Mostrando 6,661 - 6,680 Resultados de 8,491 Para Buscar '"The Real World"', tiempo de consulta: 0.23s Limitar resultados
  1. 6661
    Publicado 2019
    “…Aiming to provide a better teaching and learning experience for instructors and students, the text highlights the relevance of chemistry through real-world examples. Activities and applications throughout the program couple chemistry concepts with health and environmental career applications to help students understand why course content matters. …”
    Libro electrónico
  2. 6662
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title -- Copyright -- Detailed Contents -- Preface to the Instructor -- Preface to the Student -- Real-World Applications -- Part I Force and Motion -- OVERVIEW Why Things Change -- Chapter 1 Representing Motion -- 1.1 Motion: A First Look -- 1.2 Position and Time: Putting Numbers on Nature -- 1.3 Velocity -- 1.4 A Sense of Scale: Significant Figures, Scientific Notation, and Units -- 1.5 Vectors and Motion: A First Look -- 1.6 Where Do We Go from Here? …”
    Libro electrónico
  3. 6663
    Publicado 2022
    “…This practical book demystifies abstract strategic concepts by applying them to common API testing scenarios, revealing how these complex ideas work in the real world. You'll learn to take a risk-driven approach to API testing, and build a strategy that goes beyond the basics of code and requirements coverage. …”
    Libro electrónico
  4. 6664
    Publicado 2018
    Tabla de Contenidos: “…Challenge These Assumptive Trigger Words -- Coach the Win -- Shift Your Questions to Focus on What's Right -- Phraseology: One Word Away From a Coaching Breakthrough -- Assumptions in Action -- Phraseology = Coaching Moments -- Springboard Questions -- Coach the Written Message -- A Hidden Opportunity -- A Real-World Success Story and How to Evaluate the Written Message -- Coaching the Elusive Topic of Time Management and Personal Productivity -- Coaching Personal Productivity and Time Management Using the E.L.A.D.S. and L.E.A.D.S. …”
    Libro electrónico
  5. 6665
    Publicado 2023
    Tabla de Contenidos: “…-- Testing from the inside out -- Testing from the outside in -- Defining test boundaries with hexagonal architecture -- Inside-out works well with the domain model -- Outside-in works well with adapters -- User stories can be tested across the domain model -- Summary -- Questions and answers -- Further reading -- Part 3: Real-World TDD -- Chapter 13: Driving the Domain Layer -- Technical requirements -- Starting a new game -- Test-driving starting a new game -- Tracking the progress of the game -- Triangulating word selection -- Playing the game -- Designing the scoring interface -- Triangulating game progress tracking -- Ending the game -- Responding to a correct guess -- Triangulating the game over due to too many incorrect guesses -- Triangulating response to guess after game over -- Reviewing our design -- Summary -- Questions and answers -- Further reading -- Chapter 14: Driving the Database Layer -- Technical requirements -- Installing the Postgres database -- Creating a database integration test…”
    Libro electrónico
  6. 6666
    Publicado 2023
    Tabla de Contenidos: “…Viewing DAST's findings -- Using Dependency Scanning to find vulnerabilities in dependencies -- Understanding Dependency Scanning -- Enabling and configuring Dependency Scanning -- Viewing Dependency Scanning's findings -- Using Container Scanning to find vulnerabilities in Docker images -- Understanding Container Scanning -- Enabling and configuring Container Scanning -- Viewing Container Scanning's findings -- Using License Compliance to manage licenses of dependencies -- Understanding License Compliance -- Enabling and configuring License Compliance -- Viewing License Compliance's findings -- Using IaC Scanning to find problems in infrastructure configuration files -- Understanding IaC Scanning -- Enabling and configuring IaC scanning -- Viewing IaC Scanning's findings -- Understanding the different types of security reports -- Managing security vulnerabilities -- Integrating outside security scanners -- Summary -- Chapter 8: Packaging and Deploying Code -- Technical requirements -- Storing code in GitLab's package registry for later re-use -- Locating GitLab's container and package registries -- Getting started with the package registry -- Supported package formats -- Authenticating to the registry -- Building and pushing packages to the package registry -- Building and pushing packages to the container registry -- Storing code in GitLab's container and package registries for later deployment -- Using images from the container registry -- Using packages from the package registry -- Deploying to different environments using GitLab Flow -- Deploying to a review app for testing -- Deploying to real-world production environments -- Deploying to a Kubernetes cluster -- The CI/CD workflow -- A GitOps workflow -- Summary -- Part 3 Next Steps for Improving Your Applications with GitLab…”
    Libro electrónico
  7. 6667
    por Yang, Won Y.
    Publicado 2020
    Tabla de Contenidos: “…DFT -- 3.9.2 Physical Meaning of DFT -- 3.9.3 Interpolation by Using DFS -- Chapter 4 Nonlinear Equations -- 4.1 Iterative Method toward Fixed Point -- 4.2 Bisection Method -- 4.3 False Position or Regula Falsi Method -- 4.4 Newton(‐Raphson) Method -- 4.5 Secant Method -- 4.6 Newton Method for a System of Nonlinear Equations -- 4.7 Bairstow's Method for a Polynomial Equation -- 4.8 Symbolic Solution for Equations -- 4.9 Real‐World Problems -- Chapter 5 Numerical Differentiation/Integration -- 5.1 Difference Approximation for the First Derivative -- 5.2 Approximation Error of the First Derivative -- 5.3 Difference Approximation for Second and Higher Derivative -- 5.4 Interpolating Polynomial and Numerical Differential -- 5.5 Numerical Integration and Quadrature -- 5.6 Trapezoidal Method and Simpson Method -- 5.7 Recursive Rule and Romberg Integration -- 5.8 Adaptive Quadrature -- 5.9 Gauss Quadrature -- 5.9.1 Gauss‐Legendre Integration -- 5.9.2 Gauss‐Hermite Integration -- 5.9.3 Gauss‐Laguerre Integration -- 5.9.4 Gauss‐Chebyshev Integration -- 5.10 Double Integral -- 5.11 Integration Involving PWL Function -- Chapter 6 Ordinary Differential Equations…”
    Libro electrónico
  8. 6668
    por Funatomi, Takuya
    Publicado 2024
    Tabla de Contenidos: “…Simulation experiments with weights for two constraints -- 10.7.2. Real-world experiments -- 10.8. Conclusion and future works -- 10.9. …”
    Libro electrónico
  9. 6669
    por Choudhury, Tanupriya
    Publicado 2023
    Tabla de Contenidos: “…Six companies using smart contracts in real-world applications -- 10.7.1. Slock.It -- 10.7.2. …”
    Libro electrónico
  10. 6670
    Publicado 2017
    “…This open access book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by leading researchers, discuss the main techniques and applications, together with the advantages and shortcomings of these tools in comparison to other fuzzy number representation models. …”
    Libro electrónico
  11. 6671
    por Altman, Russ B.
    Publicado 2018
    Tabla de Contenidos: “…Improved Reliability -- 4.3.2. Robustness in Real-world Situations -- 4.3.3. Number of Articles Read -- 5. …”
    Libro electrónico
  12. 6672
    por Saundra K. Ciccarelli
    Publicado 2021
    Tabla de Contenidos: “…Applying Psychology to Everyday Life: Conditioning in the Real World -- Chapter Summary -- Test Yourself -- 6 Memory -- 6.1-6.2 What Is Memory? …”
    Libro electrónico
  13. 6673
    Publicado 2020
    “…This focus, along with hundreds of worked numerical examples, ensures that students can apply the theory to real-world application and are prepared to be successful economists in the field The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. …”
    Libro electrónico
  14. 6674
    Publicado 2017
    “…The Circuit Designer’s Companion is ideal for Professional electronics design engineers, advanced amateur electronics designers, electronic engineering students and professors looking for a book with a real-world design outlook. Updated with new material on: Extreme Environment Design Design for Reliability Wide Band Gap Devices for Power Electronics Provides an invaluable companion for circuit designers and practicing electronics engineers that includes best practices Includes practical, real-world considerations for components, PCBs, manufacturability, reliability and cost Contains new material on design tools, high-speed circuits, variability and tolerances, noise, simulation methods and testing…”
    Libro electrónico
  15. 6675
    Publicado 2017
    “…Aiding in better well testing operations and models, this book is a one-stop solution for today’s reservoir and production engineer, helping them understand every layer of their reservoir. Includes real-world examples of well testing through multilayered reservoirs, whether with crossflow or with formation crossflow Provides strong guidance and criteria of research on reservoir dynamic performance, such as physical models and mathematical models Includes a new unsteady crossflow model for vertical interference testing in low-permeability zones Describes interpretation methods for different cases in multilayer reservoirs, including a new model called semipermeable walls for stratified reservoirs, drawdown test procedures and layer-by-layer test procedures that are useful for shales between layers…”
    Libro electrónico
  16. 6676
    Publicado 2023
    “…For BCI to be effective in the real world, however, some problems remain to be solved. …”
    Libro electrónico
  17. 6677
    Publicado 2019
    “…Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. …”
    Libro electrónico
  18. 6678
    por Tripathi, Padmesh
    Publicado 2024
    Tabla de Contenidos: “…5.8.2 Key Findings and Contributions -- 5.8.2.1 Integration of Mathematical Models -- 5.8.2.2 Application of Artificial Intelligence -- 5.8.2.3 Future Directions -- 5.8.2.4 Improved Security and Public Safety -- 5.8.2.5 Efficiency and Automation -- 5.8.3 Importance of Continued Research in Enhancing Surveillance Systems -- 5.8.3.1 Advancements in Technology -- 5.8.3.2 Addressing Complex Challenges -- 5.8.3.3 Improving Accuracy and Efficiency -- 5.8.3.4 Enhancing Threat Detection and Prevention -- 5.8.3.5 Real-World Application and Impact -- References -- Key Terms -- Chapter 6 A Study on Object Detection Using Artificial Intelligence and Image Processing-Based Methods -- 6.1 Introduction -- 6.2 Role of Artificial Intelligence in Image Analysis -- 6.2.1 Object Detection and Recognition -- 6.2.2 Image Segmentation -- 6.2.3 Medical Image Analysis -- 6.2.4 Virtual Reality (VR) and Augmented Reality (AR) -- 6.3 How Artificial Intelligence Can Enhance Traditional Image Processing Algorithms and Enable New Applications -- 6.3.1 Image Restoration -- 6.3.2 Super Resolution -- 6.3.3 Style Transfer -- 6.4 Benefits of Artificial Intelligence and Image Processing Methods -- 6.5 Ethical Considerations Associated with AI and Image Processing -- 6.5.1 Privacy and the Protection of Data -- 6.5.2 Bias and Discrimination Artificial Intelligence (AI) Algorithms -- 6.5.3 Informed Approval and Transparency -- 6.5.4 Deep Fakes and the Spread of Misinformation -- 6.5.5 Trust and Safety -- 6.5.6 Accountability and Responsibility -- 6.6 Conclusion -- References -- Chapter 7 Application of Fuzzy Approximation Method in Pattern Recognition Using Deep Learning Neural Networks and Artificial Intelligence for Surveillance -- 7.1 Introduction -- 7.2 Preliminaries -- 7.2.1 Neural Network -- 7.2.2 Pattern Recognition -- 7.2.3 Self-Organizing Maps (or Kohonen Maps)…”
    Libro electrónico
  19. 6679
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Unmasking Social Media Crimes: Types, Trends, and Impact -- 1.1 Introduction -- 1.2 Related Work -- 1.3 Social Media -- 1.4 Types of Social Media Crimes -- 1.4.1 Overview of Social Media Crimes -- 1.4.2 Key Characteristics -- 1.4.3 Cyberbullying and Online Harassment -- 1.4.3.1 Impact on Victims -- 1.4.4 Identity Theft and Scams -- 1.4.4.1 Consequences for Victims -- 1.4.5 Hate Speech and Incitement to Violence -- 1.4.5.1 Link to Real-World Violence -- 1.5 Trends in Social Media Crimes -- 1.5.1 Case Studies -- 1.6 Law Enforcements's Use of Social Media Surveillance -- 1.6.1 The Evolution of Social Media Surveillance -- 1.6.2 Key Motivations -- 1.6.3 Methods Employed -- 1.6.4 Legal and Ethical Considerations -- 1.7 Challenges in Social Media Surveillance -- 1.7.1 Accuracy and Interpretation -- 1.7.2 Social Media Evidence and Accuracy -- 1.7.3 Legal Questions and Implications -- 1.7.4 The Intersection of Social Media and Criminal Justice -- 1.8 Impact of Social Media Crimes -- 1.9 Conclusion -- References -- Chapter 2 Study on Vulnerability in Online Social Networking: Impact on an Individual, Community -- 2.1 Introduction -- 2.2 Statistics of Online Social Media Network -- 2.3 Existing Research on Social Media Vulnerabilities -- 2.4 Vulnerability -- 2.4.1 How Vulnerability is Related to Online Social Networking -- 2.4.2 Classification of Vulnerability -- 2.4.2.1 Individual Vulnerabilities -- 2.4.2.2 Community Vulnerabilities -- 2.4.2.3 Government Vulnerabilities -- 2.4.3 State of the Art: Techniques to Prevent Yourself from Social Media Vulnerabilities -- 2.4.4 Some Popular Case Study -- 2.5 Future Trends -- 2.6 Conclusion -- Acknowledgement -- References -- Chapter 3 Application of Google Lens Clone Using Image Recognition in Enterprise Environment…”
    Libro electrónico
  20. 6680
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Python for Offensive Security -- Chapter 1: Introducing Offensive Security and Python -- Understanding the offensive security landscape -- Defining offensive security -- The origins and evolution of offensive security -- Use cases and examples of offensive security -- Industry relevance and best practices -- The role of Python in offensive operations -- Key cybersecurity tasks that are viable with Python -- Python's edge in cybersecurity -- The limitations of using Python -- Ethical hacking and legal considerations -- The key protocols of ethical hacking -- Ethical hacking's legal aspects -- Exploring offensive security methodologies -- Significance of offensive security -- The offensive security lifecycle -- Offensive security frameworks -- Setting up a Python environment for offensive tasks -- Setting up Python on Linux -- Setting up Python on macOS -- Setting up Python on Windows -- Exploring Python modules for penetration testing -- Essential Python libraries for penetration testing -- Case study - Python in the real world -- Scenario 1 - real-time web application security testing -- Scenario 2 - network intrusion detection -- Summary -- Chapter 2: Python for Security Professionals - Beyond the Basics -- Utilizing essential security libraries -- Harnessing advanced Python techniques for security -- Compiling a Python library -- Advanced Python features -- Decorators -- Generators -- Summary -- Activity -- Part 2: Python in Offensive Web Security -- Chapter 3: An Introduction to Web Security with Python -- Fundamentals of web security -- Python tools for a web vulnerability assessment -- Wapiti -- MITMProxy -- SQLMap -- Exploring web attack surfaces with Python -- HTTP header analysis -- HTML analysis…”
    Libro electrónico