AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 24 ·

Garbage collectors on Modern Compilers

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Introduction Garbage collection is a technique for automatic reclamation and was first suggested by McCarthy. Programmers are looking for an ideal garbage collector. The choice of the particular garbage collector depends on the application behavior and mutator choice. The problems of managing storage have motivated language designers to redesign languages to include automatic storage reclamation. For automatic memory management programmers are embracing garbage collected languages such as Java which deals with automatic memory management and thereby reducing the burden of the programmer. Chapter 1 of the book introduces the concept of explicit and implicit storage reclamation. Chapter 2 deals with the review of literature. In chapter 3 the mechanism of Garbage collection in C & C++ is studied. In chapter 4, empirical evaluation of different garbage collectors of JDK is carried out. In chapter 5 the results are compiled from of the previous chapter tables. In chapter 6 the inferences drawn from the study are presented. There fore after reading the book we can conclude that which type of garbage collector is to be activated with which type of application. ····· 10361114090

Automatic Lip-Reading System

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Lip reading is used to understand or interpret speech without hearing it, a technique especially mastered by people with hearing difficulties. The ability to lip read enables a person with a hearing impairment to communicate with others and to engage in social activities, which otherwise would be difficult. Recent advances in the fields of computer vision, pattern recognition, and signal processing has led to a growing interest in automating this challenging task of lip reading. Indeed, automating the human ability to lip read, a process referred to as visual speech recognition, could open the door for other novel applications. This book investigates various issues faced by an automated lip-reading system and propose a novel approach to automatic lip reading. The proposed approach includes a novel automatic face localisation scheme and a lip localisation method. This book is useful to students and professionals in visual speech recognition, AI, image processing and behavioural biometrics. ····· 10361113960

Digital Colored Image Tattooing

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Digital watermarking is a method in which the information is embedded directly and imperceptibly into digital data. Potential applications of digital watermarking include copyright protection and authentication. In this monograph a set of novel and generic watermarking scheme has been developed for colored digital images that can embed a holographic logo or a meaningful text. The general watermarking mechanism has been discussed in chapter 1, and a review of algorithms in chapter 2. The colored image watermarking using DCT transformation has been coined in chapter 3. The technique acts as a model for watermarking colored images. The model is advanced and an edge sensitive algorithm is discussed in chapter 4. This algorithm embeds watermark only in sensitive areas of the image thus securing the actual concerned content of the image. The algorithm has been sophisticated further with the incorporation of chaotic system in chapter 5. The algorithm used chaotic dynamical system for determining the strength factor for incorporation of watermark thereby addressing Kerckhoffs` principle. Finally, chapter 6 provides the nutshell of the work. ····· 10361113821

Genetic Algorithms for Topology Control Problems

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book present a bio-inspired topology control mechanism, force-based genetic algorithm (FGA), where a GA is run by each mobile node to achieve a uniform spread of nodes and to provide a fully connected network over an unknown area. We provide a formal analysis of FGA in terms of convergence speed, uniformity at area coverage, and Lyapunov stability theorem. This work also emphasizes the use of nodes to achieve a uniform distribution over an unknown terrain without a priori information. In contrast, each node running our FGA has to make its own movement direction and speed decisions based on local neighborhood information, such as obstacles and the number of neighbors, without a centralized control unit or global knowledge. The stochastic behavior of FGA makes it difficult to analyze its convergence speed. We built metrically transitive homogeneous and inhomogeneous Markov chain models to analyze the convergence of our FGA with respect to the communication ranges of mobile nodes and the total number of nodes in the system. The Dobrushin contraction coefficient of ergodicity is used for measuring convergence speed for the Markov chain models of our FGA. ····· 10361113796

Privacy and Security of Internet Communications

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today`s technical and legal landscape present formidable challenges to privacy. The disclosure of private data has become commonplace due to carelessness, theft or legal actions. Increasing reliance on network services causes sensitive data to be cached, copied, and archived by third parties, often without users` knowledge or control. Cloud computing and ubiquitous computing are becoming an integral part of everyday life. The social consequences of this development are profound, and the technological challenges posed by these paradigms are complex and interesting. While the lack of privacy has, in principle, always characterized Internet communications, never before Internet communication has revealed so much about the personal tastes of its users. This is because never before Internet has contained so much personal user data. This work addresses some of the privacy and security issues that arise on line. ····· 10361113768

Analysis, Structure and Organization of Complex Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The emergence of small world and scale free networks in a number of diverse fields has motivated lots of research in the study of complex networks. Examples include social networks, metabolic networks, computer networks, world wide web, food web, transport networks. This Ph.D. thesis introduces a visual analytics method for the analysis and mining of these complex networks. Th proposed method is used to comparatively study networks from different fields and discover similarities and dissimilarities between them. Further more, we build clustering and visualization methods based on the introduced method which leads to interesting results. ····· 10361113675

Surface Modeling Based on Spherical Splines

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Spline surfaces defined on planar domains have been studied for more than 40 years and universally recognized as highly effective tools in approximation theory, computer-aided geometric design, computer-aided design, computer graphics and solutions of differential equations. Many methods and theories of bivariate polynomial splines on planar triangulations carry over. However, spherical Bezier-Bernstein polynomial splines defined on sphere have several significant differences from them because sphere is a closed manifold much different from planar domains. This book is based on the dissertation completed in the University of Georgia. It includes following contents: an overview of spherical splines, the method to construct a unique spherical Hermite interpolation splines by using minimal energy method, the estimation of approximation order under L2 and L-infinity norms, methods of hole filling and scattered data fitting with global r-th order continuity. Many examples in this book have demonstrated our theories and applications. This book is especially useful for people who have interest in CAGD, CAD & CG, multivariate splines, geoscience and spline finite element methods. ····· 10361113646

Intelligent Watermarking Using Loss Less Compression and RSA Encryption

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The main objective of this book is to secure the watermark image by adding two sub layers in the existing system. In this book we have used two additive layers one for additional security of the watermark, which is RSA Encryption/Decryption and other is Huffman lossless compression to reduce the size of the watermarked image. Basically we have proposed intelligent and robust image watermarking based on Particle Swarm Optimization (PSO), Singular Value Decomposition (SVD) lossless compression & RSA Encryption/Decryption Algorithm. Initially algorithm takes an image embed watermark using PSO, SVD and Discrete wavelet transformation (DWT) and then, we have added two more layers one for more security which is RSA security algorithm and other is lossless Compression to reduce the size of the image to the original one. The algorithm provides best security to watermark using RSA and the size remains same due to Huffman lossless compression. The Experimental results are more secure due to two additive layers RSA and Huffman lossless compression. We also believe that this research oriented book will be very helpful for the students of intelligent watermarking and network security. ····· 10361113537

Hardware Agents

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book presents the general software agent models but with hardware structures. The basic concepts of multi-agent technology are discussed and how these concepts can be developed and incorporated in hardware systems with reconfigurable logics. How hardware agents can be created using conventional hardware description languages. Several examples that implement finite state and data flow machines using hardware agents are presented. The potential use of these new type of agents in image-processing and information gathering or monitoring systems is examined. Then how this hardware multi-agent technology can be applied to real-time data and sensor fusion applications is presented. The concepts, applications and examples presented in this book should be especially useful to students, researchers and engineers both in software and hardware fields who are working in the area of parallel processing systems or want to use such systems and are looking for a way to increase the speed, flexibility and performance of their operations considerably. ····· 10361113493

Audio Visual Analysis of Meeting Groups

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Meetings are an important and frequently occurring event in our daily lives, where information is disseminated, ideas are discussed and decisions are taken. They are a crucible for complex interactions, where a variety of individual and group behaviors manifest themselves. Thus researchers from various fields such as behavioral psychology, human computer interface design, computer vision and signal processing have focused efforts on analyzing meetings. In recent years, with the advent of smart meeting spaces, vast amounts of meeting data are recorded. The overwhelming amount of information available from such recordings underscores the need for systems that can automatically analyze meetings. A complete analysis of such meeting involves answering questions such as who , when , where , which , what and why . This book presents advanced methods to automatically determine who attended the meeting and when they spoke based on audio-visual cues. These steps are necessary precursors for higher level cognition tasks, such as automatic meeting transcription, determining meeting type, and generation of action items. ····· 10361113430

SOLVING ADVANCED PARTIAL DIFFERENTIAL EQUATIONS BY MATLAB SOFTWARE

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
For the first time this rare work provides guidelines how to use MATLAB software to solve all types of partial differential equations like elliptic, parabolic, eigen and hyperbolic by using simulink in MATLAB software. This book focuses on understanding the fundamental mathematical concepts and mastering problem-solving skills using all simulink techniques in MATLAB and skip some tedious derivations. Obviously, basic concepts must be taught so that students can properly formulate the mathematics problems. Afterwards, students can directly use the MATLAB codes to solve practical problems. Every algorithm introduced in this book is followed by example MATLAB code with an interface so that students can easily modify the code to solve real life problems. The goal is to make techniques understandable and easily accessible and to allow continued focus on the all engineering and sciences fields of the problems. Computational elegance and efficiency are gladly sacrificed for simplicity. Too many postgraduates students are completely in the dark when faced with variable chemical and physical properties and tend to assume them away without full knowledge of whether the effects are important ····· 10361113396

TECHNIQUES TYPES OF NEURAL NETWORK BY USING NEUROSOLUTIONS SOFTWARE

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this rare work provide how to use neurosolutios soft ware to solve all techinques of Neural Networks by using neurosolutios soft ware.Chapter 1 provides example to how to use this software for undergraduate students to solve the problems. Chapter 2 provides advanced prgramming for all Neural Network techinques for postgraduate to how to solve there problems by programming. Chapter 3 provides example to how to make trainig, testing and validation by using neurosolutios soft ware. Chapter 4 provides example in how to make interaction between neurosolutios soft ware and excil file and also, how to make trainig, validation and testing. The goal is to make the techniques understandable and easily accessible and to allow continued focus on the chemistry and physics of the problem. Computational elegance and efficiency are gladly sacrificed for simplicity. Too many engineers are completely in the dark when faced with variable physical properties, and tend to assume them away without full knowledge of whether the effects are important. ····· 10361113332

Feature Usability Index

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Feature selection as an area of interest within pattern recognition, deals with selection of a subset of attributes used in construction of a model describing observations. The purpose of this stage includes reducing data dimensionality by removing irrelevant and redundant features, reducing the amount of learning data, improving predictive accuracy and comprehensibility of a classification hypothesis. This book introduces Feature Usability Index (FUI) as a measure for evaluating classification efficacy of features and its application in feature selection. Experimental applications presents optimal feature subset selection through ordering based on FUI, use of FUI for ranking and selection of feature extraction techniques for a specific linguistic feature, and Color Usability Index as a measure for predicting performance of image segmentation algorithms. ····· 10361113253

Face Recognition a Challenge in Biometrics

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Face recognition is a difficult problem .Thedimension reduction and the skill to acquire minimumsize of feature vector required for face recognitionfor diverse facial expressions is a challenging taskin face recognition. Dimension reduction results inremoval of irrelevant variables along with noisetherein and a lower computation complexity ofsubsequent processing. This book addresses thechallenges of dimension reduction, choice of minimumsize feature vector for face recognition andminimization of adverse effects of varying facialexpressions on the recognition through reduction inimage resolution. Face images with varying imageresolution are obtained through image decimation.Improved recognition rate results are also reportedusing novel coefficients selection and optimizationmethods in DFT, DCT and DWT based face recognitionmethods. The experiments are carried out for variousimage resolutions using five different datasets. ····· 10361113199

Visualizing 3D models with fine-grain surface depth

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Daedalus Project has devised new methods for recovering 3D models of scenes from wide baseline photographs. It develops novel shape from shading methods (referred to as Depth Hallucination) to add fine grain surface detail to the reconstructed models. Reconstructing this models allows to visualize them under varying illumination, including subtle effects such as surface self shadowing. The output from this software is a dense polygon mesh and corresponding albedo and normal and depth maps. It is presented a group of GPU algorithms for rendering such models in real time or at interactive frame rates. Moreover this models can be lit with realistic illumination acquired from the real world using light probe images. You can, then, capture some images from a building, a light probe in front of it and reconstruct the 3D model of the building, lighting it with realistic illumination and compare the results with the original images. ····· 10361113174

Co-Similarity Approach to Co-clustering

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Clustering is an important tool for many applications such as document clustering, gene expression analysis, etc. In many such cases, the data can be represented as a set of instances expressed by their attributes, in the form of a matrix. Clustering instances, such as documents, depends on their attributes (words) and vice versa, thus forming a dual relationship between instances and their attributes. Co-Similarity Approach to Co-Clustering emphasizes on a technique that exploits the dual nature between instances and their attributes to find similarities between objects in each set. It provides and analyzes results of applying this technique on two different domains- Document clustering and Gene Expression Analysis. ····· 10361113119

A Conceptual Framework for Mobile Security Supporting Enterprises in Adopting Mobility

für 49.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays enterprises demand mobility and flexibility of their employees as inevitable success factors. Integrating mobile devices, namely smartphones and tablets, into the enterprise gives the employees the ability to work more productively. However, this integration has also brought new security challenges and risks. Despite all the advantages of mobility, many enterprises continue to be doubtful about it due to security concerns. Mobile devices are exposed to wide range of threats that have to be countered. Simply porting information security standards from notebooks, and server domains to mobile devices is unlikely to be effective. Thus, from an enterprise point of view, security levels are unclear on mobile devices. Generally, a high level of security might be attained on mobile devices by setting a high level of restrictions. On the other hand, this might minimize user acceptance and satisfaction factors. To address the issues mentioned above, a conceptual framework that supports enterprises in adopting Mobile Enterprise Applications is proposed. ····· 10361108382

Effiziente Speicherung von Zeitreihen mit Betriebsdaten aus Software-Systemen zur Analyse von Laufzeitanomalien

für 49.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Arbeiten geschäftsrelevante Software-Systeme ineffizient oder fallen aus, können sie zu wirtschaftlichem Schaden führen. Diese Software-Systeme müssen daher hohen Stabilitätsansprüchen genügen. Erreichen sie die Ansprüche nicht, können sie auffälliges Laufzeitverhalten zeigen, wie anormale Ressourcennutzung oder sporadische Fehler durch Synchronisationskonflikte. Die Analyse des Laufzeitverhaltens ist ein Mittel, um das Verhalten des Software-Systems zu verstehen. Sie erfordert ein strukturiertes Vorgehen und eine Werkzeugkette. Die Werkzeugkette besteht aus Werkzeugen zum Aufzeichnen, Speichern und Analysieren: Monitoring-Werkzeuge sammeln Betriebsdaten ein. Analysen nutzen spezielle Techniken zum Erkennen von Auffälligkeiten in den Betriebsdaten. Dazwischen existiert eine Lücke, da Standard-Zeitreihendatenbanken, wenn sie zum Speichern der Betriebsdaten verwendet werden, diese nicht für die Analyse des Laufzeitverhaltens optimiert speichern. Diese Arbeit beschreibt die domänenspezifische Zeitreihendatenbank Chronix, welche die Einschränkungen der Standard-Zeitreihendatenbanken nicht besitzt. Chronix hat ein generisches multidimensionales Datenmodell, einen Erweiterungsmechanismus für Zeitreihentypen und -Zeitreihenfunktionen, berücksichtigt den in dieser Arbeit beschriebenen Ansatz zum Synchronisieren von Zeitreihen und hat einen effizienten funktional-verlustfreien Langzeitspeicher. In der quantitativen Evaluation hat Chronix einen geringeren Arbeitsspeicherbedarf, spart 20 % - 68 % des Festplattenspeicherbedarfs, ist 80 % - 92 % schneller beim Datenzugriff und spart 73 % - 97 % der Laufzeiten bei datenbankseitigen Analysefunktionen. Die qualitative Evaluation zeigt zudem die Vorteile anhand von drei Fallstudien. ····· 10361108374

Agile Modellgetriebene Entwicklung von Software Security & Privacy

für 35.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Software Systeme durchdringen jeden Bereich unseres Lebens. Dadurch wachsen die Anforderungen an die korrekte Funktionsweise dieser Systeme. Gleichzeitig werden täglich im Durchschnitt 16 neue Vulnerabilities in Softwareprodukten veröffentlicht und Nutzer sorgen sich um ihre Privatsphäre. Diese Security- und Privacy-Aspekte müssen in der Entwicklung von Software Systemen adressiert werden. Daher werden in dieser Arbeit die drei Aspekte Security-Architektur, die korrekte Verarbeitung von Eingabedaten bei der Erstellung von Ausgabedaten und die Privacy von Nutzern im Kontext der Softwareentwicklung untersucht. Dabei werden Modelle und der agile modellgetriebene Softwareentwicklungsansatz eingesetzt, um Security- und Privacy-Aspekte explizit zu modellieren, analysieren und in ausführbare Systeme zu übersetzen. Durch die automatische Security-Architektur Analyse von MontiSecArc können Vulnerabilities durch Entwickler identifiziert und behoben werden, die als Flaw Correction Pattern von Security Experten formalisiert wurden. Außerdem erlauben es Flaw Correction Pattern bekannte Arten von Vulnerabilities präzise zu beschreiben, sodass diese benannt, unterschieden und gesammelt werden können. Injection Vulnerabilities wie Cross-Site-Scripting (XSS) entstehen durch fehlendes oder falsches Encoding von Ausgabedaten in unterschiedlichen Kontexten der Ausgabesprache. Mit MontiCoder wird ein Ansatz vorgestellt, der Unparser und Parser generiert, die kontextspezifisches Encoding und Decoding automatisch durchführen und so Injections für beliebige Sprachen verhindert. Mit der Privacy Development Language (PDL) wird ein Ansatz vorgestellt, mit dem Entwickler mehr Transparenz und Entscheidungshoheit über die Verwendung von Daten an den Nutzer eines Cloud Services geben ····· 10361108348

Agile Software-Produktlinienentwicklung im Kontext heterogener Projektlandschaften

für 35.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· ····· 10361108344

Integrierte Energie- und Stoffflussrechnung als zentrales Element des Nachhaltigkeitsmanagements in der Wertschöpfungskette von Milchprodukten

für 49.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Die vorliegende Arbeit verfolgt das Ziel, die ökonomische und ökologische Dimension von Molkereiunternehmen in einem integrierten System zu kombinieren. Dazu wird die Kosten- und Leistungsrechnung um alle erforderlichen umweltrelevanten Daten und eine zugehörige Berechnungslogik erweitert. Die Berechnung der umweltrelevanten Energie- und Stoffinputs entlang der Wertschöpfungskette und die Bewertung mit relevanten Umweltwirkungskategorien erfolgt mit einer geschlossenen Mengen- und Prozessrechnung nach dem Bottom-up-Prinzip. Zur Sicherstellung der Praxisrelevanz wurde das Konzept in einem Berechnungsmodell auf Basis einer realitätsnahen Demo-Molkerei umgesetzt. ····· 10361108339

Modellierung thematischer Nähe in Organisationen durch Machine Learning

für 49.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Komplexe Problemstellungen nicht nur als disziplinäre Fragestellung zu begreifen, sondern über Fachgrenzen hinaus Lösungen zu entwickeln, erweist sich nicht nur als Trend, sondern auch als Notwendigkeit. Die Identifikation geeigneter Kooperationspartner und die Suche nach gemeinsamen Themen ist jedoch oftmals zeitaufwändig. In dieser Dissertation wird daher ein System konzeptioniert und entwickelt, welches die Modellierung thematischer Nähe in Organisationen durch einen Machine Learning Ansatz erlaubt. Grundlage hierfür sind textuelle Daten, aus welchen zunächst mittels eines generativen Verfahrens inhärente Themen extrahiert werden. Danach werden diese Themen einem diskriminierenden Verfahren unterzogen, welches ein Matchmaking zwischen Themen unterschiedlicher organisationaler Entitäten ableitet. Die durch diese Verfahrenskette generierten Ergebnisse werden dann für den Nutzer in Form eines graphenbasierten Ansatzes visualisiert, es entsteht eine Landkarte verknüpfter Themen auf Basis eines automatisierten Prozesses. ····· 10361108334

SAMEM: A Methodology for the Elicitation and Specification of Requirements for Agile Model-driven Engineering of Large Software Solutions

für 39.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This thesis presents a pragmatic methodology, Software Agile Modeling And Engineering Methodology (SAMEM), for the development of large software-based solutions. The methodology is founded on the techniques of visual communication through models (Model-driven Development), a systematic guided progression of the project from beginning to end, an agile project management approach emphasizing an iterative and incremental style, and focusing on the requirements specification of the project. The iterative & incremental approach is a risk mitigation technique to prevent the project from going off track via a short feedback loop. Projects have momentum that is a collection of the decisions and work accomplished. Small steps with verification that the work is correct and consistent with the project goals create a situation where potentially only a small investment is discarded. Small discards are easier to accept and can often be viewed as design explorations. The SAMEM applies the iterative & incremental approach at all levels across the complete project lifetime. Modeling or graphical representations of the majority of project artifacts is risk mitigation against creating the incorrect solution and building the solution incorrectly. It is well known that visual expression can communicate information more accurately in many situations versus text. The mitigation effects against creating the incorrect solution, at least from the perspective of the stakeholders, is through the improved and more effective communication provided by models or graphical representations. One contribution for graphical representation or modeling is the idea of a Solution Overview Drawing (SOD) that provides a single-page summary by integrating multiple model views of requirements or design ····· 10361108332

Das ist Information

für 38.00€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Der Begriff Information wurde 1940 von Norbert Wiener mit seiner Kybernetik eingeführt. Wesentlich für seine große Verbreitung war Shannons Informationstheorie, die wichtige Grundlagen der Nachrichten-, Rechen- und Speichertechnik bereitstellte. Heute ist Information ein nahezu universell angewendeter Begriff, der aber leider sehr oft nur unscharf und intuitiv benutzt wird.

Mit diesem Buch liegt wohl erstmalig eine exakte Begriffsdefinition vor. Sie geht weitgehend auf Wieners Einführung zurück. Information ist kein Objekt, sondern betrifft immer ein komplexes Geschehen, das aus drei Teilen besteht. Der stofflich-energetische Informationsträger wirkt auf ein spezifisches System ein und ruft in ihm und in dessen Umgebung eine spezielle Wirkung, das Informat hervor. Bei einer Musikaufzeichnung ist z. B. die verbogene Rille der Schallplatte der ursprüngliche Informationsträger, der über technische Schritte den Schall erzeugt, der schließlich auf Menschen einwirkt. Damit er die ursprünglich beabsichtigte Wirkung, das Informat hervorruft muss der Mensch (als angepasstes System) bereits über spezifische Musikerfahrungen verfügen.
Im Allgemeinen besitzt Information vielfältige Möglichkeiten und Varianten. Sie werden detailliert begründet und exakt behandelt. Dabei ist es notwendig, fünf Aspekte der Information zu unterscheiden. Grundlegend ist der dreistufige Fall aus Informationsträger, System und Informat, der wegen der wichtigen und spezifischen Wirkung (dem Informat) W-Information genannt wird. Vielfach, insbesondere bei Sprache und Schrift werden jedoch nicht die Originale als Informationsträger benutzt. Statt ihrer werden im Sinne der Semiotik auf sie verweisende Zeichen verwendet. Dann sind u. a. zusätzlich mittels Klassenbildung und Axiomatik sehr nützliche Komprimierungen als Vereinfachungen der Prozesse möglich. Deshalb wird dieser Aspekt als Z-Information bezeichnet. Ein dritter Aspekt betrifft die Nachrichtentechnik und deren Grenzen, wie sie von Shannon eingeführt und inzwischen enorm erweitert und ganz entscheidend für ihre Optimierung sind. Deshalb sind diese Inhalte unter S-Information erfasst und betreffen u. a. die Übertragung, Fehlerkorrektur, Komprimierung und Datensicherheit. Besonders wichtig für die Information sind die Möglichkeiten der Speicherung. Dafür ist eine umfangreiche Speichertheorie entstanden. Im gespeicherten Zustand liegt jedoch die Information nur potentiell vor. Erst durch die Wiedergabe muss aus dem Speicherzustand erneut ein Informationsträger erzeugt werden. Deshalb wurde hierfür der Begriff P-Information gewählt. Hierbei ist die von Shannon einführte Entropie wesentlich. Leider wird sie (selbst von Experten) recht oft mangelhaft bis falsch behandelt. Deshalb wird sie hier möglich anschaulich, aber dennoch mathematisch exakt erklärt. Die höchste Stufe der Information entsteht mittels der Nutzung der Rechentechnik. Sie ermöglicht völlig neue Anwendungen, die u. a. zu virtuellen Welten führen. Deshalb wurde hierfür die Bezeichnung V-Information gewählt.

Für alle Informationsarten werden die wichtigsten Beispiele eingeführt und ausführlich erklärt. So ist quasi ein Kompendium der Information mit genauer Erfassung ihrer Möglichkeiten und Grenzen bis hin zu den technischen Anwendungen entstanden. Da leider mit den vielen Möglichkeiten der Information auch ein umfangreicher Missbrauch entstanden ist und weiter entstehen wird, wurde ein Kapitel angefügt, das vor allem versucht, für die Zukunft einige Abgrenzungen und Maßnahmen aufzuzeigen, ····· 10361108257

· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 24 ·