wellsamed one drop only

- znaleziono 31 produktów w 9 sklepach

Drop - 2857636401

40,50 zł

Drop Orion Books

Kryminał. Literatura detektywistycznaPowieść zagraniczna

Is it the end of the line for Harry Bosch?Harry Bosch is facing the end of the line. He's been put on the DROP - Deferred Retirement Option Plan - and given three years before his retirement is enforced. Seeing the end of the mission coming, he's anxious for cases. He doesn't have to wait long. First a cold case gets a DNA hit for a rape and murder which points the finger at a 29-year-old convicted rapist who was only eight at the time of the murder. Then a city councilman's son is found dead - fallen or pushed from a hotel window - and he insists on Bosch taking the case despite the two men's history of enmity. The cases seem to be unrelated; one leads to the discovery of a killer operating in the city for as many as three decades, the other to a deep political conspiracy that reached back into the dark history of the police department...

Sklep: Booknet.net.pl

Drop Shipping For Sellers - 2867126845

92,46 zł

Drop Shipping For Sellers Lulu.com

Książki / Literatura obcojęzyczna

Drop Shipping For Sellers is a Complete How-to Drop Ship Guide. This book is a Complete Guide to help you start your very own successful online business, or help you expand an existing one, while taking advantage of the many benefits that only Drop Shipping can offer. While eBay and PayPal are the main focus points of our discussions, many of the techniques and procedures you will discover, can easily be applied to virtually any type of online business, whether you decide to offer your products in auction format such as eBay offers, or directly from your own eCommerce website. No Other Product is as comprehensive. And No Other Product offers as much practical information on how to get started, and how to succeed in your own eBay/Online/Dropship Business as this Book does.

Sklep: Libristo.pl

Spalona Żywcem Wyd. Kieszonkowe - Souad - 2854922647

11,15 zł

Spalona Żywcem Wyd. Kieszonkowe - Souad

Książki & Multimedia > Książki

Opis - Pierwsze na świecie świadectwo ofiary zbrodni honorowej. Miała siedemnaście lat i zakochała się: zhańbiła rodzinę. Więc rodzina wydała na nią wyrok śmierci... Pokochała go pierwszą miłością. Myślała, że się z nią ożeni. Ale ukochany zniknął, a ona odkryła, że jest w ciąży. A w jej świecie to najcięższa zbrodnia... W zapomnianej przez Boga wiosce w Cisjordanii kobiety są warte mniej niż zwierzęta domowe. Tu mężczyzna jest panem życia i śmierci żony, córki, siostry. Brat może bezkarnie zabić siostrę, matka - córkę, kolejną bezużyteczną dziewczynkę, jaka się urodzi. Tu kobiecie odbiera się godność, a nawet życie zgodnie z odwiecznym obyczajem i uświęconą tradycją. A śmierć jest karą dla dziewczyny, która zhańbi rodzinę. Tak jak Souad. Wyrok wydaje jej ojciec. Szwagier dokonuje egzekucji. Oblewa Souad benzyną i podpala... SOUAD przeżyła - cudem, ale rodzina usiłowała zabić ją nawet w szpitalu. Na zawsze jednak pozostanie straszliwie okaleczona - na ciele i duszy. I wciąż musi się ukrywać; dopóki żyje, jej rodzinę okrywa hańba. Spalona żywcem, opublikowana pod pseudonimem szokująca opowieść o piekle, jakim było jej dzieciństwo i młodość, stała się międzynarodowym bestsellerem. Wydana w 37 w krajach książka przerywa tabu milczenia wobec istniejącej nadal w krajach muzułmańskich barbarzyńskiej tradycji. Nieludzkiego obyczaju, prawa mężczyzn, na mocy którego co najmniej pięć tysięcy kobiet pada co roku ofiarą zbrodni honorowej. Nazwa - Spalona Żywcem Wyd. Kieszonkowe Autor - Souad Oprawa - Miękka Wydawca - Amber Kod ISBN - 9788324159406 Kod EAN - 9788324159406 Wydanie - 1 Rok wydania - 2016 Tłumacz - 31182,maria rostworowska; Format - 110 x 175 x 14 Ilość stron - 224 Podatek VAT - 5% Premiera - 2016-06-23

Sklep: InBook.pl

"Co Bóg złączył..." Geneza i znaczenie klauzul Mateuszowych. Studium egzegetyczno-historyczne - Stanisław Jankowski SDB - 2836916286

67,47 zł

"Co Bóg złączył..." Geneza i znaczenie klauzul Mateuszowych. Studium egzegetyczno-historyczne - Stanisław Jankowski SDB

Książki & Multimedia > Książki

Opis - RSB 46 Nazwa - "Co Bóg złączył..." Geneza i znaczenie klauzul Mateuszowych. Studium egzegetyczno-historyczne Autor - Stanisław Jankowski SDB Oprawa - Miękka Wydawca - Vocatio Kod ISBN - 9788378290667 Kod EAN - 9788378290667 Rok wydania - 2016 Format - 145x208 Ilość stron - 458 Podatek VAT - 5%

Sklep: InBook.pl

Kate Moss by Mario Testino_Testino Mario - 2822175237

148,00 zł

Kate Moss by Mario Testino_Testino Mario TASCHEN

WYDAWNICTWA ALBUMOWE > Fotografia > Tematyczna > Reportaż i dokument

Kate Moss by Mario Testino   ISBN: 9783836550697 Autor: Testino Mario     Rok wydania: 2014-04-15 Ilość stron: 232 Oprawa: miekka Format:  250 x 345 mm Fashion's dynamic duo A photographer's tribute to his greatest muse The unseen Kate: the most intimate photos of today's biggest international fashion icon by the fashion world's favorite photographer. Limited to 1,500 copies, each numbered and signed by the artist. Mario Testino is recognised as the ultimate fashion photographer of his generation but his pictures of Kate Moss transcend fashion. The consequence of  two decades of extraordinary friendship, and phenomenal glamour, this iconic collaboration is an intimate insight into the lives and minds of  two of the world

Sklep: Multistore24.pl

Distributed network protocols for anonymous stations in cooperative and noncooperative settings - 2619308978

28,00 zł

Distributed network protocols for anonymous stations in cooperative and noncooperative settings Politechnika Gdańska

INFORMATYKA

This work studies the effects of station anonymity and/or noncooperative (selfish) station behavior upon the design and performance of selected distributed network protocols. A set of stations interconnected by a computer network are assumed to be engaged in a collective activity for which some inter-station consistency is required. The considered protocols relate to group communication (where message delivery in agreed order is required), random multiple access over a single channel (where collision avoidance is required), and packet forwarding (where maintenance of end-to-end paths is required). Design of distributed protocols for anonymous stations permits to dispense with costly authentication mechanisms, and provides a "security lower bound" for systems in which station identities are relied upon. Modeling of noncooperative settings (where stations are allowed to behave selfishly) is justified in view of the increased autonomy and user configurability of today's network components; at the same time, as a departure from the traditional engineering paradigm, it opens up interesting areas of networking research. In Chapter 2, two agreed order multicast protocols are proposed for anonymous stations in a cooperative setting. Both are LAN-oriented i.e., designed to yield high group throughput by exploiting the natural synchronism of single-broadcast transmission media. A faulty communication environment is assumed with occasional reception misses - failures by one or more stations to receive a message. The Distributed Precedence Graph (DPG) protocol is network-independent in that multicast and reception primitives clearly define a protocol-to-network interface, and missed message recovery is separated from message ordering. In contrast, the Jamming Protocol (JP) is network-dependent and exploits in a novel way the "ideal synchronism" of LAN broadcast to couple missed message recovery and message ordering. Both proposed protocols are insensitive to membership control mechanisms and do without the knowledge of station identities. Even so, they compare favorably with existing agreed order multicast protocols like LANSIS or TOTEM, as demonstrated by the analysis of logicaltime properties and simulation of stochastic performance. Chapters 3 through 5 are devoted to game-theoretic analysis of random access MAC-layer protocols in a noncooperative setting. Chapter 3 deals with CSMA/CA, the multiple access mechanism of the IEEE 802.11 MAC protocol. It is argued that in an ad hoc wireless LAN, CSMA/CA is vulnerable to a selfish backoff attack consisting in systematic selection of short backoff times. Network performance under a backoff attack is evaluated via extension of Bianchi's Markovian approximation, as well as using more accurate models. A sufficient condition of solvability is given and a game-theoretic analysis is carried out with stations' bandwidth shares regarded as payoffs. Launching a backoff attack is established as a strictly dominating action, the payoff structure of the resulting one-shot CSMA/CA game being similar to a multiplayer Prisoners' Dilemma (with a unique and Pareto non-optmal Nash equilibrium). The notion of a Nash capacity is introduced to show that selfish station behavior reduces the achievable bandwidth utilization roughly by half compared with a cooperative setting. Incentive-based discouragement of backoff attacks is proposed in Chapter 4 using the concept of a repeated CSMA/CA game, where a station is allowed to reconfigure its CSMA/CA mechanism based upon past payoffs. Assuming that most stations are interested in enforcing cooperative behavior of the other stations, a satisfactory equilibrium play is shown possible. In particular, a selfish station can be expected to incline to honest play for fear of the other stations inclining to selfish play. This idea is elaborated upon and gives rise to two proposed strategies of playing the repeated CSMA/CA game, called Cooperation via Randomized Inclination to Selfish Play (CRISP) and Selfish Play to Elicit Live-and-Let-live (SPELL). By exploiting another property of the one-shot CSMA/CA game, called coarse profile observability, CRISP and SPELL are shown to asymptotically achieve Pareto optimality and the related Nash equilibrium becomes subgame perfect. It is shown how to extend the proposed strategies if some stations disengage the CSMA/CA backoff scheme. Chapter 4 concludeswith a discussion of QoS-sensitive station behavior, in which case the CSMA/CA game may change from a Prisoners' Dilemma into a form of a queuing game. Selfish behavior of CSMA/CA stations studied in Chapters 3 and 4 only affects specific protocol parameters, leaving the very principle of contention unchanged. In Chapter 5 we look at a slightly more general model of single-channel contention. In the proposed framework, the MAC protocol proceeds in cycles, each of which accommodates the stations' requests to transmit. This subsumes various existing random token-like protocols e.g., CSMA/CA, Random Token, slotted ALOHA, and HIPERLAN/1. A selection configuration determines how the requests are placed, whereas a winner policy decides the winner of a contention. It is argued that while the winner policy must be agreed upon by all the stations, the selection configuration is entirely within a station's discretion. For a wide class of winner policies, called Random Token with Extraneous Collision Detection (RT/ECD), the notions of verifiability and viability are introduced to factor out brute-force selfish behavior, and shown to lead to two interesting winner policies, RT/ECD-0 and RT/ECD--. The resulting games are found to be a multiplayer Prisoners' Dilemma and an anti-coordination game, respectively. Related repeated games are again found to potentially lead to cooperative behavior. In Chapter 6, selfishness considerations are extended to the network layer of a mobile ad hoc network (MANET). Each MANET station generates source packets and also is supposed to forward transit packets for pairs of stations currently out of each other's reception range. It is argued that forwarding transit packets becomes a dual liability: it shortens the station's battery life "in exchange for" sacrificing a portion of the channel bandwidth that could be used for source packets. Under the introduced packet anonymity model (no packet reveals its source station except at destination), undetectable selfish manipulation of the local congestion controls is possible. The issue is addressed in a noncooperative game-theoretic framework: each MANET station selects its own strategy (congestion control settings) at will, so as to maximize some defined payoff (a combination of source packet throughput and a reputation measure). For a class of Drop-and-Throttle (D&T) congestion control mechanisms, a generic model is formulated, whereby a station adjusts its D&T threshold in response to the other stations' adjusted thresholds; this model is subsequently translated into a simple extensive-form game. Types of reachable Nash equilibria are discussed and the notion of robustness of a Nash equilibrium is introduced. Finally, a novel packet forwarding protocol called Fair Forwarding with Forced Transmissions (F3T) is presented, which, if properly configured, leads to a desirable type of Nash equilibrium. Spis treści: CONTENTS  LIST OF SYMBOLS AND ABBREVIATIONS 1. INTRODUCTION   1.1. Motivation, objective, and scope  1.2. Outline of the contents 2. MEMBERSHIP INSENSITIVE AGREED ORDER MULTICAST   2.1. Introduction and related work  2.2. Message ordering constraints  2.3. Jamming Protocol  2.3.1. LAN model  2.3.2. JP mechanisms and data structures  2.3.3. Jamming and lag detection  2.3.3.1. Ethernet  2.3.3.2. Token Ring  2.3.4. "Catch-up" mechanism  2.4. Evaluation of JP  2.4.1. Logical-time properties of JP  2.4.2. Stochastic performance of JP  2.5. Distributed Precedence Graph protocol  2.5.1. Network service model  2.5.1.1. Wired or wireless single-channel LAN  2.5.1.2. Tag seąuencer  2.5.1.3. Bounded-deiay WAN with sparse group messages  2.5.2. DPG data structures and PDU types  2.5.3. Maintenance of strong ADO  2.5.4. Missed message recovery and flow control  2.6. Evaluation of DPG  2.6.1. Logical-time properties of DPG  2.6.2. Stochastic performance of DPG  2.7. Conclusion 3. BACKOFF ATTACK AND ONE-SHOT CSMA/CA GAME   3.1. Introduction and related work  3.2. Network operation  3.2.1. CSMA/CA contention under IEEE 802.11 DCF protocol  3.2.2. Network model  3.3. Solvability of EBM  3.3.1. Uniform CSMA/CA configuration profile  3.3.2. Non-uniform CSMA/CA configuration profile  3.4. Station performance  3.5. Backoff attack incentives  3.5.1. Selfish configurations  3.5.2. CSMA/CA game and Nash capacity  3.5.3. Selfish and greedy configurations  3.5.3.1. Incentives in a binary set of actions  3.5.3.2. Incentives in a temary set of actions  3.5.4. Mixed and Monte Carlo models  3.6. Conclusion 4. BACKOFF ATTACK DISCOURAGEMENT and REPEATED CSMA/CA GAME   4.1. Introduction and related work  4.2. Morę properties of one-shot CSMA/CA game  4.3. Repeated CSMA/CA game  4.3.1. Introduction to repeated games  4.3.2. Application to CSMA/CA game  4.4. CRISP strategy  4.4.1. Strategy description  4.4.2. Uncorrelated Pareto optimality and subgame perfection  4.4.3. Performance  4.4.4. Enforceability  4.4.5. Ternary CRISP  4.5. SPELL strategy  4.5.1. Strategy Description  4.5.2. Uncorrelated Pareto optimality and subgame perfection  4.5.3. Ternary SPELL  4.6. QoS game  4.6.1. One-shot QoS game  4.6.2. Dynamie QoS game scenarios  4.6.3. Stochastic QoS game  4.7. Conclusion and comments 5. NONCOOPERATIVE CHANNEL CONTENTION IN AD HOC LANS WITH ANONYMOUS STATIONS   5.1. Introduction  5.2. WLAN model  5.3. Framework for a winner policy  5.3.1. Reąuests to transmit  5.3.2. Verifiability  5.3.3. Performance objectives  5.3.4. Viability  5.4. Binary RT/ECD game  5.4.1. One-shot RT/ECD game  5.4.2. Stage-by-stage repeated RT/ECD game  5.4.2.1. Nash strategy  5.4.2.2. Idea Bag strategy  5.5. Cycle-by-cycle repeated RT/ECD game  5.5.1. Reinforcement learning strategies  5.5.2. Evolutionary stability  5.6. Conclusion 6. FAIR PACKET FORWARDING IN MOBILE AD HOC NETWORKS   6.1. Introduction  6.2. Related work  6.2.1. Reputation systems  6.2.2. Micropayment schemes  6.2.3. Game-theoretic approaches  6.3. Forwarding model and related selfish behavior  6.3.1. Forwarding model  6.3.2. Discussion of the model  6.3.3. Undetectable selfish behavior  6.4. Game-theoretic model  6.4.1. D&Tgame  6.4.2. Reachability of Nash eąuilibria  6.5. F3T protocol  6.5.1. Protocol description  6.5.2. D&T game payoffs under F3T  6.6. F3T protocol configuration and performance  6.7. Conclusion and future research 7. SUMMARY OF MAIN RESULTS BIBLIOGRAPHY  Summary in English  Summary in Polish

Sklep: Księgarnia Techniczna

Thin Air - 2871016756

41,83 zł

Thin Air Orion Publishing Co

Książki / Literatura obcojęzyczna

In 1935, young medic Stephen Pearce travels to India to join an expedition with his brother, Kits. The elite team of five will climb Kangchenjunga, the world's third highest mountain and one of mountaineering's biggest killers. No one has scaled it before, and they are, quite literally, following in the footsteps of one of the most famous mountain disasters of all time - the 1907 Lyell Expedition. Five men lost their lives back then, overcome by the atrocious weather, misfortune and 'mountain sickness' at such high altitudes. Lyell became a classic British hero when he published his memoir, Bloody, but Unbowed, which regaled his heroism in the face of extreme odds. It is this book that will guide this new group to get to the very top. As the team prepare for the epic climb, Pearce's unease about the expedition deepens. The only other survivor of the 1907 expedition, Charles Tennant, warns him off. He hints of dark things ahead and tells Pearce that, while five men lost their lives on the mountain, only four were laid to rest. But Pearce is determined to go ahead and complete something that he has dreamed off his entire life.As they get higher and higher, and the oxygen levels drop, he starts to see dark things out of the corners of his eyes. As macabre mementoes of the earlier climbers turn up on the trail, Stephen starts to suspect that Charles Lyell's account of the tragedy was perhaps not the full story ...

Sklep: Libristo.pl

Just Got Real - 2872015170

46,08 zł

Just Got Real Penguin Books

Książki / Literatura obcojęzyczna

**PRE-ORDER THE HILARIOUS SHARP NEW NOVEL FROM THE QUEEN OF THE REVENGE NOVEL**'Gripping, sharp and brilliantly twisty. Deliciously readable. A rollercoaster of revenge' DAILY MAIL 'Her best yet! Ingenious and entertaining as ever but this book has a lot of WARMTH and HEART' MARIAN KEYES 'This escapist gem is loud-snort funny' HEAT 'Witty, smart, topical and full of heart. The sun-lounger smash of the summer' TAMMY COHEN 'Impossible to put down. Fabulous characters and a story that just will not let you go!' RUTH JONES 'Smart and funny' SUN, 'SUMMER READING' _______ When happily divorced Joni is reluctantly talked into joining a dating app, she is surprised to quickly hit it off with Ant. Phone calls and texts soon evolve into a plan to meet up. Which is a problem, as Joni's profile picture is of someone else. Joni daren't confess her lie. Yet unable to stop thinking about what might have been, she hatches a plan to 'meet' Ant in real life without revealing who she really is. Once she and Ant are an item, however, it's soon clear that the only thing Ant was honest about was his profile picture. He's still online dating. And intimately texting other women. So Joni contacts them: they need to know. And once they're comparing notes on Ant, upset turns to thoughts of revenge. Is Ant about to discover what it's like being on the wrong end of a woman's wrath? . . . _______ 'Jane Fallon's wry observation and razor-sharp wit in this unputdownable page-turner will grab you from the first page and the action races along at breakneck speed' SUNDAY EXPRESS 'Funny, fresh and clever . . . The perfect poolside read' CLARE MACKINTOSH 'I've read - and loved - ALL of Jane Fallon's books, but Just Got Real is her best yet! Especially gorgeous on female friendship' MARIAN KEYES 'We drop everything for a Jane Fallon novel and this is one of her best' CLOSER 'A brilliantly spiky read. Loved it' SAM BAKER 'Another brilliant tale from best-selling author Jane Fallon' HELLO! 'Her snappy, clever fiction . . . seems to slip down like a glass of nicely chilled white wine. Just Got Real makes no exception' SUNDAY TELEGRAPH 'Witty, funny, beautifully written and dotted with life's truths like sprinkles on a birthday cake' CATHY KELLY 'I loved it. The set-up is glorious - a woman who joins a dating app with a fake photo meets a man whose photo is the only real thing about him. A novel about friendship and treachery that contains what must be the killer twist of the year. Totally brilliant' TONY PARSONS 'Sharply observed, wickedly funny, with real depths of emotion too. Absolutely unputdownable' MILLY JOHNSON 'Just Got Real is an absolute joy' JOANNA CANNON 'A real page turner . . . I loved this addictive story about love, loss, revenge and friendship. Readers will be rooting for Joni and her friends, but my favourite character was Tyson, the furious chihuahua! I love Jane's books and this one was such a treat to read

Sklep: Libristo.pl

U.S. Navy Seal / Underwater Demolition Team (Udt) Handbook - 2867127733

95,82 zł

U.S. Navy Seal / Underwater Demolition Team (Udt) Handbook Periscope Film LLC

Książki / Literatura obcojęzyczna

The U.S. Navy's principal Special Operations force, the SEALs (SEa, Air, Land) represents an elite force that, through its distinguished service, has changed history. As their name implies, the SEALs can be deployed conventionally, through airborne operations (such as high altitude / low opening parachute insertions) or from the sea (including deployment by submarine). Comprised of only the most physically and mentally fit individuals -the drop-out rate in basic training exceeds 90% - SEALs operate at maximum self sufficiency. Their legendary toughness is embodied by their motto: "The only easy day was yesterday." The SEALs trace their history to the early days of WWII, when special "Ranger" and "Scout" forces were created to clear obstacles from enemy-held beaches. The first such groups saw combat in North Africa as part of the TORCH landings, and they participated in the D-Day landings and every major amphibious assault in the Pacific. By war's end, 34 Underwater Demolition Teams (UDTs) were established. Their service continued in the Korean conflict at Inchon, and they conducted infiltration and special operations for the duration of the war. In the 1960s, the growing need for an Unconventional Warfare capability led the Kennedy Administration to create two SEAL teams from top UDT personnel. Those groups and the UDTs conducted extensive operations in Vietnam. In 1983, all UDTs were re-designated as SEALs. Their passports since then include stamps from operations in Lebanon, Grenada, Panama, the Persian Gulf, Somalia, Bosnia, Afghanistan and perhaps most famously Pakistan - where SEALs eliminated Osama bin Laden with a bullet to the head. Originally created in 1965 as a textbook for new operators, this UDT Handbook contains chapters about diving, communications, demolitions, intelligence, first aid, map reading, weapons, survival, and more. It even features a chapter on Swimmer Delivery Vehicles - miniature submarines used for covert deployment - and parachute operations. It provides rare insight into one of the world's most extraordinary, and extraordinarily secret, military organizations. Although never classified, this book has never been available to the general public until now. This enhanced edition includes all of the original text, with special care taken to preserve the integrity of the book. It's a terrific read for anyone who has ever wondered, "What does it take to become one of the best?"

Sklep: Libristo.pl

D-Tek Fuzion GFX 2 niklowany - 1990964231

204,00 zł

D-Tek Fuzion GFX 2 niklowany D-TEK

Chłodzenie cieczą > Bloki > -Bloki na GPU

The all-new D-Tek FuZion

Sklep: Soft-PC.pl

Modification of Algorithms for Determination of Short Kinematic Vectors from GPS Data - 2619308376

23,00 zł

Modification of Algorithms for Determination of Short Kinematic Vectors from GPS Data Uniwersytet Warmińsko-Mazurski w Olsztynie

INNE

The main purpose of this work was to elaborate GPS relative kinematic positioning algorithms, based on phase measurements, which would give better positioning results than those obtained from commercial software. It is assumed that the vectors are short, i.e. their lengths are equal to about 1 km. It often happens, especially under conditions of a small number of observed satellites and breaks in satellite signal reception, that results from standard, commercial software are worse than expected. It is caused mainly by the occurrence of cycle slips in phase measurements and a too long time needed for ambiguity resolution. To verify the algorithms proposed, a system of computer programs was created and tested. Analysis of the results shows that the methods implemented cope well with ambiguity resolution and cycle slip detection and repair, in many cases better than the commercial software. Generally, the software is based on the Kalman filtering technique and double differenced phase measurements. It allows to perform all calculations required for the computation of relative coordinates of a GPS antenna being positioned:  - autonomous position calculation, together with receiver clock corrections, on the basis of observed pseudoranges, applying atmospheric corrections,  - ambiguity resolution (both for the first epoch of observations and for epochs occurring after complete loss of lock, when the phase observations drop to zero), - cycle slips repair,  - computation of 3D corrections to be applied to autonomous positions to obtain relative positions of a (generally) moving station,  - the case of a moving reference station was also studied - it was found that the algorithms derived can be applied to determine a vector between two (generally) moving GPS stations.  The innovations applied concern cycle slips repair and ambiguity resolution. Algorithms for cycle slips recovering were formulated on the basis of the existing methods. Two of them, ensuring proper elimination of jumps in phase observations, were chosen. These are: analysis of triple differences (corrected, if necessary, for the motion of the positioned antenna on the basis of Doppler measurements) and analysis of ionospheric residuals. It was found that the first method eliminates cycle slips bigger than 2-3 cycles, and the other one corrects the remaining small slips and assigns the slip to L1 or L2 phase observations. In the case of complete lock loss with the satellite and when the same satellite is observed again in further epochs, cycle slips are not repaired. Instead, new ambiguity is found.  The method of ambiguity resolution is based on the technique of searching in the wide lane ambiguity domain. The final criterion for admitting the set of ambiguity parameters is the root mean square error of solution obtained for L1 ambiguities associated with the computed wide lane values. When the number of observed satellites was 6 or more, it was confirmed that correct results can be obtained on the basis of observations for one epoch only. In the case of a smaller number of visible satellites, two further cases are examined by the program. If it is the first epoch of observations, then the data from next epochs have to be used. If the positions of previous epochs had already been determined, the procedure of fixing ambiguities is augmented by coordinates predicted with the Kalman filter. In most such cases the number of 5 or 4 satellites is sufficient to fix the ambiguities correctly.  Since carrier phase ambiguity resolution is the key to fast and precise GPS positioning, a search technique was additionally studied, using a method originally elaborated for this purpose. The method enables to test whether the solution is unique on the basis of a given configuration of satellites (their number, elevations and azimuths).  After the application of the above-mentioned procedures for ambiguity resolution and cycle slips repair the results obtained from the new software were generally better. Analysis of the results shows that they are free of gross errors coming from not resolved ambiguities or not properly eliminated cycle slips.  Apart from better results, achieved first of all under difficult observational conditions, the new program is characterized by another advantage when compared with commercial software: all of the algorithms used are known exactly, they can be changed and improved, and the results can be properly interpreted.    MODYFIKACJA ALGORYTMÓW WYZNACZANIA KRÓTKICH WEKTORÓW KINEMATYCZNYCH NA PODSTAWIE DANYCH GPS     Celem pracy jest opracowanie i sprawdzenie algorytmów, służących do obliczeń kinematycznych wektorów GPS, dających lepsze wyniki niż te, które uzyskuje się na podstawie zakupionych programów firmowych. W pracy założono, że opracowywane wektory są krótkie - długości 1 km. W praktyce często spotykamy się z taką sytuacją, gdy wyniki otrzymane na podstawie zakupionych programów są gorsze niż deklarowane przez twórców oprogramowania; szczególnie dotyczy to przypadków, gdy ilość obserwowanych satelitów jest mała lub występują przerwy w odbiorze sygnałów satelitarnych. Otrzymywane niskie dokładności są spowodowane albo źle określoną liczbą zgubionych cykli w pomiarach fazowych (nieciągłością ' tych pomiarów), albo zbyt długim czasem potrzebnym na rozwiązanie parametrów nieoznaczoności.  Stworzono i przetestowano system programów komputerowych, aby sprawdzić poprawność opracowanych algorytmów. Analiza otrzymanych wyników dowodzi, że zastosowane metody zapewniają szybkie rozwiązanie parametrów nieoznaczoności oraz poprawną eliminację nieciągłości w pomiarach fazowych. Stworzone oprogramowanie opiera się na technice filtru Kalmana i podwójnie zróżnicowanych pomiarach fazowych. Oprogramowanie to wykonuje wszystkie etapy obliczeń potrzebnych do wyznaczenia względnych współrzędnych GPS:  - wyznaczanie pozycji autonomicznych wraz z poprawkami chodu zegarów odbiorników; ten  etap obliczeń jest wykonywany na podstawie pomierzonych pseudoodległości, z zastosowa  niem odpowiednich poprawek atmosferycznych;  - rozwiązanie nieoznaczoności (zarówno dla pierwszej epoki obserwacyjnej, jak i dla tych epok, które występują po całkowitej utracie łączności z satelitą; - poprawianie pomiarów fazowych ze względu na występujące nieciągłości;  - obliczanie poprawek do trójwymiarowych współrzędnych autonomicznych stacji wyznaczanej (w ogólności ruchomej) przy pozycjonowaniu względnym;  - zbadano także przypadek ruchomej stacji referencyjnej - stwierdzono poprawność działania wyprowadzonych algorytmów do obliczania wektora między dwiema ruchomymi stacjami GPS.  Zastosowane ulepszenia algorytmiczne dotyczą eliminacji nieciągłości i rozwiązywania parametrów nieoznaczoności. Algorytmy służące do eliminacji nieciągłości opracowano na podstawie istniejących metod, spośród których wybrano dwie, współpracujące ze sobą: badanie potrójnych różnic (z możliwością uprzedniego uwzględnienia prędkości pozycjonowanej stacji, obliczonych na podstawie pomiarów dopplerowskich) oraz analiza poprawek jonosferycznych. Sprawdzono, że pierwsza z wymienionych metod eliminuje nieciągłości pomiaru fazowego większe niż 2-3 cykle, podczas gdy druga poprawia pozostałe nieciągłości, przyporządkowując je jednocześnie pomiarom fazowym na częstotliwości L1 lub L2. W przypadku całkowitej utraty łączności danego satelity z odbiornikiem i ponowną obserwacją w dalszych epokach pomiarowych, zamiast poszukiwania nieciągłości pomiaru fazowego, znajdowane są nowe parametry nieoznaczoności dla tego satelity.  Opracowana metoda rozwiązywania parametrów nieoznaczoności opiera się na technice poszukiwania w dziedzinie nieoznaczoności szerokościeżkowych. Ostatecznym kryterium przyjęcia zestawu parametrów nieoznaczoności jest średni błąd kwadratowy rozwiązania otrzymanego na częstotliwości L1, z wykorzystaniem parametrów nieoznaczoności dla tej częstotliwości, otrzymanych na podstawie odpowiednich wartości szerokościeżkowych. Jeżeli liczba obserwowanych satelitów wynosi 6 lub więcej, sprawdzono, że poprawne rozwiązanie nieoznaczoności może być otrzymane na podstawie obserwacji z jednej tylko epoki. Przy mniejszej liczbie obserwowanych satelitów, rozróżnia się dwa przypadki. Jeśli jest to pierwsza epoka obserwacji, należy wykorzystać dane z dalszych epok obserwacyjnych. Jeśli natomiast sytuacja taka występuje już po obliczeniu pozycji dla poprzednich epok, procedura rozwiązywania nieoznaczoności jest wspomagana predykcją współrzędnych na tę epokę, otrzymaną z filtru Kalmana. W zbadanych przypadkach liczba 4 lub 5 satelitów była wystarczająca do poprawnego rozwiązania nieoznaczoności.  Ponieważ poprawne rozwiązanie parametrów nieoznaczoności jest podstawą szybkiego i dokładnego pozycjonowania techniką GPS, przeprowadzono dodatkowe badania techniki poszukiwawczej, wykorzystując metodę opracowaną specjalnie w tym celu. Metoda ta umożliwia zbadanie jednoznaczności wyznaczenia parametrów nieoznaczoności na podstawie zadanej konfiguracji satelitów (ich ilości, elewacji i azymutów).  Po zastosowaniu opisanych algorytmów dotyczących rozwiązywania nieoznaczoności i eliminacji nieciągłości w pomiarach fazowych, stwierdzono, że uzyskano poprawę dokładności otrzymywanych wyznaczeń. Analiza wyników pokazuje, że są one wolne od błędów grubych, pochodzących od źle wyznaczonych parametrów nieoznaczoności lub nieciągłości pomiarów fazowych.  Oprócz lepszych wyników, które przede wszystkim są otrzymywane w złych warunkach obserwacyjnych, jest jeszcze jedna, ważna zaleta posiadania własnego oprogramowania GPS. W oprogramowaniu tym znane są wszystkie algorytmy, można je zmieniać i uzupełniać w zależności od potrzeb, umożliwia to także poprawną interpretację otrzymywanych wyników.    Spis treści: 1. Introduction    2. GPS algorithms   2.1. Observation equations  2.2. Alternative form of the Kalman filter  2.3. Satellite position determination  2.4. Tropospheric delay  2.5. Ionospheric corrections  2.6. Models for single point positioning  2.7. Models for relative positioning with carrier phases    3. Considered biases and errors   3.1. Ambiguity resolution  3.1.1. Further studies of the search method  3.2. Cycle slips  3.3. Multipath    4. Results  4.1. The car experiment  4.2. The ship experiment  4.3. Conclusions and Summary    References Abstract Abstrak

Sklep: Księgarnia Techniczna

Small Worlds - 2874070350

70,45 zł

Small Worlds Penguin Books

Książki / Literatura obcojęzyczna

An exhilarating and expansive new novel about fathers and sons, faith and friendship from Caleb Azumah Nelson, the no.1 bestselling, award-winning author of Open WaterThe one thing that can solve Stephen's problems is dancing. Dancing at Church, with his parents and brother, the shimmer of Black hands raised in praise; he might have lost his faith, but he does believe in rhythm. Dancing with his friends, somewhere in a basement with the drums about to drop, while the DJ spins garage cuts. Dancing with his band, making music which speaks not just to the hardships of their lives, but the joys too. Dancing with his best friend Adeline, two-stepping around the living room, crooning and grooving, so close their heads might touch. Dancing alone, at home, to his father's records, uncovering parts of a man he has never truly known.Stephen has only ever known himself in song. But what becomes of him when the music fades? When his father begins to speak of shame and sacrifice, when his home is no longer his own? How will he find space for himself: a place where he can feel beautiful, a place he might feel free?Set over the course of three summers in Stephen's life, from London to Ghana and back again, Small Worlds is an exhilarating and expansive novel about the worlds we build for ourselves, the worlds we live, dance and love within.***Praise for Open Water, winner of the Costa First Novel Award, Debut Novel of the Year British Book Award and a #1 Times bestseller***'Hands-down the best debut I've read in years' The Times'A beautiful and powerful novel about the true and sometimes painful depths of love' Candice Carty-Williams, bestselling author of QUEENIE and PEOPLE PERSON'A short, poetic and intellectual meditation on art and a relationship between a young couple' Bernardine Evaristo, Booker prize-winning author of GIRL, WOMAN, OTHER'A lyrical modern love story, brilliant on music and art, race and London life, I enjoyed it hugely' David Nicholls, author of ONE DAY and SWEET SORROW'A stunning piece of art' Bolu Babalola, bestselling author of LOVE IN COLOUR

Sklep: Libristo.pl

Farm to Factory - 2877494153

255,10 zł

Farm to Factory Princeton University Press

Książki / Literatura obcojęzyczna

To say that history's greatest economic experiment - Soviet communism - was also its greatest economic failure is to say what many consider obvious. Here, in a startling reinterpretation, Robert Allen argues that the USSR was one of the most successful developing economies of the twentieth century. He reaches this provocative conclusion by recalculating national consumption and using economic, demographic, and computer simulation models to address the 'what if' questions central to Soviet history. Moreover, by comparing Soviet performance not only with advanced but with less developed countries, he provides a meaningful context for its evaluation. Although the Russian economy began to develop in the late nineteenth century based on wheat exports, modern economic growth proved elusive. But growth was rapid from 1928 to the 1970s - due to successful Five Year Plans. Notwithstanding the horrors of Stalinism, the building of heavy industry accelerated growth during the 1930s and raised living standards, especially for the many peasants who moved to cities. A sudden drop in fertility due to the education of women and their employment outside the home also facilitated growth.While highlighting the previously underemphasized achievements of Soviet planning, "Farm to Factory" also shows, through methodical analysis set in fluid prose, that Stalin's worst excesses - such as the bloody collectivization of agriculture - did little to spur growth. Economic development stagnated after 1970, as vital resources were diverted to the military and as a Soviet leadership lacking in original thought pursued wasteful investments.

Sklep: Libristo.pl

Dragon's Fire - 2878307292

50,91 zł

Dragon's Fire Transworld Publ. Ltd UK

Książki / Literatura obcojęzyczna

When Masterharper Zist takes over as Harper for Natalon's coal-mining camp, he takes with him his apprentice, the orphaned, mute Pellar, and Pellar's fire-lizard Chitter. Pellar has become a gifted tracker and Zist gives him his own mission - to find out if the recent thefts of coal are the work of the Shunned, criminals condemned to a life of wandering and hardship. Halla is one of the children of the Shunned. Though innocent of their parents' crimes, these children have inherited their cruel punishment. With no shelter when the lethal Thread falls again they will have no protection against it. Life is even tougher for Halla, all her family are dead and she must fend for herself. Yet Halla is kind and gentle, devoted to helping those more helpless than she, unlike Tenim, a fellow child of the Shunned. Tenim is in league with Tarik, a crooked miner from Camp Natalon, who helps him steal coal in exchange for a cut of the profit. But Tenim soon realizes there is a lot more to be made from firestone, the volatile mineral that enables the dragons of Pern to burn Thread out of the sky. Tenim doesn't care what he has to do, or whom he has to kill, in order to corner the market.Cristov is Tarik's son. Dishonored by his father's greed and treachery, he decides he must make amends somehow...even if it means risking his life by mining the volatile firestone, which blows up at contact with the slightest drop of moisture. When the last remaining firestone mine explodes in flames, a desperate race begins to find a new deposit of the deadly but essential mineral, for without it there can be no defence against Thread. But Tenim has a murderous plan to turn the tragedy to his own advantage, and only Pellar, Halla and Cristov can stop him - and ensure that there will be a future for all on the world of the Dragonriders.

Sklep: Libristo.pl

Nightingale - 2877950620

40,65 zł

Nightingale St. Martin's Publishing Group

Książki / Literatura obcojęzyczna

In the quiet village of Carriveau, Vianne Mauriac says goodbye to her husband, Antoine, as he heads for the Front. She doesn't believe that the Nazis will invade France ... but invade they do, in droves of marching soldiers, in caravans of trucks and tanks, in planes that fill the skies and drop bombs upon the innocent. When France is overrun, Vianne is forced to take an enemy into her house, and suddenly her every move is watched; her life and her child's life is at constant risk. Without food or money or hope, as danger escalates around her, she must make one terrible choice after another.§§Vianne's sister, Isabelle, is a rebellious eighteen-year-old girl, searching for purpose with all the reckless passion of youth. While thousands of Parisians march into the unknown terrors of war, she meets the compelling and mysterious Gäetan, a partisan who believes the French can fight the Nazis from within France, and she falls in love as only the young can ... completely. When he betrays her, Isabelle races headlong into danger and joins the Resistance, never looking back or giving a thought to the real - and deadly - consequences.§§With courage, grace and powerful insight, bestselling author Kristin Hannah takes her talented pen to the epic panorama of WWII and illuminates an intimate part of history seldom seen: the women's war. The Nightingale tells the stories of two sisters, separated by years and experience, by ideals, passion and circumstance, each embarking on her own dangerous path toward survival, love, and freedom in German-occupied, war-torn France - a heartbreakingly beautiful novel that celebrates the resilience of the human spirit and the durability of women. It is a novel for everyone, a novel for a lifetime.

Sklep: Libristo.pl

szukaj w Kangoo wellsamed one drop only

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z wellsamed pl one drop only

2. Szukaj na wszystkich stronach serwisu

t1=0.042, t2=0, t3=0, t4=0.019, t=0.042

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER