Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 32
- Application software 28
- Cloud computing 26
- Computer networks 24
- Database management 23
- Research & information: general 23
- Engineering & Applied Sciences 22
- Management 17
- Computer Science 15
- Electronic data processing 14
- Java (Computer program language) 14
- Wireless communication systems 14
- Biology, life sciences 13
- Client/server computing 13
- Design and construction 12
- Medicine 12
- Computer software 11
- Technology: general issues 11
- machine learning 11
- Information technology 10
- Software engineering 10
- Web services 10
- high-throughput sequencing 10
- Artificial intelligence 9
- Computer programming 9
- Data processing 9
- Telecommunication 9
- Computer architecture 8
- Database Management 8
- Electrical & Computer Engineering 8
-
441por Knapp, Eric D.Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
Publicado 2024
Libro electrónico -
442Publicado 2024Tabla de Contenidos: “…-- Use in distributed systems -- Designing a key-value store -- Enhancing scalability and data replication -- Boosting scalability -- Consistent hashing -- Virtual nodes -- Data duplication strategies -- Implementing get and put functions -- Implementing get and put operations -- Using r and w -- Ensuring fault tolerance and identifying failures in a key-value store -- Managing temporary failures -- Addressing permanent failures -- Ring membership promotion for failure detection -- A system design interview - key value store design questions and strategies -- DynamoDB -- No fixed schema -- API functions -- Partitioning data in DynamoDB -- Throughput optimizations in DynamoDB -- High availability in DynamoDB -- Column-family databases -- HBase -- HBase details -- Graph-based databases -- The Neo4j graph database -- Neo4j details -- Relational modeling versus graph modeling -- Graph modeling -- Adding a new node to an existing graph -- Summary -- References -- Chapter 6: Distributed Cache -- What is caching? …”
Libro electrónico -
443Publicado 2015Tabla de Contenidos: “…4.2.2.2 Problem response and resolution time -- 4.2.2.3 Scalability -- 4.2.2.4 Utilization -- 4.2.2.5 Latency and throughput -- 4.2.3 Data Center Resource Celling -- 4.3 Data Center Space -- 4.3.1 Five Types of Space -- 4.3.1.1 Total space (building shell) -- 4.3.1.2 Total adjacent lot size (raw lot size) -- 4.3.1.3 Whitespace (raised floor) -- 4.3.1.4 Effective usable space (rack space) -- 4.3.1.5 General space -- 4.3.2 Data Center Functional Rooms -- 4.3.2.1 Utility support functions -- 4.3.2.1.1 Mechanical rooms -- 4.3.2.1.2 Electrical rooms -- 4.3.2.1.3 Staging area -- 4.3.2.2 Computing functions -- 4.3.2.2.1 Entrance rooms -- 4.3.2.2.2 Computer rooms -- 4.3.2.2.3 Telecommunication rooms -- 4.3.2.3 Operational functions -- 4.3.2.3.1 Network operation rooms -- 4.3.2.3.2 Common area -- 4.3.2.3.3 General office space -- 4.4 How to Estimate Cost of Space -- 4.5 Summary -- 4.6 Review Questions -- 5 Data Center Power -- 5.1 Introduction -- 5.2 Fundamentals of Power -- 5.2.1 Three Basic Power Metrics -- 5.2.2 Power Factor for AC Power -- 5.3 Power Panel (Circuit Breaker) -- 5.3.1 Type of Circuit Breaker and Selection -- 5.3.2 Circuit Breaker Coordination -- 5.4 Transfer Switches and Generators -- 5.4.1 Static Transfer Switch (STS) -- 5.4.2 Automatic transfer switch (ATS) -- 5.4.3 Generator -- 5.5 Uninterruptible Power Supply (UPS) -- 5.5.1 Different Types of UPS Topologies -- 5.5.1.1 Standby or offline single UPS topology -- 5.5.1.2 Line interactive UPS topology -- 5.5.1.3 Online double conversion -- 5.5.1.4 Delta conversion topology -- 5.5.1.5 Rotary UPS topology -- 5.6 How to Select UPS Topologies -- 5.6.1 UPS Redundancy and Cost Efficiency -- 5.6.1.1 Configuration of UPS redundancy -- 5.6.1.2 Single module system (SMS) -- 5.6.1.3 1+1 redundancy or two module system -- 5.6.1.4 N+1 redundancy -- 5.6.1.5 2(N+1) redundancy…”
Libro electrónico -
444Publicado 2022Tabla de Contenidos: “…4.4.1 System model and fading model -- 4.4.1.1 System model -- 4.4.1.2 Fading model -- 4.4.2 Outage probability analysis -- 4.4.3 Outage probability -- 4.4.3.1 Asymptotic outage probability -- 4.4.3.2 Diversity order -- 4.4.3.3 System throughput -- 4.4.4 Location optimization -- 4.4.5 Numerical results -- 4.4.6 Conclusion -- 4.5 Future research prospects -- References -- 5 MmWave technology and Terahertz technology IoT communications -- 5.1 Introduction -- 5.1.1 mmWave technology IoT communications -- 5.1.1.1 Related works -- 5.1.2 Terahertz technology IoT communications -- 5.1.3 MIMO-OFDMA Terahertz IoT networks -- 5.2 Hybrid precoding design for wideband THz massive MIMO-OFDM systems with beam squint -- 5.2.1 Antenna structure and hybrid precoding design -- 5.2.1.1 Fully-connected structure and hybrid precoding design -- 5.2.1.2 Subarray structure and hybrid precoding design -- 5.2.2 Simulation results -- 5.2.3 Conclusions -- 5.3 Robust beamforming designs in secure MIMO SWIPT IoT networks with a non-linear channel model -- 5.3.1 System model -- 5.3.1.1 Network model -- 5.3.1.2 Transmission protocol -- 5.3.1.3 Non-linear EH model -- 5.3.2 Problem formulation and robust design methods -- 5.3.2.1 Problem formulation -- 5.3.2.2 Two-layer optimization approach -- 5.3.2.3 Low-complexity SPCA algorithm -- 5.3.2.4 Optimality analysis -- 5.3.3 Computational complexity -- 5.3.4 Simulation results -- 5.3.5 Conclusion -- 5.4 Robust design for intelligent reflecting surface assisted MIMO-OFDMA Terahertz IoT networks -- 5.4.1 System model -- 5.4.1.1 Problem formulation -- 5.4.2 Solution of the weighted sum rate optimization problem -- 5.4.2.1 Optimization of F and vm[k] under fixed Φ -- 5.4.2.2 Optimization of Φ under fixed F and Vm[k] -- 5.4.3 Extension to imperfect CSIs from IRS to users -- 5.4.3.1 Optimization of F and vm[k] under fixed Φ…”
Libro electrónico -
445Publicado 2015Tabla de Contenidos: “…Centric, Multimedia Applications for PPDR 51 -- 2.2.1 Video Transmission 51 -- 2.2.2 Geographic Information Systems 54 -- 2.2.3 Location and Tracking 55 -- 2.2.4 Electronic Conferencing and Coordination Tools for Incident Command 56 -- 2.2.5 Remote Database Access and Information Transfer Applications 56 -- 2.2.6 PPDR Personnel Monitoring and Biomedical Telemetry 57 -- 2.2.7 Remote Emergency Medical Services 58 -- 2.2.8 Sensors and Remotely Controlled Devices 58 -- 2.2.9 Mobile Office 59 -- 2.3 Characterization of Broadband Data Applications for PPDR 59 -- 2.4 Assessment of the Data Capacity Needs in Various Operational Scenarios 66 -- 2.4.1 Throughput Requirements of PPDR Applications 66 -- 2.4.2 Day?]…”
Libro electrónico -
446Publicado 2023Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Chapter 1 Introduction to Machine Learning for Analyzing Material-Microbe Interactions -- 1.1 Introduction -- References -- Chapter 2 Introduction to 2D Materials -- 2.1 Classification of 2D Materials -- 2.2 Synthesis of 2D Materials -- 2.2.1 Top-Down Methods -- 2.2.2 Bottom-Up Methods -- 2.2.3 Layer Transfer Methods -- 2.3 Functionality of 2D Materials -- 2.3.1 Mechanical Properties -- 2.3.2 Electrical Properties -- 2.3.3 Optical Properties -- 2.4 Applications of 2D Materials -- References -- Chapter 3 An Overview of Machine Learning -- 3.1 Introduction -- 3.1.1 The Processing Pipeline of an ML Task -- 3.1.2 Data Integration -- 3.1.3 Data Preparation -- 3.1.4 Model Building -- 3.1.5 Model Evaluation -- 3.2 ML Algorithms -- 3.2.1 Bias and Variance -- 3.3 Unsupervised Learning -- 3.3.1 Cluster Analysis -- 3.3.2 Principal Component Analysis (PCA) -- 3.4 Supervised Learning -- 3.4.1 Regression -- 3.4.2 Classification -- 3.4.3 Supervised Learning Variants: Self-Supervised Learning -- 3.5 Deep Learning -- 3.5.1 Convolutional Neural Networks (CNNs) -- 3.6 Recurrent Neural Networks (RNN) -- References -- Chapter 4 Discovery of 2D Materials with Machine Learning -- 4.1 Introduction: High-Throughput Screening -- 4.2 ML Approaches for 2D Materials Research -- 4.2.1 Three ML Approaches for 2D Materials Research -- 4.2.2 A Summary of the Use of Machine Learning in 2D Materials Research -- 4.3 Prediction of 2D Material Properties Using Machine Learning -- 4.4 Application Machine Learning Approaches to Discover Novel 2D Materials -- 4.4.1 Predictions of Crystal Structure -- 4.4.2 Prediction of Components -- 4.5 Machine Learning for Miscellaneous Functions -- 4.6 Assessment of Common Challenges and Their Prevention Methods -- 4.6.1 The Problems with Model Building -- 4.6.2 Usability…”
Libro electrónico -
447Publicado 2019Tabla de Contenidos: “…4.2 Primary Drivers, 4.2.1 Internal and External Drivers, 4.3 Secondary Drivers, 4.4 Practical Issues with Drivers, 4.4.1 Sub-Classification of Primary Drivers, 4.4.2 Avoid Pseudo-Drivers, 4.4.3 Things are rarely Black or White, 4.5 Accuracy and Precision of Primary and Secondary Drivers, 4.5.1 Accuracy, Precision and Drivers - A Pareto Perspective, 4.5.2 Cone of Uncertainty, 4.6 3-Point Estimates as a Measure of Relative Accuracy and Uncertainty, 4.7 Precision as an Expression of Appropriate or Inappropriate Exactness, 4.8 Chapter Review, References, 5 Factors, Rates, Ratios, and Estimating by Analogy, 5.1 Estimating Metrics, 5.1.1 Where to use them, 5.1.2 The Views of Others, 5.1.3 Underlying Linear Relationship, 5.2 Rates, 5.3 Factors, 5.4 Ratios, 5.5 Dealing with Multiple Rates, Factors (and Ratios), 5.5.1 Anomalous Analogies, 5.5.2 Analogies with an Additive Model, 5.5.3 Analogies with a Multiplicative Model, 5.6 Sensitivity Analysis on Factors, Rates and Ratios, 5.6.1 Choosing a Sensitivity Range Quantitatively, 5.6.2 Choosing a Sensitivity Range around a Measure of Central Tendency, 5.6.3 The Triangulation Option, 5.6.4 Choosing a Sensitivity Range around a High-end or Low-end Metric, 5.6.5 Choosing a Sensitivity Range when all else fails, 5.7 Chapter Review, References, 6 Data Normalisation - Levelling the Playing Field, 6.1 Classification of Data Sources - Primary, Secondary and Tertiary Data, 6.1.1 Primary Data, 6.1.2 Secondary Data, 6.1.3 Tertiary Data, 6.1.4 Quarantined Data, 6.2 Types of Normalisation Methods and Techniques, 6.3 Normalisation can be a Multi-Dimensional Problem, 6.3.1 Error Related, 6.3.2 Volume, Quantity or Throughput Related - Economies of Scale, 6.3.3 Scale Conversion - Fixed and Variable Factors, 6.3.4 Date or Time Related, 6.3.5 Life Cycle Related, 6.3.6 Key Groupings - Role Related, 6.3.7 Scope Related (Subjective), 6.3.8 Complexity - Judgement Related (Subjective), 6.4 The Estimator as a Time Traveller, 6.4.1 Use of Time-based Indices Now and Then, 6.4.2 Time-based Weighted Indices, 6.4.3 Time-based Chain-Linked Weighted Indices, 6.4.4 The Doubling Rule for Escalation, 6.4.5 Composite Index: Is that not just a Weighted Index by another Name? …”
Libro electrónico -
448Publicado 2024Tabla de Contenidos: “…Living in an eventually consistent world -- Staging -- Cooperative -- Atomic -- Consistency -- Transparency -- Facts -- Chain reaction -- Concurrency and partitions -- Order tolerance and idempotence -- Parallelism -- Publishing to an event hub -- Event bus -- Domain events -- Event envelope -- Event-carried state transfer -- Substitution -- Internal versus external -- Routing and channel topology -- Dissecting the Event Sourcing pattern -- System-wide event sourcing -- Event lake -- Perpetual storage -- Indexing events -- Replaying events -- Event streams -- Temporal storage -- Stream-first event sourcing -- Concurrency control -- Micro-event stores -- Processing event streams -- Micro batching -- Choosing a programming paradigm -- Imperative programming -- Functional reactive programming -- Stream processing -- Creating a stream -- Unit of work -- Filtering and multiplexing -- Mapping -- Connectors -- Designing for failure -- Backpressure and rate limiting -- Poison events -- Fault events -- Resubmission -- Optimizing throughput -- Batch size function parameter -- Asynchronous non-blocking I/O -- Pipelines and multiplexing -- Pipeline patterns -- Sharding -- Batching and grouping -- Batching -- Grouping -- Summary -- Chapter 5: Turning the Cloud into the Database -- Fighting data gravity -- Competing demands -- Insufficient capacity -- Intractable volumes -- Embracing the data life cycle -- Create phase -- Use phase -- Analyze phase -- Archive phase -- Turning the database inside out -- The transaction log -- Derived data -- Dissecting the CQRS pattern -- System wide CQRS -- Materialized views -- Inbound bulkheads -- Live cache -- Capacity per reader, per query -- Keeping data lean -- Projections -- Time to live -- Implementing idempotence and order tolerance -- Deterministic identifiers -- Inverse optimistic locking -- Immutable event triggers…”
Libro electrónico -
449Publicado 2013Tabla de Contenidos: “…Hydrophilic Interaction Chromatography (HILIC) for Drug Discovery 5.1 Drug Discovery Model 5.2 HILIC Applications for in vitro Biology 5.2.1 Biological screening and hit finding 5.2.1.1 Target selection and assay validation 5.2.1.2 High-throughput screening 5.2.2 New drug discovery strategies 5.3 HILIC Applications and Advances for Discovery Chemistry 5.3.1 Lead identification 5.3.2 Lead optimization 5.3.2.1 ADME profile 5.3.2.2 Biopharmaceutics 5.3.2.3 Chiral purity 5.3.3 Candidate selection 5.4 Practical Considerations 5.5 Conclusions Chapter 6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
450por Meyers, Michael, 1961-Tabla de Contenidos: “…-- Power Saving -- Hardware Consolidation -- System Recovery -- System Duplication -- Research -- Virtualization in Modern Networks -- Virtual Machine Managers -- Hypervisors -- Virtual Switches -- Virtual PBX -- Network as a Service -- Chapter Review -- Questions -- Answers -- Chapter 18 Network Management -- Test Specific -- Network Configuration Management -- Configuration Management Documentation -- Change Management Documentation -- Monitoring Performance and Connectivity -- Performance Monitor -- Logs and Network Traffic -- Network Performance Optimization -- Caching -- Controlling Data Throughput -- Keeping Resources Available -- Chapter Review -- Questions -- Answers -- Chapter 19 Building a SOHO Network -- Historical/Conceptual -- Test Specific -- Designing a SOHO Network -- Building the Network -- Define the Network Needs -- Network Design -- Compatibility Issues -- Internal Connections -- External Connections -- ISPs and MTUs -- Peripherals -- Security -- Chapter Review -- Questions -- Answers -- Chapter 20 Network Troubleshooting -- Test Specific -- Troubleshooting Tools -- Hardware Tools -- Software Tools -- The Troubleshooting Process -- Identify the Problem -- Establish a Theory of Probable Cause…”
Publicado 2012
Libro electrónico -
451por Schilling, MartinTabla de Contenidos: “…. -- Organizational chart and roles -- Practice 74: Defining the roles & -- responsibilities for a service operations function -- Practice 75: Scaling the right service operations roles at the right time -- Preventing contacts -- Practice 76: Preventing unnecessary contacts in the first place -- Deflecting contacts -- Practice 77: Deflecting transactional contacts to an automated self-help -- Resolving contacts -- Practice 78: Investing in a hybrid operating model and specialization to ensure availability at all times -- Practice 79: Resolving customer inquiries with autonomous teams and close-knit performance management -- Practice 80: Investing in Lean Six Sigma processes while giving teams enough room to create moments of service delight -- Practice 81: Investing in a loosely coupled, yet highly integrated suite of service tools -- Practice 82: Steering external partners to jointly drive business goals -- Practice 83: Boosting back-office throughput with performance management, automation and centers of excellence -- Practice 84: Investing in resilience to quickly recover from demand and supply shocks -- 10 Supply Chain Excellence: Shipping customer happiness consistently -- OKRs -- Practice 85: Establishing the right supply chain OKRs -- Organizational chart and roles -- Practice 86: Defining the roles & -- responsibilities for a supply chain operations function…”
Publicado 2022
Libro electrónico -
452Publicado 2023Tabla de Contenidos: “…Tip #3 - Delineate objectives -- Tip #4 - Apply an agile methodology to your digital transformation -- Tip #5 - Encourage risk-taking -- Tip #6 - One-way door vs. two-way door decisions -- Tip #7 - Clear delineation of roles and responsibilities -- Digital transformation pitfalls -- Lack of commitment from the C-suite -- Not having the right team in place -- Internal resistance from the ranks -- Going too fast -- Going too slow -- Outdated rules and regulations -- The AWS Cloud Adoption Framework (AWS CAF) -- Architectures to provide high availability, reliability, and scalability -- Active architecture -- Active/passive architecture -- Active/active architecture -- Sharding architecture -- Chaos engineering -- Summary -- Chapter 4: Networking in AWS -- Learning about the AWS Global Infrastructure -- Regions, Availability Zones, and Local zones -- AWS Regions -- AWS AZs -- AWS LZs -- Benefits of the AWS Global Infrastructure -- AWS networking foundations -- Amazon Virtual Private Cloud (VPC) -- AWS TGW -- AWS PrivateLink -- Edge networking -- Route 53 -- Amazon CloudFront -- AWS Global Accelerator (AGA) -- AWS Wavelength -- Building hybrid cloud connectivity in AWS -- AWS Virtual Private Network (VPN) -- AWS Direct Connect -- AWS Cloud WAN -- AWS cloud network security -- AWS Network Firewall (ANFW) -- AWS network security patterns - best practices -- AWS network security anti-patterns -- AWS network security with third-party solutions -- Summary -- Chapter 5: Storage in AWS - Choosing the Right Tool for the Job -- Understanding Amazon Elastic Block Store -- General-purpose Solid-State Devices (SSDs) -- Provisioned IOPS SSD -- Throughput Optimized HDD -- Cold HDD -- Amazon EBS Snapshots -- Choosing the right EBS volume -- Investigating Amazon Elastic File System (EFS) -- Using Amazon FSx to manage file systems…”
Libro electrónico -
453por International Transport ForumTabla de Contenidos: “…World seaborne trade by type of cargo and country group -- Figure 1.6. World container throughput -- Air freight -- Figure 1.7. World air freight traffic 2008-15 -- Surface freight -- Figure 1.8. …”
Publicado 2017
Libro electrónico -
454por Sakiyama, Kazuo, 1971-Tabla de Contenidos: “…-- Preface xi -- About the Authors xiii -- 1 Introduction to Block Ciphers 1 -- 1.1 Block Cipher in Cryptology 1 -- 1.1.1 Introduction 1 -- 1.1.2 Symmetric-Key Ciphers 1 -- 1.1.3 Efficient Block Cipher Design 2 -- 1.2 Boolean Function and Galois Field 3 -- 1.2.1 INV, OR, AND, and XOR Operators 3 -- 1.2.2 Galois Field 3 -- 1.2.3 Extended Binary Field and Representation of Elements 4 -- 1.3 Linear and Nonlinear Functions in Boolean Algebra 7 -- 1.3.1 Linear Functions 7 -- 1.3.2 Nonlinear Functions 7 -- 1.4 Linear and Nonlinear Functions in Block Cipher 8 -- 1.4.1 Nonlinear Layer 8 -- 1.4.2 Linear Layer 11 -- 1.4.3 Substitution-Permutation Network (SPN) 12 -- 1.5 Advanced Encryption Standard (AES) 12 -- 1.5.1 Specification of AES-128 Encryption 12 -- 1.5.2 AES-128 Decryption 19 -- 1.5.3 Specification of AES-192 and AES-256 20 -- 1.5.4 Notations to Describe AES-128 23 -- Further Reading 25 -- 2 Introduction to Digital Circuits 27 -- 2.1 Basics of Modern Digital Circuits 27 -- 2.1.1 Digital Circuit Design Method 27 -- 2.1.2 Synchronous-Style Design Flow 27 -- 2.1.3 Hierarchy in Digital Circuit Design 29 -- 2.2 Classification of Signals in Digital Circuits 29 -- 2.2.1 Clock Signal 29 -- 2.2.2 Reset Signal 30 -- 2.2.3 Data Signal 31 -- 2.3 Basics of Digital Logics and Functional Modules 31 -- 2.3.1 Combinatorial Logics 31 -- 2.3.2 Sequential Logics 32 -- 2.3.3 Controller and Datapath Modules 36 -- 2.4 Memory Modules 40 -- 2.4.1 Single-Port SRAM 40 -- 2.4.2 Register File 41 -- 2.5 Signal Delay and Timing Analysis 42 -- 2.5.1 Signal Delay 42 -- 2.5.2 Static Timing Analysis and Dynamic Timing Analysis 45 -- 2.6 Cost and Performance of Digital Circuits 47 -- 2.6.1 Area Cost 47 -- 2.6.2 Latency and Throughput 47 -- Further Reading 48 -- 3 Hardware Implementations for Block Ciphers 49 -- 3.1 Parallel Architecture 49 -- 3.1.1 Comparison between Serial and Parallel Architectures 49 -- 3.1.2 Algorithm Optimization for Parallel Architectures 50 -- 3.2 Loop Architecture 51 -- 3.2.1 Straightforward (Loop-Unrolled) Architecture 51.…”
Publicado 2015
Libro electrónico -
455por Jonoska, Nataša, 1961-Tabla de Contenidos: “…-- References -- Origami Life -- 1 Origami Molecules -- 2 Origami Design Algorithms -- 3 Origami Folding Pathways -- 4 Folded Origins -- References -- Ok: A Kinetic Model for Locally Reconfigurable Molecular Systems -- 1 Introduction -- 2 Molecular Reconfiguration: Oritatami and Nubots -- 3 The Ok model -- 3.1 Reconfiguration Events -- 3.2 Reconfiguration Distributions and Events Rates -- 3.3 Implementing the Ok model -- 4 Conclusion -- References -- Implementing a Theoretician's Toolkit for Self-Assembly with DNA Components -- 1 Introduction -- 2 Definitions and Notation -- 3 Metrics -- 4 Monomer Reuse: Hard-Coded Versus Algorithmic -- 5 Inputs -- 5.1 Seed Assemblies -- 5.2 Tile Subsets -- 5.3 Monomer Concentrations -- 5.4 Programmed Temperature Fluctuations -- 5.5 Staged Assembly -- 6 Dynamics -- 6.1 Cooperativity -- 6.2 Single Tile or Hierarchical Growth -- 6.3 Activatable/Deactivatable Glues -- 6.4 Tile Removal and Breaking of Assemblies -- 6.5 Reconfiguration Via Flexibility -- 6.6 Assembly Growth Controlled by CRNs -- 7 Conclusion -- References -- Reasoning As If -- 1 Introduction -- 2 The Snapshot Algorithm -- 3 Local Determinism -- 4 The Future of As If -- References -- Biochemical Circuits -- Scaling Up DNA Computing with Array-Based Synthesis and High-Throughput Sequencing -- 1 Introduction -- 1.1 Scaling up DNA Computing for Molecular Diagnostics -- 1.2 Scaling up DNA Computing for DNA Data Storage -- 1.3 Limitations of Current Approaches to DNA Computing -- 2 A Vision for the Future -- 3 Results -- 3.1 Nicked Double-Stranded DNA Gates Reaction Mechanism -- 3.2 Gate Design…”
Publicado 2023
Libro electrónico -
456Publicado 2017Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
Libro -
457Publicado 2018Tabla de Contenidos: “…2.2.1 Radio Cell and Wave Propagation -- 2.2.2 Propagation Effects and Parameters -- 2.2.3 Network Planning Requirements: Dimensioning -- 2.3 Radio Network Pre-planning -- 2.3.1 Site Survey and Site Selection -- 2.3.2 Result of Site Survey Process -- 2.4 Radio Network Detailed Planning -- 2.4.1 Link Budget -- 2.4.2 Frequency Hopping -- 2.4.3 Equipment Enhancements -- 2.4.4 Cell and Network Coverage -- 2.4.5 Capacity Planning -- 2.4.6 Spectrum Efficiency and Frequency Planning -- 2.4.7 Power Control -- 2.4.8 Handover -- 2.4.9 Discontinuous Transmission -- 2.4.10 Frequency Hopping -- 2.4.11 Parameter Planning -- 2.5 Basics of Radio Network Optimisation -- 2.5.1 Key Performance Indicators -- 2.5.2 Network Performance Monitoring -- 2.5.3 Network Performance Assessment -- 2.6 GPRS Network Planning and Optimisation -- 2.6.1 GPRS System -- 2.6.2 Interfaces in a GPRS Network -- 2.6.3 Protocol Structure in a GPRS Network -- 2.7 Network Planning in a GPRS Network -- 2.7.1 GPRS Radio Network Planning -- 2.7.2 Mobility and Radio Resource Management -- 2.7.3 Power Control -- 2.7.4 Concept of Temporary Block Flow -- 2.8 GPRS Detailed Radio Network Planning -- 2.8.1 Coverage Planning -- 2.8.2 Capacity Planning -- 2.8.3 Frequency Planning -- 2.8.4 Parameter Planning -- 2.9 GPRS Radio Network Optimisation -- 2.10 EDGE Network Planning and Optimisation -- 2.10.1 EGPRS and ECSD -- 2.10.2 EDGE System -- 2.11 EDGE Radio Network Planning Process -- 2.11.1 EDGE Radio Network Planning -- 2.12 Radio Network Planning Process -- 2.12.1 Coverage Planning -- 2.13 EDGE Radio Network Optimisation -- 2.13.1 Key Performance Indicators -- 2.13.2 Performance Measurements -- 2.13.3 Improvement of Throughput in EDGE Networks -- 2.14 Conclusions -- Chapter 3 Transmission Network Planning and Optimisation -- 3.1 Basics of Transmission Network Planning…”
Libro electrónico -
458Publicado 2015Tabla de Contenidos: “…Austin TRIPS processor -- 1.5.5 The Intel Teraflops processor -- 1.5.6 The Intel SCC processor -- 1.5.7 The Intel Larrabee processor -- 1.5.8 The Intel Knights Corner processor -- 1.5.9 Summary of real processors -- 1.6 Overview of the book -- References -- Part II: Logic implementations -- Chapter 2: A single-cycle router with wing channels -- 2.1 Introduction -- 2.2 The router architecture -- 2.2.1 The overall architecture -- 2.2.2 Wing channels -- 2.3 Microarchitecture designs -- 2.3.1 Channel dispensers -- 2.3.2 Fast arbiter components -- 2.3.3 SIG managers and SIG controllers -- 2.4 Experimental results -- 2.4.1 Simulation infrastructures -- 2.4.2 Pipeline delay analysis -- 2.4.3 Latency and throughput -- 2.4.4 Area and power consumption -- 2.5 Chapter summary -- References -- Chapter 3: Dynamic virtual channel routers with congestion awareness -- 3.1 Introduction -- 3.2 DVC with congestion awareness -- 3.2.1 DVC scheme…”
Libro electrónico -
459Publicado 2008“…To avoid design-related performance problems, model-driven performance prediction methods analyse the response times, throughputs, and resource utilizations of software architectures before and during implementation. …”
Libro electrónico -
460Publicado 2020Tabla de Contenidos: “…VELOCIDAD REAL DE TRANSFERENCIA DE DATOS (Ó THROUGHPUT) -- 2.22. EFICIENCIA DEL SISTEMA DE COMUNICACIONES -- CAPÍTULO 3: SERIE DE FOURIER -- 3.1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico