Mostrando 1,701 - 1,720 Resultados de 2,030 Para Buscar 'T. F. Powys~', tiempo de consulta: 1.01s Limitar resultados
  1. 1701
    Publicado 2013
    “…Next, in Do the Right Thing, former Southwest CEO James F. Parker shows why “doing the right thing” isn’t just naïve “feel-goodism”: it’s the most powerful rule for business success.: Parker reveals how Southwest’s extraordinary culture of mutual respect and trust developed, offering deeply personal insights into principles that can make any team, organization or company strong. …”
    Libro electrónico
  2. 1702
    Publicado 2019
    Libro electrónico
  3. 1703
    Publicado 2017
    Libro electrónico
  4. 1704
    Publicado 2011
    “…That is the gift that David F einberg has brought to U CLA. I am in awe of his management skills.” …”
    Grabación de sonido
  5. 1705
    por Yang, Won Y.
    Publicado 2020
    Tabla de Contenidos: “…6.1 Euler's Method -- 6.2 Heun's Method - Trapezoidal Method -- 6.3 Runge‐Kutta Method -- 6.4 Predictor‐Corrector Method -- 6.4.1 Adams‐Bashforth‐Moulton Method -- 6.4.2 Hamming Method -- 6.4.3 Comparison of Methods -- 6.5 Vector Differential Equations -- 6.5.1 State Equation -- 6.5.2 Discretization of LTI State Equation -- 6.5.3 High‐order Differential Equation to State Equation -- 6.5.4 Stiff Equation -- 6.6 Boundary Value Problem (BVP) -- 6.6.1 Shooting Method -- 6.6.2 Finite Difference Method -- Chapter 7 Optimization -- 7.1 Unconstrained Optimization -- 7.1.1 Golden Search Method -- 7.1.2 Quadratic Approximation Method -- 7.1.3 Nelder‐Mead Method -- 7.1.4 Steepest Descent Method -- 7.1.5 Newton Method -- 7.1.6 Conjugate Gradient Method -- 7.1.7 Simulated Annealing -- 7.1.8 Genetic Algorithm -- 7.2 Constrained Optimization -- 7.2.1 Lagrange Multiplier Method -- 7.2.2 Penalty Function Method -- 7.3 MATLAB Built‐In Functions for Optimization -- 7.3.1 Unconstrained Optimization -- 7.3.2 Constrained Optimization -- 7.3.3 Linear Programming (LP) -- 7.3.4 Mixed Integer Linear Programming (MILP) -- 7.4 Neural Network[K‐1] -- 7.5 Adaptive Filter[Y‐3] -- 7.6 Recursive Least Square Estimation (RLSE)[Y‐3] -- Chapter 8 Matrices and Eigenvalues -- 8.1 Eigenvalues and Eigenvectors -- 8.2 Similarity Transformation and Diagonalization -- 8.3 Power Method -- 8.3.1 Scaled Power Method -- 8.3.2 Inverse Power Method -- 8.3.3 Shifted Inverse Power Method -- 8.4 Jacobi Method -- 8.5 Gram‐Schmidt Orthonormalization and QR Decomposition -- 8.6 Physical Meaning of Eigenvalues/Eigenvectors -- 8.7 Differential Equations with Eigenvectors -- 8.8 DoA Estimation with Eigenvectors[Y-3] -- Chapter 9 Partial Differential Equations -- 9.1 Elliptic PDE -- 9.2 Parabolic PDE -- 9.2.1 The Explicit Forward Euler Method -- 9.2.2 The Implicit Backward Euler Method…”
    Libro electrónico
  6. 1706
    Publicado 2023
    Libro electrónico
  7. 1707
    por Nelli, Fabio. author
    Publicado 2013
    Libro electrónico
  8. 1708
    por Roper, Juliet
    Publicado 2004
    “…The authors examine the power plays at work in the development and implementation of proportional representation in their respective countries and they consider the ways in which the electoral system has impacted election campaign strategies. …”
    Libro electrónico
  9. 1709
    Publicado 2016
    Tabla de Contenidos: “…A Breakout Board for Beginners -- The Desktop Novena's Power Pass-Through Board -- Custom Battery Pack Problems -- Choosing a Hard Drive -- Finalizing Firmware -- Building a Community -- Closing Thoughts -- Chapter 8. chibitronics: creating circuit stickers -- Crafting with Circuits -- Developing a New Process -- Visiting the Factory -- Performing a Process Capability Test -- Delivering on a Promise -- Why On-Time Delivery Is Important -- Lessons Learned -- Not All Simple Requests Are Simple for Everyone -- Never Skip a Check Plot -- If a Component Can Be Placed Incorrectly, It Will Be -- Some Concepts Don't Translate into Chinese Well -- Eliminate Single Points of Failure -- Some Last-Minute Changes Are Worth It -- Chinese New Year Impacts the Supply Chain -- Shipping Is Expensive and Difficult -- You're Not Out of the Woods Until You Ship -- Closing Thoughts -- part 4: a hacker's perspective -- Chapter 9. hardware hacking -- Hacking the PIC18F1320 -- Decapping the IC -- Taking a Closer Look -- Erasing the Flash Memory -- Erasing the Security Bits -- Protecting the Other Data -- Hacking SD Cards -- How SD Cards Work -- Reverse Engineering the Card's Microcontroller -- Potential Security Issues -- A Resource for Hobbyists -- Hacking HDCP-Secured Links to Allow Custom Overlays -- Background and Context -- How NeTV Worked -- Hacking a Shanzhai Phone -- The System Architecture -- Reverse Engineering the Boot Structure -- Building a Beachhead -- Attaching a Debugger -- Booting an OS -- Building a New Toolchain -- Fernvale Results -- Closing Thoughts -- Chapter 10. biology and bioinformatics -- Comparing H1N1 to a Computer Virus -- DNA and RNA as Bits -- Organisms Have Unique Access Ports -- Hacking Swine Flu -- Adaptable Influenza -- A Silver Lining -- Reverse Engineering Superbugs -- The O104:H4 DNA Sequence -- Reversing Tools for Biology…”
    Libro electrónico
  10. 1710
    Publicado 2011
    Grabación no musical
  11. 1711
    por OECD
    Publicado 2023
    Libro electrónico
  12. 1712
    Publicado 2020
    Tabla de Contenidos: “…List of Contributors xvii -- Preface xxi -- 1 Fog Computing and Fogonomics 1 /Yang Yang, Jianwei Huang, Tao Zhang, and Joe Weinman -- 2 Collaborative Mechanism for Hybrid Fog-Cloud Scenarios 7 /Xavi Masip, Eva Mar℗<U+0083>in, Jordi Garcia, and Sergi S© nchez -- 2.1 The Collaborative Scenario 7 -- 2.1.1 The F2C Model 11 -- 2.1.1.1 The Layering Architecture 13 -- 2.1.1.2 The Fog Node 14 -- 2.1.1.3 F2C as a Service 16 -- 2.1.2 The F2C Control Architecture 19 -- 2.1.2.1 Hierarchical Architecture 20 -- 2.1.2.2 Main Functional Blocks 24 -- 2.1.2.3 Managing Control Data 25 -- 2.1.2.4 Sharing Resources 26 -- 2.2 Benefits and Applicability 28 -- 2.3 The Challenges 29 -- 2.3.1 Research Challenges 30 -- 2.3.1.1 What a Resource is 30 -- 2.3.1.2 Categorization 30 -- 2.3.1.3 Identification 31 -- 2.3.1.4 Clustering 33 -- 2.3.1.5 Resources Discovery 33 -- 2.3.1.6 Resource Allocation 34 -- 2.3.1.7 Reliability 35 -- 2.3.1.8 QoS 36 -- 2.3.1.9 Security 36 -- 2.3.2 Industry Challenges 37 -- 2.3.2.1 What an F2C Provider Should Be? …”
    Libro electrónico
  13. 1713
    por Goodwin, Steven
    Publicado 2013
    Libro electrónico
  14. 1714
    Publicado 2019
    “…These systems are intended to address the needs of the most demanding clients. Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/O, maximizing performance and throughput. …”
    Libro electrónico
  15. 1715
    Publicado 2013
    Libro electrónico
  16. 1716
    Publicado 2020
    Libro electrónico
  17. 1717
  18. 1718
    por BARRETT, DANIEL J.
    Publicado 2022
    Libro electrónico
  19. 1719
    Publicado 2002
    Libro electrónico
  20. 1720
    Publicado 2017
    “…Other videos in this series: What are f-strings in Python and how can I use them?…”
    Video