Mostrando 5,261 - 5,280 Resultados de 6,274 Para Buscar '"The Voice"', tiempo de consulta: 0.09s Limitar resultados
  1. 5261
    por Masing-Delic, I.
    Publicado 2009
    “…This collection of essays on Turgenev, Goncharov, Conrad, Dostoevsky, Blok, Briusov, Gor'kii, Pasternak and Nabokov represents diverse voices but is also unified. One invariant is the recurring distinction between "culture" and "civilization" and the vision of Russia as the bearer of culture because it is "barbaric." …”
    Libro electrónico
  2. 5262
    Publicado 2021
    “…," and "How can previously unheard, or marginalised voices, find space, like this, in the world of Old English Studies?" …”
    Libro electrónico
  3. 5263
    Publicado 2024
    “…is an edited collection bringing together the voices of leading structural injustice scholars to provide an overview of this profoundly important concept…”
    Libro electrónico
  4. 5264
    por Jones, Nicola Anne
    Publicado 2011
    “…The book provides an introduction for students and development professionals to mainstreaming children in international development and policy, focusing on children's 'voices' and childhood poverty, policy and practice…”
    Libro electrónico
  5. 5265
    por King, Rachel
    Publicado 2024
    “…Through a diverse collection of expert voices, this volume invites readers to embark on their own journeys through appropriate methodologies for heritage research and public engagement…”
    Libro electrónico
  6. 5266
    Publicado 1993
    Libro
  7. 5267
    Publicado 2007
    Vídeo online
  8. 5268
    Publicado 2007
    Vídeo online
  9. 5269
    por Juvenis, Engarandus
    Publicado 1996
    CDROM
  10. 5270
    por Hölling, Hanna B.
    Publicado 2024
    “…Representing the output of the research project Performance: Conservation, Materiality, Knowledge, this volume brings together diverse voices, methods and formats in the discussion and practice of performance conservation…”
    Libro electrónico
  11. 5271
    Publicado 2016
    Tabla de Contenidos: “…B.4 ATD Distribution Viewpoint -- B.4.1 Model kind -- B.5 ATD Stakeholder Involvement Viewpoint -- B.5.1 Model kind -- B.6 ATD Chronological Viewpoint -- B.6.1 Model kind -- B.7 ATD Detail Viewpoint -- B.7.1 Model kind -- B.8 Correspondences Between Viewpoints -- References -- 6 Quality management and Software Product Quality Engineering -- 6.1 Limitations of the Current Software Practices -- 6.1.1 Quality Management During the Lifecycle -- 6.1.2 Managing Software Quality Requirements -- 6.1.3 Support for Utilizing Institutional Knowledge -- 6.2 Principles of Software Product Quality Engineering -- 6.2.1 Holistic View of Product Quality -- 6.2.2 Engineering Quality with Patterns -- 6.2.2.1 Structure of a quality pattern -- 6.2.2.2 Catalog of quality patterns -- 6.2.2.3 Functional Correctness Patterns -- 6.2.3 Compositional Traceability -- 6.2.4 Process-Product Correlation -- 6.3 Case Study -- 6.3.1 Process Instantiation and Configuration Structure -- 6.3.2 Software Quality Requirements -- 6.3.3 Consistency Tracker -- 6.4 Conclusion -- References -- 7 "Filling in the blanks": A way to improve requirements management for better estimates -- 7.1 Introduction -- 7.2 Meeting the "Voice of the Customer": QFD -- 7.3 "Filling in the Blanks": How to Further Improve Estimation Capability? …”
    Libro electrónico
  12. 5272
    por Guidetti, Oliver
    Publicado 2024
    Tabla de Contenidos: “…1.7.1 Systemic resilience: an overview -- 1.7.2 Role of systemic resilience in cybersecurity -- 1.7.3 Building systemic resilience in critical infrastructures -- 1.8 The future of cybersecurity and AI's role: the next frontier -- 1.8.1 Emerging trends in cybersecurity -- 1.8.2 AI and cybersecurity: a new paradigm -- 1.8.3 The future of AI in mitigating human-related risks -- 1.9 Conclusions and recommendations: charting the path forward -- 1.9.1 Summary of key findings -- 1.9.2 Recommendations for practice -- 1.9.3 Avenues for future research -- References -- 2 Analysing cyber-physical attacks: the human operator challenge in mining -- 2.1 Introduction -- 2.2 Mining process plants (MPP) -- 2.2.1 Mining -- 2.2.2 Overview of SCADA systems in MPP -- 2.3 Cyber-physical systems and attacks -- 2.3.1 Cyber-physical attacks (CPA) -- 2.4 Humans and human operators in mining -- 2.4.1 Human operations in mining -- 2.4.2 Human operator -- 2.5 Human psychological challenges in mining -- 2.5.1 Impact of cyberattacks on mental health -- 2.5.2 Human operator mental health -- 2.6 Autonomous cyber-physical security (CBPS) -- 2.7 Autonomous operator for cyber-physical systems -- 2.7.1 A theoretical CPS model for an autonomous operator -- 2.8 Conclusions -- References -- 3 Building cognitive resilience for enhanced cyber governance -- 3.1 Introduction -- 3.2 Human psychology and cognitive abilities -- 3.3 Digital world and cybersecurity governance -- 3.4 Social engineering and human psychology -- 3.4.1 Example 1: malicious actors use whaling attack to defraud bank of US75.8 million -- 3.4.2 Example 2: malicious actors use AI voice impersonation to defraud organisation of US243,000 -- 3.4.3 Example 3: malicious actors exploit human nature to defraud australians of more than AU7.2 million -- 3.5 Public trust and citizen engagement…”
    Libro electrónico
  13. 5273
    Publicado 2014
    Tabla de Contenidos: “…International reserves in months of import -- International reserve and short-term debt -- International reserve and broad money -- 8.4 Data Description -- 8.5 Empirical Models and Results -- 8.6 Conclusion -- Acknowledgment -- References -- Part Tow: Market Developments and Governance Issues -- 9 Singapore's Financial Market: Challenges and Future Prospects -- 9.1 Introduction -- 9.2 Growth of the Financial Sector -- 9.2.1 Singapore's Financial Sector Success Factors -- 9.2.2 The Development, Regulatory, and Supervisory Phases -- The development phase -- The regulatory phase -- The supervisory phase -- 9.3 The Prospects -- 9.4 The Challenges -- 9.4.1 The Flood, the Reservoir, and Finance -- 9.4.2 High-Frequency Trading and H -- 9.4.3 Asian Crisis: Lesson Learned -- 9.4.4 Spain's Banking Crisis -- 9.5 The Instability Paradox -- 9.6 Micro- and Macroprudential Policies -- 9.7 Conclusion -- References -- 10 Wealth Management: A Comparison of Switzerland, Singapore, and Hong Kong -- 10.1 Introduction -- 10.2 Switzerland -- 10.3 Singapore -- 10.4 Hong Kong -- 10.5 A Comparison of Switzerland, Singapore, and Hong Kong -- 10.6 Voices of Practitioners in Singapore -- 10.7 Conclusion -- References -- 11 Asian Market Reactions to US Macroeconomic News Surprises -- 11.1 Introduction -- 11.2 Data -- 11.2.1 Stock Market Data -- 11.2.2 Announcement Data -- 11.3 Methodology -- 11.4 Empirical Results -- 11.5 Conclusion -- Acknowledgment -- References -- 12 Monetary Policy in Taiwan: The Implications of Liquidity -- 12.1 Introduction -- 12.2 Financial Innovation and the Divisia Monetary Aggregate in Taiwan -- 12.3 Data and Methodology -- 12.3.1 Divisia Aggregation -- 12.3.2 Divisia Money and the Official Aggregates -- 12.3.3 Data -- 12.4 Results and Discussions -- 12.4.1 Data Selection -- 12.4.2 VAR Identification -- 12.5 Conclusion -- References…”
    Libro electrónico
  14. 5274
    Publicado 2017
    Tabla de Contenidos: “…10 - Discrete and Fast Fourier Transforms (DFT, FFT) -- 10.1 Discrete Fourier Transform and Inverse Discrete Fourier Transform Equations -- 10.2 First Discrete Fourier Transform Example -- 10.3 Second Discrete Fourier Transform Example -- 10.4 Third Discrete Fourier Transform Example -- 10.5 Fourth Discrete Fourier Transform Example -- 10.6 Fast Fourier Transform -- 10.7 Filtering Using the Fast Fourier Transform and Inverse Fast Fourier Transform -- 10.8 Bit Growth in Fast Fourier Transforms -- 10.9 Bit Reversal Addressing -- 11 - Digital Upconversion and Downconversion -- 11.1 Digital Upconversion -- 11.2 Digital Downconversion -- 11.3 Intermediate Frequency Subsampling -- 12 - Error-Correction Coding -- 12.1 Linear Block Encoding -- 12.2 Linear Block Decoding -- 12.3 Minimum Coding Distance -- 12.4 Convolutional Encoding -- 12.5 Viterbi Decoding -- 12.6 Soft Decision Decoding -- 12.7 Cyclic Redundancy Check -- 12.8 Shannon Capacity and Limit Theorems -- 13 - Matrix Inversion -- 13.1 Matrix Basics -- 13.2 Cholesky Decomposition -- 13.3 4×4 Cholesky Example -- 13.4 QR Decomposition -- 13.5 Gram-Schmidt Method -- 13.6 QR Decomposition Restructuring for Parallel Implementation -- 14 - Field-Oriented Motor Control -- 14.1 Magnetism Basics -- 14.2 AC Motor Basics -- 14.3 DC Motor Basics -- 14.4 Electronic Commutation -- 14.5 AC Induction Motor -- 14.6 Motor Control -- 14.7 Park and Clark Transforms -- 15 - Analog and Time Division Multiple Access Wireless Communications -- 15.1 Early Digital Innovations -- 15.2 Frequency Modulation -- 15.3 Digital Signal Processor -- 15.4 Digital Voice Phone Systems -- 15.5 Time Division Multiple Access Modulation and Demodulation -- 16 - CDMA Wireless Communications -- 16.1 Spread Spectrum Technology -- 16.2 Direct Sequence Spread Spectrum -- 16.3 Walsh Codes -- 16.4 Concept of Code Division Multiple Access…”
    Libro electrónico
  15. 5275
    Publicado 2018
    “…The search for these religious voices undertaken here is a valuable contribution to both research in ancient "Autorforschung" and the religio-historical study of how religious knowledge was produced in the ancient Mediterranean world…”
    Libro electrónico
  16. 5276
  17. 5277
    Publicado 2013
    “…Communicate like a LEADER Research proves that the greatest impact speakers have in any conversation comes not only from the words they say but from the sound of their voices. In other words, it is not just the message but the messenger that matters. …”
    Grabación de sonido
  18. 5278
    Publicado 2017
    “…The latest Grist Anthology is an innovative blend of some of the most exciting and freshest voices in prose and poetry today. It features five sections written from five distinct narrative viewpoints…”
    Electrónico
  19. 5279
    Publicado 2018
    “…This video demonstrates specific techniques introverts use to prepare for meetings so their voices can be heard. We also look at how they use preparation as a strength in making presentations…”
    Video
  20. 5280
    Publicado 2020
    “…In no time, you’ll find out how to line up with Facebook, Twitter, Tumblr, and Google, develop a unique and compelling voice, and influence your key audience all the way to the bank. …”
    Libro electrónico