Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 167
- Raspberry Pi (Computer) 123
- Python (Computer program language) 79
- Historia 78
- Programming 67
- Biografia 58
- Computer input-output equipment 49
- Hardware and Maker 45
- Política 40
- Nacionalisme 37
- Política i govern 37
- Pi i Margall, Francesc 35
- Pi i Sunyer, Carles 35
- Linux 32
- Biblia 29
- Computer programming 28
- Microcomputers 27
- Federalisme 26
- Internet of things 25
- Punts de vista polítics i socials 24
- Bíblia 22
- Application software 21
- Development 21
- Guerra Civil Espanyola, 1936-1939 21
- Descripcions i viatges 20
- Església de Santa Maria del Pi (Barcelona, Catalunya) 20
- Operating systems (Computers) 20
- Polítics 20
- Govern 19
- Arduino (Programmable controller) 17
-
3181Publicado 2022Tabla de Contenidos: “…The Example of Green Communications -- 10.1. The Green PI solution -- 10.2. The Edge Cloud -- 10.3. The IoE -- 10.4. …”
Libro electrónico -
3182Publicado 2013Tabla de Contenidos: “…El bací dels pobres vergonyants de la parròquia del Pi de Barcelona com atenuant de la crisi ciutadana del segle XV / Salvador Claramunt Rodríguez -- Entre Almeria et Gênes: Barcelone et les réseaux de grand commerce au XIIe siècle / Damien Coulon -- La gent rica de Barcelona l'any 1363 / Maria Teresa Ferrer i Mallol -- Dins i fora de la ciutat: els nostre veïns de l'any 1000 / Ana Gómez Rabal, Pere J. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3183Publicado 2015Tabla de Contenidos: “…7 Observando los jóvenes deho y: conociendo los adulto s demañana8 Creando espacios de ap ropiaciónpara los imaginarios de Brasil; 9 Jóvenes críticos: la pi edraangular para la construcción de"otro" Brasil; Bibliografía; 1.1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3184Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Deploying Ubuntu Server -- Setting up our lab -- Determining your server's role -- Obtaining Ubuntu Server -- Deciding between 32-bit and 64-bit installations -- Creating a bootable Ubuntu Server flash drive (Windows) -- Creating a bootable Ubuntu Server flash drive (Linux) -- Creating a bootable Ubuntu Server flash drive (Mac) -- Planning the partition layout -- Installing Ubuntu Server -- Installing Ubuntu Server (Raspberry Pi) -- Summary -- Chapter 2: Managing Users -- Understanding when to use root -- Creating and removing users -- Understanding the /etc/passwd and /etc/shadow files -- Distributing default configuration files with /etc/skel -- Switching between users -- Managing groups -- Managing passwords and password policies -- Configuring administrator access with sudo -- Setting permissions on files and directories -- Summary -- Chapter 3: Managing Storage Volumes -- Viewing disk usage -- Adding additional storage volumes -- Partitioning and formatting volumes -- Mounting and unmounting storage volumes -- Understanding the /etc/fstab file -- Managing swap -- Utilizing LVM volumes -- Using symbolic and hard links -- Summary -- Chapter 4: Connecting to Networks -- Setting the hostname -- Managing network interfaces -- Assigning static IP addresses -- Understanding Linux name resolution -- Understanding Network Manager -- Getting started with OpenSSH -- Getting started with SSH key management -- Simplifying SSH connections with a ~/.ssh/config file -- Summary -- Chapter 5: Managing Software Packages -- Understanding Linux package management -- Installing and removing software -- Searching for packages -- Managing software repositories -- Keeping your server up to date…”
Libro electrónico -
3185por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…日本語版序文 序文 概要 第1章 予算プロセスにおける業績情報:OECD 諸国の経験の概観 1. 業績情報(PI)の開発はどういう傾向になっているか? 20 2. 業績予算(PB)とは何か? 22 第 2 章 業績予算の実施アプローチ 1. …”
Publicado 2010
Libro electrónico -
3186Publicado 2017Tabla de Contenidos: “…Eine einzelne Skriptdatei lesen -- Strukturbeispiele aus HowDoI -- Stilbeispiele aus HowDoI -- Diamond -- Eine größere Anwendung lesen -- Strukturbeispiele aus Diamond -- Stilbeispiele aus Diamond -- Tablib -- Eine kleine Bibliothek lesen -- Strukturbeispiele aus Tablib -- Stilbeispiele aus Tablib -- Requests -- Eine größere Bibliothek lesen -- Strukturbeispiele aus Requests -- Stilbeispiele aus Requests -- Werkzeug -- Code in einem Toolkit lesen -- Stilbeispiele aus Werkzeug -- Strukturbeispiele aus Werkzeug -- Flask -- Code in einem Framework lesen -- Stilbeispiele aus Flask -- Strukturbeispiele aus Flask -- Kapitel 6: Guten Code ausliefern -- Nützliches Vokabular und nützliche Konzepte -- Paketierung Ihres Codes -- Conda -- PyPI -- Einfrieren Ihres Codes -- PyInstaller -- cx_Freeze -- py2app -- py2exe -- bbFreeze -- Paketierung für Linux-Built-Distributionen -- Ausführbare ZIP-Dateien -- Teil 3: Szenario-Guide -- Kapitel 7: Nutzerinteraktion -- Jupyter Notebooks -- Kommandozeilenanwendungen -- argparse -- docopt -- Plac -- Click -- Clint -- cliff -- GUI-Anwendungen -- Widget-Bibliotheken -- Spieleentwicklung -- Webanwendungen -- Web-Frameworks/Mikroframeworks -- Web-Template-Engines -- Web-Deployment -- Kapitel 8: Codemanagement und -optimierung -- Continuous Integration -- Tox -- Systemadministration -- Travis-CI -- Jenkins -- Buildbot -- Serverautomatisierung -- System- und Task-Überwachung -- Geschwindigkeit -- Threading -- Multiprocessing -- Subprozesse -- PyPy -- Cython -- Numba -- GPU-Bibliotheken -- Interfacing mit C-/C++-/FORTRAN-Bibliotheken -- Kapitel 9: Software-Interfaces -- Webclients -- Web-APIs -- Datenserialisierung -- Pickle -- Sprachübergreifende Serialisierung -- Komprimierung -- Das buffer-Protokoll -- Verteilte Systeme -- Vernetzung -- Kryptografie -- ssl, hashlib und secrets -- pyOpenSSL -- PyNaCl und libnacl -- Cryptography…”
Libro electrónico -
3187Publicado 1980Tabla de Contenidos: “…Part one: From Yenan to Peking (1942-1955): Mao Tse-Tung ; Mao Tun ; Ting Ling ; Hu Feng ; Yang Shuo ; Li Chun ; Ai Wu ; Chun Ch'ing ; Liu Pai-Yu ; Fei Li-Wen ; Wang Yuan-Chien ; Ho Ch'iu ; Ts'ui Pa-Wa ; Chang Yung-Mei ; Hus Ch'ih ; Li Chi ; Liang Shang-Ch'uan ; T'ien Chien ; Shih Fang-Yu -- Part two: The Hundred Flowers Movement and the Anti-Rightist Campaign (1956-1958): Hsiao Chun ; Ch'in Chao-Yang ; Liu Pin-Yen ; Wang Meng ; Chou Li-Po ; Ju Chih-Chuan ; Chou Erh-Fu ; Fang Chi ; Liang Pin ; Tu P'eng-Ch'eng ; Yang Mo ; K'ang Cho ; Ai Ch'ing ; Feng Chih ; Ho Ching-Chih ; Li Chi ; Li Ying ; Mao Tse-Tung ; Pien Chih-Lin ; Tsang K'o-Chia ; Tsou Ti-Fan -- Part three: The Great Leap Forward and anti-revisionism (1959-1961): Yueh Yeh ; Sun Ch'ien ; Chou Yang ; Liu Ch'ing ; Chao Hsun ; Wang Wen-Shih ; Chao Shu-Li ; T'ang K'o-Hsin ; Sha Ting ; Chang Yung-Mei ; Chao P'u-Ch'u ; Ch'en Yi ; Ho Ch'i-Fang ; Ho Ching-Chih ; Hsiao San ; Hsieh Ch'i-Kuei ; Kuo Hsiao-Ch'uan ; Li Chi ; Li Ying ; Liang Shang-Ch'uan ; Sha Pai ; Wen Chieh ; Yen Chen -- Part four: The socialist education of the people (1962-1964): Ma Feng ; Ou-Yang Shan ; Liu Chen ; Li Ying-Ju ; Hu Wan-Ch'un ; Ch'en Yun, Chang Li-Hui ; Hsu Ching-Hsien ; Shao Ch'uan-Lin ; Chang Chih-Min ; Chang Yung-Mei ; Chao P'u-Ch'u ; Ch'en Yi ; Ho Ch'i-Fang ; Ho Ching-Chih ; Hsiao San ; Joa Meng-K'an ; Juan Chang-Ching ; Ko Pi-Chou ; Kuo Hsiao-Ch'uan ; Kuo Mo-Jo ; Li Ying ; Liang Shang-Ch'uan ; Liu Cheng ; T'ai Teh-Ch'ien ; T'ang Ta-T'ung ; T'ien Chien ; Tsang K'o-Chi ; Yen Yi ; Chang Wan-Shu ; Cheng Ch'eng-Yi ; Chi P'eng ; Chiang Jih ; Ko Fei ; Kung Hsi ; Li Chia-Hsun ; Lu Ch'i ; Ning Yu ; Shhih Wen-Hsiung ; Shih Ying ; Wang Shih-Hsiang ; Lutpulla Matallep ; K'e-Li-Mu Huo-Chia ; Wang Ch'eng-Tung ; Rabchai Tsazang ; Chang Ch'ang ; Chiang P'ing, Huang Shou-Ch'ang ; Tseng Chi-Neng ; Liu Hsueh-Chung ; Ku Liu ; Chia Ch'i-Feng -- Part five: The great proletarian cultural revolution (1964-1970): Lao She ; Teng T'o ; T'ien Han ; Hsia Yen ; Revolutionary Peking Opera ; Yang Han-Sheng ; Lu Yang-Lieh ; Wang Chia-Pin ; Ho Ching-Chih ; Mao Tse-Tung ; Ch'iu Yen ; Shen Jen-K'ang ; Wei Chih -- Part six: The aftermath: The fall of the Gang of Four--Returns and reversals (1971- ): Wei Wei ; Hao Jan ; Ma Chi and T'ang Chieh-Chung ; Yang Hsing-Wang ; Yao Hsueh-Yin ; Malchinhu ; The dissenting voice ; Ai Ch'ing ; Chen Yang ; Ch'en Kuan-Hsuan ; Feng Ching-Yuan ; Ho Ch'i-Fang ; Hsu Yu and Huo Hua ; Kuo Hsiao-Ch'uan ; Kuo Mo-Jo ; Li Ying ; Pa Shan ; Ping Hsin ; Shen Yung-Ch'ang…”
Libro electrónico -
3188Publicado 1979Tabla de Contenidos: “…. -- 108: Peti-Ph. -- 109: Pi-Pn. -- 110: Po-Pou. -- 111: Pov-Pr. -- 112: Ps-Raf. -- 113: Rag-Ray. -- 114: Raz-Reh. -- 115: Rei-Reini. -- 116: Reink-Reus. -- 117: Reut-Rie. -- 118: Rif-Rok. -- 119: Rol-Ros. -- 120: Rot-Rum. -- 121: Run-Sali. -- 122: Salk-Sam. -- 123: San-Schaf. -- 124: Schag-Schel. -- 125: Schem-Schil. -- 126: Schim-Schl. -- 127: Schm-Schmid. -- 128: Schmie-Schom. -- 129: Schon-Schril. -- 130: Schrim-Schult. -- 131: Schulu-Schv. -- 132: Schw-Sed. -- 133: See-Seo. -- 134: Sep-Sik. -- 135: Sil-Soc. -- 136: Sod-Spau. -- 137: Spav-Sr. -- 138: Ss-Stau. -- 139: Stav-Ster. -- 140: Stes-Stos. -- 141: Stot-Stuc. -- 142: Stud-Sv. -- 143: Sw-Tar. -- 144: Tas-That. -- 145: Thau-Tid. -- 146: Tie-Tref. -- 147: Treg-Tz. -- 148: U-Um. -- 149: Un-Uz. -- 150: V-Vero. -- 151: Verp-Voir. -- 152: Vois-Vor. -- 153: Vos-Wape. -- 154: Wapf-Weim. -- 155: Wein-Wer. -- 156: Wes-Wilk. -- 157: Will-Wok. -- 158: Wol-Wz. -- 159: X-Zei. -- 160: Zek-Zz. -- Nachträge…”
Libro -
3189Publicado 2024Tabla de Contenidos: “…Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning -- Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations -- Model hijacking -- Trojan horse code injection -- Model reprogramming -- Summary -- Chapter 6: Supply Chain Attacks and Adversarial AI -- Traditional supply chain risks and AI -- Risks from outdated and vulnerable components -- Risks from AI's dependency on live data -- Securing AI from vulnerable components -- Enhanced security - allow approved-only packages -- Client configuration for private PyPI repositories -- Additional private PyPI security -- Use of SBOMs -- AI supply chain risks -- The double-edged sword of transfer learning -- Model poisoning -- Model tampering -- Secure model provenance and governance for pre-trained models -- MLOps and private model repositories -- Data poisoning -- Using data poisoning to affect sentiment analysis -- Defenses and mitigations -- AI/ML SBOMs -- Summary…”
Libro electrónico -
3190por Bourdaloue, Louis, 1632-1704Accés lliure (v. 4)
Publicado 1796
Accés lliure (v. 7)
Accés lliure (v. 11)
991005499599706719 -
3191
-
3192
-
3193por Vielhauer, Philipp, 1914- aut
Publicado 1991Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Universidad de Navarra, Red de bibliotecas Iglesia Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Diocesana Bilbao, Biblioteca Diocesana de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca IEBA Jerusalén, Bibliotecas de la Diócesis de Teruel y Albarracín, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Central de Capuchinos de España)Libro -
3194Publicado 2013Tabla de Contenidos: “…Chapter 7: Calculated Fields, Table Calculations, and Statistics -- Creating Calculated Fields -- Numeric Calculations -- String Manipulation -- Date Calculations -- Logic Constructs -- Creating Binned Fields -- Table Calculations -- Reference Lines, Bands, and Distribution -- Single Reference Line -- Reference Band -- Reference Distribution -- Trend Lines -- Chapter 8: Creating Dashboards -- Creating a Simple Dashboard -- Tiled Placement -- Floating Placement -- Associated Dashboard Elements -- Advanced Dashboard Elements -- Layout Container -- Blank -- Text -- Image -- Web Page -- Setting Dashboard and Element Sizes -- Dashboard Actions -- Highlight Action -- Filter Action -- URL Action -- Chapter 9: Distributing and Sharing Your Visualizations -- Exporting Worksheets and Dashboards -- Printing to PDF Format -- Exporting Worksheet Data -- Exporting Worksheet Images -- Exporting Dashboard Images -- Using Tableau Reader -- Publishing to the Web -- Sharing on Tableau Public -- Publishing to Tableau Server and Tableau Online -- Using Tableau with iPad, Android, and Other Smartphones and Tablets -- Appendix: Function Reference -- Number Functions -- ABS -- ACOS -- ASIN -- ATAN -- ATAN2 -- COS -- COT -- DEGREES -- EXP -- LN -- LOG -- MAX -- MIN -- PI -- POWER -- RADIANS -- ROUND -- SIGN -- SIN -- SQRT -- SQUARE -- TAN -- ZN -- String Functions -- ASCII -- CHAR -- CONTAINS -- ENDSWITH -- FIND -- ISDATE -- LEFT -- LEN -- LOWER -- LTRIM -- MAX -- MID -- MIN -- RIGHT -- RTRIM -- SPACE -- STARTSWITH -- TRIM -- UPPER -- Date Functions -- DATEADD -- DATEDIFF -- DATENAME -- DATEPART -- DATETRUNC -- DAY -- ISDATE -- MAX -- MIN -- MONTH -- NOW -- TODAY -- YEAR -- Type Conversion Functions -- DATE -- DATETIME -- FLOAT -- INT -- STR -- Logical Functions -- CASE -- IF -- IFNULL -- IIF -- ISDATE -- ISNULL -- ZN -- Aggregate Functions -- ATTR -- AVG -- COUNT -- COUNTD…”
Libro electrónico -
3195Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Getting Started with the BBC Micro:bit -- Chapter 1: Introduction to the BBC Micro:bit -- Technical requirements -- The history of the Micro:bit -- The specifications of Micro:bit V1 and Micro:bit V2 -- Powering up the Micro:bit -- The out-of-box experience -- Breakout boards -- Fritzing to create circuit diagrams -- Summary -- Further reading -- Chapter 2: Setting Up the Micro:bit and Using Code Editors -- Technical requirements -- BBC Micro:bit versus Raspberry Pi -- The Python programming language -- Python implementations and distributions -- Introduction to MicroPython -- MicroPython code editors -- Online code editors -- Using REPL -- Using offline IDEs for MicroPython -- The Thonny Python IDE -- The Mu editor -- Working with other editors and smartphone apps -- Manually upgrading the firmware -- Restoring the out-of-the-box experience program -- Summary -- Further readings -- Chapter 3: Basics of Python -- Technical requirements -- Getting started with Python programming -- Variables -- Code comments -- Arithmetic, string, and logical operations -- Data type conversion -- Handling user input -- Conditional statements -- Loops -- Computing prime numbers, factorials, and Fibonacci series -- Summary -- Further reading -- Chapter 4: Advanced Python -- Technical requirements -- Lists, tuples, and dictionaries -- Functions -- Recursion -- Indirect recursion -- Object-oriented programming with Python -- Exploring the random module -- Getting help for built-in modules -- Retrieving system properties with code -- Summary -- Further reading -- Part 2: Programming Hardware with MicroPython -- Chapter 5: Built-in LED Matrix Display and Push Buttons -- Technical requirements -- Built-in programmable 5x5 LED matrix…”
Libro electrónico -
3196Publicado 2021Tabla de Contenidos: “…Saving scraped data to a CSV file -- Chapter 4 Libraries, Packages, and Modules -- Understanding the Python Standard Library -- Using the dir() function -- Using the help() function -- Exploring built-in functions -- Exploring Python Packages -- Importing Python Modules -- Making Your Own Modules -- Book 4 Using Artificial Intelligence -- Chapter 1 Exploring Artificial Intelligence -- AI Is a Collection of Techniques -- Neural networks -- Machine learning -- TensorFlow - A framework for deep learning -- Current Limitations of AI -- Chapter 2 Building a Neural Network -- Understanding Neural Networks -- Layers of neurons -- Weights and biases -- The activation function -- Loss function -- Building a Simple Neural Network in Python -- The neural-net Python code -- Using TensorFlow for the same neural network -- Installing the TensorFlow Python library -- Building a Python Neural Network in TensorFlow -- Loading your data -- Defining your neural-network model and layers -- Compiling your model -- Fitting and training your model -- Evaluating the model -- Breaking down the code -- Checking the results -- Changing to a three-layer neural network in TensorFlow and Keras -- Chapter 3 Doing Machine Learning -- Learning by Looking for Solutions in All the Wrong Places -- Creating a Machine-Learning Network for Detecting Clothes Types -- Setting up the software environment -- Getting the data from the Fashion-MNIST dataset -- Training the network -- Testing our network -- Breaking down the code -- Results of the training and evaluation -- Testing a single test image -- Testing on external pictures -- The results, round 1 -- The CNN model code -- The results, round 2 -- Visualizing with MatPlotLib -- Learning More Machine Learning -- Chapter 4 Exploring AI -- Limitations of the Raspberry Pi and AI -- Adding Hardware AI to the Raspberry Pi -- AI in the Cloud…”
Libro electrónico -
3197por Bayley, EdgarTabla de Contenidos: “…. -- ESTADO DE SITUACIÓN -- UN POCO DE SENSATEZ -- POEMAS NO EDITADOS POR EL AUTOR -- ÚNICOS -- CON RAÍCES -- LA HISTORIA DE LA LIBRETA DE DIRECCIONES -- CREO EN MI PAÍS -- EL BUEN CIUDADANO -- RECONSTRUYO LA IMAGEN DE UN SER ADORABLE -- EN EL PRIMER DÍA DEL AÑO 1983 PARA CHICHITA Y SU GENTE -- LA VICTORIA -- NADIE -- ES UNA CAJA PEQUEÑA -- ME HE PASADO -- DE VIDA Y MEMORIA DEL DOCTOR PI Y OTRAS HISTORIAS (1983) -- LA ENCANTADORA -- EL MENSAJE -- DE LA POESÍA -- EL REGRESO -- UNA SEÑORA ANCIANA VIAJA EN ÓMNIBUS -- DON ASCANIO Y SU TROMPETA O LA CABAÑA DE MADARIAGA -- LA VECINA -- LA MOROCHA Y EL MILAGRO DE LA AMPOLLETA -- LA CASCADA Y LA LINGÜISTA -- EL VALS -- UN DESENCUENTRO -- EL ENANO, LOS VAMPIROS Y LA MUELA DE ORO O EL ÚLTIMO REINO -- HACIA EL RÍO -- LA LLEGADA -- EL PERFECTO PESCADOR DE CAÑA -- EL SEÑOR ROUX -- EL POETA POLÍTICO -- MILAGROS DE LA POBREZA -- VALERIO…”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3198Publicado 2018Tabla de Contenidos: “…Dynamic programming -- Value iteration -- Policy iteration -- Solving the frozen lake problem -- Value iteration -- Policy iteration -- Summary -- Questions -- Further reading -- Chapter 4: Gaming with Monte Carlo Methods -- Monte Carlo methods -- Estimating the value of pi using Monte Carlo -- Monte Carlo prediction -- First visit Monte Carlo -- Every visit Monte Carlo -- Let's play Blackjack with Monte Carlo -- Monte Carlo control -- Monte Carlo exploration starts -- On-policy Monte Carlo control -- Off-policy Monte Carlo control -- Summary -- Questions -- Further reading -- Chapter 5: Temporal Difference Learning -- TD learning -- TD prediction -- TD control -- Q learning -- Solving the taxi problem using Q learning -- SARSA -- Solving the taxi problem using SARSA -- The difference between Q learning and SARSA -- Summary -- Questions -- Further reading -- Chapter 6: Multi-Armed Bandit Problem -- The MAB problem -- The epsilon-greedy policy -- The softmax exploration algorithm -- The upper confidence bound algorithm -- The Thompson sampling algorithm -- Applications of MAB -- Identifying the right advertisement banner using MAB -- Contextual bandits -- Summary -- Questions -- Further reading -- Chapter 7: Deep Learning Fundamentals -- Artificial neurons -- ANNs -- Input layer -- Hidden layer -- Output layer -- Activation functions -- Deep diving into ANN -- Gradient descent -- Neural networks in TensorFlow -- RNN -- Backpropagation through time -- Long Short-Term Memory RNN -- Generating song lyrics using LSTM RNN -- Convolutional neural networks -- Convolutional layer -- Pooling layer -- Fully connected layer -- CNN architecture -- Classifying fashion products using CNN -- Summary -- Questions -- Further reading -- Chapter 8: Atari Games with Deep Q Network -- What is a Deep Q Network? …”
Libro electrónico -
3199Publicado 2018Tabla de Contenidos: “…-- Subsumption architecture -- Software setup -- Laptop preparation -- Installing Python -- Installing ROS on the laptop -- Setup of Raspberry Pi 3 -- VNC -- Setting up catkin workspaces -- Hardware -- Beginning at the beginning - knolling -- Assembling the tracks -- Mounting the tracks -- Arm base assembly (turntable) -- Arm assembly -- Wiring -- Summary -- Questions -- Further reading -- Chapter 3: A Concept for a Practical Robot Design Process -- A systems engineering-based approach to robotics -- Our task - cleaning up the playroom -- Use cases -- The problem - part 1 -- Who - the robot -- What - pick up toys and put them in the toy box -- What - pick up and put away in the toy box the items that were not previously in the room -- When - after the grandchildren have visited and they have left, continue to pick up toys until there are none left…”
Libro electrónico -
3200por Peterson, Steven P.Tabla de Contenidos: “…Machine generated contents note: Preface Acknowledgments Chapter 1: Discount Rates and Returns Estimating Returns Geometric and Arithmetic Averages Caveats to Return Extrapolation Discounting Present Values of Cash Flow Streams Internal Rate of Return and Yield to Maturity Real and Nominal Returns Summary Chapter 2: Fixed Income Securities Coupon Bearing Bonds Infinite Cash Flow Streams (Perpetuities) General Pricing Formulas for Finite Cash Flow Streams Interest Rate Risk Analysis of Duration Interest Rate Risk Dynamics Immunization and Duration Applications - Liability Discounting and Cash Matching Pension Logic Risky Coupons Inflation Risk and TIPS A Bond Portfolio Strategy (Optional) Summary Appendix 2.1: Solving Infinite and Finite Power Series References Chapter 3: Term Structure Discounting Using Spot Rates Forward Rates NPV revisited Short Rates The Bootstrap Method Duration Redux Summary Chapter 4: Equity The Determination of Stock Prices Discount Rates Redux Price and Dividend Multiples Extrapolating Multiples to Forecast Returns Pitfalls of Trend Analysis The Gordon Growth Model Sources of Return Summary References Chapter 5: Portfolio Construction Stochastic Returns and Risk Diversification The Efficient Frontier Markowitz Portfolio Selection Criteria Capital Market Line and the CAPM Performance Evaluation Summary Appendix 5.1: Statistical Review Appendix 5.2: Risk Adjusted Performance References Chapter 6: Optimal Portfolios Portfolio 1: Minimum Variance Portfolio (Fully Invested) Portfolio 2: Minimum Variance Portfolios with Targeted Return Portfolio 3: Minimum Variance Portfolios with No Short Sales Portfolio 4: Minimum Variance Portfolios with Capped Allocations Portfolio 5: Maximum Risk-Adjusted Return Performance Attribution The Efficient Frontier (Again) Summary Appendix 6.1: Matrix Operations Chapter 7: Data and Applications Analyzing Returns on a Ten Asset Portfolio Performance Attribution Changing the Investment Horizon Benchmarking to the Market Portfolio The Cost of Constraints A Bond Strategy Summary Chapter 8: Anomalies Deviations from the CAPM Behavioral Finance Summary References Chapter 9: Factor Models Arbitrage Pricing Theory (APT) Factor Selection Model Estimation Principal Components Applications and Examples Summary References Chapter 10: Active Portfolio Management Active Portfolio Construction and Attribution Analysis Performance Attribution Summary Appendix 10.1: Active Space Chapter 11: Risk The Failure of VaR Taxonomy of Risk Visualizing Risk Estimating Volatilities Maximum Likelihood Estimation (Optional) Credit Risk Adjusting for Leverage Adjusting for Illiquidity Other Risks Summary References Chapter 12: Monte Carlo Methods Example 1: Generating Random Numbers - Estimating pi Example 2: Confirming the Central Limit Theorem Example 3: Credit Default Risk Non-Normal Distributions The Gaussian Copula Summary References Chapter 13: Systemic Risk Extreme Value Theory Estimating the Hazards of Downside Risks A Systemic Risk Indicator Summary References Chapter 14: Incorporating Subjective Views Methodological Concepts An Example using Black-Litterman Active Space Risk Attribution Summary References Chapter 15: Futures, Forwards, and Swaps Institutional Detail and Futures Mechanics The Relationship between Spot Prices and Forward (Futures) Prices Hedging Basis Risk Hedging Portfolio Risk Futures Pricing Swaps Summary References Chapter 16: Introduction to Options Option Payoffs and Put-Call Parity Pricing European Call Options Pricing European Put Options Option Strategies Real Options Summary References Chapter 17: Models of Stock Price Dynamics Stock Price Dynamics Ito Processes Lognormal Stock Prices Deriving the Parameters of the Binomial Lattice Black-Scholes-Merton Model The Greek Letters Monte Carlo Methods Summary Appendix 17.1: Derivation of Ito's Lemma Chapter 18: Hedging Portfolio Risk Simple Hedging Strategies S&P 500 Index Puts Selling Volatility VIX Calls Liability Driven Investment Summary References Chapter 19: Private Equity The Private Equity Model Return and Risk Methodology Summary Appendix 19.1: CAPM References Chapter 20: Structured Credit Securitization Credit Enhancement Basics of Pricing Interest Rate Derivatives Interest Rate Dynamics CDO Valuation The Crash of the Housing Bubble Summary References Chapter 21: Optimal Rebalancing Trigger Strategies and No-trade Regions An Optimal Control Problem Implications Optimal Rebalancing in a Static Optimization Model The Comparative Statics of Transactions Costs References Chapter 22: Data Problems* Covariance Estimation An Example Empirical Results Overlapping Observations Conclusions Appendix 22.1: Covariance Matrix Estimation Removing the effects of smoothing References About the Author Index…”
Publicado 2012
Libro electrónico