Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Statistics 667
- Economic conditions 625
- Estadística 602
- Data processing 480
- Economic policy 420
- Statistical methods 387
- Estadística matemática 353
- Mathematical statistics 286
- Economics 263
- Mathematics 262
- Matemáticas 260
- Data mining 235
- Machine learning 234
- Mental illness 233
- Python (Computer program language) 230
- R (Computer program language) 215
- Diagnosis 210
- Métodos estadísticos 208
- Artificial intelligence 170
- Probabilidades y estadística 169
- Research 164
- Business & Economics 162
- Finance 160
- Computer programs 159
- Database management 147
- Mathematical models 142
- Diagnostic and statistical manual of mental disorders 141
- Probabilidades 136
- Management 132
- Economic development 130
-
11941Publicado 2015Tabla de Contenidos: “…2.2 Asymmetrical Current 2.2.1 General Terms; 2.2.2 DC Time Constant; 2.2.3 Asymmetrical Current in Three-Phase Systems; 2.3 Short-Circuit Current Impact on System and Components; 2.4 Fault Statistics; 2.4.1 Occurrence and Nature of Short-Circuits; 2.4.2 Magnitude of Short-Circuit Current; References; 3 Fault-Current Breaking and Making; 3.1 Introduction; 3.2 Fault-Current Interruption; 3.3 Terminal Faults; 3.3.1 Introduction; 3.3.2 Three-Phase Current Interruption; 3.4 Transformer-Limited Faults; 3.4.1 Transformer Modelling for TRV Calculation; 3.4.2 External Capacitances…”
Libro electrónico -
11942Publicado 2015Tabla de Contenidos: “…Chapter 6: Multiple-View Distance Metric6.1 Introduction; 6.2 Fundamental Many-to-Many Distance Measures; 6.3 Bipartite Graph Matching; 6.3.1 View Selection and Weighting; 6.3.2 Bipartite Graph Construction; 6.3.3 Bipartite Graph Matching; 6.4 Statistical Matching; 6.4.1 Adaptive View Clustering; 6.4.2 CCFV; 6.4.2.1 View Clustering and Query Model Training; 6.4.2.2 Positive and Negative Matching Models; 6.4.2.3 Calculation of the Similarity Between Q and O S(Q,O); 6.4.2.4 Analysis of Computational Cost; 6.4.3 Markov Chain; 6.4.4 Gaussian Mixture Model Formulation…”
Libro electrónico -
11943Publicado 2017Tabla de Contenidos: “…Gomes and Ernesto P. Raposo Le ́vy Statistics and the Glassy Behavior of Light in Random Fiber Lasers Reprinted from: Appl. …”
Libro electrónico -
11944por Schavemaker, PieterTabla de Contenidos: “…6.2.4 DC Loadflow6.3 Optimal Powerflow; 6.4 State Estimator; 6.4.1 General Scheme of the State Estimator; 6.4.2 Bad Data Analysis; 6.4.3 Statistical Analysis of the State Estimator; 7 Electricity Markets; 7.1 Introduction; 7.2 Electricity Market Structure; 7.3 Market Clearing; 7.4 Social Welfare; 7.5 Market Coupling; 8 Future Power Systems; 8.1 Introduction; 8.2 Renewable Energy; 8.3 Decentralized or Distributed Generation; 8.4 Power-electronic Interfaces; 8.5 Energy Storage; 8.6 Blackouts and Chaotic Phenomena; 8.6.1 Nonlinear Phenomena and Chaos; 8.6.2 Blackouts; A Maxwells Laws…”
Publicado 2008
Libro electrónico -
11945Publicado 2024Tabla de Contenidos: “…Power Pivot and Data Models -- DAX -- Summary -- Chapter 6: Must-Know Legacy Excel Functions -- Math and statistical functions -- SUM -- SUMIFS -- COUNT -- COUNTIFS -- MIN -- MAX -- AVERAGE -- Logical functions -- IF -- IFS -- IFERROR -- SWITCH -- OR -- AND -- Text manipulation functions -- LEFT -- MID -- RIGHT -- SEARCH -- SUBSTITUTE -- TEXT -- LEN -- Date manipulation functions -- TODAY -- DATE -- YEAR -- MONTH -- DAY -- EDATE -- EOMONTH -- WEEKNUM -- Lookup and reference functions -- VLOOKUP -- HLOOKUP -- INDEX -- MATCH -- OFFSET -- INDIRECT -- CHOOSE -- Summary -- Chapter 7: Dynamic Array Functions and Lambda Functions -- Dynamic array functions -- UNIQUE -- FILTER -- SEQUENCE -- SORT -- SORTBY -- Lambda functions -- LAMBDA -- BYCOL -- BYROW -- MAKEARRAY -- MAP -- REDUCE -- SCAN -- Summary -- Part 3 - Getting the Visualization Right -- Chapter 8: Getting Comfortable with the 19 Excel Charts -- Column chart -- Bar chart -- Line chart -- Area chart -- Pie chart -- Doughnut chart -- XY (scatter) chart -- Bubble chart -- Stock chart -- Surface chart -- Radar chart -- Treemap chart -- Sunburst chart -- Histogram chart -- Box and whisker chart -- Waterfall chart -- Funnel chart -- Filled map chart -- Combo chart -- Summary -- Chapter 9: Non-Chart Visuals -- Conditional formatting -- Highlight Cells Rules -- Top/Bottom Rules -- Data bars -- Color scales -- Icon sets -- Custom formula conditional formatting -- Shapes -- SmartArt -- Sparkline -- Images -- Symbols -- Summary -- Chapter 10: Setting Up the Dashboard's Data Model -- Adventure Works Cycle Limited -- HR schema -- Sales schema -- Purchasing schema -- Production schema -- Person schema -- Building business-relevant dashboards -- Data transformation in Power Query -- Summary -- Chapter 11: Perfecting the Dashboard -- Building the HR manpower dashboard -- Inserting PivotTables…”
Libro electrónico -
11946Publicado 2023Tabla de Contenidos: “…Payload-based approaches -- 3.3.3. Statistic-based approaches -- 3.3.4. DL-based approaches -- 3.4. …”
Libro electrónico -
11947Publicado 2022Tabla de Contenidos: “…Conclusion -- References -- Chapter 4 Written school language registers at the transition -- Introduction -- The corpus -- Analytical steps -- Statistical analysis -- Multi-dimensional analysis of school language registers -- Dimension 1: Involved versus informational discourse -- Dimension 2: Narrative versus non-narrative discourse -- Dimension 3: Explicit versus situation-dependent discourse -- Dimension 4: Overt expression of persuasion -- Dimension 5: Impersonal versus non-impersonal style -- Discussion -- Conclusion -- References -- Chapter 5 The language of English at the transition -- Introduction -- The KS2 and KS3 curricula -- Assessment -- Reading in Years 5-8 -- Reading for pleasure -- Making inferences -- Understanding genre, purpose and audience -- criticality -- Writing in Years 5-8 -- Understanding genre, purpose and audience -- Language and metalanguage in Years 5-8 -- Vocabulary -- Grammar teaching -- Corpus studies of the language of English in Years 5-8 -- Method -- The corpora used -- Frequent word analysis -- Keyword analysis -- Results -- Word frequency: Aboutness -- Keywords -- Conclusion -- Note -- References -- Chapter 6 The language of science at the transition -- Introduction -- The KS2 and KS3 curricula -- Language and learning science at school -- Scientific thinking and the language of science -- School science, language and socio-economic status -- Features of the language of school science -- Discourse -- Grammar -- Vocabulary -- Polysemy -- Method -- The corpora -- Focus and tools -- Results -- Keywords -- Frequent words -- Aboutness and general science words -- Polysemy -- Group 1: Contextual differences -- Group 2: Fine-grained differences in use -- Group 3: Meaning differences -- Group 4: Lexico-grammatical differences -- Group 5: Frequency differences -- Metaphorical uses -- Discussion and conclusion…”
Libro electrónico -
11948Publicado 2011Tabla de Contenidos: “…132 -- 4.10 Review Questions and Problems 136 -- 4.11 References for Further Study 138 -- 5 STATISTICAL METHODS 140 -- 5.1 Statistical Inference 141 -- 5.2 Assessing Differences in Data Sets 143 -- 5.3 Bayesian Inference 146 -- 5.4 Predictive Regression 149 -- 5.5 ANOVA 155 -- 5.6 Logistic Regression 157 -- 5.7 Log-Linear Models 158 -- 5.8 LDA 162 -- 5.9 Review Questions and Problems 164 -- 5.10 References for Further Study 167 -- 6 DECISION TREES AND DECISION RULES 169 -- 6.1 Decision Trees 171 -- 6.2 C4.5 Algorithm: Generating a Decision Tree 173 -- 6.3 Unknown Attribute Values 180 -- 6.4 Pruning Decision Trees 184.…”
Libro electrónico -
11949Publicado 2017Tabla de Contenidos: “…Threads in Java -- Threads in Java - characteristics and states -- The Thread class and the Runnable interface -- First example: matrix multiplication -- Common classes -- Serial version -- Parallel versions -- First concurrent version - a thread per element -- Second concurrent version - a thread per row -- Third concurrent version - the number of threads is determined by the processors -- Comparing the solutions -- Second example - file search -- Common classes -- Serial version -- Concurrent version -- Comparing the solutions -- Summary -- Chapter 3: Managing Lots of Threads - Executors -- An introduction to executors -- Basic characteristics of executors -- Basic components of the Executor framework -- First example - the k-nearest neighbors algorithm -- k-nearest neighbors - serial version -- K-nearest neighbors - a fine-grained concurrent version -- k-nearest neighbors - a coarse-grained concurrent version -- Comparing the solutions -- Second example - concurrency in a client/server environment -- Client/server - serial version -- The DAO part -- The command part -- The server part -- Client/version - parallel version -- The server part -- The command part -- Extra components of the concurrent server -- The status command -- The cache system -- The log system -- Comparing the two solutions -- Other methods of interest -- Summary -- Chapter 4: Getting the Most from Executors -- Advanced characteristics of executors -- Cancellation of tasks -- Scheduling the execution of tasks -- Overriding the executor methods -- Changing some initialization parameters -- First example - an advanced server application -- The ServerExecutor class -- The statistics object -- The rejected task controller -- The executor tasks -- The executor -- The command classes -- The ConcurrentCommand class -- The concrete commands -- The server part…”
Libro electrónico -
11950Publicado 2019Tabla de Contenidos: “…The revolt against mathematical statistics -- I.2. EDA and unsupervised methods for dimension reduction -- I.2.1. …”
Libro electrónico -
11951Publicado 2014Tabla de Contenidos: “…-- Types of Analysis -- Statistical Analysis -- Classification Analysis -- Deviation Analysis -- Trend Analysis -- Aging Analysis -- Fundamentals of Analysis -- An Analysis Workflow -- Core Examples Used in This Chapter -- Description of the Analysis Tools Available -- Turning a Tool On and Off -- The Analysis Toolbar Buttons -- Totals Area -- Crosstabs Are Great to Analyze -- Percentage Area -- Operators Area -- Conditions Area -- Finding Exceptions Using Formatting -- How to Build the Example Queries -- Statistical Analysis -- Classification Analysis -- Deviation Analysis -- Trend Analysis -- Aging Analysis -- Overcoming the Manager Who Is Wary of Your Analysis -- Summary -- Chapter 10: Using Discoverer Viewer to See Your Data -- Why Use Viewer? …”
Libro electrónico -
11952Publicado 2018Tabla de Contenidos: “…. -- Using time series data points with a scatter chart -- See also -- Creating an area chart of the application's functional statistics -- Getting ready -- How to do it... -- How it works... -- See also -- Using metrics data and a trellis layout to monitor physical environment operating conditions -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
11953por Sreenivasan, N. S.Tabla de Contenidos: “…Chapter 14: Organising for Continual Improvement -- Scope -- The big picture of continual improvement -- Strategy plan -- Statistical techniques-understanding their importance -- Improvement: macro-micro -- Micro-category -- Guidelines to project selection -- Authors' observation on learning programmes -- Conclusion -- Chapter 15: Anchor Points of the Continual Improvement Thought Process -- Background -- Anchor points -- Questioning -- Critical thinking -- Check and verify: data orientation and data dependency -- Driving out the negatives -- Be a part of the solution, not the problem -- Conflict: confront and resolve -- not sweep under carpet -- Seek opportunities for improvement -- Zero-based thinking -- Picturise the problem in all its details -- Comfort zone: disturb -- Out-of-box thinking -- Correction and corrective action -- Root cause -- Institutionalise the learning -- Horizontal deployment -- Consensus -- Fallacies to be avoided -- Headache-headache-pill fallacy -- Challenge oneself -- Factors of 'appeal and feel good'-have a re-look -- Conclusion -- Annexure 15A -- Annexure 15B -- Annexure 15C -- Chapter 16: Involvement of People in Continual Improvement Process -- Background -- Productivity -- Organising an enterprise -- Fading style -- New style -- Role of knowledge worker -- Continual improvement and productivity in an organisation -- Distinct features of a people-friendly environment -- Inner democracy -- Learning environment -- Education and training -- Decentralisation -- Customer and competitor orientation -- Value addition -- Blind spots to avoid -- CEO's concern/task -- Reality check: involvement -- Impact of continual improvement -- Conclusion -- Annexure 16A -- Annexure 16B -- Annexure 16C -- Annexure 16D -- Annexure 16E -- Annexure 16F -- Annexure 16G -- Annexure 16H…”
Publicado 2007
Libro electrónico -
11954Publicado 2024Tabla de Contenidos: “…Benchmarking with timeit -- Working with the memory profiler -- Running in Parallel on Multiple Cores -- Performing multicore parallelism -- Demonstrating multiprocessing -- Chapter 13 Exploring Data Analysis -- The EDA Approach -- Defining Descriptive Statistics for Numeric Data -- Measuring central tendency -- Measuring variance and range -- Working with percentiles -- Defining measures of normality -- Counting for Categorical Data -- Understanding frequencies -- Creating contingency tables -- Creating Applied Visualization for EDA -- Inspecting boxplots -- Performing t-tests after boxplots -- Observing parallel coordinates -- Graphing distributions -- Plotting scatterplots -- Understanding Correlation -- Using covariance and correlation -- Using nonparametric correlation -- Considering chi-square for tables -- Working with Cramér's V -- Modifying Data Distributions -- Using different statistical distributions -- Creating a Z-score standardization -- Transforming other notable distributions -- Chapter 14 Reducing Dimensionality -- Understanding SVD -- Looking for dimensionality reduction -- Using SVD to measure the invisible -- Performing Factor Analysis and PCA -- Considering the psychometric model -- Looking for hidden factors -- Using components, not factors -- Achieving dimensionality reduction -- Squeezing information with t-SNE -- Understanding Some Applications -- Recognizing faces with PCA -- Extracting topics with NMF -- Recommending movies -- Chapter 15 Clustering -- Clustering with K-means -- Understanding centroid-based algorithms -- Creating an example with image data -- Looking for optimal solutions -- Clustering big data -- Performing Hierarchical Clustering -- Using a hierarchical cluster solution -- Visualizing aggregative clustering solutions -- Discovering New Groups with DBScan -- Chapter 16 Detecting Outliers in Data…”
Libro electrónico -
11955Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
11956Publicado 2002Tabla de Contenidos: “…Alpes Vaudoises: a statistical analysis of tourism in the light of cultural factors / Miriam Scaglione. …”
Libro electrónico -
11957Publicado 2006Tabla de Contenidos: “…5.2.3 Algorithm A*5.3 Realizing the Movement; 5.4 Summary; Exercises; 6 Decision-making; 6.1 Background; 6.1.1 Levels of decision-making; 6.1.2 Modelled knowledge; 6.1.3 Methods; 6.2 Finite State Machines; 6.2.1 Computational FSM; 6.2.2 Mealy and Moore machines; 6.2.3 Implementation; 6.2.4 Discussion; 6.3 Flocking; 6.4 Influence Maps; 6.5 Summary; Exercises; 7 Modelling Uncertainty; 7.1 Statistical Reasoning; 7.1.1 Bayes' theorem; 7.1.2 Bayesian networks; 7.1.3 Dempster-Shafer theory; 7.2 Fuzzy Sets; 7.2.1 Membership function; 7.2.2 Fuzzy operations; 7.3 Fuzzy Constraint Satisfaction Problem…”
Libro electrónico -
11958Publicado 2018Tabla de Contenidos: “…-- Hierarchical clustering -- Partitioning clustering (KMeans) -- Summary -- Chapter 3: Data Preprocessing -- Technical requirements -- Data transformation -- Numerical data transformation -- Scaling -- Missing values -- Outliers -- Detecting and treating univariate outliers -- Inter-quartile range -- Filtering values -- Winsorizing -- Trimming -- Detecting and treating multivariate outliers -- Binning -- Log and power transformations -- Categorical data transformation -- Encoding -- Missing values for categorical data transformation -- Text preprocessing -- Feature selection -- Excluding features with low variance -- Univariate feature selection -- Recursive feature elimination -- Feature selection using random forest -- Feature selection using dimensionality reduction -- Principal Component Analysis -- Feature generation -- Summary -- Chapter 4: Automated Algorithm Selection -- Technical requirements -- Computational complexity -- Big O notation -- Differences in training and scoring time -- Simple measure of training and scoring time -- Code profiling in Python -- Visualizing performance statistics -- Implementing k-NN from scratch -- Profiling your Python script line by line -- Linearity versus non-linearity -- Drawing decision boundaries -- Decision boundary of logistic regression -- The decision boundary of random forest -- Commonly used machine learning algorithms -- Necessary feature transformations -- Supervised ML -- Default configuration of auto-sklearn -- Finding the best ML pipeline for product line prediction -- Finding the best machine learning pipeline for network anomaly detection -- Unsupervised AutoML -- Commonly used clustering algorithms -- Creating sample datasets with sklearn -- K-means algorithm in action -- The DBSCAN algorithm in action…”
Libro electrónico -
11959por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Financing investment -- Core questions and principles -- Supplemental questions -- Additional resources -- Websites -- OECD instruments and tools -- References, tools, guidance, manuals -- Statistics and indicators -- 11. Public governance -- Regulatory framework -- Administrative simplification -- Regulatory impact assessments -- Regulatory compliance and enforcement -- Governance and institutional structure -- Regulatory coherence across levels of government and jurisdictions -- Open government -- Public integrity -- Box 11.1. …”
Publicado 2015
Libro electrónico -
11960Publicado 2016Tabla de Contenidos: “…5.1.1 Literature Retrieval Reform5.1.2 An Alternative Scholarly Communication Initiative; 5.1.3 Scientific Research Project Services; 5.2 Administrative Data Services; 5.2.1 Police Department; 5.2.2 Statistical Office; 5.2.3 Environmental Protection Agency; 5.3 Internet Data Services; 5.3.1 Open Source; 5.3.2 Privacy Services; 5.3.3 People Search; 5.4 Financial Data Services; 5.4.1 Describing Correlations; 5.4.2 Simulating Market-Makers' Behaviors; 5.4.3 Forecasting Security Prices; 5.5 Health Data Services; 5.5.1 Approaching the Healthcare Singularity; 5.5.2 New Drug of Launching Shortcuts…”
Libro electrónico