Browse Results

Showing 23,351 through 23,375 of 53,657 results

Hibernate Recipes

by Joseph Ottinger Srinivas Guruzu Gary Mak

Hibernate Recipes, Second Edition contains a collection of code recipes and templates for learning and building Hibernate solutions for you and your clients, including how to work with the Spring Framework and the JPA. This book is your pragmatic day-to-day reference and guide for doing all things involving Hibernate. There are many books focused on learning Hibernate, but this book takes you further and shows how you can apply it practically in your daily work. Hibernate Recipes, Second Edition is a must have book for your library. Hibernate 4. x continues to be the most popular out-of-the-box, open source framework solution for Java persistence and data/database accessibility techniques and patterns and it works well with the most popular open source enterprise Java framework of all, the Spring Framework. Hibernate is used for e-commerce-based web applications as well as heavy-duty transactional systems for the enterprise.

Hibernate Search by Example

by Steve Perkins

A step-by-step guide for getting started with Hibernate Search, employing a practical example application that will make readers quickly learn and use the excellent search capabilities that the Hibernate Search tool offers.This book is for any Java developer who wants to quickly and easily add feature-rich search capabilities to his/her custom applications. It is assumed that readers will have experience in Java development, and understand some basic relational database concepts. However, while core Hibernate experience is very helpful, it is not necessarily required.

Hibernate Search in Action

by Emmanuel Bernard John Griffin

Enterprise and web applications require full-featured, "Google-quality" searchcapabilities, but such features are notoriously difficult to implement and maintain.Hibernate Search builds on the Lucene feature set and offers an easyto-implement interface that integrates seamlessly with Hibernate-the leadingdata persistence solution for Java applications.Hibernate Search in Action introduces both the principles of enterprise searchand the implementation details a Java developer will need to use HibernateSearch effectively. This book blends the insights of the Hibernate Search leaddeveloper with the practical techniques required to index and manipulate data,assemble and execute search queries, and create smart filters for better searchresults. Along the way, the reader masters performance-boosting concepts likeusing Hibernate Search in a clustered environment and integrating with thefeatures already in your applications.This book assumes you're a competent Java developer with some experienceusing Hibernate and Lucene. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Hidden and Devalued Feminized Labour in the Digital Humanities: On the Index Thomisticus Project 1954-67 (Digital Research in the Arts and Humanities)

by Julianne Nyhan

Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus–a preeminent project of the incunabular digital humanities–and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts–from the history of concordance making, to the feminization of the office and humanities computing–this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.

Hidden Biometrics: When Biometric Security Meets Biomedical Engineering (Series in BioEngineering)

by Amine Nait-Ali

This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific imaging techniques or sensors, commonly employed in the biomedical engineering field. As such, the book connects two fields, namely biometric security and biomedical engineering.The book is suitable for advanced graduate and postgraduate students, engineers and researchers, especially in Signal and Image Processing, Biometrics, and Biomedical Engineering.

The Hidden History of Code-Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions

by Sinclair McKay

A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament, too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In The Hidden History of Code Breaking, Sinclair McKay explores these uncrackable codes, secret ciphers, and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, we will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created.

Hidden in the Chest (The Unofficial Minecrafters Academy Series #5)

by Winter Morgan

Steve has joined the staff of Minecrafters Academy as a guest teacher—but luck and then disaster strike in his first farming class, when he digs a hole that unexpectedly reveals a hidden chest full of treasure. At first the students are thrilled, but strange occurrences seem to follow those who discovered the chest, and an unending storm plagues the school. With a steady rain soaking the campus, Minecrafters Academy is vulnerable to nonstop attacks from zombies and skeletons. With the help of Cayla, a new student who claims to know more about the legendary chest, Steve and the students of the Academy look for a way to stop the storm and save their campus. Their journey will take them far from the school, to peaceful Mushroom Island. But what they find there will put them all in even greater danger . . .Nothing is what it appears and no one can truly be trusted in this mysterious fifth installment in the Unofficial Minecrafters Academy series.

Hidden in White Sight: How AI Empowers and Deepens Systemic Racism

by Calvin D. Lawrence

Artificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true? Given that the policing and judicial systems can display human bias, this book explores how the technology they use can also reflect these prejudices. From healthcare services to social scoring in exams, to applying for and getting loans, AI outcomes often restrict those most in need of these services. Through personal stories from an esteemed Black Data Scientist and AI expert, this book attempts to demystify the algorithmic black box. AI pervades all aspects of modern society and affects everyone within it, yet its internal biases are rarely confronted. This book advises readers on what they can do to fight against it, including the introduction of a proposed AI Bill of Rights, whilst also providing specific recommendations for AI developers and technologists. https://hiddeninwhitesight.com/

Hidden Markov Models: Theory and Implementation using MATLAB®

by José Boaventura-Cunha João Coelho Tatiana Pinho

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models’ concepts from the domain of formal mathematics into computer codes using MATLAB®. The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB®. This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. <p><P>Key Selling Points: <li>Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory <li>Covers the analysis of both continuous and discrete Markov chains <li>Discusses the translation of HMM concepts from the realm of formal mathematics into computer code <li>Offers many examples to supplement mathematical notation when explaining new concepts

Hidden Markov Models and Applications (Unsupervised and Semi-Supervised Learning)

by Nizar Bouguila Wentao Fan Manar Amayri

This book focuses on recent advances, approaches, theories, and applications related Hidden Markov Models (HMMs). In particular, the book presents recent inference frameworks and applications that consider HMMs. The authors discuss challenging problems that exist when considering HMMs for a specific task or application, such as estimation or selection, etc. The goal of this volume is to summarize the recent advances and modern approaches related to these problems. The book also reports advances on classic but difficult problems in HMMs such as inference and feature selection and describes real-world applications of HMMs from several domains. The book pertains to researchers and graduate students, who will gain a clear view of recent developments related to HMMs and their applications.

The Hidden Power of F*cking Up

by The Try Guys Keith Habersberger Zach Kornfeld Eugene Lee Yang

#1 NEW YORK TIMES BESTSELLERThe Try Guys deliver their first book—an inspirational self-improvement guide that teaches you that the path to success is littered with humiliating detours, embarrassing mistakes, and unexpected failures.To be our best selves, we must become secure in our insecurities. In The Hidden Power of F*cking Up, The Try Guys - Keith, Ned, Zach, and Eugene - reveal their philosophy of trying: how to fully embrace fear, foolishness, and embarrassment in an effort to understand how we all get paralyzed by a fear of failure. They’ll share how four shy, nerdy kids have dealt with their most poignant life struggles by attacking them head-on and reveal their - ahem - sure-fail strategies for achieving success.But they’re not just here to talk; they’re actually going to put their advice to work. To demonstrate their unique self-improvement formula, they’ll each personally confront their deepest insecurities. A die-hard meat-lover goes vegan for the first time. A straight-laced father transforms into a fashionista. A perpetually single sidekick becomes the romantic lead. A child of divorce finally grows more intimate with his family. Through their insightful, emotional journeys and surprising, hilarious anecdotes, they’ll help you overcome your own self-doubt to become the best, most f*cked up version of yourself you can be!

The Hidden Role of Software in Educational Research: Policy to Practice (Routledge Research in Education #143)

by Tom Liam Lynch

Educational research often discounts the uniqueness and ubiquity of software and the hidden political, economic and epistemological ways it impacts teaching and learning in K-12 settings. Drawing on theories and methodologies from English education, critical discourse analysis, multimodal semiotics and digital humanities, this volume exposes the problems of technology in schools and refocuses the conversation on software. This shifting of focus invites more nuanced questions concerning the role of software in school reform and classroom instruction, and takes a critical stance on software’s role in education. This volume explores the ontology of software and the ways it is construed within educational policy discussions. It is beneficial to schools, companies, policy makers and practitioners seeking a more theoretical framework for technology in education.

Hiding Data - Selected Topics

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of "oblivious transfer" is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated. This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights. Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph. D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.

Hiding from the Internet: Eliminating Personal Online Information

by Michael Bazzell

The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers.

Hierarchical Feature Selection for Knowledge Discovery: Application of Data Mining to the Biology of Ageing (Advanced Information and Knowledge Processing)

by Cen Wan

This book is the first work that systematically describes the procedure of data mining and knowledge discovery on Bioinformatics databases by using the state-of-the-art hierarchical feature selection algorithms. The novelties of this book are three-fold. To begin with, this book discusses the hierarchical feature selection in depth, which is generally a novel research area in Data Mining/Machine Learning. Seven different state-of-the-art hierarchical feature selection algorithms are discussed and evaluated by working with four types of interpretable classification algorithms (i.e. three types of Bayesian network classification algorithms and the k-nearest neighbours classification algorithm). Moreover, this book discusses the application of those hierarchical feature selection algorithms on the well-known Gene Ontology database, where the entries (terms) are hierarchically structured. Gene Ontology database that unifies the representations of gene and gene products annotation provides the resource for mining valuable knowledge about certain biological research topics, such as the Biology of Ageing. Furthermore, this book discusses the mined biological patterns by the hierarchical feature selection algorithms relevant to the ageing-associated genes. Those patterns reveal the potential ageing-associated factors that inspire future research directions for the Biology of Ageing research.

Hierarchical Modular Granular Neural Networks with Fuzzy Aggregation

by Daniela Sanchez Patricia Melin

In this book, anew method for hybrid intelligent systems is proposed. The proposed method isbased on a granular computing approach applied in two levels. The techniquesused and combined in the proposed method are modular neural networks (MNNs)with a Granular Computing (GrC) approach, thus resulting in a new concept ofMNNs; modular granular neural networks (MGNNs). In addition fuzzy logic (FL)and hierarchical genetic algorithms (HGAs) are techniques used in this researchwork to improve results. These techniques are chosen because in other workshave demonstrated to be a good option, and in the case of MNNs and HGAs, thesetechniques allow to improve the results obtained than with their conventionalversions; respectively artificial neural networks and genetic algorithms.

Hierarchical Topology Control for Wireless Networks: Theory, Algorithms, and Simulation

by Jiguo Yu Cheng Xiuzhen Jiang Honglu Dongxiao Yu

First Published in 2018. Routledge is an imprint of Taylor & Francis, an Informa company.

Higgs Boson Decays into a Pair of Bottom Quarks: Observation with the ATLAS Detector and Machine Learning Applications (Springer Theses)

by Cecilia Tosciri

The discovery in 2012 of the Higgs boson at the Large Hadron Collider (LHC) represents a milestone for the Standard Model (SM) of particle physics. Most of the SM Higgs production and decay rates have been measured at the LHC with increased precision. However, despite its experimental success, the SM is known to be only an effective manifestation of a more fundamental description of nature. The scientific research at the LHC is strongly focused on extending the SM by searching, directly or indirectly, for indications of New Physics. The extensive physics program requires increasingly advanced computational and algorithmic techniques. In the last decades, Machine Learning (ML) methods have made a prominent appearance in the field of particle physics, and promise to address many challenges faced by the LHC.This thesis presents the analysis that led to the observation of the SM Higgs boson decay into pairs of bottom quarks. The analysis exploits the production of a Higgs boson associated with a vector boson whose signatures enable efficient triggering and powerful background reduction. The main strategy to maximise the signal sensitivity is based on a multivariate approach. The analysis is performed on a dataset corresponding to a luminosity of 79.8/fb collected by the ATLAS experiment during Run-2 at a centre-of-mass energy of 13 TeV. An excess of events over the expected background is found with an observed (expected) significance of 4.9 (4.3) standard deviation. A combination with results from other \Hbb searches provides an observed (expected) significance of 5.4 (5.5). The corresponding ratio between the signal yield and the SM expectation is 1.01 +- 0.12 (stat.)+ 0.16-0.15(syst.).The 'observation' analysis was further extended to provide a finer interpretation of the V H(H → bb) signal measurement. The cross sections for the VH production times the H → bb branching ratio have been measured in exclusive regions of phase space. These measurements are used to search for possible deviations from the SM with an effective field theory approach, based on anomalous couplings of the Higgs boson. The results of the cross-section measurements, as well as the constraining of the operators that affect the couplings of the Higgs boson to the vector boson and the bottom quarks, have been documented and discussed in this thesis. This thesis also describes a novel technique for the fast simulation of the forward calorimeter response, based on similarity search methods. Such techniques constitute a branch of ML and include clustering and indexing methods that enable quick and efficient searches for vectors similar to each other. The new simulation approach provides optimal results in terms of detector resolution response and reduces the computational requirements of a standard particles simulation.

High Accuracy Surface Modeling Method: The Robustness

by Na Zhao TianXiang Yue

This book focuses on the robustness analysis of high accuracy surface modeling method (HASM) to yield good performance of it. Understanding the sensitivity and uncertainty is important in model applications. The book aims to advance an integral framework for assessing model error that can demonstrate robustness across sets of possible controls, variable definitions, standard error, algorithm structure, and functional forms. It is an essential reference to the most promising numerical models. In areas where there is less certainty about models, but also high expectations of transparency, robustness analysis should aspire to be as broad as possible. This book also contains a chapter at the end featuring applications in climate simulation illustrating different implementations of HASM in surface modeling. The book is helpful for people involved in geographical information science, ecological informatics, geography, earth observation, and planetary surface modeling.

High Anxieties: Cultural Studies in Addiction

by Janet Farrell Brodie Marc Redfield

The essays collected in this volume describes connections between our notions of "addiction" and "culture" that go far beyond the commonplace that addiction, like any representable entity or event, is a phenomenon with a cultural side to it.

High Availability MySQL Cookbook

by Alex Davies

This book uses the approach of a cookbook. Each recipe provides the reader with easy step-by-step descriptions of the actions necessary to accomplish a specific task. It is designed to present what often appear as extremely complicated techniques as a series of simple-to-follow recipes, allowing readers to achieve high uptimes on their MySQL servers. This book is targeted at system administrators or database administrators who have basic familiarity with Linux, the shell, and MySQL. The typical user will be able to get MySQL installed and working, but needs practical guidance to make it highly available.

High Availability Per Lo Stack Lamp

by Eugenia Franzoni Jason Cannon

Uno dei modi più comuni di rendere disponibili le applicazioni web è attraverso lo stack LAMP. LAMP è un acronimo che sta per Linux, Apache, MySQL e PHP; in questo ambiente, Linux è il sistema operativo, Apache il server web, MySQL il server di database e PHP il linguaggio di programmazione. Questa architettura può essere utilizzata per servire applicazioni open source o anche app personalizzate. Siti web famosissimi come Facebook, Wikipedia e Yahoo usano questo ambiente per servire le loro applicazioni a milioni di utenti in tutto il mondo, e anche moltissime applicazioni open source, quali WordPress, Drupal, Joomla! MediaWiki e SugarCRM, si appoggiano allo stack LAMP. Che stiate implementando o facendo da piattaforma ad un'applicazione personalizzata, o che stiate usando una soluzione open source, dovreste usare un'architettura che massimizzi il tempo di uptime dell'applicazione, elimini i single point of failure, permetta di scalare senza tempo di fermo, e sia relativamente semplice da implementare e supportare. È meglio prendersi il tempo all'inizio per tenere in considerazione i requisiti e gli obiettivi a lungo termine del servizio che state implementando, invece di prendere decisioni sull'architettura durante un momento di emergenza come può essere un potenziale aumento del traffico o un'interruzione dell'elettricità. Fare queste cose durante un'emergenza non è il modo migliore di gestirle. Ogni progetto può avere requisiti diversi, ma in genere ci sono solo alcuni punti importanti da considerare di sicuro: la ridondanza, la scalabilità, le prestazioni e la gestione. La ridondanza è come si riesca a reagire ad eventuali guasti, la scalabilità è la possibilità di gestire una base di utenti più grande o più piccola, le prestazioni implicano assicurarsi che l'esperienza di ciascun utente sia ad un livello almeno accettabile. Avere un servizio ridondante, scalabile e ad alte prestazioni non serve a niente se non si riesce a gest

High-Bandwidth Memory Interface

by Chulwoo Kim Junyoung Song Hyun-Woo Lee

This book provides an overview of recent advances in memory interface design at both the architecture and circuit levels. Coverage includes signal integrity and testing, TSV interface, high-speed serial interface including equalization, ODT, pre-emphasis, wide I/O interface including crosstalk, skew cancellation, and clock generation and distribution. Trends for further bandwidth enhancement are also covered.

High-Dimensional and Low-Quality Visual Information Processing

by Yue Deng

This thesis primarily focuses on how to carry out intelligent sensing and understand the high-dimensional and low-quality visual information. After exploring the inherent structures of the visual data, it proposes a number of computational models covering an extensive range of mathematical topics, including compressive sensing, graph theory, probabilistic learning and information theory. These computational models are also applied to address a number of real-world problems including biometric recognition, stereo signal reconstruction, natural scene parsing, and SAR image processing.

High-Dimensional Covariance Estimation

by Mohsen Pourahmadi

Methods for estimating sparse and large covariance matricesCovariance and correlation matrices play fundamental roles in every aspect of the analysis of multivariate data collected from a variety of fields including business and economics, health care, engineering, and environmental and physical sciences. High-Dimensional Covariance Estimation provides accessible and comprehensive coverage of the classical and modern approaches for estimating covariance matrices as well as their applications to the rapidly developing areas lying at the intersection of statistics and machine learning.Recently, the classical sample covariance methodologies have been modified and improved upon to meet the needs of statisticians and researchers dealing with large correlated datasets. High-Dimensional Covariance Estimation focuses on the methodologies based on shrinkage, thresholding, and penalized likelihood with applications to Gaussian graphical models, prediction, and mean-variance portfolio management. The book relies heavily on regression-based ideas and interpretations to connect and unify many existing methods and algorithms for the task.High-Dimensional Covariance Estimation features chapters on:Data, Sparsity, and RegularizationRegularizing the EigenstructureBanding, Tapering, and ThresholdingCovariance MatricesSparse Gaussian Graphical ModelsMultivariate RegressionThe book is an ideal resource for researchers in statistics, mathematics, business and economics, computer sciences, and engineering, as well as a useful text or supplement for graduate-level courses in multivariate analysis, covariance estimation, statistical learning, and high-dimensional data analysis.

Refine Search

Showing 23,351 through 23,375 of 53,657 results