Mostrando 9,161 - 9,180 Resultados de 9,672 Para Buscar '"artificial"', tiempo de consulta: 0.16s Limitar resultados
  1. 9161
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Chapter 1: Periodic Table and Periodicity of Properties -- Mendeleev's Periodic law -- Modern Periodic Table -- IUPAC Table -- Periodic Table and Aufbau Principle -- Classification of Elements -- Atomicity and Elements of the Periodic Table -- Effective Nuclear Charge -- Atomic and Ionic Size -- Ionization Energy -- Electron Affinity -- Electronegativity -- Physical Properties and the Periodic Table -- Artificial elements -- Some records of Periodic Table -- Chapter 2: Chemical Bonding and Molecular Structure -- Different types of chemical bonds -- Summery of bond types -- Ionic or electrovalent bond -- Born-Haber cycle -- Cations of stable electron configuration -- Polarization and its effects -- Lattice Energy -- General properties of ionic compounds -- Covalent bonding -- σ and π bonds -- Comparison of σ and π bond -- Electronegativity -- Coordinate covalent bond -- Electronegativity and Dipole moment -- Lewis structure (or Dot structure) -- Resonance structure -- Hybridization -- Resonance -- Resonance effect -- Resonance Energy -- Bond length -- Bond Energy -- VSEPR model -- Structure and Shape -- Shape of Molecules -- Bond angle -- Odd electron molecules -- Molecular Orbital Model -- Shape and symmetry of molecular orbitals -- Formation of π bonds -- Diatomics of the first period elements -- Homonuclear Diatomics of Second Period Elements -- NO molecule -- CO molecule -- Hydrogen Bond -- Van der Waals' forces -- Metallic Bond -- Metal Structures -- Electron Gas Model -- Band Model -- Cohesive Energy -- Chapter 3: Acids and Bases -- Bronsted-Lowry theory -- Strength of Acids and Bases -- PH -- Buffer solution -- Henderson Equations -- Amphoterism -- Acid strength -- Strength of Hydra acids -- Strength of Oxy acids -- Base strength -- Strength of hydroxide bases -- Strength of Hydroxide bases…”
    Libro electrónico
  2. 9162
    Publicado 2024
    Tabla de Contenidos: “…Chapter 6: Scripting with Shell and Bash Commands in Linux -- Introducing operating systems -- Navigating system directories -- Introducing basic command-line prompts -- Understanding directory types -- Filing and directory manipulation -- Scripting with Bash -- Introducing control statements -- Creating functions -- Processing data and pipelines -- Using pipes -- Using cron -- Summary -- Chapter 7: Using Git for Version Control -- Introducing repositories (repos) -- Creating a repo -- Cloning an existing remote repository -- Creating a local repository from scratch -- Linking local and remote repositories -- Detailing the Git workflow for data scientists -- Using Git tags for data science -- Understanding Git tags -- Using tagging as a data scientist -- Understanding common operations -- Summary -- Part 3: Exploring Artificial Intelligence -- Chapter 8: Mining Data with Probability and Statistics -- Describing data with descriptive statistics -- Measuring central tendency -- Measuring variability -- Introducing populations and samples -- Defining populations and samples -- Representing samples -- Reducing the sampling error -- Understanding the Central Limit Thereom (CLT) -- The CLT -- Demonstrating the assumption of normality -- Shaping data with sampling distributions -- Probability distributions -- Uniform distribution -- Normal and student's t-distributions -- The binomial distribution -- The Poisson distribution -- Exponential distribution -- Geometric distribution -- The Weibull distribution -- Testing hypotheses -- Understanding one-sample t-tests -- Understanding two-sample t-tests -- Understanding paired sample t-tests -- Understanding ANOVA and MANOVA -- Chi-squared test -- A/B tests -- Understanding Type I and Type II errors -- Type I error (false positive) -- Type II error (false negative) -- Striking a balance -- Summary -- References…”
    Libro electrónico
  3. 9163
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  4. 9164
    por Courtland L. Bovee
    Publicado 2021
    Tabla de Contenidos: “…-- Intelligent Communication Technology Shaping Stories with the Help of Artificial Intelligence -- 5 Writing Business Messages -- Communication Close-up at Lumen/Kaleigh Moore -- Adapting to Your Audience: Being Sensitive to Audience Needs -- Using the "You" Attitude -- Maintaining Standards of Etiquette…”
    Libro electrónico
  5. 9165
    por M., Rajaram
    Publicado 2014
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- RoadMap to the Syllabus -- About the Authors -- Part I: Fundamentals of Computer -- Chapter 0: Introduction to Computers -- 0.1 Introduction -- 0.2 Characteristics of Computers -- 0.3 Evolution of Computers -- 0.4 Computer Generations -- 0.4.1 First Generation (1940-1956): Vacuum Tubes -- 0.4.2 Second Generation (1956-1963): Transistors -- 0.4.3 Third Generation (1964 to Early 1970s): Integrated Circuits -- 0.4.4 Fourth Generation (Early 1970s Till Date): Microprocessors -- 0.4.5 Fifth Generation (Present and Beyond): Artificial Intelligence -- 0.5 Classification of Computers -- 0.5.1 Micro Computers -- 0.5.2 Mini Computers -- 0.5.3 Mainframe Computer -- 0.5.4 Super Computers -- 0.6 Application of Computers -- 0.7 Basic Computer Organization -- 0.7.1 Hardware -- 0.8 Number system -- 0.8.1 Types of Number System -- 0.8.2 Conversion between Number Bases -- Summary -- Exercises -- Part II: Basics of C Programming -- Chapter 1: Introduction to 'C' -- 1.1 Introduction to C -- 1.2 About ANSI C Standard -- 1.3 Machine, Assembly and High-Level Language -- 1.3.1 Assembly Language -- 1.3.2 High-Level Language -- 1.4 Assembler, Compiler and Interpreter -- 1.5 Structure of a C Program -- 1.6 Programming Rules -- 1.7 Executing the C Program -- 1.8 Standard Directories -- 1.9 The first C program -- 1.10 Advantages of C -- 1.11 Header Files -- 1.12 Problem-Solving Techniques -- 1.13 Algorithm -- 1.14 Analysing Algorithm -- 1.15 Rate of Growth -- 1.15.1 Program Design -- 1.16 Classification of Algorithms -- Summary -- Exercises -- Chapter 2: The C Declarations -- 2.1 Introduction -- 2.2 The C Character Set -- 2.3 Delimiters -- 2.4 Types of Tokens -- 2.5 The C Keywords -- 2.6 Identifiers -- 2.7 Constants -- 2.7.1 Numerical Constants -- 2.7.2 Character Constant -- 2.8 Variables -- 2.9 Rules for Defining Variables -- 2.10 Data Types…”
    Libro electrónico
  6. 9166
    por Hurley, William
    Publicado 2023
    “…Get a better understanding of how quantum computing is revolutionizing networking, data management, cryptography, and artificial intelligence in ways that would have previously been unthinkable. …”
    Libro electrónico
  7. 9167
    Publicado 2024
    Tabla de Contenidos: “…Chapter 10: Using Evasion Techniques -- Technical requirements -- Obfuscation techniques in APIs -- Control flow obfuscation -- Code splitting -- Dead code injection -- Resource bloat -- Injection techniques for evasion -- Parameter pollution -- Null byte injection -- Using encoding and encryption to evade detection -- Encoding -- Encryption -- Defensive considerations -- Steganography in APIs -- Advanced use cases and tools -- Defensive considerations -- Polymorphism in APIs -- Characteristics of polymorphism -- Tools -- Defensive considerations -- Detection and prevention of evasion techniques in APIs -- Comprehensive logging and monitoring -- Behavioral analysis -- Signature-based detection -- Dynamic signature generation -- Machine learning and artificial intelligence -- Human-centric practices for enhanced security -- Summary -- Further reading -- Part 4: API Security for Technical Management Professionals -- Chapter 11: Best Practices for Secure API Design and Implementation -- Technical requirements -- Relevance of secure API design and implementation -- Designing secure APIs -- Threat modeling -- Implementing secure APIs -- Tools -- Secure API maintenance -- Tools -- Summary -- Further reading -- Chapter 12: Challenges and Considerations for API Security in Large Enterprises -- Technical requirements -- Managing security across diverse API landscapes -- Balancing security and usability -- Challenges -- Protecting legacy APIs -- Using API gateways -- Implementing web application firewalls (WAFs) -- Regular security audits -- Regularly updating and patching -- Monitoring and logging activity -- Encrypting data -- Developing secure APIs for third-party integration -- Security monitoring and IR for APIs -- Security monitoring -- IR -- Summary -- Further reading -- Chapter 13: Implementing Effective API Governance and Risk Management Initiatives…”
    Libro electrónico
  8. 9168
    Publicado 2024
    Tabla de Contenidos: “…Python problem representation -- Genetic algorithms solution -- Solving the graph coloring problem -- Solution representation -- Using hard and soft constraints for the graph coloring problem -- Python problem representation -- Genetic algorithms solution -- Summary -- Further reading -- Chapter 6: Optimizing Continuous Functions -- Technical requirements -- Chromosomes and genetic operators for real numbers -- Using DEAP with continuous functions -- Optimizing the Eggholder function -- Optimizing the Eggholder function with genetic algorithms -- Improving the speed with an increased mutation rate -- Optimizing Himmelblau's function -- Optimizing Himmelblau's function with genetic algorithms -- Using niching and sharing to find multiple solutions -- Simionescu's function and constrained optimization -- Constrained optimization with genetic algorithms -- Optimizing Simionescu's function using genetic algorithms -- Using constraints to find multiple solutions -- Summary -- Further reading -- Part 3: Artificial Intelligence Applications of Genetic Algorithms -- Chapter 7: Enhancing Machine Learning Models Using Feature Selection -- Technical requirements -- Supervised machine learning -- Classification -- Regression -- Supervised learning algorithms -- Feature selection in supervised learning -- Selecting the features for the Friedman-1 regression problem -- Solution representation -- Python problem representation -- Genetic algorithms solution -- Selecting the features for classifying the Zoo dataset -- Python problem representation -- Genetic algorithms solution -- Summary -- Further reading -- Chapter 8: Hyperparameter Tuning of Machine Learning Models -- Technical requirements -- Hyperparameters in machine learning -- Hyperparameter tuning -- The Wine dataset -- The adaptive boosting classifier…”
    Libro electrónico
  9. 9169
    Publicado 2024
    Tabla de Contenidos: “…-- Implementing linear regression from scratch -- Implementing linear regression with scikit-learn -- Implementing linear regression with TensorFlow -- Estimating with decision tree regression -- Transitioning from classification trees to regression trees -- Implementing decision tree regression -- Implementing a regression forest -- Evaluating regression performance -- Predicting stock prices with the three regression algorithms -- Summary -- Exercises -- Chapter 6: Predicting Stock Prices with Artificial Neural Networks -- Demystifying neural networks -- Starting with a single-layer neural network -- Layers in neural networks -- Activation functions -- Backpropagation -- Adding more layers to a neural network: DL -- Building neural networks -- Implementing neural networks from scratch -- Implementing neural networks with scikit-learn -- Implementing neural networks with TensorFlow -- Implementing neural networks with PyTorch -- Picking the right activation functions -- Preventing overfitting in neural networks -- Dropout -- Early stopping -- Predicting stock prices with neural networks -- Training a simple neural network -- Fine-tuning the neural network -- Summary -- Exercises -- Chapter 7: Mining the 20 Newsgroups Dataset with Text Analysis Techniques -- How computers understand language - NLP -- What is NLP? …”
    Libro electrónico
  10. 9170
    Publicado 2024
    Tabla de Contenidos: “…Executive Order 13873 - Securing the Information and Communications Technology and Services Supply Chain (2019) -- Executive Order 13870 - America's Cybersecurity Workforce (2019) -- Executive Order 13865 - Coordinating National Resilience to Electromagnetic Pulses (2019) -- Executive Order 13905 - Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services (2020) -- Executive Order 14028 - Improving the Nation's Cybersecurity (2021) -- Executive Order 14110 - Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023) -- Summary -- References -- Part 4: What's Next -- Chapter 9: The Future of CI -- Increment and innovation of cybersecurity measures -- More robust encryption implementation -- Human factor and training -- PPPs -- Resilience and recovery -- Integration of IoT and smart technologies -- Supply chain security -- Advancements in threat detection technologies -- Greater regulatory and compliance requirements -- Cross-sector collaboration -- Summary -- Conclusion -- References -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  11. 9171
    Publicado 2022
    Tabla de Contenidos: “…Rice Husk, andPineapple Waste for Fabrication of Super Capacitor -- 9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro Waste -- 9.6 Conclusion -- Acknowledgment -- References -- 10 Computational Intelligence Techiques for Optimization in Networks Ashu Gautam and Rashima Mahajan -- 10.1 Introduction Focussing on Pedagogy of Impending Approach -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks Vulnerability in Complex Networks -- 10.2 Relevant Analysis -- 10.3 Broad Area of Research -- 10.3.1 Routing Protocols -- 10.3.2 Hybrid Protocols -- 10.4 Problem Identification -- 10.5 Objectives of the Study -- 10.6 Methodology to be Adopted -- 10.7 Proposed/Expected Outcome of the Research -- References -- 11 R&D Export and ICT Regimes in India Zeba -- 11.1 Introduction -- 11.2 Artificial Intelligence: the ..…”
    Libro electrónico
  12. 9172
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Biography -- List of Contributors -- Chapter 1 Artificial Intelligence and Cybersecurity: Tale of Healthcare Applications -- 1.1 Introduction -- 1.2 A Brief History of AI -- 1.3 AI in Healthcare -- 1.4 Morality and Ethical Association of AI in Healthcare -- 1.5 Cybersecurity, AI, and Healthcare -- 1.6 Future of AI and Healthcare -- 1.7 Conclusion -- References -- Chapter 2 Data Analytics for Smart Cities: Challenges and Promises -- 2.1 Introduction -- 2.2 Role of Machine Learning in Smart Cities -- 2.3 Smart Cities Data Analytics Framework -- 2.3.1 Data Capturing -- 2.3.2 Data Analysis -- 2.3.2.1 Big Data Algorithms and Challenges -- 2.3.2.2 Machine Learning Process and Challenges -- 2.3.2.3 Deep Learning Process and Challenges -- 2.3.2.4 Learning Process and Emerging New Type of Data Problems -- 2.3.3 Decision‐Making Problems in Smart Cities -- 2.3.3.1 Traffic Decision‐Making System -- 2.3.3.2 Safe and Smart Environment -- 2.4 Conclusion -- References -- Chapter 3 Embodied AI‐Driven Operation of Smart Cities: A Concise Review -- 3.1 Introduction -- 3.2 Rise of the Embodied AI -- 3.3 Breakdown of Embodied AI -- 3.3.1 Language Grounding -- 3.3.2 Language Plus Vision -- 3.3.3 Embodied Visual Recognition -- 3.3.4 Embodied Question Answering -- 3.3.5 Interactive Question Answering -- 3.3.6 Multi‐agent Systems -- 3.4 Simulators -- 3.4.1 MINOS -- 3.4.2 Habitat -- 3.5 Future of Embodied AI -- 3.5.1 Higher Intelligence -- 3.5.2 Evolution -- 3.6 Conclusion -- References -- Chapter 4 Analysis of Different Regression Techniques for Battery Capacity Prediction -- 4.1 Introduction -- 4.2 Data Preparation -- 4.2.1 Dataset -- 4.2.2 Feature Extraction -- 4.2.3 Noise Addition -- 4.3 Experiment Design and Machine Learning Algorithms -- 4.4 Result and Analysis -- 4.5 Threats to Validity -- 4.6 Conclusions…”
    Libro electrónico
  13. 9173
    Publicado 2023
    Tabla de Contenidos: “…-- 1.2 Applications of IoDs -- 1.2.1 Warfare -- 1.2.2 Disaster Management -- 1.2.3 Smart Surveillance -- 1.2.4 Smart Agriculture -- 1.2.5 Firefighting -- 1.3 Components of IoDs -- 1.3.1 UAV Parts in Construction -- 1.3.1.1 UAV Frames -- 1.3.1.2 Propellers -- 1.3.1.3 Motors -- 1.3.1.4 Electronic Speed Controller (ESC) -- 1.3.1.5 Radio Transmitter -- 1.3.1.6 Battery, Electronics, and Power Distribution Cables -- 1.3.1.7 Sensors and Camera -- 1.3.1.8 Flight Control Board -- 1.3.1.9 First-Person View (FPV) -- 1.3.2 UAV Communication -- 1.3.2.1 UAV-to-UAV Communication -- 1.3.2.2 UAV to Ground Station -- 1.3.2.3 IoT-Enabled UAV Communication System -- 1.3.3 Communication Requirements (Data) -- 1.3.4 Security Requirements -- 1.4 Artificial Intelligence (AI) for IoD -- 1.5 Conclusion -- References -- 2. …”
    Libro electrónico
  14. 9174
    Publicado 2019
    Tabla de Contenidos: “…ANALYSIS FOR ASEAN 5 -- THE INFLUENCE OF DOMAIN KNOWLEDGE AND CLIENT'S REPORTING STRATEGY ON TAX CONSULTANT'S DECISION -- THE ROLE OF INVESTMENTS ON PHARMACEUTICAL COMPANY PERFORMANCE THAT WAS MEDIATED WITH ADVERTISING, RAW MATERIAL, TRAINING AND NUMBER OF LABORS -- MICRO AND SMALL BUSINESS DEVELOPMENT THROUGH INNOVATION AND BUSINESS RISK ADJUSTMENT TOWARD DIGITAL BUSINESS WITH ICT ADOPTION -- DATA MINING APPROACH FOR PREDICTION OF RICE PRODUCTION USING BACKPROPAGATION ARTIFICIAL NEURAL NETWORK METHOD -- LAMPUNG PROVINCE E-COMMERCE POTENTIAL IN FACING IMT-GT 2020 -- THE INFLUENCE OF THE PROVISION OF PEOPLE'S BUSINESS CREDIT (KUR) ON THE INCOME OF UMKM ENTREPRENEURS IN SOLOK SELATAN DISTRICT -- DEVELOPMENT OF WEB AND MOBILE GIS APPLICATION OF DISASTER IN PADANG TO SUPPORT TOURISM OF WEST SUMATRA PROVINCE -- THE READINESS OF PEOPLE IN BORDER AREA IN FACING THE ASEAN ECONOMIC COMMUNITY IN BERAKIT VILLAGE, TELUK SEBONG SUB-DISTRICT, BINTAN REGENCY, KEPULAUAN RIAU PROVINCE -- DEVELOPING WEBGIS FOR BUILDINGS IN NAGARI KOTO GADANG, AGAM REGENCY, WEST SUMATRA PROVINCE -- ORGANOLEPTIC AND CRISPNESS OF PURPLE SWEET POTATO, SOYBEAN FLOUR, AND REDKIDNEY BEAN FLOUR FLAKES -- THE COMPARATIVE ANALYSIS OF COMPANY PERFORMANCE BEFORE AND AFTER THE ADOPTION OF IT GOVERNANCE (CASE STUDY ON MANUFACTURING AND MINING LISTED COMPANIES IN IDX) -- ASEAN COOPERATION ON ENVIRONMENTALLY SUSTAINABLE CITIES: IMPLICATIONS FOR DEVELOPMENT IN PALEMBANG (SOUTH SUMATERA) -- THE POTENTIAL OF ASEAN IN ASEAN PLUS THREE ECONOMIC COOPERATION -- THE IMPACT OF ASEAN ECONOMIC COMMUNITY CASE STUDY THE FISHERMEN IN BELAWAN -- LITERATURE STUDY ABOUT HALF RUBBER TREATMENT PROCESSING BY VILLAGE OWNED ENTERPRISES AS EMPOWERMENT IN INCREASING RUBBER FARMERS INCOME IN RURAL -- THE IMPACT OF FINANCIAL TECHNOLOGY (FINTECH) ON ACCOUNTING EDUCATION AND PRACTICIONER IN WEST SUMATERA -- THE CONCEPT OF SHARIA INSURANCE ARRANGEMENT IN ASEAN COUNTRIES (COMPARISON OF MALAYSIAN AND INDONESIAN ARRANGEMENT CONCEPTS) -- III. …”
    Libro electrónico
  15. 9175
    Publicado 2017
    Tabla de Contenidos: “…Looking into the basics of the Apriori algorithm -- Implementing the Apriori algorithm -- Extracting association rules -- Evaluating the association rules -- Summary -- Chapter 5: Features and scikit-learn Transformers -- Feature extraction -- Representing reality in models -- Common feature patterns -- Creating good features -- Feature selection -- Selecting the best individual features -- Feature creation -- Principal Component Analysis -- Creating your own transformer -- The transformer API -- Implementing a Transformer -- Unit testing -- Putting it all together -- Summary -- Chapter 6: Social Media Insight using Naive Bayes -- Disambiguation -- Downloading data from a social network -- Loading and classifying the dataset -- Creating a replicable dataset from Twitter -- Text transformers -- Bag-of-words models -- n-gram features -- Other text features -- Naive Bayes -- Understanding Bayes' theorem -- Naive Bayes algorithm -- How it works -- Applying of Naive Bayes -- Extracting word counts -- Converting dictionaries to a matrix -- Putting it all together -- Evaluation using the F1-score -- Getting useful features from models -- Summary -- Chapter 7: Follow Recommendations Using Graph Mining -- Loading the dataset -- Classifying with an existing model -- Getting follower information from Twitter -- Building the network -- Creating a graph -- Creating a similarity graph -- Finding subgraphs -- Connected components -- Optimizing criteria -- Summary -- Chapter 8: Beating CAPTCHAs with Neural Networks -- Artificial neural networks -- An introduction to neural networks -- Creating the dataset -- Drawing basic CAPTCHAs -- Splitting the image into individual letters -- Creating a training dataset -- Training and classifying -- Back-propagation -- Predicting words -- Improving accuracy using a dictionary -- Ranking mechanisms for word similarity…”
    Libro electrónico
  16. 9176
    por Cisneros Enríquez, Andrés
    Publicado 2023
    Tabla de Contenidos: “…-- Estrategia emocional -- El impacto de la Inteligencia Artificial (IA) -- Yuxtaposición de entornos y código genético clave de conquista -- La tecnología 5.0 y el neuromarketing -- ¿Qué es el seguimiento de ojos? …”
    Libro electrónico
  17. 9177
    Publicado 2024
    Tabla de Contenidos: “…Exploring different types of regression -- Introducing linear regression -- Linear regression model in MATLAB -- Making predictions with regression analysis in MATLAB -- Multiple linear regression with categorical predictor -- Evaluating model performance -- Reducing outlier effects -- Using advanced techniques for model evaluation and selection in MATLAB -- Understanding k-fold cross-validation -- Exploring leave-one-out cross-validation -- Introducing the bootstrap method -- Summary -- Chapter 4: Clustering Analysis and Dimensionality Reduction -- Technical requirements -- Understanding clustering - basic concepts and methods -- How to measure similarity -- How to find centroids and centers -- How to define a grouping -- Understanding hierarchical clustering -- Partitioning-based clustering algorithms with MATLAB -- Introducing the k-means algorithm -- Using k-means in MATLAB -- Grouping data using the similarity measures -- Applying k-medoids in MATLAB -- Discovering dimensionality reduction techniques -- Introducing feature selection methods -- Exploring feature extraction algorithms -- Feature selection and feature extraction using MATLAB -- Stepwise regression for feature selection -- Carrying out PCA -- Summary -- Chapter 5: Introducing Artificial Neural Network Modeling -- Technical requirements -- Getting started with ANNs -- Basic concepts relating to ANNs -- Understanding how perceptrons work -- Activation function to introduce non-linearity -- ANN's architecture explained -- Training and testing an ANN model in MATLAB -- How to train an ANN -- Introducing the MATLAB Neural Network Toolbox -- Understanding data fitting with ANNs -- Discovering pattern recognition using ANNs -- Building a clustering application with an ANN -- Exploring advanced optimization techniques -- Understanding SGD -- Exploring Adam optimization…”
    Libro electrónico
  18. 9178
    Publicado 2021
    Tabla de Contenidos: “…-- End-to-End Framework in Support of Virtual Design-EngineeringManufacturing-Construction Space Exploration -- Accuracy Aspects when Transforming a Boundary Representation of Solids into a Tetrahedral Space Partition -- The influence of topology optimisation's design space-from shell to volume-on the generation of structural systems -- Qualifying spatial information for underground volumes -- An algorithmic BIM approach to advance concrete printing -- A methodological approach to generate robot control algorithms from BIMModels -- Multi-Level LoD Parametric Design Approach in AEC for Robot-Oriented Construction -- Design and implementation of an optimal sensor system as part of a Digital Twin for a rotary bending machine -- The Effects of Fracture Energy on the Interfacial Strength of Self-Healing Concrete -- A Performance Metric for the Evaluation of Thermal Anomaly Identification with Ill-Defined Ground Truth -- Areas of Interest -- Semantic description of component locations for damage assessment -- Deep Neural Networks for visual bridge inspections and defect visualisation in Civil Engineering -- Automated decision making in structural health monitoring using explainable artificial intelligence -- VOX2BIM -- A Fast Method for Automated Point Cloud Segmentation -- Automated Generation of Railway Track Geometric Digital Twins (RailGDT) from Airborne LiDAR Data -- Deriving Digital Twin Models of Existing Bridges from Point Cloud Data Using Parametric Models and Metaheuristic Algorithms -- Building a balanced and well-rounded dataset for railway asset detection -- Panorama-to-digital twin registration using semantic features -- AI-based thermal bridge detection of building rooftops on district scale using aerial images -- Image Captioning in Chinese for Construction Activity Scenes Understanding Using a Pre-trained Cross-modal Language Model -- Process Pattern-based Hybrid Simulation for Emission Estimation of the Construction Processes -- Automatic image analysis of mineral construction and demolition waste (CDW) using machine learning methods and deep learning -- Fast Crack Detection Using Convolutional Neural Network -- An Integrated Computational GIS Platform for UAV-based Remote Building Façade Inspection -- A Computer Vision Approach for Building Facade Component Segmentation on 3D Point Cloud Models Reconstructed by Aerial Images -- Feasibility Study of Urban Flood Mapping Using Traffic Signs for Route Optimization -- Developing indicators for measuring the effectiveness of visualizations applied in construction safety management using eye-tracking -- Real-time LiDAR for Monitoring Construction Worker Presence Near Hazards and in Work Areas in a Virtual Reality Environment…”
    Libro electrónico
  19. 9179
    Publicado 2024
    Tabla de Contenidos: “…Conventional Approach -- 3.2.2. Artificial Neural Network -- 3.3. Methods -- 3.3.1. …”
    Libro electrónico
  20. 9180
    Publicado 2021
    Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
    Libro electrónico