Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Crítica i interpretació 290
- Python (Computer program language) 180
- Data mining 159
- Història de les doctrines 150
- Data processing 137
- Revistes 136
- Machine learning 134
- Crítica, interpretació, etc 124
- Història 121
- Artificial intelligence 117
- Research & information: general 117
- Application software 107
- Development 107
- Database management 105
- Bíblia 93
- Església Catòlica 91
- Big data 90
- Technology: general issues 87
- Computer programs 81
- Aspectes religiosos 66
- History of engineering & technology 64
- Engineering & Applied Sciences 57
- Management 57
- Computer programming 54
- Natural language processing (Computer science) 50
- Cristianisme 48
- deep learning 48
- Business 47
- machine learning 47
- Security measures 45
-
4421Publicado 2007“…Anti-patterns, that is, coding idioms, which should be avoided in performance-sensitive code sections are discussed, including details on how to transform such code to make it more efficient. Most patterns were extracted from Stefan Kaes' work on improving performance of the Rails core and his regular Rails performance consulting work. …”
Libro electrónico -
4422Publicado 2016“…Instead of high-quality data with the right velocity, variety, and volume, many data scientists have to work with missing or sketchy information extracted from people in the organization. In this O’Reilly report, Jerry Overton—Distinguished Engineer at global IT leader DXC—introduces practices for making good decisions in a messy and complicated world. …”
Libro electrónico -
4423Publicado 2023“…You will learn how to combine data from multiple tables, create intricate queries, and extract valuable insights from large datasets. Lastly, we will focus on database management and optimization. …”
Video -
4424Publicado 2008“…“The premiere writer of management textbooks has sifted through the research to extract the truths every manager should know. This book is an antidote for the unsupported opinions handed out in many popular management books.” …”
Libro electrónico -
4425por Ashley, Kenneth L.“…The results of experiments are used to extract device model parameters used in subsequent electronic circuit analysis, providing a significant enhancement in the understanding of modern, computer-based electronic-circuit simulation. …”
Publicado 2003
Libro electrónico -
4426por Robbins, Stephen P., 1943-“…“The premiere writer of management textbooks has sifted through the research to extract the truths every manager should know. This book is an antidote for the unsupported opinions handed out in many popular management books.” …”
Publicado 2007
Libro electrónico -
4427Publicado 2020“…In her studies, the determination of the bioactive properties of the developed extracts and identified molecules from natural matrices stand out.Antioxidant properties are essential to break the oxidation chain that can occur in an organism, for example, in the human body, or on a substrate, such as in food. …”
Libro electrónico -
4428Publicado 2020“…Explore the potential of deep learning techniques in computer vision applications using the Python ecosystem, and build real-time systems for detecting human behavior Key Features Understand OpenCV and select the right algorithm to solve real-world problems Discover techniques for image and video processing Learn how to apply face recognition in videos to automatically extract key information Book Description Computer Vision (CV) has become an important aspect of AI technology. …”
Libro electrónico -
4429Publicado 2017“…Even though computers can't read, they're very effective at extracting information from natural language text. They can determine the main themes in the text, figure out if the writers of the text have positive or negative feelings about what they've written, decide if two documents are similar, add labels to documents, and more. …”
-
4430Publicado 2022“…About This Video Learn various components and terminology associated with JWT Extract user information and role information from JWT Create security-related classes such as configuration, filters, services In Detail JWT (JSON web token) is a standard for securing APIs in a Microservices architecture; using this standard, we can secure APIs' built-in technology such as Nodejs, Python, .NET, and so on. …”
Video -
4431Publicado 2019“…Exergy has been defined as the maximum work that is useful, extracted from any process toward its equilibrium. …”
Libro electrónico -
4432Publicado 2009“…Results We included six systematic reviews. We extracted and analyzed results on the efficacy or safety of first generation antipsychotics (typical antipsychotics) versus second generation antipsychotics (atypical antipsychotics) and among the various second generation antipsychotics. …”
Libro electrónico -
4433Publicado 2007“…Methodological details and outcomes were extracted and checked by two reviewers. Most primary studies were conducted in the US primary health-care system, often in Health Maintenance Organizations (HMOs) or at university clinics. …”
Libro electrónico -
4434Publicado 2022“…Look at exciting aspects of cybersecurity, social engineering, the tactics used to extract vital information, and how hackers exploit human psychology to dupe their targets. …”
Video -
4435Publicado 2021“…Martin In Five Lines of Code you will learn: The signs of bad code Improving code safely, even when you don't understand it Balancing optimization and code generality Proper compiler practices The Extract method, Introducing Strategy pattern, and many other refactoring patterns Writing stable code that enables change-by-addition Writing code that needs no comments Real-world practices for great refactoring Improving existing code--refactoring--is one of the most common tasks you'll face as a programmer. …”
Video -
4436Publicado 2021“…Martin In Five Lines of Code you will learn: The signs of bad code Improving code safely, even when you don't understand it Balancing optimization and code generality Proper compiler practices The Extract method, Introducing Strategy pattern, and many other refactoring patterns Writing stable code that enables change-by-addition Writing code that needs no comments Real-world practices for great refactoring Improving existing code--refactoring--is one of the most common tasks you'll face as a programmer. …”
Grabación no musical -
4437Publicado 2024“…In Graph Algorithms for Data Science you will learn: Labeled-property graph modeling Constructing a graph from structured data such as CSV or SQL NLP techniques to construct a graph from unstructured data Cypher query language syntax to manipulate data and extract insights Social network analysis algorithms like PageRank and community detection How to translate graph structure to a ML model input with node embedding models Using graph features in node classification and link prediction workflows Graph Algorithms for Data Science is a hands-on guide to working with graph-based data in applications like machine learning, fraud detection, and business data analysis. …”
Vídeo online -
4438Publicado 1993Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
4439
-
4440