Browse Results

Showing 53,101 through 53,125 of 61,611 results

Time-Domain Finite Element Methods for Maxwell's Equations in Metamaterials

by Jichun Li Yunqing Huang

The purpose of this book is to provide an up-to-date introduction to the time-domain finite element methods for Maxwell's equations involving metamaterials. Since the first successful construction of a metamaterial with both negative permittivity and permeability in 2000, the study of metamaterials has attracted significant attention from researchers across many disciplines. Thanks to enormous efforts on the part of engineers and physicists, metamaterials present great potential applications in antenna and radar design, sub-wavelength imaging, and invisibility cloak design. Hence the efficient simulation of electromagnetic phenomena in metamaterials has become a very important issue and is the subject of this book, in which various metamaterial modeling equations are introduced and justified mathematically. The development and practical implementation of edge finite element methods for metamaterial Maxwell's equations are the main focus of the book. The book finishes with some interesting simulations such as backward wave propagation and time-domain cloaking with metamaterials.

Surface- and Groundwater Quality Changes in Periods of Water Scarcity

by Miloš Gregor

This thesis deals with the evaluation of surface and groundwater quality changes in the periods of water scarcity in river catchment areas. The work can be divided into six parts. Existing methods of drought assessment are discussed in the first part, followed by the brief description of the software package HydroOffice, designed by the author. The software is dedicated to analysis of hydrological data (separation of baseflow, parameters of hydrological drought estimation, recession curves analysis, time series analysis). The capabilities of the software are currently used by scientist from more than 30 countries around the world. The third section is devoted to a comprehensive regional assessment of hydrological drought on Slovak rivers, followed by evaluation of the occurrence, course and character of drought in precipitation, discharges, base flow, groundwater head and spring yields in the pilot area of the Nitra River basin. The fifth part is focused on the assessment of changes in surface and groundwater quality during the drought periods within the pilot area. Finally, the results are summarized and interpreted, and rounded off with an outlook to future research.

Introduction to Polarization Physics

by Sandibek B. Nurushev Mikhail F. Runtso Mikhail N. Strikhanov

This book is devoted to the polarization (spin) physics of high energy particles and contains three parts. The first part presents the theoretical prefaces of polarization in the particle physics for interpretations, predictions and bases for understanding the following two parts. The second part of the book presents the description of the essential polarization experiments including the recent ones. This part is devoted to the innovative instrumentations, gives the parameters of the polarized beams, targets, polarized gas jets and polarimeters. The third part of the book concentrates on the important achievements in polarization physics. The book can be used in lectures on nuclear and particle physics and and nuclear instruments and methods. As supplementary reading this book is useful for researchers working in particle and nuclear physics.

Tractable Models of Solid Mechanics

by Oleg V. Gendelman Leonid I. Manevitch

This book describes significant tractable models used in solid mechanics - classical models used in modern mechanics as well as new ones. The models are selected to illustrate the main ideas which allow scientists to describe complicated effects in a simple manner and to clarify basic notations of solid mechanics. A model is considered to be tractable if it is based on clear physical assumptions which allow the selection of significant effects and relatively simple mathematical formulations. The first part of the book briefly reviews classical tractable models for a simple description of complex effects developed from the 18th to the 20th century and widely used in modern mechanics. The second part describes systematically the new tractable models used today for the treatment of increasingly complex mechanical objects - from systems with two degrees of freedom to three-dimensional continuous objects.

Interactive Collaborative Robotics

by Andrey Ronzhin Gerhard Rigoll Roman Meshcheryakov

This book constitutes the proceedings of the First International Conference on Interactive Collaborative Robotics, ICR 2016, held in Budapest, Hungary, in August 2016. The 29 papers presented in this volume were carefully reviewed and selected from 48 submissions.

Human Aspects of IT for the Aged Population. Healthy and Active Aging

by Gavriel Salvendy Jia Zhou

The two LNCS volume set 9754-9755 constitutes the refereed proceedings of the Second International Conference on Human Aspects of IT for the Aged Population, ITAP 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016, jointly with 14 other thematically conferences. The total of 1287 papers presented at the HCII 2016 conferences were carefully reviewed and selected from 4354 submissions. LNCS 9754, Design for Aging (Part I), addresses the following major topics: designing for and with the elderly; technology use and acceptance by older users; psychological and cognitive aspects of interaction and aging; and mobile and wearable technologies for the elderly. LNCS 9755, Healthy and Active Aging (Part II), addresses these major topics: smart and assistive environments; aging and social media; aging, learning, training and games; and aging, mobility and driving.

Human Aspects of IT for the Aged Population. Design for Aging

by Gavriel Salvendy Jia Zhou

The two LNCS volume set 9193-9194 constitutes the refereed proceedings of the First International Conference on Human Aspects of IT for the Aged Population, ITAP 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically conferences. The total of 1462 papers and 246 posters presented at the HCII 2015 conferences were carefully reviewed and selected from 4843 submissions. These papers of the two volume set address as follows: LNCS 9193, Design for Aging (Part I), addressing the following major topics: HCI design and evaluation methods for the elderly; ICT use and acceptance; aging, the web and social media; and the elderly and mobile devices and LNCS 9194, Design for Everyday Life (Part II), addressing the following major topics: health care technologies and services for the elderly; home and work support; smart environment and AAL; and communication, games, and entertainment.

Social Computing and Social Media

by Gabriele Meiselwitz

This book constitutes the refereed proceedings of the 7th International Conference on Social Computing and Social Media, SCSM 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015. The total of 1462 papers and 246 poster papers presented at the HCII 2015 conferences was carefully reviewed and selected from 4843 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 25 contributions included in the SCSM 2015 proceedings were organized in the following topical sections: designing social media; social network analysis; and individual and group behaviour in social media.

Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16')

by V. Vijayakumar V. Neelanarayanan

This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of Big Data and Cloud Computing are identified and presented throughout the book, which is intended for researchers, scholars, students, software developers and practitioners working at the forefront in their field. This book acts as a platform for exchanging ideas, setting questions for discussion, and sharing the experience in Big Data and Cloud Computing domain. ​

Trusted Systems

by Moti Yung Liehuang Zhu Yanjiang Yang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies. /* Style Definitions */ table. MsoNormalTable {{mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5. 4pt 0in 5. 4pt; mso-para-margin:0in; mso-para-margin-bottom:. 0001pt; mso-pagination:widow-orphan; font-size:11. 0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}}

Service-Oriented Computing - ICSOC 2014 Workshops

by Daniela Grigori Jan Mendling Farouk Toumani Barbara Pernici Djamal Benslimane Nejib Ben Hadj-Alouane Brian Blake Olivier Perrin Iman Saleh Moustafa Sami Bhiri

This book constitutes the revised selected papers of the 12th International Conference on Service-Oriented Computing, ICSOC 2014, held in Paris, France, in November 2014. The conference hosted the following seven workshops: 10th International Workshop in Engineering Service-Oriented Applications, WESOA 2014; First Workshop on Resource Management in Service-Oriented Computing, RMSOC 2014; First International Workshop on Knowledge Aware Service Oriented Applications, Performance Assessment and Auditing in Service Computing, KASA 2014; Workshop on Intelligent Service Clouds, ISC 2014; Third International Workshop on Self-Managing Pervasive Service Systems, SeMaPS 2014; First International Workshop on Formal Modeling and Verification of Service-Based Systems, FOR-MOVES 2014; 4th International Workshop on Cloud Computing and Scientific Applications, CCSA 2014. The papers included in this volume were carefully reviewed and selected from numerous submissions. They address various topics in the service-oriented computing domain and its emerging applications.

Smart Education and Smart e-Learning

by Lakhmi C. Jain Robert J. Howlett Vladimir L. Uskov

This book contains the contributions presented at the 2nd international KES conference on Smart Education and Smart e-Learning, which took place in Sorrento, Italy, June 17-19, 2015. It contains a total of 45 peer-reviewed book chapters that are grouped into several parts: Part 1 - Smart Education, Part 2 - Smart Educational Technology, Part 3 - Smart e-Learning, Part 4 - Smart Professional Training and Teachers' Education, and Part 5 - Smart Teaching and Training related Topics. This book can be a useful source of research data and valuable information for faculty, scholars, Ph. D. students, administrators, and practitioners - those who are interested in innovative areas of smart education and smart e-learning.

Pattern and Security Requirements

by Kristian Beckers

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns. Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers.

Information Security Applications

by Kyung-Hyune Rhee Jeong Hyun Yi

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Smart Information Systems

by Frank Hopfgartner

This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational manufacturers, service companies, and the public sector. Features: provides a state-of-the-art introduction to the field, integrating contributions from both academia and industry; reviews novel information aggregation services; discusses personalization and recommendation systems; examines sensor-based knowledge acquisition services, describing how the analysis of sensor data can be used to provide a clear picture of our world.

Information and Communication Technologies in Education, Research, and Industrial Applications

by Heinrich C. Mayr Mykola Nikitchenko Grygoriy Zholtkevych Aleksander Spivakovsky Vadim Ermolayev

This book constitutes the thoroughly refereed proceedings of the 10th International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications, held in Kherson, Ukraine, in June 2014. The 16 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on framework and tools; information and communication technologies in teaching and learning; information and communication technologies in research and industrial applications.

Sequences and Their Applications - SETA 2014

by Arne Winterhof Kai-Uwe Schmidt

This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 full papers presented together with 2 invited papers were carefully reviewed and selected from 36 submissions. The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays, relative difference sets, aperiodic correlation, pseudorandom sequences and stream ciphers, crosscorrelation of sequences, prime numbers in sequences, OFDM and CDMA, and frequency-hopping sequences.

Touchless Palmprint Recognition Systems

by Vincenzo Piuri Angelo Genovese Fabio Scotti

This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems. It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Constraints and limitations of current palmprint recognition systems are analyzed and discussed. The authors also introduce innovative methods for touchless and less-constrained palmprint recognition, with the aim to make palmprint biometrics easier to use in practical, daily-life applications, and overcome the typical constraints and limitations described. Touchless Palmprint Recognition Systems targets professionals and researchers working in biometrics, image processing and three-dimensional reconstruction. Advanced-level students studying biometrics and computer science will also find this material valuable as a secondary text book or reference.

New Frontiers in Artificial Intelligence

by Yukiko Nakano Ken Satoh Daisuke Bekki

This book constitutes the thoroughly refereed post-conference proceedings of the JSAI-isAI 2013 Workshops LENLS, JURISIN, MiMI, AAA, and DDS which tool place on October 2013, in Japan. The 28 contributions in this volume were carefully reviewed and selected from 48 submissions. LENLS (Logic and Engineering of Natural Language Semantics) is an annual international workshop on formal semantics and pragmatics. LENLS10 was the tenth event in the series, and it focused on the formal and theoretical aspects of natural language. JURISIN (Juris-Informatics) 2013 was the seventh event in the series. The purpose of this workshop was to discuss fundamental and practical issues for jurisinformatics, bringing together experts from a variety of relevant backgrounds, including law, social science, information and intelligent technology, logic,and philosophy (including the area of AI and law). MiMI (Multimodality in Multiparty Interaction) 2013 covers topics as follows interaction studies, communication studies, conversation analysis, and workplace studies, as well as their applications in other research fields. AAA (Argument for Agreement and Assurance) 2013 focused on the theoretical foundations of argumentation in AI, and the application of argumentation to various fields such as agreement formation and assurance. DDS (Data Discretization and Segmentation for Knowledge Discovery) 2013 discussed segmentation methods for various types of data, such as graphs, trees, strings, and continuous data, and their applications in the areas of Machine Learning and Knowledge Discovery.

Secure Smart Embedded Devices, Platforms and Applications

by Konstantinos Markantonakis Keith Mayes

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Optimization for Computer Vision: An Introduction to Core Concepts and Methods

by Marco Alexander Treiber

This practical and authoritative text/reference presents a broad introduction to the optimization methods used specifically in computer vision. In order to facilitate understanding, the presentation of the methods is supplemented by simple flow charts, followed by pseudocode implementations that reveal deeper insights into their mode of operation. These discussions are further supported by examples taken from important applications in computer vision. Topics and features: provides a comprehensive overview of computer vision-related optimization; covers a range of techniques from classical iterative multidimensional optimization to cutting-edge topics of graph cuts and GPU-suited total variation-based optimization; describes in detail the optimization methods employed in computer vision applications; illuminates key concepts with clearly written and step-by-step explanations; presents detailed information on implementation, including pseudocode for most methods.

Practical Oracle Database Appliance

by Matt Gallagher Bobby Curtis Fuad Arshad Erik Benner Maris Elsins Pete Sharman Yury Velikanov

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration. Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various configurations in order to realize your performance requirements. Manage and monitor the appliance to meet business requirements. Protect your data through proper backup and recovery procedures. Oracle Database is one of the most relied-up databases in industry. For many years Oracle Database was a software product that had to be installed and configured at no small expense. The Oracle Database Appliance makes Oracle Database into a plug-and-play proposition: Plug the appliance into the wall socket, and turn it on. That's it. You have a running database server. This book takes you through that beginning point and beyond, helping you to realize in your own organization the ease of deployment and management represented by the appliance. Covers the Oracle Database Appliance from architecture through configuration. Provides a technical resource for system- and database administrators. Examines practical use cases for the Oracle Database Appliance. What you'll learn Assemble the Oracle Database Appliance. Understand the architecture and its implications for deployment. Configure network access and protect against intrusion. Monitor and troubleshoot the appliance. Identify and choose options for good performance. Diagnose problems and install patch sets when needed. Who this book is for Practical Oracle Database Appliance is for the Oracle database administrator or system administrator who currently manages, or will be implementing, the Oracle Database Appliance within a small- to medium-size business, or who is using the virtualization feature set to deploy numerous appliances within a large enterprise having many branch locations. Table of Contents Oracle Database Appliance Integrated Lights Out Management Installation Database Configuration Networking Monitoring the Oracle Database Appliance Diagnosing the Oracle Database Appliance Patching the Oracle Database Appliance Business Values for the ODA Virtualization and the ODA e-Business Suite and the ODA Oracle Enterprise Manager and the ODA

Pro Drupal as an Enterprise Development Platform

by Jamie Kurtz Thomas Besluau

In Pro Drupal as an Enterprise Development Platform authors Jamie Kurtz and Thomas Besluau explain how developers can save themselves time and money, and build their applications faster with fewer bugs by using the Drupal CMS as a foundation for their projects. The days when custom client applications were built entirely from scratch are over. Today, it makes business sense to use a flexible, highly scalable framework such as Drupal, Joomla or DotNetNuke as a foundation. This book focuses on why Drupal makes a particularly strong choice for the majority of developers. With an unprecedented level of community support, tens of thousands of well-proven plug-ins and modules available for download, and advanced content management rules and configuration engines Drupal is flexible enough to provide a firm base upon which almost all enterprise application developers can build their own custom solutions. As this book will make clear, it is no longer necessary for developers to write complex applications entirely from scratch for each of their clients. Instead,they should begin by using an enterprise-class CMS like Drupal to provide a robust foundation for them so that they can concentrate their time and skills into solving the business-specific problems of each individual client maximizing the value that they add to each assignment. What you'll learn Understand how Drupal supports enterprise-grade application development. Follow a comprehensive walk-through of the common business continuity, regulatory and security concerns that come with using Drupal. See how to integrate Drupal into new or existing service-oriented architectures (SOA). Be inspired by the many and varied application build types that Drupal supports. Get a head-start on your competition! Who this book is for This book is targeted at enterprise software developers, architects, and managers looking to increase productivity and reduce time to market on new services, applications, features, and bug fixes. Knowledge of PHP is not required. Table of Contents A New Era of Software Development The Drupal Content Management System Business Application Fundamentals Implementing Application Behaviors Securing Your Application Working with Content System Configuration User Experience Design REST Services with Drupal Software Development Best Practices with Drupal How to Sell and Implement Drupal in Your Enterprise

Windows Phone 8 Recipes

by Lori Lalonde David R. Totzke

Windows Phone 8 Recipes is a problem-solution based guide to the Windows Phone 8 platform. Recipes are grouped according to features of the platform and ways of interacting with the device. Solutions are given in C# and XAML, so you can take your existing . NET skills and apply them to this exciting new venture. Not sure how to get started? No need to worry, there's a recipe for that! Always wondered what it takes to add cool features like gesture support, maps integration, or speech recognition into your app? We've got it covered! Already have a portfolio of Windows Phone 7 apps that needs to be upgraded? We have a recipe for that too! The book starts by guiding you through the setup of your development environment, including links to useful tools and resources. Core chapters range from coding live tiles and notifications to interacting with the camera and location sensor. Later chapters cover external services including Windows Azure Mobile Services, the Live SDK, and the Microsoft Advertising SDK, so you can take your app to a professional level. Finally, you'll find out how to publish and maintain your app in the Windows Phone Store. Whether you're migrating from Windows Phone 7 or starting from scratch, Windows Phone 8 Recipes has the code you need to bring your app idea to life. What you'll learn Set up your development environment with the Windows Phone 8 SDK. Upgrade your existing Windows Phone 7 apps to Windows Phone 8. Meet and try out the new features provided in the Windows Phone 8 SDK. Bring your apps to life with live tiles, notifications, and cloud services. Discover the easy steps to setting up your own Windows Phone Store account. Learn how to submit your apps for publication to the Windows Phone Store. Who this book is for Windows Phone 8 Recipes is for the developer who has a . NET background, is familiar with C# and either WPF or Silverlight, and is ready to tap into a new and exciting market in mobile app development. Table of Contents Chapter 1: Introduction to the Windows Phone SDK Chapter 2: Multi-Resolution Support and Basic User Interface Components Chapter 3: Gestures Chapter 4: Live Tiles and Lock Screen Chapter 5: Background Agents and Notifications Chapter 6: Appointments and Contacts Chapter 7: Camera, Photos, and Media Chapter 8: Maps, Location, and Routing Chapter 9: Communications and Speech Chapter 10: Launching and Resuming Apps Chapter 11: Data Storage Chapter 12: Windows Azure Mobile Services Chapter 13: Using the Microsoft Live SDK Chapter 14: Publishing your App

Windows 8 and Windows Phone 8 Game Development

by Adam Dawes

Creating fun, sophisticated games for Windows devices large or small has never been easier! With masses of example code and fully working games for you to download and run straight away Windows 8 and Windows Phone 8 Game Development is your ideal first step into modern games development. This book gives you everything you need to realize your dreams and produce fantastic games that will run on all Windows 8 devices from desktops to tablets to phones. You can code once and run everywhere. The ubiquity of Windows 8 devices makes this opportunity to good to miss! The Windows 8 and Windows Phone 8 platforms have huge potential for gaming. New form-factors - such as the Surface tablet - coupled with improved processors and higher screen resolutions combine to make Windows 8 the best Windows version yet for independent games development. It's never been easier to create a fantastic game, package it up and deploy it straight to the Windows Store with its audience of millions. This book will show you how.

Refine Search

Showing 53,101 through 53,125 of 61,611 results