Mostrando 20,441 - 20,460 Resultados de 20,631 Para Buscar '" 44"', tiempo de consulta: 0.20s Limitar resultados
  1. 20441
    Publicado 2020
    Tabla de Contenidos: “…-- 1.5 Zusammenfassung -- 2 Menschen- und Maschinensprache -- 2.1 Deep Learning für Natural Language Processing -- 2.1.1 Deep-Learning-Netze lernen Repräsentationen automatisch -- 2.1.2 Natural Language Processing -- 2.1.3 Eine kurze Geschichte des Deep Learning für NLP -- 2.2 Repräsentationen von Sprache im Computer -- 2.2.1 1-aus-n-Repräsentationen von Wörtern -- 2.2.2 Wortvektoren -- 2.2.3 Wortvektor-Arithmetik -- 2.2.4 word2viz -- 2.2.5 Lokalistische versus verteilte Repräsentationen -- 2.3 Elemente der natürlichen menschlichen Sprache -- 2.4 Google Duplex -- 2.5 Zusammenfassung -- 3 Maschinenkunst -- 3.1 Eine feuchtfröhliche Nacht -- 3.2 Berechnungen auf nachgemachten menschlichen Gesichtern -- 3.3 Stiltransfer: Fotos in einen Monet verwandeln (und umgekehrt) -- 3.4 Machen Sie Ihre eigenen Skizzen fotorealistisch -- 3.5 Fotorealistische Bilder aus Text erzeugen -- 3.6 Bildverarbeitung mittels Deep Learning -- 3.7 Zusammenfassung -- 4 Spielende Maschinen -- 4.1 Deep Learning, KI und andere Monster -- 4.1.1 Künstliche Intelligenz -- 4.1.2 Machine Learning -- 4.1.3 Representation Learning -- 4.1.4 Künstliche neuronale Netze -- 4.1.5 Deep Learning -- 4.1.6 Maschinelles Sehen -- 4.1.7 Natural Language Processing -- 4.2 Drei Arten von Machine-Learning-Problemen -- 4.2.1 Supervised Learning -- 4.2.2 Unsupervised Learning -- 4.2.3 Reinforcement Learning -- 4.3 Deep Reinforcement Learning -- 4.4 Videospiele -- 4.5 Brettspiele -- 4.5.1 AlphaGo…”
    Libro electrónico
  2. 20442
    Publicado 2023
    Tabla de Contenidos: “…3.5.1 Conditional Probability Function -- 3.5.2 Conditional Probability Density Function -- 3.6 Expectations -- 3.6.1 Moments -- 3.6.2 Expected Value of Function of Random Variable -- 3.6.3 Covariance -- 3.7 Conditional Expectations -- 3.8 Convergence of Random Variables -- 3.9 Random Processes -- 3.10 Markov Processes -- 3.11 Hidden Markov Models -- 3.12 Gaussian Processes -- Exercises -- Part II Optimization -- Chapter 4 Optimization Theory -- 4.1 Basic Concepts and Terminology -- 4.1.1 Optimization Problems -- 4.1.2 Equivalent Problems -- 4.2 Convex Sets -- 4.2.1 Convexity‐Preserving Operations -- 4.2.1.1 Intersection -- 4.2.1.2 Affine Transformation -- 4.2.1.3 Perspective Transformation -- 4.2.2 Examples of Convex Sets -- 4.2.2.1 Hyperplanes and Halfspaces -- 4.2.2.2 Polyhedral Sets -- 4.2.2.3 Norm Balls and Ellipsoids -- 4.2.2.4 Convex Cones -- 4.2.3 Generalized Inequalities -- 4.3 Convex Functions -- 4.3.1 First‐ and Second‐Order Conditions for Convexity -- 4.3.2 Convexity‐Preserving Operations -- 4.3.2.1 Scaling, Sums, and Integrals -- 4.3.2.2 Pointwise Maximum and Supremum -- 4.3.2.3 Affine Transformation -- 4.3.2.4 Perspective Transformation -- 4.3.2.5 Partial Infimum -- 4.3.2.6 Square of Nonnegative Convex Functions -- 4.3.3 Examples of Convex Functions -- 4.3.3.1 Norms -- 4.3.3.2 Indicator and Support Functions -- 4.3.4 Conjugation -- 4.3.5 Dual Norms -- 4.4 Subdifferentiability -- 4.4.1 Subdifferential Calculus -- 4.4.1.1 Nonnegative Scaling -- 4.4.1.2 Summation -- 4.4.1.3 Affine Transformation -- 4.4.1.4 Pointwise Maximum -- 4.4.1.5 Subgradients of Conjugate Functions -- 4.5 Convex Optimization Problems -- 4.5.1 Optimality Condition -- 4.5.2 Equality Constrained Convex Problems -- 4.6 Duality -- 4.6.1 Lagrangian Duality -- 4.6.2 Lagrange Dual Problem -- 4.6.3 Fenchel Duality -- 4.7 Optimality Conditions…”
    Libro electrónico
  3. 20443
    Publicado 2023
    Tabla de Contenidos: “…3.2.2 Indirect Method Sensors -- 3.2.3 Dynamometer -- 3.2.4 Accelerometer -- 3.2.5 Acoustic Emission Sensor -- 3.2.6 Current Sensors -- 3.3 Other Sensors -- 3.3.1 Temperature Sensors -- 3.3.2 Optical Sensors -- 3.4 Interaction of Sensors During Machining Operation -- 3.4.1 Milling Machining -- 3.4.2 Turning Machining -- 3.4.3 Drilling Machining Operation -- 3.5 Sensor Fusion Technique -- 3.6 Interaction of Internet of Things -- 3.6.1 Identification -- 3.6.2 Sensing -- 3.6.3 Communication -- 3.6.4 Computation -- 3.6.5 Services -- 3.6.6 Semantics -- 3.7 IoT Technologies in Manufacturing Process -- 3.7.1 IoT Challenges -- 3.7.2 IoT-Based Energy Monitoring System -- 3.8 Industrial Application -- 3.8.1 Integrated Structure -- 3.8.2 Monitoring the System Related to Service Based on Internet of Things -- 3.9 Decision Making Methods -- 3.9.1 Artificial Neural Network -- 3.9.2 Fuzzy Inference System -- 3.9.3 Support Vector Mechanism -- 3.9.4 Decision Trees and Random Forest -- 3.9.5 Convolutional Neural Network -- 3.10 Conclusion -- References -- Chapter 4 Application of Internet of Things (IoT) in the Automotive Industry -- 4.1 Introduction -- 4.2 Need For IoT in Automobile Field -- 4.3 Fault Diagnosis in Automobile -- 4.4 Automobile Security and Surveillance System in IoT-Based -- 4.5 A Vehicle Communications -- 4.6 The Smart Vehicle -- 4.7 Connected Vehicles -- 4.7.1 Vehicle-to-Vehicle (V2V) Communications -- 4.7.2 Vehicle-to-Infrastructure (V2I) Communications -- 4.7.3 Vehicle-to-Pedestrian (V2P) Communications -- 4.7.4 Vehicle to Network (V2N) Communication -- 4.7.5 Vehicle to Cloud (V2C) Communication -- 4.7.6 Vehicle to Device (V2D) Communication -- 4.7.7 Vehicle to Grid (V2G) Communications -- 4.8 Conclusion -- References -- Chapter 5 IoT for Food and Beverage Manufacturing -- 5.1 Introduction -- 5.2 The Influence of IoT in a Food Industry…”
    Libro electrónico
  4. 20444
    por Abualigah, Laith
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Metaheuristic Optimization Algorithms -- Copyright Page -- Contents -- List of contributors -- 1 Particle swarm optimization algorithm: review and applications -- 1.1 Introduction -- 1.2 Particle swarm optimization -- 1.2.1 Standard particle swarm optimization -- 1.2.2 Particle swarm optimization algorithm -- 1.3 Related works -- 1.3.1 Neural networks -- 1.3.2 Feature selection -- 1.3.3 Data clustering -- 1.3.4 Mobile robots -- 1.4 Discussion -- 1.5 Conclusion -- References -- 2 Social spider optimization algorithm: survey and new applications -- 2.1 Introduction -- 2.2 Related work -- 2.2.1 Medical field -- 2.2.2 Engineering field -- 2.2.3 Mathematics field -- 2.2.4 Artificial intelligence field -- 2.2.5 Data science -- 2.3 Social spider optimization method -- 2.4 Experiment result -- 2.5 Discussion -- 2.6 Conclusion -- References -- 3 Animal migration optimization algorithm: novel optimizer, analysis, and applications -- 3.1 Introduction -- 3.2 Animal migration optimization algorithm procedure -- 3.3 Related works -- 3.3.1 Image processing -- 3.3.2 Data clustering -- 3.3.3 Data mining -- 3.3.4 Benchmark functions -- 3.3.5 Computer networks -- 3.3.6 Neural networks -- 3.3.7 Other applications -- 3.4 Discussion -- 3.5 Conclusion -- References -- 4 A Survey of cuckoo search algorithm: optimizer and new applications -- 4.1 Introduction -- 4.2 Cuckoo search algorithm -- 4.2.1 Cuckoo rearing conduct -- 4.2.2 Lévy trips in nature -- 4.3 Related works -- 4.4 Method -- 4.5 Discussion -- 4.6 Advanced work -- 4.7 Conclusion -- References -- 5 Teaching-learning-based optimization algorithm: analysis study and its application -- 5.1 Introduction -- 5.2 Teaching-learning-based optimization -- 5.2.1 Teacher section -- 5.2.2 Learner section -- 5.3 Literature review -- 5.3.1 Optimization problem -- 5.3.2 Technoeconomic analysis…”
    Libro electrónico
  5. 20445
    Publicado 2005
    Tabla de Contenidos: “…Implementation scenarios -- 4.1 Implementation of WebSphere BI Connect Enterprise for Windows -- 4.2 Implementation of WebSphere BI Connect Advanced for AIX -- 4.3 Implementing a basic exchange -- 4.4 Securing the exchange between Companies E and A -- 4.5 Implementing WebSphere BI Connect Express for Windows -- 4.6 Using FTP with WebSphere BI Connect -- 4.7 Managing a B2B infrastructure -- 4.8 EDI translation -- 4.9 Extending WebSphere BI Connect…”
    Libro electrónico
  6. 20446
    Publicado 2003
    Tabla de Contenidos: “…IBM Tivoli Storage Resource Manager installation -- 4.1 Supported operating system platforms -- 4.2 Supported databases for repository -- 4.3 Tivoli Storage Resource Manager Server install -- 4.3.1 Lab environment -- 4.3.2 Database creation for repository -- 4.3.3 Installation of the Server code -- 4.3.4 Microsoft SQL-Server as repository -- 4.3.5 Installing Cloudscape as a test database -- 4.3.6 Configuration for Web access -- 4.3.7 Installation of the GUI code -- 4.3.8 Installing the Server code on UNIX -- 4.4 Installing the Agent code -- 4.5 Applying maintenance to Tivoli Storage Resource Manager -- 4.5.1 Planned upgrade installation for Agents -- 4.6 Basic administrative tasks -- 4.6.1 Security -- 4.6.2 Administration -- 4.6.3 Administration: Navigation -- 4.6.4 Administrative Services: Services -- 4.6.5 Administrative Services: Agents -- 4.6.6 Administrative Services: Configuration -- 4.7 Microsoft Cluster installation -- 4.7.1 Microsoft Cluster initial setup…”
    Libro electrónico
  7. 20447
    Publicado 2005
    Tabla de Contenidos: “…DB2 and Java architecture guide -- 4.1 Introduction to J2EE data access architecture -- 4.2 Servlets and JavaServer Pages -- 4.2.1 Benefits of data access from servlets and JSPs -- 4.2.2 Considerations for data access from a servlet -- 4.3 Enterprise JavaBeans -- 4.4 Session Beans -- 4.5 Stateless session Beans -- 4.5.1 Benefits of data access from a stateless session Bean -- 4.5.2 Considerations -- 4.6 Stateful session Beans -- 4.6.1 Benefits of stateful session Beans -- 4.6.2 Considerations -- 4.7 Entity Beans -- 4.8 Bean-Managed Persistence entity Beans -- 4.8.1 Benefits -- 4.8.2 Considerations -- 4.9 Container-Managed Persistence entity Beans -- 4.9.1 Benefits -- 4.9.2 Considerations -- 4.10 Message-driven Beans…”
    Libro electrónico
  8. 20448
    Publicado 2003
    Tabla de Contenidos: “…-- 4.1 Reasons for auditing the CDSs -- 4.2 Recovery of a master or user catalog -- 4.3 VSAM errors in a DFSMShsm CDS -- 4.4 Audit during a disaster recovery -- Chapter 5. …”
    Libro electrónico
  9. 20449
    Publicado 2003
    Tabla de Contenidos: “…Business requirements analysis and solution design -- 4.1 Business scenario -- 4.1.1 Initial context -- 4.1.2 Business challenges -- 4.2 Requirements -- 4.2.1 Functional requirements -- 4.2.2 Nonfunctional requirements -- 4.3 Use case model -- 4.3.1 Use case overview -- 4.3.2 Front-end experience use cases detail -- 4.3.3 System use cases detail -- 4.3.4 Administration use cases detail -- 4.4 Architecture -- 4.4.1 Architecture overview -- 4.4.2 Architectural decisions -- 4.4.3 Component model -- 4.4.4 Operational model -- Chapter 5. …”
    Libro electrónico
  10. 20450
    Publicado 2004
    Tabla de Contenidos: “…Installing the WebSphere Commerce V5.6 development environment -- 4.1 Development environment overview -- 4.2 Pre-installation requirements -- 4.2.1 VisualAge for Java V4.0 prerequisites -- 4.3 WebSphere Studio Application Developer -- 4.3.1 Pre-installation steps -- 4.3.2 Installing WebSphere Studio Application Developer V5.1.1 -- 4.3.3 Applying fixes to the test environment -- 4.4 WebSphere Commerce V5.6 Toolkit -- 4.4.1 Installing the toolkit -- 4.4.2 Verifying the installation -- 4.5 DB2 Universal Database V8.1 -- 4.5.1 Backing up development databases -- 4.5.2 Installation requirements -- 4.5.3 Preparing a Windows user for DB2 -- 4.5.4 Installing DB2 Universal Database V8.1 -- 4.5.5 Installing DB2 Universal Database fixpack 5 -- 4.5.6 Migrating databases to DB2 Universal Database V8.1 level -- 4.6 Configuring the development environment for DB2 -- 4.7 VisualAge for Java V4.0 -- 4.7.1 Installing VisualAge for Java V4.0 -- 4.7.2 Configuring VisualAge for Java V4.0 -- Chapter 5. …”
    Libro electrónico
  11. 20451
    Publicado 2011
    Tabla de Contenidos: “…Editors' Biographies -- List of Contributors -- Foreword -- Preface -- Acknowledgements -- List of Acronyms -- 1 Introduction and Background 1 / Thomas Sälzer and Matthew Baker -- 1.1 The Context for the Long Term Evolution of UMTS 1 -- 1.2 Requirements and Targets for the Long Term Evolution 7 -- 1.3 Technologies for the Long Term Evolution 14 -- 1.4 From Theory to Practice 20 -- References 21 -- Part I Network Architecture and Protocols 23 -- 2 Network Architecture 25 / Sudeep Palat and Philippe Godin -- 2.1 Introduction 25 -- 2.2 Overall Architectural Overview 26 -- 2.3 Protocol Architecture 32 -- 2.4 Quality of Service and EPS Bearers 34 -- 2.5 The E-UTRAN Network Interfaces: S1 Interface 40 -- 2.6 The E-UTRAN Network Interfaces: X2 Interface 49 -- 2.7 Summary 55 -- References 55 -- 3 Control Plane Protocols 57 / Himke van der Velde -- 3.1 Introduction 57 -- 3.2 Radio Resource Control (RRC) 58 -- 3.3 PLMN and Cell Selection 78 -- 3.4 Paging 84 -- 3.5 Summary 86 -- References 86 -- 4 User Plane Protocols 87 / Patrick Fischer, SeungJune Yi, SungDuck Chun and YoungDae Lee -- 4.1 Introduction to the User Plane Protocol Stack 87 -- 4.2 Packet Data Convergence Protocol (PDCP) 89 -- 4.3 Radio Link Control (RLC) 98 -- 4.4 Medium Access Control (MAC) 108 -- 4.5 Summary of the User Plane Protocols 120 -- References 120 -- Part II Physical Layer for Downlink 121 -- 5 Orthogonal Frequency Division Multiple Access (OFDMA) 123 / Andrea Ancora, Issam Toufik, Andreas Bury and Dirk Slock -- 5.1 Introduction 123 -- 5.2 OFDM 125 -- 5.3 OFDMA 137 -- 5.4 Parameter Dimensioning 139 -- 5.5 Summary 142 -- References 142 -- 6 Introduction to Downlink Physical Layer Design 145 / Matthew Baker -- 6.1 Introduction 145 -- 6.2 Transmission Resource Structure 145 -- 6.3 Signal Structure 148 -- 6.4 Introduction to Downlink Operation 149 -- References 150 -- 7 Synchronization and Cell Search 151 / Fabrizio Tomatis and Stefania Sesia -- 7.1 Introduction 151 -- 7.2 Synchronization Sequences and Cell Search in LTE 151.…”
    Libro electrónico
  12. 20452
    Publicado 2010
    Tabla de Contenidos: “…2.2.4 Full-Duplex Ethernet -- 2.2.5 Switched Ethernet -- 2.2.6 10-Gigabit Ethernet -- 2.2.7 Virtual LAN -- 2.2.8 Token Ring -- 2.2.9 FDDI -- 2.2.10 Wireless LAN -- 2.3 Network Node Components -- 2.3.1 Hubs -- 2.3.2 Bridges -- 2.3.3 Remote Bridge -- 2.3.4 Transparent Bridge -- 2.3.5 Source-Routing Bridge -- 2.3.6 Routers -- 2.3.7 Gateways and Protocol Converters -- 2.3.8 Multiprotocol Routers and Tunneling -- 2.3.9 Half-Bridge Configuration of Router -- 2.3.10 Edge Routers -- 2.3.11 Switches -- 2.4 Wide Area Networks -- 2.5 Transmission Technology -- 2.5.1 Introduction -- 2.5.2 Wired Transmission -- 2.5.3 Wireless Transmission Media -- 2.5.4 Transmission Modes -- 2.6 Integrated Services: ISDN, Frame Relay, and Broadband -- Summary -- Exercises -- Part II: SNMP and Network Management -- Chapter 3: Basic Foundations: Standards, Models, and Language -- 3.1 Network Management Standards -- 3.2 Network Management Models -- 3.3 Organization Model -- 3.4 Information Model -- 3.4.1 Management Information Tree -- 3.4.2 Managed Object Perspective -- 3.5 Communication Model -- 3.6 Abstract Syntax Notation One: ASN. 1 -- 3.6.1 Terminology, Symbols, and Conventions -- 3.6.2 Objects and Data Types -- 3.6.3 Object Name -- 3.6.4 An Example of Use of ASN.1 from ISO 8824 -- 3.7 Encoding Structure -- 3.8 Macros -- 3.9 Functional Model -- Summary -- Exercises -- Chapter 4: SNMPv1 Network Management: Organization and Information Models -- 4.1 Managed Network: Case Histories and Examples -- 4.2 History of SNMP Management -- 4.3 Internet Organizations and Standards -- 4.3.1 Organizations -- 4.3.2 Internet Documents -- 4.4 SNMP Model -- 4.5 Organization Model -- 4.6 System Overview -- 4.7 Information Model -- 4.7.1 Introduction -- 4.7.2 Structure of Management Information -- 4.7.3 Managed Objects -- 4.7.4 Management of Information Base -- Summary -- Exercises…”
    Libro electrónico
  13. 20453
    Publicado 2015
    Tabla de Contenidos: “…-- 4.1 The Set of All Possible Events -- 4.1.1 Coin flips: Why you should care -- 4.2 Probability: Outside or Inside the Head -- 4.2.1 Outside the head: Long-run relative frequency -- 4.2.1.1 Simulating a long-run relative frequency -- 4.2.1.2 Deriving a long-run relative frequency -- 4.2.2 Inside the head: Subjective belief -- 4.2.2.1 Calibrating a subjective belief by preferences -- 4.2.2.2 Describing a subjective belief mathematically -- 4.2.3 Probabilities assign numbers to possibilities -- 4.3 Probability Distributions -- 4.3.1 Discrete distributions: Probability mass -- 4.3.2 Continuous distributions: Rendezvous with density -- 4.3.2.1 Properties of probability density functions -- 4.3.2.2 The normal probability density function -- 4.3.3 Mean and variance of a distribution -- 4.3.3.1 Mean as minimized variance -- 4.3.4 Highest density interval (HDI) -- 4.4 Two-Way Distributions -- 4.4.1 Conditional probability -- 4.4.2 Independence of attributes -- 4.5 Appendix: R Code for Figure 4.1 -- 4.6 Exercises -- Chapter 5: Bayes' Rule -- 5.1 Bayes' Rule -- 5.1.1 Derived from definitions of conditional probability -- 5.1.2 Bayes' rule intuited from a two-way discrete table -- 5.2 Applied to Parameters and Data -- 5.2.1 Data-order invariance -- 5.3 Complete Examples: Estimating Bias in a Coin -- 5.3.1 Influence of sample size on the posterior -- 5.3.2 Influence of the prior on the posterior -- 5.4 Why Bayesian Inference Can Be Difficult…”
    Libro electrónico
  14. 20454
    Publicado 2018
    Tabla de Contenidos: “…3.1.1 Scope of Transmission Network Planning -- 3.1.2 Elements in a Transmission Network -- 3.2 Transmission Network Planning Process -- 3.3 Transmission Pre‐planning -- 3.3.1 One PCM Connection -- 3.3.2 PCM Requirements on the Abis and Ater Interface -- 3.3.3 Equipment Location -- 3.3.4 Network Topology -- 3.3.5 Site Selection and Line-of-Sight Survey -- 3.3.6 Radius of the Fresnel Zone -- 3.3.7 Microwave Link Planning -- 3.3.8 Design Principles for Microwave Link -- 3.3.9 Error Performance and Availability -- 3.4 Detailed Transmission Network Planning -- 3.4.1 Frequency Planning -- 3.4.2 Timeslot Allocation Planning -- 3.4.3 2 Mbps Planning -- 3.4.4 Synchronisation Planning -- 3.4.5 Transmission Network Management Planning -- 3.5 Transmission Network Optimisation -- 3.5.1 Basics of Transmission Network Optimisation -- 3.5.2 Transmission Network Optimisation Process -- 3.6 GPRS Transmission Network Planning and Optimisation -- 3.7 EDGE Transmission Network Planning -- 3.7.1 Dynamic Abis Functionality in EDGE Networks -- 3.7.2 Timeslot Allocation in Dynamic Abis -- 3.7.3 Dimensioning of Dynamic Abis -- 3.7.4 Impact of Dynamic Abis on Transmission Network Design -- 3.7.5 EDGE Transmission Network Optimisation -- Chapter 4 Core Network Planning and Optimisation -- 4.1 Basics of Core Network Planning -- 4.1.1 Scope of Core Network Planning -- 4.1.2 Elements of the Core Network -- 4.2 Core Network Planning Process -- 4.2.1 Network Analysis -- 4.2.2 Network Dimensioning -- 4.3 Basics of Signalling -- 4.3.1 Signalling Points -- 4.3.2 Signalling Links -- 4.3.3 Signalling Network Dimensioning -- 4.4 Intelligent Network (IN) -- 4.5 Failure Analysis and Protection -- 4.5.1 Output of Network Dimensioning -- 4.6 Detailed Planning -- 4.6.1 Routing Plans -- 4.6.2 Signalling Plans -- 4.6.3 Numbering and Charging -- 4.6.4 Synchronisation Plans…”
    Libro electrónico
  15. 20455
    Publicado 2018
    Tabla de Contenidos: “…-- 3.5.2 Exporting data to text files -- 3.5.3 Exporting data to JSON text files -- 3.5.4 Exporting data to CSV text files -- 3.5.5 Exporting data to a database -- 3.5.6 Exporting data to MongoDB -- 3.5.7 Exporting data to MySQL -- 3.6 Building complete data conversions -- 3.7 Expanding the process -- Summary -- Chapter 4: Working with unusual data -- 4.1 Getting the code and data -- 4.2 Importing custom data from text files -- 4.3 Importing data by scraping web pages -- 4.3.1 Identifying the data to scrape -- 4.3.2 Scraping with Cheerio -- 4.4 Working with binary data -- 4.4.1 Unpacking a custom binary file -- 4.4.2 Packing a custom binary file -- 4.4.3 Replacing JSON with BSON -- 4.4.4 Converting JSON to BSON -- 4.4.5 Deserializing a BSON file -- Summary -- Chapter 5: Exploratory coding -- 5.1 Expanding your toolkit -- 5.2 Analyzing car accidents -- 5.3 Getting the code and data -- 5.4 Iteration and your feedback loop -- 5.5 A first pass at understanding your data -- 5.6 Working with a reduced data sample -- 5.7 Prototyping with Excel -- 5.8 Exploratory coding with Node.js -- 5.8.1 Using Nodemon -- 5.8.2 Exploring your data -- 5.8.3 Using Data-Forge -- 5.8.4 Computing the trend column -- 5.8.5 Outputting a new CSV file -- 5.9 Exploratory coding in the browser -- Putting it all together…”
    Libro electrónico
  16. 20456
    Publicado 2019
    Tabla de Contenidos: “…3.2 Assessment of High Frequency Electromagnetic Fields -- 3.2.1 Fields Radiated by Power Line Communication (PLC) Systems -- 3.2.2 Fields in the Vicinity of RFID Loop Antennas -- 3.2.3 Radiation From Base Station Antennas -- 3.2.3.1 Near Field Analysis: Assessment of Power Density -- 3.2.3.2 Far Field Analysis: Calculation of Power Density and Electric Field -- 3.2.3.3 Some Computational Examples -- 3.2.3.4 Some Measured Results -- 3.2.3.5 Far Field Analysis: Presence of a Lossy Ground and Layered Medium -- 3.2.3.6 Accurate Numerical Modeling of Radio Base Station Antenna Systems -- References -- 4 Simpli ed Models of the Human Body -- 4.1 Parallelepiped Model of the Human Body -- 4.2 Cylindrical Antenna Models of the Body -- 4.3 Cylindrical Models - Frequency Domain Analysis -- 4.3.1 Pocklington Equation Formulation for LF Exposures -- 4.3.2 Numerical Solution of the Pocklington Equation -- 4.3.3 Analytical Modeling of the Human Body - Hallén Equation for LF and HF Exposures -- 4.3.4 Multiple Wire Model of the Body -- 4.3.5 Numerical Solution Via Method of Moments (MoM) -- 4.3.6 Computational Examples -- 4.3.6.1 LF Exposures -- 4.3.6.2 HF Exposures -- 4.4 Time Domain Modeling - Exposure of Humans to Transient Radiation: Cylindrical Model of the Human Body -- 4.4.1 Time Domain Formulation -- 4.4.2 Numerical Solution of the Time Domain Hallén Integral Equation -- 4.4.3 Measures of the Transient Response -- 4.4.3.1 Average Value of the Transient Current -- 4.4.3.2 Root-Mean-Square Value of the Transient Current -- 4.4.3.3 Instantaneous Power -- 4.4.3.4 Total Absorbed Energy -- 4.4.3.5 The Speci c Absorption -- 4.4.4 Numerical Results -- 4.5 Transmission Line Models of the Human Body -- 4.5.1 Theoretical Background -- 4.5.2 Solution of the Transmission Line Equations in the Frequency Domain -- 4.5.3 Computational Examples…”
    Libro electrónico
  17. 20457
    Publicado 2020
    Tabla de Contenidos: “…2.7.3 ASK smart contract deployment and testing -- 2.8 Smart contract design considerations -- 2.9 Best practices -- 2.10 Summary -- 3 Techniques for trust and integrity -- 3.1 Essentials of trust and integrity -- 3.1.1 Trust -- 3.1.2 Integrity -- 3.2 Digital democracy problem -- 3.2.1 Designing a solution -- 3.2.2 Use case diagram -- 3.2.3 Incremental development of code -- 3.2.4 Users, assets, and transactions -- 3.2.5 Finite state machine diagram -- 3.2.6 Trust intermediation -- 3.2.7 Defining and using modifiers -- 3.2.8 Contract diagram including modifiers -- 3.2.9 Putting it all together -- 3.3 Testing -- 3.3.1 Positive tests -- 3.3.2 Negative tests -- 3.4 Using modifiers, require(), and revert() -- 3.5 Assert() declarations -- 3.6 Best practices -- 3.7 Retrospective -- 3.8 Summary -- 4 From smart contracts to Dapps -- 4.1 Dapp development using Truffle -- 4.1.1 The development process -- 4.1.2 Installing Truffle -- 4.1.3 Building the Dapp stack -- 4.2 Install Ganache test chain -- 4.3 Develop the smart contract -- 4.3.1 Create a project folder -- 4.3.2 Add smart contract and compile -- 4.3.3 Configure blockchain network -- 4.3.4 Deploy the smart contract -- 4.4 Develop and configure the web application -- 4.4.1 Develop ballot-app -- 4.4.2 Launch the ballot-app -- 4.4.3 Install MetaMask wallet -- 4.4.4 Interact with Ballot-Dapp -- 4.4.5 Connect web client to smart contract -- 4.5 Retrospective -- 4.6 Best practices -- 4.7 Summary -- Part 2. …”
    Libro electrónico
  18. 20458
    Publicado 2013
    Tabla de Contenidos: “…1.16 Tools -- Summary -- Exercises -- Chapter 2: Preliminaries:Mathematical -- 2.1 Predicates and Boolean Expressions -- 2.2 Control Flow Graph -- 2.2.1 Basic blocks -- 2.2.2 Flow graphs -- 2.2.3 Paths -- 2.2.4 Basis paths -- 2.2.5 Path conditions and domains -- 2.2.6 Domain and computation errors -- 2.2.7 Static code analysis tools and static testing -- 2.3 Execution History -- 2.4 Dominators and Post-Dominators -- 2.5 Program Dependence Graph -- 2.5.1 Data dependence -- 2.5.2 Control dependence -- 2.5.3 Call graph -- 2.6 Strings, Languages, and Regular Expressions -- 2.7 Tools -- Summary -- Exercises -- Part II: Test Generation -- Chapter 3: Domain Partitioning -- 3.1 Introduction -- 3.2 The Test Selection Problem -- 3.3 Equivalence Partitioning -- 3.3.1 Faults targeted -- 3.3.2 Relations -- 3.3.3 Equivalence classes for variables -- 3.3.4 Unidimensional partitioning versus multidimensional partitioning -- 3.3.5 A systematic procedure -- 3.3.6 Test selection -- 3.3.7 Impact of GUI design -- 3.4 Boundary Value Analysis -- 3.5 Category-Partition Method -- 3.5.1 Steps in the category-partition method -- Summary -- Exercises -- Chapter 4: Predicate Analysis -- 4.1 Introduction -- 4.2 Domain Testing -- 4.2.1 Domain errors -- 4.2.2 Border shifts -- 4.2.3 ON-OFF points -- 4.2.4 Undetected errors -- 4.2.5 Coincidental correctness -- 4.2.6 Paths to be tested -- 4.3 Cause-Effect Graphing -- 4.3.1 Notation used in cause-effect graphing -- 4.3.2 Creating cause-effect graphs -- 4.3.3 Decision table from cause-effect graph -- 4.3.4 Heuristics to avoid combinatorial explosion -- 4.3.5 Test generation from a decision table -- 4.4 Tests Using Predicate Syntax -- 4.4.1 A fault model -- 4.4.2 Missing or extra Boolean variable faults -- 4.4.3 Predicate constraints -- 4.4.4 Predicate testing criteria -- 4.4.5 BOR, BRO, and BRE adequate tests…”
    Libro electrónico
  19. 20459
    por Ballard, Chuck
    Publicado 2005
    Tabla de Contenidos: “…Installing and configuring RAD -- 4.1 System requirements -- 4.2 RAD 6.0 installation -- 4.2.1 Installing RAD from an electronic image -- 4.2.2 Install from the CD-ROM -- 4.3 RAD interim fix installation -- 4.3.1 Installation prerequisites -- 4.3.2 Online interim fix installation -- 4.3.3 Offline interim fix installation -- 4.3.4 Offline multiple interim fix installation -- 4.4 4GL to EGL conversion tool installation -- 4.4.1 Online 4GL to EGL CT installation -- 4.4.2 Offline 4GL to EGL CT installation -- 4.4.3 Offline RPU installation -- 4.5 IBM Informix JDBCTM driver installation -- 4.5.1 Installing IBM Informix JDBC driver in graphical mode -- 4.5.2 Installing IBM Informix JDBC driver in console mode…”
    Libro electrónico
  20. 20460
    Publicado 2004
    Tabla de Contenidos: “…Runtime environment -- 4.1 Architecture -- 4.1.1 WebSphere Application Server base components -- 4.1.2 Business Process Execution container -- 4.1.3 Programming Model Extensions -- 4.2 Basic configuration -- 4.2.1 Planning -- 4.2.2 Software requirements -- 4.2.3 Installation -- 4.2.4 Configuration -- 4.3 Distributed configuration -- 4.3.1 Planning -- 4.3.2 Software requirements -- 4.3.3 Installation -- 4.3.4 Configuration -- 4.4 Configuring for scalability -- 4.4.1 Planning -- 4.4.2 Software requirements -- 4.4.3 Installation -- 4.4.4 Configuration -- 4.5 Configuring for high availability -- Chapter 5. …”
    Libro electrónico