Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
2901Publicado 2010“…Se encontró que la expresión temprana de la proteína no estructural P7-2 produce un drástico aumento en la severidad sintomática que no es acompañado por un aumento en la acumulación viral, mientras que la expresión de P7-1 a partir del mismo vector retrasa la infección viral y reduce la severidad sintomática. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
2902por Mongelli, Vanesa Claudia“…Se encontró que la expresión temprana de la proteína no estructural P7-2 produce un drástico aumento en la severidad sintomática que no es acompañado por un aumento en la acumulación viral, mientras que la expresión de P7-1 a partir del mismo vector retrasa la infección viral y reduce la severidad sintomática. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2903por Gueron, Geraldine“…Se generó la línea estable PC3HO-1, en la cual la sobre-expresión de HO-1 redujo significativamente la proliferación y migración celular respecto a la línea transfectada con el vector vacío. El silenciamiento de HO-1 mediado por siRNA en la línea con altos niveles endógenos de esta proteína (MDA PCa 2b) incrementó significativamente la proliferación y la invasión respecto a las células tratadas con un siRNA control. …”
Publicado 2009
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
2904Publicado 2023“…Machine Learning with Python for Everyone, Part 3: Fundamental Toolbox teaches about fundamental classification and regression metrics like decision tree classifiers and regressors, support vector classifiers and regression, logistic regression, penalized regression, and discriminant analysis. …”
Video -
2905Publicado 2022“…Skill Level Intermediate Advanced Learn How To Recognize which type of transformer-based model is best for a given task Understand how transformers process text and make predictions Fine-tune a transformer-based model Create pipelines using fine-tuned models Deploy fine-tuned models and use them in production Who Should Take This Course Intermediate/advanced machine learning engineers with experience with ML, neural networks, and NLP Those interested in state-of-the art NLP architecture Those interested in productionizing NLP models Those comfortable using libraries like Tensorflow or PyTorch Those comfortable with linear algebra and vector/matrix operations Course Requirements Python 3 proficiency with some experience working in interactive Python environments including Notebooks (Jupyter/Google Colab/Kaggle Kernels) Comfortable using the Pandas library and either Tensorflow or PyTorch Understanding of ML/deep learning fundamentals including train/test splits, loss/cost functions, and gradient descent About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
Video -
2906Publicado 2018“…Your host, cyber security specialist and data scientist Charles Givre, teaches the concepts behind vectorized computing as it applies specifically to security. …”
Video -
2907Publicado 2022“…What you will learn Automate map production to make and edit maps at scale, cutting down on repetitive tasks Publish map layer data to ArcGIS Online Automate data updates using the ArcPy Data Access module and cursors Turn your scripts into script tools for ArcGIS Pro Learn how to manage data on ArcGIS Online Query, edit, and append to feature layers and create symbology with renderers and colorizers Apply pandas and NumPy to raster and vector analysis Learn new tricks to manage data for entire cities or large companies Who this book is for This book is ideal for anyone looking to add Python to their ArcGIS Pro workflows, even if you have no prior experience with programming. …”
Libro electrónico -
2908Publicado 2018“…Recent advances in adjuvant development, immunogen platforms for DNA vaccines and viral vectors also contributed to optimize immunogenicity. …”
Libro electrónico -
2909Publicado 2024“…As you progress, you'll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. …”
Libro electrónico -
2910Publicado 2024“…What you will learn Build solutions with open-source offerings on Google Cloud, such as TensorFlow, PyTorch, and Spark Source, understand, and prepare data for ML workloads Build, train, and deploy ML models on Google Cloud Create an effective MLOps strategy and implement MLOps workloads on Google Cloud Discover common challenges in typical AI/ML projects and get solutions from experts Explore vector databases and their importance in Generative AI applications Uncover new Gen AI patterns such as Retrieval Augmented Generation (RAG), agents, and agentic workflows Who this book is for This book is for aspiring solutions architects looking to design and implement AI/ML solutions on Google Cloud. …”
Libro electrónico -
2911Publicado 2023“…. - Or Golan, Qedma Quantum Computing If you think Python is too slow, this book is for you! Parallelization. Vectorization. Using Cython and Numba to compile to C. …”
Video -
2912
-
2913Publicado 2021“…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
Video -
2914
-
2915Publicado 2020“…La tesis pretén descobrir les tensions entre aquests dos vectors normatius, així com identificar els mecanismes que s’utilitzen per superar-les. …”
Tesis -
2916Publicado 2020“…La tesis pretén descobrir les tensions entre aquests dos vectors normatius, així com identificar els mecanismes que s’utilitzen per superar-les. …”
Accés lliure
Tesis -
2917Publicado 2022“…Our main objective is to cover all the necessary mathematics topics so that in the future, the student is in a position to face courses such as differential and integral calculus, vector calculus, differential equations, and others. …”
Libro electrónico -
2918Publicado 2023“…Using Compound Types and Collections shows how to create and use arrays and tuples, and how to use vectors and maps in the Rust collection library. Understanding Ownership in Rust dives into the details of how Rust manages the lifetime of objects. …”
Video -
2919Publicado 2020“…Todas ellas abordan temas acerca del origen de la enfermedad, su posible vector de llegada a la ciudad, el diagnóstico, el impacto demográfico urbano así como en el resto de la provincia, las repercusiones sociales y las medidas preventivas y terapéuticas frente a la infección. …”
Clic para texto completo. Acceso restringido UPSA.
Tesis -
2920Publicado 2024“…Patrick Lloyd, a senior solutions architect at Cisco, specializes in identity and access management solutions for the Northeast US and Canada region, with a focus on minimizing business risks and lateral attack vectors. He's known for his extensive experience in integrating identity into various industries and architecting robust segmentation architectures. …”
Grabación no musical