Browse Results

Showing 19,801 through 19,825 of 53,816 results

Adobe Photoshop CC for Photographers, 2015 Release: 2015 Release

by Martin Evening

Adobe Photoshop CC for Photographers by Photoshop hall-of-famer and acclaimed digital imaging professional Martin Evening has been revamped for a thirteenth edition to include detailed instruction for all of the updates to Photoshop CC on Adobe’s Creative Cloud, including significant new features, such as faster Camera Raw processing, Blur Gallery noise matching, and new export options for quick image-saving and layers as separate documents. This guide covers all the tools and techniques photographers and professional image editors need to know when using Photoshop CC, from workflow guidance to core skills to advanced techniques for professional results. Using clear, succinct instruction and real world examples, this guide is the essential reference for Photoshop users. Accompanying the book is the photoshopforphotographers.com website, fully updated with new sample images, tutorial videos, and bonus chapters.

Adopting Biometric Technology: Challenges and Solutions

by Ravindra Das

Many types of security technologies are currently in use, with biometrics being one of the latest and most cutting-edge forms that has been produced for mass application. Biometrics, while intriguing, is often broached with hesitation and poor understanding. Adopting Biometric Technology: Challenges and Solutions advocates increased implementation of biometric technology areas of the world where it has been least accepted, particularly in the United States. This book looks at several specific applications of biometric technology, challenging issues that have obstructed the use of biometrics in security and offering realistic solutions for increasing its worldwide utilization. It is divided into three sections, with the first discussing societal barriers against the adoption of biometric technology in security. The second section presents case studies of specific applications, such as e-passports and e-voting, that have already been implemented and could be expanded into regions where usage is low. The third section lays out a case for the general practicality and value that biometrics offers to relevant business sectors, including the benefits of implementing the currently controversial technology in place of the conventional forms of verification. While biometric technology has been poorly accepted and adopted in the United States as well as other developed nations, it is already a popular tool in developing nations in Asia, Africa, and Eastern Europe. Adopting Biometric Technology examines the societal resistance hindering the broader usage of biometrics and provides practical solutions for overcoming those barriers while showing how its increased application would be overall advantageous.

Advanced and Intelligent Computations in Diagnosis and Control (Advances in Intelligent Systems and Computing #386)

by Zdzisław Kowalczuk

This book is devoted to the demands of research and industrial centers for diagnostics, monitoring and decision making systems that result from the increasing complexity of automation and systems, the need to ensure the highest level of reliability and safety, and continuing research and the development of innovative approaches to fault diagnosis. The contributions combine domains of engineering knowledge for diagnosis, including detection, isolation, localization, identification, reconfiguration and fault-tolerant control. The book is divided into six parts: (I) Fault Detection and Isolation; (II) Estimation and Identification; (III) Robust and Fault Tolerant Control; (IV) Industrial and Medical Diagnostics; (V) Artificial Intelligence; (VI) Expert and Computer Systems.

Advanced Computational Methods for Knowledge Engineering: Proceedings of the 4th International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2016, 2-3 May, 2016, Vienna, Austria (Advances in Intelligent Systems and Computing #453)

by Thanh Binh Nguyen Tien Van Do Hoai An Le Thi Ngoc Thanh Nguyen

This proceedings consists of 20 papers which have been selected and invited from the submissions to the 4th International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2016) held on 2-3 May, 2016 in Laxenburg, Austria. The conference is organized into 5 sessions: Advanced Optimization Methods and Their Applications, Models for ICT applications, Topics on discrete mathematics, Data Analytic Methods and Applications and Feature Extractio, respectively. All chapters in the book discuss theoretical and practical issues connected with computational methods and optimization methods for knowledge engineering. The editors hope that this volume can be useful for graduate and Ph.D. students and researchers in Applied Sciences, Computer Science and Applied Mathematics.

Advanced Computing and Communication Technologies: Proceedings of the 9th ICACCT, 2015 (Advances in Intelligent Systems and Computing #452)

by Ramesh K. Choudhary Jyotsna Kumar Mandal Nitin Auluck H A Nagarajaram

This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27-29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

Advanced Computing and Communication Technologies: Proceedings of the 10th ICACCT, 2016 (Advances in Intelligent Systems and Computing #562)

by Ramesh K. Choudhary Jyotsna Kumar Mandal Dhananjay Bhattacharyya

This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27-29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

Advanced Computing and Systems for Security: Volume 1 (Advances in Intelligent Systems and Computing #395)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing #396)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Computing #568)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Advanced Computing and Systems for Security: Volume Three (Advances in Intelligent Systems and Computing #567)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Advanced Concepts for Intelligent Vision Systems: 17th International Conference, ACIVS 2016, Lecce, Italy, October 24-27, 2016, Proceedings (Lecture Notes in Computer Science #10016)

by Cosimo Distante Jacques Blanc-Talon Wilfried Philips Dan Popescu Paul Scheunders

This book constitutes the refereed proceedings of the 17th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2016, held in Lecce, Italy, in October 2016. The 64 revised full papers presented in this volume were carefully selected from 137 submissions. They deal with classical low-level image processing techniques; image and video compression; 3D; security and forensics; and evaluation methodologies.

Advanced Data Mining and Applications: 12th International Conference, ADMA 2016, Gold Coast, QLD, Australia, December 12-15, 2016, Proceedings (Lecture Notes in Computer Science #10086)

by Jinyan Li, Xue Li, Shuliang Wang, Jianxin Li and Quan Z. Sheng

This book constitutes the proceedings of the 12th International Conference on Advanced Data Mining and Applications, ADMA 2016, held in Gold Coast, Australia, in December 2016. The 70 papers presented in this volume were carefully reviewed and selected from 105 submissions. The selected papers covered a wide variety of important topics in the area of data mining, including parallel and distributed data mining algorithms, mining on data streams, graph mining, spatial data mining, multimedia data mining, Web mining, the Internet of Things, health informatics, and biomedical data mining.

Advanced Information Systems Engineering Workshops: CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings (Lecture Notes in Business Information Processing #249)

by John Krogstie Haralambos Mouratidis Jianwen Su

This book constitutes the thoroughly refereed proceedings of five international workshops held in Ljubljana, Slovenia, in conjunction with the 28th International Conference on Advanced Information Systems Engineering, CAiSE 2016, in June 2016. The 16 full and 9 short papers were carefully selected from 51 submissions. The associated workshops were the Third International Workshop on Advances in Services DEsign based on the Notion of CApabiliy (ASDENCA) co-arranged with the First International Workshop on Business Model Dynamics and Information Systems Engineering (BumDISE), the Fourth International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the First International Workshop on Energy-awareness and Big Data Management in Information Systems (EnBIS), the Second International Workshop on Enterprise Modeling (EM), and the Sixth International Workshop on Information Systems Security Engineering (WISSE).

Advanced Machine Learning with Python

by John Hearty

Solve challenging data science problems by mastering cutting-edge machine learning techniques in Python About This Book * Resolve complex machine learning problems and explore deep learning * Learn to use Python code for implementing a range of machine learning algorithms and techniques * A practical tutorial that tackles real-world computing problems through a rigorous and effective approach Who This Book Is For This title is for Python developers and analysts or data scientists who are looking to add to their existing skills by accessing some of the most powerful recent trends in data science. If you've ever considered building your own image or text-tagging solution, or of entering a Kaggle contest for instance, this book is for you! Prior experience of Python and grounding in some of the core concepts of machine learning would be helpful. What You Will Learn * Compete with top data scientists by gaining a practical and theoretical understanding of cutting-edge deep learning algorithms * Apply your new found skills to solve real problems, through clearly-explained code for every technique and test * Automate large sets of complex data and overcome time-consuming practical challenges * Improve the accuracy of models and your existing input data using powerful feature engineering techniques * Use multiple learning techniques together to improve the consistency of results * Understand the hidden structure of datasets using a range of unsupervised techniques * Gain insight into how the experts solve challenging data problems with an effective, iterative, and validation-focused approach * Improve the effectiveness of your deep learning models further by using powerful ensembling techniques to strap multiple models together In Detail Designed to take you on a guided tour of the most relevant and powerful machine learning techniques in use today by top data scientists, this book is just what you need to push your Python algorithms to maximum potential. Clear examples and detailed code samples demonstrate deep learning techniques, semi-supervised learning, and more - all whilst working with real-world applications that include image, music, text, and financial data. The machine learning techniques covered in this book are at the forefront of commercial practice. They are applicable now for the first time in contexts such as image recognition, NLP and web search, computational creativity, and commercial/financial data modeling. Deep Learning algorithms and ensembles of models are in use by data scientists at top tech and digital companies, but the skills needed to apply them successfully, while in high demand, are still scarce. This book is designed to take the reader on a guided tour of the most relevant and powerful machine learning techniques. Clear descriptions of how techniques work and detailed code examples demonstrate deep learning techniques, semi-supervised learning and more, in real world applications. We will also learn about NumPy and Theano. By this end of this book, you will learn a set of advanced Machine Learning techniques and acquire a broad set of powerful skills in the area of feature selection & feature engineering. Style and approach This book focuses on clarifying the theory and code behind complex algorithms to make them practical, useable, and well-understood. Each topic is described with real-world applications, providing both broad contextual coverage and detailed guidance.

Advanced Microsystems for Automotive Applications 2015: Smart Systems for Green and Automated Driving (Lecture Notes in Mobility)

by Gereon Meyer Beate Müller Tim Schulze

This edited volume presents the proceedings of the AMAA 2015 conference, Berlin, Germany. The topical focus of the 2015 conference lies on smart systems for green and automated driving. The automobile of the future has to respond to two major trends, the electrification of the drivetrain, and the automation of the transportation system. These trends will not only lead to greener and safer driving but re-define the concept of the car completely, particularly if they interact with each other in a synergetic way as for autonomous parking and charging, self-driving shuttles or mobile robots. Key functionalities like environment perception are enabled by electronic components and systems, sensors and actuators, communication nodes, cognitive systems and smart systems integration. The book will be a valuable read for research experts and professionals in the automotive industry but the book may also be beneficial for graduate students.

Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2 (Lecture Notes in Electrical Engineering #354)

by James J. Jong Hyuk Park Han-Chieh Chao Hamid Arabnia Neil Y. Yen

This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas. Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions.

Advanced Multimedia and Ubiquitous Engineering: FutureTech & MUE (Lecture Notes in Electrical Engineering #393)

by James J. Jong Hyuk Park Young-Sik Jeong Hai Jin Muhammad Khurram Khan

This volume presents selected papers from prominent researchers participating in the 11th International Conference on Future Information Technology and the 10th International Conference on Multimedia and Ubiquitous Engineering, Beijing, China, April 20-22, 2016. These large international conferences provided an opportunity for academic and industry professionals to discuss recent progress in the fields of multimedia technology and ubiquitous engineering including new models and systems and novel applications associated with the utilization and acceptance of ubiquitous computing devices and systems. The contributions contained in this book also provide more information about digital and multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, the semantic web, user experience and HCI, security and trust computing. This book describes the state of the art in multimedia and ubiquitous engineering, and future IT models and their applications.

Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2017 (Lecture Notes in Electrical Engineering #448)

by James J. Jong Hyuk Park Shu-Ching Chen Kim-Kwang Raymond Choo

This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas. Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions.

Advanced Multiresponse Process Optimisation: An Intelligent and Integrated Approach

by Tatjana V. Šibalija Vidosav D. Majstorović

This book presents an intelligent, integrated, problem-independent method for multiresponse process optimization. In contrast to traditional approaches, the idea of this method is to provide a unique model for the optimization of various processes, without imposition of assumptions relating to the type of process, the type and number of process parameters and responses, or interdependences among them. The presented method for experimental design of processes with multiple correlated responses is composed of three modules: an expert system that selects the experimental plan based on the orthogonal arrays; the factor effects approach, which performs processing of experimental data based on Taguchi's quality loss function and multivariate statistical methods; and process modeling and optimization based on artificial neural networks and metaheuristic optimization algorithms. The implementation is demonstrated using four case studies relating to high-tech industries and advanced, non-conventional processes.

Advanced Oracle PL/SQL Developer's Guide - Second Edition

by Saurabh K. Gupta

Master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c About This Book * Learn advanced application development features of Oracle Database 12c and prepare for the 1Z0-146 examination * Build robust and secure applications in Oracle PL/SQL using the best practices * Packed with feature demonstrations and illustrations that will help you learn and understand the enhanced capabilities of Oracle Database 12c Who This Book Is For This book is for Oracle developers responsible for database management. Readers are expected to have basic knowledge of Oracle Database and the fundamentals of PL/SQL programming. Certification aspirants can use this book to prepare for 1Z0-146 examination in order to be an Oracle Certified Professional in Advanced PL/SQL. What You Will Learn * Learn and understand the key SQL and PL/SQL features of Oracle Database 12c * Understand the new Multitenant architecture and Database In-Memory option of Oracle Database 12c * Know more about the advanced concepts of the Oracle PL/SQL language such as external procedures, securing data using Virtual Private Database (VPD), SecureFiles, and PL/SQL code tracing and profiling * Implement Virtual Private Databases to prevent unauthorized data access * Trace, analyze, profile, and debug PL/SQL code while developing database applications * Integrate the new application development features of Oracle Database 12c with the current concepts * Discover techniques to analyze and maintain PL/SQL code * Get acquainted with the best practices of writing PL/SQL code and develop secure applications In Detail Oracle Database is one of the most popular databases and allows users to make efficient use of their resources and to enhance service levels while reducing the IT costs incurred. Oracle Database is sometimes compared with Microsoft SQL Server, however, Oracle Database clearly supersedes SQL server in terms of high availability and addressing planned and unplanned downtime. Oracle PL/SQL provides a rich platform for application developers to code and build scalable database applications and introduces multiple new features and enhancements to improve development experience. Advanced Oracle PL/SQL Developer's Guide, Second Edition is a handy technical reference for seasoned professionals in the database development space. This book starts with a refresher of fundamental concepts of PL/SQL, such as anonymous block, subprograms, and exceptions, and prepares you for the upcoming advanced concepts. The next chapter introduces you to the new features of Oracle Database 12c, not limited to PL/SQL. In this chapter, you will understand some of the most talked about features such as Multitenant and Database In-Memory. Moving forward, each chapter introduces advanced concepts with the help of demonstrations, and provides you with the latest update from Oracle Database 12c context. This helps you to visualize the pre- and post-applications of a feature over the database releases. By the end of this book, you will have become an expert in PL/SQL programming and will be able to implement advanced concepts of PL/SQL for efficient management of Oracle Database. Style and approach The book follows the structure of the Oracle Certification examination but doesn't restrict itself to the exam objectives. Advanced concepts have been explained in an easy-to-understand style, supported with feature demonstrations and case illustrations.

Advanced Penetration Testing for Highly-Secured Environments - Second Edition

by Kevin Cardwell Lee Allen

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book * Learn how to build your own pentesting lab environment to practice advanced techniques * Customize your own scripts, and learn methods to exploit 32-bit and 64-bit programs * Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn * A step-by-step methodology to identify and penetrate secured environments * Get to know the process to test network services across enterprise architecture when defences are in place * Grasp different web application testing methods and how to identify web application protections that are deployed * Understand a variety of concepts to exploit software * Gain proven post-exploitation techniques to exfiltrate data from the target * Get to grips with various stealth techniques to remain undetected and defeat the latest defences * Be the first to find out the latest methods to bypass firewalls * Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing

Advanced R: Data Programming and the Cloud

by Joshua F. Wiley Matt Wiley

Program for data analysis using R and learn practical skills to make your work more efficient. This book covers how to automate running code and the creation of reports to share your results, as well as writing functions and packages. Advanced R is not designed to teach advanced R programming nor to teach the theory behind statistical procedures. Rather, it is designed to be a practical guide moving beyond merely using R to programming in R to automate tasks. This book will show you how to manipulate data in modern R structures and includes connecting R to data bases such as SQLite, PostgeSQL, and MongoDB. The book closes with a hands-on section to get R running in the cloud. Each chapter also includes a detailed bibliography with references to research articles and other resources that cover relevant conceptual and theoretical topics. What You Will Learn Write and document R functions Make an R package and share it via GitHub or privately Add tests to R code to insure it works as intended Build packages automatically with GitHub Use R to talk directly to databases and do complex data management Run R in the Amazon cloud Generate presentation-ready tables and reports using R Who This Book Is For Working professionals, researchers, or students who are familiar with R and basic statistical techniques such as linear regression and who want to learn how to take their R coding and programming to the next level.

Advanced Splunk

by Ashish Kumar Yadav

Master the art of getting the maximum out of your machine data using Splunk About This Book * A practical and comprehensive guide to the advanced functions of Splunk,, including the new features of Splunk 6.3 * Develop and manage your own Splunk apps for greater insight from your machine data * Full coverage of high-level Splunk techniques including advanced searches, manipulations, and visualization Who This Book Is For This book is for Splunk developers looking to learn advanced strategies to deal with big data from an enterprise architectural perspective. It is expected that readers have a basic understanding and knowledge of using Splunk Enterprise. What You Will Learn * Find out how to develop and manage apps in Splunk * Work with important search commands to perform data analytics on uploaded data * Create visualizations in Splunk * Explore tweaking Splunk * Integrate Splunk with any pre-existing application to perform data crunching efficiently and in real time * Make your big data speak with analytics and visualizations using Splunk * Use SDK and Enterprise integration with tools such as R and Tableau In Detail Master the power of Splunk and learn the advanced strategies to get the most out of your machine data with this practical advanced guide. Make sense of the hidden data of your organization - the insight of your servers, devices, logs, traffic and clouds. Advanced Splunk shows you how. Dive deep into Splunk to find the most efficient solution to your data problems. Create the robust Splunk solutions you need to make informed decisions in big data machine analytics. From visualizations to enterprise integration, this well-organized high level guide has everything you need for Splunk mastery. Start with a complete overview of all the new features and advantages of the latest version of Splunk and the Splunk Environment. Go hands on with uploading data, search commands for basic and advanced analytics, advanced visualization techniques, and dashboard customizing. Discover how to tweak Splunk to your needs, and get a complete on Enterprise Integration of Splunk with various analytics and visualization tools. Finally, discover how to set up and use all the new features of the latest version of Splunk. Style and approach This book follows a step by step approach. Every new concept is built on top of its previous chapter, and it is full of examples and practical scenarios to help the reader experiment as they read.

Advanced Statistical Methods in Data Science (ICSA Book Series in Statistics)

by Hao Yu Ding-Geng Chen Jiahua Chen Xuewen Lu Grace Y. Yi

This book gathers invited presentations from the 2nd Symposium of the ICSA- CANADA Chapter held at the University of Calgary from August 4-6, 2015. The aim of this Symposium was to promote advanced statistical methods in big-data sciences and to allow researchers to exchange ideas on statistics and data science and to embraces the challenges and opportunities of statistics and data science in the modern world. It addresses diverse themes in advanced statistical analysis in big-data sciences, including methods for administrative data analysis, survival data analysis, missing data analysis, high-dimensional and genetic data analysis, longitudinal and functional data analysis, the design and analysis of studies with response-dependent and multi-phase designs, time series and robust statistics, statistical inference based on likelihood, empirical likelihood and estimating functions. The editorial group selected 14 high-quality presentations from this successful symposium and invited the presenters to prepare a full chapter for this book in order to disseminate the findings and promote further research collaborations in this area. This timely book offers new methods that impact advanced statistical model development in big-data sciences.

Advanced Technologies in Modern Robotic Applications

by Chenguang Yang Hongbin Ma Mengyin Fu

This book presents in a systematic manner the advanced technologies used for various modern robot applications. By bringing fresh ideas, new concepts, novel methods and tools into robot control, robot vision, human robot interaction, teleoperation of robot and multiple robots system, we are to provide a state-of-the-art and comprehensive treatment of the advanced technologies for a wide range of robotic applications. Particularly, we focus on the topics of advanced control and obstacle avoidance techniques for robot to deal with unknown perturbations, of visual servoing techniques which enable robot to autonomously operate in a dynamic environment, and of advanced techniques involved in human robot interaction. The book is primarily intended for researchers and engineers in the robotic and control community. It can also serve as complementary reading for robotics at the both graduate and undergraduate levels.

Refine Search

Showing 19,801 through 19,825 of 53,816 results