Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 199
- Application software 194
- History 177
- Software engineering 173
- Computer programming 148
- Historia 143
- Software Engineering/Programming and Operating Systems 142
- Development 131
- Electrical & Computer Engineering 128
- Database management 118
- Management 116
- Telecommunications 115
- Design 105
- Social aspects 104
- History and criticism 102
- Web sites 96
- RELIGION 94
- Web site development 90
- Computer networks 89
- Microsoft .NET Framework 88
- Música sagrada 85
- Java (Computer program language) 82
- Web Development 79
- Database Management 77
- Música 73
- Artificial intelligence 72
- Historia y crítica 70
- Internet telephony 70
- Computer Science 69
- Crítica e interpretación 66
-
5181Publicado 2013Tabla de Contenidos: “…-Gambling -- GE (General Electric) -- Gender Balance -- Gender-specific Contributions to Social Responsibility -- Gender/Gender Free -- Genetically modified organisms (GMOs) -- German Corporate Governance Code (6/6/2008) -- Giving voice to values -- Global 100 -- Global Competitiveness -- Global Corporate Governance Forum -- Global Director Development Circle -- Global Environmental Management Initiative -- Global Financial Crisis -- Global Financial Markets -- Global Governance and CSR -- Global Memorandum of Understanding -- Global Reporting Initiative -- Global Village -- Global Warming -- Globalization -- Globalization of Culture -- Globethics.net -- Glocal -- Good Corporation -- Government (role in regulation, etc) -- Grameen Bank -- Green Globe Certification -- Green jobs -- Green Workplace -- Greenbury Report (UK) -- Greenhouse gases -- Greenleaf (publisher) -- Greenpeace (NGO) -- Greenwashing -- Hampel Report (UK) and CSR -- Hannover Principles -- Health and drug testing (as part of right to privacy) -- Health and Safety -- Healthcare/benefits -- Higgs Report (UK) and CSR -- Hinduism and CSR -- Holistic Governance -- Home-based telecommuting/teleworking -- Hostile takeover -- Human ecology -- Human resource management -- Human rights -- Human Rights Compliance Assessment Tool -- Human rights, Non-Discrimination -- ICC Charter for Sustainable Development …”
Libro electrónico -
5182Publicado 2021Tabla de Contenidos: “…-- Hostile versus Friendly Buyers -- Considerations before Signing -- The LOI Template -- Chapter 12 Communication with Stakeholders -- The Role of the Board of Directors -- Weighing All Options -- Guiding Valuation and Fit -- Being the Voice of Objectivity -- Post-merger Integration -- Keeping Investors Updated in the M& -- A Process -- The Dos and Don'ts with Employees -- Chapter 13 Negotiating the Price Tag -- Price versus Terms -- Communicating Outcomes -- Pushing for a Deadline -- Increasing Price with a Bidding War -- Maximizing Value on the Buyer and Seller Sides -- Thinking Like a Buyer -- Give and Take -- Price Thresholds -- Appearing Smart -- Paranoia -- Where Is the Value for the Buyer? …”
Libro electrónico -
5183Publicado 2017Tabla de Contenidos: “…Sensor Security -- Types of Sensor Attacks -- Security of Sensor Data -- Basic encryption scheme -- Secret sharing scheme -- Partial decryption -- Sliding group watermark scheme -- Simplified sliding group watermark scheme -- Forward watermark chain -- Location Privacy -- Attack-Threat Types -- Preserving Location Privacy -- Challenges of preserving location privacy -- Architecture of privacy tools -- Mechanisms to preserve location privacy -- Location Privacy Preserving Methods -- k-Anonymity -- Extensions of k-anonymity -- Obfuscation -- Obfuscation by enlarging radius -- Obfuscation by shifting center -- Obfuscation by reducing radius -- Cloaking -- Cloaking architecture example -- Cloaking region generation basics -- Sample cloaking mechanisms -- References -- 10 Usability -- Need of Sensors in Mobile Computing -- OS Logo Requirements and Sensor Support -- Context- and Location-Based Services -- Sensor-Based Power Management -- Sensor management -- Communication protocols -- Sensor-based power management policies -- Sensor-Based User Interactions -- Simplifying the user-device interface for voice memo recording -- Detecting orientation of device -- Power management -- Human-Computer Interactions: Gesture Recognition -- Sensor Usages -- A Few Sensor Examples -- References -- 11 Sensor application areas -- Introduction to Sensor Applications -- Augmented Reality -- Hardware Components of Augmented Reality -- Augmented Reality Architecture -- Applications of Augmented Reality -- Sensor Fusion for Augmented Reality -- Depth Sensors in Augmented Reality -- Sensor Applications in the Automotive Industry -- Steering Torque Sensor -- Steering Angle Sensor -- Power Steering Motor Position Sensors -- Sensor Applications in Energy Harvesting -- Components of Energy Harvesting -- Net-Zero Energy Systems -- Medical Applications of Energy Harvesting…”
Libro electrónico -
5184Publicado 2019Tabla de Contenidos: “…Reducing the problem to statistics -- Understanding that deep learning doesn't create -- Mimicking an Artist -- Defining a new piece based on a single artist -- Combining styles to create new art -- Visualizing how neural networks dream -- Using a network to compose music -- Chapter 16 Building Generative Adversarial Networks -- Making Networks Compete -- Finding the key in the competition -- Achieving more realistic results -- Considering a Growing Field -- Inventing realistic pictures of celebrities -- Enhancing details and image translation -- Chapter 17 Playing with Deep Reinforcement Learning -- Playing a Game with Neural Networks -- Introducing reinforcement learning -- Simulating game environments -- Presenting Q-learning -- Explaining Alpha-Go -- Determining if you're going to win -- Applying self-learning at scale -- Part 4 The Part of Tens -- Chapter 18 Ten Applications that Require Deep Learning -- Restoring Color to Black-and-White Videos and Pictures -- Approximating Person Poses in Real Time -- Performing Real-Time Behavior Analysis -- Translating Languages -- Estimating Solar Savings Potential -- Beating People at Computer Games -- Generating Voices -- Predicting Demographics -- Creating Art from Real-World Pictures -- Forecasting Natural Catastrophes -- Chapter 19 Ten Must-Have Deep Learning Tools -- Compiling Math Expressions Using Theano -- Augmenting TensorFlow Using Keras -- Dynamically Computing Graphs with Chainer -- Creating a MATLAB-Like Environment with Torch -- Performing Tasks Dynamically with PyTorch -- Accelerating Deep Learning Research Using CUDA -- Supporting Business Needs with Deeplearning4j -- Mining Data Using Neural Designer -- Training Algorithms Using Microsoft Cognitive Toolkit (CNTK) -- Exploiting Full GPU Capability Using MXNet -- Chapter 20 Ten Types of Occupations that Use Deep Learning -- Managing People…”
Libro electrónico -
5185Publicado 2015Tabla de Contenidos: “…Critical LTE 125 -- 4.2 LTE Fundamentals 129 -- 4.2.1 Radio Interface 131 -- 4.2.2 Service Model: PDN Connection and EPS Bearer Service 136 -- 4.2.3 PCC Subsystem 141 -- 4.2.4 Security 143 -- 4.2.5 Roaming Support 149 -- 4.2.6 Voice Services over LTE 150 -- 4.3 Group Communications and PTT 152 -- 4.3.1 Existing Initiatives and Solutions for PTT over LTE 153 -- 4.3.2 3GPP Standardization Work 153 -- 4.3.3 GCSE 155 -- 4.3.4 MCPTT over LTE 158 -- 4.3.5 OMA PCPS 161 -- 4.4 Device?]…”
Libro electrónico -
5186Publicado 2015Tabla de Contenidos: “…-- Checking Out Electric Current -- Exploring an atom -- Getting a charge out of protons and electrons -- Identifying conductors and insulators -- Mobilizing electrons to create current -- Understanding Voltage -- Let the force be with you -- Why voltage needs to be different -- Putting Electrical Energy to Work -- Tapping into electrical energy -- Working electrons deliver power -- Using Circuits to Make Sure Electrons Arrive at Their Destination -- Supplying Electrical Energy -- Getting direct current from a battery -- Using alternating current from a power plant -- Transforming light into electricity -- Using symbols to represent energy sources -- Marveling at What Electrons Can Do -- Creating good vibrations -- Seeing is believing -- Sensing and alarming -- Controlling motion -- Computing -- Voice, video, and data communications -- Chapter 2 Gearing Up to Explore Electronics -- Getting the Tools You Need -- Stocking Up on Essential Supplies -- Getting Ready to Rumble -- Using a Solderless Breadboard -- Chapter 3 Running Around in Circuits -- Comparing Closed, Open, and Short Circuits -- Understanding Conventional Current Flow -- Examining a Basic Circuit -- Building the basic LED circuit -- Examining voltages -- Measuring current -- Calculating power -- Chapter 4 Making Connections -- Creating Series and Parallel Circuits -- Series connections -- Parallel connections -- Switching Electric Current On and Off -- Controlling the action of a switch -- Making the right contacts -- Creating a Combination Circuit -- Switching On the Power…”
Libro electrónico -
5187Publicado 2023Tabla de Contenidos: “…Develop a Change Plan -- Step 2: Work on the Culture -- 6. Bring the Voice of the Customer into the Plant…”
Libro electrónico -
5188Publicado 2023Tabla de Contenidos: “…-- Programming language APIs -- Blockchain-related APIs -- Blockchain APIs -- Wallet APIs -- Smart contract APIs -- Digital payment APIs -- Geolocation APIs -- Uses of geolocation APIs -- The technology behind geolocation APIs -- Geolocation API performance metrics -- Integration of geolocation APIs -- Challenges with geolocation APIs -- Mapping APIs -- Messaging APIs -- Artificial Intelligence (AI) APIs -- Voice and audio APIs -- Vision APIs -- Examples of API uses in the Metaverse -- Social interaction APIs…”
Libro electrónico -
5189Publicado 2024Tabla de Contenidos: “…Poisoning-assisted inference -- Attack scenarios -- Mitigations -- Example attribute inference attack -- Membership inference attacks -- Statistical thresholds for ML leaks -- Label-only data transferring attack -- Blind membership inference attacks -- White box attacks -- Attack scenarios -- Mitigations -- Example membership inference attack using the ART -- Summary -- Chapter 10: Privacy-Preserving AI -- Privacy-preserving ML and AI -- Simple data anonymization -- Advanced anonymization -- K-anonymity -- Anonymization and geolocation data -- Anonymizing rich media -- Differential privacy (DP) -- Federated learning (FL) -- Split learning -- Advanced encryption options for privacy-preserving ML -- Secure multi-party computation (secure MPC) -- Homomorphic encryption -- Advanced ML encryption techniques in practice -- Applying privacy-preserving ML techniques -- Summary -- Part 4: Generative AI and Adversarial Attacks -- Chapter 11: Generative AI - A New Frontier -- A brief introduction to generative AI -- A brief history of the evolution of generative AI -- Generative AI technologies -- Using GANs -- Developing a GAN from scratch -- WGANs and custom loss functions -- Using pre-trained GANs -- Pix2Pix -- CycleGAN -- Pix2PixHD -- Progressive Growing of GANs (PGGAN) -- BigGAN -- StarGAN v2 -- StyleGAN series -- Summary -- Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks -- Use of GANs for deepfakes and deepfake detection -- Using StyleGAN to generate convincing fake images -- Creating simple deepfakes with GANs using existing images -- Making direct changes to an existing image -- Using Pix2PixHD to synthesize images -- Fake videos and animations -- Other AI deepfake technologies -- Voice deepfakes -- Deepfake detection -- Using GANs in cyberattacks and offensive security -- Evading face verification…”
Libro electrónico -
5190por Cary, Alphonse ( 1886-1940)Acceso a copia digital Biblioteca Nacional de Australia
Publicado 1920
Partitura -
5191
-
5192Publicado 2017Tabla de Contenidos: “…-- 3.2 The Law Comes Later: The Weak Normative Discourse on Gas Warfare After the German Attack -- 3.2.1 The Lack of Protest: Political Voices and Official Reports -- 3.2.2 The Daily Press: Restraint, Disinformation, and Loud Silence -- 3.3 Possible Interpretations: Raison de Guerre as Its Own Form of Normativity? …”
Libro electrónico -
5193por BCS, The Chartered Institute for ITTabla de Contenidos: “…A survey of NHS e-therapy developers -- Matthew Russell Bennion, Gillian E Hardy, Roger K Moore, Stephen Kellett, Abigail Millings -- Nurses' perceptions of the clinical information system in primary healthcare centres in Qatar: a cross-sectional survey -- Monaa Hussain Mansoori, Kathleen Benjamin, Emmanuel Ngwakongnwi, Samya Al Abdulla -- Phishing in healthcare organisations: threats, mitigation and approaches -- Ward Priestman, Tony Anstis, Isabel G Sebire, Shankar Sridharan, Neil J Sebire -- LAGOS: learning health systems and how they can integrate with patient care -- Scott McLachlan, Kudakwashe Dube, Evangelia Kyrimi, Norman Fenton -- Developing and sustaining digital professionalism: a model for assessing readiness of healthcare environments and capability of nurses -- Carey Ann Mather, Elizabeth Cummings -- Measuring the outcomes of using person-generated health data: a case study of developing a PROM item bank -- Gerardo Luis Dimaguila, Kathleen Gray, Mark Merolli -- Evaluating the quality of voice assistants' responses to consumer health questions about vaccines: an exploratory comparison of Alexa, Google Assistant and Siri -- Emily Couvillon Alagha, Rachel Renee Helbing -- Patient and carer survey of remote vital sign telemonitoring for self-management of long-term conditions -- Julie-Ann Walkden, Paul Joseph McCullagh, W George Kernohan -- Physician leadership and health information exchange: literature review -- Michele L Heath, Tracy H Porter -- Evaluating a post-implementation electronic medical record training intervention for diabetes management in primary care -- Gurprit Kaur Randhawa, Aviv Shachak, Karen L Courtney, Andre Kushniruk -- Using normalisation process theory to understand workflow implications of decision support implementation across diverse primary care settings -- Rebecca G Mishuris, Joseph Palmisano, Lauren McCullagh, Rachel Hess, David A Feldstein, Paul D Smith, Thomas McGinn, Devin M Mann -- Improved efficiency and patient safety through bespoke electronic thalassaemia care module -- Mohamed Naveed, Yousif Al-Serkal, Sumaya Al-Nuaimi, Kalthoom Al-Blooshi, Noor Majed Al-Mahiri, Yasir Khan, Sadaf Ahsan Naqvi, Neema Preman -- Reviews -- Cerebral palsy information system with an approach to information architecture: a systematic review -- Mina Afzali, Korosh Etemad, Alireza Kazemi, Reza Rabiei -- mHealth and big-data integration: promises for healthcare system in India -- Samaneh Madanian, Dave T Parry, David Airehrour, Marianne Cherrington -- Reliability of administrative data to identify sexually transmitted infections for population health: a systematic review -- Brian E Dixon, Saurabh Rahurkar, Yenling Ho, Janet N Arno -- Short Reports -- Short-term adoption rates for a web-based portal within the intranet of a hospital information system -- Athanasios Kotoulas, Ioannis Stratis, Theodoros Goumenidis, George Lambrou,…”
Publicado 2019
Revista digital -
5194Publicado 2018Tabla de Contenidos: “…-- Making the story interactive -- Look to play -- Resetting the initial scene setup -- More interactivity ideas -- Summary -- Chapter 12: Social VR Metaverse -- Multiplayer networking -- Networking services -- The network architecture -- Local versus server -- The Unity networking system -- Setting up a simple scene -- Creating a scene environment -- Creating an Avatar head -- Adding multiplayer networking -- Network Manager and HUD -- Network Identity and sync Transform -- Running as a host -- Adding spawn positions -- Running two instances of the game -- Associating Avatar with the first-person character -- Adding a matchmaking lobby -- Syncing objects and properties -- Setting up the headshot ball game -- Spawning the ball over the network -- Synchronizing the ball transform -- State variable synchronization -- Advanced networking topics -- Options for voice chat -- Using Oculus platform and avatars -- Oculus platform entitlement check -- Adding a local avatar -- Adding remote avatars -- Building and sharing custom VRChat rooms -- Preparing and building the world -- Summary -- Chapter 13: Optimizing for Performance and Comfort -- Using the Unity Profiler and Stats -- The Stats window -- Overview of the Profiler -- Optimizing your art -- Setting up the scene -- Decimating models -- Transparent materials -- Levels of detail -- Optimizing your scene with static objects -- Setting up the scene -- Lighting and baking -- Occlusion culling -- Optimizing your code -- Understanding the Unity life cycle…”
Libro electrónico -
5195Publicado 2014Tabla de Contenidos: “…Cover -- Title Page -- Contents -- Preface -- Acknowledgments -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Unit One Fundamentals -- Part One Overview -- Chapter 1 Data Communications, Data Networks, and the Internet -- 1.1 Data Communications and Networking for Today's Enterprise -- 1.2 A Communications Model -- 1.3 Data Communications -- 1.4 Networks -- 1.5 The Internet -- 1.6 An Example Configuration -- Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications -- 2.1 The Need for a Protocol Architecture -- 2.2 A Simple Protocol Architecture -- 2.3 The TCP/IP Protocol Architecture -- 2.4 Standardization within a Protocol Architecture -- 2.5 Traditional Internet-Based Applications -- 2.6 Multimedia -- 2.7 Sockets Programming -- 2.8 Recommended Reading and Animation -- 2.9 Key Terms, Review Questions, and Problems -- 2.10 Sockets Programming Assignments -- Appendix 2A The Trivial File Transfer Protocol -- Part Two Data Communications -- Chapter 3 Data Transmission -- 3.1 Concepts and Terminology -- 3.2 Analog and Digital Data Transmission -- 3.3 Transmission Impairments -- 3.4 Channel Capacity -- 3.5 Recommended Reading -- 3.6 Key Terms, Review Questions, and Problems -- Appendix 3A Decibels and Signal Strength -- Chapter 4 Transmission Media -- 4.1 Guided Transmission Media -- 4.2 Wireless Transmission -- 4.3 Wireless Propagation -- 4.4 Line-of-Sight Transmission -- 4.5 Recommended Reading -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Signal Encoding Techniques -- 5.1 Digital Data, Digital Signals -- 5.2 Digital Data, Analog Signals -- 5.3 Analog Data, Digital Signals -- 5.4 Recommended Reading and Animations -- 5.5 Key Terms, Review Questions, and Problems -- Chapter 6 Error Detection and Correction -- 6.1 Types of Errors -- 6.2 Error Detection -- 6.3 Parity Check -- 6.4 The Internet Checksum -- 6.5 Cyclic Redundancy Check (CRC) -- 6.6 Forward Error Correction -- 6.7 Recommended Reading and Animations -- 6.8 Key Terms, Review Questions, and Problems -- Chapter 7 Data Link Control Protocols -- 7.1 Flow Control -- 7.2 Error Control -- 7.3 High-Level Data Link Control (HDLC) -- 7.4 Recommended Reading and Animations -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 Multiplexing -- 8.1 Frequency-Division Multiplexing -- 8.2 Synchronous Time-Division Multiplexing -- 8.3 Cable Modem -- 8.4 Asymmetric Digital Subscriber Line -- 8.5 xDSL -- 8.6 Multiple Channel Access -- 8.7 Recommended Reading and Animations -- 8.8 Key Terms, Review Questions, and Problems -- Part Three Wide Area Networks -- Chapter 9 WAN Technology and Protocols -- 9.1 Switched Communications Networks -- 9.2 Circuit-Switching Networks -- 9.3 Circuit-Switching Concepts -- 9.4 Softswitch Architecture -- 9.5 Packet-Switching Principles -- 9.6 Asynchronous Transfer Mode -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- Chapter 10 Cellular Wireless Networks -- 10.1 Principles of Cellular Networks -- 10.2 Cellular Network Generations -- 10.3 LTE-Advanced -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Part Four Local Area Networks -- Chapter 11 Local Area Network Overview -- 11.1 Bus and Star Topologies -- 11.2 LAN Protocol Architecture -- 11.3 Bridges -- 11.4 Hubs and Switches -- 11.5 Virtual LANs -- 11.6 Recommended Reading and Animations -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Ethernet -- 12.1 Traditional Ethernet -- 12.2 High-Speed Ethernet -- 12.3 IEEE 802.1Q VLAN Standard -- 12.4 Recommended Reading and Animations -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 24.3 Web Access and HTTP -- 24.4 Recommended Reading and Animations -- 24.5 Key Terms, Review Questions, and Problems -- Chapter 25 Internet Multimedia Support -- 25.1 Real-Time Traffic -- 25.2 Voice Over IP -- 25.3 Session Initiation Protocol -- 25.4 Real-Time Transport Protocol (RTP) -- 25.5 Recommended Reading -- 25.6 Key Terms, Review Questions, and Problems…”
Libro electrónico -
5196Publicado 2016Tabla de Contenidos: “…Testing Navigation Forms -- Maintaining the Navigation Form -- Edit a Navigation form item -- Delete a Navigation Form tab item -- Move a Navigation form item -- Displaying the Navigation Form at Startup -- Part VII The Part of Tens -- Chapter 24 Ten Common Problems -- That's Just Not Normal -- You Type 73.725, but It Changes to 74 -- The Words They Are A-Changing -- Was There and Now It's Gone -- Undo -- Search for the missing record -- Backup recovery -- You Run a Query, but the Results Aren't What You Expect -- The Dreaded Parameter Dialog Box -- The Slowest Database in Town -- Your Database File Is as Big as a Whale -- You Get a Mess When Importing Your Spreadsheet -- We're Sorry -- Your Database File Is Corrupt -- Chapter 25 Ten Uncommon Tips -- Document Everything as Though One Day You'll be Questioned by the FBI -- Keep Your Fields as Small as Possible -- Use Number Fields for Real Numbers -- Validate Your Data -- Use Understandable Names to Keep Things Simple -- Delete with Great Caution -- Backup, Backup, Backup -- Think, Think, and Think Again -- Get Organized and Stay Organized -- There's No Shame in Asking for Help -- Appendix A: Getting Help -- Asking Access for Help -- Installed Help files -- Asking the right questions -- Online Help -- Office.com -- Search engines and other sites -- Who's Our Next Caller? -- Voice calls -- TDD/TT calls -- Index -- EULA…”
Libro electrónico -
5197Publicado 2016Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- User Guide -- Acknowledgments -- The Authors -- Introduction -- Chapter 1 Circle of Voices -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 2 Chalk Talk -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Most Suited to This Technique -- Chapter 3 Circular Response -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 4 Newsprint Dialogue -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 5 Today's Meet -- Purposes -- How It Works -- To provide a continuous back channel for participants to raise concerns and pose questions -- To hear small group reports -- To get immediate responses to questions you pose -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions Suited to This Technique -- Chapter 6 Giving Appreciation: The Appreciative Pause-Sticky Note Plaudit -- Purposes -- How It Works-Appreciative Pause -- How It Works-Sticky Note Plaudit -- To provide an audit of what people appreciated -- To debrief small-group summaries -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 7 Rotating Stations -- Purposes -- How It Works -- Where and When This Works Well -- What Users Appreciate -- What to Watch Out For -- Questions That Fit This Protocol -- Chapter 8 Snowballing -- Purposes -- How It Works -- Where and When It Works Well -- What Users Appreciate -- What to Watch Out For…”
Libro electrónico -
5198Publicado 2021Tabla de Contenidos: “…-- Speak Kindly Behavior 2: Use a Kind Tone of Voice -- Speak Kindly Behavior 3: If It's Not Kind, Don't Say It! …”
Libro electrónico -
5199Publicado 2023Tabla de Contenidos: “…Recruitment, Retention and Progression -- 18.5 The Impact of Teacher Diversity Initiatives-Towards System Transformation? -- 18.6 Absent Voices: Gaps in our Knowledge about Teacher Diversity -- 18.7 Conclusion -- Notes -- References -- Chapter 19: Charting Pathways towards a More Diverse, Equitable and Inclusive Teaching Profession -- 19.1 Introduction -- 19.2 Barriers to Teacher Diversity along the Career Pathway -- 19.3 Towards a Diverse, Equitable and Inclusive Teaching Profession: Principles, Policy and Practice -- Principle 1: Build Critical Awareness of Teacher Education and Schools as Sites of Cultural Practice -- Principle 2: Identify Patterns of Under-representation and Devise Measures to Attract and Recruit Individuals from Under-represented Groups in/to Teaching -- Principle 3: Support (Student) Teachers and School Leaders from Under-represented Groups -- Principle 4: Recognise Uniqueness and Plurality within Diversity -- Principle 5: Create Safe Spaces in Education for Democratic Participation -- Principle 6: Recognise That the Development of Inclusive Schools Is the Responsibility of All Educators -- Principle 7: Commit to Research-informed Policy and Practice -- 19.4 Conclusion and Recommendations -- Notes -- References -- Index…”
Libro electrónico -
5200por Brooks, RaymondTabla de Contenidos: “…Stocks and Stock Valuation -- 7.1 Characteristics of Common Stock -- Ownership -- Claim on Assets and Cash Flow (Residual Claim) -- Vote (Voice in Management) -- No Maturity Date -- Dividends and Their Tax Effect -- Authorized, Issued, and Outstanding Shares -- Treasury Stock -- Preemptive Rights -- 7.2 Stock Markets -- Primary Markets -- Secondary Markets: How Stocks Trade -- Bull Markets and Bear Markets -- 7.3 Stock Valuation -- The Constant Dividend Model with an Infinite Horizon -- The Constant Dividend Model with a Finite Horizon…”
Publicado 2022
Libro electrónico