Browse Results

Showing 32,751 through 32,775 of 53,819 results

NSX-T Logical Routing: Fortify Your Understanding to Amplify Your Success

by Shashank Mohan

This book is a one-stop guide for IT professionals with a background in traditional and software-defined networks looking to expand or hone their skill set and has been developed through a combination of extensive research and testing in both development and production environments. It provides reliable information on a fundamental component of NSX-T, logical routing.A comprehensive understanding of this capability will help IT professionals with design, implementation, troubleshooting, and enhancements.The book starts with an introduction to the foundational components of the NSX-T platform and how NSX-T fits into the software-defined data center. The focus then moves to tunnel endpoints, which is a critical aspect of the NSX-T platform, and the differences between overlays and underlays are explained. Once the basics are covered, it provides a detailed description of how NSX-T components communicate.Next, the book introduces logical routing and its components and provides a better understanding of how these components function with one another. Several packet walks are illustrated to explain NSX-T logical routing behavior in different scenarios. After mastering logical routing, it explains how NSX-T ensures data plane availability, which is explored at various layers of NSX-T.Finally, the book explores the concepts and intricacies of routing into and out of the NSX-T environment. It deep dives into utilizing the Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), and Static Routing.What You Will LearnKnow how VMware NSX-T endpoints communicate Understand how NSX-T logical routing works Know how NSX-T provides high availability for the data plane Understand how NSX-T operates with static and dynamic routing protocolsConfigure the platform Who This Book Is ForReaders with an intermediate to advanced skill set who wish to further their knowledge, those who focus on datacenter technology, those planning to move to a software-defined datacenter to transform the way their current datacenter works, and anyone looking to learn about VMware NSX-T and how it operates

Administrating Solr

by Surendra Mohan

A fast-paced, example-based guide to learning how to administrate, monitor, and optimize Apache Solr."Administrating Solr" is for developers and Solr administrators who have a basic knowledge of Solr and who are looking for ways to keep their Solr server healthy and well maintained. A basic working knowledge of Apache Lucene is recommended, but this is not mandatory.

Apache Solr High Performance

by Surendra Mohan

This book is an easy-to-follow guide, full of hands-on, real-world examples. Each topic is explained and demonstrated in a specific and user-friendly flow, from search optimization using Solr to Deployment of Zookeeper applications. This book is ideal for Apache Solr developers and want to learn different techniques to optimize Solr performance with utmost efficiency, along with effectively troubleshooting the problems that usually occur while trying to boost performance. Familiarity with search servers and database querying is expected.

Node.js Essentials

by Surendra Mohan

If you are a developer who has prior knowledge and experience working with JavaScript and client-side and server-side applications, and if you want to create your own Node.js applications with PHP, then this book is for you.

Elasticsearch Blueprints

by Vineeth Mohan

If you are a data enthusiast and would like to explore and specialize on search technologies based on Elasticsearch, this is the right book for you. A compelling case-to-case mapping of features and implementation of Elasticsearch to solve many real-world use cases makes this book the right choice to start and specialize on Elasticsearch.

Lucene 4 Cookbook

by Vineeth Mohan Edwood Ng

This book is for software developers who are new to Lucene and who want to explore the more advanced topics to build a search engine. Knowledge of Java is necessary to follow the code samples. You will learn core concepts, best practices, and also advanced features, in order to build an effective search application.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI

by Mukesh Mohania Ladjel Bellatreche Roland Wagner Josef Küng Abdelkader Hameurlain

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This volume, the 26th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, focuses on Data Warehousing and Knowledge Discovery from Big Data, and contains extended and revised versions of four papers selected as the best papers from the 16th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2014), held in Munich, Germany, during September 1-5, 2014. The papers focus on data cube computation, the construction and analysis of a data warehouse in the context of cancer epidemiology, pattern mining algorithms, and frequent item-set border approximation.

Database Systems for Advanced Applications: 27th International Conference, DASFAA 2022, Virtual Event, April 11–14, 2022, Proceedings, Part III (Lecture Notes in Computer Science #13247)

by Mukesh Mohania P. Krishna Reddy Anirban Mondal Arnab Bhattacharya Vikram Goyal Janice Lee Mong Li Divyakant Agrawal Rage Uday Kiran

The three-volume set LNCS 13245, 13246 and 13247 constitutes the proceedings of the 26th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held online, in April 2021. The total of 72 full papers, along with 76 short papers, are presented in this three-volume set was carefully reviewed and selected from 543 submissions. Additionally, 13 industrial papers, 9 demo papers and 2 PhD consortium papers are included. The conference was planned to take place in Hyderabad, India, but it was held virtually due to the COVID-19 pandemic.

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

by Abhijit Mohanta Anoop Saldanha

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.What You Will LearnAnalyze, dissect, reverse engineer, and classify malwareEffectively handle malware with custom packers and compilersUnpack complex malware to locate vital malware components and decipher their intentUse various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is ForSecurity professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers"This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Cyclonic Disasters and Resilience: An Empirical Study on South Asian Coastal Regions (Advances in Geographical and Environmental Sciences)

by Ashutosh Mohanty Anupama Dubey R. B. Singh

The Bay of Bengal is prone to tropical cyclones and storm surges as a result of its location, and many of the mostly poor people living along the coastal regions of South Asia lose their lives almost every year. These disasters have been particularly devastating and have caused serious damage. During the past five decades, the low-lying coastal and offshore islands have experienced a tragic history of 50 severe cyclones and storm surges, with more than one million victims dead or missing. People accepted and waited for the next disaster as they had no alternatives. Members of the poor families who survived the disasters experienced hard times recovering from damage and the loss of their loved ones. After disasters, epidemic diseases arise in the affected areas. Many of the people in distress are also deprived of public services. Providing all sorts of assistance and emergency health preparedness are most essential to overcome such a situation. The causes of these huge casualties have been mainly: (1) the high population density of costal settlements, (2) inadequate cyclone shelters in the disaster risk areas, (3) lack of awareness of the disaster risk by the vulnerable population, (4) deterministic attitudes of people who accept disasters as “fate”, (5) houses that are weakly constructed and (6) underdeveloped central awareness programmes and weather forecast systems. This book is based on an empirical study presenting a timeline analysis of major cyclones and their impacts and consequent losses through the super-cyclones in the disaster-prone coastal regions of India, Sri Lanka and Bangladesh. This study also investigates resilience mechanisms based on early warning systems, technology applications including GIS and remote sensing, best practices, success stories and case studies that can be used for effective cyclone management and development of a resilience mechanism among coastal communities.

Ethereum for Architects and Developers: With Case Studies And Code Samples In Solidity

by Debajani Mohanty

Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on your local machine and on the cloud. You’ll cover best practices for writing contracts with ample examples to allow you to write high-quality contracts with optimal usage of fuel. In later chapters, Ethereum for Architects and Developers covers use cases from different business areas, such as finance, travel, supply-chain, insurance, and land registry. Many of these sectors are explained with flowcharts, diagrams, and sample code that you can refer to and further enhance in live projects.By the end of the book, you will have enough information to use Ethereum to create value for your business processes and build foolproof data storage for smoother execution of business.What You Will Learn Discover key BlockChain conceptsMaster the architecture, building blocks, and ecosystem of EthereumDevelop smart contracts from scratch Debug, test, and deploy to test Take advantage of Ethereum in your business area Who This Book Is ForBlockChain developers and architects wanting to develop decentralized Ethereum applications or learn its architecture.

R3 Corda for Architects and Developers: With Case Studies in Finance, Insurance, Healthcare, Travel, Telecom, and Agriculture

by Debajani Mohanty

Explore the entire R3 Corda ecosystem using theory, labs, and use cases. This book introduces distributed ledger technology, Corda architecture, and smart contract programming in Java, guiding you through testing and deployment. Further, you will explore various business problems in finance, insurance, healthcare, travel, and agriculture and discover how Corda can solve these issues through its unique and efficient distributed ledger technology. These business scenarios come with flowcharts, diagrams, and sample code that stakeholders can refer to and further enhance during live projects. After reading R3 Corda for Architects and Developers, you will understand how efficient usage of Corda can create value for your business processes by making business intelligence more readily available, user friendly, and interactive. What You Will Learn Work with distributed ledger technologyDiscover Corda’s differentiators Develop smart contracts, states, and business flows on Corda Take advantage of Corda in your business by going through case studies in various domains Who This Book Is For Blockchain developers and architects who wish to learn Corda.

Big Data: A Primer (Studies in Big Data #11)

by Hrushikesha Mohanty Prachet Bhuyan Deepak Chenthati

This book is a collection of chapters written by experts on various aspects of big data. The book aims to explain what big data is and how it is stored and used. The book starts from the fundamentals and builds up from there. It is intended to serve as a review of the state-of-the-practice in the field of big data handling. The traditional framework of relational databases can no longer provide appropriate solutions for handling big data and making it available and useful to users scattered around the globe. The study of big data covers a wide range of issues including management of heterogeneous data, big data frameworks, change management, finding patterns in data usage and evolution, data as a service, service-generated data, service management, privacy and security. All of these aspects are touched upon in this book. It also discusses big data applications in different domains. The book will prove useful to students, researchers, and practicing database and networking engineers.

Trends in Software Testing

by Hrushikesha Mohanty J. R. Mohanty Arunkumar Balakrishnan

This book is focused on the advancements in the field of software testing and the innovative practices that the industry is adopting. Considering the widely varied nature of software testing, the book addresses contemporary aspects that are important for both academia and industry. There are dedicated chapters on seamless high-efficiency frameworks, automation on regression testing, software by search, and system evolution management. There are a host of mathematical models that are promising for software quality improvement by model-based testing. There are three chapters addressing this concern. Students and researchers in particular will find these chapters useful for their mathematical strength and rigor. Other topics covered include uncertainty in testing, software security testing, testing as a service, test technical debt (or test debt), disruption caused by digital advancement (social media, cloud computing, mobile application and data analytics), and challenges and benefits of outsourcing. The book will be of interest to students, researchers as well as professionals in the software industry.

Webservices: Theory and Practice

by Hrushikesha Mohanty Prasant Kumar Pattnaik

This book focuses on web service specification, search, composition, validation, resiliency, security and engineering, and discusses various service specification standards like WSDL, SAWSDL, WSMO and OWLS. The theory and associated algorithms for service specification verification are detailed using formal models like Petrinet, FSM and UML. The book also explores various approaches proposed for web service search and composition, highlighting input/output, parameter-based search, and selection of services based on both functional and non-functional parameters. In turn, it examines various types of composite web services and presents an overview of popular fault handling strategies for each of these types. Lastly, it discusses the standards used for implementing web service security on the basis of a case study, and introduces the Web Service Development Life Cycle (WSDLC), which defines co-operation between several industry partners to develop web services in a more structured way.

Smart Intelligent Computing and Applications: Proceedings of the Third International Conference on Smart Computing and Informatics, Volume 2 (Smart Innovation, Systems and Technologies #160)

by J. R. Mohanty Suresh Chandra Satapathy Vikrant Bhateja Siba K. Udgata

This book presents high-quality papers from the Third International Conference on Smart Computing and Informatics (SCI 2018−19), organized by the School of Computer Engineering and School of Computer Application, Kalinga Institute of Industrial Technology Deemed to be University, Bhubaneswar, from 21 to 22 December 2018. It includes advanced and multi-disciplinary research on the design of smart computing and informatics, focusing on innovation paradigms in system knowledge, intelligence and sustainability that have the potential to provide realistic solutions to various problems in society, the environment and industry. The papers featured provide a valuable contribution to the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in varied disciplines of science, technology and health care.

ICT Strategies for Schools: A Guide for School Administrators

by Laxman Mohanty Neharika Vohra

Recognizing the potential of ICTs to make the classroom transaction of curriculum significantly more relevant and purposeful, principals and school administrators in India need to design appropriate IT strategies and oversee the entire implementation process in their schools. This book is guide to the use of ICT in schools, covering issues of pedagogy, curriculum and learning. In brief, it deals with - Education uses of IT - Criteria for selection of hardware and software - Designing an IT-assisted curriculum - Teacher recruitment, training and desired competencies - Management and financial issues - Possible problem areas: plagiarism, privacy, hacking Lucidly written, with case studies highlighting successful strategies, this volume will be of immense importance to principals and administrators of schools as also students of education.

Advances in Intelligent Computing and Communication: Proceedings of ICAC 2021 (Lecture Notes in Networks and Systems #430)

by Mihir Narayan Mohanty Swagatam Das

The book presents high-quality research papers presented at 4th International Conference on Intelligent Computing and Advances in Communication (ICAC 2021) organized by Siksha ‘O’ Anusandhan, Deemed to be University, Bhubaneswar, Odisha, India, in November 2021. This book brings out the new advances and research results in the fields of theoretical, experimental, and applied signal and image processing, soft computing, networking, and antenna research. Moreover, it provides a comprehensive and systematic reference on the range of alternative conversion processes and technologies.

Meta Heuristic Techniques in Software Engineering and Its Applications: METASOFT 2022 (Artificial Intelligence-Enhanced Software and Systems Engineering #1)

by Mihir Narayan Mohanty Swagatam Das Mitrabinda Ray Bichitrananda Patra

This book discusses an integration of machine learning with metaheuristic techniques that provide more robust and efficient ways to address traditional optimization problems. Modern metaheuristic techniques, along with their main characteristics and recent applications in artificial intelligence, software engineering, data mining, planning and scheduling, logistics and supply chains, are discussed in this book and help global leaders in fast decision making by providing quality solutions to important problems in business, engineering, economics and science. Novel ways are also discovered to attack unsolved problems in software testing and machine learning. The discussion on foundations of optimization and algorithms leads beginners to apply current approaches to optimization problems. The discussed metaheuristic algorithms include genetic algorithms, simulated annealing, ant algorithms, bee algorithms and particle swarm optimization. New developments on metaheuristics attract researchers and practitioners to apply hybrid metaheuristics in real scenarios.

Decision Making And Problem Solving: A Practical Guide For Applied Research

by Sachi Nandan Mohanty

In Decision Making and Problem Solving: A Practical Guide for Applied Research, the author utilizes traditional approaches, tools, and techniques adopted to solve current day-to-day, real-life problems. The book offers guidance in identifying and applying accurate methods for designing a strategy as well as implementing these strategies in the real world. The book includes realistic case studies and practical approaches that should help readers understand how the decision making occurs and can be applied to problem solving under deep uncertainty.

Emotion and Information Processing: A Practical approach

by Sachi Nandan Mohanty

This book consists of thirteen chapters covering many facts like psycho-social intervention on emotional disorders in individuals, impact of emotion and cognition on blended theory, theory and implication of information processing, effects of emotional self esteem in women, emotional dimension of women in workplace, effects of mental thinking in different age groups irrespective of the gender, negative emotions and its effect on information processing, role of emotions in education and lastly emotional analysis in multi perspective domain adopting machine learning approach. Most of the chapters having experimental studies, with each experiment having different constructs as well as different samples for each data collection. Most of the studies measure information processing within altered mood states, such as depression, anxiety, or positive emotional states, with mental ability tasks being conducted in addition to the experiments of quasi-experimental design.

Evolution and Applications of Quantum Computing

by Sachi Nandan Mohanty Rajanikanth Aluvalu Sarita Mohanty

EVOLUTION and APPLICATIONS of QUANTUM COMPUTING The book is about the Quantum Model replacing traditional computing’s classical model and gives a state-of-the-art technical overview of the current efforts to develop quantum computing and applications for Industry 4.0. A holistic approach to the revolutionary world of quantum computing is presented in this book, which reveals valuable insights into this rapidly emerging technology. The book reflects the dependence of quantum computing on the physical phenomenon of superposition, entanglement, teleportation, and interference to simplify difficult mathematical problems which would have otherwise taken years to derive a definite solution for. An amalgamation of the information provided in the multiple chapters will elucidate the revolutionary and riveting research being carried out in the brand-new domain encompassing quantum computation, quantum information and quantum mechanics. Each chapter gives a concise introduction to the topic. The book comprises 18 chapters and describes the pioneering work on the interaction between artificial intelligence, machine learning, and quantum computing along with their applications and potential role in the world of big data. Subjects include: Combinational circuits called the quantum multiplexer with secured quantum gate (CSWAP); Detecting malicious emails and URLs by using quantum text mining algorithms to distinguish between phishing and benign sites; Quantum data traffic analysis for intrusion detection systems; Applications of quantum computation in banking, netnomy and vehicular ad-hoc networks, virtual reality in the education of autistic children, identifying bacterial diseases and accelerating drug discovery; The critical domain of traditional classical cryptography and quantum cryptography. Audience The book will be very useful for researchers in computer science, artificial intelligence and quantum physics as well as students who want to understand the history of quantum computing along with its applications and have a technical state-of-the-art overview.

Recommender System with Machine Learning and Artificial Intelligence: Practical Tools and Applications in Medical, Agricultural and Other Industries

by Sachi Nandan Mohanty Jyotir Moy Chatterjee Sarika Jain Ahmed A. Elngar Priya Gupta

This book is a multi-disciplinary effort that involves world-wide experts from diverse fields, such as artificial intelligence, human computer interaction, information technology, data mining, statistics, adaptive user interfaces, decision support systems, marketing, and consumer behavior. It comprehensively covers the topic of recommender systems, which provide personalized recommendations of items or services to the new users based on their past behavior. Recommender system methods have been adapted to diverse applications including social networking, movie recommendation, query log mining, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. Recommendations in agricultural or healthcare domains and contexts, the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. This book illustrates how this technology can support the user in decision-making, planning and purchasing processes in agricultural & healthcare sectors.

Machine Learning Approach for Cloud Data Analytics in IoT

by Sachi Nandan Mohanty Jyotir Moy Chatterjee Monika Mangla Suneeta Satpathy Sirisha Potluri

In this era of IoT, edge devices generate gigantic data during every fraction of a second. The main aim of these networks is to infer some meaningful information from the collected data. For the same, the huge data is transmitted to the cloud which is highly expensive and time-consuming. Hence, it needs to devise some efficient mechanism to handle this huge data, thus necessitating efficient data handling techniques. Sustainable computing paradigms like cloud and fog are expedient to capably handle the issues of performance, capabilities allied to storage and processing, maintenance, security, efficiency, integration, cost, energy and latency. However, it requires sophisticated analytics tools so as to address the queries in an optimized time. Hence, rigorous research is taking place in the direction of devising effective and efficient framework to garner utmost advantage. Machine learning has gained unmatched popularity for handling massive amounts of data and has applications in a wide variety of disciplines, including social media. Machine Learning Approach for Cloud Data Analytics in IoT details and integrates all aspects of IoT, cloud computing and data analytics from diversified perspectives. It reports on the state-of-the-art research and advanced topics, thereby bringing readers up to date and giving them a means to understand and explore the spectrum of applications of IoT, cloud computing and data analytics.

Internet of Things and Its Applications (EAI/Springer Innovations in Communication and Computing)

by Sachi Nandan Mohanty Jyotir Moy Chatterjee Suneeta Satpathy

This book offers a holistic approach to the Internet of Things (IoT) model, covering both the technologies and their applications, focusing on uniquely identifiable objects and their virtual representations in an Internet-like structure. The authors add to the rapid growth in research on IoT communications and networks, confirming the scalability and broad reach of the core concepts. The book is filled with examples of innovative applications and real-world case studies. The authors also address the business, social, and legal aspects of the Internet of Things and explore the critical topics of security and privacy and their challenges for both individuals and organizations. The contributions are from international experts in academia, industry, and research.

Refine Search

Showing 32,751 through 32,775 of 53,819 results