Data Analysis Using SQL and ExcelUseful business analysis requires you to effectively transform data into actionable information. This book helps you use SQL and Excel to extract business information from relational databases and use that data to define business dimensions, store transactions about customers, produce results, and more. Each chapter explains when and why to perform a particular type of business analysis in order to obtain useful results, how to design and perform the analysis using SQL and Excel, and what the results should look like. ...
Information Fusion in Signal and Image ProcessingThe area of information fusion has grown considerably during the last few years, leading to a rapid and impressive evolution. In such fast-moving times, it is important to take stock of the changes that have occurred. As such, this books offers an overview of the general principles and specificities of information fusion in signal and image processing, as well as covering the main numerical methods (probabilistic approaches, fuzzy sets and possibility theory and belief functions). ...
Computational Intelligence and Pattern Analysis in Biology InformaticsThis book synthesizes current research in the integration of computational intelligence and pattern analysis techniques, either individually or in a hybridized manner. The purpose is to analyze biological data and enable extraction of more meaningful information and insight from it. Biological data for analysis include sequence data, secondary and tertiary structure data, and microarray data. These data types are complex and advanced methods are required, including the use of domain-specific knowledge for reducing search space, dealing with uncertainty, partial truth and imprecision, efficient linear and/or sub-linear scalability, incremental approaches to knowledge discovery, and increased level and intelligence of interactivity with human experts and decision makers. ...
Fundamentals of Sensor Network ProgrammingThis book provides the basics needed to develop sensor network software and supplements it with many case studies covering network applications. It also examines how to develop onboard applications on individual sensors, how to interconnect these sensors, and how to form networks of sensors, although the major aim of this book is to provide foundational principles of developing sensor networking software and critically examine sensor network applications. ...
Software Design for Six SigmaThis proposal constitutes an algorithm of design applying the design for six sigma thinking, tools, and philosophy to software design. The algorithm will also include conceptual design frameworks, mathematical derivation for Six Sigma capability upfront to enable design teams to disregard concepts that are not capable upfront, learning the software development cycle and saving development costs. ...
Stochastic Modeling and Analysis of Telecoms NetworksThis book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
Using these basic tools, stability criteria, performance measures and comparison principles are obtained for a wide class of models, from the canonical M/M/1 and G/G/1 queues to more sophisticated systems, including the current “hot topics” of spatial radio networking, OFDMA and real-time networks. ...
Developing Secure Applications with Visual BasicDeveloping Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods. This book covers security topics developers want and need to know including File Encryption, Encrypted Communications, Working with Certificates, Digital Signatures, SChannel Communications (SSL), Secure E-Mail, and much more. ...
Sams Teach Yourself More Visual Basic .NET in 21 DaysSams Teach Yourself More Visual Basic.NET in 21 Days provides step-by-step coverage of the most important new features of Visual Basic.NET and .NET that will allow programmers to begin creating rich Web applications and Web Services. Intermediate programmers gain the knowledge and skills to be able to design professional Windows applications and Web services. See how to use previous VB skills in this new environment. ...
Sams Teach Yourself CGI in 24 Hours, 2nd EditionSams Teach Yourself CGI in 24 Hours teaches the reader the next step beyond simple HTML Web pages. This new edition covers implementing CGI with both C and Perl, and it discusses CGI's relative strengths and weaknesses in comparison with other Web programming technologies like JavaScript, Java, and PHP. It also covers recent developments in templating systems and mod_perl server add-ons.
The book takes the reader from the basics of CGI learning, for example, how to implement and customize existing CGI programs that have been written by others to the point where he can use CGI to create his own programs from scratch. ...
PostgreSQL, 2nd EditionThe 2nd edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach that makes it easy to understand how each feature is implemented, how to best use each feature, and how to get more performance from database applications. This definitive guide to building, programming and administering the powerful PostgreSQL open-source database system will help you harness one of the most widely used open source, enterprise-level database systems. ...