Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2881Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Machine Learning -- Chapter 1: Machine Learning Fundamentals -- Comparing AI, ML, and DL -- Examining ML -- Examining DL -- Classifying supervised, unsupervised, and reinforcement learning -- Introducing supervised learning -- The CRISP-DM modeling life cycle -- Data splitting -- Overfitting and underfitting -- Applying cross-validation and measuring overfitting -- Bootstrapping methods -- The variance versus bias trade-off -- Shuffling your training set -- Modeling expectations -- Introducing ML frameworks -- ML in the cloud -- Summary -- Questions -- Chapter 2: AWS Application Services for AI/ML -- Technical requirements -- Analyzing images and videos with Amazon Rekognition -- Exploring the benefits of Amazon Rekognition -- Getting hands-on with Amazon Rekognition -- Text to speech with Amazon Polly -- Exploring the benefits of Amazon Polly -- Getting hands-on with Amazon Polly -- Speech to text with Amazon Transcribe -- Exploring the benefits of Amazon Transcribe -- Getting hands-on with Amazon Transcribe -- Implementing natural language processing with Amazon Comprehend -- Exploring the benefits of Amazon Comprehend -- Getting hands-on with Amazon Comprehend -- Translating documents with Amazon Translate -- Exploring the benefits of Amazon Translate -- Getting hands-on with Amazon Translate -- Extracting text from documents with Amazon Textract -- Exploring the benefits of Amazon Textract -- Getting hands-on with Amazon Textract -- Creating chatbots on Amazon Lex -- Exploring the benefits of Amazon Lex -- Getting hands-on with Amazon Lex -- Summary -- Questions -- Answers -- Section 2: Data Engineering and Exploratory Data Analysis -- Chapter 3: Data Preparation and Transformation -- Identifying types of features…”
Libro electrónico -
2882Publicado 2021Tabla de Contenidos: “…Installing the Prometheus stack on Kubernetes -- Monitoring applications with Grafana -- Logging and tracing -- Installing the EFK stack on Kubernetes -- Summary -- Further reading -- Chapter 10: Operating and Maintaining Efficient Kubernetes Clusters -- Technical requirements -- Learning about cluster maintenance and upgrades -- Upgrading kubectl -- Upgrading the Kubernetes control plane -- Upgrading Kubernetes components -- Upgrading Kubernetes worker nodes -- Preparing for backups and disaster recovery -- Installing Velero on Kubernetes -- Taking a backup of specific resources using Velero -- Restoring an application resource from its backup using Velero -- Validating cluster quality -- Generating compliance reports -- Managing and improving the cost of cluster resources -- Summary -- Further reading -- About Packt -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2883por OECDTabla de Contenidos: “…Methodology -- Survey responses -- Relevant considerations -- Structure of the surveys -- Data cleaning and validation process -- Note…”
Publicado 2022
Libro electrónico -
2884Publicado 2019Tabla de Contenidos: “…Revisiting what you know -- 10.2. Server-side validation -- 10.3. Working with Emscripten-built modules -- 10.4. …”
Libro electrónico -
2885Publicado 2013Tabla de Contenidos: “…-- What's new in Dreamweaver CC -- Life in the cloud -- What's gone in Dreamweaver CC -- HTML basics -- Document types -- Of tags and properties -- XHTML in Dreamweaver -- HTML5, the new markup standard -- Add style with Cascading Style Sheets -- Add interactivity with JavaScript -- Mobile web design -- How this book is organized -- About this book -- Windows and Macintosh commands -- Very basics of reading this book -- About these arrows -- Online resources -- Using code examples -- Safari books online -- Part 1: Building A Web Page: -- Dreamweaver CC guided tour: -- Download Dreamweaver CC -- Dreamweaver CC interface -- Setting up a site -- Creating a web page -- Managing files and folders with the files panel -- Dreamweaver test drive -- Working with text: -- Adding text in Dreamweaver -- Adding special characters -- Selecting text -- HTML formatting -- Paragraph formatting -- Creating and formatting lists -- Text styles -- Spell-checking -- Introducing Cascading Style Sheets: -- Cascading Style Sheet basics -- Creating styles -- Using styles -- Manipulating styles -- Formatting text with CSS -- Cascading Style Sheets tutorial -- Links: -- Understanding links -- Adding a link -- Adding an email link -- Linking within a web page -- Modifying a link -- Styling links -- Creating a navigation menu tutorial -- Link tutorial -- Images: -- Adding images -- Inserting an image from Photoshop -- Modifying an image -- Controlling images with CSS -- Editing graphics -- Image maps -- Rollover images -- Tutorial: Inserting and formatting graphics -- Tables: -- Table basics -- Inserting a table -- Selecting parts of a table -- Expanded tables mode -- Formatting tables -- Modifying cell and row properties -- Adding and removing cells -- Merging and splitting cells -- Tabular data -- Tables tutorial -- HTML under the hood: -- Controlling how Dreamweaver handles HTML -- Code view -- Live code -- Quick tag editor -- Comparing versions of a web page -- Finding references -- Find and replace: -- Find and replace basics -- Basic text and HTML searches -- Advanced text searches -- Advanced tag searches -- Powerful example: adding alt text fast -- Part 2: Building A Better Web Page: -- Advanced CSS: -- Compound selectors -- Fast style editing with CSS designer -- Moving and managing styles -- Resolving CSS conflicts -- Using the code navigator -- Styling for print -- CSS transitions -- Using CSS3 -- Advanced CSS tutorial -- Page layout : -- Types of web page layouts -- Float layout basics -- Understanding the box model -- Dreamweaver's CSS layouts -- Modifying Dreamweaver's CSS layouts -- Absolute positioning -- Adding an AP element to your page -- Modifying AP element properties -- CSS layout tutorial -- Troubleshooting CSS: -- Analyzing CSS with Dreamweaver -- Overcoming common CSS problems -- Designing websites for mobile devices: -- Previewing pages at different resolutions -- Media queries -- Strategies for using media queries -- jQuery mobile -- Fluid grid layouts -- Fluid grid layout tutorial -- Part 3: Bringing Your Pages To Life: -- Adding interactivity with jQuery: -- JavaScript, jQuery, and jQuery UI -- Adding an accordion -- Tabs -- Datepicker -- Dialog -- jQuery UI widgets for programmers -- Dreamweaver behaviors -- Applying Dreamweaver behaviors -- Events -- Sampler of actions, one by one -- Forms: -- Form basics -- Creating a form -- Adding form elements -- Forms tutorial -- Adding sound, video, and animation: -- Adding sound to your page -- Using HTML5 video -- Adding video through YouTube -- Flash: an introduction -- Automate the flash download -- Add flash videos -- Adding Adobe edge animate animations -- Part 4: Managing A Website: -- Introducing site management: -- Structure of a website -- Setting up a site (in depth) -- Managing Dreamweaver sites -- Site assets -- Testing Your Site: -- Site launch checklist -- Testing web pages with BrowserStack -- Find and fix broken links -- Validating web pages -- Cleaning up HTML (and XHTML) -- Site reporting -- Moving your site to the Internet: -- Adding a remote server -- Transferring files -- Check in and check out -- Synchronizing site files -- Communicating with design notes -- Part 5: Dreamweaver CC Power: -- Snippets and libraries: -- Snippets basics -- Using snippets -- Creating snippets -- Built-in snippets -- Library basics -- Creating and using library items -- Editing library items -- Snippets and library tutorial -- Templates: -- Template basics -- Creating a template -- Defining editable regions -- Building pages based on a template -- Updating a template -- Using repeating regions -- Using editable tag attributes -- Using optional regions -- Exporting a template-based site -- Template tutorial -- Customizing Dreamweaver: -- Keyboard shortcuts -- Dreamweaver extensions -- Working With Server-Side Programming: -- Pieces of the puzzle -- Dynamic websites: the setup -- Creating a dynamic page -- Using server-side includes -- Working with related PHP files -- PHP code hints -- Part 6: Appendixes: -- Appendix A: Getting help: -- Getting online help -- Getting help from other Dreamweaver fans -- Appendix B: Dreamweaver CC, menu by menu: -- File menu -- Edit menu -- View menu -- Insert menu -- Modify menu -- Format menu -- Commands menu -- Site menu -- Window menu -- Help menu -- Index…”
Libro electrónico -
2886Publicado 2016Tabla de Contenidos: “…-- ENCODING -- Binary -- Binary to Decimal -- Hexadecimal -- American Standard Code for Information Exchange -- Unicode -- Big and Little Endian -- Nibble Reversed -- Seven-Bit Short Message Service Protocol Description Unit -- EPOCHS -- UNIX -- Unix 48 bit -- UNIX Decimal 10Byte -- GPS -- AOL -- GSM -- Decimal Format -- 64bit -- File Time Formatted -- HTML -- JAVA -- MSDOS -- Binary-Coded Decimal -- ISO 8601 -- Bit Date -- MAC Absolute -- CELLEBRITE PHYSICAL ANALYZER -- Project Tree Example -- Multimedia Message Service -- USER-INSTALLED APPLICATIONS -- USER-ENABLED SECURITY -- BST -- IP-Box and MFC Dongle -- Advanced Nondestructive Exams-Joint Test Action Group -- Destructive Exams -- ADVANCED VALIDATION -- Ultra Compare Professional -- Chapter Summary -- REFERENCES FOR LISTED TOOLS -- 5 - Data Hiding -- INTRODUCTION -- WHAT IS STEGANOGRAPHY -- HIDING DATA BEHIND DATA -- STEGANALYSIS -- Intercepted Steganography Files -- Steganalysis Applications -- How Much Information Can Be Hidden -- STEGANOGRAPHY METHODS -- Investigative Steps -- RELEVANT CASES -- SUMMARY -- REFERENCES -- 6 - Cryptography and Encryption -- INTRODUCTION -- BRIEF HISTORY OF ENCRYPTION AND CRYPTOGRAPHY -- Tell Me What I Need to Know -- BASIC WORKING KNOWLEDGE -- HARDWARE -- Big Boy Encryption Toys -- Here Come the Computers -- Ease of Use Makes It User-Friendly -- PUBLIC AND PRIVATE KEYS -- Breaking Encryption -- THE KEY IS THE KEY -- SO TELL ME SOMETHING I CAN DO ABOUT THIS! …”
Libro electrónico -
2887Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1 - Introduction to Embedded Systems Development -- Chapter 1: Embedded Systems - A Pragmatic Approach -- Domain definition -- Embedded Linux systems -- Low-end 8-bit microcontrollers -- Hardware architecture -- Understanding the challenges -- Multithreading -- RAM -- Flash memory -- General-purpose input/output (GPIO) -- ADC and DAC -- Timers and PWM -- Interfaces and peripherals -- Asynchronous UART-based serial communication -- SPI -- I2C -- USB -- Connected systems -- Challenges of distributed systems -- Introduction to isolation mechanisms -- The reference platform -- ARM reference design -- The Cortex-M microprocessor -- Summary -- Chapter 2: Work Environment and Workflow Optimization -- Workflow overview -- The C compiler -- Linker -- Make: a build automation tool -- Debugger -- Embedded workflow -- Text editors versus integrated environments -- The GCC toolchain -- The cross compiler -- Compiling the compiler -- Linking the executable -- Binary format conversion -- Interacting with the target -- The GDB session -- Validation -- Functional tests -- Hardware tools -- Testing off-target -- Emulators -- Summary -- Part 2 - Core System Architecture -- Chapter 3: Architectural Patterns -- Configuration management -- Revision control -- Tracking activities -- Code reviews -- Continuous integration -- Source code organization -- Hardware abstraction -- Middleware -- Application code -- Security considerations -- Vulnerability management -- Software cryptography -- Hardware cryptography -- Running untrusted code -- The life cycle of an embedded project -- Defining project steps -- Prototyping -- Refactoring -- API and documentation -- Summary -- Chapter 4: The Boot-Up Procedure -- Technical requirements -- The interrupt vector table -- Startup code…”
Libro electrónico -
2888Publicado 2023Tabla de Contenidos: “…Leverage existing network infrastructure -- Summary -- Part 2: Deep Dive into Cellular IoT Solutions -- Chapter 4: Leveraging Cellular IoT Technologies -- The evolution of cellular technology -- LTE technologies -- LTE network -- LTE radio technology -- LTE technology ecosystem -- LTE IoT use cases -- LTE LPWA design and best practices -- PSM and eDRX low-power features -- LTE LPWA best practices -- LTE LPWA use cases -- Summary -- Chapter 5: Validating 5G with IoT -- Overview of 5G -- 5G network architecture -- 5G radio technology -- 5G frequency spectrum -- 5G network slicing -- 5G and IoT -- 5G NR RedCap -- 5G use cases -- Industrial automation (Industry 4.0) -- Remote surgery -- Smart vehicles (autonomous vehicles and V2X) -- VR/AR -- Best practices in 5G solutions -- 5G network carriers -- 5G private networks -- 5G IoT devices -- Summary -- Chapter 6: Reviewing Cellular IoT Devices with Use Cases -- Cellular IoT device architecture -- Processing unit -- Cellular module -- SIM -- RF -- Power unit -- Sensors -- Input/output -- WLAN radios -- Cellular IoT device types -- Alarm panel -- Camera -- Computer - in vehicle -- Emergency phone -- Hotspot -- Lighting -- Medical telematics -- Metering -- Modem - embedded -- mPERS -- POS -- Remote control device -- Rugged handheld -- Sensors -- Smart home -- Tracking -- Vehicle telematics control unit -- Vehicle OBD II -- Vending telemetry -- Wearable -- Cellular IoT device carrier certifications -- Edge computing -- Best practices in cellular IoT devices -- Buying versus building -- Carrier certification -- Device management -- Summary -- Chapter 7: Securing the Internet of Things -- An overview of the IoT security ecosystem -- IoT security challenges -- Threats to IoT devices and solutions -- Proposed IoT security framework -- Endpoint layer -- Network layer -- Application layer…”
Libro electrónico -
2889Publicado 2023Tabla de Contenidos: “…-- Summary: Getting Started -- Notes -- Chapter 3 Applying a Carbon Shock Test -- The 20 Trillion Problem -- Some Context for a Carbon Tax -- Scenario Planning for Carbon Taxes -- Summary: Have Good Processes -- Notes -- Chapter 4 Science-Based Emissions-Reduction Targets -- The Four Objectives of the Net Zero Standard -- Generally Accepted GHG Accounting and Reporting Principles -- Five Steps to Set Science-Based Targets -- Science-Based Targets Unique to the Power Sector -- Science-Based Targets Unique to the Forest, Land, and Agriculture (FLAG) Sector -- Updating and Communicating Targets -- The Validation Process -- Summary: Science-Based Targets Are Not a Transition Plan -- Notes -- Part III The Four Pathways to Net Zero -- Chapter 5 The Four Pathways to Net Zero: An Introduction…”
Libro electrónico -
2890por Hughes, Steve, authorTabla de Contenidos: “…-- Understanding SQL Server security -- Validating security settings -- Summary -- Part 3: Optimizing Your Queries to Improve Performance -- Chapter 9 - Understanding Query Plans -- Technical requirements -- Understanding query optimization techniques -- Understanding the Query Optimizer -- Understanding and exploring the Query Execution Plan -- Comparing execution plans -- Analyzing the query plan -- Summary -- Chapter 10 - Understanding the Impact of Indexes on Query Design -- Technical requirements -- Understanding index and index types -- Using CREATE to create an index -- The DROP index -- Using RENAME to rename an index -- Modifying indexes -- The ALTER index -- Exploring the types of indexes -- Clustered indexes -- The NONCLUSTERED index -- The UNIQUE index -- The filtered index -- The covering index -- The impact of indexes on query design…”
Publicado 2023
Libro electrónico -
2891Publicado 2024Tabla de Contenidos: “…Real-world AIOps -- Lab requirements -- Validating operational changes -- Assisted root cause analysis -- Summary -- Appendix A -- A lab environment -- Hardware requirements -- Software requirements -- Step 0 - Git repository setup -- Step 1 - VM provisioning -- Step 2 - interacting with the lab scenarios -- Step 3 - removing the lab environment -- Step 4 - managing lab scenarios -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2892Publicado 2023Tabla de Contenidos: “…Creating a custom role for Azure Machine Learning -- Authenticating with application identities -- Creating a service principal -- Working with managed identities -- Enhancing access security -- Conditional Access -- PIM -- Azure Key Vault -- Summary -- Chapter 7: Managing and Securing Your Azure Machine Learning Workspace -- Technical requirements -- Exploring network security -- Creating a VNet -- Securing the workspace -- Securing associated resources -- Validating connectivity -- Working with Azure Machine Learning compute -- Securing compute instances -- Securing compute clusters -- Managing container registries and containers -- Securing images with Azure Container Registry -- Working with ML endpoints -- Summary -- Chapter 8: Managing and Securing the MLOps Life Cycle -- Technical requirements -- Working with MLOps in Azure Machine Learning -- Leveraging IaC -- Combining IaC with Azure Machine Learning -- Implementing CI/CD -- Working with Azure DevOps -- Exploring event-driven workflows in Azure -- Exploring Event Grid -- Working with events in Azure Machine Learning -- Discovering event handlers in Azure -- Summary -- Chapter 9: Logging, Monitoring, and Threat Detection -- Technical requirements -- Enabling logging and configuring data retention for Azure services -- Working with Azure Monitor -- Enabling diagnostic settings -- Working with alerts -- Working with Application Insights -- Visualizing the data -- Securing resources with Microsoft Defender -- Improving our security posture -- Exploring threat management with Sentinel -- Summary -- Part 4: Best Practices for Enterprise Security in Azure Machine Learning -- Chapter 10: Setting a Security Baseline for Your Azure Machine Learning Workloads -- Setting a baseline for Azure Machine Learning -- Discovering services for added security -- Exploring an example solution architecture…”
Libro electrónico -
2893Publicado 2018Tabla de Contenidos: “…Importance of web application security testing -- Application profiling -- Common web application security testing tools -- Authentication -- Credentials over a secure channel -- Authentication error messages -- Password policy -- Method for submitting credentials -- OWASP mapping -- Authorization -- OWASP mapping -- Session management -- Cookie checks -- Cross-Site Request Forgery -- OWASP mapping -- Input validation -- OWASP mapping -- Security misconfiguration -- OWASP mapping -- Business logic flaws -- Testing for business logic flaws -- Auditing and logging -- OWASP mapping -- Cryptography -- OWASP mapping -- Testing tools -- OWASP ZAP -- Burp Suite -- Summary -- Chapter 8: Privilege Escalation -- What is privilege escalation? …”
Libro electrónico -
2894por McFedries, PaulTabla de Contenidos: “…Add Borders to a Range -- CHAPTER 6: Building Formulas -- Understanding Excel Formulas -- Build a Formula -- Understanding Excel Functions -- Add a Function to a Formula -- Add a Row or Column of Numbers -- Build an AutoSum Formula -- Add a Range Name to a Formula -- Reference Another Worksheet Range in a Formula -- Move or Copy a Formula -- CHAPTER 7: Manipulating Worksheets -- Navigate a Worksheet -- Rename a Worksheet -- Create a New Worksheet -- Move a Worksheet -- Copy a Worksheet -- Delete a Worksheet -- Change the Gridline Color -- Toggle Worksheet Gridlines On and Off -- Toggle Worksheet Headings On and Off -- CHAPTER 8: Dealing with Workbooks -- Create a New Blank Workbook -- Create a New Workbook from a Template -- Save a Workbook -- Open a Workbook -- Arrange Workbook Windows -- Find Text in a Workbook -- Replace Text in a Workbook -- CHAPTER 9: Formatting Workbooks -- Modify the Workbook Colors -- Set the Workbook Fonts -- Choose Workbook Effects -- Apply a Workbook Theme -- Add a Workbook Header -- Add a Workbook Footer -- CHAPTER 10: Working with Tables -- Understanding Tables -- Get to Know Table Features -- Convert a Range to a Table -- Select Table Data -- Insert a Table Row -- Insert a Table Column -- Delete a Table Row -- Delete a Table Column -- Add a Column Subtotal -- Convert a Table to a Range -- Apply a Table Style -- Build a Custom Table Style -- CHAPTER 11: Analyzing Data -- Sort a Range or Table -- Filter a Range or Table -- Set Data Validation Rules -- Create a Data Table -- Summarize Data with Subtotals -- Group Related Data -- Analyze Data with Goal Seek -- Analyze Data with Scenarios -- Remove Duplicate Values from a Range or Table -- CHAPTER 12: Visualizing Data with Charts -- Examine Chart Elements -- Understanding Chart Types -- Create a Chart -- Create a Recommended Chart -- Add Chart Titles -- Add Data Labels…”
Publicado 2013
Libro electrónico -
2895Publicado 2022Tabla de Contenidos: “…Microservices Architecture -- Designing Test Strategies -- RESTful Architecture -- HTTP -- Headers -- Requests -- Request Methods -- Resource Addresses -- Request Headers -- Request Body -- Response -- Status Line -- Response Header -- Response Body -- Response Codes -- Summary -- Chapter 3: Authentication -- HTTP Authentication -- Basic Authentication -- Session-Based Authentication -- Token/JWT-Based Authentication -- OAuth2-Based Authentication -- Authorization -- RBAC -- ABAC -- Authentication and Authorization Services -- Summary -- Chapter 4: Tools, Frameworks, and Libraries -- API Testing Tools -- cURL -- Authentication -- POST -- GET -- PUT -- DELETE -- Postman -- Workspace -- Globals/Environments -- Collection -- Authentication -- Parameters -- Assertions -- Requests -- HTTP Methods -- Authentication -- Variables -- Console -- POST -- GET -- PUT -- DELETE -- RestAssured -- Frameworks/Libraries -- TestNG -- Log4j -- Jackson-Databind -- HashMap -- Assertj -- Java Spring -- Summary -- Chapter 5: Test Pyramid -- Black Box Testing -- Grey Box Testing -- White Box Testing -- Test Pyramid -- Summary -- Chapter 6: Testing the API -- Workflows/Use Cases/Test Script -- Schema Validation -- Test Coverage -- Header Testing -- Request Header -- Correct Header -- Missing Header -- Incorrect Header -- Unsupported Type -- Response Header -- Supported Type -- Response Codes -- Request Body -- Format Unsupported -- Special Characters -- Very Long Strings -- Invalid Method -- Invalid Value -- Incorrect Data Type -- Empty Data/Object…”
Libro electrónico -
2896por Brito, PaulaTabla de Contenidos: “…Bacelar-Nicolau: Clustering Validation in the Context of Hierarchical Cluster Analysis: an Empirical Study -- C. …”
Publicado 2023
Libro electrónico -
2897Publicado 2023Tabla de Contenidos: “…Diving deep into the Redshift ML CREATE MODEL syntax -- Creating your first machine learning model -- Evaluating model performance -- Checking the Redshift ML objectives -- Running predictions -- Comparing ground truth to predictions -- Feature importance -- Model performance -- Summary -- Chapter 6: Building Classification Models -- Technical requirements -- An introduction to classification algorithms -- Diving into the Redshift CREATE MODEL syntax -- Training a binary classification model using the XGBoost algorithm -- Establishing the business problem -- Uploading and analyzing the data -- Using XGBoost to train a binary classification model -- Running predictions -- Prediction probabilities -- Training a multi-class classification model using the Linear Learner model type -- Using Linear Learner to predict the customer segment -- Evaluating the model quality -- Running prediction queries -- Exploring other CREATE MODEL options -- Summary -- Chapter 7: Building Regression Models -- Technical requirements -- Introducing regression algorithms -- Redshift's CREATE MODEL with user guidance -- Creating a simple linear regression model using XGBoost -- Uploading and analyzing the data -- Splitting data into training and validation sets -- Creating a simple linear regression model -- Running predictions -- Creating multi-input regression models -- Linear Learner algorithm -- Understanding model evaluation -- Prediction query -- Summary -- Chapter 8: Building Unsupervised Models with K-Means Clustering -- Technical requirements -- Grouping data through cluster analysis -- Determining the optimal number of clusters -- Creating a K-means ML model -- Creating a model syntax overview for K-means clustering -- Uploading and analyzing the data -- Creating the K-means model -- Evaluating the results of the K-means clustering -- Summary…”
Libro electrónico -
2898Publicado 2013Tabla de Contenidos: “…Machine generated contents note: Chapter 1 Introduction 1.1 Computer Programs 1.2 The Anatomy of a Computer 1.3 The Java Programming Language 1.4 Becoming Familiar with Your Programming Environment 1.5 Analyzing Your First Program 1.6 Errors 1.7 Problem Solving: Algorithm Design Chapter 2 Fundamental Data Types 2.1 Variables 2.2 Arithmetic 2.3 Input and Output 2.4 Problem Solving: First Do it By Hand 2.6 Strings Chapter 3 Decisions 3.1 The if Statement 3.2 Comparing Numbers and Strings 3.3 Multiple Alternatives 3.4 Nested Branches 3.5 Problem Solving: Flowcharts 3.6 Problem Solving: Test Cases 3.7 Boolean Variables and Operators 3.8 Application: Input Validation Chapter 4 Loops 4.1 The while Loop 4.2 Problem Solving: Hand-Tracing 4.3 The for Loop 4.4 The do Loop 4.5 Application: Processing Sentinel Values 4.6 Problem Solving: Storyboards 4.7 Common Loop Algorithms 4.8 Nested Loops 4.9 Application: Random Numbers and Simulations Chapter 5 Methods 5.1 Methods as Black Boxes 5.2 Implementing Methods 5.3 Parameter Passing 5.4 Return Values 5.5 Methods Without Return Values 5.6 Problem Solving: Reusable Functions 5.7 Problem Solving: Stepwise Refinement 5.8 Variable Scope 5.9 Recursive Methods (Optional) Chapter 6 Arrays and Array Lists 6.1 Arrays 6.2 The Enhanced for Loop 6.3 Common Array Algorithms 6.4 Using Arrays with Methods 6.5 Problem Solving: Adapting Algorithms 6.6 Problem Solving: Discovering Algorithms by Manipulating Physical Objects 6.7 Two-Dimensional Arrays 6.8 Array Lists Chapter 7 Input/Output and Exception Handling 7.1 Reading and Writing Text Files 7.2 Processing Text Input 7.3 Command Line Arguments 7.4 Checked and Unchecked Exceptions 7.5 Catching Exceptions 7.6 The finally Clause 7.7 Application: Handling Input Errors Chapter 8 Object and Classes 8.1 Object-Oriented Programming 8.2 Implementing a Simple Class 8.3 Specifying the Public Interface of a Class 8.4 Designing the Data Representation 8.5 Problem Solving: Patterns for Representing Behavior 8.6 Implementing Instance Methods 8.7 Constructors 8.8 Problem Solving: Tracing Objects 8.9 Testing a Class 8.10 Object References 8.11 Static Variables and Methods Chapter 9 Inheritance 9.1 Inheritance Hierarchies 9.2 Implementing Subclasses 9.3 Overriding Methods 9.4 Polymorphism 9.5 Object: The Cosmic Superclass 9.6 Interface Types Chapter 10 Graphical User Interfaces 10.1 Frame Windows 10.2 Events and Event Handling 10.3 Using Inheritance to Customize Frames 10.4 Building Applications with Buttons 10.5 Using Inner Classes for Listeners 10.6 Processing Text Input 10.7 Text Areas Web chapters Chapter 11 Advanced Graphical User Interfaces 11.1 Layout Management 11.2 Choices 11.3 Menus 11.4 Exploring the Swing Documentation 11.5 Drawing on a Component 11.6 Using Timer Events for Animations 11.7 Mouse Events Chapter 12 Object-Oriented Design 12.1 The Software Life Cycle 12.2 Discovering Classes 12.3 Relationships Between Classes 12.4 Cohesion and Coupling 12.5 Side Effects 12.5 Abstract Classes 12.6 Packages 12.7 Application: Printing an Invoice 12.8 Application: An Automatic Teller Machine Chapter 13 Recursion 13.1 Triangle Numbers 13.2. …”
Libro electrónico -
2899Publicado 2014Tabla de Contenidos: “…Persisting Data with MongoDB -- Using MongoDB with Node -- Connecting to MongoDB -- Inserting a document -- Retrieving a document -- Introducing Mongoose -- Schemas -- Models -- Built-in validation -- Static methods -- Virtual properties -- Connecting with Mongoose -- Defining the schema and models -- Models index file -- Adding CRUD to the controllers -- The home controller -- The image controller -- Index - retrieving an image model -- Create - inserting an image model -- Testing everything out so far -- Like - updating an image model -- Comment - inserting a comment model -- Wrapping it up -- Helpers -- Introducing the async module -- The comments helper -- The helper sidebar…”
Libro electrónico -
2900por Fink, Johannes KarlTabla de Contenidos: “…Electronic Nose 343 13.1 Methods for Validation 343 13.2 Medical Applications 349 13.3 Fire Detectors 355 13.4 Pipeline Inspection 356 13.5 Sensing Arrays with Colloidal Particles 357 13.6 Nanodisk Sensor Arrays 358 13.7 Food Testing 360 13.8 Soil Volatile Fingerprints 365 14. …”
Publicado 2013
Libro electrónico