Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 25,425
- Història 15,268
- Ciencias empresariales 7,497
- Filosofía 6,481
- Crítica e interpretación 6,003
- Biblia 5,986
- Església Catòlica 5,049
- Exposicions 5,022
- Iglesia Católica 4,129
- Bíblia 4,025
- History 3,731
- Goigs 2,806
- Biografia 2,429
- Crítica i interpretació 2,416
- Política 2,401
- Arte 2,363
- Teología 2,362
- Educación 2,360
- Religión 2,350
- Ensenyament 2,328
- Literatura 2,250
- Sociología 2,244
- Novela francesa 2,228
- Derecho 2,200
- Filosofia 2,198
- Política y gobierno 2,175
- Arquitectura 2,173
- Economía 2,091
- Música 2,044
- Congressos 1,951
-
724161por Flórez, Enrique, 1702-1773 aut, Risco, Manuel, 1735-1801 aut, Merino, Antolín, 1745-1830 aut, Sainz de Baranda, Pedro, 1797-1853 aut, Fuente, Vicente de la, 1817-1889 aut, Fort, Carlos Ramón, 1807-1878 aut, Vega, Ángel Custodio, 1894-1972 autTabla de Contenidos:
Publicado 1747Libro -
724162Publicado 2017Tabla de Contenidos: “…Goldratt -- 3.24 Eugene L. Grant -- 3.25 Bill Conway -- 3.26 Yasutoshi Washio -- Further Reading -- Chapter 4: Leadership and TQM -- 4.1 What is Leadership? …”
Libro electrónico -
724163Publicado 2023Tabla de Contenidos: “…12.3.1 Decision Variables -- 12.3.2 Objective Functions -- 12.3.3 Bounds of Decision Variables -- 12.3.4 Response Variables -- 12.4 Results and Discussions -- 12.4.1 Single Objective Optimization -- 12.4.2 Results of Multiobjective Optimization -- 12.5 Conclusion -- References -- Chapter 13 Genetic Algorithm-Based Optimization for Speech Processing Applications -- 13.1 Introduction to GA -- 13.1.1 Enhanced GA -- 13.2 GA in Automatic Speech Recognition -- 13.2.1 GA for Optimizing Off-Line Parameters in Voice Activity Detection (VAD) -- 13.2.2 Classification of Features in ASR Using GA -- 13.2.3 GA-Based Distinctive Phonetic Features Recognition -- 13.2.4 GA in Phonetic Decoding -- 13.3 Genetic Algorithm in Speech Emotion Recognition -- 13.3.1 Speech Emotion Recognition -- 13.3.2 Genetic Algorithms in Speech Emotion Recognition -- 13.4 Genetic Programming in Hate Speech Using Deep Learning -- 13.4.1 Introduction to Hate Speech Detection -- 13.4.2 GA Integrated With Deep Learning Models for Hate Speech Detection -- 13.5 Conclusion -- References -- Chapter 14 Performance of P, PI, PID, and NARMA Controllers in the Load Frequency Control of a Single-Area Thermal Power Plant -- 14.1 Introduction -- 14.2 Single-Area Power System -- 14.3 Automatic Load Frequency Control (ALFC) -- 14.4 Controllers Used in the Simulink Model -- 14.4.1 PID Controller -- 14.4.2 PI Controller -- 14.4.3 P Controller -- 14.5 Circuit Description -- 14.6 ANN and NARMA L2 Controller -- 14.7 Simulation Results and Comparative Analysis -- 14.8 Conclusion -- References -- Part 2: Decision Science and Simulation-Based Optimization -- Chapter 15 Selection of Nonpowered Industrial Truck for Small Scale Manufacturing Industry Using Fuzzy VIKOR Method Under FMCDM Environment -- 15.1 Introduction -- 15.2 Fuzzy Set Theory -- 15.2.1 Some Important Fuzzy Definitions -- 15.2.2 Fuzzy Operations…”
Libro electrónico -
724164Publicado 2014Tabla de Contenidos: “…17.1 Introduction 329 -- 17.2 Carrier CDNs 331 -- 17.3 Managed CDNs 332 -- 17.4 Federated CDNs 333 -- 17.5 Licensed CDNs 335 -- 17.6 Case Study: CoBlitz 337 -- 17.7 CoBlitz Commercialization 343 -- 17.8 Implications of HTTP Adaptive Streaming 345 -- 17.9 CoBlitz Commercialization Lessons 347 -- 17.10 CDN Industry Directions 348 -- Acknowledgments 349 -- References 349 -- 18 CONTENT DELIVERY IN CHINA: A ChinaCache PERSPECTIVE 353 /Michael Talyansky, Alexei Tumarkin, Hunter Xu, and Ken Zhang -- 18.1 Introduction 353 -- 18.2 Content-Aware Network Services in China 356 -- 18.3 Directions for Future CDN Research and Trends in China 365 -- 18.4 Conclusion 366 -- References 366 -- 19 PlatonTV: A SCIENTIFIC HIGH DEFINITION CONTENT DELIVERY PLATFORM 369 /Mirosław Czyrnek, Jedrzej Jajor, Jerzy Jamrozy, Ewa Kusmierek, Cezary Mazurek, Maciej Stroinski, and Jan Weglarz -- 19.1 Introduction 369 -- 19.2 Background and Related Work 371 -- 19.3 PlatonTV Architecture 372 -- 19.4 Content Ingest 374 -- 19.5 Content Distribution and Management 376 -- 19.6 Content Delivery 379 -- 19.7 Availability and Reliability 381 -- 19.8 Visionary Thoughts for Practitioners 382 -- 19.9 Future Research Directions 383 -- 19.10 Conclusion 383 -- Acknowledgments 383 -- References 384 -- 20 CacheCast: A SINGLE-SOURCE MULTIPLE-DESTINATION CACHING MECHANISM 385 /Piotr Srebrny, Dag H.L. Sorbo, Thomas Plagemann, Vera Goebel, and Andreas Mauthe -- 20.1 Introduction 385 -- 20.2 Related Work 387 -- 20.3 CacheCast Overview 388 -- 20.4 Background on Multidestination Traffic 389 -- 20.5 CacheCast Design 391 -- 20.6 CacheCast Efficiency 396 -- 20.7 CacheCast Applications 399 -- 20.8 Visionary Thoughts for Practitioners 407 -- 20.9 Future Research Directions 409 -- 20.10 Conclusion 409 -- Acknowledgments 410 -- References 410 -- 21 CONTENT REPLICATION AND DELIVERY IN INFORMATION-CENTRIC NETWORKS 413 /Vasilis Sourlas, Paris Flegkas, Dimitrios Katsaros, and Leandros Tassiulas -- 21.1 Introduction 413 -- 21.2 Related Work 414.…”
Libro electrónico -
724165Publicado 2022Tabla de Contenidos: “…. -- Figure 12k. with text of BD 138. -- Figure 12l. with text of BD 137. -- Figure 12m. with text BD 140. -- Figure 12n. …”
Libro electrónico -
724166por Vittal, P. R.Tabla de Contenidos: “…4.4 Length of Tangent from Point P(x1, y1) to the Circle x2 + y2 + 2gx + 2fy + c = 0 -- 4.5 Equation of Tangent at (x1, y1) to the Circle x2 + y2 + 2gx + 2fy + c = 0 -- 4.6 Equation of Circle with the Line Joining Points A (x1, y1) and B (x2, y2) as the ends of Diameter -- 4.7 Condition for the Straight Line y = mx + c to be a Tangent to the Circle x2 + y2 = a2 -- 4.8 Equation of the Chord of Contact of Tangents from (x1, y1) to the Circle x2 + y2 + 2gx + 2fy + c = 0 -- 4.9 Two Tangents Can Always Be Drawn from a Given Point to a Circle and the Locus of the Point of Intersection of Perpendicular Tangents is a Circle -- 4.10 Pole and Polar -- 4.10.1 Polar of the Point P (x1, y1) with Respect to the Circle x2 + y2 + 2gx + 2fy + c = 0 -- 4.10.2 Pole of the Line lx + my + n = 0 with Respect to the Circle x2 + y2 = a2 -- 4.11 Conjugate Lines -- 4.11.1 Condition for the Lines lx + my + n = 0 and l1x + m1y + n1 = 0 to be Conjugate Lines with Respect to the Circle x2 + y2 = a2 -- 4.12 Equation of a Chord of Circle x2 + y2 + 2gx + 2fy + c = 0 in Terms of its Middle Point -- 4.13 Combined Equation of a Pair of Tangents from (x1, y1) to the Circle x2 + y2 + 2gx + 2fy + c = 0 -- 4.14 Parametric Form of a Circle -- 4.14.1 Equation of the Chord Joining the Points 'θ' and 'φ' on the Circle and the Equation of the Tangent at θ -- Illustrative Examples -- Exercises -- Chapter 5: System of Circles -- 5.1 Radical Axis of Two Circles -- 5.2 Orthogonal Circles -- 5.3 Coaxal System -- 5.4 Limiting Points -- 5.5 Examples (Radical Axis) -- 5.6 Examples (Limiting Points) -- Exercises -- Chapter 6: Parabola -- 6.1 Introduction -- 6.2 General Equation of a Conic -- 6.3 Equation of a Parabola -- 6.4 Length of Latus Rectum -- 6.4.1 Tracing of the curve y2 = 4ax -- 6.5 Different Forms of Parabola -- Illustrative Examples Based on Focus Directrix Property…”
Publicado 2013
Libro electrónico -
724167Publicado 2023Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Part I Secure AI/ML Systems: Attack Models -- 1 Machine Learning Attack Models -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Notation -- 1.2.2 Support Vector Machines -- 1.2.3 Neural Networks -- 1.3 White-Box Adversarial Attacks -- 1.3.1 L-BGFS Attack -- 1.3.2 Fast Gradient Sign Method -- 1.3.3 Basic Iterative Method -- 1.3.4 DeepFool -- 1.3.5 Fast Adaptive Boundary Attack -- 1.3.6 Carlini and Wagner's Attack -- 1.3.7 Shadow Attack -- 1.3.8 Wasserstein Attack -- 1.4 Black-Box Adversarial Attacks -- 1.4.1 Transfer Attack -- 1.4.2 Score-Based Black-Box Attacks -- ZOO Attack -- Square Attack -- 1.4.3 Decision-Based Attack -- Boundary Attack -- HopSkipJump Attack -- Spatial Transformation Attack -- 1.5 Data Poisoning Attacks -- 1.5.1 Label Flipping Attacks -- 1.5.2 Clean Label Data Poisoning Attack -- Feature Collision Attack -- Convex Polytope Attack and Bullseye Polytope Attack -- 1.5.3 Backdoor Attack -- 1.6 Conclusions -- Acknowledgment -- Note -- References -- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-Generation Wireless Communications -- 2.1 Introduction -- 2.1.1 Scope and Background -- 2.2 Adversarial Machine Learning -- 2.3 Challenges and Gaps -- 2.3.1 Development Environment -- 2.3.2 Training and Test Datasets -- 2.3.3 Repeatability, Hyperparameter Optimization, and Explainability -- 2.3.4 Embedded Implementation -- 2.4 Conclusions and Recommendations -- References -- 3 Threat of Adversarial Attacks to Deep Learning: A Survey -- 3.1 Introduction -- 3.2 Categories of Attacks -- 3.2.1 White-Box Attacks -- FGSM-based Method -- JSMA-based Method -- 3.2.2 Black-Box Attacks -- Mobility-based Approach -- Gradient Estimation-Based Approach -- 3.3 Attacks Overview…”
Libro electrónico -
724168por Henríquez, Juan Carlos“…La parola techne implica la concretizzazione, l’ingresso di un’idea nel mondo sensorialmente percettibile dei fenomeni. …”
Publicado 2018
Artículo -
724169Publicado 2022“…La tesi s’estructura en tres parts separades: 1) el capítol 3 conté una revisió sistemàtica de la literatura, i identifica els factors impulsors, els processos i els resultats de la cocreació en el branding B2B; 2) el capítol 4 conté un estudi experimental sobre l’efecte de la cocreació en el valor de marca d’una marca de serveis corporatius, considerant els rols dels beneficis de reconeixement i l’atractiu alternatiu, i 3) el capítol 5 conté un estudi empíric que analitza l’efecte de la RSC d’una marca de serveis corporatius en el “boca a boca” positiu dels clients, considerant els rols de l’autenticitat de la marca i l’atractiu alternatiu…”
Accés lliure
Tesis -
724170por Varios autores“…Esglaó importantíssim en l'evolució i transmissió dels contes castellans medievals. …”
Publicado 2011
Texto completo en Odilo
Otros -
724171por Halperin Donghi, Tulio“…Finalment, estudia les causes del fracàs de l'evangelització i la repressió, i aprofundeix en la sèrie de decisions que van dur al decret d'expulsió ja a l'inici del segle XVII…”
Publicado 2011
Texto completo en Odilo
Otros -
724172por Varios autores“…Es pot apreciar i comprendre la immensa tasca de l'il·lustre filòleg en diversos camps, la importància dels seus estudis en l'etimologia catalana i castellana, la seua faceta com a romanista i com a editor de textos, el seu treball com a lexicògraf en les dues llengües, els seus coneixements dialectològics, la col·laboració amb el món cultural valencià, l'estudi del lèxic francès i italià, les aportacions als diccionaris hispànics i en concret al de Nebrija, la seua aportació al coneixement de l'espanyol i la metodologia investigadora que segueix. …”
Publicado 2011
Texto completo en Odilo
Otros -
724173por Varios autores“…espanyol i de l?espanyol a altres llengües, a través de l?estudi d?…”
Publicado 2015
Texto completo en Odilo
Otros -
724174“…L'histoire de la culture de l'artisanat comme celle du film documentaire et ethnographique en Suisse est mise en lumière, avec, en toile de fond, le contexte international de ce cinéma et les débats contemporains de l'anthropologie culturelle et visuelle. …”
Libro electrónico -
724175por Philippoff, Eva“…Or, les Habsbourg n’ont pas su tirer partie de cette richesse, et au lieu de s’orienter vers une possible fédération danubienne, préfiguration de l’Union Européenne, François-Joseph opta pour l’alliance fatale avec l’Empire Allemand nouvellement créé. …”
Publicado 2020
Electrónico -
724176Publicado 2019“…Ce livre explore différents types de paysages de guerre surgis à la suite des principaux conflits en Europe au cours du siècle dernier. Comparant l'évolution de ces paysages, l'ouvrage explore les reconstructions et les politiques de mémoire d'après-guerre et l'utilisation récente, tant touristique que patrimoniale, de ces témoignages. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
724177por Benelli, Enrico“…L’étude des nécropoles dispose en effet d’un atout essentiel par rapport à celle de l’habitat : la tombe est une structure fixe, généralement close, dans laquelle tout ce qui est placé est en principe destiné à demeurer à jamais. …”
Publicado 2018
Electrónico -
724178Publicado 2017“…In a further step the newly gained results are applied to four well-known operators defined on the Fréchet function spaces L^p-([0,1]) resp. L^p-(G) (where G is a compact Abelian group) and L^pâ textloc( mathbbR)…”
Libro electrónico -
724179por Barrier-Roiron, Virginie“…Les vingt-deux articles nous présentent des fantômes historiques ou textuels, et nous emmènent du Canada à l’Australie, de l’Afrique à l’Inde ou à la Caraïbe. …”
Publicado 2021
Electrónico -
724180Publicado 2013“…Guerra, Karen Heimer, Janet L. Lauritsen, Jennifer L. Matjasko, James A. Mercy, Matthew Phillips, Richard Rosenfeld, Tim Wadsworth, Valerie West, Kevin T. …”
Libro electrónico