Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Politics 74
- Sociology 72
- Political Science 62
- Philosophy 52
- Historia 48
- Cultural Studies 47
- Culture 47
- Literatura alemana 45
- History 38
- Data processing 35
- WebSphere 35
- Society 34
- Computer programs 33
- Història 33
- Media 33
- Cultural History 29
- Literature 28
- Body 26
- Management 25
- Political Sociology 25
- Political Theory 25
- Biblia 24
- Computer networks 24
- Artificial intelligence 23
- Literary Studies 23
- Education 22
- Filosofía 22
- Political Philosophy 22
- Development 21
- Media Studies 21
-
2361
-
2362
-
2363
-
2364
-
2365
-
2366
-
2367
-
2368
-
2369
-
2370
-
2371
-
2372por Ramírez, MarleniTabla de Contenidos: “…COMPENSACIONES POR MÉRITO -- 5.2.7. COMPENSACIONES POR POTENCIAL -- 5.3. DIFERENCIAS ENTRE SISTEMAS BASADOS EN PUESTOS Y EN RENDIMIENTO -- RESUMEN DE LA UNIDAD V -- ACTIVIDADES DE LA UNIDAD V -- EJERCICIO DE AUTOEVALUACIÓN DE LA UNIDAD V -- BIBLIOGRAFÍA DE LA UNIDAD V -- UNIDAD VI: PRESTACIONES SOCIALES EN LA ORGANIZACIÓN -- 6.1. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2373por Prieto Herrera, Jorge EliécerTabla de Contenidos: “…Evaluación social (precios sociales) -- 5.4.7. Evaluación de impacto (precios de mercado más precios sociales) -- 5.4.8. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2374Publicado 2018Tabla de Contenidos: “…Uso de la información contenida en el registro web. -- Artículo 1.2.1.5.1.7. Solicitud para la calificación como entidad perteneciente al Régimen Tributario Especial…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2375Publicado 2022Tabla de Contenidos: “…7.3.3 The IEEE 802.11 Frame -- 7.3.4 Mobility in the Same IP Subnet -- 7.3.5 Advanced Features in 802.11 -- 7.3.6 Personal Area Networks: Bluetooth -- 7.4 Cellular Networks: 4G and 5G -- 7.4.1 4G LTE Cellular Networks: Architecture and Elements -- 7.4.2 LTE Protocols Stacks -- 7.4.3 LTE Radio Access Network -- 7.4.4 Additional LTE Functions: Network Attachment and Power Management -- 7.4.5 The Global Cellular Network: A Network of Networks -- 7.4.6 5G Cellular Networks -- 7.5 Mobility Management: Principles -- 7.5.1 Device Mobility: a Network-layer Perspective -- 7.5.2 Home Networks and Roaming on Visited Networks -- 7.5.3 Direct and Indirect Routing to/from a Mobile Device -- 7.6 Mobility Management in Practice -- 7.6.1 Mobility Management in 4G/5G Networks -- 7.6.2 Mobile IP -- 7.7 Wireless and Mobility: Impact on Higher-Layer Protocols -- 7.8 Summary -- Homework Problems and Questions -- Wireshark Lab: WiFi -- Interview: Deborah Estrin -- Chapter 8: Security in Computer Networks -- 8.1 What Is Network Security? …”
Libro electrónico -
2376Publicado 2005Tabla de Contenidos: “…Technology options -- 7.1 Client-side technologies -- 7.1.1 Devices -- 7.1.2 Operating systems -- 7.1.3 Device Platforms/Frameworks -- 7.2 Server-side technologies -- 7.2.1 Services -- 7.2.2 Java-based technologies -- 7.3 The mobile Web -- 7.3.1 HTML -- 7.3.2 cHTML -- 7.3.3 XML -- 7.3.4 XML Device-Independent Markup Extensions (XDIME) -- 7.3.5 XForms -- 7.3.6 XHTML 1.1 (HTML 4.01) -- 7.3.7 XSLT -- 7.3.8 WML -- 7.3.9 SyncML DS and DM -- 7.3.10 VoiceXML and X+V -- 7.4 Connectivity technologies -- 7.4.1 Wireless technologies -- 7.4.2 Wired technologies -- 7.4.3 Issues with connectivity -- 7.5 IBM-specific pevasive-related technologies -- 7.5.1 Service Management Framework (SMF) -- 7.5.2 Workplace Client Technology, Micro Edition (WCTME) -- 7.5.3 Extension Services for WebSphere Everyplace (ESWE) -- Chapter 8. …”
Libro electrónico -
2377Publicado 2021Tabla de Contenidos: “…5.3.6 Data-oriented interface design using identity hubs (encrypted data vaults) -- 5.3.7 Message-oriented interface design using agents -- 5.4 Layer 3: Credentials -- 5.4.1 JSON Web Token (JWT) format -- 5.4.2 Blockcerts format -- 5.4.3 W3C verifiable credential formats -- 5.4.4 Credential exchange protocols -- 5.5 Layer 4: Governance frameworks -- 5.6 Potential for convergence -- References -- 6 Basic cryptography techniques for SSI -- 6.1 Hash functions -- 6.1.1 Types of hash functions -- 6.1.2 Using hash functions in SSI -- 6.2 Encryption -- 6.2.1 Symmetric-key cryptography -- 6.2.2 Asymmetric-key cryptography -- 6.3 Digital signatures -- 6.4 Verifiable data structures -- 6.4.1 Cryptographic accumulators -- 6.4.2 Merkle trees -- 6.4.3 Patricia tries -- 6.4.4 Merkle-Patricia trie: A hybrid approach -- 6.5 Proofs -- 6.5.1 Zero-knowledge proofs -- 6.5.2 ZKP applications for SSI -- 6.5.3 A final note about proofs and veracity -- References -- 7 Verifiable credentials -- 7.1 Example uses of VCs -- 7.1.1 Opening a bank account -- 7.1.2 Receiving a free local access pass -- 7.1.3 Using an electronic prescription -- 7.2 The VC ecosystem -- 7.3 The VC trust model -- 7.3.1 Federated identity management vs. …”
Libro electrónico -
2378por Al-Turjman, FadiTabla de Contenidos: “…2.5.3 Priority Algorithm -- 2.5.4 Bin-Packing Algorithm -- 2.6 Usage of Cloud and IoT in COVID-19 -- 2.6.1 Application of Cloud Service -- 2.6.2 Health Care Segment -- 2.6.3 Tracking the Spread -- 2.6.4 Diagnosis -- 2.7 Security of the Allocation of Resources -- 2.7.1 Security Aspect -- 2.7.1.1 Confidentiality and Authentication -- 2.7.1.2 Privacy -- 2.7.1.3 Time-Necessity -- 2.7.1.4 Availability -- 2.7.1.5 Trust -- 2.7.1.6 Predication and Intrusion Detection -- 2.7.2 Security Issues and Challenges -- 2.7.2.1 Data Protection in Cloud Environments -- 2.7.2.2 Authentication of User and Management Access -- 2.7.2.3 Lack of Visibility of Cloud Services -- 2.7.2.4 Absence of Control over Cloud Infrastructure -- 2.8 Open Research and Discussion -- 2.9 Conclusion -- References -- Chapter 3 Analyzing Radiographs for COVID-19 Using Artificial Intelligence -- 3.1 Introduction -- 3.2 Related Work -- 3.3 Dataset -- 3.4 Data Augmentation -- 3.5 Models -- 3.5.1 VGG-16 -- 3.5.2 VGG-19 -- 3.5.3 Custom Model -- 3.5.4 SVM -- 3.5.4.1 Grey Level Co-Occurrence Matrix -- 3.5.4.2 Grey Level Size Zone Matrix -- 3.5.4.3 Discrete Wavelet Transform -- 3.5.5 Modified CNN -- 3.5.5.1 Input Layer -- 3.5.5.2 Convolution Layer -- 3.5.5.3 Batch Normalization Layer -- 3.5.5.4 Rectified Linear Unit Layer -- 3.5.5.5 Fully Connected layer -- 3.5.5.6 SoftMax Layer -- 3.5.5.7 Output -- 3.6 Result and Analysis -- 3.6.1 VGG-16 -- 3.6.2 VGG-19 -- 3.6.3 Custom Model -- 3.6.4 SVM -- 3.6.5 Modified CNN -- 3.7 Activation Maps -- 3.8 Conclusion -- References -- Chapter 4 IoT-Based Micro-Expression Recognition for Nervousness Detection in COVID-Like Condition -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Methodology -- 4.3.1 Algorithm -- 4.3.2 Datasets -- 4.3.3 Performance Parameters -- 4.4 Experimental Results -- 4.4.1 Accuracy -- 4.5 Conclusion -- References…”
Publicado 2021
Libro electrónico -
2379por Hodler, JuergTabla de Contenidos: “…7.3.1.1 Anterior Cruciate Ligament -- 7.3.1.2 Posterior Cruciate Ligament -- 7.3.2 Medial Collateral Ligament -- 7.3.3 Posterolateral Corner -- 7.3.4 Posteromedial Corner -- 7.3.5 Anterolateral Ligament -- 7.3.6 Iliotibial Tract -- 7.4 Tendons -- 7.4.1 Extensor Mechanism -- 7.5 Cartilage -- 7.5.1 Chondral Lesions -- 7.6 Concluding Remarks -- References -- 8: Ankle and Foot -- 8.1 Tendon Pathology -- 8.1.1 Anatomy and Pathophysiology -- 8.1.2 Ankle Tendon Compartments -- 8.2 Bone Injuries -- 8.3 Lisfranc Joint Injuries -- 8.4 Turf Toe/Plantar Plate Injuries -- 8.5 Ankle Ligament Injuries -- 8.5.1 Lateral Collateral Ligament Complex -- 8.5.2 Medial Collateral Ligament Complex -- 8.5.3 Tibiofibular Syndesmosis -- 8.6 Osteochondral Lesions of the Ankle -- 8.7 Ankle Impingement Syndromes -- 8.7.1 Anterolateral Impingement Syndrome -- 8.7.2 Anterior Impingement Syndrome -- 8.7.3 Posterior Impingement Syndrome -- 8.8 Nerve Entrapment -- 8.8.1 Tarsal Tunnel Syndrome -- 8.8.2 Baxter Neuropathy -- 8.8.3 Jogger's Foot -- 8.8.4 Morton Neuroma -- 8.9 Concluding Remarks -- References -- 9: Postoperative Knee and Shoulder -- 9.1 Postoperative MRI of the Knee -- 9.2 Ligament Surgery -- 9.2.1 Anterior Cruciate Ligament -- 9.2.2 Other Ligaments -- 9.3 Meniscal Surgery -- 9.3.1 Partial Meniscectomy and Meniscal Repair -- 9.3.2 Root Repair and Meniscal Transplant -- 9.4 Articular Cartilage Surgery -- 9.4.1 Marrow Stimulation -- 9.4.2 Osteochondral Grafting -- 9.4.3 Cellular Repair -- 9.5 Postoperative MRI of the Shoulder -- 9.6 MRI Technique -- 9.7 Imaging Following Rotator Cuff Repair -- 9.7.1 Normal MRI Findings After Rotator Cuff Repair -- 9.7.2 Abnormal MRI Findings After Rotator Cuff Repair -- 9.8 Imaging Following Superior Labral Surgery -- 9.8.1 Normal MRI Findings After Superior Labral Surgery…”
Publicado 2021
Libro electrónico -
2380por van Wyk Kruger, GerritTabla de Contenidos: “…5.23.3 Epictetus -- 5.23.4 Ploutarchos -- 5.23.5 Flavius Josephus -- 5.23.6 Diodorus Siculus -- 5.23.7 Pausanias -- 5.23.8 Ménandros -- 5.23.9 Kallimachos -- 5.23.10 Apollonius Rhodius -- 5.23.11 Aratos -- 5.23.12 Babrius -- 5.23.13 Diogenes Laërtius -- 5.23.14 Flavius Philostratus -- 5.23.15 Timaeus -- 5.23.16 Appianus -- 5.23.17 Cassius Dio -- 5.23.18 Posidonius -- 5.23.19 Archimedes -- 5.23.20 Claudius Ptolemaeus -- 5.23.21 Marcus Aurelius -- 5.23.22 Publius Aelius Aristides -- 5.23.23 Libanius -- 5.23.24 Themistius -- 5.23.25 Himerius -- 5.23.26 Theophrastos -- 5.23.27 Athenaeus van Naukratis -- 5.23.28 Johannes Stobeús -- 5.23.29 Dionusius van Halikarnassos -- 5.23.30 Krates van Mallos -- 5.23.31 Hêsuchios -- 5.23.32 Dionusius Thrax -- 6. …”
Publicado 2017
Libro electrónico