Mostrando 1,621 - 1,640 Resultados de 2,075 Para Buscar '"Damage"', tiempo de consulta: 0.12s Limitar resultados
  1. 1621
    Publicado 2015
    Tabla de Contenidos: “…-- Seeing the Big Picture -- It's all about your connections -- Looking at a simple battery circuit -- Recognizing Symbols of Power -- Showing where the power is -- Marking your ground -- Labeling Circuit Components -- Analog electronic components -- Digital logic and IC components -- Miscellaneous components -- Knowing Where to Take Measurements -- Exploring a Schematic -- Alternative Schematic Drawing Styles -- Chapter 15 Building Circuits -- Taking a Look at Solderless Breadboards -- Exploring a solderless breadboard -- Sizing up solderless breadboard varieties -- Building Circuits with Solderless Breadboards -- Preparing your parts and tools -- Saving time with prestripped wires -- Laying out your circuit -- Avoiding damaged circuits -- Soldering 101 -- Preparing to solder -- Soldering for success -- Inspecting the joint -- Desoldering when necessary -- Cooling after soldering -- Practicing safe soldering -- Creating a Permanent Circuit -- Exploring a printed circuit board -- Relocating your circuit to a perfboard -- Making a custom circuit board -- Chapter 16 Mastering Your Multimeter to Measure Circuits -- Multitasking with a Multimeter -- It's a voltmeter! …”
    Libro electrónico
  2. 1622
    Publicado 2024
    Tabla de Contenidos: “…La integración de los mercados financieros en la Unión Europea / Ignacio Ramos Villar - La reintegración de la masa activa en las microempresas: régimen actual y perspectivas de futuro a la luz de las nuevas propuestas armonizadoras de la Unión Europea / Rubén Ruiz Pérez - El impulso jurídico de las start-ups por parte de la Unión Europea /Joaquim Castañer Codina - El derecho penal económico de la Unión Europea: logros y retos en el proceso de integración europea / Sergio Berenguer Pascual - Punitive damages y cláusulas penales: aproximación entre common law y civil law en virtud de las cláusulas especiales de orden público en materia de daños y perjuicios de los convenios de La Haya concluidos por la UE / Verona Tió Pérez-Albert - Problemática relativa a la devolución y condonación de los derechos arancelarios en la Unión Europea / David Navazo Cuadrado - La transposición al ordenamiento español de la directiva 2020/1828 del Parlamento Europeo y del Consejo / María Jesús Sande Mayo -- CAPÍTULO 5. …”
    Libro electrónico
  3. 1623
    Tabla de Contenidos: “…-- Animals-You Can't Hide From Them -- Lesson Learned -- Vehicle Damage -- Lesson Learned -- Vandals -- Lesson Learned -- Mother Nature -- Lesson Learned -- Hard to Foresee -- Lesson Learned -- My Favorite -- Lesson Learned -- Endnotes -- 10 - Data Services Architecture -- INTRODUCTION -- NETWORK ENGINEERING FOR ACCESS NETWORKS -- ASSESSMENT OF VENDOR SYSTEMS -- DATA SERVICES ORGANIZATION AND PON-SPECIFIC ATTRIBUTES -- Residential Services -- Commercial Services -- PON Standards for Data Networking -- UNIFIED MODEL FOR PON DATA SERVICE ARCHITECTURES -- PON Access Network Model -- PON Access System Integration -- Forced Forwarding Upstream -- Security of the Shared Medium -- ESSENTIAL TRANSPORT MODELS -- Layer 2 Transport-Switching -- VLAN Architectures -- VLAN Tagging in Networking Standards…”
    Libro electrónico
  4. 1624
    Publicado 2022
    Tabla de Contenidos: “…-- Risk Event Categories -- Internal Fraud -- External Fraud -- Employment Practices and Workplace Safety -- Clients, Products, and Business Practices -- Damage to Physical Assets -- Business Disruption and System Failures -- Execution, Delivery, and Process Management -- Using the Basel Risk Categories -- Minimum Operational Risk Event Data Standards -- Comprehensive -- Threshold -- Amount -- Date -- Description and Causes -- Criteria for Allocation to Business Line -- Criteria for Allocation to Central and Supporting Functions -- All Impacted Departments -- Boundary Events Identified -- Action Items -- Nonfinancial Impacts -- Where Should Operational Risk Event Data Be Collected? …”
    Libro electrónico
  5. 1625
    por Vanhove, Sander
    Publicado 2024
    Tabla de Contenidos: “…-- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 10: Creating Menus, Making Enemies, and Using Autoloads -- Technical requirements -- Creating a menu -- Control nodes -- Creating a basic start menu -- Setting the main scene -- Making enemies -- Constructing the base scene -- Navigating enemies -- Writing the enemy script -- Damaging the player in a collision -- Spawning enemies and collectibles -- Making a Game Over screen -- Shooting projectiles -- Creating the base scene -- Writing the logic of the projectile -- Spawning projectiles -- Storing highscores in autoloads -- Using an autoload -- Creating a HighscoreManager autoload -- Autoloads in the remote tree -- Adding a UI in the main menu and game scene -- Using the highscore in the main menu -- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 11: Playing Together with Multiplayer -- Technical requirements -- A crash course in computer networking -- What is a Transport Layer? …”
    Libro electrónico
  6. 1626
    Publicado 2018
    Tabla de Contenidos: “…-- How to Shift From Observation to Coaching -- Coaching Scenario #1 -- Coaching and Development -- Coaching Scenario #2 -- Coaching and Development -- Cross the Finish Line -- Chapter Twelve: 15 Common Coaching Killers That Sabotage Coaching Success -- Toxic Tactic #1: Nine Painfully Stupid, Disempowering Words to Stop Using -- Avoid These Damaging, Problem-Focused Questions -- Toxic Tactic #2: Are You Coaching People or Closing Them? …”
    Libro electrónico
  7. 1627
    Publicado 2017
    Tabla de Contenidos: “…8.1 - RAPID-N -- 8.1.1 - Scientific Module -- 8.1.2 - Industrial Plants and Units Module -- 8.1.3 - Natural-Hazards Module -- 8.1.4 - Natech Risk-Analysis Module -- 8.1.5 - Outlook -- 8.2 - PANR -- 8.3 - TRAS 310 and TRAS 320 -- 8.3.1 - TRAS 310 "Precautions and Measures Against the Hazard Sources Precipitation and Flooding" -- 8.3.1.1 - Scope of Application -- 8.3.1.2 - Methodological Approach of TRAS 310 -- 8.3.1.3 - Hazard Source Analysis -- 8.3.1.3.1 - Simplified hazard source analysis -- 8.3.1.3.2 - Detailed hazard source analysis -- 8.3.1.3.3 - Consideration of climate change -- 8.3.1.4 - Determination of Threatened Safety-Relevant Parts of Establishments and Installations -- 8.3.1.5 - Determination of Possible Causes of Major Accidents -- 8.3.1.6 - Specification of Scenarios and Protection Aims -- 8.3.1.7 - Elaboration of Protection Concepts for Scenarios -- 8.3.1.8 - Review of Protection Concepts -- 8.3.1.9 - Determination of Accident Scenarios -- 8.3.1.10 - Specification of Measures to Mitigate the Effects of Major Accidents -- 8.3.1.11 - Planning for Emergencies -- 8.3.1.12 - Design Criteria for the Consideration of Climate Change -- 8.3.2 - TRAS 320 "Precautions and Measures Against the Hazard Sources Wind, Snow Loads and Ice Loads" -- 8.3.3 - Summary -- 8.4 - Other methodologies -- References -- Chapter 9 - Quantitative Methods for Natech Risk Assessment -- 9.1 - ARIPAR -- 9.1.1 - Framework of the ARIPAR-GIS Natech Module -- 9.1.2 - The ARIPAR-GIS Software -- 9.1.3 - The Natech Package of the ARIPAR-GIS Software -- 9.1.4 - Input Data and Calculation Procedure -- 9.1.5 - Equipment Vulnerability Models -- 9.1.6 - Output -- 9.2 - RISKCURVES -- References -- Chapter 10 - Case-Study Application I: RAPID-N -- 10.1 - Earthquake scenario -- 10.2 - Chemical Facility Description -- 10.3 - Natech Risk Analysis -- 10.3.1 - Damage Analysis…”
    Libro electrónico
  8. 1628
    Publicado 2022
    Tabla de Contenidos: “…-- 3.1.2 Corrosion Management: What It Is and What It Is Not -- 3.1.3 Management of Corrosion -- 3.1.3.1 Corrosion Reactions Geometry -- 3.1.3.2 Failure -- 3.1.3.3 Corrosion Prevention and Corrosion Control -- 3.1.3.4 CM Model -- 3.1.4 Phase 1: Definition -- 3.1.5 Phase 2: Application -- 3.1.6 Phase 3: Monitoring -- 3.1.7 Phase 4: Feedback -- 3.1.7.1 Corrosion Cost Estimation Model -- 3.1.7.2 Corrosion Knowledge Management (CKM) -- 3.2 Management of Corrosion and COVID19 -- 3.3 Environment -- 3.4 Application of Management of Corrosion Scheme to Underground Fire Water Ring4 -- 3.5 Damage Management -- 3.6 Algorithm…”
    Libro electrónico
  9. 1629
    por Mullennex, Lauren
    Publicado 2023
    Tabla de Contenidos: “…Moderating images -- Using the DetectModerationLabels API -- Using top-level categories -- Using secondary-level categories -- Putting it together -- Quick recap -- Moderating videos -- Creating the supporting resources -- Finding the resource ARNs -- Uploading the sample video to Amazon S3 -- Using the StartContentModeration API -- Examining the completion notification -- Using the GetContentModeration API -- Quick recap -- Using AWS Lambda to automate the workflow -- Implement the Start Analysis Handler -- Implementing the Get Results Handler -- Publishing function changes -- Experiment with the end-to-end -- Summary -- Part 3: CV at the edge -- Chapter 7: Introducing Amazon Lookout for Vision -- Technical requirements -- Introducing Amazon Lookout for Vision -- The benefits of Amazon Lookout for Vision -- Creating a model using Amazon Lookout for Vision -- Choosing the model type based on your business goals -- Creating a model -- Starting your model -- Analyzing an image -- Stopping your model -- Building a model to identify damaged pills -- Step 1 - collecting your images -- Step 2 - creating a project -- Step 3 - creating the training and test datasets -- Step 4 - verifying the dataset -- Step 5 - training your model -- Validating it works -- Step 1 - trial detection -- Step 2 - starting your model -- Step 3 - analyzing an image with your model -- Step 4 - stopping your model -- Summary -- Chapter 8: Detecting Manufacturing Defects Using CV at the Edge -- Technical requirements -- Understanding ML at the edge -- Deploying a model at the edge using Lookout for Vision and AWS IoT Greengrass -- Step 1 - Launch an Amazon EC2 instance -- Step 2 - Create an IAM role and attach it to an EC2 instance -- Step 3 - Install AWS IoT Greengrass V2 -- Step 4 - Upload training and test datasets to S3 -- Step 5 - Create a project…”
    Libro electrónico
  10. 1630
    por MacCharles, Alan
    Publicado 2024
    Tabla de Contenidos: “…-- 3.4 IJV Formation Progression Checklist -- 3.5 Progression Checklist Question Rationale -- 3.6 Progression Checklist Summary -- 3.7 Conclusion -- CHAPTER FOUR Securing Internal Alignment: How To Avoid Damaging 'Own Goals' -- 4.1 Alignment -- 4.2 Eight Principle Framework -- Section II Preparing a JV -- CHAPTER FIVE Good Process Attributes: What Indicates A Negotiation Is Likely To Conclude Successfully? …”
    Libro electrónico
  11. 1631
    Publicado 2022
    Tabla de Contenidos: “…-- 6.2 Gaining more control: Privilege escalation -- 6.3 Data theft -- 6.3.1 Advanced persistent threat -- 6.3.2 Making money from stolen financial details -- 6.3.3 Making money from ID theft -- 6.4 Insider threats -- 6.5 "Blast radius": Limiting the damage -- 6.5.1 AI, machine learning, behavioral analysis, and snake oil -- 6.6 Building your castle: Defense in depth -- 6.6.1 Perimeter security: Build a wall -- 6.6.2 Zero trust: The attackers are everywhere -- Summary -- 7 The Dark Web: Where is stolen data traded? …”
    Libro electrónico
  12. 1632
    Publicado 2023
    Tabla de Contenidos: “…Viewing Etsy Ads stats -- Deactivating Etsy Ads -- Changing your ad spend -- Discount of Monte Cristo: Offering Discounts -- Running a sale -- Creating a promo code -- Sending targeted offers -- Managing Your Discount Offers -- Editing a sale or ending a sale early -- Deactivating a promo code or targeted offer -- Social Studies: Promoting Your Etsy Shop and Listings on Social Media -- Connecting your Etsy shop to Facebook, Pinterest, and Twitter -- Posting on social media from within Etsy -- Social media best practices -- Camera Ready: Sharing Videos with Explore -- Chapter 15 You've Been Served: Providing Exceptional Customer Service -- Sliding into your DMs: Accessing Etsy Messages -- Accessing, reading, and replying to messages -- Sending a new message -- Receiving email notifications -- Let's Talk: Communicating with Buyers -- Thanking the buyer -- Answering customer questions -- Confirming shipping and seeking feedback -- Bungle Fever: Handling a Botched Transaction and Other Tough Issues -- Dealing with a lost item -- Refunding lost or damaged items through Etsy's Purchase Protection program -- Handling returns and issuing refunds -- Canceling an order -- Responding to a negative review -- Dealing with a difficult customer -- Chapter 16 Business as Usual: Managing Your Etsy Shop -- Room and Dashboard: Exploring the Shop Manager Dashboard -- One Track Mind: Tracking and Analyzing Shop Stats -- High Finance: Viewing Your Etsy Financials -- It's Payday! …”
    Libro electrónico
  13. 1633
    Publicado 2012
    Tabla de Contenidos: “…Iacoviello -- Quantitative characterization of ferritic ductile iron damaging micromechanisms : fatigue loadings / V. Di Cocco. …”
    Libro electrónico
  14. 1634
    Publicado 2019
    Tabla de Contenidos: “…Five Examples Illustrate the Diversity of Synovial Joints -- 8.6. Joints are Easily Damaged by Injury, Inflammation, and Degeneration -- A Closer Look: Joints: From Knights in Shining Armor to Bionic Humans -- Developmental Aspects of Joints -- 9. …”
    Libro electrónico
  15. 1635
    “…As the Fukushima Daiichi nuclear power plant (NPP) accident illustrates, many challenges have to be faced in maintaining safety over the long term in a damaged NPP following a severe accident. These comprise maintaining and monitoring a stabilised and controlled state of the damaged plant; implementing provisions against further failures; evaluating the plant damaged state from a physical and radiological standpoint and ranking related risks; preparing and achieving fuel retrieval (either fuel assemblies stored in spent fuel pools or fuel debris from damaged reactors); and managing safely plant recovery and accident waste. …”
    Libro electrónico
  16. 1636
    Publicado 2020
    Tabla de Contenidos: “…6.7 Investigative Technique: Records Involving Economic Damages -- 6.8 Investigative Technique: Preservation of Evidence -- 6.9 Conclusion -- Notes -- 7: Surveillance Techniques -- 7.1 Purposes and Functions -- 7.2 Tactics and Strategy in Surveillance -- 7.2.1 What Are the Steps of Surveillance? …”
    Libro electrónico
  17. 1637
    por de Bruin, Kelly
    Publicado 2009
    “…These adaptation cost curves reflect how different adaptation levels will provide a wedge between gross damages (i.e. damages that would occur in the absence of adaptation) and residual damages. …”
    Capítulo de libro electrónico
  18. 1638
    Publicado 2022
    “…The results then form subject of a legislative proposal that takes into account the aim of actions for cartel damages as well as the need for an effective public enforcement…”
    Libro electrónico
  19. 1639
    Publicado 2015
    “…The book then dives into specific issues that arise with old or damaged photos, such as removal of dust, scuff marks, and stains; repairing actual damage such as creases or missing corners; correcting color-related problems like blue or yellow-tinted images and oversaturation; and improving the contrast and brightness of both color and black-and-white images. …”
    Libro electrónico
  20. 1640
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Microfabrication and Precision Engineering -- Copyright Page -- Contents -- List of contributors -- About the editor -- Preface -- 1 Modeling of micro- and nano-scale cutting -- 1.1 Introduction -- 1.2 Modeling of microscale cutting -- 1.2.1 Minimum chip thickness and size effect -- 1.2.2 FEM modeling of microscale cutting -- 1.2.3 FEM basics -- 1.2.4 FEM cutting models -- 1.2.5 Friction modeling -- 1.2.6 Material modeling -- 1.3 Modeling of nanoscale cutting -- 1.3.1 Model geometry and material microstructure -- 1.3.2 Potential function -- 1.3.3 Boundary conditions and input parameters -- 1.3.4 Numerical integration and equilibration -- Conclusions -- References -- 2 Machining scale: workpiece grain size and surface integrity in micro end milling -- 2.1 Introduction -- 2.2 Specific cutting energy -- 2.3 Size effect -- 2.4 Workpiece microstructure scale -- 2.5 Surface integrity -- 2.5.1 Burr formation -- 2.5.2 Chip formation -- 2.5.3 Roughness -- 2.5.4 Microhardness -- 2.5.5 Microstructural damages -- 2.5.6 Size effect -- References -- 3 Micromachining technique based on the orbital motion of the diamond tip -- 3.1 Introduction -- 3.2 Principle of micromachining using the orbital motion of the diamond tip -- 3.3 Micromachining setup and test of the stage's trajectory -- 3.3.1 Establishment of the micromachining setup and the machining procedure -- 3.3.2 Test of the trajectory of the nanopiezo stage in the orbital motion -- 3.4 Micromachining mechanism using the orbital motion of the tip -- 3.4.1 Comparison of chip states with the conical and pyramidal tips -- 3.4.2 Difference between the micromilling process and this technique -- 3.4.3 Determination of the uncut chip thickness and the cutting rake angle -- 3.5 Formation mechanism and control methods of burrs -- 3.5.1 Burr formation during machining with the conical tip…”
    Libro electrónico