Mostrando 4,441 - 4,460 Resultados de 6,175 Para Buscar '"The Whites"', tiempo de consulta: 0.12s Limitar resultados
  1. 4441
    Publicado 2018
    Tabla de Contenidos: “…-- 7.8.4 Constrained LS Estimation -- 7.9 Robust Estimation -- Chapter 8 Cramér-Rao Bound -- 8.1 Cramér-Rao Bound and Fisher Information Matrix -- 8.1.1 CRB for Scalar Problem (P=1) -- 8.1.2 CRB and Local Curvature of Log-Likelihood -- 8.1.3 CRB for Multiple Parameters (p≥1) -- 8.2 Interpretation of CRB and Remarks -- 8.2.1 Variance of Each Parameter -- 8.2.2 Compactness of the Estimates -- 8.2.3 FIM for Known Parameters -- 8.2.4 Approximation of the Inverse of FIM -- 8.2.5 Estimation Decoupled From FIM -- 8.2.6 CRB and Nuisance Parameters -- 8.2.7 CRB for Non-Gaussian rv and Gaussian Bound -- 8.3 CRB and Variable Transformations -- 8.4 FIM for Gaussian Parametric Model xN(μ(θ),C(θ)) -- 8.4.1 FIM for x=s(θ)+w with wN(0,Cw) -- 8.4.2 FIM for Continuous-Time Signals in Additive White Gaussian Noise -- 8.4.3 FIM for Circular Complex Model -- Appendix A: Proof of CRB -- Appendix B: FIM for GaussianModel -- Appendix C: Some Derivatives for MLE and CRB Computations…”
    Libro electrónico
  2. 4442
    Publicado 2017
    Tabla de Contenidos: “…3.5.3.11 Investigating Payback Times for Various Systems -- 3.5.3.12 Development of Advanced Building Envelopes -- 3.6 Conclusions -- Acknowledgments -- References -- 4 Reflective Materials for Cost-Effective Energy-Efficient Retrofitting of Roofs -- 4.1 Introduction -- 4.2 White Reflective Materials -- 4.2.1 Brief History -- 4.2.2 Properties -- 4.2.3 Cost-Effectiveness of Reflective White Materials -- 4.3 Colored Reflective Materials -- 4.3.1 Brief History -- 4.3.2 Properties -- 4.3.3 Cost Effectiveness of Colored Reflective Materials -- 4.4 Retroreflective Materials -- 4.5 Thermochromic Materials -- 4.6 Conclusions -- Acknowledgments -- References -- 5 Solar Air Collectors for Cost-Effective Energy-Efficient Retrofitting -- 5.1 Introduction -- 5.2 Types of SACs -- 5.2.1 Unglazed Transpired Solar Air Collectors -- 5.2.1.1 Theoretical Studies of UTSAC -- 5.2.1.2 Mathematical Models to Predict Existing UTSAC Outputs -- 5.2.1.3 Experimental Studies on Existing UTSAC -- 5.2.2 Back-Pass Solar Air Collector -- 5.3 Unglazed SAC Numerical Model -- 5.3.1 Experimental Setup and Methodology -- 5.3.1.1 System Description -- 5.3.1.2 Global Solar Radiation Measurements -- 5.3.1.3 Air Temperature Measurements -- 5.3.1.4 Airflow Measurements -- 5.3.1.5 Wind-Speed Measurements -- 5.3.2 Data Collection -- 5.3.2.1 Measurement Processing -- 5.3.2.2 Air Inlet and Outlet Temperatures -- 5.3.2.3 Airflow Rate -- 5.3.3 Energy-Balance Equations -- 5.4 Life-Cycle Cost Analysis (LCCA) -- 5.4.1 Energy Analysis -- 5.4.2 Economic Analysis -- 5.4.2.1 Operation and Maintenance Costs -- 5.4.2.2 Life-Cycle Savings -- 5.4.2.3 Simple Payback Period -- 5.4.3 Results -- 5.4.3.1 Internal Rate of Return (IRR) -- 5.4.4 Summary of Economic Analysis -- 5.5 Concluding Remarks -- References -- 6 Building-Integrated Photovoltaics (BIPV) for Cost-Effective Energy-Efficient Retrofitting…”
    Libro electrónico
  3. 4443
    Publicado 2000
    Tabla de Contenidos: “…The Real World: Flight Movements to and within Europe since 1985 -- 4.2 The Institutional World: From Schengen to Amsterdam -- 4.2.1 Freedom through Control: The 1985 White Paper and the Single European Act4.2.1 Freedom through Control: The 1985 White Paper and the Single European Act -- 4.2.2 L'Europe acceleree: Schengen4.2.2 L'Europe acceleree: Schengen -- 4.2.3 Trying to Catch Up: The European Political Cooperation -- 4.2.3.1 The Dublin Convention -- 4.2.3.2 The Draft External Border Convention -- 4.2.3.3 Enter Soft Law: The London Resolutions -- 4.2.3.4 Swapping Information: CIREA and CIREFI -- 4.2.4 Maastricht-Progress through Split Competencies? …”
    Libro electrónico
  4. 4444
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Part I Secure AI/ML Systems: Attack Models -- 1 Machine Learning Attack Models -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Notation -- 1.2.2 Support Vector Machines -- 1.2.3 Neural Networks -- 1.3 White-Box Adversarial Attacks -- 1.3.1 L-BGFS Attack -- 1.3.2 Fast Gradient Sign Method -- 1.3.3 Basic Iterative Method -- 1.3.4 DeepFool -- 1.3.5 Fast Adaptive Boundary Attack -- 1.3.6 Carlini and Wagner's Attack -- 1.3.7 Shadow Attack -- 1.3.8 Wasserstein Attack -- 1.4 Black-Box Adversarial Attacks -- 1.4.1 Transfer Attack -- 1.4.2 Score-Based Black-Box Attacks -- ZOO Attack -- Square Attack -- 1.4.3 Decision-Based Attack -- Boundary Attack -- HopSkipJump Attack -- Spatial Transformation Attack -- 1.5 Data Poisoning Attacks -- 1.5.1 Label Flipping Attacks -- 1.5.2 Clean Label Data Poisoning Attack -- Feature Collision Attack -- Convex Polytope Attack and Bullseye Polytope Attack -- 1.5.3 Backdoor Attack -- 1.6 Conclusions -- Acknowledgment -- Note -- References -- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-Generation Wireless Communications -- 2.1 Introduction -- 2.1.1 Scope and Background -- 2.2 Adversarial Machine Learning -- 2.3 Challenges and Gaps -- 2.3.1 Development Environment -- 2.3.2 Training and Test Datasets -- 2.3.3 Repeatability, Hyperparameter Optimization, and Explainability -- 2.3.4 Embedded Implementation -- 2.4 Conclusions and Recommendations -- References -- 3 Threat of Adversarial Attacks to Deep Learning: A Survey -- 3.1 Introduction -- 3.2 Categories of Attacks -- 3.2.1 White-Box Attacks -- FGSM-based Method -- JSMA-based Method -- 3.2.2 Black-Box Attacks -- Mobility-based Approach -- Gradient Estimation-Based Approach -- 3.3 Attacks Overview…”
    Libro electrónico
  5. 4445
    Publicado 2017
    Tabla de Contenidos: “…The horizontal and vertical blank -- Refresh rate -- Double buffering -- The back buffer -- VSync -- Triple buffering -- LCD monitors -- Time-based movement and animation -- Frame-based movement -- Time-based movement -- Summary -- Chapter 12: Best Practices -- Chapter overview -- Your objectives -- Learning fundamental code quality techniques -- Avoid magic numbers -- White space -- Indentation -- Blank lines and spaces -- Comments and self-documenting code -- Commenting -- Learning and understand the uses of the const keyword -- Const function parameters -- Const classes as parameters -- Const member functions -- Problems with const -- Learning how iteration can improve your game and code design -- The game development cycle -- Production phase -- Prototyping -- Playtesting -- Conducting a playtest -- Iteration -- Meeting milestones -- Learning when to use scripting in a game -- Introduction to assembly -- Moving to higher-level programming languages -- Introducing the compiler -- Introduction to scripting languages -- Using interpreters -- Just in time compilation -- Why use a scripting language? …”
    Libro electrónico
  6. 4446
    Publicado 2017
    Tabla de Contenidos: “…Implementing inventory -- Summary -- Chapter 10: Finalizing Java Knowledge to a Professional Level -- Java deep technologies -- Java agent -- Polyglot programming -- Polyglot configuration -- Polyglot scripting -- Business DSL -- Problems with polyglot -- Annotation processing -- Programming in the enterprise -- Static code analysis -- Source code version control -- Software versioning -- Code review -- Knowledge base -- Issue tracking -- Testing -- Types of tests -- Test automation -- Black box versus white box -- Selecting libraries -- Fit for the purpose -- License -- Documentation -- Project alive -- Maturity -- Number of users -- The -- Continuous integration and deployment -- Release management -- Code repository -- Walking up the ladder -- Summary -- Index…”
    Libro electrónico
  7. 4447
    Publicado 2017
    Tabla de Contenidos: “…Command and Control Part III: Advanced Channels and Data Exfiltration -- Notes on Intrusion Detection and the Security Operations Center -- The SOC Team -- How the SOC Works -- SOC Reaction Time and Disruption -- IDS Evasion -- False Positives -- Payload Delivery Part III: Physical Media -- A Whole New Kind of Social Engineering -- Target Location Profiling -- Gathering Targets -- The Attack -- Summary -- Exercises -- Chapter 4: Pharma Karma -- Background and Mission Briefing -- Payload Delivery Part IV: Client-Side Exploits 1 -- The Curse That Is Flash -- At Least You Can Live Without It -- Memory Corruption Bugs: Dos and Don'ts -- Reeling in the Target -- Command and Control Part IV: Metasploit Integration -- Metasploit Integration Basics -- Server Configuration -- Black Hats/White Hats -- What Have I Said About AV? -- Pivoting -- The Attack -- The Hard Disk Firewall Fail -- Metasploit Demonstration -- Under the Hood -- The Benefits of Admin -- Typical Subnet Cloning -- Recovering Passwords -- Making a Shopping List -- Summary -- Exercises -- Chapter 5: Guns and Ammo -- Background and Mission Briefing -- Payload Delivery Part V: Simulating a Ransomware Attack -- What Is Ransomware? …”
    Libro electrónico
  8. 4448
    Publicado 2013
    Tabla de Contenidos: “…-- IDEA #55: How social networks share knowledge -- IDEA #56: I'm in charge - check my paycheque -- IDEA #57: Great performance, but I regress -- IDEA #58: A bird in the hand is worth two in the bush -- IDEA #59: The hidden evil of stereotype threats -- IDEA #60: How to turn that black swan white -- IDEA #61: Kick the habit -- IDEA #62: The biology of risk-taking -- IDEA #63: Do you have a Pareto or a long tail? …”
    Libro electrónico
  9. 4449
    Publicado 2018
    Tabla de Contenidos: “…Reactive programming in Java -- Implementing the inventory -- Summary -- Chapter 10: Finalizing Java Knowledge to a Professional Level -- Java deep technologies -- Java agent -- Polyglot programming -- Polyglot configuration -- Polyglot scripting -- Business DSL -- Problems with polyglot -- Annotation processing -- Programming in the enterprise -- Static code analysis -- Source code version-control -- Software versioning -- Code review -- Knowledge base -- Issue tracking -- Testing -- Types of tests -- Test automation -- Black box versus white box -- Selecting libraries -- Fit for the purpose -- License -- Documentation -- An alive project -- Maturity -- Number of users -- The "I like it" factor -- Continuous integration and deployment -- Release management -- The code repository -- Walking up the ladder -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  10. 4450
    Publicado 2022
    Tabla de Contenidos: “…-- Beyond Diversity to Inclusion -- Chapter 4 Shifting to a Systemic Perspective -- Designing Some In, Others Out -- Size: Male, Style: White -- Cultural Levers: Disrupting Bias -- Charting Paths of Least Resistance -- Check. …”
    Libro electrónico
  11. 4451
    Publicado 2018
    Tabla de Contenidos: “…Nu ̃nez Pine Plantations and Invasion Alter Fuel Structure and Potential Fire Behavior in a Patagonian Forest-Steppe Ecotone Reprinted from: Forests 2018, 9, 117, doi: 10.3390/f9030117 97 -- Lei Fang, Jian Yang, Megan White and Zhihua Liu Predicting Potential Fire Severity Using Vegetation, -- Topography and Surface Moisture Availability in a Eurasian Boreal Forest Landscape Reprinted from: Forests 2018, 9, 130, doi: 10.3390/f9030130 113 -- Jean-No ̈el Candau, Richard A. …”
    Libro electrónico
  12. 4452
    Publicado 2024
    Tabla de Contenidos: “…8.2 Thou Shalt Remember That the Customer Is the One That Pays the Bills -- 8.3 Thou Shalt Never Stop Questioning Everything -- 8.4 Thou Shalt Never End the Improvement Process Because You Think that You Solved the Problem Early -- 8.5 Thou Shalt Always Be Available to Stakeholders, Responding Promptly to Inquiries -- 8.6 Thou Shalt Strive to Meet the Customer Demands Faster, Better, and Cheaper -- 8.7 Thou Shalt Recognize the Importance of the Entire Human Assets to the Process -- 8.8 Thou Shalt Ensure that Improvement Efforts Are Aligned with Corporate Missions and Strategy -- 9 Creating the Goal Statement -- 9.1 Goal Tree -- Part 3 Defining the Boundaries -- 10 Identification of the Supply Chain Partners -- 10.1 Stakeholder Analysis -- 10.2 Voice of the Customer -- 11 The Role of Cross-Functional Teams -- 11.1 Hawthorne Studies -- 11.2 Classical Workplace Teams -- 11.3 Empowered Workplace Teams -- 11.4 The Goal Tree -- 11.4.1 The Evaporating Cloud or Conflict Resolution -- 11.4.2 Mapping -- 11.4.3 Premortem -- 11.4.4 Solutions -- 11.4.5 Team Construction -- 12 Team Roles and Responsibilities -- 12.1 Senior Executive -- 12.2 Executive Committee -- 12.3 Champion (Project) -- 12.4 Process Owner -- 12.5 Master Black Belt -- 12.6 Black Belt -- 12.7 Green Belt -- 12.8 Yellow Belt -- 12.9 White Belt -- Part 4 Identification of the System Constraints -- 13 Establishing the Current Process State -- 13.1 Walk the Walk -- 13.2 Talk the Talk -- 13.3 Take the Gemba Walk -- 13.4 Gemba Walk Key Performance Indicators -- 13.5 The Next Step Upon Completion of the Gemba Walk -- 14 Determining the Future Process State -- 15 Determining the Gap Analysis -- 15.1 Steps to Complete the Gap Analysis -- Part 5 Elevate the System Constraints -- 16 Removing the Non-Value-Added Wastes -- 16.1 Definition of Waste -- 16.1.1 Non-Value-Added Waste #1: Overproduction…”
    Libro electrónico
  13. 4453
    Publicado 2020
    Tabla de Contenidos: “…Lessons from the Obama White House: how climate policy really gets done / Alice C. …”
    Libro electrónico
  14. 4454
    Publicado 2015
    Tabla de Contenidos: “…2.5 Threat: Transportation and service corridors -- 2.6 Threat: Biological resource use -- 2.6.1 Hunting -- 2.6.2 Guano harvesting -- 2.6.3 Logging and wood harvesting -- 2.7 Threat: Human disturbance - caving and tourism -- 2.8 Threat: Natural system modification - natural fire and fire suppression -- 2.9 Threat: Invasive species -- 2.9.1 Invasive species -- 2.9.2 White-nose syndrome -- 2.10 Threat: Pollution -- 2.10.1 Domestic and urban waste water -- 2.10.2 Agricultural and forestry effluents -- 2.10.3 Light and noise pollution -- 2.10.4 Timber treatments -- 2.11 Providing artificial roost structures for bats -- 2.12 Education and awareness raising -- 3. …”
    Libro electrónico
  15. 4455
    Publicado 2021
    Tabla de Contenidos: “…8.3 Self-driving algorithm -- 8.3.1 Fundamental driving functions -- White lane detection -- Signals -- 8.3.2 Signals -- Traffic signs -- Laneless driving -- 8.3.3 Hazards -- YOLO and detection of objects -- Collision avoidance -- Estimation of risk level for self-driving -- 8.3.4 Warning systems -- Driver monitoring -- Pedestrian hazard detection -- Sidewalk cyclists' detection -- 8.4 Deep reinforcement learning -- 8.4.1 Deep Q learning -- Learning rate -- Discount factor -- 8.4.2 Deep Q Network -- 8.4.3 Deep Q Network experimental results -- 8.4.4 Verification using robocar -- 8.5 Conclusion -- References -- Further reading -- 9. …”
    Libro electrónico
  16. 4456
    Publicado 2019
    Tabla de Contenidos: “…Sexism and Gender Bias in the Audio Industry "Opting out" of the conversation Sexual Harassment On motherhood On Age The Annenberg Study Recording Academy Task Force The Grammys and Recording Academy Class of 2019 Audio Engineering Society 2019 Chapter Two: Outreach: Organizations and Current Initiatives Pull Digital Audio Eco Feminism Erin Barra and Beats By Girlz (USA) Fun Facts: Ableton Live and Ableton Push Phebean Adedamola Oluwagbemi (Nigeria) Audio Girl Africa (Nigeria) Female Frequency (USA) Dani Mari (USA) I Am Snow Angel (USA) Women in Sound Zine and Madeleine Campbell (USA) Gender Amplified (USA) Ebonie Smith (USA) The Creator's Suite (USA) Abhita Austin (USA) Yorkshire Sound Women Network (England) International Women Working in Film Sound Women (United Kingdom) Terri Winston and Women's Audio Mission (USA) SoundGirls.org Chapter Three: Radio and Podcasts Careers in radio and podcasts Tools of the Trade: Radio Cathy Hughes (USA) Ann Charles (England) Ioana Barbu Caryl Owen (USA) Suraya Mohamed (USA) Lorna White (USA) Nadia Hassan-Garschagen (Germany) Podcasts Chapter Four: Sound for Television & Film Careers in Sound for Film and Television Feature Films and Documentaries Post Production Live Broadcast Tools of the Trade: Location Sound Tools of the Trade: Post Production for television and film Jan McLaughlin, CAS (USA) Judi Lee-Headman (England) Lori Dovi (USA) Ai-Ling Lee (Singapore) April Tucker (USA) Karol Urban, CAS (USA) Haniya Aslam (Pakistan) 'Lisa' Xiang Li (China) Sajida Khan (India) Catharine Wood (USA) Anna Bertmark (Sweden) Chapter Five: Music Recording and Electronic Music Careers in Music Recording and Electronic Music Electronic Music Pamela Z Suzanne Ciani Cecilia Wu (China) Producers Kay Huang (Taiwan) Elaine Martone (USA) Erica Brenner (USA) Linda Briceño (Venezuela) Virginia Read (Australia) Mastering Engineers Emily Lazar (USA) Jett Galindo (Philippines) Piper Payne (USA) Anna Frick (USA) Darcy Proper (USA) Fun facts: Vinyl Mastering Fun Facts: Loudness Wars Recording Engineers Lenise Bent (USA) Erin Tonkon (USA) Jill Zimmermann (Germany) Wendy Beines (Argentina) Other Women in Music Recording Chapter Six: Hardware and Software Design Careers in Hardware and Software Fun Facts: Make your own Audio Plugin with MATLAB Tools of the Trade: Hardware and Software Design Laurie Spiegel (USA) Carla Scaletti (USA) EveAnna Dauray Manley (USA) Marina Bosi (Italy) Erisa Sato (Japan) Elisabeth Löchen (France) Marie Louise Killick (England) Carol Bousquet (USA) Dawn Birr (USA) Other women in Hardware and Software Chapter Seven: Acoustics and Design Careers in Acoustics Tools of the Trade: Acoustics Fun Facts: Weighting Curves Jamie Angus-Whiteoak (England) Fun Facts: Spread Spectrum Elizabeth Cohen (USA) Samantha Weller (USA) Fun Facts: Ray Tracing Orla Murphy (Ireland) Fun Facts: Ear Training and Critical Listening Linda Gedemer (USA) Women in Acoustics Committee Chapter Eight: Live and Theater Sound Careers in Live Sound: Tools of the Trade: Live Sound Fun Facts: Safe Listening Levels Kathy Sander-Olhoeft (USA) Betty Cantor-Jackson (USA) Brandie Lane (USA) Karrie Keyes (USA) Michelle Sabolchick Pettinato (USA) Fela Davis Carolina Anton (Mexico) Leya Soraide (Bolivia) Tzu-Wei Peng (Taiwan) Jessica Paz (USA) Chapter Nine: Education A brief history of audio education Academic Standards Careers in Higher Education Education-related Volunteer and Non-Profit Work Tools of the Trade: Education Martha de Francisco (Columbia) Robin Coxe-Yeldham (USA) Theresa Leonard (Canada) Lisa Nigris (USA) Valeria Palomino (Mexico) Liz Dobson Cosette Collier (USA) Chapter Ten: Games, Immersive Sound, and Audio for Virtual, Augmented, and Mixed Reality Tools of the Trade: Game Sound Tools of the Trade: Immersive Audio Tools of the Trade: Binaural Audio Other tools Women in Game Sound: Industry Statistics Winifred Phillips (USA) Eiko Ishiwata (Canada) Ayako Yamauchi (Japan) Fun Facts: Ambisonics Emily Ridgeway (Australia) Fun Facts: Head Related Transfer Functions Khris Brown (USA) Fun Facts: TASCAM Portastudio Pam Aronoff (USA) Fun Facts: Wwise Anastasia Devana (Russia) Fun Facts: Virtual, Augmented, and Mixed Reality Victoria Dorn (USA) Sally Kellaway (Australia) Fei Yu (China) About the Author Glossary Recommended Reading Appendix 1 Appendix 2…”
    Libro electrónico
  17. 4457
    por Wolgemuth, Jennifer R.
    Publicado 2024
    Tabla de Contenidos: “…Narrative Fiction as Feminist Refusal: A Utopian Short Story of Lactation in Education -- References -- Methodologies in Action Part -- Making Sense through Letter Writing -- References -- Chapter 8: The Logic of Peace: Practical Lessons from Thematic Analysis and Meditations -- Instrumental Value and Intrinsic Value -- What Meditation Means to Me -- What Thematic Analysis Means to Me -- Practical Lessons Derivable from the Methodologies of Thematic Analysis and Meditation -- References -- Methodologies in Action -- Creative Silence and 'Theme Jumping': Meditation as Thematic Analysis -- References -- Chapter 9: Getting Mixed Up: Arts-Based, Contemplative, and Generative Approaches to Thematic Analysis -- Situating Contemplative Practices -- Context and Insight Building -- The Process -- And So It Is -- References -- Methodologies in Action -- Deliberate Reflections: Unveiling Identities and Insights through Contemplative Data Analysis in Autoethnography -- Contemplation in (Autoethnographic) Action -- Note -- References -- Chapter 10: Recurring Languaging Practices as 'Themes' -- An EMCA Perspective on Analyzing Recurrence -- A Theory of Language as Action and Methodological Practices -- Approach -- Data and Example -- Conclusions -- References -- Appendix A -- Jeffersonian Transcription Symbols -- Methodologies in Action -- Applying Ubuntu in Thematic Analysis for Exploring Black Student Experiences at a Predominately White Institution -- References -- Chapter 11: Composing Poems: Using Poetry as Qualitative Data Analysis -- Poetic Inquiry -- Poetic Inquiry as Data Analysis -- Poetic Portraits as Poetic Analysis -- Poetic Analysis Example -- Using Poetic Analysis -- References -- Methodologies in Action -- Poetry as Thematic Analysis -- References -- Chapter 12: I Have Hated Analysis: Poetic Thematic Analysis…”
    Libro electrónico
  18. 4458
    Publicado 2016
    Tabla de Contenidos: “…-- Further Forensic Investigation -- Gathering Data -- Summarizing My Findings -- Fake FPGAs -- The White Screen Issue -- Incorrect ID Codes -- The Solution -- Closing Thoughts -- part 3: what open hardware means to me -- Chapter 6. the story of chumby -- A Hacker-Friendly Platform -- Evolving chumby -- A More Hackable Device -- Hardware with No Secrets -- The End of Chumby, New Adventures -- Why the Best Days of Open Hardware Are Yet to Come -- Where We Came From: Open to Closed -- Where We Are: "Sit and Wait" vs. …”
    Libro electrónico
  19. 4459
    Publicado 2021
    Tabla de Contenidos: “…Summary -- Pop quiz - variables and methods -- Chapter 4: Control Flow and Collection Types -- Selection statements -- The if-else statement -- Using the NOT operator -- Nesting statements -- Evaluating multiple conditions -- The switch statement -- Pattern matching -- Fall-through cases -- Pop quiz 1 - if, and, or but -- Collections at a glance -- Arrays -- Indexing and subscripts -- Range exceptions -- Lists -- Accessing and modifying lists -- Dictionaries -- Working with dictionary pairs -- Pop quiz 2 - all about collections -- Iteration statements -- for loops -- foreach loops -- Looping through key-value pairs -- while loops -- To infinity and beyond -- Summary -- Chapter 5: Working with Classes, Structs, and OOP -- Introducing OOP -- Defining classes -- Instantiating class objects -- Adding class fields -- Using constructors -- Declaring class methods -- Declaring structs -- Understanding reference and value types -- Reference types -- Value types -- Integrating the object-oriented mindset -- Encapsulation -- Inheritance -- Base constructors -- Composition -- Polymorphism -- Applying OOP in Unity -- Objects are a class act -- Accessing components -- Accessing components in code -- Drag and drop -- Summary -- Pop quiz - all things OOP -- Chapter 6: Getting Your Hands Dirty with Unity -- A game design primer -- Game design documents -- The Hero Born one-page -- Building a level -- Creating primitives -- Thinking in 3D -- Materials -- White-boxing -- Editor tools -- Hero's trial - putting up drywall -- Keeping the hierarchy clean -- Working with Prefabs -- Lighting basics -- Creating lights -- Light component properties -- Animating in Unity -- Creating animations in code -- Creating animations in the Unity Animation window -- Recording keyframes -- Curves and tangents -- Summary -- Pop quiz - basic Unity features…”
    Libro electrónico
  20. 4460
    por Wagstaff, Jo
    Publicado 2024
    Tabla de Contenidos: “…-- The gift and challenge of being a mum -- Perimenopause and menopause -- The reality of a patriarchal, white-privileged and outwardly focused society -- #metoo -- Workplace gender bias -- Moving forward -- Good enough -- Changing our template -- Part II Care for yourself -- Chapter 5 The challenge and gift of being our own best friend -- Becoming our own best friend with self-compassion -- Learning to love myself -- But isn't it just self-indulgence? …”
    Libro electrónico