Browse Results

Showing 82,026 through 82,050 of 83,302 results

Image Processing: Principles and Applications

by Tinku Acharya Ajoy K. Ray

Image processing-from basics to advanced applications Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and innovations in the field, including: * Image transformation techniques, including wavelet transformation and developments * Image enhancement and restoration, including noise modeling and filtering * Segmentation schemes, and classification and recognition of objects * Texture and shape analysis techniques * Fuzzy set theoretical approaches in image processing, neural networks, etc. * Content-based image retrieval and image mining * Biomedical image analysis and interpretation, including biometric algorithms such as face recognition and signature verification * Remotely sensed images and their applications * Principles and applications of dynamic scene analysis and moving object detection and tracking * Fundamentals of image compression, including the JPEG standard and the new JPEG2000 standard Additional features include problems and solutions with each chapter to help you apply the theory and techniques, as well as bibliographies for researching specialized topics. With its extensive use of examples and illustrative figures, this is a superior title for students and practitioners in computer science, wireless and multimedia communications, and engineering.

Apache Ignite Quick Start Guide: Distributed Data Caching And Processing Made Easy

by Sujoy Acharya

Apache Ignite is a distributed in-memory platform designed to scale and process large volume of data. It can be integrated with microservices as well as monolithic systems, and can be used as a scalable, highly available and performant deployment platform for microservices. This book will teach you to use Apache Ignite for building a high performance, scalable, highly available system architecture with data integrity.

Mastering Unit Testing Using Mockito and JUnit

by Sujoy Acharya

A practical and easy-to-follow, yet comprehensive, guide to learning advanced JUnit testing. Each topic is explained and placed in context, and for the more inquisitive, there are more details of the concepts used. This book is for you if you are a developer with some experience in Java application development as well as a basic knowledge of JUnit testing. But for those whose skill set is void of any prior experience with JUnit testing, the book also covers basic fundamentals to get you acquainted with the concepts before putting them into practise.

Mockito Essentials

by Sujoy Acharya

This book is ideal for developers who have some experience in Java application development as well as some basic knowledge of test doubles and JUnit testing. This book also introduces you to the fundamentals of JUnit testing, test doubles, refactoring legacy code, and writing JUnit tests for GWT and web services.

Mockito for Spring

by Sujoy Acharya

If you are an application developer with some experience in software testing and want to learn more about testing frameworks, then this technology and book is for you. Mockito for Spring will be perfect as your next step towards becoming a competent software tester with Spring and Mockito.

Test-Driven Development with Mockito

by Sujoy Acharya

This book is a hands-on guide, full of practical examples to illustrate the concepts of Test Driven Development.If you are a developer who wants to develop software following Test Driven Development using Mockito and leveraging various Mockito features, this book is ideal for you. You don't need prior knowledge of TDD, Mockito, or JUnit. It is ideal for developers, who have some experience in Java application development as well as a basic knowledge of unit testing, but it covers the basic fundamentals of TDD and JUnit testing to get you acquainted with these concepts before delving into them.

Pro Tableau: A Step-by-Step Guide

by Seema Acharya Subhashini Chellappan

Leverage the power of visualization in business intelligence and data science to make quicker and better decisions. Use statistics and data mining to make compelling and interactive dashboards. This book will help those familiar with Tableau software chart their journey to being a visualization expert.Pro Tableau demonstrates the power of visual analytics and teaches you how to: Connect to various data sources such as spreadsheets, text files, relational databases (Microsoft SQL Server, MySQL, etc.), non-relational databases (NoSQL such as MongoDB, Cassandra), R data files, etc.Write your own custom SQL, etc.Perform statistical analysis in Tableau using RUse a multitude of charts (pie, bar, stacked bar, line, scatter plots, dual axis, histograms, heat maps, tree maps, highlight tables, box and whisker, etc.)What you’ll learnConnect to various data sources such as relational databases (Microsoft SQL Server, MySQL), non-relational databases (NoSQL such as MongoDB, Cassandra), write your own custom SQL, join and blend data sources, etc.Leverage table calculations (moving average, year over year growth, LOD (Level of Detail), etc.Integrate Tableau with RTell a compelling story with data by creating highly interactive dashboardsWho this book is forAll levels of IT professionals, from executives responsible for determining IT strategies to systems administrators, to data analysts, to decision makers responsible for driving strategic initiatives, etc. The book will help those familiar with Tableau software chart their journey to a visualization expert.

IoT-Based Smart Waste Management for Environmental Sustainability (Smart and Intelligent Computing in Engineering)

by Biswaranjan Acharya Satarupa Dey Mohammed Zidan

This book consolidates and summarizes smart technologies like IoT, edge computing, and AI used in different aspects of waste material management, mitigation, and recycling for a sustainable environment. One of the cases explains how IoT-based systems and wireless sensors can be used to continuously detect common pollutants such as volatile organic compounds (VOCs), carbon monoxide, and particulate matter (PM) and how the data collected are used to assess the overall air quality and determine actions for improvements. A collection of practical case studies, this book provides a comprehensive knowledge in smart waste management to readers in universities, research centers, and industries.

Cloud Reliability Engineering: Technologies and Tools

by Rathnakar Achary Pethuru Raj

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book’s chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Cloud Reliability Engineering: Technologies and Tools

by Rathnakar Achary Pethuru Raj

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book’s chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Deep Learning in Data Analytics: Recent Techniques, Practices and Applications (Studies in Big Data #91)

by Debi Prasanna Acharjya Anirban Mitra Noor Zaman

This book comprises theoretical foundations to deep learning, machine learning and computing system, deep learning algorithms, and various deep learning applications. The book discusses significant issues relating to deep learning in data analytics. Further in-depth reading can be done from the detailed bibliography presented at the end of each chapter. Besides, this book's material includes concepts, algorithms, figures, graphs, and tables in guiding researchers through deep learning in data science and its applications for society.Deep learning approaches prevent loss of information and hence enhance the performance of data analysis and learning techniques. It brings up many research issues in the industry and research community to capture and access data effectively. The book provides the conceptual basis of deep learning required to achieve in-depth knowledge in computer and data science. It has been done to make the book more flexible and to stimulate further interest in topics. All these help researchers motivate towards learning and implementing the concepts in real-life applications.

Bio-Inspired Computing for Image and Video Processing

by D. P. Acharjya V. Santhi

In recent years bio-inspired computational theories and tools have developed to assist people in extracting knowledge from high dimensional data. These differ in how they take a more evolutionary approach to learning, as opposed to traditional artificial intelligence (AI) and what could be described as 'creationist' methods. Instead bio-inspired computing takes a bottom-up, de-centralized approach that often involves the method of specifying a set of simple rules, a set of simple organisms which adhere to those rules, and of iteratively applying those rules. Bio-Inspired Computing for Image and Video Processing covers interesting and challenging new theories in image and video processing. It addresses the growing demand for image and video processing in diverse application areas, such as secured biomedical imaging, biometrics, remote sensing, texture understanding, pattern recognition, content-based image retrieval, and more. This book is perfect for students following this topic at both undergraduate and postgraduate level. It will also prove indispensable to researchers who have an interest in image processing using bio-inspired computing.

Bio-Inspired Computing for Image and Video Processing

by D. P. Acharjya V. Santhi

In recent years bio-inspired computational theories and tools have developed to assist people in extracting knowledge from high dimensional data. These differ in how they take a more evolutionary approach to learning, as opposed to traditional artificial intelligence (AI) and what could be described as 'creationist' methods. Instead bio-inspired computing takes a bottom-up, de-centralized approach that often involves the method of specifying a set of simple rules, a set of simple organisms which adhere to those rules, and of iteratively applying those rules. Bio-Inspired Computing for Image and Video Processing covers interesting and challenging new theories in image and video processing. It addresses the growing demand for image and video processing in diverse application areas, such as secured biomedical imaging, biometrics, remote sensing, texture understanding, pattern recognition, content-based image retrieval, and more. This book is perfect for students following this topic at both undergraduate and postgraduate level. It will also prove indispensable to researchers who have an interest in image processing using bio-inspired computing.

Computational Intelligence in Healthcare Informatics (Studies in Computational Intelligence #1132)

by D. P. Acharjya Kun Ma

The book presents advancements in computational intelligence in perception with healthcare applications. Besides, the concepts, theory, and applications in various domains of healthcare systems including decision making in healthcare management, disease diagnosis, and electronic health records will be presented in a lucid manner. To achieve these objectives, both theoretical advances and its applications to healthcare problems will be stressed upon. This has been done to make the edited book more flexible and to stimulate further research interest in topics. The book is divided into four sections such as theoretical foundation of computational intelligence techniques, computational intelligence in analyzing health data, computational intelligence in electronic health record (EHR), and computational intelligence in ethical issues in health care.

Internet of Things: Novel Advances and Envisioned Applications (Studies in Big Data #25)

by D. P. Acharjya M. Kalaiselvi Geetha

This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society.

Computational Intelligence for Big Data Analysis: Frontier Advances and Applications (Adaptation, Learning, and Optimization #19)

by D. P. Acharjya Satchidananda Dehuri Sugata Sanyal

The work presented in this book is a combination of theoretical advancements of big data analysis, cloud computing, and their potential applications in scientific computing. The theoretical advancements are supported with illustrative examples and its applications in handling real life problems. The applications are mostly undertaken from real life situations. The book discusses major issues pertaining to big data analysis using computational intelligence techniques and some issues of cloud computing. An elaborate bibliography is provided at the end of each chapter. The material in this book includes concepts, figures, graphs, and tables to guide researchers in the area of big data analysis and cloud computing.

Hadoop Essentials

by Shiva Achari

If you are a system or application developer interested in learning how to solve practical problems using the Hadoop framework, then this book is ideal for you. This book is also meant for Hadoop professionals who want to find solutions to the different challenges they come across in their Hadoop projects.

Pro Java Clustering and Scalability: Building Real-Time Apps with Spring, Cassandra, Redis, WebSocket and RabbitMQ

by Jorge Acetozi

Build clustered and scalable Java-based, real-time applications using Spring Framework, Boot, WebSocket, Cassandra, Redis and RabbitMQ. In this book, you'll tie all this together with a dive-in case study, a real-time scalable chat application under differing scenarios. Pro Java Clustering and Scalability also discusses how to horizontally scale the WebSocket chat application using a full STOMP broker such as RabbitMQ. Although this is a programming book, it also discusses many interesting infrastructure topics and tips about continuous delivery, Docker, NoSQL (Cassandra and Redis) and other related technologies. What You Will LearnHandle clustering and scalability using various open source Java, microservices, and web services tools and technologiesUse Spring Framework, Boot, and other Spring technologiesIntegrate with Redis, RabbitMQ, Cassandra, NoSQL, and much moreTest the case study code under various scenarios and stressesWho This Book Is ForExperienced Java developers with at least some prior experience with Java, especially Spring Framework, Boot and other tools, and some web services.

Foundations of Software Science and Computational Structures: 9th International Conference, FOSSACS 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25-31, 2006, Proceedings (Lecture Notes in Computer Science #3921)

by Luca Aceto Anna Ingólfsdóttir

This book constitutes the refereed proceedings of the 9th International Conference on Foundations of Software Science and Computation Structures, FOSSACS 2006, held in Vienna, Austria in March 2006 as part of ETAPS. The 28 revised full papers presented together with one invited paper were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections.

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2010. Proceedings, Part II (Lecture Notes in Computer Science #6756)

by Luca Aceto Monika Henzinger Jiri Sgall

The two-volume set LNCS 6755 and LNCS 6756 constitutes the refereed proceedings of the 38th International Colloquium on Automata, Languages and Programming, ICALP 2011, held in Zürich, Switzerland, in July 2011. The 114 revised full papers (68 papers for track A, 29 for track B, and 17 for track C) presented together with 4 invited talks, 3 best student papers, and 3 best papers were carefully reviewed and selected from a total of 398 submissions. The papers are grouped in three major tracks on algorithms, complexity and games; on logic, semantics, automata, and theory of programming; as well as on foundations of networked computation: models, algorithms and information management.

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011. Proceedings, Part I (Lecture Notes in Computer Science #6755)

by Luca Aceto Monika Henzinger Ji 345 Í Sgall

The two-volume set LNCS 6755 and LNCS 6756 constitutes the refereed proceedings of the 38th International Colloquium on Automata, Languages and Programming, ICALP 2011, held in Zürich, Switzerland, in July 2011. The 114 revised full papers (68 papers for track A, 29 for track B, and 17 for track C) presented together with 4 invited talks, 3 best student papers, and 3 best papers were carefully reviewed and selected from a total of 398 submissions. The papers are grouped in three major tracks on algorithms, complexity and games; on logic, semantics, automata, and theory of programming; as well as on foundations of networked computation: models, algorithms and information management.

Automata, Languages and Programming: 35th International Colloquium, ICALP 2008 Reykjavik, Iceland, July 7-11, 2008 Proceedings, Part I (Lecture Notes in Computer Science #5125)

by Luca Aceto Ivan Damgaard Leslie Ann Goldberg Magnus M. Halldorsson Anna Ingolfsdottir Igor Walukiewicz

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5125 contains 70 contributions of track A selected from 269 submissions as well as 2 invited lectures. The papers are organized in topical sections on complexity: boolean functions and circuits, data structures, random walks and random structures, design and analysis of algorithms, scheduling, codes and coding, coloring, randomness in computation, online and dynamic algorithms, approximation algorithms, property testing, parameterized algorithms and complexity, graph algorithms, computational complexity, games and automata, group testing, streaming, and quantum, algorithmic game theory, and quantum computing.

Automata, Languages and Programming: 35th International Colloquium, ICALP 2008 Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II (Lecture Notes in Computer Science #5126)

by Luca Aceto Ivan Damgaard Leslie Ann Goldberg Magnus M. Halldorsson Anna Ingolfsdottir Igor Walukiewicz

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.

Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday (Lecture Notes in Computer Science #10460)

by Luca Aceto Giorgio Bacci Giovanni Bacci Anna Ingólfsdóttir Axel Legay Radu Mardare

This Festschrift is published in honor of Kim Guldstrand Larsen, one of the earliest precursors of computer science in Denmark, on the occasion of his 60th birthday. During the last three decades, Kim Guldstrand Larsen has given major contributions across a remarkably wide range of topics, including real-time, concurrent, and probabilistic models of computation, logic in computer science, and model checking. Since 1995, he has been one of the prime movers behind the model checking tool for real-time systems UPPAAL, for which he was a co-recipient of the CAV Award in 2013. The Festschrift contains 32 papers that feature the broad range of Kim Guldstrand Larsen's research topics, such as formal languages and automata theory; logic; verification, model checking and testing; algorithmic game theory and mechanism design; semantics and reasoning; real-time and distributed systems; and modeling and simulation.

Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings (Lecture Notes in Computer Science #8203)

by Rafael Accorsi Silvio Ranise

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Refine Search

Showing 82,026 through 82,050 of 83,302 results