Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Transport 612
- Transportation 522
- Transporte 430
- Business & Economics 369
- Transportation Economics 287
- Transportes 246
- Transporte acuático 230
- Historia 213
- Economic conditions 143
- Engineering & Applied Sciences 139
- Computer networks 126
- History 123
- Environmental aspects 116
- Economics 115
- Ferrocarriles 114
- Economic policy 112
- Technology: general issues 109
- History of engineering & technology 108
- Innovaciones tecnológicas 108
- European Conference of Ministers of Transport 106
- Research & information: general 104
- Investigación científica 102
- Management 99
- Derecho marítimo 98
- aspectos económicos 93
- Environment 91
- Transporte ferroviario 89
- Urbanismo 88
- Història 87
- Transportes urbanos 87
-
9141Publicado 2023Tabla de Contenidos: “…VDR -- Moving Forward -- Using SBOM with Other Attestations -- Source Authenticity -- Build Attestations -- Dependency Management and Verification -- Sigstore -- Adoption -- Sigstore Components -- Commit Signing -- SBOM Critiques and Concerns -- Visibility for the Attacker -- Intellectual Property -- Tooling and Operationalization -- Summary -- Chapter 5 Challenges in Software Transparency -- Firmware and Embedded Software -- Linux Firmware -- Real-Time Operating System Firmware -- Embedded Systems -- Device-Specific SBOM -- Open Source Software and Proprietary Code -- User Software -- Legacy Software -- Secure Transport -- Summary -- Chapter 6 Cloud and Containerization -- Shared Responsibility Model -- Breakdown of the Shared Responsibility Model -- Duties of the Shared Responsibility Model -- The 4 Cs of Cloud Native Security -- Containers -- Kubernetes -- Serverless Model -- SaaSBOM and the Complexity of APIs -- CycloneDX SaaSBOM -- Tooling and Emerging Discussions -- Usage in DevOps and DevSecOps -- Summary -- Chapter 7 Existing and Emerging Commercial Guidance -- Supply Chain Levels for Software Artifacts -- Google Graph for Understanding Artifact Composition -- CIS Software Supply Chain Security Guide -- Source Code -- Build Pipelines -- Dependencies -- Artifacts -- Deployment -- CNCF's Software Supply Chain Best Practices -- Securing the Source Code -- Securing Materials -- Securing Build Pipelines -- Securing Artifacts -- Securing Deployments…”
Libro electrónico -
9142Publicado 2008Tabla de Contenidos: “…Quiz -- Foundation Topics -- Overview of Network Layer Functions -- IP Addressing -- IP Routing -- IP Routing Protocols -- Network Layer Utilities -- Exam Preparation Tasks -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Chapter 6 Fundamentals of TCP/IP Transport, Applications, and Security -- "Do I Know This Already?" …”
Libro electrónico -
9143por Tuttle, StevenTabla de Contenidos: “…Virtual private networks -- 2.1 Architecture -- 2.2 Security -- 2.2.1 Transport mode -- 2.2.2 Tunnel mode -- 2.2.3 Security parameter index -- 2.2.4 Security associations -- 2.2.5 Filter rules -- 2.2.6 Encapsulating Security Payloads -- 2.2.7 Authentication Header -- 2.2.8 Key management -- 2.2.9 Security features -- 2.3 Installing IPSec -- 2.3.1 Installing the IP Security feature -- 2.3.2 Enabling IPSec offload -- 2.3.3 Starting IP Security -- 2.3.4 Installation Verification Procedure -- 2.4 Using administration interfaces -- 2.4.1 Starting IPSec -- 2.4.2 Stopping IPSec -- 2.4.3 IKE tunnels using SMIT -- 2.4.4 IKE tunnels using Web-based System Manager -- 2.4.5 Using certificates -- 2.4.6 Manual tunnels using the System Management Interface Tool -- 2.4.7 Filtering through the System Management Interface Tool -- 2.5 Functionality -- 2.5.1 Scenario I -- 2.5.2 Scenario II -- 2.5.3 Scenario III -- 2.5.4 Scenario IV -- 2.5.5 Scenario V -- 2.5.6 Scenario VI -- 2.6 Differences and limitations -- 2.7 Event and alert management -- 2.8 Common problems and solutions -- 2.8.1 Activation failure of the tunnel -- 2.8.2 Pinging from a non-secure machine to a secured machine hangs -- 2.8.3 Cannot ping from a secured machine to a non-secure machine -- 2.8.4 Network address translation doesn't work in IPSec environments -- 2.8.5 Firewall doesn't work in IPSec environments -- 2.8.6 Cannot connect two machines where tunnels used to be active -- 2.8.7 Both tunnels activated but there is no active/negotiating in the IKE tunnel monitor…”
Publicado 2003
Libro electrónico -
9144Publicado 2003Tabla de Contenidos: “…Introducing EDI technologies and products -- 1.1 EDI terms and concepts -- 1.2 Benefits of EDI -- 1.3 EDI components -- 1.3.1 Message standards -- 1.3.2 Communication -- 1.4 The evolution of EDI -- 1.4.1 Elements of an EDI solution -- 1.4.2 The IBM EDI solution -- 1.5 Introducing WebSphere Data Interchange -- 1.5.1 Features of WebSphere Data Interchange -- 1.5.2 Mailbox profiles -- 1.5.3 Network profiles -- 1.5.4 WebSphere MQ-related artifacts -- 1.5.5 Service profiles -- 1.5.6 Trading Partner profiles -- 1.5.7 Concepts of the mapping editor -- 1.5.8 Mapping rules -- 1.6 Usage patterns for WebSphere Data Interchange -- 1.6.1 A point-to-point solution -- 1.6.2 An integration broker solution -- 1.6.3 A B2B gateway solution -- 1.7 Introducing the iSoft Peer-to-Peer Agent -- 1.7.1 Communication features -- 1.7.2 Data integrity and security characteristics -- 1.7.3 Administration features -- 1.7.4 Load-balancing and multi-machine setup -- 1.8 Introducing Trading Partner Interchange -- 1.8.1 How the system works -- 1.8.2 Company profile -- 1.8.3 Partner profile -- 1.8.4 The relationship between the company and partner profiles -- 1.8.5 Document sizes -- 1.8.6 Transports -- 1.9 Internet references -- Chapter 2. …”
Libro electrónico -
9145Tabla de Contenidos: “…Cover -- Contents -- Introduction -- Chapter 1 The Need for Controller-Based Wireless Networks -- Why Wireless LAN Controllers Were Created -- Why Wireless LAN Controllers Were Created -- Controller-Based WLAN Functional and Elemental Architecture -- Autonomous AP Issues and the WLC Remedy -- Problem: WLAN APs Are Difficult to Deploy -- Problem: WLANs Are Not Secure -- Problem: Infrastructure Device Configuration and Scaling -- Problem: Autonomous AP Costs for Configuring Each AP -- Problem: Autonomous AP Costs for Keeping Each AP's Software Up to Date -- Problem: RF Expertise and Configuration Challenges -- Mobility Applications Enabled by Controller-Based WLANs -- WLANs Do Not Provide the Performance and Robustness Needed for Use as a Primary Access Network -- Summary -- Chapter 2 Wireless LAN Protocols -- Understanding the Relevant Standards -- Wi-Fi Alliance -- Cisco Compatible Extensions -- IETF -- The Physical Layer -- Physical Layer Concepts -- CAPWAP -- CAPWAP Versus LWAPP -- CAPWAP Protocol Fundamentals -- CAPWAP Terminology -- CAPWAP Control Messages -- CAPWAP Data Messages -- CAPWAP State Machine -- CUWN Implementation of the CAPWAP Discovery -- CAPWAP Transport -- CAPWAP MAC Modes -- Split MAC Mode -- Local MAC Mode -- Summary of CAPWAP -- Packet Flow in the Cisco Unified Wireless Network -- CAPWAP Control -- CAPWAP Data Path: Centrally Bridged Traffic -- CAPWAP Data Path: Locally Bridged Traffic -- Summary of Packet Flow -- Summary -- References -- Chapter 3 802.11n -- IEEE 802.11n Standard -- 802.11n MAC -- Other 802.11 Standards Used with 802.11n -- Frequency Bands Supported by 802.11n -- Antenna Arrays -- Transmit Beam Forming (TxBF) -- Beam Steering -- Spatial Multiplexing -- Transmit Diversity -- Multiple Input, Multiple Output (MIMO) -- Multipath -- MIMO Nomenclature -- Receiver Diversity -- Branch Selection Diversity…”
Libro electrónico -
9146Understanding LTE with MATLAB from mathematical foundation to simulation and prototypingUnderstanding LTE with MATLABpor Zarrinkoub, HoumanTabla de Contenidos: “…Preface xiii List of Abbreviations xvii 1 Introduction 1 1.1 Quick Overview of Wireless Standards 1 1.2 Historical Profile of Data Rates 4 1.3 IMT-Advanced Requirements 4 1.4 3GPP and LTE Standardization 5 1.5 LTE Requirements 5 1.6 Theoretical Strategies 6 1.7 LTE-Enabling Technologies 7 1.8 LTE Physical Layer (PHY) Modeling 9 1.9 LTE (Releases 8 and 9) 11 1.10 LTE-Advanced (Release 10) 11 1.11 MATLAB(R) and Wireless System Design 11 1.12 Organization of This Book 11 References 12 2 Overview of the LTE Physical Layer 13 2.1 Air Interface 13 2.2 Frequency Bands 14 2.3 Unicast and Multicast Services 14 2.4 Allocation of Bandwidth 16 2.5 Time Framing 17 2.6 Time Frequency Representation 17 2.7 OFDM Multicarrier Transmission 20 2.8 Single-Carrier Frequency Division Multiplexing 23 2.9 Resource Grid Content 24 2.10 Physical Channels 25 2.11 Physical Signals 31 2.12 Downlink Frame Structures 34 2.13 Uplink Frame Structures 35 2.14 MIMO 35 2.15 MIMO Modes 40 2.16 PHY Processing 41 2.17 Downlink Processing 41 2.18 Uplink Processing 43 2.19 Chapter Summary 45 References 46 3 MATLAB(R) for Communications System Design 47 3.1 System Development Workflow 47 3.2 Challenges and Capabilities 48 3.3 Focus 49 3.4 Approach 49 3.5 PHY Models in MATLAB 49 3.6 MATLAB 49 3.7 MATLAB Toolboxes 50 3.8 Simulink 51 3.9 Modeling and Simulation 52 3.10 Prototyping and Implementation 53 3.11 Introduction to System Objects 54 3.12 MATLAB Channel Coding Examples 60 3.13 Chapter Summary 68 References 69 4 Modulation and Coding 71 4.1 Modulation Schemes of LTE 72 4.2 Bit-Level Scrambling 79 4.3 Channel Coding 85 4.4 Turbo Coding 85 4.5 Early-Termination Mechanism 93 4.6 Rate Matching 99 4.7 Codeblock Segmentation 105 4.8 LTE Transport-Channel Processing 107 4.9 Chapter Summary 112 References 113 5 OFDM 115 5.1 Channel Modeling 115 Examples 117 5.2 Scope 121 5.3 Workflow 121 5.4 OFDM and Multipath Fading 122 5.5 OFDM and Channel-Response Estimation 123 5.6 Frequency-Domain Equalization 124 5.7 LTE Resource Grid 124 5.8 Configuring the Resource Grid 125 5.9 Generating Reference Signals 130 5.10 Resource Element Mapping 132 5.11 OFDM Signal Generation 136 5.12 Channel Modeling 137 5.13 OFDM Receiver 140 5.14 Resource Element Demapping 141 5.15 Channel Estimation 143 5.16 Equalizer Gain Computation 145 5.17 Visualizing the Channel 146 5.18 Downlink Transmission Mode 1 147 5.19 Chapter Summary 164 References 165 6 MIMO 167 6.1 Definition of MIMO 167 6.2 Motivation for MIMO 168 6.3 Types of MIMO 168 6.4 Scope of MIMO Coverage 170 6.5 MIMO Channels 170 Implementation 171 6.6 Common MIMO Features 178 6.7 Specific MIMO Features 197 6.8 Chapter Summary 260 References 262 7 Link Adaptation 263 7.1 System Model 264 7.2 Link Adaptation in LTE 265 7.3 MATLAB(R) Examples 266 7.4 Link Adaptations between Subframes 275 7.5 Adaptive Modulation 277 7.6 Adaptive Modulation and Coding Rate 283 7.7 Adaptive Precoding 287 7.8 Adaptive MIMO 291 7.9 Downlink Control Information 294 7.10 Chapter Summary 302 References 303 8 System-Level Specification 305 8.1 System Model 306 8.2 System Model in MATLAB 315 8.3 Quantitative Assessments 316 8.4 Throughput Analysis 325 8.5 System Model in Simulink 326 8.6 Qualitative Assessment 349 8.7 Chapter Summary 351 References 352 9 Simulation 353 9.1 Speeding Up Simulations in MATLAB 353 9.2 Workflow 354 9.3 Case Study: LTE PDCCH Processing 355 9.4 Baseline Algorithm 356 9.5 MATLAB Code Profiling 358 9.6 MATLAB Code Optimizations 360 9.7 Using Acceleration Features 383 9.8 Using a Simulink Model 387 9.9 GPU Processing 399 9.10 Case Study: Turbo Coders on GPU 406 9.11 Chapter Summary 419 10 Prototyping as C/C++ Code 421 10.1 Use Cases 422 10.2 Motivations 422 10.3 Requirements 422 10.4 MATLAB Code Considerations 423 10.5 How to Generate Code 423 10.6 Structure of the Generated C Code 429 10.7 Supported MATLAB Subset 432 10.8 Complex Numbers and Native C Types 436 10.9 Support for System Toolboxes 438 10.10 Support for Fixed-Point Data 444 10.11 Support for Variable-Sized Data 447 10.12 Integration with Existing C/C++ Code 458 10.13 Chapter Summary 471 References 471 11 Summary 473 11.1 Modeling 473 11.2 Simulation 476 11.3 Directions for Future Work 477 11.4 Concluding Remarks 480 Index 483.…”
Publicado 2014
Libro electrónico -
9147por Sundberg, NiklasTabla de Contenidos: “…Transitioning to a low-carbon future -- The energy mix -- Energy and foreign policy -- The importance of energy security in ICT -- Energy consumption from IT hardware -- The calculation for the energy consumption and carbon emission of a notebook -- The calculation for the energy consumption and carbon emission of a desktop -- The calculation for the energy consumption and carbon emission of a server -- Summary of energy consumption and carbon emission of ICT devices -- Understanding your energy consumption patterns -- Step-change to energy resource efficiency -- Buy resource-efficient hardware -- Leverage low-carbon source -- Take advantage of system power management settings -- Going virtual -- Exploring smart technologies -- Summary -- Further reading -- Bibliography -- Chapter 8: Leveraging Your Buying Power -- Drivers for sustainable IT vendor and procurement management -- Essential IT sustainability requirements -- Corporate commitments -- Environmental -- Social -- Product and service -- Circularity -- Create a market for sustainable IT -- Address the hotspots -- The process -- The ABC for sustainable IT procurement -- Sustainable IT vendor management -- Step 1 - establishing and maintaining the program -- Step 2 - onboarding and divesting vendors -- Step 3 - sustainable IT value realization -- Step 4 - vendor life cycle management -- Vendor management sustainability scorecard -- Summary -- Further reading -- Bibliography -- Chapter 9: Sustainability by IT -- Unlocking a more sustainable future -- Carbon emission reporting -- ESG risk management -- Sustainable sourcing and manufacturing -- Environmentally friendly transportation -- Energy-efficient buildings -- Energy resource management -- Hybrid work -- Eco-friendly travel -- Leveraging and promoting e-services -- Product-as-a-Service (PaaS) -- From ownership to usership…”
Publicado 2022
Libro electrónico -
9148Publicado 2014Tabla de Contenidos: “…School-Based Treatment for Anxiety in Children and Adolescents: New Developments in Transportability and Dissemination; Jeremy K. Fox, Kathleen Herzig-Anderson, Daniela Colognori, Catherine E. …”
Libro electrónico -
9149Publicado 2012Tabla de Contenidos: “…Sala Ferusic Arquitectos ; The walls are coming down / takk ; Tienda Mitica / Blur arquitectura ; TUBE lab 1.1 / VAV architects ; Una mesa-jardín itinerante / Ula Iruretagoiena Busturia ; Una sombra reciclada / meva ; Vídeos Postales y Vídeos Retratos / DJarquitectura ; Vivienda Cota 0 / Álvaro Campillos Barrios ; Vivienda modular transportable / Josep Bunyesc ; Vivienda unifamiliar / Eva Llorca Afonso ; Viviendas públicas y aparcamientos / Ciria + Álvarez Gómez Arquitectos-- URV…”
WWW
Libro -
9150por Fernández Fúster, Luis
Publicado 1991Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada)Libro -
9151Publicado 1982Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
9152Publicado 2019Tabla de Contenidos: “…Front Cover -- 5G NR -- Copyright Page -- Contents -- Acknowledgments -- List of Abbreviations -- Introduction and Background -- 1 Introduction to 5G -- 2 Use Cases and Deployment Scenarios -- 2.1 Use Cases -- 2.2 Deployment Scenarios -- 3 Key Performance Indicators, Architectural, System, and Service Requirements -- 3.1 Definition of the Performance Metrics -- 3.2 Test Environments -- 3.3 High-Level Architectural Requirements -- 3.4 System Performance Requirements -- 3.5 Service Requirements -- 4 ITU-R IMT-2020 Standardization Activities -- 5 3GPP 5G Standardization Activities -- 6 Spectrum and Regulations -- 7 Future Outlook -- References -- ITU-R Specifications -- 3GPP Specifications -- Articles, Books, White Papers, and Application Notes -- 1 5G Network Architecture -- 1.1 Design Principles and Prominent Network Topologies -- 1.1.1 Network and Service Requirements -- 1.1.2 Virtualization of Network Functions -- 1.1.2.1 Architectural Aspects -- 1.1.2.2 Functional Aspects -- 1.1.2.3 Operational Aspects -- 1.1.2.4 Legacy Support and Interworking Aspects -- 1.1.3 Separation of Control and User Planes (Software-Defined Networks) -- 1.1.3.1 Architectural Aspects -- 1.1.4 Network Slicing -- 1.1.5 Heterogeneous and Ultra-dense Networks -- 1.1.6 Cloud-RAN and Virtual-RAN -- 1.1.6.1 Architectural Aspects -- 1.1.6.2 Fronthaul Transport and Functional Split Options -- 1.1.6.3 Backhaul Transport Options -- 1.1.7 Mobile Edge Computing -- 1.1.7.1 Service and Deployment Scenarios -- 1.1.7.2 Architectural Aspects -- 1.1.8 Network Sharing -- 1.2 Reference Architectures -- 1.2.1 Access Network -- 1.2.1.1 Reference Architecture: Network Entities and Interfaces -- 1.2.1.1.1 Xn Control-Plane/User-Plane Functions and Procedures -- 1.2.1.1.2 F1 Control-Plane/User-Plane Functions and Procedures -- 1.2.1.1.3 E1 Control-Plane Functions and Procedures…”
Libro electrónico -
9153Publicado 2022Tabla de Contenidos: “…9.7 Conclusion and Future Work -- References -- 10 Hierarchical Elitism GSO Algorithm For Pattern Recognition -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Methodology -- 10.3.1 Additive Kuan Speckle Noise Filtering Model -- 10.3.2 Hierarchical Elitism Gene GSO of MNN in Pattern Recognition -- 10.4 Experimental Setup -- 10.5 Discussion -- 10.5.1 Scenario 1: Computational Time -- 10.5.2 Scenario 2: Computational Complexity -- 10.5.3 Scenario 3: Pattern Recognition Accuracy -- 10.6 Conclusion -- References -- 11 Multidimensional Survey of Machine Learning Application in IoT (Internet of Things) -- 11.1 Machine Learning-An Introduction -- 11.1.1 Classification of Machine Learning -- 11.2 Internet of Things -- 11.3 ML in IoT -- 11.3.1 Overview -- 11.4 Literature Review -- 11.5 Different Machine Learning Algorithm -- 11.5.1 Bayesian Measurements -- 11.5.2 K-Nearest Neighbors (k-NN) -- 11.5.3 Neural Network -- 11.5.4 Decision Tree (DT) -- 11.5.5 Principal Component Analysis (PCA) t -- 11.5.6 K-Mean Calculations -- 11.5.7 Strength Teaching -- 11.6 Internet of Things in Different Frameworks -- 11.6.1 Computing Framework -- 11.6.1.1 Fog Calculation -- 11.6.1.2 Estimation Edge -- 11.6.1.3 Distributed Computing -- 11.6.1.4 Circulated Figuring -- 11.7 Smart Cities -- 11.7.1 Use Case -- 11.7.1.1 Insightful Vitality -- 11.7.1.2 Brilliant Portability -- 11.7.1.3 Urban Arranging -- 11.7.2 Attributes of the Smart City -- 11.8 Smart Transportation -- 11.8.1 Machine Learning and IoT in Smart Transportation -- 11.8.2 Markov Model -- 11.8.3 Decision Structures -- 11.9 Application of Research -- 11.9.1 In Energy -- 11.9.2 In Routing -- 11.9.3 In Living -- 11.9.4 Application in Industry -- 11.10 Machine Learning for IoT Security -- 11.10.1 Used Machine Learning Algorithms -- 11.10.2 Intrusion Detection -- 11.10.3 Authentication -- 11.11 Conclusion -- References…”
Libro electrónico -
9154por Lewis, Ted G.Tabla de Contenidos: “…-- 5.3.2 Climate Change and Rot - The New Threats -- 5.4 The Architecture of Water Systems -- 5.4.1 The Law of the River -- 5.4.2 Resiliency of Water Pipeline Networks -- 5.5 Hetch Hetchy Water -- 5.5.1 Risk Analysis -- 5.5.2 Resilience Analysis -- 5.6 Threat Analysis -- 5.6.1 The Rational Actor -- 5.6.2 Hetch Hetchy Threat Analysis -- 5.6.3 Chem-Bio -- 5.6.4 Earthquakes -- 5.7 Water Resilience -- 5.7.1 Save the Pineapple Express -- 5.7.2 Gray Water -- 5.7.3 Desalination -- 5.7.4 Exemplar Israel -- 5.8 Discussion -- References -- Chapter 6 Transportation Renewed -- 6.1 Transitioning a Vast and Complex Sector -- 6.1.1 Government Leads the Way -- 6.1.2 Safety and Security -- 6.2 Roads at TOC Risk -- 6.2.1 The Road to Prosperity -- 6.2.2 Economic Impact -- 6.2.3 The National Highway System (NHS) -- 6.2.4 The Interstate Highway Network is Resilient -- 6.2.5 The NHS is Safer -- 6.2.6 The Future is Electric -- 6.3 Rail and Railroads -- 6.3.1 Birth of Regulation -- 6.3.2 Freight Trains -- 6.3.3 Passenger Rail -- 6.3.4 Terrorist Target Passenger Trains -- 6.3.5 Economics of Rail -- 6.4 Air Transportation -- 6.4.1 Resilience of the Hub-and-Spoke Network -- 6.4.2 Security of Commercial Air Travel -- 6.4.3 How Safe and Secure is Flying in the United States? …”
Publicado 2023
Libro electrónico -
9155Publicado 2011Tabla de Contenidos: “…Continuación de la ruta meta de degradación del 3,4-diOH-PhAc - Gen hpaE - Gen hpaF - Gen hpaG - Gen·hpaH - Gen hpaI 4.2.1.4. Transporte del 4-OH-PhAc - Gen hpaX 4.2.1.5. Regulación de la ruta de degradación de1 3,4-diOH-PhAc - Gen hpaE - Gen hpaR - Gen tetR 4.2.2. …”
Enlace del recurso
Libro -
9156por Morales Urbina, Esther MaríaTabla de Contenidos: “…ORIENTACIONES PARA EL ESTUDIO DE LA UNIDAD VI -- COMPETENCIAS DE LA UNIDAD VI -- ESQUEMA DE CONTENIDOS DE LA UNIDAD VI -- 6.1 DEFINICIÓN DE DETERMINANTE -- 6.2 CÁLCULO DE DETERMINANTES POR LA REGLA DE SARRUS -- 6.3 CÁLCULO DE DETERMINANTES POR LA FÓRMULA DE EXPANSIÓN DE LAPLACE -- 6.4 PROPIEDADES DE LOS DETERMINANTES -- 6.5 RANGO DE UNA MATRIZ -- 6.6 ADJUNTA DE UNA MATRIZ -- 6.7 APLICACIÓN DE LA ADJUNTA Y DETERMINANTES PARA HALLAR LA MATRIZ INVERSA -- 6.8 SOLUCIÓN DE SISTEMAS DE ECUACIONES LINEALES POR MATRIZ INVERSA -- 6.9 SOLUCIÓN DE SISTEMAS DE ECUACIONES LINEALES POR LA REGLA DE CRAMER -- RESUMEN DE LA UNIDAD IV -- ACTIVIDADES DE EVALUACIÓN DE LA UNIDAD VI -- EJERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD VI -- BIBLIOGRAFÍA DE LA UNIDAD VI -- UNIDAD VII - PROGRAMACIÓN LINEAL -- ORIENTACIONES PARA EL ESTUDIO DE LA UNIDAD VII -- COMPETENCIAS DE LA UNIDAD VII -- ESQUEMA DE CONTENIDOS DE LA UNIDAD VII -- 7.1 PROGRAMACIÓN LINEAL -- 7.2 FORMULACIÓN DE MODELOS MATEMÁTICOS -- 7.3 PROPIEDADES GENERALES QUE DEBE CUMPLIR UN PROBLEMA DE PROGRAMACIÓN LINEAL -- 7.4 TIPOS DE SOLUCIÓN EN LA PROGRAMACIÓN LINEAL -- 7.5 PROBLEMAS DE OPTIMIZACIÓN DE UNA FUNCIÓN SUJETA A RESTRICCIONES -- 7.6 EL PROBLEMA DE LOS TRANSPORTES COMO CASO PARTICULAR -- RESUMEN DE LA UNIDAD VII -- ACTIVIDADES DE EVALUACIÓN DE LA UNIDAD VII -- EJERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD VII -- BIBLIOGRAFÍA DE LA UNIDAD VII -- RESPUESTAS A LOS EJERCICIOS DE AUTOEVALUACIÓN -- BIBLIOGRAFÍA GENERAL…”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
9157por Iglesias, Omar A.Tabla de Contenidos: “…INFORME (...) -- PROBLEMA DE TRANSPORTE -- MODELO DE TRANSBORDO -- BIBLIOGRAFÍA -- PROPUESTAS DE TRABAJO -- CAPÍTULO 10. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9158por Pérez Chávez, JoséTabla de Contenidos: “…Opción para enviar documentos digitales a través de los proveedores de certificación de recepción de documentos digitales -- CAPITULO IV -- PLAZO DE CONSERVACION DE LA CONTABILIDAD -- Plazo de conservación -- Contabilidad y documentación correspondientes a actos cuyos efectos fiscales se prolongan en el tiempo -- Documentación por los conceptos por los que se haya promovido algún recurso o juicio -- Conservación de actas constitutivas y otra documentación -- Opción de conservar información contable en discos ópticos -- Documentos con e.firma o sello digital -- Documentos que acrediten el origen y procedencia de una pérdida fiscal o préstamo -- Contribuyentes exceptuados de la obligación de conservar la contabilidad y proporcionar información a las autoridades fiscales -- CAPITULO V -- OTROS ASPECTOS FISCALES DE LA CONTABILIDAD -- Obligación de contar con equipos y programas informáticos para llevar los controles volumétricos en la fabricación, producción, procesamiento, transporte, almacenamiento, distribución o enajenación de hidrocarburos o petrolíferos -- Documentación de personas que no están obligadas a llevar contabilidad -- Registro de la destrucción de mercancías -- Contabilidad de las pérdidas de sociedades fusionantes -- Contabilidad de los contribuyentes residentes en el país con establecimientos en el extranjero -- Contabilidad de contribuyentes que cuentan con inversiones en territorios con regímenes fiscales preferentes -- Aplicación de las NIF en las operaciones con partes relacionadas -- Inutilización parcial de los libros o demás registros contables -- Destrucción o inutilización total de libros y demás registros contables -- Contabilidad de comisionistas para efectos del IVA -- Almacenamiento de comprobantes fiscales digitales -- CAPITULO VI -- FACULTADES DE LAS AUTORIDADES FISCALES E INFRACCIONES Y DELITOS FISCALES…”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9159por Dickinger, AstridTabla de Contenidos: “…Cover -- 1 INTRODUCTION -- 1.1 RESEARCH QUESTIONS AND AIMS -- 1.2 IMPLICATIONS -- 1.3 RESEARCH DESIGN -- 1.4 STRUCTURE -- 2 THE EXPLORATIVE RESEARCH -- 2.1 A BRIEF SUMMARY OF QUALITATIVE RESEARCH -- 2.1.1 Advantages and Disadvantages of Qualitative Research Methods -- 2.1.2 Preparing for the Field and the Selection of Experts -- 2.1.3 Qualitative Interviewing -- 2.1.4 Qualitative Data Processing and Analyzing -- 2.2 CARRYING OUT THE QUALITATIVE RESEARCH -- 3 THE M-COMMERCE VALUE CHAIN -- 3.1 THE BASIC MODEL -- 3.2 INFRASTRUCTURE AND SERVICES -- 3.2.1 Mobile Transport -- 3.2.2 Mobile Interface and Applications -- 3.2.2.1 Mobile Phones -- 3.2.2.1.1 Phones as Portable Entertainment Players -- 3.2.2.1.2 Phones as a New Marketing Tool for Retailers and Manufacturers -- 3.2.2.1.3 Phones as a Multi-Channel Shopping Device -- 3.2.2.1.4 Phones as Portable Navigation Guides -- 3.2.2.1.5 Phones as Tickets and Money -- 3.2.2.1.6 Phones as a Mobile Internet Device -- 3.2.3 Mobile Service Technologies and Delivery Support -- 3.2.3.1 Messaging Services -- 3.2.3.2 Security and Privacy -- 3.3 CONTENT -- 3.3.1 Content Creation -- 3.3.2 Content Packaging -- 3.3.3 Market Making -- 3.4 THE MOBILE USER -- 4 MOBILE SERVICES -- 4.1 CHARACTERISTICS OF MOBILE SERVICES -- 4.2 TYPES OF MOBILE SERVICES -- 4.2.1 Information Services -- 4.2.2 Entertainment Services -- 4.2.3 Transaction Services -- 4.2.4 Communication Services -- 4.2.5 Mobile Marketing Services -- 4.2.5.1 Mobile Branding -- 4.2.5.2 Mobile CRM -- 4.2.5.3 Mobile Advertising -- 4.2.5.4 Mobile Market Research -- 5 THEORETICAL AND METHODOLOGICAL FRAMEWORK -- 5.1 RELEVANCE OF THE THEORETICAL FRAMEWORK -- 5.2 DIFFUSION AND ADOPTION THEORIES -- 5.2.1 Diffusion of Innovations -- 5.2.2 Social Cognitive Theory -- 5.2.3 Theory of Planned Behavior & -- Theory of Reasoned Action -- 5.2.4 The Technology Acceptance Model…”
Publicado 2007
Libro electrónico -
9160Publicado 2018Tabla de Contenidos: “…-- Pure-play public cloud strategy -- Public cloud benefits -- Need for agility -- Ability to experiment without upfront cost -- Reducing operational overheads -- Ability to consume enhanced services -- Shortcomings of a public cloud -- Cost -- Control/customizability -- Compliance -- Fear of lock-in -- Hybrid cloud case study -- Summary - maximizing benefits -- Chapter 3: Hybrid Cloud Building Blocks -- The story of a web application -- Transport level -- Case 1 - without a proxy -- Case 2 - with a proxy -- Application level -- Web tier -- Application tier -- Database tier -- Putting it all together -- Use cases of a hybrid cloud -- Isolated use case -- Distributed use case -- Co-Existent use case -- Cloud bursting -- Using cognitive services -- Supporting application use cases -- Backup and disaster recovery in the cloud -- Decoupling the tiers -- Case in point - architecture of OpenStack -- Services to enable a hybrid cloud -- Network connectivity -- DNS service -- Public cloud services for hybrid deployment -- Amazon Web Services (AWS) -- Storage gateway -- Direct connect -- Route 53 -- Amazon EC2 run command -- VMware cloud on AWS -- Microsoft Azure -- Azure Stack -- Azure Site Recovery (ASR) -- Azure Traffic Manager -- Summary - setting up hybrid cloud -- Chapter 4: Architecting the Underpinning Services -- Networking -- Underlay network…”
Libro electrónico