Mostrando 2,601 - 2,620 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.08s Limitar resultados
  1. 2601
    por Clotet Ballús, Ramón
    Publicado 2016
    “…La economía, las políticas, la disponibilidad y la accesibilidad, el conocimiento, el comportamiento y la cultura son los vectores matrices de este sistema fractal…”
    Acceso al texto completo en Aranzadi
    Libro
  2. 2602
    por Wyler, Neil R.
    Publicado 2005
    “…This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin…”
    Libro electrónico
  3. 2603
    Publicado 2014
    “…You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that…”
    Libro electrónico
  4. 2604
    Publicado 2022
    “…Their biology, forms of management, interaction with hosts as transmitting vectors, and even their phytochemistry and medicinal uses are analyzed. …”
    Libro electrónico
  5. 2605
    Publicado 2018
    “…We will explore many modern methods ranging from spaCy to word vectors that have reinvented NLP. The book takes you from the basics of NLP to building text processing applications. …”
    Libro electrónico
  6. 2606
    por Adler, Matthew D.
    Publicado 2019
    “…The framework has three components: an interpersonally comparable measure of well-being, which functions to translate outcomes into lists ("vectors") of well-being numbers, one for each person in the population; a rule (the SWF) for ranking well-being vectors, such as the utilitarian SWF (which simply adds up well-being numbers), a continuous-prioritarian SWF (which gives greater weight to the worse off), or some other; and a procedure for ranking policies, understood as probability distributions across outcomes. …”
    Libro
  7. 2607
    Publicado 2019
    “…Finally, you will see how vectors and quaternions interact to create complex motion and rotation in 3D space. …”
    Video
  8. 2608
    por Dhanjani, Nitesh
    Publicado 2009
    “…For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social netw…”
    Libro electrónico
  9. 2609
    Publicado 2005
    “…Easy-to-browse format lets you find and apply information instantly and includes many tips and techniques that focus on Illustrator CS2’s new features: Converting bitmaps into vectors with Live Trace, Painting with the new Live Paint tool, creating Custom Workspaces, and more…”
    Libro electrónico
  10. 2610
    por Heiderich, Mario
    Publicado 2011
    “… Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
    Libro electrónico
  11. 2611
    por Patil, Harsh Kupwade
    Publicado 2013
    “…Next, it examines new attack vectors that exploit the layered approach to security.After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. …”
    Libro electrónico
  12. 2612
    Publicado 2021
    “…It is known today that more than 61% of human pathogens are zoonotic, representing 75% of all emerging pathogens during the past decade, presenting an increasing a matter of concern, particularly in modern days where global warming keeps is causing climatic conditions conducive to the introduction of exotic infectious agents or disease vectors in new territories. This book compiles studies that approach a myriad of zoonotic infectious diseases and their complex mechanisms. …”
    Libro electrónico
  13. 2613
    Publicado 2022
    “…Their importance as agricultural pests and disease vectors, and their management using various conventional and advanced tools is examined. …”
    Libro electrónico
  14. 2614
    Publicado 2022
    “…This tautology between rat and plague is articulated in a context of framing an expanding range of nonhuman animals as hosts or vectors of infectious diseases such as influenza, Ebola, severe acute respiratory syndrome (SARS), and COVID- 19.…”
    Revista digital
  15. 2615
    por Andress, Jason
    Publicado 2014
    “…Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the thre…”
    Libro electrónico
  16. 2616
    por Andress, Jason
    Publicado 2011
    “…Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the…”
    Libro electrónico
  17. 2617
    Publicado 2018
    Tabla de Contenidos: “…APRENDIZAJE SUPERVISADO -- 3.2.1.1 ÁRBOL DE DECISIONES -- 3.2.1.2 CLASIFICADORES LINEALES -- 3.2.1.2.1 MÁQUINAS DE VECTORES DE SOPORTE (SVM) -- 3.2.1.3 CLASIFICADORES BASADOS EN REGLAS -- 3.2.1.1 CLASIFICADORES PROBABILÍSTICOS -- 3.2.1.1.1 NAIVE BAYES -- 3.2.1.1.2 REDES BAYESIANAS -- 3.2.1.1.3 CLASIFICADOR DE ENTROPÍA MÁXIMA -- 3.2.2 APRENDIZAJE NO SUPERVISADO -- 3.2.3 APRENDIZAJE SEMISUPERVISADO -- 3.3. …”
    Libro electrónico
  18. 2618
    Publicado 2012
    Tabla de Contenidos: “…Control methods for induction motors and PMSM 9.1.1. V/f control 9.1.2. Vector control 9.1.3. DTC 9.2. Energy optimal control methods 9.2.1. …”
    Libro electrónico
  19. 2619
    Publicado 2022
    Tabla de Contenidos: “…Cerf -- Chapter 5: The Network Layer: Control Plane -- 5.1 Introduction -- 5.2 Routing Algorithms -- 5.2.1 The Link-State (LS) Routing Algorithm -- 5.2.2 The Distance-Vector (DV) Routing Algorithm -- 5.3 Intra-AS Routing in the Internet: OSPF -- 5.4 Routing Among the ISPs: BGP -- 5.4.1 The Role of BGP -- 5.4.2 Advertising BGP Route Information -- 5.4.3 Determining the Best Routes -- 5.4.4 IP-Anycast -- 5.4.5 Routing Policy -- 5.4.6 Putting the Pieces Together: Obtaining Internet Presence -- 5.5 The SDN Control Plane -- 5.5.1 The SDN Control Plane: SDN Controller and SDN Network-control Applications -- 5.5.2 OpenFlow Protocol -- 5.5.3 Data and Control Plane Interaction: An Example -- 5.5.4 SDN: Past and Future -- 5.6 ICMP: The Internet Control Message Protocol -- 5.7 Network Management and SNMP, NETCONF/YANG -- 5.7.1 The Network Management Framework…”
    Libro electrónico
  20. 2620
    Publicado 2022
    Tabla de Contenidos: “…9.2 Medical Imaging Techniques -- 9.2.1 X-Ray Images -- 9.2.2 Computer Tomography Imaging -- 9.2.3 Magnetic Resonance Images -- 9.2.4 Positron Emission Tomography -- 9.2.5 Ultrasound Imaging Techniques -- 9.3 Image Denoising -- 9.3.1 Impulse Noise and Speckle Noise Denoising -- 9.4 Optimization in Image Denoising -- 9.4.1 Particle Swarm Optimization -- 9.4.2 Adaptive Center Pixel Weighted Median Exponential Filter -- 9.4.3 Hybrid Wiener Filter -- 9.4.4 Removal of Noise in Medical Images Using Particle Swarm Optimization -- 9.4.4.1 Curvelet Transform -- 9.4.4.2 PSO With Curvelet Transform and Hybrid Wiener Filter -- 9.4.5 DFOA-Based Curvelet Transform and Hybrid Wiener Filter -- 9.4.5.1 Dragon Fly Optimization Algorithm -- 9.4.5.2 DFOA-Based HWACWMF -- 9.5 Results and Discussions -- 9.5.1 Simulation Results -- 9.5.2 Performance Metric Analysis -- 9.5.3 Summary -- 9.6 Conclusion and Future Scope -- References -- 10 Performance Analysis of Nature-Inspired Algorithms in Breast Cancer Diagnosis -- 10.1 Introduction -- 10.1.1 NIC Algorithms -- 10.2 Related Works -- 10.3 Dataset: Wisconsin Breast Cancer Dataset (WBCD) -- 10.4 Ten-Fold Cross-Validation -- 10.4.1 Training Data -- 10.4.2 Validation Data -- 10.4.3 Test Data -- 10.4.4 Pseudocode -- 10.4.5 Advantages of K-Fold or 10-Fold Cross-Validation -- 10.5 Naive Bayesian Classifier -- 10.5.1 Pseudocode of Naive Bayesian Classifier -- 10.5.2 Advantages of Naive Bayesian Classifier -- 10.6 K-Means Clustering -- 10.7 Support Vector Machine (SVM) -- 10.8 Swarm Intelligence Algorithms -- 10.8.1 Particle Swarm Optimization -- 10.8.2 Firefly Algorithm -- 10.8.3 Ant Colony Optimization -- 10.9 Evaluation Metrics -- 10.10 Results and Discussion -- 10.11 Conclusion -- References -- 11 Applications of Cuckoo Search Algorithm for Optimization Problems -- 11.1 Introduction -- 11.2 Related Works…”
    Libro electrónico