Set cover
-
The paper explores how university financial autonomy policy information is presented and emphasized in various online newspapers using Agenda-Setting Theory and Framing Theory in the field of communication. The study analyzed 289 journalistic works from three newspapers, namely Giao duc and Thoi dai Online Newspaper, Giao duc Vietnam Online Magazine, and Dan tri Online Newspaper, covering the period from July 2017 to December 2020.
18p viengfa 28-10-2024 3 1 Download
-
The purpose of this paper is to study the characteristics of competitiveness in firms’ sectors of the Greek manufacturing industry, based on firm level accounting and qualitative data attempting to identify key issues regarding Greek SMEs. An unbalanced data set of 407 Greek manufacturing SMEs is implemented, covering the period of 2003-2011 with the use of a multivariate regression model (EGLS) with explanatory variables characterizing firms’ operational activity.
7p longtimenosee10 26-04-2024 2 2 Download
-
Bài giảng "Bao phủ mạng không dây: Chương 2 - Bài toán K-coverage trong mạng cảm biến không dây" được biên soạn với các nội dung chính sau: Giới thiệu bài toán K-coverage; Các nghiên cứu liên quan; Mô hình bài toán K-coverage;... Mời các bạn cùng tham khảo bài giảng!
63p kimphuong1001 11-02-2023 14 5 Download
-
Thực hành Toán rời rạc - Chương 4: Phép đếm – hoán vị, tổ hợp và chỉnh hợp. Chương này cung cấp cho học viên những nội dung về: hoán vị, tổ hợp và chỉnh hợp; sử dụng thư viện itertools với các phép toán hỗ trợ xử lý về tổ hợp; ôn luyện cơ bản về Python: Hàm ngẫu nhiên toán học và lặp trong Python; tập phủ trùm tối thiểu (Set Cover Problem);... Mời các bạn cùng tham khảo!
16p gianghavan18 18-08-2022 19 3 Download
-
Module 2: Automating an installation of Microsoft Windows XP Professional. The following topics are covered in this module: Introduction to automating an installation of Windows XP Professional; creating answer files; creating a uniqueness database file; performing an automated installation of Windows XP Professional; overview of creating and deploying an image; preparing a reference computer; creating, testing, and deploying an image; managing security settings by using security center.
42p nomoney2 10-02-2017 46 3 Download
-
Module 1: Installing Windows XP Professional. The following topics are covered in this module: Planning an Installation of Microsoft Windows XP Professional Installing Windows XP Professional, upgrading to Microsoft Windows XP, transferring user settings and files by using the USMT, performing post-installation tasks.
30p nomoney2 10-02-2017 57 2 Download
-
Module 6: Troubleshooting the boot process and other system issues. The following topics are covered in this module: Multimedia - Examining the Windows XP Professional boot process, controlling system settings during the boot process, changing startup behavior using the boot.ini file, using advanced boot options to troubleshoot startup problems, using the recovery console to start the computer, restoring the computer to a previous state.
22p nomoney2 10-02-2017 52 3 Download
-
Module 8: Configuring the desktop environment. The following topics are covered in this module: Configuring user desktop settings, customizing the desktop environment, configuring system settings, understanding how user profiles and group policy affect desktop customization, using remote assistance.
27p nomoney2 10-02-2017 47 3 Download
-
Module 9: Configuring internet explorer. The following topics are covered in this module: Configuring security for internet explorer, configuring privacy for internet explorer, configuring connection settings for internet explorer.
14p nomoney2 10-02-2017 42 3 Download
-
Bài giảng chương 8 trang bị cho người học những hiểu biết về thuật toán xấp xỉ. Trong chương này người học có thể tìm hiểu một số bài toán phủ đỉnh và một số vấn đề về phủ đỉnh. Mời các bạn cùng tham khảo để nắm bắt các nội dung chi tiết.
22p youcanletgo_01 04-01-2016 90 8 Download
-
The inner face of the nuclear envelope of metazoan cells is covered by a thin lamina consisting of a one-layered network of intermediate filaments inter-connecting with a complex set of transmembrane proteins and chromatin associating factors. The constituent proteins, the lamins, have recently gained tremendous recognition, because mutations in the lamin A gene,
8p galaxyss3 21-03-2013 32 3 Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 81 3 Download
-
An extension of the Littlewood Restriction Rule is given that covers all pertinent parameters and simplifies to the original under Littlewood’s hypotheses. Two formulas are derived for the Gelfand-Kirillov dimension of any unitary highest weight representation occurring in a dual pair setting, one in terms of the dual pair index and the other in terms of the highest weight.
40p tuanloccuoi 04-01-2013 46 7 Download
-
Networking Standards and the OSI Model Identify organizations that set standards for networking. Describe the purpose of the OSI Model and each of its layers Explain specific functions belonging to each OSI Model layer Understand how two network nodes communicate through the OSI model Discuss the structure and purpose of data packets and frames. Describe the two types of addressing covered by the OSI Model.
43p itvovantien 13-07-2012 79 15 Download
-
Code-Only Development When Microsoft set about to make the Entity Framework more flexible, their goal was to provide developers with an environment in which they could create their model from one of their approaches. The first approach, which has existed since the initial release of EF, is the ability to generate your model from a database. Many of the chapters in this book have covered the new features and concepts that are tied to this approach.
26p tengteng16 27-12-2011 51 5 Download
-
Let G be a graph with vertex set V (G) = {1, . . . , n} and edge set E(G). We are interested in studying the functions of the graph G whose values belong to the interval [(G), (G)]. Here (G) is the size of the largest stable set in G and (G) is the smallest number of cliques that cover the vertices of G. It is well known (see, for example, [1]) that for some 0 it is impossible to approximate in polynomial time (G) and (G) within a factor of n, assuming P 6= NP. We suppose that better approximation could...
5p thulanh5 12-09-2011 66 4 Download
-
Note: This table presents recommended dietary allowances (RDAs) in bold type and adequate intakes (AIs) in ordinary type. RDAs and AIs may both be used as goals for individual intake. RDAs are set to meet the needs of almost all individuals (97 to 98%) in a group. For healthy breastfed infants, the AI is the mean intake. The AI for other life stage and gender groups is believed to cover needs of all individuals in the group, but lack of data or uncertainty in the data prevent being able to specify with confidence the percentage of individuals covered by...
9p konheokonmummim 03-12-2010 85 4 Download
-
Welcome. As we begin day 2, or the second major set of courses in Security Essentials, the focus will be on defense in depth. This is a term that was coined by the Department of Defense and is a crucially important concept in information assurance. The topics that we are going to cover areshown below.
31p huyhoang 07-08-2009 135 7 Download