Mostrando 5,141 - 5,160 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.14s Limitar resultados
  1. 5141
    Publicado 2017
    Tabla de Contenidos: “…11.6 The Tribology of Joint Replacements: Impact on Joint Lifetime -- 11.7 Point to the Future -- 11.8 Thought Exercise: Short-Term Surgical Viability Versus Long-Term Survival -- 11.9 Other Schemes to Reduce the Wear on Sterilized Surfaces -- 11.10 Conclusions -- 11.11 Problems -- References -- 12 Neural Interventions -- 12.1 Introduction -- 12.2 Aneurysm and Cerebrovascular Modulation -- 12.2.1 Clips -- 12.2.2 Coils -- 12.2.3 Embolic Fluids -- 12.2.3.1 Dispersion-based Embolics -- 12.2.3.2 Reactive Liquid Embolics -- 12.2.4 Filling of Other Defects -- 12.3 Neural Probes and Stimulators -- 12.4 Conclusion -- 12.5 Problems -- References -- 13 Cardiovascular Interventions -- 13.1 Introduction -- 13.2 Valvular Repairs: Rationale for Intervention: Murmurs, Regurgitation, Congestive Heart Failure -- 13.2.1 Sutures to Address Leaflet Tears -- 13.2.2 Annulolasty Rings -- 13.3 Prosthetic and Bioprosthetic Replacement Valves -- 13.4 Outcomes -- 13.5 Interchamber Defects -- 13.6 Vascular Grafts -- 13.6.1 Dacron Grafts -- 13.6.2 Expanded Polytetrafluoroethylene (ePTFE) -- 13.7 Stents -- 13.8 Drug Eluting Stents -- 13.9 Added Constraints: Pediatric Cardiac Interventions -- 13.10 Pacemakers, Defibrillators, and Associated Hardware -- 13.11 Conclusions -- 13.12 Pointing to the Future -- 13.13 Problems -- References -- 14 Artificial Organs -- 14.1 Kidney: Dialysis -- 14.1.1 Dialysis Options -- 14.1.2 Peritoneal Dialysis -- 14.1.3 Hemodialysis -- 14.1.4 Continuous Metabolite Extraction -- 14.2 Artificial Pancreas -- 14.3 Artificial Bladders -- 14.4 Pivoting to the future -- 14.5 Problems -- References -- 15 Special Topics: Assays Applied to Both Health and Sports -- 15.1 Introduction and Historical Basis -- 15.2 What Can be Learned From Urinalysis? …”
    Libro electrónico
  2. 5142
    Publicado 2017
    Tabla de Contenidos: “…24.9 Decibels -- 25 - Image and Video Compression Fundamentals -- 25.1 Baseline JPEG -- 25.2 DC Scaling -- 25.3 Quantization Tables -- 25.4 Entropy Coding -- 25.5 JPEG Extensions -- 25.6 Video Compression Basics -- 25.7 Block Size -- 25.8 Motion Estimation -- 25.9 Frame Processing Order -- 25.10 Compressing I Frames -- 25.11 Compressing P Frames -- 25.12 Compressing B Frames -- 25.13 Rate Control and Buffering -- 25.14 Quantization Scale Factor -- 26 - Introduction to Machine Learning -- 26.1 Convolutional Neural Networks -- 26.2 Convolution Layer -- 26.3 Rectified Linear Unit Layer -- 26.4 Normalization Layer -- 26.5 Max-Pooling Layer -- 26.6 Fully Connected Layer -- 26.7 Training Computational Neural Networks -- 26.8 Winograd Transform -- 26.9 Convolutional Neural Network Numerical Precision Requirements -- 27 - Implementation Using Digital Signal Processors -- 27.1 Digital Signal Processing Processor Architectural Enhancements -- 27.1.1 Data I/O Bandwidth -- 27.1.2 Core Processing -- 27.1.3 Multiple Cores or Hardware Coprocessors -- 27.2 Scalability -- 27.3 Floating Point -- 27.4 Design Methodology -- 27.5 Managing Resources -- 27.6 Ecosystem -- 28 - Implementation Using FPGAs -- 28.1 FPGA Design Methodology -- 28.2 DSP Processor or FPGA Choice -- 28.3 Design Methodology Considerations -- 28.4 Dedicated Digital Signal Processing Circuit Blocks in FPGAs -- 28.4.1 Adjustable Precision Multipliers -- 28.4.2 Accumulator -- 28.4.3 Postadder (Subtractor) and Distributed Adder -- 28.4.4 Preadder (Subtractor) -- 28.4.5 Coefficient Storage -- 28.4.6 Barrel Shifter -- 28.4.7 Rounding and Saturation -- 28.4.8 Arithmetic Logic Unit Operations and Boolean Operations -- 28.4.9 Specialty Operations -- 28.4.10 Tco and Fmax -- 28.5 Floating Point Implementation Using FPGAs -- 28.6 Ecosystem -- 28.7 Future Trends -- 29 - Implementation With GPUs…”
    Libro electrónico
  3. 5143
    Publicado 2002
    Tabla de Contenidos: “…V5R2 iSeries Navigator enhancements summary -- General Connections and user interface updates -- Applications Administration -- System values -- Work Management -- Hardware management -- Network -- Windows Administration -- Security -- Database -- Integrated File System -- Managements Central-related enhancements -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
    Libro electrónico
  4. 5144
    por Kletz, Trevor A.
    Publicado 2009
    Tabla de Contenidos: “…Problems with Computer Control -- 20.1 Hardware and Software Faults -- 20.2 Treating the Computer as a Black Box -- 20.3 Misjudging the Way Operators Will Respond -- 20.4 Other Problems -- 20.5 Unauthorized Interference -- 20.6 New Applications -- 20.7 Conclusions -- Chapter 21. …”
    Libro electrónico
  5. 5145
    por Tyagi, Amit Kumar
    Publicado 2024
    Tabla de Contenidos: “…11.1 Introduction -- 11.2 Literature Survey -- 11.3 Existing Survey -- 11.3.1 Biometrics Technology -- 11.3.2 Palm Vein Authentication -- 11.3.3 Methods of Palm Vein Authentication -- 11.3.4 Limitations of the Existing System -- 11.4 Proposed System -- 11.4.1 Biometric System -- 11.4.2 Data Processing Technique -- 11.4.3 Data-Preserving Approach -- 11.4.3.1 Generalization -- 11.4.3.2 Suppression -- 11.4.3.3 Swapping -- 11.4.3.4 Masking -- 11.5 Implementation of AI -- 11.6 Limitations and Future Works -- 11.7 Conclusion -- References -- Part 3: Applications -- Chapter 12 Detection of Bank Fraud Using Machine Learning Techniques -- 12.1 Introduction -- 12.2 Literature Review -- 12.3 Problem Description -- 12.4 Implementation and Analysis -- 12.4.1 Workflow -- 12.4.2 Dataset -- 12.4.3 Methodology -- 12.5 Results -- 12.6 Conclusion -- 12.7 Future Works -- References -- Chapter 13 An Internet of Things-Integrated Home Automation with Smart Security System -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Methodology and Working Procedure with Diagrams -- 13.4 Research Analysis -- 13.5 Establishment of the Prototype -- 13.6 Results and Discussions -- 13.7 Conclusions -- Acknowledgment -- References -- Chapter 14 An Automated Home Security System Using Secure Message Queue Telemetry Transport Protocol -- 14.1 Introduction -- 14.2 Related Works -- 14.2.1 PIR Home Security Solutions -- 14.2.2 Solutions for MQTT Security -- 14.2.3 Solutions for Home Automation -- 14.3 Proposed Solution -- 14.3.1 Technological Decisions -- 14.3.2 Hardware Decision -- 14.3.3 Module Overview -- 14.4 Implementation -- 14.5 Results -- 14.6 Conclusion and Future Work -- References -- Chapter 15 Machine Learning-Based Solutions for Internet of Things-Based Applications -- 15.1 Introduction -- 15.2 IoT Ecosystem -- 15.2.1 IoT Devices -- 15.2.2 IoT Gateways -- 15.2.3 IoT Platforms…”
    Libro electrónico
  6. 5146
    Publicado 2017
    Tabla de Contenidos: “…4.2.1 PHA Procedure Outline -- 4.3 ALARP Principles -- 4.3.1 ALARP Point -- 4.3.2 ALARP Discussions -- 4.3.3 ALARP Process -- 4.3.4 ALARP Demonstration -- 4.3.5 ALARP Assessment -- 4.3.6 Good Practices -- 4.3.7 Cost Benefit Analysis and Gross Disproportionate -- 4.3.8 ALARP Pros and Cons -- 5.0 BASICS OF MATHEMATICS -- 5.1 Logic Gates -- 5.1.1 OR Gate -- 5.1.2 AND Gate -- 5.1.3 NOT Gate -- 5.1.4 Logic Gate Discussions -- 5.1.5 Binary Decision Diagram -- 5.2 Set Theory -- 5.2.1 Important Laws of Algebraic Sets -- 5.2.2 Relation and Mapping -- 5.3 Probability -- 5.3.1 Probability Definition -- 5.3.2 Algebraic Operation of Probability -- 5.3.3 Probability Mass Function -- 5.3.4 Cumulative Distribution Function -- 5.3.5 Probability Density Function -- 6.0 FAULT TOLERANCE AND PLANT AGEING -- 6.1 Fault Tolerance -- 6.1.1 Fault and Fault Tolerance -- 6.1.2 Redundancy and Replica -- 6.2 Plant Ageing -- 6.2.1 Contributing Factors -- 6.2.2 Aging Management -- 6.2.3 Various Plant Ageing Componts -- 6.2.4 Plant Ageing Indicator -- 6.2.5 Factors -- 6.2.6 Operator Action -- 6.2.7 Inspection Teamwork -- 6.2.8 Plant Ageing Control Discussions -- 6.2.9 Progressive Ageing -- 7.0 SAFETY INSTRUMENTATION -- 7.1 Commonly Used Terms -- 7.1.1 BPCS -- 7.1.2 SIS -- 7.1.3 SIF -- 7.1.4 Functional Safety -- 7.1.5 SIL -- 7.1.6 PFD -- 7.1.7 MTBF -- 7.1.8 SIS Implementation -- 7.2 Control Objective and Layers of Protections -- 7.2.1 Control Objectives -- 7.2.2 Layers of Protections -- 7.3 SIS Boundary and Layout -- 7.4 SIS Related Issues -- 7.4.1 Hardware Issues -- 7.4.2 Software Issues -- 7.4.3 Company Issues -- 8.0 FUNCTIONAL SAFETY AND SAFETY INTEGRITY LEVEL -- 8.1 Normally Used Terms -- 8.1.1 Functional Safety -- 8.1.2 EUC -- 8.1.3 E/E/PEs -- 8.1.4 Safety Integrity Level (SIL) -- 8.1.5 SIF -- 8.2 Functional Safety Discussions -- 8.2.1 Functional Safety Concept…”
    Libro electrónico
  7. 5147
    Publicado 2016
    Tabla de Contenidos: “…8 - Joint European Torus -- 8.1 Introduction -- 8.2 Engineering for a fusion reactor -- 8.3 Fusion diagnostics -- 8.4 Disruptions -- 8.5 Plasma-wall interactions -- 8.6 Scrape-off layer and divertor physics -- 8.7 Transport and confinement -- 8.8 Stability -- 8.9 High-fusion performance -- 8.10 Fusion physics -- Acknowledgement -- References -- 9 - Tore Supra-WEST -- 9.1 Background and objectives of Tore Supra -- 9.2 Plant overview -- 9.3 Main achievements -- 9.3.1 Superconducting magnet -- 9.3.2 Development of actively cooled plasma facing components -- 9.3.3 Heating and current drive systems -- 9.3.4 Key ITER operational issues -- 9.3.5 Ergodic divertor experiments -- 9.3.6 Long pulse experiments -- 9.4 Preparing ITER operation: the WEST project -- 9.4.1 From limiter to divertor configuration -- 9.4.2 From carbon to tungsten PFC -- 9.4.3 Testing ITER divertor PFC in relevant tokamak conditions -- 9.4.4 Long pulse H-mode operation in tungsten environment -- 9.5 Conclusions and perspectives -- References -- 10 - Alcator C-Mod and the high magnetic field approach to fusion -- 10.1 Introduction -- 10.1.1 The advantages of high magnetic field for fusion -- 10.1.2 Impact of high-field operation on C-Mod -- 10.2 C-Mod engineering and technical innovations -- 10.2.1 Magnets -- 10.2.2 Internal hardware -- 10.3 Divertor and boundary physics -- 10.3.1 Operation with metal walls -- 10.3.2 Divertor regimes -- 10.3.3 Turbulence and anomalous transport in the boundary plasma -- 10.4 Pedestal and edge barrier regimes -- 10.4.1 H-modes -- 10.4.2 I-modes -- 10.5 Core turbulence and transport -- 10.5.1 Self-generated flows and momentum transport -- 10.5.2 Particle and impurity transport -- 10.5.3 Energy transport -- 10.6 ICRF technology and physics -- 10.7 Implications and future directions for high-field tokamak research -- Acknowledgments -- References…”
    Libro electrónico
  8. 5148
    Publicado 2018
    Tabla de Contenidos: “…Und warum jetzt? -- 1.3.1 Hardware -- 1.3.2 Daten -- 1.3.3 Algorithmen -- 1.3.4 Eine neue Investitionswelle -- 1.3.5 Die Demokratisierung des Deep Learnings -- 1.3.6 Bleibt es so? …”
    Libro electrónico
  9. 5149
    Publicado 2019
    Tabla de Contenidos: “…-- 1.4.1 Categorization of Digital Assets -- 1.4.1.1 (Networked) System Assets -- 1.4.1.2 Software Assets -- 1.4.1.3 Hardware Assets -- 1.4.1.4 Service Assets -- 1.4.1.5 Robotic Assets -- 1.4.1.6 Data Assets -- 1.4.1.7 Metadata Assets -- 1.4.1.8 Digitally Enabled Devices -- 1.4.2 Managing Digital Assets in an Organization -- 1.4.2.1 Information Resource Management -- 1.4.2.2 Digital Assets Management -- 1.5 Unique Attributes of Digital Assets -- 1.5.1 Characteristic 1: Digital Value Creation Does Not Decrease but Increases Through Usage -- 1.5.2 Characteristic 2: Duplication Does Not Increase Digital Value -- 1.5.3 Characteristic 3: Digital Value Production and Distribution Entails Higher Fixed Costs and Lower Variable Costs…”
    Libro electrónico
  10. 5150
    Publicado 2020
    Tabla de Contenidos: “…OMEC, Towards Cloud Native and 5G Service-Based Architecture 184 -- 7.4.1 High Volume ServerśÖ Software and Hardware Optimization for Packet Processing 188 -- 7.4.1.1 Data Plane Development Kit 188 -- 7.4.1.2 Flow Classification Bottleneck 190 -- 7.4.1.3 Cuckoo Hashing for Efficient Table Utilization 190 -- 7.4.1.4 Intel Resource Director Technology 192 -- 7.5 Part III: Software-Defined Disaggregated RAN 193 -- 7.5.1 RAN Disaggregation 193 -- 7.5.2 Software-Defined RAN Control 194 -- 7.6 Part IV: White-Box Solutions for Compute, Storage, Access, and Networking 197 -- 7.7 Part V: Edge Cloud Deployment Options 200 -- 7.8 Part VI: Edge Cloud and Network Slicing 204 -- 7.9 Summary 207 -- Acknowledgments 207 -- References 208 -- Part V 5G Verticals ́ô Key Vertical Applications 211 -- 8 Connected Aerials 213 /Feng Xue, Shu-ping Yeh, Jingwen Bai, and Shilpa Talwar -- 8.1 Introduction 213 -- 8.2 General Requirements and Challenges for Supporting UAVs over a Cellular Network 215 -- 8.3 Summary on Current Drone Regulations 217 -- 8.4 Review of Aerial Communication R&D Activities in General 217.…”
    Libro electrónico
  11. 5151
    Publicado 2015
    Tabla de Contenidos: “…6.4.5 Ambiguity Function -- 6.4.6 GLONASS Carrier Phase -- 6.5 Ambiguity Fixing -- 6.5.1 The Constraint Solution -- 6.5.2 LAMBDA -- 6.5.3 Discernibility -- 6.5.4 Lattice Reduction and Integer Least Squares -- 6.5.4.1 Branch-and-Bound Approach -- 6.5.4.2 Finke-Pohst Algorithm -- 6.5.4.3 Lattice Reduction Algorithms -- 6.5.4.4 Other Searching Strategies -- 6.5.4.5 Connection Between LAMBDA and LLL Methods -- 6.6 Network-Supported Positioning -- 6.6.1 PPP -- 6.6.2 CORS -- 6.6.2.1 Differential Phase and Pseudorange Corrections -- 6.6.2.2 RTK -- 6.6.3 PPP-RTK -- 6.6.3.1 Single-Frequency Solution -- 6.6.3.2 Dual-Frequency Solutions -- 6.6.3.3 Across-Satellite Differencing -- 6.7 Triple-Frequency Solutions -- 6.7.1 Single-Step Position Solution -- 6.7.2 Geometry-Free TCAR -- 6.7.2.1 Resolving EWL Ambiguity -- 6.7.2.2 Resolving the WL Ambiguity -- 6.7.2.3 Resolving the NL Ambiguity -- 6.7.3 Geometry-Based TCAR -- 6.7.4 Integrated TCAR -- 6.7.5 Positioning with Resolved Wide Lanes -- 6.8 Summary -- Chapter 7 Real-Time Kinematics Relative Positioning -- 7.1 Multisystem Considerations -- 7.2 Undifferenced and Across-Receiver Difference Observations -- 7.3 Linearization and Hardware Bias Parameterization -- 7.4 RTK Algorithm for Static and Short Baselines -- 7.4.1 Illustrative Example -- 7.5 RTK Algorithm for Kinematic Rovers and Short Baselines -- 7.5.1 Illustrative Example -- 7.6 RTK Algorithm with Dynamic Model and Short Baselines -- 7.6.1 Illustrative Example -- 7.7 RTK Algorithm with Dynamic Model and Long Baselines -- 7.7.1 Illustrative Example -- 7.8 RTK Algorithms with Changing Number of Signals -- 7.9 Cycle Slip Detection and Isolation -- 7.9.1 Solutions Based on Signal Redundancy -- 7.10 Across-Receiver Ambiguity Fixing -- 7.10.1 Illustrative Example -- 7.11 Software Implementation -- Chapter 8 Troposphere and Ionosphere -- 8.1 Overview…”
    Libro electrónico
  12. 5152
    Publicado 2023
    Tabla de Contenidos: “…6.5.4 Sensor Node Surrounding Temperature Field -- 6.5.5 Sensor Node Remaining Energy Calculation -- 6.5.6 Delay Modeling -- 6.6 Simulation Parameters -- 6.7 Results and Discussion -- 6.7.1 Temperature Influence on Network -- 6.7.2 Power Consumption -- 6.7.3 Lifetime Analysis -- 6.7.4 Delay Analysis -- 6.8 Conclusion -- References -- Chapter 7 A Comprehensive Study of Intrusion Detection and Prevention Systems -- 7.1 Introduction -- 7.1.1 Intrusion and Detection -- 7.1.2 Some Basic Definitions -- 7.1.3 Intrusion Detection and Prevention System -- 7.1.4 Need for IDPS: More Than Ever -- 7.1.5 Introduction to Alarms -- 7.1.6 Components of an IDPS -- 7.2 Configuring IDPS -- 7.2.1 Network Architecture of IDPS -- 7.2.2 A Glance at Common Types -- 7.2.2.1 Network-Based IDS -- 7.2.2.2 Host-Based IDS -- 7.2.3 Intrusion Detection Techniques -- 7.2.3.1 Conventional Techniques -- 7.2.3.2 Machine Learning-Based and Hybrid Techniques -- 7.2.4 Three Considerations -- 7.2.4.1 Location of Sensors -- 7.2.4.2 Security Capabilities -- 7.2.4.3 Management Capabilities -- 7.2.5 Administrators' Functions -- 7.2.5.1 Deployment -- 7.2.5.2 Testing -- 7.2.5.3 Security Consideration of IDPS -- 7.2.5.4 Regular Backups and Monitoring -- 7.2.6 Types of Events Detected -- 7.2.7 Role of State in Network Security -- 7.3 Literature Review -- 7.4 Conclusion -- References -- Chapter 8 Hardware Devices Integration With IoT -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Component Description -- 8.3.1 Arduino Board UNO -- 8.3.2 Raspberry Pi -- 8.4 Case Studies -- 8.4.1 Ultrasonic Sensor -- 8.4.2 Temperature and Humidity Sensor -- 8.4.3 Weather Monitoring System Using Raspberry Pi -- 8.5 Drawbacks of Arduino and Raspberry Pi -- 8.6 Challenges in IoT -- 8.6.1 Design Challenges -- 8.6.2 Security Challenges -- 8.6.3 Development Challenges -- 8.7 Conclusion -- 8.8 Annexures -- References…”
    Libro electrónico
  13. 5153
    Publicado 2024
    Tabla de Contenidos: “…11.2.3 Day-to-Day Example -- 11.2.3.1 Optical Character Recognition (OCR) -- 11.2.3.2 Face Recognition -- 11.2.3.3 Recognition of Speech -- 11.2.3.4 Medical Findings -- 11.2.3.5 Extraction of Acquaintance -- 11.2.3.6 Compression -- 11.2.3.7 Additional Examples -- 11.2.4 Discriminant -- 11.2.5 Algorithms -- 11.3 Clustering -- 11.3.1 Data Examples Using Natural Clusters -- 11.4 Clustering (k-means) -- 11.4.1 Outline -- 11.4.2 Example -- 11.4.2.1 Problem -- 11.4.2.2 Solution -- 11.4.3 Some Methods for Initialization -- 11.4.4 Disadvantages -- 11.4.5 Use Case: Image Compression and Segmentation -- 11.4.5.1 Segmentation of Images -- 11.4.5.2 Compression of Data -- 11.5 Reduction of Dimensionality -- 11.5.1 Introduction -- 11.5.1.1 Feature Selection -- 11.5.1.2 Feature Extraction -- 11.5.1.3 Error Measures -- 11.5.2 Benefits of Reducing Dimensionality -- 11.5.3 Subset Selection -- 11.5.3.1 Selecting Forward -- 11.5.3.2 Remarks -- 11.5.3.3 Selection in Reverse -- 11.6 The Ensemble Method -- 11.6.1 Random Forest -- 11.6.2 Algorithm -- 11.6.3 Benefits and Drawbacks -- 11.6.3.1 Benefits -- 11.6.3.2 Drawbacks -- 11.6.4 Deep Learning and Neural Networks -- 11.6.4.1 Definition -- 11.6.4.2 Remarks -- 11.6.5 Applications -- 11.6.6 Artificial Neural Network -- 11.6.6.1 Biological Motivation -- 11.7 Transfer of Learning -- 11.8 Learning Through Reinforcement -- 11.9 Processing of Natural Languages -- 11.10 Word Embeddings -- 11.11 Conclusion -- References -- Chapter 12 Recognition Attendance System Ensuring COVID-19 Security -- 12.1 Introduction -- 12.2 Literature Survey -- 12.3 Software Requirements -- 12.3.1 Operating System - Windows 7 and Above -- 12.3.2 IDE-Visual Studio Code -- 12.3.3 Programming Languages: Python, HTML, CSS, JS, and PHP -- 12.4 Hardware Requirements -- 12.4.1 Three Processors and Above -- 12.4.2 RAM - 2GB (Minimum Capacity)…”
    Libro electrónico
  14. 5154
    por Darmawan, Budi
    Publicado 2004
    Tabla de Contenidos: “…Implementation planning and considerations -- 3.1 Planning -- 3.1.1 Hardware and software prerequisites -- 3.1.2 Software used in the our run-time environment -- 3.1.3 Software installation source -- 3.1.4 Software installation paths and variables -- 3.2 Collaborative portal interaction -- 3.2.1 Server picker overview -- 3.2.2 Overview of how the automatically detect my mail database feature works -- 3.2.3 Database picker overview -- 3.2.4 Lotus Team Workplace picker overview…”
    Libro electrónico
  15. 5155
    Publicado 2004
    Tabla de Contenidos: “…Introducing the connectors test environment -- 2.1 System configurations -- 2.1.1 Hardware -- 2.1.2 Software -- 2.2 Frontend environment -- 2.3 Backend environments -- 2.3.1 z/OS -- 2.3.2 VSE -- 2.4 Connector scenarios overview -- 2.4.1 The Trader application scenarios -- Chapter 3. …”
    Libro electrónico
  16. 5156
    por Steegmans, Bart
    Publicado 2002
    Tabla de Contenidos: “…Installation and configuration -- 3.1 Installation requirements -- 3.1.1 Hardware requirements -- 3.1.2 Software requirements -- 3.2 Installation instructions -- 3.2.1 Starting InstallShield -- 3.2.2 The InstallShield process -- 3.3 Post-installation configuration -- 3.3.1 Environment variables -- 3.4 Getting started -- 3.4.1 Launching DB2 Recovery Expert -- 3.4.2 Connecting to a database -- 3.5 DB2 configuration changes -- 3.5.1 LOGRETAIN -- 3.5.2 Performance -- 3.5.3 USEREXIT (optional) -- 3.5.4 DROPPED TABLE RECOVERY (optional) -- 3.6 DB2 Recovery Expert tasks -- 3.6.1 Create Versioning Repository -- 3.6.2 Create minilogs -- 3.7 Troubleshooting…”
    Libro electrónico
  17. 5157
    Publicado 2011
    Tabla de Contenidos: “…About the Editors xiii -- Preface xv -- Acknowledgements xvii -- List of Abbreviations xix -- List of Contributors xxv -- 1 Introduction 1 -- 1.1 Market and Technology Trends 1 -- 1.2 Technology Evolution 3 -- 1.3 Development of IMT-Advanced and Beyond 6 -- References 8 -- 2 Radio Resource Management 11 -- 2.1 Overview of Radio Resource Management 11 -- 2.2 Resource Allocation in IMT-Advanced Technologies 13 -- 2.2.1 Main IMT-Advanced Characteristics 13 -- 2.2.2 Scheduling 16 -- 2.2.3 Interference Management 16 -- 2.2.4 Carrier Aggregation 18 -- 2.2.5 MBMS Transmission 18 -- 2.3 Dynamic Resource Allocation 19 -- 2.3.1 Resource Allocation and Packet Scheduling Using Utility Theory 19 -- 2.3.2 Resource Allocation with Relays 22 -- 2.3.3 Multiuser Resource Allocation Maximizing the UE QoS 24 -- 2.3.4 Optimization Problems and Performance 26 -- 2.4 Interference Coordination in Mobile Networks 26 -- 2.4.1 Power Control 27 -- 2.4.2 Resource Partitioning 28 -- 2.4.3 MIMO Busy Burst for Interference Avoidance 33 -- 2.5 Efficient MBMS Transmission 35 -- 2.5.1 MBMS Transmission 36 -- 2.5.2 Performance Assessment 37 -- 2.6 Future Directions of RRM Techniques 39 -- References 40 -- 3 Carrier Aggregation 43 -- 3.1 Basic Concepts 43 -- 3.2 ITU-R Requirements and Implementation in Standards 45 -- 3.3 Evolution Towards Future Technologies 48 -- 3.3.1 Channel Coding 48 -- 3.3.2 Scheduling 51 -- 3.3.3 Channel Quality Indicator 53 -- 3.3.4 Additional Research Directions 54 -- 3.4 Cognitive Radio Enabling Dynamic/Opportunistic Carrier Aggregation 55 -- 3.4.1 Spectrum Sharing and Opportunistic Carrier Aggregation 56 -- 3.4.2 Spectrum Awareness 58 -- 3.4.3 Cognitive Component Carrier Identification, Selection and Mobility 59 -- 3.5 Implications for Signaling and Architecture 59 -- 3.6 Hardware and Legal Limitations 60 -- References 61 -- 4 Spectrum Sharing 63 -- 4.1 Introduction 63 -- 4.2 Literature Overview 64 -- 4.2.1 Spectrum Sharing from a Game Theoretic Perspective 66 -- 4.2.2 Femtocells 67.…”
    Libro electrónico
  18. 5158
    Publicado 2019
    Tabla de Contenidos: “…7.5.5 Coarse Visual-Inertial Tracking -- 7.6 Calculating the Relative Jacobians -- 7.6.1 Proof of the Chain Rule -- 7.6.2 Derivation of the Jacobian with Respect to Pose in Eq. (7.58) -- 7.6.3 Derivation of the Jacobian with Respect to Scale and Gravity Direction in Eq. (7.59) -- 7.7 Results -- 7.7.1 Robust Quantitative Evaluation -- 7.7.2 Evaluation of the Initialization -- 7.7.3 Parameter Studies -- 7.8 Conclusion -- References -- 8 Multimodal Localization for Embedded Systems: A Survey -- 8.1 Introduction -- 8.2 Positioning Systems and Perception Sensors -- 8.2.1 Positioning Systems -- 8.2.1.1 Inertial navigation systems -- 8.2.1.2 Global navigation satellite systems -- 8.2.2 Perception Sensors -- 8.2.2.1 Visible light cameras -- 8.2.2.2 IR cameras -- 8.2.2.3 Event-based cameras -- 8.2.2.4 RGB-D cameras -- 8.2.2.5 LiDAR sensors -- 8.2.3 Heterogeneous Sensor Data Fusion Methods -- 8.2.3.1 Sensor con guration types -- 8.2.3.2 Sensor coupling approaches -- 8.2.3.3 Sensors fusion architectures -- 8.2.4 Discussion -- 8.3 State of the Art on Localization Methods -- 8.3.1 Monomodal Localization -- 8.3.1.1 INS-based localization -- 8.3.1.2 GNSS-based localization -- 8.3.1.3 Image-based localization -- 8.3.1.4 LiDAR-map based localization -- 8.3.2 Multimodal Localization -- 8.3.2.1 Classical data fusion algorithms -- 8.3.2.2 Reference multimodal benchmarks -- 8.3.2.3 A panorama of multimodal localization approaches -- 8.3.2.4 Graph-based localization -- 8.3.3 Discussion -- 8.4 Multimodal Localization for Embedded Systems -- 8.4.1 Application Domain and Hardware Constraints -- 8.4.2 Embedded Computing Architectures -- 8.4.2.1 SoC constraints -- 8.4.2.2 IP modules for SoC -- 8.4.2.3 SoC -- 8.4.2.4 FPGA -- 8.4.2.5 ASIC -- 8.4.2.6 Discussion -- 8.4.3 Multimodal Localization in State-of-the-Art Embedded Systems…”
    Libro electrónico
  19. 5159
    Publicado 2020
    Tabla de Contenidos: “…Creating the Capsulecorp Pentest lab network -- C.1 Hardware and software requirements -- C.2 Creating the primary Windows servers -- C.2.1 Goku.capsulecorp.local -- C.2.2 Gohan.capsulecorp.local -- C.2.3 Vegeta.capsulecorp.local -- C.2.4 Trunks.capsulecorp.local -- C.2.5 Nappa.capsulecorp.local and tien.capsulecorp.local -- C.2.6 Yamcha.capsulecorp.local and Krillin.capsulecorp.local -- C.3 Creating the Linux servers -- appendix D. …”
    Libro electrónico
  20. 5160
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Contents -- Preface to the Second Edition -- Preface to the First Edition -- Acknowledgements -- Part I: Preliminaries -- Chapter 1: Preliminaries: Software Testing -- 1.1 Humans, Errors, and Testing -- 1.1.1 Errors, faults, and failures -- 1.1.2 Test automation -- 1.1.3 Developer and tester as two roles -- 1.2 Software Quality -- 1.2.1 Quality attributes -- 1.2.2 Reliability -- 1.3 Requirements, Behavior, and Correctness -- 1.3.1 Input domain -- 1.3.2 Specifying program behavior -- 1.3.3 Valid and invalid inputs -- 1.4 Correctness Versus Reliability -- 1.4.1 Correctness -- 1.4.2 Reliability -- 1.4.3 Operational profiles -- 1.5 Testing and Debugging -- 1.5.1 Preparing a test plan -- 1.5.2 Constructing test data -- 1.5.3 Executing the program -- 1.5.4 Assessing program correctness -- 1.5.5 Constructing an oracle -- 1.6 Test Metrics -- 1.6.1 Organizational metrics -- 1.6.2 Project metrics -- 1.6.3 Process metrics -- 1.6.4 Product metrics: generic -- 1.6.5 Product metrics: OO software -- 1.6.6 Progress monitoring and trends -- 1.6.7 Static and dynamic metrics -- 1.6.8 Testability -- 1.7 Software and Hardware Testing -- 1.8 Testing and Verification -- 1.9 Defect Management -- 1.10 Test Generation Strategies -- 1.11 Static Testing -- 1.11.1 Walkthroughs -- 1.11.2 Inspections -- 1.11.3 Software complexity and static testing -- 1.12 Model-Based Testing and Model Checking -- 1.13 Types of Testing -- 1.13.1 Classifier: C1: Source of test generation -- 1.13.2 Classifier: C2: Life cycle phase -- 1.13.3 Classifier: C3: Goal-directed testing -- 1.13.4 Classifier: C4: Artifact under test -- 1.13.5 Classifier: C5: Test process models -- 1.14 The Saturation Effect -- 1.14.1 Confidence and true reliability -- 1.14.2 Saturation region -- 1.14.3 False sense of confidence -- 1.14.4 Reducing -- 1.14.5 Impact on test process -- 1.15 Principles of Testing…”
    Libro electrónico