Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
8201The financial times guide to wealth management how to plan, invest and protect your financial assetsPublicado 2015Tabla de Contenidos: “…-- Other types of investment funds -- 12 Other investment considerations -- The impact of dividends on overall investment returns -- The impact of regular withdrawals from your portfolio -- Interesting thoughts on asset allocation - the upward sloping equity glide path -- Principles to guide you -- The importance of rebalancing your portfolio -- The mechanics of rebalancing -- The use of debt with investing -- Inflation and deflation -- Leverage amplifies gains and losses -- Later life needs -- 13 The role of insurance -- Insuring property and possessions -- Insuring against ill health -- Insuring against loss of income…”
Libro electrónico -
8202Tabla de Contenidos: “…6-5: Open Shortest Path First (OSPF) -- 6-6: Open Shortest Path First (OSPF) Version 3 (IPv6) -- 6-7: Integrated IS-IS -- 6-8: Integrated IS-IS for IPv6 -- 6-9: Border Gateway Protocol (BGP) -- 6-10: Multiprotocol Border Gateway Protocol (BGP) for IPv6 -- Chapter 7 IP Multicast Routing -- 7-1: Protocol Independent Multicast (PIM) -- 7-2: Internet Group Management Protocol (IGMP) -- 7-3: Multiprotocol BGP (MBGP) -- 7-4: Multicast Source Discovery Protocol (MSDP) -- 7-5: IPv6 Multicast -- Chapter 8 IP Route Processing -- 8-1: Manually Configuring Routes -- 8-2: Policy Routing -- 8-3: Redistributing Routing Information -- 8-4: Filtering Routing Information -- 8-5: Load Balancing -- Part III: Packet Processing -- Chapter 9 Quality of Service -- 9-1: Modular QoS Command-Line Interface (MQC) -- 9-2: Network-Based Application Recognition (NBAR) -- 9-3: Policy-Based Routing (PBR) -- 9-4: Quality of Service for VPNs -- 9-5: QoS Policy Propagation via BGP -- 9-6: Priority Queuing (PQ) -- 9-7: Custom Queuing (CQ) -- 9-8: Weighted Fair Queuing (WFQ) -- 9-9: Weighted Random Early Detection (WRED) -- 9-10: Committed Access Rate (CAR) -- 9-11: Generic Traffic Shaping (GTS) -- 9-12: Frame Relay Traffic Shaping (FRTS) -- 9-13: Use RSVP for QoS Signaling -- 9-14: Link Efficiency Mechanisms -- 9-15: AutoQoS for the Enterprise -- Chapter 10 Multiprotocol Label Switching -- 10-1: Configuring Basic MPLS -- 10-2: MPLS Traffic Engineering -- 10-3: MPLS Virtual Private Networks (VPN) -- Part IV: Voice & -- Telephony -- Chapter 11 Voice and Telephony -- 11-1: Quality of Service for Voice -- 11-2: Voice Ports -- 11-3: Dialing -- 11-4: H.323 Gateways -- 11-5: H.323 Gatekeepers -- 11-6: Interactive Voice Response (IVR) -- 11-7: Survivable Remote Site (SRS) Telephony -- Part V: Security -- Chapter 12 Router Security -- 12-1: Suggested Ways to Secure a Router…”
Libro electrónico -
8203Publicado 2010Tabla de Contenidos: “…Core Data -- Creating the Inventory Application -- Editing the model file -- AppController -- LabelSettingViewController -- LocationListViewController -- AssetListViewController -- CountViewController -- How It All Works -- Trade-offs of Persistence Mechanisms -- Challenge 1: Deleting -- Challenge 2: Custom NSManagedObject Subclasses -- 28. …”
Libro electrónico -
8204Publicado 2018Tabla de Contenidos: “…Psychoanalytic Explanations -- Freudian Theory - The Leader as the Primal Father -- The Narcissistic Explanation - The Leader as an Ideal Object -- The Sociological-Symbolic Explanation -Charisma as awe Arousing Centrality -- Attribution-Based Explanations -- Charisma as Mere Attribution - The Romance of Leadership -- Attribution as a Mediating Mechanism Between Leaders' Behaviors and Effects on Followers -- Charisma as the Recruitment Of Followers' Self-Expressive Motivations - A Self-Concept Based Explanation -- Comparing the Explanations -- The Nature of Psychological Attachment to the Leader -- Follower Dependence Versus Autonomy -- Uncritical Acceptance and Unquestioning Obedience -- Individualistic Versus Collectivistic Orientation -- Mediating Processes -- Self-Perceptions -- Leader Behaviors -- The Leader's Vision -- Empowering Behaviors -- Leader Superiority Versus Similarity -- Formation and Affirmation of Identities -- Conclusion -- References -- Chapter 7: The Role of Followers in the Charismatic Leadership Process: Relationships and Their Consequences -- The Role of Followers in Noncharismatic Leadership Theories -- The Charismatic Leader-Follower Relationship -- Two Types of Charismatic Relationships -- Followers' Self-Concepts and the Formation of Charismatic Relationships -- Followers' Susceptibility to Charismatic Influence -- Follower Responses to Charismatic Leadership -- Followers' Empowerment of the Charismatic Leader -- Consequences of Charismatic Relationships -- Implications and Opportunities for Theoretical Extension -- References -- Chapter 8: Great Minds Think Alike? …”
Libro electrónico -
8205Understanding LTE with MATLAB from mathematical foundation to simulation and prototypingUnderstanding LTE with MATLABpor Zarrinkoub, HoumanTabla de Contenidos: “…Preface xiii List of Abbreviations xvii 1 Introduction 1 1.1 Quick Overview of Wireless Standards 1 1.2 Historical Profile of Data Rates 4 1.3 IMT-Advanced Requirements 4 1.4 3GPP and LTE Standardization 5 1.5 LTE Requirements 5 1.6 Theoretical Strategies 6 1.7 LTE-Enabling Technologies 7 1.8 LTE Physical Layer (PHY) Modeling 9 1.9 LTE (Releases 8 and 9) 11 1.10 LTE-Advanced (Release 10) 11 1.11 MATLAB(R) and Wireless System Design 11 1.12 Organization of This Book 11 References 12 2 Overview of the LTE Physical Layer 13 2.1 Air Interface 13 2.2 Frequency Bands 14 2.3 Unicast and Multicast Services 14 2.4 Allocation of Bandwidth 16 2.5 Time Framing 17 2.6 Time Frequency Representation 17 2.7 OFDM Multicarrier Transmission 20 2.8 Single-Carrier Frequency Division Multiplexing 23 2.9 Resource Grid Content 24 2.10 Physical Channels 25 2.11 Physical Signals 31 2.12 Downlink Frame Structures 34 2.13 Uplink Frame Structures 35 2.14 MIMO 35 2.15 MIMO Modes 40 2.16 PHY Processing 41 2.17 Downlink Processing 41 2.18 Uplink Processing 43 2.19 Chapter Summary 45 References 46 3 MATLAB(R) for Communications System Design 47 3.1 System Development Workflow 47 3.2 Challenges and Capabilities 48 3.3 Focus 49 3.4 Approach 49 3.5 PHY Models in MATLAB 49 3.6 MATLAB 49 3.7 MATLAB Toolboxes 50 3.8 Simulink 51 3.9 Modeling and Simulation 52 3.10 Prototyping and Implementation 53 3.11 Introduction to System Objects 54 3.12 MATLAB Channel Coding Examples 60 3.13 Chapter Summary 68 References 69 4 Modulation and Coding 71 4.1 Modulation Schemes of LTE 72 4.2 Bit-Level Scrambling 79 4.3 Channel Coding 85 4.4 Turbo Coding 85 4.5 Early-Termination Mechanism 93 4.6 Rate Matching 99 4.7 Codeblock Segmentation 105 4.8 LTE Transport-Channel Processing 107 4.9 Chapter Summary 112 References 113 5 OFDM 115 5.1 Channel Modeling 115 Examples 117 5.2 Scope 121 5.3 Workflow 121 5.4 OFDM and Multipath Fading 122 5.5 OFDM and Channel-Response Estimation 123 5.6 Frequency-Domain Equalization 124 5.7 LTE Resource Grid 124 5.8 Configuring the Resource Grid 125 5.9 Generating Reference Signals 130 5.10 Resource Element Mapping 132 5.11 OFDM Signal Generation 136 5.12 Channel Modeling 137 5.13 OFDM Receiver 140 5.14 Resource Element Demapping 141 5.15 Channel Estimation 143 5.16 Equalizer Gain Computation 145 5.17 Visualizing the Channel 146 5.18 Downlink Transmission Mode 1 147 5.19 Chapter Summary 164 References 165 6 MIMO 167 6.1 Definition of MIMO 167 6.2 Motivation for MIMO 168 6.3 Types of MIMO 168 6.4 Scope of MIMO Coverage 170 6.5 MIMO Channels 170 Implementation 171 6.6 Common MIMO Features 178 6.7 Specific MIMO Features 197 6.8 Chapter Summary 260 References 262 7 Link Adaptation 263 7.1 System Model 264 7.2 Link Adaptation in LTE 265 7.3 MATLAB(R) Examples 266 7.4 Link Adaptations between Subframes 275 7.5 Adaptive Modulation 277 7.6 Adaptive Modulation and Coding Rate 283 7.7 Adaptive Precoding 287 7.8 Adaptive MIMO 291 7.9 Downlink Control Information 294 7.10 Chapter Summary 302 References 303 8 System-Level Specification 305 8.1 System Model 306 8.2 System Model in MATLAB 315 8.3 Quantitative Assessments 316 8.4 Throughput Analysis 325 8.5 System Model in Simulink 326 8.6 Qualitative Assessment 349 8.7 Chapter Summary 351 References 352 9 Simulation 353 9.1 Speeding Up Simulations in MATLAB 353 9.2 Workflow 354 9.3 Case Study: LTE PDCCH Processing 355 9.4 Baseline Algorithm 356 9.5 MATLAB Code Profiling 358 9.6 MATLAB Code Optimizations 360 9.7 Using Acceleration Features 383 9.8 Using a Simulink Model 387 9.9 GPU Processing 399 9.10 Case Study: Turbo Coders on GPU 406 9.11 Chapter Summary 419 10 Prototyping as C/C++ Code 421 10.1 Use Cases 422 10.2 Motivations 422 10.3 Requirements 422 10.4 MATLAB Code Considerations 423 10.5 How to Generate Code 423 10.6 Structure of the Generated C Code 429 10.7 Supported MATLAB Subset 432 10.8 Complex Numbers and Native C Types 436 10.9 Support for System Toolboxes 438 10.10 Support for Fixed-Point Data 444 10.11 Support for Variable-Sized Data 447 10.12 Integration with Existing C/C++ Code 458 10.13 Chapter Summary 471 References 471 11 Summary 473 11.1 Modeling 473 11.2 Simulation 476 11.3 Directions for Future Work 477 11.4 Concluding Remarks 480 Index 483.…”
Publicado 2014
Libro electrónico -
8206Publicado 2023Tabla de Contenidos: “…Prieto, Francisco Estruch and Francisca -- Randez-Gil -- Slt2 Is Required to Activate ER-Stress-Protective Mechanisms through TORC1 Inhibition and -- Hexosamine Pathway Activation -- Reprinted from: J. …”
Libro electrónico -
8207Publicado 2024Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT& -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
Libro electrónico -
8208Publicado 2018Tabla de Contenidos: “…-glutamic acid) Composite Microparticles doi: 10.3390/md15040091 -- Mina Mahdavi, Nafiseh Mahmoudi, Farzad Rezaie Anaran and Abdolreza Simchi Electrospinning of Nanodiamond-Modified Polysaccharide Nanofibers with PhysicoMechanical Properties Close to Natural Skins doi: 10.3390/md14070128 -- Liliana A. …”
Libro electrónico -
8209Publicado 2023Tabla de Contenidos: “…-- Classic examples -- Modern games -- Understanding the game and level design of an RTS game -- Character -- Camera -- Control -- Creating a game design document -- Game outline -- World -- Characters -- Enemies and bosses -- Gameplay overview -- Game experience -- Mechanics and modes -- Summary -- Further reading -- Chapter 2: Setting Up Unity and the Dragoncraft Project -- Technical requirements -- Downloading and configuring the Unity Editor -- Using Visual Studio Code as the default IDE -- Importing and organizing assets from the Unity Asset Store -- Summary -- Chapter 3: Getting Started with Our Level Design -- Technical requirements -- Setting up our base scene -- Scenes -- Lights -- Camera -- Ground foundation -- Level scene -- Creating the first map layout using Prefabs -- Creating a custom group of Prefabs -- Using ScriptableObjects to configure the map -- Creating ScriptableObjects for game configuration -- Creating ScriptableObjects for level configuration -- Adding a custom editor for the level configuration -- Creating a map editor to speed up map creation -- Controlling the camera -- Summary -- Further reading -- Chapter 4: Creating the User Interface and HUD -- Technical requirements -- Using Canvas for a responsive UI -- Setting up the UI and HUD using Prefabs -- Creating the MenuButton GameObject and popup -- Displaying the resources counter -- Adding the action buttons -- Creating the details panel using a custom camera -- Rendering the minimap -- Loading the UI scene additively -- Summary -- Further reading -- Part 2: The Combat Units -- Chapter 5: Spawning an Army of Units -- Technical requirements…”
Libro electrónico -
8210Publicado 2024Tabla de Contenidos: “…References -- Chapter 5 Critical Systems Practice 1 - Explore the Situation of Interest -- 5.1 Introduction -- 5.2 Explore - Preliminaries -- 5.2.1 Metaphors and World Hypotheses in Philosophy -- 5.2.2 Paradigms and Metaphors in Organisation Theory -- 5.2.3 Multiperspectival Approaches in Systems Thinking -- 5.3 Explore - Process -- 5.3.1 View the Situation of Interest from Five Systemic Perspectives -- 5.3.1.1 The Mechanical Systemic Perspective -- 5.3.1.2 The Interrelationships Systemic Perspective -- 5.3.1.3 The Organismic Systemic Perspective -- 5.3.1.4 The Purposeful Systemic Perspective -- 5.3.1.5 The Societal/Environmental Systemic Perspective -- 5.3.2 Identify Primary and Secondary Issues -- 5.4 Explore - Example: The Early Days of the COVID-19 Pandemic in the United Kingdom -- 5.5 Explore - Issues -- 5.6 Conclusion -- References -- Chapter 6 Critical Systems Practice 2 - Produce an Intervention Strategy -- 6.1 Introduction -- 6.2 Produce - Preliminaries -- 6.3 Produce - Process -- 6.3.1 Appreciate the Variety of Systems Approaches -- 6.3.2 Choose Appropriate Systems Methodologies -- 6.3.2.1 Engineering Systems Methodologies -- 6.3.2.2 System Dynamics -- 6.3.2.3 Living Systems Methodologies -- 6.3.2.4 Soft Systems Methodologies -- 6.3.2.5 Emancipatory Systems Methodologies -- 6.3.3 Choose Appropriate Systems Models and Methods -- 6.3.4 Structure, Schedule and Set Objectives for the Intervention -- 6.4 Produce - Examples -- 6.5 Produce - Issues -- 6.6 Conclusion -- References -- Chapter 7 Critical Systems Practice 3 - Intervene Flexibly -- 7.1 Introduction -- 7.2 Intervene - Preliminaries -- 7.3 Intervene - Process -- 7.3.1 Use Systems Methodologies, Models and Methods Flexibly -- 7.3.2 Stay Alert to the Evolving Situation (Revisit Stage 1) -- 7.3.3 Stay Flexible About Appropriate Methodologies, Models and Methods (Revisit Stage 2)…”
Libro electrónico -
8211Publicado 2023Tabla de Contenidos: “…Creating Databases and Tables -- Searching for Data -- Creating Data -- Updating Data -- Deleting Data -- Using Indexes -- Views -- Triggers -- Simple Joins -- Stored Routines -- Connecting Applications -- MySQL Database Connectors -- Sample Database -- Example Connector: Connector/Python -- Installing Connector/Python -- Checking the Installation -- Example 1: Connecting to MySQL -- Example 2: Inserting Data -- Example Connector: Connector/J -- Installing Connector/J -- Checking the Installation -- Example 1: Connecting to MySQL -- Example 2: Inserting Data -- Summary -- Chapter 4: MySQL Database Service -- Getting Started -- Step 1: Create a VCN -- Step 2: Create a Group -- Create a Group -- Create and Add a User to the Group -- Step 3: Create Policies -- A Tour of MDS -- Creating Your First DB System -- Open the DB Systems Resource Page -- Create a DB System -- DB System Details Page -- Status and Buttons -- Resource Menu -- Metrics -- Endpoints -- HeatWave -- Backups -- Channels -- Work Requests -- MySQL DB System Information and Tags -- DB System Information Tab -- Tags Tab -- Stopping and Starting the DB System -- Connecting to Your DB System -- Connection Mechanisms -- Connecting via a Compute Instance -- Create a Compute Instance -- Modify the VCN - Create an Ingress Rule for the Private Subnet -- Connect to the Compute Instance -- Connect to the DB System -- Connecting Using a Bastion Session -- Bastion Terminology -- Session Types -- Prerequisites -- Create a Bastion Service -- Create a SSH Key Pair -- Create a Port-Forwarding Session -- Connect from Your PC -- Summary -- Chapter 5: Backup and Restore -- What Can Go Wrong? …”
Libro electrónico -
8212Publicado 1994Tabla de Contenidos: “…THE EMERGING TOBACCO-FREE NORM -- The Decline of Tobacco Use -- The Social Unacceptability of Tobacco Use -- TOBACCO USE AS PERCEIVED BY CHILDREN AND YOUTHS -- The Perception of Tobacco Use -- Spreading a False Impression: The Ubiquitous Pro-Tobacco Message -- OPPORTUNITIES FOR PROMOTING A TOBACCO-FREE NORM -- Families -- Peer Context -- The School Environment -- The Community Environment -- The Workplace -- Fast-Food Restaurants -- Shopping Malls -- Sports Facilities -- Community and Youth Organizations -- ADVOCACY FOR A TOBACCO-FREE NORM -- REINFORCING THE TOBACCO-FREE NORM: CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 4 TOBACCO ADVERTISING AND PROMOTION -- INTRODUCTION: MAINTAINING THE MARKET -- SHIFTING TRENDS IN TOBACCO MARKETING -- Promoting Tobacco Use to Consumers -- Inhibiting Opposition to Tobacco Use -- THE TOBACCO MARKET AND MARKET SEGMENTATION -- Tobacco: A Mature and a Growth Market -- Market Segmentation to Reach Youths -- THE APPEAL OF TOBACCO ADS TO CHILDREN AND YOUTHS -- Psychosocial Mechanisms Through Which Advertising Influences the Behavior of Children and Youths -- Themes and Images -- CRITICAL ASSESSMENT OF STUDIES ON ADVERTISING RECALL, ADVERTISING EXPENDITURES, AND TOBACCO CONSUMPTION -- Studies of Advertising Recall -- Econometric Studies of the Relationship Between Advertising and Consumption -- Studies of the Effects of Advertising Bans -- RATIONALE FOR RESTRICTIONS -- RECOMMENDATIONS -- Policy Recommendations -- Research Recommendations -- REFERENCES -- 5 PREVENTION AND CESSATION OF TOBACCO USE RESEARCH-BASED PROGRAMS -- PREVENTION OF SMOKING -- School-Based Smoking Prevention Research -- Approaches to School-Based Prevention Research -- Effectiveness of School-Based Smoking Prevention Programs -- Community-wide Programs to Prevent Smoking -- Summary Points -- PREVENTION OF SMOKELESS TOBACCO USE…”
Libro electrónico -
8213Publicado 2014Tabla de Contenidos: “…1.10 OUTLINE OF THE REST OF THIS BOOK -- 1.11 METRIC UNITS -- 1.12 SUMMARY -- 2 PROCESSES AND THREADS -- 2.1 PROCESSES -- 2.1.1 The Process Model -- 2.1.2 Process Creation -- 2.1.3 Process Termination -- 2.1.4 Process Hierarchies -- 2.1.5 Process States -- 2.1.6 Implementation of Processes -- 2.1.7 Modeling Multiprogramming -- 2.2 THREADS -- 2.2.1 Thread Usage -- 2.2.2 The Classical Thread Model -- 2.2.3 POSIX Threads -- 2.2.4 Implementing Threads in User Space -- 2.2.5 Implementing Threads in the Kernel -- 2.2.6 Hybrid Implementations -- 2.2.7 Scheduler Activations -- 2.2.8 Pop-Up Threads -- 2.2.9 Making Single-Threaded Code Multithreaded -- 2.3 INTERPROCESS COMMUNICATION -- 2.3.1 Race Conditions -- 2.3.2 Critical Regions -- 2.3.3 Mutual Exclusion with Busy Waiting -- 2.3.4 Sleep and Wakeup -- 2.3.5 Semaphores -- 2.3.6 Mutexes -- 2.3.7 Monitors -- 2.3.8 Message Passing -- 2.3.9 Barriers -- 2.3.10 Avoiding Locks: Read-Copy-Update -- 2.4 SCHEDULING -- 2.4.1 Introduction to Scheduling -- 2.4.2 Scheduling in Batch Systems -- 2.4.3 Scheduling in Interactive Systems -- 2.4.4 Scheduling in Real-Time Systems -- 2.4.5 Policy Versus Mechanism -- 2.4.6 Thread Scheduling -- 2.5 CLASSICAL IPC PROBLEMS -- 2.5.1 The Dining Philosophers Problem -- 2.5.2 The Readers and Writers Problem -- 2.6 RESEARCH ON PROCESSES AND THREADS -- 2.7 SUMMARY -- 3 MEMORY MANAGEMENT -- 3.1 NO MEMORY ABSTRACTION -- 3.2 A MEMORY ABSTRACTION: ADDRESS SPACES -- 3.2.1 The Notion of an Address Space -- 3.2.2 Swapping -- 3.2.3 Managing Free Memory -- 3.3 VIRTUAL MEMORY -- 3.3.1 Paging -- 3.3.2 Page Tables -- 3.3.3 Speeding Up Paging -- 3.3.4 Page Tables for Large Memories -- 3.4 PAGE REPLACEMENT ALGORITHMS -- 3.4.1 The Optimal Page Replacement Algorithm -- 3.4.2 The Not Recently Used Page Replacement Algorithm -- 3.4.3 The First-In, First-Out (FIFO) Page Replacement Algorithm…”
Libro electrónico -
8214Publicado 2017Tabla de Contenidos: “…Front Cover -- Onshore Structural Design Calculations -- Copyright Page -- Dedication -- Contents -- About the Author -- Preface -- 1 Engineering Management -- 1.1 Introduction -- 1.2 Overview of Field Development -- 1.2.1 Project Cost Versus Life Cycle -- 1.2.2 Concept and Screening Selection -- 1.3 Feed Engineering Phase -- 1.4 Detail Engineering -- 1.5 Engineering Design Management -- 1.5.1 Engineering Stage Time and Cost Control -- 1.5.1.1 Time Schedule Control -- 1.5.1.2 Engineering Cost Control -- 1.5.2 Engineering Interfaces -- Reference -- 2 Loads on the Industrial Structures -- 2.1 Introduction -- 2.2 Loads -- 2.2.1 Dead Load -- 2.2.1.1 General Design Loads -- 2.2.1.2 Pipe Rack -- 2.2.1.3 Ground-Supported Storage Tank Loads -- 2.2.2 Live Loads -- 2.2.3 Wind Loads -- 2.2.3.1 Basic Wind Load Formula -- 2.2.3.2 Wind Loads on Pipe Racks and Open Frame Structures -- 2.2.3.2.1 Pipe Racks -- Tributary Area for Piping -- Tributary Area for Cable Trays -- Force Coefficients for Pipes -- Force Coefficients for Cable Trays -- 2.2.3.2.2 Open-Frame Structures -- Open-Frame Load -- Design Load Cases -- Partial Wind Load -- 2.2.4 Earthquake Loads -- 2.2.4.1 Design Spectral Response Acceleration Parameters -- 2.2.4.2 Architectural, Mechanical, and Electrical Components Systems -- 2.2.4.2.1 Mechanical and Electrical Component Period -- 2.2.4.3 HVAC Ductwork -- 2.2.4.4 Piping Systems -- 2.2.4.5 Boilers and Pressure Vessels -- 2.2.4.6 General Precautions -- 2.2.4.7 Building and Nonbuilding Structure -- 2.2.4.7.1 Design Basis -- 2.2.4.7.2 Rigid Nonbuilding Structures -- 2.2.4.8 Flexibility of Piping Attachments -- 2.2.4.9 Design Review for Seismic Load -- 2.2.5 Impact Loads -- 2.2.6 Thermal Loads -- 2.2.7 Bundle Pull Load (Bp) for Heat Exchanger -- 2.2.8 ICE Loads (S) -- 2.3 Load Combinations -- 2.3.1 Vertical Vessels…”
Libro electrónico -
8215Publicado 2020Tabla de Contenidos: “…. -- 3.1.H Complementary specifications of the facility -- a) Related to mechanical aspects -- b) Related to constructive aspects -- c) Firewalls -- d) Electrical assembly, protection, security and connection -- e) Installation of equipment and cautions to be taken into account -- 3.2 General conditions -- 3.2.A Regulation of CTI and annex standards. -- 3.2.B Current Regulation on the Prevention of Occupational Risks. -- 3.2.C Regulations on protection against electromagnetic fields…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8216Publicado 2012Tabla de Contenidos: “…Prompt Emission-II Theory -- RADIATIVE MECHANISMS IN GRB PROMPT EMISSION -- WIDE-BAND SPECTRA OF PROMPT EMISSION -- GLOBAL PROPERTIES OF HIGH-ENERGY EMISSION FROM GAMMA-RAY BURSTS -- ON AMATI RELATION FOR GRB PROMPT EMISSION -- RELATIVISTIC FILAMENTATION INSTABILITY IN AN ARBITRARILY ORIENTED MAGNETIC FIELD -- Chapter IV. …”
Libro electrónico -
8217por Wisła, RafałTabla de Contenidos: “…The capital market -- a mechanism to support ownership transformation </P><P>2.3.1. …”
Publicado 2020
Libro electrónico -
8218Publicado 2017Tabla de Contenidos: “…7.1.1 Cognitive factors influencing the propensity to insure oneself against disaster -- 7.1.2 Emotional factors influencing the propensity to insure oneself against disaster -- 7.1.3 The role of personal experience in the propensity to insure oneself against disaster -- 7.1.4 Overview of the present study and hypotheses -- 7.2 Experiment 1 -- 7.2.1 Method -- 7.2.2 Results -- 7.2.3 Discussion -- 7.3 Experiment 2 -- 7.3.1 Method -- 7.3.2 Results -- 7.3.3 Discussion -- 7.4 Experiment 3 -- 7.4.1 Method -- 7.4.2 Results -- 7.4.3 Discussion -- 7.5 Conclusions -- Acknowledgements -- References -- Appendix -- Chapter 8: Peer effects in catastrophic risk insurance take-up -- 8.1 Introduction -- 8.2 Peer Effects: Mechanisms -- 8.3 Peer Effects: Empirical Studies -- 8.4 Experimental Study: Design and Methodology -- 8.4.1 General set-up -- 8.4.2 Treatments -- 8.4.3 Lab details -- 8.4.4 Predictions -- 8.5 Experimental Study: Results -- 8.6 Conclusions -- References -- Chapter 9: The illusion of safety: its existence, forms and remedies -- 9.1 Introduction -- 9.2 Study 1: The Illusion of Safety in the Laboratory -- 9.2.1 Participants -- 9.2.2 Procedure, scenarios and questions -- 9.2.3 Results -- 9.3 Study 2: The Illusion of Safety in the Field -- 9.3.1 The participant sample -- 9.3.2 Method and questionnaire -- 9.3.3 Results -- 9.4 Conclusions -- Acknowledgements -- References -- Appendix -- Chapter 10: Education and information as a basis for flood risk management - practical issues -- 10.1 Why Flood Education? …”
Libro electrónico -
8219Publicado 2018Tabla de Contenidos: “…Chapter 9: DevOps in the Hybrid Cloud -- The development cycle and DevOps -- The traditional development stages -- Merging the different teams -- Creating the infrastructure -- Configuring the infrastructure -- Templatize -- DevOps or NoOps -- IaaC with Terraform -- Installing Terraform -- Configuring and using Terraform -- Configuration management using Ansible -- Installing Ansible -- Configuring Ansible and a sample playbook -- Summary -- Chapter 10: Monitoring the Hybrid Cloud -- The traditional concepts in monitoring -- Availability monitoring -- ICMP monitoring -- TCP/UDP monitoring -- Enhanced monitoring -- SNMP-based availability monitoring -- Performance monitoring -- SNMP monitoring -- WMI monitoring and custom agent monitoring -- Monitoring the hybrid cloud -- Prometheus -- The implementation architecture of Prometheus -- Installing Prometheus -- Downloading Prometheus -- Setting up directories -- Setting up startup script -- Setting up node exporter -- Configuring Prometheus -- Grafana -- Installing Grafana -- Configuring Grafana to use Prometheus -- Summary -- Chapter 11: Security in a Hybrid Cloud -- Components of security -- The CIA triad -- Confidentiality -- Integrity -- Availability -- Tools to protect against the breaches -- IAM systems -- Data encryption in rest and in motion -- Network perimeter security -- Firewalls -- IDS/IPS -- Proxies -- Host controls -- High availability and disaster recovery -- Detection and analytics mechanism -- Minimizing shared infrastructure -- Compliance standards and controls -- HIPAA compliance standards -- Administrative controls -- Physical controls -- Technical controls -- Security controls consideration in hybrid cloud -- Common controls -- Implementing the controls on AWS - public cloud -- Security - shared responsibility model -- Implementing the controls in private cloud…”
Libro electrónico -
8220Publicado 2022Tabla de Contenidos: “…." -- Yet Another Key Reason for You to Take Email Marketing Seriously -- When to Use Email Marketing for Maximum Effect -- Major Use #1 for Email: Name Capture -- Major Use #2 for Email: Segmentation -- Another Way to Segment -- Major Use #3 for Email: Automatic Relationship Building -- The Mechanics of Good Email Marketing -- "I don't want to give out my personal email to anyone -- that's a prescription for even more spam." -- You Need an ESP -- Chapter 11 The Right Way to Use Social Media -- Social Media Myths and Realities -- "My customers are not on social media." -- "Social media is not a serious media channel. …”
Libro electrónico