Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
21701Publicado 2023“…The possible usefulness of explanatory models of machine learning for diagnosis and for performing chronobiological measurements that allow a more individualized treatment stand out among the novel contributions to the field of dual disorders. …”
Libro electrónico -
21702Publicado 2007“…Methods The systematic review was performed according to procedures described in the Norwegian Knowledge Centre for the Health Servicesf handbook. …”
Libro electrónico -
21703Publicado 2022“…These three approaches ascertain that stakeholders have specific responsibilities to assist in increasing access to high-priced medicines, yet they remain vague about the precise nature of actions stakeholders should perform to promote access to medicines. This report builds particularly on international human rights, and identifies specific obligations that, if properly implemented, should contribute to better access to medicines…”
Libro electrónico -
21704Publicado 2006“…A systematic literature search was performed using the databases Medline, Embase, PsychInfo, Cinahl and Swemed. …”
Libro electrónico -
21705Publicado 2016“…In Norway, thrombectomy is performed at specific intervention centres. However, time is a crucial factor, as the intervention is recommended maximum 6 hours following the stroke. …”
Libro electrónico -
21706Publicado 2007“…We restricted our inclusion criteria to studies with data from 1990 and forward. The review was performed according to general priciples for HTA. RESULTS PCI: We included 37 publications. …”
Libro electrónico -
21707Publicado 2007“…Mandate The Directorate for Health and Social Affairs has asked the Norwegian Knowledge Centre for the Health Services to summarize the documentation of the clinical outcome of IVM cycles and the obstetric, perinatal and devolopmental outcome of IVM children. Methods We have performed a systematic search for literature in the following databases: Cochrane Library, Medline and Embase for the period 2004-2008. …”
Libro electrónico -
21708Publicado 2010“…Two of the studies were performed in the Netherlands, two from England, and one each from Switzerland, Spain, Germany and Canada. …”
Libro electrónico -
21709Publicado 2009“…The Norwegian Knowledge Centre for the Health Services was commissioned by the Norwegian Directorate of Health to perform a systematic review of the scientific evidence concerning effects of rehabilitation on social and community participation among patients with reduced functional capacity. …”
Libro electrónico -
21710Publicado 2017“…We considered that only a few studies were performed in such a way that they provide an adequate description of the method's ability to estimate age. …”
Libro electrónico -
21711Publicado 2004“…The search was last performed in August 2003. All studies considered possibly relevant were retrieved and read independently by two group members. …”
Libro electrónico -
21712Publicado 2023“…This practical guide provides recipes to help you unravel common problems and perform useful tasks when working with Go. Each recipe includes self-contained code solutions that you can freely use, along with a discussion of how and why they work. …”
Libro electrónico -
21713Publicado 2012“…These practical tools can be used to easily test selected mathematical formulation or for performing a swift sensitivity analysis. The tools presented in this reference work focus primarily on mixing height evaluation, representative day identification and PBL characterization by elementary measurements evaluated at surface level. …”
Libro electrónico -
21714Publicado 2012“…With the ability to provide a large number of possible movements, such prostheses offer great promise for enhancing the ability of amputees to better perform the activities of daily living. Use of this enhanced capability, however, requires in most cases a user interface that enables efficient and intuitive access to the multiple movements offered by these prostheses. …”
Libro electrónico -
21715Publicado 2023“…We will learn to create, modify, and manage database objects, perform data querying, filtering, and sorting, and explore advanced topics such as JOIN operations, subqueries, and window functions. …”
Video -
21716Publicado 2024“…Starting with fundamental modules like os and os.path, you'll learn to interact with the operating system and manipulate file paths through practical examples. You'll perform file system operations, navigate directories, and handle paths efficiently. …”
Vídeo online -
21717Publicado 2024“…The course then transitions to advanced RAG techniques, where you will explore methods for expanding generated answers, embedding text chunks, and performing similarity searches. Hands-on exercises will guide you through adding documents to vector stores, generating answers, and projecting embedded results on graphs. …”
Vídeo online -
21718Publicado 2024“…The course further explores advanced actions, including drill fields, links, and setting custom actions, ensuring you can perform detailed analyses and provide actionable insights. …”
Vídeo online -
21719Publicado 2022“…Next, learn about hashing using PowerShell and hashcat and how to perform brute force attacks. Delve deep into all about websites, web applications, and databases. …”
Video -
21720Publicado 2022“…You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. …”
Video