Mostrando 36,921 - 36,940 Resultados de 37,006 Para Buscar '"XVII"', tiempo de consulta: 0.22s Limitar resultados
  1. 36921
    Publicado 2008
    Tabla de Contenidos: “…Roque Viejo Viñas -- Intervención en la rotonda de acceso a Santa Susanna (Maresme, Barcelona), A Alcolea+Tárrago Asociados -- Intervención en las Gracias Reales de Formentera, S. XVII (Balears), Arq. Marià Castelló Martínez -- La Casona de Somahoz (Los Corrales de Buelna, Cantabria), Arq. …”
    Accés lliure
    Libro
  2. 36922
    por Iglesia Católica.
    Publicado 1727
    Tabla de Contenidos: “…Universidad de Sevilla-Pleitos-S. XVII. Licht y Barrera, Andrés. Puerta, Manuel de la, imp. …”
    Colección
  3. 36923
    “…Their publications in this field have appeared in books and international peer-reviewed journals, such as, for example, their article 'The Islamic Statute of the Mudejars in the Light of a New Source' (Al-Qantara XVII, 1996)"--…”
    Libro
  4. 36924
    por Virtanen, Tuomas
    Publicado 2012
    Tabla de Contenidos: “…-- List of Contributors xv -- Acknowledgments xvii -- 1 Introduction 1 / Tuomas Virtanen, Rita Singh, Bhiksha Raj -- 1.1 Scope of the Book 1 -- 1.2 Outline 2 -- 1.3 Notation 4 -- Part One FOUNDATIONS -- 2 The Basics of Automatic Speech Recognition 9 / Rita Singh, Bhiksha Raj, Tuomas Virtanen -- 2.1 Introduction 9 -- 2.2 Speech Recognition Viewed as Bayes Classification 10 -- 2.3 Hidden Markov Models 11 -- 2.3.1 Computing Probabilities with HMMs 12 -- 2.3.2 Determining the State Sequence 17 -- 2.3.3 Learning HMM Parameters 19 -- 2.3.4 Additional Issues Relating to Speech Recognition Systems 20 -- 2.4 HMM-Based Speech Recognition 24 -- 2.4.1 Representing the Signal 24 -- 2.4.2 The HMM for a Word Sequence 25 -- 2.4.3 Searching through all Word Sequences 26 -- References 29 -- 3 The Problem of Robustness in Automatic Speech Recognition 31 / Bhiksha Raj, Tuomas Virtanen, Rita Singh -- 3.1 Errors in Bayes Classification 31 -- 3.1.1 Type 1 Condition: Mismatch Error 33 -- 3.1.2 Type 2 Condition: Increased Bayes Error 34 -- 3.2 Bayes Classification and ASR 35 -- 3.2.1 All We Have is a Model: A Type 1 Condition 35 -- 3.2.2 Intrinsic Interferences - Signal Components that are Unrelated to the Message: A Type 2 Condition 36 -- 3.2.3 External Interferences - The Data are Noisy: Type 1 and Type 2 Conditions 36 -- 3.3 External Influences on Speech Recordings 36 -- 3.3.1 Signal Capture 37 -- 3.3.2 Additive Corruptions 41 -- 3.3.3 Reverberation 42 -- 3.3.4 A Simplified Model of Signal Capture 43 -- 3.4 The Effect of External Influences on Recognition 44 -- 3.5 Improving Recognition under Adverse Conditions 46 -- 3.5.1 Handling the Model Mismatch Error 46 -- 3.5.2 Dealing with Intrinsic Variations in the Data 47 -- 3.5.3 Dealing with Extrinsic Variations 47 -- References 50 -- Part Two SIGNAL ENHANCEMENT -- 4 Voice Activity Detection, Noise Estimation, and Adaptive Filters for Acoustic Signal Enhancement 53 / Rainer Martin, Dorothea Kolossa -- 4.1 Introduction 53 -- 4.2 Signal Analysis and Synthesis 55.…”
    Libro electrónico
  5. 36925
  6. 36926
    Publicado 2023
    Tabla de Contenidos: “…A de Nuestro Código Sustantivo Penal: «El particular. . . -- CAPÍTULO XVII Usurpación y simulación de funciones públicas(pp. 415-424) -- CAPÍTULO XVII Usurpación y simulación de funciones públicas(pp. 415-424) -- https://doi.org/10.2307/jj.11786250.21 -- https://www.jstor.org/stable/jj.11786250.21 -- Se define en el DRAE, usurpar como: «Arrogarse la dignidad, empleo u oficio de otro, y usarlos como si fueran propios». …”
    Libro electrónico
  7. 36927
  8. 36928
    Publicado 2020
    Tabla de Contenidos: “…Preface xvii -- Acknowledgment xix -- 1 Public Safety Networks from TETRA to Commercial Cellular Networks 1 -- 1.1 Introduction 1 -- 1.2 Evaluation of TETRA and TETRAPOL 3 -- 1.3 Understanding TETRA Modes of Operation 4 -- 1.3.1 TETRA Security 4 -- 1.3.2 Evaluating the Challenge of Data Transmission and Possible Solutions on TETRA Networks 5 -- 1.3.3 Comparing Public Safety Networks to the Commercial Cellular Networks 6 -- 1.3.3.1 Services 6 -- 1.3.3.2 Networks 6 -- 1.3.4 How to Overcome These Differences 7 -- 1.3.4.1 Limitations of TETRA 7 -- 1.3.4.2 Need for Broadband 8 -- 1.4 Unifying the Two Worlds of Public Safety Networks and Commercial Networks 8 -- 1.4.1 User Requirements 8 -- 1.4.2 Public Safety Network Migration 9 -- 1.4.3 Deployment Models 9 -- 1.5 The Transition from TETRA to LTE and the Current Initiatives 10 -- 1.5.1 Network Softwarization 10 -- 1.5.2 LTE Technology for Public Safety Communications 10 -- 1.5.3 LTE as a Public Safety Mobile Broadband Standard 11 -- 1.5.4 Security Enhancements for Public Safety LTE Features 11 -- 1.6 Conclusion 12 -- References 12 -- 2 Public Safety Networks Evolution Toward Broadband and Interoperability 15 -- 2.1 Introduction 15 -- 2.1.1 Communication Technology 15 -- 2.1.2 Wireless Communication Systems 16 -- 2.1.3 Government Involvement 17 -- 2.2 Evolution to Broadband Systems 18 -- 2.2.1 Determining Factors 19 -- 2.2.2 Evolution Process 21 -- 2.2.3 Broadband System Architecture 22 -- 2.2.4 Advantages of Broadband Systems 25 -- 2.3 Interoperability 28 -- 2.3.1 Developing an Interoperability Public Safety System 28 -- 2.3.2 Platform and Technology 29 -- 2.3.3 Benefits of Evolution 32 -- 2.4 Conclusion 33 -- 2.5 Recommendations 34 -- References 35 -- 3 Public Safety Communication Evolution 37 -- 3.1 Introduction 37 -- 3.1.1 Public Safety Network and Emergency Communication Networks 37 -- 3.2 Public Safety Standardization 39 -- 3.3 Evolution of Public Safety Communication 39 -- 3.3.1 Mission-Critical Voice 40 -- 3.3.2 Mission-Critical Data 41.…”
    Libro electrónico
  9. 36929
    Publicado 2014
    Tabla de Contenidos: “…-- About the Authors xv -- Acknowledgments xvii -- List of Abbreviations and Acronyms xix -- 1 Introduction to Broadband Access Networks and Technologies 1 -- 1.1 Introduction 1 -- 1.2 A Brief History of the Access Network 2 -- 1.3 Digital Subscriber Lines (DSL) 3 -- 1.3.1 DSL Technologies and Their Evolution 3 -- 1.3.2 DSL System Technologies 5 -- 1.4 Hybrid Fiber-Coaxial Cable (HFC) 5 -- 1.5 Power Line Communications (PLC) 6 -- 1.6 Fiber in the Loop (FITL) 7 -- 1.7 Wireless Broadband Access 10 -- 1.8 Direct Point-to-Point Connections 12 -- Appendix 1.A: Voiceband Modems 12 -- 2 Introduction to Fiber Optic Broadband Access Networks and Technologies 15 -- 2.1 Introduction 15 -- 2.2 A Brief History of Fiber in the Loop (FITL) 16 -- 2.3 Introduction to PON Systems 18 -- 2.3.1 PON System Overview 18 -- 2.3.2 PON Protocol Evolution 19 -- 2.4 FITL Technology Considerations 21 -- 2.4.1 Optical Components 21 -- 2.4.2 Powering the Loop 22 -- 2.4.3 System Power Savings 23 -- 2.4.4 PON Reach Extension 25 -- 2.5 Introduction to PON Network Protection 30 -- 2.5.1 Background on Network Protection 31 -- 2.5.2 PON Facility Protection 31 -- 2.5.3 OLT Function Protection 35 -- 2.5.4 ONU Protection 40 -- 2.5.5 Conclusions Regarding Protection 42 -- 2.6 Conclusions 42 -- Appendix 2.A: Subscriber Power Considerations 43 -- References 43 -- Further Reading 43 -- 3 IEEE Passive Optical Networks 45 -- 3.1 Introduction 45 -- 3.2 IEEE 802.3ah Ethernet-based PON (EPON) 45 -- 3.2.1 EPON Physical Layer 46 -- 3.2.2 Signal Formats 46 -- 3.2.3 MAC Protocol 48 -- 3.2.4 Encryption and Security 49 -- 3.2.5 Forward Error Correction (FEC) 50 -- 3.2.6 ONU Discovery and Activation 51 -- 3.2.7 ONU Ranging Mechanism 52 -- 3.2.8 EPON OAM 52 -- 3.2.9 Dynamic Bandwidth Assignment (DBA) 53 -- 3.3 IEEE 802.3av 10Gbit/s Ethernet-based PON (10G EPON) 54 -- 3.3.1 10G EPON Physical Layer 54 -- 3.3.2 Signal Format 58 -- 3.3.3 MAC Protocol 59 -- 3.3.4 Forward Error Correction 59 -- 3.3.5 ONU Discovery and Activation 61.…”
    Libro electrónico
  10. 36930
  11. 36931
    por Romero García, Eladio
    Publicado 2015
    “…</P><P>- Un ensayo que abarca el controvertido tema de las contradicciones de Roma (y el Papado) en los siglos XVI y XVII. Un periodo convulso, política y religiosamente, en el que se persiguió a los grandes pensadores, como Bruno o Galileo.…”
    Texto completo en Odilo
    Otros
  12. 36932
  13. 36933
    Publicado 2016
    “…El presente volumen refleja este panorama a través de capítulos dedicados a la interpretación de la expresión formal y la doctrina de textos médicos concretos, que abarcan enciclopedias griegas de la Antigüedad Tardía, compilaciones latinas de distintas épocas, escritos bizantinos, tratados latinos y castellanos producidos por el Humanismo médico, y recreaciones de la ‘literatura de problemas’ publicadas entre finales del siglo XV y el XVII…”
    Libro
  14. 36934
    Publicado 2023
    “…En un estilo sencillo, y discurso breve, no rehúye ninguno de los aspectos debatidos por la doctrina en ese ámbito, presentando su propio criterio, con amplio apoyo legislativo y doctrinal, desde la Edad Media hasta el siglo XVII." -- Contracubierta…”
    Libro
  15. 36935
    Publicado 2017
    “…publicadas entre finales del siglo XV y el XVII…”
    Texto completo en Odilo
    Otros
  16. 36936
  17. 36937
    por Allendesalazar, Mercedes
    Publicado 1988
    “…Leer a Spinoza -señala Mercedes Allendesalazar Olaso- no exige más que dejar de tener miedo a las palabras del siglo XVII, dejar de tener miedo al pensamiento mismo, a las demostraciones geométricas, y atreverse a acceder a ideas sin echar en falta imágenes o mediaciones supuestamente necesarias…”
    Libro
  18. 36938
    Publicado 2007
    “…El afortunado lector español encontrará ambas partes reunidas en lo que, en la mejor tradición de los panfletos anónimos del siglo XVII, constituye un texto útil para comprender y necesario para defenderse"…”
    Libro
  19. 36939
    Publicado 2006
    “…Al proyectar esta nueva versión de San Francisco sobre la arquitectura virreinal de Lima, deriva de ello un conocimiento más pleno, renovado y enriquecido de la arquitectura de Lima en los siglos XVII y XVIII…”
    Libro electrónico
  20. 36940
    Publicado 2014
    Tabla de Contenidos: “…Preface xvii -- Acronyms xix -- Notation xxiii -- 1 Introduction 1 -- 1.1 Background and Context 1 -- 1.1.1 Early Exploration of Underwater Acoustics 1 -- 1.1.2 Underwater Communication Media 2 -- 1.1.3 Underwater Systems and Networks 3 -- 1.2 UWA Channel Characteristics 3 -- 1.2.1 Sound Velocity 3 -- 1.2.2 Propagation Loss 5 -- 1.2.3 Time-Varying Multipath 7 -- 1.2.4 Acoustic Propagation Models 10 -- 1.2.5 Ambient Noise and External Interference 11 -- 1.3 Passband Channel Input / Output Relationship 11 -- 1.3.1 Linear Time-Varying Channel with Path-Specific Doppler Scales 12 -- 1.3.2 Linear Time-Varying Channels with One Common Doppler Scale 13 -- 1.3.3 Linear Time-Invariant Channel 13 -- 1.3.4 Linear Time-Varying Channel with Both Amplitude and Delay Variations 14 -- 1.3.5 Linear Time-Varying Channel with Frequency-Dependent Attenuation 15 -- 1.4 Modulation Techniques for UWA Communications 15 -- 1.4.1 Frequency Hopped FSK 15 -- 1.4.2 Direct Sequence Spread Spectrum 16 -- 1.4.3 Single Carrier Modulation 17 -- 1.4.4 Sweep-Spread Carrier (S2C) Modulation 18 -- 1.4.5 Multicarrier Modulation 18 -- 1.4.6 Multi-Input Multi-Output Techniques 19 -- 1.4.7 Recent Developments on Underwater Acoustic Communications 20 -- 1.5 Organization of the Book 20 -- 2 OFDMBasics 23 -- 2.1 Zero-Padded OFDM 23 -- 2.1.1 Transmitted Signal 23 -- 2.1.2 Receiver Processing 26 -- 2.2 Cyclic-Prefixed OFDM 27 -- 2.2.1 Transmitted Signal 27 -- 2.2.2 Receiver Processing 28 -- 2.3 OFDM Related Issues 28 -- 2.3.1 ZP-OFDM versus CP-OFDM 28 -- 2.3.2 Peak-to-Average-Power Ratio 29 -- 2.3.3 Power Spectrum and Bandwidth 29 -- 2.3.4 Subcarrier Assignment 30 -- 2.3.5 Overall Data Rate 30 -- 2.3.6 Design Guidelines 31 -- 2.4 Implementation via Discrete Fourier Transform 31 -- 2.5 Challenges and Remedies for OFDM 32 -- 2.5.1 Benefits of Diversity Combining and Channel Coding 33 -- 2.6 MIMO OFDM 36 -- 2.7 Bibliographical Notes 38 -- 3 Nonbinary LDPC Coded OFDM 39 -- 3.1 Channel Coding for OFDM 39 -- 3.1.1 Channel Coding 39.…”
    Libro electrónico