für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray La presente publicación trata temas vinculados a la `Sustentabilidad de una Red Social para el Turismo.`, basado en las necesidades del turismo, la preservación de recursos naturales y beneficios para los participantes. Como producto final se presenta un prototipo de red social planteado mediante la metodología OOHDM capaz de esbozar los procesos de análisis y diseño desde un punto de vista diferente. El objetivo es crear una red social que permita centralizar información respecto de actividades sociales y culturales en la provincia de Tucumán con conciencia sustentable evitando la proliferación de folletos callejeros que ensucian la ciudad, con beneficio extra para el turismo ya sea un empresario, visitante o nativo, que podrá obtener esta información en forma anticipada y planificar la estancia en la provincia. ····· 103611567
für 35.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray El propósito fundamental de esta obra es proponer estrategias basadas en el enfoque de aprendizaje dialógico interactivo para promocionar la Literatura Falconiana en estudiantes del octavo semestre de Educación Lengua, Literatura y Latín de la Universidad Nacional Experimental Francisco de Miranda, en Coro, Estado Falcón, Venezuela. Con la presente publicación se aspira a señalar los alcances del uso de las estrategias basadas en el enfoque dialógico e interactivo para la promoción de la literatura falconiana en los estudiantes universitarios de la UNEFM, haciendo un diagnóstico del proceso de promoción de escritores noveles en el desarrollo de la Unidad Curricular de Literatura Falconiana, y proponer unas estrategias basadas en el enfoque dialógico e interactivo para la promoción de las obras de José Barroso, Lydda Franco Farías, Raquel Tirado y Darío Medina. ····· 103611293
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Diversos observadores económicos y tecnológicos coinciden en que el futuro de los sistemas informáticos empresariales consiste en la automatización completa de sus procesos de negocios. Así es que el éxito de esas organizaciones radica en buena parte en las herramientas utilizadas para gestionar dichos procesos. Esto ha llevado a que los sistemas de Workflow y de Gestión de Procesos de Negocios (BPM) hayan tenido un crecimiento sostenido en los últimos años, motivando el volcado de gran parte del conocimiento necesario para que las organizaciones funcionen y realicen sus objetivos, en los procesos de negocios. Éstos, de estar automatizados, constituyen una valiosísima biblioteca de conocimiento irremplazable. En este trabajo se proponen herramientas y metodologías para gestionar y aprovechar ese conocimiento, optimizando el rendimiento de las organizaciones. ····· 103611255
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Disease surveillance is an ongoing process involving the systematic collection, analysis, interpretation and dissemination of health data. This requires the collection and analysis of varied and relatively large amounts of data, from and about the locations where diseases and related health problems occur and from where patients present themselves, typically in urban and rural health centres and hospitals. The quality of data and its transformation into information are basic to the efficiency and effectiveness of all information systems. The web-based data entry system for disease surveillance is a reporting tool to be used by all disease surveillance centres (health facilities) in reporting cases to sub-district, district, regional and national levels. It is a web technology which shall send the data to a central database server. The application will provide web-based data screens for data entry. With a web-based data entry system, data can be entered anywhere in the country and this will be sent to the remote database server at the National Disease Surveillance Department. The system will provide web screens for the entry, management and querying of core demographic and diseases. ····· 103611213
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Due to the breakthrough of advanced technology, namely digital signal processing including all kinds of digital media and the Internet, a vast field has been opened up for steganographic purposes, wherein, a digitized data often includes redundant and unnoticed data spaces that can be manipulated to hide messages. Thus, the art of hiding information without being detected by unauthorized person(s) came to the fore. The efficiency of this process was measured by the ability of embedding hidden data in a certain image without causing any kind of image degradation and altering the redundant bits of an object without the alteration being detected easily. To achieve this, the book proposes a more secure algorithm which aims to reduce the number of changes happened to the Least Significant Bits of the image binary representation when a maximum text data is being embedded into the image. As a result, the number of distortions of our proposed algorithm becomes lower than that of the traditional LSB algorithm when we embed a maximum text data in the image, which makes our proposed technique more efficient and secure than the traditional LSB technique. ····· 103611207
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This thesis describes implementation of an Advanced Encryption Standard (AES) Smart Card, a highly tamper resistant to Side Channel Attacks. Smart Cards are gaining popularity in applications that require high security and store sensitive information. Modern smart Cards, highly capable of complicated cryptography, provide a high assurance of tamper resistance and thus commonly used in payment application. However, advanced Smart Cards can not protect attackers from being defrauded by different side channel attacks (DSCA). Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to side channel Attacks (SCAs) The development of such attacks describes how to perform different kinds of side channel Attack on an AES implementation by using simulated power traces. Working in a simulated environment brings relevant advantages,e.g., eventual weakness to Differential power Attack(DPA) may be detected at device designing phase,so that satisfactory countermeasures can be adopted before the physical realization. The security prevention from such corresponding attacks is a randomized masking technique for implementing in software and hardware,which has been discussed here ····· 103611182
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This study concerned the extent of adoption of internet banking and the factors affecting the adoption rate of internet banking services amongst the corporate customers of banks in Kenya. The need for the study arose in view of the increase in trends towards the adoption of internet banking. The study had two objectives namely to determine the extent of adoption of internet banking by corporate customers of the banks and to determine the factors that affect corporate customers adoption of internet banking in Kenya. The action taken by bankers and policy makers in appropriately addressing critical issues will determine the success of Internet banking. The respondents were selected using stratified and judgmental sampling. The respondents were the Finance Managers, ICT managers and General Managers and middle level management staff of the organizations respondents who were believed to have the knowledge required for the study.In view of the findings, several recommendations were made which may be useful for bankers and other related organizations. Banks should make their customers more aware of their new internet banking products and services, to encourage higher adoption. ····· 103611177
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book shows how one can model a system in object orientation. It can be referenced by other students who are pursuing a Computing Course along the same lines. Its not perfect but gives You an idea of modeling from the initial stages. Its well done and enjoyable to read and helps You grasp Object Oriented Modeling at a practical level. ····· 103611146
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Radio Frequency Identification (RFID) is a modern wireless communication technology used for identification purposes. It has recently become very popular in a number of application fields: logistics, retail, payments, tracking, avionics, health care, etc. The reasons of this growth can be found in the increasing reliability of systems, the need in modern industries for automation without manual interaction, and the decreasing costs of RFID infrastructures and tags. Based on long-range communication links, UHF systems actually represent the most promising technology, potentially suitable for thousands of applications in the already quoted fields. In order to regulate and speed this growth, the world s largest retailers and supply chain operators have defined the first worldwide UHF RFID technology standard: Electronic Product Code (EPC) Global standard. As expected, the standard has simplified and raised the development of UHF RFID applications, although a several critical issues are still open. In this book, RFID systems have been studied to understand their behavior in critical conditions, minimize effects and improve efficiency. ····· 103611137
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In recent years, educators have witnessed the rapid development of computer networks, dramatic improvements in the processing power of personal computers, and striking advances in magnetic storage technology. These developments have made the computer a dynamic force in distance education, providing a new and interactive means of overcoming time and distance to reach learners (Wagschal, 1998). A primary goal in studying a new medium of communication for educational delivery must be the identification of its impact on learning (Hiltz, 1993). In 1997, large leading-edge firms delivered 21% of their training via learning technologies, with 70% as instructor-led courses. By the year 2002, the percentage of training time delivered by learning technologies such as the Internet and Web-Based Learning (WBL) is projected to grow much higher (Bassi & Van Buren, 1998). Web-Based Learning (WBL) is defined as individualized instruction delivered over public (Internet) or private (Intranet) computer networks. WBL is also referred to as online learning and the virtual classroom.According to Lovelace (1999) there are two types of WBL: asynchronous, or self-paced, and synchronous,or instructor-led ····· 103611100
für 64.71€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In the area of generic data security and privacy, there exists well established encryption system, but within the area of video security still there is need to evolve provable model of security. Various video encryption schemes based on `symmetric encryption` have been proposed, so far, but these techniques lacks rigorous and provable model of security, hence their efficiency degraded significantly when scaled to real life applications. Asymmetric Cryptosystems basically works on the principle of `Trapdoor one way functions` , which consume CPU power significantly results in slow speed of AE. Therefore, AE is never considered `good` for video encryption. Real time processing is the foremost need of video applications, therefore, in the area of Video Security, possibility of `Asymmetric Encryption` is still unexplored due to its slow speed. This book explores a way, to use computationally intensive `Trapdoor One Way` mathematical functions efficiently in the area of video security. ····· 103611085
für 58.41€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. New cryptographic algorithms need to be designed considering the probable future developments while working on their designs, as continuous improvements in computer processing power have increased the scope of brute-force attacks. Thus we may have to think about increasing the key lengths and block lengths. There are mainly two types of crypto-systems, namely, symmetric crypto-systems and public crypto-systems. ····· 103611070
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book discusses the evolution of computer from the first generation up to the present generation. It also delved deeply on computer viruses, the maintenance of computer, hardware and software troubleshooting of computer system. An expert system was designed to cater for the easy access to the solution of the troubleshooting performed on the computer system. This book is recommended to computer students, computer technicians and individuals who just want to have deeper knowledge of computer science as a course and as a guide to easy diagnoses and solution to the common problems being encountering everyday as pertaining to our computer system. ····· 103611026
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The study is part of a broader effort from IBM in the area of Risk Communication, and took place under the supervision of a team of researchers from the IBM Dublin and Watson research centres. Building on top of the most recent visualisation research, it proposes and evaluates a series of visualisation techniques applied to medicine side effects communication. The novelty and the formal correctness of the study are guaranteed by an extensive literature survey conducted by the authors. Special care has also been devoted to survey preparation, to ensure understandability and non-ambiguity of the questions, and to remove any possible bias. This work has been presented to a broader audience within IBM as part of the internship, receiving very positive feedback. The future plans are for IBM to extend and adapt the study to target specific conferences in the Healthcare and Risk Communication domains. ····· 103611023
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Man has stood up to many challenges posed by nature over the ages and delved into the depths of the problems to analyse and solve them. It is in human nature to improvise and simplify. The basic philosophy of science and technology is to reduce complexities. Herein lay our motivation for developing a system which combines the fundamentals of the scientific techniques with the ease that is the hallmark of any automated technology. A simple automated information system, capable of addressing the information needs of a novice user looking up an issue, is of value and worth researching. And the issue that is at the centre of discussion in this work is automated landslide hazard zonation (LHZ). An approach comprising combination of existing techniques through an intelligent interface might just answer the queries in a simple way albeit with a tradeoff somewhere. Although it is not a replacement of advanced LHZ techniques in its present form, but is a viable alternative. The work sets out to try and address all these concerns, picking up the trails left by experts, the ultimate goal achieved being to help society in better sustaining itself. ····· 10361956
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The current development in information and communication technologies have impacted all sectors in our daily life where does not matter whether it is technical or routine. To ensure effective working of information security, various controls and measures had been implemented like the current policies and guidelines between computer developers. However, lack of proper computer ethics within information security is affecting educational society day by day. In today`s life it is an undeniable issue about the effects of ethics in our routine and technological life. Even though, engineer, technician, student or undemanding user, are connecting to internet from moment to moment but still they may not be aware of computer ethics that has become somewhat of a cottage industry recently in this era. ····· 10361935
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Update Vehicle Traffic Routing Using Ant Colony Optimization Algorithm is to implement the solution of combinatorial problem, based on the heuristic behavior of ant. This paper focuses on a highly developed solution procedure using ACO algorithm. This helps to solve routing problems easily. It also reflects the method considering flow, distance, cost, and emergency etc. Here, a new algorithm named UVTR (Update Vehicle Traffic Routing) is represented to overcome the complexity of the previous algorithm. It yields the typical process for removing traffic problems in case of flow, distance, cost etc. This formulation is represented with systematic rules based case study for the Dhaka City. ····· 10361928
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Now, in the beginning of twenty first century which is called `information century ` this work, intends to investigate the most important feature of this era that is `data`. Early days, when man had not been developed by the means of communication, in order to survive, he was in need of some information about the world around him to find food and shelter that information in broader initiatives and more serious concept can be called as data, today. During the years, man has analyzed and segmented the data (even written document) differently, according to the needs (daily) and precedence of the work in various frames, to keep them secure, and not to be accessed by unauthorized persons. The frame could be a file, directory, safe, locker etc., but the most important aspect of it, was the security and safety, i.e. not to be changed with other things or used by anyone and availability of deposit(s), whenever needed. ····· 10361920
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Because of the variety in mobile operating systems for smart phones, apps that target more than one platform are truly `in` today, so you as the developer need to find the best way to develop cross-platform apps, without emptying up all your resources on developing for just a couple of platforms at one time. Fortunately there are some really great multi-platform developer tools, using which you can easily achieve your aim. One of the earlier attempts, which I examined in this work, was from Adobe and targets on iPhone. Apps are first created as Flash applications and then converted to native iPhone apps. ····· 10361852
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Innovations in information and communication technologies are revolutionizing creation, recording, organization, dissemination, use and archival of knowledge continuously and at an unprecedented pace. The role of information centers and libraries is changing to match the volume, and format of creation of scholarship and its users ever rising expectations. Library and information professionals vision, skills and attitudes are challenged in this information driven society. There has been dearth of evidences regarding librarians attitudes towards adoption of latest technologies to innovate information centers and libraries, especially in developing countries like Pakistan. Based on empirical evidences this books provides insights into the level of availability and use of information technologies in libraries and the role of librarians in innovating their operations and services to facilitate the end users. Educators, university planners, administrators, information professionals, librarians, people from software, hardware, communication and publishing industry will find answers to their questions through factual data, tables and a model to enhance the use of IT in libraries. ····· 10361837
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Knowledge management has become a new concept and an important aspect for business.This book is about making a knowledge management strategy for a chemical lab called Buckman Laboratories.The analysis has been done by using several knowledge management theories.After the analysis, some suggestions have been given for the company and tried to formulate and implement recommended knowledge management strategy for Buckman Laboratories.This book is expected to create a significant contribution to the areas within a domain of Knowledge Management in the business organization. ····· 10361801
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book focuses on improvement of participative system dynamics modeling design through integration of system dynamics and participatory action research. This followed insight from the system dynamics community that modeling process outcomes are often more important than the resulting model. The emerging integrated approach, also, referred to as SyDPAR, was evaluated against rigour and relevance criteria for information systems methodologies, making it not only an original aspect but a useful outcome. The SyDPAR approach recognises the contributions as well as benefits of clients/practitioners in participative modelling using three cycles: problem articulation, modelling proficiency, and solution refinement. In addition, it provides a general modelling framework that extends participative modelling outcomes beyond the prevalent individual, group, and organisational outcomes, culminating into contributions to the system dynamics knowledge base and system change by modellers and clients respectively. Fundamental to this book is the application of SyDPAR to higher education quality management problem area, leading to the development of a quality management tool 2009 (QMT09). ····· 10361779
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In Mobile agent system, security issues are a major problem. Mobile agents are autonomous software entity when a mobile agent works in the host environment some security problem raises, it can suspend its execution in one host and resume its execution in another host. When mobile agent resume its execution, it can loss some of its important data. Mobile agent have their personal information like, internal code, state and password. ····· 10361776
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray People are social beings, so it is important that understanding of peoples approach and ways of thinking is significantly important while you are designing for them. Relationships between people and technologies and environment that they participate are subject to research in order to determine how their brain functions, how language and other elements affect their understanding and cognition. Of course, there are some important points to cover while researching on human-computer-interaction. Some benefits of usability research would be listed as understanding peoples approaches to the context, importance of the current scores, expected improvement areas, expected computing improvements, focus areas that needs to be improvement, features that works and don t, and user performance. In this book, readers will find research methods including usability, issues in usability, human-computer interaction, and designin for spesific user groups. ····· 10361766· 1 · ::::: · 40 ·· 41 ·· 42 ·· 43 ·· 44 ·· 45 ·· 46 · ::::: · 47 ·