Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,540
- Biblia 6,706
- Filosofía 4,716
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,079
- Derecho 3,747
- RELIGION 3,643
- Educación 3,564
- Història 3,432
- Iglesia Católica 3,123
- Ciencias sociales 2,926
- Moral cristiana 2,558
- Teología dogmática 2,461
- Teología 2,379
- Psicología 2,358
- Sermones 2,216
- Management 2,201
- Development 2,161
- Derecho canónico 2,131
- History 1,989
- Derecho civil 1,961
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,763
- Tecnología 1,715
- Philosophy 1,704
- Application software 1,700
- Economía 1,626
-
638901por Castella.Tabla de Contenidos: “…Conté: Memorial de Su Magestad Catolica que dieron a nuestro muy santo padre Urbano papa Octavo D. fray Domingo Pimentel, obispo de Cordova y D. …”
Publicado 1635
Informe de la restauració
991006973459706719 -
638902por Brown, Raymond Edward, 1928-1998Materias:
Publicado 1998Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de Pastoral Madrid, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Diocesana Bilbao, Universidad Loyola - Universidad Loyola Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Universidad de Deusto, Biblioteca IEBA Jerusalén, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca Diocesana de Salamanca, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Central de Capuchinos de España, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
638903Publicado 2018Tabla de Contenidos: “…-- 5.4 Blister Formation -- 5.4.1 Dynamics of Blister Formation -- 5.4.2 Finite Element Modeling of Blister Formation -- 5.5 Jet Formation and Expansion -- 5.5.1 Computational Fluid Dynamics Model -- 5.5.2 Effect of the Laser Energy -- 5.5.3 Effect of the Ink Film Properties -- 5.6 Application to the Transfer of Delicate Materials -- 5.7 Conclusions -- References -- Chapter 6 Film‐Free LIFT (FF‐LIFT) -- 6.1 Introduction -- 6.2 Rheological Considerations in Traditional LIFT of Liquids -- 6.2.1 The Challenges behind the Preparation of a Thin Liquid Film -- 6.2.1.1 The Role of Spontaneous Instabilities -- 6.2.1.2 The Role of External Instabilities -- 6.2.2 Technologies for Thin‐Film Preparation -- 6.2.3 Wetting of the Receiver Substrate -- 6.3 Fundamentals of Film‐Free LIFT -- 6.3.1 Cavitation‐Induced Phenomena for Printing -- 6.3.2 Jet Formation in Film‐Free LIFT -- 6.3.3 Differences with LIFT of Liquids -- 6.4 Implementation and Optical Considerations -- 6.4.1 Laser Source -- 6.4.2 Forward (Inverted) versus Backward (Upright) Systems -- 6.4.3 Spherical Aberration and Chromatic Dispersion -- 6.5 Applications -- 6.5.1 Film‐Free LIFT for Printing Biomaterials -- 6.5.2 Film‐Free LIFT for Micro‐Optical Element Fabrication -- 6.6 Conclusions and Future Outlook -- References -- Part II The Role of the Laser-Material Interaction in LIFT -- Chapter 7 Laser‐Induced Forward Transfer of Metals…”
Libro electrónico -
638904Publicado 2015Tabla de Contenidos: “…4.4.3.1 Internal Time Behavior Metrics -- 4.4.3.2 External Time Behavior Metrics -- 4.4.4 Resource Utilization -- 4.4.4.1 Internal Resource Utilization Metrics -- 4.4.4.2 External Resource Utilization Metrics -- 4.4.5 Compliance -- 4.4.5.1 Internal Compliance Metric -- 4.4.5.2 External Compliance Metric -- 4.4.6 Exercise: Efficiency Testing -- 4.4.7 Exercise: Efficiency Testing Debrief -- 4.5 Maintainability Testing -- 4.5.1 Analyzability -- 4.5.1.1 Internal Analyzability Metrics -- 4.5.1.2 External Analyzability Metrics -- 4.5.2 Changeability -- 4.5.2.1 Internal Changeability Metrics -- 4.5.2.2 External Changeability Metrics -- 4.5.3 Stability -- 4.5.3.1 Internal Stability Metrics -- 4.5.3.2 External Stability Metrics -- 4.5.4 Testability -- 4.5.4.1 Internal Testability Metrics -- 4.5.4.2 External Testability Metrics -- 4.5.5 Compliance -- 4.5.5.1 Internal Compliance Metric -- 4.5.5.2 External Compliance Metric -- 4.5.6 Exercise: Maintainability Testing -- 4.5.7 Exercise: Maintainability Testing Debrief -- 4.6 Portability Testing -- 4.6.1 Adaptability -- 4.6.1.1 Internal Adaptability Metrics -- 4.6.1.2 External Adaptability Metrics -- 4.6.2 Replaceability -- 4.6.2.1 Internal Replaceability Metrics -- 4.6.2.2 External Replaceability Metrics -- 4.6.3 Installability -- 4.6.3.1 Internal Installability Metrics -- 4.6.3.2 External Installability Metrics -- 4.6.4 Coexistence -- 4.6.4.1 Internal Coexistence Metrics -- 4.6.4.2 External Coexistence Metrics -- 4.6.5 Compliance -- 4.6.5.1 Internal Compliance Metrics -- 4.6.5.2 External Compliance Metrics -- 4.6.6 Exercise: Portability Testing -- 4.6.7 Exercise: Portability Testing Debrief -- 4.7 General Planning Issues -- 4.8 Sample Exam Questions -- 5 Reviews -- 5.1 Introduction -- 5.2 Using Checklists in Reviews -- 5.2.1 Some General Checklist Items for Design and Architecture Reviews…”
Libro electrónico -
638905Publicado 2013Tabla de Contenidos: “…4.20 Dominant Resistance -- 4.21 Resistors in Parallel -- 4.22 Current Division Formula -- 4.23 Dominant Resistance -- 4.24 Series-Parallel (Complex) Circuits -- Summary -- Multiple Choice Questions (MCQ) -- Conventional Questions (CQ) -- 5: Networks (d.c.) -- 5.1 Introduction -- 5.2 Ohm's Law -- 5.3 Kirchhoff's Laws -- 5.4 Voltage Drop and Polarity -- 5.5 Equipotential Points -- 5.6 The Bridge Network -- 5.7 Networks -- 5.8 Superposition Theorem -- 5.9 Voltage and Current Sources -- 5.10 Dependent Voltage Sources -- 5.11 Millman's Theorem -- 5.12 Thevenin's Theorem -- 5.13 Thevenizing a Circuit -- 5.14 Norton's Theorem -- 5.15 Nortonizing a Circuit -- 5.16 Maximum Power Transfer Theorem -- 5.17 Efficiency -- 5.18 Δ⇆Y Transformation -- 5.19 Balanced Networks -- 5.20 Network Reduction -- 5.21 Mesh Currents -- 5.22 Node-Voltages -- Summary -- Multiple Choice Questions (MCQ) -- Conventional Questions (CQ) -- 6: Mesh-Current and Node-Voltage Analysis -- 6.1 Introduction -- 6.2 Matrices and Determinants -- 6.2.1 Matrix Arithmetic -- 6.2.2 Determinants -- 6.2.3 Solution of Simultaneous Equations Using Determinants -- 6.2.4 Gauss Elimination Technique -- 6.3 Network Analysis by Mesh Current -- 6.4 Network Analysis by Node-Pair Voltages -- 6.5 The Resistance Matrix -- 6.6 The Conductance Matrix -- 6.7 The Super Mesh -- 6.8 The Super Node -- 6.9 Nodal Analysis vs Mesh Analysis-A Comparison -- Summary -- Multiple Choice Questions (MCQ) -- Conventional Questions (CQ) -- 7: Electrochemical Action -- 7.1 Introduction -- 7.2 Primary Cells -- 7.3 Electrolysis -- 7.3.1 Electrolysis of Water -- 7.4 Faraday's Laws -- 7.4.1 Electroplating -- 7.5 Simple Voltaic Cell -- 7.6 E.M.F. of a Cell -- 7.7 Local Action -- 7.8 Polarization -- 7.9 Internal Resistance -- 7.10 Characteristics of a Good Cell -- 7.11 The Leclanche Cell -- 7.12 The Dry Cell…”
Libro electrónico -
638906Publicado 2023Tabla de Contenidos: “…Building Java persistence applications with Spring -- 14 Integrating JPA and Hibernate with Spring -- 14.1 Spring Framework and dependency injection -- 14.2 JPA application using Spring and the DAO pattern -- 14.3 Generifying a JPA application that uses Spring and DAO -- 14.4 Hibernate application using Spring and the DAO pattern -- 14.5 Generifying a Hibernate application that uses Spring and DAO -- Summary -- 15 Working with Spring Data JDBC -- 15.1 Creating a Spring Data JDBC project -- 15.2 Working with queries in Spring Data JDBC -- 15.2.1 Defining query methods with Spring Data JDBC -- 15.2.2 Limiting query results, sorting, and paging -- 15.2.3 Streaming results -- 15.2.4 The @Query annotation -- 15.2.5 Modifying queries -- 15.3 Modeling relationships with Spring Data JDBC -- 15.3.1 Modeling a one-to-one relationship with Spring Data JDBC -- 15.3.2 Modeling embedded entities with Spring Data JDBC…”
Libro electrónico -
638907Publicado 2019Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
Libro electrónico -
638908Publicado 2018Tabla de Contenidos: “…Introduction -- 1.1 Introduction: Computer Programming and Digital Signal Processing -- 1.2 The Purpose of This Book -- 1.3 Intended Readers -- 1.4 Topics Covered -- 1.5 Additional Content -- 2. Basics of Programming in MATLAB® -- 2.1 Introduction: Computer Programming in MATLAB -- 2.2 Programming Languages -- 2.3 Executed Commands -- 2.3.1 Error Statements -- 2.4 Mathematics -- 2.4.1 Operators -- 2.4.2 Variables -- Variable Naming Rules and Conventions -- 2.5 Data Types -- 2.5.1 Numbers -- 2.5.2 Characters -- 2.5.3 Strings -- String Concatenation -- 2.6 Arrays -- 2.6.1 Basic Array Creation -- 2.6.2 Plotting Arrays -- 2.7 Mathematical Functions -- 2.7.1 Plotting Mathematical Functions -- 2.8 APPENDIX: Additional Plotting Options -- 2.8.1 Line Specification -- Line Color and Style -- Line Width -- Stem Plot -- 2.8.2 Axis Labels -- 2.8.3 Figure Title -- 2.8.4 Figure Legend -- 2.8.5 Axis Scale -- 2.8.6 Axis Dimensions -- 2.8.7 Multiple Arrays -- Multiple Windows -- Identical Dimensions -- Figure Hold -- Subplot -- 3. …”
Libro electrónico -
638909Publicado 2021Tabla de Contenidos: “…4.1 Overview of a DataFrame -- 4.1.1 Creating a DataFrame from a dictionary -- 4.1.2 Creating a DataFrame from a NumPy ndarray -- 4.2 Similarities between Series and DataFrames -- 4.2.1 Importing a DataFrame with the read_csv function -- 4.2.2 Shared and exclusive attributes of Series and DataFrames -- 4.2.3 Shared methods of Series and DataFrames -- 4.3 Sorting a DataFrame -- 4.3.1 Sorting by a single column -- 4.3.2 Sorting by multiple columns -- 4.4 Sorting by index -- 4.4.1 Sorting by row index -- 4.4.2 Sorting by column index -- 4.5 Setting a new index -- 4.6 Selecting columns and rows from a DataFrame -- 4.6.1 Selecting a single column from a DataFrame -- 4.6.2 Selecting multiple columns from a DataFrame -- 4.7 Selecting rows from a DataFrame -- 4.7.1 Extracting rows by index label -- 4.7.2 Extracting rows by index position -- 4.7.3 Extracting values from specific columns -- 4.8 Extracting values from Series -- 4.9 Renaming columns or rows -- 4.10 Resetting an index -- 4.11 Coding challenge -- 4.11.1 Problems -- 4.11.2 Solutions -- Summary -- 5 Filtering a DataFrame -- 5.1 Optimizing a data set for memory use -- 5.1.1 Converting data types with the astype method -- 5.2 Filtering by a single condition -- 5.3 Filtering by multiple conditions -- 5.3.1 The AND condition -- 5.3.2 The OR condition -- 5.3.3 Inversion with ~ -- 5.3.4 Methods for Booleans -- 5.4 Filtering by condition -- 5.4.1 The isin method -- 5.4.2 The between method -- 5.4.3 The isnull and notnull methods -- 5.4.4 Dealing with null values -- 5.5 Dealing with duplicates -- 5.5.1 The duplicated method -- 5.5.2 The drop_duplicates method -- 5.6 Coding challenge -- 5.6.1 Problems -- 5.6.2 Solutions -- Summary -- Part 2. …”
Libro electrónico -
638910Publicado 2023Tabla de Contenidos: “…Chapter 3 Extraction Techniques for Biodiesel Production -- 3.1 Introduction -- 3.2 Direct Use and Blending -- 3.3 Microemulsion -- 3.4 Pyrolysis -- 3.5 Transesterification -- 3.5.1 Homogeneous Catalyzed Transesterification -- 3.5.2 Heterogeneous Catalyzed Transesterification -- 3.5.3 Enzyme Catalyzed Transesterification -- 3.5.4 Supercritical Alcohol Transesterification -- 3.6 Intensification Methods for Biodiesel Production -- 3.6.1 Ultrasonic Method -- 3.6.2 Microwave Method -- 3.6.3 Cosolvent Method -- 3.6.4 Membrane Technology -- 3.6.5 Reactive Distillation -- 3.7 Conclusions -- References -- Chapter 4 Role of Additives on Anaerobic Digestion, Biomethane Generation, and Stabilization of Process Parameters -- 4.1 Introduction -- 4.2 Anaerobic Digestion Process -- 4.3 Metallic Additives -- 4.4 Alkali Additives -- 4.5 Biological Additives -- 4.5.1 Microorganisms -- 4.5.2 Enzymes -- 4.6 Carbon-Based Additives -- 4.6.1 Graphene -- 4.6.2 Carbon Nanotubes -- 4.6.3 Activated Carbon -- 4.6.4 Biochar -- 4.7 Nanoparticles -- 4.7.1 Fe Nanoparticles -- 4.7.2 Nanoparticles of Ag and ZnO -- 4.7.3 Nanoparticles of Fe2O4 -- 4.8 Other Natural Additives -- 4.9 Conclusions -- Acknowledgment -- References -- Chapter 5 An Overview on Established and Emerging Biogas Upgradation Systems for Improving Biomethane Quality -- 5.1 Introduction -- 5.2 Available Biogas Upgradation Techniques -- 5.3 Microbial Methane Enrichment -- 5.4 Bioelectrochemical System -- 5.5 Photosynthetic Biogas Upgradation -- 5.6 Techno-Economics of Biological Biogas Upgradation Technologies -- 5.7 Conclusion -- Acknowledgement -- References -- Chapter 6 Renewable Feedstocks for Biofuels -- 6.1 Introduction -- 6.2 Sugar Containing Plant Crops -- 6.2.1 Sugar Cane (Saccharum officinarum) -- 6.2.2 Sugarbeet (Beta vulgaris L.) -- 6.2.3 Sweet Sorghum (Sorghum bicolor (L.) …”
Libro electrónico -
638911por World Health OrganizationTabla de Contenidos: “…Surveillance -- 5.1 Types of approaches -- 5.1.1 Audit -- 5.1.2 Direct assessment -- 5.2 Adapting approaches to specific circumstances -- 5.2.1 Urban areas in developing countries -- 5.2.2 Community drinking-water supplies -- 5.2.3 Household treatment and storage systems -- 5.3 Adequacy of supply -- 5.3.1 Accessibility -- 5.3.2 Quantity -- 5.3.3 Continuity -- 5.3.4 Affordability -- 5.4 Planning and implementation -- 5.5 Reporting and communicating -- 5.5.1 Interaction with community and consumers…”
Publicado 2022
Libro electrónico -
638912por Ojha, RajeshTabla de Contenidos: “…Positioning and Integration of Asset Management with Other SAP S/4HANA Business Applications -- 1.5. Ways to Provision SAP S/4HANA -- 1.5.1. Options Within Cloud Provisioning -- Public Cloud -- Private Cloud -- 1.6. …”
Publicado 2023
Libro electrónico -
638913por Gucer, VasfiTabla de Contenidos: “…Planning end-to-end scheduling with Tivoli Workload Scheduler 8.2 -- 3.1 Different ways to do end-to-end scheduling -- 3.2 The rationale behind end-to-end scheduling -- 3.3 Before you start the installation -- 3.3.1 How to order the Tivoli Workload Scheduler software -- 3.3.2 Where to find more information for planning -- 3.4 Planning end-to-end scheduling with Tivoli Workload Scheduler for z/OS -- 3.4.1 Tivoli Workload Scheduler for z/OS documentation -- 3.4.2 Service updates (PSP bucket, APARs, and PTFs) -- 3.4.3 Tivoli Workload Scheduler for z/OS started tasks for end-to-end scheduling -- 3.4.4 Hierarchical File System (HFS) cluster -- 3.4.5 Data sets related to end-to-end scheduling -- 3.4.6 TCP/IP considerations for end-to-end server in sysplex -- 3.4.7 Upgrading from Tivoli Workload Scheduler for z/OS 8.1 end-to-end scheduling -- 3.5 Planning for end-to-end scheduling with Tivoli Workload Scheduler -- 3.5.1 Tivoli Workload Scheduler publications and documentation -- 3.5.2 Tivoli Workload Scheduler service updates (fix packs) -- 3.5.3 System and software requirements -- 3.5.4 Network planning and considerations -- 3.5.5 Backup domain manager -- 3.5.6 Performance considerations -- 3.5.7 Fault-tolerant agent (FTA) naming conventions…”
Publicado 2004
Libro electrónico -
638914por Baragoin, CorinneTabla de Contenidos: “…Fraud detection example -- 5.1 The business issue -- 5.2 Mapping the business issue to data mining functions -- 5.3 The business application -- 5.4 Environment, components, and implementation flow -- 5.5 Data to be used -- 5.5.1 Data extraction -- 5.5.2 Data manipulation and enrichment -- 5.6 Implementation in DB2 UDB V8.1 -- 5.6.1 Enabling database for modeling and scoring -- 5.6.2 Installing additional UDFs and stored procedures -- 5.6.3 Model building -- 5.7 Implementation in DB2 UDB V7.2 -- 5.7.1 Prerequisite: Initial model building -- 5.7.2 Data settings -- 5.7.3 Model parameter settings -- 5.7.4 Building the mining task -- 5.7.5 Running the model by calling a stored procedure -- 5.7.6 Scoring script generation -- 5.7.7 Applying the scoring model -- 5.7.8 Ranking and listing the five smallest clusters -- 5.7.9 Actionable result for investigation -- 5.7.10 Scheduling the job to run at regular intervals -- 5.8 Benefits -- 5.8.1 A system that adapts to changes in undesirable behavior -- 5.8.2 Fast deployment of fraud detection system -- 5.8.3 Better use of data mining resource…”
Publicado 2002
Libro electrónico -
638915Publicado 2009Tabla de Contenidos: “…-- 4.8 Mesh Analysis of Circuits with Independent Current Sources -- 4.9 Mesh Analysis of Circuits Containing Dependent Sources -- 4.10 Summary -- 4.11 Problems -- Chapter 5: Circuit Theorems -- Introduction -- 5.1 Linearity of a Circuit and Superposition Theorem -- 5.1.1 Linearity of a Circuit -- 5.2 Star-Delta Transformation Theorem -- 5.3 Substitution Theorem -- 5.4 Compensation Theorem -- 5.5 Thevenin's Theorem and Norton's Theorem -- 5.6 Determination of Equivalents for Circuits with Dependent Sources -- 5.7 Reciprocity Theorem -- 5.8 Maximum Power Transfer Theorem -- 5.9 Millman's Theorem -- 5.10 Summary -- 5.11 Problems -- Chapter 6: The Operational Amplifier as a Circuit Element -- Introduction -- 6.1 Ideal Amplifiers and their Features -- 6.1.1 Ground in Electronic Amplifiers -- 6.2 The Role of DC Power Supply in Amplifiers -- 6.2.1 Linear Amplification in Electronic Amplifiers -- 6.2.2 Large-signal Operation of Amplifiers -- 6.2.3 Output Limits in Amplifiers -- 6.3 The Operational Amplifier -- 6.3.1 The Practical Operational Amplifier -- 6.4 Negative Feedback in Operational Amplifier Circuits -- 6.5 The Principles of 'Virtual Short' and 'Zero Input Current' -- 6.6 Analysis of Operational Amplifier Circuits using the IOA Model -- 6.6.1 The Non-Inverting Amplifier Circuit…”
Libro electrónico -
638916Publicado 2021Tabla de Contenidos: “…Additional Comments -- Chapter 5. Turkey -- 5.1 Petitions -- 5.1.1 A Telegram from Gypsies from Drama -- 5.1.2 A Telegram from Gypsies from Kavala -- Comments -- 5.2 The Tobacco Workers -- 5.2.1 Emin Atılal -- 5.2.2 Zehra Kosova -- Comments -- 5.2.3 An Obituary for Zehra Kosova -- Comments -- 5.3 Media Testimonials -- 5.3.1 May Day -- Comments -- 5.3.2 The Trial of the Communists -- Comments -- 5.4 Training in the USSR -- 5.4.1 Remzi Salih Mustafa -- 5.4.2 The Opinion Report -- 5.4.3 The Autobiography -- 5.4.4 References -- 5.4.5 The Questionnaire -- Comments -- 5.4.6 Mustafa Mehmet (Alekber Ağaoğlu, Petko) -- 5.4.7 The Autobiography (1) -- 5.4.8 The Questionary Form -- 5.4.9 Autobiography (2) -- 5.4.10 Reference -- Comments -- 5.5 Kakava Day -- Comments -- Chapter 6. …”
Libro electrónico -
638917Publicado 2004Tabla de Contenidos: “…6.4.10 Stage 10: Preparing IBM Tivoli Service Level Advisor -- 6.4.11 Stage 11: Creating offerings -- 6.4.12 Stage 12: Creating SLAs and OLAs -- 6.4.13 Stage 13: SLA reporting -- 6.5 How the SLM solution works in practice -- 6.5.1 Example 1: Component failure without loss of service -- 6.5.2 Example 2: Component failure terminates a service -- 6.5.3 Root cause analysis -- 6.5.4 Assessing the SLM solution -- 6.6 Continuous improvement -- Part 3 Appendixes -- Appendix A. …”
Libro electrónico -
638918Publicado 2022Tabla de Contenidos: “…-- 5.1 Data Sovereignty: Freedom of Contract and Regulation -- 5.1.1 No Ownership or Exclusivity Rights in Data -- 5.1.2 Usage Control: Legally and Technically -- 5.1.3 Database Rights -- 5.1.4 Trade Secrets -- 5.1.5 Competition Law -- 5.1.6 EU Strategy on Data: The Relevance of Data Spaces -- 5.1.7 Data Governance Act: First Comments -- 5.1.8 Personal and Non-personal Data -- 5.1.8.1 GDPR -- 5.1.8.2 Free Flow of Non-Personal Data Regulation -- 5.1.9 Cybersecurity -- 5.1.9.1 NIS Directive -- 5.1.9.2 Cybersecurity Act -- 5.2 Preparing Contractual Ecosystems -- 5.2.1 Platform Contracts -- 5.2.1.1 Key Principles -- 5.2.1.2 Legal TestBed: A Lead Example -- 5.2.2 Data Licensing Agreements -- 5.2.2.1 The Contract Matrix -- 5.2.2.2 The IDS Sample Contracts -- 5.3 Implementing Compliance -- 5.3.1 GDPR -- 5.3.1.1 Controllers, Joint Controllers, and Processors -- 5.3.1.2 Documentation -- 5.3.1.3 Breach Notifications -- 5.3.1.4 Enforcement and Sanctions -- 5.3.2 Competition Law -- 5.4 Certifications from a Legal Perspective -- 5.4.1 Role of Procedural Rules -- 5.4.2 Additional Aspects…”
Libro electrónico -
638919Publicado 2023Tabla de Contenidos: “…7.3 High Peclet number advection and diffusion -- 7.3.1 Residual-based stabilization -- 7.4 Transient advection and diffusion illustration -- 7.5 Low-Mach solver strategies -- 7.6 Low-Mach fluids operators -- 7.6.1 Kinetic energy conservation -- 7.7 Validation -- Acknowledgments -- References -- 8 Boundary conditions for turbulence simulation -- 8.1 Introduction -- 8.2 A motivating example -- 8.2.1 Continuous case -- 8.2.2 Discretization -- 8.2.3 Lessons learned -- 8.3 General framework -- 8.3.1 Physical BCs -- 8.3.2 Artificial BCs -- 8.3.3 Symmetry BCs -- 8.4 BCs for compressible Navier-Stokes -- 8.4.1 The characteristic BC framework -- 8.4.2 Refinements and extensions -- 8.4.2.1 Viscous flow -- 8.4.2.2 Rigid-wall no-slip BC -- 8.4.2.3 Inlet/outlet impedance: taming drift -- 8.4.2.4 Sponge layers for multidimensional nonreflectivity -- 8.4.2.5 Other extensions -- 8.4.3 Summation-by-parts approach -- 8.4.4 Case study: high-speed turbulent jet -- 8.5 BCs for incompressible Navier-Stokes -- 8.5.1 Rigid no-slip and inlet BCs -- 8.5.2 Far-field BCs -- 8.5.3 Outlet BCs -- 8.5.4 Dealing with pressure -- 8.5.5 Case study: flow over a sphere -- 8.6 Turbulence modeling in boundary conditions -- 8.6.1 Triggering natural instabilities -- 8.6.2 Synthetic turbulence injection -- 8.7 BCs in other discretization schemes -- 8.7.1 Other schemes with body-fitted meshes -- 8.7.2 Non-conforming BCs: immersed boundary and interface methods -- References -- 9 Numerical methods in large-eddy simulation -- 9.1 Scope of the chapter -- 9.2 Large-eddy simulation: from practice to theory -- 9.2.1 LES: statement of the problem -- 9.2.2 Removal of small scales in LES: mathematical models for the LES filter -- 9.2.2.1 The filtered Navier-Stokes equations model -- 9.2.2.2 A more realistic model: the twice-filtered Navier-Stokes equations…”
Libro electrónico -
638920por Kamal, RajTabla de Contenidos: “…7.7 Implementation Procedure -- Chapter 8: Sequential Circuits for Registers and Counters -- 8.1 Registers -- 8.1.1 Bi-stable Latches as the Register -- 8.1.2 Parallel-In Parallel-Out Buffer Register -- 8.1.3 Number of Bits in a Register -- 8.2 Shift Registers -- 8.2.1 Serial-In Serial-Out (SISO) Unidirectional Shift Register -- 8.2.2 Serial-In Parallel-Out (SIPO) Right Shift Register -- 8.2.3 Parallel-In Serial-Out (PISO) Right Shift Register -- 8.3 Counter -- 8.4 Ripple Counter -- 8.4.1 Cascaded Divide-By-2n Circuit as a Ripple Counter -- 8.4.2 Modulo-6, Modulo-7 and Modulo-10 Counters -- 8.4.3 Ring Counter -- 8.4.4 Johnson Counter (Even Sequences Switch Tail or Twisted Ring Counter) -- 8.4.5 Odd Sequencer Johnson Counter (Odd Sequencer Switch Tail or Twisted Ring Counter) -- 8.5 Synchronous Counter -- 8.5.1 Synchronous Counter Using Additional Logic Circuit -- 8.6 Asynchronous Clear, Preset and Load (JAM) in a Counter -- 8.7 Synchronous Clear, Preset and Load Facilities in a Counter -- 8.8 Timing Diagrams -- Chapter 9: Fundamental Mode Sequential Circuits -- 9.1 General Asynchronous Sequential Circuit -- 9.2 Unstable Circuit Operation -- 9.3 Stable Circuit Asynchronous Mode Operation -- 9.4 Fundamental Mode Asynchronous Circuit -- 9.4.1 Tabular Representation of Excitation-cum-Transitions of States and Outputs -- 9.5 Analysis Procedure -- 9.5.1 Excitation Table -- 9.5.2 Transition Table -- 9.5.3 State Table -- 9.5.4 State Diagram -- 9.5.5 Flow Table -- 9.5.6 Example of an Excitation-cum-Transition Table -- 9.5.7 Flow Table from Excitation-Transition Table -- 9.5.8 Flow Diagram -- 9.6 Races -- 9.6.1 Cycles of the Races -- 9.7 Race-Free Assignments -- Chapter 10: Hazards and Pulse Mode Sequential Circuits -- 10.1 Hazards -- 10.1.1 Static-0 Hazard -- 10.1.2 Static-1 Hazard -- 10.2 Identifying Static Hazards…”
Publicado 2011
Libro electrónico