Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 55
- Engineering & Applied Sciences 54
- History 46
- Historia 43
- Leadership 32
- Application software 31
- Development 31
- Data processing 29
- Computer Science 28
- Computer networks 24
- Design 23
- Politics and government 23
- RELIGION 22
- Business & Economics 21
- Digital techniques 21
- Python (Computer program language) 21
- Security measures 20
- Photography 18
- Design and construction 17
- Energy 17
- Social aspects 17
- Cities and towns 16
- Electrical & Computer Engineering 16
- Política y gobierno 16
- Artificial intelligence 15
- Cloud computing 15
- Electrónica 15
- Programming 15
- Organizational change 14
- Computer graphics 13
-
1701Publicado 2013“…Next, in Do the Right Thing, former Southwest CEO James F. Parker shows why “doing the right thing” isn’t just naïve “feel-goodism”: it’s the most powerful rule for business success.: Parker reveals how Southwest’s extraordinary culture of mutual respect and trust developed, offering deeply personal insights into principles that can make any team, organization or company strong. …”
Libro electrónico -
1702Publicado 2019Libro electrónico
-
1703Publicado 2017Libro electrónico
-
1704Publicado 2011“…That is the gift that David F einberg has brought to U CLA. I am in awe of his management skills.” …”
Grabación de sonido -
1705por Yang, Won Y.Tabla de Contenidos: “…6.1 Euler's Method -- 6.2 Heun's Method - Trapezoidal Method -- 6.3 Runge‐Kutta Method -- 6.4 Predictor‐Corrector Method -- 6.4.1 Adams‐Bashforth‐Moulton Method -- 6.4.2 Hamming Method -- 6.4.3 Comparison of Methods -- 6.5 Vector Differential Equations -- 6.5.1 State Equation -- 6.5.2 Discretization of LTI State Equation -- 6.5.3 High‐order Differential Equation to State Equation -- 6.5.4 Stiff Equation -- 6.6 Boundary Value Problem (BVP) -- 6.6.1 Shooting Method -- 6.6.2 Finite Difference Method -- Chapter 7 Optimization -- 7.1 Unconstrained Optimization -- 7.1.1 Golden Search Method -- 7.1.2 Quadratic Approximation Method -- 7.1.3 Nelder‐Mead Method -- 7.1.4 Steepest Descent Method -- 7.1.5 Newton Method -- 7.1.6 Conjugate Gradient Method -- 7.1.7 Simulated Annealing -- 7.1.8 Genetic Algorithm -- 7.2 Constrained Optimization -- 7.2.1 Lagrange Multiplier Method -- 7.2.2 Penalty Function Method -- 7.3 MATLAB Built‐In Functions for Optimization -- 7.3.1 Unconstrained Optimization -- 7.3.2 Constrained Optimization -- 7.3.3 Linear Programming (LP) -- 7.3.4 Mixed Integer Linear Programming (MILP) -- 7.4 Neural Network[K‐1] -- 7.5 Adaptive Filter[Y‐3] -- 7.6 Recursive Least Square Estimation (RLSE)[Y‐3] -- Chapter 8 Matrices and Eigenvalues -- 8.1 Eigenvalues and Eigenvectors -- 8.2 Similarity Transformation and Diagonalization -- 8.3 Power Method -- 8.3.1 Scaled Power Method -- 8.3.2 Inverse Power Method -- 8.3.3 Shifted Inverse Power Method -- 8.4 Jacobi Method -- 8.5 Gram‐Schmidt Orthonormalization and QR Decomposition -- 8.6 Physical Meaning of Eigenvalues/Eigenvectors -- 8.7 Differential Equations with Eigenvectors -- 8.8 DoA Estimation with Eigenvectors[Y-3] -- Chapter 9 Partial Differential Equations -- 9.1 Elliptic PDE -- 9.2 Parabolic PDE -- 9.2.1 The Explicit Forward Euler Method -- 9.2.2 The Implicit Backward Euler Method…”
Publicado 2020
Libro electrónico -
1706
-
1707
-
1708por Roper, Juliet“…The authors examine the power plays at work in the development and implementation of proportional representation in their respective countries and they consider the ways in which the electoral system has impacted election campaign strategies. …”
Publicado 2004
Libro electrónico -
1709Publicado 2016Tabla de Contenidos: “…A Breakout Board for Beginners -- The Desktop Novena's Power Pass-Through Board -- Custom Battery Pack Problems -- Choosing a Hard Drive -- Finalizing Firmware -- Building a Community -- Closing Thoughts -- Chapter 8. chibitronics: creating circuit stickers -- Crafting with Circuits -- Developing a New Process -- Visiting the Factory -- Performing a Process Capability Test -- Delivering on a Promise -- Why On-Time Delivery Is Important -- Lessons Learned -- Not All Simple Requests Are Simple for Everyone -- Never Skip a Check Plot -- If a Component Can Be Placed Incorrectly, It Will Be -- Some Concepts Don't Translate into Chinese Well -- Eliminate Single Points of Failure -- Some Last-Minute Changes Are Worth It -- Chinese New Year Impacts the Supply Chain -- Shipping Is Expensive and Difficult -- You're Not Out of the Woods Until You Ship -- Closing Thoughts -- part 4: a hacker's perspective -- Chapter 9. hardware hacking -- Hacking the PIC18F1320 -- Decapping the IC -- Taking a Closer Look -- Erasing the Flash Memory -- Erasing the Security Bits -- Protecting the Other Data -- Hacking SD Cards -- How SD Cards Work -- Reverse Engineering the Card's Microcontroller -- Potential Security Issues -- A Resource for Hobbyists -- Hacking HDCP-Secured Links to Allow Custom Overlays -- Background and Context -- How NeTV Worked -- Hacking a Shanzhai Phone -- The System Architecture -- Reverse Engineering the Boot Structure -- Building a Beachhead -- Attaching a Debugger -- Booting an OS -- Building a New Toolchain -- Fernvale Results -- Closing Thoughts -- Chapter 10. biology and bioinformatics -- Comparing H1N1 to a Computer Virus -- DNA and RNA as Bits -- Organisms Have Unique Access Ports -- Hacking Swine Flu -- Adaptable Influenza -- A Silver Lining -- Reverse Engineering Superbugs -- The O104:H4 DNA Sequence -- Reversing Tools for Biology…”
Libro electrónico -
1710Publicado 2011Grabación no musical
-
1711
-
1712Publicado 2020Tabla de Contenidos: “…List of Contributors xvii -- Preface xxi -- 1 Fog Computing and Fogonomics 1 /Yang Yang, Jianwei Huang, Tao Zhang, and Joe Weinman -- 2 Collaborative Mechanism for Hybrid Fog-Cloud Scenarios 7 /Xavi Masip, Eva Mar℗<U+0083>in, Jordi Garcia, and Sergi S© nchez -- 2.1 The Collaborative Scenario 7 -- 2.1.1 The F2C Model 11 -- 2.1.1.1 The Layering Architecture 13 -- 2.1.1.2 The Fog Node 14 -- 2.1.1.3 F2C as a Service 16 -- 2.1.2 The F2C Control Architecture 19 -- 2.1.2.1 Hierarchical Architecture 20 -- 2.1.2.2 Main Functional Blocks 24 -- 2.1.2.3 Managing Control Data 25 -- 2.1.2.4 Sharing Resources 26 -- 2.2 Benefits and Applicability 28 -- 2.3 The Challenges 29 -- 2.3.1 Research Challenges 30 -- 2.3.1.1 What a Resource is 30 -- 2.3.1.2 Categorization 30 -- 2.3.1.3 Identification 31 -- 2.3.1.4 Clustering 33 -- 2.3.1.5 Resources Discovery 33 -- 2.3.1.6 Resource Allocation 34 -- 2.3.1.7 Reliability 35 -- 2.3.1.8 QoS 36 -- 2.3.1.9 Security 36 -- 2.3.2 Industry Challenges 37 -- 2.3.2.1 What an F2C Provider Should Be? …”
Libro electrónico -
1713
-
1714Publicado 2019“…These systems are intended to address the needs of the most demanding clients. Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/O, maximizing performance and throughput. …”
Libro electrónico -
1715
-
1716
-
1717
-
1718
-
1719
-
1720Publicado 2017“…Other videos in this series: What are f-strings in Python and how can I use them?…”