Mostrando 1,861 - 1,880 Resultados de 21,342 Para Buscar '"4:3"', tiempo de consulta: 0.77s Limitar resultados
  1. 1861
    Publicado 2025
    Tabla de Contenidos: “…2.6.1 Use of Texture and Context -- 2.6.2 Using Ancillary Multisource Data -- 2.7 Epilogue -- References -- Chapter 3 Dimensionality Reduction: Feature Extraction and Selection -- 3.1 Feature Extraction -- 3.1.1 Principal Component Analysis -- 3.1.2 Minimum/Maximum Autocorrelation Factors -- 3.1.3 Maximum Noise Fraction (MNF) Transformation -- 3.1.4 Independent Component Analysis -- 3.1.5 Projection Pursuit -- 3.2 Feature Selection -- 3.2.1 Greedy Search Methods -- 3.2.2 Simulated Annealing -- 3.2.3 Separability Indices -- 3.2.4 Filter-Based Methods -- 3.2.4.1 Correlation-Based Feature Selection -- 3.2.4.2 Information Gain -- 3.2.4.3 Gini Impurity Index -- 3.2.4.4 Minimum Redundancy-Maximum Relevance -- 3.2.4.5 Chi-Square Test -- 3.2.4.6 Relief-F -- 3.2.4.7 Symmetric Uncertainty -- 3.2.4.8 Fisher's Test -- 3.2.4.9 OneR -- 3.2.5 Wrappers -- 3.2.5.1 Genetic Algorithm -- 3.2.5.2 Particle Swarm Optimization -- 3.2.5.3 Feature Selection with SVMs -- 3.2.6 Embedded Methods -- 3.2.6.1 K-Nearest Neighbor-Based Feature Selection -- 3.2.6.2 Feature Selection with Ensemble Learners -- 3.2.6.3 Hilbert-Schmidt Independence Criterion with Lasso -- 3.3 Concluding Remarks -- References -- Chapter 4 Multisource Image Fusion and Classification -- 4.1 Image Fusion -- 4.1.1 Image Fusion Methods -- 4.1.1.1 PCA-Based Image Fusion -- 4.1.1.2 IHS-Based Image Fusion -- 4.1.1.3 Brovey Transform -- 4.1.1.4 Gram-Schmidt Transform -- 4.1.1.5 Wavelet Transform -- 4.1.1.6 Deep Learning for Image Fusion -- 4.1.2 Assessment of Fused Image Quality -- 4.1.3 Performance Evaluation of Fusion Methods -- 4.2 Multisource Classification Using the Stacked-Vector Method -- 4.3 The Extension of Bayesian Classification Theory -- 4.3.1 An Overview -- 4.3.1.1 Feature Extraction -- 4.3.1.2 Probability or Evidence Generation -- 4.3.1.3 Multisource Consensus…”
    Libro electrónico
  2. 1862
    Publicado 2020
    Tabla de Contenidos: “…2.7.3 ASK smart contract deployment and testing -- 2.8 Smart contract design considerations -- 2.9 Best practices -- 2.10 Summary -- 3 Techniques for trust and integrity -- 3.1 Essentials of trust and integrity -- 3.1.1 Trust -- 3.1.2 Integrity -- 3.2 Digital democracy problem -- 3.2.1 Designing a solution -- 3.2.2 Use case diagram -- 3.2.3 Incremental development of code -- 3.2.4 Users, assets, and transactions -- 3.2.5 Finite state machine diagram -- 3.2.6 Trust intermediation -- 3.2.7 Defining and using modifiers -- 3.2.8 Contract diagram including modifiers -- 3.2.9 Putting it all together -- 3.3 Testing -- 3.3.1 Positive tests -- 3.3.2 Negative tests -- 3.4 Using modifiers, require(), and revert() -- 3.5 Assert() declarations -- 3.6 Best practices -- 3.7 Retrospective -- 3.8 Summary -- 4 From smart contracts to Dapps -- 4.1 Dapp development using Truffle -- 4.1.1 The development process -- 4.1.2 Installing Truffle -- 4.1.3 Building the Dapp stack -- 4.2 Install Ganache test chain -- 4.3 Develop the smart contract -- 4.3.1 Create a project folder -- 4.3.2 Add smart contract and compile -- 4.3.3 Configure blockchain network -- 4.3.4 Deploy the smart contract -- 4.4 Develop and configure the web application -- 4.4.1 Develop ballot-app -- 4.4.2 Launch the ballot-app -- 4.4.3 Install MetaMask wallet -- 4.4.4 Interact with Ballot-Dapp -- 4.4.5 Connect web client to smart contract -- 4.5 Retrospective -- 4.6 Best practices -- 4.7 Summary -- Part 2. …”
    Libro electrónico
  3. 1863
    por Amberg, Eric
    Publicado 2024
    Tabla de Contenidos: “…4.2.1 Grundlagen - so arbeiten Proxys -- 4.2.2 Einen Proxy-Server nutzen -- 4.2.3 Öffentliche Proxys in der Praxis -- 4.2.4 Vor- und Nachteile von Proxy-Servern -- 4.2.5 Proxy-Verwaltung mit FoxyProxy -- 4.3 VPN, SSH und Socks - so bleiben Black Hats anonym -- 4.3.1 Virtual Private Networks (VPN) -- 4.3.2 SSH-Tunnel -- 4.3.3 SOCKS-Proxy -- 4.3.4 Kaskadierung für höchste Anonymität und Vertraulichkeit -- 4.3.5 Proxifier - Für unwillige Programme -- 4.4 Deep Web und Darknet - im Untergrund unterwegs -- 4.4.1 Wo geht es bitte zum Untergrund? …”
    Libro electrónico
  4. 1864
    Publicado 2023
    Tabla de Contenidos: “…Review of Medical Drones in Healthcare Applications -- 4.1 Introduction -- 4.1.1 IoD-Internet of Drones -- 4.1.2 Drones in Health Care -- 4.2 Internet of Medical Drone (IoMD) in Health Care -- 4.3 Architecture of Healthcare IoMD -- 4.3.1 Data Collection Phase -- 4.3.2 Data Reporting Phase -- 4.3.3 Data Processing Phase -- 4.3.4 Tools and Technologies of IoMD -- 4.4 Applications of IoMD Healthcare System -- 4.4.1 Search and Rescue -- 4.4.2 Transport and Delivery -- 4.4.3 Medical Care -- 4.5 Usage of IoMD for Health Care -- 4.5.1 Drone Functions to Combat COVID-19 in India -- 4.5.1.1 Surveillance and Lockdown Enforcement -- 4.5.1.2 Public Broadcast -- 4.5.1.3 Monitoring Body Temperatures -- 4.5.1.4 Medical and Emergency Food Supplies Delivery -- 4.5.1.5 Surveying and Mapping -- 4.5.1.6 Spraying Disinfectants -- 4.6 Recent Technologies in Healthcare IoMD -- 4.6.1 IoMDs -- 4.6.2 Cloud/Edge Computing -- 4.6.3 Internet Protocols -- 4.6.4 Artificial Intelligence -- 4.6.5 Blockchain -- 4.7 Challenges and Open Issues for Future Research -- 4.7.1 Challenges in IoMD for Healthcare Services -- 4.7.1.1 Adoption of IoMD…”
    Libro electrónico
  5. 1865
    Publicado 2011
    Tabla de Contenidos: “…Características de la narración4.3. Cultura y narraciones; 4.4. Narración: ¿vestimenta o construcción?…”
    Libro electrónico
  6. 1866
    por Basulto Santos, Jesus
    Publicado 2012
    Tabla de Contenidos: “…LOS CÁLCULOS DE LODEWIJK; 4.3. LA CONTRIBUCIÓN DE CHRISTIAAN HUYGENS: "ESPERANZA" vs."…”
    Libro electrónico
  7. 1867
    Publicado 1999
    Tabla de Contenidos: “…Direktinvestitionen als Reaktion auf Konkurrenzverhalten; 4.3. Direktinvestitionen zur Internalisierung von Markttransaktionen; 5. …”
    Libro electrónico
  8. 1868
    Publicado 2004
    Tabla de Contenidos: “…Systems Management -- 4.1 Overall Availability Management processes -- 4.1.1 Develop availability practices -- 4.1.2 Develop standards -- 4.2 Service Level Management -- 4.2.1 Business requirements -- 4.2.2 Negotiating objectives -- 4.2.3 Documenting agreements - Managing expectations -- 4.2.4 Building infrastructure - Technical and support -- 4.2.5 Measuring availability -- 4.2.6 Track and report availability -- 4.2.7 Customer satisfaction -- 4.3 Change Management -- 4.3.1 Develop and prepare change -- 4.3.2 Assess and minimize risk -- 4.3.3 Testing -- 4.3.4 Back-out planning -- 4.3.5 Verify change readiness -- 4.3.6 Schedule change -- 4.3.7 Communicate change -- 4.3.8 Implement and document -- 4.3.9 Change record content -- 4.3.10 Review quality -- 4.4 Organization -- 4.4.1 Skills -- 4.4.2 Help desk activities -- 4.4.3 Operations -- 4.4.4 Automation -- 4.4.5 Application testing -- 4.4.6 Passive and active monitoring -- 4.5 Recovery Management -- 4.5.1 Terminology -- 4.5.2 Recovery potential initiatives -- 4.5.3 Recovery Management activities -- 4.5.4 Event Management -- 4.5.5 Incident Management -- 4.5.6 Crisis Management -- 4.6 Problem Management -- 4.6.1 Data tracking and reporting -- 4.6.2 Causal analysis -- 4.6.3 Maintenance policies -- 4.7 Performance Management -- 4.8 Capacity planning -- 4.9 Security Management -- 4.9.1 Security policy -- 4.9.2 Physical security -- 4.10 Configuration Management -- 4.10.1 Component Failure Impact Analysis -- 4.11 Enterprise architecture -- 4.11.1 Infrastructure simplification -- 4.11.2 Ideal mainframe implementations -- 4.11.3 Ideal BladeCenter implementation…”
    Libro electrónico
  9. 1869
    por Warrick, Cathy
    Publicado 2005
    Tabla de Contenidos: “…Planning and monitoring tools -- 4.1 Disk Magic -- 4.1.1 Overview and characteristics -- 4.1.2 Output information -- 4.1.3 Disk Magic modeling -- 4.1.4 Disk Magic for zSeries -- 4.1.5 Disk Magic for open systems -- 4.1.6 Workload growth projection -- 4.1.7 Input data needed for DIsk Magic study -- 4.2 Capacity Magic -- 4.2.1 Overview and features -- 4.2.2 Wizard -- 4.2.3 Graphical interface -- 4.2.4 Reports -- 4.2.5 Examples -- 4.3 IBM TotalStorage Productivity Center for Disk -- 4.3.1 IBM TotalStorage Productivity Center -- 4.3.2 IBM TotalStorage Productivity Center for Disk -- 4.3.3 Operation characteristics -- 4.3.4 Using IBM TotalStorage Productivity Center for Disk -- 4.3.5 Exploiting gauges -- 4.3.6 Interpreting the DS6000 performance -- 4.3.7 Performance gauge - considerations -- 4.3.8 IBM TotalStorage Productivity Center for Disk and other tools -- 4.3.9 IBM TotalStorage Productivity Center for Disk in mixed environment -- 4.4 SAN statistics -- 4.5 Monitoring performance through a SAN switch or director -- Chapter 5. …”
    Libro electrónico
  10. 1870
    por Kahate, Atul
    Publicado 2004
    Tabla de Contenidos: “…-- 4.3.3 First Normal Form (1NF) -- 4.3.4 Second Normal Form (2NF) -- 4.3.5 Third Normal Form (3NF) -- 4.3.6 Boyce-Codd Normal Form (BCNF) -- 4.3.7 Fourth Normal Form (4NF) -- 4.3.8 Fifth Normal Form (5NF)…”
    Libro electrónico
  11. 1871
    Publicado 2018
    Tabla de Contenidos: “…6.3 Centralized DR Approaches 124 -- 6.3.1 Minimize Peak-to-Average Ratio 124 -- 6.3.2 Minimize Total Cost of Power Generation 125 -- 6.4 GameTheoretical Approaches 128 -- 6.4.1 Formulated Game 128 -- 6.4.2 GameTheoretical Approach 1: Locally Computed Smart Pricing 129 -- 6.4.3 GameTheoretical Approach 2: Semifixed Smart Pricing 131 -- 6.4.4 Mixed Approach: Mixed GA1 and GA2 132 -- 6.5 Precision and Truthfulness of the Proposed DR System 132 -- 6.6 Numerical and Simulation Results 132 -- 6.6.1 Settings 132 -- 6.6.2 Comparison of 1, 2 and GA1 135 -- 6.6.3 Comparison of Different Distributed Approaches 136 -- 6.6.4 The Impact from Energy Storage Unit 141 -- 6.6.5 The Impact from Increasing Renewable Energy 143 -- 6.7 Summary 145 -- 7 Intelligent Charging for Electric Vehicles-Scheduling in Battery Exchanges Stations 147 -- 7.1 Background and RelatedWork 147 -- 7.1.1 Background and Overview 147 -- 7.1.2 RelatedWork 149 -- 7.2 System Model 150 -- 7.2.1 Overview of the Studied System 150 -- 7.2.2 Mathematical Formulation 151 -- 7.2.3 Customer Estimation 152 -- 7.3 Load Scheduling Schemes for BESs 154 -- 7.3.1 Constraints for a BES si 154 -- 7.3.2 Minimizing PAR: Problem Formulation and Analysis 156 -- 7.3.3 Problem Formulation and Analysis for Minimizing Costs 156 -- 7.3.4 GameTheoretical Approach 159 -- 7.4 Simulation Analysis and Results 161 -- 7.4.1 Settings for the Simulations 161 -- 7.4.2 Impact of the Proposed DSM on PAR 163 -- 7.4.3 Evaluation of BESs Equipment Settings 164 -- 7.4.3.1 Number of Charging Ports 164 -- 7.4.3.2 Maximum Number of Fully Charged Batteries 164 -- 7.4.3.3 Preparation at the Beginning of Each Day 165 -- 7.4.3.4 Impact on PAR from BESs 166 -- 7.4.4 Evaluations of the GameTheoretical Approach 167 -- 7.5 Summary 169 -- 8 Big Data Analytics and Cloud Computing in the Smart Grid 171 -- 8.1 Background and Motivation 171 -- 8.1.1 Big Data Era 171 -- 8.1.2 The Smart Grid and Big Data 173 -- 8.2 Pricing and Energy Forecasts in Demand Response 174.…”
    Libro electrónico
  12. 1872
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…6.3.5 Creation of Timeline of Activity -- 6.3.5.1 Plaso -- 6.3.5.2 Volatility 3 Timeline -- 6.3.5.3 Creating a Super Timeline -- 6.4 Evidence Location -- 6.4.1 System Information -- 6.4.1.1 Time Zone Information -- 6.4.1.2 Network Interfaces -- 6.4.2 Account Usage -- 6.4.2.1 SAM Accounts -- 6.4.2.2 Security Events -- 6.4.2.3 Dead Box Password Cracking -- 6.4.2.4 User Access Logging -- 6.4.3 User Activity -- 6.4.3.1 Search History -- 6.4.3.2 Typed Path -- 6.4.3.3 LastVisitedMRU (Windows common dialog box) -- 6.4.3.4 XP Search -- 6.4.3.5 Thumbnails -- 6.4.3.6 Remote Desktop Protocol (RDP) -- 6.4.4 File or Folder Opening -- 6.4.4.1 Recent Files -- 6.4.4.2 Shortcut (.LNK) Files -- 6.4.4.3 Office Recent Files -- 6.4.4.4 Shellbag -- 6.4.4.5 Open/Save MRU -- 6.4.5 Program and File Execution -- 6.4.5.1 UserAssist -- 6.4.5.2 MUICache -- 6.4.5.3 Windows 10 Timeline -- 6.4.5.4 BAM and DAM -- 6.4.5.5 Amcache.hve -- 6.4.5.6 Jump List -- 6.4.5.7 Last‐Visited MRU -- 6.4.5.8 RecentApp -- 6.4.5.9 Prefetch -- 6.4.5.10 LastVisitedMRU -- 6.4.5.11 Taskbar Feature Usage -- 6.4.5.12 CapabilityAccessManager -- 6.4.5.13 RUN Box Execution -- 6.4.6 External Device/USB Usage -- 6.4.6.1 USB Device Types -- 6.4.6.2 Plugged in USB -- 6.4.6.3 Setupapi -- 6.4.6.4 Plug‐and‐Play Cleanup -- 6.4.6.5 PnP Events -- 6.4.6.6 MTP Device -- 6.4.6.7 User USB Device -- 6.4.6.8 Removable Devices Logs -- 6.4.7 Network Activity Artifacts -- 6.4.7.1 Network Mapping -- 6.4.7.2 Network History -- 6.4.7.3 Network Profiles Key -- 6.4.7.4 IP Address -- 6.4.8 Commands -- 6.4.8.1 Powershell History -- 6.4.8.2 WMI -- 6.4.8.3 WMI Database -- 6.4.8.4 Command Line Event Log -- 6.4.8.5 WMI Event Log -- 6.4.9 Browser Usage Artifacts -- 6.4.9.1 Account Records -- 6.4.9.2 Cookies -- 6.4.9.3 History -- 6.4.9.4 Cache -- 6.4.9.5 Internet Explorer -- 6.4.9.6 Browser Download Manager -- 6.4.9.7 Session Restore…”
    Libro electrónico
  13. 1873
    por García, Isaac
    Publicado 2011
    Tabla de Contenidos: “…Resumen de teorı́a; 4.2. Problemas resueltos; 4.3. Problemas propuestos; Capıtulo 5; 5.1. Resumen de teorıa; 5.2. …”
    Libro electrónico
  14. 1874
    por Vázquez Conde, Rosalino
    Publicado 2014
    Tabla de Contenidos: “…Temas selectos de biología II ; Página legal; Contenido; Presentación; Unidad 1; 1.1 Biodiverdidad en méxico; 1.2 Técnicas de estudio de la biodiversidad; Unidad 2; 2.1 Origen de las plantas; 2.2 Transporte y nutrición; 2.3 Reproducción; 2.4 Coodinación celular; 2.5 Plantas medicinales; 2.6 Características de los hongos; Unidad 3; 3.1 Evolución de los animales; 3.2 Características básicas de los principales grupos de animales; 3.3 Importancia ecológica y socioeconómica de los animales; Unidad 4; 4.1 Tipos de conducta; 4.2 Respuestas al ambiente; 4.3 Sociobiología; 4.4 Especies en peligro…”
    Libro electrónico
  15. 1875
    Tabla de Contenidos: “….); 2.4 Evidencia nahua en el Occidente; 3 Piezas arqueológicas; 3.1 Cerámica; 3.2 La metalurgia; 3.3 Objetos de concha; 3.4 Escultura en piedra; 4 La muerte en el occidente de México; 4.1 Prácticas mortuorias prehispánicas; 4.2 Tumbas de tiro; 4.3 Ofrendas; Glosario; Bibliografía; Selección de Piezas…”
    Libro electrónico
  16. 1876
    por Nikolaevna Ledeneva, Yulia
    Publicado 2013
    Tabla de Contenidos: “…Automatic text summarization with maximal frequent sequences -- Página legal -- Índice -- Abstract -- Resumen -- Introduction -- Chapter I -- I.1 Computational -- I.2 Text summarization -- I.3 Extractive text summarization -- I.4 Abstractive text summarization -- I.5 Applications of text -- I.6 Research problem -- Chapter II -- II.1 Text pre-processing -- II.2 Text representation -- II.3 Graph algorithms -- II.4 Genetic algorithms -- II.5 Clustering -- Chapter III -- III.1 Definitions -- III.2 New method using maximal -- III.3 New method using graph -- III.5 New method using clustering -- Chapter IV -- IV.1 Experimental -- IV.2 Experimental -- IV.3 Experimental -- Conclusions -- References -- Appendices…”
    Libro electrónico
  17. 1877
    por Navas Castillo, Antonia
    Publicado 2005
    Tabla de Contenidos: “…Origen y evolución de la Unión Europea; 4.3. La integración de España en la Unión Europea…”
    Libro electrónico
  18. 1878
    Publicado 2017
    Tabla de Contenidos: “…La ciclovía educa al ciudadano -- CAPÍTULO 4 -- 4.1 Bogotá -- 4.2 Incentivo a la bicicleta -- 4.3 Ciclovía -- 4.4 Resistencias y sujeciones -- CONCLUSIONES -- REFERENCIAS BIBLIOGRÁFICAS…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  19. 1879
    por Teniente López, Ernest
    Publicado 2003
    Tabla de Contenidos: “…Object Constraint Language; 4.3. Modelo de casos de uso en UML; 4.4. Modelo del comportamiento en UML; 4.5 Modelo de los estados en UML; 5 El proceso unificado de desarrollo de software; 6 Colección de ejercicios…”
    Enlace del recurso
    Libro electrónico
  20. 1880
    Publicado 2021
    Tabla de Contenidos: “…ANÁLISIS Y EVALUACIÓN DE LA EDUCACIÓN FINANCIERA EN BOYACÁ -- PÁGINA LEGAL -- TABLA DE CONTENIDOS -- INTRODUCCIÓN -- METODOLOGÍA -- 2.1 INTRODUCCIÓN -- 2.2 MÉTODO -- 2.3 PARTICIPANTES -- 2.4 INSTRUMENTOS -- 2.5 PROCEDIMIENTO -- EDUCACIÓN FINANCIERA -- 3.1 INTRODUCCIÓN -- 3.2 MARCO DE REFERENCIA -- 3.3 RESULTADOS -- 3.4 CONCLUSIONES -- HÁBITOS FINANCIEROS -- 4.1 INTRODUCCIÓN -- 4.3 DISTRIBUCIÓN DEL INGRESO -- 4.4 MEDIOS DE FINANCIAMIENTO -- 4.6 CONCLUSIONES -- PRODUCTOS FINANCIEROS -- 5.1 INTRODUCCIÓN -- 5.2 MARCO REFERENCIAL -- 5.3 RESULTADOS -- 5.4 CONCLUSIONES -- EVALUACIÓN DE LA EDUCACIÓN FINANCIERA -- 6.1 INTRODUCCIÓN -- 6.2 MARCO DE REFERENCIA -- 6.4 CONCLUSIONES -- CONCLUSIONES Y RECOMENDACIONES -- ANEXOS…”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico