LAP Lambert Academic Publishing

Logo

Artificial Neural Networks Applied for Digital Images with MATLAB Code

Artificial Neural Networks have broad applications to the real world business problems. They have already been successfully applied in many industries. Since neural networks are best at identifying...


Fully Homomorphic Encryption Without Bootstrapping

Fully homomorphic encryption(FHE) is the cryptosystem which supports both addition and multiplication. The existence of the cryptosystems which have efficiency and fully homomorphism would bring...


Document Analysis by Means of Data Mining Techniques

Nowadays, electronic documents are the main resource to store a huge amount of information on several fields. Usually, this information is in the form of text that implies a big effort to extract the...


Cost Estimation for Commercial Software Development Organizations

The estimation of the software cost remains one of the most challenging problems in software engineering; as a preliminary estimate of cost includes many elements of uncertainty. Reliable and early...


Digital Images Forgery Detection Techniques

Understanding the authenticity and validity of a digital image is always a problem and challenge for organizations especially who are working on e-forms and e-documents. Nowadays, there are several...


SQL Injection Attacks and Possible Remedies

The book describes about the threats on the database.we provide descriptions and examples of how attacks of different type could be performed. we also present a methodology to prevent SQL injection...


The Online Management Information System for Uneb

According to the growing increase in the use and utilization of information technology in Uganda in different sectors, ministries and departments to solve the vast work in data storage, use and...


Fundamentals of Information Technology

This book covers introductory concepts of Information Technology. It broadly covers the topics regarding components of computer system, computer networks and the distinctions between the different...


Nmal Online Shopping System

The world of Business has continuously been organizer to acceptance the use of technology to the extent that either of the two will be useless without the existence of the other. The common thing...


Basics of SQL Injection Analysis, Detection and Prevention

Web sites are dynamic, static, and most of the time a combination of both. Web sites needs to protect their databases to assure security. An SQL injection attacks interactive web applications that...


Online Fees Payment System for Makerere University (Muk-Ofps)

The available modes of fees payment to Makerere University through Cash Deposits, Electronic Funds Transfer and Bank Drafts have caused long queues, students missing to sit for their tests and...


Multilayered SQL Injection Prevention Mechanism

SQL injection is an attack in which malicious code is inserted into strings, which are later, passed to the database server for parsing and execution. This attack can be applied to any page which...


Communication Quality and Erp Implementation Project Success

Communication between the information systems specialist and the user has long been recognised as an important aspect of successful information system development projects. The study investigated the...


Internet Use in New Zealand Schools

The past ten years have seen many changes within the New Zealand education system. In order to position ourselves successfully within the global economy, we need to create a 'knowledge economy' where...


More Than Semi-Supervised Learning

Semi-supervised learning (SSL) has grown into an important research area in machine learning, motivated by the fact that human labeling is expensive while unlabeled data are relatively easy to...


Fault-Tolerant Real-Time Scheduling for Multiprocessor Systems

Owing to advances in VLSI and other related technologies, real-time systems have come to an age where their presence is being felt in almost every facet of human life.There is a steady rising trend...


Telemedicine Solutions in Resource-Poor Settings

The World Health Organization's (WHO) Health for All strategy recommends WHO and its member states to ..".integrate the appropriate use of health telematics in the overall policy and strategy for the...


An Introduction to Ddos Attacks and Defense Mechanisms

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims...


Data Compression - Exploring New Techniques

Our project comprises of analysis of the existing algorithms for data compression so that we can utilize some features of these algorithms use them to build a more efficient algorithm. We have also...


Metaheuristics to Solve Some Variants of Vehicle Routing Problems

Metaheuristics to solve some variants of vehicle routing problems. This book investigates an optimization problem concerning the distribution management in the supply chain. EUCHI address the Vehicle...


Wireless Control of Robot Using Sensor Glove

Making a small scale and low cost robots for general purpose home appliances is an emerging field of research in Robotics since past decade. Hence to make a small and cost effective robot for home...


Best Practices to Achieve CMMI Level II Configuration Process Area

Over the past years, the capability maturity model (CMM) and capability maturity model integration (CMMI) have been broadly used for assessing organizational maturity and process capability...


The Use of Ict in Rural Secondary School Libraries

This is a research paper, of which the study had been conducted to see level of use of ICT among students in rural secondary school libraries in Klang, Selangor, Malaysia. The study was conducted...


Software Engineering Project Handbook with C# & SQL Server

With this book, you will able to: Implement project plan, test plan, test report Software Design Review Checklist. Use ER diagram, database diagram, use case diagrams, class diagrams, packaging...


Paul Thomas Anderson

This book is the first full treatment of the life and cinema of American film director Paul Thomas Anderson. Beginning with his entry into filmmaking, this work spans each of his first four feature...


Dancers in a Dance Movement Therapy Group

Over the last few years dance movement therapy has gained increased recognition among the health professions as an effective medium for improving mental health. The inclusion of the expressive body...


Developing Small Domain Statistics

When a sample is taken from a population additionally for a certain of its components called domains also estimates are needed for certain parameters. When domain-wise samples are too small these...


Gelototerapiya V Praktike Pogranichnykh Psikhicheskikh Rasstroystv

Psikhicheskie rasstroystva nepsikhoticheskogo urovnya imeyut bol'shoe rasprostranenie kak v psikhiatricheskoy praktike, tak i u patsientov obshchemeditsinskoy seti. Pri etom v poslednie gody v svyazi...


''War and Peace'' in Studio Ghibli Films

This book examines Japanese animation films of Studio Ghibli in terms of war and peace. This research mainly focuses on movies directed by Hayao Miyazaki, a 'Japanese master of animation', who...


Accounting and Analysis of Financial Performance in Hotel Indusry

This monograph studies the economic nature and the main indicators for measuring the financial performance. It reveals the particular features of hotel business enterprises activity and their impact...