Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
43261por Liang, Y.Tabla de Contenidos: “…Loops -- 5.1 Introduction -- 5.2 The while Loop -- 5.3 Case Study: Guessing Numbers -- 5.4 Loop Design Strategies -- 5.5 Controlling a Loop with User Confirmation and Sentinel Value -- 5.6 The for Loop -- 5.7 Nested Loops -- 5.8 Minimizing Numerical Errors -- 5.9 Case Studies -- 5.10 Keywords break and continue -- 5.11 Case Study: Checking Palindromes -- 5.12 Case Study: Displaying Prime Numbers -- 5.13 Case Study: Random Walk -- Chapter 6. …”
Publicado 2022
Libro electrónico -
43262Publicado 2022Tabla de Contenidos: “…3.3.1 Purpose of System -- 3.3.2 Description -- 3.3.3 Safety/Integrity Aspects -- 3.3.4 Key Integration Aspects -- 3.3.5 Key Interfaces -- 3.3.6 Key Design Drivers -- 3.3.7 Modelling -- 3.3.8 References -- 3.3.9 Sizing Considerations -- 3.3.10 Future Considerations -- 3.4 Hydraulic Power Generation and Distribution -- 3.4.1 Purpose of the System -- 3.4.2 Description -- 3.4.3 Safety/Integrity Aspects -- 3.4.4 Key Integration Aspects -- 3.4.5 Key Interfaces -- 3.4.6 Key Design Drivers -- 3.4.7 Modelling -- 3.4.8 References -- 3.4.9 Sizing Considerations -- 3.4.10 Future Considerations -- 3.5 Bleed Air System -- 3.5.1 Purpose of the System -- 3.5.2 Description -- 3.5.3 Safety/Integrity Aspects -- 3.5.4 Key Integration Aspects -- 3.5.5 Key Interfaces -- 3.5.6 Key Design Drivers -- 3.5.7 Modelling -- 3.5.8 References -- 3.5.9 Sizing Considerations -- 3.5.10 Future Considerations -- 3.6 Secondary Power Systems -- 3.6.1 Purpose of System -- 3.6.2 Description -- 3.6.3 Safety/Integrity Aspects -- 3.6.4 Key Integration Aspects -- 3.6.5 Key Interfaces -- 3.6.6 Key Design Drivers -- 3.6.7 Modelling -- 3.6.8 References -- 3.6.9 Sizing Considerations -- 3.6.10 Future Considerations -- 3.7 Emergency Power Systems -- 3.7.1 Purpose of System -- 3.7.2 Description -- 3.7.3 Safety/Integrity Aspects -- 3.7.4 Key Integration Aspects -- 3.7.5 Key Interfaces -- 3.7.6 Key Design Drivers -- 3.7.7 Modelling -- 3.7.8 References -- 3.7.9 Sizing Considerations -- 3.7.10 Future Considerations -- 3.8 Flight Control System -- 3.8.1 Purpose of System -- 3.8.2 Description -- 3.8.3 Safety/Integrity Aspects -- 3.8.4 Key Integration Aspects -- 3.8.5 Key Interfaces -- 3.8.6 Key Design Drivers -- 3.8.7 Modelling -- 3.8.8 References -- 3.8.9 Sizing Considerations -- 3.8.10 Future Considerations -- 3.9 Landing Gear -- 3.9.1 Purpose of System -- 3.9.2 Description…”
Libro electrónico -
43263por Abualigah, LaithTabla de Contenidos: “…9.2.2.2 Second leader stage -- 9.2.2.3 First leader stage -- 9.2.2.4 First leader learning -- 9.2.2.5 Second leader learning -- 9.2.2.6 Second leader decision -- 9.2.2.7 First leader decision -- 9.2.3 Control parameters in spider monkey optimization -- 9.3 Related work -- 9.3.1 Optimization problems -- 9.3.2 Deep learning -- 9.3.3 Data clustering -- 9.3.4 Big data problems -- 9.3.5 Networking problems -- 9.3.6 Cloud computing -- 9.3.7 Scheduling issues -- 9.3.8 Privacy problems -- 9.3.9 Image processing -- 9.3.10 Software engineering field -- 9.3.11 Other applications -- 9.4 Discussion -- 9.5 Conclusion and future works -- References -- 10 Marine predator's algorithm: a survey of recent applications -- 10.1 Introduction -- 10.2 Marine Predator's Algorithm -- 10.3 Related Works -- 10.3.1 Engineering Problems -- 10.3.2 Image Processing -- 10.3.3 Benchmark Function -- 10.3.4 Feature Selection -- 10.4 Discussion -- 10.5 Conclusion and Future Work -- References -- 11 Quantum approximate optimization algorithm: a review study and problems -- 11.1 Introduction -- 11.2 Methods -- 11.2.1 Fixed p algorithm -- 11.2.2 Concentration -- 11.2.3 The ring of disagrees -- 11.2.4 Maxcut on 3-regular graphs -- 11.2.5 Relation to the quantum adiabatic algorithm -- 11.2.6 A variant of the algorithm -- 11.3 Related works -- 11.4 Result -- 11.5 Discussion -- 11.6 Conclusion -- References -- 12 Crow search algorithm: a survey of novel optimizer and its recent applications -- 12.1 Introduction -- 12.2 Crow search algorithm -- 12.2.1 Inspiration -- 12.2.2 Continuous crow search algorithm -- 12.3 Related work -- 12.4 Conclusion and future work -- References -- 13 A review of Henry gas solubility optimization algorithm: a robust optimizer and applications -- 13.1 Introduction -- 13.2 Henry gas solubility optimization -- 13.2.1 Henry's law -- 13.2.2 Inspiration source…”
Publicado 2024
Libro electrónico -
43264Publicado 2005Tabla de Contenidos: “…DB2e synchronization -- 10.1 IBM DB2 Everyplace overview -- 10.2 DB2 Everyplace in WCTME -- 10.2.1 DB2 Everyplace Sync Server -- 10.2.2 DB2 Everyplace SDK -- 10.3 Architecture -- 10.4 Types of subscription -- 10.4.1 JDBC subscription -- 10.4.2 DataPropagator subscription -- 10.4.3 Upload subscription -- 10.5 Filtering data from data sources -- 10.6 Synchronization with remote DB2 databases -- 10.7 Debug and tracing -- 10.7.1 Application server logs files -- 10.7.2 Enable tracing -- 10.7.3 Trace files -- 10.7.4 DB2 Everyplace control database -- 10.8 DB2 Everyplace sample scenario -- 10.8.1 First steps -- 10.8.2 Server configuration -- 10.8.3 Programming database synchronization using WCTME -- 10.8.4 Synchronization review -- 10.9 Hints and tips -- Chapter 11. …”
Libro electrónico -
43265Publicado 2003“…Yet, the storage in most businesses is typically only about 50% used. How can you take control of your storage assets to render utilization more efficient, and make the most of your storage dollars? …”
Libro electrónico -
43266por Bergland, JohnTabla de Contenidos: “…Specifying Server configuration settings for LDAP -- A.0.1 Adding portal administrators to the Domino Directory -- Updating the Access Control List of the Domino Directory -- Configuring WebSphere Portal for Domino Directory -- Security is enabled -- Verifying LDAP -- WebSphere Portal Server hardware requirements for Linux Intel systems -- Appendix B. …”
Publicado 2004
Libro electrónico -
43267Publicado 2019“…The heavy use of algorithmic and rule-based elements and the use of elements of control theory is also explained. Furthermore, the IFs system is compared and contrasted with all other major modeling efforts, also outlining the major benefits of the IFs system. …”
Libro electrónico -
43268Publicado 2020Tabla de Contenidos: “…12.2.1 Creating a database scoped credential -- 12.2.2 Creating an external data source -- 12.2.3 Creating an external table -- 12.2.4 Importing Blob files -- 12.3 Importing file data with ADF -- 12.3.1 Authenticating between ADF and SQLDB -- 12.3.2 Creating SQL Database linkedservice -- 12.3.3 Creating datasets -- 12.3.4 Creating a copy activity and pipeline -- 12.4 Exercises -- 12.4.1 Exercise 1 -- 12.4.2 Exercise 2 -- 12.4.3 Exercise 3 -- Summary -- 13 Where to go next -- 13.1 Data catalog -- 13.1.1 Data Catalog as a service -- 13.1.2 Data locations -- 13.1.3 Data definitions -- 13.1.4 Data frequency -- 13.1.5 Business drivers -- 13.2 Version control and backups -- 13.2.1 Blob Storage -- 13.2.2 Data Lake Storage -- 13.2.3 Stream Analytics -- 13.2.4 Data Lake Analytics -- 13.2.5 Data Factory configuration files -- 13.2.6 SQL Database -- 13.3 Microsoft certifications -- 13.4 Signing off -- Summary -- appendix A. …”
Libro electrónico -
43269Publicado 2003Tabla de Contenidos: “…-- 7.3.6 Is there a way to control the REORG? -- 7.3.7 Are there availability improvements for the classic REORG? …”
Libro electrónico -
43270Publicado 2022Tabla de Contenidos: “…10.2 Government ownership and banking outcomes -- 10.2.1 Government ownership and banking: main hypotheses -- 10.2.2 Modelling government ownership and control rights -- 10.2.3 Political economy equilibrium -- 10.2.4 Summary -- 10.3 Political credit cycle -- 10.3.1 Reelection and credit supply to voters -- 10.3.2 Credit supply over election cycles -- 10.3.3 Summary -- 10.4 Empirical evidence -- 10.4.1 Government ownership and banking outcomes -- 10.4.2 Legal systems and banking -- 10.4.3 Political ties and banking outcomes -- 10.4.4 Political credit cycles -- 10.4.5 Moral suasion and home bias -- 10.4.6 Political economy and allocation efficiency -- 10.5 Exercises -- PART IV: THE ECONOMICS OF BANKING REGULATION -- CHAPTER 11 SYSTEMIC RISKS AND MACROPRUDENTIAL REGULATION -- 11.1 Introduction -- 11.1.1 Why is banking regulation special? …”
Libro electrónico -
43271Publicado 2023“…The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. …”
Libro electrónico -
43272Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Review on Text Classification and Text Mining Techniques Using Spam Dataset Detection -- 1.1 Introduction -- 1.2 Text Mining Techniques -- 1.2.1 Data Mining -- 1.2.2 Information Retrieval -- 1.2.3 Natural Language Processing (NLP) -- 1.2.4 Information Extraction -- 1.2.5 Text Summarization -- 1.2.6 Text Categorization -- 1.2.7 Clustering -- 1.2.8 Information Visualization -- 1.2.9 Question Answer -- 1.3 Dataset and Preprocessing Steps -- 1.3.1 Text Preprocess -- 1.4 Feature Extraction -- 1.4.1 Term Frequency - Inverse Document Frequency -- 1.4.2 Bag of Words (BoW) -- 1.5 Supervised Machine Learning Classification -- 1.6 Evaluation -- 1.7 Experimentation and Discussion Results for Spam Detection Data -- 1.8 Text Mining Applications -- 1.9 Text Classification Support -- 1.9.1 Health -- 1.9.2 Business and Marketing -- 1.9.3 Law -- 1.10 Conclusions -- References -- Chapter 2 Study of Lidar Signals of the Atmospheric Boundary Layer Using Statistical Technique -- 2.1 Introduction -- 2.2 Methodology -- 2.2.1 A Statistical Approach to Determine the CBLH -- 2.2.2 A Statistical Approach to Determine the Best Fit Distribution to the Backscatter Signals of the Lidar Dataset -- 2.3 Mathematical Background of Method -- 2.4 Example and Result -- 2.5 Conclusion and Future Scope -- Acknowledgement -- References -- Annexure -- Chapter 3 Optimal Personalized Therapies in Colon Cancer Induced Immune Response using a Fokker-Planck Framework -- 3.1 Introduction -- 3.2 The Control Framework Based on Fokker-Planck Equations -- 3.3 Theoretical Results -- 3.4 Numerical Schemes -- 3.5 Results -- 3.6 Conclusion -- Acknowledgments -- References -- Chapter 4 Detection and Classification of Leaf Blast Disease using Decision Tree Algorithm in Rice Crop -- 4.1 Introduction…”
Libro electrónico -
43273por Tyagi, Amit KumarTabla de Contenidos: “…3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers -- 3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References -- Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society -- 4.1 Introduction -- 4.2 Background Work -- 4.3 Motivation -- 4.4 Existing Innovations in the Current Society -- 4.5 Expected Innovations in the Next-Generation Society -- 4.6 An Environment with Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.7 Open Issues in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.8 Research Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.9 Legal Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.10 Future Research Opportunities Towards Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications…”
Publicado 2024
Libro electrónico -
43274por Dey, ArindamTabla de Contenidos: “…12.2 Related Works -- 12.3 Comparison Table -- 12.4 Graph of Comparison -- 12.5 Machine Learning in Software Engineering -- 12.6 Conclusion -- References -- Chapter 13 Machine Learning Applications in Battery Management System -- 13.1 Introduction -- 13.2 Battery Management System (BMS) -- 13.2.1 Key Parameters of Battery Management System -- 13.2.1.1 Voltage -- 13.2.1.2 Temperature -- 13.2.1.3 State of Charge -- 13.2.1.4 State of Health -- 13.2.1.5 State of Function -- 13.3 Estimation of Battery SOC and SOH -- 13.3.1 Methods of Estimating SOC -- 13.3.1.1 Coulomb Counting Method -- 13.3.1.2 Open Circuit Voltage (OCV) Method -- 13.3.1.3 Kalman Filtering Method -- 13.3.1.4 Artificial Neural Network (ANN) Method -- 13.3.1.5 Fuzzy # -- 13.3.1.6 Extended Kalman Filtering Method -- 13.3.1.7 Gray Box Modeling Method -- 13.3.1.8 Support Vector Machine (SVM) Method -- 13.3.1.9 Model Predictive Control Method -- 13.3.1.10 Adaptive Observer Method -- 13.3.1.11 Impedance-Based Method -- 13.3.1.12 Gray Prediction Method -- 13.3.2 Methods of Estimating SOH -- 13.3.2.1 Capacity Fade Model -- 13.3.2.2 Electrochemical Impedance Spectroscopy (EIS) Method -- 13.3.2.3 Voltage Relaxation Method -- 13.3.2.4 Fuzzy Logic Method -- 13.3.2.5 Particle Filter Method -- 13.3.2.6 Artificial Neural Network (ANN) Method -- 13.3.2.7 Support Vector Machine (SVM) Method -- 13.3.2.8 Gray Box Modeling Method -- 13.3.2.9 Kalman Filtering Method -- 13.3.2.10 Multi-Model Approach -- 13.4 Cell Balancing Mechanism for BMS -- 13.5 Industrial Applications -- 13.5.1 Industrial Applications of Machine Learning in Battery Management System -- 13.5.2 Machine Learning Algorithms That Are Used for Industrial Applications in Battery Management System -- 13.5.3 Steps Involved in Machine Learning Approach in BMS Applications -- 13.5.4 Applications of Different ML Algorithms in BMS…”
Publicado 2024
Libro electrónico -
43275Publicado 2014Tabla de Contenidos: “…1.10 OUTLINE OF THE REST OF THIS BOOK -- 1.11 METRIC UNITS -- 1.12 SUMMARY -- 2 PROCESSES AND THREADS -- 2.1 PROCESSES -- 2.1.1 The Process Model -- 2.1.2 Process Creation -- 2.1.3 Process Termination -- 2.1.4 Process Hierarchies -- 2.1.5 Process States -- 2.1.6 Implementation of Processes -- 2.1.7 Modeling Multiprogramming -- 2.2 THREADS -- 2.2.1 Thread Usage -- 2.2.2 The Classical Thread Model -- 2.2.3 POSIX Threads -- 2.2.4 Implementing Threads in User Space -- 2.2.5 Implementing Threads in the Kernel -- 2.2.6 Hybrid Implementations -- 2.2.7 Scheduler Activations -- 2.2.8 Pop-Up Threads -- 2.2.9 Making Single-Threaded Code Multithreaded -- 2.3 INTERPROCESS COMMUNICATION -- 2.3.1 Race Conditions -- 2.3.2 Critical Regions -- 2.3.3 Mutual Exclusion with Busy Waiting -- 2.3.4 Sleep and Wakeup -- 2.3.5 Semaphores -- 2.3.6 Mutexes -- 2.3.7 Monitors -- 2.3.8 Message Passing -- 2.3.9 Barriers -- 2.3.10 Avoiding Locks: Read-Copy-Update -- 2.4 SCHEDULING -- 2.4.1 Introduction to Scheduling -- 2.4.2 Scheduling in Batch Systems -- 2.4.3 Scheduling in Interactive Systems -- 2.4.4 Scheduling in Real-Time Systems -- 2.4.5 Policy Versus Mechanism -- 2.4.6 Thread Scheduling -- 2.5 CLASSICAL IPC PROBLEMS -- 2.5.1 The Dining Philosophers Problem -- 2.5.2 The Readers and Writers Problem -- 2.6 RESEARCH ON PROCESSES AND THREADS -- 2.7 SUMMARY -- 3 MEMORY MANAGEMENT -- 3.1 NO MEMORY ABSTRACTION -- 3.2 A MEMORY ABSTRACTION: ADDRESS SPACES -- 3.2.1 The Notion of an Address Space -- 3.2.2 Swapping -- 3.2.3 Managing Free Memory -- 3.3 VIRTUAL MEMORY -- 3.3.1 Paging -- 3.3.2 Page Tables -- 3.3.3 Speeding Up Paging -- 3.3.4 Page Tables for Large Memories -- 3.4 PAGE REPLACEMENT ALGORITHMS -- 3.4.1 The Optimal Page Replacement Algorithm -- 3.4.2 The Not Recently Used Page Replacement Algorithm -- 3.4.3 The First-In, First-Out (FIFO) Page Replacement Algorithm…”
Libro electrónico -
43276Publicado 2004Tabla de Contenidos: “…Hardware -- 2.1 Environmental -- 2.1.1 Power -- 2.1.2 Cooling -- 2.1.3 Geographic location -- 2.1.4 Physical security -- 2.1.5 Automation -- 2.1.6 Physical configuration control -- 2.2 Central Processing Complexes (CPCs) -- 2.2.1 How many CPCs to have -- 2.2.2 Availability features -- 2.2.3 Concurrent upgrade -- 2.2.4 Redundant capacity -- 2.2.5 Hardware configuration -- 2.3 Coupling Facilities -- 2.3.1 Coupling Facility Capacity -- 2.3.2 Failure isolation -- 2.3.3 Recovering from CF failure -- 2.3.4 How many CFs -- 2.3.5 Coupling Facility Control Code Level considerations -- 2.3.6 CF maintenance procedures -- 2.3.7 CF volatility -- 2.3.8 Nondisruptive Coupling Facilities hardware upgrades -- 2.4 9037 Sysplex Timers considerations -- 2.4.1 Sysplex Timer® Models -- 2.4.2 Recovering from loss of all timer signals -- 2.4.3 Maximizing 9037 availability -- 2.4.4 Message time ordering -- 2.5 Intelligent Resource Director -- 2.5.1 An IRD Illustration -- 2.5.2 WLM LPAR CPU Management -- 2.5.3 Dynamic Channel-path Management (DCM) -- 2.5.4 Channel Subsystem I/O Priority Queueing -- 2.6 Switches -- 2.6.1 ESCON Directors -- 2.6.2 FICON Switches -- 2.7 DASD -- 2.7.1 Peer to Peer Remote Copy (PPRC) -- 2.7.2 Extended Remote Copy (XRC) -- 2.8 Geographically Dispersed Parallel SysplexTM -- 2.8.1 Data consistency -- 2.8.2 The HyperSwap -- 2.9 Other hardware equipment…”
Libro electrónico -
43277por Ballard, ChuckTabla de Contenidos: “…Administration tools and utilities -- 9.1 Resource management -- 9.2 Performance tuning -- 9.3 Tools and wizards that are included with DB2 -- 9.3.1 Control Center -- 9.3.2 Command Editor -- 9.3.3 Task Center -- 9.3.4 SQL Assist -- 9.3.5 Visual Explain -- 9.3.6 Configuration Assistant -- 9.3.7 Journal -- 9.3.8 Health Center -- 9.3.9 Replication Center -- 9.3.10 License Center -- 9.3.11 Information Catalog Center -- 9.3.12 Data Warehouse Center -- 9.3.13 Web administration -- 9.3.14 Wizards, advisors, and launchpads -- 9.4 Optional tools -- 9.4.1 DB2 Performance Expert -- 9.4.2 DB2 Recovery Expert -- 9.4.3 DB2 High Performance Unload -- 9.4.4 DB2 Test Database Generator -- 9.4.5 DB2 Table Editor -- 9.4.6 DB2 Web Query Tool -- 9.4.7 Query Patroller -- 9.5 Utilities -- 9.5.1 Database reorganization…”
Publicado 2005
Libro electrónico -
43278por Rogers, PaulTabla de Contenidos: “…11.1 Problem reference points -- 11.2 CICS messages -- 11.3 CICS abend codes -- 11.4 Analyzing CICS SVC dumps -- 11.5 CICS/TS 2.2 VERBEXIT options -- 11.6 CICS internal trace -- 11.7 CICS trace control facility -- Chapter 12. z/OS Language Environment -- 12.1 Run-time environment -- 12.1.1 Common LE messages -- 12.2 LE and batch (IMS, WebSphere, and so forth) -- 12.3 LE and CICS -- 12.3.1 Additional procedure for an SVCdump for 40xx abends under CICS -- 12.4 LE and UNIX System Services shell -- 12.5 Find failing module instructions -- 12.5.1 Reason code information -- 12.6 IPCS and Language Environment -- 12.7 Finding the failing CSECT name in LE -- Chapter 13. …”
Publicado 2005
Libro electrónico -
43279Publicado 2009Tabla de Contenidos: “…Srinivasa Rao -- 6.1 Introduction 117 -- 6.2 Femtocell FCAPS Requirements 118 -- 6.2.1 Fault and Event Management 119 -- 6.2.2 Configuration Management 119 -- 6.2.3 Accounting and Administration Management 119 -- 6.2.4 Performance Management 120 -- 6.2.5 Security Management 120 -- 6.3 Broadband Forum Auto-Configuration Architecture and Framework 120 -- 6.4 Auto-Configuration Data Organisation 121 -- 6.4.1 Data Hierarchy 121 -- 6.4.2 Profiles 123 -- 6.5 CPE WAN Management Protocol Overview 123 -- 6.5.1 Protocol Stack and Operation 124 -- 6.6 FAP Service Data Model 126 -- 6.6.1 Control Object Group 126 -- 6.6.2 Configuration Object Group 126 -- 6.6.3 Monitoring Object Group 128 -- 6.6.4 Management Object Group 129 -- 6.7 DOCSIS OSS Architecture and Framework 129 -- 6.8 Conclusions 132 -- 7 Femtocell Security 133 / Rasa Siegberg -- 7.1 Why is Security Important? …”
Libro electrónico -
43280por Kammermann, MarkusTabla de Contenidos: “…Auflage -- Kapitel 2: Vorbereitung auf CompTIA A+ -- 2.1 Prüfen Sie Ihr Wissen -- 2.2 Fragen zu einem Computersystem -- 2.2.1 Die Front eines PC-Systems -- 2.2.2 Rückseitige Anschlüsse -- 2.2.3 Blick auf das Mainboard -- Teil I: Alles Blech oder was -- Kapitel 3: Vom Bit bis zum Personal Computer -- 3.1 Die Welt der Elektronik -- 3.1.1 Darstellung von Zahlen -- 3.1.2 Darstellung von Texten -- 3.1.3 Darstellung von Bildern -- 3.1.4 Darstellung von Tönen -- 3.2 Ganz klein und ganz groß -- 3.3 Der Personal Computer -- 3.4 Vom Laptop bis zum Smartphone -- 3.5 Smart sind die Geräte -- 3.5.1 Unterhaltung -- 3.5.2 Wearable Computer -- 3.6 Fragen zu diesem Kapitel -- Kapitel 4: Einblick in die Systemarchitektur -- 4.1 Die Systemzentrale: Der Prozessor -- 4.1.1 Single Core, Dual Core, noch mehr Core -- 4.1.2 Intel Core i und AMD Zen -- 4.1.3 Sockel für Prozessoren -- 4.1.4 Die technische Funktion der CPU -- 4.1.5 Der Cache -- 4.2 Mainboard-Komponenten -- 4.2.1 Das Chipset -- 4.2.2 Der DMA-Controller -- 4.2.3 Der Interrupt-Controller -- 4.2.4 Der Taktgeber -- 4.2.5 Mainboard-Formfaktoren -- 4.3 Der Arbeitsspeicher -- 4.3.1 Aufbau von RAM-Bausteinen -- 4.3.2 Aktuelle RAM-Typen hören auf den Namen DDR -- 4.3.3 Single Channel, Dual Channel, Quad Channel -- 4.3.4 Bauformen -- 4.3.5 Was folgt nach DDR5? …”
Publicado 2022
Libro electrónico