Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 444
- Engineering & Applied Sciences 406
- Development 365
- Design 332
- Application software 323
- Management 321
- History 315
- Web sites 277
- Filosofía 268
- Matemáticas 244
- Computer Science 242
- Mecánica 241
- Web site development 241
- Photography 227
- Finance 214
- Digital techniques 211
- Data processing 209
- Historia 200
- Computer programs 175
- Ensenyament 172
- JavaScript (Computer program language) 170
- Computer networks 162
- Física 161
- Programming 157
- Teoría de las estructuras 147
- Computer graphics 143
- HTML (Document markup language) 143
- Estudio y enseñanza 138
- Computer programming 130
- Leadership 130
-
14821Publicado 2023Tabla de Contenidos: “…Including functioning elements into the assessment of civil invalidity -- 5.4.1. …”
Libro electrónico -
14822Publicado 2012Tabla de Contenidos: “…7.1 Preliminaries of Dynamical Systems 220 -- 7.2 Bifurcations of Nonlinear Dynamical Systems 226 -- 7.3 The Averaging Method and Multiple Time Scales 230 -- 7.4 Averaging Theory in Coupled Oscillator Systems 231 -- 7.5 Obtaining the Parameters of the van der Pol Oscillator Model 235 -- 7.6 An Alternative Perturbation Model for Coupled-Oscillator Systems 238 -- 7.7 Matrix Equations for the Steady State and Stability Analysis 242 -- 7.8 A Comparison between the Two Perturbation Models for Coupled Oscillator Systems 246 -- 7.9 Externally Injection-Locked COAs 247 -- 7.10 Phase Noise 250 -- 7.11 Modulation 256 -- 7.12 Coupled Phase-Locked Loops 258 -- 7.13 Conclusion 261 -- Chapter 8 Numerical Methods for Simulating Coupled-Oscillator Arrays 263 -- 8.1 Introduction to Numerical Methods 264 -- 8.2 Obtaining Periodic Steady-State Solutions of Autonomous Circuits in Harmonic-Balance Simulators 270 -- 8.3 Numerical Analysis of a Voltage-Controlled Oscillator 272 -- 8.4 Numerical Analysis of a Five-Element Linear Coupled-Oscillator Array 278 -- 8.5 Numerical Analysis of an Externally Injection-Locked Five-Element Linear Coupled-Oscillator Array 286 -- 8.6 Harmonic Radiation for Extended Scanning Range 288 -- 8.7 Numerical Analysis of a Self-Oscillating Mixer 291 -- 8.8 Conclusion 296 -- Chapter 9 Beamforming in Coupled-Oscillator Arrays 297 -- 9.1 Preliminary Concepts of Convex Optimization 297 -- 9.2 Beamforming in COAs 301 -- 9.3 Stability Optimization of the Coupled-Oscillator Steady-State Solution 308 -- 9.4 Multi-Beam Pattern Generation Using Coupled-Oscillator Arrays 311 -- 9.5 Control of the Amplitude Dynamics 315 -- 9.6 Adaptive Coupled-Oscillator Array Beamformer 317 -- 9.7 Conclusion 320 -- Chapter 10 Overall Conclusions and Possible Future Directions 321 -- REFERENCES 325 -- ACRONYMS AND ABBREVIATIONS 341 -- INDEX 345.…”
Libro electrónico -
14823Publicado 2010Tabla de Contenidos: “…4 Designs and Layouts -- Calendars -- Additional Customizations -- Postcards -- Greeting Cards -- Additional Visual Elements -- Color Schemes -- Word Art -- Creating Building Blocks -- 5 Working with Longer Documents -- Text Boxes Revisited -- Formatting -- Linking Text Boxes -- Navigating Text Boxes -- Layout Strategies -- Master Pages -- Additional Master Page Options -- Importing Microsoft Word Documents -- Adding Images to the Document -- Word Documents with Images -- Wrapping Text Around Images -- Irregularly Shaped Images -- Formatting Text Boxes -- Text Fitting -- Text Direction -- Hyphenation -- Alignment -- Columns -- Word Art Lite -- Drop Cap -- Number Styles -- 6 Tables -- What Are Tables? …”
Libro electrónico -
14824Publicado 2013Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
Libro electrónico -
14825Publicado 2023Tabla de Contenidos: “…-- Accessing the WWW with Python -- Setting things up -- Creating a virtual environment -- Installing libraries -- Loading URLs -- URL handling and operations -- requests - Python library -- Implementing HTTP methods -- GET -- POST -- Summary -- Further reading -- Part 2: Beginning Web Scraping -- Chapter 3: Searching and Processing Web Documents -- Technical requirements -- Introducing XPath and CSS selectors to process markup documents -- The Document Object Model (DOM) -- XPath -- CSS selectors -- Using web browser DevTools to access web content -- HTML elements and DOM navigation -- XPath and CSS selectors using DevTools -- Scraping using lxml - a Python library -- lxml by example -- Web scraping using lxml -- Parsing robots.txt and sitemap.xml -- The robots.txt file -- Sitemaps -- Summary -- Further reading -- Chapter 4: Scraping Using PyQuery, a jQuery-Like Library for Python -- Technical requirements -- PyQuery overview -- Introducing jQuery -- Exploring PyQuery -- Installing PyQuery -- Loading a web URL -- Element traversing, attributes, and pseudo-classes -- Iterating using PyQuery -- Web scraping using PyQuery -- Example 1 - scraping book details -- Example 2 - sitemap to CSV -- Example 3 - scraping quotes with author details -- Summary -- Further reading…”
Libro electrónico -
14826Data Modeling with Microsoft Excel Model and Analyze Data Using Power Pivot, DAX, and Cube FunctionsPublicado 2023Tabla de Contenidos: “…-- Factors to consider when laying out your dashboard -- Purpose and audience -- Clarity and simplicity -- Hierarchy and organization -- Consistency and visual harmony -- Interactivity and user controls -- Data visualization techniques -- Accessibility and documentation -- Common dashboard elements -- PivotTables -- Charts -- Text boxes and labels -- Images and shapes -- Sparklines -- Conditional formatting -- Making your dashboard interactive -- Slicers -- Hyperlinks -- Summary -- Chapter 8: Visualization Elements for Your Dashboard - Slicers, PivotCharts, Conditional Formatting, and Shapes…”
Libro electrónico -
14827Publicado 2000Tabla de Contenidos: “…-- BACKGROUND INFORMATION -- Sources of Quality Data -- QUALITY OF CARE IN THE VHA AND EFFECTS OF THE NATIONAL FORMULARY -- PHARMACY, CLINICAL, AND FORMULARY PROGRAM ELEMENTS RELEVANT TO QUALITY OF CARE -- Clinical Pharmacy -- P& -- T COMMITTEES -- THE VA PBM COMPLEX -- Additions to, and Quality of, the National Formulary -- POLICIES AND PROCEDURES -- Drug Class Reviews -- Clinical Guidelines and Drug Utilization Reviews -- The Nonformulary Process -- Therapeutic Interchange, Policy, and Results…”
Libro electrónico -
14828por Knudsen, SteenTabla de Contenidos: “…Spotted Arrays 9 -- 1.6 Summary 11 -- 1.7 Further Reading 13 -- 2 Overview of Data Analysis 15 -- 3 Basic Data Analysis 17 -- 3.1 Absolute Measurements 17 -- 3.2 Scaling 18 -- 3.2.1 Example: Linear and Nonlinear Scaling 20 -- 3.3 Detection of Outliers 20 -- 3.4 Fold Change 21 -- 3.5 Significance 22 -- 3.5.1 Nonparametric Tests 24 -- 3.5.2 Correction for Multiple Testing 24 -- 3.5.3 Example I: t-Test and ANOVA 25 -- 3.5.4 Example II: Number of Replicates 26 -- 3.6 Summary 28 -- 3.7 Further Reading 29 -- 4 Visualization by Reduction of Dimensionality 33 -- 4.1 Principal Component Analysis 33 -- 4.2 Example 1: PCA on Small Data Matrix 35 -- 4.3 Example 2: PCA on Real Data 37 -- 4.4 Summary 37 -- 4.5 Further Reading 39 -- 5 Cluster Analysis 41 -- 5.1 Hierarchical Clustering 41 -- 5.2 K-means Clustering 43 -- 5.3 Self-Organizing Maps 44 -- 5.4 Distance Measures 45 -- 5.4.1 Example: Comparison of Distance Measures 47 -- 5.5 Normalization 49 -- 5.6 Visualization of Clusters 50 -- 5.6.1 Example: Visualization of Gene Clusters in -- Bladder Cancer 50 -- 5.7 Summary 50 -- 5.8 Further Reading 52 -- 6 Beyond Cluster Analysis 55 -- 6.1 Function Prediction 55 -- 6.2 Discovery of Regulatory Elements in Promoter -- Regions 56 -- 6.2.1 Example 1: Discovery of Proteasomal Element 57 -- 6.2.2 Example 2: Rediscovery of Mlu Cell Cycle -- Box (MCB) 57 -- 6.3 Integration of data 58 -- 6.4 Summary 59 -- 6.5 Further Reading 59 -- 7 Reverse Engineering of Regulatory Networks 63 -- 7.1 The Time-Series Approach 63 -- 7.2 The Steady-State Approach 64 -- 7.3 Limitations of Network Modeling 65 -- 7.4 Example 1: Steady-State Model 65 -- 7.5 Example 2: Steady-State Model on Real Data 66 -- 7.6 Example 3: Steady-State Model on Real Data 68 -- 7.7 Example 4: Linear Time-Series Model 68 -- 7.8 Further Reading 71 -- 8 Molecular Classifiers 75 -- 8.1 Classification Schemes 76 -- 8.1.1 Nearest Neighbor 76 -- 8.1.2 Neural Networks 76 -- 8.1.3 Support Vector Machine 76 -- 8.2 Example I: Classification of Cancer Subtypes 77 -- 8.3 Example II: Classification of Cancer Subtypes 78 -- 8.4 Summary 79 -- 8.5 Further Reading 79 -- 9 Selection of Genes for Spotting on Arrays 81 -- 9.1 Gene Finding 82 -- 9.2 Selection of Regions Within Genes 82 -- 9.3 Selection of Primers for PCR 83 -- 9.4 Selection of Unique Oligomer Probes 83 -- 9.4.1 Example: Finding PCR Primers for Gene -- AF105374 83 -- 9.5 Experimental Design 84 -- 9.6 Further Reading 84 -- 10 Limitations of Expression Analysis 87 -- 10.1 Relative VersusAbsoluteRNA Quantification 88 -- 10.2 Further Reading 88 -- 11 Genotyping Chips 91 -- 11.1 Example: NeuralNetworksfor GeneChipprediction 91 -- 11.2 Further Reading 93 -- 12 Software Issues and Data Formats 95 -- 12.1 Standardization Efforts 96 -- 12.2 Standard File Format 97 -- 12.2.1 Example: Small Scripts in Awk 97 -- 12.3 Software for Clustering 98 -- 12.3.1 Example: Clustering with ClustArray 99 -- 12.4 Software for Statistical Analysis 99 -- 12.4.1 Example: StatisticalAnalysis with R 99 -- 12.4.2 The affyR Software Package 103 -- 12.4.3 Commercial Statistics Packages 103 -- 12.5 Summary 103 -- 12.6 Further Reading 104 -- 13 Commercial Software Packages 105 -- 14 Bibliography 109 -- Index 123.…”
Publicado 2002
Descripción del editor
Índice
Información biográfica
Libro -
14829Next generation wireless applications creating mobile applications in a Web 2.0 and Mobile 2.0 worldpor Golding, Paul, 1968-Tabla de Contenidos: “…-- 2.3 A Concentric Networks Approach -- 2.3.1 Social Network -- 2.3.2 Device Network -- 2.3.3 Radio Frequency (RF / Wireless) Network -- 2.3.4 Internet Protocol (IP) Network -- 2.3.5 Content Network -- 2.4 Application Topologies -- 2.5 Physical Network Elements -- 3 Becoming an Operator 2.0 -- 3.1 Introduction -- 3.2 What Applications Can I Sell? …”
Publicado 2008
Libro electrónico -
14830Publicado 2012Tabla de Contenidos:Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
14831por Ortega, Francisco A.Tabla de Contenidos: “…Elementos para una discusión metodológica / Elisa Cárdenas Ayala -- Imágenes de la democracia: la representación de los conceptos fundamentales (y sus símbolos) / Gonzalo Capellán -- La constitución mixta: una gramática elemental para la imaginación política en el paso a la modernidad / Pablo Sánchez León -- El concepto estado en el antiguo régimen / Gilberto Loaiza Cano -- Historia de los conceptos e historia social del tiempo: una propuesta / João Paulo Pimenta -- De conceptos y categorías: el caso de colonia / Francisco A. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14832por San Eugenio Vela, Jordi deTabla de Contenidos: “…Orígens i evolució; 2.2. Definició i elements constitutius; 2.3. La marca, avui; 2.4. La nova gestió i comunicació de la marca; Capítol III; 3.1. …”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14833por Martin Hernandez, Juan JesusTabla de Contenidos: “…SISTEMES DE SEGURETAT I CONFORT; ÍNDEX; UNITAT 1; 1 >> El so; 2 >> Elements d'una instal·lació de so en vehicles; 3 >> Instal·lacions d'àudio en vehicles; 4 >> Criteris i normes per a la instal·lació d'equips d'àudio; UNITAT 2; 1 >> Classificació dels sistemes de seguretat; 2 >> Sistemes de seguretat preventiva; 3 >> Sistemes de seguretat activa; 4 >> Seguretat passiva; UNITAT 3; 1 >> Panys mecànics; 2 >> Tancament centralitzat; 3 >> Sistemes d'alarma; 4 >> Immobilitzadors electrònics; UNITAT 4; 1 >> Fonaments sobre motors elèctrics; 2 >> Alçavidres elèctric…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14834por Ortiz Campos, Francisco JoséTabla de Contenidos: “…Bloque 7 Aplicas las funciones trigonométricas7.1 Funciones trigonométricas en el plano cartesiano; 7.2 Círculo unitario; 7.3 Grá.cas de las funciones seno, coseno y tangente; Bloque 8 Aplicas las leyes de senos y cosenos; 8.1 Leyes de senos y cosenos; Bloque 9 Aplicas la estadística elemental; 9.1 Población; 9.2 Muestra; 9.3 Medidas de tendencia central para datos no agrupados y agrupados; 9.4 Medidas de dispersión: para datos agrupados y no agrupados; Bloque 10 Empleas conceptos elementales de probabilidad; 10.1 Probabilidad clásica; Glosario; Bibliografía; Vínculos en Internet…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14835Publicado 2012Tabla de Contenidos: “…6 Fear, maths, brief dramatherapy and neuroscience7 Violence and laughter: how school-based dramatherapy can go beyond behaviour management for boys at risk of exclusion from school; 8 All the better to see you with: healing metaphors in a case of sexual abuse; 9 Romeo and Juliet and dramatic distancing: chaos and anger contained for inner-city adolescents in multicultural schools; 10 Looking for meaning with bereaved children and families: `Bring back my Daddy' and other stories; 11 Education, the Playground Project and elements of psychodrama…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14836Publicado 2013Tabla de Contenidos: “…Frontmatter -- Inhalt -- Vorwort -- Avant-propos -- Verzeichnis der Tagungsteilnehmer -- La résolution des conflits en matière de commerce á travers les archives du Parlement au XIIIe siècle / Conflict Resolution at a Medieval English Fair / Die Erwartungen mittelalterlicher Kaufleute an Gerichtsverfahren: Hansische Privilegien als Indikator / International Trade Disputes and ius commune: Legal Arguments on the 'Gdańsk Issue' during the Hanseatic Embassy to London in 1553 / Brüder unter sich: Die Handelsgesellschaft Brentano vor Gericht. Elemente privater Konfliktlösung im Reichskammergerichtsprozess / Formen der Konfliktlösung im Handels- und Seerecht in Nürnberg, Hamburg und Leipzig zwischen 1500 und 1800 / Le naufrage, un événement conflictuel au XVIIIe siècle: L'exemple de l'Amirauté de Cornouaille / Mer et droit à Dunkerque ou l'impossible conciliation (XVIIe-XIXe siècles) / Le contentieux du commerce des toiles, du tribunal des manufactures au tribunal de commerce: L'exemple de Quintin (XVIIIe-XIXe siècles) / Les modalités de règlement des conflits commerciaux entre la France et les Etats-Unis au tournant du XIXe siècle : Un révélateur du fonctionnement des réseaux marchands / Seehandelsrechtliche Streitigkeiten vor dem Oberappellationsgericht der vier freien Städte Deutschlands (1820-1848) / Handelsrechtseinheit durch Höchstgerichtsbarkeit: Die Entstehung des Bundes- bzw. …”
Libro electrónico -
14837Publicado 2012Tabla de Contenidos: “…The Cult of the Virgin Mary, or the Feminization of the Male Element in the Roman Catholic Church? - A Psycho-Historical Hypothesis Ultramontanization = Italianization = Feminization?…”
Libro electrónico -
14838
-
14839Publicado 2014Tabla de Contenidos: “…A Note on Cervantes and the Cervantes Tradition; 2. Elements in Don Quixote Contributing to Creating a Tradition; 3. …”
Libro electrónico -
14840Publicado 2016Tabla de Contenidos: “…""6 National Infrastructure Protection Plan and Critical Infrastructure and Key Resources""""Asset Identification and Prioritization""; ""National Infrastructure Protection Plan""; ""Reference""; ""7 Vulnerability Assessment""; ""Introduction""; ""Assessing Your Vulnerabilities""; ""Level of Visibility""; ""Criticality of Target Site to Jurisdiction""; ""Impact Outside of the Jurisdiction""; ""Potential Threat Element Access to the Target (Accessibility)""; ""Potential Target Threat of Hazard""; ""Potential Target Site Population""; ""Potential for Collateral Mass Casualties""…”
Libro electrónico