A cookbook of algorithms for common image processing applications Thanks to advances in computer hardware and software, algorithms have been developed that support sophisticated image processing without requiring an extensive background in mathematics. This bestselling book has been fully updated with the newest of these, including 2D vision methods in content-based searches and the use of graphic…
Covers fundamental and advanced Java database programming techniques for beginning and experienced readers This book covers the practical considerations and applications in database programming using Java NetBeans IDE, JavaServer Pages, JavaServer Faces, and Java Beans, and comes complete with authentic examples and detailed explanations. Two data-action methods are developed and presented in this…
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optim…
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including strategies and techniques for assessing the impact of deploying IPv6 on a network, discovering current IP assets, assessing network readiness, creati…
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT journey are any indication, this book will be used every day by folks interested in greening IT.” – Simon Y. Liu, Ph.D. & Ed.D., Editor-in-Chief, IT P…
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and…
NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to overcome these limitations, Codecharts can elegantly model roadmaps and blueprints for Java, C++, and C# programs of any size clearly, precisely, and at any lev…
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, and networks. Each chapter is divided into a number of sections based on the bioinformatics topics and related mathematical theory and methods. Each top…
Reconciliation of Geometry and Perception in Radiation Physics approaches the topic of projective geometry as it applies to radiation physics and attempts to negate its negative reputation. With an original outlook and transversal approach, the book emphasizes common geometric properties and their potential transposition between domains. After defining both radiation and geometric properties, auth…
Provides students and engineers with the fundamental developments and common practices of software evolution and maintenance Software Evolution and Maintenance: A Practitioner’s Approach introduces readers to a set of well-rounded educational materials, covering the fundamental developments in software evolution and common maintenance practices in the industry. Each chapter gives a clear understan…
Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, together with their associated analysis methods, that allow description and reasoning about the behavior of a system in a formal manner. Growing out of…
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the context of synthetic aperture, inverse synthetic aperture and forward scattering radars from the point of view of analytical geometrical and signal f…
A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and work in this area, divided into four main topics: representation, inference, search, and learning. The results obtained and reproduced in this book have …
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, chemistry, and nanotechnology. It explains key concepts and phenomena in the language of non-physics majors and with simple math, assuming no prior kn…
This book provides comprehensive coverage of 3D vision systems, from vision models and state-of-the-art algorithms to their hardware architectures for implementation on DSPs, FPGA and ASIC chips, and GPUs. It aims to fill the gaps between computer vision algorithms and real-time digital circuit implementations, especially with Verilog HDL design. The organization of this book is vision and hardwar…