Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Ontology 149
- Philosophy 109
- Ontología 64
- Management 49
- Development 44
- Social aspects 38
- History 35
- Cloud computing 32
- Python (Computer program language) 32
- Artificial intelligence 31
- Application software 30
- Data processing 28
- Information technology 27
- Computer software 26
- Metaphysics 26
- ontology 26
- Data mining 25
- RELIGION 25
- Computer networks 24
- Research 23
- Social sciences 22
- Big data 21
- Examinations 21
- Filosofía 21
- Machine learning 21
- Security measures 21
- Semantic Web 21
- Computer programs 20
- Crítica e interpretación 19
- History and criticism 19
-
1541
-
1542
-
1543
-
1544Publicado 2020Libro electrónico
-
1545Publicado 2023Libro electrónico
-
1546Publicado 2023Libro electrónico
-
1547Publicado 2017Tabla de Contenidos: “…-- Domain-specific languages -- Ontology -- AntiPatterns -- Summary -- Index…”
Libro electrónico -
1548
-
1549
-
1550por Dikmans, LonnekeTabla de Contenidos: “…Understanding the Problem -- The importance of information -- Example - insurance company -- Mismatch between business and IT -- Duplication of functionality and data -- Example - insurance company -- Process silos -- Example - utility companies -- Example - international software company -- Example - insurance company -- Strategies to stay ahead -- Example - a software company -- Architecture as a tool -- Layering of architecture -- Models -- Requirements -- Architecture ontology -- Enterprise architecture -- Reference architecture -- Solution architecture -- Project architecture -- Software architecture -- Service Oriented Architecture -- Summary -- 2. …”
Publicado 2012
Libro electrónico -
1551
-
1552Publicado 2024Tabla de Contenidos: “…Eight paradoxical tensions of organizational improvisation -- Introduction -- What is paradox? -- Ontology, paradox, and improvisation -- Improvisation as impulse -- Improvisation as a habit -- Improvisation as paradoxical event -- Improvisation as paradoxical processes -- Oxymoron: Signs of improvisation as paradoxical process -- Trained spontaneity -- Structured freedom -- Minimal structures -- Synthesis of global and local -- Real-time foresight -- Planning-execution convergence -- Prepared un-preparedness -- Nurtured serendipity -- Disciplined incoherence -- Nuancing improvisation through a paradox view -- Paradoxical challenges in the management of improvisation -- Longitudinal view -- The role of power -- Agile -- Conclusion -- Note -- References -- 3. …”
Libro electrónico -
1553Publicado 2021Libro electrónico
-
1554Publicado 2021Tabla de Contenidos: “…7.5 Applications of Cognitive Computing -- 7.5.1 Chatbots -- 7.5.2 Sentiment Analysis -- 7.5.3 Face Detection -- 7.5.4 Risk Assessment -- 7.6 Future of Cognitive Computing -- 7.7 Conclusion -- References -- 8 Tools Used for Research in Cognitive Engineering and Cyber Physical Systems -- 8.1 Cyber Physical Systems -- 8.2 Introduction: The Four Phases of Industrial Revolution -- 8.3 System -- 8.4 Autonomous Automobile System -- 8.4.1 The Timeline -- 8.5 Robotic System -- 8.6 Mechatronics -- References -- 9 Role of Recent Technologies in Cognitive Systems -- 9.1 Introduction -- 9.1.1 Definition and Scope of Cognitive Computing -- 9.1.2 Architecture of Cognitive Computing -- 9.1.3 Features and Limitations of Cognitive Systems -- 9.2 Natural Language Processing for Cognitive Systems -- 9.2.1 Role of NLP in Cognitive Systems -- 9.2.2 Linguistic Analysis -- 9.2.3 Example Applications Using NLP With Cognitive Systems -- 9.3 Taxonomies and Ontologies of Knowledge Representation for Cognitive Systems -- 9.3.1 Taxonomies and Ontologies and Their Importance in Knowledge Representation -- 9.3.2 How to Represent Knowledge in Cognitive Systems? …”
Libro electrónico -
1555por Khare, VikasTabla de Contenidos: “…4.10.1 Case study: factor analysis for customer satisfaction in a hotel chain -- 4.10.1.1 Introduction -- 4.10.1.2 Data collection -- 4.10.1.3 Data analysis -- 4.10.2 Case study: regression analysis in real estate market -- 4.10.2.1 Introduction -- 4.10.2.2 Background -- 4.10.2.3 Data collection -- 4.10.2.4 Regression analysis -- 4.11 Exercise -- 4.11.1 Objective type question -- 4.11.2 Descriptive type question -- Further reading -- 5 Artificial intelligence and machine learning application in data analysis -- Abbreviations -- 5.1 Introduction -- 5.2 Fundamentals of artificial intelligence -- 5.2.1 Natural language processing -- 5.2.2 Robotics -- 5.2.3 Expert systems -- 5.3 Spectrum of artificial intelligence -- 5.3.1 Reactive machines -- 5.3.2 Limited memory -- 5.3.3 Theory of mind -- 5.3.4 Self-aware -- 5.4 Knowledge representation of artificial intelligence -- 5.4.1 Symbolic representation -- 5.4.2 Semantic networks -- 5.4.3 Frames -- 5.4.4 Ontologies -- 5.4.5 Types of knowledge -- 5.4.5.1 Declarative knowledge -- 5.4.5.2 Heuristic knowledge -- 5.4.5.3 Procedural knowledge -- 5.4.5.4 Structural knowledge -- 5.4.5.5 Meta knowledge -- 5.4.6 Knowledge cycle of artificial intelligence -- 5.5 Constraint satisfaction problem -- 5.5.1 Map coloring with constraint satisfaction problems -- 5.5.2 Job shop scheduling with constraint satisfaction problem -- 5.5.3 Crypt arithmetic -- 5.5.4 The Wumpus world -- 5.6 Cognitive analysis with artificial intelligence -- 5.7 Conclusion -- 5.8 Case study -- 5.8.1 Case study: knowledge representation in artificial intelligence-healthcare diagnosis -- 5.8.1.1 Introduction -- 5.8.1.2 Problem statement -- 5.8.1.3 Knowledge representation approach -- 5.8.1.4 Rule-based systems -- 5.8.1.5 Probabilistic models -- 5.8.1.6 Ontologies -- 5.8.1.7 Knowledge graphs -- 5.8.1.8 Case-based reasoning -- 5.8.1.9 Benefits and outcomes…”
Publicado 2024
Libro electrónico -
1556
-
1557
-
1558Publicado 2024Tabla de Contenidos: “…4.8 Use of the Wireshark Sniffer Tool -- 4.9 Promiscuous Detection Tool: PromqryUI -- 4.9.1 Ping Method -- 4.9.2 Internet Control Message Protocol (ICMP) Test -- 4.9.3 Forged MAC Address Test -- 4.9.4 WIFI Security Alert -- 4.10 Countermeasures for Sniffing -- 4.11 Conclusion -- 4.12 Future Enhancement -- Chapter 5 Unraveling the Impact of Social Engineering on Organizations -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Conceptual Framework -- 5.4 Types of Social Engineering Attacks -- 5.5 Effects of Social Engineering on Organisations -- 5.6 Prevention Techniques against Social Engineering for Organisations -- 5.7 Illustrative Scenarios for Social Engineering Attacks -- 5.8 Case Study of Social Engineering -- 5.9 Conclusion -- Chapter 6 Impacts of Social Engineering on E-Banking -- 6.1 Introduction -- 6.2 Literature Survey -- 6.3 Potential Social Engineering Risks in E-Banking -- 6.4 Ontology Model of Social Engineering Attacks on E-Banking -- 6.5 Digital Transaction Scams -- 6.6 How to Fight Against Social Engineering Attacks on E-Banking -- 6.7 Detection and Prevention Techniques -- 6.8 Conclusion -- Chapter 7 The Art of Deception: Unmasking the Tools and Psychological Principles Behind Social Engineering -- 7.1 Introduction -- 7.1.1 Information Gathering -- 7.1.2 Establishing the Relationship -- 7.1.3 Exploitation Phase -- 7.1.4 Execution Phase -- 7.2 Tools and Techniques -- 7.2.1 Phishing -- 7.2.2 Baiting -- 7.2.3 Pretexting -- 7.2.4 Quid Pro Quo -- 7.2.5 Scareware -- 7.2.6 Diversion Theft -- 7.2.7 Tailgating -- 7.3 Social Engineering Toolkit -- 7.3.1 Attacks -- 7.4 Psychological Principles of Social Engineering -- 7.4.1 The Reciprocity Principle -- 7.4.2 The Need and Greed Principle -- 7.4.3 The Authority Principle -- 7.4.4 The Flattery Principle -- 7.4.5 The Consistency Principle -- 7.4.6 The Herd Principle -- 7.5 Conclusion…”
Libro electrónico -
1559por Ayache, Elie. authorTabla de Contenidos: “…Contingent Claim -- 13.2 Probabilistic Exit -- 13.3 The Alternative Exit -- 13.3.1 Differentiating the form -- 13.4 The Invention of Writing -- 13.5 Genesis -- 13.5.1 That they don't exist -- 14 The Hard Problem -- 14.1 The Ultimate Probability Spot -- 14.2 The Presentation of the Contingent Payoffs -- 14.3 The Lure of Theory -- 14.4 The Semantic Theory of the Market -- 15 The Book of the Market -- 15.1 Formalism and Meta-formalism -- 15.1.1 The instant of the formalism and the instant of the market -- 15.1.2 The infinity of the option price and the infinity of matter -- 15.1.3 Formal deduction of matter -- 15.1.4 A new book for a new reality -- 15.2 The Book of Genesis -- 15.2.1 Only the book can write history -- 15.2.2 One book instead of two theories -- 15.2.3 Only the book can bind the void -- 15.2.4 Only the book can settle the succession -- 15.2.5 Contemporary art -- 15.2.6 An ontology made of paper -- 15.3 The Trading Force -- 15.4 Coda -- 16 Denouement: The theory after the Two Narratives -- Conclusion -- 17 Appendix 1: Regime-Switching Model 669 -- 17.1 A Meta-contextual Pricing Tool -- 17.2 Recalibration -- 18 Append…”
Publicado 2015
Libro electrónico -
1560Publicado 2022Tabla de Contenidos: “…. -- There's more... -- Retrieving gene ontology information from Ensembl -- Getting ready -- How to do it... -- There's more... -- See also -- Chapter 6: Population Genetics -- Managing datasets with PLINK -- Getting ready -- How to do it... -- There's more... -- See also -- Using sgkit for population genetics analysis with xarray -- Getting ready -- How to do it... -- There's more... -- Exploring a dataset with sgkit -- Getting ready -- How to do it... -- There's more... -- See also -- Analyzing population structure -- Getting ready -- How to do it... -- See also -- Performing a PCA…”
Libro electrónico