Рубрика: Компьютерная литература

A Road to Cloud Computing

A Road to Cloud Computing

Cloud Computing is the buzz word these days. But not everyone is aware of what it is, how it came about and how capable it is of molding the future of technology. This book is aimed at answering these questions and many more from a very basic level. It throws light at the fact that cloud computing, although a relatively new term, has originated from much older technologies. The cloud is developing at a fast pace but it still has many glitches to fix and problems to solve, one of them being data security attacks. Some of the top providers of cloud services have been mentioned in the book, who are competing to provide the best services to their customers. The cloud is changing the way data is handled or stored. It is also providing software as a service, infrastructure as a service, platform as a service, etc. in order to make data handling easier and cheaper for the user of the service.

Раздел: Компьютерная литература

Amalgamation of Molecular Genetics & Data mining

Amalgamation of Molecular Genetics & Data mining

Genetic studies have contributed much in establishing the linkage association for genetic disorders and in the identification of defective genes. Similarly over the last few years, Bioinformatics focus on determining motivating relationships in a given data set of biological objects from the plethora of literature related to particular biological problem. The major precursor to most of the metabolic disorders that poses huge burden and economy is Diabetes that is a burning issue of the research. In this book we described the work on linkage analysis to discover new diseased gene location on chromosomal loci which are not reported so far. To determine the linkage to known loci, a minimum of two microsatellite markers each of the candidate regions of these loci are genotyped. To identify genes involved in susceptibility and to discover new genes and mutations, Single Strand Conformation Polymorphism technique is used. In the second phase, the patterns of interest are detected by using…

Раздел: Компьютерная литература

Data Warehousing with Service-oriented Architecture

Data Warehousing with Service-oriented Architecture

In this book, I introduce a new architectural layer that integrates SOA applications with a near-real-time data warehouse. Through this new “SOA Integration Layer” a new Information Technology (IT) solution is created that realizes even greater benefits to the business as a result of combining these individual information technologies. This new IT solution will connect the SOA integration layer to near-real-time data warehouse and consider the near-real-time data warehouse as a data stage source for other business and system environments. This new IT solution is unique because it focuses on relating SOA application environments to near-real-time data warehouse to support both business operations and business strategic decision making. This study will propose a new prototype model in order to build a SOA integration layer between the user and the data management layer and to connect this SOA integration layer to the data management layer which includes a near-real-time data…

Раздел: Компьютерная литература

Вычисление математических постоянных и функций

Вычисление математических постоянных и функций

Рассматриваются программные реализации вычисления математических постоянных и функций через решение уравнений по формуле Милна в обычной и длинной арифметике. Разработанный алгоритм длинной арифметики позволил выполнять все арифметические операции с произвольным количеством разрядов в целой и дробной частях операндов. Для написания программ использовался BORLAND С++ в WINDOWS. Книга будет полезной для студентов, аспирантов, научных работников.

Раздел: Компьютерная литература

Machine Learning for Text Document Relevance Ranking

Machine Learning for Text Document Relevance Ranking

The context oriented information retrieval has always been based on some or the other explicit ontologies. The emphasis is laid on on the Implicit Ontologies extracted from input text documents themselves. The research focuses upon design of a system (tool) to rank text documents available in machine-readable format by analyzing them upon softcopies of the syllabus content, through congenial content filtering techniques. The notion of n-gram co-occurrences is used to give the semantic interpretation to the core sentences and their neighboring components. The semantic depths of search key phrases can be learnt by analyzing term-to-term associations from the underlying conceptual dependencies of the extracted content. Two metric measures were chosen for exploring text-semantic depths namely, Topical boundaries and Topical vicinities. The degree of relative relevance was investigated by computing other relevance metric, contextual levels of term-significance from the filtered pages…

Раздел: Компьютерная литература

HIGH PERFORMANCE APPROACH FOR DIGITAL SIGNATURE

HIGH PERFORMANCE APPROACH FOR DIGITAL SIGNATURE

Grid computing is one of the most powerful techniquesthat can achieve a high acceleration forcryptographic algorithms. This approach makes thedigital signature attractive for adoption bybusinesses to secure their documents. In this thesis, we propose and develop an applicationfor digital signature cryptography using enterprisegrid middleware called Alchemi. High PerformanceApproach for Digital Signature that is Called “GridSignature” is applied through the separation of themessage, into blocks and encrypting each block to getcipher blocks. Inside Alchemi, it computing the hashcode is used for cipher blocks in independent Alchemiexecutors and any result of computing hash 160 bit isadded to other in exclusive disjunction logic gate;the result is called “Grid Hash”.The evaluation of performance in the grid signaturedepends on three relations: file size; block size andnumber of executors. For each file the sign or verifywas carried on 1, 2, 3, 4 and 5 executor nodes. Sothe performance is…

Раздел: Компьютерная литература

Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem

Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem

One of the essential security services needed to safeguard online transactions is flaxen exchange. In e-Medical transaction protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other’s signature or no one obtain anything useful. This Thesis examines security solutions for achieving e-Medical transactions among Patient/Doctor/PMHIP/Bank. It proposes new security protocols based on the «Rebalanced Multi-Prime Jordan-Totient–RSA Cryptosystem and Signature Scheme «. This thesis concentrates on security solutions for achieving Threshold e-Medical transactions in e-Medical Health Insurance System applications, Threshold contract signing and Threshold certified delivery of valuable data. A Threshold reasonable contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other’s…

Раздел: Компьютерная литература

Mandriva Linux для вашего компьютера (+ CD-ROM)

Mandriva Linux для вашего компьютера (+ CD-ROM)

Рассказывается, как можно отказаться от использования Windows и начать работать в более безопасной и надежной операционной системе Mandriva Linux. Изложены основные приемы работы в текстовых и графических оболочках, описана настройка удаленного соединения и способов подключения к Интернету. Приведены примеры запуска в ОС Linux программ для Windows. Рассмотрены принципы администрирования системы. Во втором издании даны приемы работы на компьютере, когда установлена только ОС Linux. К книге прилагается русифицированный дистрибутив Mandriva Linux One 2008 Spring.

Раздел: Компьютерная литература

Optimizing Accuracy In Decision Making Using Evolutionary Computing

Optimizing Accuracy In Decision Making Using Evolutionary Computing

Analytic Hierarchy Process (AHP) is one of the methods in Decision Support Systems (DSS). AHP has been criticized mainly for its priority deviation method, which is one of AHP’s main components. The priority derivation method, also referred to as prioritization method, is used to derive priorities in order to represent the rank of alternatives in AHP. There are two approaches to derive priorities in AHP, which are non-optimization approach and optimization approach. However, this study found three main problems in the current prioritization methods which are inconsistency of the judgment, non-evolutionary computing approach, and accuracy performance of the prioritization method. In solving these problems, this study proposed Evolutionary Computing Procedure for Deriving Priorities (ECPDP). The ECPDP is an EC-based procedure and derives priorities by solving single objective optimization problem (SOP) through maximizing the accuracy of the solution, by using Total Deviation (TD) as an…

Раздел: Компьютерная литература

Синтез нечетко-нейронных моделей принятия решений

Синтез нечетко-нейронных моделей принятия решений

В работе рассмотрены актуальные теоретико-методические проблемы разработки нечетко-нейронных моделей принятия решений. В связи с не традиционностью применяемого математического аппарата в книге приводятся основные положения теории нечетких множеств, теории возможностей, нейронных сетей в объеме, необходимом для понимания постановок задач, рассмотренных в последующих главах. Изложение ведется в достаточно строгой и в то же время доступной форме. Все основные положения и операции иллюстрируются примерами. Книга рассчитана на широкой круг читателей, включающий специалистов по прикладной математике, инженеров, а также лиц, интересующихся вопросами оптимизации, теории систем и принятия решений.

Раздел: Компьютерная литература