LEADER 01045nam0-22002771i-450- 001 990006609730403321 005 20001010 035 $a000660973 035 $aFED01000660973 035 $a(Aleph)000660973FED01 035 $a000660973 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>finanziamenti integrativi . Fonti e m odalita' di accesso agli aiuti ed ai prestiti delle Comunita' europee e delConsiglio d'Europa$fMichela Sironi Mariotti$g[A cura dell'] ISPA Istituto di Studi Politici eAmministrativi 210 $aVerona$cLibreria Universitaria Editrice$d1982 215 $a211 p. , 24 cm 700 1$aSironi Mariotti,$bMichela$0123701 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006609730403321 952 $aIII Q 304$b26329$fFSPBC 959 $aFSPBC 996 $aFinanziamenti integrativi . Fonti e m odalita' di accesso agli aiuti ed ai prestiti delle Comunita' europee e delConsiglio d'Europa$9621342 997 $aUNINA DB $aGEN01 LEADER 01988nlm 2200325 450 001 996453352503316 005 20220120090804.0 010 $a9780470106280 100 $a20070425h2007---- uy 0 101 0 $aeng 102 $aUS 135 $adrcnu 200 1 $aGenetic algorithms in electromagnetics$fRandy L. Haupt, Douglas H. Werner 210 1 $aHoboken$cIEEE Press$d2007 215 $aTesto elettronico (PDF) (XIII, 301 p. : ill.) 230 $aBase dati testuale 330 $aGenetic Algorithms in Electromagnetics si concentra sull'ottimizzazione della funzione obiettivo quando un algoritmo informatico, un modello analitico o un risultato sperimentale descrive le prestazioni di un sistema elettromagnetico. Offre una guida esperta per ottimizzare i sistemi elettromagnetici utilizzando algoritmi genetici (GA), che si sono dimostrati tenaci nel trovare risultati ottimali laddove le tecniche tradizionali falliscono.un'introduzione approfondita e perspicace all'uso di algoritmi genetici per ottimizzare i sistemi elettromagnetici Gli algoritmi genetici in elettromagnetica si concentrano sull'ottimizzazione della funzione obiettivo quando un algoritmo informatico, un modello analitico o un risultato sperimentale descrive le prestazioni di un sistema elettromagnetico. Offre una guida esperta per ottimizzare i sistemi elettromagnetici utilizzando algoritmi genetici (GA), che si sono dimostrati tenaci nel trovare risultati ottimali laddove le tecniche tradizionali falliscono. 606 0 $aAntenna arrays$xDesign$2BNCF 606 0 $aElettromagnetismo$xImpiego [degli] Algoritmi genetici$2BNCF 676 $a537.015197 700 1$aHAUPT,$bRandy L.$0319599 701 1$aWERNER,$bDouglas H.$f1960-$0845932 801 0$bcba$aIT$bcba$gREICAT 801 1$bcba$aIT$bcba$gREICAT 801 2$bcba$aIT$bcba$gREICAT 912 $a996453352503316 959 $aEB 969 $aER 996 $aGenetic algorithms in electromagnetics$91888854 997 $aUNISA LEADER 03010nam 22006133u 450 001 9910163974903321 005 20210107201651.0 010 $a9782511002469 010 $a2511002469 035 $a(CKB)3790000000024891 035 $a(EBL)2088884 035 $a(MiAaPQ)EBC2088884 035 $a(Au-PeEL)EBL2088884 035 $a(OCoLC)914149805 035 $a(PPN)257544488 035 $a(FR-PaCSA)88915340 035 $a(FRCYB88915340)88915340 035 $a(Perlego)3578065 035 $a(EXLCZ)993790000000024891 100 $a20150720d2013|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSummary of The Right Nation 210 $aCork $cPrimento Digital$d2013 215 $a1 online resource (25 p.) 300 $aDescription based upon print version of record. 311 08$a9782512006589 311 08$a2512006581 327 $aTitle page; Book Presentation; Book Abstract; About the Author; Important Note About This Ebook; Summary of The Right Nation (John Micklethwait and Adrian Wooldridge); The Conservative Ascendancy; Snatching Victory from Defeat; The Left Self Destructs; The Reagan Revolution; The Bush Dynasty; The Clinton Years; The Accidental President?; Made in Texas; Bush's Faith; The Battle of Ideas; The Brawn; The War on Terror: With Us or Against Us; Republican Hegemony; What Could Go Wrong?; Conclusion; Buy the Book; About the Summary Publisher; Copyright 330 $a This ebook consists of a summary of the ideas, viewpoints and facts presented by John Micklethwait and Adrian Wooldridge in his book "The Right Nation: How Conservatives Won". This summary offers a concise overview of the entire book in less than 30 minutes reading time. However this work does not replace in any case John Micklethwait's and Adrian Wooldridge's book.
Micklethwait and Wooldridge explore and explain the conservative nature of American politics at the 21st century.
517 $aSummary 517 $aSummary of The Right Nation 606 $aPOLITICAL SCIENCE / Essays$2bisacsh 606 $aPOLITICAL SCIENCE / General$2bisacsh 606 $aPOLITICAL SCIENCE / American Government / General$2bisacsh 606 $aPOLITICAL SCIENCE / Political Ideologies / Conservatism & Liberalism$2bisacsh 606 $aPOLITICAL SCIENCE / Political Ideologies / Democracy$2bisacsh 615 7$aPOLITICAL SCIENCE / Essays 615 7$aPOLITICAL SCIENCE / General 615 7$aPOLITICAL SCIENCE / American Government / General 615 7$aPOLITICAL SCIENCE / Political Ideologies / Conservatism & Liberalism 615 7$aPOLITICAL SCIENCE / Political Ideologies / Democracy 676 $a320.520973 700 $aReader$b Capitol$0888945 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910163974903321 996 $aSummary of The Right Nation$92862222 997 $aUNINA LEADER 08206nam 22006855 450 001 9910357841103321 005 20251225193445.0 010 $a3-030-35653-1 024 7 $a10.1007/978-3-030-35653-8 035 $a(CKB)4100000009939730 035 $a(MiAaPQ)EBC5984027 035 $a(DE-He213)978-3-030-35653-8 035 $a(PPN)257357920 035 $a(EXLCZ)994100000009939730 100 $a20191122d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFuture Data and Security Engineering $e6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27?29, 2019, Proceedings /$fedited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (749 pages) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11814 311 08$a3-030-35652-3 327 $aInvited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators? Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deeplearning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models. 330 $aThis book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11814 606 $aApplication software 606 $aArtificial intelligence 606 $aData protection 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aComputer and Information Systems Applications 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 14$aComputer and Information Systems Applications. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.8 676 $a005.8 702 $aDang$b Tran Khanh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTakizawa$b Makoto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBui$b Son Ha$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357841103321 996 $aFuture data and security engineering$91985658 997 $aUNINA