Mostrando 2,581 - 2,600 Resultados de 21,559 Para Buscar '"4:3"', tiempo de consulta: 0.71s Limitar resultados
  1. 2581
    Publicado 2016
    Tabla de Contenidos: “…-- 3.6.1 Der POST im Detail -- 3.6.2 EFI und UEFI -- 3.6.3 Fehlermeldungen -- 3.7 Fragen zu diesem Kapitel -- Kapitel 4: Storage-Lösungen -- 4.1 Die Hardware drunter -- 4.2 Solid State Drives (SSD) -- 4.2.1 MLC oder SLC -- 4.2.2 Hybrid-Festplatten (Hybrid Hard Drives) -- 4.2.3 Anschlussmöglichkeiten -- 4.2.4 Einsatz in Servern -- 4.3 SCSI -- 4.3.1 Architektur -- 4.3.2 SCSI-Kabel und -Stecker -- 4.3.3 SCSI-Standards -- 4.4 Es werde seriell - SATA -- 4.4.1 Unterschied zu PATA -- 4.4.2 Stecker und Kabel -- 4.5 SAS -- 4.5.1 Übertragungstechnik…”
    Libro electrónico
  2. 2582
    Publicado 2001
    Tabla de Contenidos: “…Installation and setup -- 4.1 Supported operating system platforms -- 4.2 IBM Tivoli SAN Manager Windows Server installation -- 4.2.1 Lab environment -- 4.2.2 Preinstallation tasks -- 4.2.3 DB2 installation -- 4.2.4 Upgrading DB2 with Fix Pack 8 -- 4.2.5 Install the SNMP service -- 4.2.6 Checking for the SNMP community name -- 4.2.7 IBM Tivoli SAN Manager Server install -- 4.2.8 Verifying the installation -- 4.3 IBM Tivoli SAN Manager Server AIX installation -- 4.3.1 Lab environment -- 4.3.2 Installation summary -- 4.3.3 Starting and stopping the AIX manager -- 4.3.4 Checking the log files…”
    Libro electrónico
  3. 2583
    por Virtanen, Tuomas
    Publicado 2012
    Tabla de Contenidos: “…4.2.1 DFT-Based Analysis Synthesis with Perfect Reconstruction 55 -- 4.2.2 Probability Distributions for Speech and Noise DFT Coefficients 57 -- 4.3 Voice Activity Detection 58 -- 4.3.1 VAD Design Principles 58 -- 4.3.2 Evaluation of VAD Performance 62 -- 4.3.3 Evaluation in the Context of ASR 62 -- 4.4 Noise Power Spectrum Estimation 65 -- 4.4.1 Smoothing Techniques 65 -- 4.4.2 Histogram and GMM Noise Estimation Methods 67 -- 4.4.3 Minimum Statistics Noise Power Estimation 67 -- 4.4.4 MMSE Noise Power Estimation 68 -- 4.4.5 Estimation of the A Priori Signal-to-Noise Ratio 69 -- 4.5 Adaptive Filters for Signal Enhancement 71 -- 4.5.1 Spectral Subtraction 71 -- 4.5.2 Nonlinear Spectral Subtraction 73 -- 4.5.3 Wiener Filtering 74 -- 4.5.4 The ETSI Advanced Front End 75 -- 4.5.5 Nonlinear MMSE Estimators 75 -- 4.6 ASR Performance 80 -- 4.7 Conclusions 81 -- References 82 -- 5 Extraction of Speech from Mixture Signals 87 / Paris Smaragdis -- 5.1 The Problem with Mixtures 87 -- 5.2 Multichannel Mixtures 88 -- 5.2.1 Basic Problem Formulation 88 -- 5.2.2 Convolutive Mixtures 92 -- 5.3 Single-Channel Mixtures 98 -- 5.3.1 Problem Formulation 98 -- 5.3.2 Learning Sound Models 100 -- 5.3.3 Separation by Spectrogram Factorization 101 -- 5.3.4 Dealing with Unknown Sounds 105 -- 5.4 Variations and Extensions 107 -- 5.5 Conclusions 107 -- References 107 -- 6 Microphone Arrays 109 / John McDonough, Kenichi Kumatani -- 6.1 Speaker Tracking 110 -- 6.2 Conventional Microphone Arrays 113 -- 6.3 Conventional Adaptive Beamforming Algorithms 120 -- 6.3.1 Minimum Variance Distortionless Response Beamformer 120 -- 6.3.2 Noise Field Models 122 -- 6.3.3 Subband Analysis and Synthesis 123 -- 6.3.4 Beamforming Performance Criteria 126 -- 6.3.5 Generalized Sidelobe Canceller Implementation 129 -- 6.3.6 Recursive Implementation of the GSC 130 -- 6.3.7 Other Conventional GSC Beamformers 131 -- 6.3.8 Beamforming based on Higher Order Statistics 132 -- 6.3.9 Online Implementation 136 -- 6.3.10 Speech-Recognition Experiments 140.…”
    Libro electrónico
  4. 2584
  5. 2585
    Publicado 2022
    Tabla de Contenidos: “…4.1.4 Persistence -- 4.2 Writing the smallest OpenAPI definition in Swagger Editor -- 4.2.1 The smallest valid OpenAPI definition -- 4.2.2 Writing in Swagger Editor -- 4.2.3 A word on validation -- 4.3 Adding GET /reviews to our definition -- 4.4 Interacting with our API -- 4.4.1 Executing GET /reviews -- 4.4.2 Adding servers to our definition -- 4.4.3 Executing GET /reviews (again) -- Summary -- 5 Describing API responses -- 5.1 HTTP responses -- 5.2 The problem -- 5.3 The mind-blowing world of data schemas -- 5.4 JSON Schema -- 5.4.1 The type field -- 5.4.2 Adding a field to an object -- 5.4.3 The minimum and maximum keywords -- 5.4.4 Number vs. integer -- 5.5 Status codes -- 5.6 Media types (aka MIME) -- 5.7 Describing the GET /reviews response -- 5.7.1 Smallest response in OpenAPI -- 5.7.2 The GET /reviews 200 response body -- 5.7.3 Adding the rating field to our response body -- 5.7.4 Describing message, uuid, and userId -- Summary -- 6 Creating resources -- 6.1 The problem -- 6.2 Describing POST /reviews with a request body -- 6.2.1 Where to find request bodies -- 6.2.2 Describing the schema for POST /reviews requestBody -- 6.3 Executing operations with request bodies -- 6.3.1 Adding examples to make try-it-out look pretty -- 6.4 Describing GET /reviews/{reviewId} with a path parameter -- 6.4.1 Path parameters -- 6.4.2 Describing the reviewId path parameter -- 6.5 Verifying our reviews are getting created -- Summary -- 7 Adding authentication and authorization -- 7.1 The problem -- 7.2 Getting set up for authentication -- 7.2.1 Challenge: Describe POST /users -- 7.2.2 Challenge: Describe POST /tokens -- 7.2.3 Solution: Definition changes -- 7.2.4 Verifying we can create users and get a token -- 7.3 Adding the Authorization header -- 7.3.1 How OpenAPI handles authorization -- 7.3.2 Types of authorization (securities) supported in OpenAPI 3.0.x…”
    Libro electrónico
  6. 2586
    Publicado 2016
    Tabla de Contenidos: “…. -- 8.4 Degradation mechanisms and modelling -- 8.4.1 Deposition -- 8.4.1.1 Deposit compositions -- 8.4.2 Oxidation -- 8.4.3 Fireside corrosion -- 8.4.3.1 Waterwall corrosion -- 8.4.3.2 Superheater-reheater corrosion -- 8.4.4 Erosion-abrasion-wear -- 8.5 Flexible fuel use -- 8.5.1 Fuel substitution -- 8.5.2 Co-firing fuels -- 8.6 Quantification of damage and protective measures -- 8.6.1 Component- and material-monitoring methods…”
    Libro electrónico
  7. 2587
    Publicado 2022
    Tabla de Contenidos: “…8.2.3.1 Object Recognition -- 8.2.3.2 Object Detection -- 8.2.3.3 Object Tracking -- 8.2.4 Edge Computing, Fog Computing, and Cloud Computing -- 8.2.4.1 Edge Computing -- 8.2.4.2 Fog Computing -- 8.2.4.3 Cloud Computing -- 8.2.5 Benefits of Computer Vision‐Driven Traffic Management -- 8.2.6 Challenges of Computer Vision‐Driven Traffic Management -- 8.2.6.1 Big Data Issues -- 8.2.6.2 Privacy Issues -- 8.2.6.3 Technical Barriers -- 8.3 Research Methodology -- 8.3.1 Research Questions and Objectives -- 8.3.2 Study Design -- 8.3.2.1 Selection Rationale -- 8.3.2.2 Potential Challenges -- 8.3.3 Adapted Study Design Research Approach -- 8.3.4 Selected Hardware and Software -- 8.3.4.1 Hardware: The NVIDIA Jetson Nano Developer Kit and Accompanying Items -- 8.3.5 Hardware Proposed -- 8.3.5.1 Software Stack: NVIDIA Jetpack SDK and Accompanying Requirements (All Iterations) -- 8.3.6 Software Proposed -- 8.4 Conclusion -- References -- Chapter 9 Implementation and Evaluation of Computer Vision Prototype for Vehicle Detection -- 9.1 Prototype Setup -- 9.1.1 Introduction -- 9.1.2 Environment Setup -- 9.2 Testing -- 9.2.1 Design and Development: The Default Model and the First Iteration -- 9.2.2 Testing (Multiple Images) -- 9.2.3 Analysis (Multiple Images) -- 9.2.4 Testing (MP4 File) -- 9.2.5 Testing (Livestream Camera) -- 9.3 Iteration 2: Transfer Learning Model -- 9.3.1 Design and Development -- 9.3.2 Test (Multiple Images) -- 9.3.3 Analysis (Multiple Images) -- 9.3.4 Test (MP4 File) -- 9.3.5 Analysis (MP4 File) -- 9.3.6 Test (Livestream Camera) -- 9.3.7 Analysis (Livestream Camera) -- 9.3.8 Redesign -- 9.4 Iteration 3: Increased Sample Size and Change of Accuracy Analysis (Images) -- 9.4.1 Design and Development -- 9.4.2 Testing -- 9.4.3 Analysis -- 9.4.3.1 Confusion Matrices -- 9.4.3.2 Precision, Recall, and F‐score -- 9.5 Findings and Discussion…”
    Libro electrónico
  8. 2588
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  9. 2589
    por Ebner, Jürgen
    Publicado 2023
    Tabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX‌ -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation‌ -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labo‌r einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinie‌n definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks‌ installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy‌ -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Service‌s (D‌oS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
    Libro electrónico
  10. 2590
    Publicado 2003
    Tabla de Contenidos: “…5.4.1 Business relationship roles -- 5.4.2 Customer service roles -- 5.4.3 Marketing manager role -- 5.4.4 Operational roles -- 5.4.5 Organizational management roles -- 5.4.6 Product management and merchandising roles -- 5.5 For more information -- Part 2 Development guidelines -- Chapter 6. …”
    Libro electrónico
  11. 2591
    Publicado 2018
    Tabla de Contenidos: “…-- 3.5.2 Exporting data to text files -- 3.5.3 Exporting data to JSON text files -- 3.5.4 Exporting data to CSV text files -- 3.5.5 Exporting data to a database -- 3.5.6 Exporting data to MongoDB -- 3.5.7 Exporting data to MySQL -- 3.6 Building complete data conversions -- 3.7 Expanding the process -- Summary -- Chapter 4: Working with unusual data -- 4.1 Getting the code and data -- 4.2 Importing custom data from text files -- 4.3 Importing data by scraping web pages -- 4.3.1 Identifying the data to scrape -- 4.3.2 Scraping with Cheerio -- 4.4 Working with binary data -- 4.4.1 Unpacking a custom binary file -- 4.4.2 Packing a custom binary file -- 4.4.3 Replacing JSON with BSON -- 4.4.4 Converting JSON to BSON -- 4.4.5 Deserializing a BSON file -- Summary -- Chapter 5: Exploratory coding -- 5.1 Expanding your toolkit -- 5.2 Analyzing car accidents -- 5.3 Getting the code and data -- 5.4 Iteration and your feedback loop -- 5.5 A first pass at understanding your data -- 5.6 Working with a reduced data sample -- 5.7 Prototyping with Excel -- 5.8 Exploratory coding with Node.js -- 5.8.1 Using Nodemon -- 5.8.2 Exploring your data -- 5.8.3 Using Data-Forge -- 5.8.4 Computing the trend column -- 5.8.5 Outputting a new CSV file -- 5.9 Exploratory coding in the browser -- Putting it all together…”
    Libro electrónico
  12. 2592
    Publicado 2021
    Tabla de Contenidos: “…-- 4.3.2 Installing Docker Compose -- 4.3.3 Creating our Docker Compose file -- 4.3.4 Booting our microservices application -- 4.3.5 Working with the application -- 4.3.6 Shutting down the application -- 4.3.7 Can we use Docker Compose for production? …”
    Libro electrónico
  13. 2593
    Publicado 2020
    Tabla de Contenidos: “…3.1 Network services from an attacker's perspective -- 3.1.1 Understanding network service communication -- 3.1.2 Identifying listening network services -- 3.1.3 Network service banners -- 3.2 Port scanning with Nmap -- 3.2.1 Commonly used ports -- 3.2.2 Scanning all 65,536 TCP ports -- 3.2.3 Sorting through NSE script output -- 3.3 Parsing XML output with Ruby -- 3.3.1 Creating protocol-specific target lists -- Summary -- 4 Discovering network vulnerabilities -- 4.1 Understanding vulnerability discovery -- 4.1.1 Following the path of least resistance -- 4.2 Discovering patching vulnerabilities -- 4.2.1 Scanning for MS17-010 Eternal Blue -- 4.3 Discovering authentication vulnerabilities -- 4.3.1 Creating a client-specific password list -- 4.3.2 Brute-forcing local Windows account passwords -- 4.3.3 Brute-forcing MSSQL and MySQL database passwords -- 4.3.4 Brute-forcing VNC passwords -- 4.4 Discovering configuration vulnerabilities -- 4.4.1 Setting up Webshot -- 4.4.2 Analyzing output from Webshot -- 4.4.3 Manually guessing web server passwords -- 4.4.4 Preparing for focused penetration -- Summary -- Phase 3. …”
    Libro electrónico
  14. 2594
    Publicado 2013
    Tabla de Contenidos: “…1.16 Tools -- Summary -- Exercises -- Chapter 2: Preliminaries:Mathematical -- 2.1 Predicates and Boolean Expressions -- 2.2 Control Flow Graph -- 2.2.1 Basic blocks -- 2.2.2 Flow graphs -- 2.2.3 Paths -- 2.2.4 Basis paths -- 2.2.5 Path conditions and domains -- 2.2.6 Domain and computation errors -- 2.2.7 Static code analysis tools and static testing -- 2.3 Execution History -- 2.4 Dominators and Post-Dominators -- 2.5 Program Dependence Graph -- 2.5.1 Data dependence -- 2.5.2 Control dependence -- 2.5.3 Call graph -- 2.6 Strings, Languages, and Regular Expressions -- 2.7 Tools -- Summary -- Exercises -- Part II: Test Generation -- Chapter 3: Domain Partitioning -- 3.1 Introduction -- 3.2 The Test Selection Problem -- 3.3 Equivalence Partitioning -- 3.3.1 Faults targeted -- 3.3.2 Relations -- 3.3.3 Equivalence classes for variables -- 3.3.4 Unidimensional partitioning versus multidimensional partitioning -- 3.3.5 A systematic procedure -- 3.3.6 Test selection -- 3.3.7 Impact of GUI design -- 3.4 Boundary Value Analysis -- 3.5 Category-Partition Method -- 3.5.1 Steps in the category-partition method -- Summary -- Exercises -- Chapter 4: Predicate Analysis -- 4.1 Introduction -- 4.2 Domain Testing -- 4.2.1 Domain errors -- 4.2.2 Border shifts -- 4.2.3 ON-OFF points -- 4.2.4 Undetected errors -- 4.2.5 Coincidental correctness -- 4.2.6 Paths to be tested -- 4.3 Cause-Effect Graphing -- 4.3.1 Notation used in cause-effect graphing -- 4.3.2 Creating cause-effect graphs -- 4.3.3 Decision table from cause-effect graph -- 4.3.4 Heuristics to avoid combinatorial explosion -- 4.3.5 Test generation from a decision table -- 4.4 Tests Using Predicate Syntax -- 4.4.1 A fault model -- 4.4.2 Missing or extra Boolean variable faults -- 4.4.3 Predicate constraints -- 4.4.4 Predicate testing criteria -- 4.4.5 BOR, BRO, and BRE adequate tests…”
    Libro electrónico
  15. 2595
    Publicado 2004
    Tabla de Contenidos: “…Runtime environment -- 4.1 Architecture -- 4.1.1 WebSphere Application Server base components -- 4.1.2 Business Process Execution container -- 4.1.3 Programming Model Extensions -- 4.2 Basic configuration -- 4.2.1 Planning -- 4.2.2 Software requirements -- 4.2.3 Installation -- 4.2.4 Configuration -- 4.3 Distributed configuration -- 4.3.1 Planning -- 4.3.2 Software requirements -- 4.3.3 Installation -- 4.3.4 Configuration -- 4.4 Configuring for scalability -- 4.4.1 Planning -- 4.4.2 Software requirements -- 4.4.3 Installation -- 4.4.4 Configuration -- 4.5 Configuring for high availability -- Chapter 5. …”
    Libro electrónico
  16. 2596
    por Lee, Peter M.
    Publicado 2012
    Tabla de Contenidos: “…3.11.4 Normal mean and variance -- 3.11.5 Technical complications -- 3.12 Exercises on Chapter 3 -- 4 Hypothesis testing -- 4.1 Hypothesis testing -- 4.1.1 Introduction -- 4.1.2 Classical hypothesis testing -- 4.1.3 Difficulties with the classical approach -- 4.1.4 The Bayesian approach -- 4.1.5 Example -- 4.1.6 Comment -- 4.2 One-sided hypothesis tests -- 4.2.1 Definition -- 4.2.2 P-values -- 4.3 Lindley's method -- 4.3.1 A compromise with classical statistics -- 4.3.2 Example -- 4.3.3 Discussion -- 4.4 Point (or sharp) null hypotheses with prior information -- 4.4.1 When are point null hypotheses reasonable? …”
    Libro electrónico
  17. 2597
    Publicado 2022
    Tabla de Contenidos: “…4.1.5 Putting configuring buffering size settings into action -- 4.2 Output formatting options -- 4.2.1 out_file -- 4.2.2 json -- 4.2.3 ltsv -- 4.2.4 csv -- 4.2.5 msgpack -- 4.2.6 Applying formatters -- 4.2.7 Putting JSON formatter configuration into action -- 4.3 Sending log events to MongoDB -- 4.3.1 Deploying MongoDB Fluentd plugin -- 4.3.2 Configuring the Mongo output plugin for Fluentd -- 4.3.3 Putting MongoDB connection configuration strings into action -- 4.4 Actionable log events -- 4.4.1 Actionable log events through service invocation -- 4.4.2 Actionable through user interaction tools -- 4.5 Slack to demonstrate the social output -- 4.5.1 Handling tokens and credentials more carefully -- 4.5.2 Externalizing Slack configuration attributes in action -- 4.6 The right tool for the right job -- Summary -- 5 Routing log events -- 5.1 Reaching multiple outputs by copying -- 5.1.1 Copy by reference or by value -- 5.1.2 Handling errors when copying -- 5.2 Configuration reuse and extension through inclusion -- 5.2.1 Place holding with null output -- 5.2.2 Putting inclusions with a MongoDB output into action -- 5.3 Injecting context into log events -- 5.3.1 Extraction of values -- 5.4 Tag-based routing -- 5.4.1 Using exec output plugin -- 5.4.2 Putting tag naming conventions into action -- 5.4.3 Putting dynamic tagging with extract into action -- 5.5 Tag plugins -- 5.6 Labels: Taking tags to a new level -- 5.6.1 Using a stdout filter to see what is happening -- 5.6.2 Illustrating label and tag routing -- 5.6.3 Connecting pipelines -- 5.6.4 Label sequencing -- 5.6.5 Special labels -- 5.6.6 Putting a common pipeline into action -- Summary -- 6 Filtering and extrapolation -- 6.1 Application of filters -- 6.1.1 All is well events do not need to be distributed -- 6.1.2 Spotting the needle in a haystack -- 6.1.3 False urgency -- 6.1.4 Releveling…”
    Libro electrónico
  18. 2598
    por Brühlmann, Thomas
    Publicado 2023
    Tabla de Contenidos: “…Kapitel 4: Eingänge und Ausgänge -- 4.1 Digitale Eingänge -- 4.1.1 Pin als Eingang setzen -- 4.1.2 Digitalen Eingang lesen -- 4.1.3 Digitalen Eingang entprellen -- 4.1.4 Hohe Eingangssignale -- 4.2 Digitale Ausgänge -- 4.2.1 Ausgang setzen und ausgeben -- 4.2.2 Praxis-Tipp: Status eines Ausgangs lesen -- 4.3 Analoge Welt -- 4.3.1 Analoge Signale einlesen -- 4.3.2 Analoge Signale ausgeben (PWM) -- 4.3.3 Analoge Signale ausgeben (DAC), (nur für Arduino UNO R4) -- 4.4 Serielle Kommunikation -- 4.4.1 Serielle Schnittstelle - Anschluss (nur Arduino UNO R4) -- 4.4.2 Serielle Schnittstelle - Software -- 4.4.3 Schnittstellenerweiterung -- 4.4.4 I2C/2-Wire (Two-Wire) -- 4.5 Drahtlose Kommunikation -- 4.5.1 433-MHz-Kommunikation (nur Arduino UNO R3) -- 4.5.2 Daten übertragen mit RFM12B Transceiver (nur Arduino UNO R3) -- 4.6 Keyboard und Maus mit USB HID (nur Arduino UNO R4) -- 4.6.1 Minikeyboard mit Funktionen -- 4.6.2 Maus-Funktionen -- 4.7 Projekt: Würfel -- Kapitel 5: Sensoren -- 5.1 Sensoren -- 5.1.1 LDR (Fotowiderstand) -- 5.1.2 NTC/PTC -- 5.1.3 Integrierte Temperatursensoren -- 5.1.4 Feuchtesensoren -- 5.1.5 Kombinierte Umweltsensoren -- 5.1.6 Schaltersensoren -- 5.1.7 Abstandssensoren -- 5.1.8 Beschleunigungssensor -- 5.1.9 Kompass -- 5.1.10 Hall-Sensor -- 5.2 Projekt Kompass mit Richtungsanzeige -- 5.3 Projekt Gefrierschrankwächter (nur Arduino UNO R3) -- 5.4 Kontaktloses Fieberthermometer -- Kapitel 6: Aktoren -- 6.1 Relais -- 6.2 Servos -- 6.2.1 Analoge Temperaturanzeige -- 6.2.2 Servos als Motoren für Miniroboter -- 6.3 Motoren -- 6.4 Lasten schalten -- 6.5 Projekt: Roboter mit Wii-Steuerung -- Kapitel 7: Anzeigen -- 7.1 Leuchtdiode (LED) -- 7.1.1 Konstantstromquelle mit Transistor -- 7.1.2 Konstantstromquelle mit Spannungsregler -- 7.1.3 Helligkeit steuern -- 7.1.4 LED als Berührungssensor (nur Arduino UNO R3) -- 7.1.5 Jetzt wird es hell…”
    Libro electrónico
  19. 2599
    Publicado 2025
    Tabla de Contenidos: “…5.6.5.7 Comparison with human performance -- 5.6.5.8 Test of statistical significance -- 5.6.5.9 Execution times -- 5.6.5.10 Keyframe visualization -- 5.7 Summary -- References -- 6 Egocentric video cosummarization -- 6.1 Motivation -- 6.2 Chapter organization -- 6.3 Related work -- 6.4 Proposed methods -- 6.4.1 Shot segmentation -- 6.4.2 Center-surround model -- 6.4.3 Method I: Egocentric video cosummarization with bipartite graph matching and game theory -- 6.4.3.1 A game-theoretic model of visual similarity -- 6.4.3.2 Shot correspondence using bipartite graph matching -- 6.4.4 Method II: Egocentric video cosummarization with random walks on a constrained graph and transfer learning -- 6.4.4.1 Feature extraction using transfer learning -- 6.4.4.2 A video representation graph -- 6.4.4.3 Must-link and cannot-link constraints -- 6.4.4.4 Must-link constrained modified graph -- 6.4.4.5 Shot clustering by random walk with label refinement -- 6.5 Time-complexity analysis -- 6.5.1 Method-I: Time-complexity analysis -- 6.5.2 Method-II: Time-complexity analysis -- 6.6 Experimental results -- 6.6.1 Datasets -- 6.6.2 Performance measures -- 6.6.3 Tuning of the parameters -- 6.6.4 Method-I: Experimental results and analysis -- 6.6.4.1 Ablation study -- 6.6.4.2 Comparisons with other approaches -- 6.6.4.3 Test of statistical significance -- 6.6.4.4 Execution times -- 6.6.5 Method-II: Experimental results and analysis -- 6.6.5.1 Implementation details -- 6.6.5.2 Ablation studies -- 6.6.5.3 Results on short duration videos -- 6.6.5.4 Results on long duration videos -- 6.6.5.5 Comparison with human performance -- 6.6.5.6 Test of statistical significance -- 6.6.5.7 Execution times -- 6.7 Summary -- References -- 7 Action recognition in egocentric video -- 7.1 Motivation -- 7.2 Chapter organization -- 7.3 Related work -- 7.4 Proposed method…”
    Libro electrónico
  20. 2600
    Tabla de Contenidos: “…Documentos en barro: artesanía prehispánica; Página legal; Índice; 1 Cualidades de la cerámica; 1.1 Composición de la arcilla; 1.2 Apariencia del barro; 1.3 Fragilidad; 1.4 Imperecedera; 2 Primeros pasos en el estudio de la cerámica arqueológica; 2.1 Identificación del estilo; 2.2 La ubicación cronológica; 2.3 Termoluminiscencia; 2.4 Entrevista; 3 La decoración; 3.1 Decoración incisa; 3.2 Decoración polícroma; 3.3 Decoración calada y punzonada; 3.4 Decoración modelada o de pastillaje; 4 Etnoarqueología; 4.1 Moldeado; 4.2 Modelado; 4.3 Enrollado; 4.4 Un ejemplo etnográfico…”
    Libro electrónico