Browse Results

Showing 126 through 150 of 35,146 results

Gradle Essentials

by Abhinandan Kunal Dabir

Master the fundamentals of Gradle using real-world projects with this quick and easy-to-read guide About This Book * Write beautiful build scripts for various types of projects effortlessly * Become more productive by harnessing the power and elegance of the Gradle DSL * Learn how to use Gradle quickly and effectively with this step-by-step guide Who This Book Is For This book is for Java and other JVM-based language developers who want to use Gradle or are already using Gradle on their projects. No prior knowledge of Gradle is required, but some familiarity with build-related terminologies and an understanding of the Java language would help. What You Will Learn * Master the Gradle DSL by identifying the building blocks * Learn just enough Groovy for Gradle * Set up tests and reports for your projects to make them CI ready * Create library, stand-alone, and web projects * Craft multi-module projects quickly and efficiently * Migrate existing projects to a modern Gradle build * Extract common build logic into plugins * Write builds for languages like Java, Groovy, and Scala In Detail Gradle is an advanced and modern build automation tool. It inherits the best elements of the past generation of build tools, but it also differs and innovates to bring terseness, elegance, simplicity, and the flexibility to build. Right from installing Gradle and writing your first build file to creating a fully-fledged multi-module project build, this book will guide you through its topics in a step-by-step fashion. You will get your hands dirty with a simple Java project built with Gradle and go on to build web applications that are run with Jetty or Tomcat. We take a unique approach towards explaining the DSL using the Gradle API, which makes the DSL more accessible and intuitive. All in all, this book is a concise guide to help you decipher the Gradle build files, covering the essential topics that are most useful in real-world projects. With every chapter, you will learn a new topic and be able to readily implement your build files. Style and approach This step-by-step guide focuses on being productive with every chapter. When required, topics are explained in-depth to give you a good foundation of the Gradle fundamentals. The book covers most aspects of builds required for conventional JVM-based projects, and when necessary, points you towards the right resources.

Deformable Registration Techniques for Thoracic CT Images: An Insight into Medical Image Registration

by Ali Imam Abidi S.K. Singh

This book focuses on novel approaches for thoracic computed tomography (CT) image registration and determination of respiratory motion models in a range of patient scenarios. It discusses the use of image registration processes to remove the inconsistencies between medical images acquired using different devices. In the context of comparative research and medical analysis, these methods are of immense value in image registration procedures, not just for thoracic CT images, but for all types of medical images in multiple modalities, and also in establishing a mean respiration motion model. Combined with advanced techniques, the methods proposed have the potential to advance the field of computer vision and help improve existing methods. The book is a valuable resource for those in the scientific community involved in modeling respiratory motion for a large number of people.

Optimization Techniques in Computer Vision

by Mongi A. Abidi Andrei V. Gribok Joonki Paik

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

Liblouis User's and Programmer's Manual

by Abilitiessoft

A guide for users and programmers on Liblouis, an open-source braille translator and back-translator.

Liblouisxml User's and Programmer's Manual

by Abilitiessoft Viewplus Technologies

A user's and programmer's guide for Liblouisxml, a software component for translating XML into braille.

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

by Lillian Ablon Andy Bogart

Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.

Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (Management for Professionals)

by Ferri Abolhassan

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

The Drivers of Digital Transformation

by Ferri Abolhassan

Inthis book, leading CEOs, CIOs and experts from international corporationsexplore the role of digitalization and cloud-based processes as the mainbusiness drivers of the 21st century. Focusing on how to get started withdigitalization and how to handle the technologies involved, they employanalyses and practical case studies to demonstrate how to unleash the potentialoffered by the cloud, and how to achieve the most critical success factors -quality and security - through the right partnerships. Readers will discoverwhy the cloud will soon take over the driver's seat in cars, and why HeinekenCIO Anne Teague claims that innovation is impossible without high-quality IT. The book reveals what IT managers can learn from Silicon Valley and Chinatoday, and why Deutsche Telekom CEO Tim Hoettges believes Europe's futuredepends on successful digitalization. In a closing strategic assessment, theeditor Ferri Abolhassan presents the cloud as the essential backbone ofdigitalization. In short, the book provides readers the first comprehensive,high-level assessment of cloud-based digital transformation in the era ofIndustry 4. 0.

The Road to a Modern IT Factory

by Ferri Abolhassan

IT is currently going through one of its most critical phases of transformation. IT vendors and IT service organizations are revolutionizing their production and service processes, adopting industrial practices. It is only through the consistent transformation into factory-like structures that quality, effectiveness and efficiency can be increased. By integrating professional concepts and methods taken from the context of industrial production, it is possible to meet functional and qualitative requirements from the departments and therefore from the end user. On top of that this new paradigm enables the implementation of optimal processes in the organization. An interdisciplinary team of authors addresses the current challenges for global IT services organizations and describes the process of IT industrialization. The transformation of the IT industry towards the model of an IT factory is the core theme of this book, which takes the latest findings from applied research, consulting and IT business practices and combines them into a consistent and innovative approach to IT services.

Graph-Based Clustering and Data Visualization Algorithms

by János Abonyi Ágnes Vathy-Fogarassy

This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges characterize relations and weights represent similarities or distances) provides a compact representation of the entire complex data set. This text describes clustering and visualization methods that are able to utilize information hidden in these graphs, based on the synergistic combination of clustering, graph-theory, neural networks, data visualization, dimensionality reduction, fuzzy methods, and topology learning. The work contains numerous examples to aid in the understanding and implementation of the proposed algorithms, supported by a MATLAB toolbox available at an associated website.

Network-Based Analysis of Dynamical Systems: Methods for Controllability and Observability Analysis, and Optimal Sensor Placement (SpringerBriefs in Computer Science)

by János Abonyi Ágnes Vathy-Fogarassy Dániel Leitold

This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis. Furthermore, it argues that certain dynamical behaviours can stem from the existence of specific motifs in the network representation.Over the last decade, network science has become a widely applied methodology for the analysis of dynamical systems. Representing the system as a mathematical graph allows several network-based methods to be applied, and centrality and clustering measures to be calculated in order to characterise and describe the behaviours of dynamical systems. The applicability of the algorithms developed here is presented in the form of well-known benchmark examples. The algorithms are supported by more than 50 figures and more than 170 references; taken together, they provide a good overview of the current state of network science-based analysis of dynamical systems, and suggest further reading material for researchers and students alike. The files for the proposed toolbox can be downloaded from a corresponding website.

Extensions of Dynamic Programming for Combinatorial Optimization and Data Mining (Intelligent Systems Reference Library #146)

by Hassan AbouEisha Talha Amin Igor Chikalov Shahid Hussain Mikhail Moshkov

Dynamic programming is an efficient technique for solving optimization problems. It is based on breaking the initial problem down into simpler ones and solving these sub-problems, beginning with the simplest ones. A conventional dynamic programming algorithm returns an optimal object from a given set of objects. This book develops extensions of dynamic programming, enabling us to (i) describe the set of objects under consideration; (ii) perform a multi-stage optimization of objects relative to different criteria; (iii) count the number of optimal objects; (iv) find the set of Pareto optimal points for bi-criteria optimization problems; and (v) to study relationships between two criteria. It considers various applications, including optimization of decision trees and decision rule systems as algorithms for problem solving, as ways for knowledge representation, and as classifiers; optimization of element partition trees for rectangular meshes, which are used in finite element methods for solving PDEs; and multi-stage optimization for such classic combinatorial optimization problems as matrix chain multiplication, binary search trees, global sequence alignment, and shortest paths. The results presented are useful for researchers in combinatorial optimization, data mining, knowledge discovery, machine learning, and finite element methods, especially those working in rough set theory, test theory, logical analysis of data, and PDE solvers. This book can be used as the basis for graduate courses.

Real World Data Mining Applications

by Mahmoud Abou-Nasr Stefan Lessmann Robert Stahlbock Gary M. Weiss

Data mining applications range from commercial to social domains, with novel applications appearing swiftly; for example, within the context of social networks. The expanding application sphere and social reach of advanced data mining raise pertinent issues of privacy and security. Present-day data mining is a progressive multidisciplinary endeavor. This inter- and multidisciplinary approach is well reflected within the field of information systems. The information systems research addresses software and hardware requirements for supporting computationally and data-intensive applications. Furthermore, it encompasses analyzing system and data aspects, and all manual or automated activities. In that respect, research at the interface of information systems and data mining has significant potential to produce actionable knowledge vital for corporate decision-making. The aim of the proposed volume is to provide a balanced treatment of the latest advances and developments in data mining; in particular, exploring synergies at the intersection with information systems. It will serve as a platform for academics and practitioners to highlight their recent achievements and reveal potential opportunities in the field. Thanks to its multidisciplinary nature, the volume is expected to become a vital resource for a broad readership ranging from students, throughout engineers and developers, to researchers and academics.

Computational Social Networks: Security and Privacy

by Ajith Abraham

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Computational Social Networks: Mining and Visualization

by Ajith Abraham

This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Computational Intelligence in Data Mining: Proceedings of the International Conference on CIDM 2017 (Advances in Intelligent Systems and Computing #711)

by Ajith Abraham Himansu Sekhar Behera Janmenjoy Nayak Bighnaraj Naik

The International Conference on “Computational Intelligence in Data Mining” (ICCIDM), after three successful versions, has reached to its fourth version with a lot of aspiration. The best selected conference papers are reviewed and compiled to form this volume. The proceedings discusses the latest solutions, scientific results and methods in solving intriguing problems in the fields of data mining, computational intelligence, big data analytics, and soft computing. The volume presents a sneak preview into the strengths and weakness of trending applications and research findings in the field of computational intelligence and data mining along with related field.

Computational Intelligence in Data Mining: Proceedings of the International Conference on CIDM 2017 (Advances in Intelligent Systems and Computing #711)

by Ajith Abraham Himansu Sekhar Behera Janmenjoy Nayak Bighnaraj Naik

The International Conference on “Computational Intelligence in Data Mining” (ICCIDM), after three successful versions, has reached to its fourth version with a lot of aspiration. The best selected conference papers are reviewed and compiled to form this volume. The proceedings discusses the latest solutions, scientific results and methods in solving intriguing problems in the fields of data mining, computational intelligence, big data analytics, and soft computing. The volume presents a sneak preview into the strengths and weakness of trending applications and research findings in the field of computational intelligence and data mining along with related field.

Next Generation Information Processing System: Proceedings of ICCET 2020, Volume 2 (Advances in Intelligent Systems and Computing #1162)

by Ajith Abraham Prachi Deshpande Kun Ma Brijesh Iyer

This book gathers high-quality research papers presented at the International Conference on Computing in Engineering and Technology (ICCET 2020) [formerly ICCASP], a flagship event in the area of engineering and emerging next-generation technologies jointly organized by the Dr. Babasaheb Ambedkar Technological University and MGM’s College of Engineering in Nanded, India, on 9-11 January 2020. Focusing on next-generation information processing systems, this second volume of the proceedings includes papers on cloud computing and information systems, artificial intelligence and the Internet of Things, hardware design and communication, and front-end design.

Emerging Technologies in Data Mining and Information Security: Proceedings Of Iemis 2018, Volume 3 (Advances In Intelligent Systems and Computing #814)

by Ajith Abraham Paramartha Dutta Jyotsna Kumar Mandal Abhishek Bhattacharya Soumi Dutta

The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research by academics and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security.

Emerging Technologies in Data Mining and Information Security: Proceedings Of Iemis 2018, Volume 3 (Advances In Intelligent Systems and Computing #814)

by Ajith Abraham Paramartha Dutta Jyotsna Kumar Mandal Abhishek Bhattacharya Soumi Dutta

The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research by academics and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security.

Emerging Technologies in Data Mining and Information Security: Proceedings Of Iemis 2018, Volume 3 (Advances In Intelligent Systems and Computing #814)

by Ajith Abraham Paramartha Dutta Jyotsna Kumar Mandal Abhishek Bhattacharya Soumi Dutta

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.

Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges (Studies in Computational Intelligence #676)

by Ajith Abraham Rafael Falcon Mario Koeppen

This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from th e spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors.

Hybrid Intelligent Systems

by Ajith Abraham Sang Yong Han Salah A. Al-Sharhan Hongbo Liu

This bookis devoted to the hybridization of intelligent systems which is a promisingresearch field of modern computational intelligence concerned with thedevelopment of the next generation of intelligent systems. This Volume containsthe papers presented in the Fifteenth International conference on HybridIntelligent Systems (HIS 2015) held in Seoul, South Korea during November 16-18, 2015. The 26 papers presented in this Volume were carefully reviewed andselected from 90 paper submissions. The Volume will be a valuable referenceto researchers, students and practitioners in the computational intelligencefield.

Computational Social Networks: Tools, Perspectives and Applications

by Ajith Abraham Aboul-Ella Hassanien

This book is the first of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on practical tools, applications, and open avenues for further research (the other two volumes review issues of Security and Privacy, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, the representation and analysis of social networks, and the use of semantic networks in knowledge discovery and visualization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Emergent Web Intelligence: Advanced Information Retrieval

by Ajith Abraham Aboul-Ella Hassanien Youakim Badr Richard Chbeir

Web Intelligence explores the impact of artificial intelligence and advanced information technologies representing the next generation of Web-based systems, services, and environments, and designing hybrid web systems that serve wired and wireless users more efficiently. Multimedia and XML-based data are produced regularly and in increasing way in our daily digital activities, and their retrieval must be explored and studied in this emergent web-based era. 'Emergent Web Intelligence: Advanced information retrieval' provides reviews of the related cutting-edge technologies and insights. It is valuable companion and comprehensive reference for undergraduate and postgraduate students who are taking a course in Web intelligence and need to study current concepts of retrieval of multimedia and XML-based data, developers who need to implement advanced search engine and make benefit of web intelligence technologies, researchers who desire to understand exiting approaches, pin down their limits, and identify several future directions. The book is organized in self-contained chapters to provide greatest reading flexibility.

Refine Search

Showing 126 through 150 of 35,146 results