Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 3
- Industrial applications 3
- Internet of things 3
- Mathematics 3
- Research 3
- Security measures 3
- Signal processing 3
- Artificial intelligence 2
- Business 2
- Computer security 2
- Eine 2
- Electric vehicles 2
- Environmental management 2
- Gobierno 2
- Leadership 2
- Management 2
- Medical economics 2
- Telecommunication 2
- Access control 1
- Ad hoc networks (Computer networks) 1
- Adhesives 1
- Agile software development 1
- Agricultural science 1
- Agriculture 1
- Ambient sounds 1
- Amparo (Writ) 1
- Analysis 1
- Application software 1
- Argumentationsmuster 1
- Austrian 1
-
61por Duch, LluísTabla de Contenidos:
Publicado 2007Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
62Publicado 2011Tabla de Contenidos: “…Alineamiento estratégico de la RS; 4.3.2.1. Las pymes que tienen un mayor alineamiento (...); 4.3.2.2. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
63por Besednjak Dietrich, AlejandroTabla de Contenidos: “…4.2 CONCEPTO DE ESTRUCTURA SANDWICH4.3 TIPOS DE NÚCLEOS; 4.3.1 MADERAS NATURALES; 4.3.1.1 MADERA BALSA; 4.3.1.2 CEDRO ROJO; 4.3.1.3 CONTRACHAPADO MARINO; 4.3.2 ESPUMAS SINTÉTICAS; 4.3.2.1 ESPUMAS DE CLORURO DE POLIVINILO (...); 4.3.2.2 ESPUMAS DE POLIURETANO (PU); 4.3.2.3 ESPUMAS DE POLIESTIRENO (PS); 4.3.2.4 ESPUMAS DE ESTIRENO-ACRILONITRILO (...); 4.3.2.5 ESPUMA DE POLIMETACRILÍMIDA (PMI); 4.3.2.6 ESPUMAS SINTÁCTICAS; 4.3.3 NIDO DE ABEJA; 4.3.4 FIRE COREMAT; 5 INTRODUCCIÓN A LOS PROCESOS DE FABRICACIÓN; 5.1 INTRODUCCIÓN; 5.2 CLASIFICACIÓN DE LOS PROCESOS; 5.3 CONTENIDO DE REFUERZO…”
Publicado 2005
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
64Publicado 2019Tabla de Contenidos: “…-- 4.2.1.3 Using Transformations for Normality -- 4.2.2 Randomness -- 4.2.2.1 Runs Test for Testing Randomness -- 4.2.3 Outliers -- 4.2.3.1 Identifying Outliers with SPSS -- 4.2.4 Homogeneity of Variances -- 4.2.4.1 Testing Homogeneity with Levene's Test -- 4.2.5 Independence of Observations -- 4.2.6 Linearity -- 4.3 Assumptions in Hypothesis Testing Experiments -- 4.3.1 Comparing Means with t‐Test -- 4.3.2 One Sample t‐Test -- 4.3.2.1 Testing Assumption of Randomness -- 4.3.2.2 Testing Normality Assumption in t‐Test -- 4.3.2.3 What if the Normality Assumption Is Violated? …”
Libro electrónico -
65por Rountree, DerrickTabla de Contenidos: “…3.4.3.1.3 SAML Bindings3.4.3.1.4 SAML Profiles; 3.4.3.2 The Evolution of SAML; 3.4.3.2.1 SAML v1.0; 3.4.3.2.2 SAML v1.1; 3.4.3.2.3 SAML 2.0; 3.4.3.2.3.1 SAML 2.0 Assertions; 3.5 Web Service Specifications; 3.5.1 WS-Security; 3.5.2 WS-SecurityPolicy; 3.5.3 WS-SecureConversation; 3.5.4 WS-Trust; 3.5.5 WS-Federation; 3.6 Windows Identity Foundation; 3.6.1 WIF Features; 3.6.1.1 Claims-Aware Applications; 3.6.1.2 Identity Delegation; 3.6.1.3 Custom Token Servers; 3.6.1.4 Step-Up Authentication; 3.7 Claims-Based Identity; 3.7.1 CBA Description and Overview; 3.7.1.1 Claims; 3.7.1.2 Token…”
Publicado 2013
Libro electrónico -
66Publicado 2018Tabla de Contenidos: “…Front Cover -- Bio-inspired Algorithms for Engineering -- Copyright -- Contents -- Preface -- Acknowledgments -- 1 Bio-inspired Algorithms -- 1.1 Introduction -- 1.1.1 Bio-inspired and evolutionary algorithms -- 1.2 Particle Swarm Optimization -- 1.3 Arti cial Bee Colony Algorithm -- 1.4 Micro Arti cial Bee Colony Algorithm -- 1.5 Differential Evolution -- 1.6 Bacterial Foraging Optimization Algorithm -- References -- 2 Data Classi cation Using Support Vector Machines Trained with Evolutionary Algorithms Employing Kernel Adatron -- 2.1 Introduction -- 2.2 Support Vector Machines -- 2.3 Evolutionary algorithms -- 2.4 The Kernel Adatron algorithm -- 2.5 Kernel Adatron trained with evolutionary algorithms -- 2.6 Results using benchmark repository datasets -- 2.7 Application to classify electromyographic signals -- 2.8 Conclusions -- References -- 3 Reconstruction of 3D Surfaces Using RBF Adjusted with PSO -- 3.1 Introduction -- 3.2 Radial basis functions -- 3.3 Interpolation of surfaces with RBF and PSO -- 3.3.1 Ellipsoid of covariance -- 3.3.2 RBF-PSO and ellipsoid of covariance to interpolate 3D point-clouds -- 3.3.3 Experimental results -- 3.4 Conclusion -- References -- 4 Soft Computing Applications in Robot Vision -- 4.1 Introduction -- 4.2 Image tracking -- 4.2.1 Normalized cross correlation -- 4.2.2 Continuous plane to image plane conversion -- 4.2.3 Algorithm implementation -- 4.2.4 Experiments -- 4.3 Plane detection -- 4.3.1 Description of the method -- 4.3.2 Simulations results -- 4.3.2.1 Outliers test -- 4.3.3 Noise test -- 4.3.4 Experiments -- 4.4 Conclusion -- References -- 5 Soft Computing Applications in Mobile Robotics -- 5.1 Introduction to mobile robotics -- 5.2 Nonholonomic mobile robot navigation -- 5.2.1 2D projective geometry -- 5.2.1.1 Representation of points -- 5.2.1.2 Representation of lines -- 5.2.1.3 Point line distance…”
Libro electrónico -
67Publicado 2009Tabla de Contenidos: “…. -- Visual Design, Development, and Quality Assurance -- Design Testing with Users (Again) -- 10, 9, 8, 7, 6, 5, 4, 3, 2, 1 ... Launch! -- Personal Advantage -- Support -- Network Opinion -- Postlaunch Activities -- Postlaunch Analytics -- Postlaunch Design Testing with Users (Again, Again) -- All Done, Right? …”
Libro electrónico -
68por Martín Sierra, Antonio J.Tabla de Contenidos: “…4.3.1 COMPONENTES DE LA TECNOLOGÍA JSF -- 4.3.2 ARQUITECTURA DE UNA APLICACIÓN JSF -- 4.3.2.1 EL CONTROLADOR -- 4.3.2.2 LA VISTA -- 4.3.2.3 EL MODELO -- 4.3.3 PROCESO DE CONSTRUCCIÓN DE UNA APLICACIÓN JSF -- 4.3.3.1 CONFIGURACIÓN DEL ENTORNO -- 4.3.3.2 LÓGICA DE NEGOCIO DE LA APLICACIÓN -- 4.3.3.3 BEAN GESTIONADOS -- 4.3.3.4 COMPONENTES DE LA INTERFAZ DE USUARIO -- 4.3.3.5 NAVEGACIÓN ENTRE PÁGINAS -- 4.3.4 AJAX EN APLICACIONES JSF -- 4.3.4.1 FUNCIONALIDAD AJAX EN JSF 2 -- APÉNDICE A. -- CARACTERÍSTICAS BÁSICAS DE XHTML -- ETIQUETAS HTML -- TIPOS DE ETIQUETAS -- ATRIBUTOS -- COMENTARIOS -- ESTRUCTURA DE UN DOCUMENTO XML -- PRINCIPALES ETIQUETAS DE XHTML -- ORGANIZACIÓN DE TEXTO -- FORMATO DEL TEXTO -- ENCABEZADOS -- SEPARADORES -- HIPERTEXTO -- LISTAS -- TABLAS -- IMÁGENES. -- FRAMES -- FORMULARIOS HTML -- EL FORMULARIO HTML -- LOS CONTROLES HTML -- CONTROL TEXT -- CONTROL TEXTAREA -- CONTROL PASSWORD -- CONTROL SUBMIT -- CONTROL BUTTON -- CONTROL CHECKBOX -- CONTROL RADIO -- CONTROL SELECT -- HOJAS DE ESTILO CSS -- TIPOS DE HOJAS DE ESTILO -- HOJAS DE ESTILO EXTERNAS -- HOJAS DE ESTILO INTERNAS -- HOJAS DE ESTILO EN LÍNEA -- APÉNDICE B -- FUNDAMENTOS SOBRE XML -- ¿QUÉ ES XML? …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
69por Lens, PietTabla de Contenidos: “…4.2.1.1 Structure and components -- 4.2.1.2 Electrochemical reactions in batteries -- 4.2.2 Battery performance metrics -- 4.2.2.1 Cell, module, and pack level -- 4.2.2.2 Energy density -- 4.2.2.3 Power density -- 4.2.2.4 Specific energy (or gravimetric energy density) -- 4.2.2.5 Specific power (or gravimetric power density) -- 4.2.2.6 Cycle life -- 4.2.2.7 Charge-discharge efficiency -- 4.2.2.8 Self-discharge rate -- 4.2.2.9 Operating temperature -- 4.2.2.10 Impedance -- 4.2.2.11 Round-trip efficiency -- 4.3 Types of Batteries -- 4.3.1 Nickel-cadmium batteries -- 4.3.2 Lead-acid batteries -- 4.3.2.1 Lead-acid battery composition -- 4.3.2.2 Working principle of lead acid battery -- 4.3.2.3 Market perspective -- 4.3.3 Lithium-ion batteries -- 4.3.3.1 Lithium-ion battery composition -- 4.3.3.2 Working principle of lithium-ion battery -- 4.3.3.3 Market perspective -- 4.3.4 Sodium-ion batteries -- 4.3.5 Zinc-air batteries -- 4.4 Supercapacitors -- 4.4.1 Principles and operations -- 4.4.1.1 Electric double-layer capacitance -- 4.4.1.2 Faradaic capacitance -- 4.4.2 Supercapacitor electrode materials -- 4.4.2.1 Electrode materials for EDLC -- 4.4.2.2 Electrode materials for pseudocapacitor -- 4.4.2.3 Electrode materials for hybrid supercapacitor -- 4.5 Types of Supercapacitors -- 4.5.1 Electrochemical double-layer capacitors -- 4.5.2 Pseudocapacitors -- 4.5.3 Hybrid capacitor -- 4.6 Applications of Batteries and Supercapacitors -- 4.6.1 Portable electronics and consumer applications -- 4.6.2 Mobility of the future -- 4.6.2.1 Electric vehicles and hybrid vehicles -- 4.6.2.2 Aerospace applications -- 4.6.3 New energy technologies -- 4.6.3.1 Renewable energy integration…”
Publicado 2023
Libro electrónico -
70Publicado 2025Tabla de Contenidos: “…4 Managing International Sport Federation Performance in a Glocalised World -- 4.1 From Growing Sport to Overall Performance -- 4.1.1 Societal Performance at the Heart of Organisational Performance -- 4.1.2 Towards New Reporting and Accountability Tools -- 4.2 Strategic Capacity -- 4.2.1 Power Structures -- 4.2.2 The Quality of the Federal Network -- 4.2.3 Federations' Business Sectors and Models -- 4.3 Operational Capacity -- 4.3.1 Key Success Factors -- 4.3.1.1 Professionalisation of Federation Management -- 4.3.1.2 Organisational Culture -- 4.3.1.3 The Partnership Approach -- 4.3.2 Failure Factors -- 4.3.2.1 Deficient Information Systems -- 4.3.2.2 Insufficient Control of Management Practices -- 4.3.2.3 Inertia Caused By Political Manoeuvring and Electoral Systems -- 4.4 Conclusion -- Notes -- Bibliography -- Chapter 5 The Financialisation and Regulation of Professional Team Sports -- 5.1 The Central Role of Regulation By Professional Leagues -- 5.1.1 Convergence Between American and European Approaches to Regulation -- 5.1.2 Success Factors for the Regulation of Professional Leagues -- 5.2 Professional Clubs' Performance Management -- 5.2.1 Geomarketing and Sources of Revenue: The Key Variable -- 5.2.2 Four Types of Expertise: Marketing, Managerial, Sporting, Social -- 5.2.2.1 Operationalising and Measuring the Independent Variables -- 5.2.2.2 The Model's Dependent Variables -- 5.3 New Growth Levers and Their Limits -- 5.3.1 For Clubs -- 5.3.1.1 Training and Transfers (Mostly Football) -- 5.3.1.2 Large Stadium/Multifunctional Arena -- 5.3.1.3 Shareholders and New International Investors -- 5.3.1.4 Listing On the Stock Exchange -- 5.3.1.5 Multi-Club Ownership of Professional Sports Clubs -- 5.3.1.6 Leisure and Entertainment Parks - From Real to Virtual -- 5.3.1.7 Diversifying Clubs' Brands -- 5.3.1.8 Internationalising the Brand…”
Libro electrónico -
71Publicado 2022Tabla de Contenidos: “…4.1.1.1 Setup -- 4.1.1.2 Implement the Native Module -- 4.1.1.3 Async Calls -- 4.1.2 Android Native Module -- 4.1.2.1 Setup -- 4.1.2.2 Implement the Native Module -- 4.1.2.3 Register the Native Module -- 4.1.2.4 Async Calls -- 4.1.3 Use the Native Module in JavaScript -- 4.1.4 Key Takeaways -- 4.2 Native Components -- 4.2.1 iOS Native Component -- 4.2.1.1 Setup -- 4.2.1.2 Implement the View Manager -- 4.2.1.3 View Property -- 4.2.2 Android Native Component -- 4.2.2.1 Setup -- 4.2.2.2 Implement the View Manager -- 4.2.2.3 View Property -- 4.2.3 Use the Native Component in JavaScript -- 4.2.3.1 The Easy Way -- 4.2.3.2 The Right Way, Abstraction on the JavaScript Layer -- 4.2.4 Children of a Native Component -- 4.2.5 Key Takeaways -- 4.3 Advanced Techniques -- 4.3.1 Event -- 4.3.1.1 Send Events from iOS -- 4.3.1.2 Send Events from Android -- 4.3.1.3 Receive Events in JavaScript -- 4.3.2 React Tag -- 4.3.2.1 React Refs -- 4.3.2.2 React Tags -- 4.3.2.3 Reconcile React Tag Implementation on JavaScript -- 4.3.3 Direct Manipulation -- 4.3.4 Synchronous Method Call -- 4.3.5 Export Constants -- 4.3.5.1 iOS -- 4.3.5.2 Android -- 4.3.5.3 Access Constants in JavaScript -- 4.3.6 Initial Properties -- 4.3.7 Dependency Injection -- 4.3.8 Key Takeaways -- 4.4 Exception Handling -- 4.5 Case Study - a Video Component -- 4.5.1 iOS Implementation of a Video Component -- 4.5.2 Android Implementation of a Video Component -- 4.5.3 JavaScript Layer -- 4.5.3.1 Native Component Wrapper -- 4.5.3.2 View Manager Wrapper -- 4.5.3.3 Video Feed -- 4.5.3.4 Ref Forwarding -- 4.5.3.5 Video Feed in Moment -- 4.5.4 Reinforced Video Component -- 4.5.4.1 Protect the iOS Component -- 4.5.4.2 Protect the Android Component -- 4.5.4.3 JavaScript Layer -- 4.6 Summary -- Chapter 5: Network Programming -- 5.1 A Very Brief Introduction to TCP/IP -- 5.1.1 TCP…”
Libro electrónico -
72por Tokarski, Kim OliverTabla de Contenidos: “…4.3.2 Einstellung der Bevölkerung zur Blockchain-basierten E-ID -- 4.3.2.1 Vertrauen in den Staat -- 4.3.2.2 Wahrnehmung und Einordnung der digitalen ID -- 4.3.2.3 Anwendungsbereiche der digitalen ID im öffentlichen Sektor und in der digitalen Demokratie -- 4.3.2.4 Vorkenntnisse und Einstellung gegenüber der Blockchain-Technologie -- 4.3.2.5 Einstellung gegenüber der Self-Sovereign Identity -- 4.3.2.6 Einstellung gegenüber einer digitalen ID auf Basis von Blockchain-Technologie -- 4.3.2.7 Abstimmungsabsicht bezüglich einer staatlichen und Blockchain-basierten ID-Lösung -- 4.3.2.8 Gründe für und gegen eine staatliche und Blockchain-basierte ID-Lösung -- 4.3.2.9 Einfluss der Kompetenz auf den Zustimmungsgrad -- 4.4 Schlussfolgerungen -- Literatur -- 5: Hackathon als Open Innovation in der öffentlichen Verwaltung -- 5.1 Einleitung -- 5.1.1 Zielsetzung -- 5.2 Theoretische Grundlagen -- 5.2.1 Open Government -- 5.2.2 Open Innovation (OI) -- 5.2.3 Innovation in der öffentlichen Verwaltung -- 5.3 Hackathon - von der Idee zur praktischen Umsetzung -- 5.3.1 Begriffsdefinition -- 5.3.2 Merkmale und Design -- 5.3.3 Civic Hackathons -- 5.3.3.1 Data Hackdays BE 2021 -- 5.3.3.2 #WirVsVirus und Update Deutschland -- 5.3.3.3 Versus Virus -- 5.3.4 Nutzen -- 5.3.5 Verbesserungen -- 5.3.6 Ergebnisse weiterführen -- 5.3.7 Kritik und Herausforderungen -- 5.4 Ergebnisse -- 5.4.1 Forschungsfrage -- 5.4.2 Innovationsfähigkeit -- 5.4.3 Vorbereitung und Unterstützung -- 5.4.4 Daten und Tools -- 5.4.5 Hackathon Design -- 5.4.6 Umsetzung der Ergebnisse -- 5.5 Fazit und Ausblick -- Literatur -- 6: Digitale Transformation = mehr Nachhaltigkeit in der Logistik? …”
Publicado 2024
Libro electrónico -
73por Verduzco Reina, Carlos JavierTabla de Contenidos: “….) -- AUTOEVALUACIÓN -- UNIDAD 7: PERSONAS -- ACTIVIDAD DE APRENDIZAJE 1 -- 7.1 CONCEPTO -- 7.2 CLASES -- 7.3 PERSONA FÍSICA -- 7.3.1 ATRIBUTOS -- 7.3.1.1 NOMBRE -- 7.3.1.2 DOMICILIO -- 7.3.1.3 PATRIMONIO -- 7.3.1.4 ESTADO CIVIL -- 7.3.1.5 NACIONALIDAD -- 7.3.2 CAPACIDAD -- 7.3.2.1 CAPACIDAD JURÍDICA -- 7.3.2.2 CAPACIDAD LEGAL -- 7.4 PERSONA MORAL -- 7.4.1 CONCEPTO -- 7.4.2 FORMA DE CREACIÓN Y EL NACIMIENTO -- 7.4.3 CLASES -- 7.4.3.1 ASOCIACIONES, FUNDACIONES Y CORPORACIONES -- 7.4.3.2 PERSONAS JURÍDICAS PÚBLICAS Y PRIVADAS -- 7.4.3.2.1 PERSONAS JURÍDICAS PÚBLICAS -- 7.4.3.2.2 PERSONAS JURÍDICAS PRIVADAS -- 7.4.3.2.3 PERSONAS JURÍDICAS NACIONALES (...) -- 7.4.4 OBJETO -- 7.4.5 DOMICILIO…”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
74Publicado 2023Tabla de Contenidos: “…Table of contents -- List of Tables and Figures xi -- Acknowledgements xiii -- General introduction xv -- Part I Commitment: A literature review -- 1 Enunciation Theory and Linguistic Polyphony 3 -- 1.1 Introduction 3 -- 1.2 Enunciation Theory 4 -- 1.2.1 Enunciation Theory and endorsement 5 -- 1.3 Linguistic polyphony 8 -- 1.3.1 Ducrot's (1984) linguistic polyphony 9 -- 1.3.2 The ScaPoLine: Linguistic polyphony and responsibility 12 -- 1.4 Conclusion 15 -- 2 Speech Act Theory 17 -- 2.1 Introduction 17 -- 2.2 Definitions of commitment in Speech Act Theory 19 -- 2.3 Speech acts and commitment 20 -- 2.3.1 Commissives 21 -- 2.3.2 Assertives 22 -- 2.3.3 Directives 25 -- 2.4 Illocutionary-force indicators and commitment 26 -- 2.5 Conclusion 28 -- 3 Studies on dialogue and argumentation 33 -- 3.1 Introduction 33 -- 3.2 Approaches and definitions of commitment 34 -- 3.2.1 Hamblin 34 -- 3.2.2 Walton 37 -- 3.2.3 Beyssade and Marandin 39 -- 3.2.4 Gunlogson 40 -- 3.2.5 Malamud and Stephenson 43 -- 3.2.6 Becker 45 -- 3.3 Conclusion 47 -- 4 Relevance Theory 51 -- 4.1 Introduction 51 -- 4.2 Relevance Theory 51 -- 4.2.1 Relevance and cognition 52 -- 4.2.2 Relevance and communication 54 -- 4.3 Relevance-theoretic approaches to commitment 60 -- 4.3.1 Indirect approaches: Assertion 61 -- 4.3.2 Indirect approaches: Modality and evidentiality 64 -- 4.3.2.1 Epistemic modality 64 -- 4.3.2.2 Evidentiality 69 -- 4.3.3 Direct approaches 75 -- 4.4 Conclusion 79 -- 5 Commitment in linguistics: A summary 83 -- 5.1 Literature on commitment 83 -- 5.2 Remaining questions 84 -- 5.3 The need for a unified account of commitment 85 -- Part II A new take on commitment -- 6 Modelling commitment 89 -- 6.1 Introduction 89 -- 6.2 A hearer-oriented approach 90 -- 6.3 Focusing on explicatures: A graded conception 90 -- 6.4 A relevance-theoretic perspective 92 -- 6.4.1 Higher-level explicatures 94 -- 6.4.2 Strength of assumptions 97 -- 6.5 Epistemic vigilance 108 -- 6.5.1 Graded mechanisms 109 -- 6.5.2 Understanding and believing 109 -- 6.5.3 Epistemic vigilance and the relevance-guided -- comprehension procedure 112 -- 6.5.4 Vigilance towards the content 113 -- 6.5.5 Vigilance towards the source of information 118 -- 6.5.6 Concluding remarks 119 -- 6.6 An alternative account of commitment 120 -- 6.7 A commitment typology 123 -- 6.8 Conclusion 126 -- 7 Theoretical predictions of the model 129 -- 7.1 Introduction 129 -- 7.2 Linguistic markers of certainty 129 -- 7.2.1 Plain assertions, epistemic modals and evidential expressions 130 -- 7.2.2 Experimental literature on linguistic markers of certainty 134 -- 7.2.3 Prediction 139 -- 7.3 The source of information's reliability 141 -- 7.3.1 Competence and benevolence 142 -- 7.3.2 Reported speech and the ad verecundiam fallacy 146 -- 7.3.3 Experimental literature on the source of information's perceived reliability 149 -- 7.3.4 Prediction 154 -- 7.4 The salience of the piece of information 158 -- 7.4.1 Manifestness, accessibility and salience 159 -- 7.4.2 The linguistic literature on salience 160 -- 7.4.3 An alternative definition of salience 161 -- 7.4.4 Experimental literature on salience 166 -- 7.4.5 Prediction 168 -- 7.5 Conclusion 170 -- Part III Testing a new model of commitment -- 8 Experimental pragmatics and memory tasks 173 -- 8.1 Experimental pragmatics 173 -- 8.2 Literature review on memory tasks 174 -- 8.2.1 Memory 174 -- 8.2.2 Remembering and memory tasks 175 -- 8.2.3 Recall and recognition paradigms: A survey 176 -- 8.3 Linguistic phenomena affecting recall and recognition 178 -- 8.4 Conclusion 181 -- 9 Three experimental studies 185 -- 9.1 Linguistic markers of certainty 185 -- 9.1.1 Study 1a 185 -- 9.1.2 Study 1b 191 -- 9.2 The source of information 194 -- 9.2.1 Study 2a 194 -- 9.2.2 Study 2b 197 -- 9.2.3 Study 2c 200 -- 9.3 The salience of the piece of information 204 -- 9.3.1 Study 3a 204 -- 9.3.2 Study 3b 207 -- 9.4 Conclusion 209 -- 10 General discussion 211 -- 10.1 Commitment from a pragmatic perspective 211 -- 10.2 Commitment from a cognitive perspective 213 -- 10.3 Commitment from an experimental perspective 214 -- 10.4 Three predictions about commitment 215 -- 10.5 The results of the three recognition studies 216 -- 10.6 Conclusion 219 -- General conclusion 221 -- References 227.…”
Libro electrónico -
75Publicado 2019Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
Libro electrónico -
76por Devlin, NancyTabla de Contenidos: “…Intro -- Foreword by Michael Drummond -- Foreword by Kim Rand -- Preface -- Acknowledgements -- Contents -- About the Editors -- Contributors -- Chapter 1: The Development of the EQ-5D-5L and its Value Sets -- 1.1 The EQ-5D as an Instrument for Measuring and Valuing Health -- 1.2 The Development of the EQ-5D-5L -- 1.3 The need for EQ-5D-5L Values -- 1.4 The Aims of this Book -- References -- Chapter 2: The Development and Strengthening of Methods for Valuing EQ-5D-5L - An Overview -- 2.1 Development of the EQ-VT Protocol -- 2.2 Description of the EQ-VT Protocol -- 2.2.1 Contents of the Protocol -- 2.2.2 Why the cTTO Task was Adopted -- 2.2.3 Why the DCE Task was Adopted -- 2.2.4 Value Set Generation -- 2.3 How the EQ-VT Protocol Updates Evolved -- 2.4 Lessons Learned -- 2.5 Concluding Remarks -- References -- Chapter 3: Experimental Design for the Valuation of the EQ-5D-5L -- 3.1 Introduction -- 3.2 EQ-VT Designs -- 3.2.1 cTTO Design -- 3.2.2 DCE Design -- 3.2.3 Other Considerations -- 3.3 Alternative cTTO Designs -- 3.4 Future Research -- Appendices -- Appendix A: Construction for Level Balance Optimisation Criterion -- Appendix B: The cTTO design of the EQ-VT -- Appendix C: The DCE design of the EQ-VT -- Appendix D: The Design Used in the Peruvian EQ-5D-5L Valuation Study -- References -- Chapter 4: EQ-5D-5L Value Set Summaries -- 4.1 Introduction -- 4.2 Methods -- 4.3 Country-by-Country Overview of Value Sets -- 4.3.1 Wave 1 -- 4.3.1.1 Country/Region: Canada (Table 4.1) -- 4.3.1.2 Country/Region: China (Table 4.5) -- 4.3.1.3 Country/Region: England (Table 4.9) -- 4.3.1.4 Country/Region: Netherlands (Table 4.13) -- 4.3.1.5 Country/Region: Spain (Table 4.17) -- 4.3.2 Wave 2 -- 4.3.2.1 Country/Region: Japan (Table 4.21) -- 4.3.2.2 Country/Region: Korea (Table 4.25) -- 4.3.2.3 Country/Region: Thailand (Table 4.29)…”
Publicado 2022
Libro electrónico -
77Publicado 2023Tabla de Contenidos: “…Caso Gran Colombia Gold y Asociación La Mesa Minera Segovia Remedios -- 4.3.2.1. Antecedentes -- 4.3.2.2. Logros y beneficios -- 4.3.2.3. …”
Libro electrónico -
78Publicado 2017Tabla de Contenidos: “…3.6.2.4 Final Remarks -- 3.6.3 EXAMPLES -- LIST OF ABBREVIATIONS AND SYMBOLS -- Acknowledgments -- REFERENCES -- 4 - Absorption of Sound in Seawater -- 4.1 PHYSICS AND PHENOMENA -- 4.2 EXPERIMENTAL DATA -- 4.2.1 ABSORPTION PRESSURE DEPENDENCE -- 4.2.2 ABSORPTION TEMPERATURE DEPENDENCE -- 4.2.3 PH DEPENDENCE OF ABSORPTION -- 4.2.4 SALINITY DEPENDENCE -- 4.3 SOUND ABSORPTION MECHANISMS -- 4.3.1 SOUND ABSORPTION IN FRESHWATER -- 4.3.2 MOLECULAR CHEMICAL RELAXATION PROCESSES -- 4.3.2.1 Temperature Dependence -- 4.3.2.2 Pressure Effects -- 4.4 FORMULAS AND EXPRESSIONS -- 4.4.1 FRANCOIS AND GARRISON EQUATION FOR SOUND ABSORPTION IN SEAWATER -- 4.4.1.1 Boric Acid Coefficients -- 4.4.1.2 Magnesium Sulfate Coefficients -- 4.4.1.3 Pure Water Contribution -- 4.4.2 AINSLIE AND MCCOLM SIMPLIFIED EQUATION FOR SOUND ABSORPTION IN SEAWATER -- 4.5 SYMBOLS AND ABBREVIATIONS -- REFERENCES -- 5 - Scattering of Sound -- 5.1 PHYSICS AND PHENOMENA -- 5.2 SCATTERING FROM POINT-LIKE OBJECTS -- 5.2.1 SINGLE OBJECTS -- 5.2.1.1 Rigid and Elastic Spheres -- 5.2.1.2 Gas Bubbles -- 5.2.1.3 Single Fish -- 5.2.1.4 Canonically Shaped Objects -- 5.2.1.5 Submarines -- 5.2.2 MULTIPLE OBJECTS -- 5.2.2.1 Fish Schools -- 5.2.2.2 Bubble Clouds -- 5.2.2.3 Deep Scattering Layer -- 5.2.2.4 Suspended Sediments -- 5.3 SCATTERING FROM EXTENDED, NEARLY PLANE, ROUGH SURFACES -- 5.3.1 BRAGG SCATTERING -- 5.3.2 REFLECTION FROM FACETS -- 5.3.3 LAMBERT'S LAW -- 5.3.4 SCATTERING FROM THE SEA SURFACE -- 5.3.5 SCATTERING FROM THE SEABED -- 5.4 THEORETICAL BASIS FOR SCATTERING CALCULATIONS -- 5.4.1 THE PERTURBATION APPROXIMATION -- 5.4.2 THE HELMHOLTZ-KIRCHHOFF METHOD -- 5.4.3 SCATTERING FROM SURFACES WITH TWO SCALES OF ROUGHNESS -- 5.5 SCATTERING FROM CURVED, ROUGH SURFACES -- 5.6 REVERBERATION -- 5.7 SYMBOLS AND ABBREVIATIONS -- REFERENCES -- 6 - Ambient Noise -- 6.1 PHYSICS AND PHENOMENA…”
Libro electrónico -
79Publicado 2021Tabla de Contenidos: “…4.3.1.1 Private Cloud -- 4.3.1.2 Public Cloud -- 4.3.1.3 Hybrid Cloud -- 4.3.1.4 Community Cloud -- 4.3.2 Service Models for Cloud Computing -- 4.3.2.1 Software as a Service (SaaS) -- 4.3.2.2 Platform as a Service (PaaS) -- 4.3.2.3 Infrastructure as a Service (IaaS) -- 4.3.3 Data Analytics on Cloud -- 4.4 Cloud-Based IoT Data Analytics Platform -- 4.4.1 Atos Codex -- 4.4.2 AWS IoT -- 4.4.3 IBM Watson IoT -- 4.4.4 Hitachi Vantara Pentaho, Lumada -- 4.4.5 Microsoft Azure IoT -- 4.4.6 Oracle IoT Cloud Services -- 4.5 Machine Learning for IoT Analytics in Cloud -- 4.5.1 ML Algorithms for Data Analytics -- 4.5.2 Types of Predictions Supported by ML and Cloud -- 4.6 Challenges for Analytics Using Cloud -- 4.7 Conclusion -- References -- Chapter 5 Deep Learning Architectures for IoT Data Analytics -- 5.1 Introduction -- 5.1.1 Types of Learning Algorithms -- 5.1.1.1 Supervised Learning -- 5.1.1.2 Unsupervised Learning -- 5.1.1.3 Semi-Supervised Learning -- 5.1.1.4 Reinforcement Learning -- 5.1.2 Steps Involved in Solving a Problem -- 5.1.2.1 Basic Terminology -- 5.1.2.2 Training Process -- 5.1.3 Modeling in Data Science -- 5.1.3.1 Generative -- 5.1.3.2 Discriminative -- 5.1.4 Why DL and IoT? …”
Libro electrónico -
80Publicado 2019Tabla de Contenidos: “…4.2.2.2 ICA Method -- 4.2.2.3 DVA Method -- 4.3 Model‐Based Methods -- 4.3.1 Adaptive State Estimation Methods -- 4.3.2 Data‐Driven Methods -- 4.3.2.1 Empirical and Fitting Methods -- 4.3.2.2 Response Surface‐Based Optimization Algorithms -- 4.3.2.3 Sample Entropy Methods -- 4.4 Joint Estimation Method -- 4.4.1 Relationship Between SOC and Capacity -- 4.4.2 Case Study -- 4.5 Dual Estimation Method -- 4.5.1 Implementation with the AEKF Algorithm -- 4.5.2 SOC-SOH Estimation -- 4.5.3 Case Study -- 4.6 Summary -- References -- Chapter 5 Battery State of Power Estimation -- 5.1 Background -- 5.2 Instantaneous SOP Estimation Methods -- 5.2.1 HPPC Method -- 5.2.2 SOC‐Limited Method -- 5.2.3 Voltage‐Limited Method -- 5.2.4 MCD Method -- 5.2.5 Case Study -- 5.3 Continuous SOP Estimation Method -- 5.3.1 Continuous Peak Current Estimation -- 5.3.2 Continuous SOP Estimation -- 5.3.3 Influences of Battery States and Parameters on SOP Estimation -- 5.3.3.1 Uncertainty of SOC -- 5.3.3.2 Case Study -- 5.3.3.3 Uncertainty of Model Parameters -- 5.3.3.4 Case Study -- 5.3.3.5 Uncertainty of SOH -- 5.4 Summary -- References -- Chapter 6 Battery Charging -- 6.1 Background -- 6.2 Basic Terms for Evaluating Charging Performances -- 6.2.1 Cell and Pack -- 6.2.2 Nominal Ampere‐Hour Capacity -- 6.2.3 C‐rate -- 6.2.4 Cut‐off Voltage for Discharge or Charge -- 6.2.5 Cut‐off Current -- 6.2.6 State of Charge -- 6.2.7 State of Health -- 6.2.8 Cycle Life -- 6.2.9 Charge Acceptance -- 6.2.10 Ampere‐Hour Efficiency -- 6.2.11 Ampere‐Hour Charging Factor -- 6.2.12 Energy Efficiency -- 6.2.13 Watt‐Hour Charging Factor -- 6.2.14 Trickle Charging -- 6.3 Charging Algorithms for Li‐Ion Batteries -- 6.3.1 Constant Current and Constant Voltage Charging -- 6.3.2 Multistep Constant Current Charging -- 6.3.3 Two‐Step Constant Current Constant Voltage Charging…”
Libro electrónico