Mostrando 155,741 - 155,760 Resultados de 158,518 Para Buscar 'userv~', tiempo de consulta: 1.53s Limitar resultados
  1. 155741
    Publicado 2022
    “…Rooting his vision in history and psychology, Narula argues that humans' intrinsic need for autonomy, accomplishment, and connection can now best be met in virtual "worlds of ideas," in which users will have the chance to create and exchange meaning and value. …”
    Libro
  2. 155742
    por Dewey, Susan
    Publicado 2013
    “…These ethical challenges include: · Research methodology · Distinguishing research from activism · Navigating the politically and ideologically charged environments in which researchers must remain constantly attuned to the legal and public policy implications of their work · Possibilities for participatory sex work research processes · Strategies for incorporating participants in a variety of collaborative ways Sex work presents a unique set of challenges that are not always well understood by those working outside of anthropology and disciplines closely related to it. This book serves an important function by honestly and openly reviewing strategies for overcoming these ethical challenges with the end goal of producing path-breaking research that actively incorporates the perspectives of research participants on their own terms. …”
    Libro electrónico
  3. 155743
    por R., Elakkiya
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Part I: Cognitive Analytics in Continual Learning -- Chapter 1 Cognitive Analytics in Continual Learning: A New Frontier in Machine Learning Research -- 1.1 Introduction -- 1.2 Evolution of Data Analytics -- 1.3 Conceptual View of Cognitive Systems -- 1.4 Elements of Cognitive Systems -- 1.5 Features, Scope, and Characteristics of Cognitive System -- 1.6 Cognitive System Design Principles -- 1.7 Backbone of Cognitive System Learning/Building Process -- 1.8 Cognitive Systems vs. AI -- 1.9 Use Cases -- 1.10 Conclusion -- References -- Chapter 2 Cognitive Computing System-Based Dynamic Decision Control for Smart City Using Reinforcement Learning Model -- 2.1 Introduction -- 2.2 Smart City Applications -- 2.3 Related Work -- 2.4 Proposed Cognitive Computing RL Model -- 2.5 Simulation Results -- 2.6 Conclusion -- References -- Chapter 3 Deep Recommender System for Optimizing Debt Collection Using Reinforcement Learning -- 3.1 Introduction -- 3.2 Terminologies in RL -- 3.3 Different Forms of RL -- 3.4 Related Works -- 3.5 Proposed Methodology -- 3.6 Result Analysis -- 3.7 Conclusion -- References -- Part II: Computational Intelligence of Reinforcement Learning -- Chapter 4 Predicting Optimal Moves in Chess Board Using Artificial Intelligence -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Proposed System -- 4.3.1 Human vs. …”
    Libro electrónico
  4. 155744
    por Beffa, Federico
    Publicado 2024
    “…The approach is based on the extension of linear systems theory using the Volterra series. In contrast to the few existing treatments, our approach highlights the algebraic structure underlying such systems and is based on Schwartz’s distributions (rather than functions). …”
    Libro electrónico
  5. 155745
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
    Libro electrónico
  6. 155746
    por Buchner, Barbara
    Publicado 2011
    “…Both ‘strawman’ proposals foresee an important oversight role from the UNFCCC to serve as recipient of all data, and to co-ordinate the verification and review and/or international consultation and analysis process. …”
    Capítulo de libro electrónico
  7. 155747
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Understanding the Laravel Web Application Architecture Configuring the RoadRunner Application Server Configuring the Swoole Application Server Building a Laravel Octane Application Reducing Latency and Managing Data with an Asynchronous Approach Using Queues to Apply the Asynchronous Approach in Your Application Configuring the Laravel Octane Application for the Production Environment…”
    Libro electrónico
  8. 155748
    por Davis, Cortney, 1945-
    Publicado 2015
    “…A surgical mishap led to a series of life-altering and life-threatening complications, resulting in two prolonged hospital stays and a lengthy recovery. …”
    Libro
  9. 155749
    por Pfeiffer, Bruce Brooks
    Publicado 2009
    “…Author Bruce Brooks Pfeiffer, who served as Wright's apprentice during the 1950s, highlights the latest research and gives fresh insights into the work, providing new dates for many of the plans and houses. …”
    Libro
  10. 155750
    Publicado 2021
    “…At once ambitious and intimate, 1000 Years of Joys and Sorrows offers a deep understanding of the myriad forces that have shaped modern China, and serves as a timely reminder of the urgent need to protect freedom of expression"--…”
    Libro
  11. 155751
    por OECD
    Publicado 2016
    “…Pensions privées et fonds de réserve publics pour les retraites Couverture des régimes de retraite privés Structure institutionnelle des plans de retraite privés Actifs des fonds de pension et des fonds de réserve publics Répartition des actifs des fonds de pension et des fonds de réserve publics Rendement des fonds de pension et des fonds de réserve publics Coûts d'exploitation et frais relatifs aux fonds de pension Coefficients de capitalisation des régimes à prestations définies Chapitre 11. …”
    Libro electrónico
  12. 155752
    Publicado 2012
    “…These findings were not observed in the control group. Wakitani scale was statistically significant between the two groups. …”
    Enlace del recurso
    Electrónico
  13. 155753
    Publicado 2018
    “…The foremost aim of this research topic is to review and contextualize the main observational scenarios following an empirical approach, to present and discuss the accretion scenario, and then to analyze how a closer connection between theory and observation can be achieved, identifying those aspects of our understanding that are still on a shaky terrain and are therefore uncertain knowledge. …”
    Libro electrónico
  14. 155754
    por Zimmermann, Martina. author
    Publicado 2017
    “…The Poetics and Politics of Alzheimer’s Disease Life-Writing offers an important intervention at a critical time, and deserves to meet with a wide readership.’ - Jane F. …”
    Libro electrónico
  15. 155755
    por Le Goff, Hervé
    Publicado 2019
    “…Le personnage de Mercœur, chef de la Ligue en Bretagne a longtemps excessivement focalisé l’attention : l’ouvrage d’Hervé Le Goff montre que la crise ligueuse y fait intervenir des acteurs très divers. …”
    Electrónico
  16. 155756
    por Brenneis, Sara J.
    Publicado 2014
    “…Brenneis argues that fiction and nonfiction written by a single author and focused on the same historical moment deserve to be read side-by-side. By proposing a literary model that examines these genres together, Genre Fusion gives equal importance to fiction and historiography in Spain. …”
    Libro electrónico
  17. 155757
    por Sadun, Erica
    Publicado 2013
    “…Shower your app with the quality promotion it deserves! Erica Sadun and Steve Sande help you earn strong app reviews that can transform sales from lackluster to blockbuster. …”
    Libro electrónico
  18. 155758
    Publicado 2017
    “…This is well illustrated by the observation that MS patients treated with an anti-CD4 depleting antibody did not gain any clinical benefits whereas removal of several lymphocyte subsets using an anti-CD52 depleting antibody has been shown to impede disease progression. …”
    Libro electrónico
  19. 155759
    Publicado 2018
    “…The kingfisher, one of the most "exotic" European birds by its colors, has always aroused the wonder of those who manage to observe it. A predator of small fry, it needs, to complete its life cycle, aquatic environments rich in fish and especially soft banks with a vertical or slightly concave profile where it can dig the burrow in which the eggs are laid. …”
    Libro electrónico
  20. 155760
    Publicado 2016
    “…Recanalization of the occluded arterial vessel using thrombolysis is the only causal therapy available. …”
    Libro electrónico