Saarbrucken, Germany

Logo

Digital Interactive Installations

The present book is based on the author's diploma thesis written at the Institute of Media and Phototechnology University of Applied Sciences Cologne and describes the recent development of digital...


Digital Images Forgery Detection Techniques

Understanding the authenticity and validity of a digital image is always a problem and challenge for organizations especially who are working on e-forms and e-documents. Nowadays, there are several...


SQL Injection Attacks and Possible Remedies

The book describes about the threats on the database.we provide descriptions and examples of how attacks of different type could be performed. we also present a methodology to prevent SQL injection...


The Online Management Information System for Uneb

According to the growing increase in the use and utilization of information technology in Uganda in different sectors, ministries and departments to solve the vast work in data storage, use and...


An Introduction to Ddos Attacks and Defense Mechanisms

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims...


Data Compression - Exploring New Techniques

Our project comprises of analysis of the existing algorithms for data compression so that we can utilize some features of these algorithms use them to build a more efficient algorithm. We have also...


Metaheuristics to Solve Some Variants of Vehicle Routing Problems

Metaheuristics to solve some variants of vehicle routing problems. This book investigates an optimization problem concerning the distribution management in the supply chain. EUCHI address the Vehicle...


Wireless Control of Robot Using Sensor Glove

Making a small scale and low cost robots for general purpose home appliances is an emerging field of research in Robotics since past decade. Hence to make a small and cost effective robot for home...


Best Practices to Achieve CMMI Level II Configuration Process Area

Over the past years, the capability maturity model (CMM) and capability maturity model integration (CMMI) have been broadly used for assessing organizational maturity and process capability...


Paul Thomas Anderson

This book is the first full treatment of the life and cinema of American film director Paul Thomas Anderson. Beginning with his entry into filmmaking, this work spans each of his first four feature...


Developing Small Domain Statistics

When a sample is taken from a population additionally for a certain of its components called domains also estimates are needed for certain parameters. When domain-wise samples are too small these...


Secondary School Music Curriculum in Kenya

This book is a culmination of the author's experience of over fifteen years in teaching Music in Kenyan secondary schools. It presents an insight into the practical realities in the theory and...


Strategies for Survival of Performing Arts Organizations

Based on thirty months of fieldwork in Boston, this book examines how three recently incorporated dance groups establish collective identity, define the roles of leadership, and reconcile private...


Fatal Spaces

Before Alfred Hitchcock rose to fame, German director Fritz Lang was considered by many to be cinema's pre-eminent master of suspense. Lang's thrillers and crime epics had an abiding influence on...


Tali Nan Bapilin Tigo (Three Strings Entwined)

The aim of this book is to identify structures in the talempong musical tradition that correspond with structures in the Minangkabau cultural tradition of the Payakumbuh region in West Sumatra,...


George Frideric Handel and Giovanni Battista Draghi

This book examines the settings of John Dryden's poem A Song for St Cecilia's Day, 1687 by Giovanni Draghi & George Frideric Handel, establishing similarities and disparity in the text setting & word...


Discourses of Dissent

Discourses of Dissent constitutes the first book-length study of Marlene NourbeSe Philip's work. Poet, playwright essayst and novelist, Philip (Tobago, 1947-) has extensively written on the meaning...


The Art of Playing Trumpet in the Upper Register

One of the most desired assets for a trumpeter is the ability to play in the upper register. Upper-register playing is considered one of the most difficult mental and physical challenges of trumpet...


Building Integrated Photovoltaic (Bipv) System

Photovoltaic (solar electric) modules are clean, safe and efficient devices that have long been considered a logical material for use in buildings. Recent technological advances have made PVs...


Green Criminology & Wildlife Trafficking

The illegal wildlife trade is a prevalent crime that has not been explored by mainstream criminology, which ignores environmental harms that remain legal. The emerging field of green criminology...


Contemporary Indonesian Language Poetry from West Java

This book maps aspects of developments in contemporary Indonesian language poetry in West Java. While there have been studies undertaken of the development of modern Indonesian literature, relatively...


Shadowrun - Between Science Fiction and Fantasy

The pieces of the Shadowrun novel series present an interesting problem. Should they be categorized as Science Fiction or Fantasy novels? In order to answer this question we have to know exactly what...


Rendering Methods for Augmented Reality

Augmented reality (AR) is a fast-growing application of computer graphics. AR systems overlay computer-generated graphics over the real world. The research described in this book puts an emphasis on...


Automated Construction of Xsl-Templates

This work bridges the gap between fundamental research in Inductive Program Synthesis and its practical application for end user programming. It demonstrates that it is indeed feasible to...


Business Processes and Context-Sensitive Business Documents - Business Collaborations Based on Umm 1.0

Exchanging business information by connecting computer systems of business partners is not particularly new, but seamless integration is still an open issue. The problem domain of seamless...


An Incrementally Trainable Statistical Approach to Information Extraction - Based on Token Classification and Rich Context Model

Most of the information stored in digital form is hidden in natural language texts. The purpose of Information Extraction (IE) is to find desired pieces of information in unstructured or weakly...


Security Protocols for Mobile Ad Hoc Networks

This book contains research conducted over a three year period, for a Ph.D. Thesis. It provides the following: An introduction to mobile ad hoc networks (MANETs); an in-dept analysis of the state of...


Formal Verification of a Processor with Memory Management Units

In this book we present the formal verification of a memory management unit which operates under specific conditions. We also present the formal verification of a complex processor VAMP with support...


Application Layer Peer-To-Peer Protocol Analysis - A Statistical Method for Analyzing P2P Protocols

Simulation is one of the most important techniques for analysis and improvement of technical systems. The reduction to the most important characteristics minimizes the complexity and points out the...


Modeling TCP Loss Recovery - Peformance Analysis and Improvement

Transmission control protocol (TCP), the major transport-layer protocol in the Internet, is designed to perform a process for the recovery of packet losses, because it inevitably causes packets lost...