
Data to controls
-
Ebook Computer networks: A systems approach (5th edition) – Part 2 presents the following content: Chapter 6 congestion control and resource allocation, chapter 7 end-to-end data, chapter 8 network security, chapter 9 applications. Please refer to the documentation for more details.
410p
runthenight03
07-12-2022
8
2
Download
-
Ebook Costing and quantitative techniques: Part 2 presents the following content: Chapter 10 cost data for short-run tactical decision making, chapter 11 cost control, chapter 12 cost ledger accounts, chapter 13 theory of index numbers, chapter 14 basic probability concepts, chapter 15 set theory, chapter 16 introduction to matrices, chapter 17 basic concepts of differentiation, chapter 18 basic linear programming, chapter 19 network analysis, chapter 20 replacement analysis, chapter 21 transportation model, chapter 22 computer assisted costing techniques.
390p
runthenight03
07-12-2022
8
2
Download
-
Ebook Data and computer communications (5th ed): Part 1 presents the following content: Chapter 1 – Introduction, Chapter 2 - Data transmission, Chapter 3 - Transmission media, Chapter 4 - Data encoding, Chapter 5 - The data communications interface, Chapter 6 - Data Link Control Protocols, Chapter 7 - Multiplexing, Chapter 8 - Circuit Switching, Chapter 9 - Packet Switching, Chapter 10 - Frame relay, Chapter 11 - Asynchronous Transfer Mode. Please refer to the documentation for more details.
372p
runthenight03
07-12-2022
8
2
Download
-
Ebook IT Auditing: Using controls to protect information systems (Second edition) - Part 1 include of the following content: Chapter 1 Building an Effective Internal IT Audit Function; Chapter 2 The Audit Process; Chapter 3 Auditing Entity-Level Controls; Chapter 4 Auditing Data Centers and Disaster Recovery; Chapter 5 Auditing Routers, Switches, and Firewalls; Chapter 6 Auditing Windows Operating Systems; Chapter 7 Auditing Unix and Linux Operating Systems; Chapter 8 Auditing Web Servers and Web Applications.
269p
runthenight03
07-12-2022
13
2
Download
-
This paper presents for using precise ephemeris to improve point positioning accuracy when processing GNSS data. The experimental GNSS network locates in Dak Nong province. It consists of 13 points, of which 3 points are control points for coordinates and height.
12p
viwmotors
13-12-2022
3
1
Download
-
Lecture Statistical package for social sciences (SPSS) - Chapter 2: Data cleaning. This lecture will cover the following: reasons; measures to prevent; methods of data cleaning; design a questionnaire clear;... Please refer to content of lecture!
4p
chutieubang
06-12-2022
4
1
Download
-
The reduction of stigma and discrimination in a population are important indicators of the success of programs that target HIV prevention and control. This study aimed to assess the level of HIV-related stigma and its determinants among sexually active Ethiopians.
11p
viferrari
28-11-2022
8
1
Download
-
This study aimed to identify the epidemiology, seasonality, aetiology and clinical characteristics of sporadic foodborne diseases in Zhejiang province during 2016–2020. Descriptive statistical methods were used to analyze the data from surveillance network established by the Zhejiang Provincial Center for Disease Control and Prevention.
9p
viferrari
29-10-2022
3
1
Download
-
In June 2019, surveillance data from the Uganda’s District Health Information System revealed an outbreak of malaria in Kole District. Analysis revealed that cases had exceeded the outbreak threshold from January 2019. The Ministry of Health deployed our team to investigate the areas and people affected, identify risk factors for disease transmission, and recommend control and prevention measures.
9p
viferrari
29-10-2022
4
1
Download
-
The first three years of life are the critical and sensitive periods for the formation of individual abilities. However, existing data indicates that early childhood development (ECD) in economically vulnerable areas of China is lagging, which is closely related to the lack of parenting knowledge and poor parenting practices.
17p
viferrari
29-10-2022
2
1
Download
-
Vector-borne diseases are among the most burdensome infectious diseases worldwide with high burden to health systems in developing regions in the tropics. For many of these diseases, vector control to reduce human biting rates or arthropod populations remains the primary strategy for prevention.
13p
viferrari
29-10-2022
2
1
Download
-
Web technologies and e-services: Lecture 3.1 provide students with knowledge about: client-side programming with JavaScript; JavaScript vs. JScript vs. VBScript; common tasks for client-side scripts; data types and expressions; control statements; functions and libraries;... Please refer to the content of document.
16p
tieuduongchi
24-10-2022
13
1
Download
-
Part 1 of ebook "Process dynamics and control (4th edition)" provide readers with content about: introduction to process control; theoretical models of chemical processes; dynamic behavior of processes; laplace transforms; transfer function models; dynamic behavior of first-order and second-order processes; dynamic response characteristics of more complicated processes; development of empirical models from process data;... Please refer to the ebook for details!
255p
duonghanthienbang
05-10-2022
4
0
Download
-
Continued part 1, part 2 of ebook "Programmable logic controllers (Fifth edition)" provide readers with content about: program control instructions; data manipulation instructions; math instructions; sequencer and shift register instructions; PLC installation practices, editing, and troubleshooting; process control, network systems, and SCADA; controllogix controllers;... Please refer to the ebook for details!
231p
duonghanthienbang
05-10-2022
3
0
Download
-
Lecture Data communications and computer networks: A business user's approach (8E) - Chapter 7. After reading this chapter, you should be able to: state the definition of a local area network List the primary function, activities, and application areas of a local area network; cite the advantages and disadvantages of local area networks; identify the physical and logical layouts (topologies) of local area networks;... Please refer to the content of document.
64p
tieuvulinhhoa
22-09-2022
7
1
Download
-
Lecture Data communications and computer networks: A business user's approach (8E) - Chapter 10. After reading this chapter, you should be able to: discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between networks; identify both IPv4 and IPv6 addresses; discuss the responsibilities of the Transmission Control Protocol (TCP) and how it can be used to create a reliable, end-to-end network connection;... Please refer to the content of document.
74p
tieuvulinhhoa
22-09-2022
7
1
Download
-
Lecture Data communications and computer networks: A business user's approach (8E) - Chapter 12. After reading this chapter, you should be able to: recognize the basic forms of system attacks; recognize the concepts underlying physical protection measures; cite the techniques used to control access to computers and networks; discuss the strengths and weaknesses of passwords;... Please refer to the content of document.
71p
tieuvulinhhoa
22-09-2022
8
1
Download
-
This paper presents the first two stages of the MS-FLC: (1) evaluation of traffic condition upon incident occurrences, and (2) anticipation of traffic condition during incidents. The results show that the MS-FLC provides a systematic procedure in deriving control actions using fuzzy-based methodology, which possesses excellent capabilities in data-handling and knowledge representation to deliver linguistic expressions that is easy to understand by the operators for making decisions.
16p
viaudi
29-08-2022
6
1
Download
-
(BQ) Ebook The Intel microprocessors: Part 1 presents the following content: Chapter 1 introduction to the microprocessor and computer, chapter 2 the microprocessor and its architecture, chapter 3 addressing modes, chapter 4 data movement instructions, chapter 5 arithmetic and logic instructions, chapter 6 program control instructions, chapter 7 using assembly language with C/C++.
395p
runordie6
10-08-2022
6
1
Download
-
This study was designed to investigate the clinical application, efficacy, and safety of immune checkpoint inhibitors (ICIs) in the treatment of lung cancer in the real world.
10p
vikolindagrabar
27-07-2022
4
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
