Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Technology: general issues 78
- History of engineering & technology 57
- Research & information: general 57
- Computer security 54
- Security measures 49
- Medicine 42
- Computer networks 35
- Environment 34
- Daños y perjuicios (Derecho civil) 31
- damage 31
- mechanical properties 31
- Digital techniques 29
- microstructure 29
- Brain damage 28
- History 28
- inflammation 28
- machine learning 28
- Damages 27
- Law and legislation 27
- climate change 27
- numerical simulation 27
- oxidative stress 27
- Photography 26
- Biology, life sciences 25
- Management 25
- DNA damage 24
- Prevention 24
- Economic aspects 23
- Social aspects 23
- Economics 22
-
1621Publicado 2015Tabla de Contenidos: “…-- Seeing the Big Picture -- It's all about your connections -- Looking at a simple battery circuit -- Recognizing Symbols of Power -- Showing where the power is -- Marking your ground -- Labeling Circuit Components -- Analog electronic components -- Digital logic and IC components -- Miscellaneous components -- Knowing Where to Take Measurements -- Exploring a Schematic -- Alternative Schematic Drawing Styles -- Chapter 15 Building Circuits -- Taking a Look at Solderless Breadboards -- Exploring a solderless breadboard -- Sizing up solderless breadboard varieties -- Building Circuits with Solderless Breadboards -- Preparing your parts and tools -- Saving time with prestripped wires -- Laying out your circuit -- Avoiding damaged circuits -- Soldering 101 -- Preparing to solder -- Soldering for success -- Inspecting the joint -- Desoldering when necessary -- Cooling after soldering -- Practicing safe soldering -- Creating a Permanent Circuit -- Exploring a printed circuit board -- Relocating your circuit to a perfboard -- Making a custom circuit board -- Chapter 16 Mastering Your Multimeter to Measure Circuits -- Multitasking with a Multimeter -- It's a voltmeter! …”
Libro electrónico -
1622Publicado 2024Tabla de Contenidos: “…La integración de los mercados financieros en la Unión Europea / Ignacio Ramos Villar - La reintegración de la masa activa en las microempresas: régimen actual y perspectivas de futuro a la luz de las nuevas propuestas armonizadoras de la Unión Europea / Rubén Ruiz Pérez - El impulso jurídico de las start-ups por parte de la Unión Europea /Joaquim Castañer Codina - El derecho penal económico de la Unión Europea: logros y retos en el proceso de integración europea / Sergio Berenguer Pascual - Punitive damages y cláusulas penales: aproximación entre common law y civil law en virtud de las cláusulas especiales de orden público en materia de daños y perjuicios de los convenios de La Haya concluidos por la UE / Verona Tió Pérez-Albert - Problemática relativa a la devolución y condonación de los derechos arancelarios en la Unión Europea / David Navazo Cuadrado - La transposición al ordenamiento español de la directiva 2020/1828 del Parlamento Europeo y del Consejo / María Jesús Sande Mayo -- CAPÍTULO 5. …”
Libro electrónico -
1623Tabla de Contenidos: “…-- Animals-You Can't Hide From Them -- Lesson Learned -- Vehicle Damage -- Lesson Learned -- Vandals -- Lesson Learned -- Mother Nature -- Lesson Learned -- Hard to Foresee -- Lesson Learned -- My Favorite -- Lesson Learned -- Endnotes -- 10 - Data Services Architecture -- INTRODUCTION -- NETWORK ENGINEERING FOR ACCESS NETWORKS -- ASSESSMENT OF VENDOR SYSTEMS -- DATA SERVICES ORGANIZATION AND PON-SPECIFIC ATTRIBUTES -- Residential Services -- Commercial Services -- PON Standards for Data Networking -- UNIFIED MODEL FOR PON DATA SERVICE ARCHITECTURES -- PON Access Network Model -- PON Access System Integration -- Forced Forwarding Upstream -- Security of the Shared Medium -- ESSENTIAL TRANSPORT MODELS -- Layer 2 Transport-Switching -- VLAN Architectures -- VLAN Tagging in Networking Standards…”
Libro electrónico -
1624Publicado 2022Tabla de Contenidos: “…-- Risk Event Categories -- Internal Fraud -- External Fraud -- Employment Practices and Workplace Safety -- Clients, Products, and Business Practices -- Damage to Physical Assets -- Business Disruption and System Failures -- Execution, Delivery, and Process Management -- Using the Basel Risk Categories -- Minimum Operational Risk Event Data Standards -- Comprehensive -- Threshold -- Amount -- Date -- Description and Causes -- Criteria for Allocation to Business Line -- Criteria for Allocation to Central and Supporting Functions -- All Impacted Departments -- Boundary Events Identified -- Action Items -- Nonfinancial Impacts -- Where Should Operational Risk Event Data Be Collected? …”
Libro electrónico -
1625por Vanhove, SanderTabla de Contenidos: “…-- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 10: Creating Menus, Making Enemies, and Using Autoloads -- Technical requirements -- Creating a menu -- Control nodes -- Creating a basic start menu -- Setting the main scene -- Making enemies -- Constructing the base scene -- Navigating enemies -- Writing the enemy script -- Damaging the player in a collision -- Spawning enemies and collectibles -- Making a Game Over screen -- Shooting projectiles -- Creating the base scene -- Writing the logic of the projectile -- Spawning projectiles -- Storing highscores in autoloads -- Using an autoload -- Creating a HighscoreManager autoload -- Autoloads in the remote tree -- Adding a UI in the main menu and game scene -- Using the highscore in the main menu -- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 11: Playing Together with Multiplayer -- Technical requirements -- A crash course in computer networking -- What is a Transport Layer? …”
Publicado 2024
Libro electrónico -
1626Publicado 2018Tabla de Contenidos: “…-- How to Shift From Observation to Coaching -- Coaching Scenario #1 -- Coaching and Development -- Coaching Scenario #2 -- Coaching and Development -- Cross the Finish Line -- Chapter Twelve: 15 Common Coaching Killers That Sabotage Coaching Success -- Toxic Tactic #1: Nine Painfully Stupid, Disempowering Words to Stop Using -- Avoid These Damaging, Problem-Focused Questions -- Toxic Tactic #2: Are You Coaching People or Closing Them? …”
Libro electrónico -
1627Publicado 2017Tabla de Contenidos: “…8.1 - RAPID-N -- 8.1.1 - Scientific Module -- 8.1.2 - Industrial Plants and Units Module -- 8.1.3 - Natural-Hazards Module -- 8.1.4 - Natech Risk-Analysis Module -- 8.1.5 - Outlook -- 8.2 - PANR -- 8.3 - TRAS 310 and TRAS 320 -- 8.3.1 - TRAS 310 "Precautions and Measures Against the Hazard Sources Precipitation and Flooding" -- 8.3.1.1 - Scope of Application -- 8.3.1.2 - Methodological Approach of TRAS 310 -- 8.3.1.3 - Hazard Source Analysis -- 8.3.1.3.1 - Simplified hazard source analysis -- 8.3.1.3.2 - Detailed hazard source analysis -- 8.3.1.3.3 - Consideration of climate change -- 8.3.1.4 - Determination of Threatened Safety-Relevant Parts of Establishments and Installations -- 8.3.1.5 - Determination of Possible Causes of Major Accidents -- 8.3.1.6 - Specification of Scenarios and Protection Aims -- 8.3.1.7 - Elaboration of Protection Concepts for Scenarios -- 8.3.1.8 - Review of Protection Concepts -- 8.3.1.9 - Determination of Accident Scenarios -- 8.3.1.10 - Specification of Measures to Mitigate the Effects of Major Accidents -- 8.3.1.11 - Planning for Emergencies -- 8.3.1.12 - Design Criteria for the Consideration of Climate Change -- 8.3.2 - TRAS 320 "Precautions and Measures Against the Hazard Sources Wind, Snow Loads and Ice Loads" -- 8.3.3 - Summary -- 8.4 - Other methodologies -- References -- Chapter 9 - Quantitative Methods for Natech Risk Assessment -- 9.1 - ARIPAR -- 9.1.1 - Framework of the ARIPAR-GIS Natech Module -- 9.1.2 - The ARIPAR-GIS Software -- 9.1.3 - The Natech Package of the ARIPAR-GIS Software -- 9.1.4 - Input Data and Calculation Procedure -- 9.1.5 - Equipment Vulnerability Models -- 9.1.6 - Output -- 9.2 - RISKCURVES -- References -- Chapter 10 - Case-Study Application I: RAPID-N -- 10.1 - Earthquake scenario -- 10.2 - Chemical Facility Description -- 10.3 - Natech Risk Analysis -- 10.3.1 - Damage Analysis…”
Libro electrónico -
1628Publicado 2022Tabla de Contenidos: “…-- 3.1.2 Corrosion Management: What It Is and What It Is Not -- 3.1.3 Management of Corrosion -- 3.1.3.1 Corrosion Reactions Geometry -- 3.1.3.2 Failure -- 3.1.3.3 Corrosion Prevention and Corrosion Control -- 3.1.3.4 CM Model -- 3.1.4 Phase 1: Definition -- 3.1.5 Phase 2: Application -- 3.1.6 Phase 3: Monitoring -- 3.1.7 Phase 4: Feedback -- 3.1.7.1 Corrosion Cost Estimation Model -- 3.1.7.2 Corrosion Knowledge Management (CKM) -- 3.2 Management of Corrosion and COVID19 -- 3.3 Environment -- 3.4 Application of Management of Corrosion Scheme to Underground Fire Water Ring4 -- 3.5 Damage Management -- 3.6 Algorithm…”
Libro electrónico -
1629por Mullennex, LaurenTabla de Contenidos: “…Moderating images -- Using the DetectModerationLabels API -- Using top-level categories -- Using secondary-level categories -- Putting it together -- Quick recap -- Moderating videos -- Creating the supporting resources -- Finding the resource ARNs -- Uploading the sample video to Amazon S3 -- Using the StartContentModeration API -- Examining the completion notification -- Using the GetContentModeration API -- Quick recap -- Using AWS Lambda to automate the workflow -- Implement the Start Analysis Handler -- Implementing the Get Results Handler -- Publishing function changes -- Experiment with the end-to-end -- Summary -- Part 3: CV at the edge -- Chapter 7: Introducing Amazon Lookout for Vision -- Technical requirements -- Introducing Amazon Lookout for Vision -- The benefits of Amazon Lookout for Vision -- Creating a model using Amazon Lookout for Vision -- Choosing the model type based on your business goals -- Creating a model -- Starting your model -- Analyzing an image -- Stopping your model -- Building a model to identify damaged pills -- Step 1 - collecting your images -- Step 2 - creating a project -- Step 3 - creating the training and test datasets -- Step 4 - verifying the dataset -- Step 5 - training your model -- Validating it works -- Step 1 - trial detection -- Step 2 - starting your model -- Step 3 - analyzing an image with your model -- Step 4 - stopping your model -- Summary -- Chapter 8: Detecting Manufacturing Defects Using CV at the Edge -- Technical requirements -- Understanding ML at the edge -- Deploying a model at the edge using Lookout for Vision and AWS IoT Greengrass -- Step 1 - Launch an Amazon EC2 instance -- Step 2 - Create an IAM role and attach it to an EC2 instance -- Step 3 - Install AWS IoT Greengrass V2 -- Step 4 - Upload training and test datasets to S3 -- Step 5 - Create a project…”
Publicado 2023
Libro electrónico -
1630por MacCharles, AlanTabla de Contenidos: “…-- 3.4 IJV Formation Progression Checklist -- 3.5 Progression Checklist Question Rationale -- 3.6 Progression Checklist Summary -- 3.7 Conclusion -- CHAPTER FOUR Securing Internal Alignment: How To Avoid Damaging 'Own Goals' -- 4.1 Alignment -- 4.2 Eight Principle Framework -- Section II Preparing a JV -- CHAPTER FIVE Good Process Attributes: What Indicates A Negotiation Is Likely To Conclude Successfully? …”
Publicado 2024
Libro electrónico -
1631Publicado 2022Tabla de Contenidos: “…-- 6.2 Gaining more control: Privilege escalation -- 6.3 Data theft -- 6.3.1 Advanced persistent threat -- 6.3.2 Making money from stolen financial details -- 6.3.3 Making money from ID theft -- 6.4 Insider threats -- 6.5 "Blast radius": Limiting the damage -- 6.5.1 AI, machine learning, behavioral analysis, and snake oil -- 6.6 Building your castle: Defense in depth -- 6.6.1 Perimeter security: Build a wall -- 6.6.2 Zero trust: The attackers are everywhere -- Summary -- 7 The Dark Web: Where is stolen data traded? …”
Libro electrónico -
1632Publicado 2023Tabla de Contenidos: “…Viewing Etsy Ads stats -- Deactivating Etsy Ads -- Changing your ad spend -- Discount of Monte Cristo: Offering Discounts -- Running a sale -- Creating a promo code -- Sending targeted offers -- Managing Your Discount Offers -- Editing a sale or ending a sale early -- Deactivating a promo code or targeted offer -- Social Studies: Promoting Your Etsy Shop and Listings on Social Media -- Connecting your Etsy shop to Facebook, Pinterest, and Twitter -- Posting on social media from within Etsy -- Social media best practices -- Camera Ready: Sharing Videos with Explore -- Chapter 15 You've Been Served: Providing Exceptional Customer Service -- Sliding into your DMs: Accessing Etsy Messages -- Accessing, reading, and replying to messages -- Sending a new message -- Receiving email notifications -- Let's Talk: Communicating with Buyers -- Thanking the buyer -- Answering customer questions -- Confirming shipping and seeking feedback -- Bungle Fever: Handling a Botched Transaction and Other Tough Issues -- Dealing with a lost item -- Refunding lost or damaged items through Etsy's Purchase Protection program -- Handling returns and issuing refunds -- Canceling an order -- Responding to a negative review -- Dealing with a difficult customer -- Chapter 16 Business as Usual: Managing Your Etsy Shop -- Room and Dashboard: Exploring the Shop Manager Dashboard -- One Track Mind: Tracking and Analyzing Shop Stats -- High Finance: Viewing Your Etsy Financials -- It's Payday! …”
Libro electrónico -
1633Publicado 2012Tabla de Contenidos: “…Iacoviello -- Quantitative characterization of ferritic ductile iron damaging micromechanisms : fatigue loadings / V. Di Cocco. …”
Libro electrónico -
1634Publicado 2019Tabla de Contenidos: “…Five Examples Illustrate the Diversity of Synovial Joints -- 8.6. Joints are Easily Damaged by Injury, Inflammation, and Degeneration -- A Closer Look: Joints: From Knights in Shining Armor to Bionic Humans -- Developmental Aspects of Joints -- 9. …”
Libro electrónico -
1635por Organisation for Economic Co-operation and Development.“…As the Fukushima Daiichi nuclear power plant (NPP) accident illustrates, many challenges have to be faced in maintaining safety over the long term in a damaged NPP following a severe accident. These comprise maintaining and monitoring a stabilised and controlled state of the damaged plant; implementing provisions against further failures; evaluating the plant damaged state from a physical and radiological standpoint and ranking related risks; preparing and achieving fuel retrieval (either fuel assemblies stored in spent fuel pools or fuel debris from damaged reactors); and managing safely plant recovery and accident waste. …”
Publicado 2021
Libro electrónico -
1636Publicado 2020Tabla de Contenidos: “…6.7 Investigative Technique: Records Involving Economic Damages -- 6.8 Investigative Technique: Preservation of Evidence -- 6.9 Conclusion -- Notes -- 7: Surveillance Techniques -- 7.1 Purposes and Functions -- 7.2 Tactics and Strategy in Surveillance -- 7.2.1 What Are the Steps of Surveillance? …”
Libro electrónico -
1637por de Bruin, Kelly“…These adaptation cost curves reflect how different adaptation levels will provide a wedge between gross damages (i.e. damages that would occur in the absence of adaptation) and residual damages. …”
Publicado 2009
Capítulo de libro electrónico -
1638Publicado 2022“…The results then form subject of a legislative proposal that takes into account the aim of actions for cartel damages as well as the need for an effective public enforcement…”
Libro electrónico -
1639Publicado 2015“…The book then dives into specific issues that arise with old or damaged photos, such as removal of dust, scuff marks, and stains; repairing actual damage such as creases or missing corners; correcting color-related problems like blue or yellow-tinted images and oversaturation; and improving the contrast and brightness of both color and black-and-white images. …”
Libro electrónico -
1640Publicado 2017Tabla de Contenidos: “…Front Cover -- Microfabrication and Precision Engineering -- Copyright Page -- Contents -- List of contributors -- About the editor -- Preface -- 1 Modeling of micro- and nano-scale cutting -- 1.1 Introduction -- 1.2 Modeling of microscale cutting -- 1.2.1 Minimum chip thickness and size effect -- 1.2.2 FEM modeling of microscale cutting -- 1.2.3 FEM basics -- 1.2.4 FEM cutting models -- 1.2.5 Friction modeling -- 1.2.6 Material modeling -- 1.3 Modeling of nanoscale cutting -- 1.3.1 Model geometry and material microstructure -- 1.3.2 Potential function -- 1.3.3 Boundary conditions and input parameters -- 1.3.4 Numerical integration and equilibration -- Conclusions -- References -- 2 Machining scale: workpiece grain size and surface integrity in micro end milling -- 2.1 Introduction -- 2.2 Specific cutting energy -- 2.3 Size effect -- 2.4 Workpiece microstructure scale -- 2.5 Surface integrity -- 2.5.1 Burr formation -- 2.5.2 Chip formation -- 2.5.3 Roughness -- 2.5.4 Microhardness -- 2.5.5 Microstructural damages -- 2.5.6 Size effect -- References -- 3 Micromachining technique based on the orbital motion of the diamond tip -- 3.1 Introduction -- 3.2 Principle of micromachining using the orbital motion of the diamond tip -- 3.3 Micromachining setup and test of the stage's trajectory -- 3.3.1 Establishment of the micromachining setup and the machining procedure -- 3.3.2 Test of the trajectory of the nanopiezo stage in the orbital motion -- 3.4 Micromachining mechanism using the orbital motion of the tip -- 3.4.1 Comparison of chip states with the conical and pyramidal tips -- 3.4.2 Difference between the micromilling process and this technique -- 3.4.3 Determination of the uncut chip thickness and the cutting rake angle -- 3.5 Formation mechanism and control methods of burrs -- 3.5.1 Burr formation during machining with the conical tip…”
Libro electrónico