Mostrando 201 - 220 Resultados de 229 Para Buscar '"Daisy"', tiempo de consulta: 0.09s Limitar resultados
  1. 201
    Publicado 2015
    Tabla de Contenidos: “…; Monsieur Poisson and the Mysterious Number 37; Clumps in Space; Final Word; Chapter 4: Backward Probabilities: The Reverend Bayes to Our Rescue; Driving Miss Daisy; Bayes, Balls, and Boys (and Girls); Bayes and My Green Card; Objection Your Honor; Ornithology; Final Word…”
    Libro electrónico
  2. 202
    Publicado 2012
    Tabla de Contenidos: “…Temporality and trauma in American sci-fi television / Aris Mousoutzanis -- The fear of the future and the pain of the past: the quest to cheat time in Heroes, FlashForward, and Fringe / Melissa Ames -- Lost in our middle hour: faith, fate, and redemption post-9/11 / Sarah Himsel Burcon -- "New beginnings only lead to painful ends": "undeading" and fear of consequences in Pushing daisies / Kasey Butcher -- The functions of time: analyzing the effects of nonnormative narrative structure(s). …”
    Libro
  3. 203
    Publicado 2019
    Libro electrónico
  4. 204
    por Ball, Stuart R., 1956-
    Publicado 2002
    Tabla de Contenidos: “…Interrupts in Embedded Systems; Interrupt Basics; Interrupt Vectors; Edge- and Level-Sensitive Interrupts; Interrupt Priority; Interrupt Hardware; Interrupt Bus Cycles; Daisy-Chained Interrupts; Other Types of Interrupts; Using Interrupt Hardware; Interrupt Software; Interrupt Service Mechanics; Nested Interrupts; Passing Data to or from the ISR…”
    Libro electrónico
  5. 205
    por Snoyman, Michael
    Publicado 2012
    Libro electrónico
  6. 206
    Publicado 2016
    Tabla de Contenidos: “…Surmising SwitchesPlanning the Network Topology; Planning the TCP/IP Implementation; Drawing Diagrams; More Questions Your Network Plan Should Address; Chapter 3: Installing Network Hardware; Working with Cable; Installing Switches; Daisy-Chaining Switches; Chapter 4: Setting Up a Server; The Many Ways to Install a Server Operating System; Gathering Your Stuff; Making Informed Decisions; Final Preparations; Installing a Server operating system; Configuring Your Server; Chapter 5: Configuring Windows Clients; Configuring Network Connections; Joining a Domain; Chapter 6: Mac Networking…”
    Libro electrónico
  7. 207
    Publicado 2016
    Tabla de Contenidos: “…; All about Cable; Working with Switches; Daisy-Chaining Switches; Using a Router; Chapter 7: Configuring Windows Clients…”
    Libro electrónico
  8. 208
    por Huber, David Miles
    Publicado 2007
    Tabla de Contenidos: “…Typical ConfigurationsThe Daisy Chain; The Multiport Network; MIDI and the Personal Computer; The Mac; The PC; Portability; Super-Portability; Connecting to the Peripheral World; USB; FireWireTM; Networking; The MIDI Interface; The Keyboard Controller; Foot Controllers; The Audio Interface; DAW Hardware Controllers; MIDI Diagnostic Tools; 4 Electronic Instruments; Inside the Toys; Keyboards; The Synth; Synth Modules; Soundcard Synths; Software Synthesis and Sample Resynthesis; Samplers; Software Samplers; Sample CDs, DVDs, and the Web; Instrument Plug-Ins; The MIDI Keyboard Controller…”
    Libro electrónico
  9. 209
    Publicado 2017
    Tabla de Contenidos: “…Nissen and Leanne Chalmers CPD Aligned to Competency Standards to Support Quality Practice -- Reprinted from: Pharmacy 2017, 5(1), 12; doi: 10.3390/pharmacy5010012 -- Howard Davies Competence-Based Curricula in the Context of Bologna and EU Higher Education Policy Reprinted from: Pharmacy 2017, 5(2), 17; doi: 10.3390/pharmacy5020017 -- Antonio Sánchez-Pozo A Comparison of Competences for Healthcare Professions in Europe Reprinted from: Pharmacy 2017, 5(1), 8; doi: 10.3390/pharmacy5010008 -- Jeffrey Atkinson The Production of the PHAR-QA Competence Framework Reprinted from: Pharmacy 2017, 5(2), 19; doi: 10.3390/pharmacy5020019 -- Constantin Mircioiu and Jeffrey Atkinson A Comparison of Parametric and Non-Parametric Methods Applied to a Likert Scale Reprinted from: Pharmacy 2017, 5(2), 26; doi: 10.3390/pharmacy5020026 -- Nina Katajavuori, Outi Salminen, Katariina Vuorensola, Helena Huhtala, Pia Vuorela and Jouni Hirvonen Competence-Based Pharmacy Education in the University of Helsinki Reprinted from: Pharmacy 2017, 5(2), 29; doi: 10.3390/pharmacy5020029 -- Daisy Volmer, Kristiina Sepp, Peep Veski and Ain Raal The Implementation of Pharmacy Competence Teaching in Estonia and Borut Božic Reprinted from: Pharmacy 2017, 5(2), 18; doi:10.3390/pharmacy5020018 -- Tanja Gmeiner, Nejc Horvat, Mitja Kos, Aleš Obreza, Tomaž Vovk, Iztok Grabnar Curriculum Mapping of the Master's Program in Pharmacy in Slovenia with the PHAR-QA Competency Framework Reprinted from: Pharmacy 2017, 5(2), 24; doi: 10.3390/pharmacy5020024 -- Agnieszka Skowron, Justyna Dymek, Anna Golda and Wioletta Polak Are We Ready to Implement Competence-Based Teaching in Pharmacy Education in Poland? …”
    Libro electrónico
  10. 210
    Tabla de Contenidos: “…Embodiment -- Summary of self -- Resilience -- Bio-psychosocial model of resilience -- Self-compassion -- Chapter summary -- References -- Chapter 4: History, temporality and culture -- Introduction -- Experiences of temporality -- Soulful space -- Phenomenological archaeology -- Ma -- Defence Archaeology Group -- Culture -- Ideologies underpinning culture -- Globalisation -- Spirituality -- Summary of chapter -- References -- Chapter 5: Creativity and wellbeing -- Introduction -- Creativity -- Social determinants of health and wellbeing -- Flourishing -- Five paths to wellbeing framework -- Art as therapy -- Social prescribing -- Summary -- References -- Chapter 6: Stiwdio Arts Group -- Introduction -- Words and images -- The bee project -- Sharing -- Portraits -- 'Artists in the making': Collingwood project -- Delivery -- Sharing -- 'Through the Trees' Rookwood project -- The participants -- Research and design -- Delivery -- Day one -- Day two -- Day three -- Day four and five -- Sharing -- Summary -- Chapter 7: Evaluations, reflections and creations -- Introduction -- Mental wellbeing -- Self -- History, temporality and culture -- Creativity -- Artist in the making reflection: Louise -- Artist in the making reflection: Daisy -- 'Through the Trees' project reflection: Louise -- 'Through the Trees' project reflection: Monica -- 'Through the Trees' project reflection: Rachel -- 'Through the Trees' project reflection: Janet -- Evaluations of 'Through the Trees' -- Creation: Green Pyjamas -- Creations: Watercolour monoprints -- Creation: The Wellingtonia -- Creation: Wellingtonia linocut - Louise -- Creations: Foil relief prints -- Creation: A poem in response to Rookwood -- Creation collage -- Summary -- Conclusions -- References -- Chapter 8: Phenomenological psychological lifeworld experiences -- Introduction -- Mental wellbeing -- Flourishing…”
    Libro electrónico
  11. 211
    por Bai, Yong
    Publicado 2012
    Tabla de Contenidos: “…TEMPLATE, CLUSTERED WELL SYSTEM, AND DAISY CHAIN; 2.9. SUBSEA FIELD DEVELOPMENT ASSESSMENT; REFERENCES; Chapter 3 - Subsea Distribution System; 3.1. …”
    Libro electrónico
  12. 212
    Publicado 2024
    Tabla de Contenidos: “…Chapter 4 Robust Zero Watermarking Algorithm for Medical Images Based on BRISK and DCT -- 4.1 Introduction -- 4.2 Fundamental Theory -- 4.2.1 BRISK Feature Extraction Algorithm -- 4.2.2 Discrete Cosine Transform (DCT) -- 4.2.3 Logistic Mapping -- 4.3 Proposed Algorithm -- 4.3.1 Medical Image Feature Extraction -- 4.3.2 Watermark Encryption -- 4.3.3 Embed Watermark -- 4.3.4 Watermark Extraction and Decryption -- 4.4 Experiments and Results -- 4.4.1 Test Different Images -- 4.4.2 Conventional Attacks -- 4.4.3 Geometric Attacks -- 4.4.4 Compare with Other Algorithms -- 4.5 Conclusion -- References -- Chapter 5 Robust Color Images Zero-Watermarking Algorithm Based on Stationary Wavelet Transform and Daisy Descriptor -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Material and Techniques -- 5.3.1 Daisy Descriptor -- 5.3.2 Stationary Wavelet Transform -- 5.3.3 Tent Chaotic Map -- 5.3.4 Proposed Algorithm -- 5.4 Experiment and Results -- 5.4.1 Evaluation Parameter -- 5.4.2 Feasibility Analysis -- 5.4.3 Results and Analysis -- 5.5 Conclusion -- References -- Chapter 6 Robust Multi-watermarking Algorithm Based on DarkNet53 -- 6.1 Introduction -- 6.2 Basic Theory -- 6.2.1 DarkNet53 -- 6.2.2 Discrete Cosine Transform -- 6.2.3 Logistic Map -- 6.3 Proposed Algorithm -- 6.3.1 Improvement of DarkNet53 Network Model -- 6.3.2 Encryption of Watermark -- 6.3.3 Watermark Embedding -- 6.3.4 Extraction of a Watermark -- 6.3.5 Decryption of a Watermark -- 6.4 Experimental Results and Analysis -- 6.4.1 Performance -- 6.4.2 Reliability Analysis -- 6.4.3 Traditional Attack -- 6.4.4 Geometric Attack -- 6.5 Conclusion -- References -- Chapter 7 Robust Multi-watermark Algorithm for Medical Images Based on SqueezeNet Transfer Learning -- 7.1 Introduction -- 7.2 Fundamental Theory -- 7.2.1 SqueezeNet Neural Network -- 7.2.2 Transfer Learning…”
    Libro electrónico
  13. 213
    Publicado 2011
    Libro electrónico
  14. 214
    por Hughes, Chris
    Publicado 2024
    Tabla de Contenidos: “…Exploit Prediction Scoring System -- EPSS 3.0-Prioritizing Through Prediction -- EPSS 3.0 -- Moving Forward -- Stakeholder-Specific Vulnerability Categorization -- CISA SSVC Guide -- Decision Tree Example -- Software Identification Formats -- Common Platform Enumeration -- Package URL -- Software Identification Tags -- Common Weaknesses and Enumerations -- Summary -- Chapter 6 Vulnerability and Exploit Database Management -- National Vulnerability Database (NVD) -- Sonatype Open Source Software Index -- Open Source Vulnerabilities -- GitHub Advisory Database -- Exploit Databases -- Exploit-DB -- Metasploit -- GitHub -- Summary -- Chapter 7 Vulnerability Chaining -- Vulnerability Chaining Attacks -- Exploit Chains -- Daisy Chains -- Vendor-Released Chains -- Microsoft Active Directory -- VMware vRealize Products -- iPhone Exploit Chain -- Vulnerability Chaining and Scoring -- Common Vulnerability Scoring System -- EPSS -- Gaps in the Industry -- Vulnerability Chaining Blindness -- Terminology -- Usage in Vulnerability Management Programs -- The Human Aspect of Vulnerability Chaining -- Phishing -- Business Email Compromise -- Social Engineering -- Integration into VMPs -- Leadership Principles -- Security Practitioner Integration -- IT and Development Usage -- Summary -- Chapter 8 Vulnerability Threat Intelligence -- Why Is Threat Intel Important to VMPs? …”
    Libro electrónico
  15. 215
    Tabla de Contenidos: “…-- Computational Environments for Coupling Multiphase Flow, Transport, and Mechanics in Porous Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving Performance of Digest Caches in Network Processors -- Optimization of BLAS on the Cell Processor -- Fine Tuning Matrix Multiplications on Multicore -- The Design and Architecture of MAQAOAdvisor: A Live Tuning Guide -- A Load Balancing Framework for Clustered Storage Systems -- Construction and Evaluation of Coordinated Performance Skeletons -- Session II: Parallel Algorithms and Applications -- Data Sharing Analysis of Emerging Parallel Media Mining Workloads -- Efficient PDM Sorting Algorithms -- Accelerating Cone Beam Reconstruction Using the CUDA-Enabled GPU -- Improving the Performance of Tensor Matrix Vector Multiplication in Cumulative Reaction Probability Based Quantum Chemistry Codes -- Experimental Evaluation of Molecular Dynamics Simulations on Multi-core Systems -- Parsing XML Using Parallel Traversal of Streaming Trees -- Session III: Scheduling and Resource Management -- Performance Analysis of Multiple Site Resource Provisioning: Effects of the Precision of Availability Information -- An Open Computing Resource Management Framework for Real-Time Computing -- A Load Aware Channel Assignment and Link Scheduling Algorithm for Multi-channel Multi-radio Wireless Mesh Networks -- Multi-round Real-Time Divisible Load Scheduling for Clusters -- Energy-Efficient Dynamic Scheduling on Parallel Machines -- A Service-Oriented Priority-Based Resource Scheduling Scheme for Virtualized Utility Computing -- Session IV: Sensor Networks -- Scalable Processing of Spatial Alarms -- Coverage Based Expanding Ring Search for Dense Wireless Sensor Networks -- An Energy-Balanced Task Scheduling Heuristic for Heterogeneous Wireless Sensor Networks -- Energy Efficient Distributed Algorithms for Sensor Target Coverage Based on Properties of an Optimal Schedule -- In-Network Data Estimation for Sensor-Driven Scientific Applications -- Localization in Ad Hoc and Sensor Wireless Networks with Bounded Errors -- Session V: Energy-Aware Computing -- Optimization of Fast Fourier Transforms on the Blue Gene/L Supercomputer -- ScELA: Scalable and Extensible Launching Architecture for Clusters -- Parallel Information Theory Based Construction of Gene Regulatory Networks -- Communication Analysis of Parallel 3D FFT for Flat Cartesian Meshes on Large Blue Gene Systems -- Scalable Multi-cores with Improved Per-core Performance Using Off-the-critical Path Reconfigurable Hardware -- Session VI: Distributed Algorithms -- TrustCode: P2P Reputation-Based Trust Management Using Network Coding -- Design, Analysis, and Performance Evaluation of an Efficient Resource Unaware Scheduling Strategy for Processing Divisible Loads on Distributed Linear Daisy Chain Networks -- A Novel Learning Based Solution for Efficient Data Transport in Heterogeneous Wireless Networks -- Scalable Data Collection in Sensor Networks -- Task Scheduling on Heterogeneous Devices in Parallel Pervasive Systems (P 2 S) -- A Performance Guaranteed Distributed Multicast Algorithm for Long-Lived Directional Communications in WANETs -- Session VII: Communication Networks -- Maintaining Quality of Service with Dynamic Fault Tolerance in Fat-Trees -- Designing a High-Performance Clustered NAS: A Case Study with pNFS over RDMA on InfiniBand -- Sockets Direct Protocol for Hybrid Network Stacks: A Case Study with iWARP over 10G Ethernet -- Making a Case for Proactive Flow Control in Optical Circuit-Switched Networks -- FBICM: Efficient Congestion Management for High-Performance Networks Using Distributed Deterministic Routing -- Achieving 10Gbps Network Processing: Are We There Yet? …”
    Libro electrónico
  16. 216
    Publicado 2018
    Tabla de Contenidos: “…-- Use fonts consistently -- Your website -- Direct messages -- Wrap -- Appendix: Daisy's social media plan -- Index -- EULA…”
    Libro electrónico
  17. 217
    Publicado 2019
    Tabla de Contenidos: “…[1852] 308 Suggested by Reading an Article in a Newspaper 310* Will 311* The Daisy 312* To the Rev. F.D. Maurice 313 The Brook 316* Maud, A Monodrama 317 The Letters 324* Tithonus 329 Ode Sung at the Opening of the International Exhibition 330* Enoch Arden 337 Aylmer's Field 1793 339 A Dedication 353 The Higher Pantheism 355 Lucretius 363 To the Rev. …”
    Libro electrónico
  18. 218
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Chapter 1: Computer Basics -- Sand Tables -- Abacus -- Napier Bones -- Slide Rule -- Pascaline -- Analytical Engine -- Hollerith's Tabulator -- MARK-I Computer -- ABC -- Colossus -- ENIAC -- EDVAC -- EDSAC -- UNIVAC -- First Generation (1940-56): Vacuum Tubes -- Second Generation (1956-63): Transistors -- Third Generation (1964 to Early 1970s): Integrated Circuits -- Fourth Generation (Early 1970s Till Date): Microprocessors -- Fifth Generation (Present and Beyond): Artificial Intelligence -- Classification According to Purpose -- Classification According to Type of Data-handling Techniques -- Microcomputers -- Minicomputers -- Mainframes -- Supercomputers -- CPU -- Input, Output, and Storage Units -- Multiple-choice Questions -- Answers -- Chapter 2: Computer Organization and Architecture -- Fetch Cycle -- Execute Cycle -- CISC Architecture -- RISC Architecture -- Conversion of Binary to Decimal -- Conversion of Octal to Binary -- Conversion of Binary to Hexadecimal -- Conversion of Hexadecimal to Octal -- Negative Binary Numbers Using 2's Complement -- Addition/Subtraction of Signed Numbers Using 2's Complement Addition -- Multiple-choice Questions -- Answers -- Chapter 3: Computer Memory and Storage -- Multiple-choice Questions -- Answers -- Chapter 4: Input Output Media -- Working of Keyboard -- Working of Mouse -- Working of Touch Screen -- Dot Matrix Printer -- Daisy Wheel Printer -- Drum Printer -- Working of Ink-jet Printer -- Working of Laser Printer -- Multiple-choice Questions -- Answers -- Chapter 5: Operating System: Windows XP -- First-come First-served (FCFS) -- Round Robin (RR) -- Desktop -- Icon -- File -- Folders -- Shortcuts -- Changing Sort Order -- Narrator -- Magnifier -- Disk Cleanup -- Disk Defragmenter -- Creating a Restore Point -- Using a Restore Point -- Calculator -- Notepad -- Paint…”
    Libro electrónico
  19. 219
    Publicado 2016
    Tabla de Contenidos: “…Chapter 11: Input-Output and Communication -- Computer I/O -- Sample Peripherals -- Keyboard -- Hard Drive -- Liquid Crystal Display Screen -- I/O Transfer Rates -- I/O Interfaces -- I/O Bus and Interface Unit -- Example of I/O Interface -- Strobing -- Handshaking -- Serial Communication -- Synchronous Transmission -- The Keyboard Revisited -- A Packet-Based Serial I/O Bus -- Modes of Transfer -- Example of Program-Controlled Transfer -- Interrupt-Initiated Transfer -- Priority Interrupt -- Daisy Chain Priority -- Parallel Priority Hardware -- Direct Memory Access -- DMA Controller -- DMA Transfe -- Chapter Summary -- References -- Problems -- Chapter 12: Memory Systems -- Memory Hierarchy -- Locality of Reference -- Cache Memory -- Cache Mappings -- Line Size -- Cache Loading -- Write Methods -- Integration of Concepts -- Instruction and Data Caches -- Multiple-Level Caches -- Virtual Memory -- Page Tables -- Translation Lookaside Buffer -- Virtual Memory and Cache -- Chapter Summary -- References -- Problems -- Index…”
    Libro electrónico
  20. 220
    por Cohen, Martin
    Publicado 2024
    Tabla de Contenidos: “…Appreciating the Difficulties of Staying Impartial -- Being neutral . . . up to a point: The BBC -- Things are heating up: The climate change debate -- Struggling to find a consensus -- Appealing to Feelings: The Psychology of Argument -- Using emotions to powerful effect -- Grabbing the attention of the gullible -- Spotting prejudice dressed as science -- Manipulating Minds and Persuading People -- Understanding how persuasion in society works -- Recognizing the language of persuasion -- Recoiling in horror as millions of Americans see "Daisy" get blown up by a bomb -- Spotting the techniques being used on you! …”
    Libro electrónico