Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
3441
-
3442por Henningsen, PeterTabla de Contenidos: “…Introduction to Fault Analyzer -- 3.1 Start by validating your software levels -- 3.1.1 Fault Analyzer software level -- 3.2 How Fault Analyzer works -- 3.3 Preparing your programs for Fault Analyzer -- 3.3.1 Compiler options -- 3.4 Introduction to Fault Analyzer main screen -- 3.4.1 Content of Fault Entry List panel -- 3.4.2 Customization of Fault Entry List panel -- 3.5 Using FA to analyze an abend -- 3.5.1 Interactive reanalysis -- 3.5.2 Synopsis section -- 3.5.3 Point of failure section -- 3.5.4 Events section -- 3.5.5 System-wide information section -- 3.5.6 Abend job information -- 3.5.7 Options in effect section -- 3.5.8 Batch reanalysis -- 3.5.9 Real-time report -- 3.5.10 The fast-path for solving this dump -- 3.5.11 DB2 related information -- 3.5.12 CICS related information -- 3.5.13 IMS related information -- 3.6 Some very useful functions -- 3.6.1 Adding user title to a fault entry -- 3.6.2 Creating user notes in a dump -- 3.6.3 DSECT mapping -- 3.7 Customizing Fault Analyzer -- 3.7.1 User options file -- 3.7.2 Notification when program abends -- 3.7.3 Placing abends in different history files -- 3.8 Analyzing a CICS system dump -- Part 1 Application Monitor -- Chapter 4. …”
Publicado 2004
Libro electrónico -
3443Publicado 2004Tabla de Contenidos: “…8.2.2 Creating the prepared NiceJourney step-by-step -- 8.3 Validation implementation -- 8.3.1 Preparation -- 8.3.2 Sequence activity -- 8.3.3 Invoke - Java Class synchronous invocation -- 8.3.4 Assign -- 8.3.5 Fault Handler -- 8.3.6 Java snippet -- 8.3.7 Terminate -- 8.4 Reserve Flight implementation -- 8.4.1 Preparation -- 8.4.2 Sequence activity -- 8.4.3 Invoke - Java class synchronous invocation -- 8.4.4 Assign -- 8.5 Reserve Car implementation -- 8.5.1 Preparation -- 8.5.2 BPEL process partner -- 8.5.3 Sequence activity -- 8.5.4 Invoke - BPEL Asynchronous invocation -- 8.5.5 Assign -- 8.5.6 Pick activity -- 8.5.7 Correlation sets -- 8.5.8 Reply - BPEL Asynchronous invocation -- 8.5.9 Assign -- 8.5.10 Conditional link -- 8.6 Reserve Hotel implementation -- 8.6.1 Preparation -- 8.6.2 Sequence activity -- 8.6.3 Staff activity -- 8.6.4 Transformer Service activity -- 8.7 Bill Customer implementation -- 8.7.1 Preparation -- 8.7.2 Switch -- 8.7.3 Import the Payment Processing Services -- 8.7.4 Creating the partner links -- 8.7.5 Credit Card case -- 8.7.6 Debit Card case -- 8.7.7 Unknown Card Otherwise case -- 8.7.8 Fault handling -- 8.7.9 Compensation -- 8.8 Testing -- 8.9 Problem determination and tips -- 8.9.1 How to delete generated deployment code -- 8.9.2 Forgetting to create tables and datasources -- 8.9.3 Type mapping - primitive and complex types -- Chapter 9. …”
Libro electrónico -
3444
-
3445por Williams, H. P.Tabla de Contenidos: “…3.5.8.3 VARIABLES -- 3.5.8.4 OBJECTIVE -- 3.5.8.5 CONSTRAINTS -- Chapter 4 Structured linear programming models -- 4.1 Multiple plant, product and period models -- 4.2 Stochastic programmes -- 4.3 Decomposing a large model -- 4.3.1 The submodels -- 4.3.2 The restricted master model -- Chapter 5 Applications and special types of mathematical programming model -- 5.1 Typical applications -- 5.1.1 The petroleum industry -- 5.1.2 The chemical industry -- 5.1.3 Manufacturing industry -- 5.1.4 Transport and distribution -- 5.1.5 Finance -- 5.1.6 Agriculture -- 5.1.7 Health -- 5.1.8 Mining -- 5.1.9 Manpower planning -- 5.1.10 Food -- 5.1.11 Energy -- 5.1.12 Pulp and paper -- 5.1.13 Advertising -- 5.1.14 Defence -- 5.1.15 The supply chain -- 5.1.16 Other applications -- 5.2 Economic models -- 5.2.1 The static model -- 5.2.2 The dynamic model -- 5.2.3 Aggregation -- 5.3 Network models -- 5.3.1 The transportation problem -- 5.3.2 The assignment problem -- 5.3.3 The transhipment problem -- 5.3.4 The minimum cost flow problem -- 5.3.5 The shortest path problem -- 5.3.6 Maximum flow through a network -- 5.3.7 Critical path analysis -- 5.4 Converting linear programs to networks -- Chapter 6 Interpreting and using the solution of a linear programming model -- 6.1 Validating a model -- 6.1.1 Infeasible models -- 6.1.2 Unbounded models -- 6.1.3 Solvable models -- 6.2 Economic interpretations -- 6.2.1 The dual model -- 6.2.2 Shadow prices -- 6.2.3 Productive capacity constraints -- 6.2.4 Raw material availabilities -- 6.2.5 Marketing demands and limitations -- 6.2.6 Material balance (continuity) constraints -- 6.2.7 Quality stipulations -- 6.2.8 Reduced costs -- 6.3 Sensitivity analysis and the stability of a model -- 6.3.1 Right-hand side ranges -- 6.3.2 Objective ranges -- 6.3.3 Ranges on interior coefficients -- 6.3.4 Marginal rates of substitution…”
Publicado 2013
Libro electrónico -
3446Publicado 2022Tabla de Contenidos: “…3.2.1 Concept and Definition of Smart Cities -- 3.2.1.1 Integration of Smart Cities with New Technologies -- 3.2.1.2 Development of Smart Cities by Integrated Technologies -- 3.2.2 Concept of Blockchain Technology -- 3.2.2.1 Features of Blockchain Technology -- 3.2.2.2 Framework and Working of Blockchain Technology -- 3.2.3 Concept and Definition of Artificial Intelligence -- 3.2.3.1 Classification of Artificial Intelligence-Machine Learning -- 3.3 Smart Cities Integrated with Blockchain Technology -- 3.3.1 Applications of Blockchain Technology in Smart City Development -- 3.3.1.1 Secured Data Transmission -- 3.3.1.2 Digital Transaction-Smart Contracts -- 3.3.1.3 Smart Energy Management -- 3.3.1.4 Modeling of Smart Assets -- 3.3.1.5 Smart Health System -- 3.3.1.6 Smart Citizen -- 3.3.1.7 Improved Safety -- 3.4 Smart Cities Integrated with Artificial Intelligence -- 3.4.1 Importance of AI for Developing Smart Cities -- 3.4.2 Applications of Artificial Intelligence in Smart City Development -- 3.4.2.1 Smart Transportation System -- 3.4.2.2 Smart Surveillance and Monitoring System -- 3.4.2.3 Smart Energy Management System -- 3.4.2.4 Smart Disposal and Waste Management System -- 3.5 Conclusion and Future Work -- References -- 4 Smart City a Change to a New Future World -- 4.1 Introduction -- 4.2 Role in Education -- 4.3 Impact of AI on Smart Cities -- 4.3.1 Botler AI -- 4.3.2 Spot -- 4.3.3 Nimb -- 4.3.4 Sawdhaan Application -- 4.3.5 Basic Use Cases of Traffic AI -- 4.4 AI and IoT Support in Agriculture -- 4.5 Smart Meter Reading -- 4.6 Conclusion -- References -- 5 Registration of Vehicles With Validation and Obvious Manner Through Blockchain: Smart City Approach in Industry 5.0 -- 5.1 Introduction -- 5.1.1 Concept of Smart Cities -- 5.1.2 Problem of Car Registration and Motivation -- 5.1.2.1 Research Objectives -- 5.1.2.2 Scope of the Research Work…”
Libro electrónico -
3447Publicado 2023Tabla de Contenidos: “…-- 11.1.1 Audience -- 11.1.2 Format -- 11.1.3 Validation -- 11.2 Documentation types -- 11.2.1 Meeting notes -- 11.2.2 Walk-throughs demos -- 11.2.3 Owner's manual -- 11.2.4 Backing up and restoration -- 11.2.5 Deployment process -- 11.2.6 Source/code comments -- 11.2.7 Architectural diagrams -- 11.2.8 Process diagrams -- 11.2.9 Network diagrams -- 11.2.10 Data schemas -- 11.2.11 Compliance documentation -- 11.2.12 License and audit tracking -- 11.3 Whitepapers -- 11.4 Best practices -- Summary -- Checklist -- 12 Security -- 12.1 Patching -- 12.1.1 Identify patches -- 12.1.2 Scheduling -- 12.1.3 Special considerations -- 12.2 Penetration testing -- 12.3 Social engineering -- 12.4 Data leakage -- 12.4.1 Logging -- 12.4.2 Application errors -- 12.4.3 Data exports -- 12.4.4 Version control -- 12.5 Password rotation -- 12.5.1 System credentials tracking -- 12.6 Secure environment -- 12.6.1 Identify -- 12.6.2 Protect -- 12.6.3 Monitor -- 12.7 Developing with security -- 12.7.1 Creating secure code -- 12.7.2 Securing the build process -- 12.8 "We are under attack" -- 12.8.1 Kill switch -- 12.8.2 Communication -- 12.8.3 Managing a security breach…”
Libro electrónico -
3448Publicado 2023Tabla de Contenidos: “…9.2.1.5 Generic e-Commerce Entity Model in Pharmaceutical Industry -- 9.2.2 Analyzing the Usability of Quantum Netnomics in Attending Economic Development -- 9.2.2.1 Theory of 4Ps in Pharma Marketing Mix -- 9.2.2.2 Buying Behavior of the e-Consumers -- 9.2.2.3 Maintaining of Privacy and Security via Quantum Technology in e-Structure -- 9.2.2.4 Interface Influencing Sales -- 9.3 Results -- 9.4 Conclusion -- References -- Chapter 10 Machine Learning Approach in the Indian Service Industry: A Case Study on Indian Banks -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Experimental Results -- 10.4 Conclusion -- References -- Chapter 11 Accelerating Drug Discovery with Quantum Computing -- 11.1 Introduction -- 11.2 Working Nature of Quantum Computers -- 11.3 Use Cases of Quantum Computing in Drug Discovery -- 11.4 Target Drug Identification and Validation -- 11.5 Drug Discovery Using Quantum Computers is Expected to Start by 2030 -- 11.6 Conclusion -- References -- Chapter 12 Problems and Demanding Situations in Traditional Cryptography: An Insistence for Quantum Computing to Secure Private Information -- 12.1 Introduction to Cryptography -- 12.1.1 Confidentiality -- 12.1.2 Authentication -- 12.1.3 Integrity -- 12.1.4 Non-Repudiation -- 12.2 Different Types of Cryptography -- 12.2.1 One-Way Processing -- 12.2.1.1 Hash Function (One-Way Processing) -- 12.2.2 Two-Way Processing -- 12.2.2.1 Symmetric Cryptography -- 12.2.2.2 Asymmetric Cryptography -- 12.2.3 Algorithms Types -- 12.2.3.1 Stream Cipher -- 12.2.3.2 Block Cipher -- 12.2.4 Modes of Algorithm -- 12.2.4.1 Cipher Feedback Mode -- 12.2.4.2 Output Feedback Mode -- 12.2.4.3 Cipher Block Chaining Mode -- 12.2.4.4 Electronic Code Book -- 12.3 Common Attacks -- 12.3.1 Passive Attacks -- 12.3.1.1 Traffic Analysis -- 12.3.1.2 Eavesdropping -- 12.3.1.3 Foot Printing -- 12.3.1.4 War Driving…”
Libro electrónico -
3449por Samaras, Constantine“…To determine whether the industrial base for the U.S. domestic coal-based electricity generation industry can maintain the capability to design, construct, operate, and maintain coal-fired electricity generating units within reasonable cost, schedule, performance, environmental, and quality expectations, this book reviews interviews with stakeholders and data describing key elements of industry capability and validation or verification of concerns…”
Publicado 2011
Libro electrónico -
3450Publicado 2016“…The implementation of an electrochemical-optical model allows advanced model validation. The method is applied exemplary to a graphite anode and a redox-polymer electrode, which is leading to highly detailed electrode models…”
Libro electrónico -
3451Publicado 2018“…The goal of this work is the development of a novel computational formalization of whole-body affordances which is suitable for the multimodal detection and validation of interaction possibilities in unknown environments. …”
Libro electrónico -
3452Publicado 2022“…It is based on fractures mechanics, is in line with experiences of the last 60 years and validated by extensive experimental as well as numerical investigations on different scales and under consideration of real casting defects. …”
Libro electrónico -
3453Publicado 2021“…The results of both models have been successfully verified against each other and validated with literature data as well as own experimental measurements…”
Libro electrónico -
3454Publicado 2021“…On this basis, different isothermal as well as a fully coupled thermomechanical simulation model under consideration of the crystallization kinetics are developed. For validation, a complex shaped geometry is simulated and compared to experimental forming results…”
Libro electrónico -
3455por Sahu, Maneesh“…In addition to discussing the planning and designing of an application, the book will also cover development of forms, validating data, registering new users, servlets, sessions management, enterprise javabeans, cookies and wireless protocol…”
Publicado 2001
Libro electrónico -
3456Publicado 2021“…The chapters of this book move from local and remote data sensing validation to local and regional trend analysis, and also give some insight into marine heatwaves and future climate scenarios…”
Libro electrónico -
3457Publicado 2001“…This collection presents empirically validated cognitive techniques for depression, bipolar I disorder, phobias, panic disorder, OCD, PTSD, anger management, eating disorders, and antisocial behavior in children and adolescents. …”
Libro electrónico -
3458por Börger, Tobias“…This response bias also threatens the reliability and validity of survey-based environmental valuation techniques such as the Contingent Valuation Method (CVM). …”
Publicado 2012
Libro electrónico -
3459Publicado 2015“…This model is applied for the research of the problem of dynamic engagement, the engagement rattle and the clutch pedal vibrations. To validate the model the simulation results are compared with the experimental results…”
Libro electrónico -
3460Publicado 2015“…Measurements on three model systems which were studied to validate the new technique are presented and compared to simulations…”
Libro electrónico