Mostrando 1,941 - 1,960 Resultados de 2,511 Para Buscar '"In the Loop"', tiempo de consulta: 0.12s Limitar resultados
  1. 1941
    Publicado 2024
    Tabla de Contenidos: “…-- GPT Models in Medicine -- Radiology -- Patient Self-Care Management and Informed Decision-Making -- Public Health -- Conclusion -- Part V Summary, Looking Forward, and Additional Resources -- Epilogue: Getting Good at AI for Good -- Communication -- Setting Realistic Expectations for AI -- Confronting Technical Limitations -- Project Scoping and Implementation -- Data -- Adapting to Previously Collected Datasets -- Creating Training and Test Sets with the Application Scenario in Mind -- Modeling -- Incorporating Domain Expertise -- Model Development with Resource Constraints -- Evaluation and Metrics -- Humans in the Loop -- Impact -- Uphill Path to Deployment and Adoption -- Measuring Impact -- Conclusion -- Key Takeaways -- AI and Satellites: Critical Tools to Help Us with Planetary Emergencies -- Amazing Things in the Amazon -- Quick Help Saving Lives in Disaster Response -- Additional Resources…”
    Libro electrónico
  2. 1942
    Publicado 2024
    Tabla de Contenidos: “…Exploring intermediate Rust concepts -- Control flow -- While loops -- Functions -- Match control flow -- Structs -- Vectors -- Delving deep into advanced Rust concepts -- Hashmaps -- Ownership and borrowing -- Crates, modules, and cargo -- Summary -- Part 2: Building the Blockchain -- Chapter 3: Building a Custom Blockchain -- Technical requirements -- Windows installation -- Mac installation -- Ubuntu installation -- VS Code -- rust-analyzer -- Cargo -- Planning our first blockchain project -- Structs -- Required functions -- Getting started with building the blockchain -- Block -- Creating the genesis block -- Using helper functions -- Exploring embedded databases -- Summary -- Chapter 4: Adding More Features to Our Custom Blockchain -- Technical requirements -- Connecting the blocks -- Libraries powering blockchain operations -- Blockchain functions -- Starting the node server -- The server -- Server struct and implemented methods -- Enums -- Helper functions -- The serve function -- The Node struct -- Summary -- Chapter 5: Finishing Up Our Custom Blockchain -- Technical requirements -- Adding memory pools -- Implementing a memory pool -- The BlockinTransit implementation -- Implementing transactions -- Understanding TXInput transactions -- Understanding TXOutput transactions -- Understanding the Transaction implementation -- Utilizing UTXOs and developing wallets -- Implementing UTXOSet -- Implementing wallets -- Wallets -- Setting up configurations and utilities -- The Config implementation -- Utility functions -- Understanding the lib.rs file -- Understanding the Main.rs file -- Using your custom blockchain -- Creating a new blockchain -- Creating a new wallet -- Checking the wallet balance -- Starting a node -- Sending currency -- Listing all wallet addresses -- Printing the blockchain -- Rebuilding the UTXO set -- Summary…”
    Libro electrónico
  3. 1943
    Publicado 2024
    Tabla de Contenidos: “…-- The OTel project -- OTel -- Summary -- Chapter 12: Distributing Your Apps -- Technical requirements -- Go Modules -- The routine using modules -- CI -- Caching -- Static analysis -- Releasing your application -- Summary -- Part 5: Going Beyond -- Chapter 13: Capstone Project - Distributed Cache -- Technical requirements -- Understanding distributed caching -- System requirements -- Requirements -- Design and trade-offs -- Creating the project -- Thread safety -- Choosing the right approach -- Adding thread safety -- The interface -- TCP -- HTTP -- Others -- Eviction policies -- Sharding -- Summary -- Chapter 14: Effective Coding Practices -- Technical requirements -- Reusing resources -- Using sync.Pool in a network server -- Using sync.Pool for JSON marshaling -- Executing tasks once -- singleflight -- Effective memory mapping -- API usage -- Advanced usage with protection and mapping flags -- Avoiding common performance pitfalls -- Leaking with time.After -- Defer in for loops -- Maps management -- Resource management -- Handling HTTP bodies -- Channel mismanagement -- Summary -- Chapter 15: Stay Sharp with System Programming -- Real-world applications -- Dropbox's leap of faith…”
    Libro electrónico
  4. 1944
    Publicado 2024
    Tabla de Contenidos: “…Fingers, faces, and other accessories -- Creating a library of poses -- The Asset Browser -- Creating a pose asset -- Practicing poses -- Summary -- Questions -- Chapter 7: Basic Character Animation -- Technical requirements -- Preparing Rain in a new scene -- A brief recap on linking Rain into a new project -- Using a pose asset -- Setting bone relationships for an animation -- Hiding bones -- Keying pose bones -- Blocking or roughing the animation -- Reviewing our key poses -- The Dope Sheet -- Introduction to the Dope Sheet -- Organizing the Dope Sheet -- Going further into animating this character -- Two more in-between poses -- In-between operators for posing -- Waving -- Polishing the animation -- Using the Graph Editor on bones -- Animating Rain's accessories -- Summary -- Questions -- Chapter 8: The Walk Cycle -- Technical requirements -- Preparing the walk cycle scene -- The timeline of a walk cycle -- Timeline markers -- Getting Rain ready to walk -- Moving forward on the Y axis -- Establishing the stride length -- Looping the animation -- Putting Rain on a treadmill -- Using a preview playback range -- Adding more periodic motion -- Torso movement -- Swaying from side to side -- The Action Editor -- More torso animation with sine waves -- Advanced footwork -- Rolling the foot -- Picking up the feet -- Correcting the motion of the legs -- Copying animation from the left foot to the right foot -- Finishing the walk cycle -- FK toes -- FK arms -- Final touches? …”
    Libro electrónico
  5. 1945
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Part I: Overview -- Chapter 1: Robotic Process Automation: Overview -- Return on Investment (ROI) -- Automation Types -- UiPath StudioX -- Chapter 2: UiPath StudioX -- Learning Objectives -- System Requirements -- Hardware Requirements -- Software Requirements -- Installation and Setup -- Register -- Download -- Install -- Interface Overview -- Home -- Start -- Templates -- Tools -- Settings -- Help -- Design View -- The Ribbon -- Save -- Export as Template -- Cut, Copy, and Paste -- Project -- Notebook -- Manage Packages -- App/Web Recorder -- Table Extraction -- Analyze -- Export to Excel -- Publish -- Run -- Project Workspace -- Activities Panel -- Designer Panel -- Context Menu -- Properties Panel -- Data Manager Panel -- Output Panel -- Part II: Building Blocks -- Chapter 3: Common Concepts -- Learning Objectives -- Notebook -- Default Notebook -- Custom Notebook -- Activity Inputs -- Activity Outputs -- Common Properties -- Common Activities -- Write Line -- Configuration -- Message Box -- Configuration -- Input Dialog -- Configuration -- Modify Text -- Configuration -- Text to Left/Right -- Configuration -- Delay -- Configuration -- If -- Configuration -- Switch -- Configuration -- Repeat Number Of Times -- Configuration -- Skip Current -- Configuration -- Exit Loop -- Configuration -- Get Username/Password -- Configuration -- Get Orchestrator Asset -- Configuration -- Save For Later -- Configuration -- Wait for Download -- Configuration -- Group -- Configuration -- Chapter 4: UI Automation -- Learning Objectives -- Sample Overview -- Activities Reference -- Use Application/Browser -- Configuration -- Go To URL -- Configuration -- Navigate Browser -- Configuration -- Highlight -- Configuration -- Take Screenshot -- Configuration…”
    Libro electrónico
  6. 1946
    Publicado 2021
    Tabla de Contenidos: “…11.4 PCM Sources and Database -- 11.5 PCMOscillator and Cores -- 11.6 PCM Core Programming Notes -- 11.7 Exercises -- Bibliography -- 12 Synthesizer Filters -- 12.1 Design Summary -- 12.2 Q and Self-Oscillation -- 12.3 Analog Magnitude Matching at Nyquist -- 12.4 Zavalishin's Virtual Analog Filters -- 12.5 Resolving Delay-Free Loops in VA Structures -- 12.6 VA Filters from Primitive Analog Block Diagrams -- 12.7 VA Filters from Signal Flow Graphs -- 12.8 VA Filters from Conceptual Signal Flow Graphs -- 12.9 Nonlinear Processing and Self-Oscillation Control -- 12.10 Synth Filter Objects -- 12.11 Input Drive and Output Peak Limiter -- 12.12 SynthFilter and Cores -- 12.13 Synth Filter Core Programming Notes -- 12.14 Exercises -- Bibliography -- 13 Karplus-Strong Plucked String Model -- 13.1 The Exciter-Resonator -- 13.2 The Plucked String -- 13.3 The Karplus-Strong Model -- 13.4 Pluck Position -- 13.5 Karplus-Strong Algorithm Equations -- 13.6 Karplus-Strong C++ Objects -- 13.7 KSOscillator and KSOCore -- 13.8 KSOCore Member Objects -- 13.9 Core Programming Notes -- 13.10 Extensions to the KS Algorithm -- 13.11 Exercises -- Bibliography -- 14 The Modulation Matrix -- 14.1 Modulation Inputs and Outputs -- 14.2 Modulation Routings -- 14.3 Mod Matrix Channel Routing -- 14.4 ModSource and ModDestination for GUI Controls -- 14.5 ModMatrixParameters -- 14.6 The ModMatrix Object -- 14.7 Initializing the ModMatrix -- 14.8 Programming the ModMatrix -- 14.9 Mod Matrix Transforms -- 14.10 Running the ModMatrix -- Bibliography -- 15 Wave Morphing and Wave Sequencing -- 15.1 Wave Banks -- 15.2 Wave Morphing -- 15.3 The MorphWTCore -- 15.4 MorphWTCore Programming Notes -- 15.5 Wave Sequencing 1.0 -- 15.6 SynthLab WaveSequencer -- 15.7 The WSOscillator Object -- 15.8 WSOscillator Programming Notes -- 15.9 Exercises -- Bibliography -- 16 The SynthLab Synth Projects…”
    Libro electrónico
  7. 1947
    Publicado 2023
    Tabla de Contenidos: “…-- Types of bugs -- Testing versus debugging -- Breaking down the debugging process -- Understanding debugging tools and techniques -- Print debugging -- The CODESYS debugger tool -- Forcing variables -- Troubleshooting - a practical example -- Case 4 - a while loop -- Summary -- Questions -- Further reading -- Chapter 4: Complex Variable Declaration - Using Variables to Their Fullest -- Technical requirements -- Auto declaring variables -- Understanding constants…”
    Libro electrónico
  8. 1948
    Publicado 2024
    Tabla de Contenidos: “…7.2 Photovoltaic (PV)-Based DSTATCOM Model -- 7.3 Controller Design and Control Algorithm -- 7.3.1 Instantaneous Reactive Power Theory (IRPT) -- 7.3.2 Modified Instantaneous Reactive Power Theory (MIRPT) -- 7.3.3 Hybrid Synchronous Reference Frame Theory (HSRF) -- 7.3.4 Indirect Current Control (ICC) -- 7.3.5 Direct Current Control (DCC) -- 7.4 Simulation Results -- 7.5 Experimental Results -- 7.6 Conclusion -- References -- Chapter 8 Modeling and Simulation of Current Transformer to Study Its Behaviors in Different Conditions -- 8.1 Introduction -- 8.2 Simulation Circuit of Current Transformer -- 8.3 Effects of CT Performance Due to Variation of Circuit Time Constants -- 8.4 Effects of CT Performance Due to Switching Transients -- 8.5 DWT-Based Skewness Analysis for Assessment of CT Saturation Due to Switching Transients -- 8.6 CT Saturation Detection by Multi-Resolution Analysis- Based Notch Assessment -- 8.7 CT Primary Current Assessment During CT Saturation -- 8.8 Conclusion -- References -- Chapter 9 Multilevel Inverter-Fed Closed Loop Control and Analysis of Induction Motor Drive -- 9.1 Introduction -- 9.2 Mathematical Modeling -- 9.2.1 Field Weakening Controller -- 9.2.2 Vector Controller -- 9.3 Results -- 9.3.1 Starting Dynamics -- 9.3.2 Reversal Dynamics -- 9.3.3 Load Perturbation Analysis -- 9.3.4 THD Analysis -- 9.4 Conclusion -- References -- Chapter 10 Hybrid Grey Wolf Optimizer for Modeling and Control of Electric Drives -- 10.1 Background Study -- 10.2 Proposed Approach -- 10.3 Simulation Outcomes and Discussions -- 10.4 Conclusions -- References -- Chapter 11 Parameter Estimation of First-Order RC Model of Lithium-Ion Batteries in Electric Vehicles Using Slime Mold Algorithm -- 11.1 Introduction -- 11.2 Brief Overview of the Battery Models -- 11.2.1 Equivalent Circuit Model (ECM) of Li-Ion Battery…”
    Libro electrónico
  9. 1949
    Publicado 2018
    Tabla de Contenidos: “…Compiling and running chaincode -- Installing and instantiating chaincode -- Invoking chaincode -- Creating a chaincode -- The chaincode interface -- Setting up the chaincode file -- The Invoke method -- Access control -- ABAC -- Registering a user -- Enrolling a user -- Retrieving user identities and attributes in chaincode -- Implementing chaincode functions -- Defining chaincode assets -- Coding chaincode functions -- Creating an asset -- Reading and modifying an asset -- Main function -- Testing chaincode -- SHIM mocking -- Testing the Init method -- Testing the Invoke method -- Running tests -- Chaincode design topics -- Composite keys -- Range queries -- State queries and CouchDB -- Indexes -- ReadSet and WriteSet -- Multiversion concurrency control -- Logging output -- Configuration -- Logging API -- SHIM logging levels -- Stdout and stderr -- Additional SHIM API functions -- Summary -- Chapter 5: Exposing Network Assets and Transactions -- Building a complete application -- The nature of a Hyperledger Fabric application -- Application and transaction stages -- Application model and architecture -- Building the application -- Middleware - wrapping and driving the chaincode -- Installation of tools and dependencies -- Prerequisites for creating and running the middleware -- Installation of dependencies -- Creating and running the middleware -- Network configuration -- Endorsement policy -- User records -- Client registration and enrollment -- Creating a channel -- Joining a channel -- Installation of chaincode -- Instantiation of chaincode -- Invoking the chaincode -- Querying the chaincode -- Completing the loop - subscribing to blockchain events -- Putting it all together -- User application - exporting the service and API -- Applications -- User and session management -- Designing an API -- Creating and launching a service…”
    Libro electrónico
  10. 1950
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Connecting Blue Prism to ML Models -- Chapter 1: Machine Learning as a Service: the Digital Exchange and Web APIs -- Technical requirements -- Using the DX -- Accessing the DX -- Machine learning web API fundamentals -- An overview of MLaaS on the DX -- Vendor selection -- Examples -- Example 1 - AWS Comprehend for text entity extraction, key phrase extraction, and sentiment analysis -- Example 2 - Azure Form Recognizer for invoice extraction -- Example 3 - GCP Cloud Vision batch OCR processing -- Summary -- Chapter 2: Predicting from Command Prompt and PowerShell -- Technical requirements -- Command-line basics -- Output streams -- Output redirection -- Blocking versus non-blocking execution -- Predicting from the command line using Utility - Environment -- Example 1 - Running a program using the Start Process -- Example 2 - Running a program using Run Process Until Ended -- Getting prediction results back into BP -- Example 3 - Saving STDOUT and STDERR as Data Items -- Example 4 - Redirecting an internal command (dir) to files -- Timing out long-running predictions -- Example 5 - PS script timeout -- DX VBOs - Utility - PowerShell and Script Execution VBO -- Utility - PowerShell -- Script Execution VBO -- Example 7 - Calling a Python program -- Summary -- Chapter 3: Code Stages -- Technical requirements -- Setting up ML.NET in BP -- Adding references and namespaces to BP -- Example 1 - preparation work before BP -- Porting ML.NET C# into a Code Stage -- Global Code -- Example 2 - porting the source code into BP -- Improving BP integration -- Example 3 - refactoring -- Summary -- Part 2: Designing IA Solutions -- Chapter 4: Reviewing Predictions and Human in the Loop -- Technical requirements -- Why should we review predictions?…”
    Libro electrónico
  11. 1951
    por Kroah-Hartman, Greg
    Publicado 2007
    Tabla de Contenidos: “…ACPI Options -- acpi -- acpi_sleep -- acpi_sci -- acpi_irq_ balance -- acpi_irq_ nobalance -- acpi_irq_isa -- acpi_irq_pci -- acpi_os_name -- acpi_osi -- acpi_serialize -- acpi_skip_ timer_override -- acpi_dbg_layer -- acpi_fake_ecdt -- acpi_generic_ hotkey -- acpi_pm_good -- ec_intr -- memmap -- memmap -- pnpacpi -- processor.max_ cstate -- processor.nocst -- SCSI Options -- max_luns -- max_report_ luns -- scsi_dev_flags -- PCI Options -- PCI -- Plug and Play BIOS Options -- noisapnp -- pnpbios -- pnp_reserve_ irq -- pnp_reserve_ dma -- pnp_reserve_io -- pnp_reserve_ mem -- SELinux Options -- checkreqprot -- enforcing -- selinux -- selinux_ compat_net -- Network Options -- netdev -- rhash_entries -- shapers -- thash_entries -- Network File System Options -- lockd.nlm_ grace_period -- lockd.nlm_ tcpport -- lockd.nlm_ timeout -- lockd.nlm_ udpport -- nfsroot -- nfs.callback_ tcpport -- nfs.idmap_ cache_timeout -- Hardware-Specific Options -- nousb -- lp -- parport -- parport_init_ mode -- nr_uarts -- Timer-Specific Options -- enable_timer_ pin_1 -- disable_timer_ pin_1 -- enable_8254_ timer -- disable_8254_ timer -- hpet -- clocksource -- Miscellaneous Options -- dhash_entries -- elevator -- hashdist -- combined_ mode -- max_loop -- panic -- pause_on_oops -- profile -- Kernel Build Command-Line Reference -- Informational Targets -- Cleaning Targets -- Configuration Targets -- Build Targets -- Packaging Targets -- Documentation Targets -- Architecture-Specific Targets -- Analysis Targets -- Kernel Configuration Option Reference -- EXPERIMENTAL -- LOCALVERSION -- AUDIT -- IKCONFIG -- EMBEDDED -- MODULES -- IOSCHED_NOOP -- IOSCHED_AS -- IOSCHED_ DEADLINE -- IOSCHED_CFQ -- SMP -- M386 -- X86_GENERIC -- NR_CPUS -- SCHED_SMT -- PREEMPT_NONE -- PREEMPT_ VOLUNTARY -- PREEMPT -- PREEMPT_BKL -- NOHIGHMEM -- HIGHMEM4G -- HIGHMEM64G -- FLATMEM_ MANUAL…”
    Libro electrónico
  12. 1952
    Publicado 2019
    Tabla de Contenidos: “…-- 1.2 Cooking with DAGs -- 1.3 Scaling out, concurrency, and recovery -- 1.3.1 Scaling up vs. scaling out -- 1.3.2 Concurrency and resource management -- 1.3.3 Recovering from failures -- 1.4 Introducing a companion dataset -- Summary -- Chapter 2: Introducing Dask -- 2.1 Hello Dask: A first look at the DataFrame API -- 2.1.1 Examining the metadata of Dask objects -- 2.1.2 Running computations with the compute method -- 2.1.3 Making complex computations more efficient with persist -- 2.2 Visualizing DAGs -- 2.2.1 Visualizing a simple DAG using Dask Delayed objects -- 2.2.2 Visualizing more complex DAGs with loops and collections -- 2.2.3 Reducing DAG complexity with persist -- 2.3 Task scheduling -- 2.3.1 Lazy computations -- 2.3.2 Data locality -- Summary -- Part 2: Working with structured data using Dask DataFrames -- Chapter 3: Introducing Dask DataFrames -- 3.1 Why use DataFrames? …”
    Libro electrónico
  13. 1953
    Publicado 2011
    Tabla de Contenidos: “…Introduction to NXT-G -- Starting an NXT-G Program -- The NXT-G Interface -- The Menu Bar -- The Toolbar -- The Work Area -- The Programming Palette -- The Configuration Panel -- The Controller -- The Little Help Window and the Work Area Map -- Fundamental NXT-G Concepts -- The Starting Point -- Sequence Beams -- Extending the Sequence Beam -- Parallel Sequence Beams -- Automatic Resizing of Sequence Beams -- Managing Programming Blocks in the Work Area -- Navigating the Work Area -- Increasing Program Readability with Comments -- The Common Palette -- The Move Block -- The Port Parameter -- The Direction Parameter -- The Steering Parameter -- The Power Parameter -- The Duration Parameter -- The Next Action Parameter -- Feedback Boxes -- The Record/Play Block -- The Sound Block -- The Display Block -- The Wait Block -- The Loop Block -- The Switch Block -- Conclusion -- 8. …”
    Libro electrónico
  14. 1954
    Publicado 2024
    Tabla de Contenidos: “…-- Additional information -- Types of documentation -- Policies and procedures -- System architecture diagrams -- Threat models -- Risk assessments -- Security requirements -- Logical architecture diagrams -- Physical architecture diagrams -- Solution design documents (SDDs) -- Configuration documents -- Documentation tools -- Categories of documentation tools -- Comparative analysis -- Team approaches to documentation -- Division of responsibilities -- Collaborative platforms for a team-based approach -- Documentation life cycle management -- Comparative analysis -- Summary -- Chapter 7: Entry-Level- to-Architect Roadmap -- The journey -- Entry level - starting in a technology field -- Mid-level - transitioning to cybersecurity -- Advanced level - becoming a cybersecurity specialist -- Senior level - becoming a CSA -- The big picture -- Where to start -- A bit of history -- The OODA Loop -- Applying lessons learned -- Entry level - analysts -- Mid-level - security engineers -- Advanced level - principal consultants -- CSA-to-CISO level -- The cold open -- Taking inventory of your skills -- Building hands-on skills…”
    Libro electrónico
  15. 1955
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to ETL, Data Pipelines, and Design Principles -- Chapter 1: A Primer on Python and the Development Environment -- Introducing Python fundamentals -- An overview of Python data structures -- Python if...else conditions or conditional statements -- Python looping techniques -- Python functions -- Object-oriented programming with Python -- Working with files in Python -- Establishing a development environment -- Version control with Git tracking -- Documenting environment dependencies with requirements.txt -- Utilizing module management systems (MMSs) -- Configuring a Pipenv environment in PyCharm -- Summary -- Chapter 2: Understanding the ETL Process and Data Pipelines -- What is a data pipeline? …”
    Libro electrónico
  16. 1956
    Publicado 2024
    Tabla de Contenidos: “…Use case 10 - correcting configuration drift in a major energy company -- Future directions -- Summary -- Chapter 6: Performance Optimization Techniques -- Techniques to optimize Kubernetes performance -- Evaluating cluster resource allocation -- Optimizing container image size and management -- Network performance tuning -- Enhancing data storage performance -- Utilizing resource quotas and limits effectively -- Efficient logging and monitoring strategies -- Load balancing and service discovery optimization -- Implementing proactive node health checks -- Ensuring efficiency and scalability -- Designing for statelessness and scalability -- Adopting microservices architecture appropriately -- Cluster autoscaling techniques -- Horizontal versus vertical scaling strategies -- Utilizing cluster federation for scalability -- Efficient resource segmentation with namespaces -- Optimizing inter-pod communication -- Load testing and capacity planning -- Maximizing the potential of Kubernetes -- Harnessing Kubernetes extensibility with custom resources -- Integrating with cloud-native ecosystems -- Leveraging Kubernetes for continuous deployment -- Utilizing advanced scheduling features -- Container runtime optimization -- Effective data management and backup strategies -- Hybrid and multi-cloud deployment strategies -- Adopting GitOps for Kubernetes management -- Summary -- Part 3: Achieving Continuous Improvement -- Chapter 7: Embracing Continuous Improvement in Kubernetes -- The concept of continuous improvement -- Fundamentals of continuous improvement in Kubernetes -- The role of feedback loops in Kubernetes' evolution -- Comparing continuous improvement to traditional models -- Measuring success in continuous improvement initiatives -- The psychological aspect of cultivating a growth mindset -- Continuous learning…”
    Libro electrónico
  17. 1957
    Publicado 2024
    Tabla de Contenidos: “…Milestone 2 - Incorporating the Common Voice 11 dataset -- Expanding language coverage -- Improving translation capabilities -- Milestone 3 - Setting up Whisper pipeline components -- Loading WhisperTokenizer -- Milestone 4 - Transforming raw speech data into Mel spectrogram features -- Combining to create a WhisperProcessor class -- Milestone 5 - Defining training parameters and hardware configurations -- Setting up the data collator -- Milestone 6 - Establishing standardized test sets and metrics for performance benchmarking -- Loading a pre-trained model checkpoint -- Defining training arguments -- Milestone 7 - Executing the training loops -- Milestone 8 - Evaluating performance across datasets -- Mitigating demographic biases -- Optimizing for content domains -- Managing user expectations -- Milestone 9 - Building applications that demonstrate customized speech recognition -- Summary -- Part 3: Real-world Applications and Use Cases -- Chapter 5: Applying Whisper in Various Contexts -- Technical requirements -- Exploring transcription services -- Understanding the role of Whisper in transcription services -- Setting up Whisper for transcription tasks -- Transcribing audio files with Whisper efficiently -- Integrating Whisper into voice assistants and chatbots -- Recognizing the potential of Whisper in voice assistants and chatbots -- Integrating Whisper into chatbot architectures -- Quantizing Whisper for chatbot efficiency and user experience -- Enhancing accessibility features with Whisper -- Identifying the need for Whisper in accessibility tools -- Building an interactive image-to-text application with Whisper -- Summary -- Chapter 6: Expanding Applications with Whisper -- Technical requirements -- Transcribing with precision -- Leveraging Whisper for multilingual transcription -- Indexing content for enhanced discoverability…”
    Libro electrónico
  18. 1958
    Publicado 2022
    “…Covers statements, lists, dictionaries, and for loops. 00:00 Intro 00:25 Using Colab 00:40 Tables of Contents in Colab 00:55 Save copy in Github 01:05 Print hello world 01:24 print equation 01:50 Using f-strings to print 02:05 using list data structures 02:20 Appending to a list 02:45 Looping with for loops in Python 03:30 Pushing to a list 04:00 Random Pushing to a container 05:19 Using a dictionary in Python…”
    Video
  19. 1959
    Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
    Libro electrónico
  20. 1960
    Publicado 2022
    Tabla de Contenidos: “…-- Assessing Your Organization's Vendor Relationship Management (VRM) -- Vendor onboarding -- Connecting vendors to internal stakeholders -- Examining the vendor payment process -- Understanding Strategic Sourcing as Part of Your Readiness Assessment -- Determining the Right Leadership Structure for Your Efforts -- Consultant -- Direct hire -- Employee add-on function -- Chapter 7 Making the Case for Supplier Diversity -- Aligning Supplier Diversity to Organizational Strategic Goals -- Finding Value-Creating Opportunities -- Communicating Value -- Selling Your Supplier Diversity Story to Stakeholders -- Chapter 8 Building Support for Supplier Diversity Programs -- Seeing How Supplier Diversity Touches Many Stakeholders -- Finding Allies throughout Departments in Your Organization -- Diversity, equity, and inclusion (DEI) -- Working with procurement -- Apprising community relations of your strategy -- Informing employees and ERGs -- Looping in those responsible for sustainability initiatives -- Developing an In-Reach Program -- Training -- Communication -- Engagement through advisory councils/task forces -- Aligning Programs to Collaborator Objectives: Solving WIIFT -- Chapter 9 Identifying Common Barriers to Supplier Diversity…”
    Libro electrónico