AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 22 ·· 23 ·· 24 ·· 25 ·· 26 ·· 27 ·· 28 · ::::: · 47 ·

Digital Computer Forensic: Validation and Verification for Disk Imaging

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In digital forensic investigation, there are numerous digital forensics preservation tools are used by practitioners all over the world. It is important to have the right specialized tools in order to ensure all the collected evidence are processed correctly and in a timely manner. Moreover, guidelines of validation and verification (VV) in computer forensic tools provide great opportunities for practitioners to remove necessity for developing individual tests for tools. Since practitioners in Malaysia are not aware of the significant of VV of disk imaging and there is no standard guideline for disk imaging process, thus a guideline model for VV for disk imaging has been created. The survey results provide indication on the process of developing guideline of VV of disk imaging in Malaysia and manage to produce a new conceptual model for VV the disk imaging tools in computer forensic environment. This conceptual model is emphases more on the management element which encompasses three supporting elements:documentation, maintenance of tools and monitoring. The internal layer are consists of technical elements:checklist of mandatory features and optional features and report writing. ····· 10361100065

Theory and Practice of Relational Algebra

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Relational algebra is a simple and consistent query language that is often used to explain principles of relational operations. While many books and articles deal with the theory of relational algebra, its practical applicability is generally neglected. Moreover, there is no software support for evaluating relational algebra expressions: contemporary relational database management systems implement only the SQL query language. Finally, the common syntax for relational algebra is based on Greek alphabet, making queries difficult to type on standard keyboards. We divide this work into two parts, theoretical and practical. In the theoretical part you will find definitions of relational algebra operations accompanied by clear examples. The practical part proposes new and approachable ASCII-compatible syntax for relational algebra. Furthermore, it explores the possibilities of automated translation of queries into SQL. A tool for checking syntactic and semantic correctness is described in detail. This book is among the few resources dealing with direct practical applications of relational algebra. Moreover, it is a great starting point for everyone interested in the background theory. ····· 10361100057

Slicing Object Oriented Programs for Maintenance Purposes

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Object oriented approach is growing very fast in various applications of the computer science. Those applications may contain a lot of entity relationships which, need to be understood by the maintainers. An approach for formally defining slices for object oriented programs is an important problem in the maintenance phase. This research proposes definitions of slices for object oriented programs. Basic relations such as Usage, Affect and Inheritance are defined, and they are extended to a family of dependence relations between entities in object oriented programs and defines slicing techniques based on these relations. Slice collection methods for specified slice criteria are given. This approach shows how the proposed slicing concepts and rules can be applied within the software maintenance process. The research also develop an object oriented system tool (O2SMt) which represent an automatically extractable and captures an object oriented software system dependencies in order to aid in maintenance phase. The O2SMt captures program slicing according to the slicing concepts, rules and definitions to feature out the dependencies with the basic object oriented relations. ····· 10361100054

Printing and Signing ECG Leads in PDF files

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This study is focused on Printing and Signing ECG (Electrocardiograph) Leads in PDF files.The most widely used signal in clinical practice is the ECG. ECG conveys information regarding the electrical function of the heart, by altering the shape of its constituent waves, namely the P, QRS, and T waves. In the first part describes the ECG pattern recognition and their classification using non-linear transformations and neural networks. Second part of the study consists of ECG Data processing and Recording System. This study is oriented towards printing and signing ECG signal in Portable Document Format (PDF) owing to its importance, because it is a file format used to represent documents in a manner independent of application software, hardware, and operating systems.In the results and discussion section requirements and the constraints that characterized the work development are presented, together with the design issues encountered and the solutions adopted. Finally java development tools have been used to enable signing ECG leads on PDF file. ····· 10361100025

Design a spam detector by analyzing user and e-mail behavior

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A new approach of detecting spam is expressed by this book. It is showing a new idea to detect spam mail which is the most recent threat in Internet users specially for e-mail user.By this book we proposed an efficient algorithm to detect spam. In this paper we tried to analysis every single feature of e-mail. The proposed model builds up with some parts. The algorithm designed by taking the some features of analysis step. Then after passing some real worlds spam and legitimate e-mail we tested our system and it performed a good job.The achievements of our work are-It can detect spam and ham messages separately and It works faster than other system.our proposed system model is not the absolute solution for spam detection. There are lots of possibilities to improve this model. As behavior analysis phase is the most important portion of this paper, so there has a possibility to build up a mail server that can continuously monitors users, after monitoring users it can analysis every single features at least for one year and then it can able to more successfully detects spam messages. ····· 10361100015

Telemedicine

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In the 20th century, electricity, the telephone, the automobile and the airplane all made the world more accessible to more people, transforming our economy and society in the process. Now we are living in 21st Century. This century has been said to be the century of Information & Communication Technology (ICT). ICT has profound effect on the way we work, live and learn. The world is already witnessing rapid and amazing developments in these fields. Similarly, health care sector is also getting benefits of those developments and one example is Telemedicine or ehealth. Information about developments in healthcare needed to reach all. We have noticed that such information is not easily reachable to paramedic in our country due to various reasons. It is welcome step that some organizations are taking responsibility to train nursing and technician students in Telemedicine. This book is written keeping objective of teaching basics of Telemedicine. We have given required illustration and table to make it well explained. We are sure the book will fulfill its requirement. We hope you enjoy reading it! ····· 10361100005

Usability of E-commerce Websites and systems

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
E-commerce, today, is a part of human communication and social system, though technical aspects of E-commerce systems are important, there are also social variables which should come to consideration, so any E-commerce system can be viewed from two main view points Technical and Human/Social. Pure technical solutions can not lead to a successful E-commerce. In order to maximize revenue from online trade, companies must have a usable E-commerce systems and websites, which give customers a real and convenient shopping experience and good customer service. If an E-commerce system supports all the factors mentioned above, it can satisfy customers and persuade them to buy online again. It is not easy to create and maintain a system and website which satisfy customers and makes them loyal, but in the case of fulfilling this goal, satisfied users may spend longer time at website, may revisit website later and also may recommend the website to others. The main issue is how to create such a systems and websites which considered being useable. The objective of research is to evaluate variables, both technical and human/social, affecting usability of systems from customers point of view. ····· 1036199970

Location Strategies of Software Industry in India

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Indian Software industry has been doing consistently well during last few years recording on annual average growth rate of above 50%. India has been the developing world s software leader. The Indian Software industry has already established its credentials in providing high quality solutions to the world. The capability of Indian Software industry is reflected in the very high market capitalization. The Indian software industry has a unique distinction in that most of its output is exported. Despite these high growth rates, India`s share in the world software market is very low, but India still enjoys an advantage over some of the other nations, this is due to the fact that India possesses the world`s second largest pool of scientific manpower, which is also English speaking. Coupled with the fact that the quality of Indian software is good and manpower cost is relatively low, it provides India a very good opportunity in the world market. For a study of location of business, policy liberalization, high quality software exports to the world, talented manpower and the growth of the software industry, India is the obvious choice of study. ····· 1036199877

Neuro Fuzzy Information Retrieval

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The goal of this book is to let people know about the information retrieval system. It cover the problems in this domain and reviews the solution in current space. It explains how to build the fuzzy inference system in order to score the documents in such a way that most relevant documents will get the higher score against the user`s information need. Relevant documents are ranked and then fetched on the basis on these scores. This book provides an overview of fuzzy logic and explains the core concepts underlying fuzzy logic. It also explains the design and implementation strategy of neuro fuzzy inference system for information retrieval by using Adaptive Neuro Fuzzy Inference System (ANFIS) toolbox available in MATLAB. Results and Evaluation are also given at the end for neuro fuzzy inference system and its comparison with the existing techniques for information retrieval. ····· 1036199753

Land Use Information System

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Landuse Information System (LIS) also known as Landuse Related Information System (LRIS) is a special type of Geographical Information System (GIS) which is designed to handled detailed landuse information. This study aims at creating a digital Information System for landuse planning, landuses changes and management within Ladoke Akintola University of Technology (LAUTECH), Ogbomoso Campus. The study goes through database design, database creation, geometric and Attributes data acquisition on different landuses. The thematic maps used were scanned, digitized and converted into digital format. Various classifications and geospatial data analysis or manipulation were made to retrieve spatial information easily at anytime. The queries and analysis performed can be used for effective record keeping, proper maintenance, good planning and allocation of land for various uses to enhance an environment that is conducive for learning and working for both the students and staff. The achievement of the aim and objectives of this project unfold the eyes of the management, staff and students to importance of GIS in landuse planning and management in LAUTECH, Ogbomoso, Nigeria. ····· 1036199721

OSS success factors when going open

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Adoption of Open Source Software involves more than using OSS products and this has marked a new trend in software development. This new practice has potential benefits while introducing peculiar practical challenges in software development particularly in areas concerning OSS selection. This involves OSS search and establishment of selection criteria which selects the best OSS product that matches the system requirements. These challenges have also introduced significant bottlenecks into software development industry. In order to mitigate or solve these problems, there is a need to identify OSS success factors for any software development firm that wants to go OPEN. This thesis aims to investigate the benefits and limitations of adopting OSS and to identify success factors that lead to the benefits of OSS in software development. Systematic literature review, through searches in library databases, was used to review empirical studies on OSS success factors when going OPEN. The data was extracted and synthesized from the selected papers for analysis. Mapping was used to obtain information concerning the OSS success factors when going OPEN. ····· 1036199706

Critical Information Assets Disaster Management Audit Model

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The concept of information asset emanates from information resource management which was to control and design all the prerequisites needed for information production. It considered being an expressible chunk of information that organizations reconsider as valuable. In any modern universities like UTM, e-learning is an important technology that can improve the quality of teaching and learning. Information is constantly processed and combined to form new information assets that are critical to any business processes. The critical information assets perceived by organization as the owner or stakeholders will suffer an adverse impact if the information assets are lost, interrupted or destroyed. Therefore, it becomes necessary for the owners of the critical information assets to identify their critical information assets.This study aims at identifying the real information needs in student information system by identifying the critical information assets and those who needs the information by putting together a good plan and auditing it regularly that can go a long way towards preventing a disaster. ····· 1036199684

2 Layer SVM Classifier for Remote Protein Homology & Fold Recognition

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Advances in molecular biology in the past years have yielded an unprecedented amount of new protein sequences. The resulting sequences describe a protein in terms of the amino acids that constitute them without structural or functional protein information. Therefore, remote protein homology detection and fold recognition algorithms have become increasingly important to detect the structural homology in proteins where there are small or no similarity at all in the sequences compared. However, it is a challenging task to detect and classify this similarity with more biological meaning in the context of Structural Classification of Proteins (SCOP) database. This study presents a new computational framework based on two-layer SVM classifier that uses protein sequences as a primary source. The result shows that the Two-Layer SVM Classifier is capable to perform wellusing different versions of datasets and has outperformed existing methods, which implies the reliability of the framework. ····· 1036199659

Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Different studies show that in 69% of cases, crashes happen because of the absence of critical and necessary information for drivers in appropriate time. New vehicles could be equipped with short-range radios capable of communicating with other vehicles or with Roadside Units at distances of at least one kilometer. Supposed Vehicular Ad Hoc Networks (VANETs) will enable a variety of applications for safety, traffic efficiency and driver assistance by providing, for example, warnings on environmental hazards, traffic and road conditions (e.g., emergency braking, congestion, or construction sites), and local information. As a result, the information conveyed over VANETs may affect life-or-death decisions. However, a formidable set of exploits and attacks becomes possible. Hence, the security of VANETs is indispensable where authentication and privacy are critical factors and significant challenges to be met. This book presents a new non-interactive protocols to provide authentication and preserve privacy among drivers in VANETs with the possibility of tracing malicious drivers only by the Trusted Third Party who is assumed to be a trusted entity in the system model. ····· 1036199622

Software Architecture and System Requirements

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Software architecture and Requirement engineering are the two well known but independent areas of Software Engineering in every aspect like research and education. Requirements provide an important role to develop the software architecture. There are lot of methods to elicit requirements. This book focuses on the software Architectures, Software Requirements and their synergy. Multi-agents are especially under consideration in synergism of Software Requirement Engineering and Software Architecture. New Model of synergism of Software Requirement Engineering and Software Architecture of Multi-agent is also described in this book. ····· 1036199614

Software Test Cases Generation

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The main part in the testing of the software is in the generation of test cases suitable for software system testing. The quality of the test cases plays a major role in reducing the time of software system testing and subsequently reduces the cost. The test cases, in model design stages, are used to detect the faults before implementing it. This early detection offers more flexibility to correct the faults in early stages rather than latter ones. The best of these tests, that covers both static and dynamic software system model specifications, is one of the challenges in the software testing. The static and dynamic specifications could be represented efficiently by Unified Modelling Language (UML) class diagram and sequence diagram. The work in this book shows that High Level Petri Nets (HLPN) can represent both of them in one model. Using a proper model in the representation of the software specifications is essential to generate proper test cases. ····· 1036199611

Inconsistency Management in Software Functional Requirements

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book propose a general integrated model which uses machine learning system (Inductive Learning Algorithm) ILA for managing inconsistencies in software functional requirements which may arise in different stages of development process. This model provides a systematic approach for managing inconsistency from early stages till the end of development process with greater solution accuracy, greater coverage of problems, reducing the time of accomplishing the work and making it more intelligent by using previous experiences, discovering new patterns to perform pattern analysis and transferring it to rules which will help in managing inconsistencies more efficiently and effectively, also will help in solving many problems such as enhancing the shared understanding of the development team, directing the development process and assisting the process of verification and validation. This model will help developers to know the number and severity of inconsistencies in their descriptions and how various changes that they make, affect these measures and if they can measure the effectiveness of development process, its degree of progress, its performance and the reliability of the product. ····· 1036199604

Design Space Exploration of Network-on-Chip at System level

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
About the Book: The goal of this text is to help students, researchers and academicians, who are working in the field of CAD for VLSI. Network-on-Chip(NoC) has been recently developed as an on-chip communication solution for System-on-Chip(SoC) design. This paradigm supports various communication resources at a time and overcomes the limitations of bus-based System. Design space exploration methodology at system level reduces the time-to-market pressure of the large and complex systems. On the other hand, design space exploration at system level is a combinatorial optimization problem. So, multi-objective Genetic Algorithm has been considered as an optimization tool for the design space exploration task. This book provides detailed methodology/algorithms to explore the design space of NoC at System Level using Genetic Algorithm. This book is the outcome of my PhD work. I hope this book will help all stake holders for extensive research in the field of NoC at System level. ····· 1036199579

MBT for Non-Functional Requirements

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Model Based Testing (MBT) is a new-age test automation technique traditionally used for Functional Black-Box Testing. Its capability of generating test cases by using model developed from the analysis of the abstract behaviour of the System under Test is gaining popularity. Researchers have tough time in adapting this technique for modelling non functional requirements. This thesis work helps to provide a new and unique method for modeling of those requirements for MBT. An experimental analysis, backed by observations of using the new proposed method indicates that the method is efficient enough to carry out modeling non-functional requirements along with modeling of functional requirements by identifying the appropriate approach. ····· 1036199575

Onotology Evaluation Framework

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
We found that some important errors are missing like sufficient omission error and disjoint redundancy relation error in error s taxonomy. We have defined and categorized them in incompleteness and redundancy categories of error s taxonomy respectively. Due to importance of such errors, we proposed the system DSR_WG, which has capability to detect all these types of errors. The system use a coding scheme and overlapping rules to accomplish the job. Before using the rules in the system we have also tested them with different angles. Our ontology evaluation system has decreased the burden from human experts and covered such areas, which are not handled by any available evaluation tool. ····· 1036199510

Formal Methods for Analyzing Privacy Policies

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With the fast spread of the online services and the huge growth in the collection of users private data, there is a growing interest both by governments and enterprises to establish rules and policies for collecting, processing, and storing users private data. These somewhat informally written privacy policies must be interpreted carefully in the software interface. To better interpret and analyze privacy policies, we need a language suited to the structure of the privacy policies, capable of supporting privacy policies designing methods like referencing to different locations of the policy text. Another issue of growing interest is exploring the compliance of enterprise designed privacy policies with legal privacy policies, or comparing and contrasting the current policies and checking their proper enforcement. Therefore, there is a need for languages that enable automatic exploration of properties with mechanisms for formally contrasting and comparing privacy policies. This book reviews formal methods application in analyzing privacy policies and investigate their potential to address the above mentioned issues. ····· 1036199466

Data Integration in Data Warehousing

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A Data Warehouse is a collection of technologies aimed to enable the decision maker to make faster and better decisions. The data warehousing has some main problems need to be solved to increase the quality of the data warehouse and its data. One of the popular problems of the data warehousing is Data Integration, which is the making of query across multiple autonomous and heterogeneous data sources with respect of quality factors. There are many integration systems (Software) each of which has its own features and benefits which will be stated in details in this research, then the researcher choose one of them to apply a case study. ····· 1036199461

On Protocols for Information Security Services

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. ····· 1036199384

Machine Learning and Biological Data

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The book covers application of various machine learning methodologies such as Support vector machine, Artificial neural network and Bayesian classifier on biological data. Individual prediction models and their comparison in terms of accuracy are also presented. The biological data sets were collected from diverse databases to develop unbiased models. This book presents complete research overview on application of machine learning using biological data. ····· 1036199366

· 1 · ::::: · 22 ·· 23 ·· 24 ·· 25 ·· 26 ·· 27 ·· 28 · ::::: · 47 ·