Résultats de la recherche - Type I error

  • Résultat(s) 1 - 20 résultats de 20
Affiner les résultats
  1. 1

    Control systems engineering par Nise, Norman S.

    Publié 2011
    Table des matières: “…Preface ix 1 Introduction 1 (32) 1.1 Introduction 2 (2) 1.2 A History of Control Systems 4 (3) 1.3 System Configurations 7 (3) 1.4 Analysis and Design Objectives 10 (5) Case Study 12 (3) 1.5 The Design Process 15 (5) 1.6 Computer-Aided Design 20 (1) 1.7 The Control Systems Engineer 21 (12) Summary 23 (1) Review Questions 23 (1) Problems 24 (6) Cyber Exploration Laboratory 30 (1) Bibliography 31 (2) 2 Modeling in the Frequency Domain 33 (84) 2.1 Introduction 34 (1) 2.2 Laplace Transform Review 35 (9) 2.3 The Transfer Function 44 (3) 2.4 Electrical Network Transfer Functions 47 (14) 2.5 Translational Mechanical System Transfer Functions 61 (8) 2.6 Rotational Mechanical System Transfer Functions 69 (5) 2.7 Transfer Functions for Systems with Gears 74 (5) 2.8 Electromechanical System Transfer Functions 79 (5) 2.9 Electric Circuit Analogs 84 (4) 2.10 Nonlinearities 88 (1) 2.11 Linearization 89 (28) Case Studies 94 (3) Summary 97 (1) Review Questions 97 (1) Problems 98 (14) Cyber Exploration Laboratory 112 (3) Bibliography 115 (2) 3 Modeling in the Time Domain 117 (44) 3.1 Introduction 118 (1) 3.2 Some Observations 119 (4) 3.3 The General State-Space Representation 123 (1) 3.4 Applying the State-Space Representation 124 (8) 3.5 Converting a Transfer Function to State Space 132 (7) 3.6 Converting from State Space to a Transfer Function 139 (2) 3.7 Linearization 141 (20) Case Studies 144 (4) Summary 148 (1) Review Questions 149 (1) Problems 149 (8) Cyber Exploration Laboratory 157 (2) Bibliography 159 (2) 4 Time Response 161 (74) 4.1 Introduction 162 (1) 4.2 Poles, Zeros, and System Response 162 (4) 4.3 First-Order Systems 166 (2) 4.4 Second-Order Systems: Introduction 168 (5) 4.5 The General Second-Order System 173 (4) 4.6 Underdamped Second-Order Systems 177 (9) 4.7 System Response with Additional Poles 186 (5) 4.8 System Response With Zeros 191 (5) 4.9 Effects of Nonlinearities Upon Time Response 196 (3) 4.10 Laplace Transform Solution of State Equations 199 (4) 4.11 Time Domain Solution of State Equations 203 (32) Case Studies 207 (6) Summary 213 (1) Review Questions 214 (1) Problems 215 (13) Cyber Exploration Laboratory 228 (4) Bibliography 232 (3) 5 Reduction of Multiple Subsystems 235 (66) 5.1 Introduction 236 (1) 5.2 Block Diagrams 236 (9) 5.3 Analysis and Design of Feedback Systems 245 (3) 5.4 Signal-Flow Graphs 248 (3) 5.5 Mason's Rule 251 (3) 5.6 Signal-Flow Graphs of State Equations 254 (2) 5.7 Alternative Representations in State Space 256 (10) 5.8 Similarity Transformations 266 (35) Case Studies 272 (6) Summary 278 (1) Review Questions 279 (1) Problems 280 (17) Cyber Exploration Laboratory 297 (2) Bibliography 299 (2) 6 Stability 301 (38) 6.1 Introduction 302 (3) 6.2 Routh-Hurwitz Criterion 305 (3) 6.3 Routh-Hurwitz Criterion: Special Cases 308 (6) 6.4 Routh-Hurwitz Criterion: Additional Examples 314 (6) 6.5 Stability in State Space 320 (19) Case Studies 323 (2) Summary 325 (1) Review Questions 325 (1) Problems 326 (9) Cyber Exploration Laboratory 335 (1) Bibliography 336 (3) 7 Steady-State Errors 339 (48) 7.1 Introduction 340 (3) 7.2 Steady-State Error for Unity Feedback Systems 343 (6) 7.3 Static Error Constants and System Type 349 (4) 7.4 Steady-State Error Specifications 353 (3) 7.5 Steady-State Error for Disturbances 356 (2) 7.6 Steady-State Error for Nonunity Feedback Systems 358 (4) 7.7 Sensitivity 362 (2) 7.8 Steady-State Error for Systems in State Space 364 (23) Case Studies 368 (3) Summary 371 (1) Review Questions 372 (1) Problems 373 (11) Cyber Exploration Laboratory 384 (2) Bibliography 386 (1) 8 ROOT LOCUS TECHNIQUES 387 (68) 8.1 Introduction 388 (4) 8.2 Defining the Root Locus 392 (2) 8.3 Properties of the Root Locus 394 (3) 8.4 Sketching the Root Locus 397 (5) 8.5 Refining the Sketch 402 (9) 8.6 An Example 411 (4) 8.7 Transient Response Design via Gain Adjustment 415 (4) 8.8 Generalized Root Locus 419 (2) 8.9 Root Locus for Positive-Feedback Systems 421 (3) 8.10 Pole Sensitivity 424 (31) Case Studies 426 (5) Summary 431 (1) Review Questions 432 (1) Problems 432 (18) Cyber Exploration Laboratory 450 (2) Bibliography 452 (3) 9 Design Via Root Locus 455 (78) 9.1 Introduction 456 (3) 9.2 Improving Steady-State Error via Cascade Compensation 459 (10) 9.3 Improving Transient Response via Cascade Compensation 469 (13) 9.4 Improving Steady-State Error and Transient Response 482 (13) 9.5 Feedback Compensation 495 (8) 9.6 Physical Realization of Compensation 503 (30) Case Studies 508 (5) Summary 513 (1) Review Questions 514 (1) Problems 515 (15) Cyber Exploration Laboratory 530 (1) Bibliography 531 (2) 10 Frequency Response Techniques 533 (92) 10.1 Introduction 534 (6) 10.2 Asymptotic Approximations: Bode Plots 540 (19) 10.3 Introduction to the Nyquist Criterion 559 (5) 10.4 Sketching the Nyquist Diagram 564 (5) 10.5 Stability via the Nyquist Diagram 569 (5) 10.6 Gain Margin and Phase Margin via the Nyquist Diagram 574 (2) 10.7 Stability, Gain Margin, and Phase Margin via Bode Plots 576 (4) 10.8 Relation Between Closed-Loop Transient and Closed-Loop Frequency Responses 580 (3) 10.9 Relation Between Closed- and Open-Loop Frequency Responses 583 (6) 10.10 Relation Between Closed-Loop Transient and Open-Loop Frequency Responses 589 (4) 10.11 Steady-State Error Characteristics from Frequency Response 593 (4) 10.12 Systems with Time Delay 597 (5) 10.13 Obtaining Transfer Functions Experimentally 602 (23) Case Study 606 (1) Summary 607 (2) Review Questions 609 (1) Problems 610 (11) Cyber Exploration Laboratory 621 (2) Bibliography 623 (2) 11 Design Via Frequency Response 625 (38) 11.1 Introduction 626 (1) 11.2 Transient Response via Gain Adjustment 627 (3) 11.3 Lag Compensation 630 (5) 11.4 Lead Compensation 635 (6) 11.5 Lag-Lead Compensation 641 (22) Case Studies 650 (2) Summary 652 (1) Review Questions 653 (1) Problems 653 (7) Cyber Exploration Laboratory 660 (1) Bibliography 661 (2) 12 Design Via State Space 663 (60) 12.1 Introduction 664 (1) 12.2 Controller Design 665 (7) 12.3 Controllability 672 (4) 12.4 Alternative Approaches to Controller Design 676 (6) 12.5 Observer Design 682 (7) 12.6 Observability 689 (4) 12.7 Alternative Approaches to Observer Design 693 (7) 12.8 Steady-State Error Design Via Integral Control 700 (23) Case Study 704 (5) Summary 709 (1) Review Questions 710 (1) Problems 711 (8) Cyber Exploration Laboratory 719 (2) Bibliography 721 (2) 13 Digital Control Systems 723 (60) 13.1 Introduction 724 (3) 13.2 Modeling the Digital Computer 727 (3) 13.3 The z-Transform 730 (5) 13.4 Transfer Functions 735 (4) 13.5 Block Diagram Reduction 739 (3) 13.6 Stability 742 (7) 13.7 Steady-State Errors 749 (4) 13.8 Transient Response on the z-Plane 753 (2) 13.9 Gain Design on the z-Plane 755 (3) 13.10 Cascade Compensation via the s-Plane 758 (4) 13.11 Implementing the Digital Compensator 762 (21) Case Studies 765 (4) Summary 769 (1) Review Questions 770 (1) Problems 771 (7) Cyber Exploration Laboratory 778 (2) Bibliography 780 (3) Appendix A List of Symbols 783 (4) Appendix B MATLAB Tutorial 787 (49) B.1 Introduction 787 (1) B.2 MATLAB Examples 788 (45) B.3 Command Summary 833 (3) Bibliography 835 (1) Appendix C MATLAB's Simulink Tutorial 836 (21) C.1 Introduction 836 (1) C.2 Using Simulink 836 (5) C.3 Examples 841 (16) Summary 855 (1) Bibliography 856 (1) Appendix D LabVIEW Tutorial 857 (30) D.1 Introduction 857 (1) D.2 Control Systems Analysis, Design, and Simulation 858 (1) D.3 Using LabVIEW 859 (3) D.4 Analysis and Design Examples 862 (14) D.5 Simulation Examples 876 (11) Summary 885 (1) Bibliography 886 (1) Appendix E MATLAB's GUI Tools Tutorial (Online) Appendix F MATLAB's Symbolic Math Toolbox Tutorial (Online) Appendix G Matrices, Determinants, and Systems of Equations (Online) Appendix H Control System Computational Aids (Online) Appendix I Derivation of a Schematic for a DC Motor (Online) Appendix J Derivation of the Time Domain Solution of State Equations (Online) Appendix K Solution of State Equations for to ≠ 0 (Online) Appendix L Derivation of Similarity Transformations (Online) Appendix M Root Locus Rules: Derivations (Online) Glossary 887 (10) Answers to Selected Problems 897 (6) Credits 903 (4) Index 907…”
    Livre
  2. 2

    Schaum's Outline of Probability and Statistics, 4th Edition : 897 Solved Problems + 20 Video par SPIEGEL, M.

    Publié 2012
    Table des matières: “…Null Hypotheses Tests of Hypotheses and Significance Type I and Type II Errors Level of Significance Tests Involving the Normal Distribution One-Tailed and Two-Tailed Tests P Value Special Tests of Significance for Large Samples Special Tests of Significance for Small Samples Relationship Between Estimation Theory and Hypothesis Testing Operating Characteristic Curves. …”
    Livre
  3. 3

    Marketing research : concepts, practices, and cases / par Easwaran, Sunanda

    Publié 2006
    Table des matières: “…Preface v Acknowledgements viii Part One Introduction to Marketing Research Nature and Scope of Marketing Research Introduction 3 (1) Marketing Research 4 (4) Marketing Decision-making 8 (2) Scope of Marketing Research 10 (16) Case Studies 19 (7) The Role of Research in Marketing Introduction 26 (1) Problem-solving Vs Opportunity Definition Research 27 (4) Quality of Research 31 (3) The Decision-making Perspective 34 (12) Case Study 43 (3) Practical Tips for Researchers Introduction 46 (1) Manager--Researcher Dialogue 47 (3) Defining the Boundaries of Marketing Research 50 (2) Marketing Intelligence and Marketing Research 52 (1) Actionable Research 53 (6) Part Two Planning for Marketing Research Stages in Planning Marketing Research Introduction 59 (1) The Marketing Research Brief 59 (2) Defining the Marketing Research Problem 61 (2) Hypotheses Generation 63 (3) The Marketing Research Proposal 66 (2) The Sample 68 (5) Types of Research Introduction 73 (1) Research Approaches 74 (8) Research Approaches for Marketing Decision Stages 82 (9) Types and Sources of Data Introduction 91 (1) Classification of Data 91 (2) Methods of Data Collection 93 (4) Errors in Data Collection 97 (13) Annexure 6.1 108 (2) Experimentation Introduction 110 (1) Causality 111 (1) Experiments in Marketing Research 112 (1) Validity in Experiments 113 (2) Types of Experimental Designs 115 (11) The Limitations of Experiments 126 (4) Interview Techniques Introduction 130 (1) The Choice of Respondents 131 (1) Survey Techniques 132 (6) The Appropriate Interview Method 138 (9) Sampling Introduction 147 (1) Sampling 148 (6) Sampling Techniques 154 (1) Probability Sampling Techniques 155 (5) Non-probability Sampling 160 (1) Determining the Sample Size 161 (10) Designing Questionnaires and Interview Guides Introduction 171 (1) Designing a Questionnaire 172 (4) Errors in Questionnaire Design and the Flow Chart 176 (6) Questionnaires for Telephone and Internet Surveys 182 (1) Projective Techniques and Interview Guides 183 (2) Reproduction of the Questionnaire 185 (6) Building Attitude Exploration into Questionnaires Introduction 191 (1) Measurement of Data 192 (5) Types of Attitude Scales 197 (17) Reliability and Validity of Scales 214 (4) Considerations in Scale Construction 218 (7) Case Studies 225 (14) Part Three Implementing Research: Quantitative Surveys Fieldwork, Data Editing, Tabulation, and the Basic Concepts of Analysis Introduction 239 (1) Fieldwork 239 (6) Coding and Editing of Data 245 (4) Tabulation of Data 249 (4) Preliminary Analysis of Data 253 (9) Other Measures of Association 262 (12) SPSS Commands 274 (17) Specific Techniques for Analysis of Data Introduction 291 (1) Parametric and Non-parametric Tests 292 (1) Parametric Tests 293 (7) Non-parametric Tests 300 (14) Computer Based Techniques of Data Analysis Introduction 314 (1) Reduction and Grouping of Data 314 (2) Discriminant Analysis 316 (9) Factor Analysis 325 (6) Cluster Analysis 331 (15) Multidimensional Scaling 346 (14) Conjoint Analysis 360 (9) The Influence of Data Analysis on Research Design 369 (46) Case Studies 376 (10) Annexure 14.1 386 (4) Annexure 14.2 390 (9) Annexure 14.3 399 (11) Annexure 14.4 410 (5) Part Four Qualitative Research and its Implementation Qualitative Research Introduction 415 (1) Qualitative Research 416 (10) Skills Required in a Qualitative Researcher 426 (2) Client--Researcher Relationship 428 (1) Forte of Qualitative Research 429 (1) Qualitative Research vs Quantitative research 429 (2) Relationship between Qualitative and Quantitative Research 431 (3) Strengths and Limitations of Qualitative Research 434 (3) Commencement of the Qualitative Research Study 437 (26) Case Study 447 (5) Annexure 15.1 452 (3) Annexure 15.2 455 (4) Annexure 15.3 459 (4) Qualitative Research Methodology Introduction 463 (1) Methodological Frameworks of Qualitative Research 464 (1) Focus Group Discussions 464 (2) Organization in Focus Group Discussions 466 (6) In-depth Interview 472 (1) Flow of Communication in In-depth Interviews 473 (4) Variations in Qualitative Research Methodology 477 (1) Role Demeanour and Skills of a Moderator 478 (1) Guidelines for Effective Moderation 479 (7) Moderation of Focus Group Discussions 486 (1) Projective Techniques 487 (1) Types of Projective Techniques 488 (3) Specific Projective Techniques 491 (4) The Innovative Methodologies of Qualitative Research 495 (16) Case Study 505 (6) Analysis and Interpretation of Qualitative Research Data Introduction 511 (1) Qualitative Research Analysis 512 (6) Process of Qualitative Research Analysis 518 (1) Content Analysis of the Transscripts and Video Tapes 519 (5) Analysis Approach for Qualitative Research 524 (3) Customized Analysis of Qualitative Data 527 (6) Data Interpretation in Qualitative 533 (3) Research Analysis Presentation of Qualitative Analysis Findings 536 (3) Analysis and Interpretation 539 (10) Case Study 542 (7) Part Five Getting Meaning Out of Data and its Application Report Writing and Presentation Introduction 549 (1) A Marketing Research Report 549 (8) Presentation of a Marketing Research Report 557 (1) Ethical Issues in Marketing Research Report Writing 558 (4) Interpretation of Marketing Research Reports Introduction 562 (1) The Marketing Research Report 562 (4) Using Marketing Research 566 (6) Applications of Marketing Research Introduction 572 (1) Marketing Research for Specific Market Situations 573 (6) Marketing Research During Various Product Life Cycle Stages 579 (4) Market Research Models for Effective Marketing Mix 583 (3) Other Applications of Marketing Research 586 (1) Marketing Research and Brand Positioning 587 (4) Research for Market Segmentation 591 (1) Research for Market Forecasting 592 (3) Research for Developing and Evaluating Marketing Strategies 595 (7) Index 602…”
    Livre
  4. 4

    Statistics / par Spiegel, Murray R.

    Publié 2014
    Table des matières: “…Statistical estimation theory -- Estimation of parameters -- Unbiased estimates -- Efficient estimates -- Point estimates and interval estimates -- Reliability -- Confidence-interval estimates of population parameters -- Probable error -- 10. Statistical decision theory -- Statistical hypotheses -- Tests of hypotheses and significance, or decision rules -- Errors -- Level of significance -- Tests involving normal distributions -- Operating-characteristic curves -- Control charts -- Tests involving sample differences -- Test involving binomial distributions -- 11. …”
    Accéder au texte intégral
    Accéder au texte intégral
    Livre
  5. 5

    LINUX : the textbook / par Sarwar, Syed Mansoor

    Publié 2002
    Table des matières: “…44 (1) Various Ways to Change Your Shell 45 (3) Shell Start-up Files and Environment Variables 48 (1) Some Useful General-Purpose Commands 49 (7) Creating and Displaying Directories 49 (2) Displaying Files 51 (1) Printing Files 51 (1) Displaying a Calendar 51 (1) One-Way Real-Time Messaging 52 (1) Notification of and Permission for Electronic Communication 52 (1) Creating Pseudonyms for Commands 53 (3) Displaying System Up Time 56 (1) Shell Metacharacters 56 (5) Summary 58 (1) Problems 59 (2) Editing Text Files 61 (46) Introduction 62 (1) How to Do Short and Simple Edits by Using the pico Editor 63 (6) Creating the Text of an E-mail Message with the pico Text Editor 63 (1) How to Start, Save a File, and Exit 64 (2) General Keystroke Commands and Cursor Movement 66 (2) Cutting, Pasting, and Searching 68 (1) Obtaining More Control Using the vi Editor 69 (15) Shell Script File 70 (2) How to Start, Save a File, and Exit 72 (1) The Format of a vi Command and the Modes of Operation 73 (5) Cursor Movement and Editing Commands 78 (2) Yank and Put (Copy and Paste) and Substitute (Search and Replace) 80 (3) Setting the vi Environment 83 (1) Executing Shell Commands from Within vi 84 (1) Getting Maximum Control by Using the emacs Editor 84 (11) DOS Aliases 84 (2) How to Start, Save a File, and Exit 86 (1) Cursor Movement and Editing Commands 87 (1) Keyboard Macros 88 (3) Cut or Copy and Paste and Search and Replace 91 (4) How to do Graphical Editing by Using XEmacs 95 (5) Editing Data Files with XEmacs 95 (2) XEmacs Menus and Buttons 97 (1) How to Start, Save a File, and Exit 98 (2) Command Line Editing 100 (7) Summary 104 (1) Problems 104 (3) Electronic Mail 107 (52) Introduction 108 (3) How to Use the LINUX mail Command Effectively 111 (9) Sending and Reading E-mail with the LINUX mail Command 111 (1) Sending E-mail with the mail Command 112 (3) Reading E-mail with mail 115 (2) Saving Messages in Folders 117 (1) Replying to and Forwarding Messages and Including Attachments 118 (1) mail Aliases 119 (1) elm---A Full-Screen Display E-mail System 120 (11) Sending a Message in elm 121 (1) Sending E-mail with elm 121 (1) Reading E-mail in elm 121 (5) Forwarding and Replying to an E-mail message in elm 126 (3) Saving Messages in Folders 129 (1) elm Aliases 129 (2) pine---Another Full-Screen Display E-mail System Sending an E-mail Message by Using pine with an Attachment Created in vi 131 (3) Sending E-mail with pine 134 (2) Reading E-mail with pine 136 (1) Disposing of E-mail in Folders in pine 137 (2) Using the pine Address Book 139 (4) A Summary of pine Commands 143 (1) Graphical E-mail with Kmail 144 (15) Starting Out with Kmail 145 (2) Reading E-mail in Kmail 147 (3) Sending E-mail in Kmail 150 (2) Simple Filtering of E-mail into Folders 152 (2) Summary 154 (1) Problems 155 (4) Files and File System Structure 159 (38) Introduction 159 (1) The LINUX File Concept 160 (1) Types of Files 160 (3) Simple/Ordinary File 160 (1) Directory 161 (1) Link File 162 (1) Special File (Device) 162 (1) Named Pipe (FIFO) 163 (1) File System Structure 163 (7) File System Organization 163 (1) Home and Present Working Directories 164 (1) Pathnames: Absolute and Relative 164 (1) Some Standard Directories and Files 165 (5) Navigating the File Structure 170 (18) Determining the Absolute Pathname for Your Home Directory 171 (1) Browsing the File System 172 (4) Creating Files 176 (1) Creating and Removing Directories 176 (2) Manipulating the Directory Stack 178 (5) Determining File Attributes 183 (4) Determining the Type of a File's Contents 187 (1) File Representation and Storage in LINUX 188 (3) Standard Files and File Descriptors 191 (1) End of File (eof) Marker 192 (5) Summary 193 (1) Problems 194 (3) File Security 197 (22) Introduction 198 (1) Password-Based Protection 198 (1) Encryption-Based Protection 198 (2) Protection-Based on Access Permission 200 (1) Types of Users 200 (1) Types of File Operations/Access Permissions 200 (1) Determining and Changing File Access Privileges 201 (10) Determining File Access Privileges 202 (2) Changing File Access Privilages 204 (5) Default File Access Privileges 209 (2) Special Access Bits 211 (5) The Set-User-ID (SUID) Bit 211 (2) The Set-Group-ID (SGID) Bit 213 (1) The Sticky Bit 214 (2) File Permissions and Types 216 (3) Summary 216 (1) Problems 217 (2) Basic File Processing 219 (40) Introduction 220 (1) Viewing Contents of Text Files 220 (11) Viewing Complete Files 220 (3) Viewing Files One Page at a Time 223 (4) Viewing the Head or Tail of a File 227 (4) Copying, Moving, and Removing Files 231 (9) Copying Files 231 (3) Moving Files 234 (2) Removing/Deleting Files 236 (2) Determining File Size 238 (2) Appending to Files 240 (2) Combining Files 242 (2) Comparing Files 244 (5) Removing Repeated Lines 249 (2) Printing Files and Controlling Print Jobs 251 (8) LINUX Mechanism for Printing Files 251 (1) Printing Files 252 (2) Finding the Status of a Print Request 254 (1) Canceling Print Jobs 254 (2) Summary 256 (1) Problems 257 (2) Advanced File Processing 259 (42) Introduction 260 (1) Regular Expressions 260 (2) Compressing Files 262 (6) The gzip Command 263 (1) The gunzip Command 264 (1) The gzexe Command 265 (1) The zcat Command 266 (1) The zforce Command 267 (1) Sorting Files 268 (3) Searching for Commands and Files 271 (4) The find Command 272 (2) The where is Command 274 (1) The which Command 275 (1) Searching Files 275 (6) Cutting and Pasting 281 (5) Encoding and Decoding 286 (2) Command History 288 (13) Summary 297 (1) Problems 298 (3) File Sharing 301 (24) Introduction 302 (1) Duplicate Shared Files 302 (1) Common Login for Members of a Team 302 (1) Setting Appropriate Access Permissions on Shared Files 303 (1) Common Group for Members of a Team 303 (1) File Sharing via Links 303 (18) Hard Links 304 (8) Drawbacks of Hard Links 312 (2) Soft/Symbolic Links 314 (5) Types of Symbolic Links 319 (1) Pros and Cons of Symbolic Links 319 (2) Searching for Symbolic Links 321 (4) Summary 322 (1) Problems 323 (2) Redirection and Piping 325 (30) Introduction 326 (1) Standard Files 326 (1) Input Redirection 326 (2) Output Redirection 328 (2) Combining Input and Output Redirection 330 (1) I/O Redirection with File Descriptors 331 (1) Redirecting Standard Error 332 (1) Redirecting stdout and stderr in One Command 333 (2) Redirecting stdin, stdout, and stderr in One Command 335 (2) Redirecting Without Overwriting File Contents (Appending) 337 (2) LINUX pipes 339 (4) Redirection and Piping Combined 343 (2) Error Redirection in the TC Shell 345 (4) Recap of I/O and Error Redirection 349 (6) Summary 351 (1) Problems 352 (3) Processes 355 (46) Introduction 356 (1) Running Multiple Processes Simultaneously 356 (1) LINUX Process States 357 (1) Execution of Shell Commands 357 (5) Process Attributes 362 (11) Process and Job Control 373 (20) Foreground and Background Processes and Related Commands 373 (8) LINUX Daemons 381 (1) Sequential and Parallel Execution of Commands 382 (5) Abnormal Termination of Commands and Processes 387 (5) Conditional Command Execution 392 (1) Process Hierarchy in LINUX 393 (8) Summary 397 (1) Problems 398 (3) Networks and Internetworking 401 (48) Introduction 402 (1) Computer Networks and Internetworks 402 (1) The Reasons for Computer Networks and Internetworks 403 (1) Network Models 404 (2) The TCP/IP Protocol Suite 406 (8) TCP and UDP 406 (1) Routing of Application Data---The Internet Protocol (IP) 407 (2) Ipv4 Addresses in Dotted Decimal Notation 409 (1) Symbolic Names 410 (2) Translating Names to IP Addresses---The Domain Name System 412 (2) Internet Services and Protocols 414 (1) The Client-Server Software Model 415 (1) Application Software 416 (33) Displaying the Host Name 416 (1) Displaying List of Users Using Hosts on a Network 417 (2) Displaying the Status of Hosts on a Network 419 (1) Testing a Network Connection 420 (2) Displaying Information About Users 422 (3) Remote Login 425 (8) Remote Command Execution 433 (3) File Transfer 436 (3) Remote Copy 439 (3) Interactive Chat 442 (1) Tracing the Route from One Site to Another Site 443 (2) Summary 445 (1) Problems 445 (4) Introductory Bash Programming 449 (54) Introduction 450 (1) Running a Bash Script 450 (1) Shell Variables and Related Commands 451 (21) Controlling the Prompt 457 (1) Variable Declaration 457 (3) Reading and Writing Shell Variables 460 (4) Command Substitution 464 (1) Exporting Environment 465 (3) Resetting Variables 468 (1) Creating Read-Only User Defined Variables 469 (1) Reading from Standard Input 470 (2) Passing Arguments to Shell Scripts 472 (5) Comments and Program Headers 477 (1) Program Control Flow Commands 478 (25) The if-then-elif-else-fi Statement 478 (10) The for Statement 488 (2) The while Statement 490 (3) The until Statement 493 (1) The break and continue Commands 494 (1) The case Statement 495 (5) Summary 500 (1) Problems 501 (2) Advanced Bash Programming 503 (44) Introduction 504 (1) Numeric Data Processing 504 (10) Array Processing 514 (5) The Here Document 519 (4) Interrupt (Signal) Processing 523 (4) The exec Command and File I/O 527 (11) Execution of a Command without Creating a New Process 528 (2) File I/O via the exec Command 530 (8) Functions In Bash 538 (9) The Reasons for Functions 538 (1) Function Definition 539 (1) Function Invocation/Call 539 (1) Examples of Functions 539 (3) Debugging Shell Programs 542 (2) Summary 544 (1) Problems 545 (2) Introductory TC Shell Programming 547 (42) Introduction 548 (1) Running a TC Shell Script 548 (1) Shell Variables and Related Commands 549 (14) Reading and Writing Shell Variables 553 (2) Command Substitution 555 (1) Exporting Environment 556 (3) Resetting Variables 559 (1) Creating Read-Only User-Defined Variables 560 (1) Reading from Standard Input 561 (2) Passing Arguments to Shell Scripts 563 (4) Comments and Program Headers 567 (1) Program Control Commands 568 (21) The if-then-else-endif Statement 568 (9) The foreach Statement 577 (2) The while Statement 579 (2) The break, continue and goto Commands 581 (1) The switch Statement 582 (4) Summary 586 (1) Problems 586 (3) Advanced TC Shell Programming 589 (20) Introduction 590 (1) Numeric Data Processing 590 (2) Array Processing 592 (6) The Here Document 598 (2) Interrupt (Signal) Processing 600 (5) Debugging Shell Programs 605 (4) Summary 606 (1) Problems 607 (2) File System Backup 609 (16) Introduction 610 (1) Archiving and Restoring Files Via tar 610 (12) Archiving Files 611 (5) Restoring Archived Files 616 (4) Copying Directory Hierarchies 620 (2) Software Distributions in the tar Format 622 (3) Summary 623 (1) Problems 623 (2) LINUX Tools for Software Development 625 (98) Introduction 626 (1) Computer Programming Languages 626 (2) The Compilation Process 628 (1) The Software Engineering Life Cycle 628 (2) Program Generation Tools 630 (67) Generating C Source Files 631 (1) Indenting C Source Code 631 (3) Compiling C Programs 634 (5) Handling Module-Based C Software 639 (13) Creating, Modifying, and Extracting from Libraries/Archives 652 (8) Version Control 660 (37) Static Analysis Tools 697 (7) Profiling C Source Code 698 (6) Dynamic Analysis Tools 704 (19) Source Code Debugging 704 (13) Run-Time Performance 717 (2) Summary 719 (1) Problems 719 (4) Xfree 86 and the LINUX GUI 723 Introduction 724 The Basics of Xfree86 725 Comparisons and Advantages 725 The Key Components of Interactivity---Events and Requests 727 The Role of a Window Manager in the User Interface and fvwm 729 Customizing Xfree86 and fvwm 734 The GNOME Desktop Manager 742 Logging In and Out and the Appearance of the GNOME Desktop 743 The GNOME Panel 744 Customizing the Panel 747 GnoRPM Installation of New Packages 751 The Sawfish Window Manager 755 The GNOME Control Center 760 File Management with the GNOME File Manager 761 The KDE Desktop Manager 763 Logging In and Out 764 The KDE Panel 766 New Packages Installation 771 The K Window Manager 775 The KDE Control Center 778 File Management with kfm 780 Internet Resources 782 Summary 783 Problems 784 Appendix A: LINUX Installation A-1 Appendix B: Command Dictionary A-13 Glossary G-1 Index l-1…”
    Livre
  6. 6

    Interconnections : bridges, routers, switches, and internetworking protocols / par Perlman, Radia

    Publié 2000
    Table des matières: “…145 (1) Network Service Types 146 (7) Connection-oriented Nets: X.25 and ATM 153 (26) Generic Connection-oriented Network 153 (2) X.25: Reliable Connection-oriented Service 155 (12) Implementing X.25 Inside the Net 167 (1) Asynchronous Transfer Mode 168 (11) Generic Connectionless Service 179 (10) Data Transfer 179 (1) Addresses 180 (1) Hop Count 180 (1) Service Class Information 181 (2) Network Feedback 183 (1) Fragmentation and Reassembly 183 (2) Maximum Packet Size Discovery 185 (4) Network Layer Addresses 189 (32) Hierarchical Addresses with Fixed Boundaries 190 (2) Hierarchical Addresses with Flexible Boundaries 192 (1) Owning versus Renting Addresses 193 (1) Types of Addresses 194 (1) IP 194 (5) IPX 199 (4) IPX+ 203 (1) IPv6 204 (7) CLNP Network Layer Addresses 211 (4) AppleTalk Network Layer Addresses 215 (1) DECnet Phases III and IV 216 (2) NAT/NAPT 218 (3) Connectionless Data Packet Formats 221 (44) Pieces of a Connectionless Network Layer 221 (1) Data Packets 222 (1) Summary of Packet Formats for Easy Reference 222 (8) Technical Issues and Comparisons in Data Packet Formats 230 (20) Source Routing 250 (3) The Great IPX Frame Format Mystery 253 (3) Error Reports and Other Network Feedback to the Endnode 256 (9) Neighbor Greeting and Autoconfiguration 265 (34) Endnodes Attached via Point-to-Point Links 266 (1) Endnodes Attached via LANs 267 (17) Endnodes Attached via Nonbroadcast Multiaccess Media 284 (9) Finding Things 293 (6) Routing Algorithm Concepts 299 (48) Distance Vector Routing 299 (8) Link State Routing 307 (13) Comparison of Link State and Distance Vector Routing 320 (5) Load Splitting 325 (1) Link Costs 326 (2) Migrating Routing Algorithms 328 (3) LANs 331 (3) Types of Service 334 (7) Partition Repair: Level I Subnetwork Partition 341 (6) Fast Packet Forwarding 347 (20) Using an Additional Header 347 (1) Address Prefix Matching 348 (2) Longest Prefix Match with Trie 350 (11) Binary Search 361 (6) Specific Routing Protocols 367 (82) A Brief History of Intradomain Routing Protocols 367 (2) RIP 369 (3) RTMP, IPX-RIP, and DECnet 372 (1) IS-IS, OSPF, NLSP, and PNNI 373 (52) Interdomain Routing Protocols 425 (24) WAN Multicast 449 (30) Introduction 449 (4) Multicast in IP 453 (26) Sabotage-proof Routing 479 (14) The Problem 480 (1) All You Need to Know about Cryptography 480 (2) Overview of the Approach 482 (2) Detailed Description of the Approach 484 (7) Summary 491 (1) For Further Reading 491 (2) To Route, Bridge, or Switch: Is That the Question? …”
    Livre
  7. 7

    Structured techniques : the basis for CASE / par Martin, James

    Publié 1988
    Table des matières: “…279 (1) Using Decision Trees and Decision Tables 279 (1) Commentary 279 (2) 22 Data Analysis Diagrams 281 (16) Introduction 281 (1) Bubble Charts 281 (1) Associations Between Data Items 282 (1) One-to-One and One-to-Many Associations 283 (1) Types and Instances 284 (1) Reverse Associations 284 (2) Keys and Attributes 286 (1) Data-Item Groups 287 (1) Records 287 (1) Concatenated Keys 288 (2) Derived Data 290 (3) Optional Data Items 293 (4) 23 Entity-Relationship Diagrams 297 (28) Introduction 297 (1) Entities 297 (1) Entity Diagrams 298 (1) Concatenated Entity Type 299 (3) Labels and Sentences 302 (2) Subject and Predicate 304 (3) Basic Constructs 307 (1) Semantic Independence 307 (1) Inverted-L Diagrams 308 (2) Entity Subtypes 310 (1) Multiple Subtype Groupings 311 (1) Subtype Hierarchies 312 (2) Computer Representation of the Diagram 314 (1) Notation Styles 315 (10) 24 Data Navigation Diagrams 325 (14) Introduction 325 (1) Divide and Conquer 325 (1) Separating Data from Procedures 326 (1) Data Navigation Diagrams 327 (4) Procedure Design 331 (2) Physical Design 333 (1) Complexity 334 (1) Standard Procedure 335 (4) 25 Compound Data Accesses 339 (16) Introduction 339 (1) Relational Joins 340 (3) Automatic Navigation 343 (1) Simple Versus Compound Data-Base Accesses 343 (1) Intermixing Simple and Compound Actions 344 (3) Three-Way Joins 347 (1) Semantic Disintegrity 348 (2) Navigation Paths 350 (1) Fourth-Generation Languages 351 (4) 26 HOS Charts 355 (22) Introduction 355 (1) HOS 355 (1) Binary Trees 355 (2) Functions 357 (4) From Requirements Statements to Detailed Design 361 (1) Three Primitive Control Structures 361 (3) Control Maps 364 (1) Generation of Code 364 (1) Four Types of Leaf Nodes 364 (3) Static and Dynamic Testing of Programs 367 (1) Embellishments 367 (1) Other Control Structures 368 (2) Simplification 370 (1) User Functions Employed in a Defined Structure 370 (1) Extending the Power of HOS 370 (2) Discussion 372 (5) 27 A Consumer's Guide to Diagramming Techniques 377 (22) Introduction 377 (1) Criteria for Choice 378 (4) Data and Processes 382 (1) Data Flow Diagrams 382 (1) The Essential Trilogy 383 (1) Comprehensive Capabilities 383 (1) Ultimate Decomposition 384 (1) Drawing Speed 384 (2) Integrity Checking 386 (1) Code Generation 387 (1) User Friendliness 387 (1) Computer Graphics 388 (1) Summary of Properties 388 (6) Our Choice of Techniques 394 (1) Challenge 395 (4) PART IV ANALYSIS AND DESIGN 399 (118) 28 Structured Analysis and Design Techniques 399 (8) Software Analysis and Design 399 (1) The Desire to Skip Analysis 399 (1) Changing Requirements 399 (1) System Specification 400 (1) Poor Specification and Expensive Errors 400 (1) Importance of Analysis 401 (1) A Building Analogy 401 (1) Importance of Design 402 (1) A Systematic Design Approach 403 (1) Types of Software Design 403 (2) Structured Design Methodologies 405 (2) 29 Structured Analysis 407 (10) A Critical Step 407 (1) A Structured Discipline 407 (1) System Specification 408 (2) Data-Flow Diagram 410 (1) Data Dictionary 410 (1) Process Specification 411 (1) Steps of Structured Analysis 412 (2) Critique of Structured Analysis 414 (1) When to Use Structured Analysis 415 (2) 30 Top-Down Design 417 (6) Informal Design Strategy 417 (1) Design Process 417 (1) Decision Making 418 (1) Principles of Top-Down Design 419 (1) Documentation for Top-Down Design 419 (1) Top-Down Design of Data 419 (1) When to Use Top-Down Design 420 (3) 31 Structured Design 423 (18) Systematic Design Approach 423 (1) Structured Design: Step 1: Draw Data-Flow Diagram 424 (1) Step 2: Draw Structure Chart 424 (7) Step 3: Evaluate the Design 431 (4) Step 4: Prepare the Design for Implementation 435 (6) 32 An Evaluation of Structured Design 441 (14) Structured Design of the Credit Verification System 441 (1) Applying Transform Analysis 441 (2) Evaluating the Quality of the Design 443 (3) Critique of Structured Design 446 (1) Critique of Transform and Transaction Analysis 447 (4) Comparison with Top-Down Design 451 (1) Critique of Coupling and Cohesion 452 (1) Lack of Data Design 453 (2) 33 Jackson Design Methodology 455 (14) Jackson Design Versus Structured Design 455 (1) Data-Driven Program Design 455 (2) Example: Employee Skills System 457 (5) Designing Simple Programs 462 (2) Designing Complex Programs 464 (1) Structure Clash 465 (1) Program Inversion 466 (3) 34 An Evaluation of Jackson Design Methodology 469 (20) Constructive Design Method 469 (1) Designing the Subscription System 469 (6) Limitations of the Jackson Design Methodology 475 (3) Designing the Credit Verification System 478 (6) Summary 484 (5) 35 Warnier-Orr Design Methodology 489 (14) Background 489 (1) Set Theory 489 (1) Top-Down Approach 490 (1) Data-Driven Approach 491 (1) Design of the Employee Skills System 491 (12) 36 An Evaluation of the Warnier-Orr Design Methodology 503 (14) Input-Process-Output Model 503 (1) Objective of the Warnier-Orr Design Methodology 504 (1) Benefits of the Warnier-Orr Diagram 504 (2) Problems with the Warnier-Orr Diagram 506 (1) Bracketed Pseudocode 507 (1) Major Criticisms 507 (1) Design of the Subscription System 507 (1) Problems with Multiple Output Structures 508 (3) Incompatible Hierarchies 511 (1) Inadequate Input Design Guidelines 511 (1) Overemphasis on Output 511 (2) Recommendations 513 (4) PART V MORE AUTOMATED TECHNIQUES 517 (150) 37 A Higher Level of Automation 517 (16) Introduction 517 (1) Problems with Specifications 517 (1) Specification Languages 518 (1) Computer-Aided Specification Design 519 (1) Two Types of Languages 519 (1) Computable Specifications 520 (1) Automation of Design 521 (2) Integration of Definition Levels 523 (1) A Common Communication Vehicle 523 (1) Integrated Top-Down and Bottom-Up Design 524 (1) Mathematically Rigorous Languages 525 (1) User Friendliness 525 (1) Properties Needed 525 (1) Spectrum of Specification Languages 526 (7) 38 HOS Methodology 533 (24) Introduction 533 (1) USE IT 533 (2) JOIN, INCLUDE, and OR 535 (1) Generation of Code 535 (2) Four Types of Leaf Nodes 537 (1) Co-control Structures 538 (7) Local Variables 545 (1) N-way Branches 546 (1) Interactive Graphics Editor 546 (5) Simulation 551 (3) External Modules of Code 554 (1) Generation of Documentation 555 (2) 39 The Impact of Design Automation 557 (18) The Revolution 557 (1) Effect on Programming 557 (1) Effect on Specifications 558 (1) What Does "Provably Correct" Mean? …”
    Livre
  8. 8

    English skills par Langan John

    Publié 2006
    Table des matières: “…To the Instructor PART ONE: Basic Principles of Effective Writing Preview Chapter 1: An Introduction to Writing Understanding Point and Support An Overview: How the Book is Organized Benefits of Paragraph Writing Writing as a Skill Writing as a Process of Discovery Keeping a Journal Using This Text Chapter 2: The Writing Process Prewriting Writing a First Draft Revising Editing Review Activities Chapter 3: The First and Second Steps in Writing Step 1: Begin With a Point Step 2: Support the Point with Specific Evidence Reinforcing Point and Support The Importance of Specific Details The Importance of Adequate Details Practice in Making and Supporting a Point Chapter 4: The Third Step in Writing Step 3: Organize and Connect the Specific Evidence Practice in Organizing and Connecting Specific Evidence Chapter 5: The Fourth Step in Writing Step 4: Write Clear, Error-Free Sentences Revising Sentences Editing Sentences Practice in Revising Sentences Chapter 6: Four Bases for Revising Writing Base 1: Unity Base 2: Support Base 3: Coherence Base 4: Sentence Skills Practice in Using the Four Bases PART TWO: Paragraph Development Preview Chapter 7: Introduction to Paragraph Development Nine Patterns of Paragraph Development Important Considerations in Paragraph Development Using a Computer Using Peer Review Doing a Personal Review Chapter 8: Providing Examples Chapter 9: Explaining a Process Chapter 10: Examining Cause and Effect Chapter 11: Comparing or Contrasting Chapter 12: Defining a Term Chapter 13: Dividing and Classifying Chapter 14: Describing a Scene or Person Chapter 15: Narrating an Event Chapter 16: Arguing a Position PART THREE: Essay Development Preview Chapter 17: Additional Paragraph Assignments Chapter 18: Writing the Essay What Is an Essay? …”
    Livre
  9. 9

    Accounting Ethics par DUSKA, R.F

    Publié 2018
    Table des matières: “…Trust The Auditor's Responsibility tothePublic The Auditor's Basic Responsibilities The Evaluation ofInternal Auditing Control Responsibility toDetect andReport Errors andIrregularities Independence Independence Risk Professional Skepticism Reasonable Assurance Discussion Questions Notes Chapter Eight The Ethics ofManagerial Accounting Reasons Used toJustify Unethical Behaviors My Behavior is not Actually Illegal or Immoral The Actions are intheCompany's Best Interests No One Will Ever Find Out The Company Will Protect Me Blowing theWhistle Discussion Questions Notes Chapter Nine The Ethics ofTax Accounting Let's look at a scenario: Standard Statement No. 1: Tax Return Positions Standard No. 2: Answers to Questions on Returns Standard Statement No. 3: Certain Procedural Aspects of PreparingReturns Statement No. 4: Use of Estimates Statement No. 5: Departure from a Previous Position Statement No. 6: Knowledge of Error Statement No. 7: Form and Content of Advice to Taxpayers Discussion Questions In theNews United States: Happy's Pizza Founder Convicted of Multi-Million Dollar Tax Fraud Scheme Notes Chapter Ten Ethics Applied totheAccounting Firm Accounting asaBusiness The Social Responsibility ofBusiness Good Ethics is Good Business Ethical Responsibilities ofAccounting Firms The Accounting Profession inCrisis Adequacy ofGAAP Earnings Management Accounting forStock Options Overly Aggressive Tax Shelters Alternative Business Structures Discussion Questions In theNews Numbers "too embarrassing" toshow fuelled Toshiba scandal Notes Appendix A Summary ofSarbanes-Oxley Act of2002 Appendix B IMA Statement of Ethical Professional Practice Principles Standards I. …”
    Livre
  10. 10

    Auditing : an instructional manual for accounting students par Millichamp, A. H. (Alan H.)

    Publié 1996
    Table des matières: “…Acknowledgements viii Preface ix How to pass auditing examinations x Introduction to auditing Introduction to auditing - the why of auditing 1 (7) Auditing and the Companies Act The rights and duties of an auditor under the Companies Act 8 (8) The auditor and the Companies Act 16 (9) Accounting records 25 (4) Accounting requirements of the Companies Act 29 (8) Professional rules Auditing standards and guidelines 37 (4) Accounting standards and the auditor 41 (3) Rules of professional conduct 44 (11) Letters of engagement 55 (5) The modern audit The modern audit - stages 60 (10) The timing of audit work 70 (5) Objectives and general principles 75 (5) The conduct of the audit Accounting systems 80 (4) Internal controls 84 (20) Audit testing 104 (10) Analytical review techniques 114 (8) Working papers 122 (25) Reports to directors or management 147 (9) The auditor and errors and fraud 156 (12) Asset and liability verification Asset verification 168 (8) Current asset verification 176 (8) Stock and work in progress 184 (12) Liability verification 196 (12) Audit evidence Audit evidence 208 (8) Business risk 216 (6) Audit risk 222 (8) Statistical and Other sampling methods 230 (14) Reliance on other specialists 244 (5) Service organisations 249 (5) Review of Financial statements The final review stage of the audit 254 (6) The true and fair view 260 (6) Representations by management 266 (6) Planning and control of audits Planning 272 (7) Quality control 279 (6) The auditors' report The auditors' report 285 (8) Qualified audit reports 293 (13) Events after the balance sheet date 306 (5) Going concern 311 (8) Opening balances and comparatives 319 (5) Auditing and accounting standards 324 (5) Particular audits The first audit 329 (7) Small companies 336 (9) Audits of different types of businesses 345 (4) Internal auditing Internal auditing 349 (6) Reliance on internal audit 355 (6) Auditors and the law Auditors' liability 361 (9) Unlawful acts of clients and their staffs 370 (8) Corporate governance Corporate governance 378 (4) Compilation Reports Compilation reports and direct reporting engagements 382 (5) Information technology Computers and the auditor 387 (7) Groups of Companies Group accounts 394 (10) Other statements and interim accounts 404 (7) Some auditing problem areas Related parties 411 (5) Reservation of title 416 (2) Current issues Current issues 418 (8) Environmental matters and auditing 426 (6) Auditing theory 432 Index 439…”
    Livre
  11. 11

    Auditing par Millichamp, A. H. (Alan H.)

    Publié 2002
    Table des matières: “…Acknowledgements viii Preface ix How to pass auditing examinations x Introduction to auditing Introduction to auditing - the why of auditing 1 (7) Auditing and the Companies Act The rights and duties of an auditor under the Companies Act 8 (8) The auditor and the Companies Act 16 (9) Accounting records 25 (4) Accounting requirements of the Companies Act 29 (8) Professional rules Auditing standards and guidelines 37 (4) Accounting standards and the auditor 41 (3) Rules of professional conduct 44 (11) Letters of engagement 55 (5) The modern audit The modern audit - stages 60 (10) The timing of audit work 70 (5) Objectives and general principles 75 (5) The conduct of the audit Accounting systems 80 (4) Internal controls 84 (20) Audit testing 104 (10) Analytical review techniques 114 (8) Working papers 122 (25) Reports to directors or management 147 (9) The auditor and errors and fraud 156 (12) Asset and liability verification Asset verification 168 (8) Current asset verification 176 (8) Stock and work in progress 184 (12) Liability verification 196 (12) Audit evidence Audit evidence 208 (8) Business risk 216 (6) Audit risk 222 (8) Statistical and Other sampling methods 230 (14) Reliance on other specialists 244 (5) Service organisations 249 (5) Review of Financial statements The final review stage of the audit 254 (6) The true and fair view 260 (6) Representations by management 266 (6) Planning and control of audits Planning 272 (7) Quality control 279 (6) The auditors' report The auditors' report 285 (8) Qualified audit reports 293 (13) Events after the balance sheet date 306 (5) Going concern 311 (8) Opening balances and comparatives 319 (5) Auditing and accounting standards 324 (5) Particular audits The first audit 329 (7) Small companies 336 (9) Audits of different types of businesses 345 (4) Internal auditing Internal auditing 349 (6) Reliance on internal audit 355 (6) Auditors and the law Auditors' liability 361 (9) Unlawful acts of clients and their staffs 370 (8) Corporate governance Corporate governance 378 (4) Compilation Reports Compilation reports and direct reporting engagements 382 (5) Information technology Computers and the auditor 387 (7) Groups of Companies Group accounts 394 (10) Other statements and interim accounts 404 (7) Some auditing problem areas Related parties 411 (5) Reservation of title 416 (2) Current issues Current issues 418 (8) Environmental matters and auditing 426 (6) Auditing theory 432 Index 439…”
    Livre
  12. 12

    Survey research methods / par Fowler, Floyd. J.

    Publié 2009
    Table of contents only
    Livre
  13. 13

    Software engineering : a programming approach / par Bell, Douglas

    Publié 2000
    Table des matières: “…200 (1) Formal development: a case study 201 (7) The role of formal development 208 (1) Summary 209 (6) Exercises 210 (1) Answers to self test questions 211 (1) Further reading 211 (4) Part D Programming paradigms The programming language 215 (50) Introduction 215 (1) Design principles 216 (2) Language syntax 218 (3) Control abstractions 221 (6) Data types and strong typing 227 (11) Procedural abstraction 238 (5) Abstract data types 243 (6) Programming in the large 249 (7) The role of programming languages 256 (2) Summary 258 (7) Exercises 258 (2) Answers to self test questions 260 (4) Further reading 264 (1) Object-oriented programming (OOP) 265 (21) Introduction 265 (1) Encapsulation 265 (2) Classes 267 (1) Creating objects 268 (1) Constructor methods 269 (1) Destructor methods 270 (1) Class or static methods 270 (1) Inheritance 271 (3) Single versus multiple inheritance 274 (1) Polymorphism 274 (1) Event-driven programming 275 (1) Case study -- a complete Java program 276 (4) The role of OOP 280 (1) Summary 281 (5) Exercises 282 (2) Answers to self test questions 284 (1) Further reading 285 (1) Concurrent programming 286 (35) Introduction 286 (2) Independent threads 288 (3) Dying and killing 291 (1) The state of a thread 292 (1) Scheduling and thread priorities 293 (1) Mutual exclusion 293 (3) Thread interaction 296 (5) The producer--consumer problem 301 (11) Interruptions 312 (1) Deadlock 313 (1) Conclusions 314 (2) Summary 316 (5) Exercises 316 (2) Answers to self test questions 318 (2) Further reading 320 (1) Functional programming 321 (17) Introduction 321 (1) Procedural languages 322 (2) Characteristics of functional programming 324 (7) Other functional languages 331 (2) The role of functional programming 333 (2) Summary 335 (3) Exercises 336 (1) Answers to self test questions 337 (1) Further reading 337 (1) Logic programming 338 (17) Introduction 338 (2) Facts and rules 340 (2) Execution mechanisms 342 (6) Prolog in use 348 (2) Conclusions 350 (1) Summary 351 (4) Exercises 352 (1) Further reading 352 (3) Part E Implementation Software tools 355 (17) Introduction 355 (1) Tools for programming 356 (1) Not programming tools 357 (1) Examples of tools 357 (8) Discussion 365 (1) Application development tools 365 (4) The physical environment 369 (1) Summary 370 (2) Exercises 371 (1) Answers to self test questions 371 (1) Further reading 371 (1) Verification 372 (24) Introduction 372 (1) The nature of errors 373 (1) The problem of testing 374 (1) Black box (functional) testing 375 (2) White box (structural) testing 377 (2) Walkthroughs and inspections 379 (3) Other testing strategies 382 (1) Discussion 383 (2) System (integration) testing 385 (1) Bottom-up testing 386 (1) Top-down development 387 (3) Summary 390 (6) Exercises 391 (2) Answers to self test questions 393 (2) Further reading 395 (1) Softwar fault tolerance and exceptions 396 (22) Introduction 396 (3) Fault detection by software 399 (3) Fault detection by hardware 402 (3) Dealing with damage 405 (2) Exceptions and exception handlers 407 (3) Recovery blocks 410 (3) N-version programming 413 (1) The role of fault tolerance 414 (1) Summary 414 (4) Exercises 415 (2) Answers to self test questions 417 (1) Further reading 417 (1) Software metrics and quality assurance 418 (12) Introduction 418 (1) Complexity metrics 419 (3) Faults and reliability -- estimating bugs 422 (1) Software quality 423 (2) Quality assurance 425 (1) Process improvement 426 (1) The capability maturity model (CMM) 426 (1) Summary 427 (3) Exercises 428 (1) Answers to self test questions 429 (1) Further reading 429 (1) Project management 430 (19) Introduction 430 (1) The challenge of project management 431 (1) The ingredients of project management 431 (1) Cost estimation 432 (2) Team organization 434 (7) Selecting tools and methods 441 (1) Introducing new methods 442 (1) The project plan 442 (1) Peopleware 443 (1) Summary 444 (5) Exercises 444 (1) Further reading 445 (4) Part F Review Review 449 (14) Introduction 449 (1) Assessing and comparing development methods 450 (2) Software tools 452 (1) Software re-usability 452 (1) The current state of methods 452 (1) A single development method? …”
    Livre
  14. 14

    Managing change : a strategic approach to organisational dynamics par Bernard Burnes

    Publié 2004
    Table des matières: “…Acknowledgements xi Introduction 1 (10) Part One The rise and fall of the rational organisation From trial and error to the science of management 11 (42) The rise of organisation theory 11 (42) Learning objectives 11 (1) Introduction 12 (2) The rise of commerce and the birth of the factory 14 (19) Organisation theory: the Classical approach 33 (14) Conclusions 47 (4) Test your learning 51 (1) Suggested further reading 52 (1) Developments in organisation theory 53 (30) From certainty to contingency 53 (30) Learning objectives 53 (1) Introduction 54 (1) The Human Relations approach 55 (15) The Contingency Theory approach 70 (10) Conclusions 80 (2) Test your learning 82 (1) Suggested further reading 82 (1) In search of new paradigms 83 (58) Learning objectives 83 (1) Introduction 84 (4) The Culture--Excellence approach 88 (27) The Japanese approach to management 115 (11) Organisational learning 126 (9) Conclusions 135 (4) Test your learning 139 (1) Suggested further reading 140 (1) Critical perspectives on organisation theory 141 (25) Postmodernism, realism and complexity 141 (25) Learning objectives 141 (1) Introduction 142 (2) The postmodern perspective 144 (10) The realist perspective 154 (3) The complexity perspective 157 (6) Conclusions 163 (1) Test your learning 164 (1) Suggested further reading 165 (1) Culture, power, politics and choice 166 (37) Learning objectives 166 (1) Introduction 167 (2) The cultural perspective 169 (14) The power--politics perspective 183 (10) Managing and changing organisations: bringing back choice 193 (4) Conclusions 197 (2) Test your learning 199 (1) Suggested further reading 199 (4) Part Two Strategy development and change management: past, present and future Approaches to strategy 203 (29) Managerial choice and constraints 203 (29) Learning objectives 203 (2) Introduction 205 (2) Understanding strategy: origins, definitions and approaches 207 (13) Understanding strategy: choices and constraints 220 (8) Conclusions 228 (2) Test your learning 230 (1) Suggested further reading 231 (1) Applying strategy 232 (27) Models, levels and tools 232 (27) Learning objectives 232 (1) Introduction 233 (1) Types of strategies 234 (4) Levels of strategy 238 (8) Strategic planning tools 246 (10) Conclusions 256 (1) Test your learning 257 (1) Suggested further reading 258 (1) Approaches to change management 259 (28) Learning objectives 259 (1) Introduction 260 (1) Theoretical foundations 261 (6) The Planned approach to organisational change 267 (14) The frequency and magnitude of organisational change 281 (3) Conclusions 284 (1) Test your learning 285 (1) Suggested further reading 286 (1) Developments in change management 287 (31) The Emergent approach and beyond 287 (31) Learning objectives 287 (1) Introduction 288 (1) The case against the Planned approach to organisational change 289 (2) The Emergent approach to change 291 (21) Emergent change: summary and criticisms 312 (4) Conclusions 316 (1) Test your learning 317 (1) Suggested further reading 317 (1) A framework for change 318 (17) Approaches and choices 318 (17) Learning objectives 318 (2) Introduction 320 (1) Varieties of change 321 (4) A framework for change 325 (3) A framework for choice 328 (1) Conclusions 329 (3) Test your learning 332 (1) Suggested further reading 332 (3) Part Three Case studies in strategy development and change management Case studies in strategic change 335 (30) Learning objectives 335 (1) Introduction 335 (2) Case Study 1: The Internet and the P2P Revolution in the music industry 337 (6) Case Study 2: The rise and fall of Marconi 343 (4) Case Study 3: Oticon - the disorganised organisation 347 (8) Case Study 4: Privatisation and the European Union: the case of the Public Power Corporation of Greece 355 (7) Conclusions 362 (2) Test your learning 364 (1) Case studies in changing internal relationships and attitudes 365 (33) Learning objectives 365 (1) Introduction 365 (3) Case Study 5: Volvo's approach to Job Design 368 (9) Case Study 6: XYZ Construction 377 (6) Case Study 7: GK Printers Limited - changing systems and attitudes 383 (13) Conclusions 396 (1) Test your learning 397 (1) Case studies in changing external relationships 398 (29) Learning objectives 398 (1) Introduction 398 (3) Case Study 8: Rover-TRW - operational integration 401 (6) Case Study 9: Speedy Stationers Ltd and UTL (Turbines) Ltd - supplier-driven change 407 (7) Case Study 10: PoliceCo - outsourcing in the public sector 414 (6) Conclusions 420 (3) Test your learning 423 (4) Part Four Managing choice Managing change 427 (25) Lessons from theory and practice 427 (25) Learning objectives 427 (1) Introduction 427 (2) Lessons from theory and practice 429 (15) Employee involvement and organisational transformation 444 (3) Conclusions: merging theory and practice 447 (3) Test your learning 450 (2) Organisational change and managerial choice 452 (34) Learning objectives 452 (1) Introduction 452 (3) The Choice Management-Change Management model 455 (29) Conclusions 484 (1) Test your learning 485 (1) Management - roles and responsibilities 486 (51) Learning objectives 486 (1) Introduction 487 (2) Globalisation and the challenge of change 489 (9) The manager's role 498 (5) Management and leadership 503 (11) Management and leadership in action 514 (5) Managerial development 519 (8) Management, leadership and change 527 (3) Summary and conclusions 530 (4) Test your learning 534 (1) Suggested further reading 535 (2) Bibliography 537 (58) Glossary 595 (12) Index 607…”
    Livre
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    The English teacher's companion : a complete guide to classroom, curriculum, and the profession / par Burke, Jim

    Publié 2003
    Table des matières: “…132 (5) Closing Thoughts 137 (4) Reflection Activity Recommendations Teaching Writing: From Practice to Performance 141 (71) The Components of an Effective Writing Program 141 (2) Performance Standards for Writing 143 (3) The Writing Product: The Process of Working with Words 146 (6) Error as an Invitation to Improve 152 (1) Teachable Moments During a Writer's Development 153 (1) Sample Unit: Teaching the Paragraph 154 (5) Sample Activities 159 (5) Forms and Functions: Writing in Our Lives, at School, and in the Workplace 164 (1) The Essay 164 (1) The Weekly Paper: Writing About Different Text Types 165 (3) The Group Essay 168 (2) The Six Traits Analytical Writing Rubric 170 (1) The Journal: Practice Makes Writers 171 (16) Creative Writing: Drama, Fiction, and Poetry 187 (9) Writing in the Workplace: What It Can Look Like in English Classes 196 (4) Responding to Student Writers 200 (6) Computers and Writing: The Promise and the Problems 206 (1) Endnote: The Last Word 207 (5) Reflection Activity Recommendations Teaching Speaking and Listening: The Verbal Curriculum 212 (15) Types of Speeches 212 (2) Standards for Speaking and Listening 214 (1) Focus Questions: How to Get Started 214 (1) Parts of a Speech 215 (1) Tricks of the Trade for Student Speakers 215 (2) Possibilities: Speaking Activities for the English Class 217 (3) Rules of the Game: Applause, Applause! …”
    Livre
  20. 20

    Principles of alternative dispute resolution / par Ware, Stephen J.

    Publié 2007
    Table des matières: “…Preface Note to teachers Acknowledgments Chapter 1: Introduction 1-1: Overview 1-2: Disputes 1-3: Resolution of disputes 1-4: Processes of dispute resolution 1-5: Definitions of litigation and ADR a: ADR as alternatives to litigation b: Litigation as the default process 1-6: Introductions to major ADR processes a: Negotiation b: Mediation and other processes in aid of negotiation c: Arbitration 1-7: Basic division within ADR: arbitration vs everything else a: All ADR processes can produce binding results 1: Negotiation 2: Mediation and other processes in aid of negotiation 3: Arbitration b: Arbitration is the only ADR process that can produce binding results without a post-dispute contract c: Arbitration or litigation casts the shadow in which negotiation and processes in aid of it occur d: Implications for categorizing and comparing processes 1-8: Broader perspectives on ADR a: ADR diversity b: Cool and warm themes; the cost and quality of dispute resolution c: Lawyers and ADR Chapter 2: Arbitration And Similar Processes A: Overview 2-1: Arbitration defined 2-2: Contractual arbitration and non-contractual arbitration; constitutional right to jury trial 2-3: Arbitration law summarized a: Post-dispute and pre-dispute agreements to arbitrate b: Enforcement of arbitration agreements c: Arbitration process d: Enforcement of arbitrator's decision or "award" B: Sources of contemporary American arbitration law 2-4: Federal law a: Pro-contract b: Court orders to arbitrate; specific performance of arbitration agreements c: Broad applicability 2-5: State law a: Arbitration law b: Non-arbitration law C: FAA preemption of state law 1: Evolution of case law on FAA preemption 2-6: Federal arbitration law as (non-preemptive) procedural law 2-7: Federal arbitration law as (preemptive) substantive law 2-8: FAA creates no federal jurisdiction 2: Preemption of state law impeding contract enforcement 2-9: Generally 2-10: State law prohibiting courts from enforcing arbitration agreements 2-11: State law prohibiting courts from enforcing arbitration agreements with the remedy of specific performance 2-12: State law making arbitration agreements unenforceable with respect to certain claims 2-13: State law making arbitration agreements in certain types of transactions unenforceable 2-14: State law raising the standard of assent for contract formation 3: Choice-of-law clauses 2-15: Introduction 2-16: Volt case 2-17: Mastrobuono case 4: Insurance arbitration 2-18: McCarran-Ferguson and the FAA D: Formation of enforceable arbitration agreements 1: Separability 2-19: Prima paint case 2-20: Buckeye case 2-21: Applications of separability 2: Formation 2-22: Mutual manifestations of assent a: Contract law's objective approach b: Recurring fact patterns 2-23: Consideration 3: Contract law defenses to enforcement 2-24: Defenses subject to separability doctrine 2-25: Unconscionability a: Generally b: FAA's constraint on the scope of the unconscionability doctrine c: Arbitration organizations' policing against unconscionability d: Public policy and child custody 2-26: Waiver of the right to arbitrate 4: Non-contract law defenses to enforcement: federal statutory claims and public policy 2-27: Toward universal arbitrability 2-28: Current in arbitrability a: Simple in arbitrability 1: Labor arbitration 2: Automobile dealers and military personnel b: Arbitrability with strings attached: the effectively vindicate doctrine E: Interpretation of arbitration agreements 1: Contractual arbitrability 2-29: Introduction 2-30: Generally decided by courts 2-31: Contractual and non-contractual approaches 2: Multi-party disputes 2-32: Claims by or against those not party to the arbitration agreement a: Party plaintiff vs non-party defendant b: Non-party plaintiff vs party defendant 2-33: Consolidation of, and stays pending, related proceedings 2-34: Class actions 3: Arbitration procedure 2-35: Overview 2-36: Pre-hearing a: Selection of arbitrator(s) 1: Methods of selection 2: Arbitrator fees 3: Judicial and regulatory constraints on party selection of arbitrator(s) b: Pleadings c: Filing fees (and un-administered arbitration) d: Discovery 2-37: Hearing a: General comparison with trial b: Role of lawyers c: Rules of evidence d: No hearing; dispositive motions e: Written awards; reasoned opinions 2-38: Remedies a: Determined by contract, within limitations 1: Generally determined by contract; the Mastrobuono case 2: Limitations on contract; the book case b: Typical contract terms c: Consequences of limiting remedies in arbitration 4: Governing substantive law, if any 2-39: Substantive law applied in arbitration F: Effect of arbitration award 1: Enforcement of arbitration award 2-40: Confirmation 2-41: Claim preclusion (res judicata) a: Generally applicable b: Labor exception 2-42: Issue preclusion (collateral estoppel) 2: Vacatur of arbitration award 2-43: Introduction a: Vacatur is rare b: Statutory and non-statutory grounds 2-44: Statutory grounds a: Corruption, fraud or undue means b: Evident partiality or corruption c: Fundamentally fair hearing d: Exceeded powers 2-45: Non-statutory grounds a: Error of law, including manifest disregard 1: Narrow ground for Vacatur 2: Recent expansion b: Public policy c: Grounds created by contract 2-46: Federal preemption of state law a: State grounds for Vacatur broader than federal b: State grounds for Vacatur narrower than federal G: International arbitration 2-47: Introduction: public law arbitration and commercial arbitration 2-48: New York convention a: Basic provisions b: Effect of United States ratification c: Significance 2-49: Practice of international commercial arbitration H: Employment arbitration and labor arbitration 2-50: Conventional distinction between "employment" and "labor" 2-51: FAA's exclusion of certain "contracts of employment" 2-52: Employment arbitration 2-53: Labor arbitration a: LMRA rather than FAA b: Practice of labor arbitration 1: Two peculiarities 2: Labor law and CBAs c: Few arbitrable claims 1: Law 2: Union, not employee, controls arbitration 3: Narrowly drafted arbitration clauses d: Interest arbitration I: Processes similar to arbitration 2-54: Private judging ("rent-a-judge") 2-55: Non-contractual, yet binding, arbitration a: Introduction b: Examples 1: Federal programs 2: Government employees-federal 3: Government employees-state and local 4: Railway Labor Act 5: State "lemon" laws 6: State auto insurance laws 7: Attorney fee disputes. 3: Negotiation A: Negotiation contexts 3-1: Dispute negotiation and transactional negotiation 3-2: Dispute negotiation and lawyers; settlement negotiation defined 3-3: Settlement negotiation and the shadow of the law 3-4: Bilateral monopoly of settlement negotiation B: Settlement/litigation choice 3-5: Valuing a case a: Introduction to case valuation b: Factors lawyers and clients should consider in valuing a case c: Timing of the settlement/litigation choice d: Risk aversion and diversification 1: Risk aversion 2: Diversification e: Expected value, BATNA and the bottom line f: Psychological barriers to valuing a case accurately 1: Availability bias 2: Anchoring bias 3: Egocentric biases 4: Overconfidence bias g: Valuation of criminal cases 3-6: Disagreements between lawyer and client about the settlement/litigation choice a: Generally b: Legal fees 1: Hourly billing 2: Contingency fees 3: Retainers and other fixed-fees (especially in criminal practice) 4: Legal fees paid through liability insurance c: Professional responsibility C: Negotiation theory 3-7: Zero-sum and positive-sum 3-8: Zero-sum (distributive) negotiation 3-9: Positive-sum (integrative) negotiation a: Example on the time value of money b: Importance of multiple issues 3-10: Positive-sum (integrative) negotiation is not always worthwhile, or even possible 3-11: Bottom lines and settlement zones a: Case valuations determine bottom lines which determine settlement zones b: Predictions about the results of litigation 1: Predictions that usually (but not always) result in a settlement zone 2: Predictions less likely to result in a settlement zone: cases of over-optimism c: Conclusion 3-12: Settlement zone does not ensure settlement (barriers to settlement) a: Ignorance of settlement zone's existence or boundaries b: Dividing the value created by settlement 3-13: Bottom lines and settlement zones in positive-sum (integrative) negotiation D: Approaches to negotiation 3-14: Terminology 1: Adversarial/competitive approach 3-15: Opening offers 3-16: Few and small concessions 3-17: False concessions 3-18: Concession tricks and escalation tactics 3-19: Deception and information 3-20: Misinformation about bottom lines and the strength of your case a: Generally b: Lying about one's bottom line c: Projecting confidence in one's case and lack of interest in settling d: Effect of misinformation about bottom lines 3-21: Psychological warfare a: Anger, threats, ridicule, accusation and intimidation b: Negotiate on your own turf c: Outnumber your counterparts d: Negotiate when you have time and your counterpart does not e: Lack of authority f: Locked into position g: Feign irrationality h: Wolf in sheep's clothing 3-22: Drawbacks of the adversarial/competitive approach 2: Cooperative approach and the prisoner's dilemma 3-23: Cooperative approach 3-24: Prisoner's dilemma and the importance of reputation a: Prisoner's dilemma b: Importance of reputation and the incentive to cooperate 3-25: Tactics for a cooperative lawyer with an adversarial/competitive counterpart 3: Problem-solving approach 3-26: Overview of problem-solving a: Positive-sum b: Coinciding interests (with a tax law example) c: Logrolling multiple issues d: Tactics listed 3-27: Interests, not positions 3-28: Communicating your side's interests 3-29: Variety of solutions 3-30: Drawbacks of the problem-solving approach 4: Gender, culture, race and ethnicity 3-31: Gender 3-32: Culture, race and ethnicity E: Preparing for negotiation 3-33: Introduction 3-34: Identifying your client's interests, bottom line and specific goals 3-35: Identifying other party's interests, bottom line and specific goals 3-36: Adjusting during negotiation a: Adjusting approaches during negotiation b: Adjusting your bottom line during negotiation 3-37: Specific preparations F: Law governing settlement 3-38: Criminal and tort law; "good faith" in negotiation 3-39: Sales law a: Legal effects of releases and settlement agreements 1: Releases 2: Settlement agreements b: Grounds for non-enforcement 1: Duress and unconscionability 2: Misrepresentation and mistake 3: Requirement of a writing 4: Public policy c: Entering judgment on settlement (consent decree) d: Plea agreements 3-40: Agency law 3-41: Multiple parties: indemnity, contribution and Mary Carter agreements 3-42: Confidentiality a: Generally b: Confidentiality agreements prior to or during litigation c: Rules of evidence and discovery d: Confidentiality clauses in settlement agreements G: Settlement/litigation choice: broader perspectives 3-43: Normative views on the prevalence of settlement 3-44: Resources 3-45: Dispute resolution vs public justice. 4: Mediation And Other Processes In Aid Of Negotiation A: Overview 4-1: Mediation's popularity 4-2: Mediation defined 4-3: Dispute mediation and transactional mediation 4-4: Mandatory mediation and voluntary mediation B: Goals of dispute mediation 4-5: Generally 4-6: Settle cases 4-7: Positive-sum or problem-solving 4-8: Moral growth C: Mediation process 4-9: Goals shape process 4-10: Mediation process generally a: Participants b: Starting to mediate c: Joint sessions, private caucuses and shuttle diplomacy d: Facilitating communication 1: Direct communication 2: Indirect communication e: Settlement offers f: Agreements 4-11: Identifying settlement zones and overcoming barriers to settlement 4-12: Positive-sum a: In general b: Coinciding interests c: Logrolling multiple issues d: Trusted intermediary combining information 4-13: Evaluation by the mediator a: Appeal of evaluation b: Concerns about evaluation 1: Interests vs rights 2: Is "evaluative mediation" an oxymoron? …”
    Livre