This work develops highly efficient algorithms for analyzing large images. Applications include object-based change detection and screening. The algorithms are 10-100 times as fast as existing software, sometimes even outperforming FGPA/GPU hardware, because they are designed to suit the computer architecture. This thesis describes the implementation details and the underlying algorithm enginee…
Learning by reflection is one of the core processes for improving work performance. We provide a novel approach for reflective learning support by transferring and adapting practices from the Quantified Self to workplace settings. This book contributes with an integrated model for technical support of reflective learning, mobile and web-based applications designed for quantifying and gathering …
The topic of this work are two further developments of the Factorization method for electrical impedance tomography.We present a modification of this method that is capable of detecting mixed inclusions, i.e. both inclusions with a higher as well as inclusions with a lower conductivity than the background medium. In addition, we derive a new method to compute the conductivity inside inclusions …
This collection of science fiction writings by Jayant V. Narlikar offers readers a unique glimpse into the world-famous Indian astrophysicist’s vivid and highly imaginative concepts and stories. The fictional material comprises a witty short story ("The rare idol of Ganesha") that cleverly explores the possible consequences of a mirror-symmetric individual in the context of cricket test ma…
This book constitutes the proceedings of the 12th International Conference on the Integration of Artificial Intelligence (AI) and Operations Research (OR) Techniques in Constraint Programming, CPAIOR 2015, held in Barcelona, Spain, in May 2015. The 29 papers presented together with 8 short papers in this volume were carefully reviewed and selected from 90 submissions. The purpose of the confere…
This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departm…
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially…
This volume is a selection of written notes corresponding to courses taught at the CIMPA School: "New Trends in Applied Harmonic Analysis: Sparse Representations, Compressed Sensing and Multifractal Analysis". New interactions between harmonic analysis and signal and image processing have seen striking development in the last 10 years, and several technological deadlocks have been solved throug…
The book reports on a new methodology for optimization and evaluation of traffic safety, which simulates the processes involved in traffic conflicts on the basis of detailed dynamical, human, and technical models. The models incorporate the whole spectrum of human cognitive functions and responses, the responses of an active safety system and the interactions between the human and the system as…
This book introduces you to professional photography and composition principles, tricks and techniques of iphoneography, photosharing, and more. Do you have a smartphone with you right now? If you do, along with this book, you've got everything you need to make amazing photography. The first three chapters of the book use digital photography history to give you an overview of the capabi…