Mostrando 1,681 - 1,700 Resultados de 1,847 Para Buscar '"Factory"', tiempo de consulta: 0.08s Limitar resultados
  1. 1681
    Publicado 2024
    “…From its beginnings as a sign of battle and piracy to the raising of a blood-stained flag at the Merthyr Rising and the arrival of the red flag at the Paris Commune, from the jungles of north-eastern India to the factories of Cuba, Red Threads explores how this symbol of working-class power first came to be held aloft in the hands of revolutionaries; who raises it today; and its meaning for the future." -- inside front jacket flap…”
    Libro
  2. 1682
    Publicado 2021
    “…When market pressures led to the consolidation of Edison lighting interests, he sold his factories to the new Edison General Electric Company. …”
    Electrónico
  3. 1683
    Publicado 2021
    “…You'll also learn how to implement ETL with Azure Data Factory. By the end of this book, you'll have a solid understanding of which Azure data services are the best fit for your model and how to implement the best design for your solution.What you will learn* Model relational database using normalization, dimensional, or Data Vault modeling* Provision and implement Azure SQL DB and Azure Synapse SQL Pools* Discover how to model a Data Lake and implement it using Azure Storage* Model a NoSQL database and provision and implement an Azure Cosmos DB* Use Azure Data Factory to implement ETL/ELT processes* Create a star schema model using dimensional modelingWho this book is forThis book is for business intelligence developers and consultants who work on (modern) cloud data warehousing and design and implement databases. …”
    Libro electrónico
  4. 1684
    Publicado 2005
    “…La composición adecuada para cada tipo de mezcla se determina mediante un diseño factorial incompleto con relaciones y variable de operación (1/3 33), Como variables de respuestas se seleccionaron la resistencia a la compresión a las 24 horas y la desmoldeabilidad. …”
    Enlace del recurso
    Artículo digital
  5. 1685
    Publicado 2020
    “…Se analiza la importancia concedida a la relación terapéutica, tomando como referencia un modelo factorial sobre la relación grupal. En base a los datos analizados, se acaba concluyendo que los pacientes evocan aspectos relativos a la relación terapéutica cuando dan respuesta a una encuesta de satisfacción, lo que indica su importancia en el balance que hacen de la psicoterapia de grupo. …”
    Enlace del recurso
    Artículo digital
  6. 1686
    Publicado 2020
    “…A confirmatory factor analysis was performed using the maximum likelihood estimation; the factorial invariance of the TASC-Spanish teacher measure across genders was analyzed using a multi-group confirmatory factor analysis. …”
    Enlace del recurso
    Artículo digital
  7. 1687
    Publicado 2006
    “…It includes agricultural robotics applications, routine material transport in factories, warehouses, office buildings and hospitals, indoor and outdoor security patrols, inventory verification, hazardous material handling, hazardous site cleanup, underwater applications, and numerous military applications. …”
    Libro electrónico
  8. 1688
    Publicado 2021
    “…Closed-field cultivation by means of agri-cubes, plant factories, vertical farming structures, and roof-top solar greenhouses has become the backbone of sustainable agriculture for producing all-year-round fresh fruits and vegetables. …”
    Libro electrónico
  9. 1689
    Publicado 2023
    “…This open access book is of interest to any researcher dealing with process and factory planning in manufacturing, like for cutting and additive manufacturing…”
    Libro electrónico
  10. 1690
    por Fornasiero, Rosanna
    Publicado 2024
    “…The roadmap's proposal is structured along 7 strategic action lines designed to face the challenges from the market such as personalized production, industrial sustainability, valorization of humans in factories, high efficiency, and to seize and develop the opportunities offered by enabling technologies such as innovative production processes, evolving and reconfigurable processes, cybersecurity, AI, and digital platforms…”
    Libro electrónico
  11. 1691
    por Ibáñez Martínez, Núria
    Publicado 2016
    “…Mitjançant l'Anàlisi Factorial Confirmatori es va verificar el model bifactorial format per dos factors, Conjugalitat i Parentalitat. …”
    Accés lliure
    Tesis
  12. 1692
    Publicado 2022
    “…Bazerman offer a passionate corrective to this view, casting today's organizations as decision factories in which effective leaders are decision architects, enabling those around them to make wise, ethical choices consistent with their own interests and the organization's highest values. …”
    Grabación no musical
  13. 1693
    Publicado 2020
    “…In this regard, data analytics and, specifically, the artificial intelligence is the vehicular technology towards the next generation of smart factories.Chapters in this book cover a diversity of current and new developments in the use of artificial intelligence on the industrial sector seen from the fourth industrial revolution point of view, namely, cyber-physical applications, artificial intelligence technologies and tools, Industrial Internet of Things and data analytics. …”
    Libro electrónico
  14. 1694
    Publicado 2022
    “…The menstrual product industry has played a large role in shaping the last hundred years of menstrual culture, from technological innovation to creative advertising, education in classrooms and as employers of thousands in factories around the world. How much do we know about this sector and how has it changed in later decades? …”
    Libro electrónico
  15. 1695
    Publicado 2022
    “…The menstrual product industry has played a large role in shaping the last hundred years of menstrual culture, from technological innovation to creative advertising, education in classrooms and as employers of thousands in factories around the world. How much do we know about this sector and how has it changed in later decades? …”
    Libro electrónico
  16. 1696
    Publicado 2024
    “…Overgrown cinchona fields and shuttered quinine factories may appear the stuff of postcolonial and postindustrial ruination, but quinine's remains are not dead. …”
    Libro electrónico
  17. 1697
    Publicado 1999
    Libro
  18. 1698
    Publicado 2012
    Tabla de Contenidos: “…11.4.3 Handling Pointers 319 -- 11.4.4 Finding Out Implementation Limits 320 -- 11.4.5 When an Area Service is Unavailable 321 -- 11.4.6 Backward Compatibility 322 -- 11.5 Concluding Remarks 322 -- 12 SA Forum Java Mappings: Specifications, Usage, and Experience 325 / Robert Hyerle and Jens Jensen -- 12.1 Introduction 325 -- 12.2 Background 325 -- 12.2.1 Early Exploration of Java Mappings in Hewlett / Packard 325 -- 12.2.2 Java in Ericsson 326 -- 12.2.3 The SA Forum Java Mapping Initiative 327 -- 12.3 Understanding the Java Mappings 328 -- 12.3.1 Java Application Integration Architecture 328 -- 12.3.2 Naming 329 -- 12.3.3 Package Structure 330 -- 12.3.4 The Underlying Objects 330 -- 12.3.5 Types 331 -- 12.3.6 Parameters, Exceptions, and Method Signatures 332 -- 12.3.7 Factories, Callbacks, and Life-cycles 333 -- 12.3.8 Callbacks and the Selection Object in Java 334 -- 12.4 Using the Java Mappings 335 -- 12.4.1 Integrating AIS Services with Java Applications 335 -- 12.4.2 Integrating AIS Services with Containerized Java Applications 342 -- 12.4.3 AIS Services in Mixed Language and Mixed Implementation Environments 343 -- 12.5 Going Further 343 -- 12.5.1 The Java Mapping Roadmap 343 -- 12.5.2 Related Java Standards and Other References 344 -- 13 SA Forum Middleware Implementations 347 / Mario Angelic and Ulrich Kleber -- 13.1 Introduction 347 -- 13.1.1 OpenHPI 347 -- 13.1.2 OpenSAF 348 -- 13.2 The OpenHPI Project 348 -- 13.2.1 Overview of the OpenHPI Solution 348 -- 13.2.2 User Perspective 351 -- 13.2.3 OpenHPI Tools 353 -- 13.2.4 Open Issues and Recommendations 354 -- 13.3 The OpenSAF Project 355 -- 13.3.1 Background 355 -- 13.3.2 OpenSAF Architecture 356 -- 13.3.3 SA Forum Compliant Services 360 -- 13.3.4 OpenSAF Infrastructure Services 364 -- 13.3.5 Managing OpenSAF 365 -- 13.3.6 Deploying OpenSAF 367 -- 13.4 Conclusion 368 -- 14 Integration of the VideoLAN Client with OpenSAF: An Example 371 / Anik Mishra and Ali Kanso -- 14.1 Introduction 371 -- 14.2 Going Under the Hood: The VLC Workflow 372.…”
    Libro electrónico
  19. 1699
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…9.7.11 Cellular Location -- 9.7.12 Network Connection -- 9.7.12.1 Wi‐Fi -- 9.7.12.2 Seen Bluetooth Devices -- 9.7.12.3 Paired Bluetooth Devices -- 9.7.12.4 iTunes Prefs Computer Connections -- 9.7.13 Evidence Destruction -- 9.7.13.1 Restore Information -- 9.8 Summary -- Chapter 10 Android -- 10.1 File Systems -- 10.2 Security -- 10.3 Application -- 10.4 Acquisition -- 10.4.1 Android Debug Bridge (ADB) -- 10.4.1.1 ADB Server -- 10.4.1.2 Extract APK from Android -- 10.4.2 Forensics Tools -- 10.4.2.1 Avilla -- 10.4.3 Downgrading Applications -- 10.4.3.1 Rooting -- 10.5 Analysis -- 10.6 Evidence of Location -- 10.6.1 System Information -- 10.6.1.1 Sim Card Info -- 10.6.2 User Settings -- 10.6.2.1 Accounts -- 10.6.2.2 Timezone -- 10.6.2.3 Dump User Data with adb -- 10.6.3 Communication -- 10.6.3.1 Call Logs -- 10.6.3.2 SMS/MMS -- 10.6.3.3 Email Information -- 10.6.4 Application Usage -- 10.6.4.1 APK Files Used for Installing Application -- 10.6.4.2 Dumpsys Usagestats -- 10.6.4.3 Application Traces -- 10.6.4.4 install&amp -- uscore -- requests -- 10.6.4.5 Application Usage -- 10.6.4.6 Application Notifications -- 10.6.4.7 Application Permissions and Metadata -- 10.6.4.8 Application Snapshots -- 10.6.4.9 Downloads -- 10.6.4.10 Calendar -- 10.6.4.11 Pictures -- 10.6.5 Wi‐Fi -- 10.6.6 Location -- 10.6.7 Evidence Destruction -- 10.6.7.1 Factory Reset -- 10.6.8 Summary -- Chapter 11 Network Forensics -- 11.1 Acquisition -- 11.1.1 Pcap -- 11.1.1.1 File Extraction from Network -- 11.1.1.2 Geolocation with Wireshark -- 11.1.2 Netflow -- 11.1.3 Logs -- 11.2 Analysis -- 11.2.1 Connected Devices -- 11.2.2 Statistical Analysis -- 11.2.3 Expected Protocol and Connection Architecture -- 11.2.4 Encrypted Network Activity Classification -- 11.2.5 Identifying Network Beacons Using Historical Network Data with RITA -- 11.2.6 Domain Analysis -- 11.3 Summary…”
    Libro electrónico
  20. 1700
    por XIMÉNEZ GÓMEZ, M. Carmen
    Publicado 2013
    “…Por último, se presentan tres técnicas multivariantes, el análisis de regresión múltiple, el análisis de componentes principales y el análisis factorial. Para cada una de ellas se expone su formulación teórica, supuestos, métodos de estimación y de verificación del modelo, así como diversos ejemplos y ejercicios…”
    Texto completo en Odilo
    Otros