Searched over 21.6 Million titles in 0.36 seconds
Please wait while the eBook Finder searches for your request. Searching through the full text of 2,850,000 books. Full Text searches may take up to 1 min.
Table of Contents Day 1: First day of vacation Day 2: Virtual Reality vacation begins. For real Day 3: Nothing out of the ordinary Day 4: Friday and friends Day 5: So many different Worlds Day 6: In Solitude Day 7: Domestic duties Day 8: Girlfriend, romance and other feelings Day 9: The sky is orange Day 10: Menstruation Day 11: Who's afraid of being watched? Day 12: Music Day 13: @SundayPlayday Day 14: Driving alone around the Worlds Day 15: Bad mood Day 16: Poem Day 17: My Sensible family Day 18: Stories are magic Day 19: Touch and feel Day 20: The point of vacations Day 21: Wasted vacation day Day 22: The day after Day 23: No easy answers Day 24: Games people play Day 25: When you feel blue Day 26: Can’t put things off forever Day 27: Sunday Day 28: Stormy Weather Day 29: Sex Day 30: Two big changes Epilogue More from the writer ...
This book describes what happened in the field of EcoDesign at the Consumer Electronics Division (PCE) of Philips Electronics in the years 1993-2008. Fifty stories illustrate the five overlapping stages of its development: Get the facts, stimulate creative thinking, implement and validate, integrate into design and production, and communicate results effectively. EcoDesign has been introduced to PCE through a bottom-up approach with an emphasis on common sense. This ensured a wide acceptance and a strong participation. As a result, EcoDesign turned out to have a significance which went far beyond just environmental improvements. Apart from direct cost reductions, it turned to be an effective concept to critically review decisions taken in the past. In its mature form it has grown into a powerful general management tool. ...
The electronics industry has been dealing with EcoDesign as of the early nineties of last century. There has been a variety of drivers to do so, varying from ethics to complying with (new) environmental legislation. After 25 years a new generation of EcoDesigners has entered the field. This generation operates from the wider sustainability perspective, that is taking apart from environmental also social and economic considerations into account. It is supported by a knowledge base which can be accessed through internet and through smart phones. This is quite a difference compared with the period when EcoDesign started. The scene has therefore changed but many issues to be addressed by EcoDesign have not. The key issues are still energy, materials, packaging and transport, chemical content and recyclability. Making EcoDesign successful in the business is facing similar hurdles as twenty years ago....
1. In what kind of company was EcoDesign being introduced in 1993? 2. EcoDesign inside companies in the Electronics sector. 3. What is EcoDesign? 4. EcoDesign at Philips Consumer Electronics: a special case. 5. The 50 Stories about the development of EcoDesign at Philips Consumer Electronics. 6. Stage 1. Get facts, why are things as they are? 7. Stage 2. Fostering Creativity. 8. Stage 3. Implementation and Validation. 9. Stage 4. Structure. 10. Stage 5. Communication and Green Marketing. 11. Teaching Applied EcoDesign. 12. Looking back and looking forward. ...
Computers, Internet, DVD, BlueRay, Bluetooth, MS Office, Adobe Reader, Video Editing, Language settings, Internet Browser, e-mail, Google Apps, eCommerce, Affiliate Marketing, AdWord, AdSense, Digital Hiding, Blogging, Keyboard, Typing, Torrent, Search Engine, Web hosting, eMail Marketing, Social Networking, Digital books, Copyright laws, Online fraud, Online earning, Online resources, Hidden Internet, Block Pornography...
A complete guide with instructions, templates and theory modules so as to help the teacher acquire ICT and interpersonal skills. The workshop aims to help teachers combat issues related with online identities....
INSTRUCTOR INTRODUCTION Introduction Welcome instructor! Thank you for being interested in the IDentifEYE project. The overall aim of the IDentifEYE project is to enhance student online safety by empowering student online resilience. But, you will not instruct students. You will instruct teachers. The reason for this is scalability. In order to reach students in a scalable, structured way there are only two gateways: parents and teachers. Because teachers are organized and have a far larger reach than parents they are the ones you will deal with. ...
Project Home 2011 scientific research- descriptions of innovations developed and the successful achievement made on January 1, 2011
Project Home 2011 accomplished January 1, 2011
The 12 Code Commandments are the steps to follow when building a new software. Each commandment goes into detail of each fundamental aspect of the project and provides insight on what you should keep in mind....
The book provides a comprehensive overview of the field (Earthquakes, Earth's Structure, sesmic waves & so more topics) to interested readers and beginning researchers. An earthquake is a sudden motion or trembling of the Earth caused by the abrupt release of energy that is stored in rocks. Now the question is how Energy stored in rocks/Earth?? How do rocks store energy, and why do they suddenly release it as an earthquake?...
The book is devoted to roads, their origin and development throughout the centuries. Their history started along with the appearance of humans, their first paths, first attempts to expand the borders of their habitat. The chronicles of road connections should be considered as the history of humankind in the spatial domain at the crossroads of which the fates of nations and cultures converged and intertwined. The appearance of roads is directly related to the invention of the wheel thousands of years ago. These were the first trading routes of ancient civilizations, the routes used to transport people, knowledge and goods, ensuring cultural, scientific and economic exchange between towns and settlements of the inhabited part of the planet. Roads attained even greater importance in the times of the Roman Empire, being the key elements of its military expansion. The Roman roads were inherited by medieval Europe, and some of them, now covered with asphalt, are still used. The transcontinental Great Silk Road, which connected the east and west of Eurasia, is still there, too. And today, in the epoch of flourishing of scientific and tech...
In those distant times, traveling was always an unsafe business, so every merchant had to consider the risks of it. The road was rarely even, not to mention picturesque. It typically ran through a desert, often stony, with camels’ skeletons strewn all around—eerie marks, indeed, but useful for any traveler to use them for road signs. Piercing cold in winter and unbearable heat in summer. Ever-nagging thirst, fostered by the need to conserve water. Constant anticipation of storms or encounters with nomads—nobody knew which of the two was worse. Finally, sporadic towns and oases where the odds of finding a hearty welcome were much lower than those of facing tolls and charges. The Great Silk Road was never a single highway, but rather a system which incorporated multiple branches of caravan routes which took different passes through mountain ranges, skirting the deserts. Originally, the Silk Road took off at Chang’an, China’s ancient capital, and ran along the northern Tian Shan toward Dunhuang, a city near the end of the Great Wall of China. Here the single Road forked to by-pass the Taklamakan desert from the north and from the so...
1. World’s Origins. Population Spread 2. First States 3. Ancient Rome. Secrets of the Empire 4. The Middle Ages. Drawing New Boundaries 5. The Age of Great Geographical Discoveries. The New Continent 6. Island Isolationism. Japan 7. The Modern Era. The Automobile 8. On the Verge of Globalization. US Roads Appendices...
Love for IT quizzing started for me when I first participated in TCS IT WIZ Quiz held in Ahmedabad. During my first year I couldn’t grab myself a place at the stage. From then onwards I was determined to win the quiz. I will be participating for the second year (2020) and let us see what my hard work reaps. Throughout the preparatory journey I have realized many things with one of them being the scarcity of preparatory material for the quiz. I would surf through the internet for readymade material but failed in doing so. Believe me surfing through the internet for getting the right facts is a herculean and daunting task in itself. Throughout the year, during my preparatory journey, I have collected and taken notes of many questions. I will be compiling those questions in the form of different volumes of the book “Euphoria”. Now speaking about the name of the book, many of you would adversely question yourselves into thinking why not an IT related name. So the thing is “Euphoria”, according to the dictionary, means “a state of intense happiness and self-confidence”. It refers to the bliss I would get by knowing that I helped a lot of...
Written by Kanishtrayen Baskaran, Swati Anant, Nicholas Hamzea, Annie Li with graphic design done by Amy Zhao. The COVID-19 pandemic has had devastating impacts on every functional aspect of society, with hundreds of thousands dead and millions more infected in just a few short months. Although many countries and regions, such as Canada and most of Europe, have shown significant decreases in the number of active cases, the pandemic is far from over and, on a global level, the peak has yet to even be reached as of July 2020 (Neustaeter, 2020). What started as a small outbreak in Wuhan, China back in late 2019 quickly snowballed into a “public health emergency of international concern” by the end of January before being declared a global pandemic on March 11, 2020 by the World Health Organization (WHO, 2020a). Within an instant, countries were scrambling to close borders, shut down public spaces and workplaces, and draft new regulations to reduce the spread of COVID-19; the world was in a state of limbo and it seemed as if nobody knew what to do next. For many, this was their first time experiencing a global crisis to this degree and ...
Rexx programming -- the complete guide. Tutorial, scripting examples, and comprehensive reference. 723 pages.
The fourth volume on Advances and Applications of Dezert-Smarandache Theory (DSmT) for information fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics. The contributions have been published or presented after disseminating the third volume (2009) in international conferences, seminars, workshops and journals. This book presents the theoretical advancement of DSmT, dealing with Belief functions, conditioning and deconditioning, Analytic Hierarchy Process, Decision Making, Multi-Criteria, evidence theory, combination rule, evidence distance, conflicting belief, sources of evidences with different importance and reliabilities, importance of sources, pignistic probability transformation, Qualitative reasoning under uncertainty, Imprecise belief structures, 2-Tuple linguistic label, Electre TriMethod, hierarchical proportional redistribution, basic belief assignment, subjective probability measure, neutrosophic logic, Evidence theory, outranking methods, Dempster-Shafer Theory, Bayes fusion rule, frequentist probability, mean square error, controlling factor,...
Since no fusion theory neither fusion rule fully satisfy all needed applications, the author has proposed since 2004 a Unification of Fusion Theories and a Unification / Combination of Fusion Rules in solving problems/applications. For each particular application, one selects the most appropriate fusion space and fusion model, then the rules, and algorithms of implementation. We are working in the Unification of the Fusion Theories and Rules (UFTR), which looks like a cooking recipe, better we would say like a logical chart for a computer programmer, but we do not see another method to comprise/unify all things. The unification scenario presented herein, which is now in an incipient form, should periodically be updated incorporating new discoveries from the fusion and engineering research. The author has pledged in various papers, conference presentations, and scientific grant applications (between 2004-2015) for the unification of fusion theories, rules, image segmentation procedures, filter algorithms, and target tracking methods for more accurate applications to our real world problems....
To learn more about agile principles, benefits and challenges, native through this comprehensive Ebook guide. It will help you to build successful agile teams and manage the software development process effectively in an agile environment. This EBook is completely free to download. Download it now for detailed information about agile development....
In today’s turbulent business environment, responding to flatlining market conditions and ever-changing customer demands is extremely important for enterprises. To fulfil the customer demand related to advanced product or services, continuous innovation and Identifying breakthrough ways of offering products and services is a must for modern-day firms. To achieve this,introduction of enterprise-wide agile software development practices is a must for global businesses today. ...
The security plus certification exam covers a broad range of domain knowledge. The exam objectives cover the following subject matter: • Attacks, Threats, and Vulnerabilities • Architecture and Design • Implementation • Operations and Incident Response • Governance, Risk, and Compliance This book will provide potentially useful definition of various subjects covered by the exam objectives. ...
Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données 2016/679 (General Data Protection Regulation, « GDPR »). La section Problèmes éthiques détaille les problèmes spécifiques générés par le big data. Après une brève section de Recherche de big data, sont présentées les Conclusions sur l’éthique de la recherche dans l’utilisation du big data. DOI: 10.13140/RG.2.2.10128.56328...
Le terme big data désigne l'extraction, la manipulation et l'analyse des ensembles de données trop volumineux pour être traités de manière routinière. Pour cette raison, des logiciels spéciaux sont utilisés et, dans de nombreux cas, des ordinateurs et du matériel informatiques dédiés. Généralement, ces données sont analysées de manière statistique. Sur la base de l'analyse des données respectives, des prédictions de certains groupes de personnes ou d'autres entités sont généralement établies, en fonction de leur comportement dans diverses situations et à l'aide des techniques analytiques avancées. Ainsi, les tendances, les besoins et les évolutions comportementales de ces entités peuvent être identifiés. Les scientifiques utilisent ces données pour la recherche en météorologie, génomique, connectomique, (Nature 2008) simulations physiques complexes, biologie, protection de l'environnement, etc. (Reichman, Jones, and Schildhauer 2011) Avec le volume croissant des données sur Internet, dans les médias sociaux, l'informatique en nuage, les appareils mobiles et les données gouvernementales, le big data constitue à la fois une menace et...
Abstract 1. Introduction - 1.1 Définitions - 1.2 Les dimensions du big data 2. La technologie - 2.1 Applications - - 2.1.1 En recherche 3. Aspects philosophiques 4 Aspects juridiques - 4.1 RGPD (GDPR) - - Étapes du traitement des données personnelles - - Principes du traitement des données - - Politique de confidentialité et transparence - - Finalités du traitement des données - - Confidentialité par conception et confidentialité implicite - - Le paradoxe (juridique) des mégadonnées 5. Problèmes éthiques - L'éthique dans la recherche - Prise de conscience - Consentement - Contrôle - Transparence - Confiance - Propriété - Surveillance et sécurité - Identité numérique - Réalité ajustée - De-anonymisation - Inégalité numérique - Confidentialité 6. Recherche des mégadonnées Conclusions Bibliographie...
De la nécessité et de l'utilité de développer une philosophie spécifique pour la technologie de la blockchain, mettant l'accent sur les aspects ontologiques. Après une Introduction qui met en évidence les principales orientations philosophiques de cette technologie émergente, dans La technologie blockchain j’explique le fonctionnement de la blockchain, en analysant les directions de développement ontologique de cette technologie dans Conception et modélisation. La section suivante est consacrée à la principale application de la technologie de la blockchain, Bitcoin, avec les implications sociales de cette crypto-monnaie. Il suit une section de Philosophie dans laquelle j'identifie la technologie de la blockchain au concept d'hétérotopie développé par Michel Foucault et je l'interprète à la lumière de la technologie de notation développée par Nelson Goodman en tant que système de notation. Dans la section Ontologie, je présente deux voies de développement que j'estime importantes: une Ontologie narrative, basée sur l'idée d'ordre et de structure de l'histoire transmise à travers l'histoire narrative de Paul Ricoeur, et le système de ...
Internet a changé complètement le monde, la culture et les coutumes des gens. Après une première phase caractérisée par la libre circulation de l’information, la sécurité des communications en ligne et la confidentialité des utilisateurs ont suscité des préoccupations. La technologie Blockchain (TB) garantit ces deux objectifs. TB, relativement nouveau, a la chance de produire une nouvelle révolution, justifiant pleinement une investigation philosophique. La première blockchain a été conceptualisée par Satoshi Nakamoto en 2008, à l'aide d'une méthode excluant un tiers autorisé. (Narayanan et al. 2016) En 2009, Nakamoto a développé Bitcoin, utilisé comme registre public pour les transactions de réseau. (The Economist 2015) Depuis 2014, de nouvelles applications technologiques, (Nian et Chuen 2015) appelées blockchain 2.0, ont été développées pour des contrats intelligents plus sophistiqués qui partagent des documents ou envoient automatiquement les dividendes des propriétaires si les bénéfices atteignent un certain niveau. Dans Philosophical Engineering: Toward a Philosophy of the Web, Halpin et Monnin ont abordé certains aspects p...
Abstract Introduction La technologie blockchain - Conception - Modèles Bitcoin Philosophie Ontologies - Ontologies narratives - Ontologies d'entreprise Conclusions Bibliographie Notes...
Η αντιστήριξη ή υποστύλωση μίας κατασκευής ή τμημάτων αυτής τα οποία έχουν υποστεί βλάβες λόγω ενός σεισμού ή οποιαδήποτε άλλης φυσικής ή ανθρωπογενούς αιτίας, είναι μία πολύπλοκή και πολυπαραγοντική διαδικασία που χρειάζεται μεγάλη προσοχή και εμπειρία, ενώ απαιτεί εξειδικευμένη γνώση των μηχανισμών αστοχίας αλλά και της στατικής συμπεριφοράς μίας κατασκευής. Η υποστύλωση ενός μικρού ανοίγματος, το οποίο μας εξασφαλίζει πρόσβαση σε εγκλωβισμένους, η υποστύλωση μιας πλάκας για την εξασφάλισή της έναντι μετακίνησης από ένα μετασεισμό, η υποστύλωση ενός τοίχου ή ενός μπαλκονιού δίπλα από τα οποία καλούμαστε να επιχειρήσουμε, είναι κάποια από τα παραδείγματα αντιστηρίξεων ή υποστυλώσεων που χρησιμοποιούμε σε μια επιχείρηση με σκοπό να μειώσουμε την ήδη μεγάλη επικινδυνότητα μιας τέτοιας επιχείρησης. Το συγκεκριμένο εγχειρίδιο έχει στόχο να δώσει σε κάθε Πυροσβέστη-Διασώστη τα γνωστικά εργαλεία ώστε να επεμβαίνει σε ένα συμβάν ολικής κατάρρευσης ή μερικής αστοχίας κτιρίου, με την μέγιστη δυνατή ασφάλεια, τόσο για τον ίδιο όσο και για τον διασωζόμενο, να χρησιμοποιεί τα διαθέσιμα εργαλεία με το βέλτιστο δυνατό τρόπο και να μπορεί να αξι...
Περιεχόμενα Αντί προλόγου 1. Βασικές Έννοιες 1.1 Τα στοιχεία ενός κτιρίου 1.2 Παραδοσιακά κτίρια 1.3 Αντιστηρίξεις - Υποστυλώσεις 1.4 Είδη υποστυλώσεων και αντιστηρίξεων 2. Κατακόρυφα Συστήματα Υποστύλωσης 2.1 Μεμονωμένοι μεταλλικοί στύλοι 2.2 Μεταλλικά συστήματα υποστύλωσης τύπου σκαλωσιάς 2.3 Μεμονωμένες ξύλινες δοκοί 2.4 Συστήματα ενός ξύλινου υποστυλώματος 2.5 Ξύλινα συστήματα πολλαπλών υποστυλωμάτων 2.6 Υποστύλωση τακαρίας 3. Κεκλιμένα Συστήματα Υποστύλωσης 3.1 Κεκλιμένες υποστυλώσεις Τύπου 1 3.2 Κεκλιμένες υποστυλώσεις Τύπου 2 3.3 Κεκλιμένη τακαρία 4. Συστήματα Αντιστήριξης 4.1 Αντιστήριξη με ξύλινες αντηρίδες ενιαίας βάσης 4.2 Αντιστήριξη με ξύλινες αντηρίδες ιπτάμενου τύπου 4.3 Αντιστήριξη με οριζόντιες δοκούς 4.4 Αντιστήριξη πλαισίου με διαγώνιους συνδέσμους 5. Υποστήριξη Ανοιγμάτων 5.1 Ξύλινα επί τόπου στοιχεία 5.2 Ξύλινα προκατασκευασμένα στοιχεία 5.3 Λοιπά συστήματα υποστήριξης 6. Τρόποι υποστύλωσης - αντιστήριξης 6.1 Θέσεις υποστύλωσης - αντιστήριξης 6.2 Ο κανόνας του " Από το μεγάλο στο μικρό - Από έξω προς τα μέσα" 6.3 Αντιστήριξη τοιχοποιίας (κατακόρυφης ή υπό κλίση) 6.4 Ισόγεια με Pilo...
Supply chain management stands to benefit tremendously from going digital. We are already in the middle of this industrial revolution. This industrial revolution has heralded an era wherein manufacturing will become smarter and more intelligent and thus leading to a connected supply chain process....