Mostrando 2,701 - 2,720 Resultados de 3,027 Para Buscar '"médium"', tiempo de consulta: 0.14s Limitar resultados
  1. 2701
    Publicado 2020
    Tabla de Contenidos: “…-- Einführung: Orientierungen und Ziele im Literaturunterricht -- 1 Vier Paradigmen des Literaturunterrichts -- 2 Forschungsfragen -- 3 Methode -- 3.1 Anlage der Studie -- 3.2 Beschreibung der Stichprobe -- 3.3 Messinstrument: Lehrkräftefragebogen -- 3.4 Datenanalyse -- 4 Ergebnisse -- Personal Growth Paradigm -- Social Paradigm -- Linguistic Paradigm -- Cultural Paradigm -- Leseverstehen -- Ausprägung der verschiedenen Zielparadigmen -- 5 Diskussion -- Literatur -- Anna Rebecca Hoffmann, Angelika Ruth Stolle: Literarische Deutungsmuster und ihr Einfluss auf Subjektive Theorien und Unterrichtshandeln bei Deutschlehrkräften -- 1 Verortung, Relevanz und Forschungsdesiderat -- 2 Konzept und Methodik -- 3 Ergebnisse: Deutungsmuster -- 4 Synopse Gruppe 1: Literatur als Medium der Persönlichkeits- und Identitätsbildung (Fallbeispiel Christine Hansen) -- 4.1 Deutungsmuster -- 4.2 Subjektive Theorien -- 4.3 Unterrichtspraxis -- 5 Synopse Gruppe 2: Literatur als Unterhaltungs- vs. …”
    Libro electrónico
  2. 2702
    Publicado 2022
    Tabla de Contenidos: “…3.3.2.3 SPIN Model Checker -- 3.3.3 Automated Theorem Prover -- 3.3.3.1 ALT-ERGO -- 3.3.4 Static Analysis -- 3.3.4.1 CODESONAR -- 3.4 Validation of IoRT Systems -- 3.4.1 IoRT Testing Methods -- 3.4.2 Design of IoRT Test -- 3.5 Automated Validation -- 3.5.1 Use of Service Visualization -- 3.5.2 Steps for Automated Validation of IoRT Systems -- 3.5.3 Choice of Appropriate Tool for Automated Validation -- 3.5.4 IoRT Systems Open Source Automated Validation Tools -- 3.5.5 Some Significant Open Source Test Automation Frameworks -- 3.5.6 Finally IoRT Security Testing -- 3.5.7 Prevalent Approaches for Security Validation -- 3.5.8 IoRT Security Tools -- References -- 4 Light Fidelity (Li-Fi) Technology: The Future Man-Machine-Machine Interaction Medium -- 4.1 Introduction -- 4.1.1 Need for Li-Fi -- 4.2 Literature Survey -- 4.2.1 An Overview on Man-to-Machine Interaction System -- 4.2.2 Review on Machine to Machine (M2M) Interaction -- 4.2.2.1 System Model -- 4.3 Light Fidelity Technology -- 4.3.1 Modulation Techniques Supporting Li-Fi -- 4.3.1.1 Single Carrier Modulation (SCM) -- 4.3.1.2 Multi Carrier Modulation -- 4.3.1.3 Li-Fi Specific Modulation -- 4.3.2 Components of Li-Fi -- 4.3.2.1 Light Emitting Diode (LED) -- 4.3.2.2 Photodiode -- 4.3.2.3 Transmitter Block -- 4.3.2.4 Receiver Block -- 4.4 Li-Fi Applications in Real Word Scenario -- 4.4.1 Indoor Navigation System for Blind People -- 4.4.2 Vehicle to Vehicle Communication -- 4.4.3 Li-Fi in Hospital -- 4.4.4 Li-Fi Applications for Pharmacies and the Pharmaceutical Industry -- 4.4.5 Li-Fi in Workplace -- 4.5 Conclusion -- References -- 5 Healthcare Management-Predictive Analysis (IoRT) -- 5.1 Introduction -- 5.1.1 Naive Bayes Classifier Prediction for SPAM -- 5.1.2 Internet of Robotic Things (IoRT) -- 5.2 Related Work -- 5.3 Fuzzy Time Interval Sequential Pattern (FTISPAM)…”
    Libro electrónico
  3. 2703
    Publicado 2004
    “…Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. …”
    Libro electrónico
  4. 2704
    por Moore, Bill
    Publicado 2003
    “…It implements a sample scenario based on realistic requirements for small and medium customers, and provides an end-to-end guide for the development of this scenario. …”
    Libro electrónico
  5. 2705
    Publicado 2022
    Tabla de Contenidos: “…3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM -- 3.6 Conclusion -- References -- 4 Automated TSR Using DNN Approach for Intelligent Vehicles -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Neural Network (NN) -- 4.4 Methodology -- 4.4.1 System Architecture -- 4.4.2 Database -- 4.5 Experiments and Results -- 4.5.1 FFNN -- 4.5.2 RNN -- 4.5.3 CNN -- 4.5.4 CNN -- 4.6 Discussion -- 4.7 Conclusion -- References -- 5 Honeypot: A Trap for Attackers -- 5.1 Introduction -- 5.1.1 Research Honeypots -- 5.1.2 Production Honeypots -- 5.2 Method -- 5.2.1 Low-Interaction Honeypots -- 5.2.2 Medium-Interaction Honeypots -- 5.2.3 High-Interaction Honeypots -- 5.3 Cryptanalysis -- 5.3.1 System Architecture -- 5.3.2 Possible Attacks on Honeypot -- 5.3.3 Advantages of Honeypots -- 5.3.4 Disadvantages of Honeypots -- 5.4 Conclusions -- References -- 6 Examining Security Aspects in Industrial-Based Internet of Things -- 6.1 Introduction -- 6.2 Process Frame of IoT Before Security -- 6.2.1 Cyber Attack -- 6.2.2 Security Assessment in IoT -- 6.2.2.1 Security in Perception and Network Frame -- 6.3 Attacks and Security Assessments in IIoT -- 6.3.1 IoT Security Techniques Analysis Based on its Merits -- 6.4 Conclusion -- References -- 7 A Cooperative Navigation for Multi-Robots in Unknown Environments Using Hybrid Jaya-DE Algorithm -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Problem Formulation -- 7.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm -- 7.4.1 Basic Jaya Algorithm -- 7.5 Hybrid Jaya-DE -- 7.5.1 Mutation -- 7.5.2 Crossover -- 7.5.3 Selection -- 7.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm -- 7.7 Total Navigation Path Deviation (TNPD) -- 7.8 Average Unexplored Goal Distance (AUGD) -- 7.9 Conclusion -- References -- 8 Categorization Model for Parkinson's Disease Occurrence and Severity Prediction -- 8.1 Introduction…”
    Libro electrónico
  6. 2706
    por Moore, Bill
    Publicado 2005
    “…This IBM Redbooks publication provides guidance for IT specialists and architects who are implementing enterprise application integration (EAI) projects for small and medium businesses. It provides best practices and advice for all levels of an EAI solution, including design, implementation and deployment using the WebSphere Business Integration Server Express. …”
    Libro electrónico
  7. 2707
    por Ritchie, Kyle J.
    Publicado 2021
    Tabla de Contenidos: “…Innovating to attract new customers -- The Drive to Be Healthier -- Lifestyles that foster health and sustainability -- Wellness as a priority -- The Drive to Be in Compliance -- Environmental, social, and corporate governance -- Corporate social responsibility (CSR) -- Climate and shareholders -- A Larger Drive Toward Deep Sustainability -- This has been brewing for a while -- Precedents -- Looking to the future -- Chapter 4 From Linear To Circular: What You Need To Know -- So Much Chaos: Understanding Entropy -- Externalized costs -- Linear versus circular: A hilarious- yet-depressing comparison -- Borrow from nature, not from the future -- Waste = Food: Redefining Disposal -- All materials have another use -- Product stewardship -- Building Resilience Through Diversity: Redefining Strength -- Responding to disruption -- Takes a lickin' and keeps on tickin' -- Durability and reparability policies -- Part 2 Rethinking Business for a Circular Economy -- Chapter 5 Identifying Your Business Opportunities -- Exploring the Benefits of Going Circular -- Exploiting the profit opportunities -- Reducing volatility and ensuring greater supply chain security -- Managing the new demand for business services -- Improving customer interaction and loyalty -- Rethinking the Business Model -- Building new types of capital -- Rethinking money as the only medium of exchange -- Reflecting the true cost of products -- Embracing diversity -- Rethinking your supply chain -- Designing for the future -- Examining Business from a Global Perspective -- Chapter 6 Rethinking the Conventional Business Model -- Rethinking How We Look at Cost -- The hidden cost of procurement -- The hidden impact of transportation -- The hidden burden of inventory -- The hidden secrets of quality -- Maximizing Your Value Proposition to Customers -- Becoming a mission-driven company…”
    Libro electrónico
  8. 2708
    Tabla de Contenidos: “…-- Animals-You Can't Hide From Them -- Lesson Learned -- Vehicle Damage -- Lesson Learned -- Vandals -- Lesson Learned -- Mother Nature -- Lesson Learned -- Hard to Foresee -- Lesson Learned -- My Favorite -- Lesson Learned -- Endnotes -- 10 - Data Services Architecture -- INTRODUCTION -- NETWORK ENGINEERING FOR ACCESS NETWORKS -- ASSESSMENT OF VENDOR SYSTEMS -- DATA SERVICES ORGANIZATION AND PON-SPECIFIC ATTRIBUTES -- Residential Services -- Commercial Services -- PON Standards for Data Networking -- UNIFIED MODEL FOR PON DATA SERVICE ARCHITECTURES -- PON Access Network Model -- PON Access System Integration -- Forced Forwarding Upstream -- Security of the Shared Medium -- ESSENTIAL TRANSPORT MODELS -- Layer 2 Transport-Switching -- VLAN Architectures -- VLAN Tagging in Networking Standards…”
    Libro electrónico
  9. 2709
    por Chodorow, Kristina
    Publicado 2013
    Tabla de Contenidos: “…Deploying MongoDB -- Designing the System -- Choosing a Storage Medium -- Recommended RAID Configurations -- CPU -- Choosing an Operating System -- Swap Space -- Filesystem -- Virtualization -- Turn Off Memory Overcommitting -- Mystery Memory -- Handling Network Disk IO Issues -- Using Non-Networked Disks -- Configuring System Settings -- Turning Off NUMA -- Setting a Sane Readahead -- Disabling Hugepages -- Choosing a Disk Scheduling Algorithm -- Don't Track Access Time…”
    Libro electrónico
  10. 2710
    Publicado 2003
    Tabla de Contenidos: “…Performance maximization techniques -- 7.1 Initial considerations -- 7.2 IBM DB2 Performance tuning considerations -- 7.2.1 Small ITLM environments -- 7.2.2 Medium ITLM environments -- 7.2.3 Large ITLM environments -- 7.3 IBM WebSphere performance tuning…”
    Libro electrónico
  11. 2711
    por Jordan, Ted
    Publicado 2023
    Tabla de Contenidos: “…Managing Permissions from the Command Line -- Exercise 6-2: Managing Permissions -- Working with Default Permissions -- Working with Special Permissions -- Exercise 6-3: Managing Default and Special Permissions -- Configuring File Attributes and Access Control Lists -- File Attributes -- File Access Control Lists -- Chapter Review -- Questions -- Answers -- Chapter 7 Managing Storage -- An Overview of Storage -- The Master Boot Record -- The GUID Partition Table -- The Device Naming Conventions -- Viewing Disk Partitions -- Creating Partitions -- Partition Considerations -- fdisk Partitioning Utility -- parted Partitioning Utility -- gdisk Partitioning Utility -- Block Device Encryption -- Creating Filesystems -- Available Filesystems -- Building a Filesystem -- Mounting a Filesystem -- Mounting Filesystems Automatically at Boot -- Unmounting a Partition with umount -- Managing Linux Filesystems -- Using df to Verify Free Disk Space -- Using du to Verify Directory Usage -- Reporting Filesystem Status Using dumpe2fs -- Verifying XFS Filesystems Using xfs_admin -- Checking the Filesystem Integrity -- Managing Quotas -- Editing /etc/fstab to Set Up Quotas -- Creating Quota Database Files -- Assigning a Quota to Users and Groups -- Exercise 7-1: Managing Linux Partitions -- Chapter Review -- Questions -- Answers -- Chapter 8 Configuring Volume Management -- Implementing Logical Volume Management -- LVM Components -- LVM Configuration -- LVM Snapshots -- Extending LVMs -- Creating Archives and Performing Compression -- Selecting a Backup Medium -- Selecting a Backup Strategy -- Linux Backup and Compression Utilities -- Exercise 8-1: Backing Up Data -- Enabling Redundant Array of Independent Disks -- Configuring Software RAID -- Verifying RAID Status -- Exercise 8-2: Configuring RAID and Logical Volumes -- Chapter Review -- Questions -- Answers…”
    Libro electrónico
  12. 2712
    Publicado 2024
    Tabla de Contenidos: “…Immersive Decca Tree -- Ambisonic Pickup -- Microphone Placement Techniques -- Brass Instruments -- Trumpet -- Trombone -- Tuba -- French Horn -- Guitar -- Acoustic Guitar -- Miking Near the Sound Hole -- Room and Surround Guitar Miking -- Nylon or Spanish Guitar -- The Electric Guitar -- Miking the Guitar Amp -- Recording Direct -- The Electric Bass Guitar -- Keyboard Instruments -- Grand Piano -- Upright Piano -- Electronic Keyboard Instruments -- Percussion -- Drum Set -- Miking the Drum Set -- Kick Drum -- Snare Drum -- Overheads -- Rack Toms -- Floor Tom -- Hi-Hat -- Tuned Percussion Instruments -- Congas and Hand Drums -- Xylophone, Vibraphone and Marimba -- Stringed Instruments -- Violin and Viola -- Cello -- Double Bass -- Voice -- Mic Tools for the Voice -- Woodwind Instruments -- Clarinet -- Flute -- Saxophone -- Harmonica -- Microphone Selection -- Shure SM57 -- Telefunken M81 -- AKG D112 -- Royer Labs R-121 -- Beyerdynamic M-160 -- AEA A440 -- Audio-Technica AT5045 -- AKG C214 -- Neumann TLM102 -- Warm Audio WA-47 -- Telefunken U47, C12 and ELA M251E -- Chapter 5 The Analog Tape Recorder -- To Commit or Not to Commit It to Tape? -- The Medium of Magnetic Recording -- The Professional Analog ATR -- The Tape Transport -- The Magnetic Tape Head -- Equalization -- Bias Current -- Monitoring Modes -- Tape, Tape Speed and Head Configurations -- Print-Through -- Analog Tape Noise -- Cleanliness -- Degaussing -- Editing Magnetic Tape -- Backup and Archive Strategies -- Backing up Your Analog Project -- Tape Restoration -- Archive Strategies -- Tape Availability -- Tape Emulation Plug-Ins -- Chapter 6 Digital Audio Technology -- The Language of Digital -- Digital Basics -- Sampling -- Quantization -- The Devil's in the Details -- The Nyquist Theorem -- Oversampling -- Signal-to-Error Ratio -- Dither -- Fixed- versus Floating-Point Processing…”
    Libro electrónico
  13. 2713
    Publicado 2010
    Tabla de Contenidos: “…5.5 UTRAN Internal Interfaces 87 -- 5.6 UTRAN Enhancements and Evolution 91 -- 5.7 UMTS CN Architecture and Evolution 93 -- References 95 -- 6 Physical Layer 97 /Antti Toskala -- 6.1 Introduction 97 -- 6.2 Transport Channels and Their Mapping to the Physical Channels 98 -- 6.3 Spreading and Modulation 102 -- 6.4 User Data Transmission 110 -- 6.5 Signaling 121 -- 6.6 Physical Layer Procedures 126 -- 6.7 Terminal Radio Access Capabilities 136 -- 6.8 Conclusion 138 -- References 139 -- 7 Radio Interface Protocols 141 /Jukka Vialén and Antti Toskala -- 7.1 Introduction 141 -- 7.2 Protocol Architecture 142 -- 7.3 The Medium Access Control Protocol 143 -- 7.4 The Radio Link Control Protocol 147 -- 7.5 The Packet Data Convergence Protocol 150 -- 7.6 The Broadcast/Multicast Control Protocol 151 -- 7.7 Multimedia Broadcast Multicast Service 152 -- 7.8 The Radio Resource Control Protocol 153 -- 7.9 Early UE Handling Principles 170 -- 7.10 Improvements for Call Set-up Time Reduction 170 -- References 171 -- 8 Radio Network Planning 173 /Harri Holma, Zhi-Chun Honkasalo, Seppo Hämäläinen, Jaana Laiho, Kari Sipilä and Achim Wacker -- 8.1 Introduction 173 -- 8.2 Dimensioning 174 -- 8.3 Capacity and Coverage Planning and Optimization 194 -- 8.4 GSM Co-planning 202 -- 8.5 Inter-Operator Interference 204 -- 8.6 WCDMA Frequency Variants 210 -- 8.7 UMTS Refarming to GSM Band 211 -- 8.8 Interference between GSM and UMTS 214 -- 8.9 Remaining GSM Voice Capacity 215 -- 8.10 Shared Site Solutions with GSM and UMTS 216 -- 8.11 Interworking of UMTS900 and UMTS2100 217 -- References 218 -- 9 Radio Resource Management 219 /Harri Holma, Klaus Pedersen, Jussi Reunanen, Janne Laakso and Oscar Salonaho -- 9.1 Introduction 219 -- 9.2 Power Control 220 -- 9.3 Handovers 232 -- 9.4 Measurement of Air Interface Load 246 -- 9.5 Admission Control 250 -- 9.6 Load Control (Congestion Control) 252 -- References 253 -- 10 Packet Scheduling 255 /Jeroen Wigard, Harri Holma, Renaud Cuny, Nina Madsen, Frank Frederiksen and Martin Kristensson…”
    Libro electrónico
  14. 2714
    Publicado 2017
    “…Focuses specifically on lossless information hiding for images Covers the most common visual medium, images, and the most common compression schemes, JPEG and JPEG 2000 Includes recent state-of-the-art techniques in the field of lossless image watermarking Presents many lossless hiding schemes, most of which come from the authors' publications in the past five years…”
    Libro electrónico
  15. 2715
    Publicado 2005
    “…We discuss a sample scenario based on realistic requirements for small and medium customers, and provide a guide for the development of this scenario. …”
    Libro electrónico
  16. 2716
    Publicado 2023
    Tabla de Contenidos: “…-- 1.3 The Inception of Zero Trust Concept -- 1.3.1 Cloud Security Alliance's Software Define Perimeter and Zero Trust -- 1.3.2 Google's BeyondCorp Zero Trust Model -- 1.3.3 Gartner's CARTA Framework for Zero Trust -- 1.3.3.1 CARTA's Zero Trust Implementation Approach -- 1.3.4 Netflix's LISA Model for Zero Trust -- 1.3.4.1 LISA Principles -- 1.3.5 Forrester's ZTX Framework -- 1.3.6 NIST SP 800:207 Zero Trust Framework -- 1.3.6.1 NIST's Zero Trust Architecture Foundation -- 1.3.6.2 Policy Engine -- 1.3.6.3 Policy Administrator -- 1.3.6.4 Policy Enforcement Point -- 1.3.7 The Open Group Zero Trust's Approach -- 1.3.7.1 Key Requirements for Zero Trust as per the Open Group -- 1.3.7.2 Organizational Value and Risk Alignment -- 1.3.7.3 Guardrails and Governance -- 1.3.7.4 Technology -- 1.3.7.5 Security Controls -- 1.3.8 Microsoft's Zero Trust Principles -- 1.4 Why Zero Trust Is Important -- 1.5 Benefits of Zero Trust -- 1.6 Zero Trust Principle Redefined -- 1.6.1 Re-Examine All Default Access Controls -- 1.6.2 Micro-Segmentation -- 1.6.3 Preventing Lateral Movement -- 1.6.4 Leverage a Variety of Preventative Techniques -- 1.6.5 Enable Real-Time Monitoring and Controls to Identify and Halt Malicious Activity Quickly -- 1.6.6 Align to the Broader Security Strategy -- 1.7 Zero Trust for Everyone -- 1.7.1 Government -- 1.7.2 Enterprises -- 1.7.3 Small and Medium Businesses -- 1.7.4 Consumers -- 1.8 Chapter Summary -- 2 Zero Trust - Disrupting the Business Model…”
    Libro electrónico
  17. 2717
    Publicado 2022
    Tabla de Contenidos: “…Commitment - Calculator -- On-Demand Instances -- Reserved Instance -- Payment Option -- AWS Calculator -- On-Demand Instance Cost -- Reserved Instance Cost -- Security on AWS -- Tools -- Tools for Access and Identity Provisioning and Protection -- Tools for Data Protection -- Monitoring and Logging Tools -- Security Event Response Mechanism -- Amazon Virtual Private Cloud Security (VPC) -- Subnet and Routing Tables -- Network Access Control List -- Security Groups (SGs) -- Virtual Private Gateway -- Internet Gateway -- Backup and Restore in AWS -- SAP HANA DB Backup/Recovery via AWS Backint Agent -- EC2 Instance and EBS Volume Backup to S3 -- Snapshot Backup from AWS Console -- EC2 Image Backup -- AWS Backup -- Backup Configuration Steps from AWS Console -- Restore Snapshot from AWS Console -- Disaster Recovery via AWS -- Passive DR Architecture - RPO Is More Than Zero and RTO Is Higher -- Steps to Configure the Passive DR -- Steps to Invoke Passive DR -- Semi-active DR Solution [RPO Is Near to Zero and RTO Is Medium] -- Steps to Configure the Semi-active DR -- Steps to Invoke DR -- Active-Active DR Solution [RPO Near to Zero and RTO Is Very Less] -- Steps to Configure the Active DR -- Steps to Invoke DR -- SAP HANA HSR Setup Guide -- Summary -- Cloud Foundation Design and Implementation…”
    Libro electrónico
  18. 2718
    por Pyeon, Cheol Ho
    Publicado 2021
    Tabla de Contenidos: “…Appendix A2: 235U-Fueled and Pb-Bi-Zoned ADS Core -- A2.1 Pb-Bi Target -- A2.1.1 Core Configurations -- A2.1.2 Results of Experiments -- A2.1.2.1 Reaction Rate Distribution -- A2.1.2.2 PNS and Feynman-α Methods -- A2.2 Subcriticality Measurements -- A2.2.1 Core Configurations -- A2.2.2 Results of Experiments -- A2.2.3 PNS and Feynman-α Methods -- A2.3 Reaction Rates -- A2.3.1 Core Configurations -- A2.3.2 Reaction Rate Distributions -- A2.3.3 Reaction Rates of Activation Foils -- References -- Appendix A3: 235U-Fueled and Pb-Zoned ADS Core -- A3.1 Core Configurations -- A3.1.1 ADS with 14 MeV Neutrons -- A3.1.2 ADS with 100 MeV Protons -- A3.2 Kinetics Parameters -- A3.2.1 ADS with 14 MeV Neutrons -- A3.2.1.1 Core Condition at Critical State -- A3.2.1.2 Case D1 (4560 HEU Plates) -- A3.2.1.3 Case D2 (4400 HEU Plates) -- A3.2.1.4 Case D3 (4320 HEU Plates) -- A3.2.1.5 Case D4 (4200 HEU Plates) -- A3.2.1.6 Case D5 (4080 HEU Plates) -- A3.2.1.7 Case D6 (3840 HEU Plates) -- A3.2.2 ADS with 100 MeV Protons -- A3.2.2.1 Core Condition at Critical State -- A3.2.2.2 Case F1 (4560 HEU Plates) -- A3.2.2.3 Case F2 (4440 HEU Plates) -- A3.2.2.4 Case F3 (4320 HEU Plates) -- A3.2.2.5 Case F4 (4200 HEU Plates) -- A3.2.2.6 Case F5 (4080 HEU Plates) -- A3.2.2.7 Case F6 (3960 HEU Plates) -- A3.2.2.8 Case F7 (3840 HEU Plates) -- A3.3 Reaction Rates -- A3.3.1 Core Configurations -- A3.3.2 Reaction Rate Distribution -- References -- Appendix A4: 235U-Fueled ADS Core in Medium-Fast Spectrum -- A4.1 Core Configurations -- A4.1.1 ADS with 14 MeV Neutrons -- A4.1.2 ADS with 100 MeV Protons -- A4.2 Results of Experiments -- A4.2.1 Criticality and Control Rod Worth -- A4.2.2 PNS and Feynman-α Methods -- A4.3 Kinetic Parameters -- A4.3.1 ADS with 14 MeV Neutrons -- A4.3.2 ADS with 100 MeV Protons -- A4.4 Reaction Rates -- A4.4.1 Core Configurations…”
    Libro electrónico
  19. 2719
    Publicado 2007
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Chapter 1 Introduction to Building Cisco Multilayer Switched Networks -- Regulatory Standards Driving Enterprise Architectures -- Hardware- and Software-Switching Terminology -- Multilayer Switching Overview -- Understanding Layers 2, 3, 4, and 7 Switching Terminology -- Layer 2 Switching in Depth -- Layer 3 Switching In-Depth -- Multilayer Switching -- Enterprise Network Architectures -- Cisco Service-Oriented Network Architecture -- Cisco Intelligent Information Network -- The Cisco AVVID Framework -- Purpose of Layer 3 Networks -- The Enterprise Models -- Enterprise Composite Network Model -- Enterprise Campus -- Enterprise Edge -- Service Provider Edge -- The Cisco Enterprise Data Center -- Introducing the Cisco Catalyst Switches -- Catalyst 6500 Family of Switches -- Catalyst 4500 and 4900 Families of Switches -- Catalyst 3560 Family of Switches -- Catalyst 2960 Family of Switches -- Study Tips -- Summary -- Review Questions -- Chapter 2 The Roles of Switches in Designing Cisco Multilayer Switched Networks -- Data Link Technologies -- 10-Mbps Ethernet -- Fast Ethernet -- Gigabit Ethernet -- Fast Ethernet and Gigabit Ethernet Auto-Negotiation -- 10-Gigabit Ethernet -- Gigabit Interface Converters -- Cisco Long-Reach Ethernet -- Metro Ethernet -- Designing Cisco Multilayer Switched Networks Using the Cisco Catalyst Switches and Data Link Technologies -- Reviewing the Campus Infrastructure Module of the Enterprise Composite Network Model -- Selecting Layer 2 or Layer 3 Switches -- Small Campus Network Design -- Medium-Sized Campus Network Design -- Large Campus Network Design -- Data Center -- Enterprise Edge -- Case Study: Designing a Cisco Multilayer Switched Campus Network -- Study Tips -- Summary -- Review Questions…”
    Libro electrónico
  20. 2720
    Publicado 2020
    Tabla de Contenidos: “…Ad Networks -- Data Management Platform (DMP) -- Datenschutz -- Konzepte - Kampagnentypen und Einsatzzwecke in Display Advertising und RTA -- Formen des Einkaufs - oder von Display zu RTA und wieder zurück -- Werbemittel - oft belächelt, fast immer unterschätzt -- In-Page-Ads -- Native Ads -- Videowerbemittel -- HTML5-Werbemittel -- Herausforderungen -- Fraud -- Brand Safety -- Tracking-Tags -- AdBlocker -- Kennzahlen und Erfolgsmessung -- KPIs - Definition und Bedeutung für die Erfolgsmessung -- Passende KPIs für die unterschiedlichen Kampagnentypen -- Lernen von Erfolgsbeispielen -- Performancekampagne -- Brand-Kampagne -- Checkliste für erfolgreiche Kampagnen -- Linktipps -- Interview mit Dominik Reisig -- Kapitel 9: E-Mail-Marketing -- Grundbegriffe und Einordnung von E-Mail-Marketing -- E-Mail-Marketing - eine Definition -- Einordnung von E-Mail-Marketing im Marketing-Mix -- Entwicklung des E-Mail-Marketings bis heute -- Grundlegendes Know-how im E-Mail-Marketing -- Wichtige Konzepte, Aufgaben und typische Herausforderungen -- E-Mail-Marketing-Strategie -- Toolauswahl: on demand versus on premise -- Adressgewinnung und Lead-Management -- E-Mail-Typen - ein Medium, tausend Gesichter -- E-Mail-Erstellung -- Content im E-Mail-Marketing -- Mehrstufige Kampagnen im E-Mail-Marketing -- Kennzahlen und Erfolgsmessung -- Wichtige E-Mail-Kennzahlen -- Benchmark-E-Mail-Kennzahlen -- Web Tracking und Behavior Tracking für eine geschlossene Customer Journey -- Lernen von Erfolgsbeispielen -- Schild steigert die Wirkung von Transaktionsmails -- Conrad reaktiviert Schläfer mit Content-Newslettern -- Checkliste für erfolgreichere Mailings -- Interview mit Luis Hanemann -- Kapitel 10: Social Media Marketing -- Grundbegriffe und Zusammenhänge von Social Media Marketing -- Entwicklung und Status quo des Social Web -- Hashtags…”
    Libro electrónico