Mostrando 2,381 - 2,400 Resultados de 2,860 Para Buscar '".ec"', tiempo de consulta: 0.08s Limitar resultados
  1. 2381
    por Mullennex, Lauren
    Publicado 2023
    Tabla de Contenidos: “…Moderating images -- Using the DetectModerationLabels API -- Using top-level categories -- Using secondary-level categories -- Putting it together -- Quick recap -- Moderating videos -- Creating the supporting resources -- Finding the resource ARNs -- Uploading the sample video to Amazon S3 -- Using the StartContentModeration API -- Examining the completion notification -- Using the GetContentModeration API -- Quick recap -- Using AWS Lambda to automate the workflow -- Implement the Start Analysis Handler -- Implementing the Get Results Handler -- Publishing function changes -- Experiment with the end-to-end -- Summary -- Part 3: CV at the edge -- Chapter 7: Introducing Amazon Lookout for Vision -- Technical requirements -- Introducing Amazon Lookout for Vision -- The benefits of Amazon Lookout for Vision -- Creating a model using Amazon Lookout for Vision -- Choosing the model type based on your business goals -- Creating a model -- Starting your model -- Analyzing an image -- Stopping your model -- Building a model to identify damaged pills -- Step 1 - collecting your images -- Step 2 - creating a project -- Step 3 - creating the training and test datasets -- Step 4 - verifying the dataset -- Step 5 - training your model -- Validating it works -- Step 1 - trial detection -- Step 2 - starting your model -- Step 3 - analyzing an image with your model -- Step 4 - stopping your model -- Summary -- Chapter 8: Detecting Manufacturing Defects Using CV at the Edge -- Technical requirements -- Understanding ML at the edge -- Deploying a model at the edge using Lookout for Vision and AWS IoT Greengrass -- Step 1 - Launch an Amazon EC2 instance -- Step 2 - Create an IAM role and attach it to an EC2 instance -- Step 3 - Install AWS IoT Greengrass V2 -- Step 4 - Upload training and test datasets to S3 -- Step 5 - Create a project…”
    Libro electrónico
  2. 2382
    Publicado 2013
    Tabla de Contenidos: “…Hurtado -- La percepción del arte español en Norteamérica / por Dolores Jiménez Blanco -- Pintando lo pintoresco : la imagen artística de España en los Estados Unidos (1820-1920) / por Richard Kagan -- El coleccionismo de Archer Milton Huntington / por Margaret E.C. McQuade -- Epílogo: La frontera entre el mundo anglosajón y el hispano : ¿es América Latina Occidente? …”
    Libro electrónico
  3. 2383
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Beginner Level Projects -- Chapter 1: Deploying and Interacting with AWS Services -- Technical requirements -- Architecting on AWS -- Requirements gathering -- Choosing an architecture pattern -- Selecting a service -- Diagramming -- Exploring the Well-Architected Framework -- Getting started with AWS Console -- Using the Console -- Navigating AWS CLI and AWS SDK -- AWS CLI -- AWS SDK -- Understanding IaC -- Using CloudFormation -- Using Terraform -- Summary -- Chapter 2: Creating a Personal Website -- Technical requirements -- Scenario -- Requirements -- Architecture patterns -- Architecture -- AWS services -- Amazon Simple Storage Service (S3) -- Amazon CloudWatch metrics -- Coding the solution -- Editing the website -- Publishing the website -- Monitoring the website -- Cleaning up -- Future work -- Implementing custom DNS -- Taking security to the next level -- Having better observability -- Final architecture -- Summary -- Part 2: Intermediate Level Projects -- Chapter 3: Building a Recipe-Sharing Application -- Technical requirements -- Scenario -- Requirements -- Architecture patterns -- Architecture -- AWS services -- Amazon S3 -- Amazon CloudFront -- Amazon Virtual Private Cloud (VPC) -- Amazon EC2 -- Application Load Balancer (ALB) -- Amazon DynamoDB -- AWS CloudFormation -- Coding the solution -- Cloning the project -- Section 1 - DNS configuration and certificate issuing (option 1 only) -- Section 2 - Solution deployment -- Section 3 - Additional configurations (option 1 only) -- Section 4 - Frontend configuration and deployment -- Section 5 - Testing and exploring your application -- Section 6 - Cleaning up -- Future work -- Using secure protocols -- Infrastructure auto-scaling -- Managed hosting and CI/CD -- Authentication…”
    Libro electrónico
  4. 2384
    por Liyanage, Madhusanka
    Publicado 2020
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
    Libro electrónico
  5. 2385
    por Scaffardi, Lucia
    Publicado 2022
    Tabla de Contenidos: “…. -- 1 Introduction -- 2 A Preliminary Analysis of Two Key Concepts: Sustainable Development and Food (In)Security -- 3 How Novel Foods Regulation (EC) 258/97 Affected the Marketing of Traditional Foods Coming from Third Countries: Criticalitie…”
    Libro electrónico
  6. 2386
    Publicado 2024
    Tabla de Contenidos: “…-- Delving into infrastructure as a code -- Pseudocode -- Summary -- Chapter 2: Talking about Python -- Python 101 -- Beautiful-ugly/explicit-implicit -- Simple-complex-complicated -- Flat-nested/sparse-dense -- Readability-special cases-practicality-purity-errors -- Ambiguity/one way/Dutch -- Now or never -- Hard-bad/easy-good -- Namespaces -- What Python offers DevOps -- Operating systems -- Containerization -- Microservices -- A couple of simple DevOps tasks in Python -- Automated shutdown of a server -- Autopull a list of Docker images -- Summary -- Chapter 3: The Simplest Ways to Start Using DevOps in Python Immediately -- Technical requirements -- Introducing API calls -- Exercise 1 - calling a Hugging Face Transformer API -- Exercise 2 - creating and releasing an API for consumption -- Networking -- Exercise 1 - using Scapy to sniff packets and visualize packet size over time -- Exercise 2 - generating a routing table for your device -- Summary -- Chapter 4: Provisioning Resources -- Technical requirements -- Python SDKs (and why everyone uses them) -- Creating an AWS EC2 instance with Python's boto3 library -- Scaling and autoscaling…”
    Libro electrónico
  7. 2387
    por Ultano Kindelan Everett
    Publicado 2016
    Texto completo en Odilo
    Otros
  8. 2388
    por Marie-Batrice Umutesi
    Publicado 2013
    Texto completo en Odilo
    Otros
  9. 2389
    Texto completo en Odilo
    Otros
  10. 2390
    por Cabañas, José Miguel
    Publicado 2016
    Texto completo en Odilo
    Otros
  11. 2391
    por Domingo Baguer, Ignacio
    Publicado 2014
    Texto completo en Odilo
    Otros
  12. 2392
  13. 2393
    por Sergio Fernández
    Publicado 2012
    Texto completo en Odilo
    Otros
  14. 2394
    por José Luís Montes
    Publicado 2012
    Texto completo en Odilo
    Otros
  15. 2395
    por David Trullás
    Publicado 2015
    Texto completo en Odilo
    Otros
  16. 2396
    por David Sánchez Sáez
    Publicado 2016
    Texto completo en Odilo
    Otros
  17. 2397
    por Lorzagirl
    Publicado 2016
    Texto completo en Odilo
    Otros
  18. 2398
    por Harvard Business Review
    Publicado 2016
    Texto completo en Odilo
    Otros
  19. 2399
  20. 2400