für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray In Mobile agent system, security issues are a major problem. Mobile agents are autonomous software entity when a mobile agent works in the host environment some security problem raises, it can suspend its execution in one host and resume its execution in another host. When mobile agent resume its execution, it can loss some of its important data. Mobile agent have their personal information like, internal code, state and password. ····· 10361776
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray People are social beings, so it is important that understanding of peoples approach and ways of thinking is significantly important while you are designing for them. Relationships between people and technologies and environment that they participate are subject to research in order to determine how their brain functions, how language and other elements affect their understanding and cognition. Of course, there are some important points to cover while researching on human-computer-interaction. Some benefits of usability research would be listed as understanding peoples approaches to the context, importance of the current scores, expected improvement areas, expected computing improvements, focus areas that needs to be improvement, features that works and don t, and user performance. In this book, readers will find research methods including usability, issues in usability, human-computer interaction, and designin for spesific user groups. ····· 10361766
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This study focused on developing and evaluating an open source software (OSS) network laboratory and curriculum for information technology (IT) program students. A review of literature revealed that to date there have been very few published studies on the development of the labs with clear and specific learning outcomes mapping the Institute for Electrical and Electronic Engineers (IEEE) and Association of Computing Machinery (ACM) IT computing curriculum recommendations. In addition, very few efforts have been taken to develop the lab and curriculum by using instructional design and learning theory from a pedagogical perspective. The goals of the research were to (a) analyze current computer networking education in the higher education system and the IEEE/ACM IT computing curriculum recommendation, (b) map the labs to the learning outcomes recommended by IEEE/ACM IT computing curriculum, (c) create and implement the OSS-based network laboratory and curriculum, and (d) evaluate the effectiveness of the laboratory and curriculum. The dissertation followed a developmental research model for the development of the lab and curriculum. ····· 10361711
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The character recognition process is implemented in the two stages. They are learning stage and testing stage. In learning stage, the following steps are considered. These are Scanned Character by scanner, Pre-processing, Feature Extraction, Training and a set of processed character. At first, the character to be recognized is scanned through a scanner and thus the character becomes a bitmap image. Then the boundary region of the saved image I is extracted. The feature of the scaled image is extracted and converted into an m x n matrix, which is reduced to very small matrix such as 16 X 16 using by matlab imresize scaling function. The feature matrix is then fed to the multilayer feedforward Neural Network. The testing stage includes Scanned Character, Pre-processing, Feature Extraction, Classification and Classified Character. In the phase of Classification, the selected features have been contained enough information within it to identity each character class uniquely. At the last phase, each unknown characters are tested through the experimental extracted features of character. The Bangla Banjonborno and Sorborno characters have been chosen to test the recognition System. ····· 10361647
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Employee retention is a process in which the employees are encouraged to remain with the organization for the maximum period of time or until the completion of the project. Employees today are different. They are not the ones who don t have good opportunities in hand. As soon as they feel dissatisfied with the current employer or the job, they switch over to the next job Compensation constitutes the largest part of the employee retention process. The employees always have high expectations regarding their compensation packages. Compensation includes salary and wages, bonuses, benefits, prerequisites, stock options, bonuses, vacations, etc. The researcher has undertaken a survey with the help of Questionnaire, among 360 respondents using convenience-sampling methods to determine the employee perception of retention in Information Technology Industry.It can be seen that out of 360 respondents 293 (83.33%) are males and the other 67 (16.67%) are females. Thus majority of the respondents are male. It is clear that out of 360 respondents, 106(29%) are between 18 to 25 years of age, 184 (51%) are between 26 to 40 years of age and 70 (20%) are 41 and above years of age group. ····· 10361642
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This book originally grew out of our research in the field of spatial data analysis using clustering techniques. Data analysis becomes quite challenging when several variables are involved. This book deals with various types of clustering techniques and their applications, specially in the field of spatial data analysis in order to find interesting patterns. We have started our book by an introduction to the field of data mining and given special emphasis on cluster analysis which is a task in data mining. Our aim is to impart the knowledge necessary for making proper interpretations, selecting appropriate techniques, understanding their strengths and weaknesses and making it understandable to the readers. ····· 10361635
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This research book aims is to establish that: a transaction graph leads to better understanding of the concepts and relations in transactions and their semantics within enterprise architecture. Enterprise architecture comprises of complex transactional information systems that carry out repetitive and bespoke business transactions to meet business goals. When enterprise systems transact with each other there needs to be an exchange of meaning through transactions, so that agent A has the same conceptual understanding as agent B in the business transaction. If we accept that agents may not use the same terms to mean the same things, we need a way to discover what another agent means when it transacts. Conceptual Graphs are used to capture and to model business transactions and their semantics within enterprise architecture. Using case studies in a health domain and a financial domain this research investigates and develops an approach and design artefacts for the specification of semantics in transactions within enterprise architecture. Model automation is used to provide both accurate semantic and syntactic refinement, aiding the designer to capture semantics through ontology. ····· 10361633
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray As temporal data are of growing importance hence require to support new trends for filtering and smoothing. The main goal of this work is to explore new smoothing techniques like wavelet filters in place of traditional moving averages and regression methods, etc for temporal data for further decision making processes like forecasting, similarities search and clustering. Temporal applications are increasingly popular methods for studying a wide range of databases including sensor, weather, stock exchange, seismic and atomic, etc. Time series, a common form of temporal data, are mostly contaminated with noise and outliers. The direct operation and analysis on these types of raw data, may easily lead to wrong decisions. The selection of appropriate smoothing techniques is the pivotal point to reach to the correct conclusions. In this work, the main task has been to select the best possible smoothing technique for selection of features of time series to perform various tasks. ····· 10361608
für 55.71€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray This research work proposed a framework for building efficient portfolio management using clustering of Nifty financial data through intelligent agents. The framework uses various kinds of agents, i.e. user agent, clustering agent, ranking agent, validation agent, and portfolio manager to automate portfolio management task. The user agent interacts with users and accepts user investment. Then ranking agent assigns weights to attributes and higher weighted attributes are selected for the data mining task. Clustering agents for each clustering algorithm helped to detect clusters automatically from financial data by sending a request to data agents which collects necessary financial data required for clustering task. This research work used only centroid based clustering algorithms. The clustering agents sent cluster result to a validation agent which validates clustering results. The validity of the clustering result is based on similarity and dissimilarity measure. The performance analysis of three clustering algorithm was evaluated using intra-class inertia which finds the best clustering algorithm. ····· 10361579
····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The growth of applications over the network where user needs system to system interaction, created the need for a structure which provided interaction not only with the user but also help application to application interaction. This problem has a common name of Application Integration. It can be resolved using Service Oriented Architecture, Enterprise Applications and Web Services.But it is a clear observation that the world is a global village and the numbers of services on the web are increasing day byday. Because of this increasing number, a problem is raised to find an appropriate web service which satisfies user needs. The user wants an efficient way to find an appropriate web service which satisfied his needs in a short time.in this book we describe an efficient technique to find appropriate web services but still it does not cover all semantic web search because it does nnot incorporate all techniques used before this for seaarching of seamantic web services. ····· 10361553
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Modelling real-life systems and phenomena using mathematical based formalisms is ubiquitous in science and engineering. The reason is that mathematics o er a suitable framework to carry out formal and rigorous analysis of these systems. For instance, in software engineering, formal methods are among the most e cient tools to identify aws in software. The behavior of many real-life systems is inherently stochastic which require stochastic models such as labelled Markov processes (LMPs), Markov decision processes (MDPs), predictive state representations (PSRs), etc. This thesis is about quantifying the di erence between stochastic systems. The important point of the thesis is that reinforcement learning (RL), a branch of arti cial intelligence particularly e cient in presence of uncertainty, can be used to quantify e ciently the divergence between stochastic systems. The key idea is to de ne an MDP out of the systems to be compared and then to interpret the optimal value of the MDP as the divergence between them. The most appealing feature of the proposed approach is that it does not rely on the knowledge of the internal structure of the systems. ····· 10361507
für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The effective use and adoption of IT has the potential to deliver significant benefits to the developing countries. Despite of low level economic development, lack of infrastructure and long political instability, Nepal has been trying to prove its capability and aims to place itself in global IT map. Widened digital divide, brain drain, cost of IT infrastructure, power outage and insufficient connectivity infrastructures has always been felt as the challenges in IT adoption in the country. Beside that, increasing software piracy, lack of systematic framework for IT adoption leads to chaotic and uneven distribution of IT infrastructure in the country. This dissertation is based on the study and evaluation of IT scenario and adoption frameworks from various countries. It delivers the framework for efficacious IT adoption in countries like Nepal with the implementation of Open Technologies. Beside that, the thesis also suggests the roles and activities that must be carried out for making the investment in IT fruitful and how the building up of local expert pool and knowledgebase will help the country to be self reliable and reduces dependency on foreign proprietary software. ····· 10361384
für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Testing of database-intensive applications has unique challenges that stem from hidden dependencies, subtle differences in data semantics, target database schemes, and implicit business rules. These challenges become even more difficult when the application involves integrated and heterogeneous databases or confidential data. Proper test-data that simulate real-world data problems are critical to achieving reasonable quality benchmarks for functional input-validation, load, performance, and stress testing. In general, techniques for creating test-data fall in two broad areas, namely, test-data generation and test-data extraction, that differ significantly in their basic approach, run-time performance, and the types of data they create. Test-data generation relies on generation rules, grammars, and pre-defined domains to create data from scratch. Test-data extraction takes sample data from existing production databases and manipulates that data for testing purposes, while trying to maintain the natural characteristics of the data. This title provides novel test-data extraction techniques and compares it with competing test-data generation. ····· 10361368
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The Java Modeling Language (JML) is a formal interface specification language designed for Java. It was developed with the aim of improving the functional software correctness of Java applications. JML has a rich set of features for specifying Java applications, including abstract specifications, method and type specifications, and multiple inheritance specifications. The current JML compiler (jmlc) does not work properly when applied to Java dialects such as Java ME. The instrumented code generated by the original JML compiler uses the Java reflection mechanism and data structures not supported by Java ME platform. In order to overcome this limitation, our new JML compiler --- ajmlc (AspectJ JML Compiler) --- uses AspectJ to instrument Java code with JML contracts. A set of translation rules are defined from JML contracts into AspectJ program code. The result is a code compliant with both Java SE and Java ME applications. The translation rules handle a number of JML specifications, such as pre-, postconditions, and invariants. This book also includes proofs of concept to compare the size of the final code generated by our compiler with the code size produced by the jmlc compiler. ····· 10361358
für 33.21€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Every secure system has the possibility to fail. Therefore, extra effort should be taken to protect these systems. Intrusion detection systems (IDSs) had been proposed with the aim of providing extra protection to security systems. IDS is a powerful computer security system used to secure the computer environments. These systems trigger thousands of alerts per day, which prompt security analysts to verify each alert for relevance and severity based on an aggregation and correlation criterion. This Book presents a new IDS Alerts Management System IDSAMS) which is a parallel system used to manage the IDS alerts, reduce the false positive by aggregating and correlating the IDS alerts to give full understanding of the network attacks as well as easing the process for the analysts and save their time. IDS Alerts management system is a standalone system which can work based on real alerts from an online data or offline data as full a Forensic Investigation System. ····· 10361327
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray A text-to-speech (TTS) synthesis system converts natural language text into speech. However, written text of a language contains both standard words (SWs) and non-standard words (NSWs) like numbers, abbreviations, synonyms, currency, and dates. These NSWs cannot be detected by an application of letter-to-sound rule.This work try to produce Amharic TTS system, which handle both standard words(SWs) and Non-standard words (NSWs) of Amharic language. The model described in this work has two major parts: Natural language processing (NLP) and Digital signal processing (DSP). The NLP handles the text analysis (transcription of the input SWs and NSWs) and extraction of the speech parameters. The DSP further enable to generate the artificial speech. Finally, the performance of the system shows that on the average 73.35% words both SWs and NSWs correctly pronounced. In addition, an assessment of intelligibility and naturalness of synthesized speech using MOS testing techniques results a score of 3 and 2.83, respectively.The experiment shows a promising result to design an applicable system that synthesis both SWs and NSWs for unrestricted text of a language. ····· 10361313
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Legacy system refers to an existing system that has been developed in the past and running critical business processes within a company. It could also be considered as the core of the company`s system architecture that has significant business value. Therefore this valuable asset must be highly considered in the adaption to SOA. However, not in all cases the company can migrate the legacy system to SOA successfully. The migration process depends on some factors which vary from one legacy infrastructure and series of business processes to another. There is no easy way to transform the existing legacy assets. The fact that considering the right factors to reach legacy system migration success in a specific company is the key value. Therefore, we studied these factors from both business and technical perspectives. In this book, we studied and shared experiences about the factors influencing success of migrating the legacy system into SOA in five different case companies with different expertise including bank, airline, engineering and furniture companies. This book should help the researchers or the readers who are interested in the service-oriented architecture system. ····· 10361201
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray The estimation of the software cost remains one of the most challenging problems in software engineering as a preliminary estimate of cost includes many elements of uncertainty. Reliable and early estimates are difficult to obtain because of the lack of the detailed information about the future system at an early stage. However, the early estimates are really important when bidding for a contract or determining whether a project is feasible in terms of cost-benefit analysis. Estimators often rely on their past experiences for the prediction of effort for software projects. In this Book, we discussed a software cost estimation tool that helps commercial software-development organizations to effectively and quantitatively measure and analyze the software metrics based upon the functional requirements, operational constraints and organization s capability to handle a project. The new cost estimation method is proposed for the iterative software development projects. ····· 10361147
für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray To achieve alignment between business and IT has become a daunting task for organizations due to rapid changes in business environment and lack of IT support. Organizations usually strive to bridge the gap by implementing business and IT strategies (i.e. top-down planning) and tend to ignore other aspects of the co-evolution. The co-evolution between business and IT is not restricted to a level but it occurs at all levels and therefore, it is necessary to understand and study co-evolution at all levels within organizations. This book presents a co-evolutionary framework that helps to study and understand the co-evolution at three levels i.e. strategic level, operational level and individual level in an integrated fashion. The three levels need to co-evolve so that all components at each level co-evolve. This framework will speed up the alignment in organizations. A K-mediator (i.e. knowledge mediator) has been used in the proposed co-evolutionary framework that facilitates the co-evolution at each level. Finally the book presents a case study in financial domain in order to evaluate and validated the framework. ····· 1036185
für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray Shoppers Avenue is a project which aims to create a digital ecosystem, enabling social interaction with an intuitive design and interface, promoting trade in an all-in-one commercial hub. This means that apart from the traditional eCommerce medium of transactions and product delivery, this system encourages customer-to-customer instant interaction and product discussions. Tools such as Adobe Integrated Run Time 2.0 SDK, Adobe Flash CS4, PhP and MySQL on a programming level and a physical touch enabled table was used to to enhance the experience. ····· 1036179· 1 · ::::: · 40 ·· 41 ·· 42 ·· 43 ·· 44 ·· 45 ·· 46 · ::::: · 47 ·