Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
2741Publicado 2023“…Indications from the steel industry and local and global government institutions suggest that the breakthrough technologies for decarbonization will be based on new fuels and energy vectors. For CO2-lean process routes, three major solutions have been identified: decarbonizing, whereby coal would be replaced by hydrogen or electricity in the hydrogen reduction or electrolysis of iron ore processes; the introduction of CCS technology; and the use of sustainable biomass. …”
Libro electrónico -
2742Publicado 2014“…Each chapter in the volume helps illuminate early modern religious culture from the perspective of the production of illustrated religious texts - to see the book as object, a point at which various vectors of early modern society met. Case studies, together with theoretical contributions, shed light on the ways in which illustrated religious books functioned in evolving societies, by analysing the use, re-use and sharing of illustrated religious texts in England, France, the Low Countries, the German States, and Switzerland. …”
Libro -
2743Publicado 2016“…In addition to fundamental physiological, ecological and evolutionary consideration, the knowledge of insect taste and especially olfaction is also of great importance to human economies, since it facilitates a more informed approach to the management of insect pests of agricultural crops and forests, and insect vectors of disease. Chemoreceptors, which bind to external chemical signals and then transform and send the sensory information to the brain, are at the core of the peripheral olfactory and gustatory system and have thus been the focus of recent research in chemical ecology. …”
Libro electrónico -
2744Publicado 2017“…Explore the advantages of vectorization in Deep Learning. Get a better understanding of the architecture of a rule-based system. …”
Libro electrónico -
2745Publicado 2024“…As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. …”
Video -
2746por Trost, Ryan“…Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. …”
Publicado 2009
Libro electrónico -
2747Publicado 2020“…The authors highlighted the importance of performing an integrated design of the district, considering different sectors, different energy vectors and different operation modes. In order to better integrate renewable and residual energy sources (R2ES), careful design of systems and storage solutions should be performed. …”
Libro electrónico -
2748Publicado 2024“…El coll d'ampolla més notable és la falta d'especificitat en els vectors actuals per a la transfecció de cèl·lules presentadores d'antígens (CPA). …”
Accés lliure
Tesis -
2749Publicado 2018“…You will examine the theory and implementation behind the supervised machine learning techniques most relevant to security, including random forest, support vector machines, and more. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. …”
Video -
2750por Álvarez Lacalle, Enrique“…Des de les regles de tres fins a les integrals i els vectors. L'esperança és que la història t'ajudi a recordar... i a enfocar. …”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Accés lliure
Libro electrónico -
2751Observatorio de los contratos públicos 2016. Sistema de control de la contratación Pública en Españapor Gimeno Feliu, Jose María“…El correcto funcionamiento de la contratación pública con objetivos de política pública como vectores de su concreto diseño exige la existencia de mecanismos de control efectivos y rápidos por autoridades independientes ya sean judiciales, o mediante «arbitrajes administrativos» independientes y con estatus de juez (así lo exige la Directiva «recursos»). …”
Publicado 2016
Acceso al texto completo en Aranzadi
Libro -
2752por Bahamonde Delgado, Rubén“…La obra se inicia con un análisis comparado del Derecho de la Competencia nacional y de la Unión identificando sus principales vectores de actuación. A continuación, se abordan específicamente las prácticas colusorias, por consubstanciar el comportamiento anticompetitivo más relevante en el dominio de la aplicación de esta área del derecho, debido a sus potenciales efectos nocivos y a la dificultad de su detección. …”
Publicado 2016
Acceso al texto completo en Aranzadi
Libro -
2753Publicado 2017“…Explore the machine learning landscape, particularly neural nets Use scikit-learn to track an example machine-learning project end-to-end Explore several training models, including support vector machines, decision trees, random forests, and ensemble methods Use the TensorFlow library to build and train neural nets Dive into neural net architectures, including convolutional nets, recurrent nets, and deep reinforcement learning Learn techniques for training and scaling deep neural nets Apply practical code examples without acquiring excessive machine learning theory or algorithm details…”
Libro electrónico -
2754Publicado 2016“…People interested in data science need to learn how to implement k-means and bottom-up hierarchical clustering algorithms Prerequisites Some experience writing code in Python Experience working with data in vector or matrix format Materials or downloads needed in advance Download this code , where you'll find this lesson's code in Chapter 19, plus you'll need the linear_algebra functions from Chapter 4. …”
Libro electrónico -
2755Publicado 2021“…This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the potential to transform the lives of people around the world by improving mission-critical services that affect the safety and security of different services. 5G is susceptible to many of the cybersecurity risks found in today's existing telecom networks but also to new avenues of attack against core network services due to its complex ecosystem of technologies, stakeholders and operations, which include containerized networks, multi-access edge compute (MEC) deployments, services-based architecture, introduction of API interfaces and new use cases catering to enterprise, industrial, health and IoT services. …”
Libro electrónico -
2756Publicado 2015“…Review machine learning concepts such as fitting a model to data Learn core concepts behind large scale algorithms like stochastic gradient descent Review the architectures used in Hadoop-based systems and data flow systems Explore resilient distributed dataset structures, vectors, and matrices using Spark Review Sparks’s machine libraries and how to run basic machine learning tasks Understand the use of approximation in optimization and compressing feature spaces Learn what makes data “complex” Mikio Braun is a data scientist researcher, a start-up entrepreneur, and the on-going creator of jblas, the open source library for fast linear algebra in Java. …”
-
2757Publicado 2013“…The author then relates the homology of the total space of a fibration to that of the base and the fiber, with applications to characteristic classes and vector bundles. The book concludes with the basic theory of spectral sequences and several applications, including Serre’s seminal work on higher homotopy groups.Thoroughly classroom-tested, this self-contained text takes students all the way to becoming algebraic topologists. …”
Libro electrónico -
2758Publicado 2020“…BOKN will include a hybrid knowledge graph that supports traditional symbolic knowledge representation enhanced by high-dimensional vector space embeddings capturing temporal evolution and semantic relationships that support machine learning applications…”
Libro electrónico -
2759por Kung, S. Y.“…Coverage includes: How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies…”
Publicado 2005
Libro electrónico -
2760Publicado 2017“…You’ll see how to create vectors, handle variables, and perform other core functions. …”