В этом каталоге представлен полный ассортимент компьютерной литературы на русском языке. Книги по прикладному и веб-программированию, учебники для ВУЗов, книги для менеджеров в IT проектах и многие другие. Например, у нас есть все книги по языку программирования Python.
Genetic algorithms (GAs) and simulated annealing (SA) are important search methods. Combining both may improve the search quality, for example by using SA as a genetic operator. One problem in such technique is to find annealing parameters that work for all stages of the run. In this research, we introduce a new adaptive hybrid GA-SA algorithm, in which SA acts as a mutation. However, the SA will be adaptive in the sense that its parameters are evolved during the search. Adaptation should help guide the search towards optimum solutions with minimum parameter tuning. The algorithm is tested on solving an important NP-hard problem, the MAP (Maximum a-Posteriori) Assignment Problem on BBNs (Bayesian Belief Networks). The results obtained...
ISBN: 978-3-8383-3529-2
Издательство:
Книга по требованию
Дата выхода: июль 2011
One of the established strengths of human tutors is their ability to recognise and adapt to the emotions of students. This is a skill that has traditionally been lacking from Intelligent Tutoring Systems (ITSs); despite their ability to intelligently model and adapt to aspects of the student’s cognitive state, ITSs are generally completely unable to detect or adapt to aspects of the student’s affective state. In response to this shortcoming, this book explores the exciting development of an emotion-sensitive ITS. With the empathy of effective human tutors as our blueprint, we investigate how an artificial tutor should adapt to the affective state of students. To inform the tutor’s adaptation to student affect, a novel method for...
ISBN: 978-3-6391-3842-9
Издательство:
Книга по требованию
Дата выхода: июль 2011
Goal oriented requirements engineering methods define the requirements in terms of goals which are understood by the stakeholders and the goals are extracted from the stakeholders, but extracting these goals is challenging task in the goal oriented methods. To extract goals, the high level goals are decomposed to get the lower level goals/sub-goals and a guiding model involving active participation of stakeholder is essential for goal decomposition/refinement/splitting. This work presents an Agile Technique for Agent Based Goal Elicitation (ATABGE)involving maximum participation of stakeholders for eliciting goals/sub-goals. The methodology is validated through a tool support which compiles the elicited goals and assigns priority for...
ISBN: 978-3-8433-6699-1
Издательство:
Книга по требованию
Дата выхода: июль 2011
At first sight, browsing the World Wide Web is a fairly intuitive and simple activity, but it turns out that users often experience difficulties in finding the information and services that they are looking for - or in returning to items that they have visited before. In order to improve the current design of Web sites and Web browsers, or to provide users with personalized interfaces, one needs to know how users interact with the Web. Although theoretical models and empirical data exist, the knowledge that they provide is limited and scattered. In this book, we integrate current insights and extend this body of knowledge with a number of user studies. Several methods are presented for obtaining, clearing, analyzing and visualizing Web...
ISBN: 978-3-8364-2818-7
Издательство:
Книга по требованию
Дата выхода: июль 2011
This study followed the development of a multidisciplinary medical team meeting (MDTM) through changes that incorporated teleconferencing technology and a picture archive and communication system (PACS). Using both qualitative and quantitative data, MDTMs are shown make health services safer for patients. Analysis of screen displays, speech, and observations reveals the dynamics of MDTMs. System boundaries extend beyond the actual meeting. Stable work routines, timing and rhythms, are critical for success. Changes in organization structures, positive and negative, are demonstrated because of teleconferencing. Discussion structure is stable but speech dynamics are affected, and it takes much longer to describe images in teleconference....
ISBN: 978-3-8383-7627-1
Издательство:
Книга по требованию
Дата выхода: июль 2011
The key questions: What are the concerns in U.S. universities due to IT/IS offshore outsourcing, in relation to interest and enrolment by students in IT/IS programs? What are the prevailing consequences of IT/IS offshore outsourcing on undergraduate training for IT/IS programs? What are the specific changes in IT/IS university programs that can be attributed to offshore outsourcing? The factors include: influence on student interest in IT/IS, the U.S. IT/IS worker morale, data security and intellectual property protection, the need for innovation, government role through regulation, funding and policies, remuneration for IT/IS careers, image of IT/IS careers, IT industry, the role of professional organizations, and mass media. These...
ISBN: 978-3-8383-0923-1
Издательство:
Книга по требованию
Дата выхода: июль 2011
As-lived experiences in IS projects-ANT Projects are a popular vehicle for realising business objectives. In the IS field like in other fields, most endeavours are implemented in the form of projects. Sadly, two out three projects fail. Rethinking and deepening understanding of the PM practice seams to be the solution. This research project was aimed at exploring and describing the as- lived experience of practitioners in an IS project network. The study results reveal that an IS project start-up is neither simple nor straightforward; Instead it is a lengthy winding process. The study also reveals that IS project objectives are not cast in stone; they are instead refined and reshaped by the interactions that take place among actors in...
ISBN: 978-3-8433-8028-7
Издательство:
Книга по требованию
Дата выхода: июль 2011
Computational Intelligence aims at creating problem-solving strategies which are inspired by biological systems. From this approach emerged artificial neural networks, genetic algorithms and recently artificial immune systems. Comparing artificial immune systems and genetic algorithms, close computational similarities can be found. Furthermore, research showed the biological nervous and endocrine systems to be so intertwined that science now speaks of one single system, the neuroendocrine system. From this perspective, the question emerges whether the interrelations between the nervous, endocrine and immune system can yield new or more general computational systems that can be used for problem-solving as well. In the present work, an...
ISBN: 978-3-8364-5361-5
Издательство:
Книга по требованию
Дата выхода: июль 2011
It is indeed that there is a large class of interesting problems for which no reasonably fast algorithms have been developed. Many of these problems are optimization problems that arise frequently in many practical applications. For the last few decades genetic algorithm has been playing a significant role in optimization problems. It is being used in structural optimization, functional optimization, database query optimization, parametric optimization and so on. The MMKP (Multi-dimensional Multiple Choice Knapsack Problem), a complex variant of 0-1 Classical Knapsack Problem, is an NP-Hard problem that cannot be solved in polynomial time. So the thesis is to present a genetic algorithmic approach for finding near optimal solutions of...
ISBN: 978-3-8383-6813-9
Издательство:
Книга по требованию
Дата выхода: июль 2011
Systematic Software Reuse (SSR) that is planned and repeatable is good for Software Engineering. The highest benefits are to be expected from reuse of large grain software artefacts, such as architectures. The book presents our architecture- centred Reuse Triplet concept, that equates SSR to plugging Reuse Software Components (RSC) into a Reuse Software Architecture (RSA). In general, the RSA and RSC will be reusable. We formally define and describe the three components of the Reuse Triplet, including some well-known software architectures. We present a formal description of plugging within the formal framework developed for describing RSAs. Finally, we look at a number of environments for architecture description as case studies of the...
ISBN: 978-3-6393-1656-8
Издательство:
Книга по требованию
Дата выхода: июль 2011
The book is simply a global platform to share doctoral research of the author. Readers are advised to go through every aspect of each algorithm proposed in this book, but never to be influenced directly by any of it in developing new ideas. Let a researcher get an idea about a doctoral research by having a thorough analysis of this book. By having such analysis and constructive criticism of any of the proposed algorithms presented in this book, one may generate a ciphering algorithm of a new dimension. Also, being acquainted with different factors discussed in this book to be used to evaluate a ciphering protocol, one may create a factor of a new dimension to be used for the same purpose. Similarly, acquiring ideas on the proposed...
ISBN: 978-3-8443-0082-6
Издательство:
Книга по требованию
Дата выхода: июль 2011
Traditionally, analysts have performed the task of extracting useful information from recorded data, but the increasing volume of data in modern business and science calls for computer-based approaches. As data sets have grown in size and complexity, there has been a shift away from direct hands-on data analysis toward indirect, automatic data analysis using more complex and sophisticated tools. The modern technologies of computers, networks, and sensors have made data collection and organization much easier. Данное издание не является оригинальным. Книга печатается по технологии принт-он-деманд после получения заказа.
ISBN: 978-3-8433-8037-9
Издательство:
Книга по требованию
Дата выхода: июль 2011
Information System (IS) effectiveness assessment is an important issue for the organizations as IS have become critical for their survival. With the incorporation of Internet technologies into the business environment, it is now more difficult to measure IS effectiveness, because Internet provides a borderless, non-stop, flexible communication medium. Assessing the effectiveness of web-based information systems (WIS) is vital for survival and competitive advantage which is a complicated subject since there are several interacting factors to consider. In the literature there are several methods proposed for IS assessment. However, those studies have been far from providing a broad, comprehensive evaluation framework for any type of...
ISBN: 978-3-8383-5096-7
Издательство:
Книга по требованию
Дата выхода: июль 2011
Deciding an appropriate level of abstraction, which would enable a model to answer some questions accurately while maintaining a reasonable level of complexity, is considered the most critical challenge in the modeling field in general. This thesis aims at presenting a new general approach for tackling the level of abstraction problem. The approach is investigated methodologically and practically. In the methodological part, a formalism of dynamic systems defining model components that form targets of abstraction is presented. A classification of the main categories of abstraction is also developed. A new taxonomy of the model abstraction techniques is then provided. Finally, a new automatic abstraction algorithm is developed. In the...
ISBN: 978-3-6393-0025-3
Издательство:
Книга по требованию
Дата выхода: июль 2011
This book reports on the design, implementation and evaluation of a new interactive Z environment that is integrated into the Eclipse environment. The Z language is a formal specification notation that is used to describe and model computer-based systems. For the widespread use of Z, it is desirable to integrate Z support with a mature and popular editing environment, such as Eclipse. Eclipse was chosen as the basis for the new Z environment because it is widely used, it provides rich functionality and it is designed to be extensible. The Z environment described in this book extends Eclipse to provide a large set of useful features for editing and analyzing Z specifications, such as a table of Z symbols, constant detection of syntax and...
ISBN: 978-3-6390-3699-2
Издательство:
Книга по требованию
Дата выхода: июль 2011
When searching for resources on networks, the system often depends on the broadcast or multicast mechanism to acquire the information, which usually results in large overhead. It will be a serious problem in ad-hoc wireless networks, where the bandwidth is limited and each node moves arbitrarily and acts not only as a host but also as a router. Therefore, it will greatly rely on broadcast or multicast mechanism to search the resources. This work presents an efficient anycasting scheme in ad-hoc wireless networks. The scheme can be used to reduce the request messages, decrease the overhead of response received from duplicate packets, and balance the load of ad-hoc wireless networks. Furthermore, our scheme also supports any K services; it...
ISBN: 978-3-6390-3104-1
Издательство:
Книга по требованию
Дата выхода: июль 2011
Disconnected operation (DO) has become one of the important issues for increasing the reliability and performance of distributed computing environment. A good distributed file system should support fundamental system services in case of network or communication failure. The proposed efficient disconnected operation protocol in Storage Area Network (SAN) distributed file system is to provide high performance, high availability, data consistency, increased scalability, automated storage and data management capability to the client, though it is disconnected from the server. Chapter 1 discusses about the preliminary concepts of the file systems, distributed computing, its advantageous features and limitations. Chapter 2 presents on the...
ISBN: 978-3-6393-1590-5
Издательство:
Книга по требованию
Дата выхода: июль 2011
Facial expressions convey non verbal cues, which play an important role in interpersonal relations. Automatic recognition of human face based on facial expression can be important component of natural human-machine interface. It may also be used in behavioral science. Although human can recognize the face practically without any effort, but reliable face recognition by machine is a challenge. This book presents a new approach for recognizing the face of a person considering the expression of the same human face at different instant of time. This methodology is developed combining Eigenface method for feature extraction and k-Means clustering for identification of the human face. In experimental purpose, AT Данное издание...
ISBN: 978-3-8433-7830-7
Издательство:
Книга по требованию
Дата выхода: июль 2011
The height of the telecommunications and computer networking technologies have combined at the turn of the century and formed WiMAX, a wireless broadband technology that delivers services in a ubiquitous coverage. The reference points of the WiMAX standard defines how the WiMAX system works, connecting users to services in any kind of networks. Reference point functions provides users with secure high bandwidth communication even under high vehicle velocities while lowering power consumption and cost. This book presents a practical simple implementation of the Access Service Network (ASN) gateway using an embedded environment using the Intel high performance network processor IXP2400, providing the details of implementing tunneling...
ISBN: 978-3-6391-8931-5
Издательство:
Книга по требованию
Дата выхода: июль 2011
This research aimed to improve search engine result summaries to help internet users make quick and accurate relevance judgements. Term Order and Query Term Order(QTO) algorithms were developed in order to produce better search engine result summaries. Six sentence weighting schemes were constructed in different weighting components combinations with the aim of comparing the effectiveness between QTO and Query Term Frequency (QTF). The literature on automatic summarisation evaluation is classified into intrinsically motivated Gold Standard/Baseline and Subjective Scoring evaluations, and extrinsically motivated Task Based evaluation. In order to triangulate evidence of the usefulness of the QTO algorithm, Document Understanding...
ISBN: 978-3-6391-5000-1
Издательство:
Книга по требованию
Дата выхода: июль 2011
Privacy, an everyday topic with weekly media coverage of loss of personal records, faces its bigger risk during the uncontrolled, involuntary or inadvertent disclosure and collection of personal and sensitive information. Preserving one's privacy while e-shopping, especially when personalisation is involved, is a big challenge. Current initiatives only o®er customers opt-out options. This research proposes a `privacy-preserved' shopping environment (PPSE) which empowers customers to disclose information safely by facilitating a personalised e- shopping experience that protects their privacy. Evaluation delivered positive results which suggest that such a product would indeed have a market in a world where customers are increasingly...
ISBN: 978-3-6391-9452-4
Издательство:
Книга по требованию
Дата выхода: июль 2011
Networked embedded systems provide a versatile computing platform for supporting surveillance applications. These networks are typically left unattended in harsh environments, making it impossible to re-charge their batteries. Motivated by the large scale of sensor deployment, the limited capabilities of sensors, and the hostility of the encompassing environment, we design distributed protocols for topology management and network synchronization. We address heavily-loaded networks, in which sensors either periodically send their reports to an observer, or respond to an observer's query. We construct a hierarchical (clustered) network in which a subset of nodes are elected as super-nodes (cluster heads). These heads constitute the routing...
ISBN: 978-3-6391-1705-9
Издательство:
Книга по требованию
Дата выхода: июль 2011
The recent growth in wireless communications presents a new challenge to multimedia communications. Due to limited bandwidth and broadcast nature of the wireless medium, it is necessary to compress and encrypt images before they are sent. Two major sources of energy consumption are energy used for computation and energy used for transmission. Computation energy can be reduced by minimizing the time spent on compression and encryption. Transmission energy can be reduced by sending a smaller image file that is obtained by compressing the original image. Image quality is often sacrificed in the compression process. This book proposes a scalable and secure image representation scheme using Binary Space Partitioning (BSP) trees. The binary...
ISBN: 978-3-8383-1207-1
Издательство:
Книга по требованию
Дата выхода: июль 2011