Browse Results

Showing 27,151 through 27,175 of 63,684 results

Hi-C Data Analysis: Methods and Protocols (Methods in Molecular Biology #2301)

by Silvio Bicciato Francesco Ferrari

This volume details a comprehensive set of methods and tools for Hi-C data processing, analysis, and interpretation. Chapters cover applications of Hi-C to address a variety of biological problems, with a specific focus on state-of-the-art computational procedures adopted for the data analysis. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls.Authoritative and cutting-edge, Hi-C Data Analysis: Methods and Protocols aims to help computational and molecular biologists working in the field of chromatin 3D architecture and transcription regulation.

Hibernate Recipes

by Joseph Ottinger Srinivas Guruzu Gary Mak

Hibernate Recipes, Second Edition contains a collection of code recipes and templates for learning and building Hibernate solutions for you and your clients, including how to work with the Spring Framework and the JPA. This book is your pragmatic day-to-day reference and guide for doing all things involving Hibernate. There are many books focused on learning Hibernate, but this book takes you further and shows how you can apply it practically in your daily work. Hibernate Recipes, Second Edition is a must have book for your library. Hibernate 4. x continues to be the most popular out-of-the-box, open source framework solution for Java persistence and data/database accessibility techniques and patterns and it works well with the most popular open source enterprise Java framework of all, the Spring Framework. Hibernate is used for e-commerce-based web applications as well as heavy-duty transactional systems for the enterprise.

Hibernate Search by Example

by Steve Perkins

A step-by-step guide for getting started with Hibernate Search, employing a practical example application that will make readers quickly learn and use the excellent search capabilities that the Hibernate Search tool offers.This book is for any Java developer who wants to quickly and easily add feature-rich search capabilities to his/her custom applications. It is assumed that readers will have experience in Java development, and understand some basic relational database concepts. However, while core Hibernate experience is very helpful, it is not necessarily required.

Hibernate Search in Action

by John Griffin Emmanuel Bernard

Enterprise and web applications require full-featured, "Google-quality" searchcapabilities, but such features are notoriously difficult to implement and maintain.Hibernate Search builds on the Lucene feature set and offers an easyto-implement interface that integrates seamlessly with Hibernate-the leadingdata persistence solution for Java applications.Hibernate Search in Action introduces both the principles of enterprise searchand the implementation details a Java developer will need to use HibernateSearch effectively. This book blends the insights of the Hibernate Search leaddeveloper with the practical techniques required to index and manipulate data,assemble and execute search queries, and create smart filters for better searchresults. Along the way, the reader masters performance-boosting concepts likeusing Hibernate Search in a clustered environment and integrating with thefeatures already in your applications.This book assumes you're a competent Java developer with some experienceusing Hibernate and Lucene. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Hibernate: A Developer's Notebook

by James Elliott

Hibernate: A Developer's Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don't even need to know the database is there, and you can change from one database to another simply by changing a few statements in a configuration file. If you've needed to add a database backend to your application, don't put it off. It's much more fun than it used to be, and Hibernate: A Developer's Notebook shows you why.

Hidden Biometrics: When Biometric Security Meets Biomedical Engineering (Series in BioEngineering)

by Amine Nait-Ali

This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific imaging techniques or sensors, commonly employed in the biomedical engineering field. As such, the book connects two fields, namely biometric security and biomedical engineering.The book is suitable for advanced graduate and postgraduate students, engineers and researchers, especially in Signal and Image Processing, Biometrics, and Biomedical Engineering.

Hidden Markov Models and Applications (Unsupervised and Semi-Supervised Learning)

by Nizar Bouguila Wentao Fan Manar Amayri

This book focuses on recent advances, approaches, theories, and applications related Hidden Markov Models (HMMs). In particular, the book presents recent inference frameworks and applications that consider HMMs. The authors discuss challenging problems that exist when considering HMMs for a specific task or application, such as estimation or selection, etc. The goal of this volume is to summarize the recent advances and modern approaches related to these problems. The book also reports advances on classic but difficult problems in HMMs such as inference and feature selection and describes real-world applications of HMMs from several domains. The book pertains to researchers and graduate students, who will gain a clear view of recent developments related to HMMs and their applications.

Hidden Markov Models: Theory and Implementation using MATLAB®

by José Boaventura-Cunha João Coelho Tatiana Pinho

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models’ concepts from the domain of formal mathematics into computer codes using MATLAB®. The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB®. This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. <p><P>Key Selling Points: <li>Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory <li>Covers the analysis of both continuous and discrete Markov chains <li>Discusses the translation of HMM concepts from the realm of formal mathematics into computer code <li>Offers many examples to supplement mathematical notation when explaining new concepts

Hidden and Devalued Feminized Labour in the Digital Humanities: On the Index Thomisticus Project 1954-67 (Digital Research in the Arts and Humanities)

by Julianne Nyhan

Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus–a preeminent project of the incunabular digital humanities–and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts–from the history of concordance making, to the feminization of the office and humanities computing–this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.

Hidden in White Sight: How AI Empowers and Deepens Systemic Racism

by Calvin D. Lawrence

Artificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true? Given that the policing and judicial systems can display human bias, this book explores how the technology they use can also reflect these prejudices. From healthcare services to social scoring in exams, to applying for and getting loans, AI outcomes often restrict those most in need of these services. Through personal stories from an esteemed Black Data Scientist and AI expert, this book attempts to demystify the algorithmic black box. AI pervades all aspects of modern society and affects everyone within it, yet its internal biases are rarely confronted. This book advises readers on what they can do to fight against it, including the introduction of a proposed AI Bill of Rights, whilst also providing specific recommendations for AI developers and technologists. https://hiddeninwhitesight.com/

Hidden in the Chest (The Unofficial Minecrafters Academy Series #5)

by Winter Morgan

Steve has joined the staff of Minecrafters Academy as a guest teacher—but luck and then disaster strike in his first farming class, when he digs a hole that unexpectedly reveals a hidden chest full of treasure. At first the students are thrilled, but strange occurrences seem to follow those who discovered the chest, and an unending storm plagues the school. With a steady rain soaking the campus, Minecrafters Academy is vulnerable to nonstop attacks from zombies and skeletons. With the help of Cayla, a new student who claims to know more about the legendary chest, Steve and the students of the Academy look for a way to stop the storm and save their campus. Their journey will take them far from the school, to peaceful Mushroom Island. But what they find there will put them all in even greater danger . . .Nothing is what it appears and no one can truly be trusted in this mysterious fifth installment in the Unofficial Minecrafters Academy series.

Hiding Data - Selected Topics

by Ingo Althöfer Rudolf Ahlswedealexander Ahlswede Christian Deppe Ulrich Tamm

Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of "oblivious transfer" is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated. This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights. Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph. D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.

Hiding from the Internet: Eliminating Personal Online Information

by Michael Bazzell

The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers.

Hierarchical Archimedean Copulas (SpringerBriefs in Applied Statistics and Econometrics)

by Ostap Okhrin Jan Górecki

This book offers a thorough understanding of Hierarchical Archimedean Copulas (HACs) and their practical applications. It covers the basics of copulas, explores the Archimedean family, and delves into the specifics of HACs, including their fundamental properties. The text also addresses sampling algorithms, HAC parameter estimation, and structure, and highlights temporal models with applications in finance and economics. The final chapter introduces R, MATLAB, and Octave toolboxes for copula modeling, enabling students, researchers, data scientists, and practitioners to model complex dependence structures and make well-informed decisions across various domains.

Hierarchical Feature Selection for Knowledge Discovery: Application of Data Mining to the Biology of Ageing (Advanced Information and Knowledge Processing)

by Cen Wan

This book is the first work that systematically describes the procedure of data mining and knowledge discovery on Bioinformatics databases by using the state-of-the-art hierarchical feature selection algorithms. The novelties of this book are three-fold. To begin with, this book discusses the hierarchical feature selection in depth, which is generally a novel research area in Data Mining/Machine Learning. Seven different state-of-the-art hierarchical feature selection algorithms are discussed and evaluated by working with four types of interpretable classification algorithms (i.e. three types of Bayesian network classification algorithms and the k-nearest neighbours classification algorithm). Moreover, this book discusses the application of those hierarchical feature selection algorithms on the well-known Gene Ontology database, where the entries (terms) are hierarchically structured. Gene Ontology database that unifies the representations of gene and gene products annotation provides the resource for mining valuable knowledge about certain biological research topics, such as the Biology of Ageing. Furthermore, this book discusses the mined biological patterns by the hierarchical feature selection algorithms relevant to the ageing-associated genes. Those patterns reveal the potential ageing-associated factors that inspire future research directions for the Biology of Ageing research.

Hierarchical Modular Granular Neural Networks with Fuzzy Aggregation

by Patricia Melin Daniela Sanchez

In this book, anew method for hybrid intelligent systems is proposed. The proposed method isbased on a granular computing approach applied in two levels. The techniquesused and combined in the proposed method are modular neural networks (MNNs)with a Granular Computing (GrC) approach, thus resulting in a new concept ofMNNs; modular granular neural networks (MGNNs). In addition fuzzy logic (FL)and hierarchical genetic algorithms (HGAs) are techniques used in this researchwork to improve results. These techniques are chosen because in other workshave demonstrated to be a good option, and in the case of MNNs and HGAs, thesetechniques allow to improve the results obtained than with their conventionalversions; respectively artificial neural networks and genetic algorithms.

Hierarchical Topology Control for Wireless Networks: Theory, Algorithms, and Simulation

by Jiguo Yu Cheng Xiuzhen Jiang Honglu Dongxiao Yu

First Published in 2018. Routledge is an imprint of Taylor & Francis, an Informa company.

Higgs Boson Decays into a Pair of Bottom Quarks: Observation with the ATLAS Detector and Machine Learning Applications (Springer Theses)

by Cecilia Tosciri

The discovery in 2012 of the Higgs boson at the Large Hadron Collider (LHC) represents a milestone for the Standard Model (SM) of particle physics. Most of the SM Higgs production and decay rates have been measured at the LHC with increased precision. However, despite its experimental success, the SM is known to be only an effective manifestation of a more fundamental description of nature. The scientific research at the LHC is strongly focused on extending the SM by searching, directly or indirectly, for indications of New Physics. The extensive physics program requires increasingly advanced computational and algorithmic techniques. In the last decades, Machine Learning (ML) methods have made a prominent appearance in the field of particle physics, and promise to address many challenges faced by the LHC.This thesis presents the analysis that led to the observation of the SM Higgs boson decay into pairs of bottom quarks. The analysis exploits the production of a Higgs boson associated with a vector boson whose signatures enable efficient triggering and powerful background reduction. The main strategy to maximise the signal sensitivity is based on a multivariate approach. The analysis is performed on a dataset corresponding to a luminosity of 79.8/fb collected by the ATLAS experiment during Run-2 at a centre-of-mass energy of 13 TeV. An excess of events over the expected background is found with an observed (expected) significance of 4.9 (4.3) standard deviation. A combination with results from other \Hbb searches provides an observed (expected) significance of 5.4 (5.5). The corresponding ratio between the signal yield and the SM expectation is 1.01 +- 0.12 (stat.)+ 0.16-0.15(syst.).The 'observation' analysis was further extended to provide a finer interpretation of the V H(H → bb) signal measurement. The cross sections for the VH production times the H → bb branching ratio have been measured in exclusive regions of phase space. These measurements are used to search for possible deviations from the SM with an effective field theory approach, based on anomalous couplings of the Higgs boson. The results of the cross-section measurements, as well as the constraining of the operators that affect the couplings of the Higgs boson to the vector boson and the bottom quarks, have been documented and discussed in this thesis. This thesis also describes a novel technique for the fast simulation of the forward calorimeter response, based on similarity search methods. Such techniques constitute a branch of ML and include clustering and indexing methods that enable quick and efficient searches for vectors similar to each other. The new simulation approach provides optimal results in terms of detector resolution response and reduces the computational requirements of a standard particles simulation.

High Accuracy Surface Modeling Method: The Robustness

by TianXiang Yue Na Zhao

This book focuses on the robustness analysis of high accuracy surface modeling method (HASM) to yield good performance of it. Understanding the sensitivity and uncertainty is important in model applications. The book aims to advance an integral framework for assessing model error that can demonstrate robustness across sets of possible controls, variable definitions, standard error, algorithm structure, and functional forms. It is an essential reference to the most promising numerical models. In areas where there is less certainty about models, but also high expectations of transparency, robustness analysis should aspire to be as broad as possible. This book also contains a chapter at the end featuring applications in climate simulation illustrating different implementations of HASM in surface modeling. The book is helpful for people involved in geographical information science, ecological informatics, geography, earth observation, and planetary surface modeling.

High Anxieties: Cultural Studies in Addiction

by Janet Farrell Brodie Marc Redfield

The essays collected in this volume describes connections between our notions of "addiction" and "culture" that go far beyond the commonplace that addiction, like any representable entity or event, is a phenomenon with a cultural side to it.

High Availability IT Services

by Terry Critchley

This book starts with the basic premise that a service is comprised of the 3Ps-products, processes, and people. Moreover, these entities and their sub-entities interlink to support the services that end users require to run and support a business. This widens the scope of any availability design far beyond hardware and software. It also increases t

High Availability MySQL Cookbook

by Alex Davies

This book uses the approach of a cookbook. Each recipe provides the reader with easy step-by-step descriptions of the actions necessary to accomplish a specific task. It is designed to present what often appear as extremely complicated techniques as a series of simple-to-follow recipes, allowing readers to achieve high uptimes on their MySQL servers. This book is targeted at system administrators or database administrators who have basic familiarity with Linux, the shell, and MySQL. The typical user will be able to get MySQL installed and working, but needs practical guidance to make it highly available.

High Availability Per Lo Stack Lamp

by Eugenia Franzoni Jason Cannon

Uno dei modi più comuni di rendere disponibili le applicazioni web è attraverso lo stack LAMP. LAMP è un acronimo che sta per Linux, Apache, MySQL e PHP; in questo ambiente, Linux è il sistema operativo, Apache il server web, MySQL il server di database e PHP il linguaggio di programmazione. Questa architettura può essere utilizzata per servire applicazioni open source o anche app personalizzate. Siti web famosissimi come Facebook, Wikipedia e Yahoo usano questo ambiente per servire le loro applicazioni a milioni di utenti in tutto il mondo, e anche moltissime applicazioni open source, quali WordPress, Drupal, Joomla! MediaWiki e SugarCRM, si appoggiano allo stack LAMP. Che stiate implementando o facendo da piattaforma ad un'applicazione personalizzata, o che stiate usando una soluzione open source, dovreste usare un'architettura che massimizzi il tempo di uptime dell'applicazione, elimini i single point of failure, permetta di scalare senza tempo di fermo, e sia relativamente semplice da implementare e supportare. È meglio prendersi il tempo all'inizio per tenere in considerazione i requisiti e gli obiettivi a lungo termine del servizio che state implementando, invece di prendere decisioni sull'architettura durante un momento di emergenza come può essere un potenziale aumento del traffico o un'interruzione dell'elettricità. Fare queste cose durante un'emergenza non è il modo migliore di gestirle. Ogni progetto può avere requisiti diversi, ma in genere ci sono solo alcuni punti importanti da considerare di sicuro: la ridondanza, la scalabilità, le prestazioni e la gestione. La ridondanza è come si riesca a reagire ad eventuali guasti, la scalabilità è la possibilità di gestire una base di utenti più grande o più piccola, le prestazioni implicano assicurarsi che l'esperienza di ciascun utente sia ad un livello almeno accettabile. Avere un servizio ridondante, scalabile e ad alte prestazioni non serve a niente se non si riesce a gest

High Dimensional Neurocomputing

by Bipin Kumar Tripathi

The book presents a coherent understanding of computational intelligence from the perspective of what is known as "intelligent computing" with high-dimensional parameters. It critically discusses the central issue of high-dimensional neurocomputing, such as quantitative representation of signals, extending the dimensionality of neuron, supervised and unsupervised learning and design of higher order neurons. The strong point of the book is its clarity and ability of the underlying theory to unify our understanding of high-dimensional computing where conventional methods fail. The plenty of application oriented problems are presented for evaluating, monitoring and maintaining the stability of adaptive learning machine. Author has taken care to cover the breadth and depth of the subject, both in the qualitative as well as quantitative way. The book is intended to enlighten the scientific community, ranging from advanced undergraduates to engineers, scientists and seasoned researchers in computational intelligence.

High Dynamic Range Digital Photography For Dummies

by Robert Correll

Create amazing HDR photos with this full-color, plain-English guide Your secret is safe with us. Even if you don't have the latest high-end high dynamic range (HDR) camera equipment, you can still create striking images that appear as if you do with the tips, tricks, and techniques in this helpful guide. Discover how to use bracketing effectively, get the most out of a tripod, finesse your photos with Photoshop, and make it all go easier with this practical and inspiring book. Shines a light on HDR-what it is, how it's done, and what tools you need Walks you through how to take good photographs, from using the right settings to choosing good HDR subjects Demonstrates how to put all your images together in a single photo, including selecting the software, establishing workflow, and creating files Covers how you can clean up digital residue, how to create HDR in black and white, and much more Packed with beautiful and inspiring full-color HDR images to fire your imagination Get fresh ideas, avoid mistakes, and produce memorable images with this essential guide.

Refine Search

Showing 27,151 through 27,175 of 63,684 results