Browse Results

Showing 53,351 through 53,375 of 53,546 results

Oracle SOA Suite 11g Administrator's Handbook

by Ahmed Aboulnaga Arun Pareek

The book explains core concepts while providing real world implementation specifics, detailing the administration-related activities with Oracle SOA Suite 11g with a step-by-step approach using real-world examples. The authors demonstrate the use of WLST scripts that administrators can reuse and extend to perform most administration tasks such as deployments, tuning, migration, and installation. If you are an Oracle SOA Suite administrator, WebLogic Server administrator, Database administrator, or developer that needs to administer and secure your Oracle SOA Suite services and applications, then this book is for you. Basic knowledge of Oracle SOA Suite Administration is beneficial, but not necessary.

System Level Design with .Net Technology

by El Mostapha Aboulhamid Frédéric Rousseau

The first book to harness the power of .NET for system design, System Level Design with .NET Technology constitutes a software-based approach to design modeling verification and simulation. World class developers, who have been at the forefront of system design for decades, explain how to tap into the power of this dynamic programming environment for more effective and efficient management of metadata—and introspection and interoperability between tools. Using readily available technology, the text details how to capture constraints and requirements at high levels and describes how to percolate them during the refinement process. Departing from proprietary environments built around System Verilog and VHDL, this cutting-edge reference includes an open source environment (ESys.NET) that readers can use to experiment with new ideas, algorithms, and design methods; and to expand the capabilities of their current tools. It also covers: Modeling and simulation—including requirements specification, IP reuse, and applications of design patterns to hardware/software systems Simulation and validation—including transaction-based models, accurate simulation at cycle and transaction levels, cosimulation and acceleration technique, as well as timing specification and validation Practical use of the ESys.NET environment Worked examples, end of chapter references, and the ESys.NET implementation test bed make this the ideal resource for system engineers and students looking to maximize their embedded system designs.

Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications

by Aboul Ella Hassanien, Nilanjan Dey and Surekha Borra

Big data and the Internet of Things (IoT) play a vital role in prediction systems used in biological and medical applications, particularly for resolving issues related to disease biology at different scales. Modelling and integrating medical big data with the IoT helps in building effective prediction systems for automatic recommendations of diagnosis and treatment. The ability to mine, process, analyse, characterize, classify and cluster a variety and wide volume of medical data is a challenging task. There is a great demand for the design and development of methods dealing with capturing and automatically analysing medical data from imaging systems and IoT sensors. Addressing analytical and legal issues, and research on integration of big data analytics with respect to clinical practice and clinical utility, architectures and clustering techniques for IoT data processing, effective frameworks for removal of misclassified instances, practicality of big data analytics, methodological and technical issues, potential of Hadoop in managing healthcare data is the need of the hour. This book integrates different aspects used in the field of healthcare such as big data, IoT, soft computing, machine learning, augmented reality, organs on chip, personalized drugs, implantable electronics, integration of bio-interfaces, and wearable sensors, devices, practical body area network (BAN) and architectures of web systems. Key Features: Addresses various applications of Medical Big Data and Internet of Medical Things in real time environment Highlights recent innovations, designs, developments and topics of interest in machine learning techniques for classification of medical data Provides background and solutions to existing challenges in Medical Big Data and Internet of Medical Things Provides optimization techniques and programming models to parallelize the computationally intensive tasks in data mining of medical data Discusses interactions, advantages, limitations, challenges and future perspectives of IoT based remote healthcare monitoring systems. Includes data privacy and security analysis of cryptography methods for the Web of Medical Things (WoMT) Presents case studies on the next generation medical chair, electronic nose and pill cam are also presented.

Network-Based Analysis of Dynamical Systems: Methods for Controllability and Observability Analysis, and Optimal Sensor Placement (SpringerBriefs in Computer Science)

by János Abonyi Ágnes Vathy-Fogarassy Dániel Leitold

This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis. Furthermore, it argues that certain dynamical behaviours can stem from the existence of specific motifs in the network representation.Over the last decade, network science has become a widely applied methodology for the analysis of dynamical systems. Representing the system as a mathematical graph allows several network-based methods to be applied, and centrality and clustering measures to be calculated in order to characterise and describe the behaviours of dynamical systems. The applicability of the algorithms developed here is presented in the form of well-known benchmark examples. The algorithms are supported by more than 50 figures and more than 170 references; taken together, they provide a good overview of the current state of network science-based analysis of dynamical systems, and suggest further reading material for researchers and students alike. The files for the proposed toolbox can be downloaded from a corresponding website.

Interpretability of Computational Intelligence-Based Regression Models

by János Abonyi Tamás Kenesei

The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques. The first part of the book deals with the identification of hinging hyperplane-based regression trees. The next part deals with the validation, visualization and structural reduction of neural networks based on the transformation of the hidden layer of the network into an additive fuzzy rule base system. Finally, based on the analogy of support vector regression and fuzzy models, a three-step model reduction algorithm is proposed to get interpretable fuzzy regression models on the basis of support vector regression. The authors demonstrate real-world use of the algorithms with examples taken from process engineering, and they support the text with downloadable Matlab code. The book is suitable for researchers, graduate students and practitioners in the areas of computational intelligence and machine learning.

Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (Management for Professionals)

by Ferri Abolhassan

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

The Drivers of Digital Transformation

by Ferri Abolhassan

Inthis book, leading CEOs, CIOs and experts from international corporationsexplore the role of digitalization and cloud-based processes as the mainbusiness drivers of the 21st century. Focusing on how to get started withdigitalization and how to handle the technologies involved, they employanalyses and practical case studies to demonstrate how to unleash the potentialoffered by the cloud, and how to achieve the most critical success factors -quality and security - through the right partnerships. Readers will discoverwhy the cloud will soon take over the driver's seat in cars, and why HeinekenCIO Anne Teague claims that innovation is impossible without high-quality IT. The book reveals what IT managers can learn from Silicon Valley and Chinatoday, and why Deutsche Telekom CEO Tim Hoettges believes Europe's futuredepends on successful digitalization. In a closing strategic assessment, theeditor Ferri Abolhassan presents the cloud as the essential backbone ofdigitalization. In short, the book provides readers the first comprehensive,high-level assessment of cloud-based digital transformation in the era ofIndustry 4. 0.

Kundenzufriedenheit im IT-Outsourcing: Das Optimum realisieren

by Ferri Abolhassan

Anknüpfend an "Der Weg zur modernen IT-Fabrik" zeigt das Fachbuch anhand von Best-Practice-Beispielen und Erfahrungswerten, welche Maßnahmen ein Unternehmen heute ergreifen kann, um Kunden langfristig zufriedenzustellen und den Qualitätsanspruch an Lösungen - von der Produktion zur Implementierung und darüber hinaus - zu sichern.

The Road to a Modern IT Factory

by Ferri Abolhassan

IT is currently going through one of its most critical phases of transformation. IT vendors and IT service organizations are revolutionizing their production and service processes, adopting industrial practices. It is only through the consistent transformation into factory-like structures that quality, effectiveness and efficiency can be increased. By integrating professional concepts and methods taken from the context of industrial production, it is possible to meet functional and qualitative requirements from the departments and therefore from the end user. On top of that this new paradigm enables the implementation of optimal processes in the organization. An interdisciplinary team of authors addresses the current challenges for global IT services organizations and describes the process of IT industrialization. The transformation of the IT industry towards the model of an IT factory is the core theme of this book, which takes the latest findings from applied research, consulting and IT business practices and combines them into a consistent and innovative approach to IT services.

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

by Lillian Ablon Martin C. Libicki Andrea A. Golay

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks).

Android in Action

by Frank Ableson Chris King C. Enrique Ortiz

SummaryAndroid in Action, Third Edition is a comprehensive tutorial for Android developers. This fast-paced book puts you in the driver's seat -- you'll master the SDK, build WebKit apps using HTML 5, and even learn to extend or replace Android's built-in features by building useful and intriguing examples.About the TechnologyWhen it comes to mobile apps, Android can do almost anything, and with this book, so can you! Android, Google's popular mobile operating system and SDK for tablets and smart phones, is the broadest mobile platform available. It is Java-based, HTML5-aware, and loaded with the features today's mobile users demand.About this BookAndroid in Action, Third Edition takes you far beyond "Hello Android." You'll master the SDK, build WebKit apps using HTML 5, and even learn to extend or replace Android's built-in features. You'll find interesting examples on every page as you explore cross-platform graphics with RenderScript, the updated notification system, and the Native Development Kit. This book also introduces important tablet concepts like drag-and-drop, fragments, and the Action Bar, all new in Android 3. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book. What's InsideCovers Android 3.xSDK and WebKit development from the ground upDriving a robot with Bluetooth and sensorsImage processing with Native C codeThis book is written for hobbyists and developers. A background in Java is helpful. No prior experience with Android is assumed.==================================Table of ContentsPART 1 WHAT IS ANDROID? THE BIG PICTUREIntroducing AndroidAndroid's development environmentPART 2 EXERCISING THE ANDROID SDKUser interfacesIntents and ServicesStoring and retrieving dataNetworking and web servicesTelephonyNotifications and alarmsGraphics and animationMultimedia1Location, location, locationPART 3 ANDROID APPLICATIONSPutting Android to work in a field service applicationBuilding Android applications in CPART 4 THE MATURING PLATFORMBluetooth and sensorsIntegrationAndroid web developmentAppWidgetsLocalizationAndroid Native Development KitActivity fragmentsAndroid 3.0 action barDrag-and-drop

Pattern Recognition and Information Processing: 14th International Conference, PRIP 2019, Minsk, Belarus, May 21–23, 2019, Revised Selected Papers (Communications in Computer and Information Science #1055)

by Sergey V. Ablameyko Viktor V. Krasnoproshin Maryna M. Lukashevich

This book constitutes the refereed proceedings of the 14th International Conference on Pattern Recognition and Information Processing, PRIP 2019, held in Minsk, Belarus, in May 2019. The 25 revised full papers were carefully reviewed and selected from 120 submissions. The papers of this volume are organized in topical sections on pattern recognition and image analysis; information processing and applications.

The Age of Algorithms

by Serge Abiteboul Gilles Dowek

Algorithms are probably the most sophisticated tools that people have had at their disposal since the beginnings of human history. They have transformed science, industry, society. They upset the concepts of work, property, government, private life, even humanity. Going easily from one extreme to the other, we rejoice that they make life easier for us, but fear that they will enslave us. To get beyond this vision of good vs evil, this book takes a new look at our time, the age of algorithms. Creations of the human spirit, algorithms are what we made them. And they will be what we want them to be: it's up to us to choose the world we want to live in.

Liblouis User's and Programmer's Manual

by Abilitiessoft

A guide for users and programmers on Liblouis, an open-source braille translator and back-translator.

Practical Git: Confident Git Through Practice

by Johan Abildskov

Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then enforces this learning through exercises - the Git katas. You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client – either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in. The importance of Git is hard to overstate – it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn’t need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today. What You'll LearnUse Git through scripted exercises and the Git katas Understand Git’s graph modelTroubleshoot common and rare scenarios you may faceSelect and apply the right Git tool for the taskMaintain and collaborate on Git repositoriesTweak Git to gain the most from this powerful tool Who This Book Is For Anyone who is currently using Git in a copy-paste fashion. It will take you from using Git to knowing Git.

Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12618)

by Habtamu Abie Silvio Ranise Luca Verderame Enrico Cambiaso Rita Ugarelli Gabriele Giunta Isabel Praça Federica Battisti

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis.The book contains 6 chapters which are available open access under a CC-BY license.

Secure and Resilient Digital Transformation of Healthcare: First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings (Communications in Computer and Information Science #1884)

by Habtamu Abie Vasileios Gkioulos Sokratis Katsikas Sandeep Pirbhulal

This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full papers together in this volume were carefully reviewed and selected from 9 submissions. The workshop offers a wide range of techniques addressing cybersecurity skills, access control, privacy risks, and resilience in healthcare systems.

Optimization Techniques in Computer Vision

by Mongi A. Abidi Andrei V. Gribok Joonki Paik

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

Deformable Registration Techniques for Thoracic CT Images: An Insight into Medical Image Registration

by Ali Imam Abidi S.K. Singh

This book focuses on novel approaches for thoracic computed tomography (CT) image registration and determination of respiratory motion models in a range of patient scenarios. It discusses the use of image registration processes to remove the inconsistencies between medical images acquired using different devices. In the context of comparative research and medical analysis, these methods are of immense value in image registration procedures, not just for thoracic CT images, but for all types of medical images in multiple modalities, and also in establishing a mean respiration motion model. Combined with advanced techniques, the methods proposed have the potential to advance the field of computer vision and help improve existing methods. The book is a valuable resource for those in the scientific community involved in modeling respiratory motion for a large number of people.

High Order Nonlinear Numerical Schemes for Evolutionary PDEs

by Rémi Abgrall Héloïse Beaugendre Pietro Marco Congedo Cécile Dobrzynski Vincent Perrier Mario Ricchiuto

This book collects papers presented during the European Workshop on High Order Nonlinear Numerical Methods for Evolutionary PDEs (HONOM 2013) that was held at INRIA Bordeaux Sud-Ouest, Talence, France in March, 2013. The central topic is high order methods for compressible fluid dynamics. In the workshop, and in this proceedings, greater emphasis is placed on the numerical than the theoretical aspects of this scientific field. The range of topics is broad, extending through algorithm design, accuracy, large scale computing, complex geometries, discontinuous Galerkin, finite element methods, Lagrangian hydrodynamics, finite difference methods and applications and uncertainty quantification. These techniques find practical applications in such fields as fluid mechanics, magnetohydrodynamics, nonlinear solid mechanics, and others for which genuinely nonlinear methods are needed.

PHP Team Development

by Samisa Abeysinghe

This book looks into PHP projects mainly from an enterprise view. The author's experience enables him to give you an overall picture of PHP projects and discuss factors that contribute to project success in a clear and precise manner. Each chapter focuses specifically on how the techniques covered will make team work easier. Examples (rather than abstract best practices) are used to illustrate the practical benefits. This book is for PHP developers who work in teams on complex PHP projects. With this book in hand, it is easy to discover the secrets of successful PHP projects that meet today's complex enterprise demands. This book can also be useful for project managers who are looking to be successful with PHP projects. Those who are stakeholders in PHP projects, such as clients, or those who want to sponsor PHP projects, can also learn what to expect and how to deal with a PHP project team with this book.

RESTful PHP Web Services

by Samisa Abeysinghe

The book explains the basic concepts associated with the REST architectural style, but the emphasis is on creating PHP code for consuming and creating RESTful services in PHP. There is plenty of example PHP code to illustrate the concepts, with careful explanations of how the code works. This book targets PHP developers who want to build or make use of RESTful web services, or explore the options available to them in PHP. You will need to know the basics of PHP development, but no knowledge of REST is assumed, nor any knowledge of creating web services generally.

Programmer's Guide to Apache Thrift

by William Abernethy

SummaryProgrammer's Guide to Apache Thrift provides comprehensive coverage of the Apache Thrift framework along with a developer's-eye view of modern distributed application architecture.Foreword by Jens Geyer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThrift-based distributed software systems are built out of communicating components that use different languages, protocols, and message types. Sitting between them is Thrift, which handles data serialization, transport, and service implementation. Thrift supports many client and server environments and a host of languages ranging from PHP to JavaScript, and from C++ to Go.About the BookProgrammer's Guide to Apache Thrift provides comprehensive coverage of distributed application communication using the Thrift framework. Packed with code examples and useful insight, this book presents best practices for multi-language distributed development. You'll take a guided tour through transports, protocols, IDL, and servers as you explore programs in C++, Java, and Python. You'll also learn how to work with platforms ranging from browser-based clients to enterprise servers. What's insideComplete coverage of Thrift's IDLBuilding and serializing complex user-defined typesPlug-in protocols, transports, and data compressionCreating cross-language services with RPC and messaging systemsAbout the ReaderReaders should be comfortable with a language like Python, Java, or C++ and the basics of service-oriented or microservice architectures.About the AuthorRandy Abernethy is an Apache Thrift Project Management Committee member and a partner at RX-M.Table of ContentsPART 1 - APACHE THRIFT OVERVIEWIntroduction to Apache ThriftApache Thrift architectureBuilding, testing, and debuggingPART 2 - PROGRAMMING APACHE THRIFTMoving bytes with transportsSerializing data with protocolsApache Thrift IDLUser-defined typesImplementing servicesHandling exceptionsServersPART 3 - APACHE THRIFT LANGUAGESBuilding clients and servers with C++Building clients and servers with JavaBuilding C# clients and servers with .NET Core and WindowsBuilding Node.js clients and serversApache Thrift and JavaScriptScripting Apache ThriftThrift in the enterprise

The Complete Idiot's Guide to Social Media Marketing, 2nd Edition

by Jennifer Abernethy

The Complete Idiot's Guide® to Social Media Marketing, Second Edition, covers cutting-edge techniques for small and large businesses alike. Ask the AuthorQ: How has social media marketing changed business and personal lives?A: The playing field has been leveled for business. No longer do you need a 6 or 7 figure budget to reach people around the country or globe for that matter. Personally, many lives have been affected. Many people more connected, businesses have grown because of the connections, TV and singing careers have been launched, money has been raised for charity, books have been marketed and purchased, and so on.Q: What has been the most challenging part of utilizing social media?A: I think the learning curve. With all of these sites . . . they come with no directions and no LIVE phone number.Q: What has worked the best and worst thus far?A: Facebook because of it&’s broad reach really has worked for me, but many would argue that YouTube works the best; particularly since it is the search engine of choice with the 11–34 age group.Q: How can a person searching for a job use social media marketing?A: So many ways. . . . They need to be on LinkedIn with a professional looking profile, photo, and contact information. They could also utilize video to begin sharing their expertise. Candidates need to stand out in a crowd of millions so if they say . . . sent in a video introducing themselves and a video follow up email . . . that would wow them!Q: What is the newest thing since Twitter?A: I believe companies and individuals are starting to utilize audio for creating their own iTunes channel, and also location-based social media like FourSquare. I personally, am not sold on location based services as of yet from a safety point of view, but for retailers it can be a good thing. I believe video is going to explode in popularity in 2011 for the 35+ market as well. They just need to get comfortable being on camera!

AI and Cognitive Modelling for Education

by Boris Aberšek Andrej Flogie Igor Pesek

This book offers a groundbreaking approach to bridging the gap between various disciplines involved in cognitive modeling in education. By drawing on the fields of learning, neuro science, cognitive science, neurobiology, and computer science, it provides a new perspective on how we can integrate these disciplines with education to create more effective learning environments. The main objective of this book is to delve into the ethical, sociological, and technological questions surrounding the introduction of intelligent and smart learning environments in education. By analyzing these issues, this book aims to bridge the gap between the various disciplines involved in cognitive modeling and education, while highlighting the benefits and risks associated with these advancements. With the emergence of AI-based tutors, coaches, and learning environments, students now have access to a new type of self-learning and self-training that was previously unavailable. Distance learning has become increasingly popular in recent years, and the use of computer-assisted learning tools has revolutionized the way we think about education. The goal of education must be to instill in students a desire to learn for themselves, and this can only be achieved through active, self-directed, and reflective learning. With intelligent tutoring systems, students are empowered to take an active role in their own education, rather than simply being passive recipients of information. This book offers practical strategies for teachers to facilitate this transition, enabling them to act as facilitators and guides rather than one-way communicators. By embracing this new approach to education, we can help students become lifelong learners who are equipped with the skills they need to succeed in the 21st century. As we cannot predict the future with certainty, the true effects of education may only be revealed in the long run, making it critical to understand the potential consequences of introducing these new learning tools. By exploring these complex topics, this book offers valuable insights for educators, policymakers, and anyone interested in the future of education.

Refine Search

Showing 53,351 through 53,375 of 53,546 results