the comprehensive tex archive network

Connection to the MV public distribution network

Connection to the MV public distribution network

Ngày tải lên : 19/10/2013, 22:15
... influence the optimum choice: b The primary current of the transformer b The insulating medium of the transformer b The position of the substation with respect to the load centre b The kVA rating of the ... insulation to the metal, can raise the voltage of the envelope to a dangerous level (depending on the ratio of the resistance of the leakage path through the insulation, to the resistance from the metal ... the start of the loop to the substation immediately downstream of the fault and open the switch on the substation immediately upstream of the fault on the loop These measures isolate the cable segment...
  • 30
  • 466
  • 0
The Novell Guide to Network Volume 1 - Instructor Guide

The Novell Guide to Network Volume 1 - Instructor Guide

Ngày tải lên : 22/10/2013, 16:15
... network and the services members on the other d Use two connected hubs to separate the workgroups from each other Connect the accounting members to one hub and the services members to the other 1-2 ... Describe the role and function of the OSI Network Layer in the OSI Model, including connectivity devices that operate at the Network Layer (Section 4) Describe the role and function of the OSI ... IG 4-5 Identify the Basic Purpose of the OSI Network Layer IG 4-11 Network Layer Processes and Methods IG 4-13 Identify the Uses of the Addresses Defined at the Network Layer ...
  • 812
  • 457
  • 0
Connection to the LV utility distribution network

Connection to the LV utility distribution network

Ngày tải lên : 23/10/2013, 20:15
... connected to the distribution network b The location along the distribution network of the proposed new load, i.e close to the substation, or near the remote end of the distribution network, etc ... closes the circuit of the water heater, the consumption of which is then indicated on the register to which the cheaper rate applies The heater can be switched on and off at any time during the ... satisfactorily supplied from the low-voltage system in their locality The voltage of the local LV network may be 120/208 V or 240/415 V, i.e the lower or upper extremes of the most common 3-phase...
  • 18
  • 332
  • 0
Advances in Relationship Marketing Thought and Practice: The Influence of Social Network Theory

Advances in Relationship Marketing Thought and Practice: The Influence of Social Network Theory

Ngày tải lên : 24/10/2013, 20:15
... customer/professional communities/knowledge networks) The fundamental premise of this talk… Because marketing is relational, social network theory (SNT) helps to advance marketing theory and practice Discussion ... does the marketing perspective compare to the sociological perspective? What are the three key perspectives of SNT that have influence marketing theory and practice? How have researchers used these ... advance marketing theory and practice? A Look at the Future • • How current trends reflect the importance of SNT to marketing thought and practice? How could social network theory enhance my...
  • 31
  • 482
  • 0
The Novell Guide to Network Volume 2 - Instructor Guide

The Novell Guide to Network Volume 2 - Instructor Guide

Ngày tải lên : 26/10/2013, 23:15
... the Network Implementing the Network IG 9-3 Objectives IG 9-3 Exercise 9-1: Pre-Test IG 9-5 Plan the Network and Install the Network Cabling IG 9-7 Plan the Network ... 7-9 The Novell Guide to Network + (Volume 2) 0 In the previous figure, an IP network has been assigned the network address of 132.132 Its network address uniquely identifies it from all other networks ... on the internetwork Each host or node on this network must have an IP address of the form 132.132.x.x, where the last two bytes of the address must be unique on the network A node assigned the...
  • 676
  • 439
  • 1
Tài liệu A.5. The Clean Install ("Archive and Install") pdf

Tài liệu A.5. The Clean Install ("Archive and Install") pdf

Ngày tải lên : 14/12/2013, 12:15
... you'll have to erase all the information on the disk first.) If you leave your Mac on all the time (if you run it as a Web server, for example), it's a good idea to use the journaled hard drive ... of just pulling out the plug) Shut If you didn't shut down properly, Mac OS X examines your hard drive the next time you start up to see if it needs repair It has to scan the whole drive–which ... tell what was happening when your computer shut down–and therefore spend a lot less time checking your hard drive There are some downsides to the journaled format, however First, this procedure doesn't...
  • 2
  • 421
  • 0
Tài liệu Security+: The Foundation for Solid Network and Information Security pdf

Tài liệu Security+: The Foundation for Solid Network and Information Security pdf

Ngày tải lên : 21/12/2013, 06:18
... computer users have to learn the safe practices for their computers, their business networks, and the Internet The security basics of “what to do” and “what not to do” become the front-line defense ... sales, and efficiency These intangibles have been the driving force to make the technology revolution the most important revolution during the existence of man Along with the social and economic ... about the CompTIA Security+ • The focus of the certification • Key benefits for becoming CompTIA Security+ certified: Over the course of several centuries, the Industrial Revolution saw the development...
  • 5
  • 630
  • 0
Tài liệu The Novell Guide to Network Volume 2 - Instructor Guide doc

Tài liệu The Novell Guide to Network Volume 2 - Instructor Guide doc

Ngày tải lên : 21/12/2013, 06:19
... the Network Implementing the Network IG 9-3 Objectives IG 9-3 Exercise 9-1: Pre-Test IG 9-5 Plan the Network and Install the Network Cabling IG 9-7 Plan the Network ... 7-9 The Novell Guide to Network + (Volume 2) 0 In the previous figure, an IP network has been assigned the network address of 132.132 Its network address uniquely identifies it from all other networks ... on the internetwork Each host or node on this network must have an IP address of the form 132.132.x.x, where the last two bytes of the address must be unique on the network A node assigned the...
  • 676
  • 481
  • 0
Tài liệu The Secrets of Successful Networking ppt

Tài liệu The Secrets of Successful Networking ppt

Ngày tải lên : 25/01/2014, 00:20
... discovered that I not only like it better, I make more money at it And the self-imposed discipline of making contacts trained me to be my own boss ...
  • 2
  • 358
  • 0
Tài liệu The Synchronisation of Telecommunications Network doc

Tài liệu The Synchronisation of Telecommunications Network doc

Ngày tải lên : 12/02/2014, 11:20
... Oscilloquartz SA Physical synchronisation network : » Not every system in the network can have a direct connection to the master network clock » Therefore the telecommunication systems are synchronised ... greater than 18µs » The size of the buffer in telecommunications systems is usually just slightly larger than 18µs » If the input wander is greater than the size of the buffer, then the buffer over- ... Co-operating Network VII Summary on Standards VIII How to Synchronize Mixed Technology Networks Mixed Technology Network Example SDH and SONET Networks The Public Switched Telephony Network Issue...
  • 185
  • 480
  • 0
Tài liệu ITU Study on the Financial Aspects of Network Security: Malware and Spam doc

Tài liệu ITU Study on the Financial Aspects of Network Security: Malware and Spam doc

Ngày tải lên : 14/02/2014, 08:20
... were hitherto relatively separable problems they are presently converging with the emergence of botnets These networks of remotecontrolled malware-infected computers are the origin of the majority ... can be further enhanced if the botnet hijacks the default web page of compromised end-user machines so that the “clicks” are executed each time the victim loads the browser Extortion, another form ... September 2007 identified the most urgent threats in the cyber world (Figure above) The various threats were studied according to the effect they had and if the system was the primary target of an...
  • 42
  • 471
  • 0
Tài liệu The Early Detection Research Network: Investing in Translational Research on Biomarkers of Early Cancer and Cancer Risk docx

Tài liệu The Early Detection Research Network: Investing in Translational Research on Biomarkers of Early Cancer and Cancer Risk docx

Ngày tải lên : 14/02/2014, 21:20
... from the WHI and the United Kingdom’s Ovarian Cancer Screening Trial will be obtained by these groups to test the effectiveness of their markers and algorithms Within the next 12-18 months, these ... under cooperative agreements, not contracts, to specifically further the goals of the network, not just their personal goals, the arrangement becomes even more unlikely.” Jeff Marks, Ph.D ... To manage the flow of information across the network, the Data Management and Coordinating Center (DMCC) and an Informatics Center, managed by the Jet Propulsion Laboratory (JPL) at the National...
  • 124
  • 422
  • 1
Tài liệu Báo cáo khoa học: Topology, tinkering and evolution of the human transcription factor network doc

Tài liệu Báo cáo khoa học: Topology, tinkering and evolution of the human transcription factor network doc

Ngày tải lên : 19/02/2014, 07:20
... TF networks, several relevant questions arise How are these factors distributed and related through the network structure? How important has the protein domain universe been in shaping the network? ... functionality and phylogeny However, the nature of the connections between these factors needs to be understood at the level of the protein domain The global properties of the HTFN topology are partially ... complex networks These networks are defined as sets of N nodes (the proteins, indicated as Pi, i ¼ 1, ., N) and l links among them Two nodes will be linked only if they interact physically The most...
  • 12
  • 511
  • 0
SANS Institute InfoSec Reading Room: Applying the OSI Seven Layer Network Model To Information Security pptx

SANS Institute InfoSec Reading Room: Applying the OSI Seven Layer Network Model To Information Security pptx

Ngày tải lên : 05/03/2014, 21:20
... with the inclusion of users and the policy they operate under, we have in many senses covered the entire spectrum of data assurance In both the standard network context and in the extended context ... added by their corresponding layer at the sending end of the conversation as the data rises back up through the seven layers at the receiving side, acting on the transmitted content at their layer ... in theory and found in the wild © Take for example the bottom-most physical layer of the network Reviewing the flow of information through the model, we see that all layers above depend upon the...
  • 31
  • 510
  • 0
Báo cáo khoa học: "AN ISLAND PARSING INTERPRETER FOR THE FULL AUGMENTED TRANSITION NETWORK FORMALISM" potx

Báo cáo khoa học: "AN ISLAND PARSING INTERPRETER FOR THE FULL AUGMENTED TRANSITION NETWORK FORMALISM" potx

Ngày tải lên : 09/03/2014, 01:20
... register contexts (hold-regs), each level in the stack holding the register contents of one level in the network, with the base of the stack representing the highest level of saved actions The action ... operations shown on the right of the figure The second pass finds, for each sub -network, the names of all the registers whose values depend on other registers (for use in the subsequent scoping ... of all the registers in the sub -network which depend on the value of that register Pass Pass three deals with scoping SENDR actions, giving them the treatment described at the end of the last...
  • 5
  • 276
  • 0
A Study of the Relative Costs of Network Security Protocols potx

A Study of the Relative Costs of Network Security Protocols potx

Ngày tải lên : 14/03/2014, 22:20
... in the VPN configuration (host-gatewaygateway-host) In the last two scenarios, the difference This is the size of the buffer that the ttcp benchmark is using for reading and writing to the network ... constantly using the network We tested the impact of a number of protocols to the performance of other jobs (in this case, the sieve) running on the system In Figure 14, we present the execution ... are themselves CPU intensive because of the crypto operations, the sieve finished faster When the sieve is run with IPsec traffic, the crypto operations are performed by the kernel and therefore the...
  • 8
  • 438
  • 0
The Role of Postal Networks in  Expanding Access to Financial Services  docx

The Role of Postal Networks in  Expanding Access to Financial Services  docx

Ngày tải lên : 15/03/2014, 10:20
... 1—Introduction The postal networks in the Asian region comprise 289,067 post offices, about 44 percent of the worldwide postal network They are much larger compared to other networks in the region, ... utilizes the postal network through an agreement with the post office All of these entities are state-owned, but only about half of them are regulated by the respective Central Bank In the other ... Introduction The postal networks in the African region comprise 11,365 post offices, or less than percent of the worldwide postal network The postal networks in Africa are uniquely large compared to other...
  • 133
  • 421
  • 0
The Impact of Social Networking to Influence Marketing through Product Reviews pot

The Impact of Social Networking to Influence Marketing through Product Reviews pot

Ngày tải lên : 15/03/2014, 22:20
... about the Social networking websites, the first website that comes in our mind is the Facebook This doesn’t mean that there is no other social networking website in the world There are several other ... feedback of the product to their customer Once the tag has been done then this tag will then be visible to the Friend List of the customer in the News Feed The benefit of the tag based marketing ... notice the social Ads displayed on social networking site? The purpose of this question is to ask user whether they notice the different social advertisement of the companies when they login to the...
  • 11
  • 831
  • 0
The Global Occupational Health Network ISSUE No. 11 - 2006 ppt

The Global Occupational Health Network ISSUE No. 11 - 2006 ppt

Ngày tải lên : 22/03/2014, 17:20
... the end of their employment If a cancer is caused by the occupation, the patient may be entitled to The Global Occupational Health Network  receive compensation from the social security or the ... www.who.int/occupational_health/Declarwh.pdf The plan of the Network for 2006 - 2010 can be accessed on the web at www.who.int/occupational_health /network/ 2006compendium/en/index.html The Global Occupational Health Network The Benefits ... representatives from some of the participating centres The objective was to learn more about the benefits of the designation as a collaborator and the participation in the Network The results are summarized...
  • 16
  • 270
  • 0

Xem thêm