Mostrando 3,441 - 3,460 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.53s Limitar resultados
  1. 3441
    Publicado 2016
    Tabla de Contenidos:
    Libro electrónico
  2. 3442
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…Introduction to Fault Analyzer -- 3.1 Start by validating your software levels -- 3.1.1 Fault Analyzer software level -- 3.2 How Fault Analyzer works -- 3.3 Preparing your programs for Fault Analyzer -- 3.3.1 Compiler options -- 3.4 Introduction to Fault Analyzer main screen -- 3.4.1 Content of Fault Entry List panel -- 3.4.2 Customization of Fault Entry List panel -- 3.5 Using FA to analyze an abend -- 3.5.1 Interactive reanalysis -- 3.5.2 Synopsis section -- 3.5.3 Point of failure section -- 3.5.4 Events section -- 3.5.5 System-wide information section -- 3.5.6 Abend job information -- 3.5.7 Options in effect section -- 3.5.8 Batch reanalysis -- 3.5.9 Real-time report -- 3.5.10 The fast-path for solving this dump -- 3.5.11 DB2 related information -- 3.5.12 CICS related information -- 3.5.13 IMS related information -- 3.6 Some very useful functions -- 3.6.1 Adding user title to a fault entry -- 3.6.2 Creating user notes in a dump -- 3.6.3 DSECT mapping -- 3.7 Customizing Fault Analyzer -- 3.7.1 User options file -- 3.7.2 Notification when program abends -- 3.7.3 Placing abends in different history files -- 3.8 Analyzing a CICS system dump -- Part 1 Application Monitor -- Chapter 4. …”
    Libro electrónico
  3. 3443
    Publicado 2004
    Tabla de Contenidos: “…8.2.2 Creating the prepared NiceJourney step-by-step -- 8.3 Validation implementation -- 8.3.1 Preparation -- 8.3.2 Sequence activity -- 8.3.3 Invoke - Java Class synchronous invocation -- 8.3.4 Assign -- 8.3.5 Fault Handler -- 8.3.6 Java snippet -- 8.3.7 Terminate -- 8.4 Reserve Flight implementation -- 8.4.1 Preparation -- 8.4.2 Sequence activity -- 8.4.3 Invoke - Java class synchronous invocation -- 8.4.4 Assign -- 8.5 Reserve Car implementation -- 8.5.1 Preparation -- 8.5.2 BPEL process partner -- 8.5.3 Sequence activity -- 8.5.4 Invoke - BPEL Asynchronous invocation -- 8.5.5 Assign -- 8.5.6 Pick activity -- 8.5.7 Correlation sets -- 8.5.8 Reply - BPEL Asynchronous invocation -- 8.5.9 Assign -- 8.5.10 Conditional link -- 8.6 Reserve Hotel implementation -- 8.6.1 Preparation -- 8.6.2 Sequence activity -- 8.6.3 Staff activity -- 8.6.4 Transformer Service activity -- 8.7 Bill Customer implementation -- 8.7.1 Preparation -- 8.7.2 Switch -- 8.7.3 Import the Payment Processing Services -- 8.7.4 Creating the partner links -- 8.7.5 Credit Card case -- 8.7.6 Debit Card case -- 8.7.7 Unknown Card Otherwise case -- 8.7.8 Fault handling -- 8.7.9 Compensation -- 8.8 Testing -- 8.9 Problem determination and tips -- 8.9.1 How to delete generated deployment code -- 8.9.2 Forgetting to create tables and datasources -- 8.9.3 Type mapping - primitive and complex types -- Chapter 9. …”
    Libro electrónico
  4. 3444
    por Cook, Jim
    Publicado 2003
    Tabla de Contenidos:
    Libro electrónico
  5. 3445
    por Williams, H. P.
    Publicado 2013
    Tabla de Contenidos: “…3.5.8.3 VARIABLES -- 3.5.8.4 OBJECTIVE -- 3.5.8.5 CONSTRAINTS -- Chapter 4 Structured linear programming models -- 4.1 Multiple plant, product and period models -- 4.2 Stochastic programmes -- 4.3 Decomposing a large model -- 4.3.1 The submodels -- 4.3.2 The restricted master model -- Chapter 5 Applications and special types of mathematical programming model -- 5.1 Typical applications -- 5.1.1 The petroleum industry -- 5.1.2 The chemical industry -- 5.1.3 Manufacturing industry -- 5.1.4 Transport and distribution -- 5.1.5 Finance -- 5.1.6 Agriculture -- 5.1.7 Health -- 5.1.8 Mining -- 5.1.9 Manpower planning -- 5.1.10 Food -- 5.1.11 Energy -- 5.1.12 Pulp and paper -- 5.1.13 Advertising -- 5.1.14 Defence -- 5.1.15 The supply chain -- 5.1.16 Other applications -- 5.2 Economic models -- 5.2.1 The static model -- 5.2.2 The dynamic model -- 5.2.3 Aggregation -- 5.3 Network models -- 5.3.1 The transportation problem -- 5.3.2 The assignment problem -- 5.3.3 The transhipment problem -- 5.3.4 The minimum cost flow problem -- 5.3.5 The shortest path problem -- 5.3.6 Maximum flow through a network -- 5.3.7 Critical path analysis -- 5.4 Converting linear programs to networks -- Chapter 6 Interpreting and using the solution of a linear programming model -- 6.1 Validating a model -- 6.1.1 Infeasible models -- 6.1.2 Unbounded models -- 6.1.3 Solvable models -- 6.2 Economic interpretations -- 6.2.1 The dual model -- 6.2.2 Shadow prices -- 6.2.3 Productive capacity constraints -- 6.2.4 Raw material availabilities -- 6.2.5 Marketing demands and limitations -- 6.2.6 Material balance (continuity) constraints -- 6.2.7 Quality stipulations -- 6.2.8 Reduced costs -- 6.3 Sensitivity analysis and the stability of a model -- 6.3.1 Right-hand side ranges -- 6.3.2 Objective ranges -- 6.3.3 Ranges on interior coefficients -- 6.3.4 Marginal rates of substitution…”
    Libro electrónico
  6. 3446
    Publicado 2022
    Tabla de Contenidos: “…3.2.1 Concept and Definition of Smart Cities -- 3.2.1.1 Integration of Smart Cities with New Technologies -- 3.2.1.2 Development of Smart Cities by Integrated Technologies -- 3.2.2 Concept of Blockchain Technology -- 3.2.2.1 Features of Blockchain Technology -- 3.2.2.2 Framework and Working of Blockchain Technology -- 3.2.3 Concept and Definition of Artificial Intelligence -- 3.2.3.1 Classification of Artificial Intelligence-Machine Learning -- 3.3 Smart Cities Integrated with Blockchain Technology -- 3.3.1 Applications of Blockchain Technology in Smart City Development -- 3.3.1.1 Secured Data Transmission -- 3.3.1.2 Digital Transaction-Smart Contracts -- 3.3.1.3 Smart Energy Management -- 3.3.1.4 Modeling of Smart Assets -- 3.3.1.5 Smart Health System -- 3.3.1.6 Smart Citizen -- 3.3.1.7 Improved Safety -- 3.4 Smart Cities Integrated with Artificial Intelligence -- 3.4.1 Importance of AI for Developing Smart Cities -- 3.4.2 Applications of Artificial Intelligence in Smart City Development -- 3.4.2.1 Smart Transportation System -- 3.4.2.2 Smart Surveillance and Monitoring System -- 3.4.2.3 Smart Energy Management System -- 3.4.2.4 Smart Disposal and Waste Management System -- 3.5 Conclusion and Future Work -- References -- 4 Smart City a Change to a New Future World -- 4.1 Introduction -- 4.2 Role in Education -- 4.3 Impact of AI on Smart Cities -- 4.3.1 Botler AI -- 4.3.2 Spot -- 4.3.3 Nimb -- 4.3.4 Sawdhaan Application -- 4.3.5 Basic Use Cases of Traffic AI -- 4.4 AI and IoT Support in Agriculture -- 4.5 Smart Meter Reading -- 4.6 Conclusion -- References -- 5 Registration of Vehicles With Validation and Obvious Manner Through Blockchain: Smart City Approach in Industry 5.0 -- 5.1 Introduction -- 5.1.1 Concept of Smart Cities -- 5.1.2 Problem of Car Registration and Motivation -- 5.1.2.1 Research Objectives -- 5.1.2.2 Scope of the Research Work…”
    Libro electrónico
  7. 3447
    Publicado 2023
    Tabla de Contenidos: “…-- 11.1.1 Audience -- 11.1.2 Format -- 11.1.3 Validation -- 11.2 Documentation types -- 11.2.1 Meeting notes -- 11.2.2 Walk-throughs demos -- 11.2.3 Owner's manual -- 11.2.4 Backing up and restoration -- 11.2.5 Deployment process -- 11.2.6 Source/code comments -- 11.2.7 Architectural diagrams -- 11.2.8 Process diagrams -- 11.2.9 Network diagrams -- 11.2.10 Data schemas -- 11.2.11 Compliance documentation -- 11.2.12 License and audit tracking -- 11.3 Whitepapers -- 11.4 Best practices -- Summary -- Checklist -- 12 Security -- 12.1 Patching -- 12.1.1 Identify patches -- 12.1.2 Scheduling -- 12.1.3 Special considerations -- 12.2 Penetration testing -- 12.3 Social engineering -- 12.4 Data leakage -- 12.4.1 Logging -- 12.4.2 Application errors -- 12.4.3 Data exports -- 12.4.4 Version control -- 12.5 Password rotation -- 12.5.1 System credentials tracking -- 12.6 Secure environment -- 12.6.1 Identify -- 12.6.2 Protect -- 12.6.3 Monitor -- 12.7 Developing with security -- 12.7.1 Creating secure code -- 12.7.2 Securing the build process -- 12.8 "We are under attack" -- 12.8.1 Kill switch -- 12.8.2 Communication -- 12.8.3 Managing a security breach…”
    Libro electrónico
  8. 3448
    Publicado 2023
    Tabla de Contenidos: “…9.2.1.5 Generic e-Commerce Entity Model in Pharmaceutical Industry -- 9.2.2 Analyzing the Usability of Quantum Netnomics in Attending Economic Development -- 9.2.2.1 Theory of 4Ps in Pharma Marketing Mix -- 9.2.2.2 Buying Behavior of the e-Consumers -- 9.2.2.3 Maintaining of Privacy and Security via Quantum Technology in e-Structure -- 9.2.2.4 Interface Influencing Sales -- 9.3 Results -- 9.4 Conclusion -- References -- Chapter 10 Machine Learning Approach in the Indian Service Industry: A Case Study on Indian Banks -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Experimental Results -- 10.4 Conclusion -- References -- Chapter 11 Accelerating Drug Discovery with Quantum Computing -- 11.1 Introduction -- 11.2 Working Nature of Quantum Computers -- 11.3 Use Cases of Quantum Computing in Drug Discovery -- 11.4 Target Drug Identification and Validation -- 11.5 Drug Discovery Using Quantum Computers is Expected to Start by 2030 -- 11.6 Conclusion -- References -- Chapter 12 Problems and Demanding Situations in Traditional Cryptography: An Insistence for Quantum Computing to Secure Private Information -- 12.1 Introduction to Cryptography -- 12.1.1 Confidentiality -- 12.1.2 Authentication -- 12.1.3 Integrity -- 12.1.4 Non-Repudiation -- 12.2 Different Types of Cryptography -- 12.2.1 One-Way Processing -- 12.2.1.1 Hash Function (One-Way Processing) -- 12.2.2 Two-Way Processing -- 12.2.2.1 Symmetric Cryptography -- 12.2.2.2 Asymmetric Cryptography -- 12.2.3 Algorithms Types -- 12.2.3.1 Stream Cipher -- 12.2.3.2 Block Cipher -- 12.2.4 Modes of Algorithm -- 12.2.4.1 Cipher Feedback Mode -- 12.2.4.2 Output Feedback Mode -- 12.2.4.3 Cipher Block Chaining Mode -- 12.2.4.4 Electronic Code Book -- 12.3 Common Attacks -- 12.3.1 Passive Attacks -- 12.3.1.1 Traffic Analysis -- 12.3.1.2 Eavesdropping -- 12.3.1.3 Foot Printing -- 12.3.1.4 War Driving…”
    Libro electrónico
  9. 3449
    por Samaras, Constantine
    Publicado 2011
    “…To determine whether the industrial base for the U.S. domestic coal-based electricity generation industry can maintain the capability to design, construct, operate, and maintain coal-fired electricity generating units within reasonable cost, schedule, performance, environmental, and quality expectations, this book reviews interviews with stakeholders and data describing key elements of industry capability and validation or verification of concerns…”
    Libro electrónico
  10. 3450
    Publicado 2016
    “…The implementation of an electrochemical-optical model allows advanced model validation. The method is applied exemplary to a graphite anode and a redox-polymer electrode, which is leading to highly detailed electrode models…”
    Libro electrónico
  11. 3451
    Publicado 2018
    “…The goal of this work is the development of a novel computational formalization of whole-body affordances which is suitable for the multimodal detection and validation of interaction possibilities in unknown environments. …”
    Libro electrónico
  12. 3452
    Publicado 2022
    “…It is based on fractures mechanics, is in line with experiences of the last 60 years and validated by extensive experimental as well as numerical investigations on different scales and under consideration of real casting defects. …”
    Libro electrónico
  13. 3453
    Publicado 2021
    “…The results of both models have been successfully verified against each other and validated with literature data as well as own experimental measurements…”
    Libro electrónico
  14. 3454
    Publicado 2021
    “…On this basis, different isothermal as well as a fully coupled thermomechanical simulation model under consideration of the crystallization kinetics are developed. For validation, a complex shaped geometry is simulated and compared to experimental forming results…”
    Libro electrónico
  15. 3455
    por Sahu, Maneesh
    Publicado 2001
    “…In addition to discussing the planning and designing of an application, the book will also cover development of forms, validating data, registering new users, servlets, sessions management, enterprise javabeans, cookies and wireless protocol…”
    Libro electrónico
  16. 3456
    Publicado 2021
    “…The chapters of this book move from local and remote data sensing validation to local and regional trend analysis, and also give some insight into marine heatwaves and future climate scenarios…”
    Libro electrónico
  17. 3457
    Publicado 2001
    “…This collection presents empirically validated cognitive techniques for depression, bipolar I disorder, phobias, panic disorder, OCD, PTSD, anger management, eating disorders, and antisocial behavior in children and adolescents. …”
    Libro electrónico
  18. 3458
    por Börger, Tobias
    Publicado 2012
    “…This response bias also threatens the reliability and validity of survey-based environmental valuation techniques such as the Contingent Valuation Method (CVM). …”
    Libro electrónico
  19. 3459
    Publicado 2015
    “…This model is applied for the research of the problem of dynamic engagement, the engagement rattle and the clutch pedal vibrations. To validate the model the simulation results are compared with the experimental results…”
    Libro electrónico
  20. 3460
    Publicado 2015
    “…Measurements on three model systems which were studied to validate the new technique are presented and compared to simulations…”
    Libro electrónico