Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Science: general issues 924
- Medicine 368
- History 283
- Neurosciences 177
- Psychology 171
- Education 136
- Immunology 133
- Law 125
- Economics 122
- Historia 99
- Botany & plant sciences 93
- Medical microbiology & virology 89
- Microbiology (non-medical) 89
- Physiology 89
- Management 85
- Study and teaching 79
- Philosophy 78
- Pharmacology 71
- Research 66
- History and criticism 65
- Civil engineering, surveying & building 64
- Development 61
- Social aspects 61
- Economic conditions 56
- Medical genetics 56
- Mathematics 50
- Politics and government 50
- Zeitschrift 48
- Application software 47
- Périodiques 45
-
1481Publicado 2023Tabla de Contenidos: “…13.1.3 Definition einer mehrdimensionalen Tabelle -- 13.1.4 Adressierung von mehrdimensionalen Tabellen -- 13.2 Normalindizierung (Subskribierung) -- 13.3 Spezialindizierung -- 13.3.1 INDEXED BY-Zusatz -- 13.3.2 Vorteile der Spezialindizierungsmethode -- 13.3.3 Die relative Adresse im Spezialindex -- 13.3.4 Relative Spezialindizierung -- 13.3.5 DEPENDING ON-Zusatz -- 13.3.6 SET-Anweisung -- 13.3.7 USAGE INDEX-Klausel -- 13.4 Vergleich zwischen Normal- und Spezialindizierung -- 13.5 Initialisieren von Tabellen -- 13.5.1 VALUE-Klausel -- 13.5.2 REDEFINES-Klausel -- 13.6 Sequenzielles Durchsuchen einer Tabelle mit der SEARCH-Anweisung -- 13.6.1 VARYING-Zusatz -- 13.6.2 AT END-Zusatz -- 13.6.3 WHEN-Zusatz -- 13.6.4 CONTINUE -- 13.6.5 Durchsuchen einer mehrdimensionalen Tabelle -- 13.7 Binäres Durchsuchen einer Tabelle -- 13.7.1 ASCENDING/DESCENDING KEY-Zusatz -- 13.7.2 Sortieren einer Tabelle mit der SORT-Anweisung -- 13.7.3 SEARCH ALL-Anweisung -- Kapitel 14: Verarbeiten von Zeichenketten -- 14.1 INSPECT-Anweisung -- 14.1.1 Zählen mit TALLYING -- 14.1.2 BEFORE und AFTER -- 14.1.3 Ersetzen mit REPLACING -- 14.1.4 Konvertieren mit CONVERTING -- 14.2 STRING-Anweisung -- 14.3 UNSTRING-Anweisung -- Kapitel 15: Sequenzielle Dateien -- 15.1 Eintragungen in der ENVIRONMENT DIVISION -- 15.1.1 SELECT-Klausel -- 15.1.2 ASSIGN-Klausel -- 15.1.3 ORGANIZATION-Klausel -- 15.1.4 ACCESS MODE-Klausel -- 15.1.5 FILE STATUS-Klausel -- 15.1.6 Sonstige Klauseln -- 15.2 Eintragungen in der DATA DIVISION -- 15.2.1 RECORD CONTAINS-Klausel -- 15.2.2 BLOCK CONTAINS-Klausel -- 15.2.3 LINAGE-Klausel -- 15.2.4 CODE-SET-Klausel -- 15.2.5 Datensatzbeschreibung -- 15.3 Anweisungen in der PROCEDURE DIVISION -- 15.3.1 OPEN-Anweisung -- 15.3.2 READ-Anweisung -- 15.3.3 WRITE-Anweisung…”
Libro electrónico -
1482Publicado 2018Tabla de Contenidos: “…5.1.2.1 Cyclic Pre x OFDM -- 5.1.2.2 Windowed OFDM -- 5.1.2.3 Filtered OFDM -- 5.1.2.4 Universally Filtered OFDM -- 5.1.3 Filter Bank-Based Waveforms -- 5.1.3.1 FBMC-OQAM -- 5.1.3.2 FBMC-QAM -- 5.2 Single Carrier DFTS-OFDM -- 5.3 Waveform Design Requirements for 5G NR -- 5.4 Key Performance Indicator for NR Waveform Design -- 5.5 Waveform Comparison for NR -- 5.5.1 Frequency Localization -- 5.5.2 Power Ef ciency -- 5.5.3 Time-Varying Fading Channel -- 5.5.4 Baseband Complexity -- 5.5.4.1 CP-OFDM -- 5.5.4.2 W-OFDM -- 5.5.4.3 UF-OFDM -- 5.5.4.4 FBMC-OQAM -- 5.5.5 Phase-Noise Robustness Comparison -- 5.5.5.1 Phase-Noise Effect in OFDM -- 5.5.5.2 Phase-Noise Effect in FBMC-QAM -- 5.5.5.3 Phase-Noise Effect in FBMC-OQAM -- References -- 6 NR Waveform -- 6.1 Suitability of OFDM for NR -- 6.2 Scalable OFDM for NR -- 6.2.1 Why 15 kHz as Baseline Numerology? …”
Libro electrónico -
1483por Kumar, K.S.SureshTabla de Contenidos: “…Cover -- Dedication -- Brief Contents -- Contents -- Preface -- Acknowledgements -- Chapter 1 : Circuit Variables and Circuit Elements -- 1.1 Electromotive Force, Potential and Voltage -- 1.1.1 Force Between Two Moving Point Charges and Retardation Effect -- 1.1.2 Electric Potential and Voltage -- 1.1.3 Electromotive Force and Terminal Voltage of a Steady Source -- 1.2 A Voltage Source with a Resistance Connected at its Terminals -- 1.2.1 Steady-State Charge Distribution in the System -- 1.2.2 Drift Velocity and Current Density -- 1.2.3 Current Intensity -- 1.2.4 Conduction and Energy Transfer Process -- 1.2.5 Two-Terminal Resistance Element -- 1.2.6 A Time-Varying Voltage Source with Resistance Across it -- 1.3 Two-Terminal Capacitance -- 1.4 Two-Terminal Inductance -- 1.4.1 Induced Electromotive Force and its Location in a Circuit -- 1.4.2 Relation between induced electromotive force and current -- 1.4.3 Farady's Law and Induced Electromotive Force -- 1.4.4 The Issue of a Unique Voltage Across a Two-Terminal Element -- 1.4.5 The Two-Terminal Inductance -- 1.5 Ideal Independent Two-Terminal Electrical Sources -- 1.5.1 Ideal Independent Voltage Source -- 1.5.2 Ideal Independent Current Source -- 1.5.3 Ideal Short-Circuit Element and Ideal Open-Circuit Element -- 1.6 Power and Energy Relations for Two-Terminal Elements -- 1.6.1 Passive Sign Convention -- 1.6.2 Power and Energy in Two-Terminal Elements -- 1.7 Classification of Two-Terminal Elements -- 1.7.1 Lumped and Distributed Elements -- 1.7.2 Linear and Non-linear Elements -- 1.7.3 Bilateral and Non-Bilateral Elements -- 1.7.4 Passive and Active Elements -- 1.7.5 Time-Invariant and Time-Variant Elements -- 1.8 Multi-Terminal Circuit Elements -- 1.8.1 Ideal Dependent Sources -- 1.9 Summary -- 1.10 Problems -- Chapter 2 : Basic Circuit Laws -- 2.1 Kirchhoff's Voltage Law (KVL)…”
Publicado 2013
Libro electrónico -
1484Publicado 1995Tabla de Contenidos: “…Sabaté Bosch -- Otras aplicaciones del vino y sus derivados en la medicina popular, con algunas curiosidades más, obtenidas del "Libro del Prior" / Josep M. Sabaté Bosch -- Varis. Notícia del conreu de la vinya a l'antic règim. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Pública Episcopal del Seminario de Barcelona, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de la Universidad de Navarra)Libro -
1485Publicado 2017Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
Libro -
1486
-
1487
-
1488
-
1489
-
1490
-
1491
-
1492
-
1493
-
1494
-
1495
-
1496
-
1497
-
1498Publicado 1945Seriada digital
-
1499
-
1500