Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Eucaristía 211
- Historia 142
- Biblia 108
- Maimónides 72
- Crítica e interpretación 68
- Història 58
- Judíos 57
- History 47
- Computer networks 44
- Data processing 36
- Filosofía 35
- Management 34
- Computer programs 33
- Hagiografías 33
- Maimònides 32
- Development 31
- Iglesia Católica 30
- Artificial intelligence 29
- Literatura latina 26
- Liturgia 26
- WebSphere 26
- Application software 25
- Filosofía judía 25
- Ciencias naturales 24
- Libros y literatura para niños 24
- Bíblia 23
- Engineering & Applied Sciences 23
- Security measures 23
- Judaisme 22
- Judaísmo 22
-
4821Publicado 2018Tabla de Contenidos: “…Simple Encoding -- 1.1 Caesar Cipher -- 1.1.1 Working Of Caesar Cipher -- 1.1.2 Decrypting Caesar Cipher In Python -- 1.2 Base64 Encoding -- 1.2.1 Translating Data To Base64 -- 1.2.2 Encoding And Decoding Base64 -- 1.2.3 Decoding Custom Base64 -- 1.2.4 Identifying Base64 -- 1.3 XOR Encoding -- 1.3.1 Single Byte XOR -- 1.3.2 Finding XOR Key Through Brute-Force -- 1.3.3 NULL Ignoring XOR Encoding -- 1.3.4 Multi-byte XOR Encoding -- 1.3.5 Identifying XOR Encoding -- 2. Malware Encryption -- 2.1 Identifying Crypto Signatures Using Signsrch -- 2.2 Detecting Crypto Constants Using FindCrypt2…”
Libro electrónico -
4822Publicado 2017Tabla de Contenidos: “…1.3.2.1 Run-Length Encoding -- 1.3.2.2 Differential Pulse-Code Modulation and Predictive Coding -- 1.3.2.3 Entropy Encoding -- 1.3.2.4 Adaptive Dictionary Algorithms -- 1.3.2.5 Deflation -- 1.3.3 LOSSY IMAGE CODING TECHNIQUES -- 1.3.3.1 Color Space Reduction -- 1.3.3.2 Chroma Subsampling -- 1.3.3.3 Transform Coding -- 1.3.3.4 Fractal Compression -- 1.3.4 VECTOR QUANTIZATION -- 1.3.5 BLOCK TRUNCATION CODING -- 1.3.6 JPEG -- 1.3.7 JPEG2000 -- 1.3.7.1 Color Component Transformation -- 1.3.7.2 Tiling -- 1.3.7.3 Wavelet Transform -- 1.3.7.4 Quantization -- 1.3.7.5 Coding -- 1.4 OVERVIEW OF INFORMATION HIDING TECHNIQUES FOR IMAGES -- 1.4.1 ROBUST IMAGE WATERMARKING -- 1.4.1.1 Background -- 1.4.1.2 Definitions -- 1.4.1.3 Image Watermarking System -- 1.4.1.4 Characteristics -- 1.4.1.5 Overview of Techniques -- 1.4.2 FRAGILE IMAGE WATERMARKING -- 1.4.2.1 Background -- 1.4.2.2 Classification -- 1.4.2.3 Requirements -- 1.4.2.4 Watermarking-Based Authentication System -- 1.4.2.4.1 Authentication Watermark Embedding -- 1.4.2.4.2 Authentication Watermark Extraction and Verification -- 1.4.2.5 Overview of Techniques -- 1.4.3 IMAGE FINGERPRINTING -- 1.4.3.1 Background and Basic Concept -- 1.4.3.2 Differences Between Watermarking and Fingerprinting -- 1.4.3.3 Requirements -- 1.4.3.4 Overview of Techniques -- 1.4.4 IMAGE STEGANOGRAPHY -- 1.4.4.1 Background and Basic Concept -- 1.4.4.2 Image Steganography System -- 1.4.4.3 Overview of Techniques -- 1.4.5 LOSSLESS INFORMATION HIDING IN IMAGES -- 1.4.5.1 Background and Basic Concepts -- 1.4.5.2 Classifications of Schemes -- 1.4.5.3 Overview of Techniques -- 1.4.5.4 Performance Evaluation Criteria for Lossless Data Hiding Schemes -- 1.5 APPLICATIONS OF LOSSLESS INFORMATION HIDING IN IMAGES -- 1.5.1 LOSSLESS HIDING AUTHENTICATION -- 1.5.2 FIDELITY CONTROL FOR COVER MEDIA -- 1.5.3 STATUS RECOVERY FOR COVER MEDIA…”
Libro electrónico -
4823Publicado 2018Tabla de Contenidos: “…-- 1.3.1 Hardware -- 1.3.2 Daten -- 1.3.3 Algorithmen -- 1.3.4 Eine neue Investitionswelle -- 1.3.5 Die Demokratisierung des Deep Learnings -- 1.3.6 Bleibt es so? …”
Libro electrónico -
4824Publicado 2019Tabla de Contenidos: “…-- 1.3 Major Features of Linux -- 1.3.1 Portability -- 1.3.1.1 Supported CPU Architectures -- 1.3.1.2 POSIX Compliance -- 1.3.2 Support of a Wide Variety of Peripheral Devices -- 1.3.3 Complete Network Stack Solution -- 1.3.4 Variety of Task Schedulers -- 1.3.5 Security -- 1.3.6 User Space Drivers -- 1.3.7 Endianness -- 1.3.8 Debuggability…”
Libro electrónico -
4825Publicado 2020Tabla de Contenidos: “…Tran, Mehdi Bennis, and Choong Seon Hong -- 5.1 Introduction 120 -- 5.2 5G Goals 120 -- 5.3 Radio Access Network Management 121 -- 5.4 Network Slicing 124 -- 5.5 Use Case: Virtual Reality 125 -- 5.5.1 System Model 125 -- 5.5.2 Problem Formulation 127 -- 5.5.3 ADMM-Based Solution 128 -- 5.5.4 Performance Analysis 131 -- 5.6 Summary 131 -- References 133 -- Further Reading 135 -- Part IV 5G Verticals ́ô Network Infrastructure Technologies 137 -- 6 The Requirements and Architectural Advances to Support URLLC Verticals 139 /Ulas C. …”
Libro electrónico -
4826por Rajkumar, K.Tabla de Contenidos: “…11.3 Filling and Copying Arrays -- 11.4 Comparing Arrays -- 11.5 Sorting Primitive Arrays -- 11.6 Sorting String Objects -- 11.7 Array Sorting Using Comparable -- 11.8 Array Sorting Using Comparator -- 11.9 Searching Sorted Arrays -- 11.10 Sorting and Searching Using Collections Class -- 11.11 Sorting Lists Using Comparable -- 11.12 Sorting Lists Using Comparator -- 11.13 Summary -- Key Terms -- Review Questions -- Exercises -- Part IV - Java Threads and IO Streams -- Chapter 12: Concurrency Using Threads -- 12.1 Introduction -- 12.2 Multithreading Using Thread Class -- 12.3 Making Threads to Sleep -- 12.4 Yielding Control to Other Threads -- 12.5 Problem: Multithreaded Adder -- 12.6 Suspending Caller Thread -- 12.7 Daemon Threads -- 12.8 Thread Priority -- 12.9 Multithreading Using Runnable -- 12.10 Thread Synchronization for Resource Sharing -- 12.11 Synchronized Methods -- 12.12 Synchronized Block -- 12.13 Cordination Among Threads -- 12.14 Problem: Car Dealer Application -- 12.15 Threads Life -- 12.16 Concurrent Programming Packages -- 12.17 The Concurrent Package -- 12.18 The Concurrent.Atomic Package -- 12.19 Problem: Random Strings Generator -- 12.20 The Concurrent.locks Package -- 12.21 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 13: Processing Byte and Object Streams -- 13.1 Introduction -- 13.2 The File Class -- 13.3 Filtering File Names -- 13.4 Filtering Absolute File Paths -- 13.5 Types of Input Streams -- 13.5.1 Reading Files as Bytes -- 13.5.2 Reading Files into Byte Array -- 13.5.3 Reading Strings as Bytes -- 13.6 Types of Output Streams -- 13.6.1 Writing to Files as Bytes -- 13.6.2 Writing to Byte Array as Bytes -- 13.7 Problem: Copy Files as Bytes -- 13.8 Processing Primitive Data Types -- 13.9 Problem: Generating Students Mark List -- 13.10 Serializing Objects…”
Publicado 2013
Libro electrónico -
4827Publicado 2015Tabla de Contenidos: “…-- 13.4.1 Design -- 13.4.2 Results -- 13.4.3 Discussions -- 13.5 Analysis #3: How Much Local Data Does an Organization Need for a Local Model? …”
Libro electrónico -
4828por Böhm, FranzTabla de Contenidos: “…-- 1.3.3 Wochenbeginn und Wochenende zu einem bestimmten Datum -- 1.3.4 Zu welcher Kalenderwoche gehört das Datum? -- 1.3.5 Der Wochentag ohne Zahlenformat -- 1.3.6 Der erste Tag eines Monats als kopierbare Spaltenüberschrift oder kopierbare Zeilenbeschriftung -- 1.3.7 Der letzte Tag eines Monats -- 1.3.8 Der erste oder letzte Arbeitstag eines Monats -- 1.3.9 Die Anzahl der Monate berechnen -- 1.3.10 Monate in Jahre und Monate aufteilen -- 1.3.11 Monate mit weniger als fünf Buchstaben werden ausgeschrieben, die restlichen abgekürzt -- 1.4 Quartals-, Halbjahres- und Jahresberechnungen -- 1.4.1 In welches Quartal fällt das Datum?…”
Publicado 2023
Libro electrónico -
4829Publicado 2013Tabla de Contenidos: “…12.5.2 Role of the Authentication Procedures 283 -- 12.5.3 Impact of VHO on HetNet Coverage 284 -- 12.5.4 Impact of VHO on HetNet Capacity 284 -- 12.6 Conclusions 284 -- Acknowledgment 285 -- References 285 -- Part III Deployment, Standardization and Field Trials -- 13 Evolution of HetNet Technologies in LTE-advanced Standards 289 -- 13.1 Introduction 289 -- 13.2 Deployment Scenarios for LTE-advanced HetNet 290 -- 13.2.1 Macro / Femto Scenario 291 -- 13.2.2 Macro / Pico Scenario 292 -- 13.3 Inter-cell Interference Coordination for HetNet 292 -- 13.3.1 Rel-8/9 ICIC 293 -- 13.3.2 Rel-10 Enhanced ICIC 294 -- 13.3.3 System-level Performance of HetNet with Time-domain eICIC 299 -- 13.4 Ongoing Work in Rel-11 LTE-A 305 -- 13.4.1 Support of Non-zero Power ABS 306 -- 13.4.2 Network-assisted Cell Acquisition for CRE UE in Low Geometry 308 -- 13.4.3 Mitigation of CRS Interference for CRE UE in Low Geometry 309 -- 13.5 Conclusion 310 -- References 310 -- 14 Macro / Femto Heterogeneous Network Deployment and Management 313 -- 14.1 Introduction 314 -- 14.2 Frameworks for Macro / Femto Network Deployment and Management 315 -- 14.2.1 Joint-deployment Framework 315 -- 14.2.2 WSP-deployment Framework 318 -- 14.2.3 User-deployment Framework 318 -- 14.3 Revenue Maximization with WSP-deployed Femto-BSs 319 -- 14.3.1 On Cross-tier Channel Allocation 320 -- 14.3.2 On Optimal Pricing and Spectrum Partition 326 -- 14.4 Summary 332 -- References 333 -- 15 Field Trial of LTE Technology 335 -- 15.1 Introduction 335 -- 15.2 Field Trial Overview 336 -- 15.2.1 UE Antennas 337 -- 15.2.2 Network Configuration and Field Trial Setup 338 -- 15.3 Measurement Results 338 -- 15.4 Summary Comparison 344 -- 15.5 Conclusion 346 -- References 347 -- Index 349.…”
Libro electrónico -
4830Publicado 2016Tabla de Contenidos: “…11.6.2 QR decomposition -- 11.6.3 Size-and-shape distributions -- 11.6.4 Multivariate approach -- 11.6.5 Approximations -- 12 Deformations for size and shape change -- 12.1 Deformations -- 12.1.1 Introduction -- 12.1.2 Definition and desirable properties -- 12.1.3 D'Arcy Thompson's transformation grids -- 12.2 Affine transformations -- 12.2.1 Exact match -- 12.2.2 Least squares matching: Two objects -- 12.2.3 Least squares matching: Multiple objects -- 12.2.4 The triangle case: Bookstein's hyperbolic shape space -- 12.3 Pairs of thin-plate splines -- 12.3.1 Thin-plate splines -- 12.3.2 Transformation grids -- 12.3.3 Thin-plate splines in R -- 12.3.4 Principal and partial warp decompositions -- 12.3.5 PCA with non-Euclidean metrics -- 12.3.6 Relative warps -- 12.4 Alternative approaches and history -- 12.4.1 Early transformation grids -- 12.4.2 Finite element analysis -- 12.4.3 Biorthogonal grids -- 12.5 Kriging -- 12.5.1 Universal kriging -- 12.5.2 Deformations -- 12.5.3 Intrinsic kriging -- 12.5.4 Kriging with derivative constraints -- 12.5.5 Smoothed matching -- 12.6 Diffeomorphic transformations -- 13 Non-parametric inference and regression -- 13.1 Consistency -- 13.2 Uniqueness of intrinsic means -- 13.3 Non-parametric inference -- 13.3.1 Central limit theorems and non-parametric tests -- 13.3.2 M-estimators -- 13.4 Principal geodesics and shape curves -- 13.4.1 Tangent space methods and longitudinal data -- 13.4.2 Growth curve models for triangle shapes -- 13.4.3 Geodesic model -- 13.4.4 Principal geodesic analysis -- 13.4.5 Principal nested spheres and shape spaces -- 13.4.6 Unrolling and unwrapping -- 13.4.7 Manifold splines -- 13.5 Statistical shape change -- 13.5.1 Geometric components of shape change -- 13.5.2 Paired shape distributions -- 13.6 Robustness -- 13.7 Incomplete data -- 14 Unlabelled size-and-shape and shape analysis…”
Libro electrónico -
4831Publicado 2023Tabla de Contenidos: “…Données accessibles au public -- 1.3.5. Données propriétaires -- 1.3.6. Informations communiquées par la BCT -- 1.4. …”
Libro electrónico -
4832Publicado 2025Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Editor -- Contributors -- Preface -- Chapter 1: Distributed and Parallel Computing -- 1.1 Introduction -- 1.2 Distributed Computing -- 1.2.1 Cluster Computing -- 1.2.1.1 Architecture -- 1.2.1.2 Data and Message Communication -- 1.2.1.3 Task Management and Administration -- 1.2.1.4 Example Geospatial Big Data Project on Cluster -- 1.2.2 Grid Computing -- 1.2.2.1 Architecture -- 1.2.2.2 Types of Grid Architectures -- 1.2.2.3 Topology -- 1.2.2.4 Perspectives -- 1.2.2.4.1 User -- 1.2.2.4.2 Administrator -- 1.2.2.4.3 Application Developer -- 1.2.2.5 Example Geospatial Big Data Project on Grids -- 1.2.3 Cloud Computing -- 1.2.3.1 Taxonomies -- 1.2.3.2 Cloud Service Models -- 1.2.3.3 Cloud Deployment Models -- 1.2.3.3.1 Cloud APIs -- 1.2.3.3.2 Levels of Cloud APIs -- 1.2.3.3.3 Categories of APIs -- 1.2.3.4 Example Geospatial Big Data Project on Clouds -- 1.3 Parallel Computing -- 1.3.1 Classes of Parallel Computing -- 1.3.2 Shared Memory Multiple Processing -- 1.3.3 Distributed Memory Multiple Processing -- 1.3.4 Hybrid Distributed Shared Memory -- 1.3.5 Example Geospatial Big Data Project on Parallel Computers -- 1.4 Supercomputing -- 1.4.1 Supercomputing Worldwide -- 1.4.2 Trend -- 1.4.3 Future Supercomputer Research -- 1.4.4 Example Geospatial Big Data Project on Supercomputers -- 1.5 XSEDE: A Single Virtual System -- 1.5.1 Resources -- 1.5.2 Services -- 1.5.3 Example Big Geospatial Data Project on XSEDE -- 1.6 Choosing Appropriate Computing Environment -- 1.7 Summary -- References -- Chapter 2: GEOSS Clearinghouse Integrating Geospatial Resources to Support the Global Earth Observation System of Systems -- 2.1 Introduction -- 2.2 Catalog and Clearinghouse Research Review -- 2.2.1 Metadata Repository and Standardized Metadata…”
Libro electrónico -
4833Publicado 2018Tabla de Contenidos: “…8.3 Differential encoding -- 8.4 Speech compression -- 8.5 A-Law and μ-Law companding -- 8.6 Speech sampling -- 8.7 PCM-TDM systems -- 8.8 Exercises -- AUDIO SIGNALS -- 9.1 Introduction -- 9.2 Principles -- 9.3 Digital audio standards -- 9.4 Error control -- 9.5 Interleaving -- 9.6 CD audio system -- 9.7 Digital audio compression -- 9.8 The 44.1 kHz sampling rate -- 9.9 Exercise -- AUDIO COMPRESSION (MPEG-AUDIO AND DOLBY AC-3) -- 10.1 Introduction -- 10.2 Psycho-acoustic model -- 10.3 MPEG audio coding -- 10.4 Backward/forward adaptive bit allocation methods -- 10.5 Comparison between forward and backward adaptive methods -- 10.6 Dolby AC-1 and AC-2 -- 10.7 Dolby AC-3 coding -- 10.8 AC-3 parameters -- 10.9 Exercises -- ERROR CODING PRINCIPLES -- 11.1 Introduction -- 11.2 Modulo-2 arithmetic -- 11.3 Binary manipulation -- 11.4 Hamming distance -- 11.5 General probability theory -- 11.6 Error probability -- 11.7 Combinations of errors -- 11.8 Linear and cyclic codes -- 11.9 Block and convolutional coding -- 11.10 Systematic and unsystematic coding -- 11.11 Feedforward and feedback error correction -- 11.12 Error types -- 11.13 Coding gain -- 11.14 Exercises -- ERROR CODING (DETECTION) -- 12.1 Introduction -- 12.2 Parity -- 12.3 Block parity -- 12.4 Checksum -- 12.5 Cyclic redundancy checking (CRC) -- 12.6 Exercises -- ERROR CODING (CORRECTION) -- 13.1 Introduction -- 13.2 Longitudinal/vertical redundancy checks (LRC/VRC) -- 13.3 Hamming code -- 13.4 Representations of Hamming code -- 13.5 Single error correction/double error detection Hamming code -- 13.6 Reed-Solomon coding -- 13.7 Convolution codes -- 13.8 Tutorial -- DATA ENCRYPTION PRINCIPLES -- 14.1 Introduction -- 14.2 Government pressure -- 14.3 Cryptography -- 14.4 Legal issues -- 14.5 Basic encryption principles -- 14.6 Exercises -- DATA ENCRYPTION -- 15.1 Introduction…”
Libro electrónico -
4834por Darmawan, BudiTabla de Contenidos: “…Portal security introduction -- 1.1 Security in the on demand world -- 1.2 Portal security needs -- 1.2.1 Encryption -- 1.2.2 Authentication -- 1.2.3 Authorization -- 1.2.4 Single sign-on -- 1.2.5 Protocol filtering -- 1.2.6 Intrusion detection -- 1.3 Overview of IBM products -- 1.3.1 IBM WebSphere Portal Extend for Multiplatforms -- 1.3.2 IBM Lotus Instant Messaging and Web Conferencing -- 1.3.3 IBM Lotus Team Workplace -- 1.3.4 IBM Lotus Domino -- 1.3.5 IBM Lotus Workplace -- 1.3.6 IBM Tivoli Access Manager for e-business -- 1.3.7 IBM Tivoli Directory Server -- 1.3.8 IBM Tivoli Directory Integrator -- 1.4 Document structure -- Chapter 2. …”
Publicado 2004
Libro electrónico -
4835Publicado 2020Tabla de Contenidos: “…13.1.3 Die optimale Strategie -- 13.2 Die grundlegende Theorie von Deep-Q-Learning-Netzwerken -- 13.2.1 Value-Funktionen -- 13.2.2 Q-Value-Funktionen -- 13.2.3 Einen optimalen Q-Value schätzen -- 13.3 Einen DQN-Agenten definieren -- 13.3.1 Initialisierungsparameter -- 13.3.2 Das neuronale-Netze-Modell des Agenten bauen -- 13.3.3 Sich an das Spiel erinnern -- 13.3.4 Training über Memory Replay -- 13.3.5 Eine Aktion auswählen -- 13.3.6 Speichern und Laden der Modellparameter -- 13.4 Mit einer OpenAI-Gym-Umgebung interagieren -- 13.4.1 Hyperparameter-Optimierung mit SLM Lab -- 13.5 Agenten jenseits von DQN -- 13.5.1 Policy-Gradienten und der REINFORCE-Algorithmus -- 13.5.2 Der Actor-Critic-Algorithmus -- 13.6 Zusammenfassung -- Schlüsselkonzepte -- Teil IV -- KI und Sie -- 14 Mit Ihren eigenen Deep-Learning-Projekten beginnen -- 14.1 Ideen für Deep-Learning-Projekte -- 14.1.1 Machine Vision und GANs -- 14.1.2 Natural Language Processing -- 14.1.3 Deep Reinforcement Learning -- 14.1.4 Ein vorhandenes Machine-Learning-Projekt überführen -- 14.2 Ressourcen für weitere Projekte -- 14.2.1 Gesellschaftlich nützliche Projekte -- 14.3 Der Modellierungsprozess einschließlich der Anpassung der Hyperparameter -- 14.3.1 Automatisierung der Hyperparameter-Suche -- 14.4 Deep-Learning-Bibliotheken -- 14.4.1 Keras und TensorFlow -- 14.4.2 PyTorch -- 14.4.3 MXNet, CNTK, Caffe und so weiter -- 14.5 Software 2.0 -- 14.6 Die kommende Artificial General Intelligence -- 14.7 Zusammenfassung -- Anhang -- A Die formale Notation neuronaler Netze -- B Backpropagation -- C PyTorch -- C.1 PyTorch-Eigenschaften -- C.1.1 Das Autograd System -- C.1.2 Das Define-by-Run-Framework -- C.1.3 PyTorch im Vergleich mit TensorFlow -- C.2 PyTorch in der Praxis -- C.2.1 Die PyTorch-Installation -- C.2.2 Die grundlegenden Bausteine in PyTorch -- Einfache Operationen mit Tensoren…”
Libro electrónico -
4836por Abualigah, LaithTabla de Contenidos: “…13.2.3 Henry gas solubility optimization mathematical model -- 13.2.4 Exploration and exploitation phases -- 13.3 Related works -- 13.3.1 Data mining -- 13.3.2 Genome biology (motif discovery problems) -- 13.3.3 Engineering problems -- 13.3.3.1 Solar energy -- 13.3.3.2 Cloud computing task scheduling -- 13.3.4 Benchmark functions -- 13.3.5 Automatic voltage regulator -- 13.3.6 Optimization tasks -- 13.3.7 Prediction of soil shear force -- 13.3.8 Autonomous vehicle management system -- 13.3.9 Software engineering problems -- 13.3.10 Machine learning -- 13.3.11 Image processing -- 13.3.12 Optimal power system -- 13.4 Discussion -- 13.5 Conclusion and future works -- References -- 14 A survey of the manta ray foraging optimization algorithm -- 14.1 Introduction -- 14.2 Manta ray foraging optimization -- 14.2.1 Chain foraging -- 14.2.2 Cyclone foraging -- 14.2.3 Somersault foraging -- 14.3 Related works -- 14.3.1 Machine learning -- 14.3.2 Engineering application -- 14.3.3 Network problems -- 14.3.4 Optimization problem -- 14.3.5 Image processing -- 14.3.6 Other applications -- 14.4 Discussion -- 14.5 Conclusion and future work -- References -- 15 A review of mothflame optimization algorithm: analysis and applications -- 15.1 Introduction -- 15.2 Moth Flame Optimization Algorithm -- 15.2.1 Origin -- 15.2.2 Moth Flame Optimization Algorithm -- 15.2.3 Establishing a Moth Population -- 15.2.4 Updating the Moths' Positions -- 15.3 The Growth of the Moth Flame Optimization Algorithm in the Literature -- 15.3.1 Variants -- 15.4 Application -- 15.4.1 Benchmark Functions -- 15.4.2 Chemical Applications -- 15.4.3 Economical Applications -- 15.4.4 Image Processing -- 15.4.5 Medical Applications -- 15.4.5.1 Breast Cancer Detection -- 15.4.5.2 Alzheimer's Disease Diagnosis -- 15.4.6 Machine Learning -- 15.5 Discussion -- 15.6 Concluding Remarks -- References…”
Publicado 2024
Libro electrónico -
4837Publicado 2005Tabla de Contenidos: “…Introduction to EDI technology and WebSphere Data Interchange -- 13.1 EDI terms and concepts -- 13.2 Benefits of EDI -- 13.3 EDI components -- 13.3.1 Message standards -- 13.3.2 Communication -- 13.4 The evolution of EDI -- 13.4.1 Elements of an EDI solution -- 13.4.2 The IBM EDI solution -- 13.4.3 Features of WebSphere Data Interchange -- 13.5 Usage patterns for WebSphere Data Interchange -- 13.5.1 A point-to-point solution…”
Libro electrónico -
4838Publicado 2003Tabla de Contenidos: “…Introducing DFSMStvs -- 1.1 A brief history of VSAM -- 1.2 Changing business requirements -- 1.2.1 Extending CICS availability -- 1.2.2 Reducing the batch window -- 1.2.3 Web access to VSAM data -- 1.3 Some definitions -- 1.3.1 Backward recovery -- 1.3.2 Forward recovery -- 1.3.3 Atomic updates -- 1.3.4 Unit of work and unit of recovery -- 1.3.5 Two-phase commit -- 1.3.6 In-flight and in-doubt -- 1.3.7 Repeatable read -- 1.3.8 Recoverable data sets -- 1.4 CICS support for recoverable VSAM -- 1.5 VSAM record level sharing introduction -- 1.5.1 RLS new function APARs -- 1.6 DFSMStvs introduction -- 1.6.1 DFSMStvs locking -- 1.6.2 DFSMStvs logging -- 1.6.3 Recovery coordination -- 1.7 Effect on the batch window -- 1.8 Planning for DFSMStvs -- 1.9 Summary -- Chapter 2. …”
Libro electrónico -
4839Publicado 2004Tabla de Contenidos: “…Replication -- 13.1 General replication concepts -- 13.1.1 Terminology -- 13.1.2 How replication functions -- 13.2 Major replication topologies -- 13.2.1 Simple master-replica topology -- 13.2.2 Master-forwarder-replica topology (ITDS 5.2 and later) -- 13.2.3 GateWay Replication Topology (ITDS 5.2 and later) -- 13.2.4 Peer replication -- 13.3 Replication agreements -- 13.4 Configuring replication topologies -- 13.4.1 Simple master-replica topology -- 13.4.2 Using the command line -- 13.4.3 Promoting a replica to peer/master -- 13.4.4 Command line for a complex replication -- 13.5 Web administration tasks for managing replication -- 13.5.1 Managing topology -- 13.5.2 Modifying replication properties -- 13.5.3 Creating replication schedules -- 13.5.4 Managing queues -- 13.6 Repairing replication differences between replicas -- 13.6.1 The ldapdiff command tool -- Chapter 14. …”
Libro electrónico -
4840Publicado 2004Tabla de Contenidos: “…An overview of WebSphere Commerce V5.6 -- 1.1 Product overview -- 1.2 WebSphere Commerce software components -- 1.2.1 Web server -- 1.2.2 WebSphere Application Server -- 1.2.3 Database server -- 1.2.4 WebSphere Commerce Server -- 1.2.5 WebSphere Commerce Payments Server -- 1.2.6 Enablement software -- 1.3 WebSphere Commerce Server subsystems -- 1.3.1 Member subsystem -- 1.3.2 Catalog subsystem -- 1.3.3 Trading subsystem -- 1.3.4 Order subsystem -- 1.3.5 Merchandising subsystem -- 1.3.6 Marketing subsystem -- 1.3.7 Inventory subsystem -- 1.3.8 Messaging subsystem -- 1.4 WebSphere Commerce Tools -- 1.5 WebSphere Commerce business models -- 1.5.1 Direct sales -- 1.5.2 Value chain -- 1.5.3 Hosting ex-sites -- 1.6 What's new in WebSphere Commerce V5.6 -- 1.6.1 WebSphere Commerce development environment -- 1.6.2 WebSphere Commerce Payments -- 1.6.3 Configuration Manager -- 1.6.4 Loader Package -- 1.6.5 Password Manager -- 1.6.6 Adapter for CrossWorlds -- 1.6.7 Catalog and product management -- 1.6.8 Business models -- 1.6.9 Access control -- 1.6.10 Collaboration -- 1.6.11 Campaigns and promotions -- 1.6.12 Order and inventory management -- 1.6.13 Analytics -- 1.6.14 Security -- 1.6.15 Caching -- 1.6.16 Product Advisor -- Chapter 2. …”
Libro electrónico