 Para Buscar '"Ran"', tiempo de consulta: 0.10s Limitar resultados
  1. 461
    por Burkholder, Nicholas C.
    Publicado 2007
    “…Meeting the challenges of high-performance HRUntil 1760 ships routinely disappeared, ran aground, or sank because seafarers could not measure longitude. …”
    Libro electrónico
  2. 462
    Publicado 2023
    Tabla de Contenidos: “…Edge Networking in 5G architecture -- 8.2. Cloud RAN -- 8.3. Cloud Networking at the heart of 5G -- 8.4. …”
    Libro electrónico
  3. 463
    por Antenhofer, Christina
    Publicado 2024
    Tabla de Contenidos: “…5 Petrarcas Semiramis - Versuch eines Fazits -- Wäsche -- »Aus Verdruß das Sacktuch klein zerschnitten« -- 1 Einleitung: Ran an die Wäsche! -- 2 Lingerien, nummerierte Betten und Kleidungsmarker -- 3 Wäsche‐Anstaltspraktiken -- 4 Weitere Verknüpfungen statt eines Fazits -- »Was versprechen Sie sich davon?…”
    Libro electrónico
  4. 464
    Publicado 2019
    Tabla de Contenidos: “…Front Cover -- 5G NR -- Copyright Page -- Contents -- Acknowledgments -- List of Abbreviations -- Introduction and Background -- 1 Introduction to 5G -- 2 Use Cases and Deployment Scenarios -- 2.1 Use Cases -- 2.2 Deployment Scenarios -- 3 Key Performance Indicators, Architectural, System, and Service Requirements -- 3.1 Definition of the Performance Metrics -- 3.2 Test Environments -- 3.3 High-Level Architectural Requirements -- 3.4 System Performance Requirements -- 3.5 Service Requirements -- 4 ITU-R IMT-2020 Standardization Activities -- 5 3GPP 5G Standardization Activities -- 6 Spectrum and Regulations -- 7 Future Outlook -- References -- ITU-R Specifications -- 3GPP Specifications -- Articles, Books, White Papers, and Application Notes -- 1 5G Network Architecture -- 1.1 Design Principles and Prominent Network Topologies -- 1.1.1 Network and Service Requirements -- 1.1.2 Virtualization of Network Functions -- 1.1.2.1 Architectural Aspects -- 1.1.2.2 Functional Aspects -- 1.1.2.3 Operational Aspects -- 1.1.2.4 Legacy Support and Interworking Aspects -- 1.1.3 Separation of Control and User Planes (Software-Defined Networks) -- 1.1.3.1 Architectural Aspects -- 1.1.4 Network Slicing -- 1.1.5 Heterogeneous and Ultra-dense Networks -- 1.1.6 Cloud-RAN and Virtual-RAN -- 1.1.6.1 Architectural Aspects -- 1.1.6.2 Fronthaul Transport and Functional Split Options -- 1.1.6.3 Backhaul Transport Options -- 1.1.7 Mobile Edge Computing -- 1.1.7.1 Service and Deployment Scenarios -- 1.1.7.2 Architectural Aspects -- 1.1.8 Network Sharing -- 1.2 Reference Architectures -- 1.2.1 Access Network -- 1.2.1.1 Reference Architecture: Network Entities and Interfaces -- 1.2.1.1.1 Xn Control-Plane/User-Plane Functions and Procedures -- 1.2.1.1.2 F1 Control-Plane/User-Plane Functions and Procedures -- 1.2.1.1.3 E1 Control-Plane Functions and Procedures…”
    Libro electrónico
  5. 465
    Publicado 2014
    Tabla de Contenidos: “…2.7.1 - Mass/heat transfer from a spherical particle in extensional flow2.7.1.1 - Steady transport; 2.7.1.2 - Unsteady transport; 2.7.2 - Flow and transport from a sphere in simple shear flow; 2.7.2.1 - Flow field; 2.7.2.2 - Mass/heat transfer; 2.8 - Summary and perspective; 2.8.1 - Summary; 2.8.2 - Perspective; Nomenclature; References; Chapter 3 - Multiphase stirred reactors; 3.1 - Introduction; 3.2 - Mathematical models and numerical methods; 3.2.1 - Governing equations; 3.2.2 - Interphase momentum exchange; 3.2.3 - RANS method; 3.2.3.1 - k-ε model; 3.2.3.2 - EASM; 3.2.4 - LES model…”
    Libro electrónico
  6. 466
    por Suresh, A.
    Publicado 2023
    Tabla de Contenidos: “…7.1.2 Management of Conflict in Agile RM Framework -- 7.1.2.1 A Holistic View of Technology -- 7.1.3 Ratings and Context Information -- 7.1.4 Dynamic Traffic Steering -- 7.1.4.1 Reduced-Overhead Interference Mitigation -- 7.1.5 Reducing Overhead Interference Mitigation -- 7.1.5.1 RIM and 5G NR -- 7.1.5.2 Contributions and Differences -- 7.1.6 High-Level 5NR - RIM Framework -- 7.1.7 OS RIM-RS -- 7.1.7.1 OS RIM-RS -- 7.1.8 Radio-Access Network -- 7.1.9 Improve RAN Coverage -- 7.1.9.1 Improving RAN Coverage Can Take Many Forms -- 7.1.10 Related Work -- 7.1.11 Conclusion -- References -- Chapter 8 Interference Techniques Based on Deep Learning in Wireless Networks -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Suppression Techniques -- 8.3.1 Deep Learning Based Approach -- 8.3.2 Adjacent Channel Interference (ACI) -- 8.3.3 Co-Channel Interference -- 8.3.4 Self-Interference -- 8.3.5 Homogeneous Technology Interference -- 8.3.6 Heterogeneous Technology Interference -- 8.4 Classification of Interference Suppression Techniques -- 8.5 A Blind Approach of Interference Cancellation Using Neural Networks -- 8.6 Interference Estimation -- 8.6.1 Feature Extraction -- 8.6.2 Channel Usage Ratio -- 8.7 Machine Learning Model-Decision Tree -- 8.8 Lookup Table -- 8.9 Conclusion -- References -- Chapter 9 Implementing SDN Process-Based MRMC Wireless Networks -- 9.1 Multi-Radio Multi Channel Network in Wireless Network -- 9.1.1 The Concept of QoS inWN -- 9.2 QoS Challenges in MRMC Based Wireless Networks -- 9.2.1 Bandwidth Limitation -- 9.2.2 Removal of Redundancy -- 9.2.3 Energy and Delay Trade-Off -- 9.2.4 Buffer Size Limitation -- 9.3 Opportunistic Routing -- 9.4 The Need for Software-Defined Network in WSN for Enhancing QoS -- 9.4.1 QoS Management -- 9.5 ILP Problem Design -- 9.5.1 Network Model -- 9.5.2 Interference Model -- 9.5.3 VL Request Design…”
    Libro electrónico
  7. 467
    Publicado 2024
    Tabla de Contenidos: “…4.3 Mid‐Band Spectrum at 3.3-5.0 GHz and at 2.6 GHz -- 4.4 Low‐Band Spectrum Below 3 GHz -- 4.5 Unlicensed Band -- 4.6 Shared Band -- 4.7 3GPP Frequency Variants -- 4.8 Summary -- References -- Chapter 5 5G Architecture -- 5.1 Introduction -- 5.2 5G Architecture Options -- 5.3 5G Core Network Architecture -- 5.3.1 Access and Mobility Management Function -- 5.3.2 Session Management Function -- 5.3.3 User Plane Function -- 5.3.4 Data Storage Architecture -- 5.3.5 Policy Control Function -- 5.3.6 Network Exposure Function -- 5.3.7 Network Repository Function -- 5.3.8 Network Slice Selection -- 5.3.9 Non‐3GPP Interworking Function -- 5.3.10 Auxiliary 5G Core Functions -- 5.4 5G RAN Architecture -- 5.4.1 NG‐Interface -- 5.4.2 Xn‐Interface -- 5.4.3 E1‐Interface -- 5.4.4 F1‐Interface -- 5.5 Network Slicing -- 5.5.1 Interworking with LTE -- 5.6 Summary -- References -- Chapter 6 5G Physical Layer -- 6.1 Introduction -- 6.2 5G Multiple Access Principle -- 6.3 Physical Channels and Signals -- 6.4 Basic Structures for 5G Frame Structure -- 6.5 5G Channel Structures and Beamforming Basics -- 6.6 Random Access -- 6.7 Downlink User Data Transmission -- 6.8 Uplink User Data Transmission -- 6.9 Uplink Signaling Transmission -- 6.10 Downlink Signaling Transmission -- 6.11 Physical Layer Procedures -- 6.11.1 HARQ Procedure -- 6.11.2 Uplink Power Control -- 6.11.3 Timing Advance -- 6.12 5G MIMO and Beamforming Operation -- 6.12.1 Downlink MIMO Transmission Schemes -- 6.12.2 Beam Management Framework -- 6.12.2.1 Initial Beam Acquisition -- 6.12.2.2 Beam Measurement and Reporting -- 6.12.2.3 Beam Indication: QCL and Transmission Configuration Indicator (TCI) -- 6.12.2.4 Beam Recovery -- 6.12.3 CSI Framework -- 6.12.3.1 Reporting Settings -- 6.12.3.2 Resource Settings -- 6.12.3.3 Reporting Configurations -- 6.12.3.4 Report Quantity Configurations -- 6.12.4 CSI Components…”
    Libro electrónico
  8. 468
  9. 469
  10. 470
    por Pignataro, Paul
    Publicado 2013
    “…You will construct a full scale financial model and valuation step-by-step as you page through the book.When we ran this analysis in…”
    Libro electrónico
  11. 471
    Publicado 2024
    Tabla de Contenidos: “…Disconnected operations -- Summary -- Chapter 4: Network Edge Architecture -- Definitions -- NFV -- NFV considerations -- SDN -- VNF, NFV, SDN, and edge computing -- Underlay and overlay networks -- Network traffic management -- MEC -- Network edge architecture -- RAN -- CSPs and hyperscalers -- Sample architectures -- Manufacturing scenario -- Healthcare scenario -- Campus network scenario -- Summary -- Chapter 5: End-to-End Edge Architecture -- IT and OT convergence -- AI and edge computing -- Industrial edge scenario -- Manufacturing scenario -- Retail edge scenario -- Retail store scenario -- Network slicing -- Example scenario -- Edge reference architecture -- The cloud -- The network -- The edge -- Edge and distributed cloud computing -- Distributed cloud computing -- The scenario -- Summary -- Part 3: Related Considerations and Concluding Thoughts -- Chapter 6: Data Has Weight and Inertia -- Suggested pre-reading material -- Data encryption -- Motivations for encrypting data -- Protecting data without making it difficult to use -- Ensuring that data modifications are noticeable -- Data storage and management -- Strategies for defining and enforcing data policies -- Usage options ranging from real to synthetic data -- Rules of thumb for retaining data, or not -- Using data to build machine learning (ML) models -- The promise of foundation models -- How small and efficient can we make models? …”
    Libro electrónico
  12. 472
  13. 473
    Publicado 2016
    Tabla de Contenidos: “…Happy Child (King)* -- 's Avonds -- Evening (Van Eyken)* -- Daar liep een dichtje in mijn gebed -- A Little Verse Ran through My Prayer (King)* -- Gij zegt dat 't Vlaamsch te niet zal gaan -- You Say That Flemish Soon Will Die (Irons) -- Tot de zonne -- To the Sun (Bithell) -- Hoe stille is 't als de donder dreegt -- How Still before the Thunder Comes (Van Eyken) -- Niet -- Nothing (Van Eyken)* -- 1861 -- `t zij vroeg of laat -- Right Soon or Late (Van Eyken) -- 1862 -- `t Laatste -- The Last (Vincent)* -- Hangt nen truisch -- Hang a Sash (Vincent)* -- 1866 -- Heidensch lied -- Pagan Song (Van Eyken) -- 1870 -- Halleluja -- Hallelujah (Van Eyken)* -- 1872 -- Verloren moeite -- Wasted Effort (Van Eyken) -- 1877 -- O dichtergeest -- O Poetry (Vincent)* -- En durft gij mij -- And Do You Dare (Vincent)* -- 1879 -- De Vlaamsche taal -- Our Flemish Speech (Barnouw) -- 1880 -- O vrienden -- O Friends (Van Eyken) -- 1882 -- O wilde en overvalschte pracht --…”
    Libro electrónico
  14. 474
    Publicado 2011
    Tabla de Contenidos: “…6.4 Shapers and Leaky Buckets -- 6.5 Excess Traffic and Oversubscription -- 6.6 Comparing and Applying Policer and Shaper Tools -- 6.7 Conclusion -- Reference -- 7 Queuing and Scheduling -- 7.1 Queuing and Scheduling Concepts -- 7.2 Packets and Cellification -- 7.3 Different Types of Queuing Disciplines -- 7.4 FIFO - First in, First out -- 7.5 Fair Queuing -- 7.6 Priority Queuing -- 7.7 Weighted Fair Queueing -- 7.8 Weighted Round Robin -- 7.9 Deficit Weighted Round Robin -- 7.10 Priority-Based Deficit Weighted Round Robin -- 7.10 Conclusions about the Best Queuing Discipline -- Further Reading -- 8 Advanced Queueing topics -- 8.1 Hierarchical Scheduling -- 8.2 Queues Lengths and Buffer Size -- 8.3 Dynamically Sized versus Fixed-size Queue Buffers -- 8.4 RED - Random Early Discard -- 8.5 Using RED with TCP Sessions -- 8.6 Differentiating Traffic Inside a Queue with WRED -- 8.7 Head versus Tail RED -- 8.8 Segmented and interpolated RED Profiles -- 8.9 Conclusion -- Further Reading -- PART III CASE STUDIES -- 9 The VPLS Case Study -- 9.1 High-Level Case Study Overview -- 9.2 Virtual Private Networks -- 9.3 Service Overview -- 9.4 Service Technical Implementation -- 9.5 Network Internals -- 9.6 Classes of Service and Queue Mapping -- 9.7 Classification and Trust Borders -- 9.8 Admission Control -- 9.9 Rewrite Rules -- 9.10 Absorbing Traffic Bursts at the Egress -- 9.11 Queues and Scheduling at Core-Facing Interfaces -- 9.12 Queues and Scheduling at Customer-Facing Interfaces -- 9.13 Tracing a Packet Through the Network -- 9.14 Adding More Services -- 9.15 Multicast Traffic -- 9.16 Using Bandwidth Reservations -- 9.17 Conclusion -- Further Reading -- 10 Case Study IP RAN and Mobile Backhaul QOS -- 10.1 Evolution from 2G to 4G -- 10.2 2G Network Components -- 10.3 Traffic on 2G Networks -- 10.4 3G Network Components -- 10.5 Traffic on 3G Networks -- 10.6 LTE Network Components -- 10.7 LTE Traffic Types -- 10.8 LTE Traffic Classes -- 10.9 Conclusion -- References -- Further Reading…”
    Libro electrónico
  15. 475
    por Katoh, Naoki
    Publicado 2021
    “…This open access book gives an overview of cutting-edge work on a new paradigm called the “sublinear computation paradigm,” which was proposed in the large multiyear academic research project “Foundations of Innovative Algorithms for Big Data.” That project ran from October 2014 to March 2020, in Japan. To handle the unprecedented explosion of big data sets in research, industry, and other areas of society, there is an urgent need to develop novel methods and approaches for big data analysis. …”
    Libro electrónico
  16. 476
    Publicado 2016
    Tabla de Contenidos: “…10.3.1 Oversubscription versus Microbursts 199 -- 10.3.2 TCP Incast Problem 202 -- 10.4 Conclusions 205 -- Further Reading 207 -- 11 Case Study IP RAN and Mobile Backhaul QOS 208 -- 11.1 Evolution from 2G to 4G 208 -- 11.2 2G Network Components 209 -- 11.3 Traffic on 2G Networks 211 -- 11.4 3G Network Components 211 -- 11.5 Traffic on 3G Networks 215 -- 11.6 LTE Network Components 216 -- 11.7 LTE Traffic Types 219 -- 11.8 LTE Traffic Classes 220 -- 11.9 Conclusion 224 -- References 227 -- Further Reading 227 -- 12 Conclusion 228 -- Index 230.…”
    Libro electrónico
  17. 477
    Publicado 2018
    “…It covers a wide range of topics from 5G use cases and their requirements, to spectrum, 5G end-to-end (E2E) system architecture including core network (CN), transport network (TN) and radio access network (RAN) architecture, network slicing, security and network management. …”
    Libro electrónico
  18. 478
    por Kreher, Ralf
    Publicado 2011
    “…A comprehensive reference on the call procedures of 4G RAN and Core networks, LTE Signaling, Troubleshooting and Optimization describes the protocols and procedures of LTE. …”
    Libro electrónico
  19. 479
    por Schrenk, Michael
    Publicado 2007
    Tabla de Contenidos: “…Further Exploration -- 15: Webbots That Read Email -- The POP3 Protocol -- Logging into a POP3 Mail Server -- Reading Mail from a POP3 Mail Server -- Executing POP3 Commands with a Webbot -- Further Exploration -- Email-Controlled Webbots -- Email Interfaces -- 16: Webbots That Send Email -- Email, Webbots, and Spam -- Sending Mail with SMTP and PHP -- Configuring PHP to Send Mail -- Sending an Email with mail() -- Writing a Webbot That Sends Email Notifications -- Keeping Legitimate Mail out of Spam Filters -- Sending HTML-Formatted Email -- Further Exploration -- Using Returned Emails to Prune Access Lists -- Using Email as Notification That Your Webbot Ran -- Leveraging Wireless Technologies -- Writing Webbots That Send Text Messages -- 17: Converting a Website into a Function -- Writing a Function Interface -- Defining the Interface -- Analyzing the Target Web Page -- Using describe_zipcode() -- Final Thoughts -- Distributing Resources -- Using Standard Interfaces -- Designing a Custom Lightweight "Web Service" -- PART III: Advanced Technical Considerations -- 18: Spiders -- How Spiders Work -- Example Spider -- LIB_simple_spider -- harvest_links() -- archive_links() -- get_domain() -- exclude_link() -- Experimenting with the Spider -- Adding the Payload -- Further Exploration -- Save Links in a Database -- Separate the Harvest and Payload -- Distribute Tasks Across Multiple Computers -- Regulate Page Requests -- 19: Procurement Webbots and Snipers -- Procurement Webbot Theory -- Get Purchase Criteria -- Authenticate Buyer -- Verify Item -- Evaluate Purchase Triggers -- Make Purchase -- Evaluate Results -- Sniper Theory -- Get Purchase Criteria -- Authenticate Buyer -- Verify Item -- Synchronize Clocks -- Time to Bid? …”
    Libro electrónico
  20. 480
    Publicado 2023
    Tabla de Contenidos: “…-- Invest initially in the leadership team -- Build broad learning programs that can scale -- Reskill pivotal business roles -- Notes -- Getting Ready Section Six -- Section Seven: Transformation Journey Stories: An exploration of how three companies have driven successful digital and AI transformations -- Chapter 33 Freeport-McMoRan turns data into value -- A copper mining business's AI transformation journey -- Note -- Chapter 34 DBS - A multinational bank becomes a digital bank -- A multinational bank's digital and AI transformation journey -- Notes -- Chapter 35 The future of play takes shape at the LEGO Group -- A global toy brand's digital transformation -- Note -- Acknowledgments -- Index -- EULA…”
    Libro electrónico