Mostrando 2,701 - 2,720 Resultados de 3,611 Para Buscar 'UNSMIL~', tiempo de consulta: 1.17s Limitar resultados
  1. 2701
    por Schmalz, Michael
    Publicado 2005
    “…The problem is, there isn't much documentation on their cross-usage. Until now. Introducing Integrating Excel and Access, the unique reference that shows you how to combine the strengths of Microsoft Excel with those of Microsoft Access. …”
    Libro electrónico
  2. 2702
    por Voinov, Vassiliy
    Publicado 2013
    “…., the parameter is considered to be known). Until 1934, Pearson believed that the limiting distribution of the statistic in (1.1) will be the same if the unknown parameters of the null hypothesis are replaced by their estimates based on a sample; see, for example, Baird (1983), Plackett (1983, p. 63), Lindley (1996), Rao (2002), and Stigler (2008, p. 266). …”
    Libro electrónico
  3. 2703
    Publicado 2022
    “…Tutankhamun Knew the Names of the Two Great Godsoffers a new interpretation of the terms Dtand nHHas fundamental concepts of Pharaonic ideology, terms that, until now, have often been treated as synonyms reflecting notions related to the vastness of time…”
    Libro electrónico
  4. 2704
    por Okuda, Hidenobu
    Publicado 2023
    Tabla de Contenidos: “…7.3.3 International Trade, Invoicing, and Dollarization -- 7.4 Financial Dollarization in the Highly Integrated International Market -- 7.4.1 Dollarization of Assets -- 7.4.2 Dollarization and Overseas Assets -- 7.4.3 Dollarization of Liability -- 7.5 Conclusion: Coping With Partial Dollarization -- References -- 8 Strategies for Promotion of Khmer Riel -- 8.1 Introduction -- 8.2 De-Dollarization Policies Until Recently -- 8.2.1 Enhance Confidence in the Riel -- 8.2.2 Promote Price Quotations and Payments of Goods and Services in Riel -- 8.2.3 Promote the Opening of Bank Accounts in Riel -- 8.2.4 Improve the Payment System and Financial Instruments in Riel -- 8.3 De-Dollarization Policy and Financial Market Development -- 8.3.1 Improve Foreign Exchange Markets -- 8.3.2 Further Developing Interbank and Money Markets -- 8.3.3 Further Develop Securities Markets -- 8.3.4 Broaden the Clearing House's Policy On Lowering the Riel Transaction Fee to Market Fund Transfer -- 8.4 New Elements for the Promotion of Khmer Riel -- 8.4.1 Promote Financial Intermediation in Riel On a Gradual Basis -- 8.4.2 Fiscal Support for the Riel -- 8.4.3 Promote Public Awareness and Participation -- 8.4.4 Enhance Cooperation for the Implementation of Effective Measures -- 8.5 Effectiveness of Promoting the Policy and Its Limitations -- 8.5.1 Stronger Yet Still Limited Confidence -- 8.5.2 Difficulty in Changing People's Mindset -- 8.5.3 Network Externality -- 8.5.4 Lack of Demand-Side Policies -- 8.5.5 Limited Domestic Production -- 8.5.6 Limited Coordination Between Implementing Agencies -- 8.6 Conclusion -- Notes -- References -- Index…”
    Libro electrónico
  5. 2705
    por Buchstein, Hubertus
    Publicado 2024
    “…Buchstein claims that the best way to characterize their relationship from their first meeting in Bonn in 1926 up until Kirchheimer's death in 1965 is as enduring enmity - in a political, a theoretical, and even a personal sense…”
    Libro electrónico
  6. 2706
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Economic, structural and geographical characteristics of the Slovak Republic -- The Slovak Republic's economy has been performing strongly until the COVID-19 crisis -- The Slovak economy is highly specialised, with a strong industrial base -- The automotive industry drives the performance of Slovak manufacturing -- Half of total exports are high-tech manufactured products, especially motor vehicles -- A number of promising regional industry clusters have emerged... -- ... that could help reduce regional economic disparities -- 2.3. …”
    Libro electrónico
  7. 2707
    por Wolgemuth, Jennifer R.
    Publicado 2024
    Tabla de Contenidos: “…Narrative Fiction as Feminist Refusal: A Utopian Short Story of Lactation in Education -- References -- Methodologies in Action Part -- Making Sense through Letter Writing -- References -- Chapter 8: The Logic of Peace: Practical Lessons from Thematic Analysis and Meditations -- Instrumental Value and Intrinsic Value -- What Meditation Means to Me -- What Thematic Analysis Means to Me -- Practical Lessons Derivable from the Methodologies of Thematic Analysis and Meditation -- References -- Methodologies in Action -- Creative Silence and 'Theme Jumping': Meditation as Thematic Analysis -- References -- Chapter 9: Getting Mixed Up: Arts-Based, Contemplative, and Generative Approaches to Thematic Analysis -- Situating Contemplative Practices -- Context and Insight Building -- The Process -- And So It Is -- References -- Methodologies in Action -- Deliberate Reflections: Unveiling Identities and Insights through Contemplative Data Analysis in Autoethnography -- Contemplation in (Autoethnographic) Action -- Note -- References -- Chapter 10: Recurring Languaging Practices as 'Themes' -- An EMCA Perspective on Analyzing Recurrence -- A Theory of Language as Action and Methodological Practices -- Approach -- Data and Example -- Conclusions -- References -- Appendix A -- Jeffersonian Transcription Symbols -- Methodologies in Action -- Applying Ubuntu in Thematic Analysis for Exploring Black Student Experiences at a Predominately White Institution -- References -- Chapter 11: Composing Poems: Using Poetry as Qualitative Data Analysis -- Poetic Inquiry -- Poetic Inquiry as Data Analysis -- Poetic Portraits as Poetic Analysis -- Poetic Analysis Example -- Using Poetic Analysis -- References -- Methodologies in Action -- Poetry as Thematic Analysis -- References -- Chapter 12: I Have Hated Analysis: Poetic Thematic Analysis…”
    Libro electrónico
  8. 2708
    Publicado 2023
    Tabla de Contenidos: “…Creating your content strategy -- Content development -- Types of content -- Content distribution -- Measuring and optimizing your efforts -- Unveiling the blueprint for a successful product launch -- Aligning with the launch process -- Stakeholder alignment -- Launch goals -- Launch tier -- Launch metrics/measurement -- Awareness and early adoption -- Channel performance -- Product retention -- A global product launch -- Summary -- Chapter 10: Enable Your Sales Team and Maximize Effectiveness -- Building an effective sales enablement program -- Building your sales collateral hub -- Adjusting your sales collateral for every stage of the buying journey -- Awareness and interest stage -- Sales scripts -- Email templates -- Consideration stage -- Battlecards -- Pitch presentations -- Product sheets -- Product demo -- Case studies -- Purchase stage -- Dealing with objections -- Advocacy/post-purchase stage -- Pricing increases -- Sales enablement tools -- Sales enablement success indicators -- Summary -- Part 4: Impactful Collaboration and Value Creation -- Chapter 11: Ensure Internal Stakeholders Buy-In -- Collaborating with PMs -- Building effective collaboration between PMs and PMMs -- Collaborating with marketing, sales, and customer success teams -- Aligning product marketing, marketing, sales, and customer success -- Getting buy-in and earning the trust of each team -- Engaging the C-suite -- Summary -- Chapter 12: Analyst Relations (AR) -- The role of product marketing in AR -- How can analysts help? …”
    Libro electrónico
  9. 2709
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
    Libro electrónico
  10. 2710
    Publicado 2019
    Tabla de Contenidos: “…-- How to Write a Shell Script -- More Formatting Tricks -- Summing Up -- 25 STARTING A PROJECT -- First Stage: Minimal Document -- Second Stage: Adding a Little Data -- Variables and Constants -- Here Documents -- Summing Up -- 26 TOP-DOWN DESIGN -- Shell Functions -- Local Variables -- Keep Scripts Running -- Summing Up -- 27 FLOW CONTROL: BRANCHING WITH IF -- if Statements -- Exit Status -- Using test -- A More Modern Version of test -- (( ))-Designed for Integers -- Combining Expressions -- Control Operators: Another Way to Branch -- Summing Up -- 28 READING KEYBOARD INPUT -- read-Read Values from Standard Input -- Validating Input -- Menus -- Summing Up -- Extra Credit -- 29 FLOW CONTROL: LOOPING WITH WHILE/UNTIL -- Looping -- Breaking Out of a Loop -- Reading Files with Loops -- Summing Up -- 30 TROUBLESHOOTING -- Syntactic Errors -- Logical Errors -- Testing -- Debugging -- Summing Up -- 31 FLOW CONTROL: BRANCHING WITH CASE -- The case Command -- Summing Up -- 32 POSITIONAL PARAMETERS -- Accessing the Command Line -- Handling Positional Parameters en Masse -- A More Complete Application -- Summing Up -- 33 FLOW CONTROL: LOOPING WITH FOR -- for: Traditional Shell Form…”
    Libro electrónico
  11. 2711
    Publicado 2010
    Tabla de Contenidos: “…Adding a scroll bar to the text field -- Some suggestions to try on your own -- 6 CREATING PRELOADERS IN ACTIONSCRIPT 3.0 -- Lesson overview -- Tools in the testing environment -- Creating a text field and progress bar to track loading -- Inserting ActionScript to track progress of the UILoader component -- Controlling the frames of a movie clip to reflect loading progress -- Some suggestions to try on your own -- 7 USING ARRAYS AND LOOPS IN ACTIONSCRIPT 3.0 -- Lesson overview -- Examining the starting file -- Adding MovieClip instances to the Stage from the Flash Library -- Adding the initial variables -- Generating multiple instances with a for loop -- Generating drag-and-drop functionality -- Creating the game play in an ENTER_FRAME listener -- Using hitTestObject() to check for collisions -- Some suggestions to try on your own -- 8 CREATING AND FORMATTING TEXT WITH ACTIONSCRIPT -- Lesson overview -- Examining the starting file -- Creating a TLF text field with ActionScript -- Loading an external text file into a TLF text field -- Using the TextFormat class -- Giving the user a custom panel to format text -- Creating a scroll bar using ActionScript -- Some suggestions to try on your own -- 9 CONTROLLING SOUND WITH ACTIONSCRIPT -- Lesson overview -- Examining the starting file -- Adding sliders to the project -- The Sound, SoundChannel, and SoundTransform classes -- Setting the song titles using a for loop -- Making the sliders invisible until needed -- Programming the buttons to select songs -- Controlling the visibility of the volume and pan controls -- Adding a listener for the ID3 tags of an MP3 file -- Adding a text format object -- Adding the slider controls -- Some suggestions to try on your own -- 10 WORKING WITH AN XML PLAYLIST -- Lesson overview -- Understanding the basic structure of an XML file -- Examining the starting file…”
    CDROM
  12. 2712
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Table of Contents -- Acknowledgements -- Notes on the Use of Terminology -- Abbreviations -- List of Tables, Diagrams, Maps and Illustrations -- Introduction: Scope and Limits of the Study -- Chapter 1 Literature Review -- 1.1 The Linguists -- 1.1.1 While Mapping the Daco-Romanian Dialects: Gustav Weigand -- 1.1.2 Further Mapping: Atlas of Romanian Language II, Emil Petrovici and Ion Gheție -- 1.1.3 The First Description of a Dialect Spoken by Rudari in Romania: Ion Calotă -- 1.1.4 Towards a Comparative Dialectal Description: Nicolae Saramandu -- 1.1.5 The Dialectal Geography of the Rudari: Thede Kahl -- 1.1.6 Conclusions -- 1.2 The Ethnographers, Historians, Anthropologists -- 1.2.1 Paul Bataillard (1816-1894) -- 1.2.2 Martin Block (1891-1972) -- 1.2.3 A Momentum, Ion Chelcea -- 1.2.4 Further Ethnological Investigations in the Muscel Region -- 1.2.5 Recent Fieldwork in Oltenia -- 1.2.6 Conclusion -- 1.3 Sources -- 1.3.1 Cozia Monastery Registers -- 1.3.1.1 Description of the Manuscripts from ANIC -- 1.3.1.2 Previous Research -- 1.3.2 The 1838 Census of Population, Houses and Agriculture -- Chapter 2 Wallachia, from its Rise until the Mid-Nineteenth Century -- Chapter 3 The Time and Space of the Gold-Washers -- 3.1 The Legacy from Antiquity -- 3.2 Renewal of Mining in the Middle Ages and early Modern Era -- 3.3 Conclusions -- Chapter 4 Different Names in Different Times -- 4.1 AURAR, pl. …”
    Libro electrónico
  13. 2713
    Tabla de Contenidos: “…-- YÁAX K'AAX: PAAKAT, TS'A-ÓOLAL YÉETEL U BEEL PÁALKERO'OB -- KA'AP'ÉEL K'AAX: LU'UMIL, U ÁAJAL U YÓOL MÁAK YÉETEL KAAMBALIL -- U TS'OOK TUUKUL: BA'AX KU TAAL YÓOK'OL LE MAAYÁAJ KAAMBALILO'OB MEYAJ (...) -- U TS'ADYOSBO'OTIKIL -- U MIATSIL K'AXNAJ. …”
    Libro electrónico
  14. 2714
    Publicado 2023
    “…A comprehensive photo editing guide from a professional artist for Affinity 1.0 and 2.0 users covering best techniques to fix problems in edits and understand workflow Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn to use masking, selection, brushes, blend mode, and color tools in the photo editing workflow Unveil advanced personas used in the editing pipeline like tone mapping, liquification, and more Create your own brushes and build your artistic pallet in Affinity Photo Book Description In this book, you'll explore the Affinity Photo program through practice-based learning as you make popular photo edits, learning the tools and techniques in conjunction with the workflow concept. …”
    Libro electrónico
  15. 2715
    Publicado 2024
    Tabla de Contenidos: “…-- Getting to know the RenderObjectWidget and its children -- Unveiling the Element class -- Reduce, reuse, recycle! …”
    Libro electrónico
  16. 2716
    Publicado 2023
    Tabla de Contenidos: “…Chapter 19 Engineering practices for speed and high-quality code -- Ground rapid software delivery in DevOps -- Improve quality through coding standards and code maintainability -- Instill end-to-end automation through continuous integration and continuous deployment (CI/CD) -- Notes -- Chapter 20 The tools to make your developers highly productive -- Flexible and scalable development sandboxes -- Modern and standardized tooling -- Chapter 21 Delivering production-grade digital solutions -- Aim for a high degree of control and auditability -- Ensure the environment is secure, scalable, and available -- Incorporate monitoring and observability -- Chapter 22 Build in security and automation from the start -- Shift left on security -- Embed security into the SDLC using DevSecOps -- Notes -- Chapter 23 MLOps so AI can scale -- Note -- Getting Ready Section Four -- Section Five: Embedding Data Everywhere: What it takes to make data easy to consume across the organization -- Chapter 24 Determine what data matters -- Identifying and prioritizing data -- Assessing data readiness -- Developing the data roadmap -- Note -- Chapter 25 Data products: The reusable building blocks for scaling -- Identifying data products that generate value -- Setting up data product pods -- Developing data products -- Note -- Chapter 26 Data architecture, or the system of data "pipes" -- Data architecture archetypes -- Deciding on data capabilities and adopting reference architectures -- Best practices for designing a data architecture -- Notes -- Chapter 27 Organize to get the most from your data -- Organization -- Talent and a data-driven culture -- DataOps tooling -- Governance and risk -- Notes -- Getting Ready Section Five…”
    Libro electrónico
  17. 2717
    Publicado 2010
    Tabla de Contenidos: “…-- THE VALUE CYCLE: YOU, ME, AND MUTUAL VALUE -- THE CONVERSATION PRISM -- THE ART AND SCIENCE OF LISTENING AND MONITORING -- LISTENERS MAKE THE BEST CONVERSATIONALISTS -- CHARTING A SOCIAL MAP -- CONVERSATION WORKFLOW -- TAKING CENTER STAGE -- LEVEL ONE: THE EPICENTER -- CHARTING THE COURSE -- ESTABLISHING A CONVERSATION INDEX -- THE COMMUNITY STARTS WITHIN -- NOTES -- Chapter 19: Unveiling the New Influencers -- WE ARE MEDIA -- BUILDING A BRIDGE BETWEEN BRANDS AND MARKETS -- ENGAGE WITH PURPOSE -- THE SHIFT FROM MONITORING TO ACTION -- X-RAY GLASSES AND BIONIC HEARING -- SEARCHING THE SOCIAL WEB -- NOTE -- Chapter 20: The Human Network -- BREATHING LIFE INTO THE HUMAN NETWORK -- THE HUMAN NETWORK: ALIVE AND CLICKING! …”
    Libro electrónico
  18. 2718
    Publicado 2024
    Tabla de Contenidos: “…Practical implementation with StatsForecast -- Using rates of arrival to identify change points -- Pros and cons of using rates of arrival for change point detection -- Summary -- Further reading -- Part 3: Who and What to Target -- Chapter 8: Customer Insights - Segmentation and RFM -- Technical requirements -- Understanding the sources of customer dynamics -- Analyzing customer dynamics - unveiling segmentation and RFM -- Delving deeper into what segmentation is -- Clustering -- Classification -- Discriminant analysis and classification -- Exploring RFM -- Approaches and techniques - independent versus sequential sorting -- A practical example of RFM analysis -- Profitability evaluation -- ROMI after RFM -- Results of using RFM for targeting -- Summary -- Further reading -- Chapter 8: Customer Lifetime Value with PyMC Marketing -- Technical requirements -- Diving deeper into CLV -- CLV in practice -- Using CLV to calculate acquisition costs -- CLV and prospects -- CLV and incremental value -- What's wrong with the CLV formula? …”
    Libro electrónico
  19. 2719
    Publicado 2024
    Tabla de Contenidos: “…5.4 Assessing the usability of AR interfaces for path planning -- 5.4.1 Usability evaluation -- 5.5 Conclusions -- References -- Part 3: Crafting the future: System design and applications -- Chapter 6: Unveiling the future of medical imaging: Scan to VR pipeline for visualization -- 6.1 Introduction -- 6.2 Case study -- 6.3 Methodology -- 6.4 Results -- 6.5 Discussion -- 6.6 Summary and conclusion -- Acknowledgements -- References -- Chapter 7: Accelerating rehabilitation through AR/VR solutions -- 7.1 Introduction -- 7.1.1 Brief explanation of the state of the art of VR/AR systems -- 7.2 Search strategy -- 7.3 Existing AR/VR technologies for physical rehabilitation -- 7.4 AR/VR technology as healthcare treatment options -- 7.4.1 Upper limb -- 7.4.2 Lower limb -- 7.4.3 Parkinson's Disease -- 7.4.4 Stroke -- 7.4.5 Sclerosis -- 7.4.6 Pain management -- 7.5 State of art review (top 5 articles) -- 7.6 Design and development approaches for Physical Rehabilitation -- 7.6.1 Traditional research and development of AR/VR devices -- 7.6.1.1 Patient side -- 7.6.1.2 Physician/physiotherapist -- 7.6.1.3 Software -- 7.6.1.4 Limitations of AR/VR usability -- 7.6.2 FDA regulations for AR/VR product development -- 7.7 Discussion -- 7.7.1 Application and benefits -- 7.7.1.1 Mental health and concerned disorders -- 7.7.1.2 Surgical limitations and pediatric diagnosis -- 7.7.2 Emerging risks -- 7.7.3 Design standard requirements -- 7.7.4 Future research directions -- 7.8 Conclusion -- Acknowledgements -- References -- Chapter 8: Overcoming phobias: Harnessing the power of immersive virtual reality therapy -- 8.1 Introduction -- 8.1.1 Background and driving forces -- 8.2 Various types of phobias -- 8.3 Available treatments for phobias -- 8.4 Virtual reality in the treatment of phobias -- 8.5 Virtual reality systems…”
    Libro electrónico
  20. 2720
    por Església Catòlica.
    Publicado 1714
    991005051479706719