Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
2561Publicado 2018“…Basics and Technical Vocabulary WORKSHOP 1: DISCOVERING BRUSH LETTERING Exercise 1: Find the Right Position Exercise 2: Set Up a Grid Exercise 3: Execute the First Movements Exercise 4: Place Letters Exercsise 5: Join the Letters Exercise 6: Retracing Your Tracks Work Studies Gallery WORKSHOP 2: INITIATING SCRIPT LETTERING Exercise 1: Discover the Skeleton Technique Exercise 2: Trace an Alphabet Exercise 3: Draw a Full Word Exercise 4: Execute a Classic Script Letter Exercise 5: Out of Your Comfort Zone Work Studies Gallery WORKSHOP 3: USING TYPOGRAPHICAL CHARACTERS Exercise 1: Decorate a Letter Exercise 2: A Complete Word Exercise Exercise 3: Go Further with a Vintage Style Exercise 4: Discover the Interlock Exercise 5: Work the Interlock Exercise 6: Realize Complete Lettering in Interlock Work Studies Gallery WORKSHOP 4: THE SECRETS OF A GOOD COMPOSITION Exercise 1: Thinking in Block Exercise 2: Execute the First Sketches Exercise 3: Choose the Word Styles Exercise 4: Tracing the Skeleton Exercise 5: Develop and Finalize Your Track Work Studies Gallery WORKSHOP 5: SCANNING AND VECTORIZATION Exercise 1: Scan and Prepare Your Lettering Exercise 2: First Steps to Vectorization Exercise 3: Testing the Summit Theory Exercise 4: Vectorize the Entire Set of Letters Exercise 5: Critiquing Vectorized Letters Exercise 6: Prepare Lettering without Vectorization Exercise 7: Isolate Lettering Exercise 8: Apply Texture Exercise 9: Finalizing the Composition Gallery..…”
Libro electrónico -
2562Publicado 2022“…Mosquitoes are vectors of many disease-causing agents, such as malaria, dengue, chikungunya and yellow fever. …”
Libro electrónico -
2563por MUSEROS ROMERO, PEDRO“…En el tema 2 se tratan los vectores y sus propiedades, prestando particular atención a las fuerzas como vectores deslizantes que deben componerse. …”
Publicado 2017
Texto completo en Odilo
Otros -
2564Publicado 2017“…The contributing authors have discussed various developments in cell culture methods, the application of insect cells for the efficient production of heterologous proteins, the expansion of human mesenchymal stromal cells for different clinical applications, the remote sensing of cell culture experiments and concepts for the development of cell culture bioprocess, continuous production of retroviral pseudotype vectors, and the production of oncolytic measles virus vectors for cancer therapy. …”
Libro electrónico -
2565Publicado 2021“…The Special Issue of Viruses is a collection of recent contributions in the field of parvovirus research, encompassing many aspects of basic and translational research on viruses of the family Parvoviridae, including on their structure, replication, and gene expression in addition to virus–host interactions and the development of vaccines and viral vectors…”
Libro electrónico -
2566Publicado 2022Tabla de Contenidos: “…Sintaxis para ordenadores: gramáticas de contexto libre -- 13.3.4. Palabras como vectores: semántica vectorial -- 13.4. Conclusiones -- 13.5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2567Publicado 2021Tabla de Contenidos: “…Schurer Operators and Related Numerical Results -- 3.1 Introduction -- 3.2 Auxiliary Results -- 3.3 Approximation Behavior of λ-Schurer-Kantorovich Operators -- 3.4 Voronovskaja-type Approximation Theorems -- 3.5 Graphical and Numerical Results -- 3.6 Conclusion -- References -- Chapter 4 Characterizations of Rough Fractional-Type Integral Operators on Variable Exponent Vanishing Morrey-Type Spaces -- 4.1 Introduction -- 4.2 Preliminaries and Main Results -- 4.2.1 Variable Exponent Lebesgue Spaces L[sup(P(·))] -- 4.2.2 Variable Exponent Morrey Spaces L[sup(P(·))],λ[sup(·)] -- 4.2.3 Variable Exponent Vanishing Generalized Morrey Spaces -- 4.2.4 Variable Exponent-Generalized Campanato Spaces C[sub(Π)][sup(q(·),ɣ(·))] -- 4.3 Conclusion -- Funding -- References -- Chapter 5 Compact-Like Operators in Vector Lattices Normed by Locally Solid Lattices -- 5.1 Introduction -- 5.2 Preliminaries -- 5.3 pτ-Continuous and pτ-Bounded Operators -- 5.4 upτ-Continuous Operators -- 5.5 The Compact-Like Operators -- Bibliography -- Chapter 6 On Indexed Product Summability of an Infinite Series -- 6.1 Introduction -- 6.1.1 Historical Background -- 6.1.2 Notations and Definitions -- 6.2 Known Results -- 6.3 Main Results -- 6.4 Proof of Main Results -- 6.5 Conclusion -- References -- Chapter 7 On Some Important Inequalities -- 7.1 Concepts of Affinity and Convexity -- 7.1.1 Affine and Convex Sets and Functions -- 7.1.2 Effect of Affine and Convex Combinations in R[sup(n)] -- 7.1.3 Coefficients of Affine and Convex Combinations -- 7.1.4 Support and Secant Hyperplanes -- 7.2 The Jensen Inequality…”
Libro electrónico -
2568Publicado 2022Tabla de Contenidos: “…Distributions for count vectors -- 2.2. Regression models and Bayesian inference -- 2.3. …”
Libro electrónico -
2569Publicado 2017Tabla de Contenidos: “…6.4.3 Operation of the Three-Phase Full-Bridge Inverter With Sinusoidal Pulse Width Modulation Control Technique -- Solution -- 6.5 Multilevel Voltage Source Inverters -- 6.5.1 Neutral Point Diode Clamped Multilevel Inverters -- 6.5.2 Flying Capacitors Multilevel Inverters -- Solution -- 6.5.3 Cascaded H-bridge Multilevel Inverters -- 6.5.4 Modular Multilevel Converter -- 6.5.5 Application of Sinusoidal Pulse Width Modulation Control Technique to Multilevel Inverters -- 6.5.5.1 Application of PD-SPWM Control Technique to Five-Level NPDCMI and FCMIs -- 6.5.5.2 Application of APOD-SPWM Control Technique to Five-Level DCMI and FCMI -- 6.5.5.3 PSC-SPWM Control Technique Applied to a Single-Phase Five-Level CHBMI -- 6.5.6 Comparison Between the Conventional and Multilevel Inverters -- 6.6 Current Source Inverters -- 6.6.1 Operation of a Three-Phase CSI Based on Quasi Square-Wave Output Line Currents -- 6.6.2 Operation of Single-Phase Forced Commutated Current Source Inverter -- Mode I (Fig. 6.102(c)) -- Mode II (Fig. 6.102(d)) -- Mode III -- 6.7 Selected Harmonic Elimination Technique and SHE-PWM -- 6.7.1 SHE Technique Applied to the Inverter Output Voltage Without PWM -- 6.7.1.1 SHE-PWM Technique Applied to Two-Level Output Voltage -- Solution -- 6.7.1.2 Selected Harmonic Elimination Applied to a Three-Level Output Voltage -- 6.7.1.3 SHE-PWM Technique Applied to a Three-Level Output Voltage -- 6.7.1.4 SHE-PWM Technique With 60° Modulation (Modified SHE Technique) -- 6.8 Other Pulse Width Modulation Techniques -- 6.8.1 Trapezoidal Pulse Width Modulation -- 6.8.2 Harmonic Injection Pulse Width Modulation -- 6.8.3 Multiple Pulses Pulse Width Modulation and Staircase Pulse Width Modulation -- 6.8.4 60°-Pulse Width Modulation -- 6.8.5 Hysteresis Band Current Controlled Pulse Width Modulation -- 6.8.6 Space Vector Pulse Width Modulation…”
Libro electrónico -
2570Publicado 2017Tabla de Contenidos: “…Source images and the point spread function -- 12.2.4. Steering vectors -- 12.2.5. Signal-to-noise ratio -- 12.2.6. …”
Libro electrónico -
2571Publicado 2010Tabla de Contenidos: “…4.4.4 Handovers between GSM and 3G -- 4.5 Network Domain Security -- 4.5.1 Generic Security Domain Framework -- 4.5.2 Security Mechanisms for NDS -- 4.5.3 Application of NDS -- 5 3G-WLAN Interworking -- 5.1 Principles of 3G-WLAN Interworking -- 5.1.1 The General Idea -- 5.1.2 The EAP Framework -- 5.1.3 Overview of EAP-AKA -- 5.2 Security Mechanisms of 3G-WLAN Interworking -- 5.2.1 Reference Model for 3G-WLAN Interworking -- 5.2.2 Security Mechanisms of WLAN Direct IP Access -- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access -- 5.3 Cryptographic Algorithms for 3G-WLAN Interworking -- 6 EPS Security Architecture -- 6.1 Overview and Relevant Specifications -- 6.1.1 Need for Security Standardization -- 6.1.2 Relevant Non-security Specifications -- 6.1.3 Security Specifications for EPS -- 6.2 Requirements and Features of EPS Security -- 6.2.1 Threats against EPS -- 6.2.2 EPS Security Features -- 6.2.3 How the Features Meet the Requirements -- 6.3 Design Decisions for EPS Security -- 6.4 Platform Security for Base Stations -- 6.4.1 General Security Considerations -- 6.4.2 Specification of Platform Security -- 6.4.3 Exposed Position and Threats -- 6.4.4 Security Requirements -- 7 EPS Authentication and Key Agreement -- 7.1 Identification -- 7.1.1 User Identity Confidentiality -- 7.1.2 Terminal Identity Confidentiality -- 7.2 The EPS Authentication and Key Agreement Procedure -- 7.2.1 Goals and Prerequisites of EPS AKA -- 7.2.2 Distribution of EPS Authentication Vectors from HSS to MME -- 7.2.3 Mutual Authentication and Establishment of a Shared Key Between the Serving Network and the UE -- 7.2.4 Distribution of Authentication Data Inside and Between Serving Networks -- 7.3 Key Hierarchy -- 7.3.1 Key Derivations -- 7.3.2 Purpose of the Keys in the Hierarchy -- 7.3.3 Cryptographic Key Separation -- 7.3.4 Key Renewal -- 7.4 Security Contexts…”
Libro electrónico -
2572Publicado 2022Tabla de Contenidos: “…Viruses -- 8.2. Spreading vectors -- 8.3. Human immunodeficiency viruses -- 8.4. …”
Libro electrónico -
2573
-
2574por Johnson, Dallas E., 1938-“…Recoge: Métodos multivariables aplicados; Correlaciones de muestras; Gráficas de datos multivariados; Eigenvalores y eigenvectores; Análisis de componentes principales, de factores y discriminante; Métodos de regresión logística; Matrices de varianza-covarianza y vectores media…”
Publicado 2000
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada)Libro -
2575Publicado 2019“…Recently, viruses transmitted by vectors (arboviruses) that affect not only people living in the tropics, but also travelers and migrating populations, have been causing epidemics. …”
Libro electrónico -
2576Publicado 2013“…Este libro intenta cubrir todos los vectores del comercio español en los siglos XVII y XVIII, cuya suma compuso un complejo sistema mercantil capaz de desentenderse de todo tipo de fronteras y de superar todo tipo de geografías…”
Texto completo en Odilo
Otros -
2577Publicado 2011“…Assuming a minimal prerequisite understanding of vectors and matrices, it also provides sufficient mathematical background for game developers to combine their previous experience in graphics API and shader programming with the background theory of computer graphics…”
Libro electrónico -
2578Publicado 2011Tabla de Contenidos: “…16.2.3 The HSV Color Model / 398 -- 16.2.4 The YIQ (NTSC) Color Model / 401 -- 16.2.5 The YCbCr Color Model / 401 -- 16.3 Representation of Color Images in MATLAB / 401 -- 16.3.1 RGB Images / 402 -- 16.3.2 Indexed Images / 403 -- 16.4 Pseudocolor Image Processing / 406 -- 16.4.1 Intensity Slicing / 406 -- 16.4.2 Gray Level to Color Transformations / 407 -- 16.4.3 Pseudocoloring in the Frequency Domain / 408 -- 16.5 Full-color Image Processing / 409 -- 16.5.1 Color Transformations / 410 -- 16.5.2 Histogram Processing / 412 -- 16.5.3 Color Image Smoothing and Sharpening / 412 -- 16.5.4 Color Noise Reduction / 414 -- 16.5.5 Color-Based Image Segmentation / 414 -- 16.5.6 Color Edge Detection / 417 -- 16.6 Tutorial 16.1: Pseudocolor Image Processing / 419 -- 16.7 Tutorial 16.2: Full-color Image Processing / 420 -- 16.8 Problems / 425 -- 17 IMAGE COMPRESSION AND CODING 427 -- 17.1 Introduction / 427 -- 17.2 Basic Concepts / 428 -- 17.2.1 Redundancy / 428 -- 17.2.2 Image Encoding and Decoding Model / 431 -- 17.3 Lossless and Lossy Compression Techniques / 432 -- 17.3.1 Lossless Compression Techniques / 432 -- 17.3.2 Lossy Compression Techniques / 433 -- 17.4 Image Compression Standards / 435 -- 17.4.1 Binary Image Compression Standards / 435 -- 17.4.2 Continuous Tone Still Image Compression Standards / 435 -- 17.4.3 JPEG / 436 -- 17.4.4 JPEG 2000 / 437 -- 17.4.5 JPEG-LS / 437 -- 17.5 Image Quality Measures / 438 -- 17.5.1 Subjective Quality Measurement / 438 -- 17.5.2 Objective Quality Measurement / 439 -- 17.6 Tutorial 17.1: Image Compression / 440 -- 18 FEATURE EXTRACTION AND REPRESENTATION 447 -- 18.1 Introduction / 447 -- 18.2 Feature Vectors and Vector Spaces / 448 -- 18.2.1 Invariance and Robustness / 449 -- 18.3 Binary Object Features / 450 -- 18.3.1 Area / 450 -- 18.3.2 Centroid / 450 -- 18.3.3 Axis of Least Second Moment / 451 -- 18.3.4 Projections / 451 -- 18.3.5 Euler Number / 452 -- 18.3.6 Perimeter / 453 -- 18.3.7 Thinness Ratio / 453 -- 18.3.8 Eccentricity / 454.…”
Libro electrónico -
2579Publicado 2017“…Internationalisation is one of the driving vectors behind all universities, the crucial element that allows them to be in constant dialogue with other institutions around the world, to stay at the cutting edge of knowledge, to recruit talent and to transmit knowledge…”
Texto completo en Odilo
Otros -
2580Publicado 2014Tabla de Contenidos: “…Basic principles of DFIM 270 -- 10.2 Vector Control of DFIM Using an AC/DC/AC Converter 280 -- 10.3 DFIM-Based Wind Energy Conversion Systems 305 -- References 317 -- 11 AC / DC / AC Converters for Distributed Power Generation Systems 319 -- 11.1 Introduction 319 -- 11.2 Pulse-Width Modulation for AC / DC / AC Topologies 328.…”
Libro electrónico