Mostrando 2,961 - 2,980 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.54s Limitar resultados
  1. 2961
    Publicado 2003
    Tabla de Contenidos: “…Cisco telephony environment -- 5.1 Voice Server for Cisco Environment installation -- 5.1.1 Requirements for Voice Server in a Cisco environment -- 5.1.2 Voice Server installation -- 5.2 Telephony environment configuration -- 5.3 Checking your installation -- 5.3.1 Specific parameters -- 5.3.2 Validating the configuration file -- 5.3.3 Using Voice Server commands -- 5.4 The final test -- 5.5 Testing on a PC -- 5.6 Voice Server considerations -- Chapter 6. …”
    Libro electrónico
  2. 2962
    Tabla de Contenidos: “…-- 1.3.1 Software interfaces -- 1.3.2 User interfaces -- 1.3.3 Application programming interface -- 1.3.4 TCP/IP interface -- 1.4 Library and storage location management -- 1.4.1 Removable media library -- 1.4.2 Storage location -- 1.4.3 HOME location -- 1.5 Media types -- 1.6 Volume management -- 1.6.1 Types of volumes -- 1.6.2 Volume status -- 1.6.3 Validation -- 1.7 Policies for retention and movement -- 1.7.1 Data set retention -- 1.7.2 Volume retention -- 1.7.3 SMS ACS support -- 1.7.4 Volume retention -- 1.7.5 Movement -- 1.8 DFSMSrmm automated tape library support -- 1.8.1 Cartridge entry processing -- 1.8.2 Ejecting volumes from system-managed libraries -- 1.8.3 Volume-Not-In-Library processing -- 1.8.4 Verifying the databases -- 1.8.5 VTS import/export processing -- 1.8.6 Defining stacked volumes to DFSMSrmm -- 1.9 Catalog synchronization -- 1.10 Implementing the RMMplex -- 1.10.1 RMMplex -- Chapter 2. …”
    Libro electrónico
  3. 2963
    por Gavin, Lee
    Publicado 2004
    Tabla de Contenidos: “…Migrating resources (common to all platforms) -- 7.1 DB2 backup -- 7.2 Message flow export from Version 2 -- 7.3 Message flow import into Version 5 -- 7.4 Message flow migration notes -- 7.4.1 Promoted property name -- 7.4.2 Converting Version 2.1 names that are not valid -- 7.5 Message set export from Version 2 -- 7.6 Message set import into Version 5 -- 7.7 Message set migration notes -- 7.7.1 What the mqsimigratemsgsets command creates -- 7.7.2 Embedded simple type -- 7.7.3 Compound type with an MRM base type -- 7.7.4 Migrating the message sets -- 7.8 Post migration activities -- 7.9 Checkpoint -- Chapter 8. …”
    Libro electrónico
  4. 2964
    Publicado 2022
    Tabla de Contenidos: “…9.6.4 Putting additional configuration validation into action…”
    Libro electrónico
  5. 2965
    Publicado 2024
    Tabla de Contenidos: “…10.2.3 Variant Calling From RNA Sequencing Data -- 10.2.4 Variant Call Format (VCF) -- 10.2.5 Evaluating VCF Results -- 10.3 Structural Variant (SV) Calling -- 10.3.1 Short-Read-Based SV Calling -- 10.3.2 Long-Read-Based SV Calling -- 10.3.3 CNV Detection -- 10.3.4 Integrated SV Analysis -- 10.4 Annotation of Called Variants -- References -- 11 Clinical Sequencing and Detection of Actionable Variants -- 11.1 Clinical Sequencing Data Generation -- 11.1.1 Patient Sample Collection -- 11.1.2 Library Preparation and Sequencing Approaches -- 11.2 Read Mapping and Variant Calling -- 11.3 Variant Filtering -- 11.3.1 Frequency of Occurrence -- 11.3.2 Functional Consequence -- 11.3.3 Existing Evidence of Relationship to Human Disease -- 11.3.4 Clinical Phenotype Match -- 11.3.5 Mode of Inheritance -- 11.4 Variant Ranking and Prioritization -- 11.5 Classification of Variants Based On Pathogenicity -- 11.5.1 Classification of Germline Variants -- 11.5.2 Classification of Somatic Variants -- 11.6 Clinical Review and Reporting -- 11.6.1 Use of Artificial Intelligence in Variant Reporting -- 11.6.2 Expert Review -- 11.6.3 Generation of Testing Report -- 11.6.4 Variant Validation -- 11.6.5 Incorporation Into a Patient's Electronic Health Record -- 11.6.6 Reporting of Secondary Findings -- 11.6.7 Patient Counseling and Periodic Report Updates -- 11.7 Bioinformatics Pipeline Validation -- References -- 12 De Novo Genome Assembly With Long And/or Short Reads -- 12.1 Genomic Factors and Sequencing Strategies for De Novo Assembly -- 12.1.1 Genomic Factors That Affect De Novo Assembly -- 12.1.2 Sequencing Strategies for De Novo Assembly -- 12.2 Assembly of Contigs -- 12.2.1 Sequence Data Preprocessing, Error Correction, and Assessment of Genome Characteristics -- 12.2.2 Contig Assembly Algorithms -- 12.2.3 Polishing -- 12.3 Scaffolding and Gap Closure…”
    Libro electrónico
  6. 2966
    Publicado 2025
    Tabla de Contenidos: “…4.4.4 Shot clustering by OPF -- 4.5 Time-complexity analysis -- 4.6 Experimental results -- 4.6.1 Datasets -- 4.6.2 Performance measures -- 4.6.3 Ablation study -- 4.6.4 Comparison with mono-view methods -- 4.6.5 Comparison with multi-view methods -- 4.7 Summary -- References -- 5 Egocentric video summarization -- 5.1 Motivation -- 5.2 Chapter organization -- 5.3 Related work -- 5.4 Proposed methods -- 5.4.1 Method I: Egocentric video summarization with different graph representations -- 5.4.1.1 Graph based shot boundary detection -- 5.4.1.2 Graph based representative frame selection -- 5.4.1.3 Graph based center-surround model -- 5.4.1.4 Graph based feature extraction -- 5.4.1.5 Construction of the VSG -- 5.4.1.6 MST based clustering with a new measure of edge inadmissibility -- 5.4.2 Method II: Egocentric video summarization with deep features and optimal clustering -- 5.4.2.1 Feature extraction using deep learning -- 5.4.2.2 Set of number of clusters -- 5.4.2.3 CSMIK K-means -- 5.4.2.3.1 Center-surround model -- 5.4.2.3.2 Integer knapsack formulation -- 5.4.2.3.3 CSMIK K-means -- 5.5 Time-complexity analysis -- 5.5.1 Method-I: Time complexity analysis -- 5.5.2 Method-II: Time complexity analysis -- 5.6 Experimental results -- 5.6.1 Datasets -- 5.6.2 Performance measures -- 5.6.3 Tuning of the parameters -- 5.6.3.1 Method-I: Tuning of the parameters -- 5.6.3.2 Method-II: Tuning of the parameters -- 5.6.4 Method-I: Experimental results and analysis -- 5.6.4.1 Ablation studies -- 5.6.4.2 Cluster validation -- 5.6.4.3 Results on SumMe dataset -- 5.6.4.4 Results on TvSum50 dataset -- 5.6.5 Method-II: Experimental results and analysis -- 5.6.5.1 Ablation studies -- 5.6.5.2 Cluster validation -- 5.6.5.3 Results on SumMe dataset -- 5.6.5.4 Results on TvSum50 dataset -- 5.6.5.5 Results on ADL dataset -- 5.6.5.6 Results on Base jumping from CoSum dataset…”
    Libro electrónico
  7. 2967
    Publicado 2022
    Tabla de Contenidos: “…Validación Cruzada (Cross validation) -- 8.2.3. Cálculo con R -- 8.3. Modelos GAM robustos -- 9. …”
    Lectura limitada a 1 usuario concurrente.
    Libro electrónico
  8. 2968
    Publicado 2018
    Tabla de Contenidos: “…-- Implementing autoencoders with TensorFlow -- Improving autoencoder robustness -- Implementing a denoising autoencoder -- Implementing a convolutional autoencoder -- Encoder -- Decoder -- Fraud analytics with autoencoders -- Description of the dataset -- Problem description -- Exploratory data analysis -- Training, validation, and testing set preparation -- Normalization -- Autoencoder as an unsupervised feature learning algorithm -- Evaluating the model -- Summary -- Chapter 6: Recurrent Neural Networks -- Working principles of RNNs…”
    Libro electrónico
  9. 2969
    Publicado 2018
    Tabla de Contenidos: “…-- What Has Driven the Change in Prices? -- When to Validate the MTM P&amp -- L -- 11 Funding, Fees and Charges -- Funding -- Drivers of Funding -- How a Desk Funds Itself -- Analysis of Funding P&amp -- L -- Rogue Trading Control -- Fees and Charges -- Above the Line Expenses -- Note -- 12 Profit and Loss Adjustments -- The Need for P&amp -- L Adjustments -- Controlling P&amp -- L Adjustments -- Independent Verification -- Recording -- Reporting -- Escalation -- Notes -- 13 Profit and Loss Commentary…”
    Libro electrónico
  10. 2970
    Publicado 2017
    Tabla de Contenidos: “…Pozo, Francisco Pérez-Ocón and Ovidio Rabaza, A Continuous Liquid-Level Sensor for Fuel Tanks Based on Surface Plasmon Resonance Reprinted from: Sensors 2016, 16(5), 724, doi: 10.3390/s16050724 http://www.mdpi.com/1424-8220/16/5/724 258 -- Carlos Morón, Jorge Pablo Díaz, Daniel Ferrández and Mari Paz Ramos, Mechatronic Prototype of Parabolic Solar Tracker Reprinted from: Sensors 2016, 16(6), 882; doi: 10.3390/s16060882 http://www.mdpi.com/1424-8220/16/6/882 271 -- Gema Chamorro-Moriana, José Luis Sevillano and Carmen Ridao-Fernández, A Compact Forearm Crutch Based on Force Sensors for Aided Gait: Reliability and Validity Reprinted from: Sensors 2016, 16(6), 925; doi: 10.3390/s16060925 http://www.mdpi.com/1424-8220/16/6/925 286 -- Lidia María Belmonte, Rafael Morales, Antonio Fernández-Caballero and José Andrés Somolinos, Robust Decentralized Nonlinear Control for a Twin Rotor MIMO System Reprinted from: Sensors 2016, 16(8), 1160; doi: 10.3390/s16081160 http://www.mdpi.com/1424-8220/16/8/1160 301.…”
    Libro electrónico
  11. 2971
    Publicado 2017
    Tabla de Contenidos: “…Study the Start -- Prepare, Prepare, Prepare -- Take a Breath . . . or Two -- Put on Your Game Face -- Summary -- Chapter 16: The Value of Good Training -- Meet the New Breed of Presenters -- Whom to Hire -- Summary -- Chapter 17: Avoiding the Training Trap -- How to Build Credibility and Gain Respect for Training -- Build a Qualified Training Staff -- Make Sure Trainers Are Knowledgeable and Up-to-Date in Their Fields -- Training Can't Solve All Business Problems -- Consult to Find Out Whether Training Is Really Needed -- Analyze the Potential Audience for the Training Program -- Investigate the Training Curriculum -- Pilot a Test Training Program -- Validating Your Training Programs -- Summary -- Chapter 18: Developing a Training Staff -- Emphasize the Quality of Your Training Programs -- Make Sure Trainers Work with the Curriculum Developers -- Promote Consistency in Course Content and Training Style -- Summary -- Chapter 19: Evaluation and Support -- Evaluating Trainees -- Evaluating the Trainer -- Advance Preparation Using Preschools -- Realistic Expectations -- Summary -- Chapter 20: Adventures in Cross-Training -- Factors to Consider before Cross-Training Trainers -- How to Cross-Train a New Presenter -- Don't Be a Perfectionist -- Power and Its Many Misuses -- Summary -- Epilogue: What's Next? …”
    Libro electrónico
  12. 2972
    Publicado 2016
    Tabla de Contenidos: “…Correlating individual stocks with the broader market -- Exploring risk and return -- Examining the market with the non-parametric runs test -- Testing for random walks -- Determining market efficiency with autoregressive models -- Creating tables for a stock prices database -- Populating the stock prices database -- Optimizing an equal weights two-asset portfolio -- Chapter 8: Text Mining and Social Network Analysis -- Introduction -- Creating a categorized corpus -- Tokenizing news articles in sentences and words -- Stemming, lemmatizing, filtering, and TF-IDF scores -- Recognizing named entities -- Extracting topics with non-negative matrix factorization -- Implementing a basic terms database -- Computing social network density -- Calculating social network closeness centrality -- Determining the betweenness centrality -- Estimating the average clustering coefficient -- Calculating the assortativity coefficient of a graph -- Getting the clique number of a graph -- Creating a document graph with cosine similarity -- Chapter 9: Ensemble Learning and Dimensionality Reduction -- Introduction -- Recursively eliminating features -- Applying principal component analysis for dimension reduction -- Applying linear discriminant analysis for dimension reduction -- Stacking and majority voting for multiple models -- Learning with random forests -- Fitting noisy data with the RANSAC algorithm -- Bagging to improve results -- Boosting for better learning -- Nesting cross-validation -- Reusing models with joblib -- Hierarchically clustering data -- Taking a Theano tour -- Chapter 10: Evaluating Classifiers, Regressors, and Clusters -- Introduction -- Getting classification straight with the confusion matrix -- Computing precision, recall, and F1-score -- Examining a receiver operating characteristic and the area under a curve…”
    Libro electrónico
  13. 2973
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 4: Web App Exploitation - Beyond -- Introduction -- Exploiting XSS with XSS Validator -- Getting ready -- How to do it... -- Injection attacks with sqlmap -- How to do it... -- See also -- Owning all .svn and .git repositories -- How to do it... -- Winning race conditions -- How to do it... -- See also -- Exploiting JBoss with JexBoss -- How to do it... -- Exploiting PHP Object Injection -- How to do it... -- See also -- Backdoors using web shells -- How to do it... -- Backdoors using meterpreters -- How to do it... -- Chapter 5: Network Exploitation on Current Exploitation -- Introduction -- Man in the middle with hamster and ferret -- Getting ready -- How to do it... -- Exploring the msfconsole -- How to do it... -- Railgun in Metasploit -- How to do it... -- There's more... -- Using the paranoid meterpreter -- How to do it... -- There's more... -- A tale of a bleeding heart -- How to do it... -- Redis exploitation -- How to do it... -- Say no to SQL - owning MongoDBs -- Getting ready -- How to do it…”
    Libro electrónico
  14. 2974
    Publicado 2017
    Tabla de Contenidos: “…-- Authoring and template anatomy -- Intrinsic functions -- Cross stack references -- Creating a base network using CloudFormation -- Validating a base network template -- Running a base network template -- Creating an EC2 instance using CloudFormation -- Nested stack -- Stack policies -- Helper scripts -- Dropping the template -- Summary -- Chapter 15: AWS CloudWatch -- CloudWatch -- Types of CloudWatch monitoring -- CloudWatch alarm states -- Simple Notification Service -- Creating SNS topics -- Subscribing to the topic -- Monitoring EC2 instances -- Creating an alarm for an EC2 instance -- Custom monitoring for an EC2 instance -- Monitoring RDS DB instances -- CloudWatch logs -- Summary -- Chapter 16: AWS Resource Auditing -- Introduction to CloudTrail -- Why CloudTrail? …”
    Libro electrónico
  15. 2975
    Publicado 2017
    Tabla de Contenidos: “…. -- Correcting data with the Script component -- Getting ready -- How to do it... -- Validating data using regular expressions in a Script component -- Getting ready -- How to do it... -- Using the Script component as a source -- How to do it... -- How it works... -- Using the Script component as a destination -- Getting ready -- How to do it... -- How it works... -- Chapter 8: SSIS and Advanced Analytics -- Introduction -- Splitting a dataset into a training and test set -- Getting ready -- How to do it... -- Testing the randomness of the split with a SSAS decision trees model -- Getting ready -- How to do it... -- Preparing a Naive Bayes SSAS data mining model -- Getting ready -- How to do it... -- Querying the SSAS data mining model with the data mining query transformation -- Getting ready -- How to do it... -- Creating an R data mining model -- Getting ready -- How to do it... -- Using the R data mining model in SSIS -- Getting ready -- How to do it... -- Text mining with term extraction and term lookup transformations -- Getting ready -- How to do it... -- Chapter 9: On-Premises and Azure Big Data Integration -- Introduction -- Azure Blob storage data management -- Getting ready -- How to do it... -- Installing a Hortonworks cluster -- Getting ready -- How to do it... -- Copying data to an on-premises cluster -- Getting ready -- How to do it... -- Using Hive - creating a database -- Getting ready…”
    Libro electrónico
  16. 2976
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 4: Learning from Data - Part 1 -- Introduction -- Creating and saving an Attribute-Relation File Format (ARFF) file -- How to do it... -- Cross-validating a machine learning model -- How to do it... -- Classifying unseen test data -- Getting ready -- How to do it... -- Classifying unseen test data with a filtered classifier -- How to do it... -- Generating linear regression models -- How to do it... -- Generating logistic regression models -- How to do it... -- Clustering data points using the KMeans algorithm -- How to do it... -- Clustering data from classes -- How to do it... -- Learning association rules from data -- Getting ready -- How to do it... -- Selecting features/attributes using the low-level method, the filtering method, and the meta-classifier method -- Getting ready -- How to do it... -- Chapter 5: Learning from Data - Part 2 -- Introduction -- Applying machine learning on data using Java Machine Learning (Java-ML) library -- Getting ready -- How to do it... -- Classifying data points using the Stanford classifier -- Getting ready -- How to do it... -- How it works... -- Classifying data points using Massive Online Analysis (MOA)…”
    Libro electrónico
  17. 2977
    Publicado 2023
    Tabla de Contenidos: “…Explicit Razor expressions -- Expression encoding -- Directives -- Directive attributes -- Creating a Razor component -- Redesigning the login page using a Razor component -- The Model-View-ViewModel (MVVM) pattern in Blazor -- Dependency injection in Blazor -- CSS isolation -- Summary -- Chapter 8: Understanding the Blazor Layout and Routing -- Technical requirements -- Understanding client-side routing -- Setup of BlazorWebView -- Setup of Router -- Defining routes -- Using Blazor layout components -- Applying a layout to a component -- Nesting layouts -- Implementing navigation elements -- Implementing a list view -- Adding a new item and navigating back -- Summary -- Chapter 9: Implementing Blazor Components -- Technical requirements -- Understanding Razor components -- Inheritance -- Creating a Razor class library -- Using static assets in the Razor class library -- Creating reusable Razor components -- Creating a base modal dialog component -- Data binding -- Component parameters -- Nested components -- Two-way data binding -- Communicating with cascading values and parameters -- Understanding the component lifecycle -- SetParametersAsync -- OnInitialized and OnInitializedAsync -- OnParametersSet and OnParametersSetAsync -- ShouldRender -- OnAfterRender and OnAfterRenderAsync -- Implementing CRUD operations -- CRUD operations of items -- CRUD operations of fields -- Summary -- Chapter 10: Advanced Topics in Creating Razor Components -- Technical requirements -- Creating more Razor components -- Creating the Navbar component -- Creating a Dropdown component for the context menu -- Using templated components -- Creating a ListView component -- Using the ListView component -- Built-in components and validation -- Using built-in components -- Using the EditForm component -- Creating an EditFormDialog component -- Summary -- Further reading…”
    Libro electrónico
  18. 2978
    Publicado 2023
    Tabla de Contenidos: “…-- Other approaches to community detection -- Summary -- Chapter 10: Supervised Machine Learning on Network Data -- Technical requirements -- Introducing ML -- Beginning with ML -- Data preparation and feature engineering -- Degrees -- Clustering -- Triangles -- Betweenness centrality -- Closeness centrality -- PageRank -- Adjacency matrix -- Merging DataFrames -- Adding labels -- Selecting a model -- Preparing the data -- Training and validating the model -- Model insights -- Other use cases -- Summary -- Chapter 11: Unsupervised Machine Learning on Network Data -- Technical requirements -- What is unsupervised ML? …”
    Libro electrónico
  19. 2979
    Publicado 2017
    Tabla de Contenidos: “…Identity Repositories and Directory Services -- Single Sign-On (SSO) -- Federated Identity Management -- Federation Standards -- Multifactor Authentication -- Supplemental Security Devices -- Cloud Application Architecture -- Application Programming Interfaces -- Tenancy Separation -- Cryptography -- Sandboxing -- Application Virtualization -- Cloud Application Assurance and Validation -- Threat Modeling -- Quality of Service -- Software Security Testing -- Approved APIs -- Software Supply Chain (API) Management -- Securing Open Source Software -- Runtime Application Self-Protection (RASP) -- Secure Code Reviews -- OWASP Top 9 Coding Flaws -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 8 Operations Elements -- Physical/Logical Operations -- Facilities and Redundancy -- Virtualization Operations -- Storage Operations -- Physical and Logical Isolation -- Security Training and Awareness -- Training Program Categories -- Additional Training Insights -- Basic Operational Application Security -- Threat Modeling -- Application Testing Methods -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 9 Operations Management -- Monitoring, Capacity, and Maintenance -- Monitoring -- Maintenance -- Change and Configuration Management (CM) -- Baselines -- Deviations and Exceptions -- Roles and Process -- Business Continuity and Disaster Recovery (BC/DR) -- Primary Focus -- Continuity of Operations -- The BC/DR Plan -- The BC/DR Kit -- Relocation -- Power -- Testing -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 10 Legal and Compliance Part 1 -- Legal Requirements and Unique Risks in the Cloud Environment -- Legal Concepts -- U.S. …”
    Libro electrónico
  20. 2980
    Publicado 2023
    Tabla de Contenidos: “…Manipulating how a child component looks -- Passing dynamic content through slots -- Providing default slot content -- Having multiple slots with named slots -- Passing data through slot props -- Rendering different HTML element or component types -- Creating recursive components for recursive data -- Example - a JSON tree viewer -- The Container/Presentational pattern -- Summary -- Part 2: Actions -- Chapter 5: Custom Events with Actions -- Technical requirements -- Defining actions -- Reusing DOM event logic with custom events -- Encapsulating logic into a component -- Encapsulating logic into an action -- Passing parameters to an action -- Example - validating form inputs with custom events -- Exercise - creating a drag-and-drop event -- Summary -- Chapter 6: Integrating Libraries with Actions -- Technical requirements -- Integrating vanilla JavaScript UI libraries into Svelte -- Why use Svelte actions to integrate a UI library? …”
    Libro electrónico