Mostrando 2,901 - 2,920 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.08s Limitar resultados
  1. 2901
    Publicado 2010
    “…Se encontró que la expresión temprana de la proteína no estructural P7-2 produce un drástico aumento en la severidad sintomática que no es acompañado por un aumento en la acumulación viral, mientras que la expresión de P7-1 a partir del mismo vector retrasa la infección viral y reduce la severidad sintomática. …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  2. 2902
    por Mongelli, Vanesa Claudia
    Publicado 2010
    “…Se encontró que la expresión temprana de la proteína no estructural P7-2 produce un drástico aumento en la severidad sintomática que no es acompañado por un aumento en la acumulación viral, mientras que la expresión de P7-1 a partir del mismo vector retrasa la infección viral y reduce la severidad sintomática. …”
    Enlace del recurso
    Libro electrónico
  3. 2903
    por Gueron, Geraldine
    Publicado 2009
    “…Se generó la línea estable PC3HO-1, en la cual la sobre-expresión de HO-1 redujo significativamente la proliferación y migración celular respecto a la línea transfectada con el vector vacío. El silenciamiento de HO-1 mediado por siRNA en la línea con altos niveles endógenos de esta proteína (MDA PCa 2b) incrementó significativamente la proliferación y la invasión respecto a las células tratadas con un siRNA control. …”
    Enlace del recurso
    Tesis
  4. 2904
    Publicado 2023
    “…Machine Learning with Python for Everyone, Part 3: Fundamental Toolbox teaches about fundamental classification and regression metrics like decision tree classifiers and regressors, support vector classifiers and regression, logistic regression, penalized regression, and discriminant analysis. …”
    Video
  5. 2905
    Publicado 2022
    “…Skill Level Intermediate Advanced Learn How To Recognize which type of transformer-based model is best for a given task Understand how transformers process text and make predictions Fine-tune a transformer-based model Create pipelines using fine-tuned models Deploy fine-tuned models and use them in production Who Should Take This Course Intermediate/advanced machine learning engineers with experience with ML, neural networks, and NLP Those interested in state-of-the art NLP architecture Those interested in productionizing NLP models Those comfortable using libraries like Tensorflow or PyTorch Those comfortable with linear algebra and vector/matrix operations Course Requirements Python 3 proficiency with some experience working in interactive Python environments including Notebooks (Jupyter/Google Colab/Kaggle Kernels) Comfortable using the Pandas library and either Tensorflow or PyTorch Understanding of ML/deep learning fundamentals including train/test splits, loss/cost functions, and gradient descent About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
    Video
  6. 2906
    Publicado 2018
    “…Your host, cyber security specialist and data scientist Charles Givre, teaches the concepts behind vectorized computing as it applies specifically to security. …”
    Video
  7. 2907
    Publicado 2022
    “…What you will learn Automate map production to make and edit maps at scale, cutting down on repetitive tasks Publish map layer data to ArcGIS Online Automate data updates using the ArcPy Data Access module and cursors Turn your scripts into script tools for ArcGIS Pro Learn how to manage data on ArcGIS Online Query, edit, and append to feature layers and create symbology with renderers and colorizers Apply pandas and NumPy to raster and vector analysis Learn new tricks to manage data for entire cities or large companies Who this book is for This book is ideal for anyone looking to add Python to their ArcGIS Pro workflows, even if you have no prior experience with programming. …”
    Libro electrónico
  8. 2908
    Publicado 2018
    “…Recent advances in adjuvant development, immunogen platforms for DNA vaccines and viral vectors also contributed to optimize immunogenicity. …”
    Libro electrónico
  9. 2909
    Publicado 2024
    “…As you progress, you'll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. …”
    Libro electrónico
  10. 2910
    Publicado 2024
    “…What you will learn Build solutions with open-source offerings on Google Cloud, such as TensorFlow, PyTorch, and Spark Source, understand, and prepare data for ML workloads Build, train, and deploy ML models on Google Cloud Create an effective MLOps strategy and implement MLOps workloads on Google Cloud Discover common challenges in typical AI/ML projects and get solutions from experts Explore vector databases and their importance in Generative AI applications Uncover new Gen AI patterns such as Retrieval Augmented Generation (RAG), agents, and agentic workflows Who this book is for This book is for aspiring solutions architects looking to design and implement AI/ML solutions on Google Cloud. …”
    Libro electrónico
  11. 2911
    Publicado 2023
    “…. - Or Golan, Qedma Quantum Computing If you think Python is too slow, this book is for you! Parallelization. Vectorization. Using Cython and Numba to compile to C. …”
    Video
  12. 2912
    Publicado 1943
    Manuscrito
  13. 2913
    Publicado 2021
    “…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
    Video
  14. 2914
    Publicado 2022
    Libro
  15. 2915
    Publicado 2020
    “…La tesis pretén descobrir les tensions entre aquests dos vectors normatius, així com identificar els mecanismes que s’utilitzen per superar-les. …”
    Tesis
  16. 2916
    Publicado 2020
    “…La tesis pretén descobrir les tensions entre aquests dos vectors normatius, així com identificar els mecanismes que s’utilitzen per superar-les. …”
    Accés lliure
    Tesis
  17. 2917
    Publicado 2022
    “…Our main objective is to cover all the necessary mathematics topics so that in the future, the student is in a position to face courses such as differential and integral calculus, vector calculus, differential equations, and others. …”
    Libro electrónico
  18. 2918
    Publicado 2023
    “…Using Compound Types and Collections shows how to create and use arrays and tuples, and how to use vectors and maps in the Rust collection library. Understanding Ownership in Rust dives into the details of how Rust manages the lifetime of objects. …”
    Video
  19. 2919
    Publicado 2020
    “…Todas ellas abordan temas acerca del origen de la enfermedad, su posible vector de llegada a la ciudad, el diagnóstico, el impacto demográfico urbano así como en el resto de la provincia, las repercusiones sociales y las medidas preventivas y terapéuticas frente a la infección. …”
    Clic para texto completo. Acceso restringido UPSA.
    Tesis
  20. 2920
    Publicado 2024
    “…Patrick Lloyd, a senior solutions architect at Cisco, specializes in identity and access management solutions for the Northeast US and Canada region, with a focus on minimizing business risks and lateral attack vectors. He's known for his extensive experience in integrating identity into various industries and architecting robust segmentation architectures. …”
    Grabación no musical