Mostrando 2,621 - 2,640 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.10s Limitar resultados
  1. 2621
    por Banerjee, Chandan
    Publicado 2024
    Tabla de Contenidos: “…6.7.3 Data Transformation -- 6.8 Output Data -- 6.9 Design &amp -- Implementation -- 6.9.1 Integration Design -- 6.9.2 High-Level Process Flow -- 6.9.3 Solution Flow -- 6.10 Dashboard Development -- 6.10.1 Landing Page -- 6.10.2 Approach and Design -- 6.10.3 Helpline Information -- 6.10.3.1 Approach and Design -- 6.10.4 Symptom Detection -- 6.10.4.1 Approach and Design -- 6.10.5 Testing Lab Information -- 6.10.5.1 Approach and Design -- 6.10.6 Hospital Information -- 6.10.6.1 Approach and Design -- 6.10.7 Oxygen Suppliers Information -- 6.10.7.1 Approach and Design -- 6.10.8 COVID Cases Information -- 6.10.8.1 Approach and Design -- 6.10.9 Vaccination Information -- 6.10.9.1 Approach and Design -- 6.10.10 Patients' Information -- 6.10.10.1 Approach and Design -- 6.11 Advantages and its Impact -- 6.12 Conclusion and Future Scope -- References -- Chapter 7 A Complete Study on Machine Learning Algorithms for Medical Data Analysis -- 7.1 Introduction -- 7.1.1 Importance of Machine Learning Algorithms in Medical Data Analysis -- 7.2 Pre-Processing Medical Data for Machine Learning -- 7.3 Supervised Learning Algorithms for Medical Data Analysis -- 7.3.1 Linear Regression Algorithm -- 7.3.2 Logistic Regression Algorithm -- 7.3.3 Decision Trees Algorithm -- 7.3.3.1 Advantages of Decision Tree Algorithm -- 7.3.3.2 Limitations of Decision Tree Algorithm -- 7.3.4 Random Forest Algorithm -- 7.3.4.1 Advantages of Random Forest Algorithm -- 7.3.4.2 Limitations of Random Forest Algorithm -- 7.3.4.3 Applications of Random Forest Algorithm in Medical Data Analysis -- 7.3.5 Support Vector Machine Algorithm -- 7.3.5.1 Advantages of SVM Algorithm -- 7.3.5.2 Limitations of SVM Algorithm -- 7.3.5.3 Applications of SVM Algorithm in Medical Data Analysis -- 7.3.6 Naive Bayes Algorithm -- 7.3.7 KNN (K-Nearest Neighbor Algorithm) -- 7.3.7.1 Applications of K-NN Algorithm…”
    Libro electrónico
  2. 2622
    Publicado 2013
    Tabla de Contenidos: “…4.4.6 BOR constraints for non-singular expressions -- 4.4.7 Cause-effect graphs and predicate testing -- 4.4.8 Fault propagation -- 4.4.9 Predicate testing in practice -- 4.5 Tests Using Basis Paths -- 4.6 Scenarios and Tests -- Summary -- Exercises -- Chapter 5: Test Generation from Finite State Models -- 5.1 Software Design and Testing -- 5.2 Finite State Machines -- 5.2.1 Excitation using an input sequence -- 5.2.2 Tabular representation -- 5.2.3 Properties of FSM -- 5.3 Conformance Testing -- 5.3.1 Reset inputs -- 5.3.2 The testing problem -- 5.4 A Fault Model -- 5.4.1 Mutants of FSMs -- 5.4.2 Fault coverage -- 5.5 Characterization Set -- 5.5.1 Construction of the k-equivalence partitions -- 5.5.2 Deriving the characterization set -- 5.5.3 Identification sets -- 5.6 The W-method -- 5.6.1 Assumptions -- 5.6.2 Maximum number of states -- 5.6.3 Computation of the transition cover set -- 5.6.4 Constructing Z -- 5.6.5 Deriving a test set -- 5.6.6 Testing using the W-method -- 5.6.7 The error detection process -- 5.7 The Partial W-method -- 5.7.1 Testing using the Wp-method for m - n -- 5.7.2 Testing using the Wp-method for m>n -- 5.8 The UIO-Sequence Method -- 5.8.1 Assumptions -- 5.8.2 UIO sequences -- 5.8.3 Core and non-core behavior -- 5.8.4 Generation of UIO sequences -- 5.8.5 Explanation of gen-uio -- 5.8.6 Distinguishing signatures -- 5.8.7 Test generation -- 5.8.8 Test optimization -- 5.8.9 Fault detection -- 5.9 Automata Theoretic Versus Control-Flow Based Techniques -- 5.9.1 n-switch-cover -- 5.9.2 Comparing automata theoretic methods -- 5.10 Tools -- Summary -- Exercises -- Chapter 6: Test Generation from Combinatorial Designs -- 6.1 Combinatorial Designs -- 6.1.1 Test configuration and test set -- 6.1.2 Modeling the input and configuration spaces -- 6.2 A Combinatorial Test Design Process -- 6.3 Fault Model -- 6.3.1 Fault vectors…”
    Libro electrónico
  3. 2623
    Publicado 2024
    Tabla de Contenidos: “…3.2.2 Differential privacy -- 3.3 DP guaranteed algorithms -- 3.3.1 Sample-level DP -- 3.3.1.1 Algorithms and discussion -- 3.3.2 Client-level DP -- 3.3.2.1 Clipping strategies for client-level DP -- 3.3.2.2 Algorithms and discussion -- 3.4 Performance of clip-enabled DP-FedAvg -- 3.4.1 Main results -- 3.4.1.1 Convergence theorem -- 3.4.1.2 DP guarantee -- 3.4.2 Experimental evaluation -- 3.5 Conclusion and future work -- References -- 4 Assessing vulnerabilities and securing federated learning -- 4.1 Introduction -- 4.2 Background and vulnerability analysis -- 4.2.1 Definitions and notation -- 4.2.1.1 Horizontal federated learning -- 4.2.1.2 Vertical federated learning -- 4.2.2 Vulnerability analysis -- 4.2.2.1 Clients' updates -- 4.2.2.2 Repeated interaction -- 4.3 Attacks on federated learning -- 4.3.1 Training-time attacks -- 4.3.1.1 Byzantine attacks -- 4.3.1.2 Backdoor attacks -- 4.3.2 Inference-time attacks -- 4.4 Defenses -- 4.4.1 Protecting against training-time attacks -- 4.4.1.1 In Situ defenses -- 4.4.1.2 Post Facto defenses -- 4.4.2 Protecting against inference-time attacks -- 4.5 Takeaways and future work -- References -- 5 Adversarial robustness in federated learning -- 5.1 Introduction -- 5.2 Attack in federated learning -- 5.2.1 Targeted data poisoning attack -- 5.2.1.1 Label flipping -- 5.2.1.2 Backdoor -- 5.2.1.2.1 Trigger-based backdoor -- 5.2.1.2.2 Semantic backdoor -- 5.2.2 Untargeted model poisoning attack -- 5.3 Defense in federated learning -- 5.3.1 Vector-wise defense -- 5.3.2 Dimension-wise defense -- 5.3.3 Certification -- 5.3.4 Personalization -- 5.3.5 Differential privacy -- 5.3.6 The gap between distributed training and federated learning -- 5.3.7 Open problems and further work -- 5.4 Conclusion -- References -- 6 Evaluating gradient inversion attacks and defenses -- 6.1 Introduction -- 6.2 Gradient inversion attacks…”
    Libro electrónico
  4. 2624
    por Mathur, Aditya P.
    Publicado 2010
    Tabla de Contenidos: “…4.2 A Combinatorial Test-Design Process -- 4.3 Fault Model -- 4.3.1. Fault vectors -- 4.4 Latin Squares -- 4.5 Mutually Orthogonal Latin Squares -- 4.6 Pairwise Design: Binary Factors -- 4.7 Pairwise Design: Multivalued Factors -- 4.7.1. …”
    Libro electrónico
  5. 2625
    por K., Bhattacharya S.
    Publicado 2015
    Tabla de Contenidos: “…Steady State Analysis of AC Circuits -- 3.1 AC Voltage Applied Across a Resistor -- 3.2 AC Voltage Applied Across an Inductor -- 3.3 AC Voltage Applied Across a Capacitor -- 3.4 R-L Series Circuit -- 3.5 Apparent Power, Real Power and Reactive Power -- 3.6 Power in R-L Series Circuit -- 3.7 Power Triangle of R-L Series Circuit -- 3.8 R-C Series Circuit -- 3.8.1 Power and Power Triangle of R-C Series Circuit -- 3.9 R-L-C Series Circuit -- 3.10 AC Parallel Circuits -- 3.10.1 Phasor or Vector Method of Solving Circuit Problems -- 3.10.2 Admittance Method of Solving Circuit Problems…”
    Libro electrónico
  6. 2626
    por Ghoshal, Subrata
    Publicado 2014
    Tabla de Contenidos: “…10.4.3 CPL Instruction -- 10.5 Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Chapter 11 : Programming Examples-II -- Chapter Objectives -- 11.1 Introduction -- 11.2 Count 1s in a Byte -- 11.3 Unpack a BCD Number -- 11.4 Pack BCD Digits -- 11.5 Pack Array of Unpacked BCD Digits -- 11.6 Find Largest and Smallest Integers of an Array -- 11.7 Bubble Sorting -- 11.8 Find the Sum of Factorials -- 11.9 Sort Out Numbers Divisible by 4 -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Chapter 12 : Advanced Instructions -- Chapter Objectives -- 12.1 Introduction -- 12.2 MOVC Instruction -- 12.3 MOVX Instruction -- 12.4 XCH Instruction -- 12.5 XCHD Instruction -- 12.6 MUL Instruction -- 12.7 DIV Instruction -- 12.8 DA A Instruction -- 12.9 JMP Instruction -- 12.10 SWAP Instruction -- 12.11 JBC Instruction -- 12.12 RETI Instruction -- 12.13 Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Chapter 13 : Programming Examples-III -- Chapter Objectives -- 13.1 Compare with External Array -- 13.2 Find Sum of a Series -- 13.3 Reverse an Array -- 13.4 HEX to BCD Conversion -- 13.5 Update Clock Display -- 13.6 Display Shift for Right Entry -- 13.7 Count Number of Words -- 13.8 Generate Prime Numbers -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Chapter 14 : External Interrupts -- Chapter Objectives -- 14.1 Introduction -- 14.1.1 What is an Interrupt? -- 14.1.2 Vectored Interrupt -- 14.2 External Interrupts of 8051 -- 14.3 SFRs for External Interrupt -- 14.3.1 TCON (bits 0, 1, 2 and 3) -- 14.3.2 IE (bits 0, 2 and 7) -- 14.3.3 IP (bits 0 and 2)…”
    Libro electrónico
  7. 2627
    por Rahman, Rezaur
    Publicado 2013
    “…From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel…”
    Libro
  8. 2628
    por Varios autores
    Publicado 2014
    “…The goal of this volume is re-inventing territories and exploring possibilities of vectors such identity, culture and new territorial government/governance practices.…”
    Texto completo en Odilo
    Otros
  9. 2629
    Publicado 2019
    “…In parallel, in geometric mechanics, Jean-Marie Souriau interpreted the temperature vector of Planck as a space-time vector, obtaining, in this way, a phenomenological model of continuous media, which presents some interesting properties. …”
    Libro electrónico
  10. 2630
    Publicado 2021
    “…Foci and vectors of communicable diseases are testing the efficacy of medical control at state borders. …”
    Libro electrónico
  11. 2631
    Publicado 2022
    “…Topics Covered Include: 00:00 Introduction 00:16 End of Moore's Law 01:15 What is a TPU and ASIC 02:25 How a GPU works 03:05 Enabling GPU in Colab Notebook 04:16 Using Python Numba 05:40 Building Mandlebrots with and without GPU and Numba 07:49 CUDA Vectorize Functions 08:27 Copy Data to GPU Memory Learning Objectives Learn about the End of Moore's Law and ASICs Learn to compare the performance of GPUs and TPUs, and JIT compilers Build your own vectorized functions with Numba and CUDA to speed up your code with GPUs Additional Popular Resources Pytest Master Class AWS Solutions Architect Professional Course Github Actions and GitOps in One Hour Video Course Jenkins CI/CD and Github in One Hour Video Course AWS Certified Cloud Practitioner Video Course Advanced Testing with Pytest Video Course AWS Solutions Architect Certification In ONE HOUR Python for DevOps Master Class 2022: CI/CD, Github Actions, Containers, and Microservices MLOPs Foundations: Chapter 2 Walkthrough of Practical MLOps Learn Docker containers in One Hour Video Course Introduction to MLOps Walkthrough AZ-900 (Azure Fundamentals) Quick reference guide 52 Weeks of AWS Episode 8: Infrastructure as Code with CDK and AWS Lambda Learn GCP Cloud Functions in One Hour Video Course Python Devops in TWO HOURS! …”
    Video
  12. 2632
    “…This report considers how the growing interconnectedness in the global economy could create the conditions and vectors for rapid and widespread disruptions. It looks at examples of hazards and threats that emerge from the financial world, cyberspace, biological systems and even the solar system, to reflect on what strategic capacities are called for to improve assessment, mapping, modelling, response and resilience to such large scale risks."…”
    Libro electrónico
  13. 2633
    por Cherry, Denny
    Publicado 2012
    “…In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. …”
    Libro electrónico
  14. 2634
    Publicado 2021
    “…It covers areas ranging from the sustainable use of natural resources linked to energy transition, to the study of various energy vectors which support decarbonization, energy conversion devices, energy storage processes and devices, complex coupled systems as well as interconnected smart grids"--Aim and scope (provider website, viewed June 12, 2023)…”
    Revista digital
  15. 2635
    Publicado 2015
    “…Además, contiene una unidad para iniciar al alumno en el estudio de la suma de Vectores con el método del triángulo, y con el principio de equilibrio de una partícula…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  16. 2636
    por Cherry, Denny
    Publicado 2011
    “…In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. …”
    Libro electrónico
  17. 2637
    Publicado 2016
    “…Section 1 covers different aspects of insecticide resistance of selected economically important plant insect pests, whereas section 2 includes chapters about the importance, development and insecticide resistance management in controlling malaria vectors. Section 3 is dedicated to some general questions in insecticide resistance, while the main topic of section 4 is biochemical approaches of insecticide resistance mechanisms. …”
    Libro electrónico
  18. 2638
    Publicado 2022
    “…You will also learn various chart/graph types, customization/configuration, and vectorization techniques. We will look at advanced visualizations using business applications such as single and multiple bar charts, pie charts, and bubble charts with the vectorization of properties. …”
    Video
  19. 2639
    Publicado 2010
    “…1 3D Overview 2 Basic 3D Math 4 Right-Hand Rule 4 Working with Matrices 5 Identity, Scale, Rotate, Orbit, Translate (ISROT) 6 Working with Vectors 7 Unit Vectors 10 Working with Quaternions 12 Controlling the Camera 13 Basic Camera 13 Follow Camera 19 ViewPorts 20 BoundingFrustum 22 3D Models 23 Modeling Programs and Formats 23 Loading a Model 24 Collision Detection 27 Skeletal Animations 29 Extending the Content Pipeline 29 Manipulating Bones at Run Time 31 Using Model Animations 36 About Michael C. …”
    Libro electrónico
  20. 2640
    Publicado 2017
    “…Coverage Includes Data and networking transport Lower- and higher-level transports and interlayer discovery Packet switching Quality of Service (QoS) Virtualized networks and services Network topology discovery Unicast loop free routing Reacting to topology changes Distance vector control planes, link state, and path vector control Control plane policies and centralization Failure domains Securing networks and transport Network design patterns Redundancy and resiliency Troubleshooting Network disaggregation Automating network management Cloud computing Networking the Internet of Things (IoT) Emerging trends and technologies…”
    Libro electrónico