Mostrando 7,121 - 7,140 Resultados de 11,577 Para Buscar '"Adaptation"', tiempo de consulta: 0.13s Limitar resultados
  1. 7121
    Publicado 2022
    Tabla de Contenidos: “…Controllable Launch Parameters -- Going Places and Crashing EVERYWHERE -- Supporting Input Controls -- Showing Game Information with the GUI -- Summary -- Chapter 7: Processing Route Data -- Technical requirements -- A Detour into Particle Systems -- The Disparate Particle Systems of Babylon.js -- Loading Particle Systems From Saved Data -- Adapting the Sun Particle System Set -- Marking Out the Route -- Defining the Encounter Zone -- Encounters Overview -- Encounter Zones and Encounter Tables -- Tracking Intersections -- Encounter Zones and Game Data -- Selecting Encounters -- Summing the Probabilities -- Populating CMDF Results -- Rolling an Encounter Check -- Listening for Encounters -- Adding Encounter Visuals -- Putting 2D Labels into 3D Space -- Animating the Encounter Panel -- Clearing Encounter Panels -- Summary -- Extended Topics -- Chapter 8: Building the Driving Game -- Technical Requirements -- Prototyping the Driving Phase -- Playground Overview -- Generating the Driving Path -- Loading Assets Asynchronously -- Initializing the Driving Phase Scene -- Running the Update Loop -- Integrating with the Application -- Splitting Up the Playground -- Transitioning to the Driving Screen -- Truck Update and Input Controls -- Patching the input map -- Adding Encounters -- Making the Mini-Map -- The GUI Camera -- Blip Plotting in Polar Coordinates -- Summary -- Extended Topics -- Chapter 9: Calculating and Displaying Scoring Results -- Technical Requirements -- Introducing the Babylon.js GUI Editor -- The Advanced Dynamic Texture -- UI Design with the GUIE -- Integration with the GUIE -- Building a Reusable Dialog Box Component -- Constructing the DialogBox Class -- Handling Button Clicks and Changing Visibility -- Prompting Users after Successful Route Planning -- Calculating Scores -- Scoring System Design -- Adding Up and Tallying Scores…”
    Libro electrónico
  2. 7122
    Publicado 2022
    Tabla de Contenidos: “…Tools and Libraries for SPFx -- Node.js -- NPM -- Gulp -- Yeoman -- Yeoman SPFx Generator -- TypeScript -- Visual Studio Code -- Extensibility with Web Parts -- Extensibility with Application Customizers -- Extensibility with Adaptive Card Extensions -- Scaffold SPFx Solution for ACE -- ACE Class (Base Class) -- Card View -- Quick View -- Deploy the Solution -- Conclusion -- Chapter 12: Set Up a Governance Strategy -- The Need for Governance -- Governance for a SharePoint Intranet -- Vision -- Information Architecture -- Policies -- Site Creation -- Navigation and Search -- Branding -- Custom Development and Deployment -- Feedback -- Training -- Measure the Success -- Governance Checklist for Home Site -- Stay on Top of Changes -- Microsoft 365 Roadmap -- Message Center in Microsoft 365 -- Conclusion -- Index…”
    Libro electrónico
  3. 7123
    Publicado 2022
    Tabla de Contenidos: “…Diamond model of intrusion analysis framework -- How it works -- Use case - Diamond model of intrusion analysis -- Integrating the Diamond model into intelligence projects -- Benefits of the Diamond model -- Summary -- Chapter 4: Cyber Threat Intelligence Tradecraft and Standards -- Technical requirements -- The baseline of intelligence analytic tradecraft -- Note 1 - Addressing CTI consumers' interests -- Note 2 - Access and credibility -- Note 3 - Articulation of assumptions -- Note 4 - Outlook -- Note 5 - Facts and sourcing -- Note 6 - Analytic expertise -- Note 7 - Effective summary -- Note 8 - Implementation analysis -- Note 9 - Conclusions -- Note 10 - Tradecraft and counterintelligence -- Understanding and adapting ICD 203 to CTI -- Understanding the STIX standard -- Using STIX for cyber threat analysis -- Specifying threat indicator patterns using STIX -- Using the STIX standard for threat response management -- Threat intelligence information sharing -- Understanding the STIX v2 standard -- Understanding the TAXII standard -- How TAXII standard works -- AFI14-133 tradecraft standard for CTI -- Analytic skills and tradecraft -- Additional topics covered in AFI14-133 -- Summary -- Chapter 5: Goal Setting, Procedures for CTI Strategy, and Practical Use Cases -- Technical requirements -- The threat intelligence strategy map and goal setting -- Objective 1 - Facilitate and support real-time security operations -- Objective 2 - Facilitate an effective response to cyber threats -- Objective 3 - Facilitate and support the proactive tracking of cyber threats -- Objective 4 - Facilitate and support the updating and implementation of security governance -- TIPs - an overview -- Commercial TIPs -- Open-source TIPs -- Case study 1 - CTI for Level 1 organizations -- Objective -- Strategy -- Example -- Case study 2 - CTI for Level 2 organizations…”
    Libro electrónico
  4. 7124
    Tabla de Contenidos: “…Craig Swanson Assessment of Damage and Adaptation Strategies for Structures and Infrastructure from Storm Surge and Sea Level Rise for a Coastal Community in Rhode Island, United States Reprinted from: J. …”
    Libro electrónico
  5. 7125
    Publicado 2023
    Tabla de Contenidos: “…-- How Transformational Leadership Helps Mobile Medicine and Other Advanced Technologies Succeed -- Key Transformational Leadership Traits You Can Implement -- Build People and Teams -- Lean into Humility -- Know What Makes an Effective Executive and Be Honest about Your Gaps -- Take Responsibility for Tackling Conflict and Using It as a Tool for Improvement -- Make Sure You Understand What Delegation Really Is -- Close Gaps between Visions and Execution -- Case Study: Transformational Leadership in Action -- Building the Team -- Aligning Team Values and Establishing Culture -- Team Goal Setting -- Team Delivery -- Team Outcomes and Experience -- Conclusion -- References -- Chapter 6 Ignore the Dangers of Hubris at Your Own Risk: Mitigating the Barrier to Trust and Respect for High-Performing Teams in Medical Technology -- Introduction -- Conceptualizing Hubris -- Consequences of Hubris -- Benefits -- Leadership -- Collaborators, Partners, Teams, and Organizations -- Business, Industry, and Society -- Disrupting Hubris -- Person to Person -- Leadership Selection, Performance Management, and Development -- Culture, Community, and Organizational Citizenship -- Conclusion -- References -- Chapter 7 Humility as a Core Value for the Adoption of Technology in Medicine: Building a Foundation for Communication and Collaboration -- Humility in Medical and Technical Education -- Moving from Expertise to Master Adaptive Learning -- Humility in Technical Education and Culture -- Humility as a Foundation for Communication and Collaboration -- Communication Models -- Integrating Humility into Communication -- Communication Styles that Challenge Humility -- It Starts at the Top -- Leadership Hubris and Situational Narcissism…”
    Libro electrónico
  6. 7126
    Publicado 2020
    Tabla de Contenidos: “…7.8 Minimal Sufficiency and Ancillary Statistics -- 7.9 Sufficiency, Completeness, and Independence -- 8 Optimal Tests of Hypotheses -- 8.1 Most Powerful Tests -- 8.2 Uniformly Most Powerful Tests -- 8.3 Likelihood Ratio Tests -- 8.3.1 Likelihood Ratio Tests for Testing Means of Normal Distributions -- 8.3.2 Likelihood Ratio Tests for Testing Variances of Normal Distributions -- 8.4 *The Sequential Probability Ratio Test -- 8.5 *Minimax and Classification Procedures -- 8.5.1 Minimax Procedures -- 8.5.2 Classification -- 9 Inferences About Normal Linear Models -- 9.1 Introduction -- 9.2 One-Way ANOVA -- 9.3 Noncentral χ2 and F-Distributions -- 9.4 Multiple Comparisons -- 9.5 Two-Way ANOVA -- 9.5.1 Interaction Between Factors -- 9.6 A Regression Problem -- 9.6.1 Maximum Likelihood Estimates -- 9.6.2 *Geometry of the Least Squares Fit -- 9.7 A Test of Independence -- 9.8 The Distributions of Certain Quadratic Forms -- 9.9 The Independence of Certain Quadratic Forms -- 10 Nonparametric and Robust Statistics -- 10.1 Location Models -- 10.2 Sample Median and the Sign Test -- 10.2.1 Asymptotic Relative Efficiency -- 10.2.2 Estimating Equations Based on the Sign Test -- 10.2.3 Confidence Interval for the Median -- 10.3 Signed-Rank Wilcoxon -- 10.3.1 Asymptotic Relative Efficiency -- 10.3.2 Estimating Equations Based on Signed-Rank Wilcoxon -- 10.3.3 Confidence Interval for the Median -- 10.3.4 Monte Carlo Investigation -- 10.4 Mann-Whitney-Wilcoxon Procedure -- 10.4.1 Asymptotic Relative Efficiency -- 10.4.2 Estimating Equations Based on the Mann-Whitney- Wilcoxon -- 10.4.3 Confidence Interval for the Shift Parameter Δ -- 10.4.4 Monte Carlo Investigation of Power -- 10.5 *General Rank Scores -- 10.5.1 Efficacy -- 10.5.2 Estimating Equations Based on General Scores -- 10.5.3 Optimization: Best Estimates -- 10.6 *Adaptive Procedures -- 10.7 Simple Linear Model…”
    Libro electrónico
  7. 7127
    Publicado 2023
    Tabla de Contenidos: “…The multi-path DMA-Net architecture: Lu et al. -- 7.1.3. Adapting to the size of the image: Mai et al. -- 7.1.4. …”
    Libro electrónico
  8. 7128
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Cloud-Native Blockchain -- Chapter 1: Understanding Cloud-Native and Blockchain -- Blockchain basics - Distributed ledgers and cryptography -- Types of blockchain -- Consensus mechanisms - Ensuring trust and security -- Smart contracts - Programmable logic on the blockchain -- dapps - Building on the blockchain -- Tokenization - Creating digital assets on the blockchain -- Scalability, interoperability, and privacy - Key challenges and innovations in blockchain -- Introduction to cloud-native technology -- Defining cloud-native technology -- Key principles of cloud-native technology -- Comparing traditional cloud computing and cloud-native technology -- Benefits and limitations of cloud-native blockchain -- Scalability - Adapting to changing workloads -- Security - Protecting data and infrastructure -- Cost-effectiveness - Optimizing resource utilization -- Limitations and trade-offs of cloud-native blockchain solutions -- Key considerations for cloud-native blockchain implementation -- Choosing the right blockchain framework -- Scalability and performance -- Security and privacy -- Interoperability and integration -- Cost optimization -- Summary -- Chapter 2: Overview of AWS, Azure, and GCP Services for Blockchain -- AWS blockchain services -- Amazon Managed Blockchain -- Amazon QLDB -- Amazon EC2 and Amazon Elastic Kubernetes Service (EKS) -- AWS Marketplace templates -- Azure blockchain services -- Microsoft Entra Verified ID -- Azure Managed Confidential Consortium Framework (CFF) -- Azure Confidential Ledger -- Azure Kubernetes Service (AKS) -- Azure partner solutions -- GCP blockchain services -- GCP Blockchain Node Engine -- GCP Compute Engine and Kubernetes Engine -- GCP Marketplace templates…”
    Libro electrónico
  9. 7129
    por Jensen, Jens Sandager
    Publicado 2024
    Tabla de Contenidos: “…LSTM-based structural pattern recognition for floating bridges -- Vision-based structural displacement measurements using deep learning and super-resolution -- Multimodal data collection using mobile robotics for rapid structural assessment -- MS08: Sustainable and efficient monitoring and digitization-based decision-making models -- Human role in existing bridge digital twin frameworks, towards Industry 5.0 -- Overview of assessment for bridges affected by HS2 tunnelling, UK -- Comparison of modal parametric and nonparametric vibration-based techniques -- Limits of digital twin modelling -- Vehicle impacts on reinforced concrete railway bridges -- Advanced modelling methods of the Jauntal railway bridge -- Generation of digital twins for bridges of medium spans Schwindegg Bridge pilot project -- ANYTWIN - standardizing monitoring-based safety assessments of bridges and the integration into Digital Twins -- Condition assessment of mechanical fasteners by use of smart bolts -- MS09: Novel technologies and information fusion for structural health monitoring of bridges -- Real-time scour depth estimation of a pier using vibration monitoring -- Structural integrity estimation of bridges based on acceleration measurement -- Research on application of real-time dynamic safety monitoring system for medium and small span bridges -- Enhancing structural performance evaluation of PC girder bridges through Bayesian model updating -- Framework of UAV bridge inspection with computer vision and deep learning -- Vision-based optimal sensor selection for full-field displacement reconstruction -- Domain adaptation for bridge health monitoring via physics-informed generative adversarial learning -- Anomaly detection of bridges by Bayesian method with optimized sensor placement…”
    Libro electrónico
  10. 7130
    por Reddy, Martin
    Publicado 2024
    Tabla de Contenidos: “…Singleton versus Monostate -- Singleton versus session state -- Factory Methods -- Abstract base classes and interfaces -- Simple factory example -- Extensible factory example -- API wrapping patterns -- The Proxy pattern -- The Adapter pattern -- The Façade pattern -- Observer pattern -- Model-View-Controller -- Implementing the Observer pattern -- Push versus pull observers -- 4 - Design -- A case for good design -- Accruing technical debt -- Paying back the debt -- Design for the long term -- Gathering functional requirements -- What are functional requirements? …”
    Libro electrónico
  11. 7131
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…OPC -- ICCP/TASE.2 -- Physical hardware -- Summary -- 7 - Hacking Industrial Control Systems -- Motives and consequences -- Consequences of a successful cyberincident -- Cybersecurity and safety -- Common industrial targets -- The evolution of the industrial cyberattack -- Common attack methods -- Attack phases -- Initial attack phases -- Industrial attack phases -- Cyber-physical attacks -- Rogue access devices -- Keylogging/keystroke injections/HID attacks -- Man-in-the-middle attacks -- Denial-of-service attacks -- Replay attacks -- Compromising the human-machine interface -- Compromising the engineering workstation -- Blended attacks -- Weaponized industrial cyberthreats -- Stuxnet -- Dissecting stuxnet -- What it does -- Lessons learned -- Shamoon/DistTrack -- Flame/flamer/skywiper -- Dragonfly -- BlackEnergy -- Industroyer -- TRISIS/TRITON -- Industroyer2 -- Incontroller/pipedream -- Attack trends -- Evolving vectors -- Supply chain vulnerabilities -- Adobe Portable Document Format -- Macros -- Secure sockets layers -- Log4j -- Ransomware and industrial control systems -- Industrial application layer protocols -- Antisocial networks: A new playground for malware -- Polymorphic and adaptive malware -- Dealing with an infection -- Summary -- 8 - Risk and Vulnerability Assessments -- Cybersecurity and risk management -- Why risk management is the foundation of cyber security? …”
    Libro electrónico
  12. 7132
    Publicado 2024
    Tabla de Contenidos: “…Storage estimation -- Bandwidth estimation -- Processing estimation -- High-level design -- Low-level system design -- Video Service -- Video upload and storage -- Video encoding and transcoding -- Video streaming -- Caching and content delivery -- User Service -- User authentication and authorization -- User profile management -- Database and caching -- Recommendation Service -- The CDN -- CDN architecture and content distribution -- Request routing and video streaming -- Adaptive bitrate streaming -- Content security and DRM -- Summary -- Chapter 15: Tips for Interviewees -- Tips for preparation for system design interviews -- Understanding the fundamentals -- Studying common system design patterns -- Practicing designing systems -- Learning from online resources -- Honing your communication skills -- Reviewing and reflecting -- Tips for the interview session -- Understanding the problem statement -- Breaking down the problem -- Key steps to follow -- Communicating your solution effectively -- Summary -- Chapter 16: System Design Cheat Sheet -- Which data store should we use for a use case? …”
    Libro electrónico
  13. 7133
    Publicado 2024
    Tabla de Contenidos: “…-- Be clear and specific -- Be descriptive -- Using consistent terminology -- Reference artworks and styles -- Incorporate negative prompts -- Iterate and refine -- Using LLMs to generate better prompts -- Summary -- References -- Part 4 - Building Stable Diffusion into an Application -- Chapter 18: Applications - Object Editing and Style Transferring -- Editing images using Stable Diffusion -- Replacing image background content -- Removing the image background -- Object and style transferring -- Loading up a Stable Diffusion pipeline with IP-Adapter -- Transferring style -- Summary -- References -- Chapter 19: Generation Data Persistence -- Exploring and understanding the PNG file structure -- Saving extra text data in a PNG image file -- PNG extra data storage limitation -- Summary -- References -- Chapter 20: Creating Interactive User Interfaces -- Introducing Gradio -- Getting started with Gradio -- Gradio fundamentals -- Gradio Blocks -- Inputs and outputs -- Building a progress bar -- Building a Stable Diffusion text-to-image pipeline with Gradio -- Summary -- References -- Chapter 21: Diffusion Model Transfer Learning -- Technical requirements -- Training a neural network model with PyTorch -- Preparing the training data -- Preparing for training -- Training a model -- Training a model with Hugging Face's Accelerate -- Applying Hugging Face's Accelerate -- Putting code together -- Training a model with multiple GPUs using Accelerate -- Training a Stable Diffusion V1.5 LoRA -- Defining training hyperparameters…”
    Libro electrónico
  14. 7134
    por Yunus Emre, -1320?
    Publicado 1949
    Libro
  15. 7135
    Publicado 2010
    “…This Infoline, focuses on how to analyze the cultural characteristics of targeted learners to determine what adaptations to the learning might be needed, recommend critical adaptations to training courses or materials and then test those recommendations, and adapt the training course to the needs of the targeted learners in the most effective way possible, with respect to effort and cost…”
    Libro electrónico
  16. 7136
    por Perkins, Peter
    Publicado 1961
    Libro
  17. 7137
    Publicado 1997
    Libro
  18. 7138
    Publicado 2016
    Tabla de Contenidos: “…-- Develop Targeted, Market-Appropriate Products -- Rapid Time-to-Market -- Product-Specific Example -- Product Development Efficiencies -- Made in the USA -- Positioning of Your Product and the Message You Send -- Compete Hard -- Chapter 15: The West: Price => Value-Add: Be Strategic, Think Scenarios -- The Discounting Game (Don't Go There-Compete on Value) -- Learn How to Position Your Premium Pricing -- Think Big Picture and Longer Term -- Defend Your Value-Add -- Sell Like a Company, Not Like a Business Unit -- Get Creative and Think Holistically Early in the Negotiation -- Price According to Customer's Propensity to Pay -- Offer Financing Options as Differentiators -- Creative Financing Models -- The World Bank Group and Other Development Bodies -- Combat Unfair Pricing -- Chapter 16: The West: Place => Partnerships -- Selling Direct versus through Partners-Know Your Customer's Preference -- Partners Are Key and So Is Your Involvement -- Engage with Channel Partners -- Educate Your Channel Partner -- Partner with Your Customer -- Form Public-Private Partnerships -- Partner with the Competition: Coopetition -- Place and Presence -- Chapter 17: The West: Promotion => Customer Relationships and Culture: Recommendations for the West -- (Really) Know Your Customer by Knowing Their Culture -- Cultural Dimensions -- Trust -- Know Your Competition -- Know Yourself -- Analyze Using the Customer Profile -- Build Relationships at All Levels -- Influence at All Organizational Levels -- Go Outside the Organization -- Help Your Customer Get to Yes More Quickly -- Be Flexible and Adapt -- Be Nice…”
    Libro electrónico
  19. 7139
    Publicado 2016
    Tabla de Contenidos: “…2.17 Room E3, E4- Union of Myanmar Nationalities' Culture Exhibition Room -- 3 Documentation at National Museum (Nay Pyi Taw) -- 4 Conservation at National Museum (Nay Pyi Taw) -- 5 Conclusion -- References -- Conservation Science Research at the Museum: Development of Carbon Dioxide Treatment for Museum Collection -- 1 Introduction -- 2 Development of an Enclosure-Type Insecticidal Treatment System Using Carbon Dioxide -- 3 Development of Technologies Necessary for Applying the Insecticidal Treatment Method Using Carbon Dioxide at Museums -- 4 Adaptability of the Insecticidal Treatment Method Using Carbon Dioxide in Large Fastener Bags -- 5 Future Topics -- References -- Part IV: Museums and Local Communities -- The Situation of Community Museums in the North of Thailand -- 1 Introduction -- 2 Community Museum: A Subtype of the Local Museum -- 3 Community Museums in the North of Thailand -- 3.1 Ethnicity Museum -- 3.2 Local Historical Museum -- Notes -- References -- Interactive Museum Activities That Provide Venues for Innovation: Case Studies from the Lake Biwa Museum -- 1 Introduction -- 2 How Are Better Relationships Determined? …”
    Libro electrónico
  20. 7140
    Publicado 2018
    Tabla de Contenidos: “…-- What Kubernetes is not -- Understanding container orchestration -- Physical machines, virtual machines, and containers -- The benefits of containers -- Containers in the cloud -- Cattle versus pets -- Kubernetes concepts -- Cluster -- Node -- Master -- Pod -- Label -- Annotations -- Label selectors -- Replication controllers and replica sets -- Services -- Volume -- StatefulSet -- Secrets -- Names -- Namespaces -- Diving into Kubernetes architecture in-depth -- Distributed systems design patterns -- Sidecar pattern -- Ambassador pattern -- Adapter pattern -- Multinode patterns -- The Kubernetes APIs -- Resource categories -- Workloads API -- Discovery and load balancing -- Config and storage -- Metadata -- Cluster -- Kubernetes components -- Master components -- API server -- Etcd -- Kube controller manager -- Cloud controller manager -- Kube-scheduler -- DNS -- Node components -- Proxy -- Kubelet -- Kubernetes runtimes -- The Container Runtime Interface (CRI) -- Docker -- Rkt -- App container -- Cri-O -- Rktnetes -- Is rkt ready for use in production? …”
    Libro electrónico