Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Eucaristía 210
- Historia 144
- Biblia 108
- Maimónides 72
- Crítica e interpretación 69
- Història 57
- Judíos 57
- History 47
- Computer networks 44
- Data processing 36
- Filosofía 35
- Management 34
- Computer programs 33
- Hagiografías 33
- Maimònides 32
- Development 31
- Iglesia Católica 30
- Artificial intelligence 29
- Literatura latina 26
- Liturgia 26
- WebSphere 26
- Application software 25
- Filosofía judía 25
- Ciencias naturales 24
- Libros y literatura para niños 24
- Bíblia 23
- Engineering & Applied Sciences 23
- Security measures 23
- Judaisme 22
- Judaísmo 22
-
4601Publicado 2011Tabla de Contenidos: “…Maximum principal strain theory -- 11.13 Maximum Shearing Stress Theory -- 11.14 Strain energy theory -- 11.15 Distortion Energy Theory -- Problems -- Objective Questions -- Answers -- Chapter 12: Springs -- 12.1 Introduction -- 12.2 Close-Coiled Helical Spring-Axial Load Stress -- 12.3 Close-Coiled Helical Spring-Axial Torque -- 12.4 Strain Energy -- 12.5 Combination of Springs -- 12.6 Open Coiled Helical Spring -- 12.7 Laminated Spring -- 12.8 Flat Spiral Spring -- Problems -- Objective Questions -- Answers -- Chapter 13: Columns and Struts -- 13.1 Introduction` -- 13.2 Combined Bending and Direct Stress -- 13.3 Rectangular Section-Middle Third Rule -- 13.4 Middle Quarter Rule for Circular Section -- 13.5 Strut with Both Ends Pinned or Pivoted -- 13.6 Strut Fixed at One End and Free at the Other -- 13.7 Strut with One End Fixed and Other Pinned…”
Libro electrónico -
4602Publicado 2014Tabla de Contenidos: “…. -- 1.34 Certain sums of trigonometric and hyperbolic functions -- 1.35 Sums of powers of trigonometric functions of multiple angles -- 1.36 Sums of products of trigonometric functions of multiple angles -- 1.37 Sums of tangents of multiple angles -- 1.38 Sums leading to hyperbolic tangents and cotangents -- 1.39 The representation of cosines and sines of multiples of the angle as finite products -- 1.41 The expansion of trigonometric and hyperbolic functions in power series -- 1.42 Expansion in series of simple fractions -- 1.43 Representation in the form of an infinite product -- 1.44-1.45 Trigonometric (Fourier) series -- 1.46 Series of products of exponential and trigonometric functions -- 1.47 Series of hyperbolic functions -- 1.48 Lobachevskiy's ``Angle of parallelism'' Π(x) -- 1.49 The hyperbolic amplitude (the Gudermannian) gd x -- 1.5 The Logarithm -- 1.51 Series representation -- 1.52 Series of logarithms (cf. 1.431) -- 1.6 The Inverse Trigonometric and Hyperbolic Functions -- 1.61 The domain of definition -- 1.62-1.63 Functional relations -- 1.64 Series representations -- 2 Indefinite Integrals of Elementary Functions -- 2.0 Introduction -- 2.00 General remarks -- 2.01 The basic integrals -- 2.02 General formulas -- 2.1 Rational Functions -- 2.10 General integration rules -- 2.11-2.13 Forms containing the binomial a+bxk -- 2.14 Forms containing the binomial 1 ± xn -- 2.15 Forms containing pairs of binomials: a+bx and α+βx -- 2.16 Forms containing the trinomial a+bxk+c x2k -- 2.17 Forms containing the quadratic trinomial a+bx+cx2 and powers of x.…”
Libro electrónico -
4603Publicado 2014Tabla de Contenidos: “…11.13 PES Streams 260 -- 11.14 Room for Future Extensions 260 -- References 261 -- 12 The MPEG-2 System Target Decoder Model 263 -- 12.1 Introduction to the MPEG-2 STD 263 -- 12.2 The Program Stream STD: P-STD 264 -- 12.2.1 Description of P-STD 264 -- 12.2.2 Buffer Management in the P-STD 267 -- 12.2.3 CSPS: Constrained System Parameter Program Stream 268 -- 12.2.4 Usage of P-STD for PES-STD 270 -- 12.3 Transport Stream STD: T-STD 275 -- 12.3.1 Description of T-STD 275 -- 12.3.2 The Use of Transport Buffers 279 -- 12.3.3 System Data Processing and Buffer Management 281 -- 12.3.4 Processing of Elementary Stream Data 284 -- 12.3.5 T-STD Buffers for Elementary Stream Decoding 288 -- 12.3.6 Buffer Management for Elementary Stream Data 290 -- 12.4 General STD Constraints and Requirements 290 -- 12.5 Content Format Specific STD Issues 292 -- 12.5.1 Decoding of MPEG Audio Streams in STD Model 292 -- 12.5.2 Decoding of MPEG Video Streams in STD Model 295 -- 13 Data Structure and Design Considerations 299 -- 13.1 System Time Clock Samples and Time Stamps 299 -- 13.2 PES Packets 301 -- 13.3 Descriptors of Programs and Program Elements 309 -- 13.3.1 General Format of Descriptors 309 -- 13.3.2 Types of Descriptors 311 -- 13.3.3 System Orientated Descriptors 311 -- 13.3.4 General Content Descriptors 315 -- 13.4 Program Streams 319 -- 13.5 Sections 326 -- 13.6 Transport Streams and Transport Packets 329 -- Reference 331 -- 14 Content Support in MPEG-2 Systems 333 -- 14.1 Introduction 333 -- 14.2 MPEG-1 334 -- 14.2.1 MPEG-1 Video 334 -- 14.2.2 MPEG-1 Audio 334 -- 14.2.3 MPEG-1 System Stream 334 -- 14.3 MPEG-2 336 -- 14.3.1 MPEG-2 Video 336 -- 14.3.2 MPEG-2 (BC) Audio 338 -- 14.3.3 MPEG-2 AAC 340 -- 14.3.4 MPEG-2 DSM-CC 341 -- 14.3.5 MPEG-2 System Stream 342 -- 14.3.6 MPEG-2 IPMP 343 -- 14.4 (ITU-T Rec.) …”
Libro electrónico -
4604por Naidu, S. ManiTabla de Contenidos: “…11.2 Principle of optical fibre, acceptance angle and acceptance cone -- 11.3 Numerical aperture (NA) -- 11.4 Step index fibres and graded index fibres-transmission of signals in them -- 11.5 Differences between step index fibres and graded index fibres -- 11.6 Differences between single mode fibres and multimode fibres -- 11.7 Attenuation in optical fibres -- 11.8 Optical fibres in communication -- 11.9 Advantages of optical fibres in communication -- 11.10 Fibre optic sensing applications -- (a) Displacement sensors -- (b) Liquid level sensor -- (c) Temperature and pressure sensor -- (d) Chemical sensors -- 11.11 Applications of optical fibres in medical field -- Formulae -- Solved Problems -- Multiple Choice Questions -- Answers -- Review Questions -- Chapter 12: Holography -- 12.1 Introduction -- 12.2 Basic principle of holography -- 12.3 Recording of image on a holographic plate -- 12.4 Reconstruction of image from a hologram -- 12.5 Applications of holography -- Multiple Choice Questions -- Answers -- Review Questions -- Chapter 13: Acoustics of Buildings and Acoustic Quieting -- 13.1 Introduction to acoustics of buildings -- 13.2 Reverberation and time of reverberation -- 13.3 Sabine's empirical formula for reverberation time -- 13.4 Sabine's reverberation theory for reverberation time -- 13.5 Absorption coefficient of sound and its measurement -- Measurement -- 13.6 Basic requirements of an acoustically good hall -- 13.7 Factors affecting architectural acoustics and their remedies -- 13.8 Acoustic quieting -- Introduction -- Aspects of Acoustic Quieting -- 13.9 Methods of quieting -- 13.10 Quieting for specific observers -- 13.11 Muffler (or silencer) -- 13.12 Sound proofing -- Formulae -- Solved Problem -- Multiple Choice Questions -- Answers -- Review Questions -- Chapter 14: Nanotechnology…”
Publicado 2009
Libro electrónico -
4605por Walther, BjörnTabla de Contenidos: “…13.2.3 Reporting der Ergebnisse -- 13.3 Kendall-Tau-Korrelation -- 13.3.1 Durchführung -- 13.3.2 Ergebnis und Interpretation -- 13.3.3 Reporting der Ergebnisse -- 13.4 Pearson-punktbiseriale Korrelation -- 13.4.1 Durchführung -- 13.4.2 Ergebnis und Interpretation -- 13.4.3 Exkurs: Interpretation einer signifikanten Korrelation -- 13.4.4 Reporting der Ergebnisse -- 13.5 Chi2-Test auf Unabhängigkeit -- 13.5.1 Durchführung -- 13.5.2 Ergebnis und Interpretation -- 13.5.3 Reporting der Ergebnisse -- 13.6 Kontingenzkoeffizient / Cramer V -- 13.7 Odds-Ratio -- 13.8 Zusatz: Partialkorrelation -- 14 Gerichtete Zusammenhänge - Regressionsanalysen -- 14.1 Lineare Regression -- 14.1.1 Vorbemerkungen und Vorbereitungen -- 14.1.2 Voraussetzungen der linearen Regression -- 14.1.3 Durchführung -- 14.1.4 Ergebnis -- 14.1.5 Interpretation der Ergebnisse -- 14.1.6 Reporting der Ergebnisse -- 14.2 Moderation und Mediation im Rahmen der linearen Regression -- 14.2.1 Moderation -- 14.2.2 Mediation -- 14.3 Binär-logistische Regression -- 14.3.1 Voraussetzungen -- 14.3.2 Durchführung -- 14.3.3 Ergebnis -- 14.3.4 Interpretation -- 14.3.5 Reporting der Ergebnisse -- 14.4 Ordinal-logistische Regression -- 14.4.1 Voraussetzungen -- 14.4.2 Durchführung -- 14.4.3 Ergebnis -- 14.4.4 Interpretation -- 14.4.5 Reporting der Ergebnisse -- Anhang -- A.1 Übersicht der allgemeinen Befehle für Diagramme mit der Basisversion von R -- A.1.1 Beschriftungen -- A.1.2 Schriftarten, Schriftvariation, Schriftgröße, Schriftfarben -- A.1.3 Achsenformatierung -- A.1.4 Linienarten und Datenpunkteformate -- A.1.5 Legende -- A.2 Übersicht der allgemeinen Befehle für Diagramme mit ggplot2 -- Glossar…”
Publicado 2022
Libro electrónico -
4606Publicado 2023Tabla de Contenidos: “…T integral formulation -- 1.3.4. Spectral methods -- 1.3.5. Particular issues for three dimensions -- 1.4. …”
Libro electrónico -
4607Publicado 2023Tabla de Contenidos: “…Intro -- inside front cover -- Privacy-Preserving Machine Learning -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A road map -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Basics of privacy-preserving machine learning with differential privacy -- 1 Privacy considerations in machine learning -- 1.1 Privacy complications in the AI era -- 1.2 The threat of learning beyond the intended purpose -- 1.2.1 Use of private data on the fly -- 1.2.2 How data is processed inside ML algorithms -- 1.2.3 Why privacy protection in ML is important -- 1.2.4 Regulatory requirements and the utility vs. privacy tradeoff -- 1.3 Threats and attacks for ML systems -- 1.3.1 The problem of private data in the clear -- 1.3.2 Reconstruction attacks -- 1.3.3 Model inversion attacks -- 1.3.4 Membership inference attacks -- 1.3.5 De-anonymization or re-identification attacks -- 1.3.6 Challenges of privacy protection in big data analytics -- 1.4 Securing privacy while learning from data: Privacy-preserving machine learning -- 1.4.1 Use of differential privacy -- 1.4.2 Local differential privacy -- 1.4.3 Privacy-preserving synthetic data generation -- 1.4.4 Privacy-preserving data mining techniques -- 1.4.5 Compressive privacy -- 1.5 How is this book structured? …”
Libro electrónico -
4608por Dance, BeverlyTabla de Contenidos: “…The Railway Labor Act (1926) -- 1.35. The Rehabilitation Act (1973) -- 1.36. The Retirement Equity Act (REA) (1984) -- 1.37. …”
Publicado 2023
Libro electrónico -
4609por Nerukh, AlexanderTabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Introduction -- 1: Basic Relations for an Electromagnetic Field in a Medium with Time-Varying Parameters and/or Moving Boundaries -- 1.1 Generalized Wave Equation for an Electromagnetic Field in a Time-Varying Medium -- 1.1.1 Generalized Derivatives -- 1.1.2 Initial and Boundary Conditions for Electromagnetic Fields in a Time-Varying Medium -- 1.1.3 Maxwell's Equations in a Generalized Derivatives Representation -- 1.1.4 Generalized Wave Equation for the Case of a Non-Dispersive Background -- 1.1.5 Generalized Wave Equation for the Case of a Dispersive Background -- 1.2 Fundamental Solutions to Maxwell's Equations -- 1.2.1 The Non-Dispersive Background -- 1.2.2 The Dispersive Background -- 1.2.3 A Rectangular Waveguide with Perfectly Conducting Walls -- 1.3 Causal Time-Spatial Interpretation of Electromagnetic Field Interaction with Time-Varying Objects -- 1.3.1 The Volterra Integral Equation for the Electromagnetic Field in a Non-Dispersive Background -- 1.3.2 Influence of a Dispersive Background on the Integral Equation Form -- 1.3.3 Spatial-Temporal Interpretation of the Volterra Integral Equation -- 1.3.4 Three Stages of Development of Electromagnetic Transients in a Bounded Medium with Time-Varying Parameters -- 1.3.5 Three Stages of Solution of a Non-Stationary Problem -- 1.4 The Resolvent Method for Solving the Integral Equation -- 1.4.1 Operator Form of an Integral Equation Representation -- 1.4.2 Kernels of the Integral Equations for Typical Media -- 1.4.3 The Resolvent Method -- 2: Transformation of an Electromagnetic Field in an Unbounded Medium with Time-Varying Parameters -- 2.1 Transformation of an Electromagnetic Wave in a Non-Dispersive Time-Varying Medium -- 2.1.1 The Resolvent for an Unbounded Medium with a Jump Change in Its Properties…”
Publicado 2018
Libro electrónico -
4610Publicado 2023Tabla de Contenidos: “…Progress guarantees -- Progress guarantees and concurrent collection -- 13.5. Notation used for concurrent algorithms -- 13.6. …”
Libro electrónico -
4611por Organization for Economic Co-operation and Development (OECD)Tabla de Contenidos: “…Korea has benefitted strongly from global integration but has yet to fully exploit its potential -- 1.3.5. Societal and structural challenges and Korea's preparedness for transitions enabled by science, technology and innovation -- 1.4. …”
Publicado 2023
Libro electrónico -
4612Publicado 2024Tabla de Contenidos: “…10.1.2 Mobile base robotic manipulator -- 10.1.3 IoT-based robotic manipulator -- 10.2 Design of the proposed semi-automatic robot manipulator -- 10.3 Proposed model -- 10.3.1 Denavit-Hartenberg parameters -- 10.3.2 Frame Assignment for D-H Parameter Calculation -- 10.4 Robot control -- 10.4.1 Joint space control -- 10.4.2 Task space control -- 10.4.3 Robotic arm simulation using MATLAB GUI -- 10.5 Hardware Implementation -- 10.6 Conclusion and future scope -- References -- Chapter 11: Pest identification and classification using IoT enable technique -- 11.1 Introduction -- 11.2 Literature survey -- 11.2.1 Related works -- 11.2.2 Problem statement -- 11.3 A novel deep learning framework for IoT-enabled pest identification and classification -- 11.3.1 Proposed architecture and description -- 11.3.2 IoT-enabled pest detection and smart agriculture -- 11.4 Conclusion -- References -- Chapter 12: Framework for leveraging diagnostic and vehicle data with emphasis on automotive cybersecurity -- 12.1 Introduction -- 12.2 Framework -- 12.3 Applications and features of the framework -- 12.4 Conclusion -- References -- Chapter 13: An array of Fibonacci series-based wide-band printed antennas for IoT/5G applications -- 13.1 Introduction -- 13.2 Proposed single antenna -- 13.2.1 Formation of the proposed geometry -- 13.2.2 Depiction of single antenna -- 13.2.3 Contour length and surface area computation -- 13.2.4 Time domain analysis -- 13.3 Proposed array -- 13.3.1 Construction of power divider network -- 13.3.2 Development of array -- 13.3.3 Benefits of the Wilkinson power divider -- 13.4 Results and discussion -- 13.5 Conclusion -- Acknowledgement -- References -- Chapter 14: Deep learning IoT platform for dental disease detection -- 14.1 Introduction -- 14.2 Literature survey -- 14.3 Suggested design -- 14.3.1 YOLO object detection interpretation…”
Libro electrónico -
4613Publicado 2023Tabla de Contenidos: “…7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? …”
Libro electrónico -
4614Publicado 2024Tabla de Contenidos: “…10.6 Decision Trees -- 10.7 Influence Diagrams -- 10.8 Affinity Diagrams -- 10.9 Game Theory -- 10.10 Cost-Benefit Analysis -- 10.11 Nominal Work Groups -- 10.12 Delphi Technique -- 10.13 Other Decision-Making Tools -- 10.14 Artificial Intelligence -- Customer Reaction -- Project Management Maturity -- Educating Project Managers -- Educating Team Members -- 10.15 Risk Management -- Ethics -- AI Penetration -- Discussion Questions -- References -- 11 Predicting the Impact -- 11.0 Evaluating the Impact of a Decision -- 11.1 Creating a Consequence Table -- 11.2 Performing Impact Analysis -- 11.3 The Time to Implement a Solution -- 11.4 The Definitions for Project Success and Failure Are Changing -- Historical Perspective -- Early Modification to the Triple Constraints -- The Use of Primary and Secondary Constraints -- From Triple Constraints to Competing Constraints -- 11.5 Project Decision-Making and Politics -- Discussion Questions -- 12 The Need for Effective or Active Listening Skills -- 12.0 Active Listening -- 12.1 Active Listening Body Language and Communications -- 12.2 Active Listening Barriers Created by the Speaker -- 12.3 Active Listening Barriers Created by the Listener -- 12.4 Overcoming Active Listening Barriers -- 12.5 Techniques for Effective Listening -- Discussion Questions -- 13 Barriers -- 13.0 The Growth of Barriers -- 13.1 Lack of Concern for the Workers Barriers -- 13.2 Legal Barriers -- 13.3 Project Sponsorship Barriers -- 13.4 Cost of Implementation Barriers -- 13.5 Culture Barriers -- 13.6 Project Management Office (PMO) Barrier -- 13.7 Conclusion -- Discussion Questions -- References -- Appendix: Using the PMBOK® Guide -- Decision-Making and the PMBOK® Guide -- Problem-Solving and the PMBOK® Guide -- PMBOK® Guide: Integration Management -- PMBOK® Guide: Scope Management -- PMBOK® Guide: Time Management…”
Libro electrónico -
4615Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Chapter 1 Introduction to Fractional Calculus -- 1.1 Introduction -- 1.2 Birth of Fractional Calculus -- 1.3 Useful Mathematical Functions -- 1.3.1 The Gamma Function -- 1.3.2 The Beta Function -- 1.3.3 The Mittag-Leffler Function -- 1.3.4 The Mellin-Ross Function -- 1.3.5 The Wright Function -- 1.3.6 The Error Function -- 1.3.7 The Hypergeometric Function -- 1.3.8 The H-Function -- 1.4 Riemann-Liouville (R-L) Fractional Integral and Derivative -- 1.5 Caputo Fractional Derivative -- 1.6 Grünwald-Letnikov Fractional Derivative and Integral -- 1.7 Riesz Fractional Derivative and Integral -- 1.8 Modified Riemann-Liouville Derivative -- 1.9 Local Fractional Derivative -- 1.9.1 Local Fractional Continuity of a Function -- 1.9.2 Local Fractional Derivative -- References -- Chapter 2 Recent Trends in Fractional Dynamical Models and Mathematical Methods -- 2.1 Introduction -- 2.2 Fractional Calculus: A Generalization of Integer-Order Calculus -- 2.3 Fractional Derivatives of Some Functions and Their Graphical Illustrations -- 2.4 Applications of Fractional Calculus -- 2.4.1 N.H. …”
Libro electrónico -
4616por Ashok, KamthaneTabla de Contenidos: “…12.13 The Predefined Macros in ANSI and Turbo-C -- 12.14 Standard I/O Predefined Streams in stdio.h -- 12.15 The Predefined Marcos in ctype.h -- 12.16 Assertions -- Summary -- Exercises -- 13 Structure and Union -- 13.1 Introduction -- 13.2 Features of Structures -- 13.3 Declaration and Initialization of Structures -- 13.4 Structure within Structure -- 13.5 Array of Structures -- 13.6 Pointer to Structure -- 13.7 Structure and Functions -- 13.8 typedef -- 13.9 Bit Fields -- 13.10 Enumerated Data Type -- 13.11 Union -- 13.12 Calling BIOS and DOS Services -- 13.13 Union of Structures -- Summary -- Exercises -- 14 Files -- 14.1 Introduction of a File -- 14.2 Definition of File -- 14.3 Streams and File Types -- 14.3.1 File Types -- 14.4 Steps for File Operations -- 14.4.1 Opening of File -- 14.4.2 Reading a File -- 14.4.3 Closing a File -- 14.4.4 Text Modes -- 14.4.5 Binary Modes -- 14.5 File I/O -- 14.6 Structures Read and Write -- 14.7 Other File Function -- 14.8 Searching Errors in Reading/Writing Files -- 14.9 Low-Level Disk I/O -- 14.10 Command Line Arguments -- 14.11 Application of Command Line Arguments -- 14.12 Environment Variables -- 14.13 I/O Redirection -- Summary -- Exercises -- 15 Graphics -- 15.1 Introduction -- 15.2 Initialization of Graphics -- 15.3 Few Graphics Functions -- 15.4 Programs Using Library Functions -- 15.4.1 Program on Moving Moon -- 15.5 Working with Text -- 15.5.1 Stylish Lines -- 15.6 Filling Patterns with Different Colours and Styles -- 15.7 Mouse Programming -- 15.8 Drawing Non-common Figures -- Summary -- Exercises -- 16 Dynamic Memory Allocation and Linked List -- 16.1 Dynamic Memory Allocation -- 16.2 Memory Models -- 16.3 Memory Allocation Functions -- 16.4 List -- 16.5 Traversal of a List -- 16.6 Searching and Retrieving an Element -- 16.7 Predecessor and Successor -- 16.8 Insertion -- 16.9 Linked Lists…”
Publicado 2015
Libro electrónico -
4617por Jill Kirsten RobinsonTabla de Contenidos: “…-- Study Guide -- Key Terms -- Key Equations -- Practice Test -- Conceptual Problems -- Section Problems -- Multiconcept Problems -- 13 Solutions and Their Properties -- 13.1 Solutions -- 13.2 Enthalpy Changes and the Solution Process -- 13.3 Predicting Solubility -- 13.4 Concentration Units for Solutions -- 13.5 Some Factors That Affect Solubility -- 13.6 Physical Behavior of Solutions: Colligative Properties -- 13.7 Vapor-Pressure Lowering of Solutions: Raoult's Law -- 13.8 Boiling-Point Elevation and Freezing-Point Depression of Solutions -- 13.9 Osmosis and Osmotic Pressure…”
Publicado 2021
Libro electrónico -
4618Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
4619Publicado 2017Tabla de Contenidos: “…Chapter 13 Digital Control Systems -- 13.1 Introduction -- 13.2 Digital Computer Control System Applications -- 13.3 Sampled-Data Systems -- 13.4 The z-Transform -- 13.5 Closed-Loop Feedback Sampled-Data Systems -- 13.6 Performance of a Sampled-Data, Second-Order System -- 13.7 Closed-Loop Systems with Digital Computer Compensation -- 13.8 The Root Locus of Digital Control Systems -- 13.9 Implementation of Digital Controllers -- 13.10 Design Examples -- 13.11 Digital Control Systems Using Control Design Software -- 13.12 Sequential Design Example: Disk Drive Read System -- 13.13 Summary -- Skills Check -- Exercises -- Problems -- Advanced Problems -- Design Problems -- Computer Problems -- Terms and Concepts -- References -- Index -- Appendix A MATLAB Basics -- Appendix B MathScript RT Module Basics -- Appendix C Symbols, Units, and Conversion Factors -- Appendix D Laplace Transform Pairs -- Appendix E An Introduction to Matrix Algebra -- Appendix F Decibel Conversion -- Appendix G Complex Numbers -- Appendix H z-Transform Pairs Preface -- Appendix I Discrete-Time Evaluation of the Time Response…”
Libro electrónico -
4620Publicado 2022Tabla de Contenidos: “…Metal-rolling Processes and Equipment -- 13.1 Introduction -- 13.2 The Flat-rolling Process -- 13.3 Flat-rolling Practice -- 13.4 Rolling Mills -- 13.5 Various Rolling Processes and Mills -- Summary -- Key Terms -- Bibliography -- Review Questions -- Qualitative Problems -- Quantitative Problems -- Synthesis, Design, and Projects -- Chapter 14. …”
Libro electrónico