Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2901por Millas, Jose Luis LatorreTabla de Contenidos: “…. -- Configuring our application to use unobtrusive validation -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using Smart Tasks in the HTML editor -- Getting ready -- How to do it... -- How it works... -- Using WAI-ARIA support -- Getting ready -- How to do it... -- How it works... -- Using the Extract to User Control feature -- Getting ready -- How to do it... -- How it works... -- Using the Page Inspector feature -- Getting ready -- How to do it... -- How it works... -- Creating an asynchronous HTTP module -- Getting ready -- How to do it... -- How it works... -- There's more... -- 6. …”
Publicado 2013
Libro electrónico -
2902Publicado 2018Tabla de Contenidos: “…Data download and exploration -- Preparing the data for our models -- The binary classification model -- The regression model -- Improving the binary classification model -- The unreasonable effectiveness of data -- Summary -- Chapter 5: Image Classification Using Convolutional Neural Networks -- CNNs -- Convolutional layers -- Pooling layers -- Dropout -- Flatten layers, dense layers, and softmax -- Image classification using the MXNet library -- Base model (no convolutional layers) -- LeNet -- Classification using the fashion MNIST dataset -- References/further reading -- Summary -- Chapter 6: Tuning and Optimizing Models -- Evaluation metrics and evaluating performance -- Types of evaluation metric -- Evaluating performance -- Data preparation -- Different data distributions -- Data partition between training, test, and validation sets -- Standardization -- Data leakage -- Data augmentation -- Using data augmentation to increase the training data -- Test time augmentation -- Using data augmentation in deep learning libraries -- Tuning hyperparameters -- Grid search -- Random search -- Use case-using LIME for interpretability -- Model interpretability with LIME -- Summary -- Chapter 7: Natural Language Processing Using Deep Learning -- Document classification -- The Reuters dataset -- Traditional text classification -- Deep learning text classification -- Word vectors -- Comparing traditional text classification and deep learning -- Advanced deep learning text classification -- 1D convolutional neural network model -- Recurrent neural network model -- Long short term memory model -- Gated Recurrent Units model -- Bidirectional LSTM model -- Stacked bidirectional model -- Bidirectional with 1D convolutional neural network model -- Comparing the deep learning NLP architectures -- Summary -- Chapter 8: Deep Learning Models Using TensorFlow in R.…”
Libro electrónico -
2903Publicado 2022Tabla de Contenidos: “…-- Walk-Through: Web Server Installation -- Moving Tasks -- Migrate the Handler -- Migrate Templates -- Use the New Roles in Your Playbook -- Validate Your Structure -- Role Structure -- Role Default Variables -- Role Dependencies…”
Libro electrónico -
2904Publicado 2006Tabla de Contenidos: “…-- Implicit and explicit memory for object locations in healthy older adults -- Object-location memory in dementia -- Neural processes related to (pathological) aging and spatial memory -- Conclusion -- References -- Visuospatial and constructional impairments in mental deterioration -- Introduction -- Visuospatial and visuoconstructional disorders -- Constructional disturbances in dementia -- Mechanisms of constructional disturbances in dementia -- References -- Using visual imagery as a mnemonic for verbal associative learning -- Introduction -- Individual differences in imagery use -- Predictive validity of self-reported imagery -- Available data on self-reported imagery use during PA learning -- Measurement of imagery mediator production -- Age and gender differences in IDQ scales -- Correlations of imagery questionnaires with PA mediator production -- Prediction of PA imagery production -- Conclusions -- References -- Neuropsychological aspects of space representation -- Spatial navigation -- Introduction -- Spatial navigation: Cognitive and neuropsychological aspects -- Concluding remarks -- References -- Visuomotor control of spatially directed action -- Introduction: Two functions served by vision -- Reaching to a single target -- On-line adjustments during reaching -- Delayed reaching -- Reaching between obstacles -- Conclusions -- References -- Visual peripersonal space -- Introduction -- References -- Visual perceptual processing in unilateral spatial neglect -- Introduction -- Sensory and perceptual processing in unilateral spatial neglect…”
Libro electrónico -
2905Publicado 2023Tabla de Contenidos: “…-- Using runqemu capabilities -- Using runqemu to test graphical applications -- Using runqemu to validate memory constraints -- Using runqemu to help with image regression tests -- Summary -- Chapter 17: Best Practices -- Guidelines to follow for Yocto Project -- Managing layers -- Avoid creating too many layers -- Prepare the product metadata for new Yocto Project releases -- Create your custom distro -- Avoid reusing existing images for your product -- Standard SDK is commonly undervalued -- Avoid too many patches for Linux kernel and bootloader modifications -- Avoid using AUTOREV as SRCREV -- Create a Software Bill of Materials -- Guidelines to follow for general projects -- Continuously monitor the project license constraints -- Security can harm your project -- Don't underestimate maintenance costs…”
Libro electrónico -
2906Publicado 2024Tabla de Contenidos: “…-- Linux server multi-factor authentication (MFA) -- Server patching -- Enabling TLS/SSL -- Installing an SSL certificate -- Configuring SSL/TLS client connections -- SSL certificate validation -- Alternatives to Let's Encrypt SSL certificates -- Investigating firewalls -- Linux server firewalls -- Uncomplicated Firewall -- fail2ban -- Learning about exfiltration -- Exploring server immutability -- CI/CD with GitLab -- An introduction to containerization -- Summary -- Chapter 5: Endpoint Protection -- Technical requirements -- Malware -- What are rootkits? …”
Libro electrónico -
2907por Simpson, AlanTabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Where to Go from Here -- Chapter 1 Starting with Python -- Why Python Is Hot -- Choosing the Right Python -- Tools for Success -- Installing Python and VS Code -- Installing the Python extension -- Letting AI write your Python code -- Using GitHub Copilot -- Chapter 2 Using Interactive Mode, Getting Help, and Writing Apps -- Using Python's Interactive Mode -- Opening Terminal -- Going into the Python Interpreter -- Entering commands -- Using Python's built-in help -- Exiting interactive help -- Searching for specific help topics online -- Creating a Folder for Your Python Code -- Typing, Editing, and Debugging Python Code -- Writing Python code -- Saving your code -- Running Python in VS Code -- Learning simple debugging -- Closing a file -- Chapter 3 Python Elements and Syntax -- The Zen of Python -- Introducing Object-Oriented Programming -- Discovering Why Indentations Count, Big Time -- Using Python Modules -- Chapter 4 Building Your First Python Application -- Opening the Python App File -- Typing and Using Python Comments -- Understanding Python Data Types -- Numbers -- Integers -- Floats -- Words (strings) -- Booleans -- Working with Python Operators -- Arithmetic operators -- Comparison operators -- Boolean operators -- Creating and Using Variables -- Creating valid variable names -- Creating variables in code -- Manipulating variables -- Saving your work -- Running your Python app in VS Code -- Understanding What Syntax Is and Why It Matters -- Chapter 5 Working with Numbers, Text, and Dates -- Calculating Numbers with Functions -- Still More Math Functions -- Formatting Numbers -- Formatting with f-strings -- Showing dollar amounts -- Formatting percent numbers…”
Publicado 2024
Libro electrónico -
2908Publicado 2023Tabla de Contenidos: “…Considerations -- Individual performance approaches -- Research findings -- Considerations -- Knowledge of results and impact -- Research findings -- Considerations -- Impact: Organisational level -- Organisational performance monitoring and evaluation -- Research findings -- Considerations -- Perceived impact -- Research findings -- Considerations -- Impact - Systems level -- Performance, evaluation and legitimacy mechanisms -- Research findings -- Considerations -- Research findings -- Considerations -- System level innovative evaluation capacity -- Research findings -- Considerations -- Summary -- References -- Notes -- 4 Systemic insights -- Systemic Insights -- How the systemic insights were identified and validated -- 1. Innovation is needed to deliver on major ambitions and goals, the status quo will not suffice -- 2. …”
Libro electrónico -
2909Publicado 2023Tabla de Contenidos: “…Security risk is business risk -- Security is a business enabler -- Security is everyone's responsibility -- Security risk accountability starts at the top -- Assume compromise (assume breach) -- Explicit validation of trust -- Asset-centric and data-centric security -- Cybersecurity is a team sport -- Factor three - human empathy -- Zero Trust provides a competitive advantage -- Key cultural themes -- Summary -- Chapter 8: Adoption with the Three-Pillar Model -- Introduction to the three pillars -- Playbook structure -- Playbook layout -- The strategic pillar -- The operational pillar -- The operating model pillar -- Stitching it all together with the Zero Trust Playbook -- Zero Trust integration drives changes -- Summary -- Chapter 9: The Zero Trust Six-Stage Plan -- Overview of the six-stage plan -- Using the playbook stages effectively -- The playbook stages in detail -- Stage 1 - Establish a strategy -- Stage 2 - Set up an operating model -- Stage 3 - Create the architecture and model -- Stage 4 - Tailor to the business -- Stage 5 - Implement and improve -- Stage 6 - Continuously monitor and evolve -- Summary -- Chapter 10: Zero Trust Playbook Roles -- Role-based approach -- Integration of roles with the six-stage plan -- Zero Trust affects everyone -- Role definition and naming -- Illustrative list of roles -- Per-role guidance -- Role mission and purpose -- Role creation and evolution -- Key role relationships -- Required skills and knowledge -- Tooling and capabilities for each role -- Zero Trust impact and imperatives for each role -- Playbook-stage involvement for each role -- A day in the life of Zero Trust for each role -- Defining and measuring success -- Summary of per-role guidance -- Making it real -- Summary -- Book 1 summary -- What's next in The Zero Trust Playbook Series -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2910por Tezuysal, AlkinTabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Databases -- Chapter 1: SQL and NoSQL Databases: Characteristics, Design, and Trade-Offs -- Understanding databases and data models -- Exploring the relational data model (SQL databases) -- Tables, rows, and columns -- Normalization -- Structured Query Language (SQL) -- ACID transactions -- Navigating the document data model (NoSQL databases) -- Data models in NoSQL -- Types of NoSQL databases -- Key-value stores -- Document stores -- Column-family stores -- Graph databases -- Applying the CAP theorem and NoSQL design choices -- Consistency -- Availability -- Partition tolerance -- Consistency models in NoSQL databases -- NoSQL design choices and use cases -- Managing transaction management and concurrency control in NoSQL -- BASE transactions in NoSQL databases -- Reasons for the BASE model in NoSQL databases -- Implications for data integrity and concurrency control -- Analyzing the advantages and disadvantages of NoSQL databases -- Advantages of NoSQL databases -- Disadvantages of NoSQL databases -- Summary -- Chapter 2: Building a Strong Foundation for Database Design -- The importance of a solid foundation in database design -- Key terms and data models -- Understanding the relational model in detail -- Identifying entities, attributes, and relationships in database design -- Creating an ER diagram -- Advanced database design -- Normalization - reducing redundancy and improving data integrity -- Achieving normal forms - 1NF, 2NF, and 3NF -- Ensuring database validity and integrity -- Concluding thoughts -- Summary -- Part 2: Practical Implementation -- Chapter 3: Getting Your Hands Dirty with PostgreSQL and MySQL -- Understanding the sample database -- EDA and preprocessing -- Database schema -- MySQL -- Concluding thoughts -- Summary…”
Publicado 2024
Libro electrónico -
2911Publicado 2024Tabla de Contenidos: “…. -- See also -- Exploring the Content Validator -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
2912Publicado 2019Tabla de Contenidos: “…Oosthuizen 89 -- Abstract 89 -- Introduction 90 -- Background 90 -- Student misconduct 91 -- Manifestation of misconduct in other countries 92 -- Student misconduct in South Africa 93 -- Conceptual-theoretical framework 94 -- Research design and methodology 96 -- Population, site selection and sampling 96 -- Data collection strategies 97 -- Data analysis 97 -- Quantitative reliability and validity 97 -- Qualitative trustworthiness 98 -- Ethical considerations 98 -- Findings 99 -- Gender of respondents 99 -- Position of respondents 99 -- Campus 100 -- The nature of student misconduct ranked 100 -- Absenteeism 102 -- Use of mobile phones 103 -- Arriving late for class 103 -- Unsatisfactory work 104 -- Sleeping in class 104 -- Disruptive behaviour 104 -- Instigation 105 -- Ill-mannered behaviour 106 -- Narcotic substance abuse 106 -- Alcohol abuse 106 -- Illegal strikes 106 -- Dishonesty during tests and exams 107 -- Bullying 107 -- Possession of pornographic material 107 -- Harassment 107 -- Factor 1: Deliberateness 108 -- Factor 2: Negligence 109 -- Factor 3: Indifference 110 -- Summary of findings 111 -- Discussion 111 -- Chapter 6: Application of due process in ensuring fair learner disciplinary hearings Nicholus T. …”
Libro electrónico -
2913Publicado 2021Tabla de Contenidos: “…-- 3.6.2 Do I need new validation data? -- 3.7 Uncertainty sampling cheat sheet -- 3.8 Further reading…”
Libro electrónico -
2914Publicado 2022Tabla de Contenidos: “…-- 3.6 Summary -- 3.7 Exercises -- 4 Principles in action -- 4.1 Buffer validation of application device channels -- 4.2 Scheduler for asynchronous transfer mode flow control -- 4.3 Route computation using Dijkstra's algorithm -- 4.4 Ethernet monitor using bridge hardware -- 4.5 Demultiplexing in the x-kernel -- 4.6 Tries with node compression -- 4.7 Packet filtering in routers -- 4.8 Avoiding fragmentation of LSPs…”
Libro electrónico -
2915por OECDTabla de Contenidos: “…Des informations de qualité sur les niveaux de compétence et sur les avantages dérivant des qualifications et de la formation -- Recommandations politiques en vue de stimuler l'intérêt pour la formation continue -- Donner de bonnes bases pour l'apprentissage tout au long de la vie : établir un fondement solide dans l'enseignement préscolaire et scolaire -- Le défi : l'influence durable du milieu social et familial -- Bonnes pratiques -- Préparer le terrain : l'importance cruciale d'un enseignement préscolaire de qualité -- Créer une assise solide : la scolarité obligatoire -- Consolider les compétences pour le travail et la vie : enseignement complémentaire et passage à l'âge adulte -- Éducation et formation professionnelles (EFP) -- Enseignement supérieur -- Recommandations politiques en vue de donner de bonnes bases pour l'apprentissage tout au long de la vie -- Assurer l'accessibilité et la viabilité financières de la formation continue : développer les dispositifs de financement pour la formation des adultes -- Le défi : accroître l'investissement dans les compétences et faire en sorte que les incitations soient efficaces -- Bonnes pratiques -- Incitations financières pour les individus -- Incitations financières destinées aux employeurs -- Recommandations politiques en vue d'assurer l'accessibilité et la viabilité financières de la formation continue -- Donner une visibilité à la formation continue et faire en sorte qu'elle soit valorisante : renforcer les mécanismes de validation et de certification des compétences -- Le défi : des systèmes plus performants pour valider et certifier les compétences -- Bonnes pratiques -- Recommandations politiques en vue de donner une visibilité à la formation continue et de faire en sorte qu'elle soit valorisante…”
Publicado 2019
Libro electrónico -
2916Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Academic Burnout Predisposition in Latin American Public University Students Based on Personality Type -- 1.1 Introduction -- 1.2 Review of Related Literature -- 1.2.1 Personality Types -- 1.2.2 Academic Burnout -- 1.2.3 Variables Associated with Academic Burnout -- 1.2.4 Variables of the Academic Context -- 1.2.5 Environmental and/or Social Context -- 1.2.6 Intrapersonal Variables -- 1.3 Method -- 1.4 Results -- 1.4.1 Model Measurement -- 1.4.2 Convergent Validity -- 1.4.3 Discriminant Validity -- 1.4.4 Cross Loads -- 1.4.5 Structural Model -- 1.5 Discussion -- 1.6 Conclusion -- References -- Chapter 2 Virtual Classroom Platform Development -- 2.1 Introduction -- 2.1.1 Free and Open Source Software -- 2.1.2 Review of Literature -- 2.1.3 Methodology -- 2.2 User Login/Registration Processes -- 2.2.1 Students' Registration Process -- 2.2.2 Teachers' Registration Process -- 2.2.3 Administrator's Registration -- 2.3 Students E-Classroom -- 2.4 Teacher's Control Panel -- 2.5 Administrator's Control Panel -- 2.6 Live Videos Sessions -- 2.7 Online Examinations -- 2.7.1 Examination Login -- 2.7.2 Start Examination -- 2.7.3 Examination Page -- 2.8 Conclusion -- References -- Chapter 3 Assessment of Modern Methods for Remote Teaching in Some Selected Educational Institutions in Kolkata City of West Bengal, India -- 3.1 Introduction -- 3.1.1 Scenario of COVID-19 Situation in West Bengal -- 3.2 Materials and Methods -- 3.2.1 Basic Principles of Quantitative Strategic Planning Matrix (QSPM) -- 3.3 Results and Discussion -- 3.3.1 Various Applications Used for Online Teaching -- 3.3.1.1 Google Meet -- 3.3.1.2 Zoom -- 3.3.1.3 Cisco Webex -- 3.4 SWOT Analysis of Online Education in Kolkata -- 3.4.1 Strengths -- 3.4.2 Weakness -- 3.4.3 Opportunity -- 3.4.4 Threats -- 3.5 Conclusion…”
Libro electrónico -
2917Publicado 2017Tabla de Contenidos: “…3.1 Introduction -- 3.2 Definitions -- 3.2.1 Sources -- 3.2.2 Attributes -- 3.2.2.1 Volume -- 3.2.2.2 Variety -- 3.2.2.3 Velocity -- 3.2.2.4 Veracity -- 3.2.2.5 Variability -- 3.2.2.6 Value -- 3.2.2.7 Visualization -- 3.2.3 The Making of Big Data -- 3.3 The Analytic Challenge: From Database Marketing to Big Data and Data Science -- 3.4 Assessing Data Quality -- 3.4.1 Validity -- 3.4.2 Missingness -- 3.4.3 Representation -- 3.5 Applications in Market, Opinion, and Social Research -- 3.5.1 Adding Value through Linkage -- 3.5.2 Combining Big Data and Surveys in Market Research -- 3.6 The Ethics of Research Using Big Data -- 3.7 The Future of Surveys in a Data-Rich Environment -- References -- Chapter 4 The Role of Statistical Disclosure Limitation in Total Survey Error -- 4.1 Introduction -- 4.2 Primer on SDL -- 4.3 TSE-Aware SDL -- 4.3.1 Additive Noise -- 4.3.2 Data Swapping -- 4.4 Edit-Respecting SDL -- 4.4.1 Simulation Experiment -- 4.4.2 A Deeper Issue -- 4.5 SDL-Aware TSE -- 4.6 Full Unification of Edit, Imputation, and SDL -- 4.7 ``Big Data ́ ́ Issues -- 4.8 Conclusion -- Acknowledgments -- References -- Section 2 Implications for Survey Design -- Chapter 5 The Undercoverage-Nonresponse Tradeoff -- 5.1 Introduction -- 5.2 Examples of the Tradeoff -- 5.3 Simple Demonstration of the Tradeoff -- 5.4 Coverage and Response Propensities and Bias -- 5.5 Simulation Study of Rates and Bias -- 5.5.1 Simulation Setup -- 5.5.2 Results for Coverage and Response Rates -- 5.5.3 Results for Undercoverage and Nonresponse Bias -- 5.5.3.1 Scenario 1 -- 5.5.3.2 Scenario 2 -- 5.5.3.3 Scenario 3 -- 5.5.3.4 Scenario 4 -- 5.5.3.5 Scenario 7 -- 5.5.4 Summary of Simulation Results -- 5.6 Costs -- 5.7 Lessons for Survey Practice -- References -- Chapter 6 Mixing Modes: Tradeoffs Among Coverage, Nonresponse, and Measurement Error Roger Tourangeau -- 6.1 Introduction…”
Libro electrónico -
2918por Nartovich, AleksandrTabla de Contenidos: “…Logging and tracing -- 10.1 IBM Web Administration for iSeries -- 10.1.1 Managing WebSphere Portal -- 10.1.2 Viewing creation logs -- 10.1.3 Viewing logs -- 10.1.4 Example of working with problems -- 10.2 Log files -- 10.2.1 WebSphere Portal Configuration Wizard log files -- 10.2.2 WebSphere Portal installation log files -- 10.3 Portal tracing -- 10.3.1 Temporary tracing -- 10.3.2 Extended tracing -- 10.3.3 Logging using WebSphere Application Server -- 10.4 Validation tasks -- 10.5 Serviceability Tool -- 10.5.1 Installing the Serviceability Tool -- 10.5.2 Running the Serviceability Tool -- 10.5.3 Browsing the result file -- Part 5 Appendixes -- Appendix A. …”
Publicado 2004
Libro electrónico -
2919por Putte, Geert van deTabla de Contenidos: “…Implementing HA queue managers: Part 2 -- 4.1 Scenario two overview -- 4.2 Implementing Linux-HA on SUSE -- 4.2.1 Planning an implementation -- 4.2.2 Installing Linux High-Availability -- 4.2.3 Configuring Linux-HA -- 4.2.4 Configuring and testing the shared SCSI drives -- 4.2.5 Validating heartbeat failover and failback…”
Publicado 2005
Libro electrónico -
2920por Anand, AbhineetTabla de Contenidos: “…7.3.2 Limited Adaptability to Dynamic Environments -- 7.3.3 Lack of Real-Time Decision-Making -- 7.3.4 Limited Perception and Situational Awareness -- 7.3.5 Computational Complexity and Processing Power -- 7.3.6 Calibration and Validation -- 7.4 Proposed Framework -- 7.4.1 Digital Twin Creation -- 7.4.2 Sensor Fusion and Data Acquisition -- 7.4.3 Environmental Analysis -- 7.4.4 Decision-Making and Control -- 7.4.5 Communication and Synchronization -- 7.4.6 Validation and Calibration -- 7.4.7 Iterative Improvement -- 7.5 Benefits and Feasibility -- 7.5.1 Improved Adaptability -- 7.5.2 Real-Time Decision-Making -- 7.5.3 Enhanced Safety -- 7.5.4 Feasibility Considerations -- 7.6 Conclusion and Future Directions -- References -- Chapter 8 Execution of Fully Automated Coal Mining Face With Transparent Digital Twin Self-Adaptive Mining System -- 8.1 Introduction -- 8.2 Simulation Methods in Digital Twins -- 8.2.1 Computational Fluid Dynamics -- 8.2.1.1 Software Tools That are Being Used in Today's Domain for CFD -- 8.2.1.2 Real-World Applications of CFD -- 8.2.2 Multibody Dynamics -- 8.2.3 Kinematics for Multibody Systems -- 8.3 Literature Review -- 8.3.1 Classification of MBD Simulations -- 8.3.2 Finite Element Analysis -- 8.4 Proposed Work -- 8.5 Conclusion -- References -- Chapter 9 MGF-Based BER and Channel Capacity Analysis of Fisher Snedecor Composite Fading Model -- 9.1 Introduction -- 9.2 Fisher Snedecor Composite Fading Model -- 9.3 Performance Analysis Using MGF -- 9.3.1 ABER -- 9.3.1.1 BDPSK and NBFSK -- 9.3.1.2 BPSK and BFSK -- 9.3.1.3 MAM -- 9.3.1.4 Square MQAM -- 9.3.1.5 MPSK -- 9.3.2 NMFSK -- 9.3.3 Adaptive Channel Capacity -- 9.3.3.1 ORA -- 9.3.3.2 CIFR -- 9.4 Numerical Results -- 9.5 Conclusion -- References…”
Publicado 2024
Libro electrónico