Mostrando 341 - 360 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 341
    Publicado 2023
    Libro electrónico
  2. 342
    Publicado 2018
    Libro electrónico
  3. 343
    Publicado 2018
    Libro electrónico
  4. 344
    por Mascarenhas, Oswald A. J.
    Publicado 2019
    Tabla de Contenidos: “…Virtue as the Theory of Ends…”
    Electrónico
  5. 345
    Publicado 2018
    Libro electrónico
  6. 346
    por Tripathi, Padmesh
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing -- 1.1 Introduction -- 1.2 Background Subtraction -- 1.3 Mathematics Behind Background Subtraction -- 1.4 Gaussian Mixture Model -- 1.4.1 Gaussian Mixture Model (GMM) Algorithm for Background Subtraction -- 1.4.2 Gaussian Mixture Model (GMM) Algorithm - A Simple Example -- 1.5 Principal Component Analysis -- 1.6 Applications -- 1.6.1 Military Surveillance -- 1.6.2 Visual Observation of Animals in Forests -- 1.6.3 Marine Surveillance -- 1.6.4 Defense Surveillance Systems -- 1.7 Conclusion -- References -- Chapter 2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing -- 2.1 Introduction -- 2.2 Moving Object Detection -- 2.3 Envisaging the Object Detection -- 2.3.1 Filtering Algorithm -- 2.3.2 Identification of Object Detection in Bad Weather Circumstance -- 2.3.3 Color Clustering -- 2.3.4 Dangerous Animal Detection -- 2.3.5 UAV Video End-of-Line Detection and Tracking in Live Traffic -- 2.3.5.1 Contextual Detection -- 2.3.5.2 Calculation of Location of a Car -- 2.3.6 Estimation of Crowd -- 2.3.7 Parking Lot Management -- 2.3.8 Public Automatic Anomaly Detection Systems -- 2.3.9 Modification of Robust Principal Component Analysis -- 2.3.10 Logistics Automation -- 2.3.11 Detection of Criminal Behavior in Humans -- 2.3.12 UAV Collision Avoidance and Control System -- 2.3.13 An Overview of Potato Growth Stages -- 2.4 Conclusion -- References -- Chapter 3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Data Preparation -- 3.2.2 Model Training -- 3.2.3 Hardware and Software Configuration -- 3.3 Result -- 3.4 Conclusion…”
    Libro electrónico
  7. 347
    por Arquilla, John
    Publicado 1999
    Libro electrónico
  8. 348
    Publicado 2021
    Libro electrónico
  9. 349
    por Leonard, Anghel
    Publicado 2024
    Libro electrónico
  10. 350
    Publicado 2024
    Libro electrónico
  11. 351
    por Finocchiaro, Maurice A.
    Publicado 2010
    “…And an essential thread of the subsequent controversy has been the emergence of many arguments claiming that his condemnation was right, as well as defenses of Galileo from such criticisms. The book’s particular yet overarching thesis is that today the proper defense of Galileo can and should have the reasoned, critical, and fair-minded character which his own defense of Copernicus had…”
    Libro electrónico
  12. 352
    Publicado 2023
    “…By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats. …”
    Libro electrónico
  13. 353
    por Woods, Kevin M.
    Publicado 2011
    “…During the 2003 war that ended Saddam Hussein's regime, coalition forces captured thousands of hours of secret recordings of meetings, phone calls, and conferences. …”
    Libro
  14. 354
    por Peterson, John, 1937-
    Publicado 2013
    “…John Peterson discusses metaphysics and the essence-existence distinction and presents what he believes is Aquinas' strongest theistic proof. He offers a new defense Aquinas' idea of natural ends based on the distinction between immanent and transient change. …”
    Libro
  15. 355
    Publicado 2017
    “…New York Times bestselling author Mark Murphy returns, with the latest science and techniques for delivering tough messages without causing anger or defensiveness. The greatest workplaces have one thing in common; they speak the truth! …”
    Grabación no musical
  16. 356
    por Foltz, Kevin
    Publicado 2020
    “…This is a unique approach to end-to-end security and fills a niche in the market. …”
    Libro electrónico
  17. 357
    por Alexandre Bidon, Danièle
    Publicado 2021
    “…The city developed as a result of contact with both Burgundian and Germanic culture and by the end of the 14th century had become a commercial and religious centre. …”
    Electrónico
  18. 358
    por Liska, Allan
    Publicado 2003
    “…He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time…”
    Libro electrónico
  19. 359
    Publicado 2024
    “…By the end of this book, you'll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats. …”
    Libro electrónico
  20. 360
    Publicado 2014
    “…This report proposes a more enterprise-oriented approach to measuring ACS manpower requirements by synthesizing combatant commander operational plans, Defense Planning Scenarios, functional area deployment rules, and subject-matter expert input. …”
    Libro electrónico