Mostrando 31,381 - 31,400 Resultados de 41,745 Para Buscar '"Documental"', tiempo de consulta: 0.19s Limitar resultados
  1. 31381
    por Moïsé, Evdokia
    Publicado 2005
    “…Ce document présente des études de cas par pays sur les réformes douanières qui ont eu lieu au Mozambique, en Angola, au Pakistan et au Pérou. …”
    Capítulo de libro electrónico
  2. 31382
    Publicado 2024
    “…Printing long documents with tables can often lead to issues where header rows don’t repeat on every page, or table rows break awkwardly across pages. …”
    Vídeo online
  3. 31383
    por Mancuso, Joseph C.
    Publicado 1992
    “…A ground-breaking approach to writing with a greater focus on planning and revising documents…”
    Libro electrónico
  4. 31384
    Publicado 1975
    Libro
  5. 31385
    Publicado 2001
    Libro
  6. 31386
    Publicado 2005
    Libro
  7. 31387
    Publicado 2022
    Tabla de Contenidos: “…La importancia del juego durante la infancia -- Capítulo 62 Pinolivo, un retrato de infancia -- Capítulo 63 Proyecto READ-COM: estudio de la metodología docente para el aprendizaje lector y buenas prácticas en educación infantil (3-6) -- Capítulo 64 Recogida de información y elaboración de informes de evaluación en infantil -- Capítulo 65 Por uma alimentação saudável: projeto de "boas práticas" na escola viva infância bilíngue, Campo Grande, MS/Brasil -- Capítulo 66 Recursos para enseñar a leer el mundo de forma crítica en infantil: un análisis documental -- Capítulo 67 La danza como recurso educativo -- Capítulo 68 Propuesta metodológica para la evaluación y promoción de la actividad física y el desarrollo cognitivo en metodologías activas en educación infantil -- Capítulo 69 Jaque mate a la inactividad física. …”
    Libro electrónico
  8. 31388
    Publicado 2017
    Tabla de Contenidos: “…2.5.1 Development and Installation -- 2.5.2 Test Run and Acceptance Test -- 2.5.3 Training and Documentation -- 2.6 Examples -- 2.6.1 Diameter Inspection of Rivets -- 2.6.2 Tubing Inspection -- Chapter 3 Lighting in Machine Vision -- 3.1 Introduction -- 3.1.1 Prologue -- 3.1.2 The Involvement of Lighting in the Complex Machine Vision Solution -- 3.2 Demands on Machine Vision lighting -- 3.3 Light used in Machine Vision -- 3.3.1 What is Light? …”
    Libro electrónico
  9. 31389
    Publicado 2021
    Tabla de Contenidos: “…6.1.1 Accuracy for object detection: Label confidence and localization -- 6.1.2 Uncertainty sampling for label confidence and localization in object detection -- 6.1.3 Diversity sampling for label confidence and localization in object detection -- 6.1.4 Active transfer learning for object detection -- 6.1.5 Setting a low object detection threshold to avoid perpetuating bias -- 6.1.6 Creating training data samples for representative sampling that are similar to your predictions -- 6.1.7 Sampling for image-level diversity in object detection -- 6.1.8 Considering tighter masks when using polygons -- 6.2 Applying active learning to semantic segmentation -- 6.2.1 Accuracy for semantic segmentation -- 6.2.2 Uncertainty sampling for semantic segmentation -- 6.2.3 Diversity sampling for semantic segmentation -- 6.2.4 Active transfer learning for semantic segmentation -- 6.2.5 Sampling for image-level diversity in semantic segmentation -- 6.3 Applying active learning to sequence labeling -- 6.3.1 Accuracy for sequence labeling -- 6.3.2 Uncertainty sampling for sequence labeling -- 6.3.3 Diversity sampling for sequence labeling -- 6.3.4 Active transfer learning for sequence labeling -- 6.3.5 Stratified sampling by confidence and tokens -- 6.3.6 Create training data samples for representative sampling that are similar to your predictions -- 6.3.7 Full-sequence labeling -- 6.3.8 Sampling for document-level diversity in sequence labeling -- 6.4 Applying active learning to language generation -- 6.4.1 Calculating accuracy for language generation systems -- 6.4.2 Uncertainty sampling for language generation -- 6.4.3 Diversity sampling for language generation -- 6.4.4 Active transfer learning for language generation -- 6.5 Applying active learning to other machine learning tasks -- 6.5.1 Active learning for information retrieval -- 6.5.2 Active learning for video…”
    Libro electrónico
  10. 31390
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Modalités de mise en œuvre de l'aide et partenariats de la Suisse -- Partenariats -- La Suisse pourrait mieux tirer parti de ses partenariats -- Le soutien à la coordination entre les donneurs ne se concrétise pas en approches conjointes -- La Suisse établit ses programmes et ses budgets de manière prévisible et flexible -- Un accès insuffisant aux documents freine les efforts de transparence -- L'essentiel (94.3 %) de l'aide allouée par la Suisse aux PMA est non liée -- Action au niveau des pays -- Les progrès modestes en matière d'efficacité du développement contrastent avec l'engagement de la Suisse -- Des analyses contextuelles et un suivi approfondis renforcent les interventions de la Suisse dans les contextes fragiles -- Les conditionnalités politiques pèsent sur le débat public -- Notes -- Références -- Chapitre 6. …”
    Libro electrónico
  11. 31391
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…La compétence matérielle des IGAI -- L'identification des documents -- Le coût d'accès -- 3.2.2. Les limites du droit d'accès à l'information -- Le principe -- Les exceptions à l'interdiction de communication de l'information et la protection des lanceurs d'alerte -- 3.2.3. …”
    Libro electrónico
  12. 31392
    Publicado 2019
    Tabla de Contenidos: “…7.3.2 How to Implement -- Step 1: Data Preparation -- Step 2: SOM Modeling Operator and Parameters -- Step 3: Execution and Interpretation -- Visual Model -- Location Coordinates -- Conclusion -- References -- 8 Model Evaluation -- 8.1 Confusion Matrix -- 8.2 ROC and AUC -- 8.3 Lift Curves -- 8.4 How to Implement -- Step 1: Data Preparation -- Step 2: Modeling Operator and Parameters -- Step 3: Evaluation -- Step 4: Execution and Interpretation -- 8.5 Conclusion -- References -- 9 Text Mining -- 9.1 How It Works -- 9.1.1 Term Frequency-Inverse Document Frequency -- 9.1.2 Terminology -- 9.2 How to Implement -- 9.2.1 Implementation 1: Keyword Clustering -- Step 1: Gather Unstructured Data -- Step 2: Data Preparation -- Step 3: Apply Clustering -- 9.2.2 Implementation 2: Predicting the Gender of Blog Authors -- Step 1: Gather Unstructured Data -- Step 2: Data Preparation -- Step 3.1: Identify Key Features -- Step 3.2: Build Models -- Step 4.1: Prepare Test Data for Model Application -- Step 4.2: Applying the Trained Models to Testing Data -- Bias in Machine Learning -- 9.3 Conclusion -- References -- 10 Deep Learning -- 10.1 The AI Winter -- AI Winter: 1970's -- Mid-Winter Thaw of the 1980s -- The Spring and Summer of Artificial Intelligence: 2006-Today -- 10.2 How it works -- 10.2.1 Regression Models As Neural Networks -- 10.2.2 Gradient Descent -- 10.2.3 Need for Backpropagation -- 10.2.4 Classifying More Than 2 Classes: Softmax -- 10.2.5 Convolutional Neural Networks -- 10.2.6 Dense Layer -- 10.2.7 Dropout Layer -- 10.2.8 Recurrent Neural Networks -- 10.2.9 Autoencoders -- 10.2.10 Related AI Models -- 10.3 How to Implement -- Handwritten Image Recognition -- Step 1: Dataset Preparation -- Step 2: Modeling using the Keras Model -- Step 3: Applying the Keras Model -- Step 4: Results -- 10.4 Conclusion -- References -- 11 Recommendation Engines…”
    Libro electrónico
  13. 31393
    Publicado 2018
    Tabla de Contenidos: “…Methods for HTML DOM document and element prototypes -- 8.5. The events in client side JavaScript -- 8.5.1. …”
    Libro electrónico
  14. 31394
    Publicado 2015
    Tabla de Contenidos: “…B: HELLOCARMS The Next Generation of Home Equity Lending System Requirements Document -- I Table of Contents -- II Versioning -- III Glossary -- 000 Introduction -- 001 Informal Use Case -- 003 Scope -- 004 System Business Benefits -- 010 Functional System Requirements -- 020 Reliability System Requirements -- 030 Usability System Requirements -- 040 Efficiency System Requirements -- 050 Maintainability System Requirements -- 060 Portability System Requirements -- A Acknowledgement -- C: Answers to Sample Questions -- Index…”
    Libro electrónico
  15. 31395
    Publicado 2023
    Tabla de Contenidos: “…11.8 Updating ICT from Time to Time and Means of Growth in the Field of Education -- 11.9 People Involved to be Trained for ICT -- 11.10 Adapting to Changes -- 11.11 Institutional Changes and ICT in Teaching -- 11.12 Global Changes and ICT in Teaching -- 11.13 Nationwide Changes and ICT in Teaching -- 11.14 Climatic Changes and ICT in Teaching -- 11.15 Types of Teaching Using ICT in Higher Educational Institutions -- 11.15.1 On Campus Teaching -- 11.15.2 Online Teaching -- 11.15.3 Blended or Hybrid Mode Teaching -- 11.15.3.1 Understanding Blended Learning -- 11.15.3.2 Measures to be Followed in Order to Ensure Effective Blended Learning -- 11.16 Analysis of ICT -- 11.17 People that Use ICT in the Field of Education -- 11.17.1 Teachers and their Use of ICT -- 11.17.2 Students and their Use of ICT -- 11.17.3 Department Heads and their Use of ICT -- 11.17.4 IT Support and their Use of ICT -- 11.18 Ease of Use of ICT -- 11.19 Problems Encountered During ICT-Based Class -- 11.19.1 Technical Problems -- 11.19.2 Non-Technical Problems -- 11.20 Recommendations -- 11.21 Conclusion -- References -- Chapter 12 Digital Tools for Interactive E-Content Development -- 12.1 Introduction -- 12.2 Digital Learning -- 12.3 Theories of Learning -- 12.4 HTML5 Package (H5P) -- 12.4.1 Course Presentation -- 12.4.2 Branching Scenario -- 12.4.3 Interactive Video -- 12.4.4 Slack -- 12.4.5 Camtasia -- 12.4.6 Accordion -- 12.4.7 Agamotto -- 12.4.8 Documentation Tool -- 12.4.9 Image Hotspots -- 12.4.10 Image Juxtaposition -- 12.4.11 Image Sequencing -- 12.4.12 Interactive Book -- 12.5 Conclusion -- References -- Chapter 13 Analysis of Changing Landscape of Virtual Learning in India -- 13.1 Introduction -- 13.2 Affecting Elements in Organizations -- 13.3 Dealing with Exceptional Youngsters -- 13.4 ICT Tools in VL for Flipped, Blended Learning and its Pitfalls…”
    Libro electrónico
  16. 31396
    Publicado 2019
    Tabla de Contenidos: “…6.8 Challenges Faced by Blockchain Technology -- 6.9 The Future of Blockchain Technology -- 6.10 Conclusion -- References -- 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations -- 7.1 Introduction -- 7.1.1 Primary Characteristics of a Distributed System -- 7.1.2 Major Challenges for Distributed Systems -- 7.2 Identifying Cyber Requirements -- 7.3 Popular security mechanisms in Distributed Systems -- 7.3.1 Secure Communication -- 7.3.1.1 Authentication -- 7.3.1.2 Shared Keys Authorship-Based Authentication -- 7.3.1.3 Key Distribution Center-Based Authentication -- 7.3.1.4 Public key encryption based authentication -- 7.3.2 Message Integrity and Confidentiality -- 7.3.2.1 Digital Signatures -- 7.3.2.2 Session Keys -- 7.3.3 Access Controls -- 7.3.3.1 Access Control Matrix -- 7.3.3.2 Protection Domains -- 7.3.3.3 Trusted Code -- 7.3.3.4 Denial of Service -- 7.4 Service Level Agreements -- 7.4.1 Types of SLAs -- 7.4.2 Critical Areas for SLAs -- 7.4.2.1 Examining the Network -- 7.4.2.2 Forensics -- 7.4.2.3 Managing Records/Documents -- 7.4.2.4 Backing Up Data -- 7.5 The Cuckoo's Egg in the Context of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants -- 7.6.1.1 Particularity -- 7.6.1.2 Reasonable Time Period for Examining Seized Electronic Equipment -- 7.6.1.3 Irrational Retention of Seized Data -- 7.6.2 Searching and Seizing -- 7.7 Conclusion -- References -- 8 Distributed Computing Security: Issues and Challenges -- 8.1 Introduction -- 8.2 Security Issues and Challenges -- 8.2.1 Confidentiality, Integrity and Availability -- 8.2.2 Authentication and Access Control Issue -- 8.2.3 Broken Authentication, Session and Access -- 8.3 Security Issues and Challenges in Advanced Areas -- 8.4 Conclusion -- References…”
    Libro electrónico
  17. 31397
    Publicado 2024
    Tabla de Contenidos: “…-- Integrating Beagle Security into our security pipeline -- Automating testing with Python -- Ensuring reliability and resilience in automated workflows -- Robust error-handling mechanisms -- Implementing retry logic -- Building idempotent operations -- Automated testing and validation -- Documentation and knowledge sharing -- Security and access control -- Implementing a logger for security pipelines -- Summary -- Chapter 7: Creating Custom Security Automation Tools with Python -- Designing and developing tailored security automation tools -- Integrating external data sources and APIs for enhanced functionality -- Extending tool capabilities with Python libraries and frameworks -- pandas -- scikit-learn -- Summary -- Part 4: Python Defense Strategies for Robust Security -- Chapter 8: Secure Coding Practices with Python -- Understanding secure coding fundamentals -- Principles of secure coding -- Common security vulnerabilities -- Input validation and sanitization with Python -- Input validation -- Input sanitization -- Preventing code injection and execution attacks -- Preventing SQL injection -- Preventing command injection -- Data encryption and Python security libraries -- Symmetric encryption -- Asymmetric encryption -- Hashing -- Secure deployment strategies for Python applications -- Environment configuration -- Dependency management…”
    Libro electrónico
  18. 31398
    por Liang, Y.
    Publicado 2022
    Tabla de Contenidos: “…-- 1.3 Programming Languages -- 1.4 Operating Systems -- 1.5 The History of Python -- 1.6 Getting Started with Python -- 1.7 Programming Style and Documentation -- 1.8 Programming Errors -- 1.9 Getting Started with Graphics Programming -- Chapter 2. …”
    Libro electrónico
  19. 31399
    por Zalbide, Mikel
    Publicado 2024
    Tabla de Contenidos: “…Characteristics of the documents which have to be dated -- 2.1.2. Measurement patterns chosen by SHB -- 2.2. …”
    Libro electrónico
  20. 31400
    por Arhippainen, Heikki
    Publicado 2004
    Tabla de Contenidos: “…WebFacing environment -- 2.1 Selecting the right system -- 2.1.1 Hardware considerations -- 2.1.2 Using IBM Eserver Workload Estimator to plan a server configuration -- 2.1.3 Software considerations -- 2.1.4 WebFacing server -- 2.2 WebFacing performance considerations -- 2.2.1 OS/400 operating system -- 2.2.2 WebFacing server -- 2.2.3 WebFacing subsystem -- 2.2.4 Java Virtual Machine considerations -- 2.2.5 WebSphere Application Server -- 2.2.6 The WebFacing application -- 2.3 References to other resources of documentation -- Chapter 3. Guidance for using this redbook -- 3.1 IBM WebFacing Tool scenario in this redbook -- 3.2 Sample 5250 application -- 3.3 Converting the sample 5250 application -- 3.4 Comparing the WebFacing application with the 5250 application -- 3.5 Improving the WebFacing application -- 3.5.1 Refining the generated user interface -- 3.5.2 Integrating with other Web applications -- Part 2 Moving to a WebFacing application -- Chapter 4. 5250 sample application -- 4.1 Setting up the environment -- 4.1.1 Restoring the FLGHT400 library -- 4.1.2 Setting up the user profile -- 4.2 Application overview -- 4.2.1 The Flight Reservation System -- 4.2.2 Application files -- 4.2.3 The database files -- 4.3 Using the Flight Reservation System application -- 4.3.1 Starting the application -- 4.3.2 Creating a new reservation -- 4.3.3 Generating reports…”
    Libro electrónico