Mostrando 29,581 - 29,600 Resultados de 33,117 Para Buscar '"Global"', tiempo de consulta: 0.22s Limitar resultados
  1. 29581
    por Dargie, Waltenegus
    Publicado 2010
    Tabla de Contenidos: “…9.3.2 Nondeterminism of Communication Latency -- 9.4 Time Synchronization Protocols -- 9.4.1 Reference Broadcasts Using Global Sources of Time -- 9.4.2 Lightweight Tree-Based Synchronization -- 9.4.3 Timing-sync Protocol for Sensor Networks -- 9.4.4 Flooding Time Synchronization Protocol -- 9.4.5 Reference-Broadcast Synchronization -- 9.4.6 Time-Diffusion Synchronization Protocol -- 9.4.7 Mini-Sync and Tiny-Sync -- Exercises -- References -- 10 Localization -- 10.1 Overview -- 10.2 Ranging Techniques -- 10.2.1 Time of Arrival -- 10.2.2 Time Difference of Arrival -- 10.2.3 Angle of Arrival -- 10.2.4 Received Signal Strength -- 10.3 Range-Based Localization -- 10.3.1 Triangulation -- 10.3.2 Trilateration -- 10.3.3 Iterative and Collaborative Multilateration -- 10.3.4 GPS-Based Localization -- 10.4 Range-Free Localization -- 10.4.1 Ad Hoc Positioning System (APS) -- 10.4.2 Approximate Point in Triangulation -- 10.4.3 Localization Based on Multidimensional Scaling -- 10.5 Event-Driven Localization -- 10.5.1 The Lighthouse Approach -- 10.5.2 Multi-Sequence Positioning -- Exercises -- References -- 11 Security -- 11.1 Fundamentals of Network Security -- 11.2 Challenges of Security in Wireless Sensor Networks -- 11.3 Security Attacks in Sensor Networks -- 11.3.1 Denial-of-Service -- 11.3.2 Attacks on Routing -- 11.3.3 Attacks on Transport Layer -- 11.3.4 Attacks on Data Aggregation -- 11.3.5 Privacy Attacks -- 11.4 Protocols and Mechanisms for Security -- 11.4.1 Symmetric and Public Key Cryptography -- 11.4.2 Key Management -- 11.4.3 Defenses Against DoS Attacks -- 11.4.4 Defenses Against Aggregation Attacks -- 11.4.5 Defenses Against Routing Attacks -- 11.4.6 Security Protocols for Sensor Networks -- 11.4.7 TinySec -- 11.4.8 Localized Encryption and Authentication Protocol -- 11.5 IEEE 802.15.4 and ZigBee Security -- 11.6 Summary -- Exercises -- References…”
    Libro electrónico
  2. 29582
    Publicado 2022
    Tabla de Contenidos: “…-- 11.2.2 Shared Weight -- 11.2.3 Global Semantics -- 11.2.4 Recurrent Neural Network -- 11.3 Gradient Propagation -- 11.4 How to Use RNN Layers -- 11.4.1 SimpleRNNCell -- 11.4.2 Multilayer SimpleRNNCell Network -- 11.4.3 SimpleRNN Layer -- 11.5 Hands-On RNN Sentiment Classification -- 11.5.1 Dataset -- 11.5.2 Network Model -- 11.5.3 Training and Testing -- 11.6 Gradient Vanishing and Gradient Exploding -- 11.6.1 Gradient Clipping -- 11.6.2 Gradient Vanishing -- 11.7 RNN Short-Term Memory -- 11.8 LSTM Principle -- 11.8.1 Forget Gate -- 11.8.2 Input Gate -- 11.8.3 Update Memory -- 11.8.4 Output Gate -- 11.8.5 Summary -- 11.9 How to Use the LSTM Layer -- 11.9.1 LSTMCell -- 11.9.2 LSTM layer -- 11.10 GRU Introduction -- 11.10.1 Reset Door -- 11.10.2 Update Gate -- 11.10.3 How to Use GRU -- 11.11 Hands-On LSTM/GRU Sentiment Classification -- 11.11.1 LSTM Model -- 11.11.2 GRU model -- 11.12 Pre-trained Word Vectors -- 11.13 Pre-trained Word Vectors -- 11.14 References -- Chapter 12: Autoencoder -- 12.1 Principle of Autoencoder -- 12.2 Hands-On Fashion MNIST Image Reconstruction -- 12.2.1 Fashion MNIST Dataset -- 12.2.2 Encoder -- 12.2.3 Decoder -- 12.2.4 Autoencoder -- 12.2.5 Network Training -- 12.2.6 Image Reconstruction -- 12.3 Autoencoder Variants -- 12.3.1 Dropout Autoencoder -- 12.3.2 Adversarial Autoencoder -- 12.4 Variational Autoencoder -- 12.4.1 Principle of VAE -- 12.4.2 Reparameterization Trick -- 12.5 Hands-On VAE Image Reconstruction -- 12.5.1 VAE model…”
    Libro electrónico
  3. 29583
    Publicado 2017
    Tabla de Contenidos: “…s Scheme -- 3.3.3.3 Experimental Results -- 3.3.4 LOSSLESS INFORMATION HIDING BY ADAPTIVE COEFFICIENT MODIFICATION IN INTEGER DISCRETE COSINE TRANSFORM DOMAIN -- 3.3.4.1 Global Coefficient-Group Distortion Sorting -- 3.3.4.2 Zero-Tree Discrete Cosine Transform Prediction -- 3.3.4.3 Low-Frequency Coefficients-Based Prediction (LFCP) -- 3.3.4.4 Experimental Results and Performance Analysis -- 3.3.4.4.1 Watermarking Capacity Versus Distortion -- 3.3.4.4.2 Performance Stability -- 3.3.4.4.3 Performance Scalability -- 3.3.4.4.4 Algorithm Complexity -- 3.3.4.4.5 Algorithm Security -- 3.4 INTEGER WAVELET TRANSFORM-BASED SCHEMES -- 3.4.1 VALUE EXPANSION TECHNIQUE IN THE INTEGER WAVELET TRANSFORM DOMAIN -- 3.4.1.1 The Compression Function Suitable for Value Expansion -- 3.4.1.2 Recording of the Compression and Companding Error and Simplification of the Value Expansion -- 3.4.2 COEFFICIENTS' MAGNITUDE PREDICTION TECHNIQUE IN INTEGER WAVELET TRANSFORM DOMAIN -- 3.4.3 COMPARISONS BETWEEN GENERALIZED LOSSLESS COMPRESSION-BASED AND VALUE EXPANSION-BASED SCHEMES -- 3.4.3.1 Generalized Least Significant Bit Lossless Compression Scheme -- 3.4.3.2 Integer Discrete Wavelet Transform Domain Lossless Bit-Plane Compression Scheme -- 3.4.3.3 Integer Discrete Wavelet Transform Domain Coefficient Companding and Compression Scheme -- 3.4.3.4 Integer Discrete Wavelet Transform Domain Histogram Shift Scheme -- 3.5 SUMMARY -- REFERENCES…”
    Libro electrónico
  4. 29584
    Publicado 2019
    Tabla de Contenidos: “…Systems Engineering Approach Has Achieved Global Recognition -- 1.2. Systems Engineering Processes -- 1.2.1. …”
    Libro electrónico
  5. 29585
    Publicado 2016
    Tabla de Contenidos: “…-- Preface xiii -- Acknowledgements xv -- List of Abbreviations xvii -- 1 Introduction 1 /Harri Holma -- 1.1 Introduction 1 -- 1.2 LTE Global Deployments and Devices 2 -- 1.3 Mobile Data Traffic Growth 3 -- 1.4 LTE Technology Evolution 4 -- 1.5 LTE Spectrum 5 -- 1.6 Small Cell Deployments 6 -- 1.7 Network Optimization 7 -- 1.8 LTE Evolution Beyond Release 13 8 -- 1.9 Summary 9 -- References 9 -- 2 LTE and LTE Advanced in Releases 8 / 11 11 /Antti Toskala -- 2.1 Introduction 11 -- 2.2 Releases 8 and 9 LTE 11 -- 2.2.1 Releases 8 and 9 Physical Layer 12 -- 2.2.2 LTE Architecture 17 -- 2.2.3 LTE Radio Protocols 17 -- 2.3 LTE Advanced in Releases 10 and 11 19 -- 2.3.1 Carrier Aggregation 19 -- 2.3.2 Multiple Input Multiple Output Enhancements 23 -- 2.3.3 HetNet Enhanced Inter-cell Interference Coordination 23 -- 2.3.4 Coordinated Multipoint Transmission 25 -- 2.4 UE Capability in Releases 8 / 11 26 -- 2.5 Conclusions 28 -- References 28 -- 3 LTE-Advanced Evolution in Releases 12 / 13 29 /Antti Toskala -- 3.1 Introduction 29 -- 3.2 Machine-Type Communications 29 -- 3.3 Enhanced CoMP 34 -- 3.4 FDD / TDD Carrier Aggregation 35 -- 3.5 WLAN-Radio Interworking 37 -- 3.6 Device-to-Device Communication with LTE 39 -- 3.7 Single Cell Point to Multipoint Transmission 41 -- 3.8 Release 12 UE Capabilities 42 -- 3.9 Conclusions 42 -- References 43 -- 4 Small Cell Enhancements in Release 12/13 45 /Antti Toskala, Timo Lunttila, Tero Henttonen and Jari Lindholm -- 4.1 Introduction 45 -- 4.2 Small Cell and Dual Connectivity Principles 45 -- 4.3 Dual Connectivity Architecture Principle 46 -- 4.4 Dual Connectivity Protocol Impacts 47 -- 4.5 Dual Connectivity Physical Layer Impacts and Radio Link Monitoring 49 -- 4.6 Other Small Cell Physical Layer Enhancement 53 -- 4.6.1 256QAM for LTE Downlink 53 -- 4.6.2 Small Cell ON/OFF Switching and Enhanced Discovery 53 -- 4.6.3 Power Saving with Small Cell ON/OFF 56 -- 4.6.4 Over the Air Synchronization Between eNodeBs 56 -- 4.7 Release 13 Enhancements 56.…”
    Libro electrónico
  6. 29586
    Publicado 2021
    Libro electrónico
  7. 29587
    Publicado 2004
    Tabla de Contenidos: “…Peer-to-Peer Remote Copy -- 3.1 Overview and introduction -- 3.1.1 Overview -- 3.1.2 Introduction -- 3.1.3 Synchronous versus non-synchronous -- 3.1.4 Terminology -- 3.1.5 Feature dependencies -- 3.2 Choosing the best method -- 3.2.1 Disaster Recovery -- 3.2.2 Tiers of Disaster Recovery -- 3.2.3 Comparing PPRC features -- 3.3 Invocation and control -- 3.4 PPRC configuration guidelines -- 3.5 Data consistency in a PPRC environment -- 3.5.1 PPRC Failover and Failback modes -- 3.6 Synchronous PPRC -- 3.6.1 How Synchronous PPRC works -- 3.7 PPRC-XD -- 3.7.1 Characteristics -- 3.7.2 How PPRC-XD works -- 3.7.3 PPRC-XD volumes states change logic -- 3.7.4 Duplex-pending state -- 3.7.5 Catch-up transition -- 3.7.6 PPRC-XD implementation considerations -- 3.7.7 Data consistency with PPRC-XD -- 3.7.8 Global catch-up -- 3.7.9 Managing PPRC-XD recovery -- 3.8 Asynchronous Cascading PPRC -- 3.8.1 How Asynchronous Cascading PPRC works -- 3.8.2 Making volumes eligible for cascading -- 3.8.3 Consistent point-in-time copy -- 3.9 Asynchronous PPRC -- 3.9.1 Terminology -- 3.9.2 Asynchronous PPRC - How it works -- 3.9.3 Steps to establish an Asynchronous PPRC Session -- 3.10 PPRC links -- 3.10.1 PPRC connectivity using ESCON ports -- 3.10.2 Distance connections -- 3.10.3 PPRC connectivity using Fibre Channel ports -- Chapter 4. …”
    Libro electrónico
  8. 29588
    Publicado 2004
    Tabla de Contenidos: “…WebSphere Portal: clustering -- 7.1 WebSphere Application Server Network Deployment -- 7.1.1 Installing Network Deployment machine -- 7.1.2 Installing the Enterprise extensions on Network Deployment -- 7.1.3 Installing Network Deployment Fix Pack 1 -- 7.1.4 Installing WebSphere Enterprise Fix Pack 1 -- 7.1.5 Validating the Network Deployment installation -- 7.1.6 Enabling global security on Network Deployment -- 7.1.7 Setting the required authority for wpsadmin -- 7.2 Installing and configuring WebSphere Portal on node 1 -- 7.3 Installing and configuring WebSphere Portal on node 2 -- 7.3.1 The Portal02 configuration -- 7.4 Adding portal nodes to the cell -- 7.4.1 Adding Portal01 to the cell -- 7.4.2 Adding Portal02 to the cell -- 7.5 Creating the cluster -- 7.5.1 Starting the cluster -- 7.5.2 Updating the Web Server plugin -- 7.5.3 Validating the cluster configuration -- 7.6 Deploying portlets -- 7.7 Deploying themes and skins -- 7.8 Enabling dynamic caching -- 7.9 Removing the Portal node from Deployment Manager -- 7.9.1 Removing the node from the cell -- 7.9.2 Removing all Enterprise Application instances from DM01 -- Chapter 8. …”
    Libro electrónico
  9. 29589
    Publicado 2015
    Tabla de Contenidos: “…3.5.2 Abnormal level earthquake requirements -- 3.5.3 ALE structural and foundation modeling -- 3.5.3.1 Topside appurtenances and equipment -- 3.6 Ice loads -- 3.7 Other loads -- 3.7.1 Marine growth -- 3.7.2 Scour -- 3.8 Design for ultimate limit state -- 3.8.1 Load factors -- 3.8.1.1 In-place analysis by ISO19902 -- 3.8.1.2 Extreme environmental situation for fixed offshore platforms -- 3.8.1.2.1 Example 3.6 -- 3.8.1.2.2 Example 3.7 -- 3.8.1.3 Operating environmental situations for fixed platforms -- 3.8.2 Partial action factors -- 3.9 Collision events -- 3.10 Material strength -- 3.11 Cement grout -- Further reading -- 4 Offshore structures design -- 4.1 Introduction -- 4.2 Guide for preliminary design -- 4.2.1 Approximate dimensions -- 4.2.2 Bracing system -- 4.2.3 Jacket design -- 4.3 Structure analysis -- 4.3.1 Global structure analysis -- 4.3.2 The loads on the piles -- Example 4.1 -- Solution -- 4.3.3 Modeling techniques -- 4.3.3.1 Joint coordinates -- 4.3.3.2 Local member axes -- 4.3.3.3 Member effective lengths -- 4.3.3.4 Joint eccentricities -- 4.4 Dynamic structure analysis -- 4.4.1 Natural frequency -- Example 4.2 -- 4.5 Cylinder member strength -- 4.5.1 Cylinder member strength calculation by ISO19902 -- 4.5.1.1 Axial tension -- 4.5.1.2 Axial compression -- 4.5.1.3 Column buckling -- 4.5.1.4 Local buckling -- 4.5.1.5 Bending -- 4.5.1.6 Shear -- 4.5.1.7 Torsional shear -- 4.5.1.8 Hydrostatic pressure -- 4.5.1.9 Hoop buckling -- 4.5.1.10 Tubular members subjected to combined forces without hydrostatic pressure -- 4.5.1.10.1 Axial tension and bending -- 4.5.1.10.2 Axial compression and bending -- 4.5.1.11 Tubular members subjected to combined forces with hydrostatic pressure -- 4.5.1.11.1 Axial tension, bending, and hydrostatic pressure -- 4.5.1.11.2 Axial compression, bending, and hydrostatic pressure…”
    Libro electrónico
  10. 29590
    por Zhang, Liming, 1943-
    Publicado 2013
    Tabla de Contenidos: “…5.3.3 Saliency Map Computation using Object Representation 184 -- 5.3.4 Using Attention for Object Recognition 184 -- 5.3.5 Implementation 185 -- 5.3.6 Optimizing the Selection of Top-down Bias 186 -- 5.4 Attention with Memory of Learning and Amnesic Function 187 -- 5.4.1 Visual Memory: Amnesic IHDR Tree 188 -- 5.4.2 Competition Neural Network Under the Guidance of Amnesic IHDR 191 -- 5.5 Top-down Computation in the Visual Attention System: VOCUS 193 -- 5.5.1 Bottom-up Features and Bottom-up Saliency Map 193 -- 5.5.2 Top-down Weights and Top-down Saliency Map 194 -- 5.5.3 Global Saliency Map 196 -- 5.6 Hybrid Model of Bottom-up Saliency with Top-down Attention Process 196 -- 5.6.1 Computation of the Bottom-up Saliency Map 197 -- 5.6.2 Learning of Fuzzy ART Networks and Top-down Decision 197 -- 5.7 Top-down Modelling in the Bayesian Framework 199 -- 5.7.1 Review of Basic Framework 200 -- 5.7.2 The Estimation of Conditional Probability Density 201 -- 5.8 Summary 202 -- References 202 -- 6 Validation and Evaluation for Visual Attention Models 207 -- 6.1 Simple Man-made Visual Patterns 207 -- 6.2 Human-labelled Images 208 -- 6.3 Eye-tracking Data 209 -- 6.4 Quantitative Evaluation 211 -- 6.4.1 Some Basic Measures 211 -- 6.4.2 ROC Curve and AUC Score 213 -- 6.4.3 Inter-subject ROC Area 213 -- 6.5 Quantifying the Performance of a Saliency Model to Human Eye Movement in Static and Dynamic Scenes 215 -- 6.6 Spearman's Rank Order Correlation with Visual Conspicuity 217 -- References 219 -- PART III APPLICATIONS OF ATTENTION SELECTION MODELS 221 -- 7 Applications in Computer Vision, Image Retrieval and Robotics 223 -- 7.1 Object Detection and Recognition in Computer Vision 224 -- 7.1.1 Basic Concepts 224 -- 7.1.2 Feature Extraction 224 -- 7.1.3 Object Detection and Classification 227 -- 7.2 Attention Based Object Detection and Recognition in a Natural Scene 231 -- 7.2.1 Object Detection Combined with Bottom-up Model 231 -- 7.2.2 Object Detection based on Attention Elicitation 233.…”
    Libro electrónico
  11. 29591
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…-- 2.1.1 Performance guidelines -- 2.1.2 Conventions used -- 2.1.3 A simple copy -- 2.1.4 Selective copying -- 2.1.5 How to perform a global find and replace in a PDS -- 2.1.6 How to create one VSAM file using another as a model -- 2.1.7 How to initialize a VSAM file with low-value records -- 2.1.8 How to populate this newly created file -- 2.1.9 How to split a single file into constituent record types -- 2.1.10 Replace a string in a specific location in a file -- 2.1.11 Copy selected variably blocked records to another file -- 2.1.12 Search for a string in all members of a PDS -- 2.1.13 Multiple Find -- 2.1.14 QSAM allocation using a model -- 2.1.15 Work with VTOC -- 2.1.16 Get information about a load module -- 2.1.17 Dynamic template -- 2.1.18 Compare data sets using templates -- 2.1.19 Working with DB2 -- 2.1.20 Working with IMS -- 2.2 Template processing -- 2.2.1 It really does remember the copybook -- 2.2.2 Using the SELECT command in template edit -- 2.2.3 How to process COPY REPLACING statements -- 2.2.4 How to build a template for multi-record file layouts -- 2.3 Hints and tips…”
    Libro electrónico
  12. 29592
    Publicado 2020
    Tabla de Contenidos: “…Conclusion -- References -- 17: The Boom-Bust Cycle of Global Copper Prices, Structural Change, and Industrial Development in Zambia -- 1. …”
    Libro electrónico
  13. 29593
    Publicado 2018
    Tabla de Contenidos: “…6.6.1.4 Natjam-R: Deadline-Based Eviction 215 -- 6.6.1.5 Microbenchmarks 216 -- 6.6.1.6 Natjam-R Evaluation 221 -- 6.7 Summary 223 -- 6.8 The Future 224 -- 7 Theoretical Considerations: Inferring and Enforcing Use Patterns for Mobile Cloud Assurance 237 /Gul Agha, Minas Charalambides, Kirill Mechitov, Karl Palmskog,Atul Sandur, and Reza Shiftehfar -- 7.1 Introduction 237 -- 7.2 Vision 239 -- 7.3 State of the Art 240 -- 7.3.1 Code Offloading 241 -- 7.3.2 Coordination Constraints 241 -- 7.3.3 Session Types 242 -- 7.4 Code Offloading and the IMCM Framework 243 -- 7.4.1 IMCM Framework: Overview 244 -- 7.4.2 Cloud Application and Infrastructure Models 244 -- 7.4.3 Cloud Application Model 245 -- 7.4.4 Defining Privacy for Mobile Hybrid Cloud Applications 247 -- 7.4.5 A Face Recognition Application 247 -- 7.4.6 The Design of an Authorization System 249 -- 7.4.7 Mobile Hybrid Cloud Authorization Language 250 -- 7.4.7.1 Grouping, Selection, and Binding 252 -- 7.4.7.2 Policy Description 252 -- 7.4.7.3 Policy Evaluation 253 -- 7.4.8 Performance- and Energy-Usage-Based Code Offloading 254 -- 7.4.8.1 Offloading for Sequential Execution on a Single Server 254 -- 7.4.8.2 Offloading for Parallel Execution on Hybrid Clouds 255 -- 7.4.8.3 Maximizing Performance 255 -- 7.4.8.4 Minimizing Energy Consumption 256 -- 7.4.8.5 Energy Monitoring 257 -- 7.4.8.6 Security Policies and Energy Monitoring 258 -- 7.5 Coordinating Actors 259 -- 7.5.1 Expressing Coordination 259 -- 7.5.1.1 Synchronizers 260 -- 7.5.1.2 Security Issues in Synchronizers 260 -- 7.6 Session Types 264 -- 7.6.1 Session Types for Actors 265 -- 7.6.1.1 Example: Sliding Window Protocol 265 -- 7.6.2 Global Types 266 -- 7.6.3 Programming Language 268 -- 7.6.4 Local Types and Type Checking 269 -- 7.6.5 Realization of Global Types 270 -- 7.7 The Future 271 -- Acknowledgments 272 -- 8 Certifications Past and Future: A Future Model for Assigning Certifications that Incorporate Lessons Learned from Past Practices 277 /Masooda Bashir, Carlo Di Giulio, and Charles A. …”
    Libro electrónico
  14. 29594
    por Amin, Samir
    Publicado 1999
    Libro
  15. 29595
    Publicado 2022
    Tabla de Contenidos: “…Subcontratación, deslocalización y cadenas globales de producción -- 2.3. El fordismo 2.0 -- 2.4. …”
    Acceso con credenciales UPSA
    Libro electrónico
  16. 29596
    Publicado 2014
    Tabla de Contenidos: “…Chapter 12 - Adjusting for AR(1) correlation in complex models 12.1 Introduction 12.2 The two sample t-test - Uncut and patch cut forest 12.3 The second Sleuth case - Global warming, a simple regression 12.4 The Semmelweis intervention 12.5 The NYC temperatures (adjusted) 12.6 The Boise river flow data: model selection with filtering 12.7 Implications of AR(1) adjustments and the "skip" method 12.8 Summary Part III - Complex temporal structures Chapter 13 - The backshift operator, the impulse response function, and general ARMA models 13.1 The general ARMA model 13.2 The backshift (shift, lag) operator 13.3 The impulse response operator - intuition 13.4 Impulse response operator, g(B) - computation 13.5 Interpretation and utility of the impulse response function Chapter 14 - The Yule-Walker equations and the partial autocorrelation function. 14.1 Background 14.2 Autocovariance of an ARMA(m,l) model 14.3 AR(m) and the Yule-Walker equations 14.4 The partial autocorrelation plot 14.5 The spectrum for ARMA processes 14.6 Summary Chapter 15 - Modeling philosophy and complete examples 15.1 Modeling overview 15.2 A complex periodic model - Monthly river flows, Furnas 1931-1978 15.3 A modeling example - trend and periodicity: CO2 levels at Mauna Lau 15.4 Modeling periodicity with a possible intervention - two examples 15.5 Periodic models: monthly, weekly, and daily averages 15.6 Summary Part IV - Some detailed and complete examples Chapter 16 - the Wolf sunspot number data 16.1 Background 16.2 Unknown period => nonlinear model 16.3 The function nls() in R 16.4 Determining the period 16.5 Instability in the mean, amplitude, and period 16.6 Data splitting for prediction 16.7 Summary Chapter 17 - Analysis of prostate and breast cancer data 17.1 Background 17.2 The first data set 17.3 The second data set Chapter 18 - Christopher Tennant/Ben Crosby watershed data 18.1 Background and question 18.2 Looking at the data and fitting Fourier series 18.3 Averaging data 18.4 Results Chapter 19 - Vostok ice core data 19.1 Source of the data 19.2 Background 19.3 Alignment 19.4 A naïve analysis 19.5 A related simulation 19.6 An AR(1) model for irregular spacing 19.7 Summary Appendices Appendix 1 - Using Data Market A1.1 Overview A1.2 Loading a time series in DataMarket A1.3 Respecting DataMarket licensing agreements Appendix 2 - AIC is PRESS A2.1 Introduction A2.2 PRESS A2.3 Connection to Akaike's result A2.4 Normalization and R2 A2.5 An example A2.6 Conclusion and further comments Appendix 3 - A 15 minute tutorial on optimization and nonlinear regression A3.1 Introduction A3.2 Newton's method for one dimensional nonlinear optimization A3.3 A direction, a step size, and a stopping rule A3.4 What could go wrong? …”
    Libro electrónico
  17. 29597
    Publicado 2017
    Tabla de Contenidos: “…-- The four psychological needs of the customer -- Affiliation in ACTION -- The prize of getting this right -- Apply the 80/20 rule and focus your efforts -- The Digital Age Is Transforming the Game -- Making it Real for Your Business -- Measures That Matter -- Summary -- Chapter 9: Marketing and Communications Strategy -- The Purpose of Marketing and Communications -- Interdependency with Your Other Strategies -- Trends Shaping the Marketing Landscape -- Trend one: Always On, changing global consumer behaviour -- Trend two: New storytelling tools -- Trend three: Connecting the physical and digital worlds -- Trend four: Enabling experience through technology and data -- Trend five: An expanding role of marketing leadership -- Defining the Brand -- Brand Identity Map -- Writing Your Marketing and Communications Strategy -- Why building your marketing and communications strategy is like building a jigsaw puzzle -- The Marketing Mix -- Channel management: Multi channel vs. omni channel -- Adding value through thought leadership -- The Customer Buying Zone -- Turning Strategy into ACTION Through Your Marketing Plan -- Measures That Matter -- Summary: A Science . . . and an Art -- Chapter 10: Business Development and Sales Strategy -- Internal Brand Positioning of Sales -- Who's in Sales in Your Business?…”
    Libro electrónico
  18. 29598
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Supplier Diversity -- Chapter 1 Understanding the Growing Demand for Supplier Diversity -- Breaking Down What Supplier Diversity Is and Isn't -- What it is -- What it's not -- Investigating Whether Supplier Diversity Is Still Necessary -- Looking at reasons supplier diversity is still necessary -- Considering what supplier diversity needs to do to stay relevant -- Examining External Drivers Redefining Supplier Diversity -- Growth of minority entrepreneurship -- Demographic shifts: The changing face of the majority -- Social activism/economic inclusion -- Accountability to secondary stakeholders -- Recognizing Why Organizations Are Recommitting to Supplier Diversity -- Complex business challenges/ strategic advantage -- Increased focus on collaboration in the supply chain -- Compliance with the law -- Accountability to primary stakeholders -- Corporate social responsibility/stewardship -- Chapter 2 Understanding the Foundation of Supplier Diversity -- Looking at Where It All Began -- Executive Order 10925 (1961): Established Committee on Equal Opportunity Employment -- Executive Order 11246 (1965): Established Requirements for Non-discriminatory Practices -- Executive Orders 11458 (1969) and 11625 (1971): Economic Entrepreneurial b Equality -- Public Law 95-507 (1978) -- Examining the Evolution of Supplier Diversity -- Compliance with federal law (1969-1990) -- The right thing to do (1990s-early 2000s) -- Making the business case (2000s-present) -- Pondering the Future of Supplier Diversity -- Business and program globalization -- Strategic advantage -- Economic imperative…”
    Libro electrónico
  19. 29599
    Publicado 2018
    Tabla de Contenidos: “…-- Understanding the technical requirements -- Building the Microservice -- Step 1 - install Node.js and MongoDB -- Step 2 - create the skeleton of the Media Catalogue Microservice -- Step 3 - define the structure of the Media Catalogue Microservice -- Step 4 - configure the Media Catalogue Microservice -- Step 5 - define the data entity -- Step 6 - code the interaction with the database -- Step 7 - define the controller function -- Step 8 - route the incoming request to the new controller function -- Step 9 - test the microservice -- Step 10 - package and deploy the microservice -- Step 11 - updating the API endpoint and re-test using Dredd -- Summary -- Chapter 5: Platform Setup and Gateway Configuration -- Platform architecture -- The concept of logical and physical gateways -- Avoiding network latency for global deployments -- Deployment for the use case -- How many nodes -- How many logical gateways -- How much storage? …”
    Libro electrónico
  20. 29600
    Publicado 2021
    Tabla de Contenidos: “…Writing tests -- 3 Testing techniques -- 3.1 Organizing test suites -- 3.1.1 Breaking down tests -- 3.1.2 Parallelism -- 3.1.3 Global hooks -- 3.1.4 Atomicity -- 3.2 Writing good assertions -- 3.2.1 Assertions and error handling -- 3.2.2 Loose assertions -- 3.2.3 Using custom matchers -- 3.2.4 Circular assertions -- 3.3 Test doubles: Mocks, stubs, and spies -- 3.3.1 Mocking imports -- 3.4 Choosing what to test -- 3.4.1 Don't test third-party software -- 3.4.2 To mock, or not to mock: That's the question -- 3.4.3 When in doubt, choose integration tests -- 3.5 Code coverage -- 3.5.1 Automated coverage reports -- 3.5.2 Coverage types -- 3.5.3 What coverage is good for and what it isn't -- Summary -- 4 Testing backend applications -- 4.1 Structuring a testing environment -- 4.1.1 End-to-end testing -- 4.1.2 Integration testing -- 4.1.3 Unit testing -- 4.2 Testing HTTP endpoints -- 4.2.1 Testing middleware…”
    Libro electrónico