Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19981Publicado 2018Tabla de Contenidos: “…Contents -- List of Contributors xiii -- Preface xv -- About the Companion Website xix -- Part I Analysis and Synthesis of Spatial Sound 1 -- Time–Frequency Processing: Methods and Tools 3 /Juha Vilkamo and Tom Ba¨ckstro¨m -- 1.1 Introduction 3 -- 1.2 Time–Frequency Processing 4 -- 1.2.1 Basic Structure 4 -- 1.2.2 Uniform Filter Banks 5 -- 1.2.3 Prototype Filters and Modulation 6 -- 1.2.4 A Robust Complex-Modulated Filter Bank, and Comparison with STFT 8 -- 1.2.5 Overlap-Add and Windowing 12 -- 1.2.6 Example Implementation of a Robust Filter Bank in Matlab 13 -- 1.2.7 Cascaded Filters 15 -- 1.3 Processing of Spatial Audio 16 -- 1.3.1 Stochastic Estimates 17 -- 1.3.2 Decorrelation 18 -- 1.3.3 Optimal and Generalized Solution for Spatial Sound Processing Using Covariance Matrices 19 -- References 23 -- 2 Spatial Decomposition by Spherical Array Processing 25 /David Lou Alon and Boaz Rafaely -- 2.1 Introduction 25 -- 2.2 Sound Field Measurement by a Spherical Array 26 -- 2.3 Array Processing and Plane-Wave Decomposition 26 -- 2.4 Sensitivity to Noise and Standard Regularization Methods 29 -- 2.5 Optimal Noise-Robust Design 32 -- 2.5.1 PWD Estimation Error Measure 32 -- 2.5.2 PWD Error Minimization 34 -- 2.5.3 R-PWD Simulation Study 35 -- 2.6 Spatial Aliasing and High Frequency Performance Limit 37 -- 2.7 High Frequency Bandwidth Extension by Aliasing Cancellation 39 -- 2.7.1 Spatial Aliasing Error 39 -- 2.7.2 AC-PWD Simulation Study 40 -- 2.8 High Performance Broadband PWD Example 42 -- 2.8.1 Broadband Measurement Model 42 -- 2.8.2 Minimizing Broadband PWD Error 42 -- 2.8.3 BB-PWD Simulation Study 44 -- 2.9 Summary 45 -- 2.10 Acknowledgment 46 -- References 46 -- 3 Sound Field Analysis Using Sparse Recovery 49 /Craig T. …”
Libro electrónico -
19982Publicado 2018Tabla de Contenidos: “…12.3.2 Signing Rights Delegation by the PKG 250 -- 12.3.3 Single Proxy Signature 250 -- 12.4 Group Proxy Signing Rights Delegation 251 -- 12.4.1 Certificate Distribution 251 -- 12.4.2 Partial Signature 251 -- 12.4.3 Group Signature 251 -- 12.5 Security Analysis of the Proposed Schemes 252 -- 12.5.1 Assumptions for Security Analysis 252 -- 12.5.2 Identity-Based Encryption Security 253 -- 12.5.2.1 Security Model 253 -- 12.5.2.2 Security Analysis 253 -- 12.5.3 Identity-Based Signature Security 255 -- 12.5.3.1 Security Models 255 -- 12.5.3.2 Security Analysis 256 -- 12.6 Performance Analysis of the Proposed Schemes 258 -- 12.6.1 Computational Complexity of the Proposed Schemes 258 -- 12.6.2 Choosing Bilinear Paring Functions 259 -- 12.6.3 Numerical Results 260 -- 12.7 Conclusion 261 -- 13 Open Issues and Possible Future Research Directions 263 -- 13.1 Efficient and Secure Cloud Services and Big Data Analytics 263 -- 13.2 Quality-of-Service Framework 263 -- 13.3 Optimal Network Design 264 -- 13.4 Better Involvement of Green Energy 265 -- 13.5 Need for Secure Communication Network Infrastructure 265 -- 13.6 Electrical Vehicles 265 -- Reference 267 -- Index 287.…”
Libro electrónico -
19983por Kotler, Philip
Publicado 2004Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
19984
-
19985Publicado 2013Tabla de Contenidos: “…Risk-Free Assets -- MEASURING A PORTFOLIO'S EXPECTED RETURN -- Measuring Single-Period Portfolio Return -- The Expected Return of a Portfolio of Risky Assets -- MEASURING PORTFOLIO RISK -- Variance and Standard Deviation as a Measure of Risk -- Covariance -- Measuring the Risk of a Portfolio Consisting of More than Two Assets -- PORTFOLIO DIVERSIFICATION -- The Effect of the Correlation of Asset Returns on Portfolio Risk -- CHOOSING A PORTFOLIO OF RISKY ASSETS -- Constructing Efficient Portfolios -- Feasible and Efficient Portfolios -- Choosing the Optimal Portfolio in the Efficient Set -- Example Using the MSCI World Country Indexes -- ROBUST PORTFOLIO OPTIMIZATION -- KEY POINTS -- NOTES -- REFERENCES -- Principles of Optimization for Portfolio Selection -- UNCONSTRAINED OPTIMIZATION -- Minima and Maxima of a Differentiable Function -- Convex Functions -- Quasi-Convex Functions -- CONSTRAINED OPTIMIZATION -- Lagrange Multipliers -- Convex Programming -- Linear Programming -- Quadratic Programming -- KEY POINTS -- REFERENCES -- Asset Allocation and Portfolio Construction Techniques in Designing the Performance-Seeking Portfolio -- THE TANGENCY PORTFOLIO AS THE RATIONALE BEHIND SHARPE RATIO MAXIMIZATION -- ROBUST ESTIMATORS FOR COVARIANCE PARAMETERS -- ROBUST ESTIMATORS FOR EXPECTED RETURNS -- IMPLICATIONS FOR BENCHMARK PORTFOLIO CONSTRUCTION -- ASSET ALLOCATION MODELING: PUTTING THE EFFICIENT BUILDING BLOCKS TOGETHER -- KEY POINTS -- NOTES -- REFERENCES -- Asset Pricing Models…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
19986Publicado 2021Tabla de Contenidos: “…Technical requirements -- Troubleshooting with log messages -- Using Debug.Log -- Using the Console with a mobile device -- Simulating a Console window in your app -- Debugging with a debugger -- Debugging on a remote device -- Testing with an editor remote tool -- Simulating with Unity MARS -- Capturing with the MARS Companion app -- Summary -- Section 2 - A Reusable AR User Framework -- Chapter 4: Creating an AR User Framework -- Technical requirements -- Understanding AR interaction flow -- Installing prerequisite assets -- TextMeshPro -- DOTween -- Serialized Dictionary Lite -- Other prerequisite assets -- Starting with a new scene -- Creating the UI canvas and panels -- Creating the screen space canvas -- Adding an app title -- Creating the UI panels -- Creating the UI controller -- Creating a Singleton class script -- Writing the UIController script -- Fading the UI panels -- Creating an Interaction Controller mode -- Creating the interaction mode hierarchy -- Writing the Interaction Controller -- Creating the interaction modes behavior -- The StartupMode script -- The ScanMode script -- The MainMode script -- The NonARMode script -- Testing it out -- Using the Unity onboarding UX assets -- Introducing the onboarding assets -- Preparing the Unity AR onboarding assets -- Installing dependency packages -- Importing the OnboardingUX package -- Writing the AnimatedPrompt script -- Integrating the onboarding graphics -- Creating a scene template for new scenes -- Summary -- Chapter 5: Using the AR User Framework -- Technical requirements -- Planning the project -- Starting with the ARFramework scene template -- Adding a main menu -- Adding PlaceObject-mode with instructional UI -- Creating the PlaceObject UI panel -- Creating the PlaceObject mode -- Wiring the menu buttons -- Performing a Building and Run -- Hiding tracked objects when not needed…”
Libro electrónico -
19987Publicado 2022Tabla de Contenidos: “…Chapter 3 Supplier Diversity Management: A New Way of Thinking -- Defining Supplier Diversity Management -- Perusing Supplier Diversity Management as a Process -- Introducing the Supplier Diversity Management (SDM) Model -- The internal process -- The external process -- The supplier development process -- Getting Started with SDM -- Phase 1: Internal efforts -- Phase 2: External efforts -- Phase 3: Supplier development -- Chapter 4 Distinguishing between Supplier Diversity and DEI -- Surveying the Programs' Similar Names and Mission -- Starting with diversity -- Introducing inclusion -- Expanding for equity -- Diving into Their Different Audiences, Tactics, and Results -- Customers/target audience -- Tactics used -- Measuring results -- Becoming Collaborative Partners -- Perusing the Pitfalls of Combining Supplier Diversity and DEI -- Combining diversity efforts under one umbrella -- The changing role of the Chief Diversity Officer -- Changing the name of supplier diversity to "supplier diversity and inclusion" -- Chapter 5 Digging into Supplier Diversity within the Organization -- Understanding the Role of the Supplier Diversity Professional -- Surveying How Supplier Diversity Fits into the Organization -- With supply chain/procurement -- With facilities/construction -- With diversity and inclusion -- With senior leadership -- With community relations -- With other departments and organizational initiatives -- Getting Involved in the Procurement Process - From Beginning to End -- Forecasting upcoming opportunities -- Reviewing and ensuring bid documents/RFPs are inclusive -- Participating on selection/evaluation committees -- Establishing the vendor onboarding process -- Informing and preparing prospective diverse vendors -- Tracking performance and utilization -- Sourcing and advocating for small and diverse businesses…”
Libro electrónico -
19988Publicado 2018Tabla de Contenidos: “…Exercise 36: Setting Instance Attributes within Instance Methods -- Activity 29: Defining Methods in a Class -- Class Versus Instance Attributes -- Exercise 37: Declaring a Class with Instance Attributes -- Class Attributes -- Exercise 38: Extending our Class with Class Attributes -- Exercise 39: Implementing a Counter for Instances of a Class -- Activity 30: Creating Class Attributes -- Class Versus Instance Methods -- Exercise 40: Creating Instance Methods -- Class Methods -- Exercise 41: Testing our Factory Method -- Exercise 42: Accessing Class Attributes from within Class Methods -- Encapsulation and Information Hiding -- Activity 31: Creating Class Methods and Using Information Hiding -- Class Inheritance -- Exercise 43: Implementing Class Inheritance -- Overriding __init__() -- Exercise 44: Overriding the __init__ Method to Add an Attribute -- Commonly Overridden Methods -- Activity 32: Overriding Methods -- Multiple Inheritance -- Exercise 45: Implementing Multiple Inheritance -- Activity 33: Practicing Multiple Inheritance -- Summary -- Modules, Packages, and File Operations -- Introduction -- Defining Modules -- Exercise 46: Creating Modules -- Imports and Import Statements -- Exercise 47: Importing Modules -- Modules and Packages -- The Module Search Path -- Standard Python Modules -- Activity 34: Inspecting Modules -- Packages -- Absolute Imports -- Relative Imports -- Activity 35: Listing the Resources Defined in a Package or Module -- Activity 36: Using Resources in a Module -- File Operations -- The file Object -- The file Object Methods -- Reading and Writing to Files -- The open() Method -- Exercise 48: Creating, Reading, and Writing to Files -- The with Context Manager -- Activity 37: Performing File Operations -- Handling Structured Data -- Working with CSV Data -- Activity 38: Working with Files -- Working with JSON Data…”
Libro electrónico -
19989Publicado 2018Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
Libro electrónico -
19990Publicado 2018Tabla de Contenidos: “…-- Job Conditions -- Personality -- Pay -- Corporate Social Responsibility (CSR) -- Outcomes of Job Satisfaction -- Job Performance -- Organizational Citizenship Behavior (OCB) -- Customer Satisfaction -- Life Satisfaction -- The Impact of Job Dissatisfaction -- Counterproductive Work Behavior (CWB) -- Understanding the Impact -- Summary…”
Libro electrónico -
19991Publicado 2015Tabla de Contenidos: “…Combining Information from a Variety of Sources: Single-Source Data -- How to Conduct an Online Search for External Secondary Data -- International Marketing Research -- Marketing Research and Social Media -- Ethics in Marketing Research -- Summary -- Companion Website -- Key Terms and Concepts -- Suggested Cases and Video Cases -- Live Research: Conducting a Marketing Research Project -- Acronyms -- Review Questions -- Applied Problems -- Internet Exercises -- Online Video Case 3.1: National Football League: The King of Professional Sports -- Chapter 4: Qualitative Research -- Overview -- Learning Objectives -- Primary Data: Qualitative Versus Quantitative Research -- A Classification of Qualitative Research Procedures -- Focus Group Interviews -- Characteristics -- Planning and Conducting Focus Groups -- Advantages and Disadvantages of Focus Groups -- Online Focus Groups -- Advantages and Disadvantages of Online Focus Groups -- Depth Interviews -- Conducting Depth Interviews -- Advantages and Disadvantages of Depth Interviews -- Projective Techniques -- Word Association -- Sentence Completion -- Picture Response and Cartoon Test -- Role Playing and Third-Person Techniques -- Advantages and Disadvantages of Projective Techniques -- Other Methods of Qualitative Research -- Ethnography and Netnography -- Mystery Shopping -- International Marketing Research -- Marketing Research and Social Media -- Focus Groups -- Depth Interviews -- Projective Techniques -- Limitations -- Ethics in Marketing Research -- Summary -- Companion Website -- Key Terms and Concepts -- Suggested Cases and Video Cases -- Live Research: Conducting a Marketing Research Project -- Acronyms -- Review Questions -- Applied Problems -- Internet Exercises -- Online Video Case 4.1: Nike: Associating Athletes, Performance, and the Brand -- Chapter 5: Survey and Observation -- Overview…”
Libro electrónico -
19992Publicado 2022Tabla de Contenidos: “…-- Cloud Native Design Principles -- API First Principle -- Monolithic Architecture Principle -- Polylithic Architecture Principle -- Applying the Polylithic Principle in Architecture -- Properties of Polylithic Principles -- Polyglot Persistence Principle -- Applying the Polyglot Persistence Principle in Architecture -- Modeled with Business Domain Principle -- Consumer First Principle -- Decentralize Everything Principle -- Culture of Automation Principle -- Always Be Architecting Principle -- Interoperability Principle -- Digital Decoupling Principle -- Single Source of Truth Principle -- Evolutionary Design Principle -- Cloud Native Runtime Principles -- Isolate Failure Principle (IFP) -- Deploy Independently Principle -- Be Smart with State Principle -- Location-Independent Principle -- Design for Failure Principle -- Security Principles -- Defense in Depth Principle -- Security by Design Principle -- SQL Injection -- Cross-Site Scripting (XSS) -- Software Engineering Principle -- Products Not Projects Principle -- Shift-Left Principle -- Shift-Left Security -- Shift-Left Performance -- Container Principles -- Single Concern Principle -- High Observability Principle -- Lifecycle Conformance Principle -- Image Immutability Principle -- Process Disposability Principle (PDP) -- Self-Containment Principle -- Runtime Confinement Principle -- Principles of Orthogonal -- Cohesion -- Types of Cohesion -- Function Cohesion…”
Libro electrónico -
19993por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Foreign MNEs facilitate GVCs integration -- FDI provides a platform to boost host country's export performance -- Foreign MNEs exports indirectly sustain Finnish jobs -- Services sectors are important channels for export success -- 1.5. …”
Publicado 2021
Libro electrónico -
19994por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…. -- Introduction -- Propriétés économiques des normes fondamentales du travail -- Normes du travail et performances commerciales -- Normes du travail et investissement direct étranger -- Preuves empiriques -- Graphique 2. …”
Publicado 2000
Libro electrónico -
19995por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…L'appréciation des performances des systèmes biométriques -- Tableau 1. -- 2. …”
Publicado 2004
Libro electrónico -
19996Publicado 2016Tabla de Contenidos: “…-- Describe the approach leveraged for the product selection phase of the IT architecture -- Describe what you understand by application performance management (APM) -- How do you arrive at the costing of a solution while building RFP responses? …”
Libro electrónico -
19997Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Performing subselection -- Getting ready -- How to do it... -- How it works... -- Function chaining -- Getting ready -- How to do it... -- How it works... -- Manipulating the raw selection -- Getting ready -- How to do it... -- How it works... -- Chapter 3: Dealing with Data -- Introduction -- The enter-update-exit pattern -- Binding an array as data -- Getting ready -- How to do it... -- How it works... -- Binding object literals as data -- Getting ready -- How to do it... -- How it works... -- Binding functions as data -- Getting ready -- How to do it... -- How it works... -- Working with arrays -- Getting ready -- How to do it... -- How it works... -- Filtering with data -- Getting ready -- How to do it... -- How it works... -- Sorting with data…”
Libro electrónico -
19998Publicado 2018Tabla de Contenidos: “…. -- Moving the real robot -- Performing motion planning using control programs -- Getting ready -- How to do it... -- Planning a trajectory -- Planning to a joint space goal -- Getting useful information from motion planning -- Executing a trajectory -- Adding perception to motion planning -- Getting ready -- How to do it... -- Adding perception to MoveIt -- How it works... -- There's more... -- See also... -- Grasping action with the robotic arm or manipulator -- Getting ready -- Creating a pick and place task -- How to do it... -- How it works... -- See also -- Chapter 9: Micro Aerial Vehicles in ROS -- Introduction -- Overview of MAV system design -- Getting ready -- A generic mathematical model of an MAV/drone -- Getting ready -- Forces and moments on quadcopter -- Hover and upward and downward motion -- Rotation (yaw) motion -- Linear (pitch and roll) motion -- Simulation of an MAV/drone using RotorS/Gazebo -- Getting ready -- Simulator overview -- How to do it... -- Hovering -- State estimation -- Sensors mounting -- Evaluation -- How it works... -- Developing a custom controller -- There's more... -- See also -- Creating custom sensors -- Autonomous navigation framework for an MAV/Drone -- Getting ready…”
Libro electrónico -
19999Publicado 2014Tabla de Contenidos: “…DEVELOPMENT OF THE MARK-TO-THE-MARKET RULE -- RIBA-FREE BUSINESS TRANSACTION MODELS -- Cost-Plus (Murabaha) -- Leasing (Ijara) Rules -- The RF Legal Foundation on Leasing -- Process -- Joint Venture (Musharaka) Direct Investment/Equity Ownership or Partnership -- Money Management (Mudaraba) -- Financing Future Production (Ba'i ul Salam) -- REVIEW QUESTIONS -- NOTES -- CHAPTER 4 The Law: The Judeo-Christian-Islamic Shari'aa -- THE LAW: SHARI'AA -- Sources of Shari'aa -- The Qur'aan -- The Way of Life (Sunnah) of the Prophet -- The Science and Foundation of Scholarly Research, or "Usul Ul Fiqh" -- Performing Scholarly Research to Develop and Pass Religious Edicts and Rulings: The Process of Issuing a Fatwa (An Edict) -- The Ultimate Intent and Goals of the Law (Shari'aa): Maqasid Al Shari'aa -- THE SHARI'AA BOARD IN AN RF (ISLAMIC) BANK OR FINANCE COMPANY -- The Role of the Shari'aa Board -- Duties of the Shari'aa Board at the RF Bank -- Approaches Used to Appoint Shari'aa Boards -- Concerns of Western Central Bankers and Bank Regulators Regarding Shari'aa Boards -- THE DEVELOPMENT OF RF SCHOLARS AND COMPLIANCE COMMITTEES FOR RF FINANCE INSTITUTIONS IN THE TWENTY-FIRST CENTURY -- The Central Bank and the Regulatory Shari'aa Compliance Committee -- REVIEW QUESTIONS -- NOTES -- CHAPTER 5 Money and Its Creation: The U.S. …”
Libro electrónico -
20000Publicado 2022Tabla de Contenidos: “…</LI><P></P></UL></UL><P></P><B><P>Chapter 11: </P><P>Advanced Strategies to Accelerate Your Sales</P><UL><UL></B><P><LI>Tuning your machine for optimum performance.</LI><P></P><P><LI>Touchpoint opportunities to engage with your buyers.…”
Libro electrónico