feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Hershey, Pa : Idea Group Pub
    UID:
    b3kat_BV035413930
    Format: 1 Online-Ressource (ix, 284 Seiten)
    Edition: Online_Ausgabe Boulder, Colo NetLibrary 2003 E-Books von NetLibrary Sonstige Standardnummer des Gesamttitels: 22382847
    ISBN: 1591401399
    Additional Edition: Reproduktion von E-business innovation and change management 2004
    Language: English
    Keywords: Electronic Commerce ; Management ; Electronic books. ; Electronic books. ; Electronic books
    URL: Full text  (Click to View (Currently Only Available on Campus))
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    kobvindex_INTEBC1640319
    Format: 1 online resource (118 pages) , illustrations, tables, photographs
    ISBN: 9783954897094
    Additional Edition: Print version Singh, Bikram Jit. Rsm : a key to optimize machining : multi-response optimization of CNC turning with Al-7020 alloy Hamburg, Germany : Anchor Academic Publishing, c2014 ISBN 9783954892099
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    kobvindex_INTEBC5573403
    Format: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9781788623087
    Content: This book gives you a practical, hands-on understanding of how you can leverage the power of Python and Keras to perform effective deep learning. It presents a unique problem-solution approach to tackle various problems in training different types of neural networks while taking care of the speed and accuracy of these models
    Note: Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keras Installation -- Introduction -- Installing Keras on Ubuntu 16.04 -- Getting ready -- How to do it... -- Installing miniconda -- Installing numpy and scipy -- Installing mkl -- Installing TensorFlow -- Installing Keras -- Using the Theano backend with Keras -- Installing Keras with Jupyter Notebook in a Docker image -- Getting ready -- How to do it... -- Installing the Docker container -- Installing the Docker container with the host volume mapped -- Installing Keras on Ubuntu 16.04 with GPU enabled -- Getting ready -- How to do it... -- Installing cuda -- Installing cudnn -- Installing NVIDIA CUDA profiler tools interface development files -- Installing the TensorFlow GPU version -- Installing Keras -- Chapter 2: Working with Keras Datasets and Models -- Introduction -- CIFAR-10 dataset -- How to do it... -- CIFAR-100 dataset -- How to do it... -- Specifying the label mode -- MNIST dataset -- How to do it... -- Load data from a CSV file -- How to do it... -- Models in Keras - getting started -- Anatomy of a model -- Types of models -- Sequential models -- How to do it... -- Create a Sequential model -- Compile the model -- Train the model -- Evaluate the model -- Predict using the model -- Putting it all together -- Model inspection internals -- Model compilation internals -- Initialize the loss -- Model training -- Output of the sample -- Shared layer models -- Introduction - shared input layer -- How to do it... -- Concatenate function -- Keras functional APIs -- How to do it... -- The output of the example -- Keras functional APIs - linking the layers -- How to do it... -- Model class -- Image classification using Keras functional APIs -- How to do it , Chapter 3: Data Preprocessing, Optimization, and Visualization -- Feature standardization of image data -- Getting ready -- How to do it... -- Initializing ImageDataGenerator -- Sequence padding -- Getting ready -- How to do it... -- Pre-padding with default 0.0 padding -- Post-padding -- Padding with truncation -- Padding with a non-default value -- Model visualization -- Getting ready -- How to do it... -- Code listing -- Optimization -- Common code for samples -- Optimization with stochastic gradient descent -- Getting ready -- How to do it... -- Optimization with Adam -- Getting ready -- How to do it... -- Optimization with AdaDelta -- Getting ready -- How to do it... -- Adadelta optimizer -- Optimization with RMSProp -- Getting ready -- How to do it... -- Chapter 4: Classification Using Different Keras Layers -- Introduction -- Classification for breast cancer -- How to do it... -- Data processing -- Modeling -- Full code listing -- Classification for spam detection -- How to do it... -- Data processing -- Modeling -- Full code listing -- Chapter 5: Implementing Convolutional Neural Networks -- Introduction -- Cervical cancer classification -- Getting ready -- How to do it... -- Data processing -- Modeling -- Predictions -- Digit recognition -- Getting ready -- How to do it... -- Modeling -- Chapter 6: Generative Adversarial Networks -- Introduction -- GAN overview -- Basic GAN -- Getting ready -- How to do it... -- Building a generator -- Building a discriminator -- Initialize the GAN instance -- Training the GAN -- Output plots -- Average metrics of the GAN -- Boundary seeking GAN -- Getting ready -- How to do it... -- Generator -- Discriminator -- Initializing the BGAN class -- Boundary seeking loss -- Train the BGAN -- Output the plots -- Iteration 0 -- Iteration 10000 -- Metrics of the BGAN model -- Plotting the metrics -- DCGAN , Getting ready -- How to do it... -- Generator -- Summary of the generator -- Training the generator -- Discriminator -- Build the discriminator -- Summary of the discriminator -- Compile the discriminator -- Combined model - generator and discriminator -- Train the generator using feedback from a discriminator -- Putting it all together -- The output of the program -- Average metrics of the model -- Chapter 7: Recurrent Neural Networks -- Introduction -- The need for RNNs -- Simple RNNs for time series data -- Getting ready -- Loading the dataset -- How to do it... -- Instantiate a sequential model -- LSTM networks for time series data -- LSTM networks -- LSTM memory example -- Getting ready -- How to do it... -- Encoder -- LSTM configuration and model -- Train the model -- Full code listing -- Time series forecasting with LSTM -- Getting ready -- Load the dataset -- How to do it... -- Instantiate a sequential model -- Observation -- Sequence to sequence learning for the same length output with LSTM -- Getting ready -- How to do it... -- Training data -- Model creation -- Model fit and prediction -- Chapter 8: Natural Language Processing Using Keras Models -- Introduction -- Word embedding -- Getting ready -- How to do it... -- Without embeddings -- With embeddings -- Sentiment analysis -- Getting ready -- How to do it... -- Full code listing -- Chapter 9: Text Summarization Using Keras Models -- Introduction -- Text summarization for reviews -- How to do it... -- Data processing -- Encoder-decoder architecture -- Training -- See also -- Chapter 10: Reinforcement Learning -- Introduction -- The CartPole game with Keras -- How to do it... -- Implementing the DQN agent -- The memory and remember -- The replay function -- The act function -- Hyperparameters for the DQN -- DQN agent class -- Training the agent -- Dueling DQN to play Cartpole -- Getting ready , DQN agent -- init method -- Setting the last layer of the network -- Dueling policy -- Init code base -- BoltzmannQPolicy -- Adjustment during training -- Sequential memory -- How to do it... -- Plotting the training and testing results -- Other Books You May Enjoy -- Index
    Additional Edition: Print version Dua, Rajdeep Keras Deep Learning Cookbook Birmingham : Packt Publishing, Limited,c2018 ISBN 9781788621755
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Bradford, West Yorkshire : Emerald Publishing Limited
    UID:
    kobvindex_INTEBC6423596
    Format: 1 online resource (112 pages)
    Edition: 1st ed.
    ISBN: 9781800711853
    Series Statement: International Journal of Structural Integrity Series v.4
    Note: Cover -- Guest editorial -- Finite element analysis of gradient lattice structure patterns for bone implant design -- Three-dimensional fatigue crack growth simulation of embedded cracks using s-version FEM -- Effect of ballistic impact on Ti6Al-4V titanium alloy and 1070 carbon steel bi-layer armour panel -- The implementation of extrapolation with smoothing technique in solving stiff ordinary differential equations -- Analysis of stress intensity factor for fatigue crack using bootstrap S-version finite element model -- Hardening model of severe plastically deformed AA2024 by high-pressure torsion -- Moisture absorption effects on the mechanical properties of carbon/epoxy composites -- Detection of high stress concentration zone using magnetic flux leakage method -- Effect of chewing and cutting condition for V-shape three-dimensional titanium miniplate for fixation of mandibular angle fractures (MAFs) -- Fatigue damage assessment of reinforced concrete beam using average frequency and rise angle value of acoustic emission signal
    Additional Edition: Print version Singh, Salvinder Damage Mechanisms in Materials and Structures and Numerical Analysis in Engineering Bradford, West Yorkshire : Emerald Publishing Limited,c2020
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Bradford, West Yorkshire : Emerald Publishing Limited
    UID:
    kobvindex_INTEBC6961010
    Format: 1 online resource (201 pages)
    Edition: 1st ed.
    ISBN: 9781803829906
    Series Statement: Journal of Asia Business Studies v.2
    Note: C01_EM-JABS220015_print -- JABS_16_2_Text_V01 -- Guest editorial: Cutting-edge technologies for the development of Asian countries -- Introduction -- Between the technological and social determinisms -- The duality of cutting-edge technologies -- References -- Information technology investment and innovation performance: does investment paradox exist? -- 1. Introduction -- 2. Literature review -- 2.1 Benefits of information technology investment -- 2.2 Innovation performance in firms -- 3. Theoretical framework and hypotheses development -- 3.1 Research framework -- 3.2 Research hypotheses -- 4. Data and method -- 4.1 Data -- 4.2 Method -- 5. Results -- 5.1 Results for the full sample -- 5.2 Results for the manufacturing industry sample -- 5.3 Results for the software industry sample -- 6. Conclusions -- 7. Limitations and future research -- References -- Enabling organizational use of artificial intelligence: an employee perspective -- Introduction -- 2. Theoretical background -- 2.1 Theoretical framework -- 2.2 Conceptual framework and hypotheses development -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3. Research methodology -- 3.1 Sample and data collection -- 3.2 Methodological information and model building -- 4. Data analysis -- 4.1 Common method bias, multicollinearity -- 4.2 Exploratory factor analysis -- 4.3 Measurement model: reliability and validity -- 5. Results -- 5.1 Structural model results , 2.3 Artificial intelligence and narrow artificial intelligence in governments and defense sector -- 2.4 Artificial intelligence/narrow artificial intelligence, resource-based view and resources in defense sector -- 3. Research methodology and context -- 3.1 Context of the study: artificial intelligence in the Lebanese Armed Forces -- 4. Analysis and discussion of results -- 4.1 What are main challenges in the Lebanese Armed Forces from resource perspective? -- 4.2 Are there any signs of isomorphism in the Lebanese Armed Forces? -- 4.3 What structure of narrow artificiall intelligence applications should the Lebanese Armed Forces adopt or adapt to avoid isomorphism? -- 5. Conclusion and recommendations -- References -- FinTech innovation and knowledge flows in Hong Kong's financial sector: a social network analysis approach -- Introduction -- Technological innovation and patents -- A social network analysis approach to patents and knowledge flows -- Methods -- Data collection -- Data analysis -- Dependent variables -- Independent variables -- Control variables -- Results -- Discussion -- References -- Smart technologies challenges and issues in social inclusion - case of disabled youthin a developing country -- 1. Introduction -- 2. Literature review -- 2.1 Social inclusion and capability theory -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 2.2 Role of smart technologies in social inclusion of disabled young people -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 2.3 Background of disabled people in Lebanon -- 3. Methodology -- 4. Results and discussion -- 4.1 Acquired capabilities -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed , 5.2 Mediation analysis results -- 5.3 Results discussion -- 6. Contributions, limitations and conclusion -- 6.1 Theoretical contributions -- 6.2 Managerial implications -- 6.3 Limitations and future research -- 6.4 Conclusion -- References -- Artificial intelligence impact on banks clients and employees in an Asian developing country -- 1. Introduction and context of the study -- 1.1 Introduction -- 2. Research statement -- 3. Literature review -- 3.1 Theories of consumer behavior in the banking system -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3.2 Theories of employability in the banking system -- 3.3 Theory of financial innovation -- 3.4 Theoretical framework -- 4. Research methodology -- 4.1 Approach -- 4.2 Data collection -- 4.3 Methods of analysis -- 5 Results and findings -- 5.1 Schematic 1 -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Schematic 2 -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 6. Conclusion and implications -- References -- Artificial intelligence in the defense sector: an RBV and isomorphism perspectives to the case of the Lebanese Armed Forces -- 1. Introduction -- 2. Literature review -- 2.1 Resource based view -- 2.2 Neo-institutional isomorphism in government and defense , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 3.3 Case 2: Company Y -- 3.4 Case 3: Company Z -- 4. Findings and discussions -- 4.1 Potential benefits of adopting disruptive technologies -- 4.2 Integration of Lean Six Sigma and digital technologies for process improvements -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- folink1 -- fivelink1 -- fivelink2 -- fivelink3 -- 5. Conclusion -- 6. Research limitations and future research directions -- References -- Unbanked to banked: reintermediation role of banks in e-government services for financial inclusion in an Indian context -- Introduction -- Literature review -- Role of financial institution in reintermediation: premises for financial inclusion through e-government services -- Demand side factors: empowering citizens through e-government intermediation -- Supply side factors: role of governments in financial inclusion -- Institution: intermediaries as facilitators in financial inclusion -- Innovation: a key to move from transactional to collaborative financial inclusion -- Framework for reintermediation: role of financial institutions -- Research methodology -- Preliminary research: general morphological analysis of financial inclusiveness -- Background of financial institutions chosen as sample for in-depth interviews -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 4.2 Challenges -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 5. Conclusion and future research perspectives -- References -- Understanding artificial intelligence: insights on China -- 1. Introduction -- 2. Literature review -- 3. Research methodology -- 4. Qualitative data analysis: processes and findings -- 4.1 Data collection and analysis -- 4.2 Theoretical framework -- 4.3 Artificial intelligence in China -- 4.4 Artificial intelligence in China: emerging results -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed -- 5. Discussion and conclusions -- References -- Digital transformations and supply chain management: a Lean Six Sigma perspective -- 1. Introduction -- 2. Literature review -- 2.1 Significance of digital transformation in the supply chain -- 2.2 Leveraging digital transformation for supply chain process improvements using Lean Six Sigma -- 2.3 Integrating Lean Six Sigma with data science in supply chain management -- 3. Research design and method -- 3.1 Case-study research -- 3.2 Case 1: Company X. , Undefined namespace prefix xmlXPathCompOpEval: parameter error xmlXPathEval: evaluation failed
    Additional Edition: Print version Singh, Sanjay Cutting-Edge Technologies for the Development of Asian Countries Bradford, West Yorkshire : Emerald Publishing Limited,c2022
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages