Mostrando 661 - 680 Resultados de 32,351 Para Buscar '"Grabs"', tiempo de consulta: 0.14s Limitar resultados
  1. 661
    por Collins, Mike, 1949-
    Publicado 2006
    “…Illustrated throughout with color screen grabs, the book starts by giving you useful overviews and advice about the hardware options available. …”
    Libro electrónico
  2. 662
    Publicado 2021
    Tabla de Contenidos: “…-- Chapter 16 Navigating in a Storm: Growth in a COVID World -- Your Existing Assumptions Are Likely Wrong -- You Probably Don't Know How to Talk to Your Customer Anymore -- Supply Chains Are Suffering -- It's a Buyers' Market -- Revenue Opportunity Will Align with Government Investment -- Successful Growth Becomes a Relative Metric -- Work from Home -- Educate from Home -- Remote Healthcare -- The New New of Food Service -- Planning for the Recovery -- Follow the Money -- Lower Overhead -- Increase Sales Effort -- Lower Price to Win Business -- Be Responsive, Not Panicked -- Bottom‐Up Assessments &amp -- equals -- Tactical Health -- Assess Org Structure and Staffing Levels -- Target Competitors for Share Grab -- Maintain Focus and Morale -- Go Where Others Aren't -- Understand the Market -- Take Calculated Risks…”
    Libro electrónico
  3. 663
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Chapter 1 Introducing ChatGPT -- Setting Up an Account -- Comparing ChatGPT, Search Engines, and Analytics -- Understanding What ChatGPT Is and Isn't -- Unwrapping ChatGPT fears -- Competing with ChatGPT for your job -- Redefining the Chatbot with ChatGPT and ChatGPT Plus -- Comparing the two versions -- Sampling its many uses -- Discovering other forms of GPT -- Grabbing Headlines and Disrupting Businesses -- Grokking that ChatGPT is a harbinger of exponential change -- Weighing the initial effect on existing businesses and industries -- Bracing for future upheaval -- Breaking the spell of heartless machine overlords -- Opening the Door for Bigger AI Products -- Categorizing types of Generative AI -- Understanding ChatGPT's creator, OpenAI -- Chapter 2 Discovering How ChatGPT Works -- What's Different About ChatGPT -- Peeking at the ChatGPT Architecture -- Discovering the supercomputer and GPUs underneath -- Considering the importance of transformers -- Setting the stage: training the model -- Grasping the importance of the dialogue format -- Pondering ChatGPT's limitations -- Increasing the Number of Versions and Integrations -- Glimpsing ChatGPT in Microsoft add-ins -- Mainstreaming ChatGPT via the power of an API -- Checking out early ChatGPT API adopters -- Expanding the field of extensions -- Building New Businesses Based on ChatGPT -- Chapter 3 Writing Prompts for ChatGPT -- Prompting Basics -- Starting a chat -- Reviewing your chat history and more -- Understanding Prompt Engineering -- Circumventing Token Limits and User History Storage Issues -- Thinking in Threads -- Chaining Prompts and Other Tips and Strategies…”
    Libro electrónico
  4. 664
    por Walker, Dain
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Thank You -- Chapter 1 Personal Brands Fill Stands -- Personal Branding Versus Company Branding -- Make Your Mark -- Do It in 90 Days -- Conquer Procrastination -- Exercise: Imagine Your Future Self -- Chapter Summary -- Chapter 2 Leave Your Comfort Zone -- Finding My Basement -- Starting from My Basement -- Just Start -- Exercise: Cast Your Future Self -- Chapter Summary -- Chapter 3 Slay the Time Vampires -- The Campfire-to-Empire Framework -- Establish Consistency -- Scout the Landscape -- Your 90-Day Tool Kit -- Slay Your Vampires -- Boost Your Amplifiers -- Exercise: Check Your Tool Kit -- The 90-Day Mindset -- Exercise: Establish Your Mindset -- Chapter Summary -- Chapter 4 Scout Industries, Model People -- Study Like a Student -- Model the Greats -- Embrace Adaptability -- Exercise: Model Like a Nerd -- Chapter Summary -- Chapter 5 Get Good Throwing Wood -- Maintain Your Messaging -- Weather the Seasons -- Winter -- Spring -- Summer -- Fall -- Build Your Tribe -- What Makes Your Tribe Valuable -- How Your Tribe Engages with Your Campfire -- Cater to Your Tribe -- Exercise: Carve Out a Wood Pile -- Chapter Summary -- Chapter 6 Master the Smoke Signals -- Work Five Themes -- Where to Start -- When to Pivot -- Pivot Till You Find It -- Explore and Expand -- Go Viral -- Study the Six Smoke Signals -- Master the Six Smoke Signals -- Grab and HOLD -- Exercise: Experiment Madly -- Chapter Summary -- Chapter 7 Give Value, Earn Loyalty -- Build Your Tribe -- Give Value, Earn Loyalty -- Earn Every Plank -- The Three Hurdles of Trust -- Build Your Credibility -- Cultivate Your Relevance -- Establish Your Reliability -- Exercise: Plot Out Your Content Value -- Chapter Summary -- Chapter 8 Find Cows, Cook Meat -- Build Your Three Pillars -- Credibility -- Relevance -- Reliability…”
    Libro electrónico
  5. 665
    Publicado 2021
    Tabla de Contenidos: “…Faecal sludge sample collection and handling -- 3.1 INTRODUCTION -- 3.2 SAMPLING OBJECTIVE -- 3.2.1 Containment -- 3.2.2 Collection and transport -- 3.2.3 Treatment -- 3.2.4 End use -- 3.3 REPRESENTATIVENESS -- 3.4 SAMPLING TECHNIQUES -- 3.4.1 Grab sampling -- 3.4.2 Composite sampling -- 3.5 SAMPLING AND MEASURING DEVICES -- 3.5.1 L-stick sludge and scum measuring device -- 3.5.2 Core sampling device -- 3.5.3 Vacuum sludge sampling device -- 3.5.4 Cone-shaped sampling device -- 3.5.5 Grab sampling device - horizontal -- 3.5.6 Grab sampling beaker device - vertical -- 3.5.7 Automatic composite sampler -- 3.5.8 Distance laser measuring device -- 3.5.9 Portable penetrometer -- 3.6 SAMPLING METHODS AND LOCATION -- 3.6.1 Sampling in situ from onsite containment technologies -- 3.6.2 Sampling during emptying of onsite containment technologies -- 3.6.3 Sampling at faecal sludge treatment plants -- 3.7 SAMPLE SIZE -- 3.8 HEALTH AND SAFETY -- 3.9 SAMPLE COLLECTION -- 3.10 RECORDING OF SAMPLE COLLECTION -- 3.11 TRANSPORT -- 3.12 STORAGE AND PRESERVATION -- 3.13 EXAMPLE OF SAMPLING KIT -- 3.14 OUTLOOK -- REFERENCES -- 4. …”
    Libro electrónico
  6. 666
    Publicado 2019
    Tabla de Contenidos: “…. -- See also -- Extracting foreground objects with the GrabCut algorithm -- How to do it... -- How it works... -- See also -- Chapter 6: Filtering the Images -- Filtering images using low-pass filters -- How to do it... -- How it works... -- See also -- Downsampling an image -- How to do it... -- How it works... -- There's more... -- Interpolating pixel values -- See also -- Filtering images using a median filter -- How to do it... -- How it works... -- Applying directional filters to detect edges -- How to do it... -- How it works... -- There's more... -- Gradient operators -- Gaussian derivatives -- See also -- Computing the Laplacian of an image -- How to do it... -- How it works... -- There's more... -- Enhancing the contrast of an image using the Laplacian -- Difference of Gaussians -- See also -- Chapter 7: Extracting Lines, Contours, and Components -- Detecting image contours with the Canny operator -- How to do it... -- How it works... -- See also -- Detecting lines in images with the Hough transform -- Getting ready -- How to do it... -- How it works... -- There's more... -- Detecting circles -- See also -- Fitting a line to a set of points -- How to do it... -- How it works... -- There's more... -- Extracting the components' contours -- How to do it... -- How it works... -- There's more... -- Computing components' shape descriptors -- How to do it..…”
    Libro electrónico
  7. 667
    por Blyth, Andrew
    Publicado 2024
    Tabla de Contenidos: “…Assessing LDAP permissions -- Testing LDAP authentication -- Identifying unsecured LDAP ports -- Monitoring LDAP traffic -- Testing LDAP with LDAPS -- Identifying anomalies with PowerShell scripts -- PowerShell and Kerberos -- The enumeration of Kerberos tickets -- Service Principal Name (SPN) enumeration -- Credential harvesting with Mimikatz -- Detecting golden ticket attacks -- Kerberos ticket renewal analysis -- Analyzing event logs -- Password spray attacks -- Summary -- Chapter 7: Databases: MySQL, PostgreSQL, and MSSQL -- Accessing SQL databases using PowerShell -- PowerShell and MySQL -- Introduction to PowerShell and MySQL -- Connecting to MySQL with PowerShell -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- PowerShell and PostgreSQL -- Introduction to PowerShell and PostgreSQL -- Connecting to PostgreSQL with PowerShell -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- PowerShell and Microsoft SQL (MSSQL) -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- Summary -- Chapter 8: Email Services: Exchange, SMTP, IMAP, and POP -- PowerShell and Exchange -- Enumeration with PowerShell -- Autodiscover enumeration -- Exploitation with PowerShell -- PowerShell and SMTP -- Enumeration with PowerShell -- Exploitation with PowerShell -- PowerShell and IMAP -- Vulnerabilities in IMAP servers -- Establishing an IMAP connection -- Scanning for IMAP servers -- PowerShell and POP -- Port identification -- Authentication checks -- Brute-forcing -- Banner grabbing -- Summary…”
    Libro electrónico
  8. 668
    Publicado 1638
    Tabla de Contenidos: “…., s.a.] 88 p., [4] h. de grab. ; Fol. Por el texto se deduce posterior a 1634. …”
    Colección
  9. 669
  10. 670
    Publicado 2017
    Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
    Libro electrónico
  11. 671
    Publicado 2021
    Tabla de Contenidos: “…Dinámicas de ocupación territorial y las formas/relaciones de producción -- Formación social y deforestación en la Amazonía -- Transformación de los suelos boscosos desde la estructura del norte cruceño -- Neyer Nogales y Lizandra Paye -- Avance de la frontera, land grabbing y resistencias en la Amazonia brasileña -- Débora Assumpção e Lima y Andrea P. …”
    Libro electrónico
  12. 672
    Publicado 2010
    Tabla de Contenidos: “…using the constant block -- creating a program with constants -- playing a game on the NXT -- defining the variables -- step 1: displaying a target randomly -- step 2: waiting until a button is pressed -- step 3: storing which button is pressed -- step 4: comparing the position and button variables -- step 5: adjusting the score -- step 6: displaying the current score -- step 7: making the program repeat for 30 seconds -- expanding the program -- further exploration -- PART IV advanced robot projects -- 13 snatcher: the autonomous robotic arm -- understanding the grabber -- the grabbing mechanism -- the lifting mechanism -- building the snatcher -- creating objects -- programming the snatcher -- creating the my blocks -- my block #1: grab -- my block #2: release -- my block #3: find object -- my block #4: move closer -- my block #5: say color -- creating the final program -- troubleshooting the snatcher -- further exploration -- 14 hybrid brick sorter: sort bricks by color and size -- understanding the sorting technique -- the driving module -- the scanning module -- identifying a brick's size -- building the hybrid brick sorter -- connecting the cables -- finding bricks to use with your sorter -- finding buckets -- programming the hybrid brick sorter -- creating the my blocks -- my block #1: reset sorter -- my block #2: drop brick -- creating the final program -- step 1: getting the brick's size -- step 2: checking where there is a brick to sort -- step 3: calculating the position of a bucket -- step 4: dropping a brick in the right bucket -- further exploration -- 15 CCC: the compact chimney climber -- understanding the climbing technique -- staying balanced on the x-axis -- balancing on the y-axis -- detecting balance errors -- solving balance errors -- building the compact chimney climber -- preparing a chimney…”
    Libro electrónico
  13. 673
    Publicado 2022
    Tabla de Contenidos: “…Cycling Colors with the HelloWorld Shader -- World-Space Dissolve -- World-Space Dissolve in HLSL -- World-Space Dissolve in Shader Graph -- World-Space Dissolve Scripting -- Controlling Shaders with Animations -- Shader Keywords -- Shader Keywords in HLSL -- Declaring Keyword Properties -- Using Keywords -- Shader Keywords in Shader Graph -- Modifying Keywords Using C# Scripting -- UsePass in ShaderLab -- GrabPass in ShaderLab -- Sepia Tone Effect Using GrabPass in the Built-in Pipeline -- Sepia Tone Effect Using Camera Opaque Texture in URP -- Sepia Tone Effect Using the Scene Color Node in Shader Graph -- Summary -- Chapter 10: Lighting and Shadows -- Lighting Models -- Ambient Light -- Diffuse Light -- Specular Light -- Fresnel Light -- Blinn-Phong Reflection Model -- Flat Shading -- Flat Shading in HLSL -- Accessing Lights in the Built-In Pipeline -- Accessing Lights in URP -- Flat Shading in Shader Graph -- Gouraud Shading -- Gouraud Shading in HLSL -- Gouraud Vertex Shader in the Built-In Pipeline -- Gouraud Vertex Shader in URP -- Gouraud Shading in Shader Graph -- GetMainLight Sub Graph -- GetAmbientLight Sub Graph -- Gouraud Shading with Custom Interpolators -- Phong Shading -- Phong Shading in HLSL -- Phong Shading in the Built-In Pipeline -- Phong Shading in URP -- Fresnel Light Modification -- Phong Shading in Shader Graph -- Physically Based Rendering -- Smoothness -- Metallic Mode -- Specular Mode -- Normal Mapping -- Ambient Occlusion -- Emission -- PBR in the Built-In Pipeline -- PBR in URP -- PBR in Shader Graph -- Shadow Casting -- Shadow Casting in the Built-In Pipeline -- Shadow Casting in URP -- Shadow Casting in Shader Graph -- Summary -- Chapter 11: Image Effects and Post-Processing -- Render Textures -- Post-Processing Effects -- Grayscale Image Effect -- Post-Processing in the Built-In Pipeline…”
    Libro electrónico
  14. 674
    por Morris, Tee
    Publicado 2024
    Tabla de Contenidos: “…-- Chapter 14 Podcasting and AI -- Editing Made Easy with Hindenburg PRO -- Getting Descript-ive -- Adding ChatGPT to Your Toolbelt -- Helping AI Generate the Best Results: Prompt Engineering -- The Ethics of AI -- Chapter 15 Podcasting on YouTube -- A Hostile Welcome: The Demands of Video -- YouTube: We're Here to Help -- Adding the Video Element: Creating a Podcast for YouTube -- Keeping it simple: Introducing video to an audio podcast -- Pro-level video podcasting: Working with a multicam setup in Adobe Premiere -- Crossing the Finish Line: Taking Your Podcast to YouTube -- Tell us about yourself: The Details window -- Adding more to your podcast: Video elements -- Making sure you're above board: Checks -- Drop it like it's HAWT: Publishing your video -- Grabbing attention: The art of the thumbnail…”
    Libro electrónico
  15. 675
    por San Joaquín, Pedro de
    Publicado 1710
    Tabla de Contenidos: “…. ; 4o Sign.: A-C4. Port. con grab. xil. de la Compañía de Jesús. Virgen María. …”
    Colección
  16. 676
    por Parma (Diócesis).
    Publicado 1790
    Tabla de Contenidos: “…Sign.: A-N4. Port. con grab. xil. Error de pag., duplica la p. 103. …”
    Colección
  17. 677
    Publicado 2019
    Tabla de Contenidos: “…Schmidt -- EU Citizenship Should Speak Both to the Mobile and the Non-Mobile European: Frank Vandenbroucke -- The Impact and Political Accountability of EU Citizenship: Dorte Sindbjerg Martinsen -- ‘Feed Them First, Then Ask Virtue of Them’: Broadening and Deepening Freedom of Movement: Andrea Sangiovanni -- EU Citizenship, Duties and Social Rights: Martin Seeleib-Kaiser -- Why Compensating the ‘Stayers’ for the Costs of Mobility is the Wrong Way to Go: Julia Hermann -- Balancing the Rights of European Citizenship with Duties Towards National Citizens: An Inter-national Perspective: Richard Bellamy -- Grab the Horns of the Dilemma and Ride the Bull: Rainer Bauböck -- Why Adding Duties to European Citizenship is Likely to Increase the Gap Between Europhiles and Eurosceptics: Theresa Kuhn -- Enhancing the Visibility of Social Europe: A Practical Agenda for ‘the Last Mile’: Ilaria Madama -- Towards a ‘Holding Environment’ for Europe’s (Diverse) Social Citizenship Regimes: Anton Hemerijck -- Imagine: European Union Social Citizenship and Post-Marshallian Rights and Duties: Dora Kostakopoulou -- Why the Crisis of European Citizenship Is a Crisis of European Democracy: Sandra Seubert -- Regaining the Trust of the Stay-at-Homes: Three Strategies: Philippe Van Parijs -- Social Citizenship, Democratic Values and European Integration: a Rejoinder: Maurizio Ferrera…”
    Libro electrónico
  18. 678
    por Lashin, Ahmed
    Publicado 2013
    Tabla de Contenidos: “…A hidden gem in XML - row level formatting -- Chapter 6 : Writing Printable Reports -- Introduction -- Controlling the container size and rows per page -- Eliminating orphan rows -- Defining page orientation and size (and overriding them for one page) -- Avoiding page title repetition -- Horizontal pagination -- Page numbering with horizontal pagination -- Choosing the output format from a prompt -- Choosing the right colors -- Defining page sets -- Cautions about HTML items and JavaScript files -- Displaying the report name in a footer -- Chapter 7 : Working with Dimensional Models -- Introduction -- List report or crosstab report -- Filtering rows or columns -- Filtering a whole report -- Adding a prompt into Slicer and its limitations -- Achieving zero suppression -- Aggregation versus preaggregated values -- The roleValue() function -- Swapping dimensions using MUN manipulation -- Chapter 8 : Working with Macros -- Introduction -- Adding data-level security using the CSVIdentityMap macro -- Using the Prompt macro in native SQL -- Making prompts optional -- Adding a token using macros -- Using the prompt() and promptmany() macros in query subjects -- Showing the prompt values in a report based on security -- String operations to get it right -- Showing a username in the footer -- Chapter 9 : Using Report Studio Efficiently -- Introduction -- Using Report Studio's environmental options -- Copying and pasting partial or full reports -- Upgrading report specifications -- Setting the execution timeout -- Setting the maximum row limit -- Handling slow report validation -- Capturing a query -- Browsing values from the data expression window -- Viewing the page structure -- Picking up and applying styles -- Using the "grab them all" practice -- Using Default Data Formats -- Chapter 10 : Working with Active Reports -- Introduction…”
    Libro electrónico
  19. 679
    por Kaltmeier, Olaf, 1970-
    Publicado 2024
    Tabla de Contenidos: “…New Productive Geographies: the Extractive Model and New Spatial Configurations -- Urban‐Rural Rearticulation: Roads and Cities in the Web of New Land Uses -- Mining and Forestry -- Finance and Livestock: Consolidating Land Grabbing in Mesoamerica -- Discussion and Conclusions -- References -- Land Use in the Caribbean in the Colonial Period -- The Hatera Society in the Hispanic Insular Caribbean -- Sugar and Slave Islands -- Cattle Ranching in Plantation Colonies and Smuggling -- Brief Conclusions -- References -- From the Mid‐Nineteenth Century to 1950 -- Introduction: Land Use, Second Conquest, and the Anthropocene in Latin America from the Mid‐Nineteenth Century to 1950 -- References -- Land Use in the Southern Cone from the Mid‐Nineteenth Century to 1950 -- Brazil, the Mercantile Use of Land from the Colonial to the Independent Period -- The Southern Cone of Spanish America -- Conclusion -- References -- Land Use in the Andes from the Mid‐Nineteenth Century to 1950 -- Crises in the Tropical Andes -- Land Use Change -- Biomass Plantations and Extractivisms -- Final Discussion -- References -- Land Use in the Amazon from the Mid‐Nineteenth Century to 1950 -- Nation‐State Projects and Evangelization: from "Empty" and Wild Territory to Inexhaustible Source of Resources -- Travelers, Scientific Expeditions, and Chorographic Commissions -- From Military Engineers to Civilian Engineers -- Cinchona, Rubber and the Incorporation of the Amazon into the Global Market -- Conclusions -- References -- Land Use in Mesoamerica from the Mid‐Nineteenth Century to 1950 -- Antecedents: the Colonial Legacy -- Economic Liberalism in the Period 1810-1870 -- Agrarian Nationalism and Transnational Interventionism (1870-1930) -- Developmentalism and Scientific and Technological Intervention in the Countryside (1930-1950)…”
    Libro electrónico
  20. 680
    Publicado 2015
    Tabla de Contenidos: “…3.1 Introduction -- 3.2 System Architecture -- 3.2.1 Data Acquisition -- 3.2.2 Software Systems -- 3.2.3 Speed Control -- 3.2.4 Track-Keeping Control -- 3.2.5 Other Components -- 3.3 Testing -- 3.3.1 Prediction System -- 3.3.2 Prevention System -- 3.3.3 Towing Tank Tests and Results -- 3.3.3.1 Mathematical model validation -- 3.3.3.2 Validation of stability diagrams -- 3.3.3.3 Prediction system tests -- 3.4 Conclusions and FutureWork -- References -- Chapter 4 - Autonomous Knowledge Discovery Basedon Artificial Curiosity-Driven Learningby Interaction -- Abstract -- 4.1 Introduction -- 4.2 Proposed System and Role of Curiosity -- 4.2.1 Interpretation from Observation -- 4.2.2 Search for the Most Coherent Interpretation -- 4.2.3 Human-Robot Interaction -- 4.3 Validation Results by Simulation -- 4.4 Implementation on Real Robot and Validation Results -- 4.4.1 Implementation -- 4.4.2 Validation Results -- 4.5 Conclusions -- References -- Chapter 5 - Information Technology for InteractiveRobot Task Training ThroughDemonstration of Movement1 -- Abstract -- 5.1 Introduction -- 5.2 Conception and Principles of Motion Modeling -- 5.2.1 Generalized Model of Motion -- 5.2.2 Algorithm for Robot Task Training by Demonstration -- 5.2.3 Algorithm for Motion Reproduction after Task Training byDemonstration -- 5.2.4 Verification of Results for the Task of Training theTelecontrolled (Remote Controlled) Robot -- 5.2.5 Major Advantages of Task Training by Demonstration -- 5.3 Algorithms and Models for Teaching Movements -- 5.3.1 Task Training by Demonstration of Movement amongthe Objects of the Environment -- 5.3.2 Basic Algorithms for RobotTaskTraining by Demonstration -- 5.3.3 Training Algorithm for the Environmental Survey Motion -- 5.3.4 Training Algorithm for Grabbing a Single Object -- 5.3.5 Special Features of the Algorithm for Reproduction ofMovements…”
    Libro electrónico