Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
3281por Bogdani, JulianTabla de Contenidos: “…. -- Towards FreeCAD experimentation and validation -- Filippo Diara, Fulvio Rinaudo -- Figure 1: Knowledge processes: from metric survey (A) to stratigraphic survey and analysis (B and C), until the parametric model construction (D). -- Figure 2: FreeCAD platform and parametric model of the refectory with stratigraphic units. -- Figure 3: Stratigraphic diagrams implemented as semantic data (Harris Matrix of north wall of the refectory of medieval Staffarda Abbey)…”
Publicado 2021
Libro electrónico -
3282por Mishra, Ambrish KumarTabla de Contenidos: “…Chapter 3 Artificial Intelligence and Financial Risk Mitigation -- 3.1 Introduction -- 3.2 Artificial Intelligence, Financial Sector, and Risk Mitigation -- 3.2.1 AI and Financial Risk Detection Processes -- 3.2.2 AI and Financial Risk Recognition Techniques -- 3.2.2.1 Risk Assessment and Prediction -- 3.2.2.2 Fraud Detection and Anticipation -- 3.2.2.3 Risk Modeling and Stress Testing -- 3.2.2.4 Portfolio Optimization and Asset Allocation -- 3.2.2.5 Regulatory Compliance -- 3.2.2.6 Cybersecurity and Data Privacy -- 3.2.2.7 Chatbots and Customer Service -- 3.2.2.8 Loan Underwriting and Processing -- 3.3 Financial Risks and AI Mitigation Practices -- 3.3.1 Credit Risk and Artificial Intelligence -- 3.3.2 Market Risk and Artificial Intelligence -- 3.3.3 Liquidity Risk and Artificial Intelligence -- 3.3.4 Operation Risk and Artificial Intelligence -- 3.3.5 Compliance Risk and Artificial Intelligence -- 3.4 AI and Financial Risk Mitigation Procedures -- 3.4.1 Identification and Assessment of Risks -- 3.4.2 Risk Prioritization -- 3.4.3 Developing Risk Mitigation Policies -- 3.4.4 Implementation of Risk Control Policies -- 3.4.5 Monitor and Evaluate Risk Mitigation Procedures -- 3.4.6 Testing and Validation -- 3.4.7 Continuously Improving the Risk Mitigation Process -- 3.5 Conclusion -- References -- Chapter 4 Artificial Intelligence Adoption in the Indian Banking and Financial Industry: Current Status and Future Opportunities -- 4.1 Introduction -- 4.2 Literature Review -- 4.2.1 Introduction to AI -- 4.2.2 Applications of Artificial Intelligence -- 4.2.2.1 AI Applications in e-Commerce -- 4.2.2.2 Applications of AI in Education -- 4.2.2.3 AI Applications in Agriculture -- 4.2.2.4 Artificial Intelligence in the Banking and Financial Industry -- 4.2.2.5 Utilization of AI in the Indian Banking and Financial Industry -- 4.3 Research Methodology…”
Publicado 2024
Libro electrónico -
3283por Stapleton, JeffTabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- Errata -- Chapter 1 Introduction -- 1.1 About This Book -- 1.2 Security Basics -- 1.3 Standards Organizations -- Notes -- Chapter 2 Cryptography Basics -- 2.1 Encryption -- 2.2 Authentication -- 2.3 Nonrepudiation -- 2.4 Key Management -- 2.5 Cryptographic Modules -- 2.5.1 Cryptographic Module Specification -- 2.5.2 Cryptographic Module Interfaces -- 2.5.3 Roles, Services, and Authentication -- 2.5.4 Software and Firmware Security -- 2.5.5 Operational Environment -- 2.5.6 Physical Security -- 2.5.7 Non-Invasive Security -- 2.5.8 Sensitive Security Parameter Management -- 2.5.9 Self-Tests -- 2.5.10 Life Cycle Assurance -- 2.5.11 Mitigation of Other Attacks -- Notes -- Chapter 3 PKI Building Blocks -- 3.1 PKI Standards Organizations -- 3.2 PKI Protocols: SSL and TLS -- 3.2.1 TLS v1.2 Overview -- 3.2.2 TLS v1.3 Overview -- 3.3 PKI Protocol: IPsec -- 3.4 PKI Protocol: S/MIME -- 3.5 PKI Methods: Legal Signatures -- 3.6 PKI Methods: Code Sign -- 3.7 PKI Architectural Concepts -- Notes -- Chapter 4 PKI Management and Security -- 4.1 RFC 2527 Introduction -- 4.1.1 RFC 3647 Overview -- 4.1.2 RFC 3647 Document Name and Identification -- 4.1.3 RFC 3647 PKI Participants -- 4.1.4 RFC 3647 Certificate Usage -- 4.1.5 RFC 3647 Policy Administration -- 4.1.6 RFC 3647 Definitions and Acronyms -- 4.2 RFC 2527 Publication and Repository Responsibilities -- 4.2.1 RFC 3647 Repositories -- 4.2.2 RFC 3647 Publication of Certification Information -- 4.2.3 RFC 3647 Time or Frequency of Publication -- 4.2.4 RFC 3647 Access Controls on Repositories -- 4.3 RFC 2527 Identification and Authentication -- 4.3.1 RFC 3647 Naming -- 4.3.2 RFC 3647 Initial Identity Validation -- 4.3.3 RFC 3647 Identification and Authentication for Rekey Requests…”
Publicado 2024
Libro electrónico -
3284Publicado 2024Tabla de Contenidos: “…Information criteria in model selection -- 6.4. Cross-validation for mixture models -- 6.5. Penalized mixture models -- 6.6. …”
Libro electrónico -
3285Publicado 2018“…Develop, validate, and deploy powerful decentralized applications using blockchain Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. …”
Libro electrónico -
3286por Pardo, Scott“…In engineering and quality control, various situations, including process validation and design verification, require equivalence and noninferiority tests. …”
Publicado 2014
Libro electrónico -
3287por Wohlrapp, Harald Rüdiger, 1944-“…Their inclusion in a four-dimensional framework (subjective-objective, structural-procedural) and the focus on thesis validity allow for a more realistic view of our discourse practice. …”
Publicado 2014
Libro -
3288por MCLAUGHLIN, GREG“…Explaining how to achieve sustained innovation success in today's increasingly competitive global environment, ENOVALE: How to Unlock Sustained Innovation Project Success provides a validated strategy for implementing innovation projects following the ENOVALETM methodology: envision the need, nominate, objectify, validate, align and adapt, link, and execute.The authors' first book, Chance or Choice: Unlocking Innovation Success, introduced a proven management process, using th…”
Publicado 2017
Libro electrónico -
3289por Becker-Weidman, Arthur, 1953-“…The pervasive effects of maltreatment on child development can be repaired when professionals use effective, empirically validated, and evidence-based methods. This book describes a comprehensive approach to treatment, Dyadic Developmental Psychotherapy, which is an evidence-based, effective, and empirically validated family based treatment. …”
Publicado 2010
Libro electrónico -
3290Publicado 2021“…Handbook of Analytical Quality by Design addresses the steps involved in analytical method development and validation in an effort to avoid quality crises in later stages. …”
Libro electrónico -
3291por Institute of Electrical and Electronics Engineers“…MOBILESoft provides a premier working conference-style forum for discussing and presenting innovative contributions to the research and practice of the design, development, validation, execution, and evolution of mobile applications…”
Publicado 2019
Libro electrónico -
3292por Budd, Malcolm, 1941-“…Some essays deal with the abstract heart of aesthetics: issues such as the nature and scope of the aesthetic, the validity of aesthetic judgements, realism and anti-realism, pleasure and value, and the aim of art…”
Publicado 2008
Sumario
Libro -
3293por Liu, James J. Y.“…This is a scholarly examination of the validity of corss-cultural, cross-language literary analysis of Chinese poetry…”
Publicado 1982
Libro electrónico -
3294por Desa, Deana“…This paper evaluates measurement invariance of complex scales from a social survey using both a continuous approach and a categorical approach to help inform future decisions in choosing the most appropriate methods to perform the validation of complex scales. In particular, continuous and categorical approaches are compared for constructing and validating 11 complex scales across 23 countries participating in the first round of the OECD Teaching and Learning International Survey (TALIS). …”
Publicado 2014
Capítulo de libro electrónico -
3295por Goldhammer, Frank“…In this study, we investigated how empirical indicators of test-taking engagement can be defined, empirically validated, and used to describe group differences in the context of the Programme of International Assessment of Adult Competences (PIAAC). …”
Publicado 2016
Capítulo de libro electrónico -
3296por Lerman, Julia“…This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API. …”
Publicado 2012
Libro electrónico -
3297por Caplan“…In the COUNTERPOINTS series, this volume summarizes and addresses the validity, or invalidity, of research into gender differences and questions the ideology behind this research and its consequences…”
Publicado 1997
Libro electrónico -
3298Publicado 2020“…From basic to advanced concepts, it collects relevant and reliable information obtained globally from validated collaborating researchers…”
Libro electrónico -
3299Publicado 2022“…This book focuses on the modelling and the design process of gas bearings, on the experimental validation of such models, and on their applications. …”
Libro electrónico -
3300por Manton, Kevin, 1960-“…The author reassesses the nature of these policies and comments on the validity of those historiographical models used in analyses of the socialism of this period…”
Publicado 2013
Libro