Search Results (9,486 titles)

Searched over 21.6 Million titles in 0.27 seconds

 
English (X)

       
56
|
57
|
58
|
59
|
60
Records: 1141 - 1160 of 9,486 - Pages: 
  • Cover Image

ePulp Sampler Vol 1

By: John Picha; Matthew J Davies

Get ready to explore strange worlds, visit forgotten pasts, and delve into parallel histories. Prepare to encounter an eclectic mix of heroes walking the line between life and death. Duck as Rurik's blade carves demons in the Celtic landscape of dark fantasy. Witness the Dead Reckoner, a battlefield ghost looking for absolution in a weird war tale. Face Nazi occupation of USA with Wild Marjoram in an alternate history. Race through the Great Depression on an errand of mercy with Pandora Driver, a noir superheroine. Fly across the universe with the Skyracos in a retro sci-fi adventure. This action packed ePulp anthology unleashes 5 new tales inspired by the pulp magazines of the 1920s - 1940s. They are not for the faint of heart. Things will get intense and stuff on these pages can't be unread. But whether you're a nostalgian, dieselpunk, pulp fan, sci-fi and fantasy aficionado, or ebook spelunker, there's something in this collection for you to explore. However, I suggest you sample them all....

-

Welcome What are ePulps? Rurik of the Demonwatch: Arena of Death Dead Reckoner: October 21, 1917 Wild Marjoram: The Pill Pandora Driver: Blind Luck Skyracos: Set Adrift Looking Forward at the Past More ePulp Pulp Allies ...

Read More
  • Cover Image

Erasure Techniques in MRD Codes

By: Florentin Smarandache; W. B. Vasantha Kandasamy

In this book the authors study the erasure techniques in concatenated Maximum Rank Distance (MRD) codes. The authors for the first time in this book introduce the new notion of concatenation of MRD codes with binary codes, where we take the outer code as the RD code and the binary code as the inner code....

We want to find efficient algebraic methods to improve the realiability of the transmission of messages. In this chapter we give only simple coding and decoding algorithms which can be easily understood by a beginner. Binary symmetric channel is an illustration of a model for a transmission channel. Now we will proceed onto define a linear code algebraically....

Preface 5 Chapter One BASIC CONCEPTS 7 Chapter Two ALGEBRAIC LINEAR CODES AND THEIR PROPERTIES 29 Chapter Three ERASURE DECODING OF MAXIMUM RANK DISTANCE CODES 49 3.1 Introduction 49 3.2 Maximum Rank Distance Codes 51 3.3 Erasure Decoding of MRD Codes 54 Chapter Four MRD CODES –SOME PROPERTIES AND A DECODING TECHNIQUE 63 4.1 Introduction 63 4.2 Error-erasure Decoding Techniques to MRD Codes 64 4.3 Invertible q-Cyclic RD Codes 83 4.4 Rank Distance Codes With Complementary Duals 101 4.4.1 MRD Codes With Complementary Duals 103 4.4.2 The 2-User F-Adder Channel 106 4.4.3 Coding for the 2-user F-Adder Channel 107 Chapter Five EFFECTIVE ERASURE CODES FOR RELIABLE COMPUTER COMMUNICATION PROTOCOLS USING CODES OVER ARBITRARY RINGS 111 5.1 Integer Rank Distance Codes 112 5.2 Maximum Integer Rank Distance Codes 114 Chapter Six CONCATENATION OF ALGEBRAIC CODES 129 6.1 Concatenation of Linear Block Codes 129 6.2 Concatenation of RD Codes With CR-Metric 140 FURTHER READING 153 INDEX 157 ABOUT THE AUTHORS 161...

Read More
  • Cover Image

Methods in Environmental Biotechnology for Environmentalists

By: Florentin Smarandache; W. B. Vasantha Kandasamy

This book has five chapters. First chapter is introductory in nature. Here we just study chemical pollution caused by garment industries in chapter two of this book using fuzzy associative memories. In chapter three we give ways to control pollution by improving the system performance using hierarchical genetic fuzzy control algorithm. This study is carried out using the past data reported by Shimada et al (1995). Health hazards suffered by the agriculture labourers; caused by the chemicals used as fertilizers and pesticides is analysed in chapter four using RTD matrices. Chapter five gives a method of minimization of SOx and NOx using fuzzy control theory in cement industries to reduce pollution....

In this chapter, we have used the fuzzy control method to find the correct measure of pressure and speed of kiln. Using data from Alathur cement industry, we have used mean of maximum method of fuzzy control with the data and we found the pressure and speed of kiln. Here the speed and pressure of kiln are important parameters in the kiln, because the SOx and N0X concentration is dependent on the kiln feed, coal feed and the kiln feed, coal feed are dependent on speed and pressure of kiln. That means if we increase the kiln feed and coal feed we must increase the kiln pressure and speed. By this way the mixing of SOx and NOx with kiln feed is maintained properly or otherwise the SOx and NOx will not mix fully with the kiln feed. The remaining unmixed gases of SOx and NOx are the wastage polluting the environment. For this, we convert all this kiln feed and coal feed level and pressure of kiln and speed of kiln into fuzzy control. By using fuzzy control we identify a correct pressure and speed of the kiln for a given kiln feed and coal feed. When we choose a correct pressure of kiln and speed of kiln through fuzzy control, the SO...

Preface 5 Chapter One INTRODUCTION 7 Chapter Two USE OF FAM MODELS TO ANALYSE THE POLLUTION CAUSED BY THE GARMENT INDUSTRIES 11 Chapter Three HIERARCHICAL GENETIC ALGORITHM TO IMPROVE THE SYSTEM PERFORMANCE AND REDUCE POLLUTION BY CHEMICAL PLANTS 51 3.1 Introduction 51 3.2 Description of the Problem 53 3.3 Application of Hierarchical Genetic Fuzzy Control Algorithm to Control Process Variables of Decision Tables in Chemical Plants 56 3.4 Use of Hierarchical Genetic Fuzzy Control Algorithm in the Real Data 58 3.5 Conclusions 73 Chapter Four IDENTIFICATION OF THE MAXIMUM AGE GROUP IN WHICH THE AGRICULTURAL LABOURERS SUFFER HEALTH HAZARDS DUE TO CHEMICAL POLLUTION USING RTD MATRIX 75 4.1 Introduction 75 4.2 Estimation of the Maximum Age Group of the Agricultural Labourers having Cardio Vascular Problem due to Chemical Pollution using RTD Matrices 77 4.3 Conclusion 93 Chapter Five MINIMIZATION OF SOX AND NOX USING FUZZY CONTROL THEORY IN CEMENT INDUSTRIES TO REDUCE POLLUTION 95 5.1 Introduction 95 5.2 Description of the Problem 97 5.3 Process Fates of Sulfur in Cement Kiln 98 5.4 Process Fates of Ni...

Read More
  • Cover Image

Emigrant to Infinity

By: Florentin Smarandache

A collection of poetry relating to the author himself based on personal experiences.

FATE IRONY before may I have been ”me” the fate was done from geometric signs Lobacevsky’s ones after my face but not looking like me in dropping of time...

Meeting of minds: Florentin Smarandache, preface by Cezar Ivãnescu: 5 1) IN THE VICINITY OF VICINITY – cycle: 6 PIT OF WORDS: 7 FATE IRONY: 8 DEFEATED TREE: 9 THE YELLOW ROSE: 10 WHEN I LOOK AT YOU: 11 BROKEN MIRROR: 12 LEFT FLOWER AND GREEN: 13 GOOD MORNING: 14 NIGHT SPIRIT: 15 SOUL WITHOUT SOUL: 16 2) TOO LONG ROUTE AMONG THE FOREIGNERS (and I cannot turn back my sight anymore) – cycle: 17 PASSING THOUGHTS: 18 THE DEAF AND THE DUMB: 19 HEALING: 20 THE MIRROR: 21 A YOKE: 22 WHAT DO WE WANT?: 23 THE GREAT ARMY: 24 TEST AT GEOGRAPHY: 25 MYSELF LIKE A CONTRADICTION: 26 FIRST CLASS PLANE TICKET: 28 NOBODY: 33 HUNTING: 34 HOSPITALITY: 35 DESIRE: 36 WITHOUT CEREMONIES: 37 YES AND NO: 39 STRIP-TEASE: 40 OH, YES: 41 COURAGE: 42 RECIPROCITY: 43 PRAYER: 44 CONTENTMENT: 48 WISH: 49 ALONE IN THE CHRISTMAS NIGHT: 51 THE MATCHMAKERS: 57 THE END: 65 ADIEU: 66 3) POEMS FROM MY SOUL’S EXILE – cycle: 68 THE SHADOW OF AUROCHS: 69 EMIGRANT TO INFINITY: 70 THE COUNTRY AND ME: 71 THE SAP OF THE LIFE: 72 THORNY ROSE OF LOVE: 73 YOU ARE SO SINGLE ON THE EARTH…: 74 SYMPHONY IN WALNUT WOOD: 75 DON’T SET YOUR ...

Read More
  • Cover Image

DSm Vector Spaces of Refined Labels

By: W. B. Vasantha Kandasamy; Florentin Smarandache

This book has six chapters. The first one is introductory in nature just giving only the needed concepts to make this book a self contained one. Chapter two introduces the notion of refined plane of labels, the three dimensional space of refined labels DSm vector spaces. Clearly any n-dimensional space of refined labels can be easily studied as a matter of routine....

Preface 5 Chapter One INTRODUCTION 7 Chapter Two DSm VECTOR SPACES 17 Chapter Three SPECIAL DSm VECTOR SPACES 83 Chapter Four DSm SEMIVECTOR SPACE OF REFINED LABELS 133 Chapter Five APPLICATIONS OF DSm SEMIVECTOR SPACES OF ORDINARY LABELS AND REFINED LABELS 173 Chapter Six SUGGESTED PROBLEMS 175 FURTHER READING 207 INDEX 211 ABOUT THE AUTHORS 214...

Read More
  • Cover Image

Advances and Applications of DSmT for Information Fusion (Collected Works) : Volume 3

By: Florentin Smarandache; Jean Dezert

Applications demonstrate the power of the DSmT framework. In this third Volume, DSmT is applied to the entire spectrum of the Information Fusion that would interest any reader in data, sensor, information, and mathematical fusion topics. Highlighted in Figure 1 are the contemporary issues that include the links between (1) data conditioning and information management, (2) combined situation and impact assessment, and (2) knowledge representation between machine processing and user coordination. Various applications leverage DSmT “Advances” listed above along with DSmH (hybrid), DSmP (Probabilistic), and DSmT theoretical insights. The third volume attacks these application issues of coordination between the “levels” of information fusion....

Part I Advances on DSmT 1 Chapter 1 An introduction to DSmT 3 by J. Dezert and F. Smarandache 1.1 Introduction . . . . . . . . . . 4 1.2 Foundations of DSmT . . . . . . . . . 4 1.2.1 The power set, hyper-power set and super-power set . . 6 1.2.2 Notion of free and hybrid DSm models . . . . 18 1.2.3 Generalized belief functions . . . . . . 20 1.2.4 The classic DSm rule of combination . . . . . 21 1.2.5 The hybrid DSm rule of combination . . . . . 22 1.2.6 Examples of combination rules . . . . . . 24 1.2.7 Fusion of imprecise beliefs . . . . . . 29 1.3 Proportional Conflict Redistribution rule . . . . . 33 1.3.1 PCR formulas . . . . . . . . . 34 1.3.2 Examples . . . . . . . . . 35 1.3.3 Zadeh’s example . . . . . . . . 39 1.4 Uniform and partially uniform redistribution rules . . . 41 1.5 RSC Fusion rules . . . . . . . . . 43 1.6 The generalized pignistic transformation (GPT) . . . . 45 1.6.1 The classical pignistic transformation . . . . 45 1.6.2 Notion of DSmcardinality . . . . . . 46 1.6.3 The Generalized Pignistic Transformation . . . 47 1.7 The DSmP transformation . . . . . . . 48 1.7.1 The Probabilistic In...

Read More
  • Cover Image

Advances and Applications of DSmT for Information Fusion (Collected Works) : Volume 2

By: Florentin Smarandache; Jean Dezert

This second book devoted on advances and applications of Dezert-Smarandache Theory (DSmT) for information fusion collects recent papers from different researchers working in engineering and mathematics. Part 1 of this book presents the current state-of-the-art on theoretical investigations while, Part 2 presents several applications of this new theory. Some ideas in this book are still under current development or improvements, but we think it is important to propose them in order to share ideas and motivate new debates with people interested in new reasoning methods and information fusion. So, we hope that this second volume on DSmT will continue to stir up some interests to researchers and engineers working in data fusion and in artificial intelligence....

Preamble iii Prefaces v Part I Advances on DSmT 1 Chapter 1 Proportional Conflict Redistribution Rules for Information Fusion 3 by Florentin Smarandache and Jean Dezert 1.1 Introduction . . . . . . . . . . . 3 1.2 The principal rules of combination . . . . . . . 6 1.2.1 Notion of total and partial conflicting masses . . . . . 6 1.2.2 The conjunctive rule . . . . . . . . . 6 1.2.3 The disjunctive rule . . . . . . . . . 8 1.2.4 Dempster’s rule of combination . . . . . . . 8 1.2.5 Smets’ rule of combination . . . . . . . 9 1.2.6 Yager’s rule of combination . . . . . . . 9 1.2.7 Dubois & Prade’s rule of combination . . . . . . 9 1.2.8 The hybrid DSm rule . . . . . . . . 10 1.3 The general weighted operator (WO) . . . . . . . 11 1.4 The weighted average operator (WAO) . . . . . . . 12 1.4.1 Definition . . . . . . . . . 12 1.4.2 Example for WAO . . . . . . . . . 13 1.4.3 Limitations of WAO . . . . . . . . . 13 1.5 Daniel’s minC rule of combination . . . . . . . 14 1.5.1 Principle of the minC rule . . . . . . . 14 1.5.2 Example for minC . . . . . . . . . 15 1.6 Principle of the PCR rules . . . . . . . . . 20 1.7 The...

Read More
  • Cover Image

Data Madministration : A Paradox Style

By: Florentin Smarandache

This is a how-not-to-do book about codification, indexing, information, computer science, peripherals and terminals. The data entries are unselected and stored in a database. Afterwards, they are disorganized, unstructured and then manufactured. A data mudflow is designed later in order to misdirect all information. A nonquality control personnel filters and trashes all high valued documents and restores the chaos in the institution. The book helps with the malfunctioning of an administrative system....

The illogical mudflow of a quarterly non-production process In looking at the illogical mudflow of a quarterly non-production process, it is very imperative for us to take into account several non-practical factors that take place during such non-production process. These factors include: - Tools under maintenance - Contracts - Transportation - Supply Below is an illustration of the two major phases that are not usually encountered during the execution of a non-production process. ...

Contents Forward and Backward.........3 Chapter 1 ...................................5 Non-Basic symbols misused in Computer Science .....................5 Unintelligent terminal .........................9 The illogical mudflow of a quarterly non-production process ...............12 Chapter 2 ..................................15 The computer coding misused in Computer Science ...................15 Codification problems ..............................17 Codes misclassification .............................18 Chapter 3 ..................................21 Miscomputing the time for creating an application misusing the mudflow scrambles ........21 Misinformation deregistration and non-identification in files...............27 Chapter 4 ..................................29 Data storage and types of non-peripheral devices .....................29 Representation of Misinformation in internal memory ..............30 External non-peripherals ............................31 Printing paper ................................34 Magnetic band ...............................34 Magnetic disks ...............................35 The non-...

Read More
  • Cover Image

Cultural Advantages in China : Tale of Six Cities

By: Fu Yuhua; Florentin Smarandache

It is the purpose of this book to bring these cultural advantages into more focus, in order to bring into light some ‘human’ aspects of the country, and how these can be integrated into the broader context of economics development. At the end of the day, their achievements cannot be measured by economic progress alone, but also how the people can have the proper sense of meaning (i.e. ‘feel’ at home) in their own homeland, instead of being just another ‘bolt’ in the obsolete industrial engine of economics....

Jingshan Park: For an extraordinary and unforgettable view of Beijing and the Forbidden City, casually climb the steps to the top of the hill to the Wanchunting (Wanchun Pavilion), which overlooks this small park, directly opposite the North Gate of the Forbidden City. From this playground of Ming and Qing dynasty emperors for almost 500 years, you will be able to get a grasp on the great city that is China’s capital. On Sunday’s choral groups gather in the park to perform amateur Peking Operas, play musical instruments or to sing songs once beloved by the masses....

Abstract……………3 Foreword……………4 Contents……………6 Chapter 1. Cultural Advantage as an Alternative Framework: An Introduction ‐ by F. Smarandache & V. Christianto……………7 Chapter 2. Beijing: A Cultural Metropolitan – compiled, edited, augmented by Ke Haiying & F. Smarandache…………18 Chapter 3. The City of Hengshui – by Li Zhanbing……………38 Chapter 4. Ningbo — A Culture‐flourishing Land on the Shore of East China Sea – by Lin Rongchen……………53 Chapter 5. Jingdezhen: Porcelain Capital of the World – by Li Xiaomin……………66 Chapter 6. Haimen : Charming City ‐ by Wang Ping & Jiang He……………71 Chapter 7. Changsha: Cultural Name Cards – by Wang Peiyun & Tang Yuming……………82...

Read More
  • Cover Image

Combinatorial Geometry with Applications to Field Theory : Second Edition

By: Linfan Mao

In The 2nd Conference on Combinatorics and Graph Theory of China (Aug. 16-19, 2006, Tianjing), I formally presented a combinatorial conjecture on mathematical sciences (abbreviated to CC Conjecture), i.e., a mathematical science can be reconstructed from or made by combinatorialization, implicated in the foreword of Chapter 5 of my book Automorphism groups of Maps, Surfaces and Smarandache Geometries (USA, 2005). This conjecture is essentially a philosophic notion for developing mathematical sciences of 21st century, which means that we can combine different fields into a union one and then determines its behavior quantitatively. It is this notion that urges me to research mathematics and physics by combinatorics, i.e., mathematical combinatorics beginning in 2004 when I was a post-doctor of Chinese Academy of Mathematics and System Science. It finally brought about me one self-contained book, the first edition of this book, published by InfoQuest Publisher in 2009. This edition is a revisited edition, also includes the development of a few topics discussed in the first edition....

1.5 ENUMERATION TECHNIQUES 1.5.1 Enumeration Principle. The enumeration problem on a finite set is to count and find closed formula for elements in this set. A fundamental principle for solving this problem in general is on account of the enumeration principle: For finite sets X and Y , the equality |X| = |Y | holds if and only if there is a bijection f : X → Y . Certainly, if the set Y can be easily countable, then we can find a closed formula for elements in X....

Contents Preface to the Second Edition . . . . . . . . . . . . . . . . . . . i Chapter 1. Combinatorial Principle with Graphs . . . . . . . . . . 1 1.1 Multi-sets with operations. . . . . . . . . . . . . . . . . . . . .2 1.1.1 Set . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Operation . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.3 Boolean algebra . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1.4 Multi-Set . . . . . . . . . . . . . . . . . . . . . . . . . .8 1.2 Multi-posets . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.2.1 Partially ordered set . . . . . . . . . . . . . . . . . . . . .11 1.2.2 Multi-Poset . . . . . . . . . . . . . . . . . . . . . . 13 1.3 Countable sets . . . . . . . . . . . . . . . . . . . . . . . . 15 1.3.1 Mapping . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.3.2 Countable set . . . . . . . . . . . . . . . . . . . . 16 1.4 Graphs . . . . . . . . . . . . . . . . . . . . . . . . 18 1.4.1 Graph. . . . . . . . . . . . . . . . . . . . . . . . . . . .18 1.4.2 Subgraph . . . . . . . . . . . . . . . . . . . . . . . . 21 1.4.3 Labeled graph. . . . . . ...

Read More
  • Cover Image

Clan Capitalism, Graph Distance, and Other Issues : A Collection of Social and Economics Papers

By: Florentin Smarandache; V. Christianto

This book consists of 6 papers focusing on social and economic issues. The topics covered include graph distance and optimal communication, migration in Jaipur, urbanization, clan capitalism, world population growth rate, and scientific inquiry. These papers were written in the period between 2009-2010. Hopefully the readers will find some new insights in this collection of papers....

In recent years, there has been a rapid increase in the literature which discusses new phenomenon associated to social network. One of the well-known phenomenon in this regards is known as ‘six degrees of separation’ [1], which implies that one can always keep a communication with each other anywhere within a six-step. A number of experiments has verified this hypothesis, either in the context of offline communication (postal mail), or online communication (email, etc.). In this article, we argue that by introducing this known ‘six degrees of separation’ into the context of group instability problem, one can find a new type of wisdom in organization. Therefore, we offer a new conjecture, which may be called ‘Group stability conjectures based on Graph/Network distance.”...

Read More
  • Cover Image

Auxiliary Information and A Priori Values in Construction of Improved Estimators

By: Florentin Smarandache; Rajesh Singh

This volume is a collection of six papers on the use of auxiliary information and a priori values in construction of improved estimators. The work included here will be of immense application for researchers and students who employ auxiliary information in any form....

Introduction In survey sampling, the use of auxiliary information can increase the precision of an estimator when study variable y is highly correlated with the auxiliary variable x. but in several practical situations, instead of existence of auxiliary variables there exists some auxiliary attributes, which are highly correlated with study variable y, such as (i) Amount of milk produced and a particular breed of cow. (ii) Yield of wheat crop and a particular variety of wheat etc. (see Shabbir and Gupta (2006)). In such situations, taking the advantage of point biserial correlation between the study variable and the auxiliary attribute, the estimators of parameters of interest can be constructed by using prior knowledge of the parameters of auxiliary attribute....

Preface...............................................4 1.Ratio Estimators in Simple Random Sampling Using Information on Auxiliary Attribute...............................................7 2.Ratio-Product Type Exponential Estimator for Estimating Finite Population Mean Using Information on Auxiliary Attribute......................18 3.Improvement in Estimating the Population Mean Using Exponential Estimator in Simple Random Sampling....................................33 4.Almost Unbiased Exponential Estimator for the Finite Population Mean......................41 5.Almost Unbiased Ratio and Product Type Estimator of Finite Population Variance Using the Knowledge of Kurtosis of an Auxiliary Variable in Sample Surveys....................................54 6.A General Family of Estimators for Estimating Population Variance Using Known Value of Some Population Parameter(s).....................62-73...

Read More
  • Cover Image

Tatsie, : The Thick-skinned Bushman

By: Jaco de Beer

Find out what happened when the other Bushmen tried to kill him and how they finally managed to get rid of him.

Certain times of the year the “Watersnake” would move far away and the land of the Bushmen would get very dry. During those times the children have to walk long distances to fetch water for the household. The bigger and stronger of the children could carry a whole springbok stomach full of water but the younger ones only two ostrich eggs filled with water. Tatsie was too lazy to go and fetch water, for himself. He would wait for the children to come back and take one of the eggs and drink the water from it. If the child protested or cried he would simply break the egg on the ground and they would get into trouble with their parents. When he was very thirsty or wanted to wash his hands he would grab the springbok “pens” or stomach from one of the bigger children and use all of that water just for himself. If the child protested or tried to run away he would cut a hole in it with his knife and drink from the water pouring out of the hole....

Read More
  • Cover Image

Greegs & Ladders : An Incredible Journey through Space and Time, Volume 1

By: Zack Mitchell; Danny Mendlow

Greetings Earth creatures. This book has been dropped off on your planet for the purpose of... well, for you to read it. I'm not sure if you'll like it, I might not if I was you. I'd wager many of you won't be big fans. The investment banking community will especially be... put off by some of what is contained here. An advanced copy was sent to your virtual place of worship 'Reddit' and met with mixed results. While spending nearly a full day on the front page, many Earthlings voiced their stern displeasure with the book. Many others found it lovely. I'm not sure who I'm more concerned for. Either way this is a book I only meant to help with. I know sometimes books, words and ideas can make you humans angry; but then again, pretty much everything seems to do that. In the end, just remember it's only words in a book. Can't we all just get along and go for a swim instead?...

Wilx looked at the nearest cage. It had a sign reading PECKING GRAPPLER-BIRDS. Below this sign was another sign reading NEVER OPEN. They couldn’t have chosen a better cage to stand in front of while defending themselves from yet another angry and hotly pursuant mob. Wilx did the unthinkable. He opened the cage. Pecking Grappler-Birds swarmed out, quickly filling up the space of Subterranean Layer 53. They pecked. They grappled. They flew. “Run!” yelled Wilx. Rip and Krimshaw followed Wilx down the corridor towards the Master Ladder. “I think those bird things have them distracted. But don’t slow down.” “Can you believe how fast they peck through to the brains?” asked Krimshaw. “And how effectively they grapple the spinal cord?” added Rip. “No time to admire the rapid killing technique of the Pecking Grappler-Bird. Everybody get on this ladder now.” ...

Read More
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
  • Cover Image

Artificial Intelligence and Responsive Optimization (Second Edition)

By: Florentin Smarandache; M. Khoshnevisan

In part 1, we have defined a fuzzy utility system, with different financial goals, different levels of risk tolerance and different personal preferences, liquid assets, etc. In part 2, we have defined a computational model for a simple portfolio insurance strategy using a protective put and computationally derive the investor’s governing utility structures underlying such a strategy under alternative market scenarios. In Part 3, it is proposed an artificial classification scheme to isolate truly benign tumors from those that initially start off as benign but subsequently show metastases. In part 4, an alternative methodological approach has been proposed for quantifying utility in terms of expected information content of the decision-maker’s choice set....

In this paper we have designed our fuzzy system so that customers are classified to belong to any one of the following three categories: *Conservative and security-oriented (risk shy) *Growth-oriented and dynamic (risk neutral) *Chance-oriented and progressive (risk happy) A neutrosophic system has three components – that’s why it may be considered as just a generalization of a fuzzy system which has only two components. Besides being useful for clients, investor classification has benefits for the professional investment consultants as well. Most brokerage houses would value this information as it gives them a way of targeting clients with a range of financial products more effectively - including insurance, saving schemes, mutual funds, and so forth. Overall, many responsible brokerage houses realize that if they provide an effective service that is tailored to individual needs, in the long-term there is far more chance that they will retain their clients no matter whether the market is up or down....

Read More
  • Cover Image

CMMI Implementation Guide : A Practitioner's Persepective

By: Vishnuvarthanan Moorthy

The Book details on how to approach CMMI Implementation in an organization. It details out the various phases involved in CMMI Implementation and how to plan and execute them. It details on various aspects which we tend to overlook in CMMI Implementation. Who Should Read? • Organization looking forward to implement CMMI • Top Management person, trying to understand how to go about • SEPG, Program manager and Process Quality members • Anyone who is interested in understanding the Implementation of CMMI Why to Read? • To get complete End to End understanding on CMMI Implementation Lifecycle • Plan your budget, effort and resources for the program • Set your expectations clear on CMMI Implementation • Be aware of the different aspects in Implementation How it’s different: • Written from practitioners’ point of view • Communicates the reality in practical implementation Word of Caution: • The book contains only samples and typical examples and they are not comprehensive and to be verified and validated on a particular context for applicability ...

This CMMI Implementation Guide is a reference book for anyone interested in implementing CMMI in their organization. The purpose of this book is, to provide insight in to CMMI Implementation phases and best practices to be followed in this journey. Most of us agree, that CMMI is more a De facto model that IT Industry follows and other industries also has shown lot of interest in adopting this model. The day to day popularity and its adoption rate is on the surge for CMMI. In this scenario, this book will help the new organizations and implementers, on how to approach CMMI Implementation practically in their organization. This book is not a replacement to the Model or to the resources which CMMI Institute Publishes. This is only an additional resource which user can benefit from. CMMI Institute holds the complete authority and rights to CMMI model and all the components within the framework. This book is prepared based on the experience of a practitioner on implementing the model in various organizations. The Author has worked in multiple roles in CMMI Implementation and has global exposure in implementing the model. We reiterate ...

Contents Introduction to CMMI Initiating CMMI Implementation Planning CMMI Implementation Executing CMMI Implementation Appraising CMMI Implementation Sustaining CMMI Implementation CMMI High Maturity Implementation Miscellaneous References ...

Read More
  • Cover Image

Time to Think : Eight Short Stories

By: Rigby Taylor

‘Time To Think’ is a collection of eight short tales about how to cope with such things as unwelcome evangelists, visitors, praise, sexual attention, living in a nursing home, relations, genetic modification and sexual urges....

Spreading the Word Sebastian gazed unseeing from the verandah into the sun filled garden. As usual a zillion thoughts jostled aside all attempts to attain a state of Zen-like relaxation. With an impatient sigh he sat up, dusted a few crumbs from the divan, rearranged the pillows then lay back with his hands at his side. Yogic breathing—that would do the trick. He managed to hold his mind still for at least three seconds before a large spider constructing an intricate web among the rafters caught his attention. He was already on his feet to get a broom when he remembered, and slumped back. ‘Your tendons will never repair if you're always on the go,’ the slim young doctor had snapped only an hour before. ‘Why can’t you just lie back and relax?’ ‘Because it’s not my nature,’ Sebastian had answered with a fetching sigh. ‘Perhaps if you were to massage me...?’ ‘And risk Reginald’s wrath? Not bloody likely.’ ‘Wouldn’t it be worth a broken arm?’ Sebastian grinned. ‘Not even you are worth that, Sebastian. Shut up and let the sounds of nature lull you to somnolence.’ But Sebastian couldn’t. Time plodded. He began to fidget. Struggled to...

•‘Spreading the Word’ • ‘Time to Think’ • ‘Free Will’ •‘A Misunderstanding’ •‘Useless Things’ • ‘I Arrived a Week Early’ • ‘Poisoned Chalice’ •‘Mens Sana in Corpore Sano’ ...

Read More
  • Cover Image

Jarek

By: Rigby Taylor

‘Jarek’ takes a tongue in cheek swipe at the extreme elements of 'women’s liberation', while offering a serious alternative to the way we currently teach our children. ...

Chapter 1. Zeno Skinny-dipping with Raylene’s friends was not Zeno’s idea of a fun night out. He’d only agreed because he wanted to seem tough, and hoped if he felt her up in the water and fucked her afterwards her mates would stop spreading rumours he was queer. The cars screeched to a halt at the boat ramp. Everyone piled out and headed for the small beach until Bob’s girlfriend reckoned there’d be eels and leeches in the river, so she refused to go down. Then the others also chickened out, saying it was too dark, probably dangerous and a stupid idea. ‘Fuck you lot are wimps’, Raylene yelled, grabbing Zeno’s hand and dragging him down to the strip of sand. A half-moon provided enough light to see, and it was hot and humid so Zeno kicked off his sandals, dropped his shorts, jocks and shirt on a rock and ran into the water, calling to Raylene to follow. The river was wide and deep at that point with little current, so he swam upstream a few metres then drifted back expecting to meet her in the water, but the beach was empty. She’d wimped out like the others; all talk and no action. Not too many brains either. He waded out ...

Chapter 1 Zeno Chapter 2 Stephen Chapter 3 Jarek Chapter 4 Bindi, Irma, Belle & Ari Chapter 5 Adele is Taught a Lesson Chapter 6 Marriage Chapter 7 Bindi & Adele Chapter 8 Preparations Chapter 9 Cador Chapter 10 What to Wear? Chapter 11 Eros Chapter 13 Acceptance Chapter 14 Secrets Chapter 15 National Park Chapter 16 Waterfall Chapter 17 Secret Places - Secret Thoughts Chapter 18 Philosophy and Farewells Chapter 19 Feral Chapter 20 Crime and Punishment Chapter 21 Another successful Week Chapter 22 A Proposal Chapter 23 Partners Chapter 24 Chloe Chapter 25 Refuge Chapter 26 Sebastian Chapter 27 Developments Chapter 28 Plans Chapter 29 Abduction Chapter 30 Resolution...

Read More
  • Cover Image

Sebastian

By: Rigby Taylor

Sebastian is an intelligent look at alternative ways to live and love, presented as a thriller about the most horrific of the twenty-first century’s most lucrative human enterprises. If you're open to difference and enjoy a fast-paced thriller, then read and enjoy. ...

During dinner Sebastian’s solitary life was laid bare. Speaking distractedly as if he were talking about someone else, he told about his irritable mother of whom he was so ashamed, never inviting anyone home, his rebellious nudity and sexually promiscuous behaviour that had been encouraged by his mother, who made a healthy profit from exploiting it. When questioned, he swore he had no idea where the money came from to buy the house or to sustain their life style, especially as Desolé was only the part time manager of a small employment agency. Rex and Fee remained sympathetically silent, letting Sebastian choose his own pace to speak about Jack and the ‘guests’, the private hospital where they recovered and Sebastian’s health was tested monthly, and to wonder why, despite becoming friends, none of the young men had contacted him after leaving. Finally they learned about Guapo’s escape, Desolé’s pretence that he was with Mr. Farzdbuk, and the discovery of the porno magazines and internet videos fed by hidden cameras. ‘If I hadn’t met Reginald at high school, and Mr. Noall hadn’t been so understanding, I’d be dead by now. I was a w...

Chapter One Chapter Two Chapter Three Chapter Four Chapter Five Chapter Six Chapter Seven Chapter Eight Chapter Nine Chapter Ten Chapter Eleven Chapter Twelve Chapter Thirteen Chapter Fourteen Chapter Fifteen...

Read More
       
56
|
57
|
58
|
59
|
60
Records: 1141 - 1160 of 9,486 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.