Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11021Publicado 2019Tabla de Contenidos: “…10.2 Fried Foods and Health -- 10.2.1 Health Maintenance -- 10.2.2 Frying and Health Hazards -- 10.3 Fried Foods and Cancer -- 10.4 Fried Foods and Diabetes -- 10.5 Fried Foods and Cardiovascular Diseases -- 10.5.1 Trans Fats and Cardiovascular Health -- 10.6 Fried Foods and Aging -- 10.7 Key Concepts -- References -- Part IV Safety in Food Frying -- Chapter 11 Safety Assessment of Food Frying -- 11.1 Introduction -- 11.2 Guideline for Assessment -- 11.3 Quality Indicators for Used Frying Oils -- 11.4 Physical Assessment -- 11.4.1 Sensory Evaluation, Colour, and Foaming -- 11.4.2 Quick Tests for Viscosity and Dielectricity -- 11.5 Chemical Assessment -- 11.5.1 Chemical Quick Tests -- 11.5.2 Near‐Infrared Spectroscopy -- 11.5.3 Mass Spectrometry -- 11.6 Evaluation of Fried Foods -- 11.7 The Future of Fried Food Safety -- 11.8 Key Concepts -- References -- Chapter 12 Toxicity of Food Frying -- 12.1 Introduction -- 12.2 Toxicity of Oxidized Triacylglycerols -- 12.3 Toxicity of Acrylamide -- 12.4 Toxicity of Acrolein -- 12.4.1 Toxico‐Kinetics and Metabolism -- 12.4.2 General Toxic Effects -- 12.4.3 Acute, Subchronic, and Chronic Toxicity -- 12.4.4 Reproduction Toxicity -- 12.4.5 Genotoxicity -- 12.4.5.1 In Vitro Genotoxicity -- 12.4.5.2 In Vivo Genotoxicity -- 12.4.6 DNA Adducts -- 12.4.7 Carcinogenicity -- 12.4.7.1 Epidemiology -- 12.5 Toxicity of Amines and Alcohols -- 12.5.1 Mutagenicity of Heterocyclic Aromatic Amines -- 12.5.2 Carcinogenicity of HAAs -- 12.5.3 Risk Assessment -- 12.5.3.1 Daily Intake of HAAs -- 12.5.4 Epidemiological Data -- 12.5.4.1 Risk Evaluation -- 12.6 Toxicity of Aldehydes -- 12.6.1 Genotoxicity and Mutagenicity of Furfurals -- 12.6.2 Acute and Subchronic Toxicity -- 12.6.3 Carcinogenicity in Animal Models -- 12.6.3.1 Intestinal Micro-Adenomas -- 12.6.3.2 Colon Preneoplastic Lesions -- 12.6.3.3 Studies with Transgenic Mice…”
Libro electrónico -
11022Publicado 2020Tabla de Contenidos: “…Preface xiii -- Acknowledgments xv -- About the Companion Website xvii -- Part I Probability 1 -- 1 Basic Concepts of Probability Theory 3 -- 1.1 Statistical Regularity and Relative Frequency 3 -- 1.2 Set Theory and Its Applications to Probability 5 -- 1.3 The Axioms and Corollaries of Probability 12 -- 1.4 Joint Probability and Conditional Probability 18 -- 1.5 Statistically Independent Events and Mutually Exclusive Events 21 -- 1.6 Law of Total Probability and Bayes’ Theorem 28 -- 1.7 Summary 32 -- Problems 32 -- 2 Applications in Probability 37 -- 2.1 Odds and Risk 37 -- 2.2 Gambler’s Ruin Problem 41 -- 2.3 Systems Reliability 43 -- 2.4 Medical Diagnostic Testing 47 -- 2.5 Bayesian Spam Filtering 50 -- 2.6 Monty Hall Problem 51 -- 2.7 Digital Transmission Error 54 -- 2.8 How to Make the Best Choice Problem 56 -- 2.9 The Viterbi Algorithm 59 -- 2.10 All Eggs in One Basket 61 -- 2.11 Summary 63 -- Problems 63 -- 3 Counting Methods and Applications 67 -- 3.1 Basic Rules of Counting 67 -- 3.2 Permutations and Combinations 72 -- 3.2.1 Permutations without Replacement 73 -- 3.2.2 Combinations without Replacement 73 -- 3.2.3 Permutations with Replacement 74 -- 3.2.4 Combinations with Replacement 74 -- 3.3 Multinomial Counting 77 -- 3.4 Special Arrangements and Selections 79 -- 3.5 Applications 81 -- 3.5.1 Game of Poker 81 -- 3.5.2 Birthday Paradox 83 -- 3.5.3 Quality Control 86 -- 3.5.4 Best-of-Seven Championship Series 86 -- 3.5.5 Lottery 89 -- 3.6 Summary 90 -- Problems 90 -- Part II Random Variables 95 -- 4 One Random Variable: Fundamentals 97 -- 4.1 Types of Random Variables 97 -- 4.2 The Cumulative Distribution Function 99 -- 4.3 The Probability Mass Function 102 -- 4.4 The Probability Density Function 104 -- 4.5 Expected Values 107 -- 4.5.1 Mean of a Random Variable 107 -- 4.5.2 Variance of a Random Variable 110 -- 4.5.3 Moments of a Random Variable 113 -- 4.5.4 Mode and Median of a Random Variable 114 -- 4.6 Conditional Distributions 116 -- 4.7 Functions of a Random Variable 120.…”
Libro electrónico -
11023Publicado 2018Tabla de Contenidos: “…Cover -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- Chapter 1 Electrical and electronic principles -- 1.1 Safe working practices -- 1.1.1 Introduction -- 1.1.2 Risk assessment and reduction -- 1.2 Basic electrical principles -- 1.2.1 Introduction -- 1.2.2 Electron flow and conventional flow -- 1.2.3 Effects of current flow -- 1.2.4 Fundamental quantities -- 1.2.5 Describing electrical circuits -- 1.2.6 Conductors, insulators and semiconductors -- 1.2.7 Factors affecting the resistance of a conductor -- 1.2.8 Resistors and circuit networks -- 1.2.9 Magnetism and electromagnetism -- 1.2.10 Electromagnetic induction -- 1.2.11 Mutual induction -- 1.2.12 Definitions and laws -- 1.3 Electronic components and circuits -- 1.3.1 Introduction -- 1.3.2 Components -- 1.3.3 Integrated circuits -- 1.3.4 Amplifiers -- 1.3.5 Bridge circuits -- 1.3.6 Schmitt trigger -- 1.3.7 Timers -- 1.3.8 Filters -- 1.3.9 Darlington pair -- 1.3.10 Stepper motor driver -- 1.3.11 Digital-to-analogue conversion -- 1.3.12 Analogue-to-digital conversion -- 1.4 Digital electronics -- 1.4.1 Introduction to digital circuits -- 1.4.2 Logic gates -- 1.4.3 Combinational logic -- 1.4.4 Sequential logic -- 1.4.5 Timers and counters -- 1.4.6 Memory circuits -- 1.4.7 Clock or astable circuits -- 1.5 Microprocessor systems -- 1.5.1 Introduction -- 1.5.2 Ports -- 1.5.3 Central processing unit (CPU) -- 1.5.4 Memory -- 1.5.5 Buses -- 1.5.6 Fetch-execute sequence -- 1.5.7 A typical microprocessor -- 1.5.8 Microcontrollers -- 1.5.9 Testing microcontroller systems -- 1.5.10 Programming -- 1.6 Measurement -- 1.6.1 What is measurement? …”
Libro electrónico -
11024Publicado 2014“…Each chapter is written by experts on the respective topics, including: Sets of desirable gambles; Coherent lower (conditional) previsions; Special cases and links to literature; Decision making; Graphical models; Classification; Reliability and risk assessment; Statistical inference; Structural judgments; Aspects of implementation (including elicitation and computation); Models in finance; Game-theoretic probability; Stochastic processes (including Markov chains); Engineering applications.Essential reading for researchers in academia, research institutes and other organizations, as well as practitioners engaged in areas such as risk analysis and engineering"-- "Provides a comprehensive introduction to imprecise probabilities, including theory and applications reflecting the current state of the art"--…”
Libro electrónico -
11025Publicado 2021Tabla de Contenidos: “…4.2 Cloud Computing and Cloud-based Computing -- 4.3 Business Operations and Management -- 4.3.1 Business Process -- 4.3.2 Business Continuity -- 4.3.3 Risk Management and Disaster Recovery -- 4.4 Human and Technological Factors -- 4.4.1 Human Factors -- 4.4.2 Technological Factors -- 4.4.3 Copyright and SLAs -- 4.5 Trust -- 4.5.1 Intra-organizational Trust -- 4.5.2 Inter-organizational Trust -- 4.6 Geographic Location -- 4.6.1 Regulations and Jurisdictions -- 4.6.2 Compliance and Governance -- 4.7 Conclusions -- References -- Chapter 5: An Overview of Cognitive Internet of Things: Cloud and Fog Computing -- 5.1 Introduction -- 5.2 Background of Fog, Cloud and Edge Computing -- 5.2.1 Fog Computing -- 5.2.1.1 Benefits of Fog Computing -- 5.2.1.2 Disadvantages of Fog Computing -- 5.2.2 Cloud Computing -- 5.2.2.1 Benefits of Cloud Computing -- 5.2.2.2 Disadvantages of Cloud Computing -- 5.2.3 Edge Computing -- 5.2.3.1 Benefits of Edge Computing -- 5.2.3.2 Disadvantages of Edge Computing -- 5.3 Literature Review of Existing Works -- 5.3.1 Review of Fog Computing -- 5.3.2 Review of Cloud Computing -- 5.3.3 Review of Edge Computing -- 5.4 Network Architecture -- 5.4.1 Computation Between Fog and Cloud -- 5.4.2 Computation Between Fog and Fog -- 5.5 Numerical Results -- 5.6 Conclusion -- References -- Chapter 6: Privacy of Edge Computing and IoT -- 6.1 Introduction -- 6.2 IoT Ecosystem -- 6.3 Privacy Spaces -- 6.4 The Technology of Privacy Spaces -- 6.4.1 Apple HomeKit -- 6.4.2 Google Home -- 6.5 Privacy Space Data Flows -- 6.6 Remote Access -- 6.7 Personal Data Store -- 6.8 Privacy-Preserving Techniques -- 6.8.1 Anonymization -- 6.8.2 k-Anonymization -- 6.8.3 Unicity -- 6.8.4 Differential Privacy -- 6.8.5 Privacy-Preserving Data Queries -- 6.9 Case Study: Contact Tracking Mobile Applications -- 6.10 Conclusions -- Notes -- References -- Section II…”
Libro electrónico -
11026por Lovelace, MaryTabla de Contenidos: “…Planning for conversion -- 2.1 Planning considerations -- 2.1.1 Software maintenance levels -- 2.1.2 Timing of events in your installation -- 2.1.3 Change management -- 2.1.4 Limiting business risk -- 2.2 Conversion process -- 2.3 Conversion stages -- 2.3.1 Preparing a conversion plan -- 2.3.2 Learning about DFSMSrmm -- 2.3.3 Starting DFSMSrmm -- 2.3.4 Analyzing the current environment -- 2.3.5 Extracting data for conversion -- 2.3.6 Completing conversion -- 2.3.7 Parallel running and validation -- 2.3.8 Cutover to production -- 2.3.9 Measuring success -- 2.3.10 Full exploitation -- 2.3.11 Uninstall all vendor tape management code from your system -- Chapter 3. …”
Publicado 2003
Libro electrónico -
11027Publicado 2021Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: MACHINE LEARNING FOR HANDLINGCOVID-19 -- 1 COVID-19 and Machine Learning Approaches to Deal With the Pandemic -- 1.1 Introduction -- 1.1.1 COVID-19 and its Various Transmission Stages Depending Upon the Severity of the Problem -- 1.2 COVID-19 Diagnosis in Patients Using Machine Learning -- 1.2.1 Machine Learning to Identify the People who are at More Risk of COVID-19 -- 1.2.2 Machine Learning to Speed Up Drug Development -- 1.2.3 Machine Learning for Re-Use of Existing Drugs in Treating COVID-19 -- 1.3 AI and Machine Learning as a Support System for Robotic System and Drones -- 1.3.1 AI-Based Location Tracking of COVID-19 Patients -- 1.3.2 Increased Number of Screenings Using AI Approach -- 1.3.3 Artificial Intelligence in Management of Resources During COVID-19 -- 1.3.4 Influence of AI on Manufacturing Industry During COVID-19 -- 1.3.5 Artificial Intelligence and Mental Health in COVID-19 -- 1.3.6 Can AI Replace the Human Brain Intelligence in COVID-19 Crisis? …”
Libro electrónico -
11028Publicado 2017Tabla de Contenidos: “…8.3.3 Vapor Dispersion in the Open -- 8.3.4 Vapor Dispersion in Buildings -- 8.3.5 Fire and Explosion Hazards -- 8.3.6 Comparison of Flammable and Toxic Hazards -- 8.4 Implications for Layout -- 8.4.1 Ideal Approach -- 8.4.1.1 Frequency of Loss of Containment -- 8.4.1.2 Probability of Transmission -- 8.4.1.3 Probability of Injury or Damage -- 8.4.2 Current Approach -- 8.4.3 Accident Modeling -- 8.5 Appropriate Criteria -- 8.5.1 Criteria for Blast Pressure Damage -- 8.5.2 Criteria for Flammable Limits -- 8.5.3 Criteria for Toxic Limits -- 8.5.4 Criteria for Exposure to Thermal Radiation -- 8.5.5 Risk Criteria -- 8.6 Hazard Assessment Procedure -- 8.6.1 Conceptual/FEED Layout -- 8.6.1.1 Step 1: Data -- 8.6.1.2 Step 2: Minor Leaks and Area Classification -- 8.6.1.3 Step 3: Major Sources of Leak -- 8.6.1.4 Step 4: Catastrophic Failure of a Pressure or Gas Source -- 8.6.1.5 Step 5: Major Steady Leakage From a Pressure or Gas Source -- 8.6.1.6 Step 6: Failure of Unpressurized Liquid Source -- 8.6.1.7 Step 7: Internal Plot Layout -- 8.6.1.8 Step 8: External Plot Separations -- 8.6.1.9 Step 9: Data -- 8.6.1.10 Step 10: Vulnerable Plots -- 8.6.1.11 Step 11: Internal Site Layout -- 8.6.1.12 Step 12: External Site Separations -- 8.6.1.13 Step 13: Site Selection -- 8.6.2 Detailed Layout -- 8.6.2.1 Step 14: Data -- 8.6.2.2 Step 15: External Vulnerable Installations -- 8.6.2.3 Step 16: External Hazardous Installations -- 8.6.2.4 Step 17: Internal Site Layout -- 8.6.2.5 Step 18: External Site Spacing -- 8.6.2.6 Step 19: Environmental Hazards -- 8.6.2.7 Step 19: Data -- 8.6.2.8 Step 20: Calculations -- 8.6.2.9 Step 21: Internal Plot Layout -- 8.6.2.10 Step 22: External Plot Separations -- 8.6.3 Design for Construction Layout -- 8.6.3.1 Step 23: Overall Site and Plot Layout -- 8.7 Hazard Mitigation -- 8.7.1 Inherent Safety…”
Libro electrónico -
11029Publicado 2024“…How bandwidth is reduced and privacy and security are enhanced; How AI applications increase operating efficiency, spawn new products and services, and enhance risk management; How AI and IoT create 'intelligent' devices and how new AI technology enables IoT to reach its full potential; Analyzes AIOT platforms and the handling of personal information for shared frameworks that remain sensitive to customers' privacy while effectively utilizing data. …”
Libro electrónico -
11030por Kapil, SheebaTabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Preface -- Unit I: Introduction to Corporate Finance -- Chapter 1: Introduction to Financial Management -- 1.1 Introduction -- 1.2 Finance Functions -- 1.2.1 Financing Decisions -- 1.2.2 Investment Decisions -- 1.2.3 Liquidity Decisions -- 1.2.4 Dividend Decisions -- 1.2.5 Decisions Regarding the Reporting, Monitoring and Controlling of Funds -- 1.3 The Role of the Finance Manager -- 1.3.1 The Functions of a Finance Manager -- 1.3.1.1 Forecasting and planning -- 1.3.1.2 Analysing and evaluating the investment activities -- 1.3.1.3 Coordination and control -- 1.3.1.4 Understanding the finance market -- 1.3.1.5 Risk management -- 1.3.1.6 Performance measurement -- 1.3.2 The Role of a Finance Manager in the Indian Context -- 1.4 The Goals of a Firm -- Business Insight 1.1: Difference Between Financial Services and Corporate Finance -- 1.4.1 Non-financial Goals -- 1.4.1.1 Enhancing employee satisfaction and welfare -- 1.4.1.2 Management satisfaction -- 1.4.1.3 Social objective -- 1.4.1.4 Quality service to customers -- 1.4.2 Financial Goals -- 1.4.2.1 Target market share -- 1.4.2.2 Sustaining and maintaining the business position -- 1.4.2.3 Maintaining financial liquidity and solvency -- 1.4.2.4 Profit maximization -- 1.4.2.5 Maximizing shareholders' wealth -- Business Snapshot 1.1: Vision, Mission and Objectives of Hindustan Aeronautics Limited (HAL) -- Business Snapshot 1.2: Tata Tea Aims to Increase its Market Share -- Business Insight 1.2: Understanding Solvency -- 1.5 Profit and Wealth Maximization -- 1.5.1 Profit Maximization -- Business Snapshot 1.3: Godrej and EVA -- 1.5.2 Wealth Maximization -- 1.6 Management Versus Shareholders -- 1.7 Fields Related to Finance -- 1.7.1 Economics -- 1.7.2 Accounting -- 1.8 Finance and Other Functional Areas -- 1.8.1 Marketing -- 1.8.2 Distribution and Selling…”
Publicado 2011
Libro electrónico -
11031Publicado 2016Tabla de Contenidos: “…5 Initial Outcomes -- 6 Conclusion -- References -- Part V The Forschungsrating of the German Council of Science and Humanities. Risks and Opportunities for the Humanities: The Case of the Anglistik/Amerikanistik Pilot Study -- Rating Research Performance in the Humanities: An Interim Report on an Initiative of the German Wissenschaftsrat -- References -- `21 Grams': Interdisciplinarity and the Assessment of Quality in the Humanities -- 1 Rating Research: Who Needs It, and What Is It Good For? …”
Libro electrónico -
11032Publicado 2021Tabla de Contenidos: “…-- Assessment Test -- Answers to Assessment Test -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Ethical Hacking -- Overview of Ethics -- Overview of Ethical Hacking -- Methodologies -- Cyber Kill Chain -- Attack Lifecycle -- Methodology of Ethical Hacking -- Reconnaissance and Footprinting -- Scanning and Enumeration -- Gaining Access -- Maintaining Access -- Covering Tracks -- Summary -- Chapter 2 Networking Foundations -- Communications Models -- Open Systems Interconnection -- TCP/IP Architecture -- Topologies -- Bus Network -- Star Network -- Ring Network -- Mesh Network -- Hybrid -- Physical Networking -- Addressing -- Switching -- IP -- Headers -- Addressing -- Subnets -- TCP -- UDP -- Internet Control Message Protocol -- Network Architectures -- Network Types -- Isolation -- Remote Access -- Cloud Computing -- Storage as a Service -- Infrastructure as a Service -- Platform as a Service -- Software as a Service -- Internet of Things -- Summary -- Review Questions -- Chapter 3 Security Foundations -- The Triad -- Confidentiality -- Integrity -- Availability -- Parkerian Hexad -- Risk -- Policies, Standards, and Procedures -- Security Policies -- Security Standards -- Procedures -- Guidelines -- Organizing Your Protections -- Security Technology -- Firewalls -- Intrusion Detection Systems -- Intrusion Prevention Systems -- Endpoint Detection and Response -- Security Information and Event Management -- Being Prepared -- Defense in Depth -- Defense in Breadth -- Defensible Network Architecture -- Logging -- Auditing -- Summary -- Review Questions…”
Libro electrónico -
11033Publicado 2015Tabla de Contenidos: “…Securing the DaaS Environment 262 -- Topics Covered in this Chapter 262 -- Impact of Data Breach on DaaS Operations 263 -- Major Security Considerations for DaaS 264 -- Multilayered Security for the DaaS Environment 266 -- Identity and Access Management 270 -- Data Entitlements to Safeguard Privacy 271 -- Impact of Increased Privacy Regulations on Data Providers 272 -- Information Risk Management 273 -- Important Data Security and Privacy Regulations that Impact DaaS 275 -- Checklist to Protect Data Providers from Data Breaches 277 -- Summary 278 -- 14. …”
Libro electrónico -
11034Publicado 2025Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 8 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 9 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 10 Keeping in Touch with Email -- Sign Up for an Email Account -- Set Up Accounts in the Outlook App -- Get to Know the Outlook Interface -- Receive Messages -- Reply to or Forward a Message -- Create and Send Email -- Manage Addresses -- Send an Attachment -- Change Outlook Account Settings -- Chapter 11 Working in the Cloud…”
Libro electrónico -
11035Publicado 2014Tabla de Contenidos: “…When Your Business Hits The Wall Above All Else: Serve Your Buyer Chapter 7: Fall in Love With Not Knowing You Only Have To Know Enough To Start The Fear Of Not Knowing Is It Our Education That Made Us So Afraid? The Risk Of Specialization Fear Of Failure A Battle Plan For Failure What It Takes To Fall In Love With Not Knowing What The Interviewing Process Taught Me: Trying On Roles Explore Daily One Important Thing To Know Taking On Too Many Exciting Projects While Not Knowing Chapter 8: Worship Obstacles and Challenges The Corporate Ladder Is Gone Fear Of Failure Rears Its Head Again So, There's No Ladder. …”
Libro electrónico -
11036Publicado 2014Tabla de Contenidos: “…Promoting Social Competence and Behavioral Health in At-risk Youth: Implementation and Efficacy of Primary and Secondary Prevention Programs in Schools; Brian Daly, Elizabeth Nicholls, Richa Aggarwal, Mark Sander -- Chapter 11. …”
Libro electrónico -
11037Publicado 2016Tabla de Contenidos: “…VII -- About the Guest Editors.XI -- Preface to "Ecological Monitoring, Assessment, and Management in Freshwater Systems" .XIII -- Young-Seuk Park and Soon-Jin Hwang Ecological Monitoring, Assessment, and Management in Freshwater Systems Reprinted from: Water 2016, 8(8), 324 http://www.mdpi.com/2073-4441/8/8/3241 -- Jens Arle, Volker Mohaupt and Ingo Kirst Monitoring of Surface Waters in Germany under the Water Framework Directive-A Review of Approaches, Methods and Results Reprinted from: Water 2016, 8(6), 217 http://www.mdpi.com/2073-4441/8/6/2178 -- Meilan Jiang, Karpjoo Jeong, Jung-Hwan Park, Nan-Young Kim, Soon-Jin Hwang and Sang-Hun Kim Open, Sharable, and Extensible Data Management for the Korea National Aquatic Ecological Monitoring and Assessment Program: A RESTful API-Based Approach Reprinted from: Water 2016, 8(5), 201 http://www.mdpi.com/2073-4441/8/5/20139 -- Byungwoong Choi, Sung-Uk Choi and Hojeong Kang Transferability of Monitoring Data from Neighboring Streams in a Physical Habitat Simulation Reprinted from: Water 2015, 7(8), 4537-4551 http://www.mdpi.com/2073-4441/7/8/453774 -- Bin Li, Kozo Watanabe, Dong-Hwan Kim, Sang-Bin Lee, Muyoung Heo, Heui-Soo Kim and Tae-Soo Chon Identification of Outlier Loci Responding to Anthropogenic and Natural Selection Pressure in Stream Insects Based on a Self-Organizing Map Reprinted from: Water 2016, 8(5), 188 http://www.mdpi.com/2073-4441/8/5/18890 -- Yung-Chul Jun, Nan-Young Kim, Sang-Hun Kim, Young-Seuk Park, Dong-Soo Kong and Soon-Jin Hwang Spatial Distribution of Benthic Macroinvertebrate Assemblages in Relation to Environmental Variables in Korean Nationwide Streams Reprinted from: Water 2016, 8(1), 27 http://www.mdpi.com/2073-4441/8/1/27120 -- Mateusz Grygoruk, Magdalena Frąk and Aron Chmielewski Agricultural Rivers at Risk: Dredging Results in a Loss of Macroinvertebrates. …”
Libro electrónico -
11038Publicado 2023Tabla de Contenidos: “…Increasing Black Wealth to Improve Black Health -- Decolonization of the Medical Industry -- Turning Research into Action -- Addressing Inequities in Health Technology -- Systemic Risks Associated with Healthcare Technology -- Activism to Address the Harms of Health Technology -- Part V Implementing Reparations: Work and Ownership -- Resurrecting the Promise of 40 Acres: The Imperative of Reparations for Black Americans -- Eligibility: Black American Descendants of Persons Enslaved in the United States -- Calculating What Is Owed -- Prioritizing the Mean of the Racial Wealth Gap -- The Cost of Slavery -- The Promise of 40 Acres -- Culpability: A Matter of National Responsibility -- Learning from Other Cases: Precedents for Reparations -- Precedents for HR 40: Lessons Learned -- Conclusion -- Solutions Centering Black Women in Housing -- A History of Racist Policies -- From Racist Exclusion to "Predatory Inclusion" -- Toward Repair: Addressing Black Women's Exclusion from Housing -- A New Vision: Centering Black Women in Housing -- Linking Racial and Economic Justice: The Struggle of Our Time -- The Long March of Institutions -- Challenging Harmful Narratives Through Data Linked to Activism -- The Importance of Historical Analysis -- The Struggle for Economic Democracy -- What If We Owned It? …”
Libro electrónico -
11039Publicado 2024Tabla de Contenidos: “…The 'how' of pragmatic law -- 2. The risks of a pragmatic approach to law -- 4. Role of pragmatic law within the legal landscape -- E. …”
Libro electrónico -
11040Publicado 2024Tabla de Contenidos: “…-- Applications of ChatGPT -- Limitations of ChatGPT -- Limitations -- Risks and security -- Summary -- Further reading -- Chapter 2: Using ChatGPT with Conversation Design -- Technical requirements -- Understanding conversation design -- Exploring the role of conversation designers -- Working with practical applications of ChatGPT in conversation design -- Intent clustering with ChatGPT -- Understanding utterance and entity generation -- Using ChatGPT to help write your dialogue -- Persona creation with ChatGPT -- Using ChatGPT for user research -- Creating our user and chatbot personas -- Simulating conversations -- What is a sample dialogue? …”
Libro electrónico