Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 591
- History 266
- Història 209
- Management 153
- Filosofía 151
- Data processing 131
- Literature, Romance 124
- Computer networks 122
- Biblia 119
- Crítica e interpretación 116
- Música 116
- Development 114
- Bíblia 110
- Education 104
- Engineering & Applied Sciences 98
- Ciencias sociales 91
- Humanities, Multidisciplinary 90
- Culture 87
- Artificial intelligence 86
- Social Sciences, Interdisciplinary 86
- Application software 85
- Cultura 83
- Església Catòlica 81
- Colecciones 79
- Religion 79
- Business & Economics 78
- Computer programs 78
- Humanities 78
- César, Cayo Julio 77
- Philosophy 77
-
19781Publicado 2017Tabla de Contenidos: “…Chapter 4 Long Term Evolution (LTE) and LTE-Advanced Pro -- 4.1 Introduction and Overview -- 4.2 Network Architecture and Interfaces -- 4.2.1 LTE Mobile Devices and the LTE Uu Interface -- 4.2.2 The eNode-B and the S1 and X2 Interfaces -- 4.2.3 The Mobility Management Entity (MME) -- 4.2.4 The Serving Gateway (S-GW) -- 4.2.5 The PDN-Gateway -- 4.2.6 The Home Subscriber Server (HSS) -- 4.2.7 Billing, Prepaid and Quality of Service -- 4.3 FDD Air Interface and Radio Network -- 4.3.1 OFDMA for Downlink Transmission -- 4.3.2 SC-FDMA for Uplink Transmission -- 4.3.3 Quadrature Amplitude Modulation for Subchannels -- 4.3.4 Reference and Synchronization Signals -- 4.3.5 The LTE Channel Model in the Downlink Direction -- 4.3.6 Downlink Management Channels -- 4.3.7 System Information Messages -- 4.3.8 The LTE Channel Model in the Uplink Direction -- 4.3.9 MIMO Transmission -- 4.3.10 HARQ and Other Retransmission Mechanisms -- 4.3.11 PDCP Compression and Ciphering -- 4.3.12 Protocol Layer Overview -- 4.4 TD-LTE Air Interface -- 4.5 Scheduling -- 4.5.1 Downlink Scheduling -- 4.5.2 Uplink Scheduling -- 4.6 Basic Procedures -- 4.6.1 Cell Search -- 4.6.2 Attach and Default Bearer Activation -- 4.6.3 Handover Scenarios -- 4.6.4 Default and Dedicated Bearers -- 4.7 Mobility Management and Power Optimization -- 4.7.1 Mobility Management in RRC Connected State -- 4.7.2 Mobility Management in RRC Idle State -- 4.7.3 Mobility Management and State Changes in Practice -- 4.8 LTE Security Architecture -- 4.9 Interconnection with UMTS and GSM -- 4.9.1 Cell Reselection between LTE and GSM/UMTS -- 4.9.2 RRC Connection Release with Redirect between LTE and GSM/UMTS -- 4.9.3 Handover from LTE to UMTS -- 4.10 Interworking with CDMA2000 Networks -- 4.10.1 Cell Reselection between LTE and CDMA2000 Networks -- 4.10.2 RRC Connection Release with Redirect between LTE and CDMA2000…”
Libro electrónico -
19782Publicado 2018Tabla de Contenidos: “…3.5.6 Eine weitere Möglichkeit zur Handhabung der Klassenbezeichnungen und der Verlustfunktion -- 3.5.7 Hinreichend große zwischenliegende Layer sind wichtig -- 3.5.8 Weitere Experimente -- 3.5.9 Zusammenfassung -- 3.6 Ein Beispiel für eine Regression: Vorhersage der Kaufpreise von Häusern -- 3.6.1 Die Boston-Housing-Price-Datensammlung -- 3.6.2 Daten vorbereiten -- 3.6.3 Neuronales Netz erzeugen -- 3.6.4 K-fache Kreuzvalidierung des Ansatzes -- 3.6.5 Zusammenfassung -- 3.7 Zusammenfassung Kapitel 3 -- Kapitel 4: Grundlagen des Machine Learnings -- 4.1 Vier Teilgebiete des Machine Learnings -- 4.1.1 Überwachtes Lernen -- 4.1.2 Unüberwachtes Lernen -- 4.1.3 Selbstüberwachtes Lernen -- 4.1.4 Bestärkendes Lernen -- 4.2 Bewertung von Machine-Learning-Modellen -- 4.2.1 Trainings-, Validierungs- und Testmengen -- 4.2.2 Worauf zu achten ist -- 4.3 Datenvorverarbeitung, Merkmalserstellung und Erlernen von Merkmalen -- 4.3.1 Datenvorverarbeitung für neuronale Netze -- 4.3.2 Merkmalserstellung -- 4.4 Überanpassung und Unteranpassung -- 4.4.1 Das neuronale Netz verkleinern -- 4.4.2 Regularisierung der Gewichte -- 4.4.3 Dropout-Regularisierung -- 4.5 Ein allgemeiner Machine-Learning-Workflow -- 4.5.1 Definition der Aufgabe und Zusammenstellen einer Datenmenge -- 4.5.2 Auswahl eines Erfolgskriteriums -- 4.5.3 Auswahl einer Bewertungsmethode -- 4.5.4 Daten vorbereiten -- 4.5.5 Entwicklung eines Modells, das besser funktioniert als zufälliges Raten -- 4.5.6 Hochskalieren: Entwicklung eines Modells mit Überanpassung -- 4.5.7 Regularisierung des Modells und Abstimmung der Hyperparameter -- 4.6 Zusammenfassung Kapitel 4 -- Teil II: Deep Learning in der Praxis -- Kapitel 5: Deep Learning und maschinelles Sehen -- 5.1 Einführung in CNNs -- 5.1.1 Die Faltungsoperation -- 5.1.2 Die Max-Pooling-Operation -- 5.2 Ein CNN von Grund auf mit einer kleinen Datenmenge trainieren…”
Libro electrónico -
19783Publicado 2016Tabla de Contenidos: “…4.3.1.3 - Scope of Business Keys -- 4.3.1.4 - Difference between Business Keys and Surrogate Keys -- 4.3.2 - Hub Entity Structure -- 4.3.2.1 - Hash Key -- 4.3.2.2 - Business Key -- 4.3.2.3 - Load Date -- 4.3.2.4 - Record Source -- 4.3.2.5 - Last Seen Date -- 4.3.3 - Hub Examples -- 4.4 - Link Definition -- 4.4.1 - Reasons for Many-to-Many Relationships -- 4.4.2 - Flexibility of Links -- 4.4.3 - Granularity of Links -- 4.4.4 - Link Unit-of-Work -- 4.4.5 - Link Entity Structure -- 4.4.5.1 - Hash Key -- 4.4.5.2 - Dependent Child Key -- 4.4.6 - Link Examples -- 4.5 - Satellite Definition -- 4.5.1 - Importance of Keeping History -- 4.5.2 - Splitting Satellites -- 4.5.2.1 - Splitting by Source System -- 4.5.2.2 - Splitting by Rate of Change -- 4.5.3 - Satellite Entity Structure -- 4.5.3.1 - Parent Hash Key -- 4.5.3.2 - Load Date -- 4.5.3.3 - Load End Date -- 4.5.3.4 - Hash Difference -- 4.5.3.5 - Extract Date -- 4.5.4 - Satellite Examples -- 4.5.5 - Link Driving Key -- References -- Chapter 5 - Intermediate Data Vault Modeling -- 5.1 - Hub Applications -- 5.1.1 - Business Key Consolidation -- 5.2 - Link Applications -- 5.2.1 - Link-on-link -- 5.2.2 - Same-as Links -- 5.2.3 - Hierarchical Links -- 5.2.4 - Nonhistorized Links -- 5.2.5 - Nondescriptive Links -- 5.2.6 - Computed Aggregate Links -- 5.2.7 - Exploration Links -- 5.3 - Satellite Applications -- 5.3.1 - Overloaded Satellites -- 5.3.2 - Multi-Active Satellites -- 5.3.3 - Status Tracking Satellites -- 5.3.4 - Effectivity Satellites -- 5.3.5 - Record Tracking Satellites -- 5.3.6 - Computed Satellites -- References -- Chapter 6 - Advanced Data Vault Modeling -- 6.1 - Point-in-Time Tables -- 6.1.1 - Point-in-Time Table Structure -- 6.1.2 - Managed PIT Window -- 6.2 - Bridge Tables -- 6.2.1 - Bridge Table Structure -- 6.2.2 - Comparing PIT Tables with Bridge Tables -- 6.3 - Reference Tables…”
Libro electrónico -
19784Publicado 2021Tabla de Contenidos:Libro electrónico
-
19785por OCDE, OECD /.Tabla de Contenidos: “…Un cadre simple de mesure de l'impact des réformes structurelles sur la production potentielle -- Résultats d'estimations -- Gains retirés des réformes antérieures -- Graphique 4.4. Les effets moyens estimés des réformes structurelles antérieures sont considérables pour certains pays -- Gains potentiels liés à une convergence plus poussée -- Graphique 4.5. …”
Publicado 2015
Libro electrónico -
19786Publicado 2023Tabla de Contenidos: “…3.3.3 Graceful terminations -- 3.3.4 Folder watcher -- 3.3.5 Action scripts -- 3.4 Running watchers -- 3.4.1 Testing watcher execution -- 3.4.2 Scheduling watchers -- Summary -- 4 Handling sensitive data -- 4.1 Principles of automation security -- 4.1.1 Do not store sensitive information in scripts -- 4.1.2 Principle of least privilege -- 4.1.3 Consider the context -- 4.1.4 Create role-based service accounts -- 4.1.5 Use logging and alerting -- 4.1.6 Do not rely on security through obscurity -- 4.1.7 Secure your scripts -- 4.2 Credentials and secure strings in PowerShell -- 4.2.1 Secure strings -- 4.2.2 Credential objects -- 4.3 Storing credentials and secure strings in PowerShell -- 4.3.1 The SecretManagement module -- 4.3.2 Set up the SecretStore vault -- 4.3.3 Set up a KeePass vault -- 4.3.4 Choosing the right vault -- 4.3.5 Adding secrets to a vault -- 4.4 Using credentials and secure strings in your automations -- 4.4.1 SecretManagement module -- 4.4.2 Using Jenkins credentials -- 4.5 Know your risks -- Summary -- 5 PowerShell remote execution -- 5.1 PowerShell remoting -- 5.1.1 Remote context -- 5.1.2 Remote protocols -- 5.1.3 Persistent sessions -- 5.2 Script considerations for remote execution -- 5.2.1 Remote execution scripts -- 5.2.2 Remote execution control scripts -- 5.3 PowerShell remoting over WSMan -- 5.3.1 Enable WSMan PowerShell remoting -- 5.3.2 Permissions for WSMan PowerShell remoting -- 5.3.3 Execute commands with WSMan PowerShell remoting -- 5.3.4 Connect to the desired version of PowerShell -- 5.4 PowerShell remoting over SSH -- 5.4.1 Enable SSH PowerShell remoting -- 5.4.2 Authenticating with PowerShell and SSH -- 5.4.3 SSH environment considerations -- 5.4.4 Execute commands with SSH PowerShell remoting -- 5.5 Hypervisor-based remoting -- 5.6 Agent-based remoting -- 5.7 Setting yourself up for success with PowerShell remoting…”
Libro electrónico -
19787por Panik, Michael J.Tabla de Contenidos: “…Appendix 3.D The von Bertalanffy and Richards Models Derived -- Appendix 3.E The Schnute Model Derived -- Appendix 3.F The McDill-Amateis Model Derived -- Appendix 3.G The Sloboda Model Derived -- Appendix 3.H A Generalized Michaelis-Menten Growth Equation -- 4 Estimation of Trend -- 4.1 Linear Trend Equation -- 4.2 Ordinary Least Squares (OLS) Estimation -- 4.3 Maximum Likelihood (ML) Estimation -- 4.4 The SAS System -- 4.5 Changing the Unit of Time -- 4.5.1 Annual Totals versus Monthly Averages versus Monthly Totals -- 4.5.2 Annual Totals versus Quarterly Averages versus Quarterly Totals -- 4.6 Autocorrelated Errors -- 4.6.1 Properties of the OLS Estimators When ε Is AR (1) -- 4.6.2 Testing for the Absence of Autocorrelation: The Durbin-Watson Test -- 4.6.3 Detection of and Estimation with Autocorrelated Errors -- 4.7 Polynomial Models in t -- 4.8 Issues Involving Trended Data -- 4.8.1 Stochastic Processes and Time Series -- 4.8.2 Autoregressive Process of Order p -- 4.8.3 Random Walk Processes -- 4.8.4 Integrated Processes -- 4.8.5 Testing for Unit Roots -- Appendix 4.A OLS Estimated and Related Growth Rates -- 4.A.1 The OLS Growth Rate -- 4.A.2 The Log-Difference (LD) Growth Rate -- 4.A.3 The Average Annual Growth Rate -- 4.A.4 The Geometric Average Growth Rate -- 5 Dynamic Site Equations Obtained from Growth Models -- 5.1 Introduction -- 5.2 Base-Age-Specific (BAS) Models -- 5.3 Algebraic Difference Approach (ADA) Models -- 5.4 Generalized Algebraic Difference Approach (GADA) Models -- 5.5 A Site Equation Generating Function -- 5.5.1 ADA Derivations -- 5.5.2 GADA Derivations -- 5.6 The Grounded GADA (g-GADA) Model -- Appendix 5.A Glossary of Selected Forestry Terms -- 6 Nonlinear Regression -- 6.1 Intrinsic Linearity/Nonlinearity -- 6.2 Estimation of Intrinsically Nonlinear Regression Models -- 6.2.1 Nonlinear Least Squares (NLS)…”
Publicado 2014
Libro electrónico -
19788por Ebner, JürgenTabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labor einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinien definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Services (DoS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
Publicado 2023
Libro electrónico -
19789Publicado 2024Tabla de Contenidos: “…3.3.2.4 Document-level sentiment analysis -- 3.3.3 Steps to perform dimensional sentiment analysis -- 3.4 Open issues and challenges in dimensional sentiment analysis -- 3.5 Future directions -- 3.6 Conclusion -- References -- 4 A model of time in natural linguistic reasoning -- 4.1 Introduction -- 4.2 Human biology of time -- 4.2.1 Working hypotheses for time management -- 4.2.2 Criteria for validity -- 4.2.3 Materials and methods -- 4.2.4 Biological foundations of time in human mind -- 4.2.4.1 Animal encephalon structures involved -- 4.2.4.2 Nuclei functioning as a storage of information -- 4.2.4.3 Nuclei functioning as a time device -- 4.2.4.4 Time perception and its alterations -- 4.3 Evidence of timelines in the brain: time in linguistic reasoning -- 4.4 Some clues and tests -- 4.4.1 A device to model timelines -- 4.4.2 A use case to test timelines -- 4.4.3 Modeling the use case with NNR4 -- 4.4.3.1 First rule: timelessness out of C -- 4.4.3.2 Second rule: cycles of use case timelines -- 4.4.3.3 Third rule: poles in c according to timelines -- 4.4.3.4 Fourth rule: the physical expression of timelines -- 4.5 Conclusions and future work -- References -- 5 Hate speech detection using LSTM and explanation by LIME (local interpretable model-agnostic explanations) -- 5.1 Introduction -- 5.2 Bag of words -- 5.2.1 Limitations of the Bag of Words -- 5.2.2 Advantages of the Bag of Words -- 5.3 Term frequency-inverse document frequency -- 5.3.1 Why is TF-IDF? …”
Libro electrónico -
19790Tabla de Contenidos: “…WebSphere Studio Application Monitor installation rollout planning -- 4.1 Strategic or tactical -- 4.2 Planning the rollout -- 4.2.1 Identify an enterprise business sponsor and the stakeholders -- 4.2.2 Define ownership -- 4.2.3 Choose the project manager -- 4.2.4 Educate the user community and gain stakeholder support -- 4.2.5 Identify and document business needs for monitoring -- 4.2.6 Identify applications and JVMs to monitor -- 4.2.7 Define appropriate levels of access to the user groups -- 4.2.8 Define appropriate views to the user groups -- 4.2.9 Plan time frame to implement -- 4.3 Rollout -- 4.4 Establish a training plan -- 4.5 Identify reporting requirements -- 4.6 Identify implementation team -- 4.7 Identify initial deployment benefits -- 4.8 Installation -- 4.8.1 Before you start -- 4.8.2 Plan the installation -- 4.8.3 Install Application Monitor -- 4.8.4 Major tasks performed by the installer -- 4.8.5 Installation scripts -- 4.8.6 Common mistakes -- 4.8.7 Resolving installation issues -- 4.8.8 Installation log files -- 4.9 Platform-specific issues -- 4.9.1 Customized startup and shutdown instructions -- 4.9.2 Common error messages and solutions -- 4.10 Maintenance -- 4.10.1 Assign responsibilities -- 4.10.2 Training -- 4.11 Database maintenance -- 4.12 Monitoring -- 4.13 Upgrade maintenance strategy -- 4.13.1 Preproduction testing -- 4.13.2 Software upgrades -- 4.13.3 Updating a large number of servers (Data Collectors) -- Part 3 Managing Server installation -- Chapter 5. …”
Libro electrónico -
19791Publicado 2003Tabla de Contenidos: “…Programming model -- 4.1 Overview -- 4.2 WebSphere Commerce Server framework -- 4.2.1 Servlet engine -- 4.2.2 Protocol Listeners -- 4.2.3 Adapter manager -- 4.2.4 Adapters -- 4.2.5 Web controller -- 4.2.6 Commands -- 4.2.7 Entity beans -- 4.2.8 Data beans -- 4.2.9 Data Bean Manager -- 4.2.10 JavaServer Page (JSP) templates -- 4.2.11 WebSphere Commerce < -- instance> -- .xml configuration file -- 4.3 Application flow of an HTTP request -- 4.4 Design patterns -- 4.4.1 Model-view-controller design pattern -- 4.4.2 Command design pattern -- 4.4.3 Display design pattern -- 4.5 Persistent object model -- 4.6 Access control -- 4.7 Customizing application assets -- 4.7.1 Asset types to customize and development tooling -- 4.7.2 Matching skills to customization needs -- 4.8 For more information -- Chapter 5. …”
Libro electrónico -
19792por Jantti, JoukoTabla de Contenidos: “…4.3 Sharing Fast Path DEDB sequential dependent segments -- 4.3.1 The shared SDEP enhancement -- 4.4 Fast Database Recovery (FDBR) -- 4.4.1 Environments where FDBR is supported -- Chapter 5. …”
Publicado 2003
Libro electrónico -
19793por Darmawan, BudiTabla de Contenidos: “…Implementing and configuring basic LTPA authentication with IBM Directory Server -- 4.1 Overview -- 4.2 Implementing IBM WebSphere Portal -- 4.2.1 Installing Base WebSphere Portal V5.0 -- 4.2.2 Upgrading WebSphere Portal to V5.0.2 -- 4.2.3 Upgrading to WebSphere Portal Cumulative Fix 1 (V5.0.2.1) -- 4.2.4 Installing DB2 Universal Database -- 4.2.5 Configuring WebSphere Portal for DB2 -- 4.2.6 Configuring WebSphere Portal for IBM HTTP Server -- 4.2.7 Connecting WebSphere Portal to a directory server -- 4.3 Installing the Lotus Collaborative Components -- 4.3.1 Installing Lotus Domino V6.5.2 -- 4.3.2 Installing Lotus Team Workplace V6.5.1 -- 4.3.3 Installing Lotus Instant Messaging and Web Conferencing -- 4.3.4 Common Domino administrative procedures -- 4.4 Installing Domino Extended Products portlets -- 4.4.1 Configuring WebSphere Portal for collaborative portlets -- 4.4.2 Installing the Domino Extended Products portlets -- 4.4.3 Configuring the Collaboration Services to bind to Domino LDAP -- 4.4.4 Enabling server access for portlets -- 4.4.5 Configuring single sign-on -- 4.4.6 Lotus Team Workplace portlets settings -- 4.4.7 Configuring the My Team Workplace portlet -- 4.4.8 Lotus Instant Messaging and Web Conferencing portlets -- 4.4.9 Allowing Contact List portlet to access Instant Messaging server -- 4.4.10 Configuring the Lotus Web Conferencing portlet -- 4.4.11 Lotus Team Workplace and Instant Messaging -- 4.4.12 Configuring People Finder -- 4.4.13 Setting up Sametime awareness and chat -- 4.4.14 Setting up Web Conferencing meetings -- 4.5 Placing portlets on a page for testing -- 4.6 Known problems and fixes in this configuration -- Chapter 5. …”
Publicado 2004
Libro electrónico -
19794Publicado 2005Tabla de Contenidos: “…Storage management in depth -- 4.1 DB2 UDB logical and physical database objects -- 4.1.1 Tables, indexes, and views -- 4.1.2 Table spaces -- 4.1.3 Table space containers -- 4.2 Working with SMS and DMS table spaces -- 4.2.1 SMS table spaces -- 4.2.2 File based DMS table spaces -- 4.2.3 Device based DMS table spaces -- 4.3 SAP data classes (TABARTs) -- 4.4 Space reclamation strategies -- 4.4.1 Offline table and index reorganization -- 4.4.2 Inplace table and index reorganization -- 4.4.3 Criteria for reorganization -- 4.4.4 High water mark -- 4.5 Best practices for intelligent storage subsystems -- 4.5.1 Database stored on single SSA/SCSI disks -- 4.5.2 Database stored on RAID-5 arrays -- 4.6 Moving tables and indexes using DB6CONV -- 4.6.1 Principle of moving tables and indexes using DB6CONV -- 4.6.2 Example: Moving table PCL2 to improve performance -- Chapter 5. …”
Libro electrónico -
19795Publicado 2017Tabla de Contenidos: “…3.4.1 Using Historical Data -- 3.4.2 Using Human Judgment -- 3.4.3 Biases in Judgment -- 3.5 Modeling Using Probability -- 3.5.1 Bayes Nets -- 3.5.2 Monte Carlo Simulation -- 3.5.3 Monte Carlo Simulation with Dependent Uncertainties -- 3.5.4 Monte Carlo Simulation with Partial Information on Output Values -- 3.5.5 Variations on Monte Carlo Simulation -- 3.5.6 Sensitivity Analysis -- 3.6 Summary -- 3.7 Key Terms -- 3.8 Exercises -- References -- Chapter 4 Analyzing Resources -- 4.1 Introduction -- 4.2 Resources -- 4.2.1 People -- 4.2.2 Facilities -- 4.2.3 Costs -- 4.2.4 Resource Space -- 4.3 Cost Analysis -- 4.3.1 Cost Estimation -- 4.3.2 Cost Estimation Techniques -- 4.3.3 Learning Curves -- 4.3.4 Net Present Value -- 4.3.5 Monte Carlo Simulation -- 4.3.6 Sensitivity Analysis -- 4.4 Affordability Analysis -- 4.4.1 Background -- 4.4.2 The Basics of Affordability Analysis Are Not Difficult -- 4.4.3 DoD Comparison of Cost Analysis and Affordability Analysis -- 4.4.4 Affordability Analysis Definitions -- 4.4.5 "Big A" Affordability Analysis Process Guide -- 4.5 Key Terms -- 4.6 Excercises -- References -- Chapter 5 Understanding Decision Management -- 5.1 Introduction -- 5.2 Decision Process Context -- 5.3 Decision Process Activities -- 5.3.1 Frame Decision -- 5.3.2 Develop Objectives and Measures -- 5.3.3 Generate Creative Alternatives -- 5.3.4 Assess Alternatives via Deterministic Analysis -- 5.3.5 Synthesize Results -- 5.3.6 Develop Multidimensional Value Model -- 5.3.7 Identify Uncertainty and Conduct Probabilistic Analysis -- 5.3.8 Assess Impact of Uncertainty -- 5.3.9 Improve Alternatives -- 5.3.10 Communicating Trade-Offs -- 5.3.11 Present Recommendation and Implementation Plan -- 5.4 Summary -- 5.5 Key Terms -- 5.6 Exercises -- References -- Chapter 6 Identifying Opportunities -- 6.1 Introduction -- 6.2 Knowledge -- 6.2.1 Domain Knowledge…”
Libro electrónico -
19796Publicado 2021Tabla de Contenidos: “…4.1 Overview of a DataFrame -- 4.1.1 Creating a DataFrame from a dictionary -- 4.1.2 Creating a DataFrame from a NumPy ndarray -- 4.2 Similarities between Series and DataFrames -- 4.2.1 Importing a DataFrame with the read_csv function -- 4.2.2 Shared and exclusive attributes of Series and DataFrames -- 4.2.3 Shared methods of Series and DataFrames -- 4.3 Sorting a DataFrame -- 4.3.1 Sorting by a single column -- 4.3.2 Sorting by multiple columns -- 4.4 Sorting by index -- 4.4.1 Sorting by row index -- 4.4.2 Sorting by column index -- 4.5 Setting a new index -- 4.6 Selecting columns and rows from a DataFrame -- 4.6.1 Selecting a single column from a DataFrame -- 4.6.2 Selecting multiple columns from a DataFrame -- 4.7 Selecting rows from a DataFrame -- 4.7.1 Extracting rows by index label -- 4.7.2 Extracting rows by index position -- 4.7.3 Extracting values from specific columns -- 4.8 Extracting values from Series -- 4.9 Renaming columns or rows -- 4.10 Resetting an index -- 4.11 Coding challenge -- 4.11.1 Problems -- 4.11.2 Solutions -- Summary -- 5 Filtering a DataFrame -- 5.1 Optimizing a data set for memory use -- 5.1.1 Converting data types with the astype method -- 5.2 Filtering by a single condition -- 5.3 Filtering by multiple conditions -- 5.3.1 The AND condition -- 5.3.2 The OR condition -- 5.3.3 Inversion with ~ -- 5.3.4 Methods for Booleans -- 5.4 Filtering by condition -- 5.4.1 The isin method -- 5.4.2 The between method -- 5.4.3 The isnull and notnull methods -- 5.4.4 Dealing with null values -- 5.5 Dealing with duplicates -- 5.5.1 The duplicated method -- 5.5.2 The drop_duplicates method -- 5.6 Coding challenge -- 5.6.1 Problems -- 5.6.2 Solutions -- Summary -- Part 2. …”
Libro electrónico -
19797Publicado 2017Tabla de Contenidos: “…-- 3.11 Übungsfragen -- Kapitel 4: Grundlegende Editierbefehle und Objektwahl -- 4.1 Übersicht über Editierbefehle -- 4.2 VERSETZ -- 4.3 STUTZEN und DEHNEN -- 4.4 ABRUNDEN, FASE und MISCHEN -- 4.4.1 Abrunden mit verschiedenen Radien -- 4.4.2 Abrunden mit Radius 0 -- 4.4.3 Fasen -- 4.4.4 Die Option POLYLINIE -- 4.4.5 Stutzen-Modus -- 4.4.6 Mischen (Kurven verschmelzen) -- 4.5 Objektwahl -- 4.5.1 Objektwahlmodi -- 4.5.2 Übereinander liegende Objekte: Wechselnde Auswahl -- 4.5.3 Objektwahlen im Kontextmenü -- 4.5.4 Objektwahl mit Schnellauswahl -- 4.5.5 Gruppe -- 4.6 Weitere Editierbefehle -- 4.6.1 SCHIEBEN -- 4.6.2 KOPIEREN -- 4.6.3 SPIEGELN -- 4.6.4 BRUCH -- 4.6.5 VERBINDEN -- 4.6.6 DREHEN -- 4.7 Griffe -- 4.7.1 Griffe als Vorauswahl für nachfolgenden Editierbefehl -- 4.7.2 Kontextmenü bei aktivierten Griffen -- 4.7.3 Griff-Menü beim heißen Griff -- 4.7.4 Griffaktionen mit regelmäßigen Abständen -- 4.7.5 Griffe-Übung -- 4.8 Kalte Griffe - Multifunktionale Griffe -- 4.9 Eigenschaften von Objekten bearbeiten -- 4.9.1 Eigenschaften-Manager…”
Libro electrónico -
19798por Weigend, MichaelTabla de Contenidos: “…3.10.4 Entwicklungsumgebungen für Profis -- 3.11 Aufgaben -- 3.12 Lösungen -- Kapitel 4: Standard-Datentypen -- 4.1 Daten als Objekte -- 4.2 Fundamentale Datentypen im Überblick -- 4.3 Typen und Klassen -- 4.4 NoneType -- 4.5 Wahrheitswerte - der Datentyp bool -- 4.6 Ganze Zahlen -- 4.7 Gleitkommazahlen -- 4.8 Komplexe Zahlen -- 4.9 Arithmetische Operatoren für Zahlen -- 4.10 Sequenzen -- 4.10.1 Zeichenketten (Strings) -- 4.10.2 Bytestrings -- 4.10.3 Tupel -- 4.10.4 Liste -- 4.10.5 Bytearray -- 4.10.6 Einige Grundoperationen für Sequenzen -- 4.10.7 Veränderbare und unveränderbare Sequenzen -- 4.11 Mengen -- 4.12 Dictionaries -- 4.13 Typumwandlungen -- 4.13.1 int() -- 4.13.2 float() -- 4.13.3 complex() -- 4.13.4 bool() -- 4.13.5 str() -- 4.13.6 dict(), list() und tuple() -- 4.14 Aufgaben -- 4.15 Lösungen -- Kapitel 5: Kontrollstrukturen -- 5.1 Einfache Bedingungen -- 5.1.1 Vergleiche -- 5.1.2 Zugehörigkeit zu einer Menge (in, not in) -- 5.1.3 Beliebige Ausdrücke als Bedingungen -- 5.2 Zusammengesetzte Bedingungen - logische Operatoren -- 5.2.1 Negation (not) -- 5.2.2 Konjunktion (and) -- 5.2.3 Disjunktion (or) -- 5.2.4 Formalisierung von Bedingungen -- 5.2.5 Hinweis zum Programmierstil -- 5.3 Programmverzweigungen (bedingte Anweisungen) -- 5.3.1 Einseitige Verzweigung (if) -- 5.3.2 Zweiseitige Verzweigung (if-else) -- 5.3.3 Mehrfache Fallunterscheidung (elif) -- 5.3.4 Bedingte Ausdrücke -- 5.4 Bedingte Wiederholung (while) -- 5.4.1 Endlosschleifen -- 5.5 Iteration über eine Kollektion (for) -- 5.5.1 Zählschleifen - Verwendung von range() -- 5.5.2 Verschachtelte Iterationen -- 5.5.3 Vertiefung: Iterative Berechnung rekursiver Folgen -- 5.6 Abbruch einer Schleife mit break -- 5.6.1 Abbruch eines Schleifendurchlaufs mit continue -- 5.7 Abfangen von Ausnahmen mit try…”
Publicado 2022
Libro electrónico -
19799Publicado 2022Tabla de Contenidos: “…-- 4.3.2 Separation Property -- 4.3.3 Conditions for Existence of Estimator Gain H -- 4.3.4 Concept of Observability -- 4.3.5 Concept of Detectability -- 4.4 Optimal Control -- 4.4.1 Linear Quadratic Regulator (LQR) -- 4.4.2 Linear Quadratic Tracker (LQT) -- 4.4.2.1 LQT Without Direct Output Feedback -- 4.4.2.2 Robust LQT with Direct Output Feedback -- 4.4.2.3 Elementary Design Approach (Unstable!) …”
Libro electrónico -
19800Publicado 2004Tabla de Contenidos: “…Systems Management -- 4.1 Overall Availability Management processes -- 4.1.1 Develop availability practices -- 4.1.2 Develop standards -- 4.2 Service Level Management -- 4.2.1 Business requirements -- 4.2.2 Negotiating objectives -- 4.2.3 Documenting agreements - Managing expectations -- 4.2.4 Building infrastructure - Technical and support -- 4.2.5 Measuring availability -- 4.2.6 Track and report availability -- 4.2.7 Customer satisfaction -- 4.3 Change Management -- 4.3.1 Develop and prepare change -- 4.3.2 Assess and minimize risk -- 4.3.3 Testing -- 4.3.4 Back-out planning -- 4.3.5 Verify change readiness -- 4.3.6 Schedule change -- 4.3.7 Communicate change -- 4.3.8 Implement and document -- 4.3.9 Change record content -- 4.3.10 Review quality -- 4.4 Organization -- 4.4.1 Skills -- 4.4.2 Help desk activities -- 4.4.3 Operations -- 4.4.4 Automation -- 4.4.5 Application testing -- 4.4.6 Passive and active monitoring -- 4.5 Recovery Management -- 4.5.1 Terminology -- 4.5.2 Recovery potential initiatives -- 4.5.3 Recovery Management activities -- 4.5.4 Event Management -- 4.5.5 Incident Management -- 4.5.6 Crisis Management -- 4.6 Problem Management -- 4.6.1 Data tracking and reporting -- 4.6.2 Causal analysis -- 4.6.3 Maintenance policies -- 4.7 Performance Management -- 4.8 Capacity planning -- 4.9 Security Management -- 4.9.1 Security policy -- 4.9.2 Physical security -- 4.10 Configuration Management -- 4.10.1 Component Failure Impact Analysis -- 4.11 Enterprise architecture -- 4.11.1 Infrastructure simplification -- 4.11.2 Ideal mainframe implementations -- 4.11.3 Ideal BladeCenter implementation…”
Libro electrónico