Mostrando 64,141 - 64,160 Resultados de 68,933 Para Buscar '".ad"', tiempo de consulta: 0.32s Limitar resultados
  1. 64141
    por Kerim, Abdulrahman
    Publicado 2023
    Tabla de Contenidos: “…Synthetic data for privacy issues -- Synthetic data in computer vision -- Synthetic data and ethical considerations -- Synthetic data types -- Data augmentation -- Geometric transformations -- Noise injection -- Text replacement, deletion, and injection -- Summary -- Chapter 5: Synthetic Data as a Solution -- The main advantages of synthetic data -- Unbiased -- Diverse -- Controllable -- Scalable -- Automatic data labeling -- Annotation quality -- Low cost -- Solving privacy issues with synthetic data -- Using synthetic data to solve time and efficiency issues -- Synthetic data as a revolutionary solution for rare data -- Synthetic data generation methods -- Summary -- Part 3: Synthetic Data Generation Approaches -- Chapter 6: Leveraging Simulators and Rendering Engines to Generate Synthetic Data -- Introduction to simulators and rendering engines -- Simulators -- Rendering and game engines -- History and evolution of simulators and game engines -- Generating synthetic data -- Identify the task and ground truth to generate -- Create the 3D virtual world in the game engine -- Setting up the virtual camera -- Adding noise and anomalies -- Setting up the labeling pipeline -- Generating the training data with the ground truth -- Challenges and limitations -- Realism -- Diversity -- Complexity -- Looking at two case studies -- AirSim -- CARLA -- Summary -- Chapter 7: Exploring Generative Adversarial Networks -- Technical requirements -- What is a GAN? …”
    Libro electrónico
  2. 64142
    Publicado 2024
    Tabla de Contenidos: “…Chapter 3: Using the DEAP Framework -- Technical requirements -- Python version -- Using a virtual environment -- Installing the necessary libraries -- Introduction to DEAP -- Using the creator module -- Creating the Fitness class -- Creating the Individual class -- Using the Toolbox class -- Creating genetic operators -- Creating the population -- Calculating the fitness -- The OneMax problem -- Solving the OneMax problem with DEAP -- Choosing the chromosome -- Calculating the fitness -- Choosing the genetic operators -- Setting the stopping condition -- Implementing with DEAP -- Using built-in algorithms -- The Statistics object -- The algorithm -- The logbook -- Running the program -- Adding the hall of fame feature -- Experimenting with the algorithm's settings -- Population size and number of generations -- Crossover operator -- Mutation operator -- Selection operator -- Summary -- Further reading -- Chapter 4: Combinatorial Optimization -- Technical requirements -- Search problems and combinatorial optimization -- Solving the knapsack problem -- The Rosetta Code knapsack 0-1 problem -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Solving the TSP -- TSPLIB benchmark files -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Improving the results with enhanced exploration and elitism -- Solving the VRP -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Summary -- Further reading -- Chapter 5: Constraint Satisfaction -- Technical requirements -- Constraint satisfaction in search problems -- Solving the N-Queens problem -- Solution representation -- Python problem representation -- Genetic algorithms solution -- Solving the nurse scheduling problem -- Solution representation -- Hard constraints versus soft constraints…”
    Libro electrónico
  3. 64143
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Consumption taxes revenue -- 2 Value-added taxes - Main design features and trends -- 2.1. …”
    Libro electrónico
  4. 64144
    por Justus, Roy
    Publicado 2022
    Tabla de Contenidos: “…Strategy 2 - Minimal implementation for long-tail items -- Not managing change -- The first cut - OCM -- Risks of reducing the OCM effort -- Optimizing value from OCM -- Responding to insufficient management of change -- Applying high-impact OCM activities -- Target state work instructions -- Transition support service -- The science experiment -- Projects extending ServiceNow -- Risks of the science experiment -- Recognizing a science experiment -- Handling a science experiment -- Summary -- Chapter 3: Capturing Value from your Implementation -- Lowering the process cycle time -- Causes of long cycle times -- Confusion in how and where to engage a process -- How to measure process cycle times and see your issues -- Delays in response to requests for service -- Inability to find the right expertise to fulfil the request -- Lost updates and poor transitions between service fulfillment parties -- How your ServiceNow transformation can reduce process cycle times -- How to prepare for an implementation with a focus on reducing the cycle time -- Optimizing asset utilization -- Causes of poor asset utilization -- How your ServiceNow transformation can improve asset utilization -- How to prepare for an implementation with a focus on optimizing asset utilization -- Automating toil -- Sources of toil -- Where ServiceNow can automate toil -- How to prepare for an implementation with a focus on automating toil -- Improving customer experience -- Where customer experience can improve -- Where ServiceNow can help improve customer experience -- How to prepare for an implementation to improve customer experience -- Summary -- Chapter 4: Planning an Implementation Program for Success -- Defining the scope of the project -- Important components of the project scope -- Adding details to the scope -- Planning the release and release activities…”
    Libro electrónico
  5. 64145
    Libro electrónico
  6. 64146
    Publicado 2017
    Tabla de Contenidos: “…4.2 - Maintenance analysis procedures -- 4.2.1 - The MSG Series Procedures -- 4.2.2 - Reliability-Centered Maintenance -- 4.2.3 - MSG-3 Logic -- 4.2.4 - Structures -- 4.2.5 - Fatigue Damage -- 4.2.6 - Environmental Deterioration -- 4.2.7 - Accidental Damage -- 4.2.8 - Systems and Power Plants -- 4.2.9 - Setting Task Frequencies/Intervals -- 4.3 - Statistical reliability assessment -- 4.4 - Logistic support analysis -- 4.4.1 - LSA Tasks -- 4.4.2 - Failure Mode Effect Analysis -- 4.5 - Fault tree analysis -- 4.5.1 - Qualitative Analysis of a Fault Tree -- 4.5.2 - Quantitative Analysis of a Fault Tree -- 4.6 - Level of repair analysis -- 4.7 - Logistic support analysis record -- 4.8 - LSA models -- 4.9 - Elements of ILS -- 4.10 - Support equipment -- 4.11 - Facilities -- 4.12 - Data -- Chapter 5 - Intelligent Structural Rating System Based on Back-Propagation Network -- 5.1 - Introduction -- 5.2 - Artificial neural network -- 5.2.1 - Basic Theory -- 5.2.2 - Back-Propagation Network -- 5.3 - Design BPN for AD -- 5.3.1 - BPN Configuration -- 5.3.2 - Case Study -- 5.4 - Discussion -- 5.4.1 - Selection of Number of Nodes in Hidden Layers and Parameter Ratio -- 5.4.2 - Selection of Training Algorithms -- 5.5 - Conclusions -- Chapter 6 - Fault Tree Analysis for Composite Structural Damage -- 6.1 - Introduction -- 6.2 - Basic principles of fault tree analysis -- 6.2.1 - Elements of FTA -- 6.2.2 - Boolean Algebra Theorems -- 6.3 - FTA for composite damage -- 6.4 - Qualitative analysis -- 6.4.1 - Minimal Cut Sets -- 6.4.2 - Structure Importance Analysis -- 6.4.3 - Probability Importance Analysis -- 6.4.4 - Relative Probability Importance Analysis -- 6.5 - Quantitative analysis -- 6.6 - Discussion -- 6.7 - Potential solutions -- 6.7.1 - Material Design -- 6.7.2 - Fabrication Process -- 6.7.3 - Personnel Training -- 6.7.4 - Surface Protection…”
    Libro electrónico
  7. 64147
    Publicado 2023
    Tabla de Contenidos: “…6.7.1 Mild Cognitive Impairment (MCI) and Alzheimer's Disease (AD) -- 6.7.2 Fronto-Temporal Dementia (FTD) -- 6.7.3 Multiple Sclerosis (MS) -- 6.7.4 Amyotrophic Lateral Sclerosis (ALS) and Depression -- 6.7.5 Bipolar -- 6.7.6 Schizophrenia -- 6.7.7 Attention Deficit Hyperactivity Disorder (ADHD) -- 6.7.8 Multiple System Atrophy (MSA) -- 6.7.9 Epilepsy/Seizures -- 6.7.10 Pediatric Applications -- 6.8 Resting-State Functional Imaging of Neonatal Brain Image -- 6.9 Different Groups in Brain Disease -- 6.10 Learning Algorithms for Analyzing rsfMRI -- 6.11 Conclusion and Future Directions -- References -- Chapter 7 Early Prediction of Epileptic Seizure Using Deep Learning Algorithm -- 7.1 Introduction -- 7.2 Methodology -- 7.3 Experimental Results -- 7.4 Taking Care of Children with Seizure Disorders -- 7.5 Ketogenic Diet -- 7.6 Vagus Nerve Stimulation (VNS) -- 7.7 Brain Surgeries -- 7.8 Conclusion -- References -- Chapter 8 Brain-Computer Interface-Based Real-Time Movement of Upper Limb Prostheses Topic: Improving the Quality of the Elderly with Brain-Computer Interface -- 8.1 Introduction -- 8.1.1 Motor Imagery Signal Decoding -- 8.2 Literature Survey -- 8.3 Methodology of Proposed Work -- 8.3.1 Proposed Control Scheme -- 8.3.2 One Versus All Adaptive Neural Type-2 Fuzzy Inference System (OVAANT2FIS) -- 8.3.3 Position Control of Robot Arm Using Hybrid BCI for Rehabilitation Purpose -- 8.3.4 Jaco Robot Arm -- 8.3.5 Scheme 1: Random Order Positional Control -- 8.4 Experiments and Data Processing -- 8.4.1 Feature Extraction -- 8.4.2 Performance Analysis of the Detectors -- 8.4.3 Performance of the Real Time Robot Arm Controllers -- 8.5 Discussion -- 8.6 Conclusion and Future Research Directions -- References -- Chapter 9 Brain-Computer Interface-Assisted Automated Wheelchair Control Management-Cerebro: A BCI Application -- 9.1 Introduction…”
    Libro electrónico
  8. 64148
    Publicado 2017
    Libro electrónico
  9. 64149
    Publicado 2012
    “…The book covers legacy non-IP tactical radios, IP-based tactical Mobile Ad-hoc NETwork (MANET) radios, the place of cognitive radios in future tactical communications, as well as the use of core networks in the tactical theatre. …”
    Libro electrónico
  10. 64150
    Publicado 1989
    Tabla de Contenidos: “…Vol. I: Fasc. II: abutor-ad. Vol. I: Fasc. III: ad-adiuvo. Vol. I: Fasc. …”
    Libro
  11. 64151
    por Moïsé, Evdokia
    Publicado 2015
    “…This report assesses how specific border procedures impact on the operation of supply chains and the resulting policy implications, using data from the OECD Trade Facilitation Indicators (TFIs) database and from the OECD-WTO database on trade-in-value-added. The assessment focusses on the impact of trade facilitation measures in three areas: on the amount of foreign value-added embodied in final domestic demand; on the amount of foreign value-added embodied in the gross exports of a reference country; and on the amount of domestic value-added embodied in foreign final demand for agriculture and primary products, low tech industries, medium-low tech industries, and high and medium-high tech industries. …”
    Capítulo de libro electrónico
  12. 64152
    Publicado 2015
    “…Active Directory Program Manager Vittorio Bertocci shows you how to: Address authentication challenges in the cloud or on-premises Systematically protect apps with Azure AD and AD Federation Services Power sign-in flows with OpenID Connect, Azure AD, and AD libraries Make the most of OpenID Connect’s middleware and supporting classes Work with the Azure AD representation of apps and their relationships Provide fine-grained app access control via roles, groups, and permissions Consume and expose Web APIs protected by Azure AD Understand new authentication protocols without reading complex spec documents…”
    Libro electrónico
  13. 64153
    Publicado 2021
    Tabla de Contenidos: “…La relació epistolar entre Mateu Obrador i Maria Antònia Salvà / Maria Isabel Ripoll Perelló -- Articles de Martí de Riquer a «Revista» (1952-1955): llibres i autors catalans / Isabel de Riquer -- Nota sobre la poesia lul·liana de Jeroni Rosselló / Pere Rosselló Bover -- Lola Badia, introductora de Ramon Llull / Josep Enric Rubio Albarracín -- Sobre les discrepàncies respecte a la intenció dels autors en els diàlegs de «Lo somni» / Josep María Ruiz Simón -- Astrología matemática en el «Llibre de les nativitats» de Bartomeu de Tresbens / Julio Samsó -- Apunts sobre la influència de la poesia medieval als inicis de la Renaixença / Joan Santanach -- Il papa Blaquerna, arabista / Simone Sari -- L'Arbre dels començaments de medicina de Guillem Pagès / Albert Soler -- La construcció d'un Ausiàs March renaixentista en glosses i comentaris cinccentistes / Josep Solervicens -- Llull's "Proverbis d'ensenyament" in a copy of Hernán Núñez's "Refranes, o proverbios en romance" (Salamanca, 1555) in the British Library / Barry Taylor -- Notes de Pau Ignasi de Dalmases a la seva col·lecció de manuscrits catalans / Maria Toldrà i Sabaté -- De l'amistat i dels llibres / Jaume Torró Torrent -- Sobre les «Condicions d'amor» i la mort de l'amic / Francesc Tous Prieto -- Una versione veneziana dell'«Epistola ad Alexandrum de dieta servanda» / Ilaria Zamuner…”
    Enlace del recurso
    Libro
  14. 64154
    Publicado 2013
    Tabla de Contenidos: “…The Fundamentals of Fundamental Factor Models -- FUNDAMENTAL ANALYSIS AND THE BARRA FUNDAMENTAL FACTOR MODEL -- CRITICAL INSIGHTS FROM THE BARRA FUNDAMENTAL FACTOR MODEL -- RISK DECOMPOSITION -- Performance Attribution -- KEY POINTS -- NOTES -- REFERENCES -- Multifactor Equity Risk Models and Their Applications -- MODEL DESCRIPTION AND ESTIMATION -- RISK DECOMPOSITION -- Total Risk Decomposition -- Systematic-Residual Risk Decomposition -- Active Risk Decomposition -- Active Systematic-Active Residual Risk Decomposition -- Summary of Risk Decomposition -- APPLICATIONS IN PORTFOLIO CONSTRUCTION AND RISK CONTROL -- Risk Control against a Stock Market Index -- Tilting a Portfolio -- KEY POINTS -- NOTES -- REFERENCES -- Multifactor Fixed Income Risk Models and Their Applications -- APPROACHES USED TO ANALYZE RISK -- Market Structure and Exposure Contributions -- Adding Volatility and Correlations into the Analysis -- A Detailed Risk Report -- APPLICATIONS OF RISK MODELING -- Portfolio Construction and Risk Budgeting -- Portfolio Rebalancing -- Scenario Analysis -- KEY POINTS -- NOTES -- REFERENCES -- Financial Econometrics -- Scope and Methods of Financial Econometrics -- THE DATA GENERATING PROCESS -- FINANCIAL ECONOMETRICS AT WORK -- Implications of Empirical Series with Only One Realization -- Determining the Model -- TIME HORIZON OF MODELS -- Model Risk and Model Robustness -- Performance Measurement of Models -- APPLICATIONS -- Portfolio Construction and Optimization -- Risk Management -- Asset-Liability Management -- KEY POINTS -- REFERENCES -- Regression Analysis: Theory and Estimation -- THE CONCEPT OF DEPENDENCE -- REGRESSIONS AND LINEAR MODELS -- Case Where All Regressors Are Random Variables -- Linear Models and Linear Regressions -- Case Where Regressors Are Deterministic Variables -- ESTIMATION OF LINEAR REGRESSIONS…”
    Libro electrónico
  15. 64155
    Publicado 2012
    Tabla de Contenidos: “…Una aproximación conceptual y taxonómica de sus actividades de enseñanza-aprendizaje (AE/AD) / Enriqueta Barniol Terricabras, comunicación -- Israel Galván: ¿qué es la contemporaneidad en la danza española? …”
    Accés llliure (RedIT) al capítol: "La interpretación en la danza. De la necesidad de un entrenamiento específico para bailarines" de Jordi Fàbrega
    Libro
  16. 64156
    por Felderer, Bernhard
    Publicado 1990
    Tabla de Contenidos: “…Theoretische Modellierungen des Transfermotivs -- i) Die ad-hoc-Sparfunktion -- ii) Die Transferbewertungsfunktion -- iii) Die altruistische Nutzenfunktion -- 3. …”
    Libro electrónico
  17. 64157
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  18. 64158
    Publicado 2017
    Tabla de Contenidos: “…-- 5.7 Pulling It All Together -- References -- 6 The Data Center: A Central Cog in the Digital Economy -- 6.1 Internet Content Providers Are Driving the New Economy -- 6.2 Cloud Computing: Another Growth Market -- 6.2.1 Microsoft, Google, and Others Seek to Grow Their Cloud Businesses -- 6.2.2 Telcos Offer a Mixed Story Regarding Cloud Computing -- 6.2.3 Traditional Enterprises Use a Hybrid Cloud Model -- 6.3 The Expansive Build-Out of Data Centers -- 6.3.1 Demand for Video Adds to Bandwidth Pressures -- 6.3.2 Facebook's Data Center Builds: A Case Study -- 6.4 Energy Consumption Poses the Greatest Data Center Challenge -- 6.5 Silicon Photonics Can Address Data Center Challenges -- References -- 7 Data Center Architectures and Opportunities for Silicon Photonics -- 7.1 Introduction -- 7.2 Internet Content Providers Are the New Drivers of Photonics -- 7.3 Data Center Networking Architectures and Their Limitations -- 7.3.1 The Leaf-and-Spine Switching Architecture -- 7.3.2 Higher-Order Radix Switches -- 7.4 Embedding Optics to Benefit Systems -- 7.4.1 An Electronic-Optic Switch Architecture for Large Data Centers -- 7.4.2 Intel's Disaggregated Server Rack Scale Architecture -- 7.4.3 Compass-EOS: Copackaging Optics and Silicon -- 7.5 Data Center Input-Output Challenges -- 7.5.1 Pluggable Optical Transceivers Evolution: Photonic Integration for 100-Gb -- 7.5.2 The Move to Single-mode Fiber -- 7.5.3 Pluggable Transceivers for the Server-to-Top-of-Row Switch Optical Opportunity -- 7.5.4 Transition One: From Pluggables to On-Board Optics -- 7.5.5 Transition Two: From On-Board Optics to Copackaged Optics -- 7.6 Adding Photonics to Ultralarge-Scale Chips -- 7.7 Pulling It All Together -- References -- 8 The Likely Course of Silicon Photonics -- 8.1 Looking Back to See Ahead…”
    Libro electrónico
  19. 64159
    Publicado 2018
    Tabla de Contenidos: “…Mitko Bogdansoki -- Securing the weakest link in the cyber security chain against social engineering attacks -- Introduction -- Social engineering definition -- Social engineering attacks life cycle -- Taxonomy of the social engineering attacks -- Phishing -- Dumpster diving -- Shoulder surfing -- Advanced Persistent Treat (APT) -- Reverse social engineering -- Baiting -- Waterholing -- Tailgating -- Trojan horses -- Surfing online content -- Role-playing -- Pretexting -- Spear phishing -- Quid pro quo -- Vishing -- Real-world examples of social engineering attacks -- Staying safe from social engineering attacks -- References -- Ozan Ucar and Orhan Sari -- Ask the expert-tips to prevent social engineering (SE) and personal real-life experiences of SE -- Keepnet Phishing Simulator is an excellent tool for fighting against phishing attacks -- Template management -- Edit button -- Adding a new template -- Report manager -- Phishing incident responder -- Sami Lahio -- Chapter 14: Ask the Experts - Part 4 -- Oguzhan Filizlibay -- The aftermath - what follows a social engineering attack? …”
    Libro electrónico
  20. 64160
    Publicado 2018
    Tabla de Contenidos: “…. -- How it works... -- Adding custom names for imports -- How to do it... -- How it works... -- Wrapping complex type declarations with type aliases -- Getting ready -- How to do it... -- How it works... -- Expressive try...catch declarations -- Getting ready -- How to do it... -- How it works... -- There's more... -- Safe type-casting -- How to do it... -- How it works... -- Other Books You May Enjoy -- Index…”
    Libro electrónico