Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Technology 360
- Tecnología 347
- Naturaleza 269
- Agriculture 252
- Agricultura 248
- Forestry 240
- Nature 227
- Forestal 219
- Silvicultura 153
- Forests and forestry 149
- Fauna forestal 118
- Ecología forestal 114
- Clasificación 108
- Machine learning 87
- Zoología 78
- Colecciones 74
- Bosques 70
- Science 66
- Research & information: general 63
- Ecosistemas y hábitats, bosques y selva tropical 62
- ecosystems and habitats 62
- forests and rainforests 62
- random forest 58
- Ciencias 56
- Documentales 56
- General 54
- Política forestal 54
- History 52
- Python (Computer program language) 52
- Historia 51
-
3521por Maufort, MarcTabla de Contenidos: “…(Ralph Dekoninck) -- Sebastian Domsch, Dan Hassler-Forest and Dirk Vanderbeke, eds. Handbook of Comics and Graphic Narratives. …”
Publicado 2024
Libro electrónico -
3522Publicado 2024Tabla de Contenidos: “…Implementing one-hot encoding -- Random forests -- Introducing robot path planning -- Understanding the coordinate system -- Developing a map based on our knowledge -- Introducing the A* algorithm -- Introducing the D* (D-star or dynamic A*) algorithm -- GPS path finding -- Summary -- Questions -- Further reading -- Chapter 9: Giving the Robot an Artificial Personality -- Technical requirements -- What is an artificial personality? …”
Libro electrónico -
3523Publicado 2023Tabla de Contenidos: “…Dumping user credentials in clear text via DPAPI -- Summary -- References -- Further reading -- Chapter 5: Lateral Movement in Domain and Across Forests -- Technical requirements -- Usage of administration protocols in the domain -- PSRemoting and JEA -- RDP -- Other protocols with Impacket -- Relaying the hash -- Pass-the-whatever -- Pass-the-hash -- Pass-the-key and overpass-the-hash -- Pass-the-ticket -- Kerberos delegation -- Unconstrained delegation -- Resource-based constrained delegation -- Constrained delegation -- Bronze Bit attack aka CVE-2020-17049 -- Abusing trust for lateral movement -- Summary -- References -- Further reading -- Chapter 6: Domain Privilege Escalation -- Technical requirements -- Zero2Hero exploits -- MS14-068 -- Zerologon (CVE-2020-1472) -- PrintNightmare (CVE-2021-1675 & -- CVE-2021-34527) -- sAMAccountName Spoofing and noPac (CVE-2021-42278/CVE-2021-42287) -- RemotePotato0 -- ACL abuse -- Group -- Computer -- User -- DCSync -- Group Policy abuse -- Other privilege escalation vectors -- Built-in security groups -- DNSAdmins abuse (CVE-2021-40469) -- Child/parent domain escalation -- Privileged Access Management -- Summary -- References -- Further reading -- Chapter 7: Persistence on Domain Level -- Technical requirements -- Domain persistence -- Forged tickets -- A domain object's ACL and attribute manipulations -- DCShadow -- Golden gMSA -- Domain controller persistence -- Skeleton Key -- A malicious SSP -- DSRM -- Security descriptor alteration -- Summary -- References -- Chapter 8: Abusing Active Directory Certificate Services -- Technical requirements -- PKI theory -- Certificate theft -- THEFT1 - Exporting certificates using the CryptoAPI -- THEFT2 - User certificate theft via DPAPI -- THEFT3 - Machine certificate theft via DPAPI -- THEFT4 - Harvest for certificate files…”
Libro electrónico -
3524Publicado 1974Tabla de Contenidos: “…XIV : El pensamiento medieval / por A. Forest, M. de Gandillac, F. van Steenberghen…”
Biblioteca del Instituto Superior de Teología de las Islas Canarias (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de Pastoral Madrid, Biblioteca Pública Episcopal del Seminario de Barcelona, Red de bibliotecas Iglesia Navarra, Biblioteca Universitat Ramon Llull, Biblioteca Central de Capuchinos de España, Universidad Loyola - Universidad Loyola Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Universidad de Deusto, Biblioteca Diocesana Bilbao, Biblioteca del Seminario Diocesano de Jaén, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
3525Publicado 2025Tabla de Contenidos: “…6.8.2 Integration of privacy-preserving techniques -- 6.8.3 AI-driven smart contracts -- 6.9 Conclusion -- References -- Chapter 7: Q-learning and deep Q networks for securing IoT networks, challenges, and solution -- 7.1 Introduction -- 7.2 Methodology -- 7.2.1 Proposed algorithm for training DQNs as agents in IoT networks for security -- 7.2.1.1 The algorithm -- 7.2.1.2 Program -- 7.2.1.3 Various security actions -- 7.2.2 Algorithm for applying security actions using a DQN in IoT network security -- 7.2.2.1 Program -- 7.3 Result and conclusion -- References -- Chapter 8: The application of artificial intelligence and machine learning in network security using a bibliometric study -- 8.1 Introduction -- 8.2 Analysis of state-of-art network security AI/ML models -- 8.2.1 Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection -- 8.2.2 A novel online incremental and decremental learning algorithm based on variable support vector machine -- 8.2.3 An effective intrusion detection framework based on SVM with feature augmentation, knowledge-based systems -- 8.2.4 A novel hybrid KPCA and SVM with GA model for intrusion detection -- 8.2.5 A novel SVM-KNN-PSO ensemble method for intrusion detection system -- 8.2.6 SVM-DT-based adaptive and collaborative intrusion detection -- 8.2.7 Random forest modeling for network intrusion detection system -- 8.3 Analysis of the state-of-art malware detection AL/ML models -- 8.3.1 Malware detection classification using machine learning -- 8.3.2 A review of Android malware detection approaches based on machine learning -- 8.3.3 A two-layer deep learning method for Android malware detection using network traffic -- 8.3.4 A lightweight network-based Android malware detection system -- 8.3.5 Phishing website classification and detection using machine learning…”
Libro electrónico -
3526Publicado 2023Tabla de Contenidos: “…7.3.3 Methodology Flow Chart -- 7.3.4 Data Pre-Processing -- 7.3.5 Models Deployed -- 7.3.6 Training and Testing -- 7.4 Analysis -- 7.4.1 Datasets -- 7.4.2 Feature Extraction -- 7.4.3 Splitting of Data into Samples -- 7.4.4 Algorithms Used -- 7.4.4.1 Multinomial Logistic Regression -- 7.4.4.2 K-Nearest Neighbors -- 7.4.4.3 Decision Tree -- 7.4.4.4 Support Vector Machine (SVM) -- 7.4.4.5 Random Forest -- 7.5 Results and Discussion -- 7.5.1 Importance of Classification Reports -- 7.5.2 Importance of Confusion Matrices -- 7.5.3 Decision Tree -- 7.5.4 Random Forest -- 7.5.5 K-Nearest Neighbors -- 7.5.6 Logistic Regression -- 7.5.7 Support Vector Machine -- 7.5.8 Comparison of the Algorithms -- 7.5.8.1 Accuracies -- 7.5.8.2 Precision and Recall -- 7.6 Conclusions -- 7.7 Scope of Future Work -- References -- Chapter 8 Smart Vision-Based Sensing and Monitoring of Power Plants for a Clean Environment -- 8.1 Introduction -- 8.1.1 Color Image Processing -- 8.1.2 Motivation -- 8.1.3 Objectives -- 8.2 Literature Review -- 8.2.1 Gas Turbine Power Plants -- 8.2.2 Artificial Intelligent Methods -- 8.3 Materials and Methods -- 8.3.1 Feature Extraction -- 8.3.2 Classification -- 8.4 Results and Discussion -- 8.4.1 Fisher's Linear Discriminant Function (FLDA) and Curvelet -- 8.5 Conclusion -- 8.5.1 Future Scope of Work -- References -- Chapter 9 Implementation of FEM and Machine Learning Algorithms in the Design and Manufacturing of Laminated Composite Plate -- Abbreviations -- 9.1 Introduction -- 9.2 Numerical Experimentation Program -- 9.3 Discussion of the Results -- 9.4 Conclusion -- Acknowledgements -- References -- Part II: Integration of Digital Technologies to Operations -- Chapter 10 Edge Computing-Based Conditional Monitoring -- 10.1 Introduction -- 10.1.1 Problem Statement -- 10.2 Literature Review -- 10.3 Edge Computing -- 10.4 Methodology…”
Libro electrónico -
3527Publicado 2023Tabla de Contenidos: “…3 Assessing the Accuracy of Digital Elevation Models for Darjeeling-Sikkim Himalayas -- 3.1 Introduction -- 3.2 Study Area -- 3.3 Materials and Methods -- 3.3.1 Generation of Cartosat-1 DEM and Orthoimage -- 3.3.2 TanDEM-X -- 3.3.3 ALOS PALSAR -- 3.3.4 DGPS Survey for Obtaining Ground Control Points (GCPs) -- 3.3.5 Datum Transformation -- 3.3.6 Accuracy Assessment Methods -- 3.3.6.1 Vertical Accuracy -- 3.3.6.2 Spatial Accuracy -- 3.4 Results and Discussion -- 3.4.1 Vertical Accuracy Assessment: Comparison of DEMs With Reference to GCPs -- 3.4.2 Vertical Accuracy of DEMs for Different Land Use Classes -- 3.4.2.1 Dense Forest -- 3.4.2.2 Open Forest -- 3.4.2.3 Tea Garden -- 3.4.2.4 Built-up Area -- 3.4.3 Spatial Accuracy Assessment: Comparison of DEMs With Reference to Stream Networks -- 3.5 Conclusions -- Acknowledgments -- References -- 4 An Overview of Morphometry Software Packages, Tools, and Add-ons -- 4.1 Introduction -- 4.2 Overview of Morphometry Tools and Toolboxes -- 4.3 Stand-Alone Tools -- 4.4 Tools that Run within Coding Bases -- 4.5 Conclusion -- References -- 5 Landscape Modeling, Glacier and Ice Sheet Dynamics, and the Three Poles: A Review of Models, Softwares, and Tools -- 5.1 Introduction -- 5.2 Taxonomy -- 5.2.1 Geomorphic Process-Based Models -- 5.2.2 Classification Based on Process of Modeling -- 5.2.2.1 Based on Geomorphic Processes -- 5.2.2.2 Based on Modeling Process -- 5.3 Working Principles for Geomorphological Models -- 5.3.1 Soil Production -- 5.3.2 Hillslope Transport -- 5.3.3 Land Sliding -- 5.3.4 Fluvial Incision and Transport -- 5.3.5 Glacial Erosion -- 5.4 Landscape Evolution Models -- 5.4.1 DEM-Based Models -- 5.4.2 SIBERIA -- 5.4.3 GOLEM -- 5.4.4 CASCADE -- 5.4.5 ZScape -- 5.4.6 CHILD -- 5.4.7 CAESAR -- 5.4.8 APERO -- 5.4.9 SIGNUM (Simple Integrated Geomorphological Numerical Model)…”
Libro electrónico -
3528por Kumar, Kukatlapalli PradeepTabla de Contenidos: “…5.5.2 Biological Neuron Model -- 5.5.3 Artificial Neural Networks -- 5.5.4 Network Topologies -- 5.5.4.1 NARX Neural Network -- 5.5.5 ANN Modeling Using Mathematical Models -- 5.6 Neuron Spiking Model Using FitzHugh-Nagumo (F-N) System -- 5.6.1 Linearization of F-N System -- 5.6.2 Reduced Order Model of Linear System -- 5.6.3 Finite Difference Discretization of F-N System -- 5.6.4 MOR of F-N System Using POD-Galerkin Method -- 5.7 Ring Oscillator Model -- 5.7.1 Model Order Reduction of Ring Oscillator Circuit -- 5.7.2 Ring Oscillator Circuit Approximation Using Linear System MOR -- 5.7.3 POD-ANN Macromodel of Ring Oscillator Circuit -- 5.8 Nonlinear VLSI Interconnect Model Using Telegraph Equation -- 5.8.1 Macromodeling of VLSI Interconnect -- 5.8.2 Discretisation of Interconnect Model -- 5.8.3 Linearization of VLSI Interconnect Model -- 5.8.4 Reduced Order Linear Model of VLSI Interconnect -- 5.9 Macromodel Using Machine Learning -- 5.9.1 Activation Function -- 5.9.2 Bayesian Regularization -- 5.9.3 Optimization -- 5.10 MOR of Dynamical Systems Using POD-ANN -- 5.10.1 Accuracy and Performance Index -- 5.11 Numerical Results -- 5.11.1 F-N System -- 5.11.2 Ring Oscillator Model -- 5.11.3 Reduced Order POD Approximation of Ring Oscillator -- 5.11.3.1 Study of POD-ANN Approximation of Ring Oscillator for Variation in Amplitude of Input Signal and for Different Input Signals -- 5.11.3.2 POD-ANN Approximation of Ring Oscillator for Variation in Frequency -- 5.11.4 POD-ANN Approximation of VLSI Interconnect -- 5.12 Conclusion -- References -- Chapter 6 Comparative Analysis of Various Ensemble Approaches for Web Page Classification -- 6.1 Introduction -- 6.2 Literature Survey -- 6.3 Material and Methods -- 6.4 Ensemble Classifiers -- 6.4.1 Bagging -- 6.4.1.1 Bagging Meta Estimator -- 6.4.1.2 Random Forest -- 6.4.2 Boosting -- 6.4.2.1 AdaBoost…”
Publicado 2023
Libro electrónico -
3529Publicado 2013Tabla de Contenidos: “…Conservación de recursos forestales nativos de Argentina: el cultivo de plantas leñosas en vivero y a campo; Página legal; Índice; Prólogo; Agradecimientos; I Introducción; Bibliografía; II Domesticación de especies forestales nativas Un enfoque para la discusión; Parte I. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3530Publicado 2022Tabla de Contenidos: “…-- 2.2 The Untapped Green Potential of the Subsides Agreement -- 2.3 Three Ways to Protect the Environment -- 2.4 Trade Sanctions and Forests Protection -- 2.5 A New Kind of Environmental Bargain -- 2.6 The EU's Sustainable Commercial Policy -- 2.7 From Exception to Promotion -- i -- ii -- iii -- 3 The Power of Ideas -- 3.1 From Weak to Strong Integration -- 3.2 Watching the Seeds Grow -- 3.3 The Development Factor -- 3.4 It's Not All About the Environment -- 3.5 Two Birds with One Stone -- 3.6 Missed Opportunities -- 6 Conclusions -- 1 Ideational Change -- 2 Historical Contingency -- 2.1 The gatt and Embedded Liberalism -- 2.2 The wto and the Resurgence of Neoliberalism -- 2.3 The 2030 Agenda and the Instrumental Role of Trade -- 3 A New Trade Story -- 3.1 One. …”
Libro electrónico -
3531por Elsevier B.V.Tabla de Contenidos: “…Cryptic Eucoleus [Capillaria] sp. in the respiratory tract of a cat from Australia -- Comparison of quantitative polymerase chain reaction, Kato-Katz and circulating cathodic antigen rapid test for the diagnosis of Schistosoma mansoni infection: A cross-sectional study in Kirinyaga County, Kenya -- Field evaluation of Veeralin, an alpha-cypermethrin + PBO long-lasting insecticidal net, against natural populations of Anopheles funestus in experimental huts in Muheza, Tanzania -- In vitro anti-Trypanosoma cruzi activity enhancement of curcumin by its monoketone tetramethoxy analog diveratralacetone -- Complexity of malaria transmission dynamics in the Brazilian Atlantic Forest -- Using cerebrospinal fluid to confirm Angiostrongylus cantonensis as the cause of canine neuroangiostrongyliasis in Australia where A. cantonensis and Angiostrongylus mackerrasae co-exist -- Molecular screening for tick-borne bacteria and hematozoa in Ixodes cf. boliviensis and Ixodes tapirus (Ixodida: Ixodidae) from western highlands of Panama -- Illuminating the bacterial microbiome of Australian ticks with 16S and Rickettsia-specific next-generation sequencing -- Biolarviciding for malaria vector control: Acceptance and associated factors in southern Tanzania -- Unexpected failure of Ixodes scapularis nymphs to transmit a North American Borrelia bissettiae strain -- Promastigotes of Leishmania donovani exhibited sensitivity towards the high altitudinal plant Cicer microphyllum -- Towards understanding transfluthrin efficacy in a pyrethroid-resistant strain of the malaria vector Anopheles funestus with special reference to cytochrome P450-mediated detoxification -- Insecticide-impregnated netting: A surface treatment for killing Lutzomyia longipalpis (Diptera: Psychodidae), the vector of Leishmania infantum -- Cat fleas (Ctenocephalides felis clade 'Sydney') are dominant fleas on dogs and cats in New South Wales, Australia: Presence of flea-borne Rickettsia felis, Bartonella spp. but absence of Coxiella burnetii DNA -- Babesia gibsoni emerging with high prevalence and co-infections in "fighting dogs" in Hungary -- Morphological and molecular characterization of a new species of Isospora Schneider, 1881 (Apicomplexa: Eimeriidae) from the western wattlebird Anthochaera lunulata Gould in Western Australia -- Unravelling the diversity of the Crassiphialinae (Digenea: Diplostomidae) with molecular phylogeny and descriptions of five new species -- Haemoprotozoan surveillance in peri-urban native and introduced wildlife from Australia -- VectorMap-GR: A local scale operational management tool for entomological monitoring, to support vector control activities in Greece and the Mediterranean Basin -- Neospora caninum and Toxoplasma gondii as causes of reproductive losses in commercial sheep flocks from Argentina -- Molecular detection of Borrelia burgdorferi (sensu lato) and Rickettsia spp. in hard ticks distributed in Tokachi District, eastern Hokkaido, Japan -- Considerations for anthelmintic resistance emergence in hookworm at a single locus -- Wild deer in the United Kingdom are a potential reservoir for the livestock parasite Babesia divergens -- First description of sarcoptic mange in an Iberian hare (Lepus granatensis) -- Evaluation of buffered Trypanosoma evansi antigen and rapid serum agglutination test (BA/Te) for the detection of anti-T. evansi antibodies in horses in Brazil -- Cryptosporidium of birds in pet markets in Wuhan city, Hubei, China -- Global analysis of cytochrome c oxidase subunit 1 (cox1) gene variation in Dibothriocephalus nihonkaiensis (Cestoda: Diphyllobothriidae) -- Insecticidal efficacy of afoxolaner against Stomoxys calcitrans (Diptera: Muscidae) in dogs -- The detection of Schistosoma bovis in livestock on Pemba Island, Zanzibar: A preliminary study -- Sarcoptic mange in the wild boar, Sus scrofa, in Sweden -- Dengue outbreaks in Bangladesh: Historic epidemic patterns suggest earlier mosquito control intervention in the transmission season could reduce the monthly growth factor and extent of epidemics -- Predicting eastern equine encephalitis spread in North America: An ecological study -- Vapor phase repellency and insecticidal activity of pyridinyl amides against anopheline mosquitoes -- Editorial: First anniversary of Current Research in Parasitology &Vector-BorneDiseases…”
Publicado 2021
Revista digital -
3532Publicado 2023Tabla de Contenidos: “…Reconstruction of Subsurface Salinity Structure in the South China Sea Using Satellite Observations: A LightGBM-Based Deep Forest Method -- L ́ea Schamberger, Audrey Minghelli, Malik Chami and Fran ̧cois Steinmetz Improvement of Atmospheric Correction of Satellite Sentinel-3/OLCI Data for Oceanic Waters in Presence of Sargassum -- Mingjun He, Shuangyan He, Xiaodong Zhang, Feng Zhou and Peiliang Li AssessmentofNormalizedWater-LeavingRadianceDerivedfromGOCIUsingAERONET-OC Data -- Shiming Lu, Mingjun He, Shuangyan He, Shuo He, Yunhe Pan, Wenbin Yin and Peiliang Li An Improved Cloud Masking Method for GOCI Data over Turbid Coastal Waters -- Hongwei Zhang, Yuanshuai Zhang, Ziwang Li, Bingyi Liu, Bin Yin and Songhua Wu Small Angle Scattering Intensity Measurement by an Improved Ocean Scheimpflug Lidar System -- Junyi Li, Huiyuan Zheng, Lingling Xie, Quanan Zheng, Zheng Ling and Min Li Response of Total Suspended Sediment and Chlorophyll-a Concentration to Late Autumn Typhoon Events in The Northwestern South China Sea -- Khalid A. …”
Libro electrónico -
3533por Politt, KatjaTabla de Contenidos: “…Infinitiv Perfekt Vorgangspassiv -- 5.3. Random Forests und Trees -- 5.3.1. Epistemisches dürfte -- 5.3.2. …”
Publicado 2022
Libro electrónico -
3534Publicado 2000Tabla de Contenidos: “…Establishment of the Role of Steroid Hormones in Plant Growth and Development -- NRI Awards -- Patents -- Publications -- Additional Information -- Signal-Transduction Pathway of the Plant Hormone Ethylene -- NRI Awards -- Patents -- Publications -- Additional Information -- Improvements in Plant Biotechnology by Manipulation of Gene Silencing -- NRI Awards to Vicki Vance, University of South Carolina -- NRI Awards to James Carrington, Texas A& -- M University -- Patent -- Publications -- A New BAC Library Vector for Transferring Large DNA Inserts to Plants -- NRI Award -- Patent -- Publications -- Additional Information: -- Appendix H Research Needs in Food, Fiber, and Natural Resources -- PLANTS -- ANIMALS -- NUTRITION, FOOD SAFETY, AND HEALTH -- NATURAL RESOURCES AND THE ENVIRONMENT -- ENHANCING VALUE AND USE OF AGRICULTURAL AND FOREST PRODUCTS -- MARKETS, TRADE, AND RURAL DEVELOPMENT -- Appendix I Grant Performance Follow-on for Quality Evaluation -- References -- About the Authors -- RECENT PUBLICATIONS OF THE BOARD ON AGRICULTURE AND NATURAL RESOURCES…”
Libro electrónico -
3535Publicado 2023Tabla de Contenidos: “…Processing dataset outliers -- Cost-based feature selection with swarm intelligence -- Correlation-based feature selection with swarm intelligence -- Experimental setup -- Genetic algorithm -- GA algorithm parameters -- Genetic algorithm results -- Geometric PSO -- GPSO parameters -- GPSO results -- Chaotic harmony search -- Algorithm parameters -- Chaotic harmony search results -- Chaotic Cuckoo Search -- Algorithm parameters -- Chaotic Cuckoo Search results -- Evolutionary algorithm -- EA parameters -- EA results -- Predictions with reduced features, SVM and random forest -- Crime forecasting with PSO-SVM -- References -- 9. …”
Libro electrónico -
3536Publicado 2023Tabla de Contenidos: “…12.3.1.5 Spying -- 12.3.2 Active Attacks -- 12.3.2.1 Denial of Service -- 12.3.2.2 Distributed Denial of Service (DDOS) -- 12.3.2.3 Message Modification -- 12.3.2.4 Masquerade -- 12.3.2.5 Trojans -- 12.3.2.6 Replay Attacks -- 12.3.3 Programming Weapons for the Attackers -- 12.3.3.1 Dormant Phase -- 12.3.3.2 Propagation Phase -- 12.3.3.3 Triggering Phase -- 12.3.3.4 Execution Phase -- 12.4 Recent Cyber Attacks -- 12.5 Drawbacks of Traditional Cryptography -- 12.5.1 Cost and Time Delay -- 12.5.2 Disclosure of Mathematical Computation -- 12.5.3 Unsalted Hashing -- 12.5.4 Attacks -- 12.6 Need of Quantum Cryptography -- 12.6.1 Quantum Mechanics -- 12.7 Evolution of Quantum Cryptography -- 12.8 Conclusion and Future Work -- References -- Chapter 13 Identification of Bacterial Diseases in Plants Using Re-Trained Transfer Learning in Quantum Computing Environment -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Proposed Methodology -- 13.3.1 SVM Classifier -- 13.3.2 Random Forest to Classify the Rice Leaf -- 13.3.2.1 Image Pre-Processing -- 13.3.2.2 Feature Extraction -- 13.3.2.3 Classification -- 13.4 Experiment Results -- Conclusion -- References -- Chapter 14 Quantum Cryptography -- 14.1 Fundamentals of Cryptography -- 14.2 Principle of Quantum Cryptography -- 14.2.1 Quantum vs. …”
Libro electrónico -
3537Publicado 2022Tabla de Contenidos: “…11.3.3 Prediction of Nifty score -- 11.3.3.1 Linear regression -- 11.3.3.2 Polynomial regression -- 11.3.3.3 Random forest -- 11.3.3.4 Gradient boost regressor -- 11.4 Results and experimental framework -- 11.4.1 Linear regression -- 11.4.2 Polynomial regression with degree 3 -- 11.4.3 Random forest regression -- 11.4.4 Gradient boost regressor -- 11.5 Conclusion -- References -- Further reading -- 12 Impact of COVID-19: a particular focus on Indian education system -- 12.1 Introduction -- 12.2 Impact of COVID-19 on education -- 12.2.1 Effect of home confinement on children and teachers -- 12.2.2 A multidimensional impact of uncertainty -- 12.3 Sustaining the education industry during COVID-19 -- 12.4 Conclusion -- References -- 13 Designing of Latent Dirichlet Allocation Based Prediction Model to Detect Midlife Crisis of Losing Jobs due to Prolonged... -- 13.1 Introduction -- 13.2 Literature survey -- 13.3 Methodology -- 13.3.1 Distinguishing midlife crisis symptoms -- 13.3.2 Designing of the prediction model -- 13.3.3 Application of LDA and statistical comparison -- 13.3.3.1 Formulation of Dirichlet distribution -- 13.3.3.2 Categorization in Bayesian model -- 13.3.3.3 Concept of topic modeling -- 13.4 Result and discussion -- 13.5 Conclusion and future scope -- References -- 14 Autonomous robotic system for ultraviolet disinfection -- 14.1 Introduction -- 14.2 Background -- 14.2.1 Ultraviolet light for disinfection -- 14.2.2 Exposure time for deactivation of the bacteria -- 14.2.3 Flow chart of UV bot control logic -- 14.2.4 Calculations related to the time for disinfection -- 14.3 Implementation -- 14.4 Model topology -- 14.4.1 UV-C light robotic vehicle -- 14.5 Conclusion -- References -- 15 Emerging health start-ups for economic feasibility: opportunities during COVID-19 -- 15.1 Introduction -- 15.2 Health-tech verticals for start-ups…”
Libro electrónico -
3538Publicado 2025Tabla de Contenidos: “…Front Cover -- Graph Based Multimedia Analysis -- Copyright -- Contents -- List of figures -- List of tables -- Biography -- Foreword -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 Chapter organization -- 1.3 Basics of multimedia -- 1.4 Preliminaries of a video -- 1.5 Multimedia problems -- 1.6 Graph based solutions -- 1.7 Other solution models -- 1.8 Organization of the book -- References -- 2 Theoretical foundations -- 2.1 Motivation -- 2.2 Organization -- 2.3 Graph basics -- 2.4 Delaunay graph -- 2.5 Bipartite graph -- 2.6 Minimum spanning tree -- 2.7 Optimum path forest -- 2.8 Random walks on a graph -- 2.9 Knapsack problems -- 2.10 Elementary game theory -- References -- 3 Exocentric video summarization -- 3.1 Motivation -- 3.2 Chapter organization -- 3.3 Related works -- 3.3.1 Related works for exocentric video summarization -- 3.3.2 Related works for scalable exocentric video summarization -- 3.4 Method I: Delaunay graph based solutions for exocentric video summarization -- 3.4.1 Method IA: Constrained Delaunay graph clustering based summary -- 3.4.1.1 Video frame presampling -- 3.4.1.2 Feature extraction -- 3.4.1.3 Elimination of redundant frames -- 3.4.1.4 Delaunay graph based constrained clustering -- 3.4.1.5 Key frame extraction -- 3.4.2 Method IB: Delaunay graph based summary with user customization -- 3.4.3 Method IC: Delaunay graph based summary in enhanced feature space -- 3.5 Method II: A graph modularity based clustering for exocentric video summarization -- 3.5.1 Compressed domain feature extraction -- 3.5.2 Multi-feature fusion -- 3.5.3 Graph modularity based clustering -- 3.5.4 Key frame extraction -- 3.6 Scalable exocentric video summarization with skeleton graph and random walk -- 3.6.1 Extraction of skeleton graph -- 3.6.2 Clustering of skeleton graph via MST -- 3.6.3 Label propagation with random walks…”
Libro electrónico -
3539Publicado 2008Tabla de Contenidos: “…MANUAL BÁSICO DE LA PODA Y FORMACIÓN DE LOS ÁRBOLES FORESTALES ; PÁGINA LEGAL; PRÓLOGO; ÍNDICE; 1. LAS RAMAS DE LOS ÁRBOLES Y LOS NUDOS DE MADERA; 1.1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3540Publicado 2018Tabla de Contenidos: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept…”
Libro electrónico