Mostrando 1,461 - 1,480 Resultados de 2,075 Para Buscar '"Damage"', tiempo de consulta: 0.12s Limitar resultados
  1. 1461
    Tabla de Contenidos: “…Chronic diseases caused by alcohol consumption damage population health and the economy -- 1.2.1. …”
    Libro electrónico
  2. 1462
    Publicado 2016
    Tabla de Contenidos: “…CHAPTER 6 | A Sales Manager Either Wants to Make Heroes or Be the HeroCHAPTER 7 | Sales Suffer when the Manager Wears the Fire Chief's Helmet; CHAPTER 8 | The Trouble with One-Size-Fits-All Sales Talent Deployment Is That One Size Does Not Fit All; CHAPTER 9 | Turning a Blind Eye to the Perennial Underperformer Does More Damage than You Realize; CHAPTER 10 | COMPensation and COMPlacency Start with the Same Four Letters; CHAPTER 11 | An Anti-Sales Culture Disengages the Heart of the Sales Team; CHAPTER 12 | The Big Ego Senior Executive ""Sales Expert"" Often Does More Harm than Good…”
    Libro electrónico
  3. 1463
    Publicado 2016
    “…These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. …”
    Libro electrónico
  4. 1464
    Publicado 2016
    Tabla de Contenidos: “…-- Private Equity: The Damage Done -- Reform of Private Equity Firms -- Registration as Investment Advisers -- Fee Reform -- Chapter 7 Welcome to Jurassic Park -- Isla Nublar -- The New DNA of Finance -- Warning Signs -- Dinosaurs Turn on Their Makers -- Bear Stearns: First Casualty -- American International Group (AIG)-Second Casualty -- The Bond Insurers-Third Casualty -- Taming the Beasts (Regulating Credit Derivatives) -- Listing Credit Derivatives on an Exchange -- Counterparty Surveillance -- Increasing Collateral Requirements -- Chapter 8 The Road to Hell -- Satan in the Garden -- Reverse Black Swans -- Birth of the Prudent Man -- The Fallacy of Diversification -- Chapter 9 Finance after Armageddon -- Obama Goes to Wall Street -- Principles of Reform -- Impose a Tax on Speculation -- End Balkanized Regulation -- Too Big to Fail -- Improving Capital Adequacy -- Limiting Banks' Balance Sheet Leverage -- Compensation Reform -- Reforming Monetary Policy -- Enhancing Systemic Transparency -- Ban Structured Investment Vehicles -- Prohibit Dark Pools and High-Frequency Trading -- Chapter 10 Unfinished Business -- Monetary Policy -- Fiscal Policy and the Federal Deficit -- Entitlements -- End Corporate Welfare -- Military Spending -- Tax Reform -- Domestic Policy -- Chapter 11 How to Save Yourself -- Gold -- Absolute Return Strategies -- Equities -- Income‐Generating Securities -- Conclusion -- Conclusion: "This Is Later" -- Notes -- Bibliography and Other Sources -- About the Author -- Index -- EULA…”
    Libro electrónico
  5. 1465
    por Sarnecki, Jerzy
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Preventing and Countering Violent Extremism and Radicalisation: Evidence-Based Policy and Practice -- Copyright information -- Dedication -- Contents -- List of figures and tables -- List of abbreviations -- Notes on contributors -- Introduction -- Overview of the book -- Theoretical and epistemological framework -- Designing, implementing and evaluating preventing and countering violent extremism initiatives -- The three pillars of evidence- based practice -- Thinking critically about evidence-based practice -- Notes -- References -- PART I Theoretical and epistemological framework -- 1 Criminological aspects of crime prevention -- Introduction -- The state's responsibility for crime prevention -- Definitions -- A crime prevention typology -- Control -- Crime prevention using punishment -- Treatment -- The Swedish case -- The gentle return of treatment -- A dynamic approach to treatment -- Opportunity -- Situational crime prevention -- Opportunities for prosocial life -- Preventing damage caused by crime -- Scientific basis for crime prevention -- Summary -- Notes -- References -- 2 An epistemological framework for evidence-based crime prevention -- Introduction -- Design science: finding the best solution -- Prevention science: translating knowledge into practice -- Behavioural and social sciences: contributing with theory and research methods -- The contribution of theory -- The contribution of research methods -- Summary -- Notes -- References -- PART II Designing, implementing and evaluating preventing and countering violent extremism initiatives -- 3 A step-by-step logic model of evidence-based practice design -- Introduction -- A systematic approach to design -- The design process based on a logic model -- Defining a long-term comprehensive, evidence-based programme…”
    Libro electrónico
  6. 1466
    Publicado 2021
    “…Computational intelligence is used for medical screening where the detection of disease symptoms is carried out, in prevention monitoring to detect suspicious behavior, in agriculture systems to help with growing plants and animal breeding, in transportation systems for the control of incoming and outgoing transportation, for unmanned vehicles to detect obstacles and avoid collisions, in optics and materials for the detection of surface damage, etc. In many cases, we use developed techniques which help us to recognize some special features. …”
    Libro electrónico
  7. 1467
    Publicado 2021
    “…For carbon emissions and other environmental damage, this means ensuring that those responsible pay their full costs rather than continuing to pass them along to others, including future generations. …”
    Libro electrónico
  8. 1468
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title -- Copyright and Credits -- Table of Contents -- Part 1: Basic AI -- Chapter 1: Introduction to AI -- Understanding AI -- AI in video games -- AI techniques for video games -- Finite state machines -- Randomness and probability in AI -- The sensor system -- Flocking, swarming, and herding -- Path following and steering -- A* pathfinding -- Navigation meshes -- Behavior trees -- Locomotion -- Summary -- Chapter 2: Finite State Machines -- Technical requirements -- Implementing the player's tank -- Initializing the Tank object -- Shooting the bullet -- Controlling the tank -- Implementing a Bullet class -- Setting up waypoints -- Creating the abstract FSM class -- Using a simple FSM for the enemy tank AI -- The Patrol state -- The Chase state -- The Attack state -- The Dead state -- Taking damage -- Using an FSM framework -- The AdvancedFSM class -- The FSMState class -- The state classes -- The NPCTankController class -- Summary -- Chapter 3: Randomness and Probability -- Technical requirements -- Introducing randomness in Unity -- Randomness in computer science -- The Unity Random class -- A simple random dice game -- Learning the basics of probability -- Independent and correlated events -- Conditional probability -- Loaded dice -- Exploring more examples of probability in games -- Character personalities -- Perceived randomness -- FSM with probability -- Dynamically adapting AI skills -- Creating a slot machine -- A random slot machine -- Weighted probability -- A near miss -- Summary -- Further reading -- Chapter 4: Implementing Sensors -- Technical requirements -- Basic sensory systems -- Scene setup -- The player's tank and the aspect class -- The player's tank -- Aspect -- AI characters -- Sense -- Sight -- Touch -- Testing -- Summary -- Part 2: Movement and Navigation -- Chapter 5: Flocking -- Technical requirements…”
    Libro electrónico
  9. 1469
    Publicado 2023
    “…experience as well as the latest research about adaptive leadership and complexity, we survey the damage caused by these lingering approaches and offer powerful strategies to help leaders achieve the impact they truly seek. …”
    Libro electrónico
  10. 1470
    Publicado 2020
    Tabla de Contenidos: “…The role of nutrition in DNA replication, DNA damage prevention and DNA repair 5. Genotyping and sequencing 6. …”
    Libro electrónico
  11. 1471
    Publicado 2021
    “…In the electronics industry, a failure mechanism describes momentary unwanted currents that may cause damage to electronic equipment. This can clearly be very costly, and it is advantageous to find ways of preventing this discharge, or to limit its damage when it does occur. …”
    Libro electrónico
  12. 1472
    Publicado 2012
    Tabla de Contenidos: “…Objective 3.03 Electrostatic Discharge Precautions and Procedures -- Types of ESD -- Catastrophic ESD Damage -- Hidden ESD Damage -- ESD Degradation -- Common ESD Protection Devices -- Antistatic Wrist and Ankle Straps -- Antistatic Mats -- Antistatic Floor Mats -- Antistatic Bags -- Objective 3.04 Safety and Environmental Issues -- Tech-Controlled Factors -- What to Wear -- Control Those Cords! …”
    Libro electrónico
  13. 1473
    Publicado 2007
    Tabla de Contenidos: “…-Laplacian First Eigenvalue Problem -- Comparison of Two Algorithms to Solve the Fixed-strike Amerasian Options Pricing Problem -- Nonlinear Diffusion Models for Self-gravitating Particles -- Existence, Uniqueness and an Explicit Solution for a One-Phase Stefan Problem for a Non-classical Heat Equation -- Dislocation Dynamics: a Non-local Moving Boundary -- Bermudean Approximation of the Free Boundary Associated with an American Option -- Steady-state Bingham Flow with Temperature Dependent Nonlocal Parameters and Friction -- Some P.D.E.s with Hysteresis -- Embedding Theorem for Phase Field Equation with Convection -- A Dynamic Boundary Value Problem Arising in the Ecology of Mangroves -- Wave Breaking over Sloping Beaches Using a Coupled Boundary Integral-Level Set Method -- Finite Difference Schemes for Incompressible Flows on Fully Adaptive Grids -- Global Solvability of Constrained Singular Diffusion Equation Associated with Essential Variation -- Capillary Mediated Melting of Ellipsoidal Needle Crystals -- Boundary Regularity at {t = 0} for a Singular Free Boundary Problem -- Fast Reaction Limits and Liesegang Bands -- Numerical Modeling of Surfactant Effects in Interfacial Fluid Dynamics -- The Value of an American Basket Call with Dividends Increases with the Basket Volatility -- Mathematical Modelling of Nutrient-limited Tissue Growth -- Asymptotic Hysteresis Patterns in a Phase Separation Problem -- Obstacle Problems for Monotone Operators with Measure Data -- Piecewise Constant Level Set Method for Interface Problems -- Dynamics of a Moving Reaction Interface in a Concrete Wall -- Adaptive Finite Elements with High Aspect Ratio for Dendritic Growth of a Binary Alloy Including Fluid Flow Induced by Shrinkage -- A Free Boundary Problem for Nonlocal Damage Propagation in Diatomites -- Concentrating Solutions for a Two-dimensional Elliptic Problem with Large Exponent in Nonlinearity -- Existence of Weak Solutions for the Mullins-Sekerka Flow -- Existence and Approximation Results for General Rate-independent Problems via a Variable Time-step Discretization Scheme -- Global Attractors for the Quasistationary Phase Field Model: a Gradient Flow Approach -- Aleksandrov and Kelvin Reflection and the Regularity of Free Boundaries -- Solvability for a PDE Model of Regional Economic Trend -- Surface Energies in Multi-phase Systems with Diffuse Phase Boundaries -- High-order Techniques for Calculating Surface Tension Forces -- Simulation of a Model of Tumors with Virus-therapy -- Asymptotic Behavior of a Hyperbolic-parabolic Coupled System Arising in Fluid-structure Interaction…”
    Libro electrónico
  14. 1474
    Tabla de Contenidos: “…Turn down business that risks damaging your brand.""; ""3. Define and reinforce your brand with a well thought out tagline""; ""4. …”
    Libro electrónico
  15. 1475
    por Pate, Steve D.
    Publicado 2003
    Tabla de Contenidos: “…; The Filesystem Hierarchy; Disks, Slices, Partitions, and Volumes; Raw and Block Devices; Filesystem Switchout Commands; Creating New Filesystems; Mounting and Unmounting Filesystems; Repairing Damaged Filesystems…”
    Libro electrónico
  16. 1476
    por Hale-Evans, Ron
    Publicado 2011
    Tabla de Contenidos: “…Hack 17: Write Magnificent NotesChapter 4 Time Management; Hack 18: Keep a Mental Datebook; Hack 19: Tell Time Who's Boss; Hack 20: Meet MET; Hack 21: Get Control of Yourself; Hack 22: Locate Lost Items; Hack 23: Huffman-Code Your Life; Hack 24: Knock Off Work; Chapter 5 Creativity and Productivity; Hack 25: Manifest Yourself; Hack 26: Woo the Muse of the Odd; Hack 27: Seek Bad Examples; Hack 28: Turn a Job into a Game; Hack 29: Scrumble for Glory; Hack 30: Salvage a Vintage Hack; Hack 31: Mine the Future; Hack 32: Dare to Do No Permanent Damage; Hack 33: Make Happy Mistakes…”
    Libro electrónico
  17. 1477
    Publicado 2016
    Tabla de Contenidos: “…The spreadsheet formatA sample spreadsheet; The Data Table struct; Importing the spreadsheet; Querying the spreadsheet; Summary; Chapter 3: Exploring and Combat ; Creating the player pawn; The interface; The player controller; The pawn; The GameMode class; Adding the skinned mesh; Creating a camera component; Defining characters and enemies; Classes; Characters; Enemies; Party members; The GameInstance class; Turn-based combat; Performing actions; Making decisions; Target selection; Dealing with damage; Combat UI with UMG; UI-driven decision making; Creating the game over screen; Summary…”
    Libro electrónico
  18. 1478
    por Kelly, James F.
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  19. 1479
    Publicado 2016
    Tabla de Contenidos: “…Recutting the first assemblyChanging and Patching Cutting Copies; Repairing cutting copy damage; Augmenting Original Film; Ordering stock footage; Negative Cutting: Principle; Cutting by numbers; Negative Cutting: Checkerboard; Starting a checkerboard assembly; Negative Cutting: Where and When; Matching edge numbers step by step; Joining picture and leader; Checking numbers before making a cut; Negative Cutting: Optical Effects; Overlapping checkerboard dissolves; Marking centre points; Negative Cutting: A/B Rolls, Cueing; Optical cue sheets; Negative Cutting: Completing…”
    Libro electrónico
  20. 1480
    Publicado 2022
    Tabla de Contenidos: “…</LI><P></P></UL></UL><B><P></P><P>Phase Four -- Implementation and Evaluation </P><P></P><UL><UL><P><LI>Chapter 13:</B> <B>Step 10</B>- What are the damages of inaction?</LI><P></P><B><P><LI>Chapter 14:</B> <B>Step 11</B>- How to implement the solution?…”
    Libro electrónico