Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
18881Publicado 2020“…This range includes, among others, management of the uncertainty in a fuzzy environment; fuzzy assessment methods of human-machine performance; fuzzy graphs; fuzzy topological and convergence spaces; bipolar fuzzy relations; type-2 fuzzy; and intuitionistic, interval-valued, complex, picture, and Pythagorean fuzzy sets, soft sets and algebras, etc. …”
Libro electrónico -
18882Publicado 2020“…Studies have aimed at the development of new, sustainable, and flame-retardant additives/materials, providing high performance and low toxicity. Also studied were their properties during ageing and recycling, as well as modeling physical and chemical processes occuring before ignition and during their combustion. …”
Libro electrónico -
18883Publicado 2020“…One of the key research challenges for the commercial deployment of several solar energy technologies is focused on the development of feasible and durable coatings that withstand appropriate optical and thermal performance over the lifetime of the solar facilities. …”
Libro electrónico -
18884Publicado 2017“…Annotation In recent years, studies in the field of thyroid cancer have been performed in order to identify and verify thyroid specific biomarkers, as well as cancer-specific changes in gene expression patterns and alterations of the protein content. …”
Libro electrónico -
18885Publicado 2020“…Soil-mediated water purification and retention, nutrient and matter cycling, and soils habitat functions are essential for maintaining ecosystem services and biodiversity (SDG 15). Healthy soils perform well in all these functions simultaneously. …”
Libro electrónico -
18886Publicado 2018“…The aim is to improve the performances of actual interface circuits and systems, both in terms of voltage mode and current mode, in order to overcome the potential problems due to technology scaling and different technology integrations. …”
Libro electrónico -
18887Publicado 2021“…An intelligent virtual assistant (IVA) or intelligent personal assistant (IPA) is a software agent that can perform tasks or services for an individual based on commands or questions. …”
Libro electrónico -
18888Publicado 2021“…How artificial intelligence is capable of performing microclimate prediction and control, and what considerations should be taken into account for implementing desiccant evaporative cooling systems? …”
Libro electrónico -
18889Publicado 2023“…Finally, we will delve into return metrics and conclude the course by analyzing the project's financial performance. By the end of the course, you will be able to unravel the intricacies of project finance, using the captivating case study on Express Fiji to enhance your understanding. …”
Video -
18890por Wempen, Faithe“…Contents: What Is a Mail Merge? Performing a Letter Merge with the Mail Merge Wizard Selecting a Main Document Type Selecting a Data Source Preparing the Main Document Inserting Merge Fields Filtering and Sorting the Data Previewing and Printing the Merge Creating Custom Merges with Word Fields Faithe Wempen, M.A., is a Microsoft Office Master Instructor and an adjunct instructor of computer information technology at Indiana University/Purdue University at Indianapolis, specializing in Microsoft Office and PC hardware. …”
Publicado 2008
Libro electrónico -
18891Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
Video -
18892Publicado 2023“…BA tools are used in diverse ways, for example, to identify consumer behaviour patterns and market trends, to derive valuable insights on the performance of stocks, to find information on the attrition rate of employees, to analyse and solve healthcare problems, to offer insight into inventory management and supply chain management, to analyse data from social networks, and to infer traffic behaviour and develop traffic management policy, among others.BA and BI have become one of the most popular research areas in academic circles, as well as in the industry, driven by the increasing demand in the business world. …”
Libro electrónico -
18893Publicado 2024“…Get a deep understanding of AWS security concepts to protect your cloud infrastructure against cyber threats Gain foundational knowledge of security strategies and implementation patterns to navigate the complexities of cloud security Strategize your incident response and threat detection performance through preparation, detection, analysis, containment, and post incident activity Get the best knowledge to secure your AWS environment. …”
Video -
18894Publicado 2024“…The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. …”
Video -
18895Publicado 2024“…It then dives into the technicalities of monitoring CPU, memory, disk, and network activity, crucial for maintaining system health and performance. The course focuses on deepening your understanding of Linux's core, including kernel components, modules, and the intricacies of compiling a kernel. …”
Video -
18896Publicado 2024“…You'll gain insights into selecting the right instance types for your projects, optimizing performance, and managing security settings to protect your cloud infrastructure. …”
Video -
18897Publicado 2020“…The authors' contributions relating to solid-state behavior deal with the performance of solid matters pertaining to quantum mechanics, physical metallurgy, and crystallography. …”
Libro electrónico -
18898Publicado 2020“…Second, a thorough theoretical comparative analysis is performed for the models of engine internal gas capacities, and practical recommendations are given on model applications, in particular for engine control purposes. …”
Libro electrónico -
18899Publicado 2006“…The test persons are divided into two age groups (31 to 49 and 50 to 73 years).The tests collect data from the fields of sociology, performance biography, anthropology, anamnesis, motor skills, cardiovascular and lung function parameters at rest and under stress as well as fat and protein metabolism.The results should show the extent to which strength or endurance training or athletic inactivity influences the body at different stages of seniors and that gerontological research must increasingly have its place in the field of sports science…”
Libro electrónico -
18900Publicado 2022“…It offers new discourse and argues for a paradigm shift in how audiology is theorised and performed, particularly in low-and-middle-income country contexts. …”
Libro electrónico