Search Results - Code Pink~

Refine Results
  1. 1

    Pulse code formats for fiber optical data communication basic principles and applications by Moris, David J.

    Published 1983
    Book
  2. 2

    Handbook of CDMA systems design, engineering, and optimization

    Published 2000
    Book
  3. 3

    Models of neural networks II temporal aspects of coding and information processing in biological systems

    Published 1994
    Table of Contents: “…Coding and information processing in neural networks -- The correlation theory of brain function -- Firing rates and well-times events in the cerebral cortex -- The role of synchrony in neocortical proceesing and synaptic plasticity -- Associative binding and segregation in an network of spiking neurons -- Modeling the sensory computations of the olfactory bulb -- Detecting coherence in neuronal data -- Hebbian synaptic plasticity: evolution of the contemporary concept -- Reentry and dynamical interactions of cortical networks…”
    Book
  4. 4

    Graph analysis and visualization discovering business opportunity in linked data by Brath, Richard

    Published 2015
    Book
  5. 5

    National Occupational Skill Standards (NOSS) for construction industry Building Painting Project Coordinator - Level 4, Building Painting Manager - Level 5

    “…Building painting project coordinator - level 4 (CIDB CODE : PT3 (4), NVTC CODE : B-132-4)…”
    Book
  6. 6

    National Occupational Skill Standards (NOSS) for construction industry Building Painting Supervisor - Level 3

    “…Building painting supervisor - level 3 (CIDB CODE:PT3, NVTC CODE:B-132-3)…”
    Book
  7. 7
  8. 8

    Careers in art fine artist.

    Published 2009
    NetLibrary
    Electronic eBook
  9. 9

    Barriers to democracy the other side of social capital in Palestine and the Arab world by Jamal, Amaney A. 1970-

    Published 2007
    Table of Contents: “…Introduction: Democratic outcomes and associational life -- Associational life in the centralized authoritarian context of the West Bank -- The polarization of Palestinian associational life -- Trust, engagement, and democracy -- Beyond Palestine : Morocco, Jordan, and Egypt -- Conclusion: Toward a theory of democratic citizenship in state-centralized nations -- Appendix A: Survey questions and coding of associational members -- Appendix B: Survey questions and coding of general Palestinian population -- Appendix C: Survey questions and coding of general Moroccan population (World Values Survey Questions)…”
    Book
  10. 10

    R and data mining examples and case studies by Ziao, Yanchang

    Published 2013
    Book
  11. 11

    An Introduction to Data Science With Python / by Saltz, Jeffrey S., Stanton, Jeffrey M., 1961-

    Published 2025
    Book
  12. 12

    Social media data extraction and content analysis

    Published 2017
    Table of Contents: “…Martinez -- Customer complaints in social networks in the Spanish telecommunication industry : an analysis using "critizen" / Antonia Estrella-Ramón and Alba Utrera-Serrano -- Applied analytical "distant reading" using NVivo 11 Plus / Shalin Hai-Jew -- Conducting sentiment analysis and post- sentiment data exploration through automated means / Shalin Hai-Jew -- Tapping specific social media platforms -- Exploring "user", "video", and (pseudo) multi-mode networks on youtube with NodeXL / Shalin Hai-Jew -- Flickering emotions : feeling-based associations from related tags networks based on flickr contents / Shalin Hai-Jew -- Creating "(social) network art" with NodeXL / Shalin Hai-Jew -- Applied uses of social media data for awareness and problem-solving -- Social network synthesis : a dynamic approach for building distance education programs / E. Pinar Uca-Günes and Gülsün Eby -- Facebook content analysis : a study into Australian banks' online community engagement / Vindaya Senadheera, Matthew Warren,Shona Leitch, and Graeme Pye -- Code reuse / Donna Bridgham…”
    Book
  13. 13

    The web application hacker's handbook finding and exploiting security flaws by Stuttard, Dafydd 1972-, Pinto, Marcus 1978-

    Published 2011
    Table of Contents: “…. -- Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Injecting code -- Exploiting path traversal -- v. 2. -- Attacking application logic -- Attacking other users -- Automating bespoke attacks -- Exploiting information disclosure -- Attacking compiled applications -- Attacking application architecture -- Attacking the Web server -- Finding vulnerabilities in source code -- A Web application hacker's toolkit -- A Web application hacker's methodology…”
    Book
  14. 14

    Shariah audit in Islamic finance by Lahsasna, Ahcene

    Published 2016
    Table of Contents: “…Overview of shariah audit: issues and problem -- Hisbah in the context of shariah audit -- Shariah audit and shariah governance -- Shariah basis of accountability and audit -- Introduction to shariah audit -- Shariah auditor --Audit evidence: sources, forms, techniques and documentation -- Shariah audit methodology: planning phase -- Examination, reporting and documentation -- Shariah review -- The International Auditing and Assurance Standards Boards (IAASB) and Accounting and Auditing Organization for Islamic Financial Institutions (AAOIF) -- Understanding differences of shariah opinion in audit process -- Common issues and findings in shariah audit -- Developing shariah auditing rating system -- Key controls for shariah compliance in Islamic banking -- Key controls for shariah compliance in takaful -- Key control for shariah compliance in Islamic capital markets -- Key controls and check list for marketing -- Areas of potential audit shariah nin-complinace risk -- Code of ethics in shariah audit and its principles -- Mini case studies in shariah audit -- Shariah audit case study -- Conclusion and recommendations…”
    Book
  15. 15

    Multirate digital signal processing multirate systems, filter banks, wavelets by Fliege, N.J

    Published 1994
    Book
  16. 16

    The art and science of analyzing software data

    Published 2015
    Book
  17. 17

    Ethics in Islamic finance by Abdullah Haron, Muhammad Adli Musa, Ahmad Zakirullah M. Shaarani

    Published 2013
    Book
  18. 18

    North of Boston by Frost, Robert, 1874-1963

    Published 2002
    “…The pasture -- Mending wall -- The death of the hired man -- The mountain -- A hundred collars -- Home burial -- The black cottage -- Blueberries -- A servant to servants -- After apple-picking -- The code -- The generations of men -- The housek…”
    Get full text
    Rights
    Electronic eBook
  19. 19

    Data analysis using SQL and Excel by Linoff, Gordon

    Published 2016
    Book
  20. 20

    Football biomechanics

    Published 2018
    Book