Mostrando 981 - 1,000 Resultados de 2,554 Para Buscar 'Wishaw~', tiempo de consulta: 1.00s Limitar resultados
  1. 981
    Publicado 2004
    Tabla de Contenidos: “…Huner -- Isolation and identification of chloroplast lipids / Sato and Mikio Tsuzuki -- DNA adducts with chlorophyll and chlorophyllin as antimutagenic agents: synthesis, stability, and structural features / Heidar-Ali Tajmir-Riahi, Jean-Francois Neault, and Stravoula Diamantoglou -- Incorporation and analysis of LHCII in model systems / Wieslaw I. Gruszecki -- Photosystem II reconstitution into proteoliposomes: structure-function characterization / Mario Fragata -- Extraction of the functional manganese and calcium cofactors from photosystem II / Joel Freeman, Garth Hendry, and Tom Wydrzynski -- Assay of photoinhibition of photosystem II and protease activity / Yasusi Yamamoto, Yoji Nishi, Hitoshi Yamasaki, Suguru Uchida, and Satoshi Ohira --…”
    Libro
  2. 982
    por Maximo, Rui
    Publicado 2009
    Libro electrónico
  3. 983
    Publicado 2023
    Libro electrónico
  4. 984
    por Guo, Rongxing
    Publicado 2012
    Tabla de Contenidos: “…2.4.1 Natural and Social Contexts2.4.2 Criteria for the Bifurcation; 2.5 Ethno-Cultural Areas; 2.5.1 Historical Evolution; 2.5.2 Organization; 2.6 Summary; Case Study 2; Who Owns Lake Weishan?; References; 3. Human and Cultural Contexts; 3.1 Population; 3.1.1 General Situation; 3.1.2 Population Control; 3.1.3 Problems; 3.2 Labor Force; 3.2.1 General Situation; 3.2.2 Rural-To-Urban Migration; 3.3 Education; 3.3.1 Historical Evolution; 3.3.2 Progress and Problems; 3.3.3 Institutional Constraints; 3.4 Cultural diversity; 3.4.1 Ethnicity; 3.4.2 Language; 3.4.3 Religion; 3.5 Summary; Case Study 3…”
    Libro electrónico
  5. 985
    Publicado 2004
    Tabla de Contenidos: “…Al-Qastal) -- Zizia (Jizeh) -- Umm Quseir -- Umm el-Walid -- Zafaran -- Khirbet ez-Zona -- Qasr Dubaiyah -- Madaba -- The Dhiban Plateau -- Dibon (Dhiban) -- Mefaat (Umm er-Resas) -- Khan ez-Zebib -- Qasr Saliya and Er-Rama -- Qasr Thuraiya -- The Wadi Mujib -- The Character of the Mujib Area -- The Via Nova Traiana -- Muhattet el-Hajj (Lower) -- Muhattet el-Hajj (Upper [= Karakun]) -- Qasr el-Al -- Qasr Bshir -- Qasr el-Maqhaz -- Qusur Rishan -- Qatrana -- The Kerak Plateau -- Rabbathmoab/Areopolis (Er-Rabba) -- Characmoab (Kerak) -- Mutah, El-Mashad -- Betthorus/um (?) …”
    Libro electrónico
  6. 986
    Publicado 2014
    Tabla de Contenidos: “…The Role of Risk Management in Reducing Chances of a Major Mishap IV. Strengthening the Ability of Agencies to Make Better Decisions to Deal with Budget Uncertainty and Budget Cuts V. …”
    Libro electrónico
  7. 987
    Publicado 2022
    “…In Articulating the Ḥijāba, Mariam Rosser-Owen analyses for the first time the artistic and cultural patronage of the ‘Amirid regents of the last Cordoban Umayyad caliph, Hisham II, a period rarely covered in the historiography of al-Andalus.; Readership: All interested in the history, literature, art, architecture and archaeology of medieval Islamic Iberia, relations with the Maghrib, the organisation of artistic workshops, and the patronage and meaning of artworks…”
    Libro electrónico
  8. 988
    Publicado 2016
    Libro electrónico
  9. 989
    Publicado 2021
    Tabla de Contenidos: “…Suzuki -- 27 Non-Traditional Religion, Hyper-religiosity and Psychopathology: the Story of Ivan from Bulgaria -- 28 Journey into Genes: cultural values and the (near) future of genetic counselling in mental health -- 29 Policy-making indabas to prevent “not listening”: An added recommendation from the Life Esidimeni tragedy -- 30 Covert Treatment in a cross-cultural setting -- 31 Discouragement towards Seeking Health Care of Older People in Rural China: The influence of culture and structural constraints -- 32 Discovering myself, a journey of rediscovery -- Part V – TRAINING 33 Training for Task: an introduction to Part V, Training -- 34 Values-based Practice when engaging with voice-hearers -- 35 Dharma Therapy: a Buddhist counselling approach to acknowledging and enhancing perspectives, attitudes and values -- 36 Dangerous Liaisons: Science, Tradition, and Qur’anic Healing in the Dakhla Oasis of Egypt -- 37 Know thyself: Jane discovers the value of her depression -- 38 Case studies in the culture of Professional Football Players and Mental Welfare and Wellbeing -- 39 Sexual Orientation Change Efforts and VBP -- 40 Values, Meanings, Hermeneutics and Mental Health -- 41 Disha: Building Bridges-Removing Barriers: Where Excluded and Privileged Young Adults Meet -- 42 Online Counselling: the world without a label -- Part VI – REFLECTIONS 43 The Realpolitik of Values-based Practice: an introduction to Part VI, Reflections -- 44 Reflections on the impact of mental health ward staff training in race equality and values-based practice -- 45 Connecting patients, practitioners and regulators in supporting positive experiences and processes of shared decision-making in osteopathy: a case study in co-production -- 46 Beyond the Color Bar: sharing narratives in order to promote a clearer understanding of mental health issues across cultural and racial boundaries -- BM 47 Co-writing values: what we did and why we did it -- After word: where next with the book -- Index…”
    Libro electrónico
  10. 990
    Publicado 2020
    Tabla de Contenidos: “…We Are More Than Footnotes: Black Women and Intellectual Theft | Aisha Mahmud -- Section 3. #NSFW -- Chapter 12. Walled Gardens, NSFW Niches, and Horizontality: A Conversation about Tumblr Porn with | Susanna Paasonen and Noah Tsika -- Chapter 13. …”
    Libro electrónico
  11. 991
    Publicado 2020
    Tabla de Contenidos: “…Curtis, Setu N. Monroe, Aisha D . Jones and Charah T . Watson -- 22. Japan: Western science and Japanese culture / Masataka Watanabe and Mitsuru Kudo -- 23. …”
    Libro electrónico
  12. 992
    Publicado 2008
    Tabla de Contenidos: “…-- 4.6 The Take-Home Message -- 4.7 Project Ideas -- 5 Network Security -- 5.1 Basic Framework -- 5.2 Protocols -- 5.3 The Network as a Battlefield -- 5.4 The Brave New World -- 5.5 The Take-Home Message -- 5.6 Project Ideas -- 6 Implementation Security -- 6.1 Buffer Overflow -- 6.2 Argument Validation and Other Mishaps -- 6.3 TOCTOU -- 6.4 Malware -- 6.5 Programming Language Security -- 6.6 Security in the Development Lifecycle -- 6.7 The Take-Home Message -- 6.8 Project Ideas -- Part III: Building Blocks for Secure Systems -- 7 Using Cryptography -- 7.1 Framework and Terminology -- 7.2 Randomness -- 7.3 Symmetric Cryptography -- 7.4 Applications of Symmetric Cryptography -- 7.5 Public-Key Cryptography -- 7.6 Hash Functions -- 7.7 Practical Issues: Public Key -- 7.8 Past and Future -- 7.9 The Take-Home Message -- 7.10 Project Ideas -- 8 Subverting Cryptography -- 8.1 Breaking Symmetric Key without Brute Force…”
    Libro electrónico
  13. 993
    Publicado 2018
    Tabla de Contenidos: “…-- How UDA Works in Fraud Detection and Prevention -- Sampling -- Benford's Law -- Recommendations -- UDA Framework for Fraud Detection and Prevention: Insurance -- Step 1: Claimant Report (Narrative) -- Step 2: Underwriter Report (Text-Heavy) -- Step 3: Fraud Management Tool (Detection and Prediction) -- Step 4: Scoring and Classification Outputs -- Step 5: Decisions and Actions -- Major Fraud Detection and Prevention Techniques -- Best Practices Using UDA for Fraud Detection and Prevention -- Assess Your Current Fraud Management System -- Interview with Vishwa Kolla, Assistant Vice President Advanced Analytics at John Hancock Financial Services -- Interview with Diane Deperrois, General Manager South-East and Overseas Region, AXA -- Key Takeaways -- Notes -- Further Reading -- Chapter 6: The Power of UDA in Human Capital Management -- Why Should You Care about UDA in Human Resources? …”
    Libro electrónico
  14. 994
    Publicado 2022
    Tabla de Contenidos: “…Yapp and Saraniya Kataraian Key Determinants of Continuance Usage Intention: An Empirical Study of Mobile Food Delivery Apps among Malaysians Reprinted from: Proceedings 2022, 82, 15, doi:10.3390/proceedings2022082015 9 -- Zada Zainuddin, Farashazillah Yahya and Ahmad Fareez Yahya Visual Design as the Key Factor for Effective Environmental Analytics Dashboard Reprinted from: Proceedings 2022, 82, 21, doi:10.3390/proceedings2022082021 19 -- Nur Ainatul Mardiah Mat Nawi, Nur Shaliza Sapiai, Siti Aswani Mohd Ghazali, Nur Hazelen Mat Rusok, Fara Zuliana Zulkifli and Fatin Masturina Mazlan Developing an E-College Monitoring System as a Web-Based Monitoring Tool Application Reprinted from: Proceedings 2022, 82, 25, doi:10.3390/proceedings2022082025 27 -- Khadijah Abdul Rahman, Nur Ainatul Mardiah Mat Nawi, Asiah Said, Fadhilah Mohd Ishak@ Zainudin, Wan Masnieza Wan Mustapha and Asma Shazwani Shaari Developing a COVID-19 Tool as a Web-Based Means of Assessing Gold (iGold) Reprinted from: Proceedings 2022, 82, 27, doi:10.3390/proceedings2022082027 35 -- Noramira Fatehah Azman and Norena Abdul Karim Zamri Conscious or Unconscious: The Intention of Hate Speech in Cyberworld-A Conceptual Paper Reprinted from: Proceedings 2022, 82, 29, doi:10.3390/proceedings2022082029 43 -- MohdAkmalFaizOsman,MohamadNoormanMasrekandKhalidAbdulWahid Software Reuse Practices among Malaysian Freelance Developers: A Conceptual Framework Reprinted from: Proceedings 2022, 82, 30, doi:10.3390/proceedings2022082030 53 -- Norhaslinda Hassan, Norhafizah Abdul Halil, Maizatul Akmal Mohd Mohzan and Hanani Ahmad Zubir Enhancing ESL Writing Instruction Using Headgram Reprinted from: Proceedings 2022, 82, 41, doi:10.3390/proceedings2022082041 63 -- Mazni Omar, Huda Ibrahim, Mazida Ahmad, Hapini Awang, Azman Yasin and Azizah Ahmad The Impact of the Malaysia ICT Volunteers (MIV) Programme: The Volunteers' Perspective Reprinted from: Proceedings 2022, 82, 52, doi:10.3390/proceedings2022082052 71 -- Khadijah Abdul Rahman, Siti Aishah Mokhtar, Noor Arina Md Arifin, Mohd Nasir Ismail and Tengku Mohd Farid Tengku Abdul Aziz Conceptual Framework: Factors Affecting Learner Performance and Cognitive Load in Educational Multimedia Learning Reprinted from: Proceedings 2022, 82, 56, doi:10.3390/proceedings2022082056 81 -- MuhamadRomdoni,AssedLussak and Ibnu Darmawan Success Factors for Using E-Court in Indonesian Courts Reprinted from: Proceedings 2022, 82, 58, doi:10.3390/proceedings2022082058 87 -- Ibnu DarmawanandAssedLussak Improving IT Self-Efficacy, Experience and Training, and Technological Anxiety's Impact on Remote Work Quality Reprinted from: Proceedings 2022, 82, 59, doi:10.3390/proceedings2022082059 97 -- Xing Yu Liu and Kin MengCheng The Preliminary Exploration of Multimedia Effects in Sculpture Creation Inspired by Maslow's Hierarchy of Needs Reprinted from: Proceedings 2022, 82, 62, doi:10.3390/proceedings2022082062 105 -- WenLiKu,Pei BoonOoiandNeeNeeChan Pilot Study on Cyberbullying among Visually Impaired Youths Reprinted from: Proceedings 2022, 82, 67, doi:10.3390/proceedings2022082067 115 -- Mohd Saiful Rahman, Shamila Mohamed Shuhidan, Mohamad Noorman Masrek and Mohammad Fazli Baharuddin Validity and Reliability Testing of Geographical Information System (GIS) Quality and User Satisfaction towards Individual Work Performance Reprinted from: Proceedings 2022, 82, 68, doi:10.3390/proceedings2022082068 123 -- Nur Ida Aniza Rusli, Nur Atiqah Sia Abdullah, Fatin Nabila Abd Razak and Nemo Menton Mufriz Web-Based Parametric Effort Estimation for Mobile Application Development Reprinted from: Proceedings 2022, 82, 69, doi:10.3390/proceedings2022082069 131 -- Maria Cahyahadi and Nina Setiyawati WebAccessibility Testing for Visually Impaired People in Indonesia Reprinted from: Proceedings 2022, 82, 72, doi:10.3390/proceedings2022082072 141 -- Ali El Idrissi and Mohamed Fourka Performance in Virtual Teams: Towards an Integrative Model Reprinted from: Proceedings 2022, 82, 73, doi:10.3390/proceedings2022082073 149 -- Yunita Awang, Shazalina Mohamed Shuhidan, Azuraidah Taib, Norfadzilah Rashid and Mohd Sidki Hasan Digitalization of Accounting Profession: An Opportunity or a Risk for Future Accountants? …”
    Libro electrónico
  15. 995
    Publicado 2015
    Tabla de Contenidos: “…-Ing -- Thomas Martin Knoll 14.1 Chapter Overview 14.2 Introduction 14.3 State of the Art 14.4 QoE Framework Architecture 14.5 QoE Monitoring (QMON) 14.6 QoE Policy and Rules (QRULE) 14.7 QoE Enforcement (QEN) 14.8 Demonstrator 14.9 Summary 15 Software Defined Mobility Management for Mobile Internet Jun Bi, You Wang 15.1 Chapter Overview 15.2 Internet Mobility and Problem Statement 15.3 Software Defined Internet Mobility Management 15.4 Conclusion 16 Mobile Virtual Network Operators: A Software Defined Mobile Network Perspective M -- Bala Krishna 16.1 Introduction 16.2 Architecture of MVNO: A SDMN Perspective 16.3 MNO, MVNE and MVNA Interactions with MVNO 16.4 MVNO Developments in 3G, 4G and LTE 16.5 Cognitive MVNO 16.6 MVNO Business Strategies 16.7 Conclusions 16.8 Future Directions Part V : Security and Economic Aspects 17 Software Defined Mobile Network Security Ahmed Bux Abro 17.1 Introduction 17.2 Evolving threat landscape for mobile networks 17.3 Traditional ways to cope with security threats in mobile networks 17.4 Principles of adequate Security for mobile network 17.5 Typical security architecture for mobile networks 17.6 Enhanced security for SDMN 17.7 SDMN Security applications 18 Security aspects of SDMN Edgardo Montes de Oca, Wissam Mallouli 18.1 Chapter Overview 18.2 State of the art and security challenges in SDMN architectures 18.3 Monitoring techniques 18.4 Other important aspects 18.4 Conclusion 19 SDMN: Industry Architecture Evolution Paths Nan Zhang, Tapio Leva, Heikki Hammainen 19.1 Introduction 19.2 From current mobile networks to SDMN 19.3 Business roles of SDMN 19.4 Industry architectures of evolutionary SDMN 19.5 Industry architectures of revolutionary SDMN 19.6 Discussion Index …”
    Libro electrónico
  16. 996
    Publicado 2018
    Tabla de Contenidos: “…Increasing predictability -- Controlling the target's environment -- Casting doubt -- Making the target powerless -- Punishing the target -- Intimidation -- Positive manipulation tips and tactics -- Summary -- Chapter 4: Information Gathering -- Introduction -- Gathering information about targets -- Technical information-gathering methods -- BasKet -- Dradis -- Websites -- Search engines -- Pipl -- Whois.net -- Social media -- Phishing and spear phishing -- Watering holes -- Blogs -- Telephone -- Nontechnical methods -- Dumpster diving -- Intrusion and impersonation -- Tailgating -- Shoulder surfing -- Observation -- Tips -- Summary -- Chapter 5: Targeting and Recon -- Introduction -- Banks -- Old organizations -- Organizational employees -- IT personnel -- Customer support agents -- Senior-level staff -- Finance personnel -- Elderly people -- Well-wishers -- Tips -- Summary -- Chapter 6: Elicitation -- Introduction -- Getting into conversations with strangers -- Preloading -- Avoiding elicitation -- Appealing to egos -- Showing mutual interest -- Falsifying statements -- Flattering -- Volunteering information -- Assuming knowledge -- Using ignorance -- Capitalizing on alcoholic drinks -- Being a good listener -- Using intelligently-posed questions -- Assumptive questions -- Bracketing -- Learning the skill of elicitation -- Tips -- Summary -- Chapter 7: Pretexting -- Introduction -- Principles and planning of pretexting -- Doing research -- Google hacking -- The power of Google hacking -- Feedback from the victims -- Google hacking secrets -- Operators -- Using personal interests -- Practicing dialects -- Using phones -- Choosing simple pretexts -- Spontaneity -- Providing logical conclusions -- Successful pretexting -- HP information leak -- Stanley Rifkin -- DHS hack -- Internal Revenue Service scams -- Phone calls -- Emails…”
    Libro electrónico
  17. 997
    por Pradeep, ashyap
    Publicado 2016
    Tabla de Contenidos: “…Rural Marketing Insight: Caution for Marketers Giving Discounts to Rural Consumers -- Rural Marketing Snapshot: Rising Consumption of Branded Products -- Review of Objectives -- Discusion and Application -- Rural Marketing Case: Coca-Cola's Strategy for Rural Markets -- Chapter 8: Distribution in Rural Markets -- Availability: The Challenge and the Dilemma -- Distribution Channels -- The Evolution of Rural Distribution Channels -- Channel Dynamics -- Rural Channel Members -- The Rural Retail Environment -- Traditional Retail -- The Emergence of Modern Retail in Rural Areas -- Rural Marketing Snapshot: The Changing Face of Rural Retail -- Channel Behaviour in Rural Areas -- Sourcing of Stocks and Purchase Cycles -- Stocking Behaviour and Seasonality -- Credit Patterns -- Transfer of Capital -- Pricing by Channel -- Channel Promotion -- Retailer-Consumer Dynamics -- Distribution Models in Rural Markets -- The Distribution Models for FMCGs -- The Distribution Model for Durables -- Rural-centric Distribution Models -- Haats/Shandies -- Modern Distribution Models -- Vans -- The Public Distribution System -- Cooperative Societies -- Petrol Pumps and Extension Counters -- Non-government Organizations -- Rural Mobile Traders: Last Mile Distribution -- Rural Marketing Insight: Project Shakti -- Rural Marketing Insight: Gaon Chalo: A Tata Tea Initiative -- Rural Logistics -- The Hub and Spoke System -- Syndicated Distribution -- Rural Marketing Insight: Syndicated Distribution for Rural Dominance -- Review of Objectives -- Discussion and Application -- Rural Marketing Case: Colgate DISHA: The Evolution of a Sustainable PPP Model in the BoP Market -- Chapter 9: Communication Strategies for Rural Markets -- Challenges in Rural Communication -- Heterogeneity and spread -- Low Literacy and varying Comprehension Abilities -- Different media reach and Habits…”
    Libro electrónico
  18. 998
    Publicado 2025
    Tabla de Contenidos: “…-- Revealing the Secret Behind Successful Prompting -- Discovering the secret sauce in prompt engineering -- Understanding how prompts guide GenAI responses -- Crafting Effective Prompts for Diverse AI Applications -- Tips and Tricks for Optimizing Your Prompts -- Using Prompts to Provide Supplemental Data for the Model -- Avoiding Common Prompting Pitfalls -- Chapter 3 Collaborating Creatively with GenAI -- Exploring Human-AI Partnerships in Creative Fields -- The role of AI in art, music, writing, and video production -- Different art forms, same prompting issues -- Looking at some benefits of using GenAI as a creative tool -- Collaborative success stories -- Art from the GenAI time machine -- Stock photos and massive wall art -- Resurrected musicians for modern music -- AI-produced television shows -- Knowing Who's at Fault for Mishaps, Misfortunes, and Law-Breaking -- Understanding Your Role in Responsible AI -- Ethical considerations in AI collaboration…”
    Libro electrónico
  19. 999
    Publicado 2012
    Tabla de Contenidos: “…Siravenha & E. Pelaes -- Wishart classification comparison between compact and quad-polarimetric SAR imagery using RADARSAT2 data / B. …”
    Libro electrónico
  20. 1000
    Publicado 2023
    Tabla de Contenidos: “…More details about differential privacy -- A.1 The formal definition of differential privacy -- A.2 Other differential privacy mechanisms -- A.2.1 Geometric mechanism -- A.2.2 Gaussian mechanism -- A.2.3 Staircase mechanism -- A.2.4 Vector mechanism -- A.2.5 Wishart mechanism -- A.3 Formal definitions of composition properties of DP -- A.3.1 The formal definition of sequential composition DP -- A.3.2 The formal definition of parallel composition DP -- references -- Appendix -- index -- inside back cover…”
    Libro electrónico