Mostrando 5,101 - 5,120 Resultados de 6,180 Para Buscar '"prior"', tiempo de consulta: 0.14s Limitar resultados
  1. 5101
    Publicado 2023
    Tabla de Contenidos: “…-- More Sophisticated Agile Estimation Techniques -- Velocity and Burn-down/Burn-up Charts -- Velocity -- Burn-down Charts -- Burn-up Charts -- Summary of Key Points -- Discussion Topics -- Notes -- Chapter 8 Agile Project Management Role -- Agile Project Management Shifts in Thinking -- Emphasis on Maximizing Value Versus Control -- Emphasis on Empowerment and Self-organization -- Limited Emphasis on Documentation -- Managing Flow Instead of Structure -- Potential Agile Project Management Roles -- Making Agile Work at a Team Level -- Hybrid Agile Project Role -- Enterprise-level Implementation -- Using Agile Concepts in Non-agile Projects -- Agile, PMI®, and PMBOK® -- Prior PMBOK® Versions -- What's Different About PMBOK® Version 7? …”
    Libro electrónico
  2. 5102
    por Delfino, Davide
    Publicado 2021
    Tabla de Contenidos: “…State of abandonment of one of the housing structures prior to the start of the 2017 campaign, and after the 2018 restauration campaign. -- Figure 2. …”
    Libro electrónico
  3. 5103
    por Institute of Medicine (U.S.).
    Publicado 1991
    Tabla de Contenidos: “…Machine Dependence and Societal Reaction -- Meaning and Purpose of Life Versus Fear of Death -- Spiritual Well-Being -- QUALITY OF LIFE AND ITS DETERMINANTS FOR PATIENTS WITH END-STAGE HEART DISEASE -- Heart Transplantation -- Automatic Implantable Cardioverter Defibrillator -- Providing Support in the Postoperative Phase -- Perspectives from Prior Studies of the Artificial Heart -- IMPLICATIONS OF QUALITY-OF-LIFE CONSIDERATIONS IN CLINICAL TRIALS AND STUDIES OF MECHANICAL CIRCULATORY SUPPORT PATIENTS -- Concepts and Methods -- Costworthiness: Patients' and Societal Perspectives -- SUMMARY AND CONCLUSIONS -- REFERENCES -- 6 Cost-Effectiveness Analysis -- THE USE OF COST-EFFECTIVENESS ANALYSIS IN HEALTH CARE -- Capabilities and Limitations -- COST-EFFECTIVENESS OF TOTAL ARTIFICIAL HEARTS -- Sensitivity Analysis -- Implications -- Cost-Effectiveness of Ventricular Assist Devices -- Treatment to Prevent End-Stage Disease -- COST-EFFECTIVENESS ANALYSIS AND RESEARCH FUNDING LEVELS -- Sensitivity Analysis -- Implications -- CONCLUSIONS -- The Borderline Cost-Effectiveness of Artificial Heart Use -- Using Cost-Effectiveness to Decide Funding Levels -- REFERENCES -- CHAPTER 6 APPENDIX: DESCRIPTION OF HEALTH STATES -- 7 The Appropriate Use of Technology -- WHAT APPROPRIATE TECHNOLOGY USE IS -- The Relationship Between Technology Use and Cost -- Factors That May Affect Future Use of New Technologies -- Past Failures to Limit Technology Use -- WAYS TO PROMOTE APPROPRIATE USE OF MECHANICAL CIRCULATORY SUPPORT DEVICES -- Clinical Practice Guidelines -- Developing Practice Guidelines -- Implementing Practice Guidelines -- Appropriate Use of Other Technologies -- Technology Assessment -- Postmarketing Surveillance -- Follow-Up Studies -- Credentialing for Technology Use -- Selective Coverage -- INVOLVING THE RIGHT PARTICIPANTS…”
    Libro electrónico
  4. 5104
    Tabla de Contenidos: “…Interviewer Versus Self-Administered Assessments -- Behavioral Specificity -- Reliability And Validity Of Measures -- Sample Coverage -- ANTHROPOLOGY'S PERSPECTIVE ON HUMAN SEXUAL BEHAVIOR -- From 1929 To The 1970s -- The 1980s Prior To AIDS -- Anthropological Research Since Aids -- CONCLUSIONS AND RECOMMENDATIONS -- BIBLIOGRAPHY -- 3 AIDS and IV Drug Use -- DRUG-USE BEHAVIORS THAT TRANSMIT HIV -- Sharing Drug Injection Equipment -- Social Context Of Needle-Sharing -- Initiation into Drug Use. -- Adolescent IV Drug Use. -- Friendship Networks and Intimate Relationships. -- Shooting Galleries. -- Mechanics Of Drug Use And Sources Of Contamination -- The Syringe. -- The Needle. -- The Cooker. -- The Cotton. -- The Rinse Water. -- Frequency Of Injection -- Polydrug Use -- Sexual Behaviors And IV Drug Use -- Toward A Better Understanding Of Risk-Associated Behaviors -- RISK REDUCTION AMONG IV DRUG USERS -- Changes In Injection Behavior -- Changes In Sexual Behavior -- Toward Reducing Risk-Associated Behavior Among IV Drug Users -- CONDUCTING RESEARCH ON IV DRUG USE -- Research Traditions -- Investigating Risk-Associated Drug Behaviors -- Methods -- Convenience Samples -- Self-Reported Information -- Toward Better Quality Data -- MEASURING THE SCOPE OF THE PROBLEM -- Prevalence Of IV Drug Use -- Definition Of An IV Drug User -- Techniques For Estimating The Total Number Of IV Drug Users -- National Aggregates Of State Estimates -- Consumption And Turnover Rates Among IV Drug Users -- Modeling The IV Drug-Using Population: Constraints And Limitations -- Prevalence Of AIDS And HIV Infection Among IV Drug Users -- CONCLUSION -- Bibliography -- PART II INTERVENING TO LIMIT THE SPREAD OF HIV INFECTION -- 4 Facilitating Change In Health Behaviors -- EDUCATION PROGRAMS -- The Role Of Education And Knowledge In Preventing The Spread Of Hiv Infection…”
    Libro electrónico
  5. 5105
    por Pradeep, ashyap
    Publicado 2016
    Tabla de Contenidos: “…Cover -- About the Author -- Brief Contents -- Table of Contents -- Foreword -- Preface -- Chapter 1: The Call of Rural India -- Defining Rural Markets -- Rural Myths -- Rapid Urbanization -- Rural India Is an Agrarian Economy -- The Rural Marketing Mix: Challenges -- Affordability -- Availability -- Awarenes -- Acceptability -- The Evolving Rural Consumer -- Rural India: The Exploding Middle Class -- Rural Marketing Snapshot: Changing Rural Settlements -- Rural Marketing Memo: Startling Facts about Rural India -- Review of Objectives -- Discussion and Application -- Rural Marketing Case: Rural Markets -- Chapter 2: The Rural Marketing Environment -- The Evolution of Rural Marketing -- Phase I (Prior to the 1960s) -- Phase II (1960s-1980s) -- Phase III (1990s-2000) -- Phase IV (After 2000) -- The Rural Environment -- The Demographic Environment -- The Physical Environment -- The social and Cultural Environment -- The Political Environment -- The Technological Environment -- The Rural Economic Environment -- The Changing Face of Rural Development -- The Rural Economic Structure -- The Farm Sector: Agriculture and Allied Activities -- The Non-farm Sector and Rural Industries -- Changing Migration Trends -- Incomes and Expenditure -- The Rural Infrastructure -- Road Connectivity -- Electrifi cation -- Rural housing -- Telecommunications -- Drinking Water -- Rural Marketing Snapshot: Rural Infrastructure -- Rural Marketing Insight: Road Connectivity Bringing Rural Economy on Track in Bihar -- Rural Employment Generation Programmes: Government Initiatives -- The Mahatma Gandhi National Rural Employment Guarantee Act (MNREGA) -- The Swarnjayanti Gram Swarozgar Yojna (SGSY) -- The Pradhan Mantri Rojgar Yojna -- Review of Objectives -- Discussion and Application -- Rural Marketing Case: MNREGA -- Chapter 3: Rural Consumer Behaviour…”
    Libro electrónico
  6. 5106
    Publicado 2017
    Tabla de Contenidos: “…-- Summary -- Chapter 8: Regular Expression Pitfalls, Optimization, and Performance Improvements -- Common pitfalls and ways to avoid them while writing regular expressions -- Do not forget to escape regex metacharacters outside a character class -- Avoid escaping every non-word character -- Avoid unnecessary capturing groups to reduce memory consumption -- However, don't forget to use the required group around alternation -- Use predefined character classes instead of longer versions -- Use the limiting quantifier instead of repeating a character or pattern multiple times -- Do not use an unescaped hyphen in the middle of a character class -- The mistake of calling matcher.goup() without a prior call to matcher.find(), matcher.matches(), or matcher.lookingAt() -- Do not use regular expressions to parse XML / HTML data -- How to test and benchmark your regular expression performance -- Catastrophic or exponential backtracking -- How to avoid catastrophic backtracking -- Optimization and performance enhancement tips -- Use a compiled form of regular expressions -- Use a negated character class instead of the greedy and slow .* or .+ -- Avoid unnecessary grouping…”
    Libro electrónico
  7. 5107
    Publicado 1956
    Tabla de Contenidos: “…Pamphilus Eccesiæ Cæsariensis Presbyter et Martyr Notitia Pars prior Pars altera S. Pamphili Expositio Capitum Actuum Apostolorum Apologia pro Origene Phileas Thmueos Episcopus et Martyr Notitia Excerptum ex spistola ad Thmuitas Epistola ad Meletium episcopus Lycopolitanum Theonas Episcopus Alexandrinus Notitia Epistola ad Lucianum cubicularium Addenda Commentarium Dionysii Alexandrini in principium Ecclesiastae Interpretatio ejusdem in S. …”
    Enlace con el listado completo de la colección ordenado por volúmenes
    Enlace con el listado completo de la colección ordenado por autores
    Libro
  8. 5108
    Publicado 2019
    Tabla de Contenidos: “…-- Implementation 2: Prospect Filtering -- Step 1: Data Preparation -- Step 2: Divide dataset Into Training and Testing Samples -- Step 3: Modeling Operator and Parameters -- Step 4: Configuring the Decision Tree Model -- Step 5: Process Execution and Interpretation -- 4.1.3 Conclusion -- 4.2 Rule Induction -- Approaches to Developing a Rule Set -- 4.2.1 How It Works -- Step 1: Class Selection -- Step 2: Rule Development -- Step 3: Learn-One-Rule -- Step 4: Next Rule -- Step 5: Development of Rule Set -- 4.2.2 How to Implement -- Step 1: Data Preparation -- Step 2: Modeling Operator and Parameters -- Step 3: Results Interpretation -- Alternative Approach: Tree-to-Rules -- 4.2.3 Conclusion -- 4.3 k-Nearest Neighbors -- 4.3.1 How It Works -- Measure of Proximity -- Distance -- Weights -- Correlation similarity -- Simple matching coefficient -- Jaccard similarity -- Cosine similarity -- 4.3.2 How to Implement -- Step 1: Data Preparation -- Step 2: Modeling Operator and Parameters -- Step 3: Execution and Interpretation -- 4.3.3 Conclusion -- 4.4 Naïve Bayesian -- 4.4.1 How It Works -- Step 1: Calculating Prior Probability P(Y) -- Step 2: Calculating Class Conditional Probability P(Xi|Y) -- Step 3: Predicting the Outcome Using Bayes' Theorem -- Issue 1: Incomplete Training Set -- Issue 2: Continuous Attributes -- Issue 3: Attribute Independence…”
    Libro electrónico
  9. 5109
    Publicado 2014
    Tabla de Contenidos: “…Evidence from International Variations in Self-Dealing Transparency -- 14.1 Introduction -- 14.2 Corporate Governance, Transparency, and Transaction Costs -- 14.2.1 The Nature of Corporate Governance -- 14.2.2 Corporate Governance in Asia -- 14.2.3 Corporate Governance Transparency -- 14.2.4 Opportunistic Behavior and Transaction Costs -- 14.2.5 Country Determinants of Governance Transparency -- 14.2.6 Contribution -- 14.3 Methodology -- 14.3.1 Dependent Variable -- 14.3.2 Statistical Specification -- 14.3.3 Independent Control Variables -- 14.3.4 Additional Statistical Correction -- 14.4 Results -- 14.4.1 Descriptive Statistics and Preliminary Analysis -- 14.4.2 Results of Regressions of Bounded Tobit Regressions -- 14.4.3 Discussion -- 14.5 Conclusion -- Acknowledgments -- References -- 15 Attitudes Toward Tax Evasion in Korea: A Study in Public Finance -- 15.1 Introduction -- 15.2 Prior Studies -- 15.3 The Present Study -- 15.3.1 Methodology -- 15.3.2 Findings -- 15.3.3 Gender -- 15.3.4 Age -- 15.3.5 Employment Status -- 15.3.6 Marital Status -- 15.3.7 Religion -- 15.3.8 Social Class -- 15.3.9 Confidence in Government -- 15.3.10 Feeling of Happiness -- 15.3.11 Longitudinal -- 15.4 Conclusion -- References -- 16 Attitudes Toward Accepting a Bribe: A Comparative Study of the People's Republic of China, Taiwan, and Hong Kong -- 16.1 Introduction -- 16.2 Prior Studies -- 16.3 The Present Study -- 16.3.1 Methodology -- 16.3.2 Findings -- Gender -- Age -- Marital status -- 16.4 Conclusion -- References -- Part Three: Sovereign Wealth Funds…”
    Libro electrónico
  10. 5110
    Publicado 2017
    Tabla de Contenidos: “…An Empirical Case Study of Release Management -- 1 Introduction -- 2 Prior Related Work -- 3 Empirical Background -- 4 Methodological Design -- 5 Results -- 5.1 Release Management at OpenStack -- 6 Discussion -- 7 Conclusion -- References -- Technical Lag in Software Compilations: Measuring How Outdated a Software Deployment Is -- 1 From Upstream to Deployment -- 2 Technical Debt and Technical Lag -- 3 Computing Technical Lag for a Deployment -- 4 Formal Definition of Technical Lag -- 5 Calculating Lag Between Packages -- 6 Discussion and Conclusions -- References -- OSSpal: Finding and Evaluating Open Source Software -- Abstract -- 1 Introduction -- 2 The Business Readiness Rating -- 2.1 Evaluation Categories -- 2.2 Experience and Shortcomings of the BRR -- 3 From BRR to OSSpal -- 3.1 Overview of Changes to the Model -- 3.2 Implementation and the Quick Assessment Tool -- 3.3 A Note About FOSS Quality -- 3.4 Using the OSSpal Site -- 4 Status and Future Directions -- Acknowledgments -- References -- Longitudinal Analysis of the Run-up to a Decision to Break-up (Fork) in a Community -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Data Collection -- 4.2 The Statistical Model -- 5 Results -- 6 Conclusion -- 7 Threats to Validity -- References -- Author Index…”
    Libro electrónico
  11. 5111
    por Muhlmeyer, Michael
    Publicado 2021
    “…At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. …”
    Libro electrónico
  12. 5112
    Publicado 2018
    “…A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure About This Book Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts, Active Directory delegation, and CRON jobs Practical use cases to deliver an intelligent endpoint-protected system Who This Book Is For If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial. …”
    Libro electrónico
  13. 5113
    Publicado 2018
    “…Over 100 recipes for penetration testing using Metasploit and virtual machines About This Book Special focus on the latest operating systems, exploits, and penetration testing techniques Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures Automate post exploitation with AutoRunScript Exploit Android devices, record audio and video, send and read SMS, read call logs, and much more Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Who This Book Is For If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required. …”
    Libro electrónico
  14. 5114
    Publicado 2018
    “…Transform and modernize your businesses and upgrade your enterprise management skills with Odoo 11, the most comprehensive management software About This Book Use project management along with analytics for better reporting Build an Odoo module and integrate it with other platforms with this practical guide Explore new design and mobile updates from the Odoo enterprise Who This Book Is For This book is for beginners, and will help you learn advanced-level features with Odoo such as creating your own custom modules. You do not need any prior knowledge of Odoo. What You Will Learn Configure a functioning customer relationship management system Set up a purchasing and receiving system Implement manufacturing operations and processes using real-world examples Discover the capabilities of Odoo's financial accounting and reporting features Integrate powerful human resource applications Utilize Odoo's project management application to organize tasks Customize Odoo without writing a line of code In Detail Odoo is an all-in-one management software that offers an array of business applications, forming a complete suite of enterprise management applications. …”
    Libro electrónico
  15. 5115
    Publicado 2018
    “…Exploit the features of TypeScript to easily create your very own web applications About This Book Develop modular, scalable, maintainable, and adaptable web applications by taking advantage of TypeScript Walk through the fundamentals of TypeScript with the help of practical examples Enhance your web development skills using TypeScript 2.x Who This Book Is For If you are a developer aiming to learn TypeScript to build attractive web applications, this book is for you. No prior knowledge of TypeScript is required. However, a basic understanding of JavaScript would be an added advantage. …”
    Libro electrónico
  16. 5116
    Publicado 2018
    “…About This Book Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Who This Book Is For This book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage What You Will Learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer In Detail This book will provide you with a holistic understanding of social engineering. …”
    Libro electrónico
  17. 5117
    Publicado 2018
    “…Be an adaptive thinker that leads the way to Artificial Intelligence About This Book AI-based examples to guide you in designing and implementing machine intelligence Develop your own method for future AI solutions Acquire advanced AI, machine learning, and deep learning design skills Who This Book Is For Artificial Intelligence by Example is a simple, explanatory, and descriptive guide for junior developers, experienced developers, technology consultants, and those interested in AI who want to understand the fundamentals of Artificial Intelligence and implement it practically by devising smart solutions. Prior experience with Python and statistical knowledge is essential to make the most out of this book. …”
    Libro electrónico
  18. 5118
    Publicado 2018
    “…You'll need some experience of Linux systems administration, including familiarity with the command line, filesystem, and text editing. No prior programming experience is required. What You Will Learn Discover the latest and most advanced features of Puppet Bootstrap your Puppet installation using powerful tools like Rake Master techniques to deal with centralized and decentralized Puppet deployments Use exported resources and forge modules to set up Puppet modules Create efficient manifests to streamline your deployments Automate Puppet master deployment using Git hooks and PuppetDB Make Puppet reliable, performant, and scalable In Detail Puppet is a configuration management system that automates all your IT configurations, giving you control of managing each node.Puppet 5 Cookbook will take you through Puppet's latest and most advanced features, including Docker containers, Hiera, and AWS Cloud Orchestration. …”
    Libro electrónico
  19. 5119
    por Whitaker, Sean
    Publicado 2013
    Tabla de Contenidos: “…-- Task 10: Plan risk management by developing a risk management plan, and identifying, analyzing, and prior to rising project risks in the risk register and defining risk response strategies, in order to manage uncertainty throughout the project life cycle. -- Exam need to know... -- Risk management plan -- Risk identification -- Qualitative risk analysis -- Quantitative risk analysis -- Risk response planning -- Can you answer these questions? …”
    Libro electrónico
  20. 5120
    por Heijden, Ferdinand van der
    Publicado 2017
    Tabla de Contenidos: “…5.2.1 Optimal Online Estimation in Linear-Gaussian Systems -- 5.2.2 Suboptimal Solutions for Non-linear Systems -- 5.3 Finite Discrete-Time State Variables -- 5.3.1 Hidden Markov Models -- 5.3.2 Online State Estimation -- 5.3.3 Offline State Estimation -- 5.4 Mixed States and the Particle Filter -- 5.4.1 Importance Sampling -- 5.4.2 Resampling by Selection -- 5.4.3 The Condensation Algorithm -- 5.5 Genetic State Estimation -- 5.5.1 The Genetic Algorithm -- 5.5.2 Genetic State Estimation -- 5.5.3 Computational Issues -- 5.6 State Estimation in Practice -- 5.6.1 System Identification -- 5.6.2 Observability, Controllability and Stability -- 5.6.3 Computational Issues -- 5.6.4 Consistency Checks -- 5.7 Selected Bibliography -- 6 Supervised Learning -- 6.1 Training Sets -- 6.2 Parametric Learning -- 6.2.1 Gaussian Distribution, Mean Unknown -- 6.2.2 Gaussian Distribution, Covariance Matrix Unknown -- 6.2.3 Gaussian Distribution, Mean and Covariance Matrix Both Unknown -- 6.2.4 Estimation of the Prior Probabilities -- 6.2.5 Binary Measurements -- 6.3 Non-parametric Learning -- 6.3.1 Parzen Estimation and Histogramming -- 6.3.2 Nearest Neighbour Classification -- 6.3.3 Linear Discriminant Functions -- 6.3.4 The Support Vector Classifier -- 6.3.5 The Feedforward Neural Network -- 6.4 Adaptive Boosting - Adaboost -- 6.5 Convolutional Neural Networks (CNNs) -- 6.5.1 Convolutional Neural Network Structure -- 6.5.2 Computation and Training of CNNs -- 6.6 Empirical Evaluation -- 6.7 Selected Bibliography -- 7 Feature Extraction and Selection -- 7.1 Criteria for Selection and Extraction -- 7.1.1 Interclass/Intraclass Distance -- 7.1.2 Chernoff-Bhattacharyya Distance -- 7.1.3 Other Criteria -- 7.2 Feature Selection -- 7.2.1 Branch-and-Bound -- 7.2.2 Suboptimal Search -- 7.2.3 Several New Methods of Feature Selection -- 7.2.4 Implementation Issues…”
    Libro electrónico