Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
41321Publicado 2007Tabla de Contenidos: “….] -- Habitat and landscape factors associated with neotropical waterbird occurrence and richness in wetland fragments / Demetrio Luis Guadagnin, Leonardo Maltchik -- Livestock husbandry as a tool for carnivore conservation in Africa's community rangelands : a case-control study / Rosie Woodroffe ... [et al.] -- Comparison of funding and demand for the conservation of the charismatic koala with those for the critically endangered wombat Lasiorhinus krefftii / Clem Tisdell and Hemanath Swarna Nantha -- Nest site selection in middle and great spotted woodpeckers Dendrocopos medius & D. major : implications for forest management and conservation / Gilberto Pasinelli -- An evaluation of the contribution of cultivated allspice (Pimenta dioca) to vertebrate biodiversity conservation in Nicaragua / David I. …”
Libro -
41322Publicado 2006Tabla de Contenidos: “…Roseff -- Blood storage / Ian Chin-Yee and Richard K. Spence -- Quality control and hospital blood utilization / Kathleen Walsh-Kaminsky -- Preoperative autologous donation / Francesco Mercuriali, Giovanni Inghilleri and Richard K. …”
Libro -
41323por Mangas Martín, Araceli“…El Tratado de Funcionamiento de la Unión establece detalladamente las políticas, la delimitación de las competencias y los procesos de decisión y control. Posteriormente, la crisis económico-financiera y de las deudas soberanas propiciaron nuevas reformas mediante nuevos Tratados e importantes novedades en el Derecho derivado y desarrollos jurisprudenciales. …”
Publicado 2016
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada)Libro -
41324Publicado 2017Tabla de Contenidos: “…273 7.2 Electronic Communications Privacy Act 275 7.2.1 Stored Communications Act 276 7.2.1.1 Section 2701: Third-Party Hacking of Stored Communications 278 7.2.1.2 Section 2702: Restrictions on Service Providers' Ability to Disclose Stored Communications and Records to the Government and Private Parties 279 7.2.1.2.1 The Cybersecurity Act of 2015: Allowing Service Providers to Disclose Cybersecurity Threats to the Government 282 7.2.1.3 Section 2703: Government's Ability to Force Service Providers to Turn Over Stored Communications and Customer Records 284 7.2.2 Wiretap Act 286 7.2.3 Pen Register Act 290 7.2.4 National Security Letters 291 7.3 Communications Assistance for Law Enforcement Act (CALEA) 293 7.4 Encryption and the All Writs Act 294 8 Cybersecurity and Federal Government Contractors 299 8.1 Federal Information Security Management Act 300 8.2 NIST Information Security Controls for Government Agencies and Contractors 301 8.3 Classified Information Cybersecurity 306 8.4 Covered Defense Information and Controlled Unclassified Information 309 9 Privacy Laws 317 9.1 Section 5 of the FTC Act and Privacy 318 9.2 Health Insurance Portability and Accountability Act 324 9.3 Gramm-Leach-Bliley Act and California Financial Information Privacy Act 326 9.4 CAN-SPAM Act 327 9.5 Video Privacy Protection Act 328 9.6 Children's Online Privacy Protection Act 330 9.7 California Online Privacy Laws 332 9.7.1 California Online Privacy Protection Act (CalOPPA) 332 9.7.2 California Shine the Light Law 333 9.7.3 California Minor "Eraser Law" 335 9.8 Illinois Biometric Information Privacy Act 337 10 International Cybersecurity Law 339 10.1 European Union 340 10.2 Canada 346 10.3 China 350 10.4 Mexico 353 10.5 Japan 356 Appendix A: Text of Section 5 of the FTC Act 361 Appendix B: Summary of State Data Breach Notification Laws 369 Appendix C: Text of Section 1201 of the Digital Millennium Copyright Act 413 Appendix D: Text of the Computer Fraud and Abuse Act 425 Appendix E: Text of the Electronic Communications Privacy Act 433 Index 485.…”
Libro electrónico -
41325por Guerra Soto, MarioTabla de Contenidos: “…CIFRADO HÍBRIDO -- 9.7 RESUMEN (HASHING) -- 10 AUTENTICACIÓN Y CONTROL DE ACCESO -- 10.1 FILTRADO DE SEGURIDAD -- 10.1.1 LISTAS DE CONTROL DE ACCESOS DE RED (ACL) -- 10.1.2 FILTRADO DE PUERTOS -- 10.2 CONTROLES DE SEGURIDAD EN EL MODELO TCP/IP -- 10.2.1 SEGURIDAD EN LA CAPA DE RED -- 10.2.2 VPN -- 10.2.3 SSL y -- 10.2.4 L2TP -- 10.2.5. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
41326Publicado 2018Tabla de Contenidos: “…Exclusión del monotributo por razones de control. -- Artículo 914. Exclusión del monotributo por incumplimiento. -- Artículo 915. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
41327Publicado 2022Tabla de Contenidos: “….) -- DISEÑO DE UNA RED: CONECTAR TODOS LOS PUNTOS -- PLANIFICACIÓN Y CONTROL: PROCESOS, PREVISIONES, INVENTARIOS, (...) -- INCERTIDUMBRE EN LA DEMANDA Y LA OFERTA -- PRIMERA CLAVE PARA EL PROCESO D2S: PREVISIÓN DE LA DEMANDA DEL MERCADO -- SEGUNDA CLAVE PARA EL PROCESO D2S: PLANIFICACIÓN DE LA CAPACIDAD -- TERCERA CLAVE PARA EL PROCESO D2S: PLANIFICACIÓN Y PROGRAMACIÓN DE LA (...) -- CUARTA CLAVE PARA EL PROCESO D2S: PRODUCCIÓN Y CALIDAD -- QUINTA CLAVE PARA EL PROCESO D2S: GESTIÓN DE INVENTARIOS (REPOSICIÓN) -- CLAVES DE O2C Y P2P: CONDICIONES DE PAGO Y REGLAS INCOTERMS -- INFORMACIÓN, SISTEMAS Y ASPECTOS ORGANIZATIVOS LA INFORMACIÓN EN EL (...) -- ASPECTOS ORGANIZATIVOS: EL DEPARTAMENTO DE LA CADENA DE SUMINISTRO Y (...) -- RESUMEN -- 4 LA DIMENSIÓN DEL LIDERAZGO DE LA CADENA DE SUMINISTRO -- PONER A LA GENTE EN MARCHA: CÓMO MEDIR EL RENDIMIENTO Y ESTABLECER (...) -- GESTIÓN DE LAS PARTES INTERESADAS, SILOS FUNCIONALES Y CULTURA CORPORATIVA…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
41328Publicado 2019Tabla de Contenidos: “…10.1.2 Safety -- 10.1.3 Cost -- 10.1.4 Temperature Tolerance -- 10.1.5 Shipment and Storage -- 10.1.6 Power Characteristics -- 10.1.7 Environmentally Friendly Technology (Clean Tech) -- 10.1.8 Pressure Tolerance -- 10.1.9 Control -- 10.2 Electric Aircraft -- 10.3 Satellites -- 10.4 Cars -- 10.5 Buses -- 10.6 Trucks -- 10.7 Electric Scooter and Electric Bikes -- 10.8 Marine -- 10.9 Energy Storage -- 10.10 Low‐Temperature Applications -- 10.11 Defense -- 10.12 Looking Ahead -- 10.13 Conclusion -- Chapter 11 Battery Engineering -- 11.1 Mechanical Considerations -- 11.2 Thermal and Electrical Considerations -- References -- Chapter 12 Case Study -- 12.1 Introduction -- 12.2 A Potted History of Eternal Solar Flight -- 12.3 Why Has It Been So Difficult? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
41329Publicado 2014“…Installation, Architektur, Infrastruktur Backup, Recovery, Sicherheit, Automatic Storage Management Pluggable Database, Performance Tuning, Oracle Warehouse Builder, Enterprise Manager: Cloud Control Dieses Buch ist keine einfache Überarbeitung des Vorgängers, sondern wurde auf Basis der Schwerpunkte und neuen Features der Version 12c neu strukturiert und gestaltet. …”
Libro electrónico -
41330Publicado 2022Tabla de Contenidos: “…7.6.4 Dynamic compilation and monomorphic calls -- 7.6.5 Reading the compilation logs -- 7.6.6 Deoptimization -- 7.7 JDK Flight Recorder -- 7.7.1 Flight Recorder -- 7.7.2 Mission Control -- Summary -- Part 3. Non-Java languages on the JVM -- 8 Alternative JVM languages -- 8.1 Language zoology -- 8.1.1 Interpreted vs. compiled languages -- 8.1.2 Dynamic vs. static typing -- 8.1.3 Imperative vs. functional languages -- 8.1.4 Reimplementation vs. original -- 8.2 Polyglot programming on the JVM -- 8.2.1 Why use a non-Java language? …”
Libro electrónico -
41331Publicado 2014Tabla de Contenidos: “…4.3.1.2 CEN technical bodies -- 4.3.1.3 European standards -- 4.3.1.4 Technical specifications -- 4.3.1.6 CENELEC workshop agreements (CWA) -- 4.3.1.7 CEN members -- 4.3.1.8 CEN/TC 225 -- 4.3.1.9 CENELEC -- 4.3.1.10 Smart grids: EC Mandate M/490 -- 4.3.1.11 ISO/IEC JTC 1/SWG 05 on the Internet of Things (IoT) -- 4.3.1.12 ISO/IEC JTC 1/WG 7 Sensor Networks -- 4.3.1.13 ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques -- 4.3.2 ETSI -- 4.3.3 IEEE -- 4.3.3.1 Overview -- 4.3.3.2 Cloud Computing -- 4.3.3.3 eHealth -- 4.3.3.4 eLearning -- 4.3.3.5 Intelligent Transportation Systems (ITS) -- 4.3.3.6 Network and Information Security (NIS) -- 4.3.3.7 Smart Grid -- 4.3.4 IETF -- 4.3.5 ITU-T -- 4.3.6 OASIS -- 4.3.6.1 Transactional Reliability -- 4.3.6.2 Modularity, reusability, and devices in the cloud -- 4.3.6.3 All that big data from all those things: access control, cybersecurity and privacy -- 4.3.6.4 Access control -- 4.3.6.5 Encryption and cybersecurity -- 4.3.6.6 Privacy -- 4.3.7 OGC -- 4.3.8 oneM2M -- 4.3.9 GS1 -- 4.3.9.1 The Role of Standards -- 4.3.9.2 GS1 Standards: Identify, Capture, Share -- 4.3.9.3 Looking forward -- 4.4 IERC Research Projects Positions -- 4.4.1 BETaaS Advisory Board Experts Position -- 4.4.2 IoT6 Position -- 4.5 Conclusions -- References -- 5 Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework -- 5.1 Introduction -- 5.2 BackgroundWork -- 5.3 Main Concepts and Motivation of the Framework -- 5.3.1 Identity Management -- 5.3.2 Size and Heterogeneity of the System -- 5.3.3 Anonymization of User Data and Metadata -- 5.3.4 Action's Control -- 5.3.5 Privacy by Design -- 5.3.6 Context Awareness -- 5.3.7 Summary -- 5.4 A Policy-based Framework for Security and Privacy in Internet of Things -- 5.4.1 Deployment in a Scenario -- 5.4.2 Policies and Context Switching…”
Libro electrónico -
41332Publicado 2023Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
Libro electrónico -
41333Publicado 2023Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
Libro electrónico -
41334Publicado 2003Tabla de Contenidos: “…-- 5.2 Understanding eClient architecture -- 5.2.1 Overview -- 5.2.2 Inspecting eClient control flow -- 5.3 Customization and integration -- 5.3.1 Overview -- 5.3.2 eClient JSPs -- 5.3.3 Customizing eClient graphics -- Chapter 6. …”
Libro electrónico -
41335por Lovelace, MaryTabla de Contenidos: “…Cutover to production -- 9.1 EDGRMMxx PARMLIB options -- 9.1.1 OPTION command -- 9.1.2 VLPOOL command -- 9.2 Control access to DFSMSrmm functions -- 9.3 Activate exits -- 9.4 Remove TLMS -- 9.5 Modifying CA-Disk -- 9.6 Inventory management -- 9.7 Interface to tape libraries -- 9.7.1 System-managed IBM 3494 and IBM 3495 tape libraries -- 9.7.2 Other tape libraries…”
Publicado 2004
Libro electrónico -
41336Publicado 2003Tabla de Contenidos: “…Implementing DFSMStvs -- 8.1 Implementation overview -- 8.2 Setting up a Parallel Sysplex environment -- 8.3 Define coupling facility structures -- 8.4 Define the DFSMS environment -- 8.4.1 Define SMSplex environment -- 8.4.2 Define cache structures in the SMS base configuration -- 8.4.3 Define storage classes for VSAM files -- 8.4.4 Change ACS routines for VSAM data sets -- 8.4.5 Define SMS environment for the system logger -- 8.4.6 Modify SYS1.PARMLIB member IGDSMSxx -- 8.4.7 Modify SYS1.PARMLIB member IFAPRDxx -- 8.5 Define the Sharing Control Data Set (SHCDS) -- 8.6 Define the system logger environment…”
Libro electrónico -
41337Publicado 2002Tabla de Contenidos: “…Overview -- 1.1 Introduction to the enhancements -- 1.2 Availability and recoverability -- 1.2.1 Database Recovery Control (DBRC) enhancements -- 1.2.2 Database Image Copy 2 enhancements -- 1.2.3 HALDB enhancements -- 1.2.4 Batch Resource Recovery Service (RRS) support -- 1.2.5 Remote Site Recovery (RSR) enhancement -- 1.2.6 Enhanced availability by using the Resource Manager (RM) -- 1.2.7 Common Queue Server (CQS) enhancements -- 1.2.8 APPC and OTMA enhancements -- 1.2.9 APPC/IMS enhancements -- 1.2.10 IMS Online Recovery Service (ORS) support -- 1.2.11 System Log Data Set (SLDS) dynamic backout processing -- 1.3 Performance and capacity enhancements -- 1.3.1 Fast Path enhancements -- 1.3.2 Parallel database processing enhancement -- 1.3.3 IMS MSC FICON CTC support -- 1.3.4 Virtual storage constraint relief -- 1.4 Systems management enhancements -- 1.4.1 BPE enhancements -- 1.4.2 Common Service Layer -- 1.4.3 Installation and configuration enhancements -- 1.4.4 Syntax Checker -- 1.4.5 Transaction trace -- 1.5 Application enablement enhancements -- 1.5.1 Java enhancements -- Part 2 IMS Version 8 base enhancements -- Chapter 2. …”
Libro electrónico -
41338Publicado 2023Tabla de Contenidos: “…18.1.2 The vision search operator -- 18.1.3 The marketing research operator -- 18.2 Implementation of SE for the one-max problem -- 18.2.1 Declaration of functions and parameters -- 18.2.2 The main loop -- 18.2.3 Additional functions -- 18.3 Simulation results of SE for the one-max problem -- 18.4 Discussion -- Supplementary source code -- 19 Advanced applications -- 19.1 Data clustering -- 19.1.1 Problem description and definition -- 19.1.2 Solution encoding -- 19.1.3 Metaheuristic algorithm for data clustering -- 19.2 Cluster-head selection -- 19.2.1 Problem description and definition -- 19.2.2 Solution encoding -- 19.2.3 Metaheuristic algorithm for cluster-head selection -- 19.3 Traffic light control -- 19.3.1 Problem description and definition -- 19.3.2 Solution encoding -- 19.3.3 Metaheuristic algorithm for traffic light control -- 19.4 Hyperparameter optimization -- 19.4.1 Problem description and definition -- 19.4.2 Solution encoding -- 19.4.3 Metaheuristic algorithm for hyperparameter optimization -- 19.5 Convolutional neural network filter pruning -- 19.5.1 Problem description and definition -- 19.5.2 Solution encoding -- 19.5.3 Metaheuristic algorithm for convolutional neural network pruning -- 19.6 Discussion -- 20 Conclusion and future research directions -- 20.1 Conclusion -- 20.2 Future research directions -- A Interpretations and analyses of simulation results -- A.1 Interpretations of metaheuristics -- A.1.1 Quality of the end result -- A.1.2 Convergence curves -- A.1.3 Number of evaluations and computation time -- A.2 Analyses of metaheuristics -- A.2.1 Impact of parameters and operators -- A.2.2 Complexity and statistical analyses -- A.3 Discussion -- Supplementary source code -- B Implementation in Python -- Supplementary source code -- References -- Index -- Back Cover…”
Libro electrónico -
41339Publicado 2013Tabla de Contenidos: “…6.4.2 Pipe Material -- 6.4.3 Depth of Sanitary Sewer -- 6.4.4 Diameter and Slope of Pipes -- 6.4.5 Hydraulic Criteria -- 6.4.6 Manholes -- 6.4.7 Pump Stations -- 6.4.8 Force Mains -- 6.4.9 Hydrogen-Sulfide Control -- 6.4.10 Combined Sewers -- 6.5 Design Computations -- 6.5.1 Design Aids -- 6.5.1.1 Manning's n -- 6.5.1.2 Minimum slope for self-cleansing -- 6.5.2 Procedure for System Design -- Problems -- 7 Design of Hydraulic Structures -- 7.1 Introduction -- 7.2 Culverts -- 7.2.1 Hydraulics -- 7.2.1.1 Submerged entrances -- 7.2.1.2 Unsubmerged entrances -- 7.2.2 Design Constraints -- 7.2.3 Sizing Calculations -- 7.2.3.1 Fixed-headwater method -- 7.2.3.2 Fixed-flow method -- 7.2.3.3 Minimum-performance method -- 7.2.4 Roadway Overtopping -- 7.2.5 Riprap/Outlet Protection -- 7.3 Gates -- 7.3.1 Free Discharge -- 7.3.2 Submerged Discharge -- 7.3.3 Empirical Equations -- 7.4 Weirs -- 7.4.1 Sharp-Crested Weirs -- 7.4.1.1 Rectangular weirs -- 7.4.1.2 V-notchweirs -- 7.4.1.3 Compound weirs -- 7.4.1.4 Other types of sharp-crested weirs -- 7.4.2 Broad-Crested Weirs -- 7.4.2.1 Rectangular weirs -- 7.4.2.2 Compound weirs -- 7.4.2.3 Gabionweirs -- 7.5 Spillways -- 7.5.1 Uncontrolled Spillways -- 7.5.2 Controlled (Gated) Spillways -- 7.5.2.1 Gates seated on the spillway crest -- 7.5.2.2 Gates seated downstream of the spillway crest -- 7.6 Stilling Basins -- 7.6.1 Type Selection -- 7.6.2 Design Procedure -- 7.7 Dams and Reservoirs -- 7.7.1 Types of Dams -- 7.7.2 Reservoir Storage -- 7.7.2.1 Sediment accumulation -- 7.7.2.2 Determination of storage requirements -- 7.7.3 Hydropower -- 7.7.3.1 Turbines -- 7.7.3.2 Turbine performance -- 7.7.3.3 Feasibility of hydropower -- Problems -- 8 Probability and Statistics in Water-Resources Engineering -- 8.1 Introduction -- 8.2 Probability Distributions -- 8.2.1 Discrete Probability Distributions…”
Libro electrónico -
41340Publicado 2019Tabla de Contenidos: “…System Analysis -- 1.2.6. System Control -- 1.3. Summary -- Chapter 2: Systems engineering and integration -- 2.1. …”
Libro electrónico