Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 2,340
- Inteligencia artificial 1,204
- Machine learning 580
- Intel·ligència artificial 515
- Artificial Intelligence 299
- Data processing 296
- Python (Computer program language) 239
- Technological innovations 224
- Computer programs 216
- Natural language processing (Computer science) 194
- Neural networks (Computer science) 162
- Information technology 141
- Technology: general issues 139
- Computer programming 137
- Industrial applications 135
- Computer security 134
- artificial intelligence 134
- Informática 133
- machine learning 130
- Computer science 129
- ChatGPT 121
- Application software 120
- Big data 119
- History of engineering & technology 118
- Management 116
- Social aspects 116
- Development 106
- Data mining 103
- Cloud computing 100
- Computer networks 90
-
9161Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Preface -- Chapter 1: Periodic Table and Periodicity of Properties -- Mendeleev's Periodic law -- Modern Periodic Table -- IUPAC Table -- Periodic Table and Aufbau Principle -- Classification of Elements -- Atomicity and Elements of the Periodic Table -- Effective Nuclear Charge -- Atomic and Ionic Size -- Ionization Energy -- Electron Affinity -- Electronegativity -- Physical Properties and the Periodic Table -- Artificial elements -- Some records of Periodic Table -- Chapter 2: Chemical Bonding and Molecular Structure -- Different types of chemical bonds -- Summery of bond types -- Ionic or electrovalent bond -- Born-Haber cycle -- Cations of stable electron configuration -- Polarization and its effects -- Lattice Energy -- General properties of ionic compounds -- Covalent bonding -- σ and π bonds -- Comparison of σ and π bond -- Electronegativity -- Coordinate covalent bond -- Electronegativity and Dipole moment -- Lewis structure (or Dot structure) -- Resonance structure -- Hybridization -- Resonance -- Resonance effect -- Resonance Energy -- Bond length -- Bond Energy -- VSEPR model -- Structure and Shape -- Shape of Molecules -- Bond angle -- Odd electron molecules -- Molecular Orbital Model -- Shape and symmetry of molecular orbitals -- Formation of π bonds -- Diatomics of the first period elements -- Homonuclear Diatomics of Second Period Elements -- NO molecule -- CO molecule -- Hydrogen Bond -- Van der Waals' forces -- Metallic Bond -- Metal Structures -- Electron Gas Model -- Band Model -- Cohesive Energy -- Chapter 3: Acids and Bases -- Bronsted-Lowry theory -- Strength of Acids and Bases -- PH -- Buffer solution -- Henderson Equations -- Amphoterism -- Acid strength -- Strength of Hydra acids -- Strength of Oxy acids -- Base strength -- Strength of hydroxide bases -- Strength of Hydroxide bases…”
Libro electrónico -
9162Publicado 2024Tabla de Contenidos: “…Chapter 6: Scripting with Shell and Bash Commands in Linux -- Introducing operating systems -- Navigating system directories -- Introducing basic command-line prompts -- Understanding directory types -- Filing and directory manipulation -- Scripting with Bash -- Introducing control statements -- Creating functions -- Processing data and pipelines -- Using pipes -- Using cron -- Summary -- Chapter 7: Using Git for Version Control -- Introducing repositories (repos) -- Creating a repo -- Cloning an existing remote repository -- Creating a local repository from scratch -- Linking local and remote repositories -- Detailing the Git workflow for data scientists -- Using Git tags for data science -- Understanding Git tags -- Using tagging as a data scientist -- Understanding common operations -- Summary -- Part 3: Exploring Artificial Intelligence -- Chapter 8: Mining Data with Probability and Statistics -- Describing data with descriptive statistics -- Measuring central tendency -- Measuring variability -- Introducing populations and samples -- Defining populations and samples -- Representing samples -- Reducing the sampling error -- Understanding the Central Limit Thereom (CLT) -- The CLT -- Demonstrating the assumption of normality -- Shaping data with sampling distributions -- Probability distributions -- Uniform distribution -- Normal and student's t-distributions -- The binomial distribution -- The Poisson distribution -- Exponential distribution -- Geometric distribution -- The Weibull distribution -- Testing hypotheses -- Understanding one-sample t-tests -- Understanding two-sample t-tests -- Understanding paired sample t-tests -- Understanding ANOVA and MANOVA -- Chi-squared test -- A/B tests -- Understanding Type I and Type II errors -- Type I error (false positive) -- Type II error (false negative) -- Striking a balance -- Summary -- References…”
Libro electrónico -
9163Publicado 2024Tabla de Contenidos:Libro electrónico
-
9164por Courtland L. BoveeTabla de Contenidos: “…-- Intelligent Communication Technology Shaping Stories with the Help of Artificial Intelligence -- 5 Writing Business Messages -- Communication Close-up at Lumen/Kaleigh Moore -- Adapting to Your Audience: Being Sensitive to Audience Needs -- Using the "You" Attitude -- Maintaining Standards of Etiquette…”
Publicado 2021
Libro electrónico -
9165por M., RajaramTabla de Contenidos: “…Cover -- Contents -- Preface -- RoadMap to the Syllabus -- About the Authors -- Part I: Fundamentals of Computer -- Chapter 0: Introduction to Computers -- 0.1 Introduction -- 0.2 Characteristics of Computers -- 0.3 Evolution of Computers -- 0.4 Computer Generations -- 0.4.1 First Generation (1940-1956): Vacuum Tubes -- 0.4.2 Second Generation (1956-1963): Transistors -- 0.4.3 Third Generation (1964 to Early 1970s): Integrated Circuits -- 0.4.4 Fourth Generation (Early 1970s Till Date): Microprocessors -- 0.4.5 Fifth Generation (Present and Beyond): Artificial Intelligence -- 0.5 Classification of Computers -- 0.5.1 Micro Computers -- 0.5.2 Mini Computers -- 0.5.3 Mainframe Computer -- 0.5.4 Super Computers -- 0.6 Application of Computers -- 0.7 Basic Computer Organization -- 0.7.1 Hardware -- 0.8 Number system -- 0.8.1 Types of Number System -- 0.8.2 Conversion between Number Bases -- Summary -- Exercises -- Part II: Basics of C Programming -- Chapter 1: Introduction to 'C' -- 1.1 Introduction to C -- 1.2 About ANSI C Standard -- 1.3 Machine, Assembly and High-Level Language -- 1.3.1 Assembly Language -- 1.3.2 High-Level Language -- 1.4 Assembler, Compiler and Interpreter -- 1.5 Structure of a C Program -- 1.6 Programming Rules -- 1.7 Executing the C Program -- 1.8 Standard Directories -- 1.9 The first C program -- 1.10 Advantages of C -- 1.11 Header Files -- 1.12 Problem-Solving Techniques -- 1.13 Algorithm -- 1.14 Analysing Algorithm -- 1.15 Rate of Growth -- 1.15.1 Program Design -- 1.16 Classification of Algorithms -- Summary -- Exercises -- Chapter 2: The C Declarations -- 2.1 Introduction -- 2.2 The C Character Set -- 2.3 Delimiters -- 2.4 Types of Tokens -- 2.5 The C Keywords -- 2.6 Identifiers -- 2.7 Constants -- 2.7.1 Numerical Constants -- 2.7.2 Character Constant -- 2.8 Variables -- 2.9 Rules for Defining Variables -- 2.10 Data Types…”
Publicado 2014
Libro electrónico -
9166por Hurley, William“…Get a better understanding of how quantum computing is revolutionizing networking, data management, cryptography, and artificial intelligence in ways that would have previously been unthinkable. …”
Publicado 2023
Libro electrónico -
9167Publicado 2024Tabla de Contenidos: “…Chapter 10: Using Evasion Techniques -- Technical requirements -- Obfuscation techniques in APIs -- Control flow obfuscation -- Code splitting -- Dead code injection -- Resource bloat -- Injection techniques for evasion -- Parameter pollution -- Null byte injection -- Using encoding and encryption to evade detection -- Encoding -- Encryption -- Defensive considerations -- Steganography in APIs -- Advanced use cases and tools -- Defensive considerations -- Polymorphism in APIs -- Characteristics of polymorphism -- Tools -- Defensive considerations -- Detection and prevention of evasion techniques in APIs -- Comprehensive logging and monitoring -- Behavioral analysis -- Signature-based detection -- Dynamic signature generation -- Machine learning and artificial intelligence -- Human-centric practices for enhanced security -- Summary -- Further reading -- Part 4: API Security for Technical Management Professionals -- Chapter 11: Best Practices for Secure API Design and Implementation -- Technical requirements -- Relevance of secure API design and implementation -- Designing secure APIs -- Threat modeling -- Implementing secure APIs -- Tools -- Secure API maintenance -- Tools -- Summary -- Further reading -- Chapter 12: Challenges and Considerations for API Security in Large Enterprises -- Technical requirements -- Managing security across diverse API landscapes -- Balancing security and usability -- Challenges -- Protecting legacy APIs -- Using API gateways -- Implementing web application firewalls (WAFs) -- Regular security audits -- Regularly updating and patching -- Monitoring and logging activity -- Encrypting data -- Developing secure APIs for third-party integration -- Security monitoring and IR for APIs -- Security monitoring -- IR -- Summary -- Further reading -- Chapter 13: Implementing Effective API Governance and Risk Management Initiatives…”
Libro electrónico -
9168Publicado 2024Tabla de Contenidos: “…Python problem representation -- Genetic algorithms solution -- Solving the graph coloring problem -- Solution representation -- Using hard and soft constraints for the graph coloring problem -- Python problem representation -- Genetic algorithms solution -- Summary -- Further reading -- Chapter 6: Optimizing Continuous Functions -- Technical requirements -- Chromosomes and genetic operators for real numbers -- Using DEAP with continuous functions -- Optimizing the Eggholder function -- Optimizing the Eggholder function with genetic algorithms -- Improving the speed with an increased mutation rate -- Optimizing Himmelblau's function -- Optimizing Himmelblau's function with genetic algorithms -- Using niching and sharing to find multiple solutions -- Simionescu's function and constrained optimization -- Constrained optimization with genetic algorithms -- Optimizing Simionescu's function using genetic algorithms -- Using constraints to find multiple solutions -- Summary -- Further reading -- Part 3: Artificial Intelligence Applications of Genetic Algorithms -- Chapter 7: Enhancing Machine Learning Models Using Feature Selection -- Technical requirements -- Supervised machine learning -- Classification -- Regression -- Supervised learning algorithms -- Feature selection in supervised learning -- Selecting the features for the Friedman-1 regression problem -- Solution representation -- Python problem representation -- Genetic algorithms solution -- Selecting the features for classifying the Zoo dataset -- Python problem representation -- Genetic algorithms solution -- Summary -- Further reading -- Chapter 8: Hyperparameter Tuning of Machine Learning Models -- Technical requirements -- Hyperparameters in machine learning -- Hyperparameter tuning -- The Wine dataset -- The adaptive boosting classifier…”
Libro electrónico -
9169Publicado 2024Tabla de Contenidos: “…-- Implementing linear regression from scratch -- Implementing linear regression with scikit-learn -- Implementing linear regression with TensorFlow -- Estimating with decision tree regression -- Transitioning from classification trees to regression trees -- Implementing decision tree regression -- Implementing a regression forest -- Evaluating regression performance -- Predicting stock prices with the three regression algorithms -- Summary -- Exercises -- Chapter 6: Predicting Stock Prices with Artificial Neural Networks -- Demystifying neural networks -- Starting with a single-layer neural network -- Layers in neural networks -- Activation functions -- Backpropagation -- Adding more layers to a neural network: DL -- Building neural networks -- Implementing neural networks from scratch -- Implementing neural networks with scikit-learn -- Implementing neural networks with TensorFlow -- Implementing neural networks with PyTorch -- Picking the right activation functions -- Preventing overfitting in neural networks -- Dropout -- Early stopping -- Predicting stock prices with neural networks -- Training a simple neural network -- Fine-tuning the neural network -- Summary -- Exercises -- Chapter 7: Mining the 20 Newsgroups Dataset with Text Analysis Techniques -- How computers understand language - NLP -- What is NLP? …”
Libro electrónico -
9170Publicado 2024Tabla de Contenidos: “…Executive Order 13873 - Securing the Information and Communications Technology and Services Supply Chain (2019) -- Executive Order 13870 - America's Cybersecurity Workforce (2019) -- Executive Order 13865 - Coordinating National Resilience to Electromagnetic Pulses (2019) -- Executive Order 13905 - Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services (2020) -- Executive Order 14028 - Improving the Nation's Cybersecurity (2021) -- Executive Order 14110 - Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023) -- Summary -- References -- Part 4: What's Next -- Chapter 9: The Future of CI -- Increment and innovation of cybersecurity measures -- More robust encryption implementation -- Human factor and training -- PPPs -- Resilience and recovery -- Integration of IoT and smart technologies -- Supply chain security -- Advancements in threat detection technologies -- Greater regulatory and compliance requirements -- Cross-sector collaboration -- Summary -- Conclusion -- References -- Index -- Other Books You May Enjoy…”
Libro electrónico -
9171Publicado 2022Tabla de Contenidos: “…Rice Husk, andPineapple Waste for Fabrication of Super Capacitor -- 9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro Waste -- 9.6 Conclusion -- Acknowledgment -- References -- 10 Computational Intelligence Techiques for Optimization in Networks Ashu Gautam and Rashima Mahajan -- 10.1 Introduction Focussing on Pedagogy of Impending Approach -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks Vulnerability in Complex Networks -- 10.2 Relevant Analysis -- 10.3 Broad Area of Research -- 10.3.1 Routing Protocols -- 10.3.2 Hybrid Protocols -- 10.4 Problem Identification -- 10.5 Objectives of the Study -- 10.6 Methodology to be Adopted -- 10.7 Proposed/Expected Outcome of the Research -- References -- 11 R&D Export and ICT Regimes in India Zeba -- 11.1 Introduction -- 11.2 Artificial Intelligence: the ..…”
Libro electrónico -
9172Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Biography -- List of Contributors -- Chapter 1 Artificial Intelligence and Cybersecurity: Tale of Healthcare Applications -- 1.1 Introduction -- 1.2 A Brief History of AI -- 1.3 AI in Healthcare -- 1.4 Morality and Ethical Association of AI in Healthcare -- 1.5 Cybersecurity, AI, and Healthcare -- 1.6 Future of AI and Healthcare -- 1.7 Conclusion -- References -- Chapter 2 Data Analytics for Smart Cities: Challenges and Promises -- 2.1 Introduction -- 2.2 Role of Machine Learning in Smart Cities -- 2.3 Smart Cities Data Analytics Framework -- 2.3.1 Data Capturing -- 2.3.2 Data Analysis -- 2.3.2.1 Big Data Algorithms and Challenges -- 2.3.2.2 Machine Learning Process and Challenges -- 2.3.2.3 Deep Learning Process and Challenges -- 2.3.2.4 Learning Process and Emerging New Type of Data Problems -- 2.3.3 Decision‐Making Problems in Smart Cities -- 2.3.3.1 Traffic Decision‐Making System -- 2.3.3.2 Safe and Smart Environment -- 2.4 Conclusion -- References -- Chapter 3 Embodied AI‐Driven Operation of Smart Cities: A Concise Review -- 3.1 Introduction -- 3.2 Rise of the Embodied AI -- 3.3 Breakdown of Embodied AI -- 3.3.1 Language Grounding -- 3.3.2 Language Plus Vision -- 3.3.3 Embodied Visual Recognition -- 3.3.4 Embodied Question Answering -- 3.3.5 Interactive Question Answering -- 3.3.6 Multi‐agent Systems -- 3.4 Simulators -- 3.4.1 MINOS -- 3.4.2 Habitat -- 3.5 Future of Embodied AI -- 3.5.1 Higher Intelligence -- 3.5.2 Evolution -- 3.6 Conclusion -- References -- Chapter 4 Analysis of Different Regression Techniques for Battery Capacity Prediction -- 4.1 Introduction -- 4.2 Data Preparation -- 4.2.1 Dataset -- 4.2.2 Feature Extraction -- 4.2.3 Noise Addition -- 4.3 Experiment Design and Machine Learning Algorithms -- 4.4 Result and Analysis -- 4.5 Threats to Validity -- 4.6 Conclusions…”
Libro electrónico -
9173Publicado 2023Tabla de Contenidos: “…-- 1.2 Applications of IoDs -- 1.2.1 Warfare -- 1.2.2 Disaster Management -- 1.2.3 Smart Surveillance -- 1.2.4 Smart Agriculture -- 1.2.5 Firefighting -- 1.3 Components of IoDs -- 1.3.1 UAV Parts in Construction -- 1.3.1.1 UAV Frames -- 1.3.1.2 Propellers -- 1.3.1.3 Motors -- 1.3.1.4 Electronic Speed Controller (ESC) -- 1.3.1.5 Radio Transmitter -- 1.3.1.6 Battery, Electronics, and Power Distribution Cables -- 1.3.1.7 Sensors and Camera -- 1.3.1.8 Flight Control Board -- 1.3.1.9 First-Person View (FPV) -- 1.3.2 UAV Communication -- 1.3.2.1 UAV-to-UAV Communication -- 1.3.2.2 UAV to Ground Station -- 1.3.2.3 IoT-Enabled UAV Communication System -- 1.3.3 Communication Requirements (Data) -- 1.3.4 Security Requirements -- 1.4 Artificial Intelligence (AI) for IoD -- 1.5 Conclusion -- References -- 2. …”
Libro electrónico -
9174Publicado 2019Tabla de Contenidos: “…ANALYSIS FOR ASEAN 5 -- THE INFLUENCE OF DOMAIN KNOWLEDGE AND CLIENT'S REPORTING STRATEGY ON TAX CONSULTANT'S DECISION -- THE ROLE OF INVESTMENTS ON PHARMACEUTICAL COMPANY PERFORMANCE THAT WAS MEDIATED WITH ADVERTISING, RAW MATERIAL, TRAINING AND NUMBER OF LABORS -- MICRO AND SMALL BUSINESS DEVELOPMENT THROUGH INNOVATION AND BUSINESS RISK ADJUSTMENT TOWARD DIGITAL BUSINESS WITH ICT ADOPTION -- DATA MINING APPROACH FOR PREDICTION OF RICE PRODUCTION USING BACKPROPAGATION ARTIFICIAL NEURAL NETWORK METHOD -- LAMPUNG PROVINCE E-COMMERCE POTENTIAL IN FACING IMT-GT 2020 -- THE INFLUENCE OF THE PROVISION OF PEOPLE'S BUSINESS CREDIT (KUR) ON THE INCOME OF UMKM ENTREPRENEURS IN SOLOK SELATAN DISTRICT -- DEVELOPMENT OF WEB AND MOBILE GIS APPLICATION OF DISASTER IN PADANG TO SUPPORT TOURISM OF WEST SUMATRA PROVINCE -- THE READINESS OF PEOPLE IN BORDER AREA IN FACING THE ASEAN ECONOMIC COMMUNITY IN BERAKIT VILLAGE, TELUK SEBONG SUB-DISTRICT, BINTAN REGENCY, KEPULAUAN RIAU PROVINCE -- DEVELOPING WEBGIS FOR BUILDINGS IN NAGARI KOTO GADANG, AGAM REGENCY, WEST SUMATRA PROVINCE -- ORGANOLEPTIC AND CRISPNESS OF PURPLE SWEET POTATO, SOYBEAN FLOUR, AND REDKIDNEY BEAN FLOUR FLAKES -- THE COMPARATIVE ANALYSIS OF COMPANY PERFORMANCE BEFORE AND AFTER THE ADOPTION OF IT GOVERNANCE (CASE STUDY ON MANUFACTURING AND MINING LISTED COMPANIES IN IDX) -- ASEAN COOPERATION ON ENVIRONMENTALLY SUSTAINABLE CITIES: IMPLICATIONS FOR DEVELOPMENT IN PALEMBANG (SOUTH SUMATERA) -- THE POTENTIAL OF ASEAN IN ASEAN PLUS THREE ECONOMIC COOPERATION -- THE IMPACT OF ASEAN ECONOMIC COMMUNITY CASE STUDY THE FISHERMEN IN BELAWAN -- LITERATURE STUDY ABOUT HALF RUBBER TREATMENT PROCESSING BY VILLAGE OWNED ENTERPRISES AS EMPOWERMENT IN INCREASING RUBBER FARMERS INCOME IN RURAL -- THE IMPACT OF FINANCIAL TECHNOLOGY (FINTECH) ON ACCOUNTING EDUCATION AND PRACTICIONER IN WEST SUMATERA -- THE CONCEPT OF SHARIA INSURANCE ARRANGEMENT IN ASEAN COUNTRIES (COMPARISON OF MALAYSIAN AND INDONESIAN ARRANGEMENT CONCEPTS) -- III. …”
Libro electrónico -
9175Publicado 2017Tabla de Contenidos: “…Looking into the basics of the Apriori algorithm -- Implementing the Apriori algorithm -- Extracting association rules -- Evaluating the association rules -- Summary -- Chapter 5: Features and scikit-learn Transformers -- Feature extraction -- Representing reality in models -- Common feature patterns -- Creating good features -- Feature selection -- Selecting the best individual features -- Feature creation -- Principal Component Analysis -- Creating your own transformer -- The transformer API -- Implementing a Transformer -- Unit testing -- Putting it all together -- Summary -- Chapter 6: Social Media Insight using Naive Bayes -- Disambiguation -- Downloading data from a social network -- Loading and classifying the dataset -- Creating a replicable dataset from Twitter -- Text transformers -- Bag-of-words models -- n-gram features -- Other text features -- Naive Bayes -- Understanding Bayes' theorem -- Naive Bayes algorithm -- How it works -- Applying of Naive Bayes -- Extracting word counts -- Converting dictionaries to a matrix -- Putting it all together -- Evaluation using the F1-score -- Getting useful features from models -- Summary -- Chapter 7: Follow Recommendations Using Graph Mining -- Loading the dataset -- Classifying with an existing model -- Getting follower information from Twitter -- Building the network -- Creating a graph -- Creating a similarity graph -- Finding subgraphs -- Connected components -- Optimizing criteria -- Summary -- Chapter 8: Beating CAPTCHAs with Neural Networks -- Artificial neural networks -- An introduction to neural networks -- Creating the dataset -- Drawing basic CAPTCHAs -- Splitting the image into individual letters -- Creating a training dataset -- Training and classifying -- Back-propagation -- Predicting words -- Improving accuracy using a dictionary -- Ranking mechanisms for word similarity…”
Libro electrónico -
9176por Cisneros Enríquez, AndrésTabla de Contenidos: “…-- Estrategia emocional -- El impacto de la Inteligencia Artificial (IA) -- Yuxtaposición de entornos y código genético clave de conquista -- La tecnología 5.0 y el neuromarketing -- ¿Qué es el seguimiento de ojos? …”
Publicado 2023
Libro electrónico -
9177Publicado 2024Tabla de Contenidos: “…Exploring different types of regression -- Introducing linear regression -- Linear regression model in MATLAB -- Making predictions with regression analysis in MATLAB -- Multiple linear regression with categorical predictor -- Evaluating model performance -- Reducing outlier effects -- Using advanced techniques for model evaluation and selection in MATLAB -- Understanding k-fold cross-validation -- Exploring leave-one-out cross-validation -- Introducing the bootstrap method -- Summary -- Chapter 4: Clustering Analysis and Dimensionality Reduction -- Technical requirements -- Understanding clustering - basic concepts and methods -- How to measure similarity -- How to find centroids and centers -- How to define a grouping -- Understanding hierarchical clustering -- Partitioning-based clustering algorithms with MATLAB -- Introducing the k-means algorithm -- Using k-means in MATLAB -- Grouping data using the similarity measures -- Applying k-medoids in MATLAB -- Discovering dimensionality reduction techniques -- Introducing feature selection methods -- Exploring feature extraction algorithms -- Feature selection and feature extraction using MATLAB -- Stepwise regression for feature selection -- Carrying out PCA -- Summary -- Chapter 5: Introducing Artificial Neural Network Modeling -- Technical requirements -- Getting started with ANNs -- Basic concepts relating to ANNs -- Understanding how perceptrons work -- Activation function to introduce non-linearity -- ANN's architecture explained -- Training and testing an ANN model in MATLAB -- How to train an ANN -- Introducing the MATLAB Neural Network Toolbox -- Understanding data fitting with ANNs -- Discovering pattern recognition using ANNs -- Building a clustering application with an ANN -- Exploring advanced optimization techniques -- Understanding SGD -- Exploring Adam optimization…”
Libro electrónico -
9178Publicado 2021Tabla de Contenidos: “…-- End-to-End Framework in Support of Virtual Design-EngineeringManufacturing-Construction Space Exploration -- Accuracy Aspects when Transforming a Boundary Representation of Solids into a Tetrahedral Space Partition -- The influence of topology optimisation's design space-from shell to volume-on the generation of structural systems -- Qualifying spatial information for underground volumes -- An algorithmic BIM approach to advance concrete printing -- A methodological approach to generate robot control algorithms from BIMModels -- Multi-Level LoD Parametric Design Approach in AEC for Robot-Oriented Construction -- Design and implementation of an optimal sensor system as part of a Digital Twin for a rotary bending machine -- The Effects of Fracture Energy on the Interfacial Strength of Self-Healing Concrete -- A Performance Metric for the Evaluation of Thermal Anomaly Identification with Ill-Defined Ground Truth -- Areas of Interest -- Semantic description of component locations for damage assessment -- Deep Neural Networks for visual bridge inspections and defect visualisation in Civil Engineering -- Automated decision making in structural health monitoring using explainable artificial intelligence -- VOX2BIM -- A Fast Method for Automated Point Cloud Segmentation -- Automated Generation of Railway Track Geometric Digital Twins (RailGDT) from Airborne LiDAR Data -- Deriving Digital Twin Models of Existing Bridges from Point Cloud Data Using Parametric Models and Metaheuristic Algorithms -- Building a balanced and well-rounded dataset for railway asset detection -- Panorama-to-digital twin registration using semantic features -- AI-based thermal bridge detection of building rooftops on district scale using aerial images -- Image Captioning in Chinese for Construction Activity Scenes Understanding Using a Pre-trained Cross-modal Language Model -- Process Pattern-based Hybrid Simulation for Emission Estimation of the Construction Processes -- Automatic image analysis of mineral construction and demolition waste (CDW) using machine learning methods and deep learning -- Fast Crack Detection Using Convolutional Neural Network -- An Integrated Computational GIS Platform for UAV-based Remote Building Façade Inspection -- A Computer Vision Approach for Building Facade Component Segmentation on 3D Point Cloud Models Reconstructed by Aerial Images -- Feasibility Study of Urban Flood Mapping Using Traffic Signs for Route Optimization -- Developing indicators for measuring the effectiveness of visualizations applied in construction safety management using eye-tracking -- Real-time LiDAR for Monitoring Construction Worker Presence Near Hazards and in Work Areas in a Virtual Reality Environment…”
Libro electrónico -
9179Publicado 2024Tabla de Contenidos: “…Conventional Approach -- 3.2.2. Artificial Neural Network -- 3.3. Methods -- 3.3.1. …”
Libro electrónico -
9180Publicado 2021Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
Libro electrónico