Mostrando 2,381 - 2,400 Resultados de 4,853 Para Buscar '"Extraction"', tiempo de consulta: 0.12s Limitar resultados
  1. 2381
    Publicado 2017
    Tabla de Contenidos: “…Restoring the Vuex state on the client -- Webpack configuration -- Client configuration -- Server configuration -- Server-side setup -- Page template -- Express server -- Creating and updating the renderer -- Rendering the Vue app -- Running our SSR app -- Unnecessary fetch -- Production build -- Additional configuration -- Extracting the style into CSS files -- Production express server -- New npm scripts -- Summary -- Chapter 8: Project 6 - Real-time Dashboard with Meteor -- Setting up the project -- What is Meteor? …”
    Libro electrónico
  2. 2382
    Publicado 2023
    Tabla de Contenidos: “…3.2 Microbial Systems for Biofuels and Chemicals Production -- 3.2.1 Microbial Systems for Genetic Engineering and Cellular Fabrication -- 3.2.2 Engineering of Microbial Cell Systems for Biofuels Production -- 3.2.2.1 Alcohols -- 3.2.3 Engineering of Microbial Cell Systems for Chemical Synthesis -- 3.2.3.1 Organic Acids -- 3.2.3.2 Fatty Alcohols -- 3.2.3.3 Bioplastic -- 3.3 Conclusions -- References -- Chapter 4 Production of Biomethane and Its Perspective Conversion: An Overview -- 4.1 Introduction -- 4.1.1 Sources of Methane -- 4.1.2 Methane from Human Activity -- 4.1.3 Impact of Methane on Climatic Change and Future -- 4.1.4 Advancements and Challenges -- References -- Chapter 5 Microalgal Biomass Synthesized Biodiesel: A Viable Option to Conventional Fuel Energy in Biorefinery -- 5.1 Introduction -- 5.2 Diesel -- 5.2.1 Biodiesel -- 5.3 Production of Biodiesel -- 5.3.1 Origin of Biofuels -- 5.3.2 Biodiesel Production from Algae -- 5.3.3 Intensity of Radiant Light -- 5.3.4 Lipid Content -- 5.3.5 Biomass Culturing Conditions -- 5.3.5.1 Temperature of Cultivation -- 5.3.5.2 pH of Cultivation -- 5.3.5.3 Duration Period of Light of Cultivation -- 5.3.5.4 Carbon Uptake of Cultivation -- 5.3.5.5 Oxygen Generation in Cultivation -- 5.3.5.6 Mixing Rates of Cultivation -- 5.3.5.7 Nutrient Uptake of Cultivation -- 5.4 Harvesting of Microalgae -- 5.4.1 Extraction of Oil -- 5.4.1.1 Varying n-Hexane to Algae Ratio -- 5.4.1.2 Varying the Algal Biomass Size -- 5.4.1.3 Varying Contact Time between n-Hexane and Algae Biomass -- 5.4.2 Transesterification -- 5.5 Conclusion -- Abbreviations -- References -- Chapter 6 Algae Biofuel Production Techniques: Recent Advancements -- 6.1 Introduction -- 6.2 Technologies for Conversion if Algal Biofuels -- 6.2.1 Thermochemical Conversion of Microalgae Biomass into Biofuel -- 6.2.1.1 Gasification…”
    Libro electrónico
  3. 2383
    Publicado 2023
    Tabla de Contenidos: “…Using the distribution of the evaluations -- 7.2.5. Extracting a "dramatic" image from a panorama: the Creatism system -- 7.3. …”
    Libro electrónico
  4. 2384
    Publicado 2023
    Tabla de Contenidos: “…Properties of indefinite integrals -- Integration by parts -- Definite integrals -- Working with calculus in R -- Plotting basic functions -- Working with derivatives -- Using symbolic parameters -- Working with the second derivative -- Working with partial derivatives -- Working with integration in R -- More on antiderivatives -- Evaluating the definite integral -- Summary -- Part 3: Fundamentals of Mathematical Statistics in R -- Chapter 10: Probability Basics -- Technical requirements -- Introducing probability distribution -- Exploring common discrete probability distributions -- The Bernoulli distribution -- The binomial distribution -- The Poisson distribution -- Poisson approximation to binomial distribution -- The geometric distribution -- Comparing different discrete probability distributions -- Discovering common continuous probability distributions -- The normal distribution -- The exponential distribution -- Uniform distribution -- Generating normally distributed random samples -- Understanding common sampling distributions -- Common sampling distributions -- Understanding order statistics -- Extracting order statistics -- Calculating the value at risk -- Summary -- Chapter 11: Statistical Estimation -- Statistical inference for categorical data -- Statistical inference for a single parameter -- Introducing the General Social Survey dataset -- Calculating the sample proportion -- Calculating the confidence interval -- Interpreting the confidence interval of the sample proportion -- Hypothesis testing for the sample proportion -- Inference for the difference in sample proportions -- Type I and Type II errors -- Testing the independence of two categorical variables -- Introducing the contingency table -- Applying the chi-square test for independence between two categorical variables -- Statistical inference for numerical data…”
    Libro electrónico
  5. 2385
    Publicado 2023
    Tabla de Contenidos: “…3.5.4 Machine learning approaches -- 3.5.5 Pathway-based approaches -- 3.5.6 Artificial neuronal network approaches -- 3.5.7 Deep learning machine approaches -- 3.5.8 Network modeling approach -- 3.5.8.1 Autoencoder approaches -- 3.5.8.2 Text mining approaches -- 3.6 Artificial intelligence algorithms for drug repurposing -- 3.7 Computational intelligence-based approaches to identify therapeutic candidates for repurposing against coronavirus -- 3.7.1 Network-based model -- 3.7.2 Structure-based approaches -- 3.7.3 Artificial intelligence approaches -- 3.8 Challenges in drug repurposing -- 3.9 Future perspectives of artificial intelligence-informed drug repurposing -- 3.10 Conclusion -- References -- 4 COVID-19: artificial intelligence solutions, prediction with country cluster analysis, and time-series forecasting -- 4.1 Introduction -- 4.1.1 Motivation for this study -- 4.1.2 Adverse impacts of COVID-19 outbreak -- 4.1.3 Chapter organization -- 4.1.4 Table of acronyms used in this chapter -- 4.2 Review of literature on COVID-19 pandemic -- 4.3 K-means clustering for COVID-19 country analysis -- 4.3.1 Cluster analysis: an overview -- 4.3.2 Dataset selection and preprocessing -- 4.3.3 Findings from COVID-19 country cluster data analysis -- 4.3.4 The results and discussions -- 4.4 Time-series modeling for COVID-19 new cases -- 4.4.1 Time-series modeling: an overview -- 4.4.2 Dataset description -- 4.4.3 Time-series exploration -- 4.4.4 Predictive analytics -- 4.5 Conclusion -- References -- Further reading -- 5 Graph convolutional networks for pain detection via telehealth -- 5.1 Introduction -- 5.2 Methodology -- 5.2.1 Features extraction -- 5.2.2 Graph-based modules -- 5.2.3 Frame-wise weight calculation -- 5.2.4 Classification -- 5.3 Experiments -- 5.3.1 Datasets -- 5.3.2 Experimental setting -- 5.4 Results and discussion -- 5.5 Conclusion…”
    Libro electrónico
  6. 2386
    por Tsuji, Koichi
    Publicado 2023
    Tabla de Contenidos: “…Performing date, time, and duration calculations with date and time expressions -- Extracting components of a datetime value -- Performing duration calculations -- Understanding week-based calculation functions -- Calculating duration in decimal value results -- Performing record-level operations with table functions and expressions -- Understanding the difference between column- and row-level functions -- Understanding important miscellaneous functions -- Using functions related to the app user -- Using the CONTEXT() functions -- Using the TEXT() function -- Using multiple functions in single expressions -- Summary -- Chapter 5: Manipulating Data with Behaviors and Actions -- Technical requirements -- Understanding actions and action types -- What are actions? …”
    Libro electrónico
  7. 2387
    Publicado 2024
    Tabla de Contenidos: “…-- Port scanning issues -- Scanning countermeasures -- Introducing the Nmap network scanning tool -- Controlling Nmap scan speeds -- Outputting results -- The NSE -- The Nmap GUI -- Mapping the network -- Lab - Scanning and enumeration -- Summary -- Assessment -- Answer -- Chapter 4: Ethical Hacking Vulnerability Assessments and Threat Modeling -- Vulnerability assessment concepts -- Explaining vulnerability assessments -- Types of vulnerability assessments -- Vulnerability assessment life cycle -- Vulnerability scanning tools -- Introducing the Nessus vulnerability scanner -- Best practices for vulnerability assessments -- Vulnerability assessment reports -- The elements of threat modeling -- The finding -- The kill chain -- The single asset value -- The organizational asset value -- The estimated risk -- Threat modeling frameworks -- STRIDE -- PASTA -- VAST -- Attack trees -- CVSS -- Threat modeling tools -- Threat forecasting -- Phase 1 - Research -- Phase 2 - Implementation and analysis -- Phase 3 - Information sharing and building -- Threat model lab - personal computer security -- Summary -- Assessment -- Answer -- Part 2: Hacking Tools and Techniques -- Chapter 5: Hacking the Windows Operating System -- Technical requirements -- Exploiting the Windows OS -- Exploiting Windows device drivers -- Exploiting Windows networking -- Address Resolution Protocol -- Simple network management protocol -- Server Message Block -- NetBIOS -- Exploiting Windows authentication -- User authentication and movement -- Obtaining and extracting passwords -- Exploring password-cracking techniques -- Authentication spoofing -- Pulling Windows account names via null sessions -- Tools for pulling account names via null sessions -- Privilege elevation…”
    Libro electrónico
  8. 2388
    por Ayuso Guixot, Miguel Ángel
    Publicado 2001
    991003816609706719
  9. 2389
    Capítulo
  10. 2390
    Publicado 1942
    Libro
  11. 2391
    Publicado 1964
    Libro
  12. 2392
    Libro
  13. 2393
    Publicado 2018
    Tabla de Contenidos: “…Autoanticuerpos -- ANTICUERPOS ANTINUCLEARES -- ANTICUERPOS ANTI-DNA -- ANTICUERPOS CONTRA ANTÍGENOS EXTRACTABLES DEL NÚCLEO -- ANTICUERPOS ANTIFOSFOLÍPIDOS -- FACTOR REUMATOIDE -- ANTICUERPOS ANTICITRULINA -- ANTICUERPOS CONTRA CITOPLASMA DE NEUTRÓFILOS -- ANTICUERPOS EN ESCLERODERMIA -- OTROS AUTOANTICUERPOS -- BIBLIOGRAFÍA -- IMAGENES Y FOTOGRAFIAS -- 8. …”
    Libro electrónico
  14. 2394
    Publicado 2013
    Tabla de Contenidos: “…. -- Cause Related Marketing -- Caux Round Table Principles -- Centre for Corporate Governance (Nairobi) -- CERES -- CH2 Building, Melbourne -- Chapman Report (2006) (Australia) -- Cheating -- Chief Executive Officer -- Chief Sustainability Officer -- Christianity and CSR -- Christine Parker -- Civil Regulation -- Climate Change -- Clinton Global Initiative -- Club of Rome -- Co-determination -- Co-operation -- Co-ownership -- Coalation of Environmentally -- Responsible Economies -- Code of 'best practice' and norms of behavior -- Colin Scott -- Collaborative Advantage -- Collective bargaining/trade unions -- Combined Assurance -- Combined Code (June 2008) -- Command and Control -- Commonwealth Association of CG -- Communicating with Stakeholders -- Communities of Practice -- Community -- Community activism -- Community of practice -- Community outrage -- Community relations -- Company Directors and CSR -- Competition -- Competitive advantage -- Compliance/Legal Compliance -- Compliant Finance -- Comply-or-explain -- Comprehensive Environmental Responses , Compensation and Liability Act -- Confucian Ethics -- Consumer Driven Corporate Responsibility -- Consumerism Consumers' protection -- Core Principles of CSR Approaches Corporate -- Corporate Activism -- Corporate Citizenship -- Corporate codes of conduct -- Corporate giving -- Corporate Governance -- Corporate Governance as a Tool for Alleviating -- Developmental Issues -- Corporate Governance Reporting -- Corporate killing -- Corporate manslaughter -- Corporate Mission, Vision and Values -- Corporate moral agency -- Corporate negligence -- Corporate outrage -- Corporate Political Connection -- Corporate Reputation -- Corporate Responsibility Index -- Corporate Responsibiliy Maturity -- Corporate Secretaries -- Corporate Social Entrepreneurship -- Corporate Social innovation -- Corporate Social -- Irresponsibility -- Corporate Social Marketing -- Corporate Social Opportunity -- Corporate Social Performance -- Corporate Social Performance Measurement -- Corporate social responsibility -- Corporate Social Responsibility Report -- Corporate Social Responsibility Strategy -- Corporate social responsiveness (Carroll, Frederick and Ackerman) -- Corporate Strategy -- Corporate Sustainability -- Corporation as Psychopath -- Corporatism -- Corruption and National Development -- Cost-benefit analysis -- Cradle to cradle -- Cradle to grave -- Critical reflection in corporate management -- Critiques of Corporate Social Responsibility -- Cross-cultural attitudes to CSR -- CSR and Africa -- CSR and Catholic Social Teaching -- CSR and Corruption -- CSR and Poverty -- CSR and Spirituality -- CSR Butterfly effect -- CSR Communication -- CSR Continuum - core business to broader goals -- CSR Europe -- CSR Evolutionary Journey - CSR Journey, CSR Organisational Evolutions -- CSR Frameworks -- CSR Innovation -- CSR Lifecycle -- CSR Measurement -- CSR: Australian Standard AS8003 [world first] -- CSRwire -- Cultural differences in values/ethics and decision-making -- Culture and Organization Performance -- Cultures, businesses, and global CSR -- Customer value creation -- Dame Anita Roddick -- Data protection -- David Henderson -- Decent work -- Definitions of social responsibility -- Deming 14 points model -- Demographic change -- Design for Environment (sep entry Hannover Principles) -- Development -- Dialogue -- Director Competencies and Skills -- Director Interlocks -- Director Role Position Description -- Disability -- Disclosure (CSR reporting) -- Discrimination -- Distributive Justice -- Diversity -- Dividend -- Dow Jones Sustainability Index -- Downsizing -- Due Diligence -- Duties of employees (comlpy with contract, comply with law, respect employers property) -- E-Waste -- Earth Summitt (separate entry on Rio declaration and on Agenda 21) -- Earthscan (publisher) -- EC Non-Discrimination Law -- Eco-Efficiency -- Eco-innovation -- Ecolabel -- Ecological economics -- Ecological footprint -- Ecology (separate entries on human and industrial) -- Econology -- Economic Globalization -- Economic sociology -- Economic Sociology of the CSR Movement -- Ecopreneurship -- Ecosystem -- Ecotoxity -- Education -- Elkington, John -- Embedded CSR -- Emissions trading -- Employability -- Employee participation/'ownership -- Employee Surveillance -- Employee volunteer programmes -- Employers' Forum on Age -- Employers' Forum on Disability -- EMS -- Endemic -- Energy Biofuels -- Energy—renewable -- Energy-solar -- Engagement/Stakeholder Engagement -- Enlightened Self-Interest -- Enron -- Environmental Accounting -- Environmental Audit -- Environmental ethics -- Environmental governance -- Environmental impact assessment -- Environmental law -- Environmental Management System -- Environmental protection agencies (all countries) -- Environmental Report Verification -- Environmental sustainability index (World economic forum) -- Environmental, Social and Governance Factors in Investment -- Environmental, Social and Governance Risk -- Environmentally Sensitive Accounting -- Equal Opportunity -- Equal Pay -- Equator Principles -- Ethic of responsibility to other stakeholders -- Ethical absolutism v. ethical relativism -- Ethical Corporation -- Ethical CSR -- Ethical Egoism & CSR -- Ethical problems in financial markets -- Ethical Theories -- Ethical Trading Initiative -- European Corporate Governance Institute -- European Multistakeholder Forum -- European Union Directive - The 8th Company Law Directive on Disclosure & Transparency -- European Urban Charter 1992 and 1998 -- Evolution of Corporate Governance Reports in the UK and Ireland -- Executive remuneration and CSR -- Externalities -- Externally Driven Business Case (EDBC) -- Extractive Industries Transparency Initiative (EITI) -- Exxon Mobil -- Exxon Valdez -- Factor 4 / Factor 10 -- Fair Pensions -- Fair Trade -- Fair wages -- Family Business and Corporate Social Responsibility -- Fiduciary duty -- Filial Piety & CSR -- Financial Regulations -- Financial Reporting Council (UK) -- Five Capitals Framework (Forum for the Future) -- Forest Stewardship Council -- Fortune at the bottom of the pyramid (Prahalad) -- Franchising Fraud prevention, detection and auditing -- Free range/cage-free/crate free/ethically raised -- Freedom of conscience -- Freedom of speech -- Friedman, Milton -- FTSE4Good Index -- G20.…”
    Libro electrónico
  15. 2395
    Publicado 2011
    Tabla de Contenidos: “…12 ADVANCES IN DATA MINING 328 -- 12.1 Graph Mining 329 -- 12.2 Temporal Data Mining 343 -- 12.3 Spatial Data Mining (SDM) 357 -- 12.4 Distributed Data Mining (DDM) 360 -- 12.5 Correlation Does Not Imply Causality 369 -- 12.6 Privacy, Security, and Legal Aspects of Data Mining 376 -- 12.7 Review Questions and Problems 381 -- 12.8 References for Further Study 382 -- 13 GENETIC ALGORITHMS 385 -- 13.1 Fundamentals of GAs 386 -- 13.2 Optimization Using GAs 388 -- 13.3 A Simple Illustration of a GA 394 -- 13.4 Schemata 399 -- 13.5 TSP 402 -- 13.6 Machine Learning Using GAs 404 -- 13.7 GAs for Clustering 409 -- 13.8 Review Questions and Problems 411 -- 13.9 References for Further Study 413 -- 14 FUZZY SETS AND FUZZY LOGIC 414 -- 14.1 Fuzzy Sets 415 -- 14.2 Fuzzy-Set Operations 420 -- 14.3 Extension Principle and Fuzzy Relations 425 -- 14.4 Fuzzy Logic and Fuzzy Inference Systems 429 -- 14.5 Multifactorial Evaluation 433 -- 14.6 Extracting Fuzzy Models from Data 436 -- 14.7 Data Mining and Fuzzy Sets 441 -- 14.8 Review Questions and Problems 443 -- 14.9 References for Further Study 445 -- 15 VISUALIZATION METHODS 447 -- 15.1 Perception and Visualization 448 -- 15.2 Scientifi c Visualization and -- Information Visualization 449 -- 15.3 Parallel Coordinates 455 -- 15.4 Radial Visualization 458 -- 15.5 Visualization Using Self-Organizing Maps (SOMs) 460 -- 15.6 Visualization Systems for Data Mining 462 -- 15.7 Review Questions and Problems 467 -- 15.8 References for Further Study 468 -- Appendix A 470 -- A.1 Data-Mining Journals 470 -- A.2 Data-Mining Conferences 473 -- A.3 Data-Mining Forums/Blogs 477 -- A.4 Data Sets 478 -- A.5 Comercially and Publicly Available Tools 480 -- A.6 Web Site Links 489 -- Appendix B: Data-Mining Applications 496 -- B.1 Data Mining for Financial Data Analysis 496 -- B.2 Data Mining for the Telecomunications Industry 499 -- B.3 Data Mining for the Retail Industry 501 -- B.4 Data Mining in Health Care and Biomedical Research 503 -- B.5 Data Mining in Science and Engineering 506.…”
    Libro electrónico
  16. 2396
    por Mueller, John Paul
    Publicado 2020
    Tabla de Contenidos: “…Performing Functional Data Manipulation -- Slicing and dicing -- Mapping your data -- Filtering data -- Organizing data -- Chapter 3 Working with Scalars, Vectors, and Matrices -- Considering the Data Forms -- Defining Data Type through Scalars -- Creating Organized Data with Vectors -- Defining a vector -- Creating vectors of a specific type -- Performing math on vectors -- Performing logical and comparison tasks on vectors -- Multiplying vectors -- Creating and Using Matrices -- Creating a matrix -- Creating matrices of a specific type -- Using the matrix class -- Performing matrix multiplication -- Executing advanced matrix operations -- Extending Analysis to Tensors -- Using Vectorization Effectively -- Selecting and Shaping Data -- Slicing rows -- Slicing columns -- Dicing -- Concatenating -- Aggregating -- Working with Trees -- Understanding the basics of trees -- Building a tree -- Representing Relations in a Graph -- Going beyond trees -- Arranging graphs -- Chapter 4 Accessing Data in Files -- Understanding Flat File Data Sources -- Working with Positional Data Files -- Accessing Data in CSV Files -- Working with a simple CSV file -- Making use of header information -- Moving On to XML Files -- Working with a simple XML file -- Parsing XML -- Using XPath for data extraction -- Considering Other Flat-File Data Sources -- Working with Nontext Data -- Downloading Online Datasets -- Working with package datasets -- Using public domain datasets -- Chapter 5 Working with a Relational DBMS -- Considering RDBMS Issues -- Defining the use of tables -- Understanding keys and indexes -- Using local versus online databases -- Working in read-only mode -- Accessing the RDBMS Data -- Using the SQL language -- Relying on scripts -- Relying on views -- Relying on functions -- Creating a Dataset -- Combining data from multiple tables…”
    Libro electrónico
  17. 2397
    Publicado 2018
    Tabla de Contenidos: “…Code injection fundamentals - fine-tuning with BDF -- Trojan engineering with BDF and IDA -- Summary -- Questions -- Further reading -- Chapter 11: Bypassing Protections with ROP -- Technical requirements -- DEP and ASLR - the intentional and the unavoidable -- Understanding DEP -- Understanding ASLR -- Testing DEP protection with WinDbg -- Demonstrating ASLR on Kali Linux with C -- Introducing return-oriented programming -- Borrowing chunks and returning to libc - turning the code against itself -- The basic unit of ROP - gadgets -- Getting cozy with our tools - MSFrop and ROPgadget -- Metasploit Framework's ROP tool - MSFrop -- Your sophisticated ROP lab - ROPgadget -- Creating our vulnerable C program without disabling protections -- No PIE for you - compiling your vulnerable executable without ASLR hardening -- Generating a ROP chain -- Getting hands-on with the return-to-PLT attack -- Extracting gadget information for building your payload -- Finding the .bss address -- Finding a pop pop ret structure -- Finding addresses for system@plt and strcpy@plt functions -- Finding target characters in memory with ROPgadget and Python -- Go, go, gadget ROP chain - bringing it together for the exploit -- Finding the offset to return with gdb -- Writing the Python exploit -- Summary -- Questions -- Further reading -- Chapter 12: Fuzzing Techniques -- Technical requirements -- Network fuzzing - mutation fuzzing with Taof proxying -- Configuring the Taof proxy to target the remote service -- Fuzzing by proxy - generating legitimate traffic -- Hands-on fuzzing with Kali and Python -- Picking up where Taof left off with Python - fuzzing the vulnerable FTP server -- The other side - fuzzing a vulnerable FTP client -- Writing a bare-bones FTP fuzzer service in Python -- Crashing the target with the Python fuzzer -- Fuzzy registers - the low-level perspective…”
    Libro electrónico
  18. 2398
    Publicado 2018
    Tabla de Contenidos: “…-- Convolutions in three dimensions -- A layer of convolutions -- Benefits of convolutional layers -- Parameter sharing -- Local connectivity -- Pooling layers -- Batch normalization -- Training a convolutional neural network in Keras -- Input -- Output -- Cost function and metrics -- Convolutional layers -- Fully connected layers -- Multi-GPU models in Keras -- Training -- Using data augmentation -- The Keras ImageDataGenerator -- Training with a generator -- Summary -- Chapter 8: Transfer Learning with Pretrained CNNs -- Overview of transfer learning -- When transfer learning should be used -- Limited data -- Common problem domains -- The impact of source/target volume and similarity -- More data is always beneficial -- Source/target domain similarity -- Transfer learning in Keras -- Target domain overview -- Source domain overview -- Source network architecture -- Transfer network architecture -- Data preparation -- Data input -- Training (feature extraction) -- Training (fine-tuning) -- Summary -- Chapter 9: Training an RNN from scratch -- Introducing recurrent neural networks -- What makes a neuron recurrent? …”
    Libro electrónico
  19. 2399
    Publicado 2018
    Tabla de Contenidos: “…Chapter 3: Best Practices for Building Selenium Page Object Classes -- Introduction -- What you will learn -- Best practices for naming conventions, comments, and folder structures -- Naming conventions -- Comments -- Folder names and structures -- Designing and building the abstract base classes for the AUT -- The abstract class -- Abstract methods -- Common locators -- Common methods -- Wrap up on base classes -- Designing and building subclasses for feature-specific pages using inheritance techniques -- Encapsulation and using getter/setter methods to retrieve objects from the page object classes -- Exception handling and synchronization in page object class methods -- Implicit exception handling -- TestNG difference viewer -- Explicit exception handling -- Try...catch exception handling -- Synchronizing methods -- Table classes -- Summary -- Chapter 4: Defining WebDriver and AppiumDriver Page Object Elements -- Introduction -- Inspecting page elements on browser applications -- Types of locators -- Inheriting WebElements -- Inspecting WebElements -- Third-party plugins/tools -- Inspection of page elements on mobile applications -- Appium inspector -- Inspecting mobile elements -- Standards for using static locators -- Rules for using standard locators -- Simple locators -- CSS locators -- XPath query locators -- Referencing static elements in methods -- Retrieving static elements from other classes -- Standards for using dynamic locators -- Single attribute XPath versus CSS locators -- WebElements -- MobileElements -- Multiple attribute XPath versus CSS locators -- Using dynamic locators in methods -- Summary -- Chapter 5: Building a JSON Data Provider -- Introduction -- What you will learn -- The TestNG Data Provider class -- The @DataProvider annotation -- The @Test annotation -- Extracting JSON data into Java objects -- Filtering test data…”
    Libro electrónico
  20. 2400
    Publicado 2021
    Tabla de Contenidos: “…Enabling/disabling column resizing -- Filtering data from a table -- Implementing pagination -- Working with dialogs -- Using the dialog component -- Opening and closing the dialog on an action -- Implementing the logic to delete a user -- Working with checkboxes -- Creating a checkbox with static data -- Creating a checkbox with dynamic data -- Working with List View -- Showing data in the Card Layout view -- Working with visualization components -- Creating a bar chart -- Creating a pie chart -- Creating an area chart -- Summary -- Further reading -- Questions -- Chapter 9: Extending Oracle and Non-Oracle SaaS Applications -- Technical requirements -- Extending a Salesforce application -- Pre-requisites for extending the Salesforce app -- Creating a Service Connection -- Listing and creating accounts -- Listing opportunities -- Creating opportunities -- Extending an Oracle Cloud application -- Adding an accounts REST endpoint -- Listing and updating the accounts -- Adding nomination functionality -- Creating a multilingual application -- Configuring an application to set the selected language locale -- Generating translatable strings -- Downloading and uploading the bundle -- Adding a language switcher -- Summary -- Questions -- Chapter 10: Working with Business Processes -- Technical requirements -- Adding the Process backend -- Registering the business processes -- Initiating the process from the VB application -- Managing process tasks -- Extracting the data object -- Configuring a connection to a process server -- Summary -- Further reading -- Questions -- Chapter 11: Building a Mobile Application with Live Examples -- Technical requirements -- Developing a mobile application -- Developing a doctor's appointment mobile application -- Booking an appointment -- Listing the appointments -- Configuring mobile application settings…”
    Libro electrónico