Mostrando 2,281 - 2,300 Resultados de 4,853 Para Buscar '"Extraction"', tiempo de consulta: 0.13s Limitar resultados
  1. 2281
    Publicado 2019
    Tabla de Contenidos: “…State of the Art on the Fragility Problem -- 3.1.1. Robust Data Extraction -- 3.1.2. Breakage Prevention -- 3.1.3. Web Test Repair -- 3.2. …”
    Libro electrónico
  2. 2282
    Publicado 2017
    Tabla de Contenidos: “…7.6 Conclusion -- References -- 8 Performance Isolation in Cloud-Based Big Data Architectures -- 8.1 Introduction -- 8.2 Background -- 8.2.1 Cloud Computing -- 8.2.2 Big Data Architecture -- 8.3 Case Study and Problem Statement -- 8.3.1 Case Study -- 8.3.2 Problem Statement -- 8.4 Performance Monitoring in Cloud-Based Systems -- 8.5 Application Framework for Performance Isolation -- 8.6 Evaluation of the Framework -- 8.6.1 Evaluation Results -- 8.7 Discussion -- 8.8 Related Work -- 8.9 Conclusion -- References -- 9 From Legacy to Cloud: Risks and Bene ts in Software Cloud Migration -- 9.1 Introduction -- 9.2 Research Method -- 9.2.1 Pilot Study -- 9.2.2 Search Strategy -- 9.2.2.1 Research question -- 9.2.2.2 Data sources -- 9.2.2.3 Search query -- 9.2.2.4 Search process -- 9.2.2.5 Selection of primary studies -- 9.2.2.6 Included and excluded studies -- 9.2.2.7 Search result management -- 9.2.2.8 Quality assessment of primary studies -- 9.2.3 Data Extraction -- 9.2.4 Data Analysis Method -- 9.3 Results -- 9.3.1 Overview of Primary Studies and Quality Evaluation -- 9.3.2 Bene ts and Risks -- 9.3.3 General Measures -- 9.3.4 Models and Frameworks for Cloud Migration -- 9.4 Discussion -- 9.4.1 Findings and Lessons Learned -- 9.4.2 Threats to Validity -- 9.5 Conclusion -- References -- 10 Big Data: A Practitioners Perspective -- 10.1 Big Data Is a New Paradigm - Differences With Traditional Data Warehouse, Pitfalls and Consideration -- 10.1.1 Differences With Traditional Data Warehouse -- 10.1.2 Pitfalls -- 10.1.2.1 Insuf cient volume of data -- 10.1.2.2 Not having a business challenge -- 10.1.2.3 Ignoring the data quality -- 10.1.2.4 Big data can predict the future -- 10.1.3 Considerations -- 10.2 Product Considerations for Big Data - Use of Open Source Products for Big Data, Pitfalls and Considerations…”
    Libro electrónico
  3. 2283
    Publicado 2018
    Tabla de Contenidos: “…Using a pretrained convnet -- 5.3.1. Feature extraction -- 5.3.2. Fine-tuning -- 5.3.3. Wrapping up -- 5.4. …”
    Libro electrónico
  4. 2284
    Publicado 2023
    Tabla de Contenidos: “…6.3.2.1 High-K Dielectric -- 6.3.2.2 Metal Gate -- 6.3.2.3 Multiple Gate -- 6.4 Role of High-K in CMOS Miniaturization -- 6.5 Current Mosfet Technologies -- 6.6 Conclusion -- References -- Chapter 7 Investigation of Diabetic Retinopathy Level Based on Convolution Neural Network Using Fundus Images -- 7.1 Introduction -- 7.2 The Proposed Methodology -- 7.3 Dataset Description and Feature Extraction -- 7.3.1 Depiction of Datasets -- 7.3.2 Preprocessing -- 7.3.3 Detection of Blood Vessels -- 7.3.4 Microaneurysm Detection -- 7.4 Results and Discussions -- 7.5 Conclusions -- References -- Chapter 8 Anti-Theft Technology of Museum Cultural Relics Using RFID Technology -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Software Implementation -- 8.4 Components -- 8.4.1 Arduino UNO -- 8.4.2 EM18 Reader Module -- 8.4.3 RFID Tag -- 8.4.4 LCD Display -- 8.4.5 Sensors -- 8.4.5.1 Fire Sensor -- 8.4.5.2 IR Sensor -- 8.4.6 Relay -- 8.5 Working Principle -- 8.5.1 Working Principle -- 8.6 Results and Discussions -- 8.7 Conclusions -- References -- Chapter 9 Smart Irrigation System Using Machine Learning Techniques -- 9.1 Introduction -- 9.2 Hardware Module -- 9.2.1 Soil Moisture Sensor -- 9.2.2 LM35-Temperature Sensor -- 9.2.3 POT Resistor -- 9.2.4 BC-547 Transistor -- 9.2.5 Sounder -- 9.2.6 LCD 16x2 -- 9.2.7 Relay -- 9.2.8 Push Button -- 9.2.9 LED -- 9.2.10 Motor -- 9.3 Software Module -- 9.3.1 Proteus Tool -- 9.3.2 Arduino Based Prototyping -- 9.4 Machine Learning (Ml) Into Irrigation -- 9.5 Conclusion -- References -- Chapter 10 Design of Smart Wheelchair with Health Monitoring System -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.3 The Proposed System -- 10.4 Results and Discussions -- 10.5 Conclusions -- References -- Chapter 11 Design and Analysis of Anti-Poaching Alert System for Red Sandalwood Safety -- 11.1 Introduction…”
    Libro electrónico
  5. 2285
    por Raj, Balwinder
    Publicado 2024
    Tabla de Contenidos: “…9.7 A Summary of Neuromorphic Hardware Methodologies -- 9.8 Neuromorphic Computing in Robotics -- 9.8.1 Sensor Processing and Perception -- 9.8.2 Motor Control and Movement -- 9.8.3 Neuromorphic Hardware Advances -- 9.8.4 Brain-Inspired Learning Algorithms -- 9.9 Challenges in Neuromorphic Computing -- 9.9.1 Language Understanding and Interpretation -- 9.9.2 Sentiment Analysis and Emotion Recognition -- 9.9.3 Natural Language Generation -- 9.9.4 Language Translation and Multilingual Processing -- 9.9.5 Dialogue Systems and Conversational Agents -- 9.9.6 Language Modeling and Prediction -- 9.9.7 Text Summarization and Information Extraction -- 9.10 Applications of Neuromorphic Computing -- 9.10.1 Medicines -- 9.10.2 Artificial Intelligence [AI] -- 9.10.3 Imaging -- 9.10.4 Sensor Processing and Perception -- 9.10.5 Motor Control and Movement -- 9.10.6 Autonomous Navigation and Mapping -- 9.10.7 Human-Robot Interaction and Collaboration -- 9.10.8 Adaptive and Learning Capabilities -- 9.10.9 Task Planning and Decision Making -- 9.10.10 Robustness and Fault Tolerance -- 9.10.11 Some More Applications -- 9.11 Conclusion -- References -- Chapter 10 Performance Evaluation of Prototype Microstrip Patch Antenna Fabrication Using Microwave Dielectric Ceramic Nanocomposite Materials for X-Band Applications -- 10.1 Introduction -- 10.2 Materials and Methods -- 10.3 Results and Discussion -- 10.4 Conclusions -- References -- Chapter 11 Build and Deploy a Smart Speaker with Biometric Authentication and Advanced Voice Interaction Capabilities -- 11.1 Introduction -- 11.2 Cybersecurity Risk as Smart Speakers Don't Have an Authentication Process -- 11.3 Related Work -- 11.4 Overview of Biometric Authentication and the Voice Algorithm-Based Smart Speaker -- 11.5 Conclusion and Discussion -- Acknowledgements -- References…”
    Libro electrónico
  6. 2286
    Publicado 2009
    Tabla de Contenidos: “…Genomic standards consortium workshop : Metagenomics, Metadata and Metaanalysis (M3) / Peter Sterk ... [et al.]. Extraction of genotype-phenotype-drug relationships from text : from entity recognition to bioinformatics application / Adrien Coulet ... …”
    Libro electrónico
  7. 2287
    Publicado 2018
    Tabla de Contenidos: “…datatype -- Understanding how parse works -- First parse examples -- Using some and any -- Matching positions -- Choosing with | -- Searching, extracting, and changing -- Working with variables - to, thru, and copy -- Executing code on a match -- Changing data - change, remove, and insert -- More features and examples -- Using end -- Building special languages -- Changing a rule on the fly -- Parsing blocks and code -- Debugging parse -- Summary -- Questions -- Chapter 9: Composing Visual Interfaces -- Technical requirements -- Structuring an interface -- First example - a screen for downloading exchange rates -- Running the example -- Examining the code -- Building a layout -- Faces and actions -- Two-way binding -- Container settings - view -- Changing an app's icon -- View's refinements -- Using do in view -- Layout commands -- A faces walkthrough -- Base, box, and image -- Text faces - h1, text, field, and area -- Button, check, and radio -- List faces - text-list, drop-list, and drop-down -- Panel, group-box, and tab-panel -- Progress bar and slider -- Styles -- Events and actors -- Multiple events -- Timer event -- Actors are objects -- Detecting the keyboard -- Menus -- Basic contacts app…”
    Libro electrónico
  8. 2288
    por Hamstead, Zoé A.
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Acknowledgments -- Contents -- Editors and Contributors -- 1 A Framework for Resilient Urban Futures -- 1.1 Introduction -- 1.2 An Approach to Urban Resilience Research-Practice -- 1.3 Linking the Past, Present, and Future -- References -- 2 How We Got Here: Producing Climate Inequity and Vulnerability to Urban Weather Extremes -- 2.1 Breaking Climatological Records -- 2.2 Urbanization and Extreme Weather Events -- 2.2.1 Urban Industrialization -- 2.2.2 Urban Climatology -- 2.3 Breaking Political Will -- 2.3.1 Liberal Trade Narrative -- 2.3.2 Rational Choice Narrative -- 2.3.3 Global Climate Narrative -- 2.4 Urban Climate Extremes Exacerbate Existing Inequities -- 2.5 Conclusion -- References -- 3 Social, Ecological, and Technological Strategies for Climate Adaptation -- 3.1 Social-Ecological-Technological Systems (SETS) Framework -- 3.2 Content Analysis of Municipal Planning Documents and Governance Strategies in SETS -- 3.2.1 Selecting Municipal Planning Documents -- 3.2.2 Extracting Governance Strategies -- 3.2.3 Labeling Strategies with Levers and Exogenous Drivers -- 3.2.4 The SETS Codebook -- 3.3 Conclusion -- References -- 4 Mapping Vulnerability to Weather Extremes: Heat and Flood Assessment Approaches -- 4.1 Vulnerability Frameworks and Spatial Vulnerability Assessments for Resilience -- 4.1.1 Extreme Heat Vulnerability -- 4.1.2 Flood Vulnerability -- 4.2 Role of Vulnerability Maps -- 4.3 Urban Resilience to Extremes (UREx) Assessments and Mapping Methodologies -- 4.3.1 Vulnerability Assessments -- 4.3.2 Mapping Urban Landscapes -- 4.3.3 Mapping Extreme Event Injustice -- 4.4 Conclusion -- References -- 5 Producing and Communicating Flood Risk: A Knowledge System Analysis of FEMA Flood Maps in New York City -- 5.1 Introduction -- 5.1.1 The National Flood Insurance Program -- 5.1.2 Flood Insurance Rate Maps as a Knowledge System…”
    Libro electrónico
  9. 2289
    Tabla de Contenidos: “…Trends -- Figure 2.1. Global material extraction 1900-2009 -- Figure 2.2. Progress in decoupling materials consumption from economic activity -- Figure 2.3. …”
    Libro electrónico
  10. 2290
    por Yazdani, Amirnaser, 1972-
    Publicado 2010
    Tabla de Contenidos: “…7.1 Introduction 160 -- 7.2 Structure of Grid-Imposed Frequency VSC System 160 -- 7.3 Real-/Reactive-Power Controller 161 -- 7.4 Real-/Reactive-Power Controller Based on Three-Level NPC 181 -- 7.5 Controlled DC-Voltage Power Port 189 -- 8 Grid-Imposed Frequency VSC System: Control in dq-Frame 204 -- 8.1 Introduction 204 -- 8.2 Structure of Grid-Imposed Frequency VSC System 205 -- 8.3 Real-/Reactive-Power Controller 206 -- 8.4 Current-Mode Control of Real-/Reactive-Power Controller 217 -- 8.5 Real-/Reactive-Power Controller Based on Three-Level NPC 232 -- 8.6 Controlled DC-Voltage Power Port 234 -- 9 Controlled-Frequency VSC System 245 -- 9.1 Introduction 245 -- 9.2 Structure of Controlled-Frequency VSC System 246 -- 9.3 Model of Controlled-Frequency VSC System 247 -- 9.4 Voltage Control 253 -- 10 Variable-Frequency VSC System 270 -- 10.1 Introduction 270 -- 10.2 Structure of Variable-Frequency VSC System 270 -- 10.3 Control of Variable-Frequency VSC System 273 -- PART II APPLICATIONS 311 -- 11 Static Compensator (STATCOM) 313 -- 11.1 Introduction 313 -- 11.2 Controlled DC-Voltage Power Port 313 -- 11.3 STATCOM Structure 314 -- 11.4 Dynamic Model for PCC Voltage Control 315 -- 11.5 Approximate Model of PCC Voltage Dynamics 321 -- 11.6 STATCOM Control 322 -- 11.7 Compensator Design for PCC Voltage Controller 324 -- 11.8 Model Evaluation 324 -- 12 Back-to-Back HVDC Conversion System 334 -- 12.1 Introduction 334 -- 12.2 HVDC System Structure 334 -- 12.3 HVDC System Model 336 -- 12.4 HVDC System Control 342 -- 12.5 HVDC System Performance Under an Asymmetrical Fault 353 -- 13 Variable-SpeedWind-Power System 385 -- 13.1 Introduction 385 -- 13.2 Constant-Speed and Variable-Speed Wind-Power Systems 385 -- 13.3 Wind Turbine Characteristics 388 -- 13.4 Maximum Power Extraction from A Variable-Speed Wind-Power System 390 -- 13.5 Variable-Speed Wind-Power System Based on Doubly-Fed Asynchronous Machine 393 -- APPENDIXA: Space-Phasor Representation of Symmetrical Three-Phase Electric Machines 413.…”
    Libro electrónico
  11. 2291
    Publicado 2014
    Tabla de Contenidos: “…Encoding Secret Messages with Steganography -- Background briefing - handling file formats -- Working with the OS filesystem -- glob -- os -- Processing simple text files -- Working with ZIP files -- Working with JSON files -- Working with CSV files -- JPEG and PNG graphics - pixels and metadata -- Using the Pillow library -- Adding the required supporting libraries -- GNU/Linux secrets -- Mac OS X secrets -- Windows secrets -- Installing and confirming Pillow -- Decoding and encoding image data -- Manipulating images - resizing and thumbnails -- Manipulating images - cropping -- Manipulating images - enhancing -- Manipulating images - filtering -- Manipulating images - ImageOps -- Some approaches to steganography -- Getting the red-channel data -- Extracting bytes from Unicode characters -- Manipulating bits and bytes -- Assembling the bits -- Encoding the message -- Decoding a message -- Detecting and preventing tampering -- Using hash totals to validate a file -- Using a key with a digest -- Solving problems - encrypting a message -- Unpacking a message -- Summary -- 4. …”
    Libro electrónico
  12. 2292
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Foreword Paul Fisher -- Foreword Professor Alexander Lipton -- Foreword Rundheersing Bheenick -- Preface -- Acknowledgments -- About the Author -- List of Extract Book Titles -- Part I: Principles of Banking, Finance and Financial Products -- Chapter 1: A Primer on Banking, Finance and Financial Instruments -- An Introduction to Banking -- An Introduction to Debt Financial Markets -- An Introduction to Financial Market Products -- Bank Structures and Business Models -- Appendix 1.A: Financial Markets Arithmetic -- Appendix 1.B: Leadership Lessons From The World of Sport -- Appendix 1.C: The Global Master Repurchase Agreement -- Selected Bibliography and References -- Chapter 2: Derivative Instruments and Hedging -- Asset Swaps and Relative Value -- Post-2008 Crash Swap Discounting and Valuation Principles -- Appendix 2.A: The Par Asset Swap Spread -- Selected Bibliography and References -- Chapter 3: The Yield Curve -- Constructing the Bank's Internal Yield Curve -- Market Approach for FTP Curve Construction -- Application of Ordinary Least Squares Method and Nelson-Siegel Family Approaches -- Sonia Yield Curve -- Conclusion -- Appendix 3.A: ALCO Submission Paper -- Selected Bibliography and References -- Chapter 4: Eurobonds, Securitisation and Structured Finance -- Selected Bibliography and References -- Part II: Bank Regulatory Capital and Risk Management -- Chapter 5: Banks and Risk Management -- The Risk Management Universe for Banks -- Policy templates -- Selected Bibliography and References -- Chapter 6: Banks and Credit Risk -- Understanding and Managing Credit Risk: Part 1 -- De(re)constructing the B2 Credit Risk Airb Formula -- Understanding and Managing Credit Risk: Part 2 -- Selected Bibliography and References -- Chapter 7: Understanding and Managing Operational Risk…”
    Libro electrónico
  13. 2293
    Publicado 2018
    Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging &amp -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
    Libro electrónico
  14. 2294
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: A Gentle Introduction to Machine Learning -- Introduction - classic and adaptive machines -- Descriptive analysis -- Predictive analysis -- Only learning matters -- Supervised learning -- Unsupervised learning -- Semi-supervised learning -- Reinforcement learning -- Computational neuroscience -- Beyond machine learning - deep learning and bio-inspired adaptive systems -- Machine learning and big data -- Summary -- Chapter 2: Important Elements in Machine Learning -- Data formats -- Multiclass strategies -- One-vs-all -- One-vs-one -- Learnability -- Underfitting and overfitting -- Error measures and cost functions -- PAC learning -- Introduction to statistical learning concepts -- MAP learning -- Maximum likelihood learning -- Class balancing -- Resampling with replacement -- SMOTE resampling -- Elements of information theory -- Entropy -- Cross-entropy and mutual information -- Divergence measures between two probability distributions -- Summary -- Chapter 3: Feature Selection and Feature Engineering -- scikit-learn toy datasets -- Creating training and test sets -- Managing categorical data -- Managing missing features -- Data scaling and normalization -- Whitening -- Feature selection and filtering -- Principal Component Analysis -- Non-Negative Matrix Factorization -- Sparse PCA -- Kernel PCA -- Independent Component Analysis -- Atom extraction and dictionary learning -- Visualizing high-dimensional datasets using t-SNE -- Summary -- Chapter 4: Regression Algorithms -- Linear models for regression -- A bidimensional example -- Linear regression with scikit-learn and higher dimensionality -- R2 score -- Explained variance -- Regressor analytic expression -- Ridge, Lasso, and ElasticNet -- Ridge -- Lasso…”
    Libro electrónico
  15. 2295
    Publicado 2017
    Tabla de Contenidos: “…-- Real-life examples of machine learning -- Type of machine learning -- A small sample case study of supervised and unsupervised learning -- Steps for machine learning problems -- Choosing the machine learning model -- What are the feature types that can be extracted from the datasets? -- How do you select the best features to train your models? …”
    Libro electrónico
  16. 2296
    Publicado 2003
    Tabla de Contenidos: “…Introduction-Preparing for Production Stress Testing -- System-Level Stress Testing and Pre-Tuning -- Key SAP Stress-Testing Considerations -- How to Test mySAP Components -- Script Development and Preparation in the Real World -- Stress Test Execution During "Test Week" -- Additional Stress-Testing Goals -- Extracting the Last Drop of Value out of Testing -- Lessons Learned in the Real World -- Tools and Techniques -- Summary -- 17 Preparing for SAP Go-Live -- Overview-Preparing for Cutover -- Preparing for Technical Go-Live -- Final Administrative Technical Details -- The Changing Role of the SAP TSO -- Preparing SAP Operations and the Help Desk -- Addressing Future Service and Support -- The First Week of Go-Live -- Tools and Techniques -- Summary -- Index…”
    Libro electrónico
  17. 2297
    Publicado 2022
    Tabla de Contenidos: “…. -- Chapter 4: Voice Controlling LEDs with Edge Impulse -- Technical requirements -- Acquiring audio data with a smartphone -- Getting ready -- How to do it... -- Extracting MFCC features from audio samples -- Getting ready -- How to do it... -- There's more... -- Designing and training a NN model -- Getting ready -- How to do it... -- Tuning model performance with EON Tuner -- Getting ready -- How to do it... -- Live classifications with a smartphone -- Getting ready -- How to do it... -- Live classifications with the Arduino Nano -- Getting ready -- How to do it... -- Continuous inferencing on the Arduino Nano -- Getting ready -- How to do it... -- Building the circuit with the Raspberry Pi Pico to voice control LEDs -- Getting ready -- How to do it... -- Audio sampling with ADC and timer interrupts on the Raspberry Pi Pico -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Indoor Scene Classification with TensorFlow Lite for Microcontrollers and the Arduino Nano -- Technical requirements -- Taking pictures with the OV7670 camera module -- Getting ready -- How to do it... -- Grabbing camera frames from the serial port with Python -- Getting ready -- How to do it... -- Converting QQVGA images from YCbCr422 to RGB888 -- Getting ready -- How to do it... -- Building the dataset for indoor scene classification -- Getting ready -- How to do it…”
    Libro electrónico
  18. 2298
    por McFedries, Paul
    Publicado 2024
    Tabla de Contenidos: “…Declaring and populating an array at the same time -- Populating an array using a loop -- Iterating Arrays -- Iterating an array: forEach() -- Iterating to create a new array: map() -- Iterating an array down to a value: reduce() -- Iterating to locate an element: find() -- Manipulating Arrays -- The length property -- Some useful array methods -- Chapter 8 Coding Strings and Dates -- Manipulating Strings -- Working with string templates -- Determining the length of a string -- Searching for substrings -- Learning the methods that extract substrings -- Dealing with Dates and Times -- Learning the arguments used with the Date object -- Getting to know the Date object -- Specifying the current date and time -- Specifying any date and time -- Getting info about a date -- Setting the date -- Chapter 9 Debugging JavaScript -- Laying Out Your Debugging Tools -- Debugging 101: Using the Console -- Getting the console onscreen -- Printing program data in the Console -- Running code in the Console -- Putting Your Code into Break Mode -- Invoking break mode -- Setting a breakpoint -- Adding a debugger statement -- Getting out of break mode -- Stepping Through Your Code -- Stepping one statement at a time -- Stepping into some code -- Stepping over some code -- Stepping out of some code -- Chapter 10 Dealing with Form Data -- Coding Text Fields -- Referencing by field type -- Getting a text field value -- Setting a text field value -- Programming Checkboxes -- Referencing checkboxes -- Getting the checkbox state -- Setting the checkbox state -- Coding Radio Buttons -- Referencing radio buttons -- Getting a radio button state -- Setting the radio button state -- Programming Selection Lists -- Referencing selection list options -- Getting the selected list option -- Changing the selected option -- Working with Form Events -- Setting the focus…”
    Libro electrónico
  19. 2299
    Publicado 2016
    Tabla de Contenidos: “…Application of Dynamic Models for Optimal Redesign of Cell Factories -- Summary -- 8.1 Introduction -- 8.2 Kinetics of Pathway Reactions: the Need to Measure in a Very Narrow Time Window -- 8.2.1 Sampling -- 8.2.2 Quenching and Extraction -- 8.2.3 Analysis -- 8.2.4 Examples for Quantitative Measurements of Metabolites in Stimulus-Response Experiments -- 8.3 Tools for In Vivo Diagnosis of Pathway Reactions -- 8.3.1 Modular Decomposition of the Network: the Bottom-Up Approach -- 8.4 Examples: The Pentose-Phosphate Shunt and Kinetics of Phosphofructokinase -- 8.4.1 Kinetics of the Irreversible Reactions of the Pentose-Phosphate Shunt -- 8.4.2 Kinetics of the Phophofructokinase I (PFK1) -- 8.5 Additional Approaches for Dynamic Modeling Large Metabolic Networks -- 8.5.1 Generalized Mass Action -- 8.5.2 S-Systems Approach -- 8.5.3 Convenience Kinetics -- 8.5.4 Log-Lin and Lin-Log Approaches -- 8.6 Dynamic Models Used for Redesigning Cell Factories. …”
    Libro electrónico
  20. 2300
    Publicado 2021
    Tabla de Contenidos: “…8.7 Conclusion -- References -- Chapter 9: Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification -- 9.1 Introduction -- 9.2 Literature Review -- 9.3 Dataset Preparation -- 9.4 Methodology -- 9.4.1 ECG Pre-processing Phase -- 9.4.2 Heartbeat Segmentation Phase -- 9.4.3 Feature Extraction Phase -- 9.4.4 Learning/Classification Phase -- 9.5 Experimental Setups, Results and Discussion -- 9.5.1 Performance Indicators -- 9.5.2 Results for Experimental Setup 1 -- 9.5.3 Results for Experimental Setup 2 -- 9.6 Conclusion -- References -- Chapter 10: On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge -- 10.1 Introduction -- 10.2 Existing Decentralized Security Methods: Can Blockchain Be Used At the Edge? …”
    Libro electrónico