Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
2601por Clotet Ballús, Ramón“…La economía, las políticas, la disponibilidad y la accesibilidad, el conocimiento, el comportamiento y la cultura son los vectores matrices de este sistema fractal…”
Publicado 2016
Acceso al texto completo en Aranzadi
Libro -
2602por Wyler, Neil R.“…This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin…”
Publicado 2005
Libro electrónico -
2603Publicado 2014“…You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that…”
Libro electrónico -
2604Publicado 2022“…Their biology, forms of management, interaction with hosts as transmitting vectors, and even their phytochemistry and medicinal uses are analyzed. …”
Libro electrónico -
2605Publicado 2018“…We will explore many modern methods ranging from spaCy to word vectors that have reinvented NLP. The book takes you from the basics of NLP to building text processing applications. …”
Libro electrónico -
2606por Adler, Matthew D.“…The framework has three components: an interpersonally comparable measure of well-being, which functions to translate outcomes into lists ("vectors") of well-being numbers, one for each person in the population; a rule (the SWF) for ranking well-being vectors, such as the utilitarian SWF (which simply adds up well-being numbers), a continuous-prioritarian SWF (which gives greater weight to the worse off), or some other; and a procedure for ranking policies, understood as probability distributions across outcomes. …”
Publicado 2019
Libro -
2607Publicado 2019“…Finally, you will see how vectors and quaternions interact to create complex motion and rotation in 3D space. …”
-
2608por Dhanjani, Nitesh“…For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social netw…”
Publicado 2009
Libro electrónico -
2609Publicado 2005“…Easy-to-browse format lets you find and apply information instantly and includes many tips and techniques that focus on Illustrator CS2’s new features: Converting bitmaps into vectors with Live Trace, Painting with the new Live Paint tool, creating Custom Workspaces, and more…”
Libro electrónico -
2610por Heiderich, Mario“… Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
Publicado 2011
Libro electrónico -
2611por Patil, Harsh Kupwade“…Next, it examines new attack vectors that exploit the layered approach to security.After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. …”
Publicado 2013
Libro electrónico -
2612Publicado 2021“…It is known today that more than 61% of human pathogens are zoonotic, representing 75% of all emerging pathogens during the past decade, presenting an increasing a matter of concern, particularly in modern days where global warming keeps is causing climatic conditions conducive to the introduction of exotic infectious agents or disease vectors in new territories. This book compiles studies that approach a myriad of zoonotic infectious diseases and their complex mechanisms. …”
Libro electrónico -
2613Publicado 2022“…Their importance as agricultural pests and disease vectors, and their management using various conventional and advanced tools is examined. …”
Libro electrónico -
2614Publicado 2022“…This tautology between rat and plague is articulated in a context of framing an expanding range of nonhuman animals as hosts or vectors of infectious diseases such as influenza, Ebola, severe acute respiratory syndrome (SARS), and COVID- 19.…”
Revista digital -
2615por Andress, Jason“…Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the thre…”
Publicado 2014
Libro electrónico -
2616por Andress, Jason“…Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the…”
Publicado 2011
Libro electrónico -
2617Publicado 2018Tabla de Contenidos: “…APRENDIZAJE SUPERVISADO -- 3.2.1.1 ÁRBOL DE DECISIONES -- 3.2.1.2 CLASIFICADORES LINEALES -- 3.2.1.2.1 MÁQUINAS DE VECTORES DE SOPORTE (SVM) -- 3.2.1.3 CLASIFICADORES BASADOS EN REGLAS -- 3.2.1.1 CLASIFICADORES PROBABILÍSTICOS -- 3.2.1.1.1 NAIVE BAYES -- 3.2.1.1.2 REDES BAYESIANAS -- 3.2.1.1.3 CLASIFICADOR DE ENTROPÍA MÁXIMA -- 3.2.2 APRENDIZAJE NO SUPERVISADO -- 3.2.3 APRENDIZAJE SEMISUPERVISADO -- 3.3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2618Publicado 2012Tabla de Contenidos: “…Control methods for induction motors and PMSM 9.1.1. V/f control 9.1.2. Vector control 9.1.3. DTC 9.2. Energy optimal control methods 9.2.1. …”
Libro electrónico -
2619Publicado 2022Tabla de Contenidos: “…Cerf -- Chapter 5: The Network Layer: Control Plane -- 5.1 Introduction -- 5.2 Routing Algorithms -- 5.2.1 The Link-State (LS) Routing Algorithm -- 5.2.2 The Distance-Vector (DV) Routing Algorithm -- 5.3 Intra-AS Routing in the Internet: OSPF -- 5.4 Routing Among the ISPs: BGP -- 5.4.1 The Role of BGP -- 5.4.2 Advertising BGP Route Information -- 5.4.3 Determining the Best Routes -- 5.4.4 IP-Anycast -- 5.4.5 Routing Policy -- 5.4.6 Putting the Pieces Together: Obtaining Internet Presence -- 5.5 The SDN Control Plane -- 5.5.1 The SDN Control Plane: SDN Controller and SDN Network-control Applications -- 5.5.2 OpenFlow Protocol -- 5.5.3 Data and Control Plane Interaction: An Example -- 5.5.4 SDN: Past and Future -- 5.6 ICMP: The Internet Control Message Protocol -- 5.7 Network Management and SNMP, NETCONF/YANG -- 5.7.1 The Network Management Framework…”
Libro electrónico -
2620Publicado 2022Tabla de Contenidos: “…9.2 Medical Imaging Techniques -- 9.2.1 X-Ray Images -- 9.2.2 Computer Tomography Imaging -- 9.2.3 Magnetic Resonance Images -- 9.2.4 Positron Emission Tomography -- 9.2.5 Ultrasound Imaging Techniques -- 9.3 Image Denoising -- 9.3.1 Impulse Noise and Speckle Noise Denoising -- 9.4 Optimization in Image Denoising -- 9.4.1 Particle Swarm Optimization -- 9.4.2 Adaptive Center Pixel Weighted Median Exponential Filter -- 9.4.3 Hybrid Wiener Filter -- 9.4.4 Removal of Noise in Medical Images Using Particle Swarm Optimization -- 9.4.4.1 Curvelet Transform -- 9.4.4.2 PSO With Curvelet Transform and Hybrid Wiener Filter -- 9.4.5 DFOA-Based Curvelet Transform and Hybrid Wiener Filter -- 9.4.5.1 Dragon Fly Optimization Algorithm -- 9.4.5.2 DFOA-Based HWACWMF -- 9.5 Results and Discussions -- 9.5.1 Simulation Results -- 9.5.2 Performance Metric Analysis -- 9.5.3 Summary -- 9.6 Conclusion and Future Scope -- References -- 10 Performance Analysis of Nature-Inspired Algorithms in Breast Cancer Diagnosis -- 10.1 Introduction -- 10.1.1 NIC Algorithms -- 10.2 Related Works -- 10.3 Dataset: Wisconsin Breast Cancer Dataset (WBCD) -- 10.4 Ten-Fold Cross-Validation -- 10.4.1 Training Data -- 10.4.2 Validation Data -- 10.4.3 Test Data -- 10.4.4 Pseudocode -- 10.4.5 Advantages of K-Fold or 10-Fold Cross-Validation -- 10.5 Naive Bayesian Classifier -- 10.5.1 Pseudocode of Naive Bayesian Classifier -- 10.5.2 Advantages of Naive Bayesian Classifier -- 10.6 K-Means Clustering -- 10.7 Support Vector Machine (SVM) -- 10.8 Swarm Intelligence Algorithms -- 10.8.1 Particle Swarm Optimization -- 10.8.2 Firefly Algorithm -- 10.8.3 Ant Colony Optimization -- 10.9 Evaluation Metrics -- 10.10 Results and Discussion -- 10.11 Conclusion -- References -- 11 Applications of Cuckoo Search Algorithm for Optimization Problems -- 11.1 Introduction -- 11.2 Related Works…”
Libro electrónico