für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many researches proposed selection systems to automatically rank and select the optimum web service between the deployed candidates. However, the role of these systems limited at selecting the optimal web service only, and they did not introduce a direct solution to step over failure situations in real time systems with out changing the client application. In this work, we introduce a new automated web services supervision system based on Multi Agents System platform named JADE to provide two tasks. First, to select the optimal web service with respect to users preferences based on changeable Quality of Service (QoS)criteria in dynamic environment Second, to take advantage of agents technology to manage, monitor the communication between services and clients, and automatically manipulate connection failures. ····· 1036187440
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray A large type of data contains in various geographic locations and these huge amounts of data create a data ocean. Information Retrieval (IR)system use by different search engine for retrieval of information. But all these technique does not fulfill the user requirements.when a user search into web by a search engine for a desire information the search engine provide the facility by its own method which may not full fill user requirements.Some of them use relevance ranking,HITS algorithm,PageRank.In our book we used a new formula for web ranking which has emphasis on the keyword and also the link of the page.It have also identified these important link in accordance to keyword used.This book we introduced will helpful for web search ranking of retrieved information. ····· 1036187438
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray To fulfill the objectives of data warehouse, a number of front-end tools and back-end tools are required. Front-end tools include analysis, OLAP queries, reporting, data mining etc, while back-end tools include data cleaning, data loading and refreshing etc. Vendor specific Structured Query Language (SQL) engines like Oracle, MS SQL Server, IBM DB2 provide data warehousing facility. However, small and medium enterprise cannot take the advantages of the vendor provided DBMS due to its high Total Cost of Ownership (TCO). As a result open-source SQL engines are becoming popular nowadays. But open-source SQL engines have still no generalized data warehousing facility. In this book it is shown that how to develop a back end tool for loading data into data warehouse from many sources using open source Structured Query Language (SQL) engine MySQL. In this book it is also shown that how to test data loading into data warehouse using the developed back-end tool where data sources are multiple operational MySQL data-bases connected through computer network or backup databases stored in non-volatile media like CD, VCD, pen drive etc. ····· 1036187434
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book deals with performance and dependability modeling and evaluation of computing systems. Some specific methodologies, techniques and tools for the quantitative assessment of such systems are investigated, also adopting a practical approach through examples. In this way the book aims at becoming a reference for practitioners, providing them guidelines on how to apply the techniques proposed to real case studies. The target audience are therefore engineers, modelers, system administrators, researchers and, generally, whoever wants and has the necessity of assessing performance and dependability of computing systems. Most of the work, the techniques and the tools discussed in the book are currently under development. In order to have clarifications, updates and upgrades on them you can directly contact the author. ····· 1036187372
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The objective of the presented work is to facilitate the description of discrete-event models and the discrete-event part of hybrid-DAE models. It is achieved by combining the Parallel DEVS formalism, the process-oriented modeling approach and the Modelica language. This objective not only includes the description of P-DEVS and process-oriented models in Modelica, but also developing interface models which will facilitate the combination of these models with other continuous-time or discrete-event Modelica models. The development of this work includes the identification and analysis of the requirements needed to describe P-DEVS and process-oriented models in Modelica, the description and implementation of a message passing mechanism in Modelica, the implementation of the requirements analyzed into new Modelica libraries that facilitate the description of models using current Modelica functionalities, the combination of these new libraries with other Modelica libraries and the validation of the developed models using case studies and benchmarking systems. ····· 1036187266
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The World Health Organization s (WHO) Health for All strategy recommends WHO and its member states to integrate the appropriate use of health telematics in the overall policy and strategy for the attainment of health for all in the 21st century, thus fulfilling the vision of a world in which the benefits of science, technology and public health development are made equitably available to all people everywhere (WHO 1998). There are ongoing attempts in Sub-Saharan Africa (SSA) to successfully develop telemedicine solutions with the ultimate goal of improving access to quality healthcare. The requirements and critical success factors of these solutions must be thoroughly examined. The author has assessed the ability of telemedicine solutions to support healthcare system governance in Ghana and Nigeria. This book is intended for both researchers and experts in Telemedicine and eHealth, who are particularly interested in the African continent and how to support the development of telecommunication technology for healthcare. It is also intended for politicians and policy makers in SSA who want to significantly impact the governance of their healthcare systems. ····· 1036187097
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Complexities, and some outright failures, with Enterprise Resource Planning (ERP) systems implementation have been well documented. The work described in this book empirically validated a model offering a systematic approach for successful ERP project management and achievement of business performance goals. Data collected from 217 organisations was analysed using structural equation modelling. Results show the need, at the adoption stage, to carefully analyse organisational readiness and the expected strategic value and quality of the ERP system. At the implementation stage project management and training are most crucial for success. Understanding is needed of the synergies among certain factors that have multiple influences across the different project stages, and also of the impact of a number of factors that can have two-way effects, where one needs to determine in which direction the effect is stronger. ····· 1036187082
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The rapid development of current information technology has brought about new aspirations in the academic world, especially in higher education organizations. Learning management systems (LMS) are software applications or Web-based technology used mainly for digital learning and studying. Even though there are many different kinds of LMS, the more advanced ones are usually highly priced and the simpler ones are limited, so the question is would an in-house built LMS be the best solution This research focuses on the analysis of an in-house built LMS called LIBRI designed by the research team at the South-Eastern Europe University in Macedonia. The aim of this research is to describe the project of LIBRI as a success story and transform its development pattern into a standardized methodology for other future in-house LMS developments. A number of interviews were conducted and later analyzed through the research framework in an attempt to better view the step by step procedures taken by the developers. We present a detailed process view of the analysis, design, development, implementation and evaluation phases by conjoining their similarities with other relevant theories. ····· 1036187027
für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray There have been many developments in the field of facilitated model based verification and validation techniques. Most of them have been based upon observing the external behaviour of the system. Our approach follows the same and is valid with the source code of the system under observance is not available Inference mechanism allow us to infer such machine models by observing. We present a framework which adopts to generate component with infinite/finite states and adapt to formal verifications. The models used are communication protocol inferred by regular inference observed through the behaviour of communication protocol entity. Also, an approach is presented such that the observed behaviour of the protocol validates to the designed model of the protocol. ····· 1036187011
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Data that are processed in a computer system include numeric, character, pointer and logical data. Character data, in particular, are data that are represented with the aid of coded character sets (CCSs). This is the focus of this monograph. Although, there have been a sizeable number of published works on such present-day CCSs as ASCII, EBCDIC and Unicode, only few literature materials provide a unified discourse on CCSs as data representation standards. This has been the trend since the publication of C.E. Mackenzie`s classic book, `Coded Character Sets, History and Development` (The Systems Programming Series Addison-Wesley Publishing Company, 1980). This monograph thus provides a present-day treatise on CCSs via a non-trivial mathematical analysis of the sets. The monograph is suitable for use as a good reference manual for an undergraduate or beginning graduate course on aspects of discrete structures dealing with CCS, and for a course on character data representation. Apart from computer scientists and computer engineers, the monograph is useful to mathematicians who are interested in practical applications of set theory and group presentation theory in computer science. ····· 1036186999
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Steganography is the art and science of hiding information such that its presence cannot be detected. This differs from cryptography, the art of secret writing, which is intended to make a message indecipherable by an unintended receiver but does not hide the existence of the secret communication. In steganography, the secret message is encoded in such a way that information s existence kept hidden from the unintended receivers. In this monogram, a new system for text steganography through Indian Languages has been proposed for secured data communication through network. The system is a collection of the implementation of some existing methods like Word shifting, Line shifting, adding open spaces and synonym replacement methods on Indian Languages and some new algorithms like deterministic and non-deterministic Feature Coding methods using Indian Scripts, Linguistic Algorithms without using probabilistic approach, Dynamic Programming Method and Greedy Approach using property of sentences for data transfer. The proposed system ensures a satisfactory data hiding capacity with high security in terms of the steganography concepts. ····· 1036186965
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book has focussed on designing high performance Network Intrusion Detection Systems models, we have presented two designs to address limitations of Packet Loss and Low Detection Rate. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switch overs between nodes in case the traffic exceeds pre-defined threshold. Comparator Logic enhances the overall efficiency by recovering lost data and analyzing it to identify threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset. ····· 1036186952
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Modeling and forecasting of network traffic data presents a number of challenges in recent paradigm due to the volatility of data. There are various methods used for forecasting time series including AR, MA, ARMA, ARIMA, Fourier transform, ANN, and fuzzy logic. Wavelets technique has attracted the attention of researchers and is a rapidly growing area of research. Using the wavelet transformation, a multiresolution representation of a traffic signal is possible which breaks the signal into its shifted and scaled versions. This breaking up of signal is used for smoothing of time series to differentiate between signal and noise. The filtered and de-noised data is then further used to search time series models as possible candidates for forecasting. These models may be standard AR, ANN or fuzzy, etc to produce forecast that best estimate the mean and variance of actual traffic. Wavelets based Seasonal autoregressive moving average model is used to forecasting network traffic load at University of Karachi s High Speed Fibre Optics LAN which supports Wireless Computing. The new forecasting strategy incredibly improves the performance. ····· 1036186921
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Now a days databased watermarking is one of the interesting research area in the field of information security.Proving ownership rights on outsourced relational databases is a crucial issue in today`s internet-based application environments and in many content distribution applications. Therefore keeping the aspect of database watermarking this book provides the idea about how to use the watermark into the database for copyright protection. Herein we propose a novel algorithm for watermarking realtional databases using the concepts of watermarking images and biometric images like fingerprint is used as a watermark in our work. The entire procedure basically comprises two steps: embedding the data into a watermark and extracting the data from the watermark. We develop a new algorithm for database watermarking which is based on a mathematical concept singular value decomposition (SVD). Proposed method performs embedding and detecting a relational database in a fingerprint watermark. Any watermarking algorithm faces several types of attacks like addition attack, deletion attack. Our proposed algorithm exhibits a robust watermarking against them. ····· 1036186883
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Changes that occur in software are usually tracked and managed through version control systems. These version control systems contain data about changes in the form of change log files. Researchers have used this data to predict number of changes for future months for particular components of software. There is a need to carry out work on prediction of change size in addition to number of changes, because change size is a very influential factor in determining project size as it can cause an increase or decrease in it. In this dissertation, we focus on prediction of change size along with number of changes for particular components and developers. This research work includes experiments for prediction of average change size and number of changes for components and developers. We used three prediction techniques (ARIMA, Double Exponential Smoothing, and Polynomial Regression) for this purpose. ····· 1036186880
für 49.00€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In digital libraries, ambiguous author names may occur due to the existence of identical names, name misspellings, pseudonyms. Disambiguating these author names is a major problem during data integration and document retrieval. In this study, we assume that an individual tends to create a distinctively coherent body of work that can hence form a single cluster containing all of his/her articles yet distinguishing them from those of everyone else with the same name. Still, we believe the information contained in a digital library may be not sufficient to allow an automatic detection of such clusters. Hence, we exploit Topic Models, extracted from Wikipedia, to enhance records metadata and use Agglomerative Clustering to disambiguate ambiguous author names by clustering together similar records, where records in different clusters are supposed to have been written by different people. ····· 1036186863
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The scientific, technological and engineering disciplines and the management techniques used for information handling and processing their applications, computers and their interaction with men and machines are associated with social, economic and cultural matters. Information provides power to find and evaluate the problems, and make decisions effectively and efficiently. Information can be identified regardless of the particulars of the physical realization. Information in one realization can be easily transferred to another form. It also helps in determining how to use technology to one advantages, learn the research process, and enhance problem solving skills. An attempt has been made in this study to identify the Information sources and services The collected data are organized and tabulated by using statistical method, tables and percentage of the paper focuses the analysis and interpretation of the data collected through questionnaire, interview and observation method. ····· 1036186712
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Information mediators are a proven technology for achieving one-stop integrated access to information in distributed, heterogeneous information sources. This book describes the work in a doctoral dissertation on optimizing performance in information mediators. Performance, particularly query response time, is an issue in such systems as data has to be retrieved from remote information sources at real-time. This dissertation proposes and validates a comprehensive solution to optimizing the performance by analyzing information source structure, mediator query distribution and source data update behavior. ····· 1036186710
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Due to the unstable, noncrystalline and insoluble nature of some proteins, the technologies such as X-ray crystallography, NMR (nuclear magnetic resonance) spectroscopy and dual polarization interferometry etc sometimes cannot produce the 3D structures of these proteins. In this condition, molecular modeling (MM) might have been the only strategy to get the 3D structures. The non-covalent interactions such as hydrogen bonding (HB), ionic interactions (SB), Van Der Waals forces (VDW), and hydrophobic packing (HP) are driving the proteins to be able to perform their biological functions. The author has found some SBs play a key role in prion diseases revealed from rabbit prion protein. Neurodegenerative diseases are amyloid fibril diseases. This book studies the HB, VDW, HP interactions for MM of amyloid fibrils in global optimization (GO). The GO MM-algorithms of this book should be very useful in materials science, drug design, IT, operations research, biostatistics and bioinformatics etc research fields. This book was written without advanced mathematical formulas thus it is easily readable for people in wide areas of sciences, engineering, IT, medicine, physiology, education,etc ····· 1036186700
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Finding dominators in a control flow graph is one of the most desirable goals in control flow analysis. The dominators can be used for finding the parts of a computer code which must unconditionally run. The dominators can be further utilized for code optimizations and detecting independent units in a code. This can be especially suitable for the code written in assembly language, which represents complex structure, mainly caused by the still widely used statement GOTO. This work describes some suitable algorithms for finding dominators and then shows their application in practice. The behavior of the algorithms is investigated on random, as well as on assembly control flow graphs. This work also discusses the contribution of the dominators for the orientation in a control flow graph and proposes some suitable solutions. ····· 1036186653
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray What is the role of mobile devices in education Mobile phone ownership has proliferated at an explosive rate over the last decade. The entrenchment of this technology in everyday life necessitates a critical examination of the roles it can play in education. A varied cross-section of case studies in mobile education was selected and analyzed with the primary aim of providing a critical landscape of mobile education and the secondary aim of extrapolating frameworks from usage patterns. Exemplar case studies were reviewed for insight into mobile education and synthesized into a framework using meta-ethnography. The framework consists of three usage categories: Accessing Learning, Enhancing Learning, and Managing Learning. ····· 1036186629
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Nowadays the largest E-commerce or E-service websites offer millions of products for sale. A Recommender system is defined as software used by such websites for recommending product items to users according to the users tastes. In this project, we develop a recommender system for a private multimedia web service company. In particular, we devise three recommendation engines using different data filtering methods named weighted-average, K-nearest neighbors, and item-based which are based on collaborative filtering techniques, which work by recording user preferences on items and by anticipating the future likes and dislikes of users by comparing the records, for prediction of user preference. To acquire proper input data for the three engines, we retrieve data from database using three data collection techniques: active filtering, passive filtering, and item-based filtering. For experimental purpose we compare prediction accuracy of those recommendation engines with the results from each engine and additionally we evaluate the performance of weighted-average method using an empirical analysis approach a methodology which was devised for verification of predictive accuracy. ····· 1036186563
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Vision is perhaps the most important sense for humans. It consists of processing images of scenes so as to make explicit what needs to be known about them. Among the different complex tasks accomplished by the Human Visual System, the tasks of representing and understanding the content of an observed scene are fundamental these tasks, indeed, allow to humans the interpretation of their surroundings. Computer vision aims to build robust and reusable vision systems that act taking into account the visual content of images and videos. Just as learning is an essential component of biological visual systems, the design of machine vision systems that learn and adapt represent an important challenge in modern computer vision research. This book focuses on some key ingredients useful to represent images for scene recognition, image retrieval and content based learning. ····· 1036186554
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Ubuntu Server Administration and Cloud Computing: Mastering Deploying Applications on Ubuntu Server. It is a step-by-step, task-oriented hands-on training guide for configuring and customizing your system. This guide assumes you have a basic understanding of your Ubuntu system. In Chapter II, you`ll learn all the required tasked covering installation, maintenance and administration. In Chapter III, you`ll be introduced on how to build and deploy your own ISP Hosting solution using EHCP on Ubuntu Server - giving you ability to start your own ISP business. Starting from Chapter IV onwards, you`ll have the privilege of learning how to build and deploy your cloud computing solutions. Chapter IV introduces you on how to Build & Deploy Desktop Personal Cloud using eyeOS Cloud Computing Operating System on Linux. Chapter V covers how to Build & Deploy a Private Cloud using OpenNebula Cloud Computing and finally you`ll learn how to Build Private Cloud with Ubuntu 11.04 Natty Eucalyptus Enterprise Cloud. ····· 1036186547· 1 · ::::: · 30 ·· 31 ·· 32 ·· 33 ·· 34 ·· 35 ·· 36 · ::::: · 47 ·