Mostrando 1,201 - 1,220 Resultados de 1,904 Para Buscar '"ranking"', tiempo de consulta: 0.14s Limitar resultados
  1. 1201
    Publicado 2024
    Tabla de Contenidos: “…Authentication UI and Validating Inputs -- Installing Required Modules -- Setting Up Auth Pages -- Using Joi for Input Validation -- Setting Up User Authentication with Supabase -- Creating the Signup Function -- Creating and Managing Personal User Posts -- Adding RLS Policy for the 'Posts' Table -- Using Supabase API for Post Management -- Building the Post Information Page -- Displaying User Posts -- Summary -- Practice Questions -- Further Reading -- Chapter 6: Enhancing a Recipe-Sharing Site While Optimizing SEO Using Nuxt 3 -- Technical requirements -- Essential background - Understanding Search Engine Optimization (SEO) -- Exploring the repository -- Defining metadata for each page -- Setting up the project structure -- Setting up site configuration with nuxt SEO -- Overriding metadata -- Implementing structured data for improved search engine rankings -- Creating a recipe node -- Optimizing recipe images to load pages faster -- Creating a custom og:image for the recipe page -- Generating dynamic site maps for the recipe-sharing site -- Summary -- Practice questions -- Further reading -- Chapter 7: Building a Quiz Game Application to Learn about Testing -- Technical requirements -- Exploring the repository -- Essential background - fundamentals of testing -- Implementing the quiz game app -- Questions data -- Types definitions -- Quiz Pinia store -- The app.vue file -- Writing unit tests for the Pinia store -- Exploring Vitest -- Testing the quiz store -- Writing unit tests for components -- Setting up for component testing -- Creating the Question.spec.ts test file -- Writing the component unit test -- Writing end-to-end tests for the quiz game -- Setting up for E2E testing -- Writing E2E tests -- Exploring Vitest UI and test coverage tools -- Summary -- Practice questions -- Further reading…”
    Libro electrónico
  2. 1202
    Publicado 2024
    Tabla de Contenidos: “…One‐Tailed t‐Tests -- 5.2.2 Rank‐Based Two‐Sample Tests -- 5.3 One‐Sample Tests -- 5.4 Power Analyses and Sample Size Determination -- Chapter 6 Communicating Quantitative Information Using Visuals -- 6.1 The Fundamentals of Scientific Plotting -- 6.2 Scatter Plots -- 6.3 Line Plots -- 6.4 Box Plots and Bar Plots -- 6.5 Multipanel Plots and Plotting Regions -- 6.6 Adding Text, Formulae, and Colour -- 6.7 Interaction Plots -- 6.8 Images, Colour Contour Plots, and 3D Plots -- 6.8.1 Adding Images to Plots -- 6.8.2 Colour Contour Plots -- References -- Chapter 7 Working with Categorical Data -- 7.1 Tabling and Visualising Categorical Data -- 7.2 Contingency Tables -- 7.3 The Chi‐squared Test -- 7.4 Decision Trees -- 7.5 Optimising Decision Trees -- References -- Chapter 8 Working with Continuous Data -- 8.1 Covariance -- 8.2 Correlation Coefficient -- 8.3 Transformations -- 8.4 Plotting Correlations -- 8.5 Correlation Tests -- References -- Chapter 9 Linear Regression -- 9.1 Basics and Simple Linear Regression -- 9.1.1 Making Sense of the summary Output for Regression Models Fitted with lm -- 9.1.2 Model Diagnostics -- 9.1.3 Model Predictions and Visualisation -- 9.1.4 What to Write in a Report or Paper? …”
    Libro electrónico
  3. 1203
    Publicado 2022
    Tabla de Contenidos: “…. -- 1.10.5 Digital Equipment Corp - DEC -- 1.11 Computer company revenue rankings -- 1.12 Computer structures book -- 1.13 Computer family architectures - CFA -- 1.14 Virtual memory and page replacement algorithms -- 1.15 Memory space fragmentation and dynamic storage allocation -- 1.15.1 Page replacement algorithms -- 1.15.2 Simplified analysis of a paging system -- 1.16 Analysis of thrashing in 2-phase locking - 2PL systems…”
    Libro electrónico
  4. 1204
    Publicado 2015
    Tabla de Contenidos: “…CART -- 18.5.4 Detailed Look at the Statistical Analysis -- 18.5.5 Early Results on Defect Data Sets -- 18.6 Summary -- Part IV: Sharing Models -- Chapter 19: Sharing Models: Challenges and Methods -- Chapter 20: Ensembles of Learning Machines -- 20.1 When and Why Ensembles Work -- 20.1.1 Intuition -- 20.1.2 Theoretical Foundation -- 20.2 Bootstrap Aggregating (Bagging) -- 20.2.1 How Bagging Works -- 20.2.2 When and Why Bagging Works -- 20.2.3 Potential Advantages of Bagging for SEE -- 20.3 Regression Trees (RTs) for Bagging -- 20.4 Evaluation Framework -- 20.4.1 Choice of Data Sets and Preprocessing Techniques -- 20.4.1.1 PROMISE data -- 20.4.1.2 ISBSG data -- 20.4.2 Choice of Learning Machines -- 20.4.3 Choice of Evaluation Methods -- 20.4.4 Choice of Parameters -- 20.5 Evaluation of Bagging+RTs in SEE -- 20.5.1 Friedman Ranking -- 20.5.2 Approaches Most Often Ranked First or Second in Terms of MAE, MMRE and PRED(25) -- 20.5.3 Magnitude of Performance Against the Best -- 20.5.4 Discussion -- 20.6 Further Understanding of Bagging+RTs in SEE -- 20.7 Summary -- Chapter 21: How to Adapt Models in a Dynamic World -- 21.1 Cross-Company Data and Questions Tackled…”
    Libro electrónico
  5. 1205
    Publicado 2023
    Tabla de Contenidos: “…4.7.1 Convex Optimization Problems -- 4.7.2 Nonconvex Optimization Problems -- Exercises -- Chapter 5 Optimization Problems -- 5.1 Least‐Squares Problems -- 5.2 Quadratic Programs -- 5.3 Conic Optimization -- 5.3.1 Conic Duality -- 5.3.2 Epigraphical Cones -- 5.4 Rank Optimization -- 5.5 Partially Separability -- 5.5.1 Minimization of Partially Separable Functions -- 5.5.2 Principle of Optimality -- 5.6 Multiparametric Optimization -- 5.7 Stochastic Optimization -- Exercises -- Chapter 6 Optimization Methods -- 6.1 Basic Principles -- 6.1.1 Smoothness -- 6.1.2 Descent Methods -- 6.1.3 Line Search Methods -- 6.1.3.1 Backtracking Line Search -- 6.1.3.2 Bisection Method for Wolfe Conditions -- 6.1.4 Surrogation Methods -- 6.1.4.1 Trust‐Region Methods -- 6.1.4.2 Majorization Minimization -- 6.1.5 Convergence of Sequences -- 6.2 Gradient Descent -- 6.2.1 L‐Smooth Functions -- 6.2.2 Smooth and Convex Functions -- 6.2.3 Smooth and Strongly Convex Functions -- 6.3 Newton's Method -- 6.3.1 The Newton Decrement -- 6.3.2 Analysis of Newton's Method -- 6.3.2.1 Affine Invariance -- 6.3.2.2 Pure Newton Phase -- 6.3.2.3 Damped Newton Phase -- 6.3.3 Equality Constrained Minimization -- 6.4 Variable Metric Methods -- 6.4.1 Quasi‐Newton Updates -- 6.4.1.1 The BFGS Update -- 6.4.1.2 The DFP Update -- 6.4.1.3 The SR1 Update -- 6.4.2 The Barzilai-Borwein Method -- 6.5 Proximal Gradient Method -- 6.5.1 Gradient Projection Method -- 6.5.2 Proximal Quasi‐Newton -- 6.5.3 Accelerated Proximal Gradient Method -- 6.6 Sequential Convex Optimization -- 6.7 Methods for Nonlinear Least‐Squares -- 6.7.1 The Levenberg‐Marquardt Algorithm -- 6.7.2 The Variable Projection Method -- 6.8 Stochastic Optimization Methods -- 6.8.1 Smooth Functions -- 6.8.2 Smooth and Strongly Convex Functions -- 6.8.3 Incremental Methods -- 6.8.4 Adaptive Methods -- 6.8.4.1 AdaGrad -- 6.8.4.2 RMSprop…”
    Libro electrónico
  6. 1206
    Publicado 2022
    Tabla de Contenidos: “…11.6 Standards Requiring Design Safety -- 11.7 The Review of Designs -- 11.8 Hazardous Energy Control -- 11.9 Ergonomic Review of Designs -- 11.10 Design Review Process -- 11.11 Hazard Analysis and Risk Assessment in Design -- 11.12 Conclusion -- References -- Chapter 12 Industrial Hygiene Risk Assessment -- 12.1 Introduction -- 12.2 Fundamental Concepts -- 12.3 US Navy Industrial Hygiene Field Operations Manual -- 12.4 Alternate Health Risk Ranking Systems -- 12.5 More Complex Occupational Hygiene Risk Assessment Tools -- 12.6 Health Risk Assessments and Prioritization -- 12.7 Modified HRR/IH FMEA Methodology -- 12.8 Case Study -- 12.8.1 Sampling -- 12.8.2 Results -- 12.9 Control Banding Nanotool -- 12.10 Dermal RA -- 12.11 Occupational Health Risk and PtD Process Alignment -- 12.12 Summary -- Review Questions -- References -- Chapter 13 Machine Risk Assessments -- 13.1 Introduction -- 13.2 Machine Safety Standards -- 13.2.1 The B11 Standards -- 13.3 Machine Hazards -- 13.4 Machine Safeguarding -- 13.4.1 Machine Safety Control Systems -- 13.5 Selecting Machines for Assessment -- 13.6 Risk Assessment of Machines -- 13.7 Estimating Risk -- 13.8 Case Study -- 13.9 Assessment of Machine Maintenance and Service -- 13.10 Summary -- Appendix A Machine Safeguards Methods (Adapted from OSHA) -- References -- Chapter 14 Project-Oriented Risk Assessments -- 14.1 Introduction -- 14.2 Fatalities and Serious Incidents -- 14.3 Error Traps in Nonroutine Tasks -- 14.4 Management of Change -- 14.5 Construction Project Work -- 14.6 Construction Project Risk Assessment -- 14.7 Safe Work Methods -- 14.8 Pre-Task Hazard Analysis -- 14.9 The Use of Checklists -- 14.10 Maintenance and Service Work -- 14.11 Operating Hazard Analysis -- 14.12 Analyzing Specific Hazards -- 14.13 Pre-Entry Hazard Analysis -- 14.14 Fall Hazard Assessment -- 14.15 Summary -- Review Questions…”
    Libro electrónico
  7. 1207
    Publicado 2016
    Tabla de Contenidos: “…Establish ALARP -- 1.5 Costs -- 1.5.1 Costs of Applying the Standard -- 1.5.2 Savings from Implementing the Standard -- 1.5.3 Penalty Costs from Not Implementing the Standard -- 1.6 The Seven Parts of IEC 61508 -- 1.7 HAZOP (Hazard and Operability Study) -- 1.7.1 Objectives of a HAZOP -- 1.7.2 HAZOP Study Team -- 1.7.3 Typical Information Used in the HAZOP -- 1.7.4 Typical HAZOP Worksheet Headings -- Design Intent -- Nodes -- Parameter/Guidewords -- Causes -- Consequence -- Safeguards -- Action Required -- 1.7.5 Risk Ranking -- 1.7.6 Quantifying Risk -- 2 - Meeting IEC 61508 Part 1 -- 2.1 Establishing Integrity Targets -- 2.1.1 The Quantitative Approach -- (a) Maximum Tolerable Risk -- (b) Maximum tolerable failure rate -- Example -- On site -- Off site -- (c) Safety integrity levels (SILs) -- Simple example (low demand) -- Simple example (high demand) -- More complex example -- (d) Exercises -- 2.1.2 Layer of Protection Analysis -- 2.1.3 The Risk Graph Approach -- 2.1.4 Safety Functions -- 2.1.5 "Not Safety-Related" -- 2.1.6 SIL 4 -- 2.1.7 Environment and Loss of Production -- 2.1.8 Malevolence and Misuse -- Paragraph 7.4.2.3 of Part 1 of the Standard -- 2.2 "As Low as Reasonably Practicable" -- 2.3 Functional Safety Management and Competence -- 2.3.1 Functional Safety Capability Assessment -- 2.3.2 Competency -- (a) IET/BCS "Competency guidelines for safety-related systems practitioners" -- (b) HSE document (2007) "Managing competence for safety-related systems" -- Annex D of "Guide to the application of IEC 61511" -- (d) Competency register -- 2.3.3 Independence of the Assessment -- 2.3.4 Hierarchy of Documents -- 2.3.5 Conformance Demonstration Template -- IEC 61508 Part 1 -- 2.4 Societal Risk -- 2.4.1 Assess the Number of Potential Fatalities…”
    Libro electrónico
  8. 1208
    Publicado 2018
    Tabla de Contenidos: “…-- Nvidia GPU support optimized -- Introducing TensorFlow Lite -- Eager execution -- Optimized Accelerated Linear Algebra (XLA) -- Installing and configuring TensorFlow -- TensorFlow computational graph -- TensorFlow code structure -- Eager execution with TensorFlow -- Data model in TensorFlow -- Tensor -- Rank and shape -- Data type -- Variables -- Fetches -- Feeds and placeholders -- Visualizing computations through TensorBoard -- How does TensorBoard work? …”
    Libro electrónico
  9. 1209
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Working with Rank-N type -- How to do it... -- How it works... -- Working with type family -- How to do it... -- How it works... -- Working with GADTs -- How to do it... -- How it works... -- Chapter 11: Working with Lens and Prism -- Introduction -- Creating lenses -- How to do it... -- How it works... -- Working with lenses -- How to do it... -- How it works... -- Working with Traversal -- How to do it... -- How it works... -- Working with Iso -- How to do it... -- How it works... -- Working with Prism -- How to do it... -- How it works... -- Working with predefined lenses -- Getting ready -- How to do it... -- How it works... -- Chapter 12: Concurrent and Distributed Programming in Haskell -- Introduction -- Working with IORef -- How to do it... -- How it works... -- Working with MVar -- How to do it... -- How it works... -- Working with STM -- How it works... -- How it works... -- Working with strategies -- How to do it... -- How it works... -- Working with monad-par -- How to do it... -- How it works... -- Working with Cloud Haskell -- Getting ready -- How to do it... -- How it works... -- Using Cloud Haskell to start master and slave nodes -- How to do it... -- How it works... -- Using closure to communicate between nodes -- How to do it... -- How it works... -- Index…”
    Libro electrónico
  10. 1210
    Publicado 2024
    Tabla de Contenidos: “…Chapter 9: Time Series Analysis and Forecasting with MATLAB -- Technical requirements -- Exploring the basic concepts of time series data -- Understanding predictive forecasting -- Introducing forecasting methodologies -- Time series analysis -- Extracting statistics from sequential data -- Converting a dataset into a time series format in MATLAB -- Understanding time series slicing -- Resampling time series data in MATLAB -- Moving average -- Exponential smoothing -- Implementing a model to predict the stock market -- Dealing with imbalanced datasets in MATLAB -- Understanding oversampling -- Exploring undersampling -- Summary -- Chapter 10: MATLAB Tools for Recommender Systems -- Technical requirements -- Introducing the basic concepts of recommender systems -- Understanding CF -- Content-based filtering explained -- Hybrid recommender systems -- Finding similar users in data -- Creating recommender systems for network intrusion detection using MATLAB -- Recommender system for NIDS -- NIDS using a recommender system in MATLAB -- Deploying machine learning models -- Understanding model compression -- Discovering model pruning techniques -- Introducing quantization for efficient inference on edge devices -- Getting started with knowledge distillation -- Learning low-rank approximation -- Summary -- Chapter 11: Anomaly Detection in MATLAB -- Technical requirements -- Introducing anomaly detection and fault diagnosis systems -- Anomaly detection overview -- Fault diagnosis systems explained -- Approaching fault diagnosis using ML -- Using ML to identify anomalous functioning -- Anomaly detection using logistic regression -- Improving accuracy using the Random Forest algorithm -- Building a fault diagnosis system using MATLAB -- Understanding advanced regularization techniques -- Understanding dropout -- Exploring L1 and L2 regularization…”
    Libro electrónico
  11. 1211
    Publicado 2024
    Tabla de Contenidos: “…-- 6.1.1 Egalitarianism -- 6.1.2 Dignitas Christiana -- 6.1.3 The Raising of the Poor -- 6.1.4 Lumen Orientale -- 6.1.5 The Delphic Maxim -- 6.1.6 Establishing Christmas Liturgy -- 6.1.7 Christian Reading of the Psalms -- 6.1.8 Features of Human Dignity as an Indication of Homonymy Replacing Polysemy -- 6.2 Existing Assessments of the Role of the Patristic Period -- 6.2.1 Did Human Dignity Develop from an Idea of a Rank? -- 6.2.2 Was the Coining of the Category of Human Dignity a Discontinuous Process in European Culture? …”
    Libro electrónico
  12. 1212
    Publicado 2018
    Tabla de Contenidos: “…-- Benefits of keyword search -- Benefits of ranked results -- Solr use cases -- Social media -- Science and research -- Search engine -- E-commerce -- Media and entertainment -- Government -- Education -- What's new in Solr 7? …”
    Libro electrónico
  13. 1213
    Publicado 2018
    Tabla de Contenidos: “…Inhaltsverzeichnis 7 -- Tabellenverzeichnis 9 -- Abbildungsverzeichnis 12 -- Einführung 15 -- 1.1 Überlegungen zu lnfrastrukturleistungen 15 -- 1.2 Überlegungen zu Kollaborationsplattformen . 17 -- 1.3 Aufbau der Arbeit 21 -- Volkswirtschaftstheoretische Betrachtung . 23 -- 2.1 Wissen als ökonomische Kategorie 24 -- 2.2 Transparenz vs. lntransparenz . 27 -- 2.3 Ökonomie als evolutionärer Prozess 31 -- 2.4 Entropie 35 -- 2.5 Kontextualisierung und Bedeutungskoordination . 37 -- Überlegungen zu einem Transaktionssystemunterstützungsmodell. . 41 -- 3.1 Input-Output-Tabellen als produktionsbezogene Transaktionsdarstellung 47 -- 3.2 Zum Aufbau der Input-Output-Rechnung . 49 -- 3.2.1 Zuordnungsprinzipien und Aufstellungsprobleme 57 -- 3.2.2 Annahmen bei der Aufstellung von Input-Output-Tabellen 59 -- 3.2.3 Generierung von Güter x Güter IOT mit der Gütertechnologieannahme . 62 -- 3.2.4 Negative Werte im Zuge der Gütertechnologieannahme . 68 -- 3.3 Alternative Formen der Produktionsstrukturerhebung 73 -- BCI - Modell und Daten . 75 -- Datenaufbereitungsphase 83 -- 5.1 Profildaten . 83 -- 5.2 Transaktionsdaten 84 -- 5.3 Strukturdaten 86 -- 5.4 Abgeleitete Datenquellen 87 -- 5.4.1 ,Seil' -Matrizen . 88 -- 5.4.2 ,Buy'-Matrizen 91 -- 5.4.3 Erweiterungen der ,Buy'-Matrizen 93 -- 5.4.4 BCliot - Input-Output-Relationen auf der -- Kollaborationsplattform 97 -- Strukturanalysephase 101 -- 6.1 Graphentheoretische Grundlagen 101 -- 6.2 Einfache Verflechtungseigenschaften auf Basis der Graphentheorie 107 -- 6.2.1 Grade und Dichte . 108 -- 6.2.2 Erreichbarkeit und Distanzen . 11 O -- 6.2.3 Indexierte Knoteneigenschaften . 112 -- 6.3 Knotenbetrachtung unter Einbezug direkter und indirekter -- Verflechtungen 116 -- 6.4 Berücksichtigung von Kantengewichten bei der Bewertung von Knoten 121 -- 6.4.1 Bedeutungsbestimmung mit der Leontief-lnverse 122 -- 6.4.2 Cliquenidentifikation und komplementärer Status nach Hubbell" 126 -- 6.4.3 Zwischen Perron-Frobenius und PageRankTM . 132 -- 6.5 Darstellung von Verflechtungsdaten . 135 -- 6.6 Blockmodeling - Clustering und Partitionierung von relationalen Datensätzen 137 -- 6.6.1 Direkte und indirekte Verfahren . 140 -- 6.6.2 Äquivalenzrelationen und Blocktypen 141 -- 6.6.3 Optimierungsprozess . 145 -- 6.6.4 Two-mode Blockmodeling 148 -- 6.6.5 Illustration des two-mode Blockmodeling . 150 -- 6.6.6 Blockmodellberechnung für gewichtete Relationen . 153 -- 6.6.7 Illustration der Blockmodellberechnung für gewichtete Kanten 156 -- 7 Strukturvergleichsphase 159 -- 7 .1 Lückentypologie 159 -- 7.2 Identifikation von direkten internen Lücken & potenziellen -- Performanzlücken . 162 -- 7.3 Identifikation von indirekten internen und externen Lücken 166 -- 7.4 Identifikation von internen Lückenfolgen 169 -- 7.5 Identifikation von externen Lückenfolgen . 173 -- 7.6 Deskriptive Auswertung der Lücken bzw. …”
    Libro electrónico
  14. 1214
    Publicado 2023
    Tabla de Contenidos: “…4.1 Introduction -- Parallelizing Computational Tasks -- Parallelizing for Distributed Data -- 4.2 Parallel Processing Approaches -- 4.2.1 Parallel Algorithms for Text Summarization -- 4.2.2 Parallel Bisection k-Means Method -- 4.3 Parallel Data Processing Algorithms for Large-Scale Summarization -- 4.3.1 Designing MapReduce Algorithm for Text Summarization -- 4.3.2 Key Concepts in Mapper -- 4.3.3 Key Concepts in Reducer -- 4.3.4 Summary Generation -- An Illustrative Example for MapReduce -- Good Time: Movie Review -- 4.4 Other MR-Based Methods -- 4.5 Summary -- 4.6 Examples -- K-Means Clustering Using MapReduce -- Parallel LDA Example (Using Gensim Package) -- Sample Code: (Using Gensim Package) -- Example: Creating an Inverted Index -- Example: Relational Algebra (Table JOIN) -- References -- Sample Code -- Chapter 5 Optimization Approaches for Text Summarization -- 5.1 Introduction -- 5.2 Optimization for Summarization -- 5.2.1 Modeling Text Summarization as Optimization Problem -- 5.2.2 Various Approaches for Optimization -- 5.3 Formulation of Various Approaches -- 5.3.1 Sentence Ranking Approach -- 5.3.1.1 Stages and Illustration -- 5.3.2 Evolutionary Approaches -- 5.3.2.1 Stages -- 5.3.2.2 Demonstration -- 5.3.3 MapReduce-Based Approach -- 5.3.3.1 In-Node Optimization Illustration -- 5.3.4 Multi-objective-Based Approach -- Summary -- Exercises -- References -- Sample Code -- Chapter 6 Performance Evaluation of Large-Scale Summarization Systems -- 6.1 Evaluation of Summaries -- 6.1.1 CNN Dataset -- 6.1.2 Daily Mail Dataset -- 6.1.3 Description -- 6.2 Methodologies -- 6.2.1 Intrinsic Methods -- 6.2.2 Extrinsic Methods -- 6.3 Intrinsic Methods -- 6.3.1 Text Quality Measures -- 6.3.1.1 Grammaticality -- 6.3.1.2 Non-redundancy -- 6.3.1.3 Reverential Clarity -- 6.3.1.4 Structure and Coherence -- 6.3.2 Co-selection-Based Methods…”
    Libro electrónico
  15. 1215
    por Senger, Hans Gerhard, 1936-
    Publicado 2017
    Tabla de Contenidos: “…Jahrhundert bei Jacobi und Goethe -- Bei den Philosophen des Deutschen Idealismus : Hegel : Schelling : Schlegel -- in Politik, Staat und Kirche : Görres : Ranke : Deutinger : Stumpf : Gioberti -- Bei A. von Humboldt -- Im 19. und 20. …”
    Plan general de la obra
    Libro
  16. 1216
    Publicado 2016
    Tabla de Contenidos: “…Identification of Observed Variable (Path) Models -- General Requirements -- Unique Estimates -- Rule for Recursive Models -- Identification of Nonrecursive Models -- Models with Feedback Loops and All Possible Disturbance Correlations -- Graphical Rules for Other Types of Nonrecursive Models -- Respecification of Nonrecursive Models that are Not Identified -- A Healthy Perspective on Identification -- Empirical Underidentification -- Managing Identification Problems -- Path Analysis Research Example -- Summary -- Learn More -- Exercises -- Appendix 7.A. Evaluation of the Rank Condition -- 8. Graph Theory and the Structural Causal Model -- Introduction to Graph Theory -- Elementary Directed Graphs and Conditional Independences -- Implications for Regression Analysis -- d-Separation -- Basis Set -- Causal Directed Graphs -- Testable Implications -- Graphical Identification Criteria -- Instrumental Variables -- Causal Mediation -- Summary -- Learn More -- Exercises -- Appendix 8.A. …”
    Libro
  17. 1217
    Publicado 2018
    Tabla de Contenidos: “…3.2.1.3 Regression Plots of Tails -- 3.2.1.4 The Empirical Quantile Function -- 3.2.2 Density Estimation Based Tools -- 3.2.2.1 The Histogram -- 3.2.2.2 The Kernel Density Estimator -- 3.3 Univariate Parametric Models -- 3.3.1 The Normal and Log‐normal Models -- 3.3.1.1 The Normal and Log‐normal Distributions -- 3.3.1.2 Modeling Stock Prices -- 3.3.2 The Student Distributions -- 3.3.2.1 Properties of Student Distributions -- 3.3.2.2 Estimation of the Parameters of a Student Distribution -- 3.4 Tail Modeling -- 3.4.1 Modeling and Estimating Excess Distributions -- 3.4.1.1 Modeling Excess Distributions -- 3.4.1.2 Estimation -- 3.4.2 Parametric Families for Excess Distributions -- 3.4.2.1 The Exponential Distributions -- 3.4.2.2 The Pareto Distributions -- 3.4.2.3 The Gamma Distributions -- 3.4.2.4 The Generalized Pareto Distributions -- 3.4.2.5 The Weibull Distributions -- 3.4.2.6 A Three Parameter Family -- 3.4.3 Fitting the Models to Return Data -- 3.4.3.1 S&amp -- P 500 Daily Returns: Maximum Likelihood -- 3.4.3.2 Tail Index Estimation for S&amp -- P 500 Components -- 3.5 Asymptotic Distributions -- 3.5.1 The Central Limit Theorems -- 3.5.1.1 Sums of Independent Random Variables -- 3.5.1.2 Sums of Independent and Identically Distributed Random Variables -- 3.5.1.3 Sums of Dependent Random Variables -- 3.5.2 The Limit Theorems for Maxima -- 3.5.2.1 Weak Convergence of Maxima -- 3.5.2.2 Extreme Value Distributions -- 3.5.2.3 Convergence to an Extreme Value Distribution -- 3.5.2.4 Generalized Pareto Distributions -- 3.5.2.5 Convergence to a Generalized Pareto Distribution -- 3.6 Univariate Stylized Facts -- Chapter 4 Multivariate Data Analysis -- 4.1 Measures of Dependence -- 4.1.1 Correlation Coefficients -- 4.1.1.1 Linear Correlation -- 4.1.1.2 Spearman's Rank Correlation -- 4.1.1.3 Kendall's Rank Correlation…”
    Libro electrónico
  18. 1218
    Publicado 2025
    Tabla de Contenidos: “…3.6.4 Key frame selection and ranking -- 3.7 Time-complexity analysis -- 3.7.1 Complexity analysis of an exocentric video summarization algorithm -- 3.7.2 Complexity analysis of the scalable exocentric video summarization algorithm -- 3.8 Experimental test bed -- 3.8.1 Dataset(s) -- 3.8.2 Performance measures -- 3.8.2.1 Objective measures -- 3.8.2.2 Subjective measures -- 3.9 Results of Delaunay graph based exocentric video summarization methods -- 3.9.1 Results of constrained Delaunay graph clustering based summary -- 3.9.1.1 Performance analysis with information theoretic presampling -- 3.9.1.2 Performance analysis with deviation ratio constraint -- 3.9.1.3 Performance comparison with state-of-the-art methods -- 3.9.1.4 Performance comparison with K-means clustering -- 3.9.1.5 Clustering performance analysis -- 3.9.1.6 Tuning of the parameters -- 3.9.1.7 Key frame visualization -- 3.9.2 Results of Delaunay graph based summary with user customization -- 3.9.3 Results of Delaunay graph based summary in enhanced feature space -- 3.9.3.1 Performance analysis with semantic features -- 3.9.3.2 Performance analysis with CCA -- 3.10 Results of graph modularity based solution -- 3.11 Results of scalable exocentric video summarization -- 3.11.1 Objective evaluations -- 3.11.2 Subjective evaluations -- 3.11.3 Comparison of execution times -- 3.12 Summary -- 3.12.1 Summary of exocentric video summarization -- 3.12.2 Summary of scalable exocentric video summarization -- References -- 4 Multi-view exocentric video summarization -- 4.1 Motivation -- 4.2 Chapter organization -- 4.3 Related work -- 4.4 Proposed method -- 4.4.1 Video preprocessing -- 4.4.1.1 Shot detection and representation -- 4.4.1.2 Feature extraction -- 4.4.2 Unimportant shot elimination using Gaussian entropy -- 4.4.3 Multi-view correlation using bipartite matching…”
    Libro electrónico
  19. 1219
    Publicado 2022
    Tabla de Contenidos: “…Restoring Network -- Restore IT Security Services -- Restore Virtual Machines and/or Cloud Services -- Restore Backup Systems -- Restore Clients, Servers, Applications, Services -- Conduct Unit Testing -- Rebuild Process Summary -- Recovery Process Summary -- Recovering a Windows Computer -- Recovering/Restoring Microsoft Active Directory -- Summary -- Chapter 10 Next Steps -- Paradigm Shifts -- Implement a Data-Driven Defense -- Focus on Root Causes -- Rank Everything! -- Get and Use Good Data -- Heed Growing Threats More -- Row the Same Direction -- Focus on Social Engineering Mitigation -- Track Processes and Network Traffic -- Improve Overall Cybersecurity Hygiene -- Use Multifactor Authentication -- Use a Strong Password Policy -- Secure Elevated Group Memberships -- Improve Security Monitoring -- Secure PowerShell -- Secure Data -- Secure Backups -- Summary -- Chapter 11 What Not to Do -- Assume You Can't Be a Victim -- Think That One Super-Tool Can Prevent an Attack -- Assume Too Quickly Your Backup Is Good -- Use Inexperienced Responders -- Give Inadequate Considerations to Paying Ransom -- Lie to Attackers -- Insult the Gang by Suggesting Tiny Ransom -- Pay the Whole Amount Right Away -- Argue with the Ransomware Gang -- Apply Decryption Keys to Your Only Copy -- Not Care About Root Cause -- Keep Your Ransomware Response Plan Online Only -- Allow a Team Member to Go Rogue -- Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy -- Summary -- Chapter 12 Future of Ransomware -- Future of Ransomware -- Attacks Beyond Traditional Computers -- IoT Ransoms -- Mixed-PurposeHacking Gangs -- Future of Ransomware Defense -- Future Technical Defenses -- Ransomware Countermeasure Apps and Features -- AI Defense and Bots -- Strategic Defenses -- Focus on Mitigating Root Causes -- Geopolitical Improvements -- Systematic Improvements…”
    Libro electrónico
  20. 1220
    Publicado 2017
    Tabla de Contenidos: “…-- International Trends in Leadership -- How the Countries Ranked -- Emotional Intelligence and the GLOBE Theory -- Leadership Orientations and Emotional Intelligence -- Chapter 16: Entrepreneurial Leadership and EQ -- The EQ Leader: Entrepreneurial CEOs -- Succeeding in a Small Enterprise: Success Running a Dentist Office -- What Does It Take to Be an Entrepreneur? …”
    Libro electrónico