····· lezzter Preis 29.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Das Testen, Analysieren und Verifizieren von Software hat in den letzten Jahren erheblich an Bedeutung gewonnen, da die Qualität eine immer größere Rolle beim Einsatz von Software spielt. Auch durch die Anwendung von agilen Vorgehensweisen bei der Erstellung von Software ist das Testen zunehmend relevanter geworden. Seit über 25 Jahren gibt es in der `Gesellschaft für Informatik e.V.` (GI) eine Fachgruppe, die sich mit diesem Thema auseinandersetzt: TAV - Test, Analyse und Verifikation von Software. Das 25-jährige Bestehen dieser Fachgruppe wurde im Juni 2016 auf dem 39. Treffen in Bremen gefeiert. Dieses Buch umfasst einige der Vorträge, die auf dem Treffen gehalten wurden. Es wirft nicht nur einen Blick zurück in die Vergangenheit, sondern schaut auch nach vorne. Dabei beleuchtet es in weiteren Beiträgen aktuelle und zukünftige Ausrichtungen des Testens in Theorie und Praxis. Eine Auswahl der Themen: Softwarequalität zwischen hohem Ziel und hohler Floskel Leistungsfähige neue Testverfahren Quality Engineering für das Internet der Dinge Complete Model-based Testing Modellbasiertes Security-Testen Test- und Qualitätsmanagement in agilen Projekten Testen mit automatisch bestimmten Eingabegrammatiken The Future of Software Testing ····· 10361154594
····· lezzter Preis 19.95€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Mit diesem Original Microsoft Prüfungstraining bereiten Sie sich effizient auf die Microsoft-Zertifizierungsprüfung 70-698 `Installing and Configuring Windows 10` vor. Dabei konzentriert sich dieses Buch auf die richtige Herangehensweise an die Prüfungsfragen sowie die dafür nötige kritische Analyse der Fragen und den richtigen Ansatz zur Entscheidungsfindung, um auf MCSA-Niveau erfolgreich zu sein. Dieses Training ist entsprechend der in der Prüfung bewerteten Fähigkeiten aufgebaut und behandelt die folgenden Themenbereiche: - Windows implementieren - Konfigurieren und Unterstützen der Kerndienste - Verwalten und Warten von Windows Anhand von Gedankenexperimenten inklusive Antworten am Ende eines jeden Kapitels können Sie Ihr erlerntes Wissen prüfen, sodass Sie schnell fit für die Prüfung sind. Die Prüfung 70-698: Gegenstand dieser Prüfung sind die grundlegenden Kenntnisse und Fähigkeiten, die nötig sind, um Windows 10 zu konfigurieren, zu verwalten und zu warten. Microsoft-Zertifizierung: Durch das Bestehen dieser Prüfung sowie der Prüfung 70-697 `Configuring Windows Devices` erhalten Sie die Zertifizierung `MCSA: Windows 10`. ····· 10361154580
Mit Motoren, Getrieben, pneumatischen Elementen, Kupplungen und vielem mehr können LEGO-Modelle entworfen werden, die realistisch funktionieren.
LEGO-Guru Pawel `Sariel` Kmiec erklärt die Grundlagen der Konstruktion - von einfachen Maschinen bis zur Behandlung von fortgeschrittenen Mechanismen - und zeigt, wie maßstabsgetreue Modelle gebaut werden.
Statt Bauanleitungen für bestimmte LEGO-Modelle bietet dieses Buch das komplette Know-how für eigene Abenteuer mit LEGO-Technic. Nach einem Überblick über alle Technic-Komponenten und -Konstruktionsprinzipien werden Einzelheiten von Mechanismen - Getriebe, Lenkungen, Radaufhängungen oder Kupplungen - im Detail erklärt. Der Autor gibt dabei einen einzigartigen Einblick in mechanische Prinzipien wie Drehmoment, Leistungs- und Getriebeübersetzungen - alles unter Verwendung von LEGO-Technic-Steinen.
Du erfährst, wie man:
- robuste Verbindungen entwirft, die schweren Belastungen standhalten können
- spezielle LEGO-Teile wie Gehäuse und U-Gelenke nachbaut,
und Lösungen für Schmidt- und Oldham-Kupplungen findet
- Differenziale, Aufhängungen, Getriebe und Lenkungen konstruiert
- unterschiedliche Baustile kombinieren kann
- ferngesteuerte Fahrzeuge, Beleuchtung, motorisierte Kompressoren und pneumatische Motoren entwirft
Dieses wunderschön illustrierte, farbige Buch begeistert aber auch mit Ideen für den Bau cooler Fahrzeuge wie Supersportwagen, Kränen, Planierraupen und vielem mehr.
In dieser Auflage: 13 neue Bauanleitungen sowie 13 aktualisierte und vier komplett neue Kapitel!
Dieses Buch ist von der LEGO-Gruppe weder unterstützt noch autorisiert worden. ····· 10361154563
····· lezzter Preis 49.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Gegenstand von IT-Unternehmensarchitektur ist es, ein Portfolio an Software und IT-Infrastruktur so auszurichten, dass daraus ein optimaler Nutzen für das anwendende Unternehmen entsteht. Durch den musterbasierten Ansatz, denmdieses Buch verfolgt, ist es möglich, die IT-Unternehmensarchitektur für die Einsatzziele des Unternehmens zielgenau zu konfigurieren. Der Leser erfährt, welche Zielmuster durch welche Managementprozessmuster unterstützt werden und wie er daraus die erforderliche Datenbasis ableiten kann, um Architekturaktivitäten zu unterstützen. Die Kernprozesse der IT-Unternehmensarchitektur - wie das Erarbeiten der IT-Strategie, das IT-Portfoliomanagement, die strategische IT-Planung, das Monitoring des Projektportfolios sowie die Projektbegleitung - können so an den Bedarf des Unternehmens angepasst werden. Darüber hinaus vermittelt das Buch notwendige Grundlagen zu den im Unternehmensumfeld wichtigen Themen Compliance, IT-Sicherheit und IT-Risikomanagement. Dabei werden Frameworks für das IT-Management wie TOGAF oder COBIT vorgestellt. Im Anhang finden sich u.a. Checklisten für Richtlinien und Architekturdokumente sowie ein Glossar. Das Buch bietet somit viele in der Praxis anwendbare Hinweise und zeigt IT-Verantwortlichen, wie sie IT-Unternehmensarchitektur für die Erreichung ihrer Ziele einsetzen können. Die 3. Auflage wurde komplett überarbeitet und um Themen wie Lean EAM und Agile EAM sowie EAM für den Mittelstand erweitert. Auch neue technologische Trends wie Cloud Computing und Microservice-Architektur wurden aufgenommen. ····· 10361154544
····· lezzter Preis 34.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray JUnit ist die Standardbibliothek zum Schreiben automatisierter Tests in Java. Dieses Buch enthält Grundlagen- und Expertenwissen für das effiziente Entwickeln automatisierter Tests in Java mit JUnit. Es vermittelt einen kompakten Überblick über alle Features von JUnit 3.8.1 bis JUnit 4.11 und zeigt anhand von Beispielen aus Tests bekannter Open-Source-Projekte, wann Sie diese sinnvoll einsetzen können. Darüber hinaus behandelt der Autor Open-Source-Bibliotheken wie Mockito und FEST, die das Schreiben von JUnit-Tests erleichtern, und verdeutlicht Programmierregeln für das Schreiben richtig `guter` Tests. Im Einzelnen werden behandelt: - Testgetriebene Entwicklung - Assertion-Bibliotheken - Unit-Tests mit Mock-Objekten - Programmieren gut verständlicher Tests - Programmieren schneller Tests - Tests abseits vom Happy Path - Nichtfunktionale Tests Abgerundet wird das Buch durch Hinweise und Tipps, wie Sie JUnit effektiv zusammen mit den bekannten Java-IDEs Eclipse und IntelliJ IDEA sowie mit den Build-Tools Ant und Maven einsetzen können. ····· 10361154350
····· lezzter Preis 36.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Performante Webanwendungen sind keine Selbstverständlichkeit. Meist sind Projekte durch die Eigenschaften soll schnell entwickelt werden und das Projekt muss günstig sein geprägt, worunter die Qualität und oft damit auch die Performance leidet. Eine schlechte Performance der Anwendung führt jedoch schnell zur Unzufriedenheit und fehlender Akzeptanz der Nutzer bei steigenden Nutzerzahlen kann die schlechte Performance sogar einen Totalausfall des Systems verursachen.Dieses Buch zeigt Ihnen, wie Sie die Performance von neuen und bestehenden Anwendungen im Entwicklungszyklus als auch im Live-Betrieb testen, Bottlenecks rechtzeitig identifizieren, beheben und damit Ausfällen und Geschwindigkeitseinbußen langfristig entgegenwirken können. Die Optimierungsempfehlungen erstrecken sich dabei über alle beteiligten Komponenten einer Webanwendung: Von der Server-Hardware, der Netzwerk-Infrastruktur, der Softwarearchitektur, der Implementierung der Anwendung auf der Server- und Clientseite bis hin zur Nutzerführung. Hinzu kommt die Auswahl und Konfiguration von Webserver-, Datenbank- und Caching-Software als auch die Optimierung der Datenübertragung und Darstellung im Browser. Ein besonderer Fokus liegt hierbei auf der Reduzierung der vom Nutzer tatsächlich wahrgenommenen Ladezeit. Durch Abstimmung aller Komponenten auf den spezifischen Anwendungsfall, können optimierte Webanwendungen nicht nur schneller geladen und dargestellt werden, sondern auch mehr Last beim niedrigerem Ressourcenverbrauch bewältigen und oft sogar die Betriebskosten reduzieren. ····· 10361154346
····· lezzter Preis 38.27€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The thesis contributes to the future operation of the Super Proton Synchrotron at CERN and to the numerous efforts that ensure the long-term physics performance of the Large Hadron Collider. An increased mitigation of higher order electromagnetic modes in the travelling wave acceleration system of the SPS is required to ensure delivery of the high intensity particle beam desired in the future. The proposed solutions are developed from theory as well as simulations and tested in measurements. ····· 10361149486
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The most critical and difficult problem in speech analysis is reliable discrimination among Silence, Unvoiced and Voiced speech. Several methods have been proposed for making this three levels decision and most of them need Speech Activity Detection (SAD). In this study, we propose the Estimated Degree of Noise (EDON) to adjust the threshold of speech activity. To estimate the degree of noise, a function was previously prepared using the least-squares (LS) method, from the given (true) DON and the estimated parameter of DON. This parameter is obtained from the Auto-Correlation Function (ACF) of the noisy speech on a frame basis. Issues associated with this EDON for SAD approach are discussed, and experiments are done using the TIMIT database. Experimental result shows that using EDON improves the classification performance specially voiced and silent parts and the efficiency is compared with other existing published algorithms. ····· 10361147434
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Relational databases are not well suited for representing and processing hierarchical data. Clever schemes are required to represent trees in the flat format of the relational model, as well as answering queries such as retrieving all nodes in a sub-tree, all nodes at a particular level and the nodes on the path from a node to one of its descendants. Some areas where hierarchical data needs to be stored and processed include XML data warehousing, organization chart in automation systems, bioinformatics and pyramidal games that require hierarchical data representation. In this book, a new method (Arya) is proposed to represent hierarchical data structures in relational database systems so that queries proved on trees can be executed efficiently. This method reshapes hierarchical data structures to non-hierarchical graphs using extra pointers to be accessed directly from each node to its ancestors. The cost for the gained performance is only a small increase in the space required for the representation of the original tree, which is significantly less than the used space by other methods. ····· 10361147388
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Security in wireless sensor network (WSN) encompasses a great number of challenges ranging from the nature of wireless communications, constrained resources of the sensors, unknown topologies of the deployed networks, unattended and accessible environment where sensors might be susceptible to physical attacks, dense and large networks, etc. In general, the research areas on security in WSN could be categorized as (a) Key Management (b) Secure routing and transport, (c) Security services, (deployment strategy, security framework, etc.), (d) Intrusion detection system A single mechanism cannot solve all the issues. Keeping this point in mind, this book deals with security services and secure routing [areas (b) and (c)] in WSN. It analyzes the impact of security mechanisms on the resource efficiency in wireless sensor network. ····· 10361147345
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book is review of current trends and strategies in the area of e-governance. In the current democracies, there is an increasing demand to bring citizens closer to the government and to improve delivery of government services. There is always pressure on the government to achieve its objective within the budget constraints, an effective E-governance solution seems to be the better way out by offering opportunities for governments to re-invent themselves & deliver services at reduced time to its various clients and Citizens (G2C), Business (G2B), Employee (G2E) and Government (G2G). Today, as citizens are becoming more and more conscious of their right to get the required services and as both the state and Central governments recognize the need to deliver faster and efficient services to the ordinary citizens, e-governance (or government `online`) has emerged as an effective instrument of administration. E-governance and Internet are inseparable, as Internet is the medium connecting the citizen and government. ····· 10361147221
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Mediation frameworks present a cost-effective solution to integrating distributed heterogeneous data sources. Mediators are middleware in which a new layer is introduced between applications and data sources, so changes in either application layer or data sources layer will not affect the other. The mediation layer adds value to systems such as data conversion, integration, and presentation. Before data can be integrated, it must be found: a simple solution to this is to maintain a repository for the schemas of the data sources. However, this approach affects the reliability and scalability of the system. This research is to design a large scale, reliable mediation architecture based on a skip-list distributed hash table algorithm. ····· 10361147200
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Understanding factors that enhance or diminish performance levels of individuals is instrumental for achieving individual (low level) and organisational (high level) goals. In this book, the effect of social network structure, position, ties and information and communication technologies (ICT) use on performance attitudes of knowledge-intensive workers in dispersed occupational communities is investigated. Based on social network theories of strength of weak ties and structural holes, and the social influence model of technology use, a theoretical framework is developed. A validated and reliable data collection instrument is also developed. Network measures of degree centrality, density, structural holes (constraint and efficiency), tie strength and tie diversity are applied for exploring the association with ICT use and performance from a sample of 110 knowledge workers. Empirical results suggest that network structure, position and ties of knowledge workers play a crucial role in individual performance and ICT use. The book outlines several important theoretical, methodological and practical implications for individuals engaged in knowledge-intensive work. ····· 10361147173
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The estimation of a camera s intrinsic parameters (the camera focal length and the principal point) and extrinsic parameters (camera orientation and pose) is the problem of camera calibration. Camera calibration can be accomplished using one of two strategies. The first is off-line calibration which is often used when the camera is stationary during the setup operation. This however reduces the flexibility of using the camera. Alternatively, the camera may be calibrated during the normal operation of the setup. This strategy is called auto-calibration. To achieve greatest flexibility, this work focuses on the auto-calibration strategy. Once the camera is calibrated, it is possible to compute a metric reconstruction from the image sequence. As a result of the flexibility of this strategy, a 3D scene can be imaged from multiple views by a hand-held camera, which can be moving freely without special setup or hardware configuration. Several methods for solving the camera auto-calibration are discussed and implemented in this thesis. The thesis also studies this problem when the camera internal parameters are allowed to change, as the case with a zooming image sequence. ····· 10361147114
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Biometric Authentication System is a technique to identify or verify a person based on his physical and/or behavioral characteristics. The fingerprint recognition, Face Recognition, Hand Geometry, Voice Print etc are trait to identify a person. The Multimodal biometric authentication is a technique to identify or verify a person using the multiple trait. In this thesis, the fingerprint and face recognition is used as multiple trait to identify a person. ····· 10361147112
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Android is a brand new open source mobile Operating System (OS) that combines and builds upon parts of many different open source projects. This OS was erected by Google for mobile devices built on the Linux kernel platform by the Open Handset Alliance (OHA) in November, 2007. This book is appropriate for the developers starting out new Android project, as well as for professional programmers. The aim of this book is to enhance research and development in the field of Android mobile technology. With the help of UML diagrams and code examples, we explain how to design and develop a highly interactive, user friendly, customizable, and challenging `Maze Game`. The didactic description of Android along with key web references helps the reader to get an insight into the Android architecture, and customization of its important libraries in order to build an application or a game. We have developed Maze Game using the following Android tools: Software Development Kit (SDK), Eclipse, TILED, AND Engine. The Maze Game was developed in the Open Source Technology Development Lab (OSTDL), Punjab University College of Information Technology (PUCIT), University of the Punjab, Lahore, Pakistan. ····· 10361147054
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This comprehensive text shows the effectiveness of using mobile sinks in obtaining potential energy savings for the sensors in wireless sensor networks. The entire sensor network is divided into two layers: the resource-constrained sensor nodes constituting the lower layer and a mobile ad hoc network of resource-rich sinks forming the upper layer. Each sink is responsible for monitoring and data collection from a particular cluster of sensors. A sink moves to the vicinity of the sensor nodes - in a cluster - to collect data and exchanges the collected data with peer mobile sinks. The data can be transferred to the base station through multi-hop sink-to-sink data propagation and the energy loss incurred due to multi-hop data propagation in disseminating the data from a sensor to the control center is accounted to the sinks rather than sensors. This book also illustrates the scenarios, use just one mobile sink - where use of multiple mobile sinks becomes unaffordable - to reduce energy consumption in wireless sensor network. The lone mobile sink transfers the collected data to the base station directly. ····· 10361147040
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In this book, we study optimization models for health care under uncertainty and resource constraints. In particular, we study two problems. The first problem is the multi-shift Vehicle Routing Problem (MSVRP) with overtime to meet around-the-clock demand. We use insertion to create the initial routes and then use tabu search to improve the routes. We show that our algorithm can find high-quality solutions for very large problems. The second problem is a multi-city resource allocation model to distribute the medical supplies in order to minimize the total number of fatalities in an infectious disease outbreak. We consider the problem with uncertainty in the initial number of cases and transmission rate, and build a two-stage stochastic programming model. To solve instances of realistic size we use a heuristic based on Benders decomposition. Finally, we use sample average approximation (SAA) to get confidence intervals on the optimal solution. We illustrate the use of the model and the solution technique in planning an emergency response to a hypothetic national smallpox outbreak. Computations show that the algorithm is efficient and can obtain near-optimal solution. ····· 10361147008
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Human Computer Interaction (HCI) emerged as a field of research with the purpose of studying the interaction between user and computer technology. In the challenging world every system is build to satisfy users needs by some specific operation in the system but the more important challenge is to create a usable or user-friendly system. Usability is acted with end-user by an interaction between user and the system. This interaction is maintained by user interface. But to the software engineer, usability is just one of the many aspects that must be taken into account in the development process and most of the case if it is an explicit interest then is considered if time permits.Moreover, there is a trend to consider usability the responsibility of somebody else. Typically, usability is still considered as a test activity rather than a product design activity. In this book, we have focused on the challenges to implement usability design for the software companies and impacts on software development process. ····· 10361146950
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This textbook is designed to learn how personal computer operates. Easy-to-understand, in plain English it will teach you how to work with Windows operating system (desktop, working with windows, files and folders, customizing and others), with the Microsoft Word word processor (ribbon interface, character, paragraph and page formatting, using styles, searching, check spelling and others), with the Excel program (formatting, using formulas and functions, charting), and with PowerPoint (creating presentations). The necessary information is presented on how to use the Internet and electronic mail. Glossary of computer terms is provided. The textbook can be used both in the universities and at schools. It will be helpful for all who are interested in computer English and want to study personal computer fundamentals, who is eager to read and understand English language texts on personal computers and learn computer vocabulary. ····· 10361146940
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray As the largest body of health care and treatment services to societies, in each hospital the human resource costs receive the great amount of considered budget and credit to the health and treatment sector of a country. Although determining the optimized number of staff needed for each ward of hospital is highly effective on the service quality, it is among the subject that any clear standards have not been written for it. This research has been done to set staff`s shift schedule and determining the needed number of staff to increase the model hospital productivity and minimize its costs with help of intelligence systems. Since the presence of paints in the hospital and discharge them can be considered as a fragmented system, in the first step with Markov `s procedures specifications we can estimate wisely about the system conditions such as the number of needed beds and occupied beds which can be very useful for optimizing capacities usage. To develop the model, an approach is stated for minimizing the costs as the second step with assist of Petri`s network. Finally, to control and to optimize, the model is presented with applying genetic algorithm for optimized shifting of huma ····· 10361146939
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Reconstructing a metric structure of a scene from images has been one of the important topics in computer vision. In this book, we focus on a simple diagonal rank-deficient form of a 2D metric invariant, a conic dual to the circular points. By manipulating image features to constrain the simple form algebraically, the metric reconstruction can be achieved. We start from second order curves such as concentric circles or confocal conics to be used as basic features. By simply subtracting them, affine and metric properties of a plane are recovered. The geometric meanings of the resulting subtraction matrices are also investigated. The idea of algebraically manipulating features extend to an ``addition method`` using human recognizable features such as a rectangle. Its parallelism and orthogonality enables us to obtain information of the scene structure. As a generalization, we propose a framework to unify the geometric constraints used in camera calibration and in metric reconstruction. We show that scene constraints can be converted into constraints of cameras, and that a flexible algorithm to metric-reconstruct scenes from images can be developed in the proposed unified framework. ····· 10361146850
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Enhancing software engineering models, RUP in specific, to accommodate and support Globalization and Internationalization of Software. The thesis shows how globalization standards, measures and guidelines can integrate into Rational Unified Process Software Engineering models. The thesis illustrates the integration into the phases and disciplines of the Rational Unified Process elements, presents the benefits attained from such integration, and demonstrates a case study of a fully globalized software product. Software is being developed in geographically distributed locations, and deployed all around the globe. For instance, software manufactured in a certain country, is required to handle a wide range of users, with different languages, character sets, encoding, expectations, culture, and more. Users with a wide range of cultural backgrounds have different expectations and requirements. In some cases, presenting the interface in the user`s own language is a must-have requirement which makes the manufacturing software for international audience is not an easy task. ····· 10361146848· 1 · ::::: · 2 ·· 3 ·· 4 ·· 5 ·· 6 ·· 7 ·· 8 · ::::: · 47 ·