Mostrando 3,521 - 3,540 Resultados de 4,268 Para Buscar '"forestal"', tiempo de consulta: 0.13s Limitar resultados
  1. 3521
    por Maufort, Marc
    Publicado 2024
    Tabla de Contenidos: “…(Ralph Dekoninck) -- Sebastian Domsch, Dan Hassler-Forest and Dirk Vanderbeke, eds. Handbook of Comics and Graphic Narratives. …”
    Libro electrónico
  2. 3522
    Publicado 2024
    Tabla de Contenidos: “…Implementing one-hot encoding -- Random forests -- Introducing robot path planning -- Understanding the coordinate system -- Developing a map based on our knowledge -- Introducing the A* algorithm -- Introducing the D* (D-star or dynamic A*) algorithm -- GPS path finding -- Summary -- Questions -- Further reading -- Chapter 9: Giving the Robot an Artificial Personality -- Technical requirements -- What is an artificial personality? …”
    Libro electrónico
  3. 3523
    Publicado 2023
    Tabla de Contenidos: “…Dumping user credentials in clear text via DPAPI -- Summary -- References -- Further reading -- Chapter 5: Lateral Movement in Domain and Across Forests -- Technical requirements -- Usage of administration protocols in the domain -- PSRemoting and JEA -- RDP -- Other protocols with Impacket -- Relaying the hash -- Pass-the-whatever -- Pass-the-hash -- Pass-the-key and overpass-the-hash -- Pass-the-ticket -- Kerberos delegation -- Unconstrained delegation -- Resource-based constrained delegation -- Constrained delegation -- Bronze Bit attack aka CVE-2020-17049 -- Abusing trust for lateral movement -- Summary -- References -- Further reading -- Chapter 6: Domain Privilege Escalation -- Technical requirements -- Zero2Hero exploits -- MS14-068 -- Zerologon (CVE-2020-1472) -- PrintNightmare (CVE-2021-1675 &amp -- CVE-2021-34527) -- sAMAccountName Spoofing and noPac (CVE-2021-42278/CVE-2021-42287) -- RemotePotato0 -- ACL abuse -- Group -- Computer -- User -- DCSync -- Group Policy abuse -- Other privilege escalation vectors -- Built-in security groups -- DNSAdmins abuse (CVE-2021-40469) -- Child/parent domain escalation -- Privileged Access Management -- Summary -- References -- Further reading -- Chapter 7: Persistence on Domain Level -- Technical requirements -- Domain persistence -- Forged tickets -- A domain object's ACL and attribute manipulations -- DCShadow -- Golden gMSA -- Domain controller persistence -- Skeleton Key -- A malicious SSP -- DSRM -- Security descriptor alteration -- Summary -- References -- Chapter 8: Abusing Active Directory Certificate Services -- Technical requirements -- PKI theory -- Certificate theft -- THEFT1 - Exporting certificates using the CryptoAPI -- THEFT2 - User certificate theft via DPAPI -- THEFT3 - Machine certificate theft via DPAPI -- THEFT4 - Harvest for certificate files…”
    Libro electrónico
  4. 3524
  5. 3525
    Publicado 2025
    Tabla de Contenidos: “…6.8.2 Integration of privacy-preserving techniques -- 6.8.3 AI-driven smart contracts -- 6.9 Conclusion -- References -- Chapter 7: Q-learning and deep Q networks for securing IoT networks, challenges, and solution -- 7.1 Introduction -- 7.2 Methodology -- 7.2.1 Proposed algorithm for training DQNs as agents in IoT networks for security -- 7.2.1.1 The algorithm -- 7.2.1.2 Program -- 7.2.1.3 Various security actions -- 7.2.2 Algorithm for applying security actions using a DQN in IoT network security -- 7.2.2.1 Program -- 7.3 Result and conclusion -- References -- Chapter 8: The application of artificial intelligence and machine learning in network security using a bibliometric study -- 8.1 Introduction -- 8.2 Analysis of state-of-art network security AI/ML models -- 8.2.1 Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection -- 8.2.2 A novel online incremental and decremental learning algorithm based on variable support vector machine -- 8.2.3 An effective intrusion detection framework based on SVM with feature augmentation, knowledge-based systems -- 8.2.4 A novel hybrid KPCA and SVM with GA model for intrusion detection -- 8.2.5 A novel SVM-KNN-PSO ensemble method for intrusion detection system -- 8.2.6 SVM-DT-based adaptive and collaborative intrusion detection -- 8.2.7 Random forest modeling for network intrusion detection system -- 8.3 Analysis of the state-of-art malware detection AL/ML models -- 8.3.1 Malware detection classification using machine learning -- 8.3.2 A review of Android malware detection approaches based on machine learning -- 8.3.3 A two-layer deep learning method for Android malware detection using network traffic -- 8.3.4 A lightweight network-based Android malware detection system -- 8.3.5 Phishing website classification and detection using machine learning…”
    Libro electrónico
  6. 3526
    Publicado 2023
    Tabla de Contenidos: “…7.3.3 Methodology Flow Chart -- 7.3.4 Data Pre-Processing -- 7.3.5 Models Deployed -- 7.3.6 Training and Testing -- 7.4 Analysis -- 7.4.1 Datasets -- 7.4.2 Feature Extraction -- 7.4.3 Splitting of Data into Samples -- 7.4.4 Algorithms Used -- 7.4.4.1 Multinomial Logistic Regression -- 7.4.4.2 K-Nearest Neighbors -- 7.4.4.3 Decision Tree -- 7.4.4.4 Support Vector Machine (SVM) -- 7.4.4.5 Random Forest -- 7.5 Results and Discussion -- 7.5.1 Importance of Classification Reports -- 7.5.2 Importance of Confusion Matrices -- 7.5.3 Decision Tree -- 7.5.4 Random Forest -- 7.5.5 K-Nearest Neighbors -- 7.5.6 Logistic Regression -- 7.5.7 Support Vector Machine -- 7.5.8 Comparison of the Algorithms -- 7.5.8.1 Accuracies -- 7.5.8.2 Precision and Recall -- 7.6 Conclusions -- 7.7 Scope of Future Work -- References -- Chapter 8 Smart Vision-Based Sensing and Monitoring of Power Plants for a Clean Environment -- 8.1 Introduction -- 8.1.1 Color Image Processing -- 8.1.2 Motivation -- 8.1.3 Objectives -- 8.2 Literature Review -- 8.2.1 Gas Turbine Power Plants -- 8.2.2 Artificial Intelligent Methods -- 8.3 Materials and Methods -- 8.3.1 Feature Extraction -- 8.3.2 Classification -- 8.4 Results and Discussion -- 8.4.1 Fisher's Linear Discriminant Function (FLDA) and Curvelet -- 8.5 Conclusion -- 8.5.1 Future Scope of Work -- References -- Chapter 9 Implementation of FEM and Machine Learning Algorithms in the Design and Manufacturing of Laminated Composite Plate -- Abbreviations -- 9.1 Introduction -- 9.2 Numerical Experimentation Program -- 9.3 Discussion of the Results -- 9.4 Conclusion -- Acknowledgements -- References -- Part II: Integration of Digital Technologies to Operations -- Chapter 10 Edge Computing-Based Conditional Monitoring -- 10.1 Introduction -- 10.1.1 Problem Statement -- 10.2 Literature Review -- 10.3 Edge Computing -- 10.4 Methodology…”
    Libro electrónico
  7. 3527
    Publicado 2023
    Tabla de Contenidos: “…3 Assessing the Accuracy of Digital Elevation Models for Darjeeling-Sikkim Himalayas -- 3.1 Introduction -- 3.2 Study Area -- 3.3 Materials and Methods -- 3.3.1 Generation of Cartosat-1 DEM and Orthoimage -- 3.3.2 TanDEM-X -- 3.3.3 ALOS PALSAR -- 3.3.4 DGPS Survey for Obtaining Ground Control Points (GCPs) -- 3.3.5 Datum Transformation -- 3.3.6 Accuracy Assessment Methods -- 3.3.6.1 Vertical Accuracy -- 3.3.6.2 Spatial Accuracy -- 3.4 Results and Discussion -- 3.4.1 Vertical Accuracy Assessment: Comparison of DEMs With Reference to GCPs -- 3.4.2 Vertical Accuracy of DEMs for Different Land Use Classes -- 3.4.2.1 Dense Forest -- 3.4.2.2 Open Forest -- 3.4.2.3 Tea Garden -- 3.4.2.4 Built-up Area -- 3.4.3 Spatial Accuracy Assessment: Comparison of DEMs With Reference to Stream Networks -- 3.5 Conclusions -- Acknowledgments -- References -- 4 An Overview of Morphometry Software Packages, Tools, and Add-ons -- 4.1 Introduction -- 4.2 Overview of Morphometry Tools and Toolboxes -- 4.3 Stand-Alone Tools -- 4.4 Tools that Run within Coding Bases -- 4.5 Conclusion -- References -- 5 Landscape Modeling, Glacier and Ice Sheet Dynamics, and the Three Poles: A Review of Models, Softwares, and Tools -- 5.1 Introduction -- 5.2 Taxonomy -- 5.2.1 Geomorphic Process-Based Models -- 5.2.2 Classification Based on Process of Modeling -- 5.2.2.1 Based on Geomorphic Processes -- 5.2.2.2 Based on Modeling Process -- 5.3 Working Principles for Geomorphological Models -- 5.3.1 Soil Production -- 5.3.2 Hillslope Transport -- 5.3.3 Land Sliding -- 5.3.4 Fluvial Incision and Transport -- 5.3.5 Glacial Erosion -- 5.4 Landscape Evolution Models -- 5.4.1 DEM-Based Models -- 5.4.2 SIBERIA -- 5.4.3 GOLEM -- 5.4.4 CASCADE -- 5.4.5 ZScape -- 5.4.6 CHILD -- 5.4.7 CAESAR -- 5.4.8 APERO -- 5.4.9 SIGNUM (Simple Integrated Geomorphological Numerical Model)…”
    Libro electrónico
  8. 3528
    por Kumar, Kukatlapalli Pradeep
    Publicado 2023
    Tabla de Contenidos: “…5.5.2 Biological Neuron Model -- 5.5.3 Artificial Neural Networks -- 5.5.4 Network Topologies -- 5.5.4.1 NARX Neural Network -- 5.5.5 ANN Modeling Using Mathematical Models -- 5.6 Neuron Spiking Model Using FitzHugh-Nagumo (F-N) System -- 5.6.1 Linearization of F-N System -- 5.6.2 Reduced Order Model of Linear System -- 5.6.3 Finite Difference Discretization of F-N System -- 5.6.4 MOR of F-N System Using POD-Galerkin Method -- 5.7 Ring Oscillator Model -- 5.7.1 Model Order Reduction of Ring Oscillator Circuit -- 5.7.2 Ring Oscillator Circuit Approximation Using Linear System MOR -- 5.7.3 POD-ANN Macromodel of Ring Oscillator Circuit -- 5.8 Nonlinear VLSI Interconnect Model Using Telegraph Equation -- 5.8.1 Macromodeling of VLSI Interconnect -- 5.8.2 Discretisation of Interconnect Model -- 5.8.3 Linearization of VLSI Interconnect Model -- 5.8.4 Reduced Order Linear Model of VLSI Interconnect -- 5.9 Macromodel Using Machine Learning -- 5.9.1 Activation Function -- 5.9.2 Bayesian Regularization -- 5.9.3 Optimization -- 5.10 MOR of Dynamical Systems Using POD-ANN -- 5.10.1 Accuracy and Performance Index -- 5.11 Numerical Results -- 5.11.1 F-N System -- 5.11.2 Ring Oscillator Model -- 5.11.3 Reduced Order POD Approximation of Ring Oscillator -- 5.11.3.1 Study of POD-ANN Approximation of Ring Oscillator for Variation in Amplitude of Input Signal and for Different Input Signals -- 5.11.3.2 POD-ANN Approximation of Ring Oscillator for Variation in Frequency -- 5.11.4 POD-ANN Approximation of VLSI Interconnect -- 5.12 Conclusion -- References -- Chapter 6 Comparative Analysis of Various Ensemble Approaches for Web Page Classification -- 6.1 Introduction -- 6.2 Literature Survey -- 6.3 Material and Methods -- 6.4 Ensemble Classifiers -- 6.4.1 Bagging -- 6.4.1.1 Bagging Meta Estimator -- 6.4.1.2 Random Forest -- 6.4.2 Boosting -- 6.4.2.1 AdaBoost…”
    Libro electrónico
  9. 3529
    Publicado 2013
    Tabla de Contenidos: “…Conservación de recursos forestales nativos de Argentina: el cultivo de plantas leñosas en vivero y a campo; Página legal; Índice; Prólogo; Agradecimientos; I Introducción; Bibliografía; II Domesticación de especies forestales nativas Un enfoque para la discusión; Parte I. …”
    Libro electrónico
  10. 3530
    Publicado 2022
    Tabla de Contenidos: “…-- 2.2 The Untapped Green Potential of the Subsides Agreement -- 2.3 Three Ways to Protect the Environment -- 2.4 Trade Sanctions and Forests Protection -- 2.5 A New Kind of Environmental Bargain -- 2.6 The EU's Sustainable Commercial Policy -- 2.7 From Exception to Promotion -- i -- ii -- iii -- 3 The Power of Ideas -- 3.1 From Weak to Strong Integration -- 3.2 Watching the Seeds Grow -- 3.3 The Development Factor -- 3.4 It's Not All About the Environment -- 3.5 Two Birds with One Stone -- 3.6 Missed Opportunities -- 6 Conclusions -- 1 Ideational Change -- 2 Historical Contingency -- 2.1 The gatt and Embedded Liberalism -- 2.2 The wto and the Resurgence of Neoliberalism -- 2.3 The 2030 Agenda and the Instrumental Role of Trade -- 3 A New Trade Story -- 3.1 One. …”
    Libro electrónico
  11. 3531
    por Elsevier B.V.
    Publicado 2021
    Tabla de Contenidos: “…Cryptic Eucoleus [Capillaria] sp. in the respiratory tract of a cat from Australia -- Comparison of quantitative polymerase chain reaction, Kato-Katz and circulating cathodic antigen rapid test for the diagnosis of Schistosoma mansoni infection: A cross-sectional study in Kirinyaga County, Kenya -- Field evaluation of Veeralin, an alpha-cypermethrin + PBO long-lasting insecticidal net, against natural populations of Anopheles funestus in experimental huts in Muheza, Tanzania -- In vitro anti-Trypanosoma cruzi activity enhancement of curcumin by its monoketone tetramethoxy analog diveratralacetone -- Complexity of malaria transmission dynamics in the Brazilian Atlantic Forest -- Using cerebrospinal fluid to confirm Angiostrongylus cantonensis as the cause of canine neuroangiostrongyliasis in Australia where A. cantonensis and Angiostrongylus mackerrasae co-exist -- Molecular screening for tick-borne bacteria and hematozoa in Ixodes cf. boliviensis and Ixodes tapirus (Ixodida: Ixodidae) from western highlands of Panama -- Illuminating the bacterial microbiome of Australian ticks with 16S and Rickettsia-specific next-generation sequencing -- Biolarviciding for malaria vector control: Acceptance and associated factors in southern Tanzania -- Unexpected failure of Ixodes scapularis nymphs to transmit a North American Borrelia bissettiae strain -- Promastigotes of Leishmania donovani exhibited sensitivity towards the high altitudinal plant Cicer microphyllum -- Towards understanding transfluthrin efficacy in a pyrethroid-resistant strain of the malaria vector Anopheles funestus with special reference to cytochrome P450-mediated detoxification -- Insecticide-impregnated netting: A surface treatment for killing Lutzomyia longipalpis (Diptera: Psychodidae), the vector of Leishmania infantum -- Cat fleas (Ctenocephalides felis clade 'Sydney') are dominant fleas on dogs and cats in New South Wales, Australia: Presence of flea-borne Rickettsia felis, Bartonella spp. but absence of Coxiella burnetii DNA -- Babesia gibsoni emerging with high prevalence and co-infections in "fighting dogs" in Hungary -- Morphological and molecular characterization of a new species of Isospora Schneider, 1881 (Apicomplexa: Eimeriidae) from the western wattlebird Anthochaera lunulata Gould in Western Australia -- Unravelling the diversity of the Crassiphialinae (Digenea: Diplostomidae) with molecular phylogeny and descriptions of five new species -- Haemoprotozoan surveillance in peri-urban native and introduced wildlife from Australia -- VectorMap-GR: A local scale operational management tool for entomological monitoring, to support vector control activities in Greece and the Mediterranean Basin -- Neospora caninum and Toxoplasma gondii as causes of reproductive losses in commercial sheep flocks from Argentina -- Molecular detection of Borrelia burgdorferi (sensu lato) and Rickettsia spp. in hard ticks distributed in Tokachi District, eastern Hokkaido, Japan -- Considerations for anthelmintic resistance emergence in hookworm at a single locus -- Wild deer in the United Kingdom are a potential reservoir for the livestock parasite Babesia divergens -- First description of sarcoptic mange in an Iberian hare (Lepus granatensis) -- Evaluation of buffered Trypanosoma evansi antigen and rapid serum agglutination test (BA/Te) for the detection of anti-T. evansi antibodies in horses in Brazil -- Cryptosporidium of birds in pet markets in Wuhan city, Hubei, China -- Global analysis of cytochrome c oxidase subunit 1 (cox1) gene variation in Dibothriocephalus nihonkaiensis (Cestoda: Diphyllobothriidae) -- Insecticidal efficacy of afoxolaner against Stomoxys calcitrans (Diptera: Muscidae) in dogs -- The detection of Schistosoma bovis in livestock on Pemba Island, Zanzibar: A preliminary study -- Sarcoptic mange in the wild boar, Sus scrofa, in Sweden -- Dengue outbreaks in Bangladesh: Historic epidemic patterns suggest earlier mosquito control intervention in the transmission season could reduce the monthly growth factor and extent of epidemics -- Predicting eastern equine encephalitis spread in North America: An ecological study -- Vapor phase repellency and insecticidal activity of pyridinyl amides against anopheline mosquitoes -- Editorial: First anniversary of Current Research in Parasitology &Vector-BorneDiseases…”
    Revista digital
  12. 3532
    Publicado 2023
    Tabla de Contenidos: “…Reconstruction of Subsurface Salinity Structure in the South China Sea Using Satellite Observations: A LightGBM-Based Deep Forest Method -- L ́ea Schamberger, Audrey Minghelli, Malik Chami and Fran ̧cois Steinmetz Improvement of Atmospheric Correction of Satellite Sentinel-3/OLCI Data for Oceanic Waters in Presence of Sargassum -- Mingjun He, Shuangyan He, Xiaodong Zhang, Feng Zhou and Peiliang Li AssessmentofNormalizedWater-LeavingRadianceDerivedfromGOCIUsingAERONET-OC Data -- Shiming Lu, Mingjun He, Shuangyan He, Shuo He, Yunhe Pan, Wenbin Yin and Peiliang Li An Improved Cloud Masking Method for GOCI Data over Turbid Coastal Waters -- Hongwei Zhang, Yuanshuai Zhang, Ziwang Li, Bingyi Liu, Bin Yin and Songhua Wu Small Angle Scattering Intensity Measurement by an Improved Ocean Scheimpflug Lidar System -- Junyi Li, Huiyuan Zheng, Lingling Xie, Quanan Zheng, Zheng Ling and Min Li Response of Total Suspended Sediment and Chlorophyll-a Concentration to Late Autumn Typhoon Events in The Northwestern South China Sea -- Khalid A. …”
    Libro electrónico
  13. 3533
    por Politt, Katja
    Publicado 2022
    Tabla de Contenidos: “…Infinitiv Perfekt Vorgangspassiv -- 5.3. Random Forests und Trees -- 5.3.1. Epistemisches dürfte -- 5.3.2. …”
    Libro electrónico
  14. 3534
    Publicado 2000
    Tabla de Contenidos: “…Establishment of the Role of Steroid Hormones in Plant Growth and Development -- NRI Awards -- Patents -- Publications -- Additional Information -- Signal-Transduction Pathway of the Plant Hormone Ethylene -- NRI Awards -- Patents -- Publications -- Additional Information -- Improvements in Plant Biotechnology by Manipulation of Gene Silencing -- NRI Awards to Vicki Vance, University of South Carolina -- NRI Awards to James Carrington, Texas A&amp -- M University -- Patent -- Publications -- A New BAC Library Vector for Transferring Large DNA Inserts to Plants -- NRI Award -- Patent -- Publications -- Additional Information: -- Appendix H Research Needs in Food, Fiber, and Natural Resources -- PLANTS -- ANIMALS -- NUTRITION, FOOD SAFETY, AND HEALTH -- NATURAL RESOURCES AND THE ENVIRONMENT -- ENHANCING VALUE AND USE OF AGRICULTURAL AND FOREST PRODUCTS -- MARKETS, TRADE, AND RURAL DEVELOPMENT -- Appendix I Grant Performance Follow-on for Quality Evaluation -- References -- About the Authors -- RECENT PUBLICATIONS OF THE BOARD ON AGRICULTURE AND NATURAL RESOURCES…”
    Libro electrónico
  15. 3535
    Publicado 2023
    Tabla de Contenidos: “…Processing dataset outliers -- Cost-based feature selection with swarm intelligence -- Correlation-based feature selection with swarm intelligence -- Experimental setup -- Genetic algorithm -- GA algorithm parameters -- Genetic algorithm results -- Geometric PSO -- GPSO parameters -- GPSO results -- Chaotic harmony search -- Algorithm parameters -- Chaotic harmony search results -- Chaotic Cuckoo Search -- Algorithm parameters -- Chaotic Cuckoo Search results -- Evolutionary algorithm -- EA parameters -- EA results -- Predictions with reduced features, SVM and random forest -- Crime forecasting with PSO-SVM -- References -- 9. …”
    Libro electrónico
  16. 3536
    Publicado 2023
    Tabla de Contenidos: “…12.3.1.5 Spying -- 12.3.2 Active Attacks -- 12.3.2.1 Denial of Service -- 12.3.2.2 Distributed Denial of Service (DDOS) -- 12.3.2.3 Message Modification -- 12.3.2.4 Masquerade -- 12.3.2.5 Trojans -- 12.3.2.6 Replay Attacks -- 12.3.3 Programming Weapons for the Attackers -- 12.3.3.1 Dormant Phase -- 12.3.3.2 Propagation Phase -- 12.3.3.3 Triggering Phase -- 12.3.3.4 Execution Phase -- 12.4 Recent Cyber Attacks -- 12.5 Drawbacks of Traditional Cryptography -- 12.5.1 Cost and Time Delay -- 12.5.2 Disclosure of Mathematical Computation -- 12.5.3 Unsalted Hashing -- 12.5.4 Attacks -- 12.6 Need of Quantum Cryptography -- 12.6.1 Quantum Mechanics -- 12.7 Evolution of Quantum Cryptography -- 12.8 Conclusion and Future Work -- References -- Chapter 13 Identification of Bacterial Diseases in Plants Using Re-Trained Transfer Learning in Quantum Computing Environment -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Proposed Methodology -- 13.3.1 SVM Classifier -- 13.3.2 Random Forest to Classify the Rice Leaf -- 13.3.2.1 Image Pre-Processing -- 13.3.2.2 Feature Extraction -- 13.3.2.3 Classification -- 13.4 Experiment Results -- Conclusion -- References -- Chapter 14 Quantum Cryptography -- 14.1 Fundamentals of Cryptography -- 14.2 Principle of Quantum Cryptography -- 14.2.1 Quantum vs. …”
    Libro electrónico
  17. 3537
    Publicado 2022
    Tabla de Contenidos: “…11.3.3 Prediction of Nifty score -- 11.3.3.1 Linear regression -- 11.3.3.2 Polynomial regression -- 11.3.3.3 Random forest -- 11.3.3.4 Gradient boost regressor -- 11.4 Results and experimental framework -- 11.4.1 Linear regression -- 11.4.2 Polynomial regression with degree 3 -- 11.4.3 Random forest regression -- 11.4.4 Gradient boost regressor -- 11.5 Conclusion -- References -- Further reading -- 12 Impact of COVID-19: a particular focus on Indian education system -- 12.1 Introduction -- 12.2 Impact of COVID-19 on education -- 12.2.1 Effect of home confinement on children and teachers -- 12.2.2 A multidimensional impact of uncertainty -- 12.3 Sustaining the education industry during COVID-19 -- 12.4 Conclusion -- References -- 13 Designing of Latent Dirichlet Allocation Based Prediction Model to Detect Midlife Crisis of Losing Jobs due to Prolonged... -- 13.1 Introduction -- 13.2 Literature survey -- 13.3 Methodology -- 13.3.1 Distinguishing midlife crisis symptoms -- 13.3.2 Designing of the prediction model -- 13.3.3 Application of LDA and statistical comparison -- 13.3.3.1 Formulation of Dirichlet distribution -- 13.3.3.2 Categorization in Bayesian model -- 13.3.3.3 Concept of topic modeling -- 13.4 Result and discussion -- 13.5 Conclusion and future scope -- References -- 14 Autonomous robotic system for ultraviolet disinfection -- 14.1 Introduction -- 14.2 Background -- 14.2.1 Ultraviolet light for disinfection -- 14.2.2 Exposure time for deactivation of the bacteria -- 14.2.3 Flow chart of UV bot control logic -- 14.2.4 Calculations related to the time for disinfection -- 14.3 Implementation -- 14.4 Model topology -- 14.4.1 UV-C light robotic vehicle -- 14.5 Conclusion -- References -- 15 Emerging health start-ups for economic feasibility: opportunities during COVID-19 -- 15.1 Introduction -- 15.2 Health-tech verticals for start-ups…”
    Libro electrónico
  18. 3538
    Publicado 2025
    Tabla de Contenidos: “…Front Cover -- Graph Based Multimedia Analysis -- Copyright -- Contents -- List of figures -- List of tables -- Biography -- Foreword -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 Chapter organization -- 1.3 Basics of multimedia -- 1.4 Preliminaries of a video -- 1.5 Multimedia problems -- 1.6 Graph based solutions -- 1.7 Other solution models -- 1.8 Organization of the book -- References -- 2 Theoretical foundations -- 2.1 Motivation -- 2.2 Organization -- 2.3 Graph basics -- 2.4 Delaunay graph -- 2.5 Bipartite graph -- 2.6 Minimum spanning tree -- 2.7 Optimum path forest -- 2.8 Random walks on a graph -- 2.9 Knapsack problems -- 2.10 Elementary game theory -- References -- 3 Exocentric video summarization -- 3.1 Motivation -- 3.2 Chapter organization -- 3.3 Related works -- 3.3.1 Related works for exocentric video summarization -- 3.3.2 Related works for scalable exocentric video summarization -- 3.4 Method I: Delaunay graph based solutions for exocentric video summarization -- 3.4.1 Method IA: Constrained Delaunay graph clustering based summary -- 3.4.1.1 Video frame presampling -- 3.4.1.2 Feature extraction -- 3.4.1.3 Elimination of redundant frames -- 3.4.1.4 Delaunay graph based constrained clustering -- 3.4.1.5 Key frame extraction -- 3.4.2 Method IB: Delaunay graph based summary with user customization -- 3.4.3 Method IC: Delaunay graph based summary in enhanced feature space -- 3.5 Method II: A graph modularity based clustering for exocentric video summarization -- 3.5.1 Compressed domain feature extraction -- 3.5.2 Multi-feature fusion -- 3.5.3 Graph modularity based clustering -- 3.5.4 Key frame extraction -- 3.6 Scalable exocentric video summarization with skeleton graph and random walk -- 3.6.1 Extraction of skeleton graph -- 3.6.2 Clustering of skeleton graph via MST -- 3.6.3 Label propagation with random walks…”
    Libro electrónico
  19. 3539
    Publicado 2008
    Tabla de Contenidos: “…MANUAL BÁSICO DE LA PODA Y FORMACIÓN DE LOS ÁRBOLES FORESTALES ; PÁGINA LEGAL; PRÓLOGO; ÍNDICE; 1. LAS RAMAS DE LOS ÁRBOLES Y LOS NUDOS DE MADERA; 1.1. …”
    Libro electrónico
  20. 3540
    Publicado 2018
    Tabla de Contenidos: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept…”
    Libro electrónico