Mostrando 5,361 - 5,380 Resultados de 12,444 Para Buscar '"LinkedIn"', tiempo de consulta: 0.17s Limitar resultados
  1. 5361
    por Allocca, Michela
    Publicado 2024
    Tabla de Contenidos: “…-- Key Takeaways -- Chapter 3 Resumé Secrets: Strategies for Standing Out in a Competitive Job Market -- Analyzing Resumés -- Key Finding 1: LinkedIn Can Help You Secure an Interview -- Key Finding 2: Include Keywords and Skills That Match the Job Description -- Key Finding 3: Companies Prefer Measurable Metrics and Quantifiable Results -- Key Finding 4: The Ideal Resumé Is 475-600 Words -- Key Finding 5: Buzzwords and Fluff Can Devalue Your Resumé -- Crafting a Compelling Narrative -- The Optimal Resumé Structure -- Key Takeaways -- Chapter 4 Interviewing for Success -- Interviewing Is a Two-Way Street -- Setting the Record Straight -- Myth #1: Your Resumé Is Your Best Bet at Landing the Job -- Myth #2: The Interviewer Knows What They Are Doing -- Myth #3: The Most Qualified Person Will Get the Job…”
    Libro electrónico
  2. 5362
    por Lewinson, Eryk
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Acquiring Financial Data -- Getting data from Yahoo Finance -- Getting data from Nasdaq Data Link -- Getting data from Intrinio -- Getting data from Alpha Vantage -- Getting data from CoinGecko -- Summary -- Chapter 2: Data Preprocessing -- Converting prices to returns -- Adjusting the returns for inflation -- Changing the frequency of time series data -- Different ways of imputing missing data -- Converting currencies -- Different ways of aggregating trade data -- Summary -- Chapter 3: Visualizing Financial Time Series -- Basic visualization of time series data -- Visualizing seasonal patterns -- Creating interactive visualizations -- Creating a candlestick chart -- Summary -- Chapter 4: Exploring Financial Time Series Data -- Outlier detection using rolling statistics -- Outlier detection with the Hampel filter -- Detecting changepoints in time series -- Detecting trends in time series -- Detecting patterns in a time series using the Hurst exponent -- Investigating stylized facts of asset returns -- Summary -- Chapter 5: Technical Analysis and Building Interactive Dashboards -- Calculating the most popular technical indicators -- Downloading the technical indicators -- Recognizing candlestick patterns -- Building an interactive web app for technical analysis using Streamlit -- Deploying the technical analysis app -- Summary -- Chapter 6: Time Series Analysis and Forecasting -- Time series decomposition -- Testing for stationarity in time series -- Correcting for stationarity in time series -- Modeling time series with exponential smoothing methods -- Modeling time series with ARIMA class models -- Finding the best-fitting ARIMA model with auto-ARIMA -- Summary -- Chapter 7: Machine Learning-Based Approaches to Time Series Forecasting…”
    Libro electrónico
  3. 5363
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  4. 5364
    Publicado 2007
    Tabla de Contenidos: “…Haataja -- Secure communication method in mobile wireless networks / Masao Tanabe, Masaki Aida -- Privacy guaranteeing execution containers: one time use of personal data by location based services / Peter Langendoerfer, Michael Maaser -- Requirements for an extendible IMS client framework / Andreas Bachmann, Alice Motanga, Thomas Magedanz -- Session and media signaling for IPTV via IMS / Christian Riede, Adel Al-Hezmi, Thomas Magedanz -- Reference architecture for mobility enhanced multimedia services / Tiia Sutinen, Tapio Frantti -- Optimal usage of multiple network connections / Anne Setämaa-Kärkkäinen, Jani Kurhinen -- Intelligent seamless vertical handoff algorithm for the next generation wireless networks / Jiping Lv, Yuanchen Ma, Satoshi Yoshizawa -- LINE: link information normalization environment / Umar Toseef [and others] -- A layered infrastructure for mobility-aware best connectivity in the heterogeneous wireless internet / Paolo Bellavista, Antonio Corradi, Carlo Giannelli -- Realization of multiple access interface management and flow mobility in IPv6 / Umar Toseef [and others] -- The MobiSoC middleware for mobile social computing: challenges, design, and early experiences / Cristian Borcea [and others] -- Analysis of application partitioning for massively multiplayer mobile gaming / Madan Kumar M. …”
    Libro electrónico
  5. 5365
    Publicado 2016
    Tabla de Contenidos: “…Learning Company Name Links -- 7.4.1. Company Name Lookup -- 7.4.2. Company Classification -- 7.4.3. …”
    Libro electrónico
  6. 5366
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Unmasking Social Media Crimes: Types, Trends, and Impact -- 1.1 Introduction -- 1.2 Related Work -- 1.3 Social Media -- 1.4 Types of Social Media Crimes -- 1.4.1 Overview of Social Media Crimes -- 1.4.2 Key Characteristics -- 1.4.3 Cyberbullying and Online Harassment -- 1.4.3.1 Impact on Victims -- 1.4.4 Identity Theft and Scams -- 1.4.4.1 Consequences for Victims -- 1.4.5 Hate Speech and Incitement to Violence -- 1.4.5.1 Link to Real-World Violence -- 1.5 Trends in Social Media Crimes -- 1.5.1 Case Studies -- 1.6 Law Enforcements's Use of Social Media Surveillance -- 1.6.1 The Evolution of Social Media Surveillance -- 1.6.2 Key Motivations -- 1.6.3 Methods Employed -- 1.6.4 Legal and Ethical Considerations -- 1.7 Challenges in Social Media Surveillance -- 1.7.1 Accuracy and Interpretation -- 1.7.2 Social Media Evidence and Accuracy -- 1.7.3 Legal Questions and Implications -- 1.7.4 The Intersection of Social Media and Criminal Justice -- 1.8 Impact of Social Media Crimes -- 1.9 Conclusion -- References -- Chapter 2 Study on Vulnerability in Online Social Networking: Impact on an Individual, Community -- 2.1 Introduction -- 2.2 Statistics of Online Social Media Network -- 2.3 Existing Research on Social Media Vulnerabilities -- 2.4 Vulnerability -- 2.4.1 How Vulnerability is Related to Online Social Networking -- 2.4.2 Classification of Vulnerability -- 2.4.2.1 Individual Vulnerabilities -- 2.4.2.2 Community Vulnerabilities -- 2.4.2.3 Government Vulnerabilities -- 2.4.3 State of the Art: Techniques to Prevent Yourself from Social Media Vulnerabilities -- 2.4.4 Some Popular Case Study -- 2.5 Future Trends -- 2.6 Conclusion -- Acknowledgement -- References -- Chapter 3 Application of Google Lens Clone Using Image Recognition in Enterprise Environment…”
    Libro electrónico
  7. 5367
    Publicado 2004
    Tabla de Contenidos: “…8.4.1 EQQPT52E cannot switch to new Symphony file -- 8.4.2 CP batch job for E2E is run on wrong LPAR -- 8.4.3 Changing the OPCMASTER that an FTA should use -- 8.4.4 No valid Symphony file exists -- 8.4.5 DM and FTAs alternate between linked and unlinked -- 8.5 Other E2E problems -- 8.5.1 Delay in Symphony current plan (SCP) processing -- 8.5.2 E2E server started before TCP/IP initialized -- 8.5.3 Jobs run at wrong time -- 8.5.4 CPUTZ defaults to UTC due to invalid setting -- 8.5.5 Domain manager (DM) file system full -- 8.5.6 CP batch job starting before file formatting has completed -- 8.5.7 EQQW086E in controller EQQMLOG -- 8.6 OMVS limit problems -- 8.6.1 MAXFILEPROC value set too low -- 8.6.2 MAXPROCSYS value set too low -- 8.6.3 MAXUIDS value set too low -- 8.7 Other useful E2E-related information -- 8.7.1 Restarting an E2E FTA from the distributed side -- 8.7.2 Adding or removing an E2E FTA -- 8.7.3 Reallocating the EQQTWSIN or EQQTWSOU file -- 8.7.4 E2E server SYSMDUMP with Language Environment (LE) -- 8.8 Troubleshooting the data store -- 8.9 Where to find messages in UNIX System Services -- 8.10 Where to find messages in an end-to-end environment -- Appendix A. …”
    Libro electrónico
  8. 5368
    Publicado 2019
    Tabla de Contenidos: “…Chapter 17 Structured Finance and the Financial Crisis of 2007-2009 -- 17.1 Structured Finance -- 17.2 Poor Risk Management Linked to the Structured Finance Market -- 17.2.1 Lack of Incentive Contracts in the Presence of Information Asymmetry -- 17.2.2 Poor Evaluation of Structured Products by Rating Agencies -- 17.2.3 Poor Pricing of Complex Financial Products -- 17.2.4 Poor Regulation of Structured Finance -- 17.3 Conclusion -- References -- Appendix: How to Create an AAA CDO Tranche from BBB Loans -- Chapter 18 Risk Management and Corporate Governance -- 18.1 Enron and Corporate Governance -- 18.2 Financial Crisis and Corporate Governance -- 18.3 New 2002 Governance Rules -- 18.4 Risk Management and Governance -- 18.5 Administrative Competence of Board Members -- 18.6 New Regulation for Financial Institutions -- 18.7 Economic Analysis of Governance Effect -- 18.7.1 Testable Hypothesis -- 18.7.2 Data and Variables -- 18.7.3 Model -- 18.7.4 Empirical Results -- 18.8 Conclusion -- References -- Appendix A: Governance of Canadian Federal Financial Institutions -- Appendix B: Details on the Construction of the Governance Indexes -- Measuring Governance Standards -- The Quality of the Audit Committee -- The Quality of the Board -- SOX Standards -- NYSE Standards -- SOX and NYSE Standards -- Appendix C: Variables -- Chapter 19 Risk Management and Industrial Organization -- 19.1 Entry, Production, and Hedging -- 19.2 Commitment to Hedging -- 19.3 Conclusion -- References -- Chapter 20 Real Implications of Corporate Risk Management -- 20.1 Real Implications of Corporate Risk Management: A Review -- 20.2 Methodology -- 20.2.1 Instrumental Variable -- 20.2.2 Essential Heterogeneity Model -- 20.3 US Oil Producers -- 20.3.1 Sample Construction -- 20.3.2 Descriptive Statistics -- 20.3.3 Oil Hedging Activity -- 20.3.4 Univariate Tests…”
    Libro electrónico
  9. 5369
    Publicado 2018
    Tabla de Contenidos: “…21.1 MARKETABLE DEBT SECURITIES -- 21.2 BANK DEBT PRODUCTS -- 21.3 FINANCING LINKED TO AN ASSET OF THE FIRM -- 22 SHARES -- 22.1 BASIC CONCEPTS -- 22.2 MULTIPLES -- 22.3 KEY MARKET DATA -- 22.4 How TO PERFORM A STOCK MARKET ANALYSIS -- 22.5 ADJUSTING PER SHARE DATA FOR TECHNICAL FACTORS -- 23 OPTIONS -- 23.1 DEFINITION AND THEORETICAL FOUNDATION OF OPTIONS -- 23.2 MECHANISMS USED IN PRICING OPTIONS -- 23.3 ANALYSING OPTIONS -- 23.4 PARAMETERS TO VALUE OPTIONS -- 23.5 METHODS FOR PRICING OPTIONS -- 23.6 TOOLS FOR MANAGING AN OPTIONS POSITION -- 24 HYBRID SECURITIES -- 24.1 WARRANTS -- 24.2 CONVERTIBLE BONDS -- 24.3 PREFERENCE SHARES -- 24.4 OTHER HYBRID SECURITIES -- 25 SELLING SECURITIES -- 25.1 GENERAL PRINCIPLES IN THE SALE OF SECURITIES -- 25.2 INITIAL PUBLIC OFFERINGS -- 25.3 CAPITAL INCREASES -- 25.4 BLOCK TRADES OF SHARES -- 25.5 BONDS -- 25.6 CONVERTIBLE AND EXCHANGEABLE BONDS -- 25.7 SYNDICATED LOANS -- Section III Value -- 26 VALUE AND CORPORATE FINANCE -- 26.1 THE PURPOSE OF FINANCE IS TO CREATE VALUE -- 26.2 VALUE CREATION AND MARKETS IN EQUILIBRIUM -- 26.3 VALUE AND ORGANISATION THEORIES -- 26.4 How CAN WE CREATE VALUE? …”
    Libro electrónico
  10. 5370
    Publicado 2020
    Tabla de Contenidos: “…-- But creativity is also in the small stuff -- Our senses affect our creativity -- Is intelligence linked to creativity? -- Part 2: Impact on our daily life -- Can we learn to be creative? …”
    Libro electrónico
  11. 5371
    por Loth, Alexander
    Publicado 2024
    Tabla de Contenidos: “…-- 6.1.4 Tipp 4: Beispiele geben‌ -- 6.1.5 Tipp 5: Verkettete Aufrufe‌ verwenden -- 6.1.6 Tipp 6: Rollenspiel‌ für authentische Inhalte -- 6.1.7 Tipp 7: Neue Chats für neue Themen -- 6.2 Grundlegende Formel für die Verwendung von ChatGPT in sozialen Medien -- 6.3 Anwendungen von ChatGPT im Social Media Marketing -- 6.4 Das Schreiben von Bildunterschriften‌ -- 6.5 Die Wiederverwendung von Inh‌alten -- 6.6 Social-Media-Strategieplan‌ entwickeln -- 6.7 Ideenfindung‌ für Inhalte -- 6.8 Erstellung eines Inhaltskalenders‌ -- 6.9 Echtes Beispiel eines verketteten Aufrufs -- 6.9.1 Zuerst vom Blog-Post zu LinkedIn‌ -- 6.9.2 Weiter zu Instagram‌ -- 6.9.3 Schließlich zu Twitter‌ -- 6.10 Qualitätskontrolle‌ und ethische Überlegungen im KI-gestützten Social Media Marketing -- Kapitel 7: Künstliche Intelligenz in Unternehmenskommunikation und PR -- 7.1 Anwendungsfälle und Beispiele -- 7.2 KI-gestützte Datenanalyse‌ -- 7.3 Dokumentenanalyse‌ durch künstliche Intelligenz -- 7.4 Einsatz von künstlicher Intelligenz als Schreibassistent‌ -- 7.5 KI-gestützte Web-Recherche‌ -- 7.6 KI-gestützte Übersetzung‌ in der Unternehmenskommunikation -- 7.7 Executive Summaries‌ mit KI erzeugen -- 7.8 Einsatz von KI-generierten Illustration‌en in Präsentationen -- 7.9 Schlussgedanken zur künstlichen Intelligenz in Unternehmenskommunikation und PR -- Kapitel 8: KI für SEO-Optimierung -- 8.1 Überblick zu relevanten Tools zur SEO-Optimierung -- 8.2 Keyword-Recherche‌ mit Semrush‌ -- 8.2.1 Keyword-Übersicht‌: Eine schnelle Analyse durchführen…”
    Libro electrónico
  12. 5372
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Preface -- Content -- 1 Introduction -- 1.1 Historic Note -- 1.2 Role of Plastics in Packaging -- 1.3 Book Structure -- 1.4 References -- 2 Basic Concepts and Definitions -- 2.1 Terminology -- 2.1.1 Macromolecule -- 2.1.2 Polymer -- 2.1.3 Plastic -- 2.1.4 Monomer -- 2.1.5 Constitutional Unit -- 2.1.6 Homopolymer -- 2.1.7 Copolymer -- 2.2 Polymer Nomenclature -- 2.3 Interatomic and Intermolecular Forces in Polymers -- 2.3.1 Interatomic Forces -- 2.3.1.1 Covalent Bonds -- 2.3.1.2 Ionic Bonds -- 2.3.2 Intermolecular and Intramolecular Forces -- 2.3.2.1 Dispersion Forces -- 2.3.2.2 Induction Forces -- 2.3.2.3 Dipole Forces -- 2.3.2.4 Hydrogen Bonds -- 2.4 Properties Determined by Chemical Composition -- 2.5 Categorization of Plastics -- 2.6 References -- Study Questions -- 3 Polymer Structure and Properties -- 3.1 Introduction -- 3.2 Molecular Architecture -- 3.2.1 Linear Polymers -- 3.2.2 Branched Polymers -- 3.2.3 Cross-Linked Polymers -- 3.3 Copolymer Structure -- 3.3.1 Random Copolymers -- 3.3.2 Alternating Copolymers -- 3.3.3 Block Copolymers -- 3.3.4 Graft Copolymers -- 3.3.5 Combinations of Copolymer Types -- 3.4 Chain Polymerization, Addition Polymers -- 3.4.1 Addition or Chain Polymerization Mechanism -- 3.4.2 Vinyl Polymers -- 3.4.3 Free-Radical Polymerization -- 3.4.3.1 Initiation -- 3.4.3.2 Propagation -- 3.4.3.3 Termination -- 3.4.4 Polyethylene Polymerization Processes -- 3.4.5 Other Addition Polymerization Mechanisms -- 3.5 Molecular Configuration and Conformation -- 3.6 Head-to-Head and Head-to-Tail -- 3.6.1 Configurations of Vinyl Polymers -- 3.7 Stereochemistry -- 3.8 Step Polymerization, Condensation Polymers -- 3.9 Molecular Weight and Molecular Weight Distribution -- 3.9.1 Degree of Polymerization -- 3.9.2 Molecular Mass (Weight) and Molecular Weight Distribution -- 3.9.3 Number Average Molecular Weight…”
    Libro electrónico
  13. 5373
    por Flanagan, William A.
    Publicado 2012
    Tabla de Contenidos: “…-- Preface xiii -- Acknowledgments xv -- 1 IP Technology Disrupts Voice Telephony 1 -- 1.1 Introduction to the Public Switched Telephone Network 1 -- 1.2 The Digital PSTN 2 -- 1.3 The Packet Revolution in Telephony 8 -- 1.3.1 Summary of Packet Switching 9 -- 1.3.2 Link Capacity: TDM versus Packets 11 -- 1.3.3 VoIP and “The Cloud” 13 -- IN SHORT: Reading Network Drawings 14 -- 2 Traditional Telephones Still Set Expectations 17 -- 2.1 Availability: How the Bell System Ensured Service 18 -- 2.2 Call Completion 19 -- 2.3 Sound Quality: Encoding for Recognizable Voices 20 -- 2.4 Low Latency 23 -- 2.5 Call Setup Delays 24 -- 2.6 Impairments Controlled: Echo, Singing, Distortion, Noise 25 -- 3 From Circuits to Packets 27 -- 3.1 Data and Signaling Preceded Voice 27 -- 3.1.1 X.25 Packet Data Service 27 -- 3.1.2 SS7: PSTN Signaling on Packets 28 -- 3.1.3 ISDN 29 -- 3.2 Putting Voice into Packets 30 -- 3.2.1 Voice Encoding 31 -- 3.2.2 Dicing and Splicing Voice Streams 32 -- 3.2.3 The Latency Budget 33 -- 4 Packet Transmission and Switching 37 -- 4.1 The Physical Layer: Transmission 39 -- IN SHORT: The Endian Wars 40 -- 4.2 Data Link Protocols 41 -- 4.3 IP, the Network Protocol 43 -- 4.4 Layer 4 Transport Protocols 47 -- 4.4.1 Transmission Control Protocol 47 -- 4.4.2 User Datagram Protocol 50 -- 4.4.3 Stream Control Transmission Protocol 51 -- 4.5 Higher Layer Processes 54 -- 4.5.1 RTP 54 -- 4.5.2 RTCP 57 -- 4.5.3 Multiplexing RTP and RTCP on One UDP Port 58 -- 4.5.4 RTP Mixers and Translators 59 -- 4.5.5 Layered Encoding 60 -- 4.5.6 Profiles for Audio and Video Conferences 60 -- 4.5.7 Security via Encryption 61 -- IN SHORT: Public Key Infrastructure (PKI) 62 -- 4.6 Saving Bandwidth 64 -- 4.6.1 Voice Compression 64 -- 4.6.2 Header Compression 66 -- 4.6.3 Silence Suppression, VAD 67 -- 4.6.4 Sub-Packet Multiplexing 69 -- 4.6.5 Protocol and Codec Selection 70 -- 4.7 Differences: Circuit versus Packet Switched 71 -- 4.7.1 Power to the Desktop Phone 71 -- 4.7.2 Phone as Computer and Computer as Phone 72.…”
    Libro electrónico
  14. 5374
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Preface -- Organisation -- Table of Contents -- Communication in Automation -- TSN basierte automatisch etablierte Redundanz für deterministische Kommunikation -- 1 Einleitung -- 2 Mechanismen für Quality of Service (QoS) -- 3 Industrielle Anforderungen an Echtzeitkommunikation -- 3.1 Latenz -- 3.2 Verfügbarkeit -- 4 Stream Reservation -- 5 Redundante Stream Reservierung -- 5.1 End-to-End Frame Replication and Elimination for Reliability (E2E FRER) -- 5.2 Network Frame Replication and Elimination for Reliability (Network-FRER) -- 6 Fazit -- Literatur -- Arduino based Framework for Rapid Application Development of a Generic IO-Link interface -- 1 Introduction -- 2 Framework overview -- 3 Firmware -- 4 GUI -- 5 Hardware interface -- 6 Proof of concept -- 6.1 IO-Link distance sensor -- 7 Conclusions -- References -- On the suitability of 6TiSCH for industrial wireless communication -- 1 Introduction -- 2 Overview of 6TiSCH-stack -- 2.1 Time Slotted Channel Hopping -- 2.2 Routing protocol RPL -- 2.3 6TiSCH-WG standardization activities -- 3 Challenges -- Challenge 1: Convergence on industrial concerns -- Challenge 2: Avoidance of specification implementation mismatches -- Challenge 3: Design of the management architecture scheme -- Challenge 4: Concurrence of other wireless technologies -- 4 Analysis and Improvements of the 6TiSCH minimal configuration -- 4.1 6TiSCH network formation procedure -- 4.2 Shortcomings of 6TiSCH-MC -- 4.3 Improvements of 6TiSCH-MC -- 4.4 Diagonal: Our improvement proposal for 6TiSCH-MC -- 5 Conclusions -- References -- Ein dezentraler Regelalgorithmus für ein automatisches Koexistenzmanagement -- 1 Einführung -- 2 Der Betrachtungsraum als Regelkreis -- 3 Modellierung der Regelstrecke zur Koexistenz -- 4 Modellierung eines dezentralen Regleralgorithmusses -- 5 Validierung des Modells für die dezentrale Regelung…”
    Libro electrónico
  15. 5375
    Publicado 2016
    Tabla de Contenidos: “…-- Weitere Tricks von Spotlight -- Wetter-Info mit Spotlight -- Videos im Internet finden -- Größe des Spotlight-Panels ändern -- Internet-Funktionen in Spotlight abschalten -- Bei Problemen: Index neu erstellen -- Spotlight mit Diktat-Funktion kombinieren -- 5.2 Intelligente Ordner schlau nutzen -- Intelligenten Ordner erstellen -- Intelligente Ordner bearbeiten -- Schnell auf intelligente Ordner zugreifen -- 6 Schreibtisch und Dock bequem nutzen -- 6.1 Das Dock: Eine Leiste mit Programmen und Fenstern -- Programm ans Dock anheften -- Programm aus dem Dock entfernen -- Minimierte Fenster -- Dock größer oder kleiner machen -- Dock automatisch ausblenden -- Links oder rechts statt unten andocken -- 6.2 Hintergrund-Bild des Schreibtischs ändern -- Eigenes Bild nutzen -- 6.3 Fotos des Bildschirm-Inhalts machen -- 6.4 Wo ist die Maus? …”
    Libro electrónico
  16. 5376
    Publicado 2017
    Tabla de Contenidos: “…s Algorithm 126 -- 5.7 Random Races Algorithm 126 -- References 127 -- Abbreviations/Terminologies 128 -- Questions 128 -- Exercises 129 -- Part III Routing on the Internet 131 -- 6 Interior Gateway Protocols 133 -- 6.1 Introduction 133 -- 6.2 Distance Vector Protocols 135 -- 6.2.1 Routing Information Protocol 137 -- 6.2.2 Interior Gateway Routing Protocol 141 -- 6.3 Link State Protocols 143 -- 6.3.1 Open Shortest Path First Protocol 144 -- 6.3.2 Intermediate System to Intermediate System Protocol 148 -- References 152 -- Abbreviations/Terminologies 152 -- Questions 153 -- Exercises 155 -- 7 Exterior Gateway Protocol 159 -- 7.1 Introduction 159 -- 7.1.1 Hosts vs Gateways 161 -- 7.1.2 Gateway?]…”
    Libro electrónico
  17. 5377
    por Hart-Davis, Guy
    Publicado 2024
    Tabla de Contenidos: “…View Files and Folders by Tags -- Work with Zip Files -- Work with Zip Files -- Compress Files to a Zip File -- Extract Files from a Zip File -- Using the Trash -- Using the Trash -- Place a File in the Trash -- Recover a File from the Trash -- Configure Finder Settings -- Configure Finder Settings -- Customize the Finder Toolbar -- Customize the Finder Toolbar -- Customize the Finder Sidebar -- Customize the Finder Sidebar -- Chapter 6 Surfing the Web -- Open Safari and Customize Your Start Page -- Open Safari and Customize Your Start Page -- Open a Web Page -- Open a Web Page -- Follow a Link to a Web Page -- Follow a Link to a Web Page -- Open Several Web Pages at Once -- Open Several Web Pages at Once -- Open Several Pages on Tabs in the Same Safari Window -- Open Several Pages in Separate Safari Windows -- Navigate Among Web Pages -- Navigate Among Web Pages -- Go Back One Page -- Go Forward One Page -- Go Back Multiple Pages -- Go Forward Multiple Pages -- Return to a Recently Visited Page -- Return to a Recently Visited Page -- Return to a Page on the History List -- Clear Your Browsing History -- Play Music and Videos on the Web -- Play Music and Videos on the Web -- Play Music -- Play Videos -- Set Your Home Page and Search Engine -- Set Your Home Page and Search Engine -- Create Bookmarks for Web Pages -- Create Bookmarks for Web Pages -- Create a New Bookmark -- Organize Your Bookmarks -- Using Reader View and Reading List -- Using Reader View and Reading List -- Switch a Web Page to Reader View -- Add a Web Page to Reading List -- Open Reading List and Display a Page -- Organize Safari Tabs into Tab Groups -- Organize Safari Tabs into Tab Groups -- Download a File -- Download a File -- Create and Use Safari Profiles -- Configure Safari for Security and Privacy -- Configure Safari for Security and Privacy…”
    Libro electrónico
  18. 5378
    por Benedict, Mark Quentin
    Publicado 2022
    Tabla de Contenidos: “…12.5 Relaxing Model Assumptions -- 12.5.1 Resistance formation and mutation -- 12.5.2 UD reversal -- 12.5.3 Spatial effects -- 12.6 Linking Theory and Experimentation -- 12.7 Alternative Configurations of UD -- 12.8 Areas of Future Interest -- 13 Tsetse Paratransgenesis: a Novel Strategy for Reducing the Spread of African Trypanosomiases -- 13.1 Tsetse as Vectors of Parasitic African Trypanosomes -- 13.2 Tsetse Reproduction and Symbiosis -- 13.2.1 Tsetse reproduction -- 13.2.2 Tsetse's endogenous endosymbionts -- 13.3 Utilizing Endogenous Endosymbionts for Tsetse Paratransgenesis -- 13.3.1 Recombinant Sodalis is well suited for tsetse paratransgenesis -- 13.3.2 Identification and expression of anti-trypanosomal effector molecules -- 13.3.3 Paratransgenic manipulation of tsetse midgut physiology to alter parasite infection dynamics -- 13.4 Utilizing Exogenous Bacteria for Tsetse Paratransgenesis -- 13.5 Mechanisms to Drive Parasite-Resistant Tsetse Phenotypes into Natural Populations -- 13.5.1 Exploiting Wolbachia-mediated mating incompatibilities -- 13.5.2 Modelling the efficacy of paratransgenic control -- 13.5.3 Polyandry and cytoplasmic incompatibility -- 13.6 Conclusions -- 14 Paratransgenic Control of Chagas Disease -- 14.1 Introduction -- 14.2 Chagas Disease -- 14.2.1 Epidemiology, ecology and modes of transmission of Chagas disease -- 14.2.2 Global spread of Chagas disease -- 14.3 Novel Approaches to Control of Chagas Disease -- 14.3.1 Paratransgenesis -- 14.3.2 Antimicrobial peptides as effector molecules -- 14.3.3 Single-chain antibodies -- 14.3.4 β-1-3-glucanase -- 14.3.5 Additional methods for bacterial modifications -- 14.4 From Bench Top to Field Trials -- 14.5 Conclusions -- 15 Asaia Paratransgenesis in Mosquitoes -- 15.1 Asaia -- 15.2 Paratransgenesis for Vector Control…”
    Libro electrónico
  19. 5379
    Publicado 2014
    Tabla de Contenidos: “…7.5.1 Attenuation Compensation Techniques 341 -- 7.5.2 Depolarization Compensation Techniques 342 -- 7.6 Noise Considerations 342 -- 7.6.1 Thermal Noise 342 -- 7.6.2 Noise Figure 343 -- 7.6.3 Noise Temperature 344 -- 7.6.4 Noise Figure and Noise Temperature of Cascaded Stages 345 -- 7.6.5 Antenna Noise Temperature 346 -- 7.6.6 Overall System Noise Temperature 350 -- 7.7 Interference-related Problems 353 -- 7.7.1 Intermodulation Distortion 354 -- 7.7.2 Interference between the Satellite and Terrestrial Links 357 -- 7.7.3 Interference due to Adjacent Satellites 357 -- 7.7.4 Cross-polarization Interference 361 -- 7.7.5 Adjacent Channel Interference 361 -- 7.8 Antenna Gain-to-Noise Temperature (G/T) Ratio 365 -- 7.9 Link Design 367 -- 7.9.1 Link Design Procedure 368 -- 7.9.2 Link Budget 368 -- 7.10 Multiple Spot Beam Technology 371 -- Further Readings 374 -- Glossary 375 -- 8 Earth Station 378 -- 8.1 Earth Station 378 -- 8.2 Types of Earth Station 380 -- 8.2.1 Fixed Satellite Service (FSS) Earth Station 381 -- 8.2.2 Broadcast Satellite Service (BSS) Earth Stations 382 -- 8.2.3 Mobile Satellite Service (MSS) Earth Stations 383 -- 8.2.4 Single Function Stations 384 -- 8.2.5 Gateway Stations 385 -- 8.2.6 Teleports 386 -- 8.3 Earth Station Architecture 386 -- 8.4 Earth Station Design Considerations 387 -- 8.4.1 Key Performance Parameters 388 -- 8.4.2 Earth Station Design Optimization 390 -- 8.4.3 Environmental and Site Considerations 391 -- 8.5 Earth Station Testing 392 -- 8.5.1 Unit and Subsystem Level Testing 392 -- 8.5.2 System Level Testing 392 -- 8.6 Earth Station Hardware 398 -- 8.6.1 RF Equipment 398 -- 8.6.2 IF and Baseband Equipment 408 -- 8.6.3 Terrestrial Interface 409 -- 8.7 Satellite Tracking 412 -- 8.7.1 Satellite Tracking System -- Block Diagram 412 -- 8.7.2 Tracking Techniques 412 -- 8.8 Some Representative Earth Stations 419 -- 8.8.1 Goonhilly Satellite Earth Station 419 -- 8.8.2 Madley Communications Centre 421 -- 8.8.3 Madrid Deep Space Communications Complex 421.…”
    Libro electrónico
  20. 5380
    por Pestano Herrera, Jesús María
    Publicado 2018
    Tabla de Contenidos: “….) -- 6.2 PROGRAMANDO CON EL ADAPTADOR ST-LINK -- 6.2.1 PROGRAMANDO EN ARDUINO CON EL ADAPTADOR (...) -- 6.2.2 PROGRAMANDO DIRECTAMENTE CON EL SOFTWARE (...) -- 6.2.3 CONFIGURAR EL KEIL PARA PROGRAMAR (...) -- 6.2.4 CONFIGURAR EL KEIL PARA PROGRAMAR (...) -- 6.2.5 ACTUALIZACIÓN DEL FIRMWARE DEL ADAPTADOR (...) -- 7 PRINCIPIOS BÁSICOS DEL HARDWARE DE LOS (...) -- 7.1 PUERTOS Y PINES -- 7.2 PERIFÉRICOS INTERNOS -- 7.3 MÉTODO DE PROGRAMACIÓN -- PARTE III PROGRAMACIÓN DEL MICROCONTROLADOR (...) -- 8 PROGRAMACIÓN GPIO -- 8.1 PROGRAMACIÓN SYSCLK -- 8.1.1 PLL -- 9 PROGRAMACIÓN USART -- 9.1 EJEMPLO DE CONFIGURACIÓN PUERTO USART -- 9.2 EJEMPLO CON OTRO PUERTO USART -- 9.3 EJEMPLO REMAPEO DE PUERTO USART…”
    Libro electrónico