Mostrando 11,481 - 11,500 Resultados de 13,849 Para Buscar '"The Class"', tiempo de consulta: 0.11s Limitar resultados
  1. 11481
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgements -- Chapter 1: Corporate Accounting (Company Accounts)-Issue of Share Capital -- 1.1 Definition -- 1.2 Characteristics of a Company -- 1.3 Kinds of Companies (or) Types of Companies -- 1.3.1 Statutory Companies -- 1.3.2 Government Company -- 1.3.3 Foreign Company -- 1.3.4 Holding Company -- 1.3.5 Subsidiary Company -- 1.3.6 Registered Company -- 1.3.7 Listed Company -- 1.3.8 Private Company -- 1.3.9 Limited Company -- 1.3.10 Unlimited Company -- 1.3.11 Distinction between Private Company and Public Limited Company -- 1.4 Privileges of a Private Limited Company -- 1.5 Documents -- 1.5.1 Memorandum of Association -- 1.5.2 Articles of Association -- 1.5.3 Certificate of Incorporation -- 1.5.4 Prospectus -- 1.5.5 Certificate of Commencement of Business -- 1.6 Share Capital -- 1.6.1 Authorized Capital (Nominal/Registered Capital) -- 1.6.2 Issued Capital -- 1.6.3 Subscribed Capital -- 1.6.4 Called-up Capital -- 1.6.5 Paid-up Capital -- 1.6.6 Uncalled Capital -- 1.6.7 Reserve Capital -- 1.7 Differences Between "Capital Reserve" and "Reserve Capital" -- 1.8 Shares of a Company -- 1.8.1 Meaning -- 1.8.2 Classes of Shares -- 1.8.2.1 Preference Share -- 1.8.3 Types or Kinds of Preference Shares -- 1.8.3.1 On the Basis of Dividend Right -- 1.8.3.2 On the Basis of Participation in Surplus Profits -- 1.8.3.3 On the Basis of Recovery of Capital -- 1.8.3.4 On the Basis of Conversion into Equity Shares -- 1.8.3.5 Guaranteed Preference Share -- 1.9 Equity Shares -- 1.9.1 Distinction Between Preference Share and Equity Share -- 1.10 Management of Companies -- 1.10.1 Shareholders -- 1.10.2 Board of Directors -- 1.10.3 Managing Director -- 1.10.4 Manager -- 1.11 General Meetings of the Company -- 1.11.1 Statutory Meeting -- 1.11.2 Annual General Meeting -- 1.11.3 Extraordinary General Meeting -- 1.12 Quorum…”
    Libro electrónico
  2. 11482
    Publicado 2018
    Tabla de Contenidos: “…8.5.2 Exploiting domain rules -- 8.6 Validating configuration -- 8.6.1 Causes for configuration-related security flaws -- 8.6.2 Automated tests as your safety net -- 8.6.3 Knowing your defaults and verifying them -- Summary -- 9 Handling failures securely -- 9.1 Using exceptions to deal with failure -- 9.1.1 Throwing exceptions -- 9.1.2 Handling exceptions -- 9.1.3 Dealing with exception payload -- 9.2 Handling failures without exceptions -- 9.2.1 Failures aren't exceptional -- 9.2.2 Designing for failures -- 9.3 Designing for availability -- 9.3.1 Resilience -- 9.3.2 Responsiveness -- 9.3.3 Circuit breakers and timeouts -- Always specify a timeout -- 9.3.4 Bulkheads -- 9.4 Handling bad data -- Cross-site scripting and second-order attacks -- 9.4.1 Don't repair data before validation -- 9.4.2 Never echo input verbatim -- Summary -- 10 Benefits of cloud thinking -- 10.1 The twelve-factor app and cloud-native concepts -- 10.2 Storing configuration in the environment -- 10.2.1 Don't put environment configuration in code -- 10.2.2 Never store secrets in resource files -- 10.2.3 Placing configuration in the environment -- 10.3 Separate processes -- 10.3.1 Deploying and running are separate things -- 10.3.2 Processing instances don't hold state -- 10.3.3 Security benefits -- 10.4 Avoid logging to file -- 10.4.1 Confidentiality -- 10.4.2 Integrity -- 10.4.3 Availability -- 10.4.4 Logging as a service -- 10.5 Admin processes -- 10.5.1 The security risk of overlooked admin tasks -- 10.5.2 Admin tasks as first-class citizens -- Admin of log files -- 10.6 Service discovery and load balancing -- 10.6.1 Centralized load balancing -- 10.6.2 Client-side load balancing -- 10.6.3 Embracing change -- 10.7 The three R's of enterprise security -- 10.7.1 Increase change to reduce risk -- 10.7.2 Rotate -- 10.7.3 Repave -- 10.7.4 Repair -- Summary…”
    Libro electrónico
  3. 11483
    Publicado 2022
    Tabla de Contenidos: “…IDS Usage Contract Language -- 7.3.2 Usage Control Dimensions -- 7.3.3 Operators for Usage Control Rules -- 7.4 The Policy Information Point -- 7.5 The Participant Information Service (ParIS) -- 7.6 Conclusion: The IDS-IM as the Bridge Between Expressions, Infrastructure, and Enforcement -- References -- Chapter 8: Data Usage Control -- 8.1 Introduction -- 8.2 Usage Control -- 8.2.1 Access Control -- 8.2.2 Usage Control -- 8.2.3 Usage Control Components and Communication Flow -- 8.2.4 Specification, Management, and Negotiation -- 8.2.5 Related Concepts -- 8.2.5.1 Data Leak/Loss Prevention -- 8.2.5.2 Digital Rights Management -- 8.2.5.3 User Managed Access -- 8.2.5.4 Windows Information Protection -- 8.3 Usage Control in the IDS -- 8.3.1 Usage Control Policies -- 8.3.1.1 Policy Classes -- 8.3.1.2 Policy Negotiation -- 8.3.2 Usage Control Technologies -- 8.3.2.1 Integration Concept…”
    Libro electrónico
  4. 11484
    Publicado 2017
    Tabla de Contenidos: “…Luden / Time of Day and Training Status Both Impact the Efficacy of Caffeine for Short Duration Cycling Performance, Reprinted from: Nutrients 2016, 8(10), 639; doi: 10.3390/nu8100639 -- Chihiro Kojima, Aya Ishibashi, Kumiko Ebi and Kazushige Goto / The Effect of a 20 km Run on Appetite Regulation in Long Distance Runners, Reprinted from: Nutrients 2016, 8(11), 672; doi: 10.3390/nu8110672 -- Wagner Santos Coelho, Luis Viveiros de Castro, Elizabeth Deane, Alexandre Magno-França Adriana Bassini and Luiz-Claudio Cameron / Investigating the Cellular and Metabolic Responses of World-Class Canoeists Training: A Sportomics Approach, Reprinted from: Nutrients 2016, 8(11), 719; doi: 10.3390/nu8110719 -- Heidi M. …”
    Libro electrónico
  5. 11485
    Publicado 2023
    Tabla de Contenidos: “…3 Assessing the Accuracy of Digital Elevation Models for Darjeeling-Sikkim Himalayas -- 3.1 Introduction -- 3.2 Study Area -- 3.3 Materials and Methods -- 3.3.1 Generation of Cartosat-1 DEM and Orthoimage -- 3.3.2 TanDEM-X -- 3.3.3 ALOS PALSAR -- 3.3.4 DGPS Survey for Obtaining Ground Control Points (GCPs) -- 3.3.5 Datum Transformation -- 3.3.6 Accuracy Assessment Methods -- 3.3.6.1 Vertical Accuracy -- 3.3.6.2 Spatial Accuracy -- 3.4 Results and Discussion -- 3.4.1 Vertical Accuracy Assessment: Comparison of DEMs With Reference to GCPs -- 3.4.2 Vertical Accuracy of DEMs for Different Land Use Classes -- 3.4.2.1 Dense Forest -- 3.4.2.2 Open Forest -- 3.4.2.3 Tea Garden -- 3.4.2.4 Built-up Area -- 3.4.3 Spatial Accuracy Assessment: Comparison of DEMs With Reference to Stream Networks -- 3.5 Conclusions -- Acknowledgments -- References -- 4 An Overview of Morphometry Software Packages, Tools, and Add-ons -- 4.1 Introduction -- 4.2 Overview of Morphometry Tools and Toolboxes -- 4.3 Stand-Alone Tools -- 4.4 Tools that Run within Coding Bases -- 4.5 Conclusion -- References -- 5 Landscape Modeling, Glacier and Ice Sheet Dynamics, and the Three Poles: A Review of Models, Softwares, and Tools -- 5.1 Introduction -- 5.2 Taxonomy -- 5.2.1 Geomorphic Process-Based Models -- 5.2.2 Classification Based on Process of Modeling -- 5.2.2.1 Based on Geomorphic Processes -- 5.2.2.2 Based on Modeling Process -- 5.3 Working Principles for Geomorphological Models -- 5.3.1 Soil Production -- 5.3.2 Hillslope Transport -- 5.3.3 Land Sliding -- 5.3.4 Fluvial Incision and Transport -- 5.3.5 Glacial Erosion -- 5.4 Landscape Evolution Models -- 5.4.1 DEM-Based Models -- 5.4.2 SIBERIA -- 5.4.3 GOLEM -- 5.4.4 CASCADE -- 5.4.5 ZScape -- 5.4.6 CHILD -- 5.4.7 CAESAR -- 5.4.8 APERO -- 5.4.9 SIGNUM (Simple Integrated Geomorphological Numerical Model)…”
    Libro electrónico
  6. 11486
    Publicado 2023
    Tabla de Contenidos: “…-- 10.3 Variance of the Solvency Position -- 10.4 Characteristics of Various Asset Classes and Liabilities -- 10.5 Our Scenarios -- 10.6 Results -- 10.7 Simulations -- 10.8 Exercise and Discussion - an Insurer With Predominately Short-Term Liabilities -- 10.9 Potential Exercise -- 10.10 Conclusions -- 10.11 Recommended Reading -- 11 Hedging: Protecting Against a Fall in Equity Markets -- 11.1 Introduction -- 11.2 Our Example -- 11.2.1 Futures Contracts - A Brief Explanation -- 11.2.2 Our Task -- 11.3 Adopting a Better Hedge -- 11.4 Allowance for Contract and Portfolio Sizes -- 11.5 Negative Hedge Ratio -- 11.6 Parameter and Model Risk -- 11.7 A Final Reminder on Hedging -- 11.8 Recommended Reading -- 12 Immunisation - Redington and Beyond -- 12.1 Introduction -- 12.2 Outline of Redington Theory and Alternatives -- 12.3 Redington's Theory of Immunisation -- 12.4 Changes in the Shape of the Yield Curve -- 12.5 A More Realistic Example -- 12.5.1 Determining a Suitable Bond Allocation -- 12.5.2 Change in Yield Curve Shape -- 12.5.3 Liquidity Risk -- 12.6 Conclusion -- 12.7 Recommended Reading -- 13 Copulas -- 13.1 Introduction -- 13.2 Copula Theory - The Basics -- 13.3 Commonly Used Copulas -- 13.3.1 The Independent Copula -- 13.3.2 The Gaussian Copula -- 13.3.3 Archimedian Copulas -- 13.3.4 Clayton Copula -- 13.3.5 Gumbel Copula -- 13.4 Copula Density Functions…”
    Libro electrónico
  7. 11487
    por Kumar, Kukatlapalli Pradeep
    Publicado 2023
    Tabla de Contenidos: “…6.4.2.2 Gradient Tree Boosting -- 6.4.2.3 XGBoost -- 6.4.3 Stacking -- 6.5 Results -- 6.5.1 Bagging Meta Estimator -- 6.5.2 Random Forest -- 6.5.3 AdaBoost -- 6.5.4 Gradient Tree Boosting -- 6.5.5 XGBoost -- 6.5.6 Stacking -- 6.5.7 Comparison with Single Classifiers -- 6.6 Conclusion -- Acknowledgement -- References -- Chapter 7 Feature Engineering and Selection Approach Over Malicious Image -- 7.1 Introduction -- 7.2 Feature Engineering Techniques -- 7.2.1 Methodologies in Feature Engineering -- 7.2.2 Strides in Feature Engineering -- 7.2.3 Feature Extraction -- 7.2.4 Feature Selection -- 7.2.5 Feature Engineering in Image Processing -- 7.2.6 Importance of Feature Engineering in Image Processing -- 7.3 Malicious Feature Engineering -- 7.4 Image Processing Technique -- 7.4.1 Steps Involved in Image Processing Technique -- 7.4.2 Image Processing Task -- 7.4.2.1 Image Enhancement -- 7.4.2.2 Image Restoration -- 7.4.2.3 Coloring Image Processing -- 7.4.2.4 Wavelets Processing and Multiple Solutions -- 7.4.2.5 Image Compression -- 7.4.2.6 Character Recognition -- 7.4.2.7 Characteristics of Image Processing -- 7.5 Image Processing Techniques for Analysis on Malicious Images -- 7.6 Conclusion -- References -- Blog -- Chapter 8 Cubic-Regression and Likelihood Based Boosting GAM to Model Drug Sensitivity for Glioblastoma -- 8.1 Introduction -- 8.1.1 Glioblastoma -- 8.2 Literature Survey -- 8.3 Materials and Methods -- 8.3.1 Methodology -- 8.3.1.1 Generalized Additive Models (GAMs) -- 8.3.1.2 Model-Based Boosting - Boosted GAM -- 8.3.2 Datasets Description -- 8.4 Evaluations, Results and Discussions -- 8.4.1 Akaike Information Criterion (AIC) -- 8.4.2 Adjusted R-Squared -- 8.4.3 Discussion -- Conclusion -- References -- Chapter 9 Unobtrusive Engagement Detection through Semantic Pose Estimation and Lightweight ResNet for an Online Class Environment…”
    Libro electrónico
  8. 11488
    “…It highlights the number of students involved, where they are educated – special schools, special classes or regular classes – and in what phases of education – pre-primary, primary, lower secondary and upper secondary education. …”
    Libro electrónico
  9. 11489
    Publicado 2022
    “…The book largely reflect the structural diversity of echinoderm metabolites including triterpene glycosides and fucosylated chondroitin sulfates, as well as branched fatty acids, di- and triacylglycerols and other lipid classes from the sea cucumbers, polyhydroxysteroids from starfish and different classes of sphingolipids from sea cucumbers and starfish. …”
    Libro electrónico
  10. 11490
    Publicado 2012
    “…In C++ Primer Plu s, you’ll find depth, breadth, and a variety of teaching techniques and tools to enhance your learning: A new detailed chapter on the changes and additional capabilities introduced in the C++11 standard Complete, integrated discussion of both basic C language and additional C++ features Clear guidance about when and why to use a feature Hands-on learning with concise and simple examples that develop your understanding a concept or two at a time Hundreds of practical sample programs Review questions and programming exercises at the end of each chapter to test your understanding Coverage of generic C++ gives you the greatest possible flexibility Teaches the ISO standard, including discussions of templates, the Standard Template Library, the string class, exceptions, RTTI, and namespaces Table of Contents 1: Getting Started with C++ 2: Setting Out to C++ 3: Dealing with Data 4: Compound Types 5: Loops and Relational Expressions 6: Branching Statements and Logical Operators 7: Functions: C++’s Programming Modules 8: Adventures in Functions 9: Memory Models and Namespaces 10: Objects and Classes 11: Working with Classes 12: Classes and Dynamic Memory Allocation 13: Class Inheritance 14: Reusing Code in C++ 15: Friends, Exceptions, and More 16: The string Class and the Standard Template Library 17: Input, Output, and Files 18: The New C++11 Standard A Number Bases B C++ Reserved Words C The ASCII Character Se..…”
    Libro electrónico
  11. 11491
  12. 11492
    Publicado 1938
    Libro
  13. 11493
    por Tobler, Adolf, 1835-1910
    Publicado 1884
    991006456559706719
  14. 11494
    por Lie, Sophus, 1842-1899
    Publicado 1967
    Libro
  15. 11495
    por Kagame, Alexis
    Publicado 1955
    Tesis
  16. 11496
    Publicado 1925
    Libro
  17. 11497
    Publicado 1941
    Libro
  18. 11498
    Publicado 1984
    Libro
  19. 11499
    por Belleville, Pierre
    Publicado 1967
    Libro
  20. 11500
    Publicado 1961
    Libro