Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,213
- Usos y costumbres 2,908
- Bible 1,923
- Bíblia 1,278
- Historia 1,198
- RELIGION 1,015
- Crítica e interpretación 421
- Criticism, interpretation, etc 373
- History 272
- Història 269
- Crítica, interpretación, etc 257
- Comentarios 229
- Engineering & Applied Sciences 228
- Crítica, interpretació, etc 211
- crítica e interpretación 205
- Descripción y viajes 194
- Religion 184
- Business & Economics 176
- Doble imposición 172
- Theology 155
- Computer Science 147
- Application software 146
- Transportation 143
- Computer networks 142
- Development 141
- Operating systems (Computers) 127
- Web sites 126
- Design 121
- Historia y crítica 120
- Transport 116
-
28501por Bandyopadhyay, Samir KumarTabla de Contenidos: “…Cover -- Preface -- Contents -- Chapter 1: Fundamentals of Data Representation -- 1.1 Basic Concepts of Data Representation -- 1.2 Data Type -- 1.3 Data Abstraction and Abstract Data Types -- 1.4 System-Defined Data Type -- 1.5 Primitive Data Structures and their Representation -- Exercises -- Chapter 2: Fundamentals of Data Structures- Basic Concepts -- 2.1 Introduction to Data Structure -- 2.2 Algorithm for Data Structure -- 2.3 Notation for Algorithm -- 2.3.1 Flowcharts -- 2.3.2 Pseudocode -- 2.3.3 Decision Tables -- 2.4 Modularisation to Algorithm Design -- 2.4.1 Top-Down Design Approach -- 2.4.2 Bottom-Up Approach -- 2.5 Analysis of Algorithms -- 2.5.1 Asymptotic Analysis -- 2.5.2 Space Complexity -- 2.6 Structured Programming -- Exercises -- Chapter 3: Arrays -- 3.1 Linear Arrays -- 3.2 Arrays in C -- 3.3 Initializing Arrays -- 3.4 Insertion and Deletion -- 3.5 Multidimensional Arrays -- 3.6 Row-Major and Column-Major Order -- Exercises -- Chapter 4: String Processing and Pattern Matching -- 4.1 Introduction to String Processing -- 4.2 String Representation -- 4.3 String Manipulation -- 4.4 Pattern Matching -- 4.5 The Brute-Force Algorithm -- 4.5.1 Algorithm: Brute-Force Pattern Matching -- 4.6 Kunth-Morris-Pratt Algorithm -- 4.6.1 Algorithm A: Kunth-Morris-Pratt Pattern Matching -- 4.6.2 Algorithm B: Kunth-Morris-Pratt Pattern Matching -- 4.7 Boyer-Moore Algorithm -- Exercises -- Chapter 5: Pointers -- 5.1 Introduction -- 5.2 Fundamentals and Defining Pointers -- 5.3 Type Specifiers and Scalars for Pointers -- 5.4 Operations Using Pointers -- 5.5 Passing Pointers to Functions -- 5.6 Pointers and Arrays, Pointer Arithmetic -- 5.7 Pointers and Two-Dimensional Arrays -- 5.8 Array of Pointers -- 5.9 Pointers to Pointers -- 5.10 Pointers to Functions -- 5.11 Command the Arguments -- Exercises -- Chapter 6: Stacks and Queues…”
Publicado 2008
Libro electrónico -
28502Publicado 2022Tabla de Contenidos: “…Les attributs onomastiques construits sur medeôn, -ousa + toponyme -- 1.4 Rome and the West -- The Quadruviae: Cult Mobility and Social Agency in the Northern Provinces of the Roman Empire -- Naming the Gods in Roman Sicily: The Case of Enguium -- 2 Mapping the Divine: Presenting Gods in Space -- 2.1 Egypt and Near East -- Khnoum d’Éléphantine et Isis de Philae : la lutte pour le contrôle de la première cataracte du Nil et du Dodécaschène -- From High to Low: Reflections about the Emplacement of Religion in Ancient Mesopotamia -- A New Mobilities Approach to Naming and Mapping Deities: Presence, Absence, and Distance at Kuntillet ‘Ajrud -- Entre espace et puissance : le séjour des morts et la persistance de structures polythéistes dans la Bible hébraïque -- 2.2 Phoenician and Punic World -- Death at the Centre of Life: Some Notes on Gods and the Dead, Temples and Tombs in the Phoenician Context -- In and Out What Archaeology Can Tell Us About the Role of Liminality in the Phoenician Rites -- Graeco-Phoenician Figurines in Phoenicia. …”
Libro electrónico -
28503Publicado 2024Tabla de Contenidos: “…Business financials -- Cross Functional Teams (CFTs) -- Managing business relationships -- Vendors and suppliers -- Internal stakeholders -- Partners and clients -- Industry groups and associations -- Regulatory agencies -- Summary -- Chapter 5: The Mindset of the Network Architect - the Principles of Design -- Principles of network architecting -- Hierarchical -- Additional design patterns -- Scalability -- Modularity -- Resilience -- Performant -- Thinking like a CxO -- What other industries are doing -- Always thinking - innovating, exploring new trends -- Summary -- Part 3 - Constructing the Core: Building Blocks of a Network Architect -- Chapter 6: Foundations of Network Architecture - Part 1: Route/Switch -- Overview of the OSI model -- OSI model versus TCP/IP model -- Physical infrastructure -- Network cabling -- Switches and switching concepts -- Switching concepts -- Switches -- Key switching functions -- Routers and routing concepts -- Routing concepts -- Router types -- Supporting vendors -- Fiber optics -- Networking -- Security -- Virtualization -- Server -- Summary -- Further reading -- Chapter 7: The Foundation of Network Architecture, Part Two - Network Services -- Understanding load balancers -- Types of load balancers -- Network load balancer (NLB) -- Global server load balancer (GSLB) -- Load balancing algorithms -- Which load balancer should you choose? …”
Libro electrónico -
28504Publicado 2018Tabla de Contenidos: “…O'Malley -- The myths of the Council of Trent and the construction of Catholic confessional culture / Günther Wassilowsky -- The Council of Trent and vernacular Bible reading: what happened in the build-uo to and during de Fourth Session (1546)? …”
991004478509706719 -
28505Publicado 1988Tabla de Contenidos: “…Roest Crollius -- Biblical theology: its revival and influence on theological formation / Emilio Rasco -- The study of the fathers of the Church in priestly formation / Antonio Orbe -- Absence and presence of fundamental theology at Vatican II / René Latourelle -- The Bible in different cultures: a study group work report / FritzLeo Lentzen-Deis -- The contribution of the Council to culture / Hervé Carrier -- From the class war to the culture of solidarity: a fundamental theme of the Church's Social Teaching / Johannes Schasching -- The implications of the teaching of Gaudium et spes on peace / Joseph Joblim -- Biomedical progress and its demand on moral theology / Manuel Cuyás -- Vatican II and communications / Avery Dulles -- The decree on them means of social communication: success or failure of the Council? …”
991002121429706719 -
28506Publicado 2012Tabla de Contenidos: “…-- Investing in commodities using index funds -- How to invest using index tracking funds -- Spot prices v the futures index -- The main commodity index providers -- Composite or not? …”
Libro electrónico -
28507Publicado 2019Tabla de Contenidos: “…List of Abbreviations, Figures and Tables in the -- Text and Notes xiii -- List of Abbreviations xiii -- List of Figures xiv -- List of Tables xiv -- Notes on Contributors xv -- Preface xxi -- Chapter 1: Reconceiving reproductive health: An introduction 1 -- Introduction 1 -- Part One: Systematic theological reflections -- Chapter 2: 'Bearing fruit'? …”
Libro electrónico -
28508por Watts, DavidTabla de Contenidos: “…3.3 Storage considerations -- 3.3.1 xSeries storage solutions -- 3.3.2 Tape backup -- 3.4 Rack installation -- 3.5 Power considerations -- 3.6 Operating system support -- 3.6.1 Clustering -- 3.7 IBM Director support -- 3.8 Solution Assurance Review -- 3.8.1 Trigger Tool -- 3.8.2 Electronic Solution Assurance Review (eSAR) -- Chapter 4. Installation -- 4.1 Using The Extensible Firmware Interface -- 4.1.1 EFI Firmware Boot Manager -- 4.1.2 The EFI shell -- 4.1.3 Driver Setup -- 4.1.4 Flash update -- 4.1.5 Configuration/Setup utility -- 4.1.6 Diagnostic utility -- 4.1.7 Boot Option Maintenance -- 4.2 Configuring scalable partitions -- 4.2.1 Creating a scalable partition -- 4.2.2 Booting a scalable partition -- 4.2.3 Multiple Monitors -- 4.2.4 Deleting a scalable partition -- 4.3 Installing Windows Server 2003 -- 4.3.1 Important information -- 4.3.2 Preparing to install -- 4.3.3 Installation -- 4.3.4 Post-setup phase -- 4.4 Installing Linux -- 4.4.1 Linux IA-64 kernel overview -- 4.4.2 Choosing a Linux distribution -- 4.4.3 Installing SUSE LINUX Enterprise Server 8.0 -- 4.4.4 Installing Red Hat Enterprise Linux AS -- 4.4.5 Linux boot process -- 4.4.6 Information about the installed system -- 4.4.7 Using the serial port for the Linux console -- 4.4.8 RXE-100 Expansion Enclosure -- 4.4.9 Upgrading drivers -- Chapter 5. …”
Publicado 2004
Libro electrónico -
28509Publicado 2020Tabla de Contenidos: “…Intro -- I Grundlegende Konzepte -- Vorbemerkungen und Überblick -- Informatik, Algorithmen und Datenstrukturen -- Historischer Überblick: Algorithmen -- Historie von Programmiersprachen und Java -- Grundkonzepte der Programmierung in Java -- Algorithmische Grundkonzepte -- Intuitiver Algorithmusbegriff -- Beispiele für Algorithmen -- Bausteine für Algorithmen -- Pseudocode-Notation für Algorithmen -- Struktogramme -- Rekursion -- Sprachen und Grammatiken -- Begriffsbildung -- Reguläre Ausdrücke -- Backus-Naur-Form (BNF) -- Elementare Datentypen -- Datentypen als Algebren -- Signaturen von Datentypen -- Der Datentyp bool -- Der Datentyp integer -- Felder und Zeichenketten -- Terme -- Bildung von Termen -- Algorithmus zur Termauswertung -- Datentypen in Java -- Primitive Datentypen -- Referenzdatentypen -- Operatoren -- Algorithmenparadigmen -- Überblick über Algorithmenparadigmen -- Applikative Algorithmen -- Terme mit Unbestimmten -- Funktionsdefinitionen -- Auswertung von Funktionen -- Erweiterung der Funktionsdefinition -- Applikative Algorithmen -- Beispiele für applikative Algorithmen -- Imperative Algorithmen -- Grundlagen imperativer Algorithmen -- Komplexe Anweisungen -- Beispiele für imperative Algorithmen -- Das logische Paradigma -- Logik der Fakten und Regeln -- Deduktive Algorithmen -- Weitere Paradigmen -- Genetische Algorithmen -- Neuronale Netze -- Umsetzung in Java -- Ausdrücke und Anweisungen -- Methoden -- Applikative Algorithmen und Rekursion -- Literaturhinweise zum Teil I -- II Algorithmen -- Ausgewählte Algorithmen -- Suchen in sortierten Folgen -- Sequenzielle Suche -- Binäre Suche -- Sortieren -- Sortieren: Grundbegriffe -- Sortieren durch Einfügen -- Sortieren durch Selektion -- Sortieren durch Vertauschen: BubbleSort -- Sortieren durch Mischen: MergeSort -- QuickSort -- Sortieren durch Verteilen: RadixSort…”
Libro electrónico -
28510Publicado 2023Tabla de Contenidos: “…D ́okus, Eszter Lajk ́o, Ivan Ranelovi ́c, Di ́ana Mez ̋o, Gitta Schlosser and L ́aszl ́o -- K ̋ohidai et al. -- Phage Display-Based Homing Peptide-Daunomycin Conjugates for Selective Drug Targeting to -- PANC-1 Pancreatic Cancer -- Reprinted from: Pharmaceutics 2020, 12, 576, doi:10.3390/pharmaceutics12060576 261 -- Ayman Abouzayed, Hanna Tano, Abel Nagy, Sara S. …”
Libro electrónico -
28511Publicado 2023Tabla de Contenidos: “…D ́okus, Eszter Lajk ́o, Ivan Ranelovi ́c, Di ́ana Mez ̋o, Gitta Schlosser and L ́aszl ́o -- K ̋ohidai et al. -- Phage Display-Based Homing Peptide-Daunomycin Conjugates for Selective Drug Targeting to -- PANC-1 Pancreatic Cancer -- Reprinted from: Pharmaceutics 2020, 12, 576, doi:10.3390/pharmaceutics12060576 261 -- Ayman Abouzayed, Hanna Tano, Abel Nagy, Sara S. …”
Libro electrónico -
28512por Doll-Steinberg, DanielTabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
Publicado 2023
Libro electrónico -
28513por Ariganello, ErnestoTabla de Contenidos: “…TÉCNICAS DE CONFIGURACIÓN DE ROUTERS CISCO -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONFIGURACIÓN BÁSICA DEL ROUTER -- CONECTÁNDOSE POR PRIMERA VEZ AL ROUTER -- Comandos ayuda -- ASIGNACIÓN DE NOMBRE Y CONTRASEÑA -- Configuración de contraseña de consola -- Configuración de contraseña de telnet -- Configuración de contraseña de auxiliar -- Servicio de encriptación -- CASO PRÁCTICO -- Configuración de contraseñas -- Creación y autenticación de usuarios -- Configuración de mensajes -- Tablas de host -- CONFIGURACIÓN DE INTERFACES -- Interfaces Ethernet -- CASO PRÁCTICO -- Configuración de una interfaz ethernet -- Verificación del estado de una interfaz ethernet -- Interfaces seriales -- Sub-interfaces -- Sub-interfaces como enlaces troncales -- CASO PRÁCTICO -- Configuración de un enlace troncal sobre dos subinterfaces -- EtherChannel -- COPIAS DE RESGUARDO -- Copia de la configuración en la memoria del router -- Cómo borrar el contenido de las memorias -- Copia de la configuración en un servidor TFTP -- Copiar y pegar la configuración -- Descarga del IOS mediante Xmodem -- Copia de seguridad del IOS -- Verificación del contenido de las memorias -- COMANDOS SHOW -- Lista de comandos show más usados -- 2 ENRUTAMIENTO ESTÁTICO -- DETERMINACIÓN DE ENRUTAMIENTO -- RUTAS ESTÁTICAS -- Proceso de configuración de rutas estáticas -- Rutas estáticas por defecto -- Distancia administrativa -- CASO PRÁCTICO -- Configuración de rutas estáticas -- VERIFICACIÓN DE RUTAS ESTÁTICAS -- 3 ENRUTAMIENTO DINÁMICO -- INTRODUCCIÓN A RIP -- PROCESO DE CONFIGURACIÓN DE RIP -- Distancia administrativa -- Ajustes de los temporizadores -- CASO PRÁCTICO -- Filtrado de rutas -- REDISTRIBUCIÓN ESTÁTICA EN RIP -- CASO PRÁCTICO -- Configuración de una ruta estática redistribuida en RIP -- Autenticación Rip v2 -- VERIFICACIÓN RIP -- Resumen de comandos RIP…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28514Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding IoT Fundamentals -- Chapter 1: IoT Essentials, All You Should Know -- The evolving definition of IoT -- Deployed from fixed to mobility -- Mobility from a local area to a wide area -- Presence from city to barren fields -- Throughput from Mb/s to Gb/s -- Battery life from days to years -- Networking from point-to-point and point-to-multipoint to mesh and star topologies -- Intelligence at edge node -- AI and ML -- Addressable markets -- Residential -- Commercial and business -- Neighborhood and campus -- Cities -- Rural areas -- Industries -- How IoT impacts us -- Living comfort and safety improvement -- Operational efficiency improvement -- Environmental protection improvement -- Industrial productivity improvement -- Summary -- Further reading -- Chapter 2: IoT Network, the Neural System of Things -- IoT networks at home -- Home Wi-Fi -- BLE -- Thread -- IoT networks on campuses and in buildings -- Enterprise Wi-Fi -- Thread mesh -- Private LoRaWAN network -- No one-size-fits-all approach -- IoT networks in cities -- Cellular network -- Public LoRaWAN network -- IoT networks in rural areas -- Private LoRaWAN network -- LEO network -- Summary -- Chapter 3: IoT End Devices, the Neuron Cells of an IoT System -- Device types -- Installing indoors versus outdoors -- Powering via external supply versus batteries -- Connected by wire versus wireless -- The need for edge computing -- Hardware architecture -- MCUs -- Roles -- Key features -- Critical components -- Off-the-shelf MCU -- DIY-friendly MCU -- Peripherals and interfaces -- GPIO -- SPI -- I2C -- UART -- USB -- SDIO -- ADCs -- DACs -- PWM outputs -- JTAG -- Timers -- Real-time clock -- Sensors and actuators -- Sensors -- Actuators -- Common pins on sensors -- Understanding sensor specifications…”
Libro electrónico -
28515Publicado 2021Tabla de Contenidos: “…Solving Inverse Problems by Approximate Bayesian Computation -- 2.1 Introduction to the ABC method -- 2.2 Basis of ABC using Subset Simulation -- 2.2.1 Introduction to Subset Simulation -- 2.2.2 Subset Simulation for ABC -- 2.3 The ABC-SubSim algorithm -- 2.4 Summary -- 3. …”
Libro electrónico -
28516por Lidwell, William
Publicado 2003Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
28517Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Hadoop -- Hadoop Distributed File System -- High availability -- Intra-DataNode balancer -- Erasure coding -- Port numbers -- MapReduce framework -- Task-level native optimization -- YARN -- Opportunistic containers -- Types of container execution -- YARN timeline service v.2 -- Enhancing scalability and reliability -- Usability improvements -- Architecture -- Other changes -- Minimum required Java version -- Shell script rewrite -- Shaded-client JARs -- Installing Hadoop 3 -- Prerequisites -- Downloading -- Installation -- Setup password-less ssh -- Setting up the NameNode -- Starting HDFS -- Setting up the YARN service -- Erasure Coding -- Intra-DataNode balancer -- Installing YARN timeline service v.2 -- Setting up the HBase cluster -- Simple deployment for HBase -- Enabling the co-processor -- Enabling timeline service v.2 -- Running timeline service v.2 -- Enabling MapReduce to write to timeline service v.2 -- Summary -- Chapter 2: Overview of Big Data Analytics -- Introduction to data analytics -- Inside the data analytics process -- Introduction to big data -- Variety of data -- Velocity of data -- Volume of data -- Veracity of data -- Variability of data -- Visualization -- Value -- Distributed computing using Apache Hadoop -- The MapReduce framework -- Hive -- Downloading and extracting the Hive binaries -- Installing Derby -- Using Hive -- Creating a database -- Creating a table -- SELECT statement syntax -- WHERE clauses -- INSERT statement syntax -- Primitive types -- Complex types -- Built-in operators and functions -- Built-in operators -- Built-in functions -- Language capabilities -- A cheat sheet on retrieving information -- Apache Spark -- Visualization using Tableau -- Summary…”
Libro electrónico -
28518Publicado 2017Tabla de Contenidos: “…Sensor Security -- Types of Sensor Attacks -- Security of Sensor Data -- Basic encryption scheme -- Secret sharing scheme -- Partial decryption -- Sliding group watermark scheme -- Simplified sliding group watermark scheme -- Forward watermark chain -- Location Privacy -- Attack-Threat Types -- Preserving Location Privacy -- Challenges of preserving location privacy -- Architecture of privacy tools -- Mechanisms to preserve location privacy -- Location Privacy Preserving Methods -- k-Anonymity -- Extensions of k-anonymity -- Obfuscation -- Obfuscation by enlarging radius -- Obfuscation by shifting center -- Obfuscation by reducing radius -- Cloaking -- Cloaking architecture example -- Cloaking region generation basics -- Sample cloaking mechanisms -- References -- 10 Usability -- Need of Sensors in Mobile Computing -- OS Logo Requirements and Sensor Support -- Context- and Location-Based Services -- Sensor-Based Power Management -- Sensor management -- Communication protocols -- Sensor-based power management policies -- Sensor-Based User Interactions -- Simplifying the user-device interface for voice memo recording -- Detecting orientation of device -- Power management -- Human-Computer Interactions: Gesture Recognition -- Sensor Usages -- A Few Sensor Examples -- References -- 11 Sensor application areas -- Introduction to Sensor Applications -- Augmented Reality -- Hardware Components of Augmented Reality -- Augmented Reality Architecture -- Applications of Augmented Reality -- Sensor Fusion for Augmented Reality -- Depth Sensors in Augmented Reality -- Sensor Applications in the Automotive Industry -- Steering Torque Sensor -- Steering Angle Sensor -- Power Steering Motor Position Sensors -- Sensor Applications in Energy Harvesting -- Components of Energy Harvesting -- Net-Zero Energy Systems -- Medical Applications of Energy Harvesting…”
Libro electrónico -
28519Publicado 2016Tabla de Contenidos: “…Specific -- Measurable -- Achievable -- Realistic -- Time-Bound -- Too Many Objectives -- The Artifact Serves the Objectives -- Doing Too Much -- Doing Too Little -- The Objectives Frame the Report -- Summary -- Chapter 13 - Losing Our Audience -- Overview -- Users Catch on Rough Edges -- When Confusion is a Distraction Versus Branch Point -- Difficult Conversations (Uncooperative Stakeholders) -- The Discussion Strays from the Objectives -- Summary -- Part 3 - How-To Manual and Recipes -- Chapter 14 - Master Facilitation -- Overview -- Fundamental Facilitation Techniques -- Offering the Artifact, Not the Design -- Staying Present in the Present Tense -- Use Their Words -- Being Present -- Keeping it Real -- Maintaining Engagement -- Judicious Prompting -- Building Rapport -- Actively Listening Without Judgment -- Prompt, but Don't Lead -- Leading Through Body Language -- The Five Prompts and How to Avoid Three of Them -- Honoring Silence -- The Five Whys -- Facilitation Unique to PrD -- The Artifact Is the Thing -- Social Objects -- A Personal Object -- An Active Object -- A Provocative Object -- A Relational Object -- Improvisation Is Key -- Why PrD Isn't Usability -- Performing a Task -- User Goals -- Thinking Aloud -- Noting Confusions -- Capturing Quantitative Data -- Relevance -- Collecting Requirements -- Refining the Design -- Refining -- Exploring -- Do You Like It? …”
Libro electrónico -
28520Publicado 2023Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Chapter 1 Introduction to Machine Learning for Analyzing Material-Microbe Interactions -- 1.1 Introduction -- References -- Chapter 2 Introduction to 2D Materials -- 2.1 Classification of 2D Materials -- 2.2 Synthesis of 2D Materials -- 2.2.1 Top-Down Methods -- 2.2.2 Bottom-Up Methods -- 2.2.3 Layer Transfer Methods -- 2.3 Functionality of 2D Materials -- 2.3.1 Mechanical Properties -- 2.3.2 Electrical Properties -- 2.3.3 Optical Properties -- 2.4 Applications of 2D Materials -- References -- Chapter 3 An Overview of Machine Learning -- 3.1 Introduction -- 3.1.1 The Processing Pipeline of an ML Task -- 3.1.2 Data Integration -- 3.1.3 Data Preparation -- 3.1.4 Model Building -- 3.1.5 Model Evaluation -- 3.2 ML Algorithms -- 3.2.1 Bias and Variance -- 3.3 Unsupervised Learning -- 3.3.1 Cluster Analysis -- 3.3.2 Principal Component Analysis (PCA) -- 3.4 Supervised Learning -- 3.4.1 Regression -- 3.4.2 Classification -- 3.4.3 Supervised Learning Variants: Self-Supervised Learning -- 3.5 Deep Learning -- 3.5.1 Convolutional Neural Networks (CNNs) -- 3.6 Recurrent Neural Networks (RNN) -- References -- Chapter 4 Discovery of 2D Materials with Machine Learning -- 4.1 Introduction: High-Throughput Screening -- 4.2 ML Approaches for 2D Materials Research -- 4.2.1 Three ML Approaches for 2D Materials Research -- 4.2.2 A Summary of the Use of Machine Learning in 2D Materials Research -- 4.3 Prediction of 2D Material Properties Using Machine Learning -- 4.4 Application Machine Learning Approaches to Discover Novel 2D Materials -- 4.4.1 Predictions of Crystal Structure -- 4.4.2 Prediction of Components -- 4.5 Machine Learning for Miscellaneous Functions -- 4.6 Assessment of Common Challenges and Their Prevention Methods -- 4.6.1 The Problems with Model Building -- 4.6.2 Usability…”
Libro electrónico