Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19861por Cox, Christopher 1965-Tabla de Contenidos: “…22.11.1 SMS Architecture 408 -- 22.11.2 Access Domain Selection 409 -- References 410 -- 23 Performance of LTE and LTE-Advanced 413 -- 23.1 Peak Data Rates of LTE and LTE-Advanced 413 -- 23.1.1 Increase of the Peak Data Rate 413 -- 23.1.2 Limitations on the Peak Data Rate 415 -- 23.2 Coverage of an LTE Cell 416 -- 23.2.1 Uplink Link Budget 416 -- 23.2.2 Downlink Link Budget 418 -- 23.2.3 Propagation Modelling 419 -- 23.2.4 Coverage Estimation 420 -- 23.3 Capacity of an LTE Cell 421 -- 23.3.1 Capacity Estimation 421 -- 23.3.2 Cell Capacity Simulations 422 -- 23.4 Performance of Voice over IP 424 -- 23.4.1 AMR Codec Modes 424 -- 23.4.2 Transmission of AMR Frames on the Air Interface 425 -- 23.4.3 Transmission of AMR Frames in the Fixed Network 426 -- References 427 -- Bibliography 429 -- Index 431.…”
Publicado 2014
Libro electrónico -
19862Publicado 2017Tabla de Contenidos: “…Emerging Fields and Other Related Fields -- Application of MATLAB in University Physics Teaching / The Impact of Innovation Strategy on Firm Financial Performance / Transverse-Load Characteristics of Long Period Fiber Gratings Fabricated By Femtosecond Laser Pulses…”
Libro electrónico -
19863Publicado 2013Tabla de Contenidos: “…-- Cross-References -- References -- Academic Firm -- Synonyms -- The Conceptual Definition of the Academic Firm -- Organizational Aspects of the Academic Firm -- Conclusion and Future Directions -- Cross-References -- References -- Academic Spin-Off -- Accompaniment -- Accompaniment of Business Creation -- Synonyms -- The Accompanier-Accompanied Relationship: Characteristics -- Diversity in the Forms of Accompaniment -- Performance in Accompaniment -- Conclusions and Future Directions -- Cross-References -- References…”
Libro electrónico -
19864Publicado 2016Tabla de Contenidos: “…Intercepting Network Traffic -- Performing In-Game Actions -- Emulating the Keyboard -- Sending Packets -- Tying the Pieces Together -- Making the Perfect Healer -- Resisting Enemy Crowd-Control Attacks -- Avoiding Wasted Mana -- Closing Thoughts -- Chapter 11: Putting it All Together: Writing Autonomous Bots -- Control Theory and Game Hacking -- State Machines -- Combining Control Theory and State Machines -- A Basic Healer State Machine -- A Complex Hypothetical State Machine -- Error Correction -- Pathfinding with Search Algorithms -- Two Common Search Techniques -- How Obstacles Disrupt Searches -- An A* Search Algorithm -- When A* Searches Are Particularly Useful -- Common and Cool Automated Hacks -- Looting with Cavebots -- Automating Combat with Warbots -- Closing Thoughts -- Chapter 12: Staying Hidden -- Prominent Anti-Cheat Software -- The PunkBuster Toolkit -- Signature-Based Detection -- Screenshots -- Hash Validation -- The ESEA Anti-Cheat Toolkit -- The VAC Toolkit -- DNS Cache Scans -- Binary Validation -- False Positives -- The GameGuard Toolkit -- User-Mode Rootkit -- Kernel-Mode Rootkit -- The Warden Toolkit -- Carefully Managing a Bot's Footprint -- Minimizing a Bot's Footprint -- Masking Your Footprint -- Teaching a Bot to Detect Debuggers -- Anti-Debugging Techniques -- Defeating Signature-Based Detection -- Defeating Screenshots -- Defeating Binary Validation -- Defeating an Anti-Cheat Rootkit -- Defeating Heuristics -- Closing Thoughts -- Index -- Footnotes -- Chapter 4: From Code to Memory: A General Primer -- Resources -- The Electronic Frontier Foundation -- Get Inside the Game…”
Libro electrónico -
19865Publicado 2015Tabla de Contenidos: “…Zhang -- Improving autocorrelation performance of 2-dimensional coupled logistic (2DCL) sequence using phase space methods / B. …”
Libro electrónico -
19866Publicado 2021Tabla de Contenidos: “…2.4.11.7 Bandwidth and hypertuning -- 2.4.11.8 Lasso regression -- 2.4.11.9 Dropout -- 2.4.12 Generalization puzzle of deep and overparameterized learning -- 2.4.13 Online machine learning -- 2.4.14 Boosting -- 2.4.15 Twicing -- 2.4.16 Randomized learning -- 2.4.17 Latent structure -- 2.4.18 No free lunch and AutoML -- 2.4.19 Computer power and machine learning -- 2.5 Dynamical modeling -- 2.6 Alternative reality -- 2.7 Timeliness‐significance tradeoff -- 2.8 Grouping -- 2.9 Conditioning -- 2.10 Pairwise predictors -- 2.11 Forecast for securities from their linear combinations -- 2.12 Forecast research vs simulation -- Chapter 3 Forecast Combining -- 3.1 Correlation and diversification -- 3.2 Portfolio combining -- 3.3 Mean‐variance combination of forecasts -- 3.4 Combining features vs combining forecasts -- 3.5 Dimensionality reduction -- 3.5.1 PCA, PCR, CCA, ICA, LCA, and PLS -- 3.5.2 Clustering -- 3.5.3 Hierarchical combining -- 3.6 Synthetic security view -- 3.7 Collaborative filtering -- 3.8 Alpha pool management -- 3.8.1 Forecast development guidelines -- 3.8.1.1 Point-in-time data -- 3.8.1.2 Horizon and scaling -- 3.8.1.3 Type of target return -- 3.8.1.4 Performance metrics -- 3.8.1.5 Measure of forecast uncertainty -- 3.8.1.6 Correlation with existing forecasts -- 3.8.1.7 Raw feature library -- 3.8.1.8 Overfit handling -- 3.8.2 Pnl attribution -- 3.8.2.1 Marginal attribution -- 3.8.2.2 Regression-based attribution -- Chapter 4 Risk -- 4.1 Value at risk and expected shortfall -- 4.2 Factor models -- 4.3 Types of risk factors -- 4.4 Return and risk decomposition -- 4.5 Weighted PCA -- 4.6 PCA transformation -- 4.7 Crowding and liquidation -- 4.8 Liquidity risk and short squeeze -- 4.9 Forecast uncertainty and alpha risk -- Chapter 5 Trading Costs and Market Elasticity -- 5.1 Slippage -- 5.2 Impact -- 5.2.1 Empirical observations…”
Libro electrónico -
19867Publicado 2022Tabla de Contenidos: “…Pillars of the Well-Architected Framework -- 2.5.1 Operational excellence -- 2.5.2 Security -- 2.5.3 Reliability -- 2.5.4 Performance efficiency -- 2.5.5 Cost optimization -- 2.5.6 Sustainability -- 2.5.7 Section quiz -- Summary -- Chapter quiz answers…”
Libro electrónico -
19868por Cabestany, JoanTabla de Contenidos: “…6.5.3 Protocol, Script and Metrics -- 6.5.4 Results -- 6.5.4.1 Appointment test -- 6.5.4.2 Medication test -- 6.6 Conclusions after the User-Centred Process -- 6.7 Characteristics of REMPARK Smartphone Applications -- 6.8 Some Concluding Remarks -- References -- Chapter 7 - Actuator Sub-System: The Auditory Cueing -- 7.1 Introduction -- 7.2 Cueing Strategies for Gait in Parkinson's Disease -- 7.3 State of the Art: Competitive Analysis -- 7.4 REMPARK Auditory Cueing System (ACS) -- 7.5 Outcomes from Field Trials: Future Considerations -- 7.6 A Step Further in REMPARK: Automatic Drug Administration -- 7.7 Conclusion -- References -- Chapter 8 - Disease Management System (DMS) -- 8.1 Introduction -- 8.2 Disease Management System Application -- 8.3 DMS Functional Organization -- 8.4 Advantages Using the Disease Management System (DMS) -- 8.4.1 Advantages for the Clinical Team -- 8.4.2 Advantages for the Patients -- 8.4.3 Advantages for the Organization -- 8.5 Conclusions, Discussion and Vision -- References -- Chapter 9 - REMPARK System Assessment: Main Results -- 9.1 Introduction -- 9.2 Description of Main Communication Flows -- 9.2.1 Type of Transmitted Information -- 9.2.2 Security Aspects -- 9.2.3 Final Deployment and Implementation of the REMPARK Platform -- 9.3 Pilot for the REMPARK System Assessment: Description -- 9.3.1 Definition of the Pilots' Objectives and Eligibility Criteria -- 9.3.2 Design of the Study -- 9.3.3 Pre-Pilot Conclusions -- 9.4 REMPARK Pilots' Execution and Obtained Results -- 9.4.1 Performance of the System -- 9.4.2 Validity of the ON-OFF Detection Algorithm -- 9.4.2.1 The methodology -- 9.4.2.2 Validation of the ON-OFF diaries: available data -- 9.4.2.3 Results of the ON/OFF state detection -- 9.4.3 Non-Motor Symptoms Descriptive Analysis -- 9.4.4 Efficacy and Effectiveness of the Cueing System…”
Publicado 2022
Libro electrónico -
19869por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Définir des priorités gouvernementales globales -- 3.3.3. Rapports sur les performances des ministères -- Rôle du Secrétariat du Conseil du Trésor (SCT) -- 3.3.4. …”
Publicado 2019
Libro electrónico -
19870Publicado 2017Tabla de Contenidos: “…GPIO callback functions -- DC motor control in Python -- Some mini-project challenges for the reader -- Summary -- Chapter 4: Communication Interfaces -- UART - serial port -- Raspberry Pi Zero's UART port -- Setting up the Raspberry Pi Zero serial port -- Example 1 - interfacing a carbon dioxide sensor to the Raspberry Pi -- Python code for serial port communication -- I2C communication -- Example 2 - PiGlow -- Installing libraries -- Example -- Example 3 - Sensorian add-on hardware for the Raspberry Pi -- I2C drivers for the lux sensor -- Challenge -- The SPI interface -- Example 4 - writing to external memory chip -- Challenge to the reader -- Summary -- Chapter 5: Data Types and Object-Oriented Programming in Python -- Lists -- Operations that could be performed on a list -- Append element to list: -- Remove element from list: -- Retrieving the index of an element -- Popping an element from the list -- Counting the instances of an element: -- Inserting element at a specific position: -- Challenge to the reader -- Extending a list -- Clearing the elements of a list -- Sorting the elements of a list -- Reverse the order of elements in list -- Create copies of a list -- Accessing list elements -- Accessing a set of elements within a list -- List membership -- Let's build a simple game! …”
Libro electrónico -
19871Publicado 2017Tabla de Contenidos: “…-- Lab 1-installing Snort and creating ICMP rules lab -- Lab 2-create the following snort.conf and icmp.rules files -- Rule options -- Lab 3-execute Snort -- Show log alert -- Alert explanation -- Lab 4-execute Snort as Daemon -- Summary -- Chapter 16: Advance Wireless Security Lab Using the Wi-Fi Pineapple Nano/Tetra -- The history of Wi-Fi - the WLAN standard -- Wireless vulnerability -- The Wi-Fi Pineapple -- For penetration testing -- Lab 1-how to set up -- Getting connected -- Performing a scan -- Getting connected, managing your network, and broadcasting Wi-Fi -- Reporting data -- Logging data with Pineapple -- Reporting data -- Enabling the landing page -- Summary -- Chapter 17: Offensive Security and Threat Hunting -- What is offensive security? …”
Libro electrónico -
19872Publicado 2018Tabla de Contenidos: “…Chapter 5: CRUD Operations in Plain REST (Without Reactive) and File Upload -- Mapping CRUD operations to HTTP methods -- Creating resources -- CRUD operation in Spring 5 (without Reactive) -- getAllUsers - implementation -- getUser - implementation -- createUser - implementation -- updateUser - implementation -- deleteUser - implementation -- File uploads - REST API -- Testing the file upload -- Summary -- Chapter 6: Spring Security and JWT (JSON Web Token) -- Spring Security -- Authentication and authorization -- JSON Web Token (JWT) -- JWT dependency -- Creating a JWT token -- Generating a token -- Getting a subject from a JWT token -- Getting a subject from a token -- Summary -- Chapter 7: Testing RESTful Web Services -- JUnit -- MockMvc -- Testing a single user -- Postman -- Getting all the users - Postman -- Adding a user - Postman -- Generating a JWT - Postman -- Getting the subject from the token -- SoapUI -- Getting all the users - SoapUI -- Generating JWT SoapUI -- Getting the subject from the token - SoapUI -- jsoup -- Getting a user - jsoup -- Adding a user - jsoup -- Running the test cases -- Summary -- Chapter 8: Performance -- HTTP compression -- Content negotiation -- Accept-Encoding -- Content-Encoding -- Server-driven content negotiation -- Agent-driven content negotiation -- HTTP caching -- HTTP cache control -- Public caching -- Private caching -- No-cache -- Only-if-cached -- Cache validation -- ETags -- Last-Modified/If-Modified-Since headers -- Cache implementation -- The REST resource -- Caching with ETags -- Summary -- Chapter 9: AOP and Logger Controls -- Aspect-oriented programming (AOP) -- AOP (@Before) with execution -- Testing AOP @Before execution -- AOP (@Before) with annotation -- Testing AOP @Before annotation -- Integrating AOP with JWT -- Logger controls -- SLF4J, Log4J, and Logback -- Logback framework…”
Libro electrónico -
19873Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Improving performance using cache for remote validation -- Getting ready -- How to do it... -- How it works... -- See also -- Using Gatling to load test remote token validation -- Getting ready -- How to do it... -- There's more... -- See also -- Dynamic client registration…”
Libro electrónico -
19874Publicado 2023Tabla de Contenidos: “…Shaofeng Wang, Xin Cai, Jian Zhou, Zhengyang Song and Xiaofeng Li Analytical, Numerical and Big-Data-Based Methods in Deep Rock Mechanics Reprinted from: Mathematics 2022, 10, 3403, doi:10.3390/math10183403 . 1 -- Jianguo Zhang, Peitao Li, Xin Yin, Sheng Wang and Yuanguang Zhu Back Analysis of Surrounding Rock Parameters in Pingdingshan Mine Based on BP Neural Network Integrated Mind Evolutionary Algorithm Reprinted from: Mathematics 2022, 10, 1746, doi:10.3390/math10101746 . 7 -- Chong Li and Zhijun Xu Numerical Modeling and Investigation of Fault-Induced Water Inrush Hazard under Different Mining Advancing Directions Reprinted from: Mathematics 2022, 10, 1561, doi:10.3390/math10091561 . 23 -- Yangchun Wu, Linqi Huang, Xibing Li, Yide Guo, Huilin Liu and Jiajun Wang Effects of Strain Rate and Temperature on Physical Mechanical Properties and Energy Dissipation Features of Granite Reprinted from: Mathematics 2022, 10, 1521, doi:10.3390/math10091521 . 35 -- Laifu Song, Hao Ying, Wei Wang, Ning Fan and Xueming Du Reliability Modelling of Pipeline Failure under the Impact of Submarine Slides-Copula Method Reprinted from: Mathematics 2022, 10, 1382, doi:10.3390/math10091382 . 55 -- Minglei Zhai, Dan Ma and Haibo Bai Diffusion Mechanism of Slurry during Grouting in a Fractured Aquifer: A Case Study in Chensilou Coal Mine, China Reprinted from: Mathematics 2022, 10, 1345, doi:10.3390/math10081345 . 81 -- Yuan Zhao, Guoyan Zhao, Jing Zhou, Xin Cai and Ju Ma Mining Stress Evolution Law of Inclined Backfilled Stopes Considering the Brittle-Ductile Transition in Deep Mining Reprinted from: Mathematics 2022, 10, 1308, doi:10.3390/math10081308 . 95 -- Ying Chen, Shirui Chen, Zhengyu Wu, Bing Dai, Longhua Xv and Guicai Wu Optimization of Genetic Algorithm through Use of Back Propagation Neural Network in Forecasting Smooth Wall Blasting Parameters Reprinted from: Mathematics 2022, 10, 1271, doi:10.3390/math10081271 . 117 -- Baoping Chen, Bin Gong, Shanyong Wang and Chun'an Tang Research on Zonal Disintegration Characteristics and Failure Mechanisms of Deep Tunnel in Jointed Rock Mass with Strength Reduction Method Reprinted from: Mathematics 2022, 10, 922, doi:10.3390/math10060922 139 -- Diyuan Li, Zida Liu, Danial Jahed Armaghani, Peng Xiao and Jian Zhou Novel Ensemble Tree Solution for Rockburst Prediction Using Deep Forest Reprinted from: Mathematics 2022, 10, 787, doi:10.3390/math10050787 159 -- Kewei Liu, Shaobo Jin, Yichao Rui, Jin Huang and Zhanxing Zhou Effect of Lithology on Mechanical and Damage Behaviors of Concrete in Concrete-Rock Combined Specimen Reprinted from: Mathematics 2022, 10, 727, doi:10.3390/math10050727 183 -- Tong Zhang, Xiaodong Nie, Shuaibing Song, Xianjie Hao and Xin Yang Modeling Uranium Transport in Rough-Walled Fractures with Stress-Dependent Non-Darcy Fluid Flow Reprinted from: Mathematics 2022, 10, 702, doi:10.3390/math10050702 201 -- Shaofeng Wang, Yu Tang, Ruilang Cao, Zilong Zhou and Xin Cai Regressive and Big-Data-Based Analyses of Rock Drillability Based on Drilling Process Monitoring (DPM) Parameters Reprinted from: Mathematics 2022, 10, 628, doi:10.3390/math10040628 223 -- Longjun Dong, Lingyun Zhang, Huini Liu, Kun Du and Xiling Liu Acoustic Emission b Value Characteristics of Granite under True Triaxial Stress Reprinted from: Mathematics 2022, 10, 451, doi:10.3390/math10030451 243 -- Barkat Ullah, Muhammad Kamran and Yichao Rui Predictive Modeling of Short-Term Rockburst for the Stability of Subsurface Structures Using Machine Learning Approaches: t-SNE, K-Means Clustering and XGBoost Reprinted from: Mathematics 2022, 10, 449, doi:10.3390/math10030449 259 -- Min Wang, Qifeng Guo, Yakun Tian and Bing Dai Physical and Mechanical Properties Evolution of Coal Subjected to Salty Solution and a Damage Constitutive Model under Uniaxial Compression Reprinted from: Mathematics 2021, 9, 3264, doi:10.3390/math9243264 279 -- Bo Sun, Zhiyu Zhang, Jiale Meng, Yonghui Huang, Hongchao Li and Jun Wang Research on Deep-Hole Cutting Blasting Efficiency in Blind Shafting with High In-Situ Stress Environment Using the Method of SPH Reprinted from: Mathematics 2021, 9, 3242, doi:10.3390/math9243242 299 -- Zhuo Rong, Xiang Yu, Bin Xu and Xueming Du Reliability Analysis of High Concrete-Face Rockfill Dams and Study of Seismic Performance of Earthquake-Resistant Measures Based on Stochastic Dynamic Analysis Reprinted from: Mathematics 2021, 9, 3124, doi:10.3390/math9233124 315 -- Yuantian Sun, Guichen Li and Sen Yang Rockburst Interpretation by a Data-Driven Approach: A Comparative Study Reprinted from: Mathematics 2021, 9, 2965, doi:10.3390/math9222965 333 -- Jiasen Liang, Shaokun Ma and Xueming Du Diffusion Model of Parallel Plate Crack Grouting Based on Foaming Expansion Characteristics of Polymer Slurry Reprinted from: Mathematics 2021, 9, 2907, doi:10.3390/math9222907 347 -- Shan Yang, Zitong Xu and Kaijun Su Variable Weight Matter-Element Extension Model for the Stability Classification of Slope Rock Mass Reprinted from: Mathematics 2021, 9, 2807, doi:10.3390/math9212807 365 -- Kexin Yin, Lianghui Li and Eugenia Di Filippo A Numerical Investigation to Determine the p-y Curves of Laterally Loaded Piles Reprinted from: Mathematics 2021, 9, 2783, doi:10.3390/math9212783 379 -- Lihai Tan, Ting Ren, Linming Dou, Xiaohan Yang, Gaofeng Wang and Huaide Peng Analytical Stress Solution and Numerical Mechanical Behavior of Rock Mass Containing an Opening under Different Confining Stress Conditions Reprinted from: Mathematics 2021, 9, 2462, doi:10.3390/math9192462 393 -- Daoyuan Sun, Yifan Wu, Longjun Dong and Qiaomu Luo Closed-Form Solutions for Locating Heat-Concentrated Sources Using Temperature Difference Reprinted from: Mathematics 2022, 10, 2843, doi:10.3390/math10162843 . 411.…”
Libro electrónico -
19875Publicado 2023Tabla de Contenidos: “…-- 6.1.1 Identifying abnormal usage of resources -- 6.1.2 Finding out what code executes -- 6.1.3 Identifying slowness in an app's execution -- 6.2 Using a profiler -- 6.2.1 Installing and configuring VisualVM -- 6.2.2 Observing the CPU and memory usage -- 6.2.3 Identifying memory leaks -- Summary -- 7 Finding hidden issues using profiling techniques -- 7.1 Sampling to observe executing code -- 7.2 Profiling to learn how many times a method executed -- 7.3 Using a profiler to identify SQL queries an app executes -- 7.3.1 Using a profiler to retrieve SQL queries not generated by a framework -- 7.3.2 Using the profiler to get the SQL queries generated by a framework -- 7.3.3 Using the profiler to get programmatically generated SQL queries -- Summary -- 8 Using advanced visualization tools for profiled data -- 8.1 Detecting problems with JDBC connections -- 8.2 Understanding the app's code design using call graphs -- 8.3 Using flame graphs to spot performance problems -- 8.4 Analyzing queries on NoSQL databases -- Summary -- 9 Investigating locks in multithreaded architectures -- 9.1 Monitoring threads for locks -- 9.2 Analyzing thread locks -- 9.3 Analyzing waiting threads -- Summary -- 10 Investigating deadlocks with thread dumps -- 10.1 Getting a thread dump -- 10.1.1 Getting a thread dump using a profiler -- 10.1.2 Generating a thread dump from the command line -- 10.2 Reading thread dumps…”
Libro electrónico -
19876por Schär, ClarissaTabla de Contenidos: “…6 Schlussdiskussion -- 6.1 Forschungsmethodologische und ‐methodische Reflexion -- 6.1.1 Die körperleibsensible Haltung im Forschungsprozess -- 6.1.2 Voruntersuchung: Reflexion der Selbstreflexion -- 6.1.3 Hauptuntersuchung: Forschungsethische Reflexion -- 6.1.4 Hauptuntersuchung: Verallgemeinerbarkeit der Befunde -- 6.2 Die Denkfigur der ›Imaginationen des Körpers‹ -- 6.2.1 Zur imaginären Stabilisierung im idealisierten Spiegelbild -- 6.2.2 Imagination als performative Kraft -- 6.2.3 Subjektivierungserfahrungen: Körperleibliche Erfahrungen des Subjektseins -- 6.2.4 Fotografische Selbstdarstellungen in digitalen sozialen Netzwerken als Imaginationen des Körpers -- 6.3 Imaginationen des Körpers zwischen Unterwerfung und Ermächtigung -- 6.3.1 Die Schwerkraft der Subjektivierung: Unbehagen mit und Leiden an Subjektformen und ‐positionen -- 6.3.2 Scheinbare Schwerelosigkeit: Ermächtigung in Unterwerfung -- 6.3.3 Imaginationen des Körpers als befreiende und riskante Potenzialität mit Bildungsrelevanz -- 7 Literatur -- 8 Anhang: Transkriptionsnotation…”
Publicado 2024
Libro electrónico -
19877por Singh, HoshiarTabla de Contenidos: “…How to Build up and Maintain Wholesome Morale -- Motivation -- Theories of Motivation -- The Hierarchy of Needs Theory -- The Motivation-Hygiene Approach Theory -- McGregor's Theory X and Theory Y -- Motivation: The Carrot and the Stick Approach -- The Expectancy Theory of Motivation -- References -- Chapter 5: Structure of Organisation -- Chief Executive -- Types of Chief Executive -- Functions of the Chief Executive -- Political Functions -- Administrative Functions -- Deciding Administrative Policy -- Authorising Details of Organisation -- Coordination -- Issuing Directions -- Selection and Removal of Personnel -- Control of Financial Administration -- Supervision and Investigation -- Public Relations -- Line, Staff and Auxiliary Agencies -- Line Agencies -- Staff Agencies -- Functions of Staff Agencies -- Kinds of Staff Agencies -- Qualities of a Staff Officer -- Some Examples of Staff Agencies in Various Countries -- Distinction Between Line and Staff Agencies -- Auxiliary Agencies -- Distinction Between Auxiliary Agencies and Line Agencies -- Distinction Between Auxiliary Agencies and Staff Agencies -- Department -- Public Enterprises -- Forms of Public Enterprises -- Advantages of Corporations -- Problems of Public Corporation -- Public Sector -- Performance of the Public Enterprises -- Definition of a Board or a Commission -- Where is the Board System Suited -- The Mixed System -- Classification of Boards and Commissions -- Boards and Commissions in India -- Merits of Independent Regulatory Commissions -- Demerits of Independent Regulatory Commissions -- Attempts at Reforms of the Commissions -- Headquarters-Field Relationship -- Grading and Classification of Field-Stations -- Headquarters-Field Relationship -- Supervision and Control of Field-Stations -- References -- Chapter 6: Personnel Administration…”
Publicado 2011
Libro electrónico -
19878Publicado 2009Tabla de Contenidos: “…Continuously Rasterizing a Layer -- Quality Setting Switches -- Chapter 6: Layer Editing -- Viewing Layers in the Timeline and Layer Panels -- The Time Graph -- Navigating the Time Graph -- The Layer Panel -- Trimming Layers -- Moving Layers in Time -- Showing Numerical Editing Controls -- Changing a Layer's Speed -- Performing a Slip Edit -- Sequencing and Overlapping Layers -- Duplicating Layers -- Splitting Layers -- Using Markers -- Chapter 7: Properties and Keyframes -- Layer Property Types -- Viewing Properties -- Setting Global vs. …”
Libro electrónico -
19879Publicado 2005Tabla de Contenidos: “…Moodle Administration -- Notifications -- Users -- Authentication -- Accounts -- Browse list of users -- Add a new user -- Upload users -- User profile fields -- Permissions -- Define roles -- Assign global roles -- User policies -- Courses -- Add/edit courses -- Enrollments -- Course Request -- Backups -- Location -- Language -- Language Settings -- Language Editing -- Language Packs -- Modules -- Activities -- Blocks -- Filters -- Security -- Site Policies -- HTTP Security -- Module Security -- Notifications -- Anti-Virus -- Appearance -- Themes -- Theme settings -- Theme selector -- Calendar -- Filter Settings -- HTML Editor -- Moodle Docs -- My Moodle -- Course Managers -- Sticky Blocks -- Front Page -- Front Page Settings -- Front Page Roles -- Front Page Backup -- Site Files -- Server -- System Paths -- Email -- Session Handling -- RSS -- Debugging -- Statistics -- HTTP -- Maintenance Mode -- Cleanup -- Environment -- PHP Info -- Performance -- Networking -- Reports -- Course Overview -- Logs -- Statistics -- Miscellaneous -- Experimental -- XMLDB Editor -- Moodle Support -- Index…”
Libro electrónico -
19880Publicado 2004Tabla de Contenidos: “…Technology considerations -- 7.1 Query syntax support -- 7.2 Support for a common data model -- 7.3 Simple versus advanced index creation -- 7.4 Honoring the security of data sources -- 7.5 Source discovery -- 7.6 Performance considerations -- 7.7 Client features -- 7.8 Client technologies -- 7.8.1 HTML -- 7.8.2 Dynamic HTML -- 7.8.3 JavaScript -- 7.8.4 Java applets -- 7.8.5 Java servlets -- 7.8.6 JavaServer Pages (JSPs) -- 7.8.7 JavaBeans -- 7.8.8 XML -- 7.8.9 Web Services -- 7.9 Summary -- Chapter 8. …”
Libro electrónico