Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10741Publicado 2015Tabla de Contenidos: “…Cover Page -- Half Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- Acknowledgements -- Chapter 1 Thinking Wealthy -- Rule 1 Anybody can be wealthy - you just need to apply yourself -- Rule 2 Decide on your definition of wealth -- Rule 3 Set your objectives -- Rule 4 Keep it under your hat -- Rule 5 Most people are too lazy to be wealthy -- Rule 6 Get a reality check -- Rule 7 Understand your money beliefs and where they come from -- Rule 8 Understand that wealth is a consequence, not a reward* -- Rule 9 Decide what you want money for -- Rule 10 Understand that money begets money -- Rule 11 Calculate the net return -- Rule 12 If you see money as the solution you'll find it becomes the problem -- Rule 13 You can make lots of money, you can enjoy your job, and you can sleep nights -- Rule 14 Don't make money by being bad -- Rule 15 Money and happiness - understand their relationship -- Rule 16 Know the difference between price and value -- Rule 17 Know how the wealthy think -- Rule 18 Don't envy what others have -- Rule 19 It's harder to manage yourself than it is to manage your money -- Chapter 2 Getting Wealthy -- Rule 20 You've got to know where you are before you start -- Rule 21 You've got to have a plan -- Rule 22 Get your finances under control -- Rule 23 Insurance pays someone, and odds are it's not you -- Rule 24 Only by looking wealthy can you become wealthy -- Rule 25 Speculate to accumulate (no, this isn't gambling) -- Rule 26 Decide your attitude to risk -- Rule 27 Think through the alternatives to taking a risk -- Rule 28 If you don't trust someone, don't do business with them -- Rule 29 It's never too late to start getting wealthy -- Rule 30 Start saving young (or teach your kids this one if it's too late for you) -- Rule 31 Understand that your financial needs change at different stages of your life…”
Libro electrónico -
10742Publicado 2022Tabla de Contenidos: “…About the author xiii -- Preface. . xv -- Acknowledgements. xix -- Prologue - Some experiences in my lifetime xxi -- Chapter 1 Introduction - setting the scene. 1 -- 1.1 Where We are Today . 1 -- 1.2 How We Got Here . 2 -- 1.3 Going from Here . . 4 -- 1.4 Some Scenarios . 4 -- 1.4.1 Fossil fuels 5 -- 1.4.2 Food. . 6 -- 1.4.3 Renewable energy - critical minerals . . 7 -- 1.4.4 Economics 7 -- 1.5 Overview of the Book . . 7 -- Chapter 2 Systems thinking . . 11 -- 2.1 Systemic Approach . 12 -- 2.2 Feedback 15 -- 2.3 Wicked Problems . 15 -- 2.4 Hyperobjects. 16 -- 2.5 The UN Sustainable Development Goals . 17 -- 2.6 Global Risks . 18 -- Chapter 3 Climate today . . 19 -- 3.1 The 1992 RIO Conference . 21 -- 3.2 Climate as Reported by IPCC in 2021 23 -- 3.3 Climate Pioneers . 26 -- 3.4 The Million-Year Perspective . 27 -- 3.5 The CO2 -- Budget 28 -- 3.6 The COP26 Agreements . 29 -- 3.7 Deforestation 31 -- 3.8 Actions Needed 34 -- Chapter 4 Global warming impacts . 35 -- 4.1 Global Impact of Climate Change . 37 -- 4.2 Weather vs Climate . 37 -- 4.3 Extreme Weather. 38 -- 4.3.1 Human-made vulnerability 42 -- 4.4 Temperature . 42 -- 4.5 Rossby Waves 45 -- 4.6 Droughts 46 -- 4.7 Air Pollution from Wildfires 47 -- 4.8 Precipitation . 48 -- 4.9 Methane 49 -- 4.10 Other Significant Greenhouse Gases 52 -- 4.10.1 Nitrous oxide . 52 -- 4.10.2 Hydrofluorocarbons . 52 -- 4.11 Climate Feedback Mechanisms . 52 -- 4.12 The Human Cost of Climate Change. 54 -- 4.13 Actions Needed 55 -- Chapter 5The water perspective . . 57 -- 5.1 How We Got Here 59 -- 5.1.1 Drinking water 59 -- 5.1.2 Sanitation 60 -- 5.1.3 Water stress 60 -- 5.2 The State of Water Resources. 60 -- 5.2.1 Water quantity 61 -- 5.2.2 Water quality . 63 -- 5.2.3 Natural disasters and water . 64 -- 5.2.4 Glacier mass loss 64 -- 5.2.5 Water supply from glaciers 65 -- 5.2.6 Sea level rise and land subsidence 66 -- 5.2.7 Predicting future water resources 67 -- 5.2.8 Water conflicts 67 -- 5.3 Energy for Water Supply and Water Treatment 68 -- 5.3.1 Source water abstraction and conveyance . 68 -- 5.3.2 Desalination . . 69 -- 5.3.3 Irrigation and groundwater use 70 -- 5.3.4 Wastewater treatment - water resource recovery . 72 -- 5.4 Water Impact on Hydropower 73 -- 5.5 Economics, Tariffs, and the Value of Water . 74 -- 5.6 Food Consumption Impact on Water 78 -- 5.6.1 Water use 78 -- 5.7 Lifestyle and Water Consumption . 79 -- 5.8 Our Attitude to Nature . . 80 -- 5.9 Actions Needed 82 -- Chapter 6 The energy perspective . 85 -- 6.1 How We Got Here . . 87 -- 6.1.1 Global energy . 87 -- 6.1.2 Electrical energy 88 -- 6.1.3 Transport 90 -- 6.2 Energy Consumption Today . . 92 -- 6.3 Climate and Energy Interactions . . 93 -- 6.4 Water Needs for Energy . 95 -- 6.5 Fossil Fuel Production - Impact on Water and Environment 97 -- 6.5.1 Tar sand operations . . 97 -- 6.5.2 Hydraulic fracturing 100 -- 6.5.3 Flaring 101 -- 6.5.4 Coal 102 -- 6.5.5 Oil accidents and oil pollution 104 -- 6.6 Biofuel Production. 106 -- 6.6.1 Water use . 107 -- 6.6.2 Burning wood 108 -- 6.7 Electric Power Production 109 -- 6.8 Hydropower 110 -- 6.8.1 Impact of reservoirs. 110 -- 6.9 Thermal Electric Power Generation Systems. 112 -- 6.9.1 Nuclear power . 113 -- 6.9.2 Fossil-fuelled power systems 115 -- 6.9.3 Water requirements . 115 -- 6.10 Carbon Capture . 117 -- 6.11 Solar and Wind Power . 119 -- 6.11.1 Energy efficiency and consumption 119 -- 6.11.2 Solar .120 -- 6.11.3 Wind power . 121 -- 6.12 Energy Storage 122 -- 6.12.1 Batteries 122 -- 6.12.2 Hydrogen .125 -- 6.13 Critical Resources for Renewable Energy 127 -- viii Water Interactions - A Systemic View -- 6.13.1 Cobalt128 -- 6.13.2 Lithium . 131 -- 6.14 Energy and Public Health. 133 -- 6.14.1 Coal and public health 135 -- 6.14.2 Biomass burning . 135 -- 6.15 Actions Needed . 135 -- Chapter 7 The food perspective . . 137 -- 7.1 Food and Climate Change 139 -- 7.1.1 Global meat production and consumption 140 -- 7.1.2 Environmental impact. 142 -- 7.2 Land Area for Food 143 -- 7.3 Food Waste. 145 -- 7.4 Water for Food 147 -- 7.4.1 Irrigation, water efficiencies, and available technologies 147 -- 7.4.2 Water quality 148 -- 7.5 Energy for Food . 149 -- 7.5.1 Irrigation 149 -- 7.5.2 Fertilizers . 150 -- 7.6 Conservation Agriculture . 152 -- 7.7 Food-Related Health . 155 -- 7.7.1 Targets for food production and consumption . 155 -- 7.7.2 Health risks factors . 156 -- 7.8 Actions Needed . 157 -- Chapter 8 Economics 159 -- 8.1 Inequalities . 160 -- 8.1.1 Climate change. 162 -- 8.1.2 Water inequalities 162 -- 8.1.3 Energy inequalities . 163 -- 8.1.4 Land use and deforestation. 163 -- 8.1.5 Food inequalities . 164 -- 8.2 Economic Consequences of Climate Change . 164 -- 8.2.1 The polluter pays principle . 165 -- 8.2.2 Paying for climate change 165 -- 8.3 Doughnut Economics 167 -- 8.3.1 Circular economics . 169 -- 8.4 Energy Subsidies 169 -- 8.5 Actions Needed . 170 -- Chapter 9 Lifestyle 173 -- 9.1 The Real Difficulty . 173 -- 9.2 Relation Between Wealth and Emissions 174 -- 9.3 Measuring National Emissions . . 176 -- 9.4 Consumption Patterns. . 177 -- 9.4.1 Apparel industry . 178 -- 9.4.2 Aviation . 179 -- 9.5 Actions . . 180 -- Chapter 10 Crisis or hope 183 -- A1 Units. 187 -- Large numbers . 187 -- Power and energy . 187 -- Mass and volume . 188 -- A2 Glossary 189 -- A3 Abbreviations 191 -- Notes 193 -- References 205 -- Index 217.…”
Libro electrónico -
10743Publicado 2025Tabla de Contenidos: “…Evaluating and drafting contracts -- Performing due diligence -- Managing intellectual property -- Chapter 3 Launching into the AI Marketing Era -- Ready or Not: AI Is Your New Marketing Copilot -- Putting performance marketers at risk -- Competing with creative directors -- Watching AI Upend the Corporate World -- Taking Foundational Steps Toward AI Marketing -- Addressing the marketing dichotomy -- Assessing progress with the AI checklist -- Adopting a Strategic Framework for Entering the AI Era -- Going for liftoff -- Initiating atmospheric ascent -- Reaching escape velocity -- Dominating deep space -- Part 2 Exploring Fundamental AI Structures and Concepts -- Chapter 4 Collecting, Organizing, and Transforming Data -- Defining Data in the Context of AI -- Considering the quality of data -- Getting an appropriate quantity of data -- Choosing Data Collection Methods for Marketing with AI -- Identifying data sources and methods -- Minding data privacy and ethics -- Putting Your Marketing Data in Its Place -- Understanding Data via Manual and Automated Systems -- Preparing the Data for Use by AI Algorithms and Models -- Perfecting data by cleaning -- Transforming data -- Splitting data into subsets -- Trimming down data -- Handling imbalanced and irrelevant data -- Chapter 5 Making Connections: Machine Learning and Neural Networks -- Examining the Process of Machine Learning -- Understanding Neural Networks -- Layers of a neural network -- Challenges with neural networks -- Supervised and Unsupervised Learning -- Following the path of supervised learning -- Embracing the freedom of unsupervised learning -- Exploring Reinforcement Learning -- Reinforcement learning in e-mail marketing -- Weighing explorations against exploits -- Mastering Sequences and Time Series -- Seeing how neural networks excel at time series analysis…”
Libro electrónico -
10744Publicado 2024Tabla de Contenidos: “…. -- Organization into zone considerations -- Cloud limitations -- The Intelligence Age -- Use case definitions -- The mission, the vision, and the strategy -- Principles and the development life cycle -- The architecture definition, best practices, and key considerations -- The DataOps convergence -- Summary -- Chapter 2: A Data Engineer's Journey - Background Challenges -- Challenge #1 - platform architectures change rapidly -- Platform architectures in the 21st century -- Impacts on business strategy -- A flexible software development life cycle to manage platform risk -- Challenge #2 - Total cost of ownership (TCO) is high -- ETL architecture costs are high! …”
Libro electrónico -
10745Publicado 2011Tabla de Contenidos: “…-- 4.3 The Seven Types of Change Control -- 4.4 Creating a Change Control Function -- 4.5 Examples of Change Control in Action -- 4.6 Don't Forget the Risk -- 4.7 Driving the CM Process Through Change Control -- 4.8 Entry/Exit Criteria -- 4.9 After-Action Review -- 4.10 Make Sure That You Evaluate Yourself -- Conclusion -- Chapter 5 Release Management -- Goals of Release Management -- Principles of Release Management -- 5.1 Why Is Release Management Important? …”
Libro electrónico -
10746Publicado 2018Tabla de Contenidos: “…8.2.4 Multivariate Geometric Distribution-4 -- 8.2.5 Bivariate Geometric Distribution-6 -- 8.2.6 Bivariate Geometric Distribution-7 -- 8.3 Schur-Constant Family -- 8.3.1 Distributional Features -- 8.3.2 Reliability Aspects -- 8.3.3 Dependence and Ageing -- 8.4 Bivariate Waring Distribution-1 -- 8.5 Bivariate Waring Distribution-2 -- 8.6 Bivariate Negative Hypergeometric Distribution -- 8.7 Bivariate Weibull Distribution -- 8.8 Multivariate Zipf Distributions -- 9 Applications -- 9.1 Introduction -- 9.2 Survival Analysis -- 9.2.1 Proportional Hazards Models -- 9.2.2 Additive Hazards Model -- 9.2.3 Proportional Reversed Hazards Model -- 9.2.4 Proportional Mean Residual Life Model -- 9.2.5 Proportional Odds Model -- 9.3 Social Sciences -- 9.4 Risk Analysis -- 9.5 Information Theory -- 9.6 Mathematics and Statistics -- References -- Index -- Back Cover…”
Libro electrónico -
10747Publicado 2019Tabla de Contenidos: “…4.4.7.2 Review Prior Steps -- 4.5 Step 11: Use Case -- 4.5.1 Template -- 4.5.2 Example -- 4.5.3 Guidance -- 4.5.3.1 Document Assumptions -- 4.5.3.2 Review Prior Steps -- 4.6 Step 12: Experience Implications -- 4.6.1 Template -- 4.6.2 Example -- 4.6.3 Guidance -- 4.6.3.1 Document Assumptions -- 4.6.3.2 Review Prior Steps -- Chapter 5 Stage 3: Craft Business to Know Viability -- 5.1 Step 13: Business Context -- 5.1.1 Business Context Template -- 5.1.2 Example -- 5.1.3 Guidance -- 5.1.3.1 Document Assumptions -- 5.1.3.2 Review Prior Steps -- 5.2 Step 14: Value Proposition -- 5.2.1 Template -- 5.2.2 Example -- 5.2.3 Guidance -- 5.2.3.1 Document Assumptions -- 5.2.3.2 Review Prior Steps -- 5.3 Step 15: Business Model -- 5.3.1 Value Proposition -- 5.3.2 Value Delivery -- 5.3.3 Value Creation -- 5.3.4 Value Partnering -- 5.3.5 Value Capture -- 5.3.6 Value Funding -- 5.3.7 Template (Figure 5.7) -- 5.3.8 Guidance -- 5.3.8.1 Document Assumptions -- 5.3.8.2 Review Prior Steps -- 5.3.9 Bringing It All Together -- 5.4 Step 16: Elevator Pitch -- 5.4.1 Template -- 5.4.1.1 Short Version -- 5.4.1.2 Longer Version -- 5.4.2 Example -- 5.4.3 Guidance -- 5.4.3.1 Document Assumptions -- 5.4.3.2 Review Prior Steps -- Chapter 6 Stage 4: Manage Risk to Handle Uncertainty -- 6.1 Step 17: Assumptions -- 6.1.1 Impact -- 6.1.2 Template -- 6.2 Step 18: Risk Assessment -- 6.2.1 Calculation -- Chapter 7 Go Ahead and Transform Your Idea -- About the Author -- Index…”
Libro electrónico -
10748Publicado 2024Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
Libro electrónico -
10749Publicado 2024Tabla de Contenidos: “…-- How to access and store data with the Windows Registry -- Comparing the Windows Registry to JSON settings files -- Worker Services -- Docker support -- Dissecting the Worker Service -- Controlling the lifetime of the service -- Wrapping up Worker Services -- WMI -- How to use WMI -- Reading the CPU temperature -- Reading the BIOS -- Controlling the Windows Update service -- Watching USB devices -- Registry and WMI - risks and how to avoid them -- The Windows Registry -- Potential risks when dealing with WMI -- Next steps -- Chapter 8: The One with the Network Navigation -- Technical requirements -- The fundamentals -- A walk down the OSI layers -- Exploring the System.Net namespace -- Understanding HTTP/HTTPS -- FTP -- Email protocols -- Working with the System.Net.Sockets namespace -- Steps to take when using sockets -- IPv4 and IPv6 -- Looking up time with sockets -- Async, non-blocking networking -- Making asynchronous calls -- Networking performance -- Connection pooling -- Caching -- Compression and serialization -- Keep-alive connections -- Networking errors and time-outs -- Using the HTTPClient wisely -- Implementing retries with Polly -- The circuit breaker pattern -- Validating network availability -- Monitoring and logging -- Next steps -- Chapter 9: The One with the Hardware Handshakes -- Technical requirements…”
Libro electrónico -
10750Publicado 2011Tabla de Contenidos: “…percepção do termo <<Desertificação>> na comunicação social em Portugal -- Cheias rápidas em áreas urbanas: o caso de Sacavém -- Impactes das barragens nos regimes fluviais: comparação entre Vilarinho das Furnas (Hidroeléctrica) e Monte Novo (Hidroagrícola) -- A sustentabilidade da produção de biodiesel a partir de óleos alimentares usados: o caso da freguesia de Ericeira -- Cheias e movimentos de massa com carácter danoso em Portugal Continental -- Avaliação e validação da susceptibilidade e perigosidade de incêndio florestal em Portugal Continental -- Miavita: mitigate and assess risk from volcanic impact terrain and human activities -- O planeamento e gestão das albufeiras de águas públicas de serviço público -- Extensão temporal e magnitude máxima da ilha de calor urbano: estudo de caso em Paronhos, Porto -- Avaliação ambiental estratégica em planos directores municipais -- A mudança do uso do solo após Alqueva e novos desafios ambientais: o caso do Olival -- As águas subterrâneas no concelho do Porto: um estudo hidro-histórico -- Modelo de avaliação da perigosidade de incêndio florestal -- A bacia hidrográfica do rio Arunca: factores condicionantes e cartografia dos processos de cheia/inundação…”
Libro electrónico -
10751Publicado 2018“…Exposures to dietary, environmental, hormonal, and other stressors during this window have been associated with an increased risk of poor health outcomes, some of which are irreversible. …”
Libro electrónico -
10752por Freshney, R. IanTabla de Contenidos: “…Objectives of Aseptic Technique; 5.1.1. Risk of Contamination; 5.1.2. Maintaining Sterility; 5.2. …”
Publicado 2010
Libro electrónico -
10753Publicado 2021Tabla de Contenidos: “…-- Message in a Model -- You Can't Get There from Here -- Simpler but Wrong -- Why TDD Has Never Taken Off -- I Already Have an Automated Testing Framework -- My Program Is Too Complicated for TDD -- My Program Is Too Simple for TDD -- TDD Is Far Too Expensive -- TDD Reduces Development Costs -- TDD Reduces the Cost of Fixing Bugs -- TDD Reduces the Financial Risk of Failure -- Conclusion -- Recommended Reading -- Chapter 3: Clarity: The First Pillar of Code Quality -- Refactoring: Automated and Manual Checks -- Automated Checks -- Syntax Check -- Extended Program Check -- Code Inspector -- ABAP Open Checks -- Code Pal -- Remote ATC Checks -- Continuous Integration -- Manual Checks -- Clean ABAP -- ABAP Gore -- Creating a Personalized Checklist -- Code Complexity -- Huge Routines -- Confusing Code -- Double Negatives -- Text Symbols -- Pointless Variables -- Contradictory Instructions -- END-OF-SELECTION -- DATA Declarations -- Unrelated Tasks -- Not Being Able to Locate a Routine -- Duplicate Code -- Global Variables -- Why Are Global Variables Bad? …”
Libro electrónico -
10754Publicado 2018Tabla de Contenidos: “…. -- Chapter 10: Jupyter Security -- Introduction -- How much risk? -- Known vulnerabilities -- Web attack strategies -- Inherent Jupyter security issues -- Security mechanisms built into Jupyter -- How to do it... -- Token-based authentication -- Password authentication -- No authentication -- Using SSL -- How to do it... -- Creating an SSL certificate -- Apply the SSL certificate -- The Jupyter trust model -- How to do it... -- Trust overrides -- Collaboration -- Controlling network access -- How to do it... -- Controlling domain access -- Controlling IP access -- Additional practices -- How to do it... -- Server IP address -- URL prefix -- No browser -- Chapter 11: Jupyter Labs -- Introduction -- JupyterLab features -- Installing and starting JupyterLab -- How to do it... -- Installing JupyterLab -- Starting JupyterLab -- JupyterLab display -- How to do it... -- JupyterLab menus -- How to do it... -- Starting a Notebook -- How to do it... -- Starting a console -- Index…”
Libro electrónico -
10755Publicado 2017Tabla de Contenidos: “…-- 9.4 Scenario Planning -- 9.5 Risk, Responsibility, and Reassurance -- 9.6 Optimization and Upsell -- 9.7 Value Creation/Agility -- 9.8 Expectation Management -- Chapter 10 Multicast -- the Sleeping Giant -- 10.1 Multicast Recap -- 10.1.1 Basics -- 10.1.2 Routing Protocols -- 10.1.3 Flood, Prune, Storms, and a Bad Taste -- 10.1.4 Commercial Outcome -- 10.2 What Happens Now? …”
Libro electrónico -
10756Hire with your head using performance-based hiring to build outstanding diverse teamsHire With Your HeadHire With Your HeadPublicado 2022Tabla de Contenidos: “…Chapter 16: Use Performance-based Hiring to Create a Win-Win Hiring Culture -- DELIVER ON THE WIN-WIN HIRING PROMISE -- BUILDING A WIN-WIN HIRING CULTURE STARTS WITH THE RIGHT TALENT STRATEGY -- MEASURE AND MANAGE QUALITY OF HIRE -- USE HIGH TOUCH TO CREATE AN OUTSTANDING CANDIDATE EXPERIENCE -- TAKE THE RISK AND BIAS OUT OF THE "YES" DECISION -- HIRING STRONG PEOPLE IS THE FIRST STEP IN MANAGING A GREAT TEAM -- NOTES -- Appendix 1: Performance-based Hiring and Legal Compliance -- NOTE -- Appendix 2: Forms -- Index -- End User License Agreement…”
Libro electrónico -
10757por Naletoski, IvanchoTabla de Contenidos: “…5.5.1 Dairy Production in Low-Productivity Areas -- 5.5.2 Meat Production in Low-Productivity Areas -- 5.6 Radionuclide Transfer to Game Animals -- 5.6.1 Forest Environments -- 5.7 Impacts on the Health of Livestock Exposed to Nuclear Contamination -- 5.8 Routes of Radionuclide Intake via Aquatic Pathways -- 5.8.1 Radionuclides in Freshwater Fish -- 5.9 The Risk for Public Health (Placement on the Market for Human Consumption) -- 5.9.1 Radioiodine -- 5.9.2 Radiocaesium -- 5.9.3 Other Radionuclides -- References -- Chapter 6: Management Options for Animal Production Systems: Which Ones to Choose in the Event of a Nuclear or Radiological Emergency? …”
Publicado 2021
Libro electrónico -
10758por Guthrie Caitlyn, CaitlynTabla de Contenidos: “…Ensuring that external school evaluations support school improvement, especially in at-risk schools -- Policy issue 4.3. Making regular school self-evaluation mandatory and building schools' capacity for development -- Policy Issue 5.1. …”
Publicado 2022
Libro electrónico -
10759Publicado 2016Tabla de Contenidos: “…Correlating individual stocks with the broader market -- Exploring risk and return -- Examining the market with the non-parametric runs test -- Testing for random walks -- Determining market efficiency with autoregressive models -- Creating tables for a stock prices database -- Populating the stock prices database -- Optimizing an equal weights two-asset portfolio -- Chapter 8: Text Mining and Social Network Analysis -- Introduction -- Creating a categorized corpus -- Tokenizing news articles in sentences and words -- Stemming, lemmatizing, filtering, and TF-IDF scores -- Recognizing named entities -- Extracting topics with non-negative matrix factorization -- Implementing a basic terms database -- Computing social network density -- Calculating social network closeness centrality -- Determining the betweenness centrality -- Estimating the average clustering coefficient -- Calculating the assortativity coefficient of a graph -- Getting the clique number of a graph -- Creating a document graph with cosine similarity -- Chapter 9: Ensemble Learning and Dimensionality Reduction -- Introduction -- Recursively eliminating features -- Applying principal component analysis for dimension reduction -- Applying linear discriminant analysis for dimension reduction -- Stacking and majority voting for multiple models -- Learning with random forests -- Fitting noisy data with the RANSAC algorithm -- Bagging to improve results -- Boosting for better learning -- Nesting cross-validation -- Reusing models with joblib -- Hierarchically clustering data -- Taking a Theano tour -- Chapter 10: Evaluating Classifiers, Regressors, and Clusters -- Introduction -- Getting classification straight with the confusion matrix -- Computing precision, recall, and F1-score -- Examining a receiver operating characteristic and the area under a curve…”
Libro electrónico -
10760Publicado 2015“…For those working in the field of wind energy integration examining the potential risk of stability is key, this edition looks at how wind energy is modelled, what kind of control systems are adopted, how it interacts with the grid, as well as suitable study approaches. …”
Libro electrónico