This book concentrates on the subject of health monitoring technology of Liquid Rocket Engine (LRE), including its failure analysis, fault diagnosis and fault prediction. Since no similar issue has been published, the failure pattern and mechanism analysis of the LRE from the system stage are of particular interest to the readers. Furthermore, application cases used to validate the efficacy of …
The four volume set LNCS 9489, LNCS 9490, LNCS 9491, and LNCS 9492 constitutes the proceedings of the 22nd International Conference on Neural Information Processing, ICONIP 2015, held in Istanbul, Turkey, in November 2015. The 231 full papers presented were carefully reviewed and selected from 375 submissions. The 4 volumes represent topical sections containing articles on Learning Algorithm…
This book is intended for college students in computer science and related fields, as well as professional software engineers, people training in software engineering, and people preparing for technical interviews. Before you start this book, you should know Java pretty well; in particular, you should know how to define a new class that extends an existing class or implements an interface. If …
The two-volume proceedings LNCS 9314 and 9315, constitute the proceedings of the 16th Pacific-Rim Conference on Multimedia, PCM 2015, held in Gwangju, South Korea, in September 2015. The total of 138 full and 32 short papers presented in these proceedings was carefully reviewed and selected from 224 submissions. The papers were organized in topical sections named: image and audio processing;…
The two-volume proceedings LNCS 9314 and 9315, constitute the proceedings of the 16th Pacific-Rim Conference on Multimedia, PCM 2015, held in Gwangju, South Korea, in September 2015. The total of 138 full and 32 short papers presented in these proceedings was carefully reviewed and selected from 224 submissions. The papers were organized in topical sections named: image and audio processing;…
The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the context of poor IT project success rates globally a…
All individuals, companies and, in general, all organisations are continuously capturing data, many of which are of no significance to them at all. However, other data are available that would afford them a better understanding of their own environment and of themselves. These data – what we know as information – enable them to make more accurate decisions. For this reason, the right amount…
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; pr…
This book constitutes the proceedings of the 37th European Conference on IR Research, ECIR 2015, held in Vienna, Austria, in March/April 2015. The 44 full papers, 41 poster papers and 7 demonstrations presented together with 3 keynotes in this volume were carefully reviewed and selected from 305 submissions. The focus of the papers were on following topics: aggregated search and diversity, clas…
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought in more advertising revenue than any firm, online or off, and had risen to become the most profitable media company on the planet. Today billions …