Browse Results

Showing 31,751 through 31,775 of 82,740 results

Shooting Great Digital Photos For Dummies, Pocket Edition

by Mark Justice Hinton Barbara Obermeier

Make your photos better than ever with these great tips! Photography is fun, and thebetter your photos, the morefun you'll have. This little bookis packed with advice to help you set up super shots, make the most of lighting, explore exposure, and sharpen your focus. Learn to take advantage of your camera's settings, and watch your confidence grow as your images improve. Open the book and find: Creative ways to play with lighting All about getting close-up shots How to focus on a moving target Composition tips Things you should know when using manual mode

Fundamentals of Digital Machine Computing

by G. Hintze

Fundamentals of Digital Machine Computing

by Guenter Hintze

Value Chain Marketing: A Marketing Strategy to Overcome Immediate Customer Innovation Resistance (Contributions to Management Science)

by Stephanie Hintze

​Value Chain Marketing (VCM) is a promising strategy to overcome immediate customers’ innovation resistance. By pursuing VCM, material suppliers enlarge their target group beyond their immediate customers and address their downstream customers as well. Treading on relatively unexplored grounds, this book explores the relevance of VCM and comprehends its process; identifies the critical factors for suppliers’ marketing success, and compares the performance of VCM trials, using a multi-method design linking case study research and computational modeling.

The Tower of Hanoi – Myths and Maths

by Andreas M. Hinz Sandi Klavžar Uroš Milutinović Ciril Petr

This is the first comprehensive monograph on the mathematical theory of the solitaire game “The Tower of Hanoi” which was invented in the 19th century by the French number theorist Édouard Lucas. The book comprises a survey of the historical development from the game’s predecessors up to recent research in mathematics and applications in computer science and psychology. Apart from long-standing myths it contains a thorough, largely self-contained presentation of the essential mathematical facts with complete proofs, including also unpublished material. The main objects of research today are the so-called Hanoi graphs and the related Sierpiński graphs. Acknowledging the great popularity of the topic in computer science, algorithms and their correctness proofs form an essential part of the book. In view of the most important practical applications of the Tower of Hanoi and its variants, namely in physics, network theory, and cognitive (neuro)psychology, other related structures and puzzles like, e.g., the “Tower of London”, are addressed. Numerous captivating integer sequences arise along the way, but also many open questions impose themselves. Central among these is the famed Frame-Stewart conjecture. Despite many attempts to decide it and large-scale numerical experiments supporting its truth, it remains unsettled after more than 70 years and thus demonstrates the timeliness of the topic. Enriched with elaborate illustrations, connections to other puzzles and challenges for the reader in the form of (solved) exercises as well as problems for further exploration, this book is enjoyable reading for students, educators, game enthusiasts and researchers alike.

The Tower of Hanoi – Myths and Maths

by Andreas M. Hinz Sandi Klavžar Ciril Petr

The solitaire game “The Tower of Hanoi" was invented in the 19th century by the French number theorist Édouard Lucas. The book presents its mathematical theory and offers a survey of the historical development from predecessors up to recent research. In addition to long-standing myths, it provides a detailed overview of the essential mathematical facts with complete proofs, and also includes unpublished material, e.g., on some captivating integer sequences. The main objects of research today are the so-called Hanoi graphs and the related Sierpiński graphs. Acknowledging the great popularity of the topic in computer science, algorithms, together with their correctness proofs, form an essential part of the book. In view of the most important practical applications, namely in physics, network theory and cognitive (neuro)psychology, the book also addresses other structures related to the Tower of Hanoi and its variants.The updated second edition includes, for the first time in English, the breakthrough reached with the solution of the “The Reve's Puzzle" in 2014. This is a special case of the famed Frame-Stewart conjecture which is still open after more than 75 years. Enriched with elaborate illustrations, connections to other puzzles and challenges for the reader in the form of (solved) exercises as well as problems for further exploration, this book is enjoyable reading for students, educators, game enthusiasts and researchers alike.Excerpts from reviews of the first edition: “The book is an unusual, but very welcome, form of mathematical writing: recreational mathematics taken seriously and serious mathematics treated historically. I don’t hesitate to recommend this book to students, professional research mathematicians, teachers, and to readers of popular mathematics who enjoy more technical expository detail.”Chris Sangwin, The Mathematical Intelligencer 37(4) (2015) 87f. “The book demonstrates that the Tower of Hanoi has a very rich mathematical structure, and as soon as we tweak the parameters we surprisingly quickly find ourselves in the realm of open problems.”László Kozma, ACM SIGACT News 45(3) (2014) 34ff. “Each time I open the book I discover a renewed interest in the Tower of Hanoi. I am sure that this will be the case for all readers.”Jean-Paul Allouche, Newsletter of the European Mathematical Society 93 (2014) 56.

Implementation and Application of Functional Languages: 24th International Symposium, IFL 2012, Oxford, UK, August 30 - September 1, 2012, Revised Selected Papers (Lecture Notes in Computer Science #8241)

by Ralf Hinze

This book contains the selected peer-reviewed and revised papers from the 24th International Symposium on Implementation and Application of Functional Languages, IFL 2012, held in Oxford, UK, in August/September 2012. The 14 papers included in this volume were carefully reviewed and selected from 28 revised submissions received from originally 37 presentations at the conference. The papers relate to the implementation and application of functional languages and function-based programming.

Mathematics of Program Construction: 12th International Conference, MPC 2015, Königswinter, Germany, June 29--July 1, 2015. Proceedings (Lecture Notes in Computer Science #9129)

by Ralf Hinze Janis Voigtländer

This book constitutes the refereed proceedings of the 12th International Conference on Mathematics of Program Construction, MPC 2015, held in Königswinter, Germany, in June/July 2015. The 15 revised full papers presented together with two invited talks were carefully reviewed and selected from 20 submissions. The papers are about mathematical methods and tools put to use in program construction. They range from algorithmics to support for program construction in programming languages and systems. Some typical areas are type systems, program analysis and transformation, programming-language semantics, security, and program logics.

Membrane Computing: 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11399)

by Thomas Hinze Grzegorz Rozenberg Arto Salomaa Claudio Zandron

This book constitutes revised selected papers from the 19th International Conference on Membrane Computing (CMC19), CMC 2018, which was held in Dresden, Germany, in September 2018. The 15 papers presented in this volume were carefully reviewed and selected from 20 submissions. The contributions aim to abstract computing ideas and models from the structure and the functioning of living cells, as well as from the way the cells are organized in tissues or higher order structures.

Netzguidance für Jugendliche: Chancen und Grenzen der Internetkompetenzförderung und ihrer Vermittlung

by Eveline Hipeli

Eveline Hipeli untersucht geeignete Maßnahmen, um Jugendlichen Internetkompetenz zu vermitteln. Die Autorin analysiert, welche Sozialisationsinstanzen als Vermittler eingesetzt werden können und wo deren Chancen und Grenzen liegen. Neben Alter, Geschlecht und Schultypus wurde die kreative und kritische Internetnutzung als Einflussfaktor für die Einstellung Jugendlicher gegenüber Netzguidance-Maßnahmen und Vermittlern untersucht. Denn die kreative und kritische Verwendung des Internets setzt andere Kenntnisse voraus als eine rein konsumorientierte Nutzung.

The Mind-Technology Problem: Investigating Minds, Selves and 21st Century Artefacts (Studies in Brain and Mind #18)

by Inês Hipólito Robert W. Clowes Klaus Gärtner

This edited book deepens the engagement between 21st century philosophy of mind and the emerging technologies which are transforming our environment. Many new technologies appear to have important implications for the human mind, the nature of our cognition, our sense of identity and even perhaps what we think human beings are. They prompt questions such as: Would an uploaded mind be 'me'? Does our reliance on smart phones, or wearable gadgets enhance or diminish the human mind? and: How does our deep reliance upon ambient artificial intelligence change the shape of the human mind? Readers will discover the best philosophical analysis of what current and near future 21st technology means for the metaphysics of mind. Important questions are addressed on matters relating to the extended mind and the distributed self. Expert authors explore the role that the ubiquitous smart phone might have in creating new forms of self-knowledge. They consider machine consciousness, brain enhancement and smart ambient technology, and what they can tell us about phenomenal consciousness. While ideas of artificial general intelligence, cognitive enhancements and the smart environment are widely commented on, serious analysis of their philosophical implications is only getting started. These contributions from top scholars are therefore very timely, and are of particular relevance to students and scholars of the philosophy of mind, philosophy of technology, computer science and psychology.

Human-Computer Systems Interaction: Backgrounds and Applications 4 (Advances in Intelligent Systems and Computing #551)

by Zdzisław S. Hippe Juliusz L. Kulikowski Teresa Mroczek

This book presents a fascinating, state-of-the-art collection of papers on the recent advances in human-computer systems interaction (H-CSI). It offers a detailed description of the status quo in the H-CSI field and also provides a solid base for further development and research in the area. The content is divided into three parts: I. Aid systems for disabled people; II. Decision-making support systems; and III. Information and communication systems. It is intended for a wide audience of readers who are not necessarily experts in computer science, machine learning or knowledge engineering, but are interested in human-computer systems interaction, and the combination of general and specific papers offers readers deeper insights than might be gleaned from research papers or talks at conferences. It touches on all the current hot topics in the field of H-CSI.

Issues and Challenges in Artificial Intelligence (Studies in Computational Intelligence #559)

by Zdzisław S. Hippe Juliusz L. Kulikowski Teresa Mroczek Jerzy Wtorek

The importance of human-computer system interaction problems is increasing due to the growing expectations of users on general computer systems capabilities in human work and life facilitation. Users expect system which is not only a passive tool in human hands but rather an active partner equipped with a sort of artificial intelligence, having access to large information resources, being able to adapt its behavior to the human requirements and to collaborate with the human users. This book collects examples of recent human-computer system solutions. The content of the book is divided into three parts. Part I is devoted to detection, recognition and reasoning in different circumstances and applications. Problems associated with data modeling, acquisition and mining are presented by papers collected in part II and part III is devoted to Optimization.

Human-Computer Systems Interaction: Backgrounds and Applications (Advances in Intelligent and Soft Computing #60)

by Zdzislaw S. Hippe Juliusz Lech Kulikowski

For the last decades, as the computer technology has been developing, the importance of human-computer systems interaction problems was growing. This is not only because the computer systems performance characteristics have been im-proved but also due to the growing number of computer users and of their expectations about general computer systems capabilities as universal tools for human work and life facilitation. The early technological problems of man-computer information exchange – which led to a progress in computer programming languages and input/output devices construction – have been step by step dominated by the more general ones of human interaction with-and-through computer systems, shortly denoted as H-CSI problems. The interest of scientists and of any sort specialists to the H-CSI problems is very high as it follows from an increasing number of scientific conferences and publications devoted to these topics. The present book contains selected papers concerning various aspects of H-CSI. They have been grouped into five Parts: I. General H-CSI problems (7 papers), II. Disabled persons helping and medical H-CSI applications (9 papers), III. Psychological and linguistic H-CSI aspects (9 papers), IV. Robots and training systems (8 papers), V. Various H-CSI applications (11 papers).

Automatische Identifikation für Industrie 4.0

by Heinrich Hippenmeyer Thomas Moosmann

Die Autoren gehen in diesem Buch darauf ein, welche Herausforderungen mit "Industrie 4.0" auf Industriepraktiker zukommen. Wie und mit welchen Zielsetzungen können Entwicklungen in mittelständischen Unternehmen aufgegriffen werden? Die Geräte zur automatischen Identifikation als Teil der Prozesssteuerung und Systemplanung der Intralogistik, zur Einbindung in das Netzwerk im Unternehmen und mit Partnern, sind Kumulationspunkte vieler Probleme in kleinen und mittelständischen Unternehmen. Diesen wird dargelegt wo und wie in den automatisierten Unternehmensbereichen Schritte zur "digitalen" Fabrik bereits vollzogen wurden und wie die Einbindung der betrieblichen Intralogistik in das firmenweite Netzwerk und damit in das ERP-System erfolgen kann.

Nature-Inspired Computing for Control Systems (Studies in Systems, Decision and Control #40)

by Hiram Eredín Ponce Espinosa

The book presents recent advances in nature-inspired computing, giving a special emphasis to control systems applications. It reviews different techniques used for simulating physical, chemical, biological or social phenomena at the purpose of designing robust, predictive and adaptive control strategies. The book is a collection of several contributions, covering either more general approaches in control systems, or methodologies for control tuning and adaptive controllers, as well as exciting applications of nature-inspired techniques in robotics. On one side, the book is expected to motivate readers with a background in conventional control systems to try out these powerful techniques inspired by nature. On the other side, the book provides advanced readers with a deeper understanding of the field and a broad spectrum of different methods and techniques. All in all, the book is an outstanding, practice-oriented reference guide to nature-inspired computing addressing graduate students, researchers and practitioners in the field of control engineering.

Coding Theory and Number Theory (Mathematics and Its Applications #554-A)

by T. Hiramatsu Günter Köhler

This book grew out of our lectures given in the Oberseminar on 'Cod­ ing Theory and Number Theory' at the Mathematics Institute of the Wiirzburg University in the Summer Semester, 2001. The coding the­ ory combines mathematical elegance and some engineering problems to an unusual degree. The major advantage of studying coding theory is the beauty of this particular combination of mathematics and engineering. In this book we wish to introduce some practical problems to the math­ ematician and to address these as an essential part of the development of modern number theory. The book consists of five chapters and an appendix. Chapter 1 may mostly be dropped from an introductory course of linear codes. In Chap­ ter 2 we discuss some relations between the number of solutions of a diagonal equation over finite fields and the weight distribution of cyclic codes. Chapter 3 begins by reviewing some basic facts from elliptic curves over finite fields and modular forms, and shows that the weight distribution of the Melas codes is represented by means of the trace of the Hecke operators acting on the space of cusp forms. Chapter 4 is a systematic study of the algebraic-geometric codes. For a long time, the study of algebraic curves over finite fields was the province of pure mathematicians. In the period 1977 - 1982, V. D. Goppa discovered an amazing connection between the theory of algebraic curves over fi­ nite fields and the theory of q-ary codes.

Entity Framework 6 Recipes

by Zeeshan Hirani Larry Tenny Nitin Gupta Brian Driscoll Robert Vettor

Entity Framework 6 Recipes provides an exhaustive collection of ready-to-use code solutions for Entity Framework, Microsoft's model-centric, data-access platform for the .NET Framework and ASP.NET development. With this book, you will learn the core concepts of Entity Framework through a broad range of clear and concise solutions to everyday data access tasks. Armed with this experience, you will be ready to dive deep into Entity Framework, experiment with new approaches, and develop ways to solve even the most difficult data access challenges. If you are a developer who likes to learn by example, then this is the right book for you. Gives ready-to-use, real-world recipes to help you with everyday tasks Places strong focus on DbContext and the Code First approach Covers new features such as Asynch Query and Save, Codebased Configuration, Connection Resiliency, Dependency Resolution, and much more

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices

by Joey Hirao

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security.* The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance.* This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.

Analysis of Legal Argumentation Documents: A Computational Argumentation Approach (Translational Systems Sciences #29)

by Hayato Hirata Katsumi Nitta

This book introduces methods to analyze legal documents such as negotiation records and legal precedents, using computational argumentation theory.First, a method to automatically evaluate argumentation skills from the records of argumentation exercises is proposed. In law school, argumentation exercises are often conducted and many records of them are produced. From each utterance in the record, a pattern of “speech act +factor” is extracted, and argumentation skills are evaluated from the sequences of the patterns, using a scoring prediction model constructed by multiple regression analyses between the appearance pattern and the scoring results. The usefulness of this method is shown by applying it to the example case “the garbage house problem”. Second, a method of extracting factors (elements that characterize precedents and cases) and legal topoi from individual precedents and using them as the expression of precedents to analyze how the pattern of factors and legal topoi appearing in a group of precedents affects the judgment (plaintiff wins/defendant wins) is proposed. This method has been applied to a group of tax cases. Third, the logical structure of 70 labor cases is described in detail by using factors and a bipolar argumentation framework (BAF) and an (extended argumentation framework (EAF) together. BAF describes the logical structure between plaintiff and defendant, and EAF describes the decision of the judge. Incorporating the legal topoi into the EAF of computational argumentation theory, the strength of the analysis of precedents by combined use of factored BAF and EAF, not only which argument the judge adopted could be specified. It was also possible to determine what kind of value judgment was made and to verify the logic. The analysis methods in this book demonstrate the application of logic-based AI methods to the legal domain, and they contribute to the education and training of law school students in logical ways of argumentation.

Music, Mathematics and Language: The New Horizon of Computational Musicology Opened by Information Science

by Keiji Hirata Satoshi Tojo Masatoshi Hamanaka

This book presents a new approach to computational musicology in which music becomes a computational entity based on human cognition, allowing us to calculate music like numbers. Does music have semantics? Can the meaning of music be revealed using symbols and described using language? The authors seek to answer these questions in order to reveal the essence of music. Chapter 1 addresses a very fundamental point, the meaning of music, while referring to semiotics, gestalt, Schenkerian analysis and cognitive reality. Chapter 2 considers why the 12-tone equal temperament came to be prevalent. This chapter serves as an introduction to the mathematical definition of harmony, which concerns the ratios of frequency in tonic waves. Chapter 3, “Music and Language,” explains the fundamentals of grammar theory and the compositionality principle, which states that the semantics of a sentence can be composed in parallel to its syntactic structure. In turn, Chapter 4 explains the most prevalent score notation – the Berklee method, which originated at the Berklee School of Music in Boston – from a different point of view, namely, symbolic computation based on music theory. Chapters 5 and 6 introduce readers to two important theories, the implication-realization model and generative theory of tonal music (GTTM), and explain the essence of these theories, also from a computational standpoint. The authors seek to reinterpret these theories, aiming at their formalization and implementation on a computer. Chapter 7 presents the outcomes of this attempt, describing the framework that the authors have developed, in which music is formalized and becomes computable. Chapters 8 and 9 are devoted to GTTM analyzers and the applications of GTTM. Lastly, Chapter 10 discusses the future of music in connection with computation and artificial intelligence.This book is intended both for general readers who are interested in music, and scientists whose research focuses on music information processing. In order to make the content as accessible as possible, each chapter is self-contained.

Hybrid Quantum Systems (Quantum Science and Technology)

by Yoshiro Hirayama Koji Ishibashi Kae Nemoto

This book presents state-of-the-art research on quantum hybridization, manipulation, and measurement in the context of hybrid quantum systems. It covers a broad range of experimental and theoretical topics relevant to quantum hybridization, manipulation, and measurement technologies, including a magnetic field sensor based on spin qubits in diamond NV centers, coherently coupled superconductor qubits, novel coherent couplings between electron and nuclear spin, photons and phonons, and coherent coupling of atoms and photons. Each topic is concisely described by an expert at the forefront of the field, helping readers quickly catch up on the latest advances in fundamental sciences and technologies of hybrid quantum systems, while also providing an essential overview.

Contemporary Issues in Communication, Cloud and Big Data Analytics: Proceedings of CCB 2020 (Lecture Notes in Networks and Systems #281)

by Hiren Kumar Deva Sarma Valentina Emilia Balas Bhaskar Bhuyan Nitul Dutta

This book presents the outcomes of the First International Conference on Communication, Cloud, and Big Data (CCB) held on December 18–19, 2020, at Sikkim Manipal Institute of Technology, Majitar, Sikkim, India. This book contains research papers and articles in the latest topics related to the fields like communication networks, cloud computing, big data analytics, and on various computing techniques. Research papers addressing security issues in above-mentioned areas are also included in the book. The research papers and articles discuss latest issues in the above-mentioned topics. The book is very much helpful and useful for the researchers, engineers, practitioners, research students, and interested readers.

Trends in Communication, Cloud, and Big Data: Proceedings of 3rd National Conference on CCB, 2018 (Lecture Notes in Networks and Systems #99)

by Hiren Kumar Deva Sarma Bhaskar Bhuyan Samarjeet Borah Nitul Dutta

This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2–3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.

Machine Learning in Information and Communication Technology: Proceedings of ICICT 2021, SMIT (Lecture Notes in Networks and Systems #498)

by Hiren Kumar Deva Sarma Vincenzo Piuri Arun Kumar Pujari

This book presents collection of research papers presented at International Conference on Information and Communication Technology (ICICT 2021) organized by Department of Information Technology, Sikkim Manipal Institute of Technology, Sikkim, India, during 23–24 December 2021. The book includes papers in the research area of communication networks, data science, healthcare informatics, bio-medical image processing, security of information including cryptography, machine learning applications, and AI applications.

Refine Search

Showing 31,751 through 31,775 of 82,740 results