Mostrando 5,041 - 5,060 Resultados de 9,028 Para Buscar '"Agente"', tiempo de consulta: 0.13s Limitar resultados
  1. 5041
    Publicado 2022
    Tabla de Contenidos: “…-- 6.2.2 Part of Speech Tagging and Chunking -- 6.2.3 Sentence Parsing -- 6.2.4 Discussion About the Various Semantic Search in Medical Databases -- 6.2.5 Discussion About the Retrieval Tools Used in Sematic Search in Medline -- 6.3 Structural Pattern of Semantic Search -- 6.3.1 Architectural Diagram -- 6.3.2 Agent Ontology -- 6.3.3 Rule-Based Approach -- 6.3.4 Reasoners-Based Approach SVM-Based Approach -- 6.4 Implementation of Reasoners -- 6.5 Implementation and Results -- 6.6 Conclusion and Future Prospective -- References -- 7 Ontology-Based System for Robotic Surgery-A Historical Analysis -- 7.1 Historical Discourse of Surgical Robots -- 7.2 The Necessity for Surgical Robots -- 7.3 Ontological Evolution of Robotic Surgical Procedures in Various Domains…”
    Libro electrónico
  2. 5042
    Tabla de Contenidos: “…La non-déductibilité fiscale des pots-de-vin versés à des agents publics étrangers -- Historique de la Recommandation de l'OCDE sur la déductibilité fiscale -- Refus de la non-déductibilité -- L'échange de renseignements -- Suivi de la mise en œuvre de la Recommandation sur la déductibilité fiscale -- Législation et pratiques des pays à l'égard de la corruption d'agents publics étrangers -- Traitement fiscal des agents publics bénéficiant d'un pot-de-vin -- Traitement fiscal de la personne qui verse un pot-de-vin à un agent public étranger -- Mise au point de pratiques exemplaires -- Élaboration de Principes OCDE de vérification pour la détection des pots-de-vin versés à des agen... -- Multiplier les échanges de renseignements sur les opérations de corruption et les paiements suspects -- Contrôles fiscaux simultanés -- Tâches futures -- Chapitre 5. …”
    Libro electrónico
  3. 5043
    Publicado 2003
    Tabla de Contenidos: “…8.3.3 Using virtual fields with virtual documents -- 8.4 Virtual attachments -- 8.5 Virtual agents activity -- 8.6 Example 1: Using a virtual documents activity -- 8.6.1 Create a DB2 connection document -- 8.6.2 Create a virtual documents activity document -- 8.6.3 Testing the virtual documents activity -- 8.7 Example 2: Using virtual documents with a DB2 UDB view -- 8.7.1 Create a DB2 connection document to EMPLIB.EMP_DEPT -- 8.7.2 Create a virtual documents activity document -- 8.7.3 Testing the virtual documents activity -- 8.8 Example 3: Using virtual fields with multiple DB2 tables -- 8.8.1 Create a DB2 connection document to EMPLIB.EMPLOYEE -- 8.8.2 Create a DB2 connection document to EMPLIB.DEPARTMENT -- 8.8.3 Create a virtual fields activity document to EMPLIB.EMPLOYEE -- 8.8.4 Generate key documents -- 8.8.5 Create a virtual fields activity document to EMPLIB.DEPARTMENT -- 8.8.6 Testing the virtual fields activities -- 8.9 Example 4: Using virtual fields with virtual documents -- 8.9.1 Create a DB2 connection document to EMPLIB.EMPLOYEE2 -- 8.9.2 Create a DB2 connection document to EMPLIB.DEPARTMENT -- 8.9.3 Create a virtual documents activity -- 8.9.4 Create a virtual fields activity -- 8.9.5 Testing the activities -- 8.10 Example 5: Using virtual agents and virtual attachments -- 8.10.1 Create a DB2 connection document to AUTOBODY.AUTOBODY_EST -- 8.10.2 Create a DB2 connection document to AUTOBODY.AUTOBODY_DAMAGE -- 8.10.3 Create a DB2 connection document to AUTOBODY.DAMAGETOT -- 8.10.4 Create a virtual documents activity document -- 8.10.5 Create a virtual fields activity document -- 8.10.6 Create a virtual agents document -- 8.10.7 Testing the virtual attachments activity -- 8.10.8 Testing the virtual agents activity -- Chapter 9. …”
    Libro electrónico
  4. 5044
    Publicado 2023
    Tabla de Contenidos: “…Chapter 11 Eye-Based Cursor Control and Eye Coding Using Hog Algorithm and Neural Network -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Methodology -- 11.3.1 Eye Blink Detection -- 11.3.2 Hog Algorithm -- 11.3.3 Eye Gaze Detection -- 11.3.3.1 Deep Learning and CNN -- 11.3.3.2 Hog Algorithm for Gaze Determination -- 11.3.4 GUI Automation -- 11.4 Experimental Analysis -- 11.4.1 Eye-Based Cursor Control -- 11.4.2 Eye Coding -- 11.5 Observation and Results -- 11.6 Conclusion -- 11.7 Future Scope -- References -- Chapter 12 Role of Artificial Intelligence in the Agricultural System -- 12.1 Introduction -- 12.2 Artificial Intelligence Effect on Farming -- 12.2.1 Agriculture Lifecycle -- 12.2.2 Problems with Traditional Methods of Farming -- 12.3 Applications of Artificial Intelligence in Agriculture -- 12.3.1 Forecasting Weather Details -- 12.3.2 Crop and Soil Quality Surveillance -- 12.3.3 Pesticide Use Reduction -- 12.3.4 AI Farming Bots -- 12.3.5 AI-Based Monitoring Systems -- 12.3.6 AI-Based Irrigation System -- 12.4 Robots in Agriculture -- 12.5 Drones for Agriculture -- 12.6 Advantage of AI Implementation in Farming -- 12.6.1 Intelligent Agriculture Cloud Platform -- 12.6.1.1 Remote Control and Administration in Real Time -- 12.6.1.2 Consultation of Remote Experts -- 12.7 Research, Challenges, and Scope for the Future -- 12.8 Conclusion -- References -- Chapter 13 Improving Wireless Sensor Networks Effectiveness with Artificial Intelligence -- 13.1 Introduction -- 13.2 Wireless Sensor Network (WSNs) -- 13.3 AI and Multi-Agent Systems -- 13.4 WSN and AI -- 13.5 Multi-Agent Constructed Simulation -- 13.6 Multi-Agent Model Plan -- 13.7 Simulation Models on Behalf of Wireless Sensor Network -- 13.8 Model Plan -- 13.8.1 Hardware Layer -- 13.8.2 Middle Layer -- 13.8.3 Application Layer -- 13.9 Conclusion -- References -- Index -- EULA…”
    Libro electrónico
  5. 5045
    Publicado 2018
    Tabla de Contenidos: “…Putting it all together -- Training -- Inference -- Loading data -- Creating reverse indices -- Loading models -- Translating a sequence -- Decoding a sequence -- Example translations -- Summary -- Chapter 12: Using Deep Reinforcement Learning -- Reinforcement learning overview -- Markov Decision Processes -- Q Learning -- Infinite state space -- Deep Q networks -- Online learning -- Memory and experience replay -- Exploitation versus exploration -- DeepMind -- The Keras reinforcement learning framework -- Installing Keras-RL -- Installing OpenAI gym -- Using OpenAI gym -- Building a reinforcement learning agent in Keras -- CartPole -- CartPole neural network architecture -- Memory -- Policy -- Agent -- Training -- Results -- Lunar Lander -- Lunar Lander network architecture -- Memory and policy -- Agent -- Training -- Results -- Summary -- Chapter 13: Generative Adversarial Networks -- An overview of the GAN -- Deep Convolutional GAN architecture -- Adversarial training architecture -- Generator architecture -- Discriminator architecture -- Stacked training -- Step 1 - train the discriminator -- Step 2 - train the stack -- How GANs can fail -- Stability -- Mode collapse -- Safe choices for GAN -- Generating MNIST images using a Keras GAN -- Loading the dataset -- Building the generator -- Building the discriminator -- Building the stacked model -- The training loop -- Model evaluation -- Generating CIFAR-10 images using a Keras GAN -- Loading CIFAR-10 -- Building the generator -- Building the discriminator -- The training loop -- Model evaluation -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  6. 5046
    por Ayyadevara, V. Kishore
    Publicado 2023
    Tabla de Contenidos: “…Architecture -- Coding SRGAN -- Summary -- Questions -- Section 4: Combining Computer Vision with Other Techniques -- Chapter 14: Combining Computer Vision and Reinforcement Learning -- Learning the basics of reinforcement learning -- Calculating the state value -- Calculating the state-action value -- Implementing Q-learning -- Defining the Q-value -- Understanding the Gym environment -- Building a Q-table -- Leveraging exploration-exploitation -- Implementing deep Q-learning -- Understanding the CartPole environment -- Performing CartPole balancing -- Implementing deep Q-learning with the fixed targets model -- Understanding the use case -- Coding up an agent to play Pong -- Implementing an agent to perform autonomous driving -- Setting up the CARLA environment -- Installing the CARLA binaries -- Installing the CARLA Gym environment -- Training a self-driving agent -- Creating model.py -- Creating actor.py -- Training a DQN with fixed targets -- Summary -- Questions -- Chapter 15: Combining Computer Vision and NLP Techniques -- Introducing transformers -- Basics of transformers -- Encoder block -- Decoder block -- How ViTs work -- Implementing ViTs -- Transcribing handwritten images -- Handwriting transcription workflow -- Handwriting transcription in code -- Document layout analysis -- Understanding LayoutLM -- Implementing LayoutLMv3 -- Visual question answering -- Introducing BLIP2 -- Representation learning -- Generative learning -- Implementing BLIP2 -- Summary -- Questions -- Chapter 16: Foundation Models in Computer Vision -- Introducing CLIP -- How CLIP works -- Building a CLIP model from scratch -- Leveraging OpenAI CLIP -- Introducing SAM -- How SAM works -- Implementing SAM -- How FastSAM works -- All-instance segmentation -- Prompt-guided selection -- Implementing FastSAM -- Introducing diffusion models -- How diffusion models work…”
    Libro electrónico
  7. 5047
    Publicado 2013
    Tabla de Contenidos: “…Budget -- Commitments -- Forecasts -- Costs -- Billings -- Agreements and Funding -- Performance -- Revenue -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 12: Sales Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Subject Areas -- CRM Customer Overview -- CRM Forecasting -- CRM Orders -- CRM Pipeline -- CRM Products -- CRM Quotes -- CRM Sales Activity -- CRM Usage Accelerator Current -- CRM Usage Accelerator Summary -- Other Areas -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 13: Service Analytics and Contact Center Telephony Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Subject Areas -- CRM Activities -- CRM Agreements -- CRM Assets -- CRM Customer Satisfaction -- CRM E-mail Response -- CRM Orders -- CRM Products -- CRM Service Requests -- Customer Service Overview -- Enterprise Contact Center Overview -- IVR -- Service Delivery and Costs -- Service Delivery and Costs Overview -- ACD/CTI -- Agent Activity -- Agent Benchmarks and Targets -- Agent Performance Overview -- Contact Center Benchmarks and Targets -- Contact Center Marketing -- Contact Center Performance Overview -- Contact Center Sales -- Contact Center Sales Overview -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 14: Making It Yours Without Ruining the Foundation -- Approaching the Implementation -- You Will Need to Pick an Implementer -- You Will Need a Governance Process -- You Will Need to Pick Your Team -- The Implementation Itself -- Security -- Multicurrency -- Analytical Workflows -- Multiple Languages -- Multiple Source Systems -- Multiple Tenants -- Multiple Time Zones -- Tuning…”
    Libro electrónico
  8. 5048
    Publicado 2010
    Tabla de Contenidos: “…-- Understanding Relevant Governmental Regulations for Policy Enforcement -- Using Transport Agents in Exchange Server 2010 -- Understanding the Hub Role Transport Agents in Exchange Server 2010 -- Implementing Transport Agent Policies on the Edge -- Creating Messaging Records Management Policies -- Summary -- Best Practices -- Part V: Migrations and Coexistence with Exchange Server 2010.…”
    Libro electrónico
  9. 5049
    Publicado 2024
    Tabla de Contenidos: “…Intercepting traffic with MiTM attacks -- Summary -- Further reading -- Chapter 11: Delving into Command and Control Tactics -- Technical requirements -- Understanding C2 -- Setting up C2 operations -- Part 1 - Empire client-server model -- Part 2 - Managing users on Empire -- Post-exploitation using Empire -- Part 1 - Creating a listener -- Part 2 - Creating a stager -- Part 3 - Working with agents -- Part 4 - Creating a new agent -- Part 5 - Threat emulation -- Part 6 - Setting up persistence -- Working with Starkiller -- Part 1 - Starkiller -- Part 2 - User management -- Part 3 - Working with modules -- Part 4 - Creating listeners -- Part 5 - Creating stagers -- Part 6 - Interacting with agents -- Part 7 - Credentials and reporting -- Summary -- Further reading -- Chapter 12: Working with Active Directory Attacks -- Technical requirements -- Understanding Active Directory -- Enumerating Active Directory -- Working with PowerView -- Exploring BloodHound -- Part 1 - setting up BloodHound -- Part 2 - remote data collection with BloodHound.py -- Part 3 - data analysis using BloodHound -- Leveraging network-based trust -- Exploiting LLMNR and NetBIOS-NS -- Exploiting SMB and NTLMv2 within Active Directory -- Retrieving the SAM database -- Obtaining a reverse shell -- Summary -- Further reading -- Chapter 13: Advanced Active Directory Attacks -- Technical requirements -- Understanding Kerberos -- Abusing trust on IPv6 with Active Directory -- Part 1: setting up for an attack -- Part 2: launching the attack -- Part 3: taking over the domain -- Attacking Active Directory -- Lateral movement with CrackMapExec -- Vertical movement with Kerberos -- Lateral movement with Mimikatz -- Part 1: setting up the attack -- Part 2: grabbing credentials -- Domain dominance and persistence -- Golden ticket -- Silver ticket -- Skeleton key -- Summary -- Further reading…”
    Libro electrónico
  10. 5050
    Publicado 2013
    Tabla de Contenidos: “…Jenkins -- Pharmacologic agents / Suzanne McMurtry Baird, Stephen D. Krau, and Michael A. …”
    Enlace del recurso
    Libro electrónico
  11. 5051
    por Hernández Peña, Alicia María
    Publicado 2012
    Tabla de Contenidos: “…Fundaciones Capítulo 13 AGENTES INTERMEDIOS Comentario final Apéndices Bibliografía…”
    Texto completo en Odilo
    Otros
  12. 5052
    por Leon Parada, Victor Orielson
    Publicado 2005
    Tabla de Contenidos: “…Aplicación de medidas cautelares sobre bienes susceptibles de comiso y suspensión del poder dispositivo de los bienes o solicitud para levantar la medida de suspensión del poder dispositivo (Art. 84 CPP)Actuaciones de agentes encubiertos en infiltración y penetración de organizaciones criminales y de entregas vigiladas (Arts. 241, 242, 243); Formulación de la imputación (Art. 286 CPP); Audiencia de Formulación de Imputación (Arts. 286, 287, 288, 289, 290, 291, 292, 293 y 294); Solicitud, modificación, revocatoria o reconsideración de medida de aseguramiento (Art. 306 CPP)…”
    Libro electrónico
  13. 5053
    por Pérez Pichardo, Isabel María
    Publicado 2014
    Tabla de Contenidos: “…Concepto de negociación y agentes implicados -- 3. Condiciones para una negociación efectiva -- 4. …”
    Libro electrónico
  14. 5054
    por Cossío Díaz, José Ramón
    Publicado 2003
    Tabla de Contenidos: “…RATIFICACIÓN DE NOMBRAMIENTOS DE MINISTROS, AGENTES (...)EVOLUCIÓN CONSTITUCIONAL; ANÁLISIS DE LA FACULTAD; CAPÍTULO 7. …”
    Libro electrónico
  15. 5055
    Publicado 2015
    Tabla de Contenidos: “….); DISPOSICIÓN ADICIONAL DECIMONOVENA. AGENTES (...); DISPOSICIÓN TRANSITORIA PRIMERA. ADAPTACIÓN (...); DISPOSICIÓN TRANSITORIA SEGUNDA. …”
    Libro electrónico
  16. 5056
    por Guerrero Vargas, José Joaquín
    Publicado 2011
    Tabla de Contenidos: “…NEUROFÁRMACOS COMO MIDRIÁTICOS Y CICLOPLÉGICOSUSO CLÍNICO DE LOS MIDRIÁTICOS; USO CLÍNICO DE LOS MIÓTICOS; CAPÍTULO 6; GENERALIDADES; AGENTES HIPEROSMÓTICOS; CAPÍTULO 7; GENERALIDADES; BACTERIAS; CAPÍTULO 8; GENERALIDADES; CAPÍTULO 9; GENERALIDADES; CAPÍTULO 10; GENERALIDADES; CAPÍTULO 11; GENERALIDADES; CAPÍTULO 12; GENERALIDADES; CAPÍTULO 13; GENERALIDADES; CAPÍTULO 14; GENERALIDADES; FISIOLOGÍA DE LA PELÍCULA LAGRIMAL; PRINCIPIOS FUNCIONALES DE LA LÁGRIMA; LÁGRIMAS ARTIFICIALES O SUSTITUTOS LAGRIMALES; NUEVAS TERAPIAS DE SUSTITUCIÓN LAGRIMAL; VISCOELÁSTICOS; CAPÍTULO 15; GENERALIDADES…”
    Libro electrónico
  17. 5057
    por Hunziker, Paula
    Publicado 2017
    Tabla de Contenidos: “…EL “MAL RADICAL”, LA SUPERFLUIDAD DE LOS AGENTES Y LAS LIMITACIONES DE LA FILOSOFÍA MORAL KANTIANA -- 4. …”
    Libro electrónico
  18. 5058
    Publicado 2014
    Tabla de Contenidos: “…Un comercio franco-peruano. Los agentes promotores -- El comercio asiático desde Nueva España hacia Perú. …”
    Libro electrónico
  19. 5059
    Publicado 2014
    Tabla de Contenidos: “….); REFERENCIAS; CAPÍTULO 3 CULTIVO DE PSIQUE CIUDADANA; EL CIUDADANO: UN AGENTE MORAL (...); EL SUJETO HUMANO NO SÓLO NACE (...); DE LOS PROPÓSITOS A LA VOLUNTAD; CARÁCTER MORAL COMO ENCARNACIÓN (...); CONCLUSIONES…”
    Libro electrónico
  20. 5060
    por Gorodner, Jorge Osvaldo
    Publicado 2008
    Tabla de Contenidos: “…Patologías regionales y enfermedades emergentes; Legales; Dedicatorias; Los Autores; Colaboradores; Índice General; Prólogo; Introducción; Sección I: Generalidades; 1- Agentes infecciosos, enfermedades emergentes y reemergentes en América del Sur; 2- Cambio climático y salud humana; Bibliografía; 3- Atención primaria en Patologías regionalesEmergentes; 4- Avances diagnósticos. …”
    Libro electrónico