05812nam 2200493 450 991050263270332120220621182923.01-4842-7249-8(CKB)4940000000612103(MiAaPQ)EBC6729683(Au-PeEL)EBL6729683(OCoLC)1287132203(CaSebORM)9781484272497(PPN)258057912(EXLCZ)99494000000061210320220621d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHands-on Azure cognitive services applying AI and machine learning for richer applications /Ed Price, Adnan Masood, Gaurav Aroraa[Place of publication not identified] :Apress,[2021]©20211 online resource (376 pages)1-4842-7248-X Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: The Power of Cognitive Services -- Overview of Azure Cognitive Services -- Why Azure Cognitive Services -- Exploring the Cognitive Services APIs: Vision, Speech, Language, Web Search, and Decision -- Vision APIs -- Computer Vision -- Custom Vision -- Face -- Form Recognizer -- Video Indexer -- Speech APIs -- Speech Service -- Speaker Recognition (Preview) -- Language APIs -- Immersive Reader -- Language Understanding (LUIS) -- QnA Maker -- Text Analytics -- Translator -- Web Search APIs -- Bing Search APIs -- Bing Web Search -- Bing Custom Search -- Bing Image Search -- Bing Entity Search -- Bing News Search -- Bing Video Search -- Bing Visual Search -- Bing Autosuggest -- Bing Spell Check -- Bing Local Business Search -- Decision APIs -- Anomaly Detector (Preview) -- Content Moderator -- Personalizer -- Overview of Machine Learning -- Understanding the Use Cases -- The COVID-19 SmartApp Scenario -- Summary -- Chapter 2: The Azure Portal for Cognitive Services -- Getting Started with Azure Portal and Azure Cognitive Services -- Getting Started with Azure Cognitive Services -- Azure Marketplace: An Overview of AI + Machine Learning -- Understanding Software Development Kits (SDKs): To Get Started with Your Favorite Programing Language -- Setting Up Your Visual Studio Template -- Summary -- Chapter 3: Vision - Identify and Analyze Images and Videos -- Understanding the Vision APIs with Computer Vision -- Analyzing Images -- Start Diving for Computer Vision -- Working with APIs -- Identifying a Face -- Test Using the API Console -- Test Using a Demo Page -- Implement It Using Code -- Understanding the Working Behavior of Vision APIs for Video Analysis -- Microsoft Azure Video Indexer -- Summary.Chapter 4: Language - Understand Unstructured Text and Models -- Creating and Understanding Language Models -- Enrichment in Progress - JFK Files Demo -- The Muppet Models - Transformers for NLP -- Named Entity Recognition with Fine-Tuned BERT -- Summary of the Language API -- Chapter 5: Speech - Talk to Your Application -- Understanding Speech and Speech Services -- Comprehensive Privacy and Security -- Getting Started -- Translating Speech Real Time into Your Application -- Speech to Text - Converting Spoken Audio to Text for Interaction -- Cognitive Speech Search with LUIS and Speech Studio -- Summary of the Speech API -- Chapter 6: Decision - Make Smarter Decisions in Your Applications -- Decision Services and APIs -- Content Moderator Service -- Trying It Out - Building Content Moderators -- Moderating Text Using Content Moderator Service -- Moderating Text - Invoking the API -- Personalizer Service -- Trying It Out - Building a Movie Personalizer -- Anomaly Detector Service -- Try It Out - Anomaly Detector Demo -- Metrics Advisor (Preview) -- Summary and Conclusion -- References and Further Reading -- Chapter 7: Search - Add Search Capabilities to Your Application -- The Search Ecosystem -- Azure Cognitive Search -- Searching with Azure Cognitive Search -- Testing Azure Cognitive Search -- Integrating Azure Cognitive Search in Your Notebooks -- Searching with Bing Web Search -- Summary and Conclusion -- References and Further Reading -- Chapter 8: Deploy and Host Services Using Containers -- Cognitive Services Containers -- Hosting Cognitive Services Containers -- Running a Language Service Container -- Running an Anomaly Detector Service Container -- Working with Azure Container Instances -- Deploying a Cognitive Services Container with Azure Kubernetes Service -- Summary and Conclusion -- References and Further Reading.Chapter 9: Azure Bot Services -- The Azure Bot Services Ecosystem -- Building Azure Service COVID-19 Bot -- Augmenting the Bot Knowledge Base from the Web -- Conclusion and Summary -- References and Further Reading -- Chapter 10: Azure Machine Learning -- Azure Machine Learning Stack -- Hello World with Azure Machine Learning -- Creating a Machine Learning Model for Classification -- Classification Model Using Azure Machine Learning Designer -- Conclusion and Summary -- References and Further Reading -- Index.Application program interfaces (Computer software)Microsoft Azure (Computing platform)Application program interfaces (Computer software)Microsoft Azure (Computing platform)005.1068Price Ed1071777Aroraa GauravMasood AdnanMiAaPQMiAaPQMiAaPQBOOK9910502632703321Hands-on Azure cognitive services2882111UNINA07905nam 22008055 450 99646571950331620231026003349.010.1007/b136247(CKB)1000000000212944(SSID)ssj0000327640(PQKBManifestationID)11912791(PQKBTitleCode)TC0000327640(PQKBWorkID)10301945(PQKB)11576663(DE-He213)978-3-540-32104-0(MiAaPQ)EBC3067761(PPN)123094496(EXLCZ)99100000000021294420100714d2005 u| 0engurnn#008mamaatxtccrWired/Wireless Internet Communications[electronic resource] Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings /edited by Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XIV, 370 p.)Computer Communication Networks and Telecommunications ;3510"3rd International Conference on Wired/Wireless Internet Communications"--Pref.3-540-32104-7 3-540-25899-X Includes bibliographical references and index.Session 1: Mobility Management -- Impact of Link State Changes and Inaccurate Link State Information on Mobility Support and Resource Reservations -- Comparison of Signaling and Packet Forwarding Overhead for HMIP and MIFA -- Profile System for Management of Mobility Context Information for Access Network Selection and Transport Service Provision in 4G Networks -- Replic8: Location-Aware Data Replication for High Availability in Ubiquitous Environments -- Session 2: Transport Protocols and Congestion Control -- Refined PFTK-Model of TCP Reno Throughput in the Presence of Correlated Losses -- Examining TCP Parallelization Related Methods for Various Packet Losses -- The Interaction Between Window Adjustment Strategies and Queue Management Schemes -- A Novel TCP Congestion Control (TCP-CC) Algorithm for Future Internet Applications and Services -- Performance Evaluation of ?-AIMD over Wireless Asynchronous Networks -- Session 3: QoS and Routing -- Rate Allocation and Buffer Management for Proportional Service Differentiation in Location-Aided Ad Hoc Networks -- Multiservice Communications over TDMA/TDD Wireless LANs -- Interference-Based Routing in Multi-hop Wireless Infrastructures -- Session 4: Quality of Service -- A Probabilistic Transmission Slot Selection Scheme for MC-CDMA Systems Using QoS History and Delay Bound -- Evaluation of QoS Provisioning Capabilities of IEEE 802.11E Wireless LANs -- Content-Aware Packet-Level Interleaving Method for Video Transmission over Wireless Networks -- A Performance Model for Admission Control in IEEE 802.16 -- Session 5: Wireless Multi-hop Networks and Cellular Networks -- Comparison of Incentive-Based Cooperation Strategies for Hybrid Networks -- Analysis of Decentralized Resource and Service Discovery Mechanisms in Wireless Multi-hop Networks -- Location Assisted Fast Vertical Handover for UMTS/WLAN Overlay Networks -- Session 6: Traffic Characterization and Modeling -- A Methodology for Implementing a Stress Workload Generator for the GTP-U Plane -- Traffic Characteristics Based Performance Analysis Model for Efficient Random Access in OFDMA-PHY System -- Collision Reduction Random Access Using m-Ary Split Algorithm in Wireless Access Network -- Simple, Accurate and Computationally Efficient Wireless Channel Modeling Algorithm -- Session 7: Ad hoc Networks -- Efficient Multicast Trees with Local Knowledge on Wireless Ad Hoc Networks -- Limiting Control Overheads Based on Link Stability for Improved Performance in Mobile Ad Hoc Networks -- Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks -- Session 8: IEEE 802.11 and Other Wireless MAC Protocols -- Lecture Notes in Computer Science:Packet Error Rate Analysis of IEEE 802.15.4 Under IEEE 802.11b Interference -- On the Service Differentiation Capabilities of EY-NPMA and 802.11 DCF -- Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode -- ECN Marking for Congestion Control in Multihop Wireless Networks -- Session 9: Energy Efficiency and Resource Optimization -- Providing Delay Guarantees and Power Saving in IEEE 802.11e Network -- Measuring Transport Protocol Potential for Energy Efficiency -- STC-Based Cooperative Relaying System with Adaptive Power Allocation -- Reducing Memory Fragmentation with Performance-Optimized Dynamic Memory Allocators in Network Applications.Welcome to the 3rd International Conference on Wired/Wireless Internet Communications (WWIC). After a successful start in Las Vegas and a selective conference in Germany, this year’s WWIC demonstrated the event’s maturity. The conference was supported by several sponsors, both international and local, and became the official venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more effort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%.Computer Communication Networks and Telecommunications ;3510Computer communication systemsSoftware engineeringOperating systems (Computers)Application softwarePersonal computersElectrical engineeringComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Personal Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24083Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Computer communication systems.Software engineering.Operating systems (Computers).Application software.Personal computers.Electrical engineering.Computer Communication Networks.Software Engineering.Operating Systems.Information Systems Applications (incl. Internet).Personal Computing.Communications Engineering, Networks.004.67/854.32bclBraun Torstenedthttp://id.loc.gov/vocabulary/relators/edtCarle Georgedthttp://id.loc.gov/vocabulary/relators/edtKoucheryavy Yevgeniedthttp://id.loc.gov/vocabulary/relators/edtTsaoussidis Vassilisedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465719503316Wired772061UNISA