Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Misales 1,720
- Derecho civil 1,582
- Historia 1,399
- Derecho penal 1,397
- Derecho administrativo 1,038
- Liturgia 1,018
- Filosofía 929
- Engineering & Applied Sciences 912
- Església Catòlica 904
- Development 864
- Teología dogmática 805
- Application software 791
- Derecho 759
- Tratados y manuales 749
- Litúrgia 735
- Psicología 712
- Derecho mercantil 710
- Teología 696
- Derecho constitucional 689
- Mental illness 687
- Economía 658
- Operating systems (Computers) 646
- Moral cristiana 624
- Computer Science 612
- Enfermedades mentales 610
- Universidad Pontificia de Salamanca (España) 583
- Computer programs 548
- Mental health 546
- Derecho canónico 544
- Personas con discapacidad mental 534
-
125841Publicado 2019Tabla de Contenidos: “…4.4 Hiring Reliability Engineers -- Part II Unraveling the Mystery -- Chapter 5 The Product Life Cycle -- 5.1 Six Phases of the Product Life Cycle -- 5.2 Risk Mitigation -- 5.2.1 Investigate the Risk -- 5.2.2 Communicate the Risk -- 5.2.3 Mitigate the Risk -- 5.3 The ICM Process for a Small Company -- 5.4 Design Guidelines -- 5.5 Warranty -- Further Reading -- Reliability Process -- DFM -- Chapter 6 Reliability Concepts -- 6.1 The Bathtub Curve -- 6.2 Mean Time between Failure -- 6.2.1 Mean Time between Repair -- 6.2.2 Mean Time between Maintenance (MTBM) -- 6.2.3 Mean Time between Incidents (MTBI) -- 6.2.4 Mean Time to Failure (MTTF) -- 6.2.5 Mean Time to Repair (MTTR) -- 6.2.6 Mean Time to Restore System (MTTRS) -- 6.3 Warranty Costs -- 6.4 Availability -- 6.4.1 On‐site Manufacturer Service Personnel -- 6.4.2 Trained Customer Service Personnel -- 6.4.3 Manufacturer Training for Customer Service Personnel -- 6.4.4 Easy‐to‐Use Service Manuals -- 6.4.5 Rapid Diagnosis Capability -- 6.4.6 Repair and Spare Parts Availability -- 6.4.7 Rapid Response to Customer Requests for Service -- 6.4.8 Failure Data Tracking -- 6.5 Reliability Growth -- 6.6 Reliability Demonstration Testing -- 6.7 Maintenance and Availability -- 6.7.1 Preventative Maintenance -- 6.7.2 Predictive Maintenance -- 6.7.3 Prognostics and Health Management (PHM) -- 6.8 Component Derating -- 6.9 Component Uprating -- Reference -- Further Reading -- Reliability Growth -- Reliability Demonstration -- Prognostics and Health Management -- Chapter 7 FMEA -- 7.1 Benefits of FMEA -- 7.2 Components of FMEA -- 7.2.1 The Functional Block Diagram (FBD) -- 7.2.1.1 Generating the Functional Block Diagram -- 7.2.1.2 Filling in the Functional Block Diagram -- 7.2.2 The Fault Tree Analysis -- 7.2.2.1 Building the Fault Tree -- 7.2.2.2 Brainstorming -- 7.2.3 Failure Modes and Effects Analysis Spreadsheet…”
Libro electrónico -
125842Publicado 2021Tabla de Contenidos: “…-- 12.1.4 Mapping a database to your application code -- 12.2 Adding EF Core to an application -- 12.2.1 Choosing a database provider and installing EF Core -- 12.2.2 Building a data model -- 12.2.3 Registering a data context -- 12.3 Managing changes with migrations -- 12.3.1 Creating your first migration -- 12.3.2 Adding a second migration -- 12.4 Querying data from and saving data to the database -- 12.4.1 Creating a record -- 12.4.2 Loading a list of records -- 12.4.3 Loading a single record -- 12.4.4 Updating a model with changes -- 12.5 Using EF Core in production applications -- Summary -- 13 The MVC and Razor Pages filter pipeline -- 13.1 Understanding filters and when to use them -- 13.1.1 The MVC filter pipeline -- 13.1.2 The Razor Pages filter pipeline -- 13.1.3 Filters or middleware: Which should you choose? …”
Libro electrónico -
125843Publicado 2021Tabla de Contenidos: “…8.3.2.1 Example Target System Setup Using Engine and Body Control Modules -- 8.3.2.2 Fuzz Testing Setup Using Duplicate Engine and Body Control Modules -- 8.3.2.3 Fuzz Testing Setup Considerations -- 8.4 Chapter Summary -- References -- Chapter 9 Improving Fuzz Testing Coverage by Using Agent Instrumentation -- 9.1 Introduction to Agent Instrumentation -- 9.2 Problem Statement: Undetectable Vulnerabilities -- 9.2.1 Memory Leaks -- 9.2.2 Core Dumps and Zombie Processes -- 9.2.3 Considerations for Addressing Undetectable Vulnerabilities -- 9.3 Solution: Using Agents to Detect Undetectable Vulnerabilities -- 9.3.1 Overview of the Test Environment -- 9.3.2 Modes of Operation -- 9.3.2.1 Synchronous Mode -- 9.3.2.2 Asynchronous Mode -- 9.3.2.3 Hybrid Approach -- 9.3.3 Examples of Agents -- 9.3.3.1 AgentCoreDump -- 9.3.3.2 AgentLogTailer -- 9.3.3.3 AgentProcessMonitor -- 9.3.3.4 AgentPID -- 9.3.3.5 AgentAddressSanitizer -- 9.3.3.6 AgentValgrind -- 9.3.3.7 An Example config.json Configuration File -- 9.3.4 Example Results from Agent Instrumentation -- 9.3.4.1 Bluetooth Fuzz Testing -- 9.3.4.2 Wi‐Fi Fuzz Testing -- 9.3.4.3 MQTT Fuzz Testing -- 9.3.4.4 File Format Fuzz Testing -- 9.3.5 Applicability and Automation -- 9.4 Chapter Summary -- References -- Chapter 10 Automating File Fuzzing over USB for Automotive Systems -- 10.1 Need for File Format Fuzzing -- 10.2 Problem Statement: Manual Process for File Format Fuzzing -- 10.3 Solution: Emulated Filesystems to Automate File Format Fuzzing -- 10.3.1 System Architecture Overview -- 10.3.2 Phase One Implementation Example: Prepare Fuzzed Files -- 10.3.3 Phase Two Implementation Example: Automatically Emulate Filesystems -- 10.3.4 Automating User Input -- 10.3.5 Monitor for Exceptions -- 10.4 Chapter Summary -- References…”
Libro electrónico -
125844Publicado 2022Tabla de Contenidos: “…11.6 Standards Requiring Design Safety -- 11.7 The Review of Designs -- 11.8 Hazardous Energy Control -- 11.9 Ergonomic Review of Designs -- 11.10 Design Review Process -- 11.11 Hazard Analysis and Risk Assessment in Design -- 11.12 Conclusion -- References -- Chapter 12 Industrial Hygiene Risk Assessment -- 12.1 Introduction -- 12.2 Fundamental Concepts -- 12.3 US Navy Industrial Hygiene Field Operations Manual -- 12.4 Alternate Health Risk Ranking Systems -- 12.5 More Complex Occupational Hygiene Risk Assessment Tools -- 12.6 Health Risk Assessments and Prioritization -- 12.7 Modified HRR/IH FMEA Methodology -- 12.8 Case Study -- 12.8.1 Sampling -- 12.8.2 Results -- 12.9 Control Banding Nanotool -- 12.10 Dermal RA -- 12.11 Occupational Health Risk and PtD Process Alignment -- 12.12 Summary -- Review Questions -- References -- Chapter 13 Machine Risk Assessments -- 13.1 Introduction -- 13.2 Machine Safety Standards -- 13.2.1 The B11 Standards -- 13.3 Machine Hazards -- 13.4 Machine Safeguarding -- 13.4.1 Machine Safety Control Systems -- 13.5 Selecting Machines for Assessment -- 13.6 Risk Assessment of Machines -- 13.7 Estimating Risk -- 13.8 Case Study -- 13.9 Assessment of Machine Maintenance and Service -- 13.10 Summary -- Appendix A Machine Safeguards Methods (Adapted from OSHA) -- References -- Chapter 14 Project-Oriented Risk Assessments -- 14.1 Introduction -- 14.2 Fatalities and Serious Incidents -- 14.3 Error Traps in Nonroutine Tasks -- 14.4 Management of Change -- 14.5 Construction Project Work -- 14.6 Construction Project Risk Assessment -- 14.7 Safe Work Methods -- 14.8 Pre-Task Hazard Analysis -- 14.9 The Use of Checklists -- 14.10 Maintenance and Service Work -- 14.11 Operating Hazard Analysis -- 14.12 Analyzing Specific Hazards -- 14.13 Pre-Entry Hazard Analysis -- 14.14 Fall Hazard Assessment -- 14.15 Summary -- Review Questions…”
Libro electrónico -
125845por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Bajo la guía de la Unidad de Ética, Coahuila podría considerar la elaboración de manuales o guías sobre ejemplos prácticos y procedimientos para situaciones de conflictos de interés y dilemas éticos. -- Cuadro 2.1. …”
Publicado 2017
Libro electrónico -
125846por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…De nombreux Canadiens n'ont accès qu'à des installations de traitement primaire des eaux usées -- La nouvelle réglementation fédérale a renforcé le cadre d'action, mais sa mise en œuvre est lente -- Une stratégie de long terme est nécessaire pour assurer le financement de la modernisation du réseau -- Recommandations relatives au traitement des eaux usées urbaines -- Références -- Annexe. …”
Publicado 2017
Libro electrónico -
125847por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Conception et équipement des installations à usage éducatif -- Évaluation environnementale des établissements d'enseignement -- Conception durable, respectueuse de l'environnement -- Énergies de substitution -- Technologie légère -- Technique de simulation par ordinateur -- Éclairage -- Audit sur l'environnement -- Chaleur excessive -- Allergies et qualité de l'air -- Énergies de substitution -- Travail interdisciplinaire en équipe -- Coûts sur l'ensemble de la durée de vie -- Contradictions entre les directives environnementales -- Lyons Hall - Cours moyen -- Barnes Farm - École primaire de 2e cycle -- Great Notley - Cours moyen -- Conclusion -- Schémas et stratégies de conception des nouvelles constructions scolaires -- Introduction -- Quantité et qualité -- Le processus de planification des constructions scolaires : synthèse méthodologique -- Analyse et diagnostic…”
Publicado 2000
Libro electrónico -
125848Publicado 2016Tabla de Contenidos: “…-- 1.1 ArchiCAD und BIM -- 1.2 Die Testversion -- 1.2.1 Hard- und Software-Voraussetzungen -- 1.2.2 Installation -- 1.3 ArchiCAD starten und eine einfache Konstruktion erstellen -- 1.3.1 Das ArchiCAD-Fenster -- 1.4 Konstruktion der Außenwände -- 1.4.1 Nützliche Voreinstellungen -- 1.4.2 Vier Wände -- 1.5 Die Innenwände -- 1.5.1 Wandstärke und Ebenen -- 1.5.2 Rasterfang und Koordinateneingabe -- 1.5.3 Eingabe für die Innenwände -- 1.6 Die Tür -- 1.7 Speichern der Konstruktion -- 1.8 Einbau von Fenstern -- 1.9 Bemaßung -- 1.10 3D-Ansicht -- 1.11 Übungsfragen -- Kapitel 2: Die Benutzeroberfläche im Detail -- 2.1 Die Standard-20-Arbeitsumgebung -- 2.2 Das Pfeil-Werkzeug -- 2.2.1 Objekte mit Pfeil-Werkzeug wählen -- 2.2.2 Punktpositionen auf Elementen -- 2.3 Zoom-Funktionen -- 2.3.1 Zoom und Verschieben mit der Maus -- 2.3.2 Zoom und Verschieben mit Werkzeugen -- 2.3.3 Was ändert sich bei Wahl eines anderen Maßstabs? …”
Libro electrónico -
125849Publicado 2017Tabla de Contenidos: “…. -- 4.2.1.5 - Electronic Data NOT Available for Purchase -- 4.2.2 - Other General Data Collections -- 4.2.2.1 - Non-Electronic Parts Reliability Data Book - NPRD (generic, some failure modes) -- 4.2.2.2 - OREDA - Offshore Reliability Data (industry specific, detailed failure modes, mean times to repair) -- 4.2.2.3 - TECHNIS (the author) (industry and generic, many failure modes, some repair times) -- 4.2.2.4 - UKAEA (industry and generic, many failure modes) -- 4.2.2.5 - Sources of Nuclear Generation Data (industry specific) -- 4.2.2.6 - US Sources of Power Generation Data (industry specific) -- 4.2.2.7 - SINTEF (industry specific) -- 4.2.2.8 - Data NOT Available for Purchase -- 4.2.3 - Some Older Sources -- 4.3 - Data Ranges -- 4.3.1 - Using the Ranges -- 4.4 - Confidence Limits of Prediction -- 4.5 - Manufacturers' Data (Warranty Claims) -- 4.6 - Overall Conclusions -- Chapter 5 - Interpreting Data and Demonstrating Reliability -- 5.1 - The Four Cases -- 5.2 - Inference and Confidence Levels -- 5.3 - The Chi-Square Test -- 5.4 - Understanding the Method in More Detail -- 5.5 - Double-Sided Confidence Limits -- 5.6 - Reliability Demonstration -- 5.7 - Sequential Testing -- 5.8 - Setting Up Demonstration Tests -- Chapter 6 - Variable Failure Rates and Probability Plotting -- 6.1 - The Weibull Distribution -- 6.2 - Using the Weibull Method -- 6.2.1 - Curve Fitting to Interpret Failure Data -- 6.2.2 - Manual Plotting -- 6.2.3 - Using the COMPARE Computer Tool -- 6.2.4 - Significance of the Result -- 6.2.5 - Optimum Preventive Replacement -- 6.3 - More Complex Cases of the Weibull Distribution -- 6.4 - Continuous Processes…”
Libro electrónico -
125850Publicado 2016Tabla de Contenidos: “…-- 3.5 Software Quality Control's Utilization of the Quality Characterization Model -- 3.5.1 Systems Analysis -- 3.5.2 Systems Design -- 3.5.3 Development -- 3.5.4 Testing the Presence of External Metrics for a Given Quality Factor -- 3.6 SPI Utilization of the Quality Characterization Model -- 3.6.1 Measuring and Monitoring Quality Factors and Related Metrics -- 3.6.2 Process Improvements Related to Software Quality Characterization Models -- 3.7 Concluding Remarks -- References -- 4 Quality management and software process engineering -- 4.1 Motivation -- 4.2 Our Notion of Process -- 4.3 Quality Management -- 4.4 Software Process (SP) -- 4.5 Software Quality -- 4.6 Quality Management Through SP Engineering -- 4.6.1 Localizing Focus on Quality -- 4.6.1.1 Requirements engineering and management -- 4.6.1.2 Engineering technical specifications -- 4.6.1.3 System architectural design -- 4.6.1.4 System engineering design -- 4.6.1.5 Software architectural design -- 4.6.1.6 Software engineering design -- 4.6.1.7 Software construction engineering -- 4.6.1.8 Software installation engineering -- 4.6.1.9 Software commissioning engineering…”
Libro electrónico -
125851Publicado 2017Tabla de Contenidos: “…Runtime Security Adaptation -- 5.4.1. Supporting Manual Adaptation Using MDSE@R -- 5.4.2. Automated Adaptation Using Vulnerability Analysis and Mitigation -- 5.4.2.1. …”
Libro electrónico -
125852Publicado 2016Tabla de Contenidos: “…Building a Data Set -- 2.4. Manual Annotation: Preparing for Evaluation -- 2.4.1. …”
Libro electrónico -
125853Publicado 2023Tabla de Contenidos: “…11.3.2 Understanding JWT claims -- 11.3.3 Producing JWTs -- 11.3.4 Inspecting JWTs -- 11.3.5 Validating JWTs -- 11.4 Adding authorization to the API server -- 11.4.1 Creating an authorization module -- 11.4.2 Creating an authorization middleware -- 11.4.3 Adding CORS middleware -- 11.5 Authorizing resource access -- 11.5.1 Updating the database to link users and orders -- 11.5.2 Restricting user access to their own resources -- Summary -- 12 Testing and validating APIs -- 12.1 Setting up the environment for API testing -- 12.2 Testing REST APIs with Dredd -- 12.2.1 What is Dredd? -- 12.2.2 Installing and running Dredd's default test suite -- 12.2.3 Customizing Dredd's test suite with hooks -- 12.2.4 Using Dredd in your API testing strategy -- 12.3 Introduction to property-based testing -- 12.3.1 What is property-based testing? …”
Libro electrónico -
125854Publicado 2023Tabla de Contenidos: “…Part 2 Topics in the Production of Official Establishment Statistics and Organizational Frameworks -- Chapter 8 Statistical Producers Challenges and Help -- 8.1 Introduction -- 8.2 A Brief Overview of the Evolution of Economic Statistics, and the Establishment of National Statistical Institutes -- 8.3 Our Statistical Ecosystem -- 8.4 Help Available to Us -- 8.4.1 International Governance -- 8.4.2 Statistical Principles to Produce and Disseminate Official Statistics -- 8.4.3 Statistical Production Models and Frameworks -- 8.4.3.1 Quality Assurance Frameworks -- 8.4.4 Statistical Manuals and Handbooks -- 8.4.5 Classifications -- 8.4.5.1 Classifying Businesses -- 8.4.5.2 Classifying Employment and Workers -- 8.4.5.3 Classifications Overview -- 8.4.6 Statistical Tools -- 8.4.7 International Collaboration and Support -- 8.5 Summary Before the Case Study -- 8.6 Standardization Leads to Efficiency: Canada's Integrated Business Statistics Program -- 8.7 IBSP Objectives -- 8.8 Cornerstones of an Integrated Infrastructure System -- 8.9 Metadata‐Driven Model -- 8.10 Integrated Infrastructure -- 8.11 Information Management -- 8.12 Standardization and Cooperation Within IBSP -- 8.13 The Business Register -- 8.13.1 The BR as the Common Frame -- 8.13.2 Allocation Factors on the BR -- 8.13.3 Commodities and Activities on the BR -- 8.13.4 Robust Methodologies and Generalized Systems -- 8.14 Standard Tools for Developing EQ -- 8.15 Developing a Harmonized Content Model -- 8.16 The IBSP Data Mart and Analytical Tools -- 8.17 Managing Response Burden -- 8.18 Electronic Questionnaires -- 8.19 Large and Complex Enterprises -- 8.19.1 EPM/LAOS Programs -- 8.19.2 Customized Collection -- 8.20 Tax Replacement Strategy -- 8.21 Active Collection Management -- 8.22 Rolling Estimate Model -- 8.23 IBSP Growth and Adaptation -- 8.24 Efficiencies Gained and Learned…”
Libro electrónico -
125855Publicado 2016Tabla de Contenidos: “…-- 1.1 Why R? -- 1.2 R Installation -- 1.3 There is Nothing such as PRACTICALS -- 1.4 Datasets in R and Internet -- 1.4.1 List of Web-sites containing DATASETS -- 1.4.2 Antique Datasets -- 1.5 http://cran.r-project.org -- 1.5.1 http://r-project.org -- 1.5.2 http://www.cran.r-project.org/web/views/ -- 1.5.3 Is subscribing to R-Mailing List useful? …”
Libro electrónico -
125856por Bijalwan, AnchitTabla de Contenidos: “…4.4.3 How Emagnet Works -- 4.4.4 Installation and Platform Requirements -- 4.4.5 Emagnet Usage Options -- 4.4.6 Key Features and Benefits -- 4.4.7 Our Review -- 4.4.8 Pastebin -- 4.4.9 Pastebin's Dark Side -- 4.4.10 The Need for Vigilance -- 4.4.11 Leveraging Authentic8 Flash Report -- 4.4.12 The Role of Silo for Research -- 4.4.13 Our Implementation Case Study -- 4.4.14 Our Review -- 4.5 Countermeasures and Best Practices -- 4.5.1 Strategies for Individuals and Organizations -- 4.5.2 Strengthening Password Security and Promoting 2FA -- 4.5.3 Responsible Vulnerability Disclosure -- 4.6 Recommendations and Future Directions -- 4.6.1 Developing Effective Policies -- 4.6.2 Enhancing Collaboration Between Stakeholders -- 4.6.3 Raising Awareness Among Users -- 4.6.4 Predicting Future Trends and Challenges -- 4.7 Conclusion -- References -- Chapter 5 Mitigating the Threat of Multi-Factor Authentication (MFA) Bypass Through Man-in-the-Middle Attacks Using EvilGinx2 -- 5.1 Introduction -- 5.1.1 Background and Significance of MFA in Enhancing Account Security -- 5.1.2 Overview of the Research Topic and the Use of EvilGinx2 for MFA Bypass -- 5.1.3 Research Objectives and Research Questions -- 5.2 Literature Review -- 5.2.1 Overview of MFA and its Effectiveness in Preventing Unauthorized Access -- 5.2.2 Previous Research on MFA Vulnerabilities and Bypass Techniques -- 5.2.3 Case Studies -- 5.3 Methodology -- 5.3.1 Description of Experimental Setup and Environment -- 5.3.2 Demonstration of EvilGinx2's Functionality and Operation -- 5.4 Results and Discussion -- 5.4.1 Evaluation of EvilGinx2's Ability to Bypass MFA Protections -- 5.4.2 Analysis of Captured Authentication Data, Including Usernames, Passwords, and Cookies -- 5.4.3 Discussion of the Effectiveness of the MFA Bypass Technique…”
Publicado 2024
Libro electrónico -
125857por Arhippainen, HeikkiTabla de Contenidos: “…10.1.2 Creating the Web project -- 10.1.3 Configuring the iSeries run time -- 10.1.4 Creating the output JSP -- 10.1.5 Adding the Table Web component -- 10.1.6 Configuring the table's attributes -- 10.1.7 Creating the Web interaction -- 10.1.8 Testing the Web interaction -- 10.1.9 Integrating the Web interaction with the WebFacing application -- 10.1.10 Testing the Web interaction within the WebFacing application -- 10.2 Extending the WebFacing application with Database Web Pages -- 10.2.1 Creating the database Web pages -- 10.2.2 Testing the database Web pages -- 10.3 Displaying spooled files by calling another WebFacing application -- 10.3.1 Programs involved -- 10.3.2 Testing the function using the 5250 interactive session -- 10.3.3 Converting the application -- 10.3.4 Integrating the WebFacing application with the existing application -- 10.4 Using the traditional program to replace the unsupported feature -- 10.4.1 Traditional program with a display file -- 10.5 Integrating a HATS LE project into the WebFacing application -- 10.5.1 Installing HATS LE on WebSphere Application Server Version 5 -- 10.5.2 Configuring and administering HATS LE -- 10.5.3 Integrating HATS LE within the WebFacing application -- 10.5.4 Testing the command key action -- 10.6 Extending functionality through iSeries Access for Web -- 10.6.1 iSeries Access for Web -- 10.6.2 Using the command key within the WebFacing application -- 10.6.3 Defining the Web Settings to link the iSeries Access for Web -- 10.7 Working with spooled files using the IBM WebFacing Tool -- 10.7.1 Defining a report service command key -- 10.8 Using the built-in system screen support -- Chapter 11. …”
Publicado 2004
Libro electrónico -
125858Publicado 2023Tabla de Contenidos: “…12.3.5 Development of the Final ISM Model…”
Libro electrónico -
125859por Anand, AbhineetTabla de Contenidos: “…Digital Twin Technology -- 5.3.1 Integrating Deep Learning in Simulation Models -- 5.3.2 Benefits of Deep Learning Digital Twin -- 5.3.3 Applications of Digital Twin Technology -- 5.4 Literature Review -- 5.5 Conclusion -- References -- Chapter 6 Digital Twin Application on System Identification and Control -- 6.1 Introduction -- 6.2 Digital Twin Technology and Its Application -- 6.2.1 Related Work on Digital Twin -- 6.2.2 DT Application -- 6.2.3 Different Levels of DT Models -- 6.2.3.1 Pre-Digital Twin -- 6.2.3.2 Model Design -- 6.2.3.3 Adaptive Model With DT Technology -- 6.2.3.4 The Process of Intelligent DT -- 6.2.4 Dynamic Model -- 6.2.5 Digital Twin and Machine Learning -- 6.3 Control and Identification: A Survey -- 6.3.1 Hierarchy of System Identification Methods -- 6.3.1.1 Parametric Methods -- 6.3.1.2 Nonparametric Methods -- 6.3.2 Machine Learning Approach -- 6.3.3 Deep Neural Network Approach -- 6.4 Proposed Methodology -- 6.4.1 DT Technology Application in Identification and Control -- 6.5 Result Analysis and Discussion -- 6.5.1 Case Study: Control Application -- 6.6 Conclusion and Future Work -- References -- Part 2: Real Time Applications of Digital Twin -- Chapter 7 Digital Twinning-Based Autonomous Take-Off, Landing, and Cruising for Unmanned Aerial Vehicles -- 7.1 Introduction -- 7.1.1 Problem Statement -- 7.1.2 Research Objectives -- 7.2 Digital Twinning for UAV Autonomy -- 7.3 Challenges and Limitations -- 7.3.1 Manual Control and Pre-Programmed Flight Paths…”
Publicado 2024
Libro electrónico -
125860por Baragoin, CorinneTabla de Contenidos: “…Fraud detection example -- 5.1 The business issue -- 5.2 Mapping the business issue to data mining functions -- 5.3 The business application -- 5.4 Environment, components, and implementation flow -- 5.5 Data to be used -- 5.5.1 Data extraction -- 5.5.2 Data manipulation and enrichment -- 5.6 Implementation in DB2 UDB V8.1 -- 5.6.1 Enabling database for modeling and scoring -- 5.6.2 Installing additional UDFs and stored procedures -- 5.6.3 Model building -- 5.7 Implementation in DB2 UDB V7.2 -- 5.7.1 Prerequisite: Initial model building -- 5.7.2 Data settings -- 5.7.3 Model parameter settings -- 5.7.4 Building the mining task -- 5.7.5 Running the model by calling a stored procedure -- 5.7.6 Scoring script generation -- 5.7.7 Applying the scoring model -- 5.7.8 Ranking and listing the five smallest clusters -- 5.7.9 Actionable result for investigation -- 5.7.10 Scheduling the job to run at regular intervals -- 5.8 Benefits -- 5.8.1 A system that adapts to changes in undesirable behavior -- 5.8.2 Fast deployment of fraud detection system -- 5.8.3 Better use of data mining resource…”
Publicado 2002
Libro electrónico