Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,383
- Application software 1,224
- Microsoft .NET Framework 806
- Management 671
- Engineering & Applied Sciences 599
- Web site development 516
- Taxation 482
- Computer Science 473
- Java (Computer program language) 407
- Law and legislation 385
- Computer networks 337
- Economics 330
- Design 329
- Computer programming 326
- Artificial intelligence 318
- Computer software 316
- Microsoft software 312
- Security measures 308
- Web sites 308
- JavaScript (Computer program language) 306
- Python (Computer program language) 300
- Web applications 293
- Computer security 291
- Information technology 272
- Data processing 264
- Programming 261
- Cloud computing 258
- Computer programs 252
- Economic conditions 242
- History 238
-
14961por Cooper, Peter. author“…By the end of the book, in addition to in-depth knowledge of Ruby, you'll also have basic understanding of many ancillary technologies such as SQL, XML, web frameworks, and networking. Introduces readers to the Ruby programming language Takes readers from basic programming skills to web development with topics like Ruby-based frameworks and GUI programming Covers many ancillary technologies in order to provide a broader picture (e.g., databases, XML, network daemons)…”
Publicado 2009
Libro electrónico -
14962Publicado 2016Tabla de Contenidos: “…5.8 Isotopomer Labeling Balances -- 5.9 Simulating an Isotope Labeling Experiment -- 5.10 Isotopic Steady State -- 5.11 Flux Identifiability -- 5.12 Measurement Models -- 5.13 Statistical Considerations -- 5.14 Experimental Design -- 5.15 Exchange Fluxes -- 5.16 Multidimensional Flux Identifiability -- 5.17 Multidimensional Flux Estimation -- 5.18 The General Parameter Fitting Procedure -- 5.19 Multidimensional Statistics -- 5.20 Multidimensional Experimental Design -- 5.21 The Isotopically Nonstationary Case -- 5.22 Some Final Remarks on Network Specification -- 5.23 Algorithms and Software Frameworks for 13C MFA -- Glossary -- References -- 6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
14963Publicado 2018Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Preface -- Notation -- About the Authors -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 Threats, Attacks, and Assets -- 1.3 Security Functional Requirements -- 1.4 Fundamental Security Design Principles -- 1.5 Attack Surfaces and Attack Trees -- 1.6 Computer Security Strategy -- 1.7 Standards -- 1.8 Key Terms, Review Questions, and Problems -- Part One Computer Security Technology and Principles -- Chapter 2 Cryptographic Tools -- 2.1 Confidentiality with Symmetric Encryption -- 2.2 Message Authentication and Hash Functions -- 2.3 Public-Key Encryption -- 2.4 Digital Signatures and Key Management -- 2.5 Random and Pseudorandom Numbers -- 2.6 Practical Application: Encryption of Stored Data -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 User Authentication -- 3.1 Digital User Authentication Principles -- 3.2 Password-Based Authentication -- 3.3 Token-Based Authentication -- 3.4 Biometric Authentication -- 3.5 Remote User Authentication -- 3.6 Security Issues for User Authentication -- 3.7 Practical Application: An Iris Biometric System -- 3.8 Case Study: Security Problems for ATM Systems -- 3.9 Key Terms, Review Questions, and Problems -- Chapter 4 Access Control -- 4.1 Access Control Principles -- 4.2 Subjects, Objects, and Access Rights -- 4.3 Discretionary Access Control -- 4.4 Example: UNIX File Access Control -- 4.5 Role-Based Access Control -- 4.6 Attribute-Based Access Control -- 4.7 Identity, Credential, and Access Management -- 4.8 Trust Frameworks -- 4.9 Case Study: RBAC System for a Bank -- 4.10 Key Terms, Review Questions, and Problems -- Chapter 5 Database and Data Center Security -- 5.1 The Need for Database Security -- 5.2 Database Management Systems -- 5.3 Relational Databases -- 5.4 SQL Injection Attacks…”
Libro electrónico -
14964por Bovenkerk, BerniceTabla de Contenidos: “…12.4 Philosophers and Animal Husbandry -- 12.5 Animal Husbandry and Animal Activism -- 12.6 The Eclipse of Husbandry and the Rise of Narcissism -- 12.7 Conclusion -- References -- 13 Reimagining Human Responsibility Towards Animals for Disaster Management in the Anthropocene -- 13.1 Introduction -- 13.2 Animal Disaster Ethics: Developing Disaster Frameworks -- 13.3 Animal Disaster Ethics: Revealing Animal Vulnerabilities -- 13.4 Animal Disaster Management: A Reimagining -- 13.5 Animal Disaster Management: Humanitarian Impulse and Animal Welfare Science -- 13.6 Animal Disaster Management: Aims and Recommendations for Ethically Responsible Caretaking -- 13.7 Recommendations -- References -- 14 The Decisions of Wannabe Dog Keepers in the Netherlands -- 14.1 Introduction -- 14.2 Animal Ethicists' Views on Dog Ownership -- 14.3 Pedigree Pups -- 14.4 Pups Without Pedigree -- 14.5 Shelter Dogs -- 14.6 Discussion -- References -- 15 Comment: Animals in 'Non-Ideal Ethics' and 'No-Deal Ethics' -- 15.1 Non-ideal Animal Ethics and the Meat Industry -- 15.2 Non-ideal Animal Ethics and Disaster Management -- 15.3 Non-ideal Ethics and Ethnographic Animal Studies -- 15.4 Towards a No-Deal Animal Ethics -- References -- Part III Urban Animals -- 16 Stray Agency and Interspecies Care: The Amsterdam Stray Cats and Their Humans -- 16.1 Introduction -- 16.2 The Amsterdam Stray Cat Foundation -- 16.3 Degrees of Agency -- 16.4 Networks of Care -- 16.5 Cat Politics -- 16.5.1 Stray Cat Rights -- 16.5.2 Democratic Agency -- 16.6 Cat-Human Relations at the SAZ as a Model for Future Interactions -- 16.6.1 Ecologies of Care -- 16.6.2 Sharing the City -- 16.6.3 Interspecies Resistance as the Foundation for New Relations -- References -- 17 "Eek! …”
Publicado 2021
Libro electrónico -
14965Publicado 2017Tabla de Contenidos: “…Front Cover -- Quantum Inspired Computational Intelligence: Research and Applications -- Copyright -- Dedication -- Contents -- List of Contributors -- About the Editors -- Foreword -- Preface -- Acknowledgments -- Part I : Research -- Chapter 1: Quantum neural computation of entanglement is robust to noise and decoherence -- 1 Introduction and Literature Background -- 2 Dynamic Learning of an Entanglement Indicator -- 3 Learning with Noise -- 4 Decoherence -- 5 Noise Plus Decoherence -- 6 Conclusions -- Acknowledgments -- References -- Chapter 2: Quantum computing and supervised machine learning: Training, model selection, and error estimation -- 1 Introduction -- 2 The Supervised Learning Problem: Training, Model Selection, and Error Estimation -- 3 Classical and Quantum Computing -- 3.1 Classical Computing -- 3.2 Quantum Computing -- 4 Quantum Computing for Training -- 4.1 Bounded Loss Functions -- 4.1.1 Example: The problems behind the convex relaxation -- 4.2 Energy-Efficient Models -- 4.3 Sparse Solutions -- 4.4 Gibbs and Bayes Classifiers -- 5 Quantum Computing for Model Selection and Error Estimation -- 5.1 Out-of-Sample Methods: Hold-Out, Cross Validation, and Bootstrap -- 5.2 Vapnik-Chervonenkis Theory -- 5.3 (Local) Rademacher Complexity Theory -- 5.4 PAC-Bayes Theory -- 5.4.1 Algorithmic stability -- 5.4.2 Compression bound -- 6 Conclusions -- References -- Chapter 3: Field computation: A framework for quantum-inspired computing -- 1 Introduction -- 2 Fields -- 3 Field computation -- 4 Derivatives of Field Transformations -- 5 Examples of Field Computation -- 5.1 Neural Network-Style Computation -- 5.2 Discrete Basis Function Networks -- 5.3 Continua of Basis Functions -- 5.4 Approximations of Spatial Integration and Differentiation -- 5.5 Iterative Field Computation -- 5.6 Field Differential Equations…”
Libro electrónico -
14966Publicado 2018Tabla de Contenidos: “…7.3.4 Conjugated Microporous Polymers (CMPs) -- 7.3.5 Hyper-Cross-Linked Polymers (HCPs) -- 7.3.6 Porous Aromatic Frameworks (PAFs) -- 7.4 Composite Materials Made by Polymeric Matrix -- 7.4.1 Composite Poly(Amide-Amine) (PAMAM) -- 7.4.2 Polymer-Dispersed Metal Hydrides (PDMHs) -- 7.4.3 Mn Oxide Anchored to a Polymeric Matrix -- 7.5 Waste and Natural Materials -- 7.6 Conclusions -- References -- 8 Beneficial Effects of Graphene on Hydrogen Uptake and Release from Light Hydrogen Storage Materials -- 8.1 Introduction -- 8.2 General Aspects of Graphene -- 8.2.1 Synthesis of Graphene -- 8.2.1.1 Mechanical Cleavage of Highly Oriented Pyrolytic Graphite -- 8.2.1.2 Chemical Vapor Deposition -- 8.2.1.3 Chemical and Thermal Exfoliation of Graphite Oxide -- 8.2.1.4 Arc Discharge Method -- 8.2.2 Graphene as a Beneficial Additive for HS Materials -- 8.3 Beneficial Effect of Graphene: Key Results with Light Metal Hydrides (e.g., LiBH4, NaAlH4, MgH2) -- 8.3.1 Borohydrides (Tetrahydroborate) as HS Material -- 8.3.1.1 Effect of Graphene on Desorption Properties of LiBH4 -- 8.4 Alanates as HS Materials -- 8.4.1 Effect of Graphene on Sorption Behavior of NaAlH4 -- 8.4.2 Carbon Nanomaterial-Assisted Morphological Tuning of NaAlH4 to Improve Thermodynamics and Kinetics -- 8.5 Magnesium Hydride as HS Material -- 8.5.1 Catalytic Effect of Graphene on Sorption Behavior of Mg/MgH2 -- 8.5.2 Nanoparticles Templated Graphene as an Additive for MgH2 -- 8.6 Summary and Future Prospects -- Acknowledgment -- References -- 9 Hydrogen Adsorption on Nanotextured Carbon Materials -- 9.1 Introduction -- 9.1.1 Essential Features of Hydrogen Adsorption on Porous Carbon Materials -- 9.1.2 Measurement of the Hydrogen Storage Capacity -- 9.1.3 Excess, Absolute and Total Hydrogen Adsorption -- 9.2 Hydrogen Storage in Carbon Materials -- 9.2.1 Activated Carbons -- 9.2.2 Carbon Nanomaterials…”
Libro electrónico -
14967Publicado 2023Tabla de Contenidos: “…-- 1.3 The Continuous Strategic High Productivity Improvement -- 1.3.1 Estrangement Results between Company Health and Just Synchronous Operations -- 1.3.2 Changing from Synchronous Operations to Synchronous Profitable Operations -- 1.3.3 Synchronous Profitable Operations Should be Continuously Enhanced -- 1.3.4 The Crucial Role of Strategic Productivity Improvement -- 1.4 The Potential for Profitability Increases Based on Productivity -- 1.5 Targeting the Strategic High Productivity Improvement -- 1.6 The New Approach to Strategic Systematic Improvements -- 1.7 The Strategic Kaizen for Synchronous Profitable Operations -- 1.7.1 The Concept -- 1.7.2 The Basic Image -- 1.7.3 The Seven Basic Processes -- 1.7.4 Five Problems Targeted to Be Solved -- 1.8 Conclusion -- References -- Chapter 2 Current Condition, Basic Policy, and Strategy -- 2.1 Studying the Impact of Current Strategies on Operations and Lowering Costs -- 2.2 Deep Understanding of the Company's Key External Factors -- 2.3 Internal Strategic Capabilities -- 2.4 Current Business Performance Against Expectations -- 2.4.1 Operational and Financial Performance -- 2.4.2 Current Level of Synchronous Profitable Operations -- 2.5 The Basic Policy Framework for Strategic Kaizen -- 2.5.1 At the Cutting Edge: Identifying Strategic Drivers -- 2.5.2 Two Productivity Improvement Scenarios -- 2.5.3 The Strategic Intent of Each Strategic Drivers -- 2.6 Winning Key Strategies…”
Libro electrónico -
14968Publicado 2015Tabla de Contenidos: “…-- 1.4.2 Prerequisites -- 1.4.3 Postrequisites -- 1.5 Getting Started -- 1.6 Key Success Factors for Systems Engineers in Reliability, Maintainability, and Supportability Engineering -- 1.6.1 Customer-Supplier Relationships -- 1.6.2 Language and Clarity of Communication -- 1.6.3 Statistical Thinking -- 1.7 Organizing a Course Using this Book -- 1.7.1 Examples -- 1.7.2 Exercises -- 1.7.3 References -- 1.8 Chapter Summary -- References -- Chapter 2 Reliability Requirements -- 2.1 What to Expect from this Chapter -- 2.2 Reliability for Systems Engineers -- 2.2.1 "Reliability" in Conversation -- 2.2.2 "Reliability" in Engineering -- 2.2.3 Foundational Concepts -- 2.2.4 Reliability Concepts for Systems Engineers -- 2.2.5 Definition of Reliability -- 2.2.6 Failure Modes, Failure Mechanisms, and Failure Causes -- 2.2.7 The Stress-Strength Model -- 2.2.8 The Competing Risk Model -- 2.3 Reliability, Maintainability, and Supportability are Mutually Reinforcing -- 2.3.1 Introduction -- 2.3.2 Mutual Reinforcement -- 2.4 The Structure of Reliability Requirements -- 2.4.1 Reliability Effectiveness Criteria -- 2.4.2 Reliability Figures of Merit -- 2.4.3 Quantitative Reliability Requirements Frameworks…”
Libro electrónico -
14969Publicado 2024Tabla de Contenidos: “…6.2.2 Challenges and Opportunities in Implementing Smart Hospital Solutions -- 6.3 Foundations of Blockchain Technology -- 6.4 Literature Survey -- 6.5 Integration of Blockchain in Healthcare -- 6.5.1 Use Cases of Blockchain in Healthcare -- 6.5.2 Improving Data Interoperability and Integrity -- 6.5.3 Enhancing Security and Privacy in Healthcare Transactions -- 6.6 Digital Twin Technology in Smart Hospitals -- 6.6.1 Applications of Digital Twins in Healthcare -- 6.6.2 Synergies Between Blockchain and Digital Twin Technologies -- 6.7 Benefits and Challenges -- 6.7.1 Benefits -- 6.7.2 Challenges and Considerations -- 6.8 Building A Connected Ecosystem -- 6.8.1 Role of Blockchain in Creating A Connected Healthcare Ecosystem -- 6.8.2 Interoperability and Data Exchange in Smart Hospitals -- 6.8.3 Collaborative Approaches for Ecosystem Development -- 6.9 Regulatory Considerations -- 6.9.1 Compliance and Legal Aspects in Implementing Blockchain in Healthcare -- 6.9.2 Future Regulatory Trends and Implications -- 6.10 Case Study -- 6.11 Future Trends and Innovation -- 6.12 Conclusion -- References -- Chapter 7 Blockchain for Edge Association in Digital Twin Empowered 6G Networks -- 7.1 Introduction -- 7.1.1 Background and Motivation -- 7.1.2 Scope -- 7.2 Digital Twin Technology -- 7.2.1 Fundamentals -- 7.2.2 Utilization in 6G Networks -- 7.2.3 Obstacles and Opportunities -- 7.3 Edge Computing in 6G Networks -- 7.3.1 Edge Computing - An Overview -- 7.3.2 Edge Computing's Significance in 6G Networks -- 7.3.3 Opportunities -- 7.4 The Blockchain Technology -- 7.4.1 Essential Elements of Blockchain -- 7.4.2 Blockchain Use Cases in Telecommunications -- 7.4.3 Edge Association in 6G Networks - An Initiative -- 7.5 Blockchain, Digital Twin, and Edge Computing Integration -- 7.5.1 Theoretical Framework -- 7.5.2 Schematic Requirements…”
Libro electrónico -
14970Publicado 2013Tabla de Contenidos: “…11.2 Volatility smiles and skews -- 11.3 The VIX -- 11.4 Value profiles prior to maturity -- 11.5 How options behave - the Greeks -- 11.6 Delta hedging -- 12 Options - from building blocks to portfolios -- 12.1 The building block approach -- 12.2 Option spreads - vertical, horizontal and diagonal -- 12.3 Volatility structures -- 12.4 Range structures -- 12.5 Arbitrage structures -- 13 Options - interest rate and exotic options -- 13.1 Why interest rate options are different -- 13.2 Caps, floors and collars -- 13.3 Swaptions -- 13.4 Cancellable and extendible swaps -- 13.5 Pricing interest rate options -- 13.6 Compound options -- 13.7 Exotic options -- 13.8 Path-dependent options -- 13.9 Digital options -- 13.10 Multivariate options -- 13.11 Other exotic options -- 13.12 Pricing exotic options -- 13.13 Price comparisons between exotic options -- 13.14 Embedded options -- 14 Introducing credit derivatives -- 14.1 Development of the credit derivatives market -- 14.2 Motivations for using credit derivatives -- 14.3 Introducing credit default swaps (CDS) -- 14.4 Market conventions -- 14.5 Credit events and determination committees -- 14.6 Capital structure, recovery rates, reference and deliverable obligations -- 14.7 Settlement methods and auctions -- 14.8 Other aspects of CDS -- 15 CDS pricing and credit indices -- 15.1 A simple CDS pricing model -- 15.2 Obtaining default probabilities -- 15.3 Developing a multi-period framework -- 15.4 The ISDA CDS Standard Model -- 15.5 Bootstrapping default probabilities -- 15.6 Calculating up-front payments -- 15.7 Mark-to-market and CDS valuation -- 15.8 PV01 and SDV01 -- 15.9 How credit indices developed -- 15.10 The CDX and iTraxx credit indices -- 15.11 Market quotations and statistics -- 15.12 Other credit indices -- 15.13 Index tranches -- Part II Techniques -- 16 Applications for financial engineering…”
Libro electrónico -
14971Publicado 2017Tabla de Contenidos: “…4.6.3 General Diagram Features -- 4.6.3.1 Views -- 4.6.3.2 Diagram Frame and Header -- 4.6.3.3 Diagram Kind -- 4.6.3.4 Namespace -- 4.6.3.5 Comments -- 4.6.3.6 Constraints -- 5 Questions for Chapter 4 -- Answers for Chapter 4 -- 6 Objects and Classes -- 6.1 Finding Objects and Classes -- 6.1.1 Attributes -- 6.1.2 Operations -- 6.1.3 Referring to a Member Feature -- 6.1.4 Static Features -- 6.2 Types -- 6.2.1 Class Versus Datatype -- 6.2.2 Primitive Types -- 6.2.3 Enumerations -- 6.2.4 DataTypes -- 6.2.4.1 Abstraction -- 6.3 Modifiers -- 6.3.1 Derived Properties -- 6.3.2 Default Value -- 6.3.2.1 Default Values for Attributes/Properties -- 6.3.2.2 Default Values for Arguments/Parameters -- 6.3.3 Protecting from Change -- 6.3.3.1 ReadOnly -- 6.3.3.2 Queries -- 6.3.4 Parameter Direction -- 6.4 Assigning Value -- 6.4.1 Literals -- 6.4.2 Instance Specifications -- 6.4.3 Expressions -- 7 Questions for Chapter 6 -- Answers for Chapter 6 -- 8 Packages and Namespaces -- 8.1 Package Notation -- 8.1.1 Packages and Their Contents -- 8.1.2 Diagrams of Packages -- 8.1.3 Uniform Resource Identifiers -- 8.2 Packages and Visibility -- 8.2.1 Package Member Visibility -- 8.2.2 Inner and Outer Names -- 8.2.3 Namespaces and Distinguishable Names -- 8.3 Packages and Their Contents -- 8.3.1 Package Dependencies -- 8.3.2 Specific Elements from Other Packages -- 8.3.2.1 Package Import -- 8.3.2.2 Element Import -- 8.3.2.3 Comparison of Package vs Element Import -- 8.3.2.4 Access -- 8.3.2.5 Package Dependencies and Cycles -- 8.3.2.6 Package Merge -- 8.4 Package Stereotypes -- 8.4.1 Packages and Models -- 8.4.2 Miscellaneous Stereotypes of Packages -- 8.4.2.1 ModelLibrary -- 8.4.2.2 Framework -- 8.4.2.3 Profiles -- 8.4.2.4 Diagrams -- 9 Questions for Chapter 8 -- Answers for Chapter 8 -- 10 Finishing the Static Model -- 10.1 Multiplicity…”
Libro electrónico -
14972por Lens, PietTabla de Contenidos: “…Intro -- Cover -- Contents -- Preface -- List of Contributors -- Part 1: Process Fundamentals -- Chapter 1 : Algal systems for resource recovery from waste and wastewater -- 1.1 Process Fundamentals -- 1.2 Algal-Based Wastewater Treatment -- 1.3 Valorization of Algal Biomass by Integrating with Different Technologies -- 1.4 Algal Biotechnology -- References -- Chapter 2 : Metabolic modelling of microalgae for wastewater treatment -- 2.1 Introduction -- 2.2 Main Metabolic Pathways -- 2.2.1 Photosynthesis -- 2.2.2 Glycolysis and pentose phosphate pathway -- 2.2.3 Tricarboxylic acid cycle -- 2.2.4 Glyoxylate shunt -- 2.2.5 Lipid biosynthesis -- 2.3 Genome-Scale Metabolic Models -- 2.4 Modelling Metabolic Networks -- 2.5 Tools for Steady-State Conditions -- 2.5.1 Elementary flux modes -- 2.5.1.1 Mathematical construction of EFMs -- 2.5.1.2 Minimal generating sets and EFM reduction -- 2.5.2 Flux balance analysis -- 2.6 Metabolic Networks Reduction -- 2.6.1 The DRUM framework -- 2.7 Case Study: Microalgae Cultivation -- 2.7.1 Introduction: volatile fatty acid -- 2.7.2 Determination of the subnetworks and accumulating metabolites -- 2.7.3 Derivation of MR -- 2.7.4 Choice of kinetic model -- 2.7.5 Model calibration and validation -- 2.7.6 Example of application: optimization of waste treatment time -- 2.8 Conclusion -- References -- Chapter 3 : Wastewater treatment using microalgal-bacterial consortia in the photo-activated sludge process -- 3.1 Microalgal-Bacterial Consortia -- 3.1.1 Use of microalgal-bacterial consortia in environmental technologies -- 3.1.2 Interactions within microalgal-bacterial consortia -- 3.1.3 Nutrient removal by microalgal-bacterial consortia -- 3.1.4 Microalgal-bacterial systems and configurations…”
Publicado 2023
Libro electrónico -
14973Publicado 2012Tabla de Contenidos: “…137 -- 5.7.2 Historical Perspective 137 -- Bibliography 138 -- 6 IP-Based Tactical Waveforms and the GIG 141 -- 6.1 Tactical GIG Notional Architecture 141 -- 6.2 Tactical GIG Waveforms 144 -- 6.2.1 Wide-Area Network Waveform (WNW) 144 -- 6.2.2 Soldier Radio Waveform (SRW) 163 -- 6.2.3 High-Band Networking Waveform (HNW) 164 -- 6.2.4 Network Centric Waveform (NCW) 165 -- 6.3 The Role of Commercial Satellite in the Tactical GIG 166 -- 6.4 Satellite Delay Analysis 166 -- 6.5 Networking at the Tactical GIG 169 -- 6.6 Historical Perspective 170 -- Bibliography 173 -- 7 Cognitive Radios 177 -- 7.1 Cognitive Radios and Spectrum Regulations 177 -- 7.2 Conceptualizing Cognitive Radios 180 -- 7.2.1 Cognitive Radio Setting (CRS) Parameters 180 -- 7.2.2 The Cognitive Engine 181 -- 7.3 Cognitive Radios in Tactical Environments 183 -- 7.4 Software Communications Architecture (SCA) 184 -- 7.4.1 The SCA Core Framework 185 -- 7.4.2 SCA Definitions 185 -- 7.4.3 SCA Components 186 -- 7.4.4 SCA and Security Architecture 188.…”
Libro electrónico -
14974Publicado 2023Tabla de Contenidos: “…Front Cover -- Handbook of Metaheuristic Algorithms -- Copyright -- Contents -- List of figures -- List of tables -- List of algorithms -- List of listings -- About the authors -- Chun-Wei Tsai (1978-) -- Ming-Chao Chiang (1956-) -- Preface -- Part 1 Fundamentals -- 1 Introduction -- 1.1 Why metaheuristic algorithms -- 1.2 Organization of this book -- 2 Optimization problems -- 2.1 Problem definition -- 2.2 Combinatorial optimization problems -- 2.2.1 The one-max and 0-1 knapsack problems -- 2.2.2 The B2D and deceptive problems -- 2.2.3 The traveling salesman problem (TSP) -- 2.3 Continuous optimization problems -- 2.3.1 The single-objective optimization problem -- 2.3.2 The multi-objective optimization problem -- 2.4 Summary -- 3 Traditional methods -- 3.1 Exhaustive search (ES) -- 3.1.1 The basic idea of ES -- 3.1.2 Implementation of ES for the one-max problem -- 3.1.3 Discussion of ES -- 3.2 Hill climbing (HC) -- 3.2.1 The basic idea of HC -- 3.2.2 Implementation of HC for the one-max problem -- 3.2.2.1 Main function -- 3.2.2.2 Search function of HC -- 3.2.2.2.1 Declaration of parameters and functions -- 3.2.2.2.2 The main loop -- 3.2.2.2.3 Additional functions -- 3.2.2.3 Library function -- 3.2.3 Discussion of HC -- 3.3 Comparisons between ES and HC -- 3.3.1 Simulation results of ES and HC for the one-max problem -- 3.3.2 Simulation results of ES and HC for the deceptive problem -- 3.4 Summary of ES and HC -- Supplementary source code -- 4 Metaheuristic algorithms -- 4.1 What is a metaheuristic algorithm? -- 4.2 A unified framework for metaheuristic algorithms -- 4.3 Comparisons of metaheuristics with exhaustive and greedy search -- 5 Simulated annealing -- 5.1 The basic idea of simulated annealing (SA) -- 5.2 Implementation of SA for the one-max and deceptive problems -- 5.2.1 Declaration of functions and parameters -- 5.2.2 The main loop…”
Libro electrónico -
14975por Amico, Alissa“…Corporate governance frameworks in the Middle East and North Africa region have undergone a substantial evolution in the past decade. …”
Publicado 2014
Capítulo de libro electrónico -
14976por Organisation for Economic Co-operation and Development.“…This can be especially helpful for countries with no existing WoE frameworks or those looking to augment their approaches. …”
Publicado 2019
Libro electrónico -
14977por Organisation for Economic Co-operation and Development.“…Governments themselves have an important role in adjusting the legal and regulatory frameworks. These frameworks cover a range of policy areas (employment, culture, legal, etc.), usually addressed by separate ministries and agencies. …”
Publicado 1996
Capítulo de libro electrónico -
14978por Organisation for Economic Co-operation and Development“…The OECD Corporate Governance Factbook provides easily accessible and up-to-date information on the institutional, legal and regulatory frameworks for corporate governance across 49 jurisdictions worldwide. …”
Publicado 2023
Libro electrónico -
14979Publicado 2010“…Readers will find several papers that address high-level issues in the use of technology in education, for example architecture and design frameworks for building online education materials or tools. …”
Libro electrónico -
14980Publicado 2023“…The use of advanced and scalable algorithms, along with parallel programming frameworks and high-performance computers, is commonly used to solve Big Data problems and obtain valuable information and learning processes in a reasonable time. …”
Libro electrónico