Mostrando 2,481 - 2,500 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.12s Limitar resultados
  1. 2481
    Publicado 2017
    Tabla de Contenidos: “…Examples of SQL injection attacks -- Ways to defend against SQL injection attacks -- Attack vectors for web applications -- Bypassing authentication -- Bypass blocked and filtered websites -- Finding vulnerabilities from a targeted sites -- Extracting data with SQLmap -- Hunting for web app vulnerabilities with Open Web Application Security Project (OWASP) ZAP -- Summary -- Chapter 10: Scapy -- Scapy -- Creating our first packet -- Sending and receiving -- Layering -- Viewing the packet -- Handling files -- The TCP three way handshake -- SYN scan -- A DNS query -- Malformed packets -- Ping of death -- Teardrop attack (aka Nestea) -- ARP cache poisoning -- ARP poisoning commands -- ACK scan -- TCP port scanning -- VLAN hopping -- Wireless sniffing -- OS fingerprinting ISN -- Sniffing -- Passive OS detection -- Summary -- Chapter 11: Web Application Exploits -- Web application exploits -- What tools are used for web application penetration testing? …”
    Libro electrónico
  2. 2482
    por DeStefano, Stephen
    Publicado 2023
    Tabla de Contenidos: “…Gathering and slicing images -- Adding the animating variables -- Adding the images to the scene -- Adding the background -- Adding the right leg -- Adding the girl -- Adding the left leg -- Bringing the images together -- Using the mask modifier -- Summary -- Chapter 7: Building a Series of Belts and Gears -- Technical requirements -- Animating our first circular gear -- Animating a worm gear using shadows -- Using a marching ants effect to create a gear belt -- Animating a gear shaft image -- Animating a fan image -- Bringing everything together in ContentView -- Adding the motor -- Adding the gears along the x-, y-, and z-axes -- Adding the worm gear -- Adding the belts -- Adding the gear shafts -- Adding the fan -- Adding the background -- Summary -- Chapter 8: Animating a Bouquet of Flowers -- Technical requirements -- Adding the variables and a winter background -- Animating the text labels -- Using the blur modifier to create a vapor effect -- Animating flower petals in an arc -- Adding the flower bouquet and the animated breath -- Creating falling snow in the scene -- Adding the UIViewRepresentable protocol -- Dealing with methods and errors -- Adding the CAEmitter class -- Summary -- Chapter 9: Animating Strokes around Shapes -- Technical requirements -- Converting images into Swift code -- Removing the image backgrounds -- Vectorizing the images -- Translating the SVG file into Swift code -- Animating images with the stroke modifier -- Creating a stroke animation on the "WE" image -- Creating a stroke animation on the heart image -- Creating a stroke animation on the SwiftUI logo image -- Combining the animated strokes -- Summary -- Chapter 10: Creating an Ocean Scene -- Technical requirements -- Adding the wave's offset property -- Creating a wave shape using the Shape protocol and Path function…”
    Libro electrónico
  3. 2483
    por Shalloway, Alan
    Publicado 2004
    Tabla de Contenidos: “…Applying the Template Method to the International E-Commerce Case Study -- Using the Template Method Pattern to Reduce Redundancy -- Field Notes: Using the Template Method Pattern -- Summary -- Review Questions -- PART VII: Factories -- Chapter 20 Lessons from Design Patterns: Factories -- Overview -- Factories -- The Universal Context Revisited -- Factories Follow Our Guidelines -- Limiting the Vectors of Change -- Another Way to Think About It -- Different Roles of Factories -- Field Notes -- Summary -- Review Questions -- Chapter 21 The Singleton Pattern and the Double-Checked Locking Pattern -- Overview -- Introducing the Singleton Pattern -- Applying the Singleton Pattern to the Case Study -- A Variant: The Double-Checked Locking Pattern -- Reflections -- Field Notes: Using the Singleton and Double-Checked Locking Patterns -- Summary -- Review Questions -- Chapter 22 The Object Pool Pattern -- Overview -- A Problem Requiring the Management of Objects -- The Object Pool Pattern -- Observation: Factories Can Do Much More Than Instantiation -- Summary -- Review Questions -- Chapter 23 The Factory Method Pattern -- Overview -- More Requirements for the Case Study -- The Factory Method Pattern -- Factory Method Pattern and Object-Oriented Languages -- Field Notes: Using the Factory Method Pattern -- Summary -- Review Questions -- Chapter 24 Summary of Factories -- Overview -- Steps in the Software Process -- Parallels in Factories and XP Practices -- Scaling Systems -- PART VIII: Endings and Beginnings -- Chapter 25 Design Patterns Reviewed: A Summation and a Beginning -- Overview -- A Summary of Object-Oriented Principles -- How Design Patterns Encapsulate Implementations -- Commonality and Variability Analysis and Design Patterns -- Decomposing a Problem Domain into Responsibilities -- Patterns and Contextual Design…”
    Libro electrónico
  4. 2484
    Publicado 2018
    Tabla de Contenidos: “…-- The evolution of machine learning -- Factors that led to the success of machine learning -- Machine learning, statistics, and AI -- Categories of machine learning -- Supervised and unsupervised machine learning -- Supervised machine learning -- Vehicle Mileage, Number Recognition and other examples -- Unsupervised machine learning -- Subdividing supervised machine learning -- Common terminologies in machine learning -- The core concepts in machine learning -- Data management steps in machine learning -- Pre-processing and feature selection techniques -- Centering and scaling -- The near-zero variance function -- Removing correlated variables -- Other common data transformations -- Data sampling -- Data imputation -- The importance of variables -- The train, test splits, and cross-validation concepts -- Splitting the data into train and test sets -- The cross-validation parameter -- Creating the model -- Leveraging multicore processing in the model -- Summary -- Chapter 8: Machine Learning Deep Dive -- The bias, variance, and regularization properties -- The gradient descent and VC Dimension theories -- Popular machine learning algorithms -- Regression models -- Association rules -- Confidence -- Support -- Lift -- Decision trees -- The Random forest extension -- Boosting algorithms -- Support vector machines -- The K-Means machine learning technique -- The neural networks related algorithms -- Tutorial - associative rules mining with CMS data -- Downloading the data -- Writing the R code for Apriori -- Shiny (R Code) -- Using custom CSS and fonts for the application -- Running the application -- Summary -- Chapter 9: Enterprise Data Science -- Enterprise data science overview…”
    Libro electrónico
  5. 2485
    Publicado 2024
    Tabla de Contenidos: “…Exploring intermediate Rust concepts -- Control flow -- While loops -- Functions -- Match control flow -- Structs -- Vectors -- Delving deep into advanced Rust concepts -- Hashmaps -- Ownership and borrowing -- Crates, modules, and cargo -- Summary -- Part 2: Building the Blockchain -- Chapter 3: Building a Custom Blockchain -- Technical requirements -- Windows installation -- Mac installation -- Ubuntu installation -- VS Code -- rust-analyzer -- Cargo -- Planning our first blockchain project -- Structs -- Required functions -- Getting started with building the blockchain -- Block -- Creating the genesis block -- Using helper functions -- Exploring embedded databases -- Summary -- Chapter 4: Adding More Features to Our Custom Blockchain -- Technical requirements -- Connecting the blocks -- Libraries powering blockchain operations -- Blockchain functions -- Starting the node server -- The server -- Server struct and implemented methods -- Enums -- Helper functions -- The serve function -- The Node struct -- Summary -- Chapter 5: Finishing Up Our Custom Blockchain -- Technical requirements -- Adding memory pools -- Implementing a memory pool -- The BlockinTransit implementation -- Implementing transactions -- Understanding TXInput transactions -- Understanding TXOutput transactions -- Understanding the Transaction implementation -- Utilizing UTXOs and developing wallets -- Implementing UTXOSet -- Implementing wallets -- Wallets -- Setting up configurations and utilities -- The Config implementation -- Utility functions -- Understanding the lib.rs file -- Understanding the Main.rs file -- Using your custom blockchain -- Creating a new blockchain -- Creating a new wallet -- Checking the wallet balance -- Starting a node -- Sending currency -- Listing all wallet addresses -- Printing the blockchain -- Rebuilding the UTXO set -- Summary…”
    Libro electrónico
  6. 2486
    Publicado 2019
    Tabla de Contenidos: “…3.5.3 The Firing Solution -- 3.5.4 Projectiles with Drag -- 3.5.5 Iterative Targeting -- 3.6 Jumping -- 3.6.1 Jump Points -- 3.6.2 Landing Pads -- 3.6.3 Hole Fillers -- 3.7 Coordinated Movement -- 3.7.1 Fixed Formations -- 3.7.2 Scalable Formations -- 3.7.3 Emergent Formations -- 3.7.4 Two-Level Formation Steering -- 3.7.5 Implementation -- 3.7.6 Extending to More Than Two Levels -- 3.7.7 Slot Roles and Better Assignment -- 3.7.8 Slot Assignment -- 3.7.9 Dynamic Slots and Plays -- 3.7.10 Tactical Movement -- 3.8 Motor Control -- 3.8.1 Output Filtering -- 3.8.2 Capability-Sensitive Steering -- 3.8.3 Common Actuation Properties -- 3.9 Movement in the Third Dimension -- 3.9.1 Rotation in Three Dimensions -- 3.9.2 Converting Steering Behaviors to Three Dimensions -- 3.9.3 Align -- 3.9.4 Align to Vector -- 3.9.5 Face -- 3.9.6 Look Where You're Going -- 3.9.7 Wander -- 3.9.8 Faking Rotation Axes -- CHAPTER 4: PATHFINDING -- 4.1 The Pathfinding Graph -- 4.1.1 Graphs -- 4.1.2 Weighted Graphs -- 4.1.3 Directed Weighted Graphs -- 4.1.4 Terminology -- 4.1.5 Representation -- 4.2 Dijkstra -- 4.2.1 The Problem -- 4.2.2 The Algorithm -- 4.2.3 Pseudo-Code -- 4.2.4 Data Structures and Interfaces -- 4.2.5 Performance of Dijkstra -- 4.2.6 Weaknesses -- 4.3 A* -- 4.3.1 The Problem -- 4.3.2 The Algorithm -- 4.3.3 Pseudo-Code -- 4.3.4 Data Structures and Interfaces -- 4.3.5 Implementation Notes -- 4.3.6 Algorithm Performance -- 4.3.7 Node Array A* -- 4.3.8 Choosing a Heuristic -- 4.4 World Representations -- 4.4.1 Tile Graphs -- 4.4.2 Dirichlet Domains -- 4.4.3 Points of Visibility -- 4.4.4 Navigation Meshes -- 4.4.5 Non-Translational Problems -- 4.4.6 Cost Functions -- 4.4.7 Path Smoothing -- 4.5 Improving on A* -- 4.6 Hierarchical Pathfinding -- 4.6.1 The Hierarchical Pathfinding Graph -- 4.6.2 Pathfinding on the Hierarchical Graph…”
    Libro electrónico
  7. 2487
    por Jodidio, Philip
    Publicado 2009
    Tabla de Contenidos: “…CR Land Guanganmen Green Technology Showroom (Beijing, China) / Vector Architects. Bamboo Wing (Dai Lai, Vinh Phuc Province, Vietnam) ; Stacking Green (Ho Chi Minh City, Vietnam) / Vo Trong Nghia. …”
    Libro
  8. 2488
    Publicado 2018
    Tabla de Contenidos: “…Iteration -- 1.6 Types Of Recursion -- 1.6.1 Linear Recursion -- 1.6.2 Tail Recursion -- 1.6.3 Multiple Recursion -- 1.6.4 Mutual Recursion -- 1.6.5 Nested Recursion -- 1.7 Exercises -- Chapter 2 Methodology For Recursive Thinking -- 2.1 Template For Designing Recursive Algorithms -- 2.2 Size Of The Problem -- 2.3 Base Cases -- 2.4 Problem Decomposition -- 2.5 Recursive Cases, Induction, And Diagrams -- 2.5.1 Thinking Recursively Through Diagrams -- 2.5.2 Concrete Instances -- 2.5.3 Alternative Notations -- 2.5.4 Procedures -- 2.5.5 Several Subproblems -- 2.6 Testing -- 2.7 Exercises -- Chapter 3 Runtime Analysis Of Recursive Algorithms -- 3.1 Mathematical Preliminaries -- 3.1.1 Powers And Logarithms -- 3.1.2 Binomial Coefficients -- 3.1.3 Limits And L'hopital's Rule -- 3.1.4 Sums And Products -- 3.1.5 Floors And Ceilings -- 3.1.6 Trigonometry -- 3.1.7 Vectors And Matrices -- 3.2 Computational Time Complexity -- 3.2.1 Order Of Growth Of Functions -- 3.2.2 Asymptotic Notation -- 3.3 Recurrence Relations -- 3.3.1 Expansion Method -- 3.3.2 General Method For Solving Difference Equations -- 3.4 Exercises -- Chapter 4 Linear Recursion I: Basic Algorithms -- 4.1 Arithmetic Operations -- 4.1.1 Power Function -- 4.1.2 Slow Addition -- 4.1.3 Double Sum -- 4.2 Base Conversion -- 4.2.1 Binary Representation Of A Nonnegative Integer -- 4.2.2 Decimal To Base B Conversion -- 4.3 Strings -- 4.3.1 Reversing A String…”
    Libro electrónico
  9. 2489
    Publicado 2015
    Tabla de Contenidos: “…-- Standards and Best Practices for Risk Management -- Methodologies for Assessing Risk Within Industrial Control Systems -- Security Tests -- Security Audits -- Security and Vulnerability Assessments -- Establishing a Testing and Assessment Methodology -- Tailoring a Methodology for Industrial Networks -- Theoretical versus Physical Tests -- Online versus Offline Physical Tests -- System Characterization -- Data Collection -- Scanning of Industrial Networks -- Device Scanners -- Vulnerability Scanners -- Traffic Scanners -- Live Host Identification -- "Quiet" / "Friendly" Scanning Techniques -- Potentially "Noisy"/"Dangerous" Scanning Techniques -- Port Mirroring and Span Ports -- Command Line Tools -- Hardware and Software Inventory -- Data Flow Analysis -- Threat Identification -- Threat Actors/Sources -- Threat Vectors -- Threat Events -- Identification of Threats During Security Assessments -- Vulnerability Identification -- Vulnerability Scanning -- Configuration Auditing -- Vulnerability Prioritization -- Common Vulnerability Scoring System -- Risk Classification and Ranking -- Consequences and Impact…”
    Libro electrónico
  10. 2490
    Publicado 2024
    Tabla de Contenidos: “…7.2 Photovoltaic (PV)-Based DSTATCOM Model -- 7.3 Controller Design and Control Algorithm -- 7.3.1 Instantaneous Reactive Power Theory (IRPT) -- 7.3.2 Modified Instantaneous Reactive Power Theory (MIRPT) -- 7.3.3 Hybrid Synchronous Reference Frame Theory (HSRF) -- 7.3.4 Indirect Current Control (ICC) -- 7.3.5 Direct Current Control (DCC) -- 7.4 Simulation Results -- 7.5 Experimental Results -- 7.6 Conclusion -- References -- Chapter 8 Modeling and Simulation of Current Transformer to Study Its Behaviors in Different Conditions -- 8.1 Introduction -- 8.2 Simulation Circuit of Current Transformer -- 8.3 Effects of CT Performance Due to Variation of Circuit Time Constants -- 8.4 Effects of CT Performance Due to Switching Transients -- 8.5 DWT-Based Skewness Analysis for Assessment of CT Saturation Due to Switching Transients -- 8.6 CT Saturation Detection by Multi-Resolution Analysis- Based Notch Assessment -- 8.7 CT Primary Current Assessment During CT Saturation -- 8.8 Conclusion -- References -- Chapter 9 Multilevel Inverter-Fed Closed Loop Control and Analysis of Induction Motor Drive -- 9.1 Introduction -- 9.2 Mathematical Modeling -- 9.2.1 Field Weakening Controller -- 9.2.2 Vector Controller -- 9.3 Results -- 9.3.1 Starting Dynamics -- 9.3.2 Reversal Dynamics -- 9.3.3 Load Perturbation Analysis -- 9.3.4 THD Analysis -- 9.4 Conclusion -- References -- Chapter 10 Hybrid Grey Wolf Optimizer for Modeling and Control of Electric Drives -- 10.1 Background Study -- 10.2 Proposed Approach -- 10.3 Simulation Outcomes and Discussions -- 10.4 Conclusions -- References -- Chapter 11 Parameter Estimation of First-Order RC Model of Lithium-Ion Batteries in Electric Vehicles Using Slime Mold Algorithm -- 11.1 Introduction -- 11.2 Brief Overview of the Battery Models -- 11.2.1 Equivalent Circuit Model (ECM) of Li-Ion Battery…”
    Libro electrónico
  11. 2491
    Publicado 2019
    Tabla de Contenidos: “…Entropy and occurrence vectors -- 9.2.2. Functional metrics -- 9.2.3. E-M (expectation-maximization) approaches -- 9.2.4. …”
    Libro electrónico
  12. 2492
    Publicado 2008
    Tabla de Contenidos: “…Quiz -- Foundation Topics -- Dynamic Routing Protocol Overview -- Distance Vector Routing Protocol Features -- Link-State Routing Protocol Features -- Exam Preparation Tasks -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Command Reference to Check Your Memory -- Chapter 9 OSPF -- "Do I Know This Already?" …”
    Libro electrónico
  13. 2493
    Publicado 2019
    Tabla de Contenidos: “…-- 8.1.1 The five stages of the Datashader rendering pipeline -- 8.1.2 Creating a Datashader Visualization -- 8.2 Plotting location data as an interactive heatmap -- 8.2.1 Preparing geographic data for map tiling -- 8.2.2 Creating the interactive heatmap -- Summary -- Part 3: Extending and deploying Dask -- Chapter 9: Working with Bags and Arrays -- 9.1 Reading and parsing unstructured data with Bags -- 9.1.1 Selecting and viewing data from a Bag -- 9.1.2 Common parsing issues and how to overcome them -- 9.1.3 Working with delimiters -- 9.2 Transforming, filtering, and folding elements -- 9.2.1 Transforming elements with the map method -- 9.2.2 Filtering Bags with the filter method -- 9.2.3 Calculating descriptive statistics on Bags -- 9.2.4 Creating aggregate functions using the foldby method -- 9.3 Building Arrays and DataFrames from Bags -- 9.4 Using Bags for parallel text analysis with NLTK -- 9.4.1 The basics of bigram analysis -- 9.4.2 Extracting tokens and filtering stopwords -- 9.4.3 Analyzing the bigrams -- Summary -- Chapter 10: Machine learning with Dask-ML -- 10.1 Building linear models with Dask-ML -- 10.1.1 Preparing the data with binary vectorization -- 10.1.2 Building a logistic regression model with Dask-ML -- 10.2 Evaluating and tuning Dask-ML models -- 10.2.1 Evaluating Dask-ML models with the score method -- 10.2.2 Building a naïve Bayes classifier with Dask-ML -- 10.2.3 Automatically tuning hyperparameters -- 10.3 Persisting Dask-ML models -- Summary -- Chapter 11: Scaling and deploying Dask -- 11.1 Building a Dask cluster on Amazon AWS with Docker -- 11.1.1 Getting started…”
    Libro electrónico
  14. 2494
    Publicado 1986
    Tabla de Contenidos: “…Agencies and Organizations with International Responsibilities or Operations -- Importation -- INFECTION RISKS OUTSIDE THE UNITED STATES -- Sexual Exposure -- Exposure Through Blood Transfusion -- IV Drug Use -- Use of Unsterile Needles and Implements -- Lack of Evidence for Transmission by Insect Vectors and Casual Contact -- Conclusions -- INTERNATIONAL RESEARCH OPPORTUNITIES -- THE U.S. …”
    Libro electrónico
  15. 2495
    Publicado 2011
    Tabla de Contenidos: “…Intro -- Title -- Preface -- Organization -- Table of Contents -- Progress in Indoor UAV -- On the Way to a Real-Time On-Board Orthogonal SLAM for an Indoor UAV -- Introduction -- Introductive System Description -- SLAM Algorithm -- Indoor Navigation -- Experimental SLAM Results -- Conclusion -- References -- Quadrocopter Localization Using RTK-GPS and Vision-Based Trajectory Tracking -- Introduction -- Characteristics of the Flight Platform -- Sensors and Hardware Equipment -- Software -- Differential GPS -- Real Time Kinematic GPS -- Measurements -- Position Control and Trajectory Tracking -- Position Controller -- Trajectory Controller -- Conclusions and Future Research -- References -- Five-Axis Milling Simulation Based on B-rep Model -- Introduction -- Geometric Description of Ball-End Tool -- Tool Swept Volume Generation -- Swept Profiles of Cylinder Surface -- Swept Profiles of Hemisphere Surface -- Realization of Five-Axis Milling Simulation -- Determining and Solving Self-intersection -- Conclusions -- References -- Robotics Intelligence -- Exploration Strategies for Building Compact Maps in Unbounded Environments -- Introduction -- Related Work -- Greedy Exploration -- Compact Exploration Strategies -- Spiral Exploration -- Distance-Penalized Exploration -- Evaluation -- Experiment 1: Low Obstacle Density -- Experiment 2: High Obstacle Density -- Experiment 3: Elongated Obstacles -- Conclusions -- References -- The Basic Component of Computational Intelligence for KUKA KR C3 Robot -- Introduction -- Kinematics -- Workspace -- Example of Calculations -- Conclusions -- References -- An Experimental Comparison of Model-Free Control Methods in a Nonlinear Manipulator -- Introduction -- System Description -- Model-Free Control Strategies -- Proportional-Integral-Derivative -- Robust Tracking with Control Vector Constraints…”
    Libro electrónico
  16. 2496
    por Institute of Medicine (U.S.).
    Publicado 2000
    Tabla de Contenidos: “…Vaccines for the 21st Century -- Copyright -- Acknowledgments -- Contents -- Executive Summary -- THE ANALYTIC FRAMEWORK -- ETHICAL ISSUES -- RESULTS -- OBSERVATIONS -- 1 Introduction -- CONSIDERATIONS RELATED TO THE MODEL AND THE STUDY -- ORGANIZATION OF THE REPORT -- Charge to the Committee -- Committee Membership and Meetings -- Organization of the Report -- 2 Progress in Vaccine Development -- PRIORITIES OF THE IOM COMMITTEE IN 1985 -- LITIGATION AS A BARRIER TO VACCINE DEVELOPMENT -- Immunization of Pregnant Women -- A CASE STUDY OF SUCCESS -- Disease Burden -- Polio Vaccine Development -- Advantages of Evolving Vaccine Strategies -- ADVANCES IN BIOTECHNOLOGY AND MOLECULAR IMMUNOLOGY AND NEW OPPORTUNITIES FOR VACCINES -- Fundamental Understanding of Helper T Cells for Antibody Versus CMI Responses, and for Cytotoxicity -- Major Advances in Mucosal Immunity -- Mucosal Immune System Organization -- Molecular Aspects of Virulence and Design of Recombinant Protein Vaccines -- Novel Vaccine Delivery Systems -- Recent Advances in Development of Novel Adjuvants -- Scientific Rationale for Vaccines against Autoimmune Diseases -- Immune Tolerance Induction -- Immune Deviation -- Receptor-Centered Regulation -- Targeting Cytokines or Their Receptors -- Viral Vectors in Autoimmune Therapy -- Preventive Vaccines for Autoimmune Diseases -- 3 Considerations of Candidate Vaccines -- EXCLUSION CRITERIA -- Insufficient Basic Science Information -- Existence of Appropriate Prevention Interventions -- International Burden of Disease -- ADDITIONAL CONSIDERATIONS FOR INCLUSION -- Therapeutic Vaccines -- Programmatic Considerations -- Delivery of Vaccines to Children -- Delivery of Vaccines to Adults -- Delivery of Vaccines to Pregnant Women -- 4 Overview of Analytic Approach and Results -- A COST-EFFECTIVENESS APPROACH…”
    Libro electrónico
  17. 2497
    por Chaparro Amaya, Adolfo
    Publicado 2023
    Tabla de Contenidos: “…"La puesta en escena como transmutación maquínica inagotable" -- IV Festival Iberoamericano de Teatro, Bogotá, 1994 "Pretextos, vectores y mixturas del teatro contemporáneo" -- El discurso autorreferencial -- "Una moral que vive de su asesinato" -- La experiencia transcultural -- La sobria eficacia de la danza-teatro -- Los fantasmas de la imagen simbiótica -- Latinoamérica: otra pulsión dramática -- Fragmentario sobre danza-teatro -- Introito -- Un canon localizado y aleatorio de la danza-teatro -- Athanor Danza. …”
    Libro electrónico
  18. 2498
    Publicado 2013
    Tabla de Contenidos: “…See -- Archimedean Axiom -- ARIMA -- See -- Army Operations Research -- Arrival Process -- See -- Arrival-Point Distribution -- Arrow Diagram -- See -- Artificial Intelligence -- Introduction -- AI as Search -- AI as Logic -- Further Reading -- See -- References -- Artificial Variables -- See -- Assignment Problem -- See -- References -- Auction and Bidding Models -- Introduction -- Environments Modeled -- Auction Forms -- Revenue Maximization -- Concluding Remarks -- See -- References -- Automation in Manufacturing and Services -- Introduction -- Automated Manufacturing -- Services -- Implementation: Human and Organizational Dimensions -- Concluding Remarks -- See -- References -- Availability -- See -- References -- Averch-Johnson Hyphothesis -- B -- Backward Chaining -- See -- Backward Kolmogorov Equations -- See -- Backward-Recurrence Time -- Balance Equations -- See -- Balking -- See -- Bandit Model -- Banking -- Introduction -- Pricing Contingent Cashflows -- Portfolio Immunization -- Portfolio Diversification -- See -- References -- Bar Chart -- Barrier Functions and their Modifications -- Introduction -- Barrier Functions -- Modified Barrier Functions -- See -- References -- Basic Feasible Solution -- See -- Basic Solution -- See -- Basic Variables -- See -- Basis -- See -- Basis Inverse -- See -- Basis Vector -- See -- Batch Shops -- Battle Modeling -- Introduction -- Battle Model Classification -- Attrition Laws -- Dimension, Data, and Output -- Verification, Validation, and Accreditation -- Other Controversies -- Concluding Remarks -- See -- References -- Bayes Rule -- See -- Bayesian Decision Theory, Subjective Probability, and Utility -- Introduction -- Subjective Probability -- Bayes Rule -- Other Interpretations of The Probability Calculus -- Utility Theory -- Concluding Remarks -- See -- References -- Beale Tableau -- See…”
    Libro electrónico
  19. 2499
    Publicado 2018
    Tabla de Contenidos: “…-- Industrial "things," connectivity, and operational technologies -- Operational technology -- Machine-to-Machine -- An overview of SCADA, DCS, and PLC -- Industrial control system architecture -- ICS components and data networks -- ICS network components -- Fieldbus protocols -- IT and OT convergence - what it really means -- Industrial IoT deployment architecture -- Divergence in IT and OT security fundamentals -- Operational priorities -- Attack surface and threat actors -- Interdependence of critical infrastructures -- Industrial threats, vulnerabilities, and risk factors -- Threats and threat actors -- Vulnerabilities -- Policy and procedure vulnerabilities -- Platform vulnerabilities -- Software platform vulnerabilities -- Network vulnerability -- Risks -- Evolution of cyber-physical attacks -- Industrial IoT use cases - examining the cyber risk gap -- Energy and smart grids -- Manufacturing -- Cyberattack on industrial control systems - Stuxnet case study -- Event flow -- Key points -- Risk gap summary -- Smart city and autonomous transportation -- Healthcare and pharmaceuticals -- The ransomware attack on the healthcare enterprise - "WannaCry" case study -- Cyber risk gap summary -- Summary -- Chapter 2: Industrial IoT Dataflow and Security Architecture -- Primer on IIoT attacks and countermeasures -- Attack surfaces and attack vectors -- OWASP IoT attack surfaces -- Attack trees…”
    Libro electrónico
  20. 2500
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 6: Building a Classification Model with Spark * -- Types of classification models -- Linear models -- Logistic regression -- Multinomial logistic regression -- Visualizing the StumbleUpon dataset -- Extracting features from the Kaggle/StumbleUpon evergreen classification dataset -- StumbleUponExecutor -- Linear support vector machines -- The naà ̄ve Bayes model -- Decision trees -- Ensembles of trees -- Random Forests -- Gradient-Boosted trees -- Multilayer perceptron classifier -- Extracting the right features from your data -- Training classification models…”
    Libro electrónico