Mostrando 19,801 - 19,820 Resultados de 26,560 Para Buscar '"performance"', tiempo de consulta: 0.17s Limitar resultados
  1. 19801
    Publicado 2017
    Tabla de Contenidos: “…3.7.4 Critical Action and Decision Evaluation Technique -- 3.7.5 The Influence Modeling and Assessment System [14] -- 3.8 HAZID Discussions -- 3.8.1 Human Factor -- 3.8.2 Worst Case Scenario -- 3.8.3 Common Mistakes, Pitfalls, and Suggestions -- 3.9 Risk Estimate (Brief) -- 4.0 RISK ASSESSMENT AND MANAGEMENT -- 4.1 Risk Analysis Basics -- 4.1.1 Various Terms and Definitions -- 4.1.2 Definitions of a Few Related Terms -- 4.1.3 SFARP/SFAIRP -- 4.1.4 Objective and Philosophy of Risk Assignment -- 4.1.5 Features and Framework of Risk Analysis: The Basic Features of Risk Analysis Shall Cover -- 4.1.6 Standards -- 4.2 Risk Analysis Prestart Issues -- 4.2.1 Scope and Approach -- 4.2.2 Technique(s) Selection -- 4.2.3 Risk Analysis Types -- 4.2.4 Staffing and Workforce Involvement -- 4.2.5 Information Flow -- 4.2.6 Combinational, Cumulative, and Individual Hazards -- 4.3 Outline of Risk Analysis Procedure -- 4.3.1 Consequence Analysis -- 4.3.2 Likelihood Analysis -- 4.3.3 Nature of Injury -- 4.3.4 Human Factor -- 4.3.5 Screening of Hazards -- 4.3.6 Qualitative Risk Analysis -- 4.3.7 Semiquantitative Risk Analysis -- 4.3.8 Quantitative Risk Analysis (QRA) -- 4.3.9 Uncertainty Factors for Risk Analysis -- 4.4 Risk Assessment and Output -- 4.4.1 Risk Assessment Issues -- 4.4.2 Brief Risk Assessment Goal -- 4.4.3 Outputs and Their Uses -- 4.4.4 Risk Assessment Discussions -- 4.5 Control Measure -- 4.5.1 Control Measure Characteristic Features and Associated Details -- 4.5.2 Various Control Measures -- 4.5.3 Influencing Factors Related to Selections and Effectiveness of Control Measure -- 4.5.4 Selection, Rejection, and Adequacy of Control Measure With Addition Controls -- 4.5.5 Performance Indicator and Standard -- 4.5.6 Additional Control Measure -- 4.5.7 Control Measure Output -- 4.5.8 Discussions -- 4.6 Safety Management System -- 4.6.1 Features…”
    Libro electrónico
  2. 19802
    Publicado 2017
    Tabla de Contenidos: “…3.4.4 Example: Network Search -- 3.4.5 Example: Initial Network Access Procedure -- 3.4.6 The Uu Protocol Stack -- 3.5 The UMTS Terrestrial Radio Access Network (UTRAN) -- 3.5.1 Node-B, Iub Interface, NBAP and FP -- 3.5.2 The RNC, Iu, Iub and Iur Interfaces, RANAP and RNSAP -- 3.5.3 Adaptive Multirate (AMR) NB and WB Codecs for Voice Calls -- 3.5.4 Radio Resource Control (RRC) States -- 3.6 Core Network Mobility Management -- 3.7 Radio Network Mobility Management -- 3.7.1 Mobility Management in the Cell-DCH State -- 3.7.2 Mobility Management in Idle State -- 3.7.3 Mobility Management in Other States -- 3.8 UMTS CS and PS Call Establishment -- 3.9 UMTS Security -- 3.10 High-Speed Downlink Packet Access (HSDPA) and HSPA+ -- 3.10.1 HSDPA Channels -- 3.10.2 Shorter Delay Times and Hybrid ARQ (HARQ) -- 3.10.3 Node-B Scheduling -- 3.10.4 Adaptive Modulation and Coding, Transmission Rates and Multicarrier Operation -- 3.10.5 Establishment and Release of an HSDPA Connection -- 3.10.6 HSDPA Mobility Management -- 3.11 High-Speed Uplink Packet Access (HSUPA) -- 3.11.1 E-DCH Channel Structure -- 3.11.2 The E-DCH Protocol Stack and Functionality -- 3.11.3 E-DCH Scheduling -- 3.11.4 E-DCH Mobility -- 3.11.5 E-DCH-Capable Devices -- 3.12 Radio and Core Network Enhancements: CPC and One Tunnel -- 3.12.1 A New Uplink Control Channel Slot Format -- 3.12.2 CQI Reporting Reduction and DTX and DRX -- 3.12.3 HS-SCCH Discontinuous Reception -- 3.12.4 HS-SCCH-less Operation -- 3.12.5 Enhanced Cell-FACH and Cell/URA-PCH States -- 3.12.6 Radio Network Enhancement: One Tunnel -- 3.13 HSPA Performance in Practice -- 3.13.1 Throughput in Practice -- 3.13.2 Radio Resource State Management -- 3.13.3 Power Consumption -- 3.14 Automated Emergency Calls (eCall) from Vehicles -- 3.15 UMTS and CDMA2000 -- Questions -- References…”
    Libro electrónico
  3. 19803
    Publicado 2020
    Tabla de Contenidos: “…Tran, Mehdi Bennis, and Choong Seon Hong -- 5.1 Introduction 120 -- 5.2 5G Goals 120 -- 5.3 Radio Access Network Management 121 -- 5.4 Network Slicing 124 -- 5.5 Use Case: Virtual Reality 125 -- 5.5.1 System Model 125 -- 5.5.2 Problem Formulation 127 -- 5.5.3 ADMM-Based Solution 128 -- 5.5.4 Performance Analysis 131 -- 5.6 Summary 131 -- References 133 -- Further Reading 135 -- Part IV 5G Verticals ́ô Network Infrastructure Technologies 137 -- 6 The Requirements and Architectural Advances to Support URLLC Verticals 139 /Ulas C. …”
    Libro electrónico
  4. 19804
    por Nartovich, Aleksandr
    Publicado 2004
    Tabla de Contenidos: “…Advanced techniques and considerations for using the IBM WebFacing Tool -- Outline -- Learning objectives -- 10.1 Current DDS keyword support -- 10.2 Using the WebFacing Environment API -- 10.3 Programmatic invocation of WebFacing applications -- 10.4 Working with JSPs -- 10.5 Performance considerations -- 10.5.1 Using IBM Eserver Workload Estimator to plan a server configuration -- 10.5.2 Time to create the project and convert the display files -- 10.5.3 Run-time jobs -- 10.5.4 Tuning the performance of a WebFacing application -- 10.6 DDS Object Mappings -- 10.7 Migrating between different IBM WebFacing Tool versions -- Summary -- Key terms and concepts -- Other helpful resources -- Questions -- Exercises -- Part 4 iSeries Web development tools -- Chapter 11. …”
    Libro electrónico
  5. 19805
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…Introducing File Manager -- 2.1 What can File Manager be used for? -- 2.1.1 Performance guidelines -- 2.1.2 Conventions used -- 2.1.3 A simple copy -- 2.1.4 Selective copying -- 2.1.5 How to perform a global find and replace in a PDS -- 2.1.6 How to create one VSAM file using another as a model -- 2.1.7 How to initialize a VSAM file with low-value records -- 2.1.8 How to populate this newly created file -- 2.1.9 How to split a single file into constituent record types -- 2.1.10 Replace a string in a specific location in a file -- 2.1.11 Copy selected variably blocked records to another file -- 2.1.12 Search for a string in all members of a PDS -- 2.1.13 Multiple Find -- 2.1.14 QSAM allocation using a model -- 2.1.15 Work with VTOC -- 2.1.16 Get information about a load module -- 2.1.17 Dynamic template -- 2.1.18 Compare data sets using templates -- 2.1.19 Working with DB2 -- 2.1.20 Working with IMS -- 2.2 Template processing -- 2.2.1 It really does remember the copybook -- 2.2.2 Using the SELECT command in template edit -- 2.2.3 How to process COPY REPLACING statements -- 2.2.4 How to build a template for multi-record file layouts -- 2.3 Hints and tips…”
    Libro electrónico
  6. 19806
    Publicado 2004
    Tabla de Contenidos: “…Scheduler service -- 14.1 Prerequisites -- 14.2 Sample scenario -- 14.3 Development -- 14.3.1 Steps for using the Scheduler API -- 14.3.2 Using Scheduler with Process Choreographer -- 14.3.3 Notification bean -- 14.4 Unit test -- 14.5 Assembly -- 14.6 Configuration -- 14.7 More information -- 14.7.1 Problem determination -- 14.7.2 Security considerations -- 14.7.3 Clustering -- 14.7.4 Performance considerations…”
    Libro electrónico
  7. 19807
    por Cook, Jim
    Publicado 2003
    Tabla de Contenidos: “…Next steps: Getting the IBM Tivoli Storage Manager server ready for production -- 6.1 Setting the correct time zone for OS/400 PASE -- 6.1.1 Adding an environment variable for the OS/400 PASE time zone -- 6.1.2 Restarting the IBM Tivoli Storage Manager server -- 6.1.3 Accepting new IBM Tivoli Storage Manager server time, enabling sessions -- 6.2 IBM Tivoli Storage Manager and BRMS tape library management -- 6.2.1 IBM Tivoli Storage Manager and BRMS tape library overview -- 6.2.2 Creating IBM Tivoli Storage Manager and BRMS exit programs -- 6.2.3 Registering the IBM Tivoli Storage Manager exit programs -- 6.2.4 Defining the IBM Tivoli Storage Manager USRDFN tape library -- 6.2.5 Defining the device class -- 6.2.6 Verifying the IBM Tivoli Storage Manager and BRMS exit programs -- 6.2.7 Sharing a common media pool between IBM Tivoli Storage Manager, BRMS -- 6.3 IBM Tivoli Storage Manager advanced storage -- 6.3.1 Overview of IBM Tivoli Storage Manager storage -- 6.3.2 Storage pool migration -- 6.3.3 Collocation -- 6.3.4 Reclamation -- 6.3.5 Creating a sequential access storage pool -- 6.3.6 Updating the disk storage pool to migrate to tape -- 6.3.7 Creating a copy storage pool -- 6.3.8 IBM Tivoli Storage Manager disk storage pool performance improvements -- 6.4 IBM Tivoli Storage Manager policies -- 6.4.1 IBM Tivoli Storage Manager policy overview -- 6.4.2 Updating the default backup copy group…”
    Libro electrónico
  8. 19808
    Publicado 2022
    Tabla de Contenidos: “…3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM -- 3.6 Conclusion -- References -- 4 Automated TSR Using DNN Approach for Intelligent Vehicles -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Neural Network (NN) -- 4.4 Methodology -- 4.4.1 System Architecture -- 4.4.2 Database -- 4.5 Experiments and Results -- 4.5.1 FFNN -- 4.5.2 RNN -- 4.5.3 CNN -- 4.5.4 CNN -- 4.6 Discussion -- 4.7 Conclusion -- References -- 5 Honeypot: A Trap for Attackers -- 5.1 Introduction -- 5.1.1 Research Honeypots -- 5.1.2 Production Honeypots -- 5.2 Method -- 5.2.1 Low-Interaction Honeypots -- 5.2.2 Medium-Interaction Honeypots -- 5.2.3 High-Interaction Honeypots -- 5.3 Cryptanalysis -- 5.3.1 System Architecture -- 5.3.2 Possible Attacks on Honeypot -- 5.3.3 Advantages of Honeypots -- 5.3.4 Disadvantages of Honeypots -- 5.4 Conclusions -- References -- 6 Examining Security Aspects in Industrial-Based Internet of Things -- 6.1 Introduction -- 6.2 Process Frame of IoT Before Security -- 6.2.1 Cyber Attack -- 6.2.2 Security Assessment in IoT -- 6.2.2.1 Security in Perception and Network Frame -- 6.3 Attacks and Security Assessments in IIoT -- 6.3.1 IoT Security Techniques Analysis Based on its Merits -- 6.4 Conclusion -- References -- 7 A Cooperative Navigation for Multi-Robots in Unknown Environments Using Hybrid Jaya-DE Algorithm -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Problem Formulation -- 7.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm -- 7.4.1 Basic Jaya Algorithm -- 7.5 Hybrid Jaya-DE -- 7.5.1 Mutation -- 7.5.2 Crossover -- 7.5.3 Selection -- 7.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm -- 7.7 Total Navigation Path Deviation (TNPD) -- 7.8 Average Unexplored Goal Distance (AUGD) -- 7.9 Conclusion -- References -- 8 Categorization Model for Parkinson's Disease Occurrence and Severity Prediction -- 8.1 Introduction…”
    Libro electrónico
  9. 19809
    Publicado 2023
    Tabla de Contenidos: “…12.9 Chief Information Security Officer (CISO) -- Summary -- Checklist -- 13 Housekeeping -- 13.1 Managing hardware -- 13.2 Support contracts -- 13.2.1 Providing support -- 13.3 Monitoring -- 13.3.1 Outside looking in -- 13.3.2 Inside looking in -- 13.4 Backup and restoration -- 13.4.1 Frequency/retention -- 13.4.2 Archive security -- 13.5 Budget oversight -- Summary -- Checklist -- 14 Company growth -- 14.1 Investment groups -- 14.2 Impromptu pitch -- 14.3 Investment cadence -- 14.4 Preparing for integration -- 14.5 Due diligence -- 14.5.1 Performing due diligence -- 14.5.2 Conducting due diligence -- 14.5.3 Presenting your findings -- 14.5.4 Answering due diligence -- 14.6 Handing over the reins -- 14.7 Taking the reins -- Summary -- Checklist -- 15 You, Inc. -- 15.1 Reviewing yourself -- 15.2 Mentor -- 15.3 Keeping pace -- 15.4 Monitoring change -- 15.5 Succession planning -- 15.6 Career success -- 15.7 Stepping up -- Summary -- Checklist -- index…”
    Libro electrónico
  10. 19810
    Publicado 2022
    Tabla de Contenidos: “…8.1.2 Angular Averaging -- 8.2 Radiation Stiffness and Coupling Loss Factors -- 8.2.1 Point Radiation Stiffness -- 8.2.2 Point Junctions -- 8.2.3 Area Radiation Stiffness -- 8.2.4 Area Junctions -- 8.2.5 Line Radiation Stiffness -- 8.2.6 Line Junctions -- 8.2.7 Summary -- Bibliography -- 9 Deterministic Applications -- 9.1 Acoustic One-Dimensional Elements -- 9.1.1 Transfer Matrix and Finite Element Convention -- 9.1.2 Acoustic One-Dimensional Networks -- 9.1.3 The Acoustic Pipe -- 9.1.4 Volumes and Closed Pipes -- 9.1.5 Limp Layer -- 9.1.6 Membranes -- 9.1.7 Perforated Sheets -- 9.1.8 Branch Lumped Elements -- 9.1.9 Boundary Conditions -- 9.1.10 Performance Indicators -- 9.2 Coupled One-Dimensional Systems -- 9.2.1 Change in Cross Section -- 9.2.2 Impedance Tube -- 9.2.3 Helmholtz Resonator -- 9.2.4 Quarter Wave Resonator -- 9.2.5 Muffler System -- 9.2.6 T-Joint -- 9.2.7 Conclusions of 1D-Systems -- 9.3 Infinite Layers -- 9.3.1 Plate Layer -- 9.3.2 Lumped Elements Layers -- 9.3.3 Fluid Layer -- 9.3.4 Equivalent Fluid - Fiber Material -- 9.3.5 Performance Indicators -- 9.3.6 Conclusions on Layer Formulation -- 9.4 Acoustic Absorber -- 9.4.1 Single Fiber Layer -- 9.4.2 Multiple Layer Absorbers -- 9.4.3 Absorber with Perforate -- 9.4.4 Single Degree of Freedom Liner -- 9.5 Acoustic Wall Constructions -- 9.5.1 Double Walls -- 9.5.2 Limp Double Walls with Fiber -- 9.5.3 Two Plates with Fiber -- 9.5.4 Conclusion on Double Walls -- Bibliography -- 10 Application of Random systems -- 10.1 Frequency Bands for SEA Simulation -- 10.2 Fluid Systems -- 10.2.1 Twin Chamber -- 10.3 Algorithms of SEA -- 10.4 Coupled Plate Systems -- 10.4.1 Two Coupled Plates -- 10.5 Fluid-Structure Coupled Systems -- 10.5.1 Twin Chamber -- 10.5.2 Noise Control Treatments -- 10.5.3 Transmission Loss of Trimmed Plate -- 10.5.4 Free Field Radiation into Half Space…”
    Libro electrónico
  11. 19811
    por Anita, Goel
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Copyright -- Roadmap to the Syllabus -- Brief Contents -- Contents -- Preface -- Why and How I Wrote this Book -- C Programming Language -- About the Book -- Structure of the Book -- Salient Features and Strengths of the Book -- Typographical Conventions -- Web Resources -- Acknowledgements -- Part - I: Computer Fundamentals -- 1: Basics of Computer -- 1.1 Introduction -- 1.2 Digital and Analog Computers -- 1.3 Characteristics of Computer -- 1.4 History of Computer -- 1.5 Generations of Computer -- 1.5.1 First Generation (1940 to 1956): Using Vacuum Tubes -- 1.5.2 Second Generation (1956 to 1963): Using Transistors -- 1.5.3 Third Generation (1964 to 1971): Using Integrated Circuits -- 1.5.4 Fourth Generation (1971 to present): Using Microprocessors -- 1.5.5 Fifth Generation (Present and Next): Using Artificial Intelligence -- 1.6 Classification of Computer -- 1.6.1 Microcomputers -- 1.6.2 Minicomputers -- 1.6.3 Mainframe Computers -- 1.6.4 Supercomputers -- 1.7 The Computer System -- 1.7.1 The Input-Process-Output Concept -- 1.7.2 Components of Computer Hardware -- 1.8 Central Processing Unit -- 1.8.1 Arithmetic Logic Unit -- 1.8.2 Registers -- 1.8.3 Control Unit -- 1.9 Memory Unit -- 1.9.1 Cache Memory -- 1.9.2 Primary Memory -- 1.9.3 Secondary Memory -- 1.10 Instruction Format -- 1.11 Instruction Set -- 1.12 Instruction Cycle -- 1.13 Microprocessor -- 1.14 Interconnecting the Units of a Computer -- 1.14.1 System Bus -- 1.14.2 Expansion Bus -- 1.14.3 External Ports -- 1.15 Performance of a Computer -- 1.16 Inside a Computer Cabinet -- 1.16.1 Motherboard -- 1.16.2 Ports and Interfaces -- 1.16.3 Expansion Slots -- 1.16.4 Ribbon Cables -- 1.16.5 Memory Chips -- 1.16.6 Storage Devices -- 1.16.7 Processor -- 1.17 Application of Computers -- 1.18 Summary -- Exercise Questions -- Additional Questions…”
    Libro electrónico
  12. 19812
    Publicado 2018
    Tabla de Contenidos: “…-- The CoE's Soft Law on Legal Aid -- The CEPEJ's Main Challenges Concerning Legal Aid -- What Does the European Judicial Survey Tell Us About the Performance of European Legal Aid? -- The Overall Picture -- Nordic Legal Aid in the European Setting -- The CEPEJ's Evaluation of European Legal Aid Schemes -- Conclusion -- References -- Legislation and Other Legislative Documents -- Finland: -- Norway: -- Council of Europe/CEPEJ:…”
    Libro electrónico
  13. 19813
    Publicado 2018
    Tabla de Contenidos: “…Evaluating machine learning models -- Training, validation, and test split -- Simple holdout validation -- K-fold validation -- K-fold validation with shuffling -- Data representativeness -- Time sensitivity -- Data redundancy -- Data preprocessing and feature engineering -- Vectorization -- Value normalization -- Handling missing values -- Feature engineering -- Overfitting and underfitting -- Getting more data -- Reducing the size of the network -- Applying weight regularization -- Dropout -- Underfitting -- Workflow of a machine learning project -- Problem definition and dataset creation -- Measure of success -- Evaluation protocol -- Prepare your data -- Baseline model -- Large model enough to overfit -- Applying regularization -- Learning rate picking strategies -- Summary -- Chapter 5: Deep Learning for Computer Vision -- Introduction to neural networks -- MNIST - getting data -- Building a CNN model from scratch -- Conv2d -- Pooling -- Nonlinear activation - ReLU -- View -- Linear layer -- Training the model -- Classifying dogs and cats - CNN from scratch -- Classifying dogs and cats using transfer learning -- Creating and exploring a VGG16 model -- Freezing the layers -- Fine-tuning VGG16 -- Training the VGG16 model -- Calculating pre-convoluted features -- Understanding what a CNN model learns -- Visualizing outputs from intermediate layers -- Visualizing weights of the CNN layer -- Summary -- Chapter 6: Deep Learning with Sequence Data and Text -- Working with text data -- Tokenization -- Converting text into characters -- Converting text into words -- N-gram representation -- Vectorization -- One-hot encoding -- Word embedding -- Training word embedding by building a sentiment classifier -- Downloading IMDB data and performing text tokenization -- torchtext.data -- torchtext.datasets -- Building vocabulary -- Generate batches of vectors…”
    Libro electrónico
  14. 19814
    Publicado 2017
    Tabla de Contenidos: “…-- The Art (and Craft) of Restoration -- Restoring Tone -- Restoring Color -- Fine-Detail Repairs and Cleanup -- Major Damage Repairs -- Repairing Uneven Damage -- Fooling Around -- A Modest Taxonomy of Restoration -- Prints -- Slides -- Negatives -- Newspaper Clippings -- Take Your Time -- Chapter 2: Hardware for Restoration -- The "Bottom" Line -- The Computer -- Memory -- Hard Drives -- Display -- Laptops and iMacs -- Graphics Tablets -- Color Management and ColorMunki -- Backup and Long-Term Storage -- Scanners -- Printers -- Chapter 3: Software for Restoration -- Image Processing Programs -- Photoshop CC and CS6 -- Maximizing Photoshop Performance -- Avoiding Photoshop -- Alternatives to Photoshop -- Photoshop Elements 14 -- Elements XXL -- Affinity Photo -- Photoline 19 -- Plug-in and Stand-Alone Tools -- AKVIS Retoucher -- Polaroid Dust &amp -- Scratch Removel -- Focus Magic -- Noise Ninja/Photo Ninja -- Topaz Labs DeNoise 6 -- Topaz Labs InFocus -- Topaz Labs Detail 3 -- Topaz Labs Clarity -- Repair and Recover Tools -- CD/DVD Diagnostic -- JPEG Recovery Pro 5.0 -- Stellar Phoenix JPEG Repair -- RS File Repair -- Picture Doctor 2 -- Chapter 4: Getting the Photo into the Computer -- How-Tos in This Chapter…”
    Libro electrónico
  15. 19815
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…Promoting responsible business conduct in Georgia -- Summary and policy recommendations -- Scope and importance of responsible business conduct -- RBC in Georgia: context, incentives and opportunities -- Awareness of RBC is on the rise -- Consolidating efforts: government commitments and policies -- RBC and the state as an economic actor: leading by example in the state's own economic activities -- Public procurement -- State-owned enterprises -- Investment promotion -- Policies in specific areas covered by the Guidelines and relevant to Georgia -- Need for maintaining gains in human rights protection -- Access to remedy and independence of the judiciary -- Civil society space and human rights defenders -- Business-related RBC impacts: spotlight on high-risk sectors -- Continue to strengthen environmental governance, including enforcement -- Existing environmental issues -- Environmental governance -- Environmental performance of SMEs -- Employment and industrial relations: Georgia is strengthening its system of labour rights protection -- Policy developments: Georgia's path towards stronger protection of labour rights -- Working conditions and occupational safety and health -- Non-discrimination -- Freedom of association and collective bargaining -- Forced labour and human trafficking -- The fight against corruption has advanced -- References -- Notes…”
    Libro electrónico
  16. 19816
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Intro -- Statistiques de base de la France, 2018 -- Résumé -- Principaux éclairages sur l'action publique -- Un pic de croissance a été franchi -- Les perspectives de croissance fléchissent, mais demeurent positives -- Risques financiers -- Mieux utiliser les dépenses publiques pour renforcer la croissance et le bien-être -- De grands défis économiques et sociaux demeurent -- Réduire les dépenses publiques et améliorer leur efficience -- Contenir les dépenses des collectivités locales -- Réformer le système de retraite -- Limiter l'évolution des dépenses de santé -- Réformer les services publics pour en améliorer l'efficience -- Réduire les dépenses fiscales inefficaces -- Rendre la fiscalité plus favorable à l'emploi et la productivité -- Les entreprises sont soumises à une pression fiscale élevée -- La fiscalité foncière pourrait être améliorée -- Illustration des effets des réformes proposées par l'OCDE -- Assurer la viabilité écologique -- Améliorer la productivité, l'emploi et la mobilité sociale -- Des réformes des marchés de biens et de services stimuleraient la croissance -- Continuer les efforts de la lutte contre la corruption -- Stimuler l'investissement des entreprises innovantes -- Exploiter le potentiel des crypto-actifs pour financer l'investissement des entreprises innovantes -- Renforcer les compétences par la formation initiale -- Bibliographie -- Chapitres thématiques -- Chapitre 1. Améliorer les performances du marché du travail -- Mise en œuvre de la Stratégie pour l'emploi de l'OCDE -- Le marché du travail s'est amélioré mais des défis persistent -- Les difficultés se sont concentrées sur les travailleurs les moins qualifiés et les jeunes -- L'emploi et les inégalités se sont polarisés -- L'évolution des salaires a été déconnectée de la productivité -- Le marché du travail doit se transformer…”
    Libro electrónico
  17. 19817
    Tabla de Contenidos: “…Les degrés de satisfaction des Sénégalais à l'égard des services éducatifs et de santé sont parmi les plus bas -- Axe 2 : Bien-être et conditions de vie - la santé s'améliore, les liens sociaux se renforcent, mais la pauvreté et l'éducation sont à la traîne -- Graphique 1.7. Les performances du Sénégal sont souvent inférieures aux niveaux attendus de bien-être -- Graphique 1.8. …”
    Libro electrónico
  18. 19818
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico
  19. 19819
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- See also -- Performing deep magic with DMitry -- How to do it... -- Hunting for SSL flaws -- How to do it... -- See also -- Exploring connections with intrace -- How to do it... -- Digging deep with theharvester -- How to do it... -- How it works…”
    Libro electrónico
  20. 19820
    Publicado 2018
    Tabla de Contenidos: “…GlassFish dependencies -- Performing the installation -- Starting GlassFish -- Deploying our first Java EE application -- Deploying an application through the web console -- Undeploying an application through the GlassFish Admin Console -- Deploying an application through the command line -- The Autodeploy directory -- The asadmin command-line utility -- GlassFish domains -- Creating domains -- Deleting domains -- Stopping a domain -- Setting up database connectivity -- Setting up connection pools -- Setting up data sources -- Setting JMS resources -- Setting up a JMS connection factory -- Setting up a JMS message queue -- Setting up a JMS message topic -- Configuring durable subscribers -- Summary -- Index…”
    Libro electrónico