Browse Results

Showing 19,851 through 19,875 of 55,784 results

Agent-Based Approaches in Economic and Social Complex Systems VII: Post-Proceedings of The AESCS International Workshop 2012 (Agent-Based Social Systems #10)

by Takao Terano Shingo Takahashi Tadahiko Murata

Agent-based modeling/simulation is an emergent approach to the analysis of social and economic systems. It provides a bottom-up experimental method to be applied to social sciences such as economics, management, sociology, and politics as well as some engineering fields dealing with social activities. This book includes selected papers presented at the Seventh International Workshop on Agent-Based Approaches in Economic and Social Complex Systems held in Osaka, Japan, in 2012. At the workshop, 24 reviewed full papers were presented, and of those, 17 were selected to be included in this volume. The papers are divided into two groups as "Fundamentals of Agent-Based Modeling" and "Applications of Agent-Based Modeling".

Comptia Security+ All-in-one Exam Guide, Fifth Edition (exam Sy0-501)

by Dwayne Williams Chuck Cothren Roger L. Davis Greg White Wm. Arthur Conklin

<P>This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam <P>Take the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified. <P>CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions. To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. <P> All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals. <br>• Provides 100% coverage of every objective on exam SY0-501 <br>• Electronic content includes 200 practice questions and a secured book PDF <br>• Written by a team of experienced IT security academics

Starting out with Visual Basic (3rd Custom LACC Edition)

by Tony Gaddis Kip Irvibe

Starting out with Visual Basic. Third Custom Edition for Los Angeles City College.

Partitions, Hypergeometric Systems, and Dirichlet Processes in Statistics (SpringerBriefs in Statistics #0)

by Shuhei Mano

This book focuses on statistical inferences related to various combinatorial stochastic processes. Specifically, it discusses the intersection of three subjects that are generally studied independently of each other: partitions, hypergeometric systems, and Dirichlet processes. The Gibbs partition is a family of measures on integer partition, and several prior processes, such as the Dirichlet process, naturally appear in connection with infinite exchangeable Gibbs partitions. Examples include the distribution on a contingency table with fixed marginal sums and the conditional distribution of Gibbs partition given the length. The A-hypergeometric distribution is a class of discrete exponential families and appears as the conditional distribution of a multinomial sample from log-affine models. The normalizing constant is the A-hypergeometric polynomial, which is a solution of a system of linear differential equations of multiple variables determined by a matrix A, called A-hypergeometric system. The book presents inference methods based on the algebraic nature of the A-hypergeometric system, and introduces the holonomic gradient methods, which numerically solve holonomic systems without combinatorial enumeration, to compute the normalizing constant. Furher, it discusses Markov chain Monte Carlo and direct samplers from A-hypergeometric distribution, as well as the maximum likelihood estimation of the A-hypergeometric distribution of two-row matrix using properties of polytopes and information geometry. The topics discussed are simple problems, but the interdisciplinary approach of this book appeals to a wide audience with an interest in statistical inference on combinatorial stochastic processes, including statisticians who are developing statistical theories and methodologies, mathematicians wanting to discover applications of their theoretical results, and researchers working in various fields of data sciences.

Separating Information Maximum Likelihood Method for High-Frequency Financial Data (SpringerBriefs in Statistics #0)

by Naoto Kunitomo Seisho Sato Daisuke Kurisu

This book presents a systematic explanation of the SIML (Separating Information Maximum Likelihood) method, a new approach to financial econometrics.Considerable interest has been given to the estimation problem of integrated volatility and covariance by using high-frequency financial data. Although several new statistical estimation procedures have been proposed, each method has some desirable properties along with some shortcomings that call for improvement. For estimating integrated volatility, covariance, and the related statistics by using high-frequency financial data, the SIML method has been developed by Kunitomo and Sato to deal with possible micro-market noises.The authors show that the SIML estimator has reasonable finite sample properties as well as asymptotic properties in the standard cases. It is also shown that the SIML estimator has robust properties in the sense that it is consistent and asymptotically normal in the stable convergence sense when there are micro-market noises, micro-market (non-linear) adjustments, and round-off errors with the underlying (continuous time) stochastic process. Simulation results are reported in a systematic way as are some applications of the SIML method to the Nikkei-225 index, derived from the major stock index in Japan and the Japanese financial sector.

A Practical Guide to Using Glycomics Databases

by Kiyoko F. Aoki-Kinoshita

This book provides glycoscientists with a handbook of useful databases that can be applied to glycoscience research. Although many databases are now publicly available, one of the hurdles for their users is the learning curve required to effectively utilize those databases. Therefore, this book not only describes the existing databases, but also provides tips on how to obtain the target data. That is, because many databases provide a variety of data that could be obtained from different perspectives, each chapter provides users with potential biological questions that can be answered by a particular database and step-by-step instructions, with figures, on how to obtain that data. Troubleshooting tips are also provided to aid users encountering problems that can be predicted when using these databases. Moreover, contact information for each database is provided in case unexpected issues arise.

VLSI Design and Test for Systems Dependability

by Shojiro Asai

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems.The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project “Dependable VLSI Systems,” in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial–economic perspectives will also benefit from the discussions in this book.

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection

by E Dawson S. V. Raghavan

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Complex Binary Number System: Algorithms and Circuits (SpringerBriefs in Electrical and Computer Engineering)

by Tariq Jamil

This book is a compilation of the entire research work on the topic of Complex Binary Number System (CBNS) carried out by the author as the principal investigator and members of his research groups at various universities during the years 2000-2012. Pursuant to these efforts spanning several years, the realization of CBNS as a viable alternative to represent complex numbers in an "all-in-one" binary number format has become possible and efforts are underway to build computer hardware based on this unique number system. It is hoped that this work will be of interest to anyone involved in computer arithmetic and digital logic design and kindle renewed enthusiasm among the engineers working in the areas of digital signal and image processing for developing newer and efficient algorithms and techniques incorporating CBNS.

Comptia It Fundamentals All-in-one Exam Guide (exam Fc0-u51)

by Scott Jernigan Mike Meyers

<P>This effective study guide delivers 100% coverage of all topics on the CompTIA IT Fundamentals exam <P>Take the CompTIA IT Fundamentals exam with complete confidence using the detailed information contained in this comprehensive self-study resource. Written by two of the industry’s leading CompTIA A+ authorities, the book serves as both a powerful exam preparation tool and an ideal on-the-job reference. <P>CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51) offers complete coverage of every exam objective and follows the proven methodology that has established Mike Meyers as the #1 name in CompTIA training and certification. Readers will learn how to identify computer components, set up software, establish network connectivity, and minimize security risks. Learning objectives, chapter summaries, practice exam questions, and exam tips highlight key points throughout. <P>Complete coverage of the CompTIA IT Fundamentals exam FC0-U51 <P>Written with the "in the trenches" voice and clarity Mike Meyers is known for <P>Electronic content includes customizable test engine with 130 practice questions, an introductory video from Mike Meyers, and a link to over an hour of free video training episodes from Mike Meyers' CompTIA IT Fundamentals Certification Video Training series

Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 (Advances in Intelligent Systems and Computing #246)

by G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Anthony Bonato Manuel Graña

This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19-21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

Application of Evolutionary Algorithms for Multi-objective Optimization in VLSI and Embedded Systems

by M. C. Bhuvaneswari

This book describes how evolutionary algorithms (EA), including genetic algorithms (GA) and particle swarm optimization (PSO) can be utilized for solving multi-objective optimization problems in the area of embedded and VLSI system design. Many complex engineering optimization problems can be modelled as multi-objective formulations. This book provides an introduction to multi-objective optimization using meta-heuristic algorithms, GA and PSO and how they can be applied to problems like hardware/software partitioning in embedded systems, circuit partitioning in VLSI, design of operational amplifiers in analog VLSI, design space exploration in high-level synthesis, delay fault testing in VLSI testing and scheduling in heterogeneous distributed systems. It is shown how, in each case, the various aspects of the EA, namely its representation and operators like crossover, mutation, etc, can be separately formulated to solve these problems. This book is intended for design engineers and researchers in the field of VLSI and embedded system design. The book introduces the multi-objective GA and PSO in a simple and easily understandable way that will appeal to introductory readers.

Applied Computation and Security Systems: Volume One (Advances in Intelligent Systems and Computing #304)

by Khalid Saeed Nabendu Chaki Rituparna Chaki Sankhayan Choudhury

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

Get Fit with Apple Watch

by Allen Taylor

Get Fit with Apple Watch is the concise introduction to the amazing new Apple Watch. It's the first book specifically focused on the Apple Watch's most important function: health and fitness.This book is for you if you are interested in health and are willing to make small lifestyle adjustments in order to enhance health and well-being. This book is also for you if you are a dedicated health junkie who already exercises on a regular basis and follows a healthy diet. The Apple Watch includes fitness apps that you can access right on your wrist while you are exercising, for instant feedback on how you are doing.You will learn how to use the Watch to avoid sitting for too long, to register a healthy amount of body movement every day, and how to get the most out of more strenuous exercise activities. All fitness and exercise-related built-in apps will be covered in detail, as well as leading third party health and fitness apps that have been specifically tailored to work with the Watch.Part I plus two appendixes give readers just what they need to know to understand all functionality of the Apple Watch to set up their Apple Watch, and what third-party apps are available (at time of publication). It's a great mini-book that will be appeal to readers who don't feel the need to buy an entire standalone introduction to the Apple Watch.Part II (the majority of the book) clearly explains the Apple Watch's fitness and health-tracking functions, but goes well beyond this by showing readers different ways to integrate these functions into their daily lives, regular workout routines, and with their iPhone and the leading third-party health and fitness apps. Plus, there's an entire chapter devoted to the Apple Watch Research Kit, explaining the benefits of the associated medical research apps and how users can participate in these world-changing programs, should they choose to.Veteran technology author Allen Taylor is also a participant in the Apple Watch Research Kit study in cardiovascular fitness conducted by Stanford University.

Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1 (Advances in Intelligent Systems and Computing #324)

by Bijaya Ketan Panigrahi L. Padma Suresh Subhransu Sekhar Dash

The book is a collection of high-quality peer-reviewed research papers presented in Proceedings of International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014) held at Noorul Islam Centre for Higher Education, Kumaracoil, India. These research papers provide the latest developments in the broad area of use of artificial intelligence and evolutionary algorithms in engineering systems. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.

Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2 (Advances in Intelligent Systems and Computing #325)

by Bijaya Ketan Panigrahi L. Padma Suresh Subhransu Sekhar Dash

The book is a collection of high-quality peer-reviewed research papers presented in Proceedings of International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014) held at Noorul Islam Centre for Higher Education, Kumaracoil, India. These research papers provide the latest developments in the broad area of use of artificial intelligence and evolutionary algorithms in engineering systems. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.

Computational Vision and Robotics: Proceedings of ICCVR 2014 (Advances in Intelligent Systems and Computing #332)

by Ishwar K. Sethi

Computer Vision and Robotic is one of the most challenging areas of 21st century. Its application ranges from Agriculture to Medicine, Household applications to Humanoid, Deep-sea-application to Space application, and Industry applications to Man-less-plant. Today's technologies demand to produce intelligent machine, which are enabling applications in various domains and services. Robotics is one such area which encompasses number of technology in it and its application is widespread. Computational vision or Machine vision is one of the most challenging tools for the robot to make it intelligent. This volume covers chapters from various areas of Computational Vision such as Image and Video Coding and Analysis, Image Watermarking, Noise Reduction and Cancellation, Block Matching and Motion Estimation, Tracking of Deformable Object using Steerable Pyramid Wavelet Transformation, Medical Image Fusion, CT and MRI Image Fusion based on Stationary Wavelet Transform. The book also covers articles from applications of soft computing techniques such as Target Searching and Tracking using Particle Swarm Optimization, PSO-based Functional Artificial Neural Network, etc. The book also covers article from the areas of Robotics such as Solar Power Robot Vehicle, Multi Robot Area Exploration, Intelligent Driving System based on Video Sequencing, Emotion Recognition using MLP Network, Identifying the Unstructured Environment.

Computational Intelligence in Data Mining - Volume 3: Proceedings of the International Conference on CIDM, 20-21 December 2014 (Smart Innovation, Systems and Technologies #33)

by Lakhmi C. Jain Himansu Sekhar Behera Durga Prasad Mohapatra Jyotsna Kumar Mandal

The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i. e. , computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experienced a considerable growth in the last years due to two key factors: (a) knowledge hidden in organizations' databases can be exploited to improve strategic and managerial decision-making; (b) the large volume of data managed by organizations makes it impossible to carry out a manual analysis. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.

Computational Intelligence in Data Mining - Volume 1: Proceedings of the International Conference on CIDM, 20-21 December 2014 (Smart Innovation, Systems and Technologies #32)

by Lakhmi C. Jain Himansu Sekhar Behera Durga Prasad Mohapatra Jyotsna Kumar Mandal

The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i. e. , computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experienced a considerable growth in the last years due to two key factors: (a) knowledge hidden in organizations' databases can be exploited to improve strategic and managerial decision-making; (b) the large volume of data managed by organizations makes it impossible to carry out a manual analysis. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.

Channel Coding Techniques for Wireless Communications

by K. Deergha Rao

The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, Reed Solomon (RS) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subject's underlying theories. It includes current topics of increasing importance such as turbo codes, LDPC codes, LT codes, Raptor codes and space-time coding in detail, in addition to the traditional codes such as cyclic codes, BCH and RS codes and convolutional codes. MIMO communications is a multiple antenna technology, which is an effective method for high-speed or high-reliability wireless communications. PC-based MATLAB m-files for the illustrative examples are included and also provided on the accompanying CD, which will help students and researchers involved in advanced and current concepts in coding theory. Channel coding, the core of digital communication and data storage, has undergone a major revolution as a result of the rapid growth of mobile and wireless communications. The book is divided into 11 chapters. Assuming no prior knowledge in the field of channel coding, the opening chapters (1 - 2) begin with basic theory and discuss how to improve the performance of wireless communication channels using channel coding. Chapters 3 and 4 introduce Galois fields and present detailed coverage of BCH codes and Reed-Solomon codes. Chapters 5-7 introduce the family of convolutional codes, hard and soft-decision Viterbi algorithms, turbo codes, BCJR algorithm for turbo decoding and studies trellis coded modulation (TCM), turbo trellis coded modulation (TTCM), bit-interleaved coded modulation (BICM) as well as iterative BICM (BICM-ID) and compares them under various channel conditions. Chapters 8 and 9 focus on low-density parity-check (LDPC) codes, LT codes and Raptor codes. Chapters 10 and 11 discuss MIMO systems and space-time (ST) coding.

An Introduction to R for Quantitative Economics: Graphing, Simulating and Computing (SpringerBriefs in Economics)

by Vikram Dayal

This book gives an introduction to R to build up graphing, simulating and computing skills to enable one to see theoretical and statistical models in economics in a unified way. The great advantage of R is that it is free, extremely flexible and extensible. The book addresses the specific needs of economists, and helps them move up the R learning curve. It covers some mathematical topics such as, graphing the Cobb-Douglas function, using R to study the Solow growth model, in addition to statistical topics, from drawing statistical graphs to doing linear and logistic regression. It uses data that can be downloaded from the internet, and which is also available in different R packages. With some treatment of basic econometrics, the book discusses quantitative economics broadly and simply, looking at models in the light of data. Students of economics or economists keen to learn how to use R would find this book very useful.

Big Data: A Primer (Studies in Big Data #11)

by Hrushikesha Mohanty Prachet Bhuyan Deepak Chenthati

This book is a collection of chapters written by experts on various aspects of big data. The book aims to explain what big data is and how it is stored and used. The book starts from the fundamentals and builds up from there. It is intended to serve as a review of the state-of-the-practice in the field of big data handling. The traditional framework of relational databases can no longer provide appropriate solutions for handling big data and making it available and useful to users scattered around the globe. The study of big data covers a wide range of issues including management of heterogeneous data, big data frameworks, change management, finding patterns in data usage and evolution, data as a service, service-generated data, service management, privacy and security. All of these aspects are touched upon in this book. It also discusses big data applications in different domains. The book will prove useful to students, researchers, and practicing database and networking engineers.

Advanced Computing and Systems for Security: Volume 1 (Advances in Intelligent Systems and Computing #395)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing #396)

by Khalid Saeed Nabendu Chaki Agostino Cortesi Rituparna Chaki

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Artificial Intelligence and Evolutionary Computations in Engineering Systems: Proceedings of ICAIECES 2015 (Advances in Intelligent Systems and Computing #394)

by Bijaya Ketan Panigrahi Swagatam Das Subhransu Sekhar Dash M. Arun Bhaskar

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems (ICAIECES -2015) held at Velammal Engineering College (VEC), Chennai, India during 22 - 23 April 2015. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of Communication, Computing and Power Technologies.

Refine Search

Showing 19,851 through 19,875 of 55,784 results