Browse Results

Showing 151 through 175 of 53,404 results

Modern R Programming Cookbook

by Jaynal Abedin

Recipes for emerging developers in R programming and data scientists to simplify their R programming capabilities About This Book • Develop strategies to speed up your R code • Tackle programming problems and explore both functional and object-oriented programming techniques • Learn how to address the core problems of programming in R with the most popular R packages for common tasks Who This Book Is For This book is for developers who would like to enhance the R programming skills. Basic knowledge of R programming is assumed. What You Will Learn • Install R and its various IDE for a given platform along with installing libraries from different repositories and version control • Learn about basic data structures in R and how to work with them • Write customized R functions and handle recursions, exceptions in R environments • Create the data processing task as a step by step computer program and execute using dplyr • Extract and process unstructured text data • Interact with database management system to develop statistical applications • Formulate and implement parallel processing in R In Detail R is a powerful tool for statistics, graphics, and statistical programming. It is used by tens of thousands of people daily to perform serious statistical analyses. It is a free, open source system whose implementation is the collective accomplishment of many intelligent, hard-working people. There are more than 2,000 available add-ons, and R is a serious rival to all commercial statistical packages. The objective of this book is to show how to work with different programming aspects of R. The emerging R developers and data science could have very good programming knowledge but might have limited understanding about R syntax and semantics. Our book will be a platform develop practical solution out of real world problem in scalable fashion and with very good understanding. You will work with various versions of R libraries that are essential for scalable data science solutions. You will learn to work with Input / Output issues when working with relatively larger dataset. At the end of this book readers will also learn how to work with databases from within R and also what and how meta programming helps in developing applications. Style and approach This book will be a companion for R programmer and emerging developers in R programming areas. This book will contain recipes related to advanced R programming which will enable users to solve complex problems efficiently.

R Graphs Cookbook Second Edition

by Jaynal Abedin Hrishi V. Mittal

Targeted at those with an existing familiarity with R programming, this practical guide will appeal directly to programmers interested in learning effective data visualization techniques with R and a wide-range of its associated libraries.

Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)

by Mohammad Zoynul Abedin Petr Hajek

To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.

Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)

by Mohammad Zoynul Abedin Petr Hajek

To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis.The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.

Novel Financial Applications of Machine Learning and Deep Learning: Algorithms, Product Modeling, and Applications (International Series in Operations Research & Management Science #336)

by Mohammad Zoynul Abedin Petr Hajek

This book presents the state-of-the-art applications of machine learning in the finance domain with a focus on financial product modeling, which aims to advance the model performance and minimize risk and uncertainty. It provides both practical and managerial implications of financial and managerial decision support systems which capture a broad range of financial data traits. It also serves as a guide for the implementation of risk-adjusted financial product pricing systems, while adding a significant supplement to the financial literacy of the investigated study. The book covers advanced machine learning techniques, such as Support Vector Machine, Neural Networks, Random Forest, K-Nearest Neighbors, Extreme Learning Machine, Deep Learning Approaches, and their application to finance datasets. It also leverages real-world financial instances to practice business product modeling and data analysis. Software code, such as MATLAB, Python and/or R including datasets within a broad range of financial domain are included for more rigorous practice. The book primarily aims at providing graduate students and researchers with a roadmap for financial data analysis. It is also intended for a broad audience, including academics, professional financial analysts, and policy-makers who are involved in forecasting, modeling, trading, risk management, economics, credit risk, and portfolio management.

The Essentials of Machine Learning in Finance and Accounting (Routledge Advanced Texts in Economics and Finance)

by Mohammad Zoynul Abedin M. Kabir Hassan Petr Hajek Mohammed Mohi Uddin

Th­is book introduces machine learning in finance and illustrates how we can use computational tools in numerical finance in real-world context. ­These computational techniques are particularly useful in financial risk management, corporate bankruptcy prediction, stock price prediction, and portfolio management. ­The book also offers practical and managerial implications of financial and managerial decision support systems and how these systems capture vast amount of financial data. Business risk and uncertainty are two of the toughest challenges in the financial industry. Th­is book will be a useful guide to the use of machine learning in forecasting, modeling, trading, risk management, economics, credit risk, and portfolio management.

Neo4j in Action

by Tareq Abedrabbo Nicki Watt Dominic Fox Aleksa Vukotic

SummaryNeo4j in Action is a comprehensive guide to Neo4j, aimed at application developers and software architects. Using hands-on examples, you'll learn to model graph domains naturally with Neo4j graph structures. The book explores the full power of native Java APIs for graph data manipulation and querying.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the TechnologyMuch of the data today is highly connected—from social networks to supply chains to software dependency management—and more connections are continually being uncovered. Neo4j is an ideal graph database tool for highly connected data. It is mature, production-ready, and unique in enabling developers to simply and efficiently model and query connected data. About the BookNeo4j in Action is a comprehensive guide to designing, implementing, and querying graph data using Neo4j. Using hands-on examples, you'll learn to model graph domains naturally with Neo4j graph structures. The book explores the full power of native Java APIs for graph data manipulation and querying. It also covers Cypher, Neo4j's graph query language. Along the way, you'll learn how to integrate Neo4j into your domain-driven app using Spring Data Neo4j, as well as how to use Neo4j in standalone server or embedded modes. Knowledge of Java basics is required. No prior experience with graph data or Neo4j is assumed. What's InsideGraph database patternsHow to model data in social networksHow to use Neo4j in your Java applicationsHow to configure and set up Neo4jAbout the AuthorsAleksa Vukotic is an architect specializing in graph data models. Nicki Watt, Dominic Fox, Tareq Abedrabbo, and Jonas Partner work at OpenCredo, a Neo Technology partner, and have been involved in many projects using Neo4j.Table of ContentsPART 1 INTRODUCTION TO NEO4JA case for a Neo4j databaseData modeling in Neo4jStarting development with Neo4j The power of traversalsIndexing the dataPART 2 APPLICATION DEVELOPMENT WITH NEO4JCypher: Neo4j query languageTransactionsTraversals in depthSpring Data Neo4jPART 3 NEO4J IN PRODUCTIONNeo4j: embedded versus server mode

Advances in Databases and Information Systems: 27th European Conference, ADBIS 2023, Barcelona, Spain, September 4–7, 2023, Proceedings (Lecture Notes in Computer Science #13985)

by Alberto Abelló Panos Vassiliadis Oscar Romero Robert Wrembel

This book constitutes the proceedings of the 27th European Conference on Advances in Databases and Information Systems, ADBIS 2023, held in Barcelona, Spain, during September 4–7, 2023. The 11 full papers presented in this book together with 3 keynotes and tutorials were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: keynote talk and tutorials; query processing and data exploration, data science and fairness and Data and Metadata Quality

New Trends in Database and Information Systems: ADBIS 2023 Short Papers, Doctoral Consortium and Workshops: AIDMA, DOING, K-Gals, MADEISD, PeRS, Barcelona, Spain, September 4–7, 2023, Proceedings (Communications in Computer and Information Science #1850)

by Alberto Abelló Panos Vassiliadis Oscar Romero Robert Wrembel Francesca Bugiotti Johann Gamper Genoveva Vargas Solar Ester Zumpano

This book constitutes the refereed proceedings of the Doctoral Consortium and Workshops on New Trends in Database and Information Systems, ADBIS 2023, held in Barcelona, Spain, during September 4–7, 2023.The 29 full papers, 25 short papers and 7 doctoral consortium included in this book were carefully reviewed and selected from 148. They were organized in topical sections as follows: ADBIS Short Papers: Index Management & Data Reconstruction, ADBIS Short Papers: Query Processing, ADBIS Short Papers: Advanced Querying Techniques, ADBIS Short Papers: Fairness in Data Management, ADBIS Short Papers: Data Science, ADBIS Short Papers: Temporal Graph Management, ADBIS Short Papers: Consistent Data Management, ADBIS Short Papers: Data Integration, ADBIS Short Papers: Data Quality, ADBIS Short Papers: Metadata Management, Contributions from ADBIS 2023 Workshops and Doctoral Consortium, AIDMA: 1st Workshop on Advanced AI Techniques for Data Management, Analytics, DOING: 4th Workshop on Intelligent Data - From Data to Knowledge, K-Gals: 2nd Workshop on Knowledge Graphs Analysis on a Large Scale, MADEISD: 5th Workshop on Modern Approaches in Data Engineering, Information System Design, PeRS: 2nd Workshop on Personalization, Recommender Systems, Doctoral Consortium.

Transforming Global Information and Communication Markets

by Donald Abelson Jonathan D. Aronson Peter F. Cowhey

Innovation in information and communication technology (ICT) fuels the growth of the global economy. How ICT markets evolve depends on politics and policy, and since the 1950s periodic overhauls of ICT policy have transformed competition and innovation. For example, in the 1980s and the 1990s a revolution in communication policy (the introduction of sweeping competition) also transformed the information market. Today, the diffusion of Internet, wireless, and broadband technology, growing modularity in the design of technologies, distributed computing infrastructures, and rapidly changing business models signal another shift. This pathbreaking examination of ICT from a political economy perspective argues that continued rapid innovation and economic growth require new approaches in global governance that will reconcile diverse interests and enable competition to flourish. The authors (two of whom were architects of international ICT policy reforms in the 1990s) discuss this crucial turning point in both theoretical and practical terms.

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

by Hal Abelson Ken Ledeen Harry Lewis

"For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development. It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everything. If digitized, the world has enough disks and memory chips to save it all, for as long as civilization can keep producing computers and disk drives. Global computer networks can make it available to everywhere in the world, almost instantly. And computers are powerful enough to extract meaning from all that information, to find patterns and make connections in the blink of an eye. <p><p>In centuries gone by, others may have dreamed these things could happen, in Utopian fantasies or in nightmares. But now they are happening. We are living in the middle of the changes, and we can see the changes happening. But we don't know how things will turn out. Right now, governments and the other institutions of human societies are deciding how to use the new possibilities. Each of us is participating as we make decisions for ourselves, for our families, and for people we work with. Everyone needs to know how their world and the world around them is changing as a result of this explosion of digital information. Everyone should know how the decisions will affect their lives, and the lives of their children and grandchildren and everyone who comes after. That is why we wrote this book." - By the Authors

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

by Hal Abelson Ken Ledeen Harry Lewis Wendy Seltzer

What you must know to protect yourself today. <p><p>The digital technology explosion has blown everything to bits--and the blast has provided new challenges and opportunities. This second edition of Blown to Bits delivers the knowledge you need to take greater control of your information environment and thrive in a world that's coming whether you like it or not. <p><p>Straight from internationally respected Harvard/MIT experts, this plain-English bestseller has been fully revised for the latest controversies over social media, “fake news,” big data, cyberthreats, privacy, artificial intelligence and machine learning, self-driving cars, the Internet of Things, and much more. <p><p>Discover who owns all that data about you―and what they can infer from it. Learn to challenge algorithmic decisions. See how close you can get to sending truly secure messages. Decide whether you really want always-on cameras and microphones. Explore the realities of Internet free speech. Protect yourself against out-of-control technologies (and the powerful organizations that wield them). <p><p>You will find clear explanations, practical examples, and real insight into what digital tech means to you--as an individual, and as a citizen.

App Inventor

by Hal Abelson David Wolber Ellen Spertus Liz Looney

Yes, you can create your own apps for Android phones--and it's easy to do. This extraordinary book introduces App Inventor for Android, a powerful visual tool that lets anyone build apps for Android-based devices. Learn the basics of App Inventor with step-by-step instructions for more than a dozen fun projects, such as creating location-aware apps, data storage, and apps that include decision-making logic. The second half of the book features an Inventor's manual to help you understand the fundamentals of app building and computer science. App Inventor makes an excellent textbook for beginners and experienced developers alike. Design games and other apps with 2D graphics and animation Create custom multi-media quizzes and study guides Create a custom tour of your city, school, or workplace Use an Android phone to control a LEGO® MINDSTORMS® NXT robot Build location-aware apps by working with your phone's sensors Explore apps that incorporate information from the Web Learn computer science as you build your apps

App Inventor

by Hal Abelson David Wolber Ellen Spertus Liz Looney

Yes, you can create your own apps for Android phones—and it's easy to do. This extraordinary book introduces App Inventor for Android, a powerful visual tool that lets anyone build apps for Android-based devices. Learn the basics of App Inventor with step-by-step instructions for more than a dozen fun projects, such as creating location-aware apps, data storage, and apps that include decision-making logic.The second half of the book features an Inventor's manual to help you understand the fundamentals of app building and computer science. App Inventor makes an excellent textbook for beginners and experienced developers alike.Design games and other apps with 2D graphics and animationCreate custom multi-media quizzes and study guidesCreate a custom tour of your city, school, or workplaceUse an Android phone to control a LEGO® MINDSTORMS® NXT robotBuild location-aware apps by working with your phone’s sensorsExplore apps that incorporate information from the WebLearn computer science as you build your apps

App Inventor 2: Create Your Own Android Apps

by Hal Abelson David Wolber Ellen Spertus Liz Looney

Yes, you can create your own apps for Android devices—and it’s easy to do. This extraordinary book introduces you to App Inventor 2, a powerful visual tool that lets anyone build apps. Learn App Inventor basics hands-on with step-by-step instructions for building more than a dozen fun projects, including a text answering machine app, a quiz app, and an app for finding your parked car!The second half of the book features an Inventor’s Manual to help you understand the fundamentals of app building and computer science. App Inventor 2 makes an excellent textbook for beginners and experienced developers alike.Use programming blocks to build apps—like working on a puzzleCreate custom multi-media quizzes and study guidesDesign games and other apps with 2D graphics and animationMake a custom tour of your city, school, or workplaceControl a LEGO® MINDSTORMS® NXT robot with your phoneBuild location-aware apps by working with your phone’s sensorsExplore apps that incorporate information from the Web

Structure and Interpretation of Computer Programs: JavaScript Edition (MIT Electrical Engineering and Computer Science)

by Harold Abelson Gerald Jay Sussman

A new version of the classic and widely used text adapted for the JavaScript programming language.Since the publication of its first edition in 1984 and its second edition in 1996, Structure and Interpretation of Computer Programs (SICP) has influenced computer science curricula around the world. Widely adopted as a textbook, the book has its origins in a popular entry-level computer science course taught by Harold Abelson and Gerald Jay Sussman at MIT. SICP introduces the reader to central ideas of computation by establishing a series of mental models for computation. Earlier editions used the programming language Scheme in their program examples. This new version of the second edition has been adapted for JavaScript. The first three chapters of SICP cover programming concepts that are common to all modern high-level programming languages. Chapters four and five, which used Scheme to formulate language processors for Scheme, required significant revision. Chapter four offers new material, in particular an introduction to the notion of program parsing. The evaluator and compiler in chapter five introduce a subtle stack discipline to support return statements (a prominent feature of statement-oriented languages) without sacrificing tail recursion. The JavaScript programs included in the book run in any implementation of the language that complies with the ECMAScript 2020 specification, using the JavaScript package sicp provided by the MIT Press website.

Moodle for Mobile Learning

by Mark Aberdour

A guide with practical examples that gives you hands-on knowledge in creating learning environments for Mobile devices using Moodle, while also empowering you to create your own effective mlearning course designs."Moodle for Mobile Learning" is primarily aimed at Moodle course practitioners - teachers, tutors, instructors, and learning and development professionals. It does not require you to have an in-depth knowledge about any mobile technologies. It is for anyone who has the desire to deliver great courses that allow their learners to interact using the devices in their pockets.

AI and Cognitive Modelling for Education

by Boris Aberšek Andrej Flogie Igor Pesek

This book offers a groundbreaking approach to bridging the gap between various disciplines involved in cognitive modeling in education. By drawing on the fields of learning, neuro science, cognitive science, neurobiology, and computer science, it provides a new perspective on how we can integrate these disciplines with education to create more effective learning environments. The main objective of this book is to delve into the ethical, sociological, and technological questions surrounding the introduction of intelligent and smart learning environments in education. By analyzing these issues, this book aims to bridge the gap between the various disciplines involved in cognitive modeling and education, while highlighting the benefits and risks associated with these advancements. With the emergence of AI-based tutors, coaches, and learning environments, students now have access to a new type of self-learning and self-training that was previously unavailable. Distance learning has become increasingly popular in recent years, and the use of computer-assisted learning tools has revolutionized the way we think about education. The goal of education must be to instill in students a desire to learn for themselves, and this can only be achieved through active, self-directed, and reflective learning. With intelligent tutoring systems, students are empowered to take an active role in their own education, rather than simply being passive recipients of information. This book offers practical strategies for teachers to facilitate this transition, enabling them to act as facilitators and guides rather than one-way communicators. By embracing this new approach to education, we can help students become lifelong learners who are equipped with the skills they need to succeed in the 21st century. As we cannot predict the future with certainty, the true effects of education may only be revealed in the long run, making it critical to understand the potential consequences of introducing these new learning tools. By exploring these complex topics, this book offers valuable insights for educators, policymakers, and anyone interested in the future of education.

The Complete Idiot's Guide to Social Media Marketing, 2nd Edition

by Jennifer Abernethy

The Complete Idiot's Guide® to Social Media Marketing, Second Edition, covers cutting-edge techniques for small and large businesses alike. Ask the AuthorQ: How has social media marketing changed business and personal lives?A: The playing field has been leveled for business. No longer do you need a 6 or 7 figure budget to reach people around the country or globe for that matter. Personally, many lives have been affected. Many people more connected, businesses have grown because of the connections, TV and singing careers have been launched, money has been raised for charity, books have been marketed and purchased, and so on.Q: What has been the most challenging part of utilizing social media?A: I think the learning curve. With all of these sites . . . they come with no directions and no LIVE phone number.Q: What has worked the best and worst thus far?A: Facebook because of it&’s broad reach really has worked for me, but many would argue that YouTube works the best; particularly since it is the search engine of choice with the 11–34 age group.Q: How can a person searching for a job use social media marketing?A: So many ways. . . . They need to be on LinkedIn with a professional looking profile, photo, and contact information. They could also utilize video to begin sharing their expertise. Candidates need to stand out in a crowd of millions so if they say . . . sent in a video introducing themselves and a video follow up email . . . that would wow them!Q: What is the newest thing since Twitter?A: I believe companies and individuals are starting to utilize audio for creating their own iTunes channel, and also location-based social media like FourSquare. I personally, am not sold on location based services as of yet from a safety point of view, but for retailers it can be a good thing. I believe video is going to explode in popularity in 2011 for the 35+ market as well. They just need to get comfortable being on camera!

Programmer's Guide to Apache Thrift

by William Abernethy

SummaryProgrammer's Guide to Apache Thrift provides comprehensive coverage of the Apache Thrift framework along with a developer's-eye view of modern distributed application architecture.Foreword by Jens Geyer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThrift-based distributed software systems are built out of communicating components that use different languages, protocols, and message types. Sitting between them is Thrift, which handles data serialization, transport, and service implementation. Thrift supports many client and server environments and a host of languages ranging from PHP to JavaScript, and from C++ to Go.About the BookProgrammer's Guide to Apache Thrift provides comprehensive coverage of distributed application communication using the Thrift framework. Packed with code examples and useful insight, this book presents best practices for multi-language distributed development. You'll take a guided tour through transports, protocols, IDL, and servers as you explore programs in C++, Java, and Python. You'll also learn how to work with platforms ranging from browser-based clients to enterprise servers. What's insideComplete coverage of Thrift's IDLBuilding and serializing complex user-defined typesPlug-in protocols, transports, and data compressionCreating cross-language services with RPC and messaging systemsAbout the ReaderReaders should be comfortable with a language like Python, Java, or C++ and the basics of service-oriented or microservice architectures.About the AuthorRandy Abernethy is an Apache Thrift Project Management Committee member and a partner at RX-M.Table of ContentsPART 1 - APACHE THRIFT OVERVIEWIntroduction to Apache ThriftApache Thrift architectureBuilding, testing, and debuggingPART 2 - PROGRAMMING APACHE THRIFTMoving bytes with transportsSerializing data with protocolsApache Thrift IDLUser-defined typesImplementing servicesHandling exceptionsServersPART 3 - APACHE THRIFT LANGUAGESBuilding clients and servers with C++Building clients and servers with JavaBuilding C# clients and servers with .NET Core and WindowsBuilding Node.js clients and serversApache Thrift and JavaScriptScripting Apache ThriftThrift in the enterprise

PHP Team Development

by Samisa Abeysinghe

This book looks into PHP projects mainly from an enterprise view. The author's experience enables him to give you an overall picture of PHP projects and discuss factors that contribute to project success in a clear and precise manner. Each chapter focuses specifically on how the techniques covered will make team work easier. Examples (rather than abstract best practices) are used to illustrate the practical benefits. This book is for PHP developers who work in teams on complex PHP projects. With this book in hand, it is easy to discover the secrets of successful PHP projects that meet today's complex enterprise demands. This book can also be useful for project managers who are looking to be successful with PHP projects. Those who are stakeholders in PHP projects, such as clients, or those who want to sponsor PHP projects, can also learn what to expect and how to deal with a PHP project team with this book.

RESTful PHP Web Services

by Samisa Abeysinghe

The book explains the basic concepts associated with the REST architectural style, but the emphasis is on creating PHP code for consuming and creating RESTful services in PHP. There is plenty of example PHP code to illustrate the concepts, with careful explanations of how the code works. This book targets PHP developers who want to build or make use of RESTful web services, or explore the options available to them in PHP. You will need to know the basics of PHP development, but no knowledge of REST is assumed, nor any knowledge of creating web services generally.

High Order Nonlinear Numerical Schemes for Evolutionary PDEs

by Rémi Abgrall Héloïse Beaugendre Pietro Marco Congedo Cécile Dobrzynski Vincent Perrier Mario Ricchiuto

This book collects papers presented during the European Workshop on High Order Nonlinear Numerical Methods for Evolutionary PDEs (HONOM 2013) that was held at INRIA Bordeaux Sud-Ouest, Talence, France in March, 2013. The central topic is high order methods for compressible fluid dynamics. In the workshop, and in this proceedings, greater emphasis is placed on the numerical than the theoretical aspects of this scientific field. The range of topics is broad, extending through algorithm design, accuracy, large scale computing, complex geometries, discontinuous Galerkin, finite element methods, Lagrangian hydrodynamics, finite difference methods and applications and uncertainty quantification. These techniques find practical applications in such fields as fluid mechanics, magnetohydrodynamics, nonlinear solid mechanics, and others for which genuinely nonlinear methods are needed.

Deformable Registration Techniques for Thoracic CT Images: An Insight into Medical Image Registration

by Ali Imam Abidi S.K. Singh

This book focuses on novel approaches for thoracic computed tomography (CT) image registration and determination of respiratory motion models in a range of patient scenarios. It discusses the use of image registration processes to remove the inconsistencies between medical images acquired using different devices. In the context of comparative research and medical analysis, these methods are of immense value in image registration procedures, not just for thoracic CT images, but for all types of medical images in multiple modalities, and also in establishing a mean respiration motion model. Combined with advanced techniques, the methods proposed have the potential to advance the field of computer vision and help improve existing methods. The book is a valuable resource for those in the scientific community involved in modeling respiratory motion for a large number of people.

Optimization Techniques in Computer Vision

by Mongi A. Abidi Andrei V. Gribok Joonki Paik

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

Refine Search

Showing 151 through 175 of 53,404 results