Mostrando 22,641 - 22,660 Resultados de 23,350 Para Buscar '"'39"', tiempo de consulta: 0.16s Limitar resultados
  1. 22641
  2. 22642
  3. 22643
    por González R., Moralis J.
    Publicado 2017
    Tabla de Contenidos: “…INTERPRETACIÓN DE LÍNEAS ARBITRARIAS PARA RECONOCIMIENTO DE (...) -- FIGURA 39. INTERPRETACIÓN DE LÍNEAS ARBITRARIAS E-O PARA RECONOCIMIENTO DE (...) -- FIGURA 40. …”
    Libro electrónico
  4. 22644
    Publicado 2020
    Tabla de Contenidos: “…3.3.5.2 Waste Generators -- 3.3.5.3 Hazardous Waste Transporters -- 3.3.5.4 Treatment, Storage and Disposal Facilities (TSDFs) -- 3.3.5.5 Land Disposal Restrictions (LDRs) -- 3.3.5.6 Universal Waste -- 3.3.5.7 Underground Storage Tanks -- 3.3.5.8 Used Oil -- 3.3.6 Emergency Planning and Community Right to Know Act (EPCRA) -- 3.3.7 Toxic Substances Control Act -- 3.3.8 Safe Drinking Water Act (SDWA) -- 3.3.9 National Environmental Policy Act -- 3.3.10 Endangered Species Act -- 3.3.11 Federal Insecticide, Fungicide and Rodenticide Act -- 3.3.12 Comprehensive Environmental Response Compensation and Liability Act (CERCLA) -- 3.4 State Laws -- 3.5 County Laws -- 3.6 Local Laws -- 3.7 Regulatory Relationship Development and Sustainment -- 3.8 Other Directives and Corporate Policy -- 3.9 Establishing and Documenting Applicability -- 3.10 Applied Learning -- 3.10.1 Case Study -- References -- Chapter 4 Implementation Roles, Responsibilities and Accountability -- 4.1 Leadership Charting the Way -- 4.1.1 Leadership Style and Impact -- 4.1.2 Communicating the Importance of Environmental Compliance -- 4.2 Employee Participation -- 4.2.1 Where Implementation Really Takes Place -- 4.2.2 Motivated versus Reluctant Implementation -- 4.3 Environmental Subject Matter Experts and Professionals -- 4.3.1 What Defines an Environmental Subject Matter Expert? …”
    Libro electrónico
  5. 22645
    por Schilling, Martin
    Publicado 2022
    Tabla de Contenidos: “…Practice 30: Creating a crystal-clear picture of your target customers -- Practice 31: Aligning your product value proposition with the underserved needs of your customers -- Practice 32: Developing your roadmap as a communication tool with the right prioritization logic -- Product management basics -- Practice 33: Getting the brand and product design right early on -- Practice 34: Building a thriving user research engine quickly -- Practice 35: Implementing best-in-class product management tools -- 6 Technology Excellence: Creating scalable and secure tech platforms for future growth -- Practice 36: Establishing the right technology OKRs -- Organzational charts and roles -- Practice 37: Defining the roles &amp -- responsibilities for a technology function -- Practice 38: Scaling the right technology roles at the right time -- Your way of agile development -- Practice 39: Creating your own version of agile development -- Development operations (DevOps) -- Practice 40: Establishing lean software development principles -- Practice 41: Establishing technical DevOps practices for continuous delivery -- Practice 42: Enabling a team of doers through the right DevOps culture -- Scalable architecture -- Practice 43: Creating a "good enough" software architecture that can evolve over time -- Practice 44: Establishing a resilient cloud architecture -- Information security -- Practice 45: Mitigating the top 10 web applications' security risks -- Practice 46: Integrating the key information security practices into design, development and deployment early on -- Data management -- Practice 47: Democratizing data with self-service data tools while building a scalable data architecture -- 7 B2C Marketing Excellence: Scaling up with minimal expense and maximum customer retention -- OKRs -- Practice 48: Establishing the right marketing OKRs…”
    Libro electrónico
  6. 22646
    Publicado 2004
    Tabla de Contenidos: “…Alerts structure -- Automation support -- Event automation service -- IBM Tivoli Enterprise Console Version 3.9 -- IBM Tivoli Enterprise Console structure -- IBM Tivoli Data Warehouse Version 1.2 -- Data warehouse concepts -- Warehouse enablement pack -- Appendix D. …”
    Libro electrónico
  7. 22647
    por Arrell, Kathryn
    Publicado 2005
    Tabla de Contenidos: “…3.5.8 Database configuration options -- 3.5.9 Selecting the database management options -- 3.5.10 Selecting the database file storage -- 3.5.11 Selecting the backup and recovery options -- 3.5.12 Choose the database passwords -- 3.5.13 Summary -- 3.5.14 Install completing -- 3.5.15 Configuration Assistant panel -- 3.6 Verifying that the database is running -- 3.7 Enabling Async IO -- 3.8 Using the LOCK_SGA parameter -- 3.9 Using OEM to manage an Oracle database -- Chapter 4. …”
    Libro electrónico
  8. 22648
    por Wang, Wally
    Publicado 2010
    Tabla de Contenidos: “…Additional Ideas for Updating Your Operating System -- 36: Making an iPad Accessible -- Improving the Visual Quality of the Screen -- Turning On VoiceOver -- Turning On Closed Captioning and Mono Audio -- Turning Accessibility Features On and Off Rapidly -- Additional Ideas for Making Your iPad Accessible -- 37: Using Foreign Languages -- Switching the iPad's Default Language -- Defining a Foreign-Language Keyboard -- Using a Foreign-Language Virtual Keyboard -- Additional Ideas for Using Foreign Languages on Your iPad -- 38: Transferring and Editing Microsoft Office Documents -- Transferring Microsoft Office Files to Your iPad -- Transferring Microsoft Office Files from Your iPad to Your Computer -- Managing Imported Files on Your iPad -- Additional Ideas for Transferring Microsoft Office Files -- 39: The Best iPad Apps -- Office Productivity Apps -- News and Information -- Painting and Drawing Apps -- Entertainment Apps -- Additional Ideas for Using Apps -- The Next Step -- Index…”
    Libro electrónico
  9. 22649
    Publicado 2020
    Tabla de Contenidos: “…CISCO ACI (Application Centric Infrastructure) 39 -- 3.2.2. OpenContrail and Juniper 40 -- 3.2.3. …”
    Libro electrónico
  10. 22650
    Publicado 2021
    Tabla de Contenidos: “…Problem -- Solution -- Discussion -- See Also -- 3.2 Converting Between Numeric Types (Casting) -- Problem -- Solution -- Discussion -- 3.3 Overriding the Default Numeric Type -- Problem -- Solution -- Discussion -- 3.4 Replacements for ++ and −− -- Problem -- Solution -- Discussion -- 3.5 Comparing Floating-Point Numbers -- Problem -- Solution -- Discussion -- See Also -- 3.6 Handling Large Numbers -- Problem -- Solution -- Discussion -- See Also -- 3.7 Generating Random Numbers -- Problem -- Solution -- Discussion -- 3.8 Formatting Numbers and Currency -- Problem -- Solution -- Locales -- Discussion -- 3.9 Creating New Date and Time Instances -- Problem -- Solution -- 3.10 Calculating the Difference Between Two Dates -- Problem -- Solution -- Discussion -- 3.11 Formatting Dates -- Problem -- Solution -- 3.12 Parsing Strings into Dates -- Problem -- Solution -- Chapter 4. …”
    Libro electrónico
  11. 22651
    Publicado 2010
    Tabla de Contenidos: “…Avoid unnecessary backtracking. -- Item 39. Compile regexes only once. -- Item 40. Pre-compile regular expressions. -- Item 41. …”
    Libro electrónico
  12. 22652
    Publicado 2014
    Tabla de Contenidos: “…Foreword xi -- Preface xiii -- About the Author xvii -- Acknowledgements xxi -- Part One BACKGROUNDS OF MPEG-2 SYSTEMS 1 -- 1 Introduction 3 -- 1.1 The Scope of This Book 7 -- 1.2 Some Definitions 7 -- References 8 -- 2 Technology Developments Around 1990 9 -- References 11 -- 3 Developments in Audio and Video Coding in MPEG 13 -- 3.1 The Need for Compression 13 -- 3.1.1 Compression Factors for Audio 14 -- 3.1.2 Compression Factors for Video 14 -- 3.2 MPEG Video 19 -- 3.2.1 Introduction 19 -- 3.2.2 MPEG-1 and MPEG-2 Video Essentials 20 -- 3.2.3 Evolution of MPEG Video 39 -- 3.3 MPEG Audio 47 -- 3.3.1 MPEG-1 and MPEG-2 Audio Essentials 47 -- 3.3.2 Evolution of MPEG Audio 53 -- References 59 -- 4 Other Important Content Formats 61 -- 4.1 Metadata 61 -- 4.2 Timed Text 64 -- 4.3 Lossless and Scalable Lossless Audio 69 -- 4.4 Multiview Video 69 -- 4.5 3D Video 70 -- 4.5.1 Left and Right Views in a Single Video Stream 73 -- 4.5.2 Depth Information Associated to 2D Video 75 -- 4.5.3 Use of MVC to Convey Left and Right Views 78 -- 4.5.4 Further 3D Video Evolution 79 -- References 80 -- 5 Motivation for a Systems Standard 83 -- 6 Principles Underlying the MPEG-2 Systems Design 87 -- 6.1 Building an End-to-End System 87 -- 6.1.1 Constant End-to-End Delay 87 -- 6.1.2 Video Coding Delay 88 -- 6.1.3 Audio Coding Delay 94 -- 6.1.4 Delay Compensation 95 -- 6.2 The Multiplex and Demultiplex Operation 97 -- 6.3 Delivery Schedule of MPEG System Streams 106 -- 6.4 Synchronization of Audio and Video 108 -- 6.5 MPEG-2 System Streams and the STD Model 113 -- 6.6 Timing Issues 118 -- 6.6.1 Frequency and Tolerance of the STC in MPEG-1 Systems 119 -- 6.6.2 Regeneration of the STC in System Decoders 121 -- 6.6.3 Frequency and Tolerance of the STC in MPEG-2 Systems 125 -- 6.7 Quality of Service Issues 127 -- 6.8 Transport Layer Independence 131 -- References 132 -- 7 MPEG-1 Systems: Laying the MPEG-2 Foundation 133 -- 7.1 Driving Forces 133 -- 7.2 Objectives and Requirements 136 -- 7.3 Structure of MPEG-1 System Streams 138.…”
    Libro electrónico
  13. 22653
    Publicado 2010
    Tabla de Contenidos: “…How It Works -- When to Use It -- Wrapping a Function Sequence in a Nested Closure (Ruby) -- Simple C# Example (C#) -- Using Method Chaining (Ruby) -- Function Sequence with Explicit Closure Arguments (Ruby) -- Using Instance Evaluation (Ruby) -- Chapter 39: Literal List -- How It Works -- When to Use It -- Chapter 40: Literal Map -- How It Works -- When to Use It -- The Computer Configuration Using Lists and Maps (Ruby) -- Evolving to Greenspun Form (Ruby) -- Chapter 41: Dynamic Reception -- How It Works -- When to Use It -- Promotion Points Using Parsed Method Names (Ruby) -- Promotion Points Using Chaining (Ruby) -- Removing Quoting in the Secret Panel Controller (JRuby) -- Chapter 42: Annotation -- How It Works -- When to Use It -- Custom Syntax with Runtime Processing (Java) -- Using a Class Method (Ruby) -- Dynamic Code Generation (Ruby) -- Chapter 43: Parse Tree Manipulation -- How It Works -- When to Use It -- Generating IMAP Queries from C# Conditions (C#) -- Chapter 44: Class Symbol Table -- How It Works -- When to Use It -- Statically Typed Class Symbol Table (Java) -- Chapter 45: Textual Polishing -- How It Works -- When to Use It -- Polished Discount Rules (Ruby) -- Chapter 46: Literal Extension -- How It Works -- When to Use It -- Recipe Ingredients (C#) -- Part V: Alternative Computational Models -- Chapter 47: Adaptive Model -- How It Works -- When to Use It -- Chapter 48: Decision Table -- How It Works -- When to Use It -- Calculating the Fee for an Order (C#) -- Chapter 49: Dependency Network -- How It Works -- When to Use It -- Analyzing Potions (C#) -- Chapter 50: Production Rule System -- How It Works -- When to Use It -- Validations for club membership (C#) -- Eligibility Rules: extending the club membership (C#) -- Chapter 51: State Machine -- How It Works -- When to Use It -- Secret Panel Controller (Java)…”
    Libro electrónico
  14. 22654
    Publicado 2012
    Tabla de Contenidos: “…Recipe 37: SpamCatch() -- About the Recipe -- How It Works -- How to Use It -- The Recipe -- Recipe 38: SendEmail() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 39: BBCode() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 40: PoundCode() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Chapter 7: The Internet -- Recipe 41: LookupLinks() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 42: GetTitleFromURL() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 43: AutoBackLinks() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 44: CreateShortURL() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 45: UseShortURL() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 46: SimpleWebProxy() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 47: PageUpdated() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 48: HTMLToRSS() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 49: RSSToHTML() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 50: HTMLToMobile() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Chapter 8: Chat and Messaging -- Recipe 51: UsersOnline()…”
    Libro electrónico
  15. 22655
    Publicado 2022
    Tabla de Contenidos: “…(d) Libraries -- (e) Museums -- (f) Health Care Institutions -- (g) Other Health Care Provider Organizations -- (h) Membership Organizations -- (i) Small Solicitations -- (j) Solicitations for Specified Individuals -- (k) Political Organizations -- (l) Veterans' Organizations -- (m) Named Organizations -- (n) Other Categories of Exempted Organizations -- 3.6 Regulation of Professional Fundraisers -- 3.7 Regulation of Professional Solicitors -- 3.8 Regulation of Commercial Coventurers -- 3.9 Limitations on Fundraising Costs -- 3.10 Availability of Records -- 3.11 Contracts -- 3.12 Registered Agent Requirements -- 3.13 Prohibited Acts -- 3.14 Regulatory Prohibitions -- 3.15 Disclosure Statements and Legends -- 3.16 Reciprocal Agreements -- 3.17 Solicitation Notice Requirements -- 3.18 Fiduciary Relationships -- 3.19 Powers of Attorney General -- 3.20 Miscellaneous Provisions -- 3.21 Sanctions -- 3.22 Unified Registration -- 3.23 Other Laws -- 3.24 Prospect of Law Changes -- Chapter 4 State Regulation of Fundraising -- 4.1 Regulation of Fundraising Costs -- (a) The Disclosure Dilemma -- (b) The Fundraising Cost Percentage Approach -- (c) Fundraising Cost Line Item Approach -- (d) Floating Average Approach -- (e) Pluralization Approach -- (f) Average Gift Size Factor -- (g) Regulated Disclosure Approach -- (h) Factors Affecting Fundraising Costs -- (i) Joint Cost Allocations -- 4.2 Police Power -- 4.3 Registration and Licensing Requirements -- 4.4 Charitable Purposes Revisited -- 4.5 Fundraising as Free Speech -- (a) State of Law before 1980 Supreme Court Decision -- (b) Free Speech Principles in Fundraising Context -- (c) State of Law Subsequent to Supreme Court Decisions -- (d) Airport Terminal Solicitations -- (e) Door‐to‐Door Advocacy -- (f) Outer Boundaries of Doctrine…”
    Libro electrónico
  16. 22656
    Publicado 1994
    Tabla de Contenidos: “…Syntactic Processing -- 3.9. Proposition Generation -- 3.10. Frame Processing -- 4. …”
    Libro electrónico
  17. 22657
    Publicado 2005
    Tabla de Contenidos: “…The body image and the environment: The big idea -- 3.9. New body schema after SCI -- 3.10. Body image from others -- 3.11. …”
    Libro electrónico
  18. 22658
    Publicado 2024
    Tabla de Contenidos: “…Chapter 3: A review on edge computing: Working, comparisons, benefits, vision, instances and illustrations along with challenges -- 3.1 Introduction -- 3.2 Literature review -- 3.3 The working of edge computing -- 3.4 Comparison-edge computing, cloud computing and fog computing -- 3.5 The benefits of edge computing -- 3.6 Instances and illustrations of edge computing -- 3.7 Edge maintenance -- 3.8 Opportunities for 5G, IoT with edge computing -- 3.9 Challenges of edge computing -- 3.10 Conclusion -- References -- Chapter 4: Industrial Internet of Things: IoT and Industry 4.0 -- 4.1 Introduction -- 4.2 Streamlined work -- 4.3 Internet of Things -- 4.4 The Industrial Internet of Things -- 4.5 Industry 4.0 -- 4.6 Key technologies for the Industrial Internet of Things -- 4.6.1 Blockchain technology -- 4.6.2 Cloud computing -- 4.6.3 Artificial intelligence and cyber physical systems -- 4.7 Intelligent manufacturing in the context of Industry 4.0 -- 4.8 Open research issues -- 4.9 Application domains -- 4.9.1 Healthcare -- 4.9.2 Smart cities -- 4.9.3 Smart environments -- 4.9.4 Industry -- 4.10 Challenges -- 4.11 Conclusion -- References -- Chapter 5: Denial of Service Attacks in the Internet of Things -- 5.1 Introduction -- 5.2 IoT architecture -- 5.3 Categorization of security issues -- 5.4 Security issues of the lower layers -- 5.5 Security issues of the intermediate levels -- 5.6 Security issues of the higher levels -- 5.7 Mitigation strategies at various levels of IoT devices -- 5.8 Distributed Denial of Service (DDoS) attack -- 5.9 DDoS attack mitigation strategies -- 5.10 Research gap -- 5.11 Fuzzy-Neural Network-based cross-layer DoS attack detection framework -- 5.12 Conclusion -- 5.13 Future work -- References…”
    Libro electrónico
  19. 22659
    por Lederer, Gerald
    Publicado 2023
    Tabla de Contenidos: “…Ausblick: Auf dem Weg zur einheitlichen Einlagensicherung beim SRB? -- II.3.9. Fazit -- II.4. Die Rolle der FMA in der Bankenunion -- II.4.1. …”
    Libro electrónico
  20. 22660
    Publicado 2023
    Tabla de Contenidos: “…3.5.4 Machine learning approaches -- 3.5.5 Pathway-based approaches -- 3.5.6 Artificial neuronal network approaches -- 3.5.7 Deep learning machine approaches -- 3.5.8 Network modeling approach -- 3.5.8.1 Autoencoder approaches -- 3.5.8.2 Text mining approaches -- 3.6 Artificial intelligence algorithms for drug repurposing -- 3.7 Computational intelligence-based approaches to identify therapeutic candidates for repurposing against coronavirus -- 3.7.1 Network-based model -- 3.7.2 Structure-based approaches -- 3.7.3 Artificial intelligence approaches -- 3.8 Challenges in drug repurposing -- 3.9 Future perspectives of artificial intelligence-informed drug repurposing -- 3.10 Conclusion -- References -- 4 COVID-19: artificial intelligence solutions, prediction with country cluster analysis, and time-series forecasting -- 4.1 Introduction -- 4.1.1 Motivation for this study -- 4.1.2 Adverse impacts of COVID-19 outbreak -- 4.1.3 Chapter organization -- 4.1.4 Table of acronyms used in this chapter -- 4.2 Review of literature on COVID-19 pandemic -- 4.3 K-means clustering for COVID-19 country analysis -- 4.3.1 Cluster analysis: an overview -- 4.3.2 Dataset selection and preprocessing -- 4.3.3 Findings from COVID-19 country cluster data analysis -- 4.3.4 The results and discussions -- 4.4 Time-series modeling for COVID-19 new cases -- 4.4.1 Time-series modeling: an overview -- 4.4.2 Dataset description -- 4.4.3 Time-series exploration -- 4.4.4 Predictive analytics -- 4.5 Conclusion -- References -- Further reading -- 5 Graph convolutional networks for pain detection via telehealth -- 5.1 Introduction -- 5.2 Methodology -- 5.2.1 Features extraction -- 5.2.2 Graph-based modules -- 5.2.3 Frame-wise weight calculation -- 5.2.4 Classification -- 5.3 Experiments -- 5.3.1 Datasets -- 5.3.2 Experimental setting -- 5.4 Results and discussion -- 5.5 Conclusion…”
    Libro electrónico