Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Photography 92
- Digital techniques 62
- Nikon digital cameras 22
- Canon digital cameras 21
- Sound 18
- Recording and reproducing 17
- History of engineering & technology 15
- Lighting 15
- Single-lens reflex cameras 15
- Smart power grids 15
- Computer networks 14
- Data processing 14
- Technology: general issues 13
- Security measures 11
- Development 10
- Digital cameras 10
- Electronics 10
- Management 10
- Programming 10
- Cinematography 9
- Digital video 9
- History 9
- Technique 9
- smart grid 9
- Application software 8
- Design and construction 8
- renewable energy 8
- Documentales 7
- Equipment and supplies 7
- HTML (Document markup language) 7
-
441por Watkinson, John, 1950-Tabla de Contenidos: “…Sound; 5.1 Introduction; 5.2 The deciBel; 5.3 Audio level metering; 5.4 The ear; 5.5 Level and loudness; 5.6 Frequency discrimination; 5.7 Music and the ear…”
Publicado 2001
Libro electrónico -
442por Watkinson, JohnTabla de Contenidos: “…The Art of Sound Reproduction; Copyright; Contents; Preface; Chapter 1Introduction; 1.1 A short history; 1.2 Types of reproduction; 1.3 Sound systems; 1.4 Portable consumer equipment; 1.5 Fixed consumer equipment; 1.6 High-end hi-fi; 1.7 Public address; 1.8 Multitrack recording; 1.9 Sound radio; 1.10 Film and television sound; References; Chapter 2Audio basics; 2.1 Periodic and aperiodic signals; 2.2 Frequency response and linearity; 2.3 The sine wave; 2.4 Root mean square measurements; 2.5 The deciBel; 2.6 Audio level metering; 2.7 Vectors; 2.8 Phase angle and power factor; 2.9 Audio cabling…”
Publicado 1998
Libro electrónico -
443por Watkinson, John, 1950-Tabla de Contenidos: “…2.3 Periodic and aperiodic signals2.4 Sound and the ear; 2.5 The cochlea; 2.6 Mental processes; 2.7 Level and loudness; 2.8 Frequency discrimination; 2.9 Frequency response and linearity; 2.10 The sine wave; 2.11 Root mean square measurements; 2.12 The deciBel; 2.13 Audio level metering; References; Chapter 3. Digital principles; 3.1 Binary codes; 3.2 Introduction to digital logic; 3.3 The computer; 3.4 Timebase correction; 3.5 Multiplexing; 3.6 Gain control; 3.7 Digital faders and controls; 3.8 A digital mixer; 3.9 Filters; 3.10 FIR filters; 3.11 Sampling-rate conversion…”
Publicado 2002
Libro electrónico -
444por Watkinson, John, 1950-Tabla de Contenidos: “…1.20 NetworksReference; Chapter 2 Some audio principles; 2.1 The physics of sound; 2.2 The speed of sound; 2.3 Wavelength; 2.4 Periodic and aperiodic signals; 2.5 Sound and the ear; 2.6 Hearing; 2.7 The cochlea; 2.8 Mental processes; 2.9 Level and loudness; 2.10 Frequency discrimination; 2.11 Critical bands; 2.12 Beats; 2.13 Music and the ear; 2.14 The sensation of pitch; 2.15 Frequency response and linearity; 2.16 The sine wave; 2.17 Root mean square measurements; 2.18 The deciBel; 2.19 Audio level metering; 2.20 Vectors; 2.21 Phase angle and power factor; 2.22 Audio cabling; 2.23 EMC…”
Publicado 2001
Libro electrónico -
445Publicado 2017Tabla de Contenidos: “…The Text component -- Basic transformations -- The Rect Tool -- The Rect Transform -- Layout components -- Fitters -- Layout groups -- The layout element component -- Interaction components -- The selectable base class -- Interactable option -- Transition options -- Navigation options -- Button -- Toggle and Toggle Group -- Slider -- Scrollbar -- Dropdown -- Input Field -- Scroll Rect -- More about UI rendering -- The canvas renderer -- More visual components -- UI effect components -- UI and lights -- The canvas components -- Canvas group -- Event system -- Scripting user interfaces -- Designing the interface for our game -- Preparing the scene for the UI -- Creating a health bar -- Creating and placing the health bar -- Scripting the health bar -- Implementing the sugar meter -- Creating and place -- Scripting the sugar meter -- More about UI scripting - handlers -- What about all the rest? …”
Libro electrónico -
446Publicado 2024Tabla de Contenidos: “…-- Summary -- Chapter 6: Fixing and Enhancing the Audio -- Understanding audio in the browser -- Reading the audio meters -- Audio in the timeline -- Sub-frame audio fine-tuning -- Audio filters -- Expanded audio -- Fixing audio vocal problems -- Ambient background noise -- Voices with variable volume levels -- Wind noise -- Echoes -- Distorted voices -- Ums and ahs, coughs, and sniffs -- Suggestions for correcting audio -- Settings for the audio meters…”
Libro electrónico -
447Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Cybersecurity Risk Assessment in Advanced Metering Infrastructure -- 1.1 Introduction -- 1.2 Preliminaries -- 1.2.1 Advanced Metering Infrastructure -- 1.2.2 AMI Components -- 1.2.3 AMI Tiers -- 1.2.4 Information Security Risk Assessment -- 1.3 Implementation of the AMI System's Risk Assessment -- 1.3.1 Risk Identification Phase for the AMI System -- 1.3.2 AMI Vulnerabilities -- 1.3.3 Risk Profiling Phase for the AMI System -- 1.3.4 Risk Treatment Phase for the AMI System -- 1.4 Discussion and Recommendations -- 1.4.1 Recommendations -- 1.5 Conclusion -- Acknowledgment -- References -- Chapter 2 A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices -- 2.1 Introduction -- 2.2 Background -- 2.2.1 Machine Learning -- 2.2.2 Deep Learning Malware Detection -- 2.2.3 Adversarial Machine Learning -- 2.2.4 Generative Adversarial Networks -- 2.2.5 Related Work -- 2.3 Methodology -- 2.3.1 Dataset -- 2.3.2 Dynamic Analysis -- 2.3.3 Data Preparation -- 2.3.4 Image Generation -- 2.3.5 Adversarial Samples -- 2.3.6 Convolutional Neural Network (CNN) -- 2.4 Experimental Design -- 2.4.1 Experimental Setup -- 2.4.2 Behavior Feature Extraction -- 2.4.3 Words to Images -- 2.4.4 Synthetic Images -- 2.4.5 Image Classification -- 2.5 Results and Discussion -- 2.5.1 Assessing the Evasive Effectiveness of the Generated Samples Using a CNN Classifier -- 2.5.2 Assessing the Effectiveness of the CNN Classifier with a Novel Dataset Including a Newly Generated Batch of Malicious Samples for Each Family Produced by the DCGAN -- 2.5.3 Evaluation -- 2.6 Conclusion -- Notes -- References -- Chapter 3 A Physical-Layer Approach for IoT Information Security During Interference Attacks -- 3.1 Introduction…”
Libro electrónico -
448Publicado 2023Tabla de Contenidos: “…Exposing Right -- Tip 42: Choosing the right metering method -- Tip 43: Linking spot metering to focus frames -- Tip 44: Using the live view and live histogram -- Tip 45: Auto exposure (AE) with modes P, A, and S -- Tip 46: Using manual exposure M -- Tip 47: Using aperture priority A -- Tip 48: Using shutter priority S -- Tip 49: Using program AE P and program shift -- Tip 50: Playing it safe with auto exposure bracketing -- Tip 51: Long exposures -- Tip 52: Long exposures in bright daylight -- Tip 53: ISO settings-what's the deal? …”
Libro electrónico -
449
-
450Publicado 2021Tabla de Contenidos: “…18.5 Refining edits: how to solve problems and maintain musical flow -- 18.6 Notes on working with different instruments -- 18.7 Overdubbing scenarios -- 18.8 Emergency measures: sampling piano notes and note removal -- 18.9 Professional finish: joining into room tone -- 19 Mastering -- 19.1 Noise removal -- 19.2 Changing the sound -- 19.3 Tops and tails: room tone, breaths, noises, and fades -- 19.4 Levels between tracks, compression, and loudness meters -- 19.5 Placing track markers for CD mastering -- Appendices -- Appendix 1 Opera recording: practices at Decca from the 1950s to the 1990s -- Appendix 2 Cheaper alternatives to classic microphones -- Appendix 3 Original session set-up sheets -- Appendix 4 Orchestral layout notation -- Bibliography and further read -- Index…”
Libro electrónico -
451Publicado 2017Tabla de Contenidos: “…Chapter 9: Azure Site Recovery and Azure Backup for Hyper-V -- Introduction -- Enabling Hyper-V virtual machines protection to Azure with Azure Site Recovery and Microsoft Azure Backup Server -- Chapter 10: Monitoring, Tuning, and Troubleshooting Hyper-V -- Introduction -- Using real-time monitoring tools -- Using Perfmon for logged monitoring -- Using VM monitoring -- Monitoring Hyper-V Replica -- Using resource metering -- Tuning your Hyper-V server -- Using event viewer for Hyper-V troubleshooting -- Appendix: Hyper-V Architecture and Components -- Understanding Hypervisors -- Hyper-V architecture -- Hyper-V architecture components -- Differences between Windows Server 2016 -- Hyper-V, Nano Server, Hyper-V Server, Hyper-V Client, and VMware -- Windows Server 2016 Hyper-V X VMware vSphere 6.5 -- Index…”
Libro electrónico -
452por Stolarz, DamienTabla de Contenidos: “…The Hack: Calculating Battery Drain; 1.6.3.2. Method two: Amp meter.; 1.6.4. Testing Drain; 6. Upgrade Your Car Battery; 1.7.2. …”
Publicado 2005
Libro electrónico -
453por Evans, JohnTabla de Contenidos: “…; 2.1.5 The QOS Toolset; 2.2 Data Plane QOS Mechanisms; 2.2.1 Classification; 2.2.2 Marking; 2.2.3 Policing and Metering; 2.2.4 Queuing, Scheduling, Shaping, and Dropping; 2.2.5 Link Fragmentation and Interleaving; 2.3 IP QOS Architectures; 2.3.1 A Short History of IP Quality of Service…”
Publicado 2007
Libro electrónico -
454por Gómez Cardoso, Angel LuisTabla de Contenidos: “…1.1- Actividades para el área cognoscitiva1.1.1- Para enseñarlo a utilizar la visión; 1.1.2- Para enseñarlo a utilizar la audición; 1.1.3- Para enseñarlo a sacar, meter, abrir, cerrar:; 1.1.4- Para la comprensión; 1.1.5- Para enseñarlo a comparar y encontrar objetos; 1.1.6- Para que aprenda a pintar; 1.1.7- Para la imitación; 1.1.8- Para la asociación y acciones con objetos; 1.1.9- Para el lenguaje; 1.1.10- Actividades para el área social; 2- Segunda etapa de trabajo: actividades de estimulación (...); 2.1- Patrones sensoriales; 2.1.1- Actividades; 2.2- Psicomotricidad…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
455por Farahani, ShahinTabla de Contenidos: “…1.10.4 Data Verification1.10.5 Addressing; 1.11 Association and Disassociation; 1.12 Binding; 1.13 ZigBee Self-Forming and Self-Healing Characteristics; 1.14 ZigBee and IEEE 802.15.4 Networking Layer Functions; 1.14.1 PHY Layer; 1.14.2 MAC Layer; 1.14.3 The NWK Layer; 1.14.4 The APL Layer; 1.14.5 Security; 1.15 The ZigBee Gateway; 1.16 ZigBee Metaphor; References; Chapter 2 ZigBee/IEEE 802.15.4 Networking Examples; 2.1 Home Automation; 2.1.1 Security Systems; 2.1.2 Meter-Reading Systems; 2.1.3 Irrigation Systems; 2.1.4 Light Control Systems; 2.1.5 Multizone HVAC Systems…”
Publicado 2008
Libro electrónico -
456por Liyanage, MadhusankaTabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
Publicado 2020
Libro electrónico -
457por Eusterbrock, LinusTabla de Contenidos: “…-- Conclusion -- References -- Hip‐Hop Doesn't Need School, School needs Hip‐Hop -- Hip‐Hop Is More than Music -- Making Dope Shit -- Introduction -- Learning (about) Flow -- Analyzing Flow -- Line‐Bar Interactions-Phrasing on/in Meter -- Stress Interactions-(Quantized) Rhythmic Surface Structure -- Microrhythm-Timing and Degrees of Ambiguity -- What Makes the Shit Dope? …”
Publicado 2024
Libro electrónico -
458Publicado 2015“…At the same time, the serious scholar wil obtain an easy key to the extremely rich holdings of the archive of the Deshima trading factory, which covers a shelf length of more than forty meters in the National Archives in the Netherlands, but which has been only rarely utilized by historians, Japanologists or other scholars. …”
Libro electrónico -
459Publicado 2018Tabla de Contenidos: “…De la diversidad a la variación en la Teoría Comunicativa de la Terminología (TCT) / Maria Teresa Cabré -- A investigación sobre variación tereminolóxica: avances actuais e desafíos metodolóxicos / Sabela Fernándz-Silva -- Variação terminolõgica em uma ontologia do domínio jurídico / Luciana Monteiro Krebs e Maria da Graça Kreiger -- El turismo alternativo: análisis terminológico de las distintas denominaciones en lengua francesa de este fenómeno / Mercedes López Santiago -- La variación terminológica inter- e intratextual en la comunicación empresarial: el caso de los informes anuales / Johannes Schnitzer -- L'enrichissement terminologique d'usage du projet iMediate: une collaboration tripartite terminologie/TALN/sciences de la santé / Nathalie Lemaire, Thomas François, Jean-Claude Debongnie, Damien De Meyere, Benjamin Fauquert, Thierry Klein, Cédrick Fairon e Marc Van Campenhoudt -- Terminologie et diffusion des connaissance: un dialogue culturel et diachronique pour communiquer les méters / Mari Teresa Zanola -- What makes a legal text "legal"?…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
460Publicado 2017Tabla de Contenidos: “…10.6.1 Chemical Nonequilibrium Turbulent Flow in a Scramjet Nozzle -- 10.6.1.1 Some Results -- 10.6.2 Shock Wave-Boundary Layer Interactions -- 10.7 CONCLUSIONS -- REFERENCES -- 11 - Measuring Techniques -- 11.1 INTRODUCTION -- 11.2 TEMPERATURE MEASUREMENT -- 11.3 FLOW MEASUREMENT -- 11.3.1 Typical Flow Meters -- 11.3.2 Two-Phase Flow Measurements -- 11.3.3 Microscale Fluid Flow Measurement -- 11.4 LIQUID MASS GAUGING IN MICROGRAVITY -- 11.4.1 Review -- 11.4.2 Compression of Mass Gauging -- 11.4.2.1 Description of Ground Experiments -- 11.4.2.1.1 Experimental Apparatus -- 11.4.2.1.2 Experimental Procedures -- 11.4.2.2 Test Results and Discussion -- 11.4.2.2.1 Normal Tests -- 11.4.2.2.2 Attitude Disturbance Tests -- 11.4.2.2.3 Heat Transfer Tests -- 11.4.3 Summary and Concluding Remarks -- REFERENCES -- 1: Governing Equations for Momentum, Mass, and Energy Transport -- A1.1 CONTINUITY EQUATION (MASS CONSERVATION EQUATION) -- A1.2 THE NAVIER-STOKES EQUATIONS -- A1.2.1 The Stress Tensor σij -- A1.2.2 The Navier-Stokes Equations for Two-Dimensional and Incompressible Flows -- A1.2.3 Derivation of the Complete Temperature Field Equation -- A1.2.3.1 Determination of ΔE ̇ -- A1.2.3.2 Determination of the Heat Transfer Rate Q ̇ -- A1.2.3.3 Determination of the Work Rate W ̇ -- A1.2.3.3.1 The Energy Equation in its Primary Form -- A1.2.3.3.2 Rewriting the Energy Equation -- A1.3 THE BOUNDARY LAYER FORM OF THE TEMPERATURE FIELD EQUATION -- A1.4 BOUNDARY LAYER EQUATIONS FOR THE LAMINAR CASE -- A1.5 DIMENSIONLESS GROUPS AND RULES OF SIMILARITY -- REFERENCES -- 2: Dimensionless Numbers of Relevance in Aerospace Heat Transfer -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Back Cover…”
Libro electrónico