Search Results - Generation of '98
Suggested Topics within your search.
Suggested Topics within your search.
- diagnosis 3
- methods 2
- Aeration 1
- Bias 1
- Biomedical Research 1
- Buildings 1
- Child 1
- Children's librarians 1
- Children's libraries 1
- Computer Literacy 1
- Computer networks 1
- Cytodiagnosis 1
- Cytological Techniques 1
- Data transmission systems 1
- Disease 1
- Electroencephalography 1
- Energy conservation 1
- Epilepsy 1
- Exercise 1
- General Surgery 1
- Lung Neoplasms 1
- Mediastinal Neoplasms 1
- Mental Disorders 1
- Meta-Analysis as Topic 1
- Mythology, Classical 1
- Perioperative Care 1
- Physical Fitness 1
- Publication Bias 1
- Purification 1
- Sewage 1
-
1
-
2
-
3
-
4
-
5
-
6
Interactive structures visualizing structural behavior
Published 2008Click Here to View Status and Holdings.
Unknown -
7
Classical mythology
Published 2003Table of Contents: “…|a Machine generated contents note: PART ONE. THE MYTHS OF CREATION: THE GODS 1 Interpretation and Definition of Classical Mythology 3 Appendix to Chapter I: Sources for Classical Mythology 26 2 Historical Background of Greek Mythology 39 3 Myths of Creation 5I Additional Reading: Hesiod and the Muses (Theogony, I-II5) 7I 4 Zeus' Rise to Power: The Creation of Mortals 76 Additional Reading: Parallels in Myths of Greece and the Ancient Near East 98 5 The Twelve Olympians: Zeus, Hera, and Their Children 108 6 The Nature of the Gods 128 7 Poseidon, Sea Deities, Group Divinities, and Monsters 147 8 Athena I57 9 Aphrodite and Eros 171 10 Artemis 200 Additional Reading: Selections from Euripides' Hippolytus 212 11 Apollo 226 Additional Reading: The Homeric Hymn to Pythian Apollo 246 12 Hermes 257 13 Dionysus, Pan, Echo, and Narcissus 274 14 Demeter and the Eleusinian Mysteries 307 15 Views of the Afterlife: The Realm of Hades 328 16 Orpheus and Orphism: Mystery Religions in Roman Times 354 PART TWO. …”
Click Here to View Status and Holdings.
Book Chapter -
8
-
9
-
10
Aeration control system design a practical guide to energy and process optimization
Published 2014Table of Contents: “…Machine generated contents note: Foreword Acknowledgements List of Figures Chapter 1: Introduction 1.1 Basic Concepts and Objectives 1.2 Safety 1.3 The Importance of an Integrated Approach 1.4 Importance of Operator Involvement 1.5 The Benefits of Successful Aeration Process Automation Chapter 2: Initial System Assessment 2.1 Define Current Operations 2.2 Evaluate Process and Equipment 2.3 Benchmark Performance 2.4 Estimate Potential Energy Savings and Performance Improvement 2.5 Prepare Report Chapter 3: Aeration Processes 3.1 Process Fundamentals 3.2 Loading Variations and Their Implications 3.3 Process Limitations and Their Impact on Control Systems Chapter 4: Mechanical and Diffused Aeration Systems 4.1 Oxygen Transfer Basics 4.2 Types of Aerators 4.3 Savings Determinations Chapter 5: Blowers and Blower Control 5.1 Common Application and Selection Concern s 5.2 Positive Displacement Blowers and Control Characteristics 5.3 Dynamic Blowers Chapter 6: Piping Systems 6.1 Design Considerations 6.2 Pressure Drop 6.3 Control Valve Selection Chapter 7: Instrumentation 7.1 Common Characteristics and Electrical Design Considerations 7.2 Pressure 7.3 Temperature 7.4 Flow 7.5 Analytic Instruments 7.6 Motor Monitoring and Electrical Measurement s 7.7 Miscellaneous Chapter 8: Final Control Elements 8.1 Valve Operators 8.2 Guide Vanes 8.3 Motor Basics 8.4 Motor Control 8.5 Variable Frequency Drives Chapter 9: Control Loops and Algorithms 9.1 Control Fundamentals 9.2 Dissolved Oxygen Control 9.3 Aeration Basin Air Flow Contro l 9.4 Pressure Control 9.5 Most-Open-Valve Control 9.6 Blower Control and Coordination 9.7 Control Loop Timing Considerations 9.8 Miscellaneous Controls Chapter 10: Control Components 10.1 Programmable Logic Controllers 10.2 Distributed Control Systems 10.3 Human Machine Interfaces 10.4 Control Panel Design Considerations Chapter 11: Documentation 11.1 Specification Considerations 11.2 Data Lists 11.3 Process and Instrumentation Diagrams 11.4 Ladder and Loop Diagrams 11.5 One-Line Diagrams 11.6 Installation Drawings 11.7 Loop Descriptions 11.8 Operation and Maintenance Manuals Chapter 12: Commissioning 12.1 Inspection 12.2 Testing 12.3 Tuning 12.4 Training 12.5 Measurement and Verification of Results Chapter 13: Summary 13.1 Review of Integrated Design Procedure 13.2 Potential Problem Areas 13.3 Benefit s Appendix A: Example Problem Solutions Appendix B: List of Equations and Variables Bibliography .…”
Click Here to View Status and Holdings.
Unknown -
11
-
12
DATA AND COMPUTER COMMUNICATIONS
Published 2014Table of Contents: “…Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERVIEW Chapter 1 Data Communications, Data Networks, and the Internet 1.1 Data Communications and Networking for Today's Enterprise 1.2 A Communications Model 1.3 Data Communications 1.4 Networks 1.5 The Internet 1.6 An Example Configuration Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications 2.1 The Need for a Protocol Architecture 2.2 A Simple Protocol Architecture 2.3 The TCP/IP Protocol Architecture 2.4 Standardization within a Protocol Architecture 2.5 Traditional Internet-Based Applications 2.6 Multimedia 2.7 Sockets Programming 2.7 Recommended Reading 2.8 Key Terms, Review Questions, and Problems Appendix 2A The Trivial File Transfer Protocol PART TWO DATA COMMUNICATIONS Chapter 3 Data Transmission 3.1 Concepts and Terminology 3.2 Analog and Digital Data Transmission 3.3 Transmission Impairments 3.4 Channel Capacity 3.5 Recommended Reading 3.6 Key Terms, Review Questions, and Problems Appendix 3A Decibels and Signal Strength Chapter 4 Transmission Media 4.1 Guided Transmission Media 4.2 Wireless Transmission 4.3 Wireless Propagation 4.4 Line-of-Sight Transmission 4.5 Recommended Reading 4.6 Key Terms, Review Questions, and Problems Chapter 5 Signal Encoding Techniques 5.1 Digital Data, Digital Signals 5.2 Digital Data, Analog Signals 5.3 Analog Data, Digital Signals 5.4 Recommended Reading 5.5 Key Terms, Review Questions, and Problems Chapter 6 Error Detection and Correction 6.1 Types of Errors 6.2 Error Detection 6.3 Parity Check 6.4 The Internet Checksum 6.5 Cyclic Redundancy Check (CRC) 6.6 Forward Error Correction 6.7 Recommended Reading 6.8 Key Terms, Review Questions, and Problems Chapter 7 Data Link Control Protocols 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems Appendix 7A Performance Issues Chapter 8 Multiplexing 8.1 Frequency-Division Multiplexing 8.2 Synchronous Time-Division Multiplexing 8.3 Cable Modems 8.4 Asymmetric Digital Subscriber Line 8.5 xDSL 8.6 Multiple Channel Access 8.7 Recommended Reading 8.8 Key Terms, Review Questions, and Problems PART THREE WIDE AREA NETWORKS Chapter 9 WAN Technology and Protocols 9.1 Switched Communications Networks 9.2 Circuit Switching Networks 9.3 Circuit Switching Concepts 9.4 Softswitch Architecture 9.5 Packet-Switching Principles 9.6 Asynchronous Transfer Mode 9.7 Recommended Reading 9.8 Key Terms, Review Questions, and Problems Chapter 10 Cellular Wireless Networks 10.1 Principles of Cellular Networks 10.2 Cellular Network Generations 10.3 LTE-Advanced 10.4 Recommended Reading 10.5 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 11 Local Area Network Overview 11.1 Bus and Tree Topologies 11.2 LAN Protocol Architecture 11.3 Bridges 11.4 Hubs and Switches 11.5 Virtual LANs 11.6 Recommended Reading 11.7 Key Terms, Review Questions, and Problems Chapter 12 Ethernet 12.1 Traditional Ethernet 12.2 High-Speed Ethernet 12.3 IEEE 802.1Q VLAN Standard 12.4 Recommended Reading 12.5 Key Terms, Review Questions, and Problems Appendix 12A Digital Signal Encoding for LANs Appendix 12B Scrambling Chapter 13 Wireless LANs 13.1 Overview 13.2 IEEE 802.11 Architecture and Services 13.3 IEEE 802.11 Medium Access Control 13.4 IEEE 802.11Physical Layer 13.5 Gigabit Wi-Fi 13.6 IEEE 802.11 Security Considerations 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems PART FIVE INTERNET AND TRANSPORT LAYERS Chapter 14 The Internet Protocol 14.1 Principles of Internetworking 14.2 Internet Protocol Operation 14.3 Internet Protocol 14.4 IPv6 14.5 Virtual Private Networks and IP Security 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 Transport Protocols 15.1 Connection-Oriented Transport Protocol Mechanisms 15.2 TCP 15.3 UDP 15.4 Recommended Reading 15.5 Key Terms, Review Questions, and Problems UNIT TWO ADVANCED TOPICS IN DATA COMMUNICATIONS AND NETWORKING PART SIX DATA COMMUNICATIONS AND WIRELESS NETWORKSChapter 16 Advanced Data Communications Topics 16.1 Analog Data, Analog Signals 16.2 Forward Error Correction Codes 16.3 ARQ Performance Issues 16.4 Recommended Reading 16.5 Key Terms, Review Questions, and Problems Chapter 17 Wireless Transmission Techniques 17.1 MIMO Antennas 17.2 OFDM, OFDMA, and SC-FDMA 17.3 Spread Spectrum 17.4 Direct Sequence Spread Spectrum 17.5 Code-Division Multiple Access 17.6 Recommended Reading 17.7 Key Terms, Review Questions, and Problems Chapter 18 Wireless Networks 18.1 Fixed Broadband Wireless Access 18.2 WiMAX/IEEE 802.16 18.3 Bluetooth Overview 18.4 Bluetooth Radio Specification 18.5 Bluetooth Baseband Specification 18.6 Bluetooth Logical Link Control and Adaptation Protocol 18.7 Recommended Reading 18.8 Key Terms, Review Questions, and Problems PART SEVEN INTERNETWORKING Chapter 19 Routing 19.1 Routing in Packet-Switching Networks 19.2 Examples: Routing in ARPANET 19.3 Internet Routing Protocols 19.4 Least-Cost Algorithms 19.5 Recommended Reading 19.6 Key Terms, Review Questions, and Problems Chapter 20 Congestion Control 20.1 Effects of Congestion 20.2 Congestion Control 20.3 Traffic Management 20.4 Congestion Control in Packet-Switching Networks 20.5 TCP Congestion Control 20.6 Datagram Congestion Control Protocol 20.7 Recommended Reading 20.8 Key Terms, Review Questions, and Problems Chapter 21 Internetwork Operation 21.1 Multicasting 21.2 Software Defined Networks 21.3 OpenFlow 21.4 Mobile IP 21.5 Recommended Reading 21.6 Key Terms, Review Questions, and Problems Chapter 22 Internetwork Quality of Service 22.1 QoS Architectural Framework 22.2 Integrated Services Architecture 22.3 Resource Reservation Protocol 22.4 Differentiated Services 22.5 Service Level Agreements 22.6 IP Performance Metrics 22.7 Recommended Reading 22.8 Key Terms, Review Questions, and Problems Chapter 23 Multiprotocol Label Switching 23.1 The Role of MPLS 23.2 Background 23.3 MPLS Operation 23.4 Labels 23.5 FECs, LSPs, and Labels 23.6 Label Distribution 23.7 Traffic Engineering 23.8 Virtual Private Networks 23.9 Recommended Reading 23.10 Key Terms, Review Questions, and Problems PART EIGHT INTERNET APPLICATIONS Chapter 24 Electronic Mail, DNS, and HTTP 24.1 Electronic Mail: SMTP and MIME 24.2 Internet Directory Service: DNS 24.3 Web Access: HTTP 24.4 Recommended Reading 24.5 Key Terms, Review Questions, and Problems Chapter 25 Internet Multimedia Support 25.1 Real-Time Traffic 25.2 Voice Over IP 25.3 Session Initiation Protocol 25.4 Real-Time Transport Protocol 25.5 Recommended Reading 25.6 Key Terms, Review Questions, and Problems APPENDICES Appendix A Fourier Analysis A.1 Fourier Series Representation of Periodic Signals A.2 Fourier Transform Representation of Aperiodic Signals A.3 Recommended Reading Appendix B Projects and Other Student Exercises for Teaching Data and Computer Communications B.1 Animations and Animation Projects B.2 Practical Exercises B.3 Sockets Projects B.4 Wireshark Projects B.5 Simulation and Modeling Projects B.6 Performance Modeling B.7 Research Projects B.8 Reading/Report Assignments B.9 Writing Assignments B.10 Discussion TopicsReferences Index ONLINE CHAPTERS AND APPENDICES[1] PART NINE NETWORK SECURITY Chapter 26 Computer and Network Security Threats 26.1 Computer Security Concepts 26.2 Threats, Attacks, and Assets 26.3 Intruders 26.4 Malicious Software Overview 26.5 Viruses, Worms, and Bots 26.6 Recommended Reading 26.7 Key Terms, Review Questions, and Problems Chapter 27 Computer and Network Security Techniques 27.1 Virtual Private Networks and IPsec 27.2 SSL and TLS 27.3 Wi-Fi Protected Access 27.4 Intrusion Detection 27.5 Firewalls 27.6 Malware Defense 27.7 Recommended Reading 27.8 Key Terms, Review Questions, and Problems Appendix C Standards Organizations Appendix D Asynchronous and Synchronous TransmissionAppendix E The OSI Model Appendix F The International Reference Alphabet Appendix G Proof of the Sampling Theorem Appendix H Ones Complement Representation and AdditionAppendix I Statistical TDM Appendix J The Spanning Tree AlgorithmAppendix K LAN Performance IssuesAppendix L Matrix Multiplication and Determinants Appendix M Queuing Effects Appendix N Orthogonality, Correlation, and…”
Click Here to View Status and Holdings.
Manuscript Book