Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Crítica i interpretació 290
- Python (Computer program language) 180
- Data mining 159
- Història de les doctrines 150
- Data processing 137
- Revistes 136
- Machine learning 134
- Crítica, interpretació, etc 124
- Història 121
- Artificial intelligence 117
- Research & information: general 117
- Application software 107
- Development 107
- Database management 105
- Bíblia 93
- Església Catòlica 91
- Big data 90
- Technology: general issues 87
- Computer programs 81
- Aspectes religiosos 66
- History of engineering & technology 64
- Engineering & Applied Sciences 57
- Management 57
- Computer programming 54
- Natural language processing (Computer science) 50
- Cristianisme 48
- deep learning 48
- Business 47
- machine learning 47
- Security measures 45
-
1741Publicado 2018Tabla de Contenidos: “…Using chart to turn data -- Using timechart to show values over time -- The timechart options -- Working with fields -- A regular expression primer -- Commands that create fields -- eval -- rex -- Extracting loglevel -- Using the extract fields interface -- Using rex to prototype a field -- Using the admin interface to build a field -- Indexed fields versus extracted fields -- Indexed field case 1 - rare instances of a common term -- Indexed field case 2 - splitting words -- Indexed field case 3 - application from source -- Indexed field case 4 - slow requests -- Indexed field case 5 - unneeded work -- Chart enhancements in version 7.0 -- charting.lineWidth -- charting.data.fieldHideList -- charting.legend.mode -- charting.fieldDashStyles -- charting.axis Y.abbreviation -- Summary -- Chapter 4: Data Models and Pivots -- What is a data model? …”
Libro electrónico -
1742Publicado 2023Tabla de Contenidos: “…Passing parameters into views -- Using macros for JSON serialization -- Building our own serialization struct -- Implementing the Serialize trait -- Integrating serialization structs into our application code -- Packaging our custom serialized struct to be returned to users -- Extracting data from views -- Extracting JSON from the body of a request -- Extracting data from the header in requests -- Simplifying header extraction with traits -- Summary -- Questions -- Answers -- Chapter 5: Displaying Content in the Browser -- Technical requirements -- Serving HTML, CSS, and JavaScript using Rust -- Serving basic HTML -- Reading basic HTML from files -- Serving basic HTML loaded from files -- Adding JavaScript to an HTML file -- Communicating with our server using JavaScript -- Injecting JavaScript into HTML -- Adding the delete endpoint -- Adding a JavaScript loading function -- Adding JavaScript tags in the HTML -- Building a rendering JavaScript function -- Building an API call JavaScript function -- Building JavaScript functions for buttons -- Injecting CSS into HTML -- Adding CSS tags to HTML -- Creating a base CSS -- Creating CSS for the home page -- Serving CSS and JavaScript from Rust -- Inheriting components -- Creating a React app -- Making API calls in React -- Creating custom components in React -- Creating our ToDoItem component -- Creating custom components in React -- Constructing and managing custom components in our App component -- Lifting CSS into React -- Converting our React application into a desktop application -- Summary -- Questions -- Answers -- Further reading -- Part 3: Data Persistence -- Chapter 6: Data Persistence with PostgreSQL -- Technical requirements -- Building our PostgreSQL database -- Why we should use a proper database -- Why use Docker? …”
Libro electrónico -
1743por Gurfinkel, ArieTabla de Contenidos: “…3 At-Least-K Conjunctive Normal Form (KNF) -- 4 Cardinality Constraint Extraction and Analysis -- 4.1 Extraction -- 4.2 Analysis with BDDs -- 4.3 PySAT Encodings Experimental Evaluation -- 5 Cardinality Conflict-Driven Clause Learning -- 5.1 Implementation Details -- 5.2 Inprocessing Techniques -- 6 Proof Checking -- 6.1 Satisfying Assignments -- 6.2 Clausal Proofs -- 6.3 Starting with KNF Input -- 7 Experimental Evaluation -- 7.1 SAT Competition Benchmarks -- 7.2 Magic Squares and Max Squares -- 8 Conclusion and Future Work -- References -- CaDiCaL 2.0 -- 1 Introduction -- 2 Architecture -- 3 External Propagator -- 4 Proofs -- 5 Tracer Interface -- 6 Constraints and Flipping -- 7 Interpolation -- 8 Testing and Debugging -- 9 Experiments -- 10 Conclusion -- References -- Formally Certified Approximate Model Counting -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Approximate Model Counting -- 3.2 Formalization in Isabelle/HOL -- 4 Approximate Model Counting in Isabelle/HOL -- 4.1 Abstract Specification and Probabilistic Analysis -- 4.2 Concretization to a Certificate Checker -- 4.3 Extending ApproxMC to ApproxMCCert -- 4.4 CNF-XOR Unsatisfiability Checking -- 5 Experimental Evaluation -- 6 Conclusion and Future Work -- References -- Scalable Bit-Blasting with Abstractions -- 1 Introduction -- 2 Preliminaries -- 3 Abstraction-Refinement Framework -- 4 Refinement Schemes -- 4.1 Hand-Crafted Lemmas -- 4.2 Lemma Scoring Scheme -- 4.3 Synthesizing Lemmas via Abduction -- 4.4 Lemma Verification -- 5 Integration -- 6 Evaluation -- 7 Conclusion -- References -- Hardware Model Checking -- The MoXI Model Exchange Tool Suite -- 1 Overview -- 2 Intermediate Language -- 3 Tool Suite -- 3.1 Translators -- 3.2 Utilities -- 4 Tool Suite Validation -- 5 Benchmarks -- 6 Conclusion and Future Work -- References -- SMLP: Symbolic Machine Learning Prover…”
Publicado 2024
Libro electrónico -
1744Publicado 2022Tabla de Contenidos: “…8.2.1 Solar-Powered Wheelchair -- 8.2.2 Solar Energy Module -- 8.3 Smart EMG-Based Wheelchair Control System -- 8.3.1 Techniques of EMG Signal Collection -- 8.3.2 Pre-Possessing and Segmentation of EMG Signal -- 8.3.3 Feature Extraction and Pattern Classification -- 8.4 Smart Navigation Assistance -- 8.5 Internet of Things (IoT)-Enabled Monitoring -- 8.6 Future Advancements in Smart Wheelchairs -- References -- 9 Hand-Talk Assistance: An Applicationfor Hearing and Speech Impaired People -- 9.1 Introduction -- 9.1.1 Sign Language -- 9.1.2 Recognition of Hand Gesture -- 9.1.3 Different Techniques for Sign Language Detection -- 9.2 Related Work -- 9.3 History and Motivation -- 9.4 Types of Sensors -- 9.4.1 Flex Sensor -- 9.5 Working of Glove -- 9.5.1 Hand Gloves -- 9.5.2 Implementation Details at Server Side -- 9.6 Architecture -- 9.7 Advantages and Applications -- References -- 10 The Effective Practice of AssistiveTechnology to Boom Total Communication Among ChildrenWith Hearing Impairment inInclusive Classroom Settings -- 10.1 Introduction -- 10.2 Students With Hearing Impairment -- 10.3 The Classifications on Hearing Impairment -- 10.3.1 Conductive Hearing Losses -- 10.3.2 Sensorineural Hearing Losses -- 10.3.3 Central Hearing Losses -- 10.3.4 Mixed Hearing Losses -- 10.4 Inclusion of Hearing-Impaired Students in Inclusive Classrooms -- 10.4.1 Assistive Technology -- 10.4.2 Assistive Technology for Hearing Impairments -- 10.4.3 Hearing Technology -- 10.4.4 Assistive Listening Devices -- 10.4.5 Personal Amplification -- 10.4.6 Communication Supports -- 10.5 Total Communication System for HearingImpairments -- 10.6 Conclusion -- References -- Index -- EULA…”
Libro electrónico -
1745Publicado 1999Tabla de Contenidos: “…OVERVIEW -- Total Threshold Limit Concentrations (TTLCs) -- Human Health Risk Assessment Scenarios and Models -- Upper TTLCs -- Exit-level TTLCs -- Soluble or Extractable Regulatory Thresholds (SERTs) -- 2. ISSUES -- TTLC issues -- Model Selection -- Scenario Selection -- SERT issues -- Acute Toxicity Issues -- DESCRIPTION OF ISSUES -- The Waste Classification Review -- The Existing California System -- RECOMMENDATION -- CIRCUMSTANCES NECESSITATING A DECISION -- EXISTING STATUTES OR REGULATIONS RELATED TO THE ISSUE -- Objectives to be Achieved Through Decision -- Alternatives Available and Recommended Alternative -- A. …”
Libro electrónico -
1746Publicado 2011Tabla de Contenidos: “…: Javanese cotton trade industry from the seventeenth to the eighteenth centuries / Kwee Hui Kian -- The power of culture and its limits : Taiwanese merchants' Asian commodity flows, 1895-1945 / Lin Man-houng -- Rice trade and Chinese rice millers in the late-nineteenth and early-twentieth centuries : the case of British Malaya / Wu Xiao An -- Tonle sap processed fish: from Khmer subsistence staple to colonial export commodity / Nola Cooke -- Moses' rod: the Bible as a commodity in Southeast Asia and China / Jean DeBernardi -- Market price, labor input, and relation of production in Sarawak's edible birds' nest trade / Bien Chiang -- A Sino-Southeast Asian circuit : ethnohistories of the marine goods trade / Eric Tagliacozzo -- From a Shiji episode to the forbidden jade trade during the socialist regime in Burma / Wen-Chin Chang -- Conflict timber along the China-Burma border : connecting the global timber consumer with violent extraction sites / Kevin Woods…”
Libro electrónico -
1747por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Modelling of Colloid-facilitated Contaminant Transport with the Computer Code TRAPIC: Theoretical Basis and ApplicationMatrix Diffusion: Through-Diffusion Versus Electrical Conductivity Measurements; Discordance in Understanding of Isotope Solute Diffusion and Elements for Resolution; Determination of Natural Uranium Concentration in Boom Clay: Effect of Different Extraction Techniques; List of Participants…”
Publicado 2002
Libro electrónico -
1748Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Chapter 1 Fundamental Networking and Security Tools -- Ping -- IPConfig -- NSLookup -- Tracert -- NetStat -- PuTTY -- Chapter 2 Troubleshooting Microsoft Windows -- RELI -- PSR -- PathPing -- MTR -- Sysinternals -- The Legendary God Mode -- Chapter 3 Nmap-The Network Mapper -- Network Mapping -- Port Scanning -- Services Running -- Operating Systems -- Zenmap -- Chapter 4 Vulnerability Management -- Managing Vulnerabilities -- OpenVAS -- Nexpose Community -- Chapter 5 Monitoring with OSSEC -- Log-Based Intrusion Detection Systems -- Agents -- Adding an Agent -- Extracting the Key for an Agent -- Removing an Agent -- Log Analysis -- Chapter 6 Protecting Wireless Communication -- 802.11 -- inSSIDer -- Wireless Network Watcher -- Hamachi -- Tor -- Chapter 7 Wireshark -- Wireshark -- OSI Model -- Capture -- Filters and Colors -- Inspection -- Chapter 8 Access Management -- AAA -- Least Privilege -- Single Sign-On -- JumpCloud -- Chapter 9 Managing Logs -- Windows Event Viewer -- Windows PowerShell -- BareTail -- Syslog -- SolarWinds Kiwi -- Chapter 10 Metasploit -- Reconnaissance -- Installation -- Gaining Access -- Metasploitable2 -- Vulnerable Web Services -- Meterpreter -- Chapter 11 Web Application Security -- Web Development -- Information Gathering -- DNS -- Defense in Depth -- Burp Suite -- Chapter 12 Patch and Configuration Management -- Patch Management -- Configuration Management -- Clonezilla Live -- Chapter 13 Securing OSI Layer 8 -- Human Nature -- Human Attacks -- Education -- The Social Engineer Toolkit -- Chapter 14 Kali Linux -- Virtualization -- Optimizing Kali Linux -- Using Kali Linux Tools -- Maltego -- Recon-ng -- Sparta -- MacChanger -- Nikto…”
Libro electrónico -
1749Publicado 2015Tabla de Contenidos: “…Tuple Variables and ConstantsExtracting Tuple Components; Naming Tuple Components; Using Type Aliases with Tuples; Tuples as Return Types; Operators; No Implicit Type Conversion; Arithmetic Operators; Bitwise Operators; Assignment Operators; Comparison Operators; Logical Operators; Overflow Operators; Type Casting Operators; Range Operators; Ternary Conditional Operator; Operator Precedence; Strings and Characters; String Properties; Comparing Strings; Escaped Characters in Strings; String Interpolation; Converting Strings to Numeric Types; Character-Level Access in Strings…”
Libro electrónico -
1750Publicado 2015Tabla de Contenidos: “…Teach Edison to See; Introduction; Materials List; OpenCV; Extracting Colored Objects; Viewing Images; Face Detection; Webcam; Snapping Photos; Recording Video; Streaming Video; Processed Streaming Video…”
Libro electrónico -
1751Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Configuring HBase -- Introduction -- Configuring and deploying HBase -- Using the filesystem -- Administering clusters -- Managing clusters -- Chapter 2: Loading Data from Various DBs -- Introduction -- Extracting data from Oracle -- Loading data using Oracle Big data connector -- Bulk utilities -- Using Hive with Apache HBase -- Using Sqoop -- Chapter 3: Working with Large Distributed Systems Part I -- Introduction -- Scaling elastically or Auto Scaling with built-in fault tolerance -- Auto Scaling HBase using AWS -- Works on different VM/physical, cloud hardware -- Chapter 4: Working with Large Distributed Systems Part II -- Introduction -- Read path -- Write Path -- Snappy -- LZO compression -- LZ4 compressor -- Replication -- Chapter 5: Working with Scalable Structure of tables -- Introduction -- HBase data model part 1 -- HBase data model part 2 -- How HBase truly scales on key and schema design -- Chapter 6: HBase Clients -- Introduction -- HBase REST and Java Client -- Working with Apache Thrift -- Working with Apache Avro -- Working with Protocol buffer -- Working with Pig and using Shell -- Chapter 7: Large-Scale MapReduce -- Introduction -- Chapter 8: HBase Performance Tuning -- Introduction -- Working with infrastructure/operating systems -- Working with Java virtual machines -- Changing the configuration of components -- Working with HDFS -- Chapter 9: Performing Advanced Tasks on Hbase -- Machine learning using Hbase -- Real-time data analysis using Hbase and Mahout -- Full text indexing using Hbase -- Chapter 10: Optimizing Hbase for Cloud -- Introduction -- Configuring Hbase for the Cloud -- Connecting to an Hbase cluster using the command line…”
Libro electrónico -
1752por Lee, Michael, 1966-Tabla de Contenidos: “…Chapter 8: Implementing Availability and ReplicationImplement Availability Solutions; Implement Replication; Chapter 9: Extracting, Transforming, and Loading Data; Use the Bulk Copy Program Utility; Use the SQL Server Import and Export Wizard; Create Transformations Using SQL Server Integration Services (SSIS); Chapter 10: Managing Data Recovery; Understand Recovery Concepts; Perform Backup Operations; Perform Restore Operations; PART IV: Performance and Advanced Features; Chapter 11: Monitoring and Tuning SQL Server; Monitor SQL Server; Tune SQL Server…”
Publicado 2009
Libro electrónico -
1753Publicado 2008Tabla de Contenidos: “…Tutorial: Working with 3D LayersTutorial: Sculpting with Symmetry; Tutorial: Using Alpha Images; Tutorial: Creating Wrinkles and Skin Pores; Tutorial: The Extract Tool; Tutorial: Sculpting Hair and Cloth; Tutorial: Using ZProject for Texturing; Tutorial: Posing the Character; Chapter 9 UVs and Texturing; Tutorial: UV Mapping Overview; Tutorial: Mapping a Character; Tutorial: Cleaning Up the UV Layout; Tutorial: Texturing in Adobe Photoshop; Tutorial: Polypainting; Tutorial: Converting Polypaint to a Texture; Chapter 10 The Next Step; Tutorial: Creating a Normal Map in Maya…”
Libro electrónico -
1754por Keig, AndrewTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Foundations; Feature set; Installation; package.json; Testing Express with Mocha and SuperTest; Feature: Heartbeat; Continuous testing with Mocha; Code coverage with Mocha and JSCoverage; Configuring Express with Nconf; Extracting routes; 404 handling middleware; Logging middleware; Logging with Winston; Task automation with Grunt; Summary; Chapter 2: Building a Web API; Persisting data with MongoDB and Mongoose; GitHub tokens; Feature: Create a project…”
Publicado 2013
Libro electrónico -
1755Publicado 2019Tabla de Contenidos: “…Poems / Stuart Cooke -- Lurujarri : a poem by foot -- Extracts from George Dyu?gayan's "Bulu line : a West Kimberley song cycle" -- II. …”
Libro electrónico -
1756Publicado 2022Tabla de Contenidos: “…: Interactive, Online Mapping of the Israeli-Palestinian Region (1840-Present) / Daniel Stein Kokin -- TEXT -- The Digital Humanities and the Ladino Press: Using Machine Learning to Extract and Analyze Visual Content in Historic Ladino Newspapers / Benjamin Charles Germain Lee -- Using Nodegoat to Track Gendered Political Networks: Henrietta Klotz's Influence on Henry Morgenthau Jr.'…”
Libro electrónico -
1757Publicado 2009Tabla de Contenidos: “…The case of wine / Raffaella Canali and Favio Virgilli -- The role of oxidative stress in beta-thalassemia and the antioxidative effect of fermented papaya preparation / Eitan Fibach, Ada Goldfarb, Johnny Amer -- Ginko biloba leaf extract FGb 761 modulates cell signaling associated with myloid beta oligomers in Alzheimer's disease / Yuan Luo…”
Libro -
1758Publicado 2021Tabla de Contenidos:Libro electrónico
-
1759Publicado 2016Tabla de Contenidos: “…Predicting stock prices with an ARIMA model -- Chapter 11: Supervised Machine Learning -- Introduction -- Fitting a linear regression model with lm -- Summarizing linear model fits -- Using linear regression to predict unknown values -- Measuring the performance of the regression model -- Performing a multiple regression analysis -- Selecting the best-fitted regression model with stepwise regression -- Applying the Gaussian model for generalized linear regression -- Performing a logistic regression analysis -- Building a classification model with recursive partitioning trees -- Visualizing a recursive partitioning tree -- Measuring model performance with a confusion matrix -- Measuring prediction performance using ROCR -- Chapter 12: Unsupervised Machine Learning -- Introduction -- Clustering data with hierarchical clustering -- Cutting tree into clusters -- Clustering data with the k-means method -- Clustering data with the density-based method -- Extracting silhouette information from clustering -- Comparing clustering methods -- Recognizing digits using the density-based clustering method -- Grouping similar text documents with k-means clustering methods -- Performing dimension reduction with Principal Component Analysis (PCA) -- Determining the number of principal components using a scree plot -- Determining the number of principal components using the Kaiser method -- Visualizing multivariate data using a biplot -- Index…”
Libro electrónico -
1760Publicado 2023Tabla de Contenidos: “…-- A Java code coverage tool - JaCoCo -- Test-driven development -- Advantages of TDD -- Summary -- Further reading -- Chapter 5: Refactoring Techniques -- Writing better methods -- Extract Method -- Inline Method -- Extract and inline variables -- Combining a function into a class -- Moving features between objects -- Moving a method or field -- Moving statements into/from methods -- Hiding delegates -- Removing dead code -- Organizing data -- Field encapsulation -- Replacing primitives with objects -- Replacing type code with subclasses -- Simplifying conditional logic -- Returning a special case instead of null -- Using polymorphism instead of conditions -- Removing duplicated conditions -- Guard clauses -- Simplifying method calls -- Avoiding side effects -- Removing setter methods -- Using generalization -- Pull up field -- Push down field -- Pull up method -- Push down method -- Template method -- Using enums instead of constants -- Summary -- Further reading -- Chapter 6: Metaprogramming -- What is metaprogramming? …”
Libro electrónico