Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Data mining 1,113
- Big data 282
- Data processing 239
- Python (Computer program language) 186
- Machine learning 182
- Database management 129
- Engineering & Applied Sciences 116
- Artificial intelligence 113
- Management 113
- Mines and mineral resources 111
- Computer Science 106
- History 105
- Electronic data processing 103
- Computer programs 85
- Historia 74
- R (Computer program language) 71
- Minería 67
- Geology 64
- Development 60
- Information technology 60
- Application software 59
- Technology: general issues 58
- Data Mining and Knowledge Discovery 57
- Business 56
- History of engineering & technology 53
- Computer networks 52
- Social aspects 52
- Spark (Electronic resource : Apache Software Foundation) 52
- Web usage mining 50
- Business & Economics 48
-
3821Publicado 2014Tabla de Contenidos:Libro electrónico
-
3822por National Research Council (U.S.).Tabla de Contenidos: “…SUMMARY AND RECOMMENDATIONS -- REFERENCES -- 4 Measurement of Exposure to Asbestiform Fibers -- MEASUREMENT TECHNIQUES -- MEASURING ASBESTOS DUST IN THE WORKPLACE -- The Impinger Technique -- The Membrane Filter Technique -- MEASURING ASBESTOS DUST IN THE AMBIENT ENVIRONMENT -- RELATIONSHIPS AMONG VARIOUS EXPOSURE MEASUREMENT METHODS -- EXPOSURE TO CHRYSOTILE IN THE AMBIENT ENVIRONMENT -- COMPLICATING FACTORS IN ENVIRONMENTAL ASSAYS -- FUTURE MEASUREMENT OF EXPOSURE TO ASBESTIFORM FIBERS -- RECOMMENDATIONS -- REFERENCES -- 5 Effects of Asbestiform Fibers on Human Health -- NATURE OF EVIDENCE -- BIODISPOSITION OF FIBERS -- Fiber Deposition -- Clearance and Transport -- CLINICAL ASPECTS OF ASBESTOS-ASSOCIATED DISEASES -- Necessary Assumptions Used in Determining Health Effects -- Sensitivity and Specificity of Clinical Evidence -- General Diagnostic Measures -- DISEASE ASSOCIATED WITH NONOCCUPATIONAL INHALATION EXPOSURES TO ASBESTIFORM FIBERS -- Asbestos Exposure from Household Contacts -- Neighborhood Exposure to Asbestos -- Natural Sources of Asbestiform Fibers -- Summary -- EPIDEMIOLOGICAL STUDIES OF EFFECTS RESULTING FROM THE INGESTION OF ASBESTOS IN DRINKING WATER -- OCCUPATIONAL EPIDEMIOLOGICAL STUDIES-METHODOLOGICAL CONSIDERATIONS -- CANCER MORTALITY IN OCCUPATIONAL COHORTS EXPOSED TO ASBESTOS -- Mining and Milling -- Manufacturing -- Insulation -- Shipyards -- Relative Carcinogenicity of Different Types of Asbestos -- Effects of Smoking -- Summary -- ASBESTOSIS AND ASBESTOS-ASSOCIATED PLEURAL DISEASE IN OCCUPATIONAL COHORTS -- Mortality Studies -- Morbidity Studies -- Summary -- HEALTH EFFECTS OF OCCUPATIONAL EXPOSURE TO MAN-MADE MINERAL FIBERS12 -- Morbidity -- Mortality -- Summary -- ADDITIONAL OCCUPATIONAL EPIDEMIOLOGICAL STUDIES -- Attapulgite -- Talc -- RECOMMENDATIONS -- REFERENCES…”
Publicado 1984
Libro electrónico -
3823por Greenwald, RickTabla de Contenidos: “…OLAP Option; 1.8.2.6. Data Mining Option; 1.8.2.7. Availability; 1.9. Database Management Features; 1.9.2. …”
Publicado 2004
Libro electrónico -
3824Publicado 2022Tabla de Contenidos: “…5.2 Reasons for Introducing Separation Distance by Local Governments -- 6 Conclusions -- References -- China Mainland ́s Energy Transition: How to Overcome Financial, Societal, and Institutional Challenges in the Long Term -- 1 Energy Transition: Status and Sustainability -- 1.1 Energy System Profiles -- 1.2 Lessons of Energy Transition During 2006-2020 -- Weathering the Massive Job Loss in the Coal Mining Sector -- The Ups and Downs of Renewable Energy Development in China -- Major Experiences from China ́s Energy Transition -- Co-Benefits of Energy Transition Would Help to Build a Healthy and Low-Carbon Energy System -- Subsidy-Driven Policies Boosted the Renewable Energy Industry: Is It Switch-Off Time Now? …”
Libro electrónico -
3825Publicado 2024Tabla de Contenidos: “…Chapter 5: Writing Elegant T-SQL Queries -- Technical requirements -- Best practices for T-SQL querying -- Referencing objects -- Joining tables -- Using NOLOCK -- Using cursors -- The perils of SELECT * -- Functions in our predicate -- Deconstructing table-valued functions -- Complex expressions -- Optimizing OR logic -- NULL means unknown -- Fuzzy string matching -- Inequality logic -- EXECUTE versus sp_executesql -- Composable logic -- Summary -- Chapter 6: Discovering T-SQL Anti- Patterns in Depth -- Technical requirements -- Implicit conversions -- Avoiding unnecessary sort operations -- UNION ALL versus UNION -- SELECT DISTINCT -- Avoiding UDF pitfalls -- Avoiding unnecessary overhead with stored procedures -- Pitfalls of complex views -- Pitfalls of correlated sub-queries -- Properly storing intermediate results -- Using table variables and temporary tables -- Using Common Table Expressions (CTEs) -- Summary -- Part 3: Assembling Our Query Troubleshooting Toolbox -- Chapter 7: Building Diagnostic Queries Using DMVs and DMFs -- Technical requirements -- Introducing DMVs -- Exploring query execution DMVs -- sys.dm_exec_sessions -- sys.dm_exec_requests -- sys.dm_exec_sql_text -- sys.dm_os_waiting_tasks -- Exploring query plan cache DMVs -- sys.dm_exec_query_stats -- sys.dm_exec_procedure_stats -- sys.dm_exec_query_plan -- sys.dm_exec_cached_plans -- Troubleshooting common scenarios with DMV queries -- Investigating blocking -- Cached query plan issues -- Single-use plans (query fingerprints) -- Finding resource-intensive queries -- Queries with excessive memory grants -- Mining XML query plans -- Plans with missing indexes -- Plans with warnings -- Plans with implicit conversions -- Plans with lookups -- Summary -- Chapter 8: Building XEvent Profiler Traces -- Technical requirements -- Introducing XEvents…”
Libro electrónico -
3826Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contributors -- Contents -- Welcome -- A Friend Indeed -- Fieldbook and Guide -- Seeing More in What We Do -- Moving On -- The Icons -- Part 1 No Fast and Easy Way -- Chapter 1 Flawless -- Chapter 2 Transformation Is Slow, Small, and Low Cost -- Community Through "Houses" -- The First Open Space Meeting -- Morning Circles: Checking In -- Mentoring Administrators and Teachers -- The Advantages of Restorative Practices -- The Benefit of Design -- You're Invited to a Pro Action Café -- Reducing Disciplinary Referrals and Expulsions -- Designed to Succeed -- Chapter 3 Risk Is Where You Find It -- No Pain, No Pain -- The Risks We Fear -- Vulnerability Is a Sign of Life -- Chapter 4 Consultant, Flawed: A Story of Eternal Internal Triangles -- Part 2 The Complexity of Advice -- Chapter 5 Partners for Possibility -- An Encouraged Principal -- Peter Block and Community Building Workshops -- Dinokeng Scenarios -- Walking Together in Education -- Piloting an Idea at a Primary School -- Leadership Development Through Immersion and Service -- South Africa: Alive with Possibility -- Partners for Possibility -- Reflecting on Thirteen Years of Impact -- Chapter 6 Changing Focus: The New Direction of "Flawless" Consulting -- Flawless Contracting -- Change: Now and Future -- Chapter 7 Be Careful Who You Ask: Perils of Wisdom -- From Myth and History -- The Educated Expert -- Partnership: The Promise and Perils -- Mining the Expert Within -- Chapter 8 Dealing with Resistance: Having the Right Conversation in Difficult Situations -- Revealing Resistance -- Four Guidelines for Exposing Content and Emotions -- Taking the Risk -- Part 3 The Power of the Question -- Chapter 9 Flawless Goes to Parliament -- Consulting in Parliament -- Partnership and Transparency -- Introducing Process Checks -- Opening up the Room…”
Libro electrónico -
3827Publicado 2023Tabla de Contenidos: “…-- Chapter 6: Adding a Registration and Login Form for Our Users -- Technical requirements -- Creating a sign-up screen -- Understanding Vertical Layout Group -- Creating a sign-in screen -- Placing the player -- Summary -- Chapter 7: Building an NPC That Allows Us to Travel -- Technical requirements -- Choosing an aspect -- Bringing the NPC to life -- Triggering when we are close -- Showing the available worlds in a window -- Mobile support -- Traveling to the selected world -- Canvas -- NPC -- PlayerInstance -- Summary -- Chapter 8: Acquiring a House -- Technical requirements -- The concept of home -- Enabling a user to obtain a home -- Adding a trigger to the Prefab of the house -- Programming script to acquire a house -- Linking a house to a player -- Understanding what an NFT is -- Converting a house to an NFT -- IPFS -- Goerli -- ChainSafe -- MetaMask -- Mining cryptocurrencies -- Programming the generation of the NFT -- Summary -- Chapter 9: Turning Our World into a Multiplayer Room -- Technical requirements -- Getting started with Photon SDK -- Pricing -- Signing up for Photon SDK -- Creating a new application -- Installing Photon SDK -- Photon life cycle -- Regions -- Rooms -- Lobby -- Synchronizing movements and animations in the network -- Preparing the player Prefab -- Disabling other players' scripts -- Creating the network logic script -- Adapting login for multiplayer support -- Adapting world navigation for multiplayer support -- Testing the changes -- Testing synchronization with another user -- Introducing ParrelSync -- Installing ParrelSync -- Summary -- Chapter 10: Adding Text and a Voice Chat to the Room -- Technical requirements -- Getting started with Photon Chat -- Introduction to the Photon Chat SDK -- Creating a Photon Chat project…”
Libro electrónico -
3828por Hampton, LionelTabla de Contenidos: “…Just for laffs (3:05) -- Martin on every block (2:48) -- Pig foot sonata (3:01) -- Charlie was a sailor (3:26) -- Lost love (3:08) -- I nearly lost my mind (3:10) -- Altitude (2:57) -- Fiddle-dee-dee (3:21) -- Bogo-jo (2:51) -- Open house (2:58) -- Smart Alec (3:18) -- Bouncing at the Beacon (3:20) -- Give me some skin (3:13) -- Now that you're mine (2:44) -- Chasin' with Chase (2:56) -- Three quarter boogie (2:34) -- Martin on every block : (alternate take) (2:45) -- Chasin' with Chase : (alternate take) (3:02) -- Three quarter boogie : (alternate take) (2:34)…”
Publicado 2007
CDROM -
3829Publicado 2005Tabla de Contenidos: “…Rey Benayas -- Restoring overlogged tropical forests / Cesar Sabogal and Robert Nasi -- Opencast mining reclamation / Josâe Manuel Nicolau Ibarra and Mariano Moreno de las Heras -- The role of commercial plantations in forest landscape restoration / Jeffrey Sayer and Chris Elliot -- Attempting to restore biodiversity in even-aged plantations / Florencia Montagnini -- Best practices for industrial plantations ; What has WWF learned about restoration at an ecoregional scale? …”
Libro -
3830Publicado 2018Tabla de Contenidos: “…10.2 Defending Against Buffer Overflows -- 10.3 Other forms of Overflow Attacks -- 10.4 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Key Terms, Review Questions, and Problems -- Chapter 13 Cloud and IoT Security -- 13.1 Cloud Computing -- 13.2 Cloud Security Concepts -- 13.3 Cloud Security Approaches -- 13.4 The Internet of Things -- 13.5 IoT Security -- 13.6 Key Terms and Review Questions -- Part Three Management Issues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery from Physical Security Breaches…”
Libro electrónico -
3831Publicado 2023Tabla de Contenidos: “…8.5 Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies -- 8.5.1 Classification Features of Network Routing Protocols -- 8.5.2 Nearest Neighbor Behavior in Ant Colonies and the ACO Metaheuristic to Network Routing Protocols Inspired by Insect Societies -- 8.5.3 Useful Ideas from Honeybee Colonies -- 8.5.4 Colony and Workers Recruitment Communications -- 8.5.5 Stochastic Food Site Selection -- 8.6 Swarm Intelligence in Data Mining -- 8.6.1 Steps of Knowledge Discovery -- 8.7 Swarm Intelligence and Knowledge Discovery -- 8.8 Ant Colony Optimization and Data Mining -- 8.9 Conclusion -- References -- Index -- EULA…”
Libro electrónico -
3832Publicado 2024Tabla de Contenidos: “…Front Cover -- Many-Sorted Algebras for Deep Learning and Quantum Technology -- Copyright Page -- Dedication -- Contents -- List of figures -- Preface -- Acknowledgments -- 1 Introduction to quantum many-sorted algebras -- 1.1 Introduction to quantum many-sorted algebras -- 1.1.1 Algebraic structures -- 1.1.2 Many-sorted algebra methodology -- 1.1.3 Global field structure -- 1.1.4 Global algebraic structures in quantum and in machine learning -- 1.1.5 Specific machine learning field structure -- 1.1.6 Specific quantum field structure -- 1.1.7 Vector space as many-sorted algebra -- 1.1.8 Fundamental illustration of MSA in quantum -- 1.1.9 Time-limited signals as an inner product space -- 1.1.10 Kernel methods in real Hilbert spaces -- 1.1.11 R-Modules -- References -- 2 Basics of deep learning -- 2.1 Machine learning and data mining -- 2.2 Deep learning -- 2.3 Deep learning and relationship to quantum -- 2.4 Affine transformations for nodes within neural net -- 2.5 Global structure of neural net -- 2.6 Activation functions and cost functions for neural net -- 2.7 Classification with a single-node neural net -- 2.8 Backpropagation for neural net learning -- 2.9 Many-sorted algebra description of affine space -- 2.10 Overview of convolutional neural networks -- 2.11 Brief introduction to recurrent neural networks -- References -- 3 Basic algebras underlying quantum and NN mechanisms -- 3.1 From a vector space to an algebra -- 3.2 An algebra of time-limited signals -- 3.3 The commutant in an algebra -- 3.4 Algebra homomorphism -- 3.5 Hilbert space of wraparound digital signals -- 3.6 Many-sorted algebra description of a Banach space -- 3.7 Banach algebra as a many-sorted algebra -- 3.8 Many-sorted algebra for Banach* and C* algebra -- 3.9 Banach* algebra of wraparound digital signals -- 3.10 Complex-valued wraparound digital signals -- References…”
Libro electrónico -
3833Publicado 2019“…In no time, you’ll discover how to mine and analyze critical data in order to make more informed business decisions. …”
Libro electrónico -
3834por OECDTabla de Contenidos: “…Brazil has a low share of ICT inputs in the production exports -- Use of ICT inputs in agro-food exports -- Use of ICT inputs in mining sectors -- Use of ICT inputs in manufacturing exports -- Use of ICT inputs in services exports -- 2.3. …”
Publicado 2022
Libro electrónico -
3835por Rashvand, Habib F.Tabla de Contenidos: “…4.5 Case Study: Outpatient Care 141 -- 5 Clinical Applications 149 -- 5.1 Surgical Applications 150 -- 5.2 Dental Applications 161 -- 5.3 Scalp Applications 165 -- 5.4 Post-Operative Applications 171 -- 5.5 Emergency Case Studies 181 -- 6 Smart Home, Smart Office 189 -- 6.1 Application Requirements 190 -- 6.2 Energy and Resource Optimisation 198 -- 6.3 Smart Home Case Studies 203 -- 6.4 Smart Office Case Studies 212 -- 7 Public Safety Applications 221 -- 7.1 Monitoring Airborne Toxins 223 -- 7.2 Monitoring Forest Fires 228 -- 7.3 Monitoring Structural Health 233 -- 7.4 Monitoring Traffic 242 -- 7.5 Case Study: Sink Location 250 -- 7.6 Case Study: Congestion Avoidance 254 -- 7.7 Case Study: Target Tracking and Surveillance 257 -- 8 Geographical Applications 261 -- 8.1 Farming Industry 261 -- 8.2 Mining Industry 270 -- 8.3 Transportation 274 -- 8.4 Remote Sensing and Imaging 279 -- 8.5 Earth Resources Observation 282 -- 8.6 Underwater Sensing 287 -- Appendix A Further Details on Potential Devices and Systems 293 -- A.1 Accelerometers 293 -- A.2 Equipment 295 -- A.2.1 Tomography 296 -- A.2.2 Gadgets 300 -- A.3 Smart Sensors Devices 302 -- A.3.1 Mica2 and Mica2Dot 302 -- A.3.2 MicaZ 307 -- A.3.3 Telos and TMote Sky 308 -- A.3.4 Fleck3 and FleckNano 310 -- A.3.5 3Mate! …”
Publicado 2012
Libro electrónico -
3836por National Research Council (U.S.).Tabla de Contenidos: “…3.3.1 Education and Training -- 3.3.2 Government Initiative and Support -- 3.4 SUMMARY -- 3.5 REFERENCES -- 4 Current Bioprocess Technology, Products, and Opportunities -- 4.1 BIOPHARMACEUTICALS -- 4.1.1 Proteins from Recombinant Microorganisms -- 4.1.2 Inclusion Bodies -- 4.1.3 Mammalian Host Systems -- 4.1.4 Other Hosts for Heterologous Gene Expression -- 4.1.5 Isolation and Purification -- 4.1.6 Protein Engineering -- 4.1.7 Glycobiology -- 4.1.8 Metabolic Engineering -- 4.1.9 Polymerase Chain Reaction -- 4.1.10 Monoclonal Antibodies and Antibody Engineering -- 4.1.11 Transgenic Animals -- 4.1.12 Product Formulation -- 4.1.13 Research Needs -- 4.2 SPECIALTY BIOPRODUCTS AND INDUSTRIAL CHEMICALS -- 4.2.1 Enzyme Technology and Specialty Bioproducts -- 4.2.2 Biopesticides -- 4.2.3 Microalgae and New Chemicals -- 4.2.4 Plant-Cell Tissue Culture -- 4.2.5 Research Needs and Opportunities -- 4.3 ENVIRONMENTAL APPLICATIONS -- 4.3.1 Bioremediation -- 4.3.2 Point-of-Source Biocontrol -- 4.3.3 Agriculture -- 4.3.4 Mining -- 4.3.5 Microbial-Enhanced Oil Recovery -- 4.3.6 Research Needs and Opportunities -- 4.4 REFERENCES -- 5 Needs: What Must Be Done to Meet the Challenges -- 5.1 EDUCATION AND TRAINING -- 5.1.1 Science-Engineering Interface -- 5.1.2 Multidisciplinary Team Research -- 5.1.3 Industry-University Interface -- 5.1.4 Bioprocess Equipment Engineers -- 5.1.5 Diversification and Specialized Training -- 5.1.6 Curriculum Development -- 5.2 RESEARCH -- 5.3 TECHNOLOGY TRANSFER -- 5.3.1 University-Industry Relationships -- 5.3.2 International Exploitation -- 5.4 REFERENCES -- 6 The Future -- 6.1 OPPORTUNITIES -- 6.1.1 Biopharmaceuticals and Biopesticides from Insect Cell-Baculovirus System -- 6.1.2 Gene-Based Pharmaceuticals and Gene Therapy -- 6.1.3 New Catalysts -- 6.1.4 Cells, Organs, and Biomaterials -- 6.1.5 Transgenic Animals -- 6.1.6 Transgenic Plants…”
Publicado 1992
Libro electrónico -
3837por Doll-Steinberg, DanielTabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
Publicado 2023
Libro electrónico -
3838por OECDTabla de Contenidos: “…Skills and capacities -- Leadership -- Employees -- Policy and implementation challenges -- Balancing adaptive innovation and stability/resilience -- Adaptive innovation as a core practice -- Open questions -- Multifaceted approaches and research streams -- Drivers in the public sector -- Support structures -- Tools and methods -- References -- Notes -- 7 Mission-oriented innovation -- General description -- The challenge -- The approach -- Main drivers -- Enabling factors -- Institutional entrepreneurship and mission governance -- Funding missions -- Procurement -- Tools and methods -- New ways of working and knowing -- Portfolio approach to funding -- New approaches to appraisal and evaluation -- Skills and capabilities -- Policy and public service challenges -- Open questions -- Research questions -- Policy questions -- References -- Notes -- 8 Anticipatory innovation -- General description -- The challenge -- The approach -- Definitions in the literature -- Limitations of forecasting and prediction -- Strategic foresight and the discipline of anticipation -- Adaptation vs. anticipation -- Main drivers in the public sector -- Responding to novel societal and technological developments -- Decision-making and planning in conditions of unpredictable uncertainty -- Making sense of complex policy problems -- The cost of doing nothing in the face of rapid change -- Enabling factors -- Foresight ecosystems -- Governance using anticipatory innovation -- Working methods -- Tools and methods -- Forecasting and horizon scanning -- Signals -- Weak signals -- Web content analysis and text mining -- Delphi -- Real-time data monitoring and predictive analytics -- Thick data -- MCDA -- Visioning -- Running anticipatory innovation -- Framing -- Scenarios -- Megatrends -- Causal layered analysis -- Acting -- Stress-testing and wind-tunnelling -- Prototyping…”
Publicado 2022
Libro electrónico -
3839por Naik, ShefaliTabla de Contenidos: “…Distributed Database Management System -- 9.4 DDBMS Components -- 9.5 Distributed Processing -- 9.6 DDBMS Advantages and Disadvantages -- Summary -- Chapter 10 Advancement in Databases -- 10.1 Multidimensional Database -- 10.2 Mobile Databases -- 10.3 Multimedia Databases -- 10.4 Data Warehousing and Data Mining -- 10.5 Open Source Database -- 10.6 Spatial Databases -- 10.7 Moving Object Databases -- 10.8 NoSQL Database -- Summary…”
Publicado 2014
Libro electrónico -
3840