Showing 721 - 740 results of 987 for search '(((((rain OR (((tpain OR pain) OR tmain) OR tmain)) OR ((((((bbtbbbmain OR bbtbbmain) OR bbtbbttmain) OR stmain) OR bbtmain) OR (tmain OR ((smain OR (strain OR sbbrain)) OR (tmain OR train)))) OR ((((tpain OR pain) OR tbbpain) OR tbbbbbbbrain) OR (((tpain OR pain) OR tbbpain) OR tbbbbbbbrain)))) OR (((((again OR again) OR ((bmain OR bmain) OR barmain)) OR (((btttbtrain OR btttbtrain) OR ((btbmain OR btbttbbmain) OR btbttbbmain)) OR (bpain OR bpain))) OR (((((bmain OR bpain) OR (((smain OR (sbttttbbbbrain OR sbttttbrain)) OR ((smain OR smain) OR (stbtrain OR stbbtpain))) OR (smain OR smain))) OR smain) OR (((((((sbbbttttttrain OR sbbbttttttpain) OR sbbbtttbbbrain) OR ((sbbbtbbtttbbpain OR sbbbtbbtttbpain) OR (sbbbtbtbtmain OR (sbbbtmain OR smain)))) OR (sbbbbtbtrain OR sbbbbtbtrain)) OR ((sbbbrain OR sbbbbbmain) OR (sbbbbbbbbrain OR sbbbbbmain))) OR (smain OR smain)) OR ((smain OR (smain OR ((sbbtrain OR sbbtbtbrain) OR sbpain))) OR smain))) OR smain)) OR gain)) OR (min OR min)) OR (spain OR (tpain OR pain))) tax', query time: 1.75s Refine Results
  1. 721

    General Equilibrium : Theory And Evidence.

    Published 2009
    Table of Contents: “…Some 8216;policy induced existence results -- 5.2.1. Endowment taxes -- 5.2.2. Taxes and general consumption sets -- 5.2.3. …”
    Full text (Wentworth users only)
    Electronic eBook
  2. 722
  3. 723

    Comprehensive Ruby Programming. by Hudgens, Jordan

    Published 2017
    Table of Contents: “…Implementing a prime number counting algorithm -- How to code the power digit sum algorithm -- Implementing a humanize counting algorithm -- Implementing a date algorithm -- How to code a Fibonacci digit counter -- Implementing a permutation algorithm -- Implementing an amicable number algorithm -- Implementing a factorial algorithm -- Implementing an even Fibonacci number algorithm -- Implementing the least common multiple -- Summary -- Chapter 19: Machine Learning -- Big data analysis -- Basic decision tree implementation -- Addition of attributes -- Addition of training data and its values -- Calling the ID3 method -- Function of the train method -- Addition of the test method -- Setting up decision variables -- Print the results out -- Testing the program -- Advantage of decision trees over if ... else statements -- How to develop a big data analysis application in Ruby -- Summary -- Index.…”
    Full text (Wentworth users only)
    Electronic eBook
  4. 724

    Use Public Tools for Career Success Kaleba, Kermit. by Kaleba, Kermit

    Published 2007
    Full text (Wentworth users only)
    Electronic eBook
  5. 725
  6. 726

    Find Grant Funding Now! : the Five-Step Prosperity Process for Entrepreneurs and Business. by Aubrey, Sarah Beth

    Published 2013
    Table of Contents: “…; Grants Are Usually a Reimbursement; Reporting Is Required; Grants Can Be Recalled; A Grant Is Always Competitive; What Grants Are Not; Grants versus Loans; Grants versus Scholarships; Grants versus Rebates; Grants versus Tax Credits.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 727

    In Search for the Soul of International Business. by Czinkota, Michael R.

    Published 2018
    Full text (Wentworth users only)
    Electronic eBook
  8. 728
  9. 729
  10. 730
  11. 731

    Frequently Asked Questions on IFRS. by Yoxen

    Published 2013
    Full text (Wentworth users only)
    Electronic eBook
  12. 732

    Kickstart Your Corporation Feindel, Andrew. by Feindel, Andrew

    Published 2020
    Full text (Wentworth users only)
    Electronic eBook
  13. 733
  14. 734

    Increasing formality and productivity of Bolivian firms.

    Published 2009
    Full text (Wentworth users only)
    Electronic eBook
  15. 735
  16. 736

    Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings / edited by Zhu Xiao, Ping...

    Published 2023
    Table of Contents: “…Models and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.…”
    Full text (Wentworth users only)
    Electronic eBook
  17. 737
  18. 738

    How to Write Successful Fundraising Appeals. by Warwick, Mal

    Published 2013
    Table of Contents: “…People Send Money Because You Allow Them to Gain Personal Connections with Other Individuals Who Are Passionately Involved in Some Meaningful Dimension of LifePeople Send Money Because You Give Them the Chance to Release Emotional Tension Caused by a Life-threatening Situation, a Critical Emergency, or an Ethical Dilemma; People Send Money Because They Are Afraid; People Send Money Because You Allow Them to Relieve Their Guilt about an Ethical, Political, or Personal Transgression, Whether Real or Imagined; People Send Money Because You Give Them Tax Benefits.…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 739
  20. 740

    Hiring Firing Keep Employees. by Fleischer, Charles

    Published 2004
    Table of Contents: “…Confidentiality AgreementsIntellectual Property -- Arbitration Agreements -- Chapter 13: Requirements Applicable to New Employees -- I-9 Requirements -- Sample I-9, Employment Eligibility Verification form -- New Hire Reports -- Tax Withholding -- Sample Form W-4 -- Earned Income Credit -- Sample Form W-5 -- Statutory Employees and Non-Employees -- Social Security Number Verification -- Benefit Plan Participation -- Training -- Part II: FIring -- Chapter 14: The Decision-Making Process -- Grounds for Termination -- Progressive Discipline…”
    Full text (Wentworth users only)
    Electronic eBook