Mostrando 1,761 - 1,780 Resultados de 2,511 Para Buscar '"In the Loop"', tiempo de consulta: 0.12s Limitar resultados
  1. 1761
    Publicado 2018
    Tabla de Contenidos: “…Putting it all together -- Training -- Inference -- Loading data -- Creating reverse indices -- Loading models -- Translating a sequence -- Decoding a sequence -- Example translations -- Summary -- Chapter 12: Using Deep Reinforcement Learning -- Reinforcement learning overview -- Markov Decision Processes -- Q Learning -- Infinite state space -- Deep Q networks -- Online learning -- Memory and experience replay -- Exploitation versus exploration -- DeepMind -- The Keras reinforcement learning framework -- Installing Keras-RL -- Installing OpenAI gym -- Using OpenAI gym -- Building a reinforcement learning agent in Keras -- CartPole -- CartPole neural network architecture -- Memory -- Policy -- Agent -- Training -- Results -- Lunar Lander -- Lunar Lander network architecture -- Memory and policy -- Agent -- Training -- Results -- Summary -- Chapter 13: Generative Adversarial Networks -- An overview of the GAN -- Deep Convolutional GAN architecture -- Adversarial training architecture -- Generator architecture -- Discriminator architecture -- Stacked training -- Step 1 - train the discriminator -- Step 2 - train the stack -- How GANs can fail -- Stability -- Mode collapse -- Safe choices for GAN -- Generating MNIST images using a Keras GAN -- Loading the dataset -- Building the generator -- Building the discriminator -- Building the stacked model -- The training loop -- Model evaluation -- Generating CIFAR-10 images using a Keras GAN -- Loading CIFAR-10 -- Building the generator -- Building the discriminator -- The training loop -- Model evaluation -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  2. 1762
    Publicado 2018
    Tabla de Contenidos: “…Extending the IntIterator to bidirectional -- Practical example - iterating floating point values within a range -- Illustrated usage examples -- Utility functions -- How to construct a linear range iterator -- Iterator usage example -- Generalizing the iterator pair to a range -- The make_linear_range convenience function -- Linear range usage examples -- Summary -- Chapter 6: STL Algorithms and Beyond -- Using STL algorithms as building blocks -- STL algorithm concepts -- Algorithms operate on iterators -- Implementing a generic algorithm that can be used with any container -- Iterators for a range point to the first element and the element after the last -- Algorithms do not change the size of the container -- Algorithms with output require allocated data -- Algorithms use operator== and operator&lt -- by default -- Custom comparator function -- General-purpose predicates -- Algorithms require move operators not to throw -- Algorithms have complexity guarantees -- Algorithms perform just as well as C library function equivalents -- STL algorithms versus handcrafted for-loops -- Readability and future-proofing -- Real-world code base example -- Usage examples of STL algorithms versus handcrafted for-loops -- Example 1 - Unfortunate exceptions and performance problems -- Example 2 - STL has subtle optimizations even in simple algorithms -- Sorting only for the data you need to retrieve -- Use cases -- Performance evaluation -- The future of STL and the ranges library -- Limitations of the iterators in STL -- Introduction to the ranges library -- Composability and pipeability -- Actions, views, and algorithms -- Actions -- Views -- Algorithms -- Summary -- Chapter 7: Memory Management -- Computer memory -- The virtual address space -- Memory pages -- Thrashing -- Process memory -- Stack memory -- Heap memory -- Objects in memory…”
    Libro electrónico
  3. 1763
    por Ritchie, Kyle J.
    Publicado 2021
    Tabla de Contenidos: “…Safeguarding your workers -- Greenwashing -- Turning Obstacles into Opportunities -- Listening to customers -- Creating unspoken demand -- Rethinking old assumptions -- Bending linear into loops -- Thinking of businesses as a system -- Chapter 7 Exploring the Essentials of a Circular Business Model -- The Six Rs: Your New Circularity Mantra -- Refuse: Say no to what you don't need -- Reduce: Use less for longer -- Reuse and remanufacture: Extend product life -- Repurpose: Find other uses -- Recycle: Return materials for rebirth -- Rot: Return it to the soil -- Developing a Circular Business Structure: The Bones of the Operation -- Identifying potential material loops -- Considering innovative business models -- Who's at the table? …”
    Libro electrónico
  4. 1764
    por Hochstein, Lorin
    Publicado 2015
    Tabla de Contenidos: “…Complex Playbooks -- Running a Task on the Control Machine -- Running a Task on a Machine Other Than the Host -- Manually Gathering Facts -- Running on One Host at a Time -- Running Only Once -- Dealing with Badly Behaved Commands: changed_when and failed_when -- Retrieving the IP Address from the Host -- Encrypting Sensitive Data with Vault -- Patterns for Specifying Hosts -- Limiting Which Hosts Run -- Filters -- The Default Filter -- Filters for Registered Variables -- Filters That Apply to File Paths -- Writing Your Own Filter -- Lookups -- file -- pipe -- env -- password -- template -- csvfile -- dnstxt -- redis_kv -- etcd -- Writing Your Own Lookup Plug-in -- More Complicated Loops -- with_lines -- with_fileglob -- with_dict -- Looping Constructs as Lookup Plug-ins -- Chapter 8. …”
    Libro electrónico
  5. 1765
    por Schrenk, Michael
    Publicado 2007
    Tabla de Contenidos: “…8: Image-Capturing Webbots -- Example Image-Capturing Webbot -- Creating the Image-Capturing Webbot -- Binary-Safe Download Routine -- Directory Structure -- The Main Script -- Further Exploration -- Final Thoughts -- 9: Link-Verification Webbots -- Creating the Link-Verification Webbot -- Initializing the Webbot and Downloading the Target -- Setting the Page Base -- Parsing the Links -- Running a Verification Loop -- Generating Fully Resolved URLs -- Downloading the Linked Page -- Displaying the Page Status -- Running the Webbot -- LIB_http_codes -- LIB_resolve_addresses -- Further Exploration -- 10: Anonymous Browsing Webbots -- Anonymity with Proxies -- Non-proxied Environments -- Your Online Exposure -- Proxied Environments -- The Anonymizer Project -- Writing the Anonymizer -- Final Thoughts -- 11: Search-Ranking Webbots -- Description of a Search Result Page -- What the Search-Ranking Webbot Does -- Running the Search-Ranking Webbot -- How the Search-Ranking Webbot Works -- The Search-Ranking Webbot Script -- Initializing Variables -- Starting the Loop -- Fetching the Search Results -- Parsing the Search Results -- Final Thoughts -- Be Kind to Your Sources -- Search Sites May Treat Webbots Differently Than Browsers -- Spidering Search Engines Is a Bad Idea -- Familiarize Yourself with the Google API -- Further Exploration -- 12: Aggregation Webbots -- Choosing Data Sources for Webbots -- Example Aggregation Webbot -- Familiarizing Yourself with RSS Feeds -- Writing the Aggregation Webbot -- Adding Filtering to Your Aggregation Webbot -- Further Exploration -- 13: FTP Webbots -- Example FTP Webbot -- PHP and FTP -- Further Exploration -- 14: NNTP News Webbots -- NNTP Use and History -- Webbots and Newsgroups -- Identifying News Servers -- Identifying Newsgroups -- Finding Articles in Newsgroups -- Reading an Article from a Newsgroup…”
    Libro electrónico
  6. 1766
    Publicado 2019
    Tabla de Contenidos: “…-- Rolling the dice -- Toggling with feature flags -- Monitoring Your Systems -- Understanding telemetry -- Recording behavior -- SLAs, SLIs, and SLOs -- Part 3 Connecting the Circuit -- Chapter 12 Implementing Rapid Iteration -- Prioritizing the Important -- Important and urgent -- Important, not urgent -- Urgent, not important -- Neither important nor urgent -- Increasing Velocity -- Improving Performance -- Eliminating perfection -- Designing small teams -- Tracking your work -- Reducing friction -- Humanizing alerting -- Chapter 13 Creating Feedback Loops around the Customer -- Creating a Customer Feedback Process -- Creating a Feedback Loop -- Receive -- Analyze -- Communicate -- Change -- Collecting Feedback -- Satisfaction surveys -- Case studies -- Dogfooding -- Asking for Continual Feedback -- Net promoter score (NPS) -- Finding a rhythm…”
    Libro electrónico
  7. 1767
    Publicado 2011
    Tabla de Contenidos: “…-- Java Virtual Machine -- Features of Java -- Small -- Simple -- Object Oriented -- Compiled and Interpreted -- Platform Independent -- Robust and Secure -- Multithreaded -- Dynamic -- Java's Evolution -- JDK 1.0 (January 23, 1996): Codename Oak -- JDK 1.1 (February 19, 1997) -- Java Beans -- Remote Method Invocation -- The JAR File Format -- Digital Signatures -- AWT Enhancements -- Other Changes -- J2SE 1.2 (December 8, 1998): Codename Playground -- The Introduction of Swing -- The 2D API -- Drag-and-Drop -- Audio Enhancements -- Java IDL -- Security Enhancements -- Other Enhancements -- J2SE 1.3 (May 8, 2000): Codename Kestrel -- J2SE 1.4 (Feb 6, 2002): Codename Merlin -- J2SE 5.0 (Sept 30, 2004): Codename Tiger -- Java SE 6 (Dec 11, 2006): Codename Mustang -- Java SE 7 (July 7, 2011): Codename Dolphin -- Summary -- Chapter 2: Arrays -- Arrays -- Declaring Arrays -- Creating Arrays -- Accessing and Modifying Array Elements -- Initializing Arrays -- Initializing at Runtime -- Initializing Using Array Literals -- The for-each Loop -- Multidimensional Arrays -- Two-dimensional Arrays -- Initializing Two-dimensional Arrays -- Initializing at Runtime -- Initializing Using Array Literals -- Looping Using the for-each Construct -- N-dimensional Arrays -- Nonrectangular Arrays -- Runtime Initialization -- Initialization Using Array Literals -- A Few Goodies -- Determining the Array Length -- Cloning an Array -- Finding Out the Class of an Array -- Summary -- Chapter 3: Classes -- Object-Oriented Programming (OOP) Concepts -- OOP Features -- Encapsulation -- Inheritance -- Polymorphism -- OOP Benefits -- The Class -- Defining a Class…”
    Libro electrónico
  8. 1768
    por Shaughnessy, Pat
    Publicado 2013
    Tabla de Contenidos: “…How Ruby Borrowed a Decades-Old Idea from Lisp -- Blocks: Closures in Ruby -- Stepping Through How Ruby Calls a Block -- Borrowing an Idea from 1975 -- Experiment 8-1: Which Is Faster: A while Loop or Passing a Block to each? -- Lambdas and Procs: Treating a Function as a First-Class Citizen -- Stack vs. …”
    Libro electrónico
  9. 1769
    Publicado 2024
    Tabla de Contenidos: “…Reducing potential risks and accelerating the release of software products -- Streamlining the release process so that it becomes standardized -- Improving metrics and KPIs for successful releases -- Four critical DevOps metrics -- Summary -- Questions -- Chapter 5: Understanding What Makes DevOps Release Management Unique -- DevOps is holistic -- DevOps integrates CI/CD, QA, security, and feedback -- DevOps incorporates business teams into the development process -- The three ways of DevOps -- The first way - flow/systems thinking -- The second way - amplify feedback loops -- The third way - a culture of continual experimentation and learning -- How do traditional release management methodologies stack up against DevOps? …”
    Libro electrónico
  10. 1770
    Publicado 2023
    Tabla de Contenidos: “…-- JSX versus HTML -- How JSX abstracts JavaScript -- Event handling in React -- Displaying lists in React -- Using key and id in JSX -- Nesting lists in JSX -- Looping over objects in JSX -- Using Object.keys() -- Using Object.values() -- Using Object.entries() -- Example of looping with Object.keys -- Summary -- Chapter 6: Working with React Router and Forms -- Technical requirements -- Routing with React Router -- Routers -- Components -- Hooks -- Adding React Router in React -- Setting up the routing configuration -- Adding links -- Adding a nested route -- Handling dynamic routes -- Using useParams -- Using useNavigate -- Using forms in React -- Controlled and uncontrolled form components -- Controlled form -- Uncontrolled form -- Handling user input - Input, TextArea, and Select -- Input -- TextArea -- Select -- Validating and sanitizing users' data in React -- Implementing form validation -- Summary -- Chapter 7: React Unit Testing -- Technical requirements -- What is software testing? …”
    Libro electrónico
  11. 1771
    Publicado 2024
    Tabla de Contenidos: “…-- The if statement -- The switch statement -- Ternary operator -- Understanding loops -- while -- do...while -- for -- Using strings in JavaScript -- Important methods -- Exploring arrays -- Basic operations -- Iterating over an array -- Destructuring -- Sets -- Using objects in JavaScript -- Basic operations -- Iteration -- Shallow copy versus deep copy -- Merging objects -- Destructuring -- Optional chaining (?.) …”
    Libro electrónico
  12. 1772
    Publicado 2018
    Tabla de Contenidos: “…-- Discover a world of opportunities with Google Translate -- Getting started -- The program -- The header -- Implementing Google's translation service -- Google Translate from a linguist's perspective -- Playing with the tool -- Linguistic assessment of Google Translate -- Lexical field theory -- Jargon -- Translating is not just translating but interpreting -- How to check a translation -- AI as a new frontier -- Lexical field and polysemy -- Exploring the frontier - the program -- k-nearest neighbor algorithm -- The KNN algorithm -- The knn_polysemy.py program -- Implementing the KNN compressed function in Google_Translate_Customized.py -- Conclusions on the Google Translate customized experiment -- The disruptive revolutionary loop -- Summary -- Questions -- Further reading -- Chapter 9: Getting Your Neurons to Work -- Technical requirements -- Defining a CNN -- Defining a CNN -- Initializing the CNN -- Adding a 2D convolution -- Kernel -- Intuitive approach -- Developers' approach -- Mathematical approach -- Shape -- ReLu -- Pooling -- Next convolution and pooling layer -- Flattening -- Dense layers -- Dense activation functions -- Training a CNN model -- The goal -- Compiling the model -- Loss function -- Quadratic loss function -- Binary cross-entropy -- Adam optimizer -- Metrics -- Training dataset -- Data augmentation -- Loading the data -- Testing dataset -- Data augmentation -- Loading the data -- Training with the classifier -- Saving the model -- Next steps -- Summary -- Questions -- Further reading and references -- Chapter 10: Applying Biomimicking to Artificial Intelligence -- Technical requirements -- Human biomimicking -- TensorFlow, an open source machine learning framework -- Does deep learning represent our brain or our mind? …”
    Libro electrónico
  13. 1773
    Publicado 2023
    Tabla de Contenidos: “…Understanding architectural patterns within RISE with SAP -- Exploring what is possible and what is not possible within RISE with SAP -- Looking into alternate options for RISE with SAP -- Summary -- Further readings -- Chapter 6: Cloud with a Silver Lining: Busting the Myth - Part 2 -- Understanding the standard and tailored editions -- The standard option for RISE with SAP -- The tailored option for RISE with SAP -- Understanding the roles and responsibilities of standard, optional, and additional services -- The approach for handling rollouts and upgrades on RISE with SAP -- Understanding changes with AMS in RISE with SAP -- Exploring CAS packages - what you need to know -- Summary -- Further reading -- Chapter 7: Back to the Drawing Board: Reimagined Processes -- The enterprise experience -- Experience-led process modeling -- Experience and process design -- Insights to design -- Simulating the "to-be" world -- Continuous improvement - the infinity loop -- Data-to-value transformation -- Managing data and the challenges it brings -- Architecting intelligence -- The AI fabric -- Engagement (AI-X thread - conversational AI and digital assistance) -- Learning (cognition thread - machine Learning) -- Design considerations for intelligent workflows -- Going cloud-native with SAP -- Inner ring and outer ring -- Summary -- Further reading -- Chapter 8: The Exodus - Data That Matters -- Understanding different move/implementation scenarios -- Greenfield implementation -- Brownfield migration -- Selective data migration -- Looking into the importance of data migration - why, what, and how -- Understanding the importance of data governance and data quality -- Debunking myths around data migration -- Looking into the SAP Activate methodology and the adoption patterns related to data migration…”
    Libro electrónico
  14. 1774
    por MacDonald, Matthew
    Publicado 2005
    Tabla de Contenidos: “…Skip to the Next Iteration of a Loop; 2.10.2. What about...; 2.10.3. Where can I learn more?…”
    Libro electrónico
  15. 1775
    Publicado 2018
    Tabla de Contenidos: “…-- Some best practices of exception handling -- finally -- Assert requires JVM option -ea -- Exercise - Infinite loop -- Answer -- Summary -- Chapter 11: JVM Processes and Garbage Collection -- What are JVM processes? …”
    Libro electrónico
  16. 1776
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Table of Contents -- Preface -- Chapter 1: Introduction to Microservices -- Technical requirements -- My way into microservices -- Benefits of autonomous software components -- Challenges with autonomous software components -- Enter microservices -- A sample microservice landscape -- Defining a microservice -- Challenges with microservices -- Design patterns for microservices -- Service discovery -- Problem -- Solution -- Solution requirements -- Edge server -- Problem -- Solution -- Solution requirements -- Reactive microservices -- Problem -- Solution -- Solution requirements -- Central configuration -- Problem -- Solution -- Solution requirements -- Centralized log analysis -- Problem -- Solution -- Solution requirements -- Distributed tracing -- Problem -- Solution -- Solution requirements -- Circuit breaker -- Problem -- Solution -- Solution requirements -- Control loop -- Problem -- Solution -- Solution requirements -- Centralized monitoring and alarms -- Problem -- Solution -- Solution requirements -- Software enablers -- Other important considerations -- Summary -- Chapter 2: Introduction to Spring Boot -- Technical requirements -- Spring Boot -- Convention over configuration and fat JAR files -- Code examples for setting up a Spring Boot application -- The magic @SpringBootApplication annotation -- Component scanning -- Java-based configuration -- What's new in Spring Boot 3.0 -- Migrating a Spring Boot 2 application -- Spring WebFlux -- Code examples of setting up a REST service -- Starter dependencies -- Property files -- Sample RestController -- springdoc-openapi -- Spring Data -- Entity -- Repositories -- Spring Cloud Stream -- Code examples for sending and receiving messages -- Docker -- Summary -- Questions -- Chapter 3: Creating a Set of Cooperating Microservices -- Technical requirements…”
    Libro electrónico
  17. 1777
    por Burleson, Donald K.
    Publicado 2001
    Tabla de Contenidos: “…Validate an Oracle SID Passed to a Unix Script; 1.4.9. Loop Between Unix Servers; 1.4.10. Execute a SQL*Plus Script on All Databases; 1.4.11. …”
    Libro electrónico
  18. 1778
    por Weilkiens, Tim
    Publicado 2006
    Tabla de Contenidos: “…3.5 Activity Diagrams3.5.1 Examination Topics; 3.5.2 Object Nodes; 3.5.3 Control Nodes; 3.5.4 Activity Partitions; 3.5.5 Structured Activity Nodes; 3.5.6 Conditional Nodes, Loop Nodes, and Sequence Nodes; 3.5.7 Exception Handling; 3.6 Interaction Diagrams; 3.6.1 Examination Topics; 3.6.2 Interaction References; 3.6.3 Interaction Operations; 3.6.4 Connection Points (Gate); 3.6.5 Communication Diagrams; 3.6.6 Timing Diagrams; 3.6.7 Interaction Overview Diagrams; 3.7 State Diagrams; 3.7.1 Examination Topics; 3.7.2 State Machines; 3.8 Deployment Diagrams; 3.8.1 Examination Topics; 3.8.2 Artifacts…”
    Libro electrónico
  19. 1779
    Publicado 2017
    Tabla de Contenidos: “…Create and configure the AWS environment -- Microsoft Azure -- Digital Ocean -- Summary -- Chapter 11: Popular Node.js Web Frameworks -- Koa -- Meteor -- Sails -- Flatiron -- total.js -- LoopBack -- Hapi -- Kick starting Hapi.js -- Scaffolding the Hapi app -- Setting up a server -- Creating APIs -- Creating a configuration-based architecture -- Summary -- Chapter 12: Single Page Applications with Popular Frontend Frameworks -- Why use a frontend framework? …”
    Libro electrónico
  20. 1780
    por Das, Lyla. B.
    Publicado 2011
    Tabla de Contenidos: “…Chapter 5: Programming Concepts - IV -- 5.1 Input/Output Programming -- 5.1.1 Memory Mapped I/O -- 5.1.2 Peripheral or Isolated I/O -- 5.2 I/O Instructions -- 5.2.1 Fixed Port Addressing -- 5.2.2 Variable Port Addressing -- 5.3 Modular Programming -- 5.3.1 PUBLIC -- 5.3.2 EXTRN -- 5.3.3 Frequently Used Modules -- 5.4 Programming in C with Assembly Modules -- Key Points of this Chapter -- Questions -- Exercises -- Chapter 6: The Hardware Structure of 8086 -- 6.1 Pin Configuration -- 6.1.1 Minimum Mode Pins -- 6.1.2 De-multiplexing the Address/Data Bus -- 6.1.3 Minimum Mode Pin Functions -- 6.1.4 The De-multiplexed Address/Data Bus -- 6.1.4.1The Address Bus -- 6.1.4.2 The Data Bus -- 6.1.5 Control Signals for Read and Write -- 6.1.6 Memory and I/O -- 6.1.7 Clock Generation -- 6.1.8 Ready -- 6.1.9 Reset -- 6.1.10 Power on Reset -- 6.2 Clock -- 6.2.1 Read Machine Cycle -- 6.2.2 Wait Cycles -- 6.2.3 Write Machine Cycle -- 6.3 Other Processor Activities -- 6.3.1 Interrupt Lines -- 6.3.2 DMA -- 6.3.3 TEST -- 6.3.4 Bus High Enable (BHE ) -- 6.3.5 Halt Machine Cycle -- 6.4 Maximum Mode -- 6.4.1 Bus Controller -- 6.4.2 Request/Grant pins -- 6.4.3 Queue Status pins QS0 , QS1 -- 6.4.4 LOCK -- 6.5 Instruction Cycle -- 6.5.1 Delay Loops -- 6.5.2 Why Delay Loops? -- Key Points of this Chapter -- Questions -- Exercises -- Chapter 7: Memory and I/O Decoding -- 7.1 Memory Device Pins -- 7.2 Memory Address Decoding -- 7.2.1 Address Decoding Concepts -- 7.2.2 Address Decoding Using Block Decoders -- 7.2.3 Partial Address Decoding -- 7.3 Memory Banks -- 7.3.1 Odd Addresses Word -- 7.3.2 Why Memory Banks? …”
    Libro electrónico