Mostrando 43,981 - 44,000 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 2.11s Limitar resultados
  1. 43981
    Publicado 2012
    Tabla de Contenidos: “…-- 6.3 A Brief History and Background -- 6.4 Overview -- 6.5 JSP Lifecycle -- 6.5.1 JSP Service Methods -- 6.6 Elements in a JSP Page -- 6.6.1 Declarations -- 6.6.2 Directives -- 6.6.3 Scriptlets -- 6.6.4 Expressions -- 6.6.5 Transfer Control -- 6.7 Implicit JSP Objects -- 6.8 JSP Object Scopes -- 6.9 FavConnect Example Modified -- 6.10 JSP Tags -- 6.10.1 Declarations -- 6.10.2 Directives -- 6.11 JSP Exceptions -- 6.11.1 Expressions -- 6.11.2 Scriptlet -- 6.11.3 Actions -- 6.12 Expression Language (EL) -- 6.13 JSP Standard Tag Library -- 6.14 A JSP Example -- 6.15 Custom Tag Library…”
    Libro electrónico
  2. 43982
    Publicado 2016
    Tabla de Contenidos: “…-- 5.6 Relais schalten -- 5.7 Akkus zeitgesteuert laden. 5.8 Zeitsteuerung einer Kamera -- 5.9 Die Navigation in BlueJ -- Kapitel 6: Digitale Eingänge und Sensoren -- 6.1 Den Raspberry Pi über einen Taster steuern -- 6.2 Externe Prozesse über einen Taster steuern -- 6.3 Der Bewegungsmelder HC-SR501 -- 6.4 Licht und Musik über den Bewegungsmelder steuern -- 6.5 Abstandsmessung mit dem Ultraschallsensor HC-SR04 -- 6.6 Schmitt-Trigger für analoge Sensoren -- Kapitel 7: Swing lernen -- 7.1 Ein Fenster erzeugen -- 7.2 Swing-Komponenten -- 7.3 Auf Ereignisse reagieren und Text verarbeiten -- 7.4 Auf Ereignisse in einer Auswahlliste reagieren -- 7.5 Auf Ereignisse in Checkboxen und Radiobuttons reagieren -- 7.6 Auf Ereignisse in einer Liste reagieren -- 7.7 Noch etwas über Ereignisse -- Kapitel 8: Analoge Eingänge und Sensoren -- 8.1 Den MCP3002 an den Raspberry Pi anschließen -- 8.2 Temperaturmessung mit einem NTC-Widerstand -- 8.2.1 Kennlinie linearisieren -- 8.2.2 Der passende Verstärker -- 8.2.3 Die Schutzschaltung -- 8.3 LDR-Sensoren -- 8.4 Analoge Distanzsensoren -- Kapitel 9: Messwerte speichern -- 9.1 Auf Dateien und Verzeichnisse zugreifen -- 9.1.1 Dateisystem -- 9.1.2 In eine Datei schreiben -- 9.1.3 Aus einer Datei lesen -- 9.2 Listen, Mengen und assoziative Speicher -- 9.2.1 Mit Listen arbeiten -- 9.2.2 Mit Mengen arbeiten -- 9.2.3 Arbeiten mit assoziativem Speicher -- 9.3 Zeichenketten formatieren -- 9.4 Einen Datenlogger schreiben -- 9.5 Temperatur und Beleuchtungsstärke loggen -- Kapitel 10: Messwertgrafiken mit Swing -- 10.1 Das Prinzip der Komponentenentwicklung -- 10.2 Die Hilfsklasse ComputeDiagram -- 10.3 Die Swing-Komponente JDiagram -- 10.4 Diagramme in einer Swing-Anwendung anzeigen -- 10.5 Geloggte Messwerte anzeigen -- Kapitel 11: Threads und reguläre Ausdrücke -- 11.1 Threads implementieren -- 11.1.1 Threads anlegen und starten -- 11.1.2 Threads beenden -- 11.1.3 Daten teilen. 11.1.4 Auf das Ende warten -- 11.2 Reguläre Ausdrücke -- 11.2.1 Zeichenklassen -- 11.2.2 Vordefinierte Zeichenklassen -- 11.2.3 Häufigkeit -- Kapitel 12: Füllstandsanzeige für eine Zisterne -- 12.1 Die Schaltung -- 12.2 Der HTTP-Server stellt sich vor -- 12.3 Den Webserver bauen -- 12.3.1 Die Klasse RaspiHttpServer -- 12.3.2 Die Klasse HttpHandlerZisterne -- 12.3.3 Die Klasse Scheduler -- 12.3.4 Die Klasse Sensor -- 12.4 Der Client -- 12.4.1 Die Klasse HttpClient -- 12.4.2 Die Swing-Anwendung -- Kapitel 13: Eine Heizungssteuerung -- 13.1 Die Schaltung -- 13.2 Das Programmkonzept -- 13.2.1 Die Klasse RaspiHttpServer -- 13.2.2 Die Klasse HttpHandlerHeizung -- 13.2.3 Die Klasse Scheduler -- 13.2.4 Die Klasse Sensor -- 13.3 Der Client -- 13.3.1 Die Klasse HttpClient -- 13.3.2 Die Klasse JTempPanel -- 13.3.3 Die Klasse Gui -- Kapitel 14: Eine Zeitschaltuhr -- 14.1 Die Schaltung -- 14.2 Das Programmkonzept -- 14.2.1 Die Klasse RaspiHttpServer -- 14.2.2 Die Klasse SchedulerPort -- 14.2.3 Die Klasse HttpHandlerZeitschaltuhr -- 14.3 Der Client -- 14.3.1 Die Klasse HttpClient -- 14.3.2 Die Klasse ZeitschaltuhrProperties -- 14.3.3 Die Klasse GuiUtil -- 14.3.4 Die Klasse Gui -- 14.4 Einen Autostart für den Server einrichten -- 14.5 Hinweise zum Betrieb des Servers -- 14.6 Eine Desktop-Verknüpfung erstellen -- Kapitel 15: E-Mail-Alarm -- 15.1 Das Package raspi.mail -- 15.1.1 Die Klasse MailService -- 15.1.2 Die Klasse EMail -- 15.2 Das Projekt -- 15.2.1 Die Klasse AlarmProperties -- 15.3 Die Klasse AlarmService -- 15.4 Die Klasse Shutdown -- 15.5 Die Klasse Alarm -- 15.6 Autostart -- Kapitel 16: Der I2C-Bus -- 16.1 Den I2C-Bus einrichten -- 16.2 Den I2C-Bus mit Pi4j steuern -- 16.3 Eine Hilfsklasse für I2C-Geräte -- 16.4 Der Temperatursensor MCP9808 -- 16.5 Die Arbeitsweise des MCP9808 -- 16.6 Die Klasse MCP9808 -- 16.7 Den Sensor testen. 16.8 Den Sensor im Komparator-Modus testen -- Kapitel 17: Die serielle Schnittstelle RS232 -- 17.1 Die Schnittstelle konfigurieren -- 17.2 Mit Pi4J die serielle Schnittstelle steuern -- 17.3 Der Ultraschall-Entfernungssensor SRF02 -- 17.4 Die Klasse SRF02 -- 17.5 Entfernungsmessung -- 17.6 Kurze Distanzen -- 17.7 Die Sensoradresse ändern -- Kapitel 18: Textausgabe mit LCD-Displays -- 18.1 Der Befehlssatz des HD 44780 -- 18.1.1 Clear Display -- 18.1.2 Cursor Home -- 18.1.3 Entry Mode Set -- 18.1.4 Display On/Off Control -- 18.1.5 Cursor / Display Shift -- 18.1.6 Function Set -- 18.1.7 RAM Address Set und Data write -- 18.1.8 CG RAM Address Set -- 18.1.9 Und noch zwei Lesebefehle -- 18.2 Die Initialisierung des Displays -- 18.3 Das Programmkonzept -- 18.4 Die Klasse DisplayHD44780 -- 18.5 Die Klasse PinDirect -- 18.6 Das Display testen -- 18.6.1 Die Klasse Test8Bit -- 18.6.2 Die Klasse Test4Bit -- 18.6.3 Die Klasse TestDisplay -- 18.7 Das Display über den MCP23017 ansteuern -- 18.7.1 Die Klasse PinMCP23017 -- 18.7.2 Die Klasse Test8BitMCP23017 -- 18.7.3 Die Klasse Test4BitMCP23017 -- Anhang A: Java -- A.1 Der erste Programmcode -- A.2 Java-Konzepte -- A.2.1 Objekte -- A.2.2 Klassen und Instanzen -- A.2.3 Vererbung -- A.2.4 Interface -- A.2.5 Package -- A.3 Java-Grundlagen -- A.3.1 Variable -- A.3.2 Arrays -- A.3.3 Operatoren -- A.3.4 Programmfluss -- A.4 Java ist objektorientiert -- A.4.1 Klasse -- A.4.2 Variablen -- A.4.3 Methoden -- A.4.4 Konstruktoren -- A.4.5 this -- A.4.6 Zugriffsrechte -- A.4.7 static und final -- A.4.8 Anonyme innere Klassen -- A.4.9 ENUM-Datentypen -- A.4.10 Interfaces -- A.4.11 Vererbung -- A.4.12 Methoden überschreiben -- A.4.13 Super -- A.4.14 Überschreiben unterbinden -- A.4.15 Abstrakte Klassen und Methoden -- A.5 Wrapper-Klassen für numerische Datentypen -- A.6 Zeichenkette (String) -- A.7 Character -- A.8 Boolean. …”
    Libro electrónico
  3. 43983
    Publicado 2010
    Tabla de Contenidos: “…-- 7.2.1 Evolution of Democracy -- 7.2.2 Forms of Governance -- 7.3 Democracy - Its Varieties and Processes -- 7.3.1 Varieties -- 7.4 Democratic Process -- 7.4.1 Implications for the Corporation -- 7.5 A Corporation as a Democratic Body -- 7.6 Democracy - Beyond the State Level -- 7.7 Conclusion -- Suggested Questions -- Bibliography -- Chapter 8: Welfare State -- 8.1 Interpretations of Welfare State -- 8.2 Origins -- 8.2.1 The Development of Welfare States -- 8.3 Arguments For and Against the Welfare State -- 8.3.1 Arguments in Favour -- 8.3.2 Arguments Against -- 8.4 Criticism -- 8.5 The Welfare State and Social Expenditure -- 8.6 Conclusion -- Suggested Questions -- Bibliography -- Chapter 9: Markets and Globalisation -- 9.1 Introduction -- 9.2 Market Economy -- 9.3 What Is Market Failure? -- 9.4 Social Controls -- 9.5 The Decline of the Welfare State and Growth of Multinationals -- 9.6 Implication of Globalisation -- 9.6.1 Globalisation -- 9.6.2 Economic Globalisation -- 9.6.3 Globalisation, Market and Inequality -- 9.6.4 Globalisation and Corruption -- 9.7 Global Corporate Responsibility -- 9.8 Conclusion -- Suggested Questions -- Bibliography…”
    Libro electrónico
  4. 43984
    Publicado 2018
    Tabla de Contenidos: “…6.4.2 System.ComponentModel.DataAnnotations.Schema -- 6.5 Configuring via the Fluent API -- 6.5.1 A better way to structure your Fluent API commands -- 6.6 Excluding properties and classes from the database -- 6.6.1 Excluding a class or property via Data Annotations -- 6.6.2 Excluding a class or property via the Fluent API -- 6.7 Configuring model-level query filters -- 6.8 Setting database column type, size, and nullability -- 6.9 The different ways of configuring the primary key -- 6.9.1 Configuring a primary key via Data Annotations -- 6.9.2 Configuring a primary key via the Fluent API -- 6.10 Adding indexes to database columns -- 6.11 Configuring the naming on the database side -- 6.11.1 Configuring table names -- 6.11.2 Configuring the schema name, and schema groupings -- 6.11.3 Configuring the database column names in a table -- 6.12 Using specific database-provider Fluent API commands -- 6.13 Recommendations for using EF Core's configuration -- 6.13.1 Use By Convention configuration first-its quick and easy -- 6.13.2 Use validation Data Annotations wherever possible -- 6.13.3 Use the Fluent API for anything else -- 6.14 Shadow properties-hide column data inside EF Core -- 6.14.1 Configuring shadow properties -- 6.14.2 Accessing shadow properties -- 6.15 Backing fields-controlling access to data in an entity class -- 6.15.1 Creating a simple backing field accessed by a read/write property -- 6.15.2 Configuring backing fields -- Summary -- 7 Configuring relationships -- 7.1 Defining some relationship terms -- 7.2 What navigational properties do you need? …”
    Libro electrónico
  5. 43985
    Publicado 2020
    Tabla de Contenidos: “…Using and Configuring the Android Studio AVD Emulator -- 5.1 The Emulator Environment -- 5.2 The Emulator Toolbar Options -- 5.3 Working in Zoom Mode -- 5.4 Resizing the Emulator Window -- 5.5 Extended Control Options -- 5.5.1 Location -- 5.5.2 Displays -- 5.5.3 Cellular -- 5.5.4 Camera -- 5.5.5 Battery -- 5.5.6 Phone -- 5.5.7 Directional Pad -- 5.5.8 Microphone -- 5.5.9 Fingerprint…”
    Libro electrónico
  6. 43986
    por Roeder, Larry W.
    Publicado 2013
    Tabla de Contenidos: “….-6.6.10 Protocols -- 6.7 The Impact of Program Budget Implications (PBI) -- 6.8 Sovereignty, the New World Order and Implementing a Deal -- 6.9 Rights of Indigenous Peoples: -- 6.10 Non-ratification or Non implementation -- Chapter Seven: War and Peace – Roles for NGOs -- Extract -- 7.1 Law of War -- 7.2 At the Peace Table -- 7.3Neutrality and Working With or Avoiding the Military -- 7.4 An International Army and Peace Keeping -- 7.4.1 Operational Advantage -- 7.4.2 The Saarland and the First Multilateral Force -- 7.4.3 Misuse of a Force -- 7.4.4 The Veto As a Positive Tool -- 7.4.5 Conclusions -- 7.5 Working with Armed Non-State Actors (ANSAs) -- Chapter Eight: Failed and Weak Nation-states -- Highlights of Chapter Eight: -- 8.1 Introduction -- 8.1.1 Coalition Building with Local NGOs -- 8.2 A Common Political and Economic Vision: -- 8.3 A Framework that is Inclusive and Avoids Retribution: -- 8.4 Democracy can be a quality control tool for economic policies -- 8.5 The Case of Egyptian Economic Development -- 8.6 Inform the Public.- 8.7 Equality of Opportunity and Good Governance Create Stable Politics -- Chapter Nine: International Funding -- Extract: -- 9.1 Introduction -- 9.2 Who Receives Government Funding? …”
    Libro electrónico
  7. 43987
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  8. 43988
    por Gatti, Rathishchandra R.
    Publicado 2023
    Tabla de Contenidos: “…1.6.12 Challenges Related to Energy Harvesting Techniques -- 1.6.13 Generic Energy Generator -- 1.6.14 Hybrid Energy Sources -- 1.6.15 Cooperation Among Different Energy Sources -- 1.6.16 Energy Storage -- 1.6.17 Intelligent Prediction Model for Amount of Harvested Energy -- 1.6.18 Focus on Energy Generator for Underwater and Underground Applications -- 1.7 Conclusion -- References -- Chapter 2 Self-Powered Wireless Sensor Networks in Cyber Physical System -- 2.1 Introduction -- 2.2 Wireless Sensor Networks in CPS -- 2.3 Architecture of WSNs with Energy Harvesting -- 2.4 Energy Harvesting for WSN -- 2.5 Energy Harvesting Due to Mechanical Vibrations -- 2.6 Piezoelectric Generators -- 2.7 Piezoelectric Materials -- 2.8 Types of Piezoelectric Structures -- 2.8.1 Nanogenerators -- 2.8.2 Piezoelectric Nanogenerators -- 2.8.3 Triboelectric Nanogenerators -- 2.8.4 Pyroelectric Nanogenerators -- 2.8.5 Thermoelectric Nanogenerator -- 2.9 Hybridized Nanogenerators for Energy Harvesting -- 2.10 Conclusion -- References -- Chapter 3 The Emergence of Cyber-Physical System in the Context of Self-Powered Soft Robotics -- 3.1 Introduction -- 3.2 Actuators and Its Types -- 3.2.1 Nature of Actuation -- 3.2.1.1 Actuators Based on Thermal Materials -- 3.2.1.2 Actuators Based on Pressure -- 3.2.1.3 Actuators Based on Photo Responsivity -- 3.2.1.4 Actuators Based on Explosive Function -- 3.2.1.5 Electric Actuation Methods -- 3.3 Soft Actuator Electrodes -- 3.4 Sensors -- 3.5 Soft Robotic Structures and Control Methods -- 3.6 Soft Robot Applications -- 3.7 Future Scope -- 3.8 Conclusion -- References -- Chapter 4 Dynamic Butterfly Optimization Algorithm-Based Task Scheduling for Minimizing Energy Consumption in Distributed Green Data Centers -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 Green Data Centers -- 4.2.2 Energy-Aware Task Scheduling…”
    Libro electrónico
  9. 43989
    por Karmakar, Anupam
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- About the Authors -- Syllabus -- Part I: Principles and Practice of Management -- Chapter 1: Introduction to Management -- 1.1 Management: Concept and Definition -- 1.1.1 Traditional Approach -- 1.1.2 Modern Approach -- 1.1.3 From the Viewpoint of 7 Ms -- 1.1.4 From the Viewpoint of 4 Ps -- 1.2 Nature of Management -- 1.3 Importance or Significance of Management -- 1.4 Functions of Management -- 1.4.1 Planning -- 1.4.2 Organizing -- 1.4.3 Staffing -- 1.4.4 Directing -- 1.4.5 Controlling -- 1.4.6 Coordinating -- 1.4.7 Motivating -- 1.4.8 Order of Performance -- 1.5 Concerns of Management -- 1.5.1 Process -- 1.5.2 Efficiency and Effectiveness -- 1.5.3 Balancing Effectiveness and Efficiency -- 1.6 Management as a Process -- 1.7 Objectives of Management -- 1.8 Principles of Management -- 1.9 Management and Administration -- 1.9.1 Administration and Management are Separate Functions -- 1.9.2 Administration and Management are Synonymous -- 1.10 Levels of Management -- 1.10.1 Top Level of Management -- 1.10.2 Middle Level of Management -- 1.10.3 Lower Level of Management -- 1.11 Management: Art and Science -- 1.11.1 Characteristics of Art -- 1.11.2 Arguments in Favour of Treating Management as an Art -- 1.11.3 Characteristics of Science -- 1.11.4 Arguments in Favour of Treating Management as a Science -- 1.11.5 Management as Both an Art and a Science -- 1.11.6 Conclusion-Management is Both an Art and a Science -- 1.12 Management as a Profession -- 1.13 Universality of Management -- 1.13.1 Arguments in Favour of Universality -- 1.13.2 Arguments Against Universality -- 1.14 Managerial Skills -- 1.14.1 Conceptual Skill -- 1.14.2 Human Skill -- 1.14.3 Technical Skill -- 1.14.4 Sources of Management Skills -- 1.15 Management Skills and Management Function Matrix -- 1.16 Managerial Roles -- 1.17 Emerging Trends in Management…”
    Libro electrónico
  10. 43990
    Publicado 2016
    Tabla de Contenidos: “…14.5 Complex Numbers -- 14.6 Rectangular Form -- 14.7 Polar Form -- 14.8 Conversion Between Forms -- 14.9 Mathematical Operations with Complex Numbers -- 14.10 Calculator Methods with Complex Numbers -- 14.11 Phasors -- 14.12 Computer Analysis -- 15 Series ac Circuits -- 15.1 Introduction -- 15.2 Resistive Elements -- 15.3 Inductive Elements -- 15.4 Capacitive Elements -- 15.5 Impedance Diagram -- 15.6 Series Configuration -- 15.7 Voltage Divider Rule -- 15.8 Frequency Response for Series ac Circuits -- 15.9 Summary: Series ac Circuits -- 15.10 Phase Measurements -- 15.11 Applications -- 15.12 Computer Analysis -- 16 Parallel ac Circuits -- 16.1 Introduction -- 16.2 Total Impedance -- 16.3 Total Admittance -- 16.4 Parallel ac Networks -- 16.5 Current Divider Rule -- 16.6 Frequency Response of Parallel Elements -- 16.7 Summary: Parallel ac Networks -- 16.8 Equivalent Circuits -- 16.9 Applications -- 16.10 Computer Analysis -- 17 Series-Parallel ac Networks -- 17.1 Introduction -- 17.2 Illustrative Examples -- 17.3 Ladder Networks -- 17.4 Grounding -- 17.5 Applications -- 17.6 Computer Analysis -- 18 Methods of Analysis and Selected Topics (ac) -- 18.1 Introduction -- 18.2 Independent Versus Dependent (Controlled) Sources -- 18.3 Source Conversions -- 18.4 Mesh Analysis -- 18.5 Nodal Analysis -- 18.6 Bridge Networks (ac) -- 18.7 Δ - Y, Y - Δ Conversions -- 18.8 Computer Analysis -- 19 Network Theorems (ac) -- 19.1 Introduction -- 19.2 Superposition Theorem -- 19.3 Thévenin's Theorem -- 19.4 Norton's Theorem -- 19.5 Maximum Power Transfer Theorem -- 19.6 Substitution, Reciprocity, and Millman's Theorems -- 19.7 Application -- 19.8 Computer Analysis -- 20 Power (ac) -- 20.1 Introduction -- 20.2 General Equation -- 20.3 Resistive Circuit -- 20.4 Apparent Power -- 20.5 Inductive Circuit and Reactive Power -- 20.6 Capacitive Circuit…”
    Libro electrónico
  11. 43991
    Publicado 2024
    Tabla de Contenidos: “…-- 3.5 Manufacturing Explorers -- 3.5.1 A Mom-and-Pop Shop Learns Statistical Process Control (SPC) -- 3.6 Retail Explorers -- 3.6.1 Small Plant Nursery Benefits from Marketing Analytics -- 3.6.2 Auto Parts Retailer Discovers Demand Forecasting and Inventory Management Analytics -- 3.7 Energy Explorers -- 3.7.1 Green Energy Company Leverages the Power of Financial Simulation -- 3.8 Financial Services and Insurance Explorers -- 3.8.1 A Small Credit Union Enters the Analytics Space -- 3.9 Other Explorers -- 3.9.1 Smart Apps Enabling "Low-Tech" Industries from Farmers and Ranchers…”
    Libro electrónico
  12. 43992
    por Marwala, Tshilidzi
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- MECHANISM DESIGN, BEHAVIORAL SCIENCE AND ARTIFICIAL INTELLIGENCE IN INTERNATIONAL RELATIONS -- MECHANISM DESIGN, BEHAVIORAL SCIENCE AND ARTIFICIAL INTELLIGENCE IN INTERNATIONAL RELATIONS -- Copyright -- Contents -- Preface -- Acknowledgments -- 1 - Introduction to mechanism design, behavioral science, and artificial intelligence in international relations -- 1.1 Introduction -- 1.2 International relations -- 1.3 Mechanism design -- 1.3.1 Auctions -- 1.3.2 Bargaining mechanisms -- 1.3.3 Matching mechanisms -- 1.3.4 Voting mechanisms -- 1.3.5 Public goods provision mechanisms -- 1.4 Behavioral science and nudges -- 1.5 Artificial intelligence -- 1.5.1 Machine learning -- 1.5.2 Evolutionary programming -- 1.5.3 Soft computing -- 1.6 Mechanism design, behavioral science, AI, and IR -- 1.7 Rest of the book -- AI disclosure -- References -- I - Peace and security -- 2 - Interstate conflict -- 2.1 Introduction -- 2.2 Drivers of interstate conflicts -- 2.2.1 Economic competition -- 2.2.2 Economic disparities -- 2.2.3 Ideologies and political differences -- 2.2.4 Security dilemma -- 2.2.5 Military alliances -- 2.2.6 Sharing borders -- 2.2.7 Distance between capitals -- 2.2.8 Superpower -- 2.2.9 Military capability -- 2.2.10 Democratic peace -- 2.2.11 Economic dependence -- 2.3 Economic disparities and competition in interstate conflict -- 2.4 Ideologies and political differences in interstate conflict -- 2.5 Controlling interstate conflict -- 2.6 Conclusion -- AI disclosure -- References -- 3 - International treaties -- 3.1 Introduction -- 3.2 Economic competition -- 3.2.1 The role of economic competition -- 3.2.2 Enforcing economic competition treaties -- 3.3 Economic dependency -- 3.3.1 The role of economic dependency -- 3.3.2 Promoting economic relationships -- 3.4 Security -- 3.4.1 Role of security treaties…”
    Libro electrónico
  13. 43993
    Publicado 2012
    Tabla de Contenidos: “…Réglementation des marchés de produits -- Graphique 3.14. Contrôle étatique exercé sur les activités des entreprises -- Graphique 3.15. …”
    Libro electrónico
  14. 43994
    por Kamal, Raj
    Publicado 2011
    Tabla de Contenidos: “…3.9 Two Outputs Simplification-Computer-Based Prime Implicants Using Star Product and Sharp Operations -- 3.9.1 Combination of Two Cubes Differing in One Variable into One Cube-A Star Product Operation -- 3.9.2 Finding Essential Prime Implicants Using Two Cubes-A Sharp Operation -- 3.9.3 Computer-Based Minimization Method to Find Minimum Required Cover (SOP function implicants) -- 3.10 Computer-Based Minimization-Quine-McCluskey Method -- 3.10.1 Quine-McCluskey Method of Finding Prime Implicants -- 3.10.2 Finding Minimal Sum from the Prime Implicants for an Output -- 3.10.3 Finding Minimal Sum for the Multi-Output Case Using Quine-McCluskey Method -- Chapter 4: Binary Arithmetic and Decoding and Mux Logic Units -- 4.1 Binary Arithmetic Units -- 4.1.1 Binary Addition of Two Bits -- 4.1.2 Addition of Two Arithmetic Numbers Each of 4 Bits -- 4.1.3 Subtraction of Two Arithmetic Numbers Each of 4 Bits -- 4.2 Decoder -- 4.2.1 Decoder (Line Decoder) -- 4.2.2 The 1 of 2 and 1 of 4 Line Decoders -- 4.2.3 The Four-line to 16-line Decoder -- 4.2.4 Function Specific Decoders -- 4.3 Encoder -- 4.3.1 Encoder (Line Encoder) -- 4.3.2 Encoder (Priority Encoder) -- 4.3.3 BCD 10 of 1 Four-bit Encoder -- 4.3.4 Octal 8 of 1 Three-bit Encoder and Hexadecimal Encoder -- 4.4 Multiplexer -- 4.4.1 Multiplexer (Line Selector) -- 4.4.2 Multiplexer with Outputs Enabling Control (gate) Pin(s) -- 4.5 Demultiplexer -- 4.5.1 Demultiplexer Definition -- Chapter 5: Code Converters, Comparators and Other Logic Processing Circuits -- 5.1 Code Converters -- 5.1.1 Codes for Decimal Numbers -- 5.1.2 Unit Distance Code Converter -- 5.1.3 ASCII (American Standard Code for Information Interchange) for the Alphanumeric Characters -- 5.2 Equality and Magnitude Comparators Between Two Four-bit Numbers -- 5.3 Odd Parity and Even Parity Generators -- 5.4 The 4-bit AND, OR, XOR Between Two Words…”
    Libro electrónico
  15. 43995
    Publicado 1995
    Tabla de Contenidos: “…Espuny Tomás -- El comercio exterior del vino de Cataluña / M.Concepción Estella Álvarez -- Producción, consumo y control del vino en el litoral valenciano durante el siglo XVII/ Amparo Felipo Orts -- Les mesures del vi a Catalunya abans de la reducció del 1585 / Gaspar Feliu i Montfort -- Les ordinacions de vi del Llibre de Cadena de Reus / A. …”
    Libro
  16. 43996
    Publicado 1651
    Tabla de Contenidos: “…Prophesias del Pe.Fr . Francisco Monteron (h . 75 r.-76 r.)…”
    Manuscrito
  17. 43997
    por Alombert, Anne
    Publicado 2021
    “…L’organisation contemporaine du savoir est telle que la notion d’humanité y joue une position relativement ambiguë. …”
    Electrónico
  18. 43998
    Publicado 2022
    “…In most grammatical models, hierarchical structuring and dependencies are considered as central features of grammatical structures, an idea which is usually captured by the notion of "head" or "headedness". While in most models, this notion is more or less taken for granted, there is still much disagreement as to the precise properties of grammatical heads and the theoretical implications that arise of these properties. …”
    Libro electrónico
  19. 43999
    Publicado 2019
    “…En la contracubierta: L'organisation contemporaine du savoir est telle que la notion d'humanité y joue une position relativement ambigüe. …”
    Libro
  20. 44000
    por Vacca, Alberto
    Publicado 2011
    “…Duce truce, per la prima volta, pubblica le denunce segrete dei prefetti contro i responsabili delle "offese al Duce": circa cinquecento storie che documentano, spesso con involontaria comicità, l'implacabile furia del fascismo contro i suoi critici. …”
    Libro