Mostrando 2,261 - 2,280 Resultados de 2,315 Para Buscar '"FOX"', tiempo de consulta: 0.09s Limitar resultados
  1. 2261
    Publicado 2020
    Tabla de Contenidos: “…Revelación estrujante: el senador John McCain, verdadero califadel Estado Islámico yihadista ; 4. Reclaman en Fox News una yihad estadounidense ; 5. Yihadistas en Chihuahua para invadir Estados Unidos? …”
    Libro electrónico
  2. 2262
    por AA., VV
    Publicado 2018
    Tabla de Contenidos: “…FRAGMENTOS DE UNA -- HALLAZGO -- ANÉCDOTA -- REVISTA FOX NO 1 -- UNA ESTÉTICA AUTÓCTONA -- CARMEN BÁEZ -- GEOGRAFÍA HISTÓRICA DE JALISCO -- TRLPTICO DE ARRABAL -- UN CASO -- EXAMEN DE LIBROS -- LA PLANCHETA -- NÚMERO 7, PRIMERO QUINCENA DE AGOSTO, 1929 -- POÉTICA DE LA NOVELA -- NOCTURNO DE LA ESTATUA -- ''ESTUDIO -- CONTRA LAS FÁBULAS LITERARIAS -- ESPEJO VACIO -- NAIPE -- LA PLANCHETA -- GUADALAJARA FRAGMENTOS DE UNA -- HOMENAJE A ENRIQUE JOSÉ VARONA -- HALLAZGO -- NUEVA POESÍA -- JOSÉ MARIA -- TARJETA POSTAL -- EXAMEN DE LIBROS -- NÚMERO 8, SEGUNDA QUINCENA DE AGOSTO, 1929 -- LA FORMA ESTRICTA DEL POEMA -- CIENCIA Y FILOSOFÍA. …”
    Libro electrónico
  3. 2263
    Publicado 2018
    Tabla de Contenidos: “….) -- 9.5.3 LA ALTERNANCIA POLÍTICA: VICENTE FOX QUESADA (2000-2006) Y FELIPE (...) -- 9.5.4 EL RETORNO A LOS PINOS: ENRIQUE PEÑA NIETO (2012-2018) -- REFERENCIAS DOCUMENTALES…”
    Libro electrónico
  4. 2264
    por Foxe, John
    Publicado 1885
    Libro
  5. 2265
    Publicado 2013
    Tabla de Contenidos: “…16.1 Applications of financial engineering -- 16.2 Sources of financial risk -- 16.3 Accounting and economic risk -- 16.4 Defining hedging objectives -- 16.5 Measuring hedge efficiency -- 16.6 The finance division as a profit centre -- 17 Managing currency risk -- 17.1 Forwards and futures solutions -- 17.2 Options are chameleons -- 17.3 How FX options are different -- 17.4 The scenario -- 17.5 Comparing hedging strategies -- 17.6 Basic option hedges -- 17.7 Selling options within a hedging programme -- 17.8 Collars, range-forwards, forward-bands and cylinders -- 17.9 Spread hedges -- 17.10 Participating forwards -- 17.11 Ratio forwards -- 17.12 Break-forwards, FOXs and forward-reversing options -- 17.13 Flexi-forwards -- 17.14 Using exotic options -- 17.15 Selling options outside a hedging programme -- 17.16 Dynamic hedging -- 17.17 Which strategy is best? …”
    Libro electrónico
  6. 2266
    Libro
  7. 2267
    Publicado 2017
    Tabla de Contenidos: “…Gert Ferrano MV) -- 6.6.1 Explanation of the Most Important Measurements -- 6.7 Camera Noise (by Henning Haider AVT, Updated by Author) -- 6.7.1 Photon Noise -- 6.7.2 Dark Current Noise -- 6.7.3 Fixed Pattern Noise (FPN) -- 6.7.4 Photo Response Non Uniformity (PRNU) -- 6.7.5 Reset Noise -- 6.7.6 1/f Noise (Amplifier Noise) -- 6.7.7 Quantization Noise -- 6.7.8 Noise Floor -- 6.7.9 Dynamic Range -- 6.7.10 Signal to Noise Ratio -- 6.7.11 Example 1: SONY IMX-174 Sensor (mvBlueFOX3-2024) -- 6.7.12 Example 2: CMOSIS CMV2000 (mvBlueCOUGAR-X104) -- 6.8 Useful Links and Literature -- 6.9 Digital Interfaces -- Chapter 7 Smart Camera and Vision Systems Design -- 7.1 Introduction to Vision System Design -- 7.2 Definitions -- 7.3 Smart Cameras -- 7.3.1 Applications -- 7.3.2 Component Parts -- 7.3.3 Programming and Configuring -- 7.3.4 Environment -- 7.4 Vision Sensors -- 7.4.1 Applications -- 7.4.2 Component Parts -- 7.4.3 Programming and Configuring -- 7.4.4 Environment -- 7.5 Embedded Vision Systems -- 7.5.1 Applications -- 7.5.2 Component Parts -- 7.5.3 Programming and Configuring -- 7.5.4 Environment -- 7.6 Conclusion -- References -- Further Reading -- Chapter 8 Camera Computer Interfaces…”
    Libro electrónico
  8. 2268
    Publicado 2018
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Contents -- Foreword by Aruna Sundararajan -- Foreword by Rainer Deutschmann -- Preface -- Acknowledgements -- List of Abbreviations -- Chapter 1 Overview of Mobile Networks -- 1.1 Introduction -- 1.2 Mobile Network Evolution -- 1.2.1 First-generation System (Analogue System) -- 1.2.2 Second-generation System (Digital System) -- 1.2.3 Third-generation Networks (WCDMA in UMTS) -- 1.2.4 Fourth-generation Networks (LTE) -- 1.2.5 Fifth-generation Networks -- 1.3 Information Theory -- 1.3.1 Multiple Access Techniques -- 1.3.2 Modulations -- 1.3.3 OSI Reference Model -- 1.4 Second-generation Mobile Network -- 1.4.1 Base Station Subsystem (BSS) -- 1.4.2 Network Subsystem (NSS) -- 1.4.3 Network Management System (NMS) -- 1.4.4 Interfaces and Signalling in GSM -- 1.5 Third-generation Mobile Networks -- 1.5.1 Radio Access Network (RAN) -- 1.5.2 Core Network (CN) -- 1.5.3 Interfaces and Signalling in 3G Networks -- 1.6 Fourth-generation Mobile Networks -- 1.6.1 Access Network -- 1.6.2 Evolved Packet Core Network -- 1.6.3 Interfaces and Signalling -- 1.7 Fifth-generation Networks -- 1.8 Supporting Technologies -- 1.8.1 ADSL2+ -- 1.8.2 VDSL2 -- 1.8.3 FTTN -- 1.8.4 V+ -- 1.8.5 GPON -- 1.8.6 GEPON -- 1.8.7 G.Fast -- 1.8.8 XG-PON1 -- 1.8.9 XGS-PON -- 1.8.10 NGPON2 -- 1.8.11 NB-IoT -- 1.8.12 LTE eMTC -- 1.8.13 RFID -- 1.8.14 NFC -- 1.8.15 ZigBee -- 1.8.16 Z-Wave -- 1.8.17 LoRa -- 1.8.18 SigFox -- 1.8.19 Li-Fi -- 1.8.20 V2V and V2I -- 1.8.21 SRD -- 1.8.22 RLAN -- 1.8.23 PMR -- Part I: 2G GSM and EGPRS Network Planning and Optimisation -- Chapter 2 Radio Network Planning and Optimisation -- 2.1 Basics of Radio Network Planning -- 2.1.1 Scope of Radio Network Planning -- 2.1.2 Cell Shapes -- 2.1.3 Elements in a Radio Network -- 2.1.4 Channel Configuration in GSM -- 2.2 Radio Network Planning Process…”
    Libro electrónico
  9. 2269
    Publicado 2024
    Tabla de Contenidos: “…9.1.1.6 Slammer and Sobig - Business Systems, Nuclear Power Plants, and Train Signaling (2003) -- 9.1.1.7 Conficker (2008-2011) -- 9.1.1.8 Wikileaks (2006 to present) -- 9.1.2 Hackers in the Russo-Ukraine War (2022+) -- 9.1.2.1 Independent Operations and the Russo-Ukraine War (2022+) -- 9.1.2.2 Killnet - Pro-Russian Operations -- 9.1.3 Independent Cyber Operations Wrap-up -- Bibliography -- Section I Cyber Operations Summary -- I.1 Introduction -- I.2 Phases of Cyber Operations -- I.2.1 1980s-2002 -- I.2.2 2003-2012 -- I.2.3 2013-present -- Bibliography -- Section II Introduction to Cyber Effects -- II.1 Cyber Effects Introduction -- II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects -- II.1.1.1 Strategic Cyber Effects -- II.1.1.2 Tactical Cyber Effects -- II.1.1.3 Criminal Cyber Effects -- II.1.2 Wrap-up -- Bibliography -- Chapter 10 Strategic Cyber Effects -- 10.1 Strategic Cyber Effects -- 10.1.1 STUXNET (2010) - Delaying a Nation-State's Nuclear Program -- 10.1.2 STUXNET Versus Operation Desert Fox Wrap-up -- Bibliography -- Chapter 11 Strategic Cyber Effects (2) -- 11.1 Critical Infrastructure Strategic Cyber Effects -- 11.1.1 Critical Infrastructure -- 11.1.1.1 Energy Sector -- 11.1.1.2 Telecommunications -- 11.1.1.3 Water -- 11.1.1.4 Agriculture -- 11.1.1.5 Rail -- 11.1.1.6 Election Attacks (IO) (2011s) -- 11.1.2 Media-Based Cyber Operations -- 11.1.3 Cyber Espionage Effects -- 11.1.3.1 Using Cyber to Speed Up the Development of a Fifth-Generation Fighter (e.g., J-31 from F-35 Drawings) -- 11.1.4 Cyber Strategic Effects' Wrap-up -- 11.A Strategic Effect Examples -- Bibliography -- Chapter 12 Tactical Cyber Effects -- 12.1 Cyber Tactical Effects -- 12.1.1 Conventional Example - Denying the Syrian Air Force's Ability to Operate -- 12.1.2 Russian Uses of Cyber (From 2007) -- 12.1.3 ISIS and the Cost of Suppressing a Cyber Entity…”
    Libro electrónico
  10. 2270
    por White, David Gordon aut
    Publicado 2020
    “…The present article addresses this question by surveying Eurasian traditions of 'were-creatures', in which the species of shape-shifting human sorceresses varies according to the regional habitats of a variety of creatures: jackals, wolves, hyenas, foxes, bats, and owls. In ancient Roman and medieval Islamic traditions, descriptions of these creatures and their vampirizing practices were most often found in horror-genre literature and accounts of foreign exotica; however in medieval South and East Asia, these predatory 'were-creatures' were integrated into esoteric traditions, wherein they played a salutary role in the transformation of tantric practitioners…”
    Artículo
  11. 2271
  12. 2272
    Mapa
  13. 2273
    Publicado 2022
    “…Research in this Special Issue includes welfare assessment related to pilot whales, finishing pigs, commercial turkey flocks, and dairy goats; the use of sensors or wearable technologies, such as heart rate monitors to assess sleep in dairy cows, ear tag sensors, and machine learning to assess commercial pig behaviour; non-invasive measures, such as video monitoring of behaviour, computer vision to analyse video footage of red foxes, remote camera traps of free-roaming wild horses, infrared thermography of effort and sport recovery in sport horses; telomere length and regulatory genes as novel biomarkers of stress in broiler chickens; the effect of environment on growth physiology and behaviour of laboratory rare minnows and housing system on anxiety, stress, fear, and immune function of laying hens; and discussions of natural behaviour in farm animal welfare and maintaining health, welfare, and productivity of commercial pig herds…”
    Libro electrónico
  14. 2274
    por Farago, Ladislas
    Publicado 1974
    Libro
  15. 2275
    Publicado 2014
    “…." -- Bob Burg, author of Endless Referrals and The Go-Giver "Jay Block is an industry icon and has taken his place as one of the career-coaching industry's most innovative thinkers and contributors." -- Frank X. Fox, Executive Director, Professional Association of Resume Writers and Career Coaches…”
    Libro electrónico
  16. 2276
    Publicado 2020
    “…This edition includes a new joint foreword by the volume’s editor, David Bates, and the current director of the Institute of Historical Research, Jo Fox…”
    Libro electrónico
  17. 2277
    por Owens, David A.
    Publicado 2012
    “…The author's research has been featured in the New York Times, Wall Street Journal, London Guardian and San Jose Mercury News, as well as on Fox News and on NPR's Marketplace Includes illustrative examples from leading organizations Offers a practical guide for bringing new ideas to fruition even within a previously rigid organizational culture This book gives people in organizations the conceptual framework and practical information they need to innovate successfully"--…”
    Libro electrónico
  18. 2278
    Publicado 2022
    “…Conservative operatives learned that playing on these emotions was the best way to persuade individuals to take action. Before talk radio, Fox News, Twitter, and Cambridge Analytica, conservatives used direct mail to spread messages of anxiety and anger to raise funds and mobilize the grassroots. …”
    Libro electrónico
  19. 2279
    Publicado 2017
    “…The three combine their deep backgrounds (65+ years of combined experience) in design strategy, information architecture, and UX design to craft business solutions for clients like Google, Ford, Fox, and GE…”
    Video
  20. 2280
    Publicado 2020
    “…From the real-life Lord of the Flies to the Blitz, a Siberian fox farm to an infamous New York murder, Stanley Milgram's Yale shock machine to the Stanford prison experiment, Bregman shows how believing in human kindness and altruism can be a new way to think - and act as the foundation for achieving true change in our society. …”
    Libro