Mostrando 20,621 - 20,640 Resultados de 26,560 Para Buscar '"performance"', tiempo de consulta: 0.17s Limitar resultados
  1. 20621
    Publicado 1968
    Grabación musical
  2. 20622
    por Cage, John, (1912-1992)
    Publicado 1991
    CDROM
  3. 20623
    Publicado 2012
    Tabla de Contenidos: “…The estimate of building energy performance 5.1. European Standard EN 15232 5.1.1. Automation Classes for energy efficiency 5.1.2. …”
    Libro electrónico
  4. 20624
    Publicado 2018
    Tabla de Contenidos: “…4.6.3 Lithium‐ion Battery -- 4.6.4 Liquid metal battery -- 4.6.5 Flow Battery -- 4.6.6 Nickle‐Based Battery -- 4.7 Thermal Storage -- 4.7.1 Sensible Heat Storage -- 4.7.2 Latent Heat Storage -- 4.7.3 Thermochemical Energy Storage (TES) -- 4.8 Hydrogen Energy Storage Technology -- 4.9 Summary -- References -- Chapter 5 Solar Energy Systems -- 5.1 Sun as Source of Energy -- 5.2 Solar Radiations on Earth -- 5.2.1 Spectral Distribution of Solar Energy -- 5.3 Measurement of Solar Radiation -- 5.3.1 Pyrheliometer -- 5.3.2 Pyranometer -- 5.3.3 Sources of Errors in Radiation Meters -- 5.3.4 Sunshine Recorder -- 5.4 Solar Radiation on Different Surfaces -- 5.4.1 Zenith and Zenith Angle -- 5.4.2 Solar Time -- 5.4.3 Latitude (∅) -- 5.4.4 Declination Angle (δ) -- 5.4.5 Hour Angle (ω) -- 5.4.6 Surface Azimuth Angle (Y) -- 5.4.7 Tilt Angle (β) -- 5.4.8 Angle of Incidence -- 5.4.9 Solar Radiation on an Inclined Surface -- 5.5 Utilization of Solar Energy -- 5.6 Solar Thermal Systems -- 5.6.1 Flat‐Plate Collectors -- 5.6.1.1 Thermal Performance of Collector -- 5.6.2 Evacuated Tube Collector -- 5.6.2.1 Direct‐Flow Evacuated Tube Collector -- 5.6.2.2 Heat‐Pipe Evacuated Tube Collector -- 5.6.3 Parabolic Collectors -- 5.6.4 Linear Fresnel Reflector (LFR) -- 5.6.5 Parabolic Trough Collector (PTC) -- 5.6.6 Cylindrical Trough Collector (CTC) -- 5.6.7 Parabolic Dish Reflector -- 5.6.8 Heliostat Field Collector (HFC) -- 5.7 Application of Solar Energy -- 5.7.1 Solar Water Heating -- 5.7.2 Passive Systems with Thermosiphon Circulation -- 5.7.3 Integrated Collector Storage Systems (Passive) -- 5.7.4 Active Solar Systems -- 5.7.4.1 Direct Circulation Systems -- 5.7.4.2 Indirect Circulation (Closed‐Loop) Systems -- 5.7.5 Air Heating Systems -- 5.8 Solar Thermal Power Generation -- 5.9 Desalination of Water -- 5.10 Steam Pressurization Systems Using Heat Energy -- 5.11 Summary…”
    Libro electrónico
  5. 20625
    Publicado 2021
    Tabla de Contenidos: “…5.1 Updating state without causing a re-render -- 5.1.1 Comparing useState and useRef when updating state values -- 5.1.2 Calling useRef -- 5.2 Storing timer IDs with a ref -- 5.3 Keeping references to DOM elements -- 5.3.1 Setting focus on an element in response to an event -- 5.3.2 Managing a text box via a ref -- Summary -- 6 Managing application state -- 6.1 Passing shared state to child components -- 6.1.1 Passing state from a parent by setting props on the children -- 6.1.2 Receiving state from a parent as a prop -- 6.1.3 Receiving an updater function from a parent as a prop -- 6.2 Breaking components into smaller pieces -- 6.2.1 Seeing components as part of a bigger app -- 6.2.2 Organizing multiple components within a page's UI -- 6.2.3 Creating a BookableDetails component -- 6.3 Sharing the state and dispatch function from useReducer -- 6.3.1 Managing state in the BookablesView component -- 6.3.2 Removing an action from the reducer -- 6.3.3 Receiving state and dispatch in the BookablesList component -- 6.4 Sharing the state value and updater function from useState -- 6.4.1 Managing the selected bookable in the BookablesView component -- 6.4.2 Receiving the bookable and updater function in BookablesList -- 6.5 Passing functions to useCallback to avoid redefining them -- 6.5.1 Depending on functions we pass in as props -- 6.5.2 Maintaining function identity with the useCallback hook -- Summary -- 7 Managing performance with useMemo -- 7.1 Breaking the cook's heart by calling, "O, shortcake!" …”
    Libro electrónico
  6. 20626
    Publicado 2014
    Tabla de Contenidos: “…7.5.3.2 Traffic intensity monitoring -- 7.5.3.3 Environmental monitoring -- 7.5.3.4 Parks and gardens irrigation -- 7.5.3.5 Citizens apps -- 7.5.4 Sustainability Plan -- 7.6 FITMAN -- 7.6.1 The "IoT for Manufacturing"Trials in FITMAN -- 7.6.2 FITMAN Trials' Requirements to "IoT for Manufacturing" -- 7.6.3 The TRW and Whirlpool Smart Factory Trial -- 7.6.4 FITMAN Trials' Exploitation Plans &amp -- Business Opportunities -- 7.6.5 Conclusions and Future Outlook -- 7.7 OSMOSE -- 7.7.1 The AW and EPC "IoT for Manufacturing"Test Cases -- 7.7.2 OSMOSE Use Cases' Requirements to "IoT for Manufacturing" -- 7.7.3 OSMOSE Use Cases' Exploitation Plans &amp -- Business Opportunities -- 7.7.4 Conclusions and Future Outlook -- Acknowledgments -- List of Contributors -- Contributing Projects and Initiatives -- References -- 8 Bringing IP to Low-power Smart Objects: The Smart Parking Case in the CALIPSO Project -- Abstract -- 8.1 Introduction -- 8.1.1 Bringing IP to Energy-Constrained Devices -- 8.1.2 The CALIPSO Project -- 8.2 Smart Parking -- 8.3 CALIPSO Architecture -- 8.3.1 CALIPSO Communication Modules -- 8.3.1.1 MAC layer -- 8.3.1.2 Routing layer -- 8.3.1.3 Application layer -- 8.3.2 CALIPSO Security Modules -- 8.4 Calipso Implementation and Experimentation with Smart Parking -- 8.4.1 Implementation of Calipso Modules -- 8.4.2 Experimentation Plan for Smart Parking -- 8.4.2.1 Prototype description -- 8.4.2.2 Description of the scenario -- 8.4.2.3 Performance indicators -- 8.5 Concluding Remarks -- Acknowledgements -- References -- 9 Insights on Federated Cloud Service Management and the Internet of Things -- Abstract -- 9.1 Introduction -- 9.2 Federated Cloud Services Management -- 9.2.1 Cloud Data Management -- 9.2.2 Cloud Data Monitoring -- 9.2.3 Cloud Data Exchange -- 9.2.4 Infrastructure Configuration and re-Configuration…”
    Libro electrónico
  7. 20627
    Tabla de Contenidos: “…Économie et marché du travail -- 2.3.1. Forte performance macro-économique à long terme d'une économie diversifiée -- 2.3.2. …”
    Libro electrónico
  8. 20628
    por Editions Ocde Staff
    Publicado 2004
    Tabla de Contenidos: “…Le rôle accru des travailleurs étrangers au service des personnes âgées et des jeunes enfants -- 2. Les performances de l'emploi étranger au cours de la dernière décennie -- Graphique I.9. …”
    Libro electrónico
  9. 20629
    Tabla de Contenidos: “…Résultats scolaires en lecture et en mathématiques des enfants selon leur lieu de... -- Encadré I.4. Performances scolaires des enfants d'origine étrangère -- Carte I.1. …”
    Libro electrónico
  10. 20630
    Tabla de Contenidos: “…Suivi de la mise en œuvre des réformes du marché du travail et des performances,... -- Graphique IV.7. Variabilité conjoncturelle et chômage tendanciel, 1990-98 -- Graphique V.1 Évolutions alternatives des concentrations de CO2 -- Graphique V.2 Coûts moyens de scénarios alternatifs, 2010-50 -- Graphique VI.1. …”
    Libro electrónico
  11. 20631
    Tabla de Contenidos: “…Les TIC et leur rôle dans l'économie -- Les TIC et leur contribution à la croissance et aux performances de l'économie -- Les investissements dans les TIC -- Figure 1. …”
    Libro electrónico
  12. 20632
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Rapport de dépendance et taux de fécondité dans les zones rurales et urbaines -- Les villes petites et moyennes enregistrent de bonnes performances -- Les moyennes masquent de fortes hétérogénéités entre villes et au sein des villes -- Estimation des gains de PIB dus à l'urbanisation -- Graphique 1.21. …”
    Libro electrónico
  13. 20633
    Publicado 2019
    Tabla de Contenidos: “…1.5.4 Characteristic 4: Digital Value Can Be Distributed via Multi-Sided Markets -- 1.5.5 Characteristic 5: Digital Value Is Limitless -- 1.5.5.1 Characteristic 5a: Digital Value Has Limitless Utility to the Owner -- 1.5.5.2 Characteristic 5b: There Are Limitless Opportunities to Distribute and Consume Digital Value -- 1.6 Digital Value Matrix: Categorization of Digital Assets Based on Their Economic Functions -- 1.6.1 Digital Asset on an Individual Level -- 1.6.2 Digital Asset on an Organizational Level -- 1.6.3 Digital Asset on a National Level -- 1.6.4 Digital Asset on the Global Level -- 1.7 Valuation of Digital Assets as Economic Goods -- 1.7.1 Attributes of Digital Assets Contributing to Intrinsic Digital Value Creation -- 1.7.1.1 Data Quality -- 1.7.1.2 Risk Exposure -- 1.7.1.3 Age -- 1.7.1.4 Data Volume -- 1.7.1.5 System Quality -- 1.7.1.6 Production Cost -- 1.7.2 Attributes of Digital Assets Contributing to Extrinsic Digital Value Creation -- 1.7.2.1 Exclusivity -- 1.7.2.2 Network Connectivity -- 1.7.2.3 Accessibility -- 1.7.2.4 Reproduction Cost -- 1.7.2.5 Economies of Scale -- 1.7.2.6 Data Format -- 1.7.2.7 Level of Structure -- 1.7.2.8 Delivery Cadence -- 1.7.2.9 Power Supplies -- 1.8 Existing Challenges for Digital Asset Valuation -- 1.8.1 Inherent Challenges -- 1.8.2 Market Challenges -- 1.8.3 Taxation Challenges -- 1.8.4 Regulatory and Standardization Challenges -- 1.9 Current Methods for Digital Asset Valuation -- 1.9.1 Intrinsic Value -- 1.9.2 Direct Conversion of Financial Value -- 1.9.3 Business and Performance Value -- 1.9.4 Cost-Based Models -- Example: Total Cost of Ownership (TCO) -- 1.9.5 Market-Based Models -- Example: Market for Personal Data -- 1.9.6 Income-Based Models -- 1.9.7 Option Models -- 2 Digital Theory of Value -- 2.1 The Search for a Value Theory Supporting the Fourth Industrial Revolution…”
    Libro electrónico
  14. 20634
    por Ebner, Jürgen
    Publicado 2023
    Tabla de Contenidos: “…7.3.5 Netzwerkverkehr‌ ausspähen -- 7.4 Webgestütztes Eindringen -- 7.4.1 Schwachstellen in Webapplikationen‌‌ finden -- 7.4.2 Webseite analysieren -- 7.4.3 Informationen abfangen -- 7.4.4 Auf Schwachstellen‌ scannen -- 7.5 Nachbearbeitung und Erhaltung des Zugriffs -- 7.6 Abschluss eines Penetrationstests -- 7.7 Zusammenfassung -- Teil III: Tools in Kali Linux -- Kapitel 8: Tools zur Informationsbeschaffung und Schwachstellenanalyse -- 8.1 Tools zur Informationssammlung -- 8.1.1 Nmap - Das Schweizer Taschenmesser für Portscanning -- 8.1.2 TheHarvester - E-Mail-Adressen aufspüren und ausnutzen -- 8.1.3 Dig‌ - DNS-Informationen abrufen -- 8.1.4 Fierce - falls der Zonentransfer nicht möglich ist -- 8.1.5 MetaGooFil - Metadaten extrahieren -- 8.1.6 HTTrack - Webseite als Offline-Kopie -- 8.1.7 Maltego - gesammelte Daten in Beziehung setzen -- 8.1.8 Legion - Automation in der Informationsbeschaffung -- 8.2 Schwachstellenanalyse-Tools‌‌ -- 8.2.1 OpenVAS - Sicherheitslücken aufdecken -- 8.2.2 Nikto - Aufspüren von Schwachstellen auf Webservern -- 8.2.3 Siege‌ - Performance Test von Webseiten -- 8.3 Sniffing und Spoofing -- 8.3.1 Dsniff - Sammlung von Werkzeugen zum Ausspionieren von Netzwerkdatenverkehr‌ -- 8.3.2 Ettercap‌ - Netzwerkverkehr ausspionieren‌ -- 8.3.3 Wireshark - der Hai im Datenmeer -- Kapitel 9: Tools für Attacken -- 9.1 Wireless-Attacke‌n -- 9.1.1 aircrack-ng‌ -- 9.1.2 wifiphisher -- 9.1.3 Kismet -- 9.2 Webseiten-Penetration-Testing -- 9.2.1 WebScara‌b -- 9.2.2 Skipfish -- 9.2.3 Zed Attack Proxy‌ -- 9.3 Exploitation-Tools -- 9.3.1 Metasploit -- 9.3.2 Armitage -- 9.3.3 Social Engineer Toolkit (SET) -- 9.3.4 Searchsploit -- 9.4 Passwort-Angriffe -- 9.4.1 Medusa -- 9.4.2 Hydra -- 9.4.3 John the Ripper -- 9.4.4 Samdump2 -- 9.4.5 chntpw -- Kapitel 10: Forensik-Tools -- 10.1 Dcfld‌d - Abbild für forensische Untersuchung erstellen -- 10.2 Autopsy…”
    Libro electrónico
  15. 20635
    Publicado 2025
    Tabla de Contenidos: “…2.6.1 Use of Texture and Context -- 2.6.2 Using Ancillary Multisource Data -- 2.7 Epilogue -- References -- Chapter 3 Dimensionality Reduction: Feature Extraction and Selection -- 3.1 Feature Extraction -- 3.1.1 Principal Component Analysis -- 3.1.2 Minimum/Maximum Autocorrelation Factors -- 3.1.3 Maximum Noise Fraction (MNF) Transformation -- 3.1.4 Independent Component Analysis -- 3.1.5 Projection Pursuit -- 3.2 Feature Selection -- 3.2.1 Greedy Search Methods -- 3.2.2 Simulated Annealing -- 3.2.3 Separability Indices -- 3.2.4 Filter-Based Methods -- 3.2.4.1 Correlation-Based Feature Selection -- 3.2.4.2 Information Gain -- 3.2.4.3 Gini Impurity Index -- 3.2.4.4 Minimum Redundancy-Maximum Relevance -- 3.2.4.5 Chi-Square Test -- 3.2.4.6 Relief-F -- 3.2.4.7 Symmetric Uncertainty -- 3.2.4.8 Fisher's Test -- 3.2.4.9 OneR -- 3.2.5 Wrappers -- 3.2.5.1 Genetic Algorithm -- 3.2.5.2 Particle Swarm Optimization -- 3.2.5.3 Feature Selection with SVMs -- 3.2.6 Embedded Methods -- 3.2.6.1 K-Nearest Neighbor-Based Feature Selection -- 3.2.6.2 Feature Selection with Ensemble Learners -- 3.2.6.3 Hilbert-Schmidt Independence Criterion with Lasso -- 3.3 Concluding Remarks -- References -- Chapter 4 Multisource Image Fusion and Classification -- 4.1 Image Fusion -- 4.1.1 Image Fusion Methods -- 4.1.1.1 PCA-Based Image Fusion -- 4.1.1.2 IHS-Based Image Fusion -- 4.1.1.3 Brovey Transform -- 4.1.1.4 Gram-Schmidt Transform -- 4.1.1.5 Wavelet Transform -- 4.1.1.6 Deep Learning for Image Fusion -- 4.1.2 Assessment of Fused Image Quality -- 4.1.3 Performance Evaluation of Fusion Methods -- 4.2 Multisource Classification Using the Stacked-Vector Method -- 4.3 The Extension of Bayesian Classification Theory -- 4.3.1 An Overview -- 4.3.1.1 Feature Extraction -- 4.3.1.2 Probability or Evidence Generation -- 4.3.1.3 Multisource Consensus…”
    Libro electrónico
  16. 20636
    por Prakash, Kolla Bhanu
    Publicado 2024
    Tabla de Contenidos: “…-- 9.8.4 Benefits of Modeling Validation -- 9.8.5 Model Validation Traps -- 9.8.6 Data Verification -- 9.8.7 Model Performance and Validation -- 9.9 Self-Driving Cars -- 9.10 K-Fold Cross Validation…”
    Libro electrónico
  17. 20637
    Publicado 2003
    Tabla de Contenidos: “…9.2.10 PSSP security installation and configuration -- 9.2.11 Start RSCT subsystems -- 9.2.12 Set up nodes to be installed -- 9.2.13 spchvgobj -- 9.2.14 Verify all node information -- 9.2.15 Change the default network tunable values -- 9.2.16 Perform additional node customization -- 9.2.17 spbootins -- 9.2.18 Setting the switch -- 9.2.19 Configuring the CWS as boot/install server -- 9.2.20 Verify that the System Management tools were correctly installed -- 9.2.21 Network boot the boot/install server and nodes -- 9.2.22 Verify node installation -- 9.2.23 Enable s1_tty on the SP-attached server (SAMI protocol only) -- 9.2.24 Update authorization files in restricted mode for boot/install servers (optional) -- 9.2.25 Run verification tests on all nodes -- 9.2.26 Check the system -- 9.2.27 Start the switch -- 9.2.28 Verify that the switch was installed correctly -- 9.3 Key files -- 9.3.1 /etc/bootptab.info -- 9.3.2 /tftpboot -- 9.3.3 /usr/sys/inst.images -- 9.3.4 /spdata/sys1/install/images -- 9.3.5 /spdata/sys1/install/&lt -- name&gt -- /lppsource -- 9.3.6 /spdata/sys1/install/pssplpp/PSSP-x.x -- 9.3.7 /spdata/sys1/install/pssp -- 9.3.8 image.data -- 9.4 Related documentation -- 9.5 Sample questions -- 9.6 Exercises -- Chapter 10. …”
    Libro electrónico
  18. 20638
    por Chiueh, Tzi-Dar, 1960-
    Publicado 2012
    Tabla de Contenidos: “…Mobile MIMO WiMAX System-on-Chip Design 321 -- 11.1 Introduction of WiMAX Standard 321 -- 11.2 Mobile WiMAX OFDMA and Frame Structure 322 -- 11.3 WiMAX Baseband Receiver Design 325 -- 11.3.1 Automatic Gain Control (AGC) 325 -- 11.3.2 Packet Detection (PKD) 326 -- 11.3.3 Symbol Timing Recovery (STR) 328 -- 11.3.4 Carrier Frequency Offset (CFO) Compensation 328 -- 11.3.5 Channel Estimation 330 -- 11.3.6 MIMO Detection 330 -- 11.3.7 Outer Receiver 333 -- 11.4 WiMAX Media Access Control (MAC) Design 333 -- 11.5 Implementation and Field Trial of the WiMAX SoC 336 -- 11.5.1 Laboratory Testing and Performance Evaluation 338.…”
    Libro electrónico
  19. 20639
    Publicado 2020
    Tabla de Contenidos: “…Information gathering -- 2 Discovering network hosts -- 2.1 Understanding your engagement scope -- 2.1.1 Black-box, white-box, and grey-box scoping -- 2.1.2 Capsulecorp -- 2.1.3 Setting up the Capsulecorp Pentest environment -- 2.2 Internet Control Message Protocol -- 2.2.1 Using the ping command -- 2.2.2 Using bash to pingsweep a network range -- 2.2.3 Limitations of using the ping command -- 2.3 Discovering hosts with Nmap -- 2.3.1 Primary output formats -- 2.3.2 Using remote management interface ports -- 2.3.3 Increasing Nmap scan performance -- 2.4 Additional host-discovery methods -- 2.4.1 DNS brute-forcing -- 2.4.2 Packet capture and analysis -- 2.4.3 Hunting for subnets -- Summary -- 3 Discovering network services…”
    Libro electrónico
  20. 20640
    Publicado 2003
    Tabla de Contenidos: “…High availability and failover -- 16.1 Failover concept and terminology -- 16.2 Implementation of failover -- 16.2.1 Prerequisites -- 16.2.2 Installation and customization of failover -- 16.2.3 Setup for z/OS -- 16.3 Performing failover -- 16.3.1 Enabling failover -- 16.3.2 Enabling reverse failover -- 16.4 Limitations and discussion -- 16.5 Troubleshooting tips -- Chapter 17. …”
    Libro electrónico