Mostrando 14,741 - 14,760 Resultados de 18,171 Para Buscar '"framework"', tiempo de consulta: 0.23s Limitar resultados
  1. 14741
    Publicado 2022
    Tabla de Contenidos: “…6.6 Future direction of data-analytic-based optical monitoring -- 6.7 Summary -- Acknowledgment -- References -- 7 Machine Learning methods for Quality-of-Transmission estimation -- 7.1 Introduction -- 7.2 Classification and regression models for QoT estimation -- 7.2.1 Classification approaches for QoT estimation -- 7.2.1.1 Performance evaluation metrics - ML classification -- 7.2.1.2 Illustrative description of a classifier for QoT estimation -- 7.2.2 Regression approaches for QoT estimation -- 7.2.2.1 Regression models for QoT estimation -- 7.3 Active and transfer learning approaches for QoT estimation -- 7.3.1 Active learning -- 7.3.1.1 Gaussian Processes for QoT estimation -- 7.3.2 Transfer learning -- 7.3.2.1 Domain adaptation techniques -- 7.3.3 When to apply AL/DA during network lifecycle -- 7.4 On the integration of ML in optimization tools -- 7.4.1 RMSA integrating ML-based QoT estimation in EONs -- 7.4.1.1 Integrated network planning framework -- 7.5 Illustrative numerical results -- 7.5.1 Data generation -- 7.5.2 Classification -- 7.5.3 Regression -- 7.5.4 Active learning and transfer learning -- 7.6 Future research directions and challenges -- 7.7 Conclusion -- References -- 8 Machine Learning for optical spectrum analysis -- 8.1 Introduction -- 8.1.1 Failure detection and localization -- 8.1.2 Optical spectrum -- 8.1.3 Failures affecting the optical spectrum -- 8.2 Feature-based spectrum monitoring -- 8.2.1 Motivation and objectives -- 8.2.2 OSA for soft-failure detection and identification -- 8.2.2.1 Soft-failure detection, identification, and localization -- 8.2.2.2 Options for classification using FeX -- Multi-classifier approach -- Single-classifier approach -- Feature transformation for single-classifier approach -- 8.2.3 Soft-failure localization -- 8.2.4 Illustrative results -- 8.2.4.1 VPI set-up for data collection…”
    Libro electrónico
  2. 14742
    Publicado 2021
    Tabla de Contenidos: “…2.11 RetinaNet -- 2.11.1 Focal loss -- 2.12 Detection performances -- 2.13 Conclusion -- References -- Biographies -- 3 Learning with limited supervision -- 3.1 Introduction -- 3.2 Context-aware active learning -- 3.2.1 Active learning -- 3.2.2 Context in active learning -- 3.2.3 Framework for context-aware active learning -- 3.2.4 Applications -- 3.3 Weakly supervised event localization -- 3.3.1 Network architecture -- 3.3.2 k-max multiple instance learning -- 3.3.3 Coactivity similarity -- 3.3.4 Applications -- 3.4 Domain adaptation of semantic segmentation using weak labels -- 3.4.1 Weak labels for category classification -- 3.4.2 Weak labels for feature alignment -- 3.4.3 Network optimization -- 3.4.4 Acquiring weak labels -- 3.4.5 Applications -- 3.4.6 Output space visualization -- 3.5 Weakly-supervised reinforcement learning for dynamical tasks -- 3.5.1 Learning subgoal prediction -- 3.5.2 Supervised pretraining -- 3.5.3 Applications -- 3.6 Conclusions -- Acknowledgments -- References -- Biographies -- 4 Efficient methods for deep learning -- 4.1 Model compression -- 4.1.1 Parameter pruning -- 4.1.2 Low-rank factorization -- 4.1.3 Quantization -- 4.1.4 Knowledge distillation -- 4.1.5 Automated model compression -- 4.2 Efficient neural network architectures -- 4.2.1 Standard convolution layer -- 4.2.2 Efficient convolution layers -- 4.2.3 Manually designed efficient CNN models -- 4.2.4 Neural architecture search -- 4.2.5 Hardware-aware neural architecture search -- 4.3 Conclusion -- References -- 5 Deep conditional image generation -- 5.1 Introduction -- 5.2 Visual pattern learning: a brief review -- 5.3 Classical generative models -- 5.4 Deep generative models -- 5.5 Deep conditional image generation -- 5.6 Disentanglement for controllable synthesis -- 5.6.1 Disentangle visual content and style -- 5.6.2 Disentangle structure and style…”
    Libro electrónico
  3. 14743
    por Meier, Nicola, 1977-
    Publicado 2009
    Tabla de Contenidos: “…-- 3.2.3.1 The State Planning Commission and its successors -- 3.2.3.2 Streamlined government structure -- 3.3 State -- 3.3.1 Industrial policy -- 3.3.2 Institutional reforms - drivers of and obstacles to economic growth -- 3.3.2.1 Fiscal federalism -- 3.3.2.2 Collective ownership -- 3.3.2.3 Corruption -- 3.3.2.4 Local protectionism -- 3.3.3 Promotion of selected sectors, companies and projects -- 3.3.3.1 Industrial policy targeting S&amp -- T -- 3.3.3.2 State effort to increase China's R&amp -- D capabilities -- 3.3.4 Foreign participation -- 3.3.4.1 Substantial reliance on FDI -- 3.3.4.2 State guidance of FDI -- 3.3.5 Export-oriented industrialization -- 3.3.5.1 Export promotion and import substitution -- 3.3.5.2 Sectoral targeting of exports -- 3.3.5.3 The central government's devaluation policy to promote exports -- 3.3.5.4 Export-FDI nexus in Special Economic Zones -- 3.4 Financial system -- 3.4.1 Government influence over the financial system -- 3.4.2 Sectoral and firm-level allocation of credit -- 3.4.3 Fragility of the Chinese financial system -- 3.5 Government-business relations -- 3.6 Conclusion -- 4 The auto industry in the light of the Chinese development approach -- 4.1 Design of research -- 4.1.1 Qualitative analysis -- 4.1.1.1 Expert interviews as a method of qualitative research -- 4.1.1.2 Interview partners and questionnaires -- 4.1.1.3 Research design quality -- 4.1.2 Quantitative analysis -- 4.1.2.1 The data sample -- 4.1.2.2 Methodology of the statistical evaluation -- 4.1.3 Shortcomings of the research approach -- 4.2 Bureaucratic framework of the auto industry -- 4.2.1 Bureaucratic institutions shaping the auto sector's development -- 4.2.2 Policy-making and implementation -- 4.3 National auto industrial policy -- 4.3.1 FDIs in the auto sector…”
    Electrónico
  4. 14744
    Publicado 2019
    Tabla de Contenidos: “…-- 1 Introduction -- 2 A Framework for Regional House Price Modelling: The Case of London -- 3 The Case of Paris -- 4 Conclusions -- References…”
    Libro electrónico
  5. 14745
    Publicado 2017
    Tabla de Contenidos: “…/ Professional and social integration of migrants and language learning: convergences and challenges at the European level / Mediation and the social and linguistic integration of migrants: updating the CEFR descriptors / Sociocultural integration and second language proficiency following migration / Integration trajectories of adult (im)migrants in minority and minoritized contexts: Ottawa and Barcelona / L'intégration linguistique des migrants adultes: la mise en œuvre des politiques publiques dans la région suisse alémanique de Zurich / 3 Linguistic repertoires and integration / Répertoires linguistiques et intégration -- Multilingualism as a resource for basic education with young migrants / La place de la L1 dans les familles bilingues franco-turques en Alsace / La loyauté linguistique au sein des membres de la communauté kurde en France / Le résident européen percevant sa propre aptitude linguistique dans un contexte judiciaire - une première recherche empirique sans prétention / Répertoires linguistiques des détenus étrangers en Italie et en Europe: premiers résultats des projets RiUscire et DEPORT / 4 Language teaching for integration: content, methods and materials / Formations en langue pour l'intégration: contenu, méthodes et matériels -- Les besoins langagiers des adultes migrants: une notion complexe à appréhender / What migrant learners need / fide - On the way to a coherent framework / Settlement, integration and language learning: possible synergies. …”
    Electrónico
  6. 14746
    Publicado 2018
    Tabla de Contenidos: “…-- ANNs and the backpropagation algorithm -- Weight optimization -- Stochastic gradient descent -- Neural network architectures -- Deep Neural Networks (DNNs) -- Multilayer perceptron -- Deep Belief Networks (DBNs) -- Convolutional Neural Networks (CNNs) -- AutoEncoders -- Recurrent Neural Networks (RNNs) -- Emergent architectures -- Deep learning frameworks -- Summary -- Chapter 2: A First Look at TensorFlow -- A general overview of TensorFlow -- What's new in TensorFlow v1.6? …”
    Libro electrónico
  7. 14747
    Publicado 2018
    Tabla de Contenidos: “…-- Hardware availability -- Data and algorithms -- Deep learning frameworks -- PyTorch -- Summary -- Chapter 2: Building Blocks of Neural Networks -- Installing PyTorch -- Our first neural network -- Data preparation -- Scalar (0-D tensors) -- Vectors (1-D tensors) -- Matrix (2-D tensors) -- 3-D tensors -- Slicing tensors -- 4-D tensors -- 5-D tensors -- Tensors on GPU -- Variables -- Creating data for our neural network -- Creating learnable parameters -- Neural network model -- Network implementation -- Loss function -- Optimize the neural network -- Loading data -- Dataset class -- DataLoader class -- Summary -- Chapter 3: Diving Deep into Neural Networks -- Deep dive into the building blocks of neural networks -- Layers - fundamental blocks of neural networks -- Non-linear activations -- Sigmoid -- Tanh -- ReLU -- Leaky ReLU -- PyTorch non-linear activations -- The PyTorch way of building deep learning algorithms -- Model architecture for different machine learning problems -- Loss functions -- Optimizing network architecture -- Image classification using deep learning -- Loading data into PyTorch tensors -- Loading PyTorch tensors as batches -- Building the network architecture -- Training the model -- Summary -- Chapter 4: Fundamentals of Machine Learning -- Three kinds of machine learning problems -- Supervised learning -- Unsupervised learning -- Reinforcement learning -- Machine learning glossary…”
    Libro electrónico
  8. 14748
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 9: Working with Snap Framework -- Introduction -- Getting started with Snap -- How to do it... -- How it works... -- Routing in Snap -- How to do it... -- How it works…”
    Libro electrónico
  9. 14749
    por Montagnino, Marian, author
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Preface -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Part 1: Getting Started with a Solid Foundation -- Chapter 1: Understanding CLI Standards -- A brief introduction and history of the command line -- About the history -- Introducing the CLI -- The philosophy of CLI development -- Checklist for a successful CLI -- The guidelines -- Name -- Help and documentation -- Input -- Output -- Configuration -- Security -- Open source community -- Software lifespan and robustness -- Go for CLIs -- Summary -- Questions -- Answers -- Further reading -- Chapter 2: Structuring Go Code for CLI Applications -- Technical requirements -- Commonly used program layouts for robust applications -- Program layouts -- Common folders -- Determining use cases and requirements -- Use cases -- Requirements -- Disadvantages and benefits of use cases and requirements -- Use cases, diagrams, and requirements for a CLI -- Requirements for a metadata CLI -- Structuring an audio metadata CLI application -- Bounded context -- Language -- Entities and value objects -- Aggregation -- Service -- Events -- Repository -- Creating the structure -- Summary -- Questions -- Answers -- Further reading -- Chapter 3: Building an Audio Metadata CLI -- Technical requirements -- Defining the components -- cmd/ -- cmd/api/ -- cmd/cli/ -- cmd/cli/command -- extractors/ -- extractors/tags -- extractors/transcript -- internal/interfaces -- models/ -- services/metadata -- storage/ -- vendor/ -- Implementing use cases -- Uploading audio -- Requesting metadata -- Testing a CLI -- Manual testing -- Testing and mocking -- Summary -- Questions -- Answers -- Chapter 4: Popular Frameworks for Building CLIs -- Technical requirements -- Cobra - a library for building modern CLI applications -- Creating subcommands -- Global, local, and required flags…”
    Libro electrónico
  10. 14750
    Publicado 2023
    Tabla de Contenidos: “…-- Importance of standardizing deliverables -- The art and science of designing insightful standardized reports -- Delving into parts that can be flexible but not compromised -- Mastering the research readout -- Tone and eye contact -- Summary -- Chapter 16: Data Visualization - the Power of Visuals to Help with Cognition and Decisions -- Data visualization for quick insights -- Understanding basic data visualization types -- Static versus interactive visualizations -- Static visualizations -- Interactive visualizations -- Understanding levels of detail -- Moving toward predictive and prescriptive analysis -- Predictive analysis -- When you don't have data scientists at your disposal -- Prescriptive analysis -- Summary -- Chapter 17: Heuristics - How We Measure Application Usability -- Getting to know application heuristics -- Exploring the Nielsen Norman Usability Heuristics Platform -- Visibility of system status -- Match between the system and the real world -- User control and freedom -- Consistency and standards -- Error prevention -- Recognition rather than recall -- Flexibility and efficiency of use -- Aesthetic and minimalist design -- Help users recognize, diagnose, and recover from errors -- Help and documentation -- Making use of other types of evaluation -- Cognitive walk-through -- Feature inspection -- Pluralistic walk-through -- Cognitive dimensions framework -- Wrapping up -- Summary -- In conclusion and thanks -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  11. 14751
    Publicado 2018
    Tabla de Contenidos: “…Application programming in a cross-development environment -- 7 Accessing hardware -- Review -- ARM I/O Architecture -- LEDs -- Accessing I/O From Linux: Our First Program -- Creating a Project -- The Target Execution Environment -- The led Program -- The Makefile -- A Data Acquisition Example -- Set Up the Hardware -- Accessing the Analog Subsystem -- Resources -- 8 Debugging embedded software -- Remote Debugging With Eclipse -- Remote Debug Launch Configuration -- A Thermostat -- Host Workstation as Debug Environment -- Advanced Breakpoint Features -- Debugger Services Framework -- Configuring Remote System Explorer -- Debugging With Remote System Explorer -- Resources -- 9 Posix threads -- Threads -- Thread Attributes -- Synchronization: Mutexes -- Mutex Attributes -- Problems With Solving the Resource Sharing Problem: Priority Inversion -- Communication: Condition Variables -- Condition Variable Attributes -- Thread Termination and Cancellation…”
    Libro electrónico
  12. 14752
    Tabla de Contenidos: “…Branch-Combining Diversity -- Diversity Antenna Array, Type, Orientation, and Spacing -- Transmit Beam-Forming Types -- Legacy Beam Forming -- Implicit Beam Forming -- Explicit Beam Forming -- MIMO Antenna Array Coverage and Placement -- Coding -- Binary Convolutional Coding (BCC) -- Low-Density Parity Checking (LDPC) -- HT PHY and Operation -- HT Mixed -- HT-Greenfield Format -- Channel Bonding/40-MHz-Wide Channels -- Protection -- Power Management -- Packet Aggregation -- Bursting/Block ACK (BACK) -- Short Guard Interval (GI) -- Reduced Inter-Frame Spacing (RIFS) -- Reverse Direction Protocol (RDP) -- Modulation and Coding Schemes (MCS) -- Configuration Requirements to Obtain HT Rates -- Predicting 802.11 Link Performance -- Summary -- Chapter 4 Cisco Unified Wireless LAN Security Fundamentals -- Understanding WLAN Security Challenges -- Vulnerabilities Inherent to the Radio Transmission Medium -- Physical Containment Problem -- Unlicensed Radio Spectrum Problem -- Vulnerabilities Inherent to the Standards Definitions -- Authentication and Encryption Weaknesses -- Unauthenticated Management Frames -- Vulnerabilities Inherent to Mobility -- Misconfigured Wireless Devices and Clients -- Rogue Access Points and Devices -- Readily Available Profiling and Attack Tools -- Addressing the WLAN Security Challenges -- Background on Strong Authentication and Privacy -- How WEP Encryption Works -- How WEP Is Broken -- 802.11 Authentication -- Addressing the Strong Authentication and Privacy Challenges -- Authentication Framework -- Authentication Algorithm -- Data Privacy and Integrity -- Alternative Approaches to Authentication and Data Privacy -- Rogue Access Point Detection and Wireless Intrusion Prevention -- Secure Management and Security Policies -- Summary -- References -- Chapter 5 Design Considerations -- 100 Percent Wireless Access Layer…”
    Libro electrónico
  13. 14753
    Publicado 2022
    Tabla de Contenidos: “…-- Rules for Disguised Cases -- Disguise Tips -- Research Ethics for Case Writers -- 5: Writing a Compact Case -- Case Writing Conventions -- Compact Case Components -- Opening Hook -- Five Ws and an H Framework -- Length of the Hook -- What Not To Do…”
    Libro electrónico
  14. 14754
    Publicado 2014
    Tabla de Contenidos: “…Response to Intervention for youth with Attention-Deficit/Hyperactivity Disorder: Incorporating an Evidence-Based Intervention within a Multi-tiered Framework; Rebecca K. Vujnovic, Alex S. Holdaway, Julie Sarno Owens, Gregory A. …”
    Libro electrónico
  15. 14755
    por Hughes, Chris
    Publicado 2024
    Tabla de Contenidos: “…Risk Management and Patching -- Building a Patch Management Program -- People -- Process -- Technology -- Summary -- Chapter 3 Secure Configuration -- Regulations, Frameworks, and Laws -- NSA and CISA Top Ten Cybersecurity Misconfigurations -- Default Configurations of Software and Applications -- Improper Separation of User/Administrator Privilege -- Insufficient Internal Network Monitoring -- Lack of Network Segmentation -- Poor Patch Management -- Bypass of System Access Controls -- Weak or Misconfigured Multifactor Authentication Methods -- Lack of Phishing-Resistant MFA -- Insufficient Access Control Lists on Network Shares and Services -- Poor Credential Hygiene -- Unrestricted Code Execution -- Mitigations -- Default Configurations of Software Applications -- Improper Separation of User/Administration Privilege -- Insufficient Network Monitoring -- Poor Patch Management -- Wrapping up the CIS Misconfigurations Guidance -- CIS Benchmarks -- DISA Security Technical Implementation Guides -- Summary -- Chapter 4 Continuous Vulnerability Management -- CIS Control 7-Continuous Vulnerability Management -- Establish and Maintain a Vulnerability Management Process -- Establish and Maintain a Remediation Process -- Perform Automated Operating System Patch Management -- Perform Automated Application Patch Management -- Perform Automated Vulnerability Scans of Internal Enterprise Assets -- Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets -- Remediate Detected Vulnerabilities -- Continuous Monitoring Practices -- Summary -- Chapter 5 Vulnerability Scoring and Software Identification -- Common Vulnerability Scoring System -- CVSS 4.0 at a Glance -- Base Metrics -- Exploitability Metrics -- Threat Metrics -- Environmental Metrics -- Supplemental Metrics -- Qualitative Severity Rating Scale -- Vector String…”
    Libro electrónico
  16. 14756
    Publicado 2024
    Tabla de Contenidos: “…-- 3.6.3 Towards Systemic Pragmatism -- 3.7 Conclusion -- References -- Part 2 Critical Systems Practice -- Chapter 4 Critical Systems Practice: An Overview -- 4.1 Introduction -- 4.2 The Origins of Critical Systems Practice -- 4.3 Contemporary Critical Systems Practice -- 4.3.1 Essence -- 4.3.2 The EPIC Framework -- 4.3.3 The Four Stages -- 4.3.3.1 Explore the Situation of Interest -- 4.3.3.2 Produce an Intervention Strategy -- 4.3.3.3 Intervene Flexibly -- 4.3.3.4 Check on Progress -- 4.4 Considerations on the Nature of Critical Systems Practice -- 4.5 Related Approaches -- 4.6 Conclusion…”
    Libro electrónico
  17. 14757
    Publicado 1990
    Tabla de Contenidos: “…National Priorities for the Assessment of Clinical Conditions and Medical Technologies -- Copyright -- Acknowledgments -- Foreword -- Contents -- Summary -- ASSESSING MEDICAL PRACTICE -- A NATIONAL APPROACH -- PRIORITY-SETTING CRITERIA -- TWENTY ASSESSMENT PRIORITIES -- USING THE PRIORITIES -- ACCOMMODATING CLINICAL CONDITIONS AND TECHNOLOGIES -- NEXT STEPS -- 1 Introduction -- 2 A Pilot Process for Setting National Assessment Priorities -- ELEMENTS OF A NATIONAL APPROACH -- NATIONALLY APPLICABLE PRIORITY-SETTING CRITERIA -- Primary Criteria -- Potential (for an Assessment) to Improve Individual Patient Outcome -- Potential to Affect a Large Patient Population -- Potential to Reduce Unit or Aggregate Cost -- Potential to Reduce Unexplained Variations in Medical Practice -- Secondary Criteria -- Potential to Address Social and Ethical Implications -- Potential to Advance Medical Knowledge -- Potential to Affect Policy Decisions -- Potential to Enhance the National Capacity for Assessment -- Potential to Be Readily Conducted -- A CONCEPTUAL FRAMEWORK FOR PRIORITIES -- The Clinical Condition Approach -- The Technology Approach -- Integrating the Clinical Condition and Technology Approaches -- METHOD OF THIS PILOT STUDY -- Overview -- Round I of the Modified Delphi Process -- Round II of the Modified Delphi Process -- The Priority-Setting Group's Meeting -- Activities Following the Priority-Setting Meeting -- 3 Twenty Priority Assessment Areas -- CLINICAL CONDITIONS -- Breast Cancer -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge -- Affect Policy Decisions -- Cataracts -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost…”
    Libro electrónico
  18. 14758
    Publicado 2023
    Tabla de Contenidos: “…Tragic Choices during the COVID-19 Pandemic: The Past and the Future -- 12.1 The Two Main Approaches for Resource Allocation: Ethical (USA) versus Medical (Europe) Framework -- 12.2 Outcomes -- 12.3 Lessons for the Future -- 12.4 Conclusion -- Part IV. …”
    Libro electrónico
  19. 14759
    Publicado 2016
    Tabla de Contenidos: “…Coming of Age -- Preparing to Learn SEM -- Definition of SEM -- Importance of Theory -- A Priori, but Not Exclusively Confirmatory -- Probabilistic Causation -- Observed Variables and Latent Variables -- Data Analyzed in SEM -- SEM Requires Large Samples -- Less Emphasis on Significance Testing -- SEM and Other Statistical Techniques -- SEM and Other Causal Inference Frameworks -- Myths about SEM -- Widespread Enthusiasm, but with a Cautionary Tale -- Family History -- Summary -- Learn More -- 2. …”
    Libro
  20. 14760
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Chapter 1: Introduction to Artificial Intelligence -- 1.1 Artificial Intelligence in Action -- 1.1.1 Artificial Intelligence Explained -- 1.1.2 Machine Learning -- 1.1.3 Neural Networks and Deep Learning -- 1.2 The History of Neural Networks -- 1.2.1 Shallow Neural Networks -- 1.2.2 Deep Learning -- 1.3 Deep Learning Characteristics -- 1.3.1 Data Volume -- 1.3.2 Computing Power -- 1.3.3 Network Scale -- 1.3.4 General Intelligence -- 1.4 Deep Learning Applications -- 1.4.1 Computer Vision -- 1.4.2 Natural Language Processing -- 1.4.3 Reinforcement Learning -- 1.5 Deep Learning Framework -- 1.5.1 Major Frameworks -- 1.5.2 TensorFlow 2 and 1.x -- 1.5.3 Demo -- 1.6 Development Environment Installation -- 1.6.1 Anaconda Installation -- 1.6.2 CUDA Installation -- 1.6.3 TensorFlow Installation -- 1.6.4 Common Editor Installation -- 1.7 Summary -- 1.8 Reference -- Chapter 2: Regression -- 2.1 Neuron Model -- 2.2 Optimization Method -- 2.3 Linear Model in Action -- 2.4 Summary -- 2.5 References -- Chapter 3: Classification -- 3.1 Handwritten Digital Picture Dataset -- 3.2 Build a Model -- 3.3 Error Calculation -- 3.4 Do We Really Solve the Problem? …”
    Libro electrónico