AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 38 ·· 39 ·· 40 ·· 41 ·· 42 ·· 43 ·· 44 · ::::: · 47 ·

Integrated Web Application of Bioinformatics for Format Conversions

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This project aims at developing a tool for bioinformatics data to be available on one platform by using all types of formats conversion tools. This tool is more convenient to bioinformaticians,researchers and academic students as they do not have to search different databases for formats. By using this web tool on one platform they get the information about the databases, formats and available tools.This web tool is generally seen as a means to control the flow of data and show of information online but is also an invaluable tool to implementing and maintaining accessibility of this web tool.It allows administrator to easily customize their web tool as per requirement. It is easy to operate and can even be operated by non technical.In future these kinds of web tools will help bioinformaticians and researchers to handle large amount of data on one platform. ····· 1036120320

Multimodal Fusion of Iris and Fingerprint

für 49.41€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Biometrics systems perform authentication based on human body features, systems based on only one kind of biometric trait are generally called as unimodal biometric systems. The performance and scalability of a biometric system can be increased by combining more than one biometric trait. Such systems are called as multimodal biometric systems. Being less intrusive and universal fingerprint based systems serve as good option for access control and surveillance. Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes Fingerprint & Iris recognition systems unavoidable in emerging security & authentication mechanisms. This book is focusing on a multimodal implementation of Fingerprint & Iris. Fingerprint and Iris features are extracted using multilevel decomposition of captured image data using a new family of wavelet called Hybrid Wavelet type-I and type-II. Feature vector of iris and fingerprint are combined using decision fusion technique and their performance is studied here. ····· 1036120308

Analyzing the usage of open source products for SOA

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Service Oriented Architecture (SOA) is rapidly becoming the new standard for today s enterprise. SOA can enable great agility, productivity and cost savings, but not if it is implemented with complex, closed and expensive enterprise platforms. The best way is to implement it in Simpler, Open and Affordable manner. The main purpose of this thesis is to identify some of the core characteristics of SOA and explain how they are manifested in actual technologies that can be used in a cost effective way in an enterprise. ····· 1036120296

Stock Market Pattern Recognition Algorithm

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Data mining is the process of extracting patterns from data. Stock Market Pattern recognition is a very active research area which overlaps with various other research fields such as Machine Learning,Data Mining, Probability Theory, Algebra and Calculus. In recent years the concept of data mining has emerged as one of them. The main focus of the experiment is on the mining algorithms to analyze a much accurate and efficient algorithm. Data mining is becoming an increasingly important tool to transform these data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery. Time series is used for prediction for value. Different classifier method has been analyzed. First, in this project we are interested in the comparison of the quality of different mining algorithms.Data mining can be defined as an activity that extracts some new nontrivial information contained in large databases. ····· 1036120248

3-D Surface Reconstruction in Spatial Frequency Domain

für 64.71€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The multiple view geometry in computer vision includes 3-D image and 3-D video processing techniques have received increasing interest due to the availability of high-end capturing, processing and rendering devices. Computer vision can define as a set of computational techniques aimed at estimating or making explicit the geometric and dynamic properties of the 3-D world from digital images. The 3-D world is projected onto 2-D acquisition surfaces. During this process, depth information can be lost. Furthermore, the classical 3-D measurement procedures based on photogrammetric causes systematic errors at strong curved surfaces or steps in surfaces (depth discontinuities problem). The challenges arise also from the foreshortening in one view of the stereo images, that occurs when the measured object have depth variation with the direction of the baseline. we demonstrate a theory of modeling the physical effects of perspective distortion in stereo vision systems. The proposed model is based on local spatial frequency representation and phase-difference-based technique as a widespread method for depth and optical flow estimation due to its superior performance. ····· 1036120241

Mathematical models of time series

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Dissertation thesis is dedicated to elaboration of elements of mathematical software for dealing information systems realizing the procedure of forecasting models construction based on analysis of statistic properties of dynamic series. Mathematical forecasting model of stochastic dynamic series with the consideration of a forecast error, synthesized based on the research of methods of exponential smoothing and their modifications, autoregress integral moving average (ARIMA) and under conditions of disturbing factors has been received in the dissertation for the first time. For the first time, mathematical forecasting models have been obtained for foreign exchange currency rates for increasing and declining portions of the temporary series with the assistance of NN, which together with the results of the technical analysis decreased the value of market risks. Scientific results, received in the dissertation theses are practically applied in scientifically research institute NIPI ASU TRANSGAZ and at the Kharkiv Forex-Club, as well as when developing mathematical software for automatic control systems (ACS) for many subject fields. ····· 1036120214

Insight into Data Preprocessing: Theory and Practice

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In real world datasets, lots of redundant and conflicting data exists. The performance of a classification algorithm in data mining is greatly affected by noisy information (i.e. redundant and conflicting data). These arameters not only increase the cost of mining process, but also degrade the detection performance of the classifiers. They have to be removed to increase the efficiency and accuracy of the classifiers. This process is called as the tuning of the dataset.Insight into Data pre-processing: Theory and Practice is the master reference that practitioners and researchers have long been seeking. It is also the obvious choice for academic and industry people.Features-1.Provides in-depth, practical coverage of essential data preprocessing topics, including data cleaning, integration, transformation, reduction and discretization. 2.Addresses the method to deals with redundant and conflicting pattern. ····· 1036120178

Generatory sluchajnyh chisel. Matematicheskaya teoriya

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Kniga posvyashhena teoreticheskim osnovam postroeniya fizicheskih generatorov sluchajnyh chisel. Takie generatory yavlyajutsya sostavnoj chast`ju sistem informacionnoj bezopasnosti, a takzhe primenyajutsya pri reshenii zadach metodami Monte-Karlo. Naryadu s klassicheskimi rezul`tatami privedeny novye shemy generatorov, osnovannye na robote kombinacionnoj shemy v neshtatnom rezhime. V chastnosti, pokazana vozmozhnost` primeneniya shem, rabotajushhih v trehznachnoj logike, dlya ukazannyh celej. Postroeny matematicheskie modeli rassmatrivaemyh shem. Kniga budet poleznoj dlya studentov starshih kursov, interesujushhihsya tematikoj, i dlya inzhenerov, zanimajushhihsya sozdaniem generatorov. ····· 1036120118

Notch based Face Detection and Facial Feature Localization

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
At present, the model of computer machine is something that is placed at the corner of the room because it is deaf, dumb and blind as well as unaware of the surrounding environment. The most interactive entity with computers is human beings. Imagine a machine that can detect the presence of human being by detecting human face and follows it during the interaction process (tracking). The demand to implement this scenario is to come up with a technique that responds in real time and able to detect the face under varying scale, translation and rotation transformation with facial feature localized. This book discusses in detail the real time implementation of face detection/tracking, face/non-face classification and facial feature localization in video sequence that is invariant to scale, translation, and rotation transformation. ····· 1036120092

Integrated Criminal Justice Information System (ICJIS)

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Both Nicholas Jjuuko as an Msc Information Systems Student and Joseph Othieno as a lecturer and Research Coordinator at the Department of Computer Science and Information Systems in Uganda Martyrs University handily compiled this book showcasing the current and available records management systems in developing countries particularly looking at Uganda hence proposing an automated system. Using a practical, case-oriented approach, this comprehensive report provides real solutions to Information Systems making it an indispensable reference to professionals doing related projects and other academic researchers. It focuses on a wide range of features which include the background of the study, problem of statement, general and specific objectives of the study,scope and the Conceptual framework for the ICJIS.Reviewing literature on how information systems have been implemented in other countries. Research methodology explicitly looks at the tools and techniques used in data collection, developing conceptual, logical and physical designs. It also critically analyses the current records management systems and comes up with a practical approach to design and implement a proposed system. ····· 1036120058

HIT Diffusion Patterns by Hospitals

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This study, positioned at the macro level, draws upon research in the adoption and diffusion of technology to examine factors influencing Health Information Technology (HIT) diffusion in hospitals. The study focuses on a range of HIT applications that have clinical, administrative and strategic functions. I theorized that the HIT adoption is driven by the combination of technological, organizational, financial, and environmental factors. The study results indicate that adoption of HIT has accelerated in the last few years and HIT adoption in its current form is not necessarily driven by organizational, financial or environmental characteristics of a given hospital. With the passage of time, the importance of hospital characteristics in terms of HIT adoption is diminishing particularly for the long-existing HIT applications. More and more hospitals are adopting a growing number of various HIT applications and we might have reached a juncture where the adoption and diffusion of HIT applications in its current form is just a matter of time for all hospitals. ····· 1036120047

Successful Determinants for Business Intelligence (BI) Projects - Edition 1

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Business Intelligence (BI) is among the top 5 priorities of CIO technology priorities for providing improvement on decision making and operational efficiencies that drive top-line revenue and bottom-line profitability, yet few studies have assessed its practices in general and critical success factors in particular. Although plenty of guidelines for implementation exist, few have been subjected to empirical testing. In order to better understand success determinants and their effect on business intelligence implementation success, a cross-sectional survey was conducted with it professionals and business users from nine organizations of different industries in Malaysia. Questionnaires were distributed to examine the success determinants of business intelligence implementation based on their experiences. Since different organizations may have different objectives or emphases in their business intelligence initiatives, the results are useful in identifying the top rated success determinants that need attention and thus provide a basis for prioritizing those determinants. The results also suggest several promising directions for continued research on data warehousing success. ····· 1036119963

Optimized Thresholding on Self Organizing Map for Cluster Analysis

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
One of the popular tools in the exploratory phase of data mining and pattern recognition is the Kohonen Self Organizing Map (SOM). Recently, experiments have shown that to find the ambiguities involved in cluster analysis, it is not necessary to consider crisp boundaries in clustering operations. In this Book, the Incremental Leader algorithm for the thresholding of the SOM (Inc-SOM) is proposed to validate the potential of a crisp clustering algorithm. However, the performance deteriorates when there is overlap between clusters. To overcome the ambiguities in the results of cluster analysis, a rough thresholding for the SOM (Rough-SOM) is proposed. In Rough-SOM, the data is first trained by a SOM neural network, then the rough thresholding, which is a rough set based clustering approach, is applied on the neurons of the SOM. The optimal number of clusters can be found by rough set theory, which groups the neurons into a set of overlapping clusters. An optimization technique is applied during the last stage to assign the overlapped data to the true clusters. ····· 1036119880

Gaining insight on trust engineering in networking businesses

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The analysis of trust has proven to be a complex phenomenon in both research and practice. Several facts demonstrate this issue, a few of which are the lack of common and standardized definition of trust as well as diversities and differences of trust perceptions among trustors and trustees. However, despite this complexity co-working among actors whether organizations or individuals can hardly be successful with proper established trust relationships. This book addresses these challenges from the rational point of view. ····· 1036119706

Designing User Interfaces with the BadIdeas Method:

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book describes the BadIdeas method, a tool that aims to nurture creativity and innovation during the design and development of novel user interfaces. The BadIdeas method initially focuses on the generation of bad ideas, which are then submitted to a critical examination. Later, these divergent ideas are transformed until they are of good use and materialise into a tangible artefact or idea for future implementation. Creativity and innovation emerge as fundamental requisites in terms of design and development of present-day user interfaces. While conventional user interfaces need to ensure usability, in addition, less conventional ones require creativity and innovation in order to create engaging and pleasurable experience. In order to nurture these elements throughout the process of design and development of novel user interfaces, the author proposes the use of the BadIdeas method. A review of literature on Human-Computer Interaction, Design and Creativity sets the scene for this work, which then focuses on communicating the iterative development of the BadIdeas method, ultimately forming the major contribution of this research. ····· 1036119621

Financial Management in Academic Libraries

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Finance is the life blood of any library systems. Without finance neither any library can be started nor successfully run. Provisions of sufficient funds at the required time are the success of libraries. In the recent times, educational finance is highly institutionalized and a number of institutions have been setup to meet the requirements of higher education. Library requires the permanent source of supply of adequate finance which can meet the needs of its readers and proper maintenance of library in every respect. This study has been carried out in the Sri Krishansamy Reddiar Educational Trust Institutions. The data for this study have been collected from both the primary and secondary sources. Besides, expert opinions have been sought through personal interview. The secondary data are useful to understand the past, while primary data enables one to know the present. ····· 1036119566

Static Signature Recognition using Morphology

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Morphology is the study of external features of an object. In image processing we use the morphological features based on the shape of the object, from this a template is created and used for matching purpose. We have applied this approach for the problem of handwritten signature recognition. The static signature recognition is simple and cost effective and as large number of commercial transactions are still done on paper, handwritten signatures are widely used for authorization of the documents. Hence the static signature recognition is an important aspect of document authorization using biometric authentication. Static signature is captured from the paper using image scanner, we have only static information such as shape, strokes, orientation available with us. We use techniques based on morphological operations such as erosion, dilation to generate the template and measure the authenticity of the signature. ····· 1036119553

A Panoramic study on Extreme Research

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Book titled A PANORAMIC STUDY ON EXTREME RESEARCH focused on the values, practices, their relationships, advantages, disadvantages, recommendations, misconceptions, problems encountered in the implementation of Extreme Programming, along with them certain solutions were proposed based on the previous case studies. This dissertation intended to analyze various possibilities for applying quality assurance practices effectively to Extreme Programming. Provided, it should not affect negatively to the process and must lead to better quality assurance. Certain adaptations were recommended to Extreme Programming to make it more suitable for widest range of projects including small and large projects as well as critical and highly reliable systems. ····· 1036119470

Human Vision Based Framework for the Extraction of Salient Regions

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mechanisms which are not fully understood today, exist in human visual system that reduces the bulk of input sensory data and makes possible for visual system to analyze a scene in real time. The reduction of sensory input is based on saliency map i.e. a topographical map of salient regions, of the scene. Research work presented in this book has investigated the effect of blur on human visual attention. Hypothesis has been investigated that the sharp regions tend to capture attention irrespective of intensity, color or contrast. The second objective of this research was to find such algorithm of saliency detection that performs adequately in predicting human fixation for stimuli containing blur and sharp regions. Framework is proposed for the extraction of salient regions specifically for stimuli containing blur and sharp regions. Data gathered from visual experiment is used as the ground truth for identifying salient regions for 122 images (specifically built database) and compared with the salient regions extracted by new approach. Proposed approach for extraction of salient regions out performs state-of-the-art saliency detection methods in terms of precision and recall. ····· 1036119419

Software Measurements

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Software Measurement Programs are vital as they are used to Plan, implement, monitor and control software processes, products and resources in an organization.The facts and figures show that most of the Measurement Programs fail to provide expected results therefore it s needed to consider reasons of failures, success factors and best practices. To serve the purpose state of the art measurement program models, frameworks, standards and tools are discussed. Analysis of available research is used to construct a framework that can be used as a tool to implement successful measurement programs. The framework is also validated in CMMI certified company with help of a case study. ····· 1036119381

Quality management for component based software system

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Software communities are striving for techniques and approaches that could improve developer s productivity reduce time-to-market, excellent performance and produce systems that are flexible, scalable, secure, and robust. Only possible solution of this problem is component-based software engineering, which has generated tremendous interest in software communities. Unfortunately, the quality attributes of the final component based system, such as its performance, scalability or reliability, are not easy to determine. For this reasons, the component-based approach, is difficult to utilize in domains in which quality attributes are of primary concern. This dissertation proposes quality model for CBSD that defines a set of quality attributes for the effective evaluation of COTS components. Further, this dissertation also suggests few necessary guidelines and proposes some relevant metrics applicable to it, which after proper quantification and validation may help guiding risk and quality management of CBSD. This dissertation may help the research scholar s software, practitioners and students in better understanding of more relevant metrics applicable to quality management of CBSD ····· 1036119373

The Role of Learning Management Systems in Educational Environments

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Using Learning Management Systems (LMSs) in educational environments has facilitated the communication between students and teachers, and raised new challenges as well. In this research the authors investigated the role of LMS in the learning and teaching processes from students and teachers perspectives. They adopted a social constructivist worldview. They used an inductive qualitative approach, a single case study design and hermeneutical approach for analyzing collected data. The research took place at the School of Computer Science, Physics and mathematics department at Linnaeus University, Växjö campus, Sweden. The participants of this research were students and teachers from two master levels within the program of Information Systems. The study results were packed with information about how teacher and students evaluate their experience in using LMS. ····· 1036119322

Desktop Grid Computing for Commercial Simulation Packages

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Collaborative research has facilitated the development of distributed systems that provide users non-trivial access to geographically dispersed resources that are administered in multiple computer domains. The term grid computing is popularly used to refer to such distributed systems. Scientific simulations have traditionally been the primary benefactor of grid computing. The application of this technology to simulation in industry has, however, been negligible. In this book the author investigates the application of grid technology for effective use by simulation practitioners using Windows-based Commercially-available Simulation Packages (CSPs) to model simulations in industry. Towards this end, specific grid computing services and software (grid middleware) are identified and its application demonstrated through use of case studies. With its focus on end-users and end-user tools, it is intended that this book will encourage wider adoption of grid computing in the workplace and that simulation users will derive benefit from using this technology. ····· 1036119321

A Managerial Guide on IT Outsourcing

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today s globalized world is more liable on high-tech novelty as well as business. Yet, setting up of business value with technology is the biggest challenge for mid-sized organization. For the time being, a new sector so-called information technology (Networks, desktop applications, data center, different service support such as call centers etc.) expanded intensely due to hasty speed of technological revolution. Conversely, difficulties in resource specification & rareness, political unrest, technological ambiguity and economic instability etc. have made the business environment more intricate and competitive. Considering those barriers and supplement issues, IT outsourcing is now a common practice in most organization. Again, IT outsourcing often goes wrong due to lack of analysis about possible appropriateness of few economic theories into IT outsourcing decision process. This paper work strongly focuses on the key reasons behind IT outsourcing, common goals and objectives as well.This also explores diverse issues that trigger outsourcing decisions and critical success factors of selecting vendors. As a whole, it may be an effective handout for novice managers of SMEs. ····· 1036119272

· 1 · ::::: · 38 ·· 39 ·· 40 ·· 41 ·· 42 ·· 43 ·· 44 · ::::: · 47 ·