Mostrando 1,401 - 1,420 Resultados de 21,342 Para Buscar '"4:3"', tiempo de consulta: 0.85s Limitar resultados
  1. 1401
    por Stamp, Mark
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  2. 1402
    por Akin, Thomas
    Publicado 2002
    Tabla de Contenidos: “…Remote Administration; 3.4.2. Dial-up Access; 3.4.3. VTY Access; 3.4.3.2. SSH; 3.4.3.3. Limiting VTY access by IP; 3.4.3.4. …”
    Libro electrónico
  3. 1403
    Publicado 2006
    Tabla de Contenidos: “…Opening a tarball; 4.3.2. Compiling Open Source Software; 4.3.2.2. make; 4.3.2.3. …”
    Libro electrónico
  4. 1404
    por Litovski, Ivan
    Publicado 2010
    Tabla de Contenidos: “…4.1.1 Query Languages4.1.2 Growth of SQL; 4.2 The Example Database; 4.2.1 Installation; 4.2.2 Running the Examples; 4.3 Syntax; 4.3.1 Commands; 4.3.2 Literals; 4.3.3 Keywords and Identifiers; 4.3.4 Comments; 4.4 Creating a Database; 4.4.1 Creating a Table; 4.4.2 Altering a Table; 4.5 Querying a Database; 4.5.1 Relational Operations; 4.5.2 The Operational Pipeline; 4.5.3 Filtering Rows; 4.5.4 Limiting and Ordering; 4.5.5 Functions and Aggregates; 4.5.6 Grouping; 4.5.7 Removing Duplicates; 4.5.8 Joining Tables; 4.5.9 Column Names and Aliases; 4.5.10 Subqueries; 4.5.11 Compound Queries…”
    Libro electrónico
  5. 1405
    Publicado 2003
    Tabla de Contenidos: “…Klassifizierung der polnischen, ungarischen und tschechischen Regionen im Rahmen eines umfassenden Wohlfahrtsverständnisses 109 -- 4.1 Die Clusteranalyse als Verfahren zur Typisierung von Regionen 111 -- 4.1.1 Ziele der Clusteranalyse . 111 -- 4.1.2 Objekte der Clusteranalyse 112 -- 4.1.3 Klassifizierungsindikatoren . 113 -- 4.1.4 Methode der Clusteranalyse . 115 -- 4.2 Ergebnisse der Clusteranalyse für das Untersuchungsjahr 1996 . 119 -- 4.2.1 Ergebnisüberblick: Geographische und strukturelle Spezifika der vier Cluster . 119 -- 4.2.2 Cluster 1: Die Wachstumsmetropole Prag . 122 -- 4.2.3 Cluster 2: Wachstumsagglomerationen, Altindustrieregionen sowie der gesamte tschechische Wirtschaftsraum 125 -- 4.2.4 Cluster 3: Das Cluster der Gegensätze . 130 -- 4.2.5 Cluster 4: Die östliche Peripherie 135 -- 4.3 Ergebnisse der Clusteranalyse für das Untersuchungsjahr 1999 . 140 -- 4.3.1 Ergebnisüberblick: Geographische und strukturelle Spezifika der vier Cluster . 140 -- 4.3.2 Cluster 1: Die Wachstumsregionen Prag und Mittelungarn 143 -- 4.3.3 Cluster 2: Polnische und ungarische Wachstumspole der zweiten Reihe sowie der gesamte tschechische Wirtschaftsraum . 146 -- 4.3.4 Cluster 3: Die Altindustrieregion Oberschlesien . 151 -- 4.3.5 Cluster 4: Die östliche Peripherie 154 -- 4.4 Zusammenfassung 159 -- 5. …”
    Libro electrónico
  6. 1406
    Publicado 2022
    Tabla de Contenidos: “…Deep NLP -- 4 Textual similarity -- 4.1 The problem -- 4.2 The data -- 4.2.1 Authorship attribution and verification data -- 4.3 Data representation -- 4.3.1 Segmenting documents -- 4.3.2 Word-level information -- 4.3.3 Subword-level information -- 4.4 Models for measuring similarity -- 4.4.1 Authorship attribution -- 4.4.2 Verifying authorship -- Summary -- 5 Sequential NLP -- 5.1 Memory and language -- 5.1.1 The problem: Question Answering -- 5.2 Data and data processing -- 5.3 Question Answering with sequential models -- 5.3.1 RNNs for Question Answering -- 5.3.2 LSTMs for Question Answering…”
    Libro electrónico
  7. 1407
    Publicado 2022
    Tabla de Contenidos: “…Datos espaciales y su representación -- 4.3. Procesos Puntuales Espaciales -- 4.3.1. Análisis de la distribución espacial -- 4.3.2. …”
    Lectura limitada a 1 usuario concurrente.
    Libro electrónico
  8. 1408
    Publicado 2022
    Tabla de Contenidos: “…4.1.3 Design Review Applications -- 4.2 Design Verification and Validation -- 4.2.1 Prototype Processes -- 4.2.2 Processes of Verification and Validation -- 4.2.3 Discussion of Verification and Validation -- 4.3 Concurrent Engineering -- 4.3.1 Principle of Concurrent Engineering -- 4.3.2 Considerations to CE -- 4.4 Variation Considerations -- 4.4.1 Recognition of Variation -- 4.4.2 Target Setting with Variation -- 4.4.3 Propagation of Variation -- 4.4.4 Quality and Variation -- Summary -- Exercises -- References -- 5 Proactive Approaches: Failure Modes and Effects Analysis and Control Plan -- 5.1 Understanding Failure Modes and Effects Analysis -- 5.1.1 Principle of Failure Modes and Effects Analysis -- 5.1.2 FMEA Development -- 5.1.3 Parameters in FMEA -- 5.2 Pre- and Post-work of FMEA -- 5.2.1 Pre-FMEA Analysis -- 5.2.2 FMEA Follow-up -- 5.3 Implementation of FMEA -- 5.3.1 Considerations in FMEA -- 5.3.2 Applications of FMEA -- 5.4 Control Plan -- 5.4.1 Basics of Control Plan -- 5.4.2 Considerations in Control Plan -- 5.4.3 Applications of Control Plan -- Summary -- Exercises -- References -- 6 Supplier Quality Management and Production Part Approval Process -- 6.1 Introduction to Supplier Quality -- 6.1.1 Supplier Quality Overview -- 6.1.2 Supplier Selection and Evaluation -- 6.2 PPAP Standardized Guideline -- 6.2.1 Concept of PPAP -- 6.2.2 PPAP Elements -- 6.2.3 PPAP Packages -- 6.3 PPAP Elements in a Package -- 6.3.1 Essential Element (Level 1) -- 6.3.2 Level 2 Elements -- 6.3.3 Level 3 Elements -- 6.3.4 Unique Requirements (Levels 4 and 5) -- 6.4 Supplier Quality Assurance -- 6.4.1 PPAP Preparation and Approval -- 6.4.2 Customer and Supplier Teamwork -- 6.4.3 Supplier Quality to Service -- Summary -- Exercises -- References -- 7 Special Analyses and Processes -- 7.1 Measurement System Analysis -- 7.1.1 Measurement System…”
    Libro electrónico
  9. 1409
    Publicado 2023
    Tabla de Contenidos: “…5.4 PHY Performance: Simulation Results -- 5.4.1 Sync Field Detection Rate -- 5.4.2 Sync Field Classification Error Rate -- 5.4.3 Sync Field Timing Error -- 5.4.4 Packet Error Rate -- 5.4.5 Effects of Transmit Diversity -- 5.5 Link Budget Comparison -- 5.5.1 Comparison to the 6 Mb/s OFDM PHY -- 5.5.2 Comparison to the 1 Mb/s Non-OFDM PHY -- 5.6 Conclusions -- References -- Chapter 6 Wake-up Radio Medium Access Control -- 6.1 Introduction -- 6.2 Network Discovery -- 6.2.1 General -- 6.2.2 WUR Discovery -- 6.3 Connectivity and Synchronization -- 6.3.1 General -- 6.3.2 WUR Beacon Frame Generation -- 6.3.3 WUR Beacon Frame Processing -- 6.4 Power Management -- 6.4.1 General -- 6.4.1.1 MR Power Management -- 6.4.1.2 WUR Power Management -- 6.4.2 WUR Modes -- 6.4.2.1 WUR Mode Setup -- 6.4.2.2 WUR Mode Update -- 6.4.2.3 WUR Mode Suspend and Resume -- 6.4.2.4 WUR Mode Teardown -- 6.4.3 Duty Cycle Operation -- 6.4.3.1 WUR Duty Cycle Period -- 6.4.3.2 WUR Duty Cycle Service Period -- 6.4.3.3 WUR Duty Cycle Start Time -- 6.4.4 WUR Wake Up Operation -- 6.4.4.1 Individual DL BU Delivery Context -- 6.4.4.2 Group Addressed DL BU Delivery Context -- 6.4.4.3 Critical BSS Update Delivery Context -- 6.4.5 Use of WUR Short Wake-up Frames -- 6.4.6 Keep Alive Frames -- 6.5 Frequency Division Multiple Access -- 6.6 Protected Wake-up Frames -- 6.7 Conclusion -- Chapter 7 Medium Access Control Frame Design -- 7.1 Introduction -- 7.2 Information Elements -- 7.2.1 General -- 7.2.2 Elements Supporting MR Functionalities -- 7.2.2.1 DSSS Parameter Set Element -- 7.2.2.2 EDCA Parameter Set Element -- 7.2.2.3 Channel Switch Announcement Element -- 7.2.2.4 Extended Channel Switch Announcement Element -- 7.2.2.5 HT Operation Element -- 7.2.2.6 VHT Operation Element -- 7.2.2.7 Wide Bandwidth Channel Switch Element -- 7.2.2.8 Channel Switch Wrapper Element…”
    Libro electrónico
  10. 1410
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- PEERING CARRIER ETHERNET NETWORKS -- PEERING CARRIER ETHERNET NETWORKS -- Copyright -- Dedications -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- ABOUT THE AUTHOR -- PREFACE -- About this Book -- Organization of the Book -- Miscellaneous Items -- Audience of the Book -- ACKNOWLEDGMENTS -- GLOSSARY -- 1 - INTRODUCTION -- 1.1 Telephone Networks -- 1.2 Data Networks -- 1.3 Hybrid Fiber-Coaxial Networks -- 1.4 Wireless Networks -- 1.5 Chapter Summary -- 2 - SHAPING OF DATA NETWORKS -- 2.1 Protocols, Models, and Architecture of Data Networks -- 2.2 Convergence in Backhaul -- 2.3 Diversity in Access -- 2.4 Voice as Another Data Application -- 2.5 Chapter Summary -- 3 - THE ETHERNET LANDSCAPE -- 3.1 Ethernet Protocol for Data Link Layer -- 3.2 Evolution of Ethernet -- 3.3 Components of an Ethernet Switch -- 3.4 Emergence of Carrier Ethernet Networks -- 3.5 Chapter Summary -- 4 - CARRIER ETHERNET NETWORKS -- 4.1 Carrier Ethernet-Related Terminology and Architecture -- 4.2 Ethernet Services Framework -- 4.2.1 Ethernet Physical Interface Attribute (Scalability-Related Attributes) -- 4.2.2 Bandwidth Profile Attribute (Traffic Policing-Related Attribute) -- 4.2.3 Performance Attribute (Frame Delay, Frame Delay Variation, and Frame Loss-Related QoS Attributes) -- 4.2.4 Class of Service-Related Attributes (Queuing and Scheduling Related to QoS) -- 4.2.5 Service Frame Delivery Attribute (Unicast, Multicast, Broadcast, and L2CP Related) -- 4.2.6 VLAN Tag Support Attribute (Service Delivery Related) -- 4.2.7 Service Multiplexing Attribute (Service Delivery Related) -- 4.2.8 Bundling Attribute (Service Delivery Related) -- 4.2.9 Security Filters Attribute (Security Related) -- 4.3 Services Defined by Carrier Ethernet -- 4.3.1 EP-Line Service -- 4.3.2 EVP-Line (EVPL) Service -- 4.3.3 EP-LAN -- 4.3.4 EVP-LAN -- 4.3.5 EP-Tree -- 4.3.6 EVP-Tree…”
    Libro electrónico
  11. 1411
    por Smaini, Lydi, 1974-
    Publicado 2012
    Tabla de Contenidos: “…SNR simulations in AWGN channel 3.4 WiFi OFDM and mobile WiMAX signals PAPR 3.5 Transmitter impairments simulation 3.5.1 Introduction 3.5.2 DAC clipping and resolution 3.5.3 I&Q mismatch 3.5.4 RF oscillator phase noise 3.5.5 Power amplifier distortion 3.5.6 Transmitter complete simulation 3.6 Receiver impairments simulation 3.6.1 Introduction 3.6.2 Carrier Frequency Offset 3.6.3 Sampling Frequency Offset 3.6.4 Linearity: IIP2 and IIP3 3.6.5 I&Q mismatch 3.6.6 RF oscillator phase noise and reciprocal mixing 3.6.7 Sampling jitter 3.6.8 ADC clipping and resolution 3.6.9 Receiver complete simulation 3.7 Adaptive modulation illustration 3.8 Summary 4 Chapter 4: Digital Compensation of RF analog Impairments 4.1 Introduction 4.2 Carrier Frequency Offset Estimation and Correction 4.2.1 CFO estimation principle 4.2.2 CFO estimation in time domain 4.2.3 CFO estimation in frequency domain 4.2.4 CFO correction 4.3 Sampling Frequency Offset Estimation and Correction 4.3.1 SFO estimation principle 4.3.2 SFO estimation 4.3.3 SFO correction 4.3.4 Joint SFO and CFO estimation 4.4 IQ mismatch estimation and correction 4.4.1 Principle 4.4.2 Effect of the channel 4.4.3 Simulation results 4.5 Power Amplifier Linearization 4.5.1 Digital Predistortion Principle 4.5.2 Memory polynomial predistortion 4.5.3 Polynomial coefficients computation 4.5.4 Simulation results 4.6 Summary …”
    Libro electrónico
  12. 1412
    por Monson, Philip
    Publicado 2005
    Tabla de Contenidos: “…Document management -- 4.1 Document libraries -- 4.2 Desktop integration -- 4.2.1 Desktop Components installation -- 4.2.2 Using the Desktop Components -- 4.2.3 Working with Microsoft Office applications -- 4.3 Document Manager tasks -- 4.3.1 Documents editing -- 4.3.2 Document versioning -- 4.3.3 Workflow -- 4.3.4 Documents locking -- 4.3.5 Folders and views -- 4.3.6 Document search -- 4.4 Document security -- 4.5 Collaboration and notification -- 4.6 Document conversion…”
    Libro electrónico
  13. 1413
    Publicado 2017
    Tabla de Contenidos: “…3.6.6.1 Transmission lines tour inspection system characteristics -- 3.6.6.2 The advantages of tour inspection system -- References -- 4 Transmission lines detection technology -- 4.1 Faulty Insulator Detection -- 4.1.1 The Characteristics of Faulty Insulators -- 4.1.2 Detection Methods of Faulty Insulators -- 4.1.2.1 Electrical quantity detection methods -- 4.1.2.2 Nonelectric quantity detection method -- 4.2 Voltage Detection in Operation -- 4.2.1 Requirements for Voltage Detector -- 4.2.1.1 Functions and technical requirements of voltage detectors -- 4.2.1.2 Electrical insulation requirements for voltage detectors -- 4.2.2 Methods of Voltage Detection Working -- 4.2.2.1 Direct voltage detection and indirect voltage detection -- 4.2.2.2 Methods and devices of voltage detection -- 4.3 Detection of Grounding Devices -- 4.3.1 Requirements for Grounding Type and Grounding Resistance -- 4.3.1.1 Grounding type -- 4.3.1.2 The main defects of grounding devices -- 4.3.1.3 Requirements for power frequency ground resistance in poles and towers -- 4.3.2 Measurement Methods of Power Frequency of Tower Ground Resistance -- 4.3.2.1 Three-electrode method -- 4.3.2.2 Four-electrode method -- 4.3.2.3 Clamp meter measuring method -- 4.3.3 Notes for Measuring Grounding Resistance and the Operating Maintenance of the Grounding Device -- 4.3.3.1 Notes for measuring grounding resistance -- 4.3.3.2 Operation maintenance for grounding device -- 4.4 Detection of Conductors and Ground Wires and Splicing Fittings -- 4.4.1 Performance Requirements and Heating Reasons for Conductors and Ground Wires and Splicing Fittings -- 4.4.1.1 Performance requirements -- 4.4.1.2 Reasons for temperature increase -- 4.4.1.3 Measures taken -- 4.4.2 Detection Methods -- 4.4.2.1 Ocular estimate method -- 4.4.2.2 Infrared thermal imaging detection method…”
    Libro electrónico
  14. 1414
    por Nartovich, Aleksandr
    Publicado 2004
    Tabla de Contenidos: “…Advanced configuration -- 4.1 Configuring an extended portal instance with the wizard -- 4.1.1 Basic configuration -- 4.1.2 Proxy configuration -- 4.1.3 Securing a portal instance with LDAP -- 4.1.4 Deploying default portlets -- 4.2 Manual configuration -- 4.2.1 Configuration tasks environment -- 4.2.2 Configuration tasks -- 4.2.3 Configuration properties -- 4.2.4 Parent properties files -- 4.2.5 Configuration templates -- 4.2.6 Creating stream files -- 4.3 Configuration tasks reference -- 4.3.1 Overview of configuration tasks -- 4.3.2 Startup tasks -- 4.3.3 HTTP server tasks -- 4.3.4 General purpose tasks -- 4.3.5 Portlet tasks -- 4.3.6 Security tasks -- 4.3.7 Setup tasks -- 4.3.8 Database tasks -- 4.3.9 Validation tasks -- 4.3.10 Lotus configuration tasks -- 4.4 Configuration scenarios -- 4.4.1 Scenario 1: Configuring a manual instance -- 4.4.2 Scenario 2: Configuring an external HTTP server -- 4.4.3 Scenario 3: Configuring security using LDAP for authentication -- Chapter 5. …”
    Libro electrónico
  15. 1415
    por Monson, Philip
    Publicado 2005
    Tabla de Contenidos: “…4.2 Configuring Workplace Collaboration Services security -- 4.2.1 LDAP security overview -- 4.2.2 Configuration Wizard: Disabling WebSphere Member Manager CUR security -- 4.2.3 Required user accounts for enabling Workplace Collaboration Services external LDAP security -- 4.2.4 Editing the security helper files -- 4.2.5 Enabling external LDAP security -- 4.2.6 Verifying the security configuration -- 4.2.7 (Optional) Configuring read-only LDAP access for Tivoli Directory Server and Domino -- 4.3 Configuring the Workplace Collaboration Services data store -- 4.3.1 Overview: The Workplace Collaboration Services data store -- 4.3.2 What you need -- 4.3.3 Installing the DB2 Administration Client software -- 4.3.4 Installing Fix Pack 7a for the DB2 Administration Client -- 4.3.5 Installing DB2 UDB Enterprise Server Edition on a remote server -- 4.3.6 Creating and configuring the Workplace Collaboration Services database -- 4.3.7 Details: DB2 database creation and configuration -- 4.3.8 Transferring WebSphere Portal data from Cloudscape to DB2 -- 4.3.9 Migrating Workplace Collaboration Services data to DB2 -- 4.3.10 Running reorgchk for performance -- 4.3.11 Verifying Workplace Collaboration Services deployment status after data store configuration -- 4.4 Running Workplace Collaboration Services configuration script to connect to external HTTP server -- 4.4.1 Installing IBM HTTP Server -- 4.4.2 Configuring IBM HTTP Server -- 4.4.3 Connecting Workplace Collaboration Services to the external HTTP server -- 4.4.4 Updating the WebSphere Application Server plug-in -- 4.4.5 Configuring Collaborative Learning for external HTTP -- 4.4.6 Verifying the Workplace Collaboration Services deployment with remote HTTP -- 4.5 Next steps -- Chapter 5. …”
    Libro electrónico
  16. 1416
    Publicado 2003
    Tabla de Contenidos:
    Libro electrónico
  17. 1417
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  18. 1418
    Publicado 2023
    Tabla de Contenidos: “…Kovasznay flow -- 5.4 Implementation -- 5.4.1 Data structures and performance implications -- 5.4.2 Matrix and matrix-free implicit solvers -- 5.4.3 Unstructured grid filtering for LES -- 5.4.3.1 Face-based filtering -- 5.4.3.2 Derivative-based filter -- 5.4.3.3 Generalized top-hat filter -- 5.4.3.4 Function based filter -- 5.5 Scale resolving turbulence simulations -- References -- 6 Finite difference methods for turbulence simulations -- 6.1 Introduction -- 6.2 Grid topologies -- 6.2.1 Navier-Stokes equations in curvilinear coordinates -- 6.2.1.1 Conservation laws on curvilinear grids -- 6.2.1.2 The geometric conservation constraint -- 6.2.2 Cartesian octree topologies -- 6.2.3 Numerical considerations for abrupt grid changes -- 6.3 Grid staggering and flux evaluations -- 6.3.1 Primitive variable placement -- 6.3.2 Staggered flux evaluations in collocated variable formulation -- 6.4 Robustness of inviscid flux discretization -- 6.4.1 Linear schemes -- 6.4.1.1 Kinetic energy preservation and entropy consistency -- 6.4.2 Flows with discontinuities -- 6.4.2.1 Nonlinear schemes: WENO interpolation and WCNS -- 6.4.2.2 Artificial dissipation -- 6.5 Finite difference schemes for LES: dispersion/dissipation errors -- 6.5.1 Are low-dispersion error schemes relevant for LES in turbulence-dominated flows? …”
    Libro electrónico
  19. 1419
    Publicado 2024
    Tabla de Contenidos: “…2.5.1 Land Cover Classification -- 2.5.2 Vegetation Monitoring -- 2.5.3 Urban Land-Use Classification -- 2.5.4 HSI Remote Sensing -- 2.6 Challenges for Deep Learning Methods for RS Image Processing -- 2.6.1 High Spatial and Spectral Variability -- 2.6.2 Limited Annotated Data -- 2.6.3 Class Imbalance -- 2.6.4 Intra-Class Variability -- 2.6.5 Spectral Mixing and Shadow Effects -- 2.6.6 Sensor Noise and Atmospheric Interference -- 2.6.7 Computational Complexity -- 2.6.8 Adaptability and Generalization -- 2.7 Limitations -- 2.7.1 Dependence on Image Quality -- 2.7.2 Temporal Variability -- 2.7.3 Generalization and Transferability -- 2.7.4 Scalability -- 2.7.5 Interpretability -- 2.7.6 Labeling Challenges -- 2.7.7 Privacy Concerns -- 2.7.8 Legal and Policy Constraints -- 2.8 Conclusion -- 2.8.1 Future Work -- Funding -- References -- Chapter 3 Deep Learning Framework for Face Detection and Recognition for Dark Faces Using VGG19 with Variant of Histogram Equalization -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Material and Techniques -- 3.3.1 Convolutional Neural Network -- 3.3.2 Histogram Equalization -- 3.3.3 Data Set -- 3.3.4 Proposed Framework -- 3.4 Experiment and Results -- 3.4.1 Evaluation Parameter -- 3.4.2 Experimental Setup -- 3.4.3 Results and Analysis -- 3.5 Conclusion -- References -- Chapter 4 A 3D Method for Combining Geometric Verification and Volume Reconstruction in a Photo Tourism System -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Method -- 4.3.1 Processing -- 4.3.2 Feature Extraction -- 4.3.3 Feature Matching -- 4.3.4 Geometric Verification -- 4.3.5 Volumetric Reconstruction -- 4.3.6 Triangulation -- 4.3.7 Bundle Adjustment -- 4.4 Experiments -- 4.4.1 Data Set Description -- 4.5 Results and Analysis -- 4.6 Conclusion -- Acknowledgments -- References…”
    Libro electrónico
  20. 1420
    Publicado 1970
    Tabla de Contenidos: “…Mechanical engineering (1970; XXXIV, 760 páginas) -- V.4/3. Civil engineering and nautics (1971; LVII, 931 páginas) -- V.5/2 Spagyrical discovery and invention: magisteries of gold and immortality (1974; XXXII, 510 páginas)…”
    Libro