feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    UID:
    almahu_9949301313602882
    Format: 1 online resource (527 pages)
    ISBN: 9783319511030
    Series Statement: Signals and Communication Technology Ser.
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Acronyms -- Part I Theoretical Performance of Error-Correcting Codes -- 1 Bounds on Error-Correction Coding Performance -- 1.1 Gallager's Coding Theorem -- 1.1.1 Linear Codes with a Binomial Weight Distribution -- 1.1.2 Covering Radius of Codes -- 1.1.3 Usefulness of Bounds -- 1.2 Bounds on the Construction of Error-Correcting Codes -- 1.2.1 Upper Bounds -- 1.2.2 Lower Bounds -- 1.2.3 Lower Bounds from Code Tables -- 1.3 Summary -- References -- 2 Soft and Hard Decision Decoding Performance -- 2.1 Introduction -- 2.2 Hard Decision Performance -- 2.2.1 Complete and Bounded Distance Decoding -- 2.2.2 The Performance of Codes on the Binary Symmetric Channel -- 2.3 Soft Decision Performance -- 2.3.1 Performance Assuming a Binomial Weight Distribution -- 2.3.2 Performance of Self-dual Codes -- 2.4 Summary -- References -- 3 Soft Decision and Quantised Soft Decision Decoding -- 3.1 Introduction -- 3.2 Soft Decision Bounds -- 3.3 Examples -- 3.4 A Hard Decision Dorsch Decoder and BCH Codes -- 3.5 Summary -- References -- Part II Code Construction -- 4 Cyclotomic Cosets, the Mattson--Solomon Polynomial, Idempotents and Cyclic Codes -- 4.1 Introduction -- 4.2 Cyclotomic Cosets -- 4.3 The Mattson--Solomon Polynomial -- 4.4 Binary Cyclic Codes Derived from Idempotents -- 4.4.1 Non-Primitive Cyclic Codes Derived from Idempotents -- 4.5 Binary Cyclic Codes of Odd Lengths from 129 to 189 -- 4.6 Summary -- References -- 5 Good Binary Linear Codes -- 5.1 Introduction -- 5.2 Algorithms to Compute the Minimum Hamming Distance of Binary Linear Codes -- 5.2.1 The First Approach to Minimum Distance Evaluation -- 5.2.2 Brouwer's Algorithm for Linear Codes -- 5.2.3 Zimmermann's Algorithm for Linear Codes and Some Improvements -- 5.2.4 Chen's Algorithm for Cyclic Codes -- 5.2.5 Codeword Enumeration Algorithm. , 5.3 Binary Cyclic Codes of Lengths 129 len le 189 -- 5.4 Some New Binary Cyclic Codes Having Large Minimum Distance -- 5.5 Constructing New Codes from Existing Ones -- 5.5.1 New Binary Codes from Cyclic Codes of Length 151 -- 5.5.2 New Binary Codes from Cyclic Codes of Length ge 199 -- 5.6 Concluding Observations on Producing New Binary Codes -- 5.7 Summary -- References -- 6 Lagrange Codes -- 6.1 Introduction -- 6.2 Lagrange Interpolation -- 6.3 Lagrange Error-Correcting Codes -- 6.4 Error-Correcting Codes Derived from the Lagrange Coefficients -- 6.5 Goppa Codes -- 6.6 BCH Codes as Goppa Codes -- 6.7 Extended BCH Codes as Goppa Codes -- 6.8 Binary Codes from MDS Codes -- 6.9 Summary -- References -- 7 Reed--Solomon Codes and Binary Transmission -- 7.1 Introduction -- 7.2 Reed--Solomon Codes Used with Binary Transmission-Hard Decisions -- 7.3 Reed--Solomon Codes and Binary Transmission Using Soft Decisions -- 7.4 Summary -- References -- 8 Algebraic Geometry Codes -- 8.1 Introduction -- 8.2 Motivation for Studying AG Codes -- 8.2.1 Bounds Relevant to Algebraic Geometry Codes -- 8.3 Curves and Planes -- 8.3.1 Important Theorems and Concepts -- 8.3.2 Construction of AG Codes -- 8.4 Generalised AG Codes -- 8.4.1 Concept of Places of Higher Degree -- 8.4.2 Generalised Construction -- 8.5 Summary -- References -- 9 Algebraic Quasi Cyclic Codes -- 9.1 Introduction -- 9.2 Background and Notation -- 9.2.1 Description of Double-Circulant Codes -- 9.3 Good Double-Circulant Codes -- 9.3.1 Circulants Based Upon Prime Numbers Congruent to pm3 Modulo 8 -- 9.3.2 Circulants Based Upon Prime Numbers Congruent to +1 mod 8, or -1 mod 8: Cyclic Codes -- 9.4 Code Construction -- 9.4.1 Double-Circulant Codes from Extended Quadratic Residue Codes -- 9.4.2 Pure Double-Circulant Codes for Primes +3 mod 8, or -3 mod 8 -- 9.4.3 Quadratic Double-Circulant Codes. , 9.5 Evaluation of the Number of Codewords of Given Weight -- 9.6 Weight Distributions -- 9.6.1 The Number of Codewords of a Given Weight in Quadratic Double-Circulant Codes -- 9.6.2 The Number of Codewords of a Given Weight in Extended Quadratic Residue Codes -- 9.7 Minimum Distance Evaluation: A Probabilistic Approach -- 9.8 Conclusions -- 9.9 Summary -- References -- 10 Historical Convolutional Codes as Tail-Biting Block Codes -- 10.1 Introduction -- 10.2 Convolutional Codes and Circulant Block Codes -- 10.3 Summary -- References -- 11 Analogue BCH Codes and Direct Reduced Echelon Parity Check Matrix Construction -- 11.1 Introduction -- 11.2 Analogue BCH Codes and DFT Codes -- 11.3 Error-Correction of Bandlimited Data -- 11.4 Analogue BCH Codes Based on Arbitrary Field Elements -- 11.5 Examples -- 11.5.1 Example of Simple (5,3,3) Analogue Code -- 11.5.2 Example of Erasures Correction Using (15,10,4) Binary BCH code -- 11.5.3 Example of (128, 112, 17) Analogue BCH Code and Error-Correction of Audio Data (Music) Subjected to Impulsive Noise -- 11.6 Conclusions and Future Research -- 11.7 Summary -- References -- 12 LDPC Codes -- 12.1 Background and Notation -- 12.1.1 Random Constructions -- 12.1.2 Algebraic Constructions -- 12.1.3 Non-binary Constructions -- 12.2 Algebraic LDPC Codes -- 12.2.1 Mattson--Solomon Domain Construction of Binary Cyclic LDPC Codes -- 12.2.2 Non-Binary Extension of the Cyclotomic Coset-Based LDPC Codes -- 12.3 Irregular LDPC Codes from Progressive Edge-Growth Construction -- 12.4 Quasi-cyclic LDPC Codes and Protographs -- 12.4.1 Quasi-cyclic LDPC Codes -- 12.4.2 Construction of Quasi-cyclic Codes Using a Protograph -- 12.5 Summary -- References -- Part III Analysis and Decoders -- 13 An Exhaustive Tree Search for Stopping Sets of LDPC Codes -- 13.1 Introduction and Preliminaries. , 13.2 An Efficient Tree Search Algorithm -- 13.2.1 An Efficient Lower Bound -- 13.2.2 Best Next Coordinate Position Selection -- 13.3 Results -- 13.3.1 WiMax LDPC Codes -- 13.4 Conclusions -- 13.5 Summary -- References -- 14 Erasures and Error-Correcting Codes -- 14.1 Introduction -- 14.2 Derivation of the PDF of Correctable Erasures -- 14.2.1 Background and Definitions -- 14.2.2 The Correspondence Between Uncorrectable Erasure Patterns and Low-Weight Codewords -- 14.3 Probability of Decoder Error -- 14.4 Codes Whose Weight Enumerator Coefficients Are Approximately Binomial -- 14.5 MDS Shortfall for Examples of Algebraic, LDPC and Turbo Codes -- 14.5.1 Turbo Codes with Dithered Relative Prime (DRP) Interleavers -- 14.5.2 Effects of Weight Spectral Components -- 14.6 Determination of the dmin of Any Linear Code -- 14.7 Summary -- References -- 15 The Modified Dorsch Decoder -- 15.1 Introduction -- 15.2 The Incremental Correlation Dorsch Decoder -- 15.3 Number of Codewords that Need to Be Evaluated to Achieve -- 15.4 Results for Some Powerful Binary Codes -- 15.4.1 The (136, 68, 24) Double-Circulant Code -- 15.4.2 The (255, 175, 17) Euclidean Geometry (EG) Code -- 15.4.3 The (513, 467, 12) Extended Binary Goppa Code -- 15.4.4 The (1023, 983, 9) BCH Code -- 15.5 Extension to Non-binary Codes -- 15.5.1 Results for the (63, 36, 13) GF(4) BCH Code -- 15.6 Conclusions -- 15.7 Summary -- References -- 16 A Concatenated Error-Correction System Using the 69640972 u69640972 u+v69640972 Code Construction -- 16.1 Introduction -- 16.2 Description of the System -- 16.3 Concatenated Coding and Modulation Formats -- 16.4 Summary -- References -- Part IV Applications -- 17 Combined Error Detection and Error-Correction -- 17.1 Analysis of Undetected Error Probability -- 17.2 Incremental-Redundancy Coding System -- 17.2.1 Description of the System -- 17.3 Summary. , References -- 18 Password Correction and Confidential Information Access System -- 18.1 Introduction and Background -- 18.2 Details of the Password System -- 18.3 Summary -- References -- 19 Variations on the McEliece Public Key Cryptoystem -- 19.1 Introduction and Background -- 19.1.1 Outline of Different Variations of the Encryption System -- 19.2 Details of the Encryption System -- 19.3 Reducing the Public Key Size -- 19.4 Reducing the Cryptogram Length Without Loss of Security -- 19.5 Security of the Cryptosystem -- 19.5.1 Probability of a k timesk Random Matrix Being Full Rank -- 19.5.2 Practical Attack Algorithms -- 19.6 Applications -- 19.7 Summary -- References -- 20 Error-Correcting Codes and Dirty Paper Coding -- 20.1 Introduction and Background -- 20.2 Description of the System -- 20.3 Summary -- References -- Index.
    Additional Edition: Print version: Tomlinson, Martin Error-Correction Coding and Decoding Cham : Springer International Publishing AG,c2017 ISBN 9783319511023
    Language: English
    Keywords: Electronic books. ; Electronic book. ; Electronic books. ; Electronic books.
    URL: OAPEN
    URL: OAPEN
    URL: OAPEN  (Creative Commons License)
    URL: Image  (Thumbnail cover image)
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947389240402882
    Format: XX, 522 p. 134 illus., 82 illus. in color. , online resource.
    ISBN: 9783319511030
    Series Statement: Signals and Communication Technology,
    Content: This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of these codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field This book is open access under a CC BY 4.0 license.
    Note: Part I: Theoretical Performance of Error-Correcting Codes -- Bounds on Error Correction Coding Performance -- Soft and Hard Decision Decoding Performance -- Soft Decision and Quantised Soft Decision Decoding -- Part II: Code Construction -- Cyclotomic Cosets, The Mattson–Solomon Polynomial, Idempotents and Cyclic Codes -- Good Binary Linear Codes -- Lagrange Codes -- Extended BCH -- Reed–Solomon Codes -- Algebraic Geometry Codes -- Algebraic Quasi Cyclic Codes -- Convolutional Codes: A Historical Perspective -- Aalogue BCH Codes -- LDPC Codes -- Part III: Analysis of Codes -- True Search for Stopping Sets for LDPC Codes -- Part IV: Decoders -- Erasures and Error-Correcting Codes -- The Modified Dorsch Decoder -- A Concatenated Error-Correction System Using the |u|u+v| Code Construction -- Part V: Applications -- Combined Error Detection and Error Correction -- Password Correction and Confidential Information Access System -- Variations on the McEliece Public Key Encryption System -- Error-Correcting Codes and Dirty-Paper Coding.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319511023
    Language: English
    Subjects: Mathematics
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_9958198325302883
    Format: 1 online resource (XX, 522 p. 134 illus., 82 illus. in color.)
    Edition: 1st ed. 2017.
    ISBN: 3-319-51103-3
    Series Statement: Signals and Communication Technology,
    Content: This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of th ese codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field This book is open access under a CC BY 4.0 license.
    Note: Part I: Theoretical Performance of Error-Correcting Codes -- Bounds on Error Correction Coding Performance -- Soft and Hard Decision Decoding Performance -- Soft Decision and Quantised Soft Decision Decoding -- Part II: Code Construction -- Cyclotomic Cosets, The Mattson–Solomon Polynomial, Idempotents and Cyclic Codes -- Good Binary Linear Codes -- Lagrange Codes -- Extended BCH -- Reed–Solomon Codes -- Algebraic Geometry Codes -- Algebraic Quasi Cyclic Codes -- Convolutional Codes: A Historical Perspective -- Aalogue BCH Codes -- LDPC Codes -- Part III: Analysis of Codes -- True Search for Stopping Sets for LDPC Codes -- Part IV: Decoders -- Erasures and Error-Correcting Codes -- The Modified Dorsch Decoder -- A Concatenated Error-Correction System Using the |u|u+v| Code Construction -- Part V: Applications -- Combined Error Detection and Error Correction -- Password Correction and Confidential Information Access System -- Variations on the McEliece Public Key Encryption System -- Error-Correcting Codes and Dirty-Paper Coding.
    Additional Edition: ISBN 3-319-51102-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_BV009900825
    Format: XIII, 199 S. : graph. Darst.
    Edition: 1. Aufl.
    ISBN: 3-89574-028-4
    Series Statement: Schriften zur internationalen Agrarentwicklung 12
    Note: Zugl.: Hohenheim, Univ., Diss., 1994
    Language: English
    Subjects: Geography
    RVK:
    Keywords: Agrarproduktion ; Effizienz ; Marktzugang ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949762864002882
    Format: 1 online resource (477 pages)
    Edition: 1st ed.
    ISBN: 0-323-85925-9
    Note: Front Cover -- Hydroclimatic Extremes in the Middle East and North Africa -- Copyright Page -- Epigraph -- Contents -- List of figures -- List of tables -- List of contributors -- About the editors -- Preface -- Acknowledgments -- 1 Hydroclimatic extremes in arid and semi-arid regions: status, challenges, and future outlook -- 1.1 Introduction -- 1.2 Definition and classification -- 1.3 Historical and future trends and observations -- 1.4 Challenges in monitoring and prediction of hydroclimatic extremes -- 1.5 Mitigation and adaptation strategies -- 1.6 Future research directions -- 1.7 Conclusions -- References -- 2 How warming in East Mediterranean may contribute to Sahara cyclogenesis -- 2.1 Introduction -- 2.2 Experiment design -- 2.3 Synoptic discussion -- 2.4 Results and discussions -- 2.4.1 The control experiment (SST0) -- 2.4.2 Role of sea surface temperature on storm evolution -- 2.4.2.1 Pressure, 10m wind speed: sensitivity to sea surface temperature -- 2.4.2.2 Surface latent heat flux -- 2.4.2.3 Surface heat flux -- 2.4.2.4 Surface moisture flux (Moisture convergence) -- 2.4.2.5 Dust concentration -- 2.5 Conclusions -- References -- 3 Links between climate and hydrological budget in arid environments: the case of Sinai Peninsula -- 3.1 Introduction -- 3.2 Study area -- 3.3 Materials and methods -- 3.4 Results and discussion -- 3.4.1 The annual rate of evapotranspiration in the Sinai Peninsula -- 3.4.2 The average of seasonal and monthly evapotranspiration -- 3.5 Water deficit and surplus in the Sinai Peninsula -- 3.5.1 Annual water deficit and surplus -- 3.5.2 The seasonal and monthly water deficit and surplus -- 3.6 Conclusions -- References -- 4 Impacts of climate change on drought in Libya -- 4.1 Overview -- 4.2 Materials and methods -- 4.2.1 Study area -- 4.2.2 Time series of standardized precipitation-evapotranspiration index. , 4.2.3 Climate projections -- 4.3 Statistical tests -- 4.3.1 Trend analysis -- 4.4 Results and discussions -- 4.4.1 Assessment of climatic projections state -- 4.4.1.1 Precipitation -- 4.4.1.2 Temperature -- 4.4.2 Droughts under recent past and future climate conditions -- 4.4.3 Climate change's potential effects on droughts -- 4.4.3.1 Climatic Zone-01-E -- 4.4.3.2 Climatic Zone-02-W -- 4.4.3.3 Climatic Zone-02-W -- 4.4.3.4 Climatic Zone-03-E -- 4.4.3.5 Climatic Zone-03-M -- 4.4.3.6 Climatic Zone-03-W -- 4.4.4 Future standardized precipitation-evapotranspiration index evolution and trends -- 4.4.4.1 Standardized precipitation-evapotranspiration index temporal trends -- 4.4.4.2 Standardized precipitation-evapotranspiration index trends spatial pattern -- 4.5 Conclusions -- List of abbreviations -- Appendix A -- The community climate system model -- Representative concentration pathways -- Ensemble members and average -- References -- 5 Rainfall erosivity changes across the coastal region of Syria (1975-2010) -- 5.1 Introduction -- 5.2 Methods -- 5.2.1 Study area -- 5.2.2 Data acquisition and analysis -- 5.2.3 Trend analysis -- 5.2.4 Mapping rainfall erosivity (R) and extreme erosivity events -- 5.3 Results -- 5.3.1 Statistical characteristics and variability of R factor across the coastal region of Syria -- 5.3.2 Spatiotemporal change of R-factor and extreme events -- 5.4 Discussion -- 5.5 Conclusions -- Appendix 1 Scatter plot between R-factor and rainfall in each location. -- Appendix 2 Correlation and regression model (n=36) between rainfall (mm) and R-factor (MJ mm ha−1 h−1 per year) during the ... -- Acknowledgment -- References -- 6 Impacts of climate change on drought in northern Algeria -- 6.1 Introduction -- 6.2 Material and methods -- 6.2.1 Study region -- 6.2.2 Climate change and rainfall trend -- 6.2.3 Drought. , 6.3 Multi-scale rainfall variability in northern Algeria -- 6.3.1 Rainfall trend -- 6.3.1.1 Annual rainfall trend -- 6.3.1.2 Seasonal and monthly rainfall variability -- 6.3.1.3 Daily rainfall variability -- 6.3.2 Projected rainfall evolution during the period 2070-99 -- 6.4 Dry sequences and relationship with atmospheric oscillation indices in the Cheliff Basin -- 6.4.1 Dry sequence analysis -- 6.4.2 Total dry days on a monthly scale -- 6.4.3 Total number of dry days at the annual scale -- 6.5 Hydrological drought forecasts in the North West of Algeria -- 6.6 Hydrological drought assessment based on their trigger factors -- 6.7 Conclusions -- References -- 7 Modeling and managing flash flood hazards in the state of Kuwait: a hydrogeomorphological study -- 7.1 Introduction -- 7.2 Study area -- 7.3 Methodology -- 7.3.1 Data description -- 7.3.2 Mapping flash floods (inundated areas) -- 7.3.3 Hydrological analysis -- 7.4 Results and discussion -- 7.4.1 Meteorological conditions during November 2018 event -- 7.4.2 Hydrological effects on desert areas and modeling the impact -- 7.4.3 The impact on urban area and infrastructure -- 7.4.4 Flood water management in Kuwait -- 7.5 Conclusions -- Acknowledgments -- Funding -- Competing interests -- References -- 8 Rainfall characteristics in Egypt from 1960 to 2017: patterns, variability, driving mechanisms, and impacts -- 8.1 Introduction -- 8.2 Rainfall characteristics in Egypt -- 8.3 Trend analysis of rainfall -- 8.4 Probability analysis for rainfall -- 8.5 Precipitation concentration index of rainfall -- 8.6 Correlation of rainfall trends with teleconnection indices -- 8.7 Impacts of rainfall variability on agriculture in Egypt: the case of Matrouh Governorate -- 8.8 Conclusions -- References -- Further reading -- 9 Urban climate of the middle east and north Africa region: a comprehensive anatomization. , Abbreviations -- 9.1 An introductory glance -- 9.2 Historical overview -- 9.3 Approaches and methodologies -- 9.3.1 Indoor and outdoor -- 9.3.2 Single-city and comparative studies -- 9.3.3 Environmental approaches -- 9.3.4 Local climate zones approach -- 9.3.5 Urban layers and observation systems -- 9.3.6 Analytical methodologies -- 9.4 Findings and discoveries -- 9.4.1 Urban Heat Island quantification -- 9.4.2 UHI spatiotemporal variation -- 9.4.3 Urban Heat Island development (generation and determination) -- 9.4.3.1 Land use/land cover types -- 9.4.3.2 Urban green area -- 9.4.3.3 Anthropogenic heat flux -- 9.4.3.4 Coastal location -- 9.4.3.5 Climatic conditions -- 9.4.3.6 Urban planning and design -- 9.4.4 Urban Heat Island dynamics -- 9.4.5 Urban climate change -- 9.4.6 Urban Heat Island prediction and projections -- 9.4.7 Urban heat island impact -- 9.4.7.1 Rainfall -- 9.4.7.2 Heat exposure and stress -- 9.4.7.3 Public outdoor human comfort -- 9.4.7.4 Occupational health and workability assessment -- 9.4.7.5 Human comfort of sporty fan visitors -- 9.4.7.6 Energy consumption -- 9.4.8 Urban heat island mitigation and adaptation -- 9.4.8.1 Developing efficient vegetation systems -- 9.4.8.2 Planning and designing the modern urban fabric -- 9.4.8.3 Old traditional urban architecture -- 9.4.8.4 Cool surfaces and urban materials -- 9.5 Challenges and prospects -- 9.5.1 Data availability -- 9.5.2 Approaches and methodologies -- 9.5.3 UHI quantification, spatiotemporal variation, and development -- 9.5.4 The effectiveness and negative impacts of mitigation strategies -- 9.5.5 Adopting complex mitigation strategies -- 9.5.6 Differentiating the urban heat island mitigations in Middle East and North Africa and other regions -- 9.5.7 Maximizing the urban shading value -- 9.5.8 Developing an optimum urban design model. , 9.5.9 Prioritize the mitigation implementation -- References -- Further reading -- 10 Analysis of surface urban heat island using nighttime MODIS LST data as a signal for regional climate change: a case stu... -- 10.1 Introduction -- 10.2 Data and methods -- 10.2.1 Study area -- 10.2.2 Land cover classification -- 10.2.3 Moderate resolution imaging spectroradiometer data -- 10.2.3.1 Moderate resolution imaging spectroradiometer data pre-processing -- 10.2.4 Surface urban heat island intensity calculation -- 10.3 Result and discussion -- 10.3.1 Temporal changes in surface urban heat island intensity -- 10.3.2 Temporal trends of surface urban heat island intensity from 2003 to 2019 -- 10.3.3 Spatial distribution of surface urban heat island intensity -- 10.3.4 Hot spotted sites -- 10.3.5 Mitigation of surface urban heat island -- 10.4 Conclusions -- 10.5 Limitations and future studies -- Acknowledgments -- Conflicts of interest -- References -- 11 Recent study of urbanization growth effects on the local climatic changes over Greater Cairo Region (Egypt) using satell... -- 11.1 Introduction -- 11.2 Study area -- 11.3 Meteorological data and methodology -- 11.4 Results -- 11.4.1 Computation of urbanization growth over Greater Cairo Region -- 11.4.2 The climatic change features over Greater Cairo Region -- 11.4.3 The relationship between the urbanization and climatic changes over Greater Cairo Region -- 11.5 Conclusions -- Acknowledgments -- References -- 12 Urban climate change in view of climate justice: case study Dokki Area, Giza, Egypt -- 12.1 Introduction -- 12.2 Case study -- 12.3 Methods -- 12.4 Results -- 12.5 Discussion -- 12.5.1 Urban climate -- 12.5.2 Achieving climate justice -- 12.6 Conclusions -- References -- 13 Climate change and its impacts on selected archeological sites in Egypt -- 13.1 Introduction -- 13.2 Study area. , 13.3 General geology.
    Additional Edition: ISBN 0-12-824130-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_269380078
    Format: 319 S. , Ill, Kt.
    Uniform Title: Lost oases 〈dt.〉
    Language: German
    Subjects: Geography
    RVK:
    Keywords: Libyen ; Ägypten ; Sudan ; Reisebericht
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_BV002027801
    Format: VII, 118 S. : graph. Darst.
    Note: Stuttgart, Univ., Diss.
    Language: German
    Keywords: Schlichte ; Gewinnung ; Ultrafiltration ; Schlichte ; Textilveredelung ; Hochschulschrift ; Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    New York ; Bern ; Berlin ; Brussels ; Vienna ; Oxford ; Warsaw :Peter Lang,
    UID:
    almahu_BV045480203
    Format: XVIII, 287 Seiten : , Karten.
    ISBN: 978-1-4331-5434-8
    Content: This book sheds light on how the Shiite-dominated government's sectarian policy deepened the divide between Iraq's major communities (Shiites, Sunni Arabs and the Kurds) and led the country on the path of unending sectarian violence. It explains how government's failure to address the Sunni Arab grievances led to the emergence of the radical Islamic State, and convinced the Kurds that they could not coexist with Iraqi Arabs, who had been at each other's throats since 2003. It notes that the emergence of a Shiite-dominated government in Baghdad was a historical event that led Iran to achieve its longstanding dream of extending its influence from Tehran to Baghdad, to Damascus and Beirut. It places a special focus on how the Shiite politicians' slick diplomacy and media campaign diverted attention from its sectarian policy in 2014 by labeling the Sunni Arabs as terrorists and Kurdish leaders as corrupt separatists and troublemakers. This volume also uncovers how the Iraqi government was able to amass Western military and political support to defeat ISIS and to derail the Kurdish statehood movement
    Note: Includes bibliographical references
    Additional Edition: Erscheint auch als Online-Ausgabe, ePDF ISBN 978-1-4331-5794-3
    Additional Edition: Erscheint auch als Online-Ausgabe, ePub ISBN 978-1-4331-5795-0
    Additional Edition: Erscheint auch als Online-Ausgabe, MOBI ISBN 978-1-4331-5796-7
    Language: English
    Subjects: Political Science
    RVK:
    RVK:
    RVK:
    Keywords: Sunniten ; Kurden ; Schiiten ; Politik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV002950564
    Format: 29 S.
    Note: Math.-naturwiss.Diss.Göttingen 1969
    Language: German
    Keywords: Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    New York :Apress Media LLC,
    UID:
    edocfu_9961587416602883
    Format: 1 online resource (446 pages)
    Edition: First edition.
    ISBN: 9798868804076
    Content: This book delivers cloud-based applications that are both scalable and reliable, aligning with the evolving needs of the present user base. This innovative approach blends the agility of cloud computing with the efficiency of contemporary DevOps methodologies. The book starts by providing valuable insights into the ever-evolving software landscape of Cloud-native DevOps. It delves into strategies for crafting scalable and dependable applications and illustrates the art of leveraging open-source tools to enhance collaboration. It navigates through the integral role of microservices in contemporary software development and imparts the know-how to integrate them with DevOps practices. The book simplifies container technology, with a focus on Docker and Kubernetes. It further elucidates the process of streamlining software delivery through Continuous Integration and Continuous Deployment (CI/CD). As you progress, you will explore open-source tools, including Argo, Kubeflow Pipelines, and AWS Step Functions. The concluding section covers real-world case studies and best practices for implementing Cloud-native DevOps. The book reviews the core concepts covered throughout and provides an exciting glimpse into the future of Cloud-native DevOps. Upon completing this book, you will be well-versed in the principles and practices of Cloud-native DevOps, understand real-world applications, and recognize the critical importance of security in cloud computing.
    Note: Includes index. , Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Chapter 1: Unveiling the Cloud- Native Paradigm -- Pre-cloud Era -- Evolution of Cloud Native -- Shift from Mainframe Computing to a Cloud-Native Approach -- Advantages of Cloud-Native Computing over Mainframe -- Disadvantages of Cloud-Native Computing over Mainframe -- The Twelve-Factor App -- Introduction and Understanding of Cloud Native -- What Is CNCF? -- Core Pillars of Cloud Native -- Containerization -- Continuous Integration and Delivery -- Serverless Computing -- Advantages of Serverless Cloud Computing -- Popular Serverless Computing Platforms -- Disadvantages of Serverless Cloud Computing -- Cloud Concept -- Key Features of a Public Cloud -- Downside of Public Cloud -- Key Features of a Private Cloud -- Downside of Private Cloud -- Key Features of Hybrid Cloud -- Downside of Hybrid Cloud -- Differences Between IaaS, PaaS, and SaaS -- Infrastructure-as-a-Service (IaaS) -- Advantages of IaaS -- Disadvantages of IaaS -- Platform-as-a-Service (PaaS) -- Advantages of PaaS -- Disadvantages of PaaS -- Software-as-a-Service (SaaS) -- Advantages of SaaS -- Disadvantages of SaaS -- Cloud Native Maturity Model (CNMM) -- Layers of Cloud-Native Landscape -- Provisioning Layer -- Runtime Layer -- Orchestration and Management Layer -- Application Definition and Development Layer -- Summary -- Chapter 2: Cloud-Native DevOps Architectural Overview -- Introduction to DevOps in Cloud-Native Environment -- What Is DevOps? -- Principles of DevOps -- 7C's of DevOps Life Cycle -- Continuous Development -- Continuous Integration -- Continuous Testing -- Continuous Deployment -- Benefits of Infrastructure Automation -- Continuous Feedback -- Continuous Monitoring -- Continuous Operations -- Kubernetes Scalability -- What Is Kubernetes?. , Fundamental Architecture of Kubernetes Cluster -- Master Node -- Worker Node -- Hardened Installation of Kubernetes -- Perform the Following Steps on Master Node -- Perform the Following Steps on the Worker Node -- Kube-bench for Security of Kubernetes Cluster -- Steps to Set Kube-bench on Your Nodes -- Scaling of Kubernetes -- Recommended Practices for Kubernetes Scaling -- Manual Scaling -- What Is Autoscaling? -- Kubernetes Autoscaling -- Horizontal Pod Autoscaling (HPA) -- Description of Each Attribute Described in the Preceding YAML File -- Vertical Pod Autoscaling (VPA) -- Comparison of Monolithic and Public Managed Kubernetes Cluster -- Summary -- Chapter 3: Security in Cloud-Native Applications with a Shift-Left Approach -- Introduction to Shift-Left Security in Cloud Native -- Shift-Left Secure Right -- Risk from Third-Party Components -- Embracing Technologies to Shift Left -- 1. Static Application System Testing (SAST) -- 2. Dynamic Application Security Testing (DAST) -- 3. Interactive Application Security Testing (IAST) -- 4. Software Composition Analysis (SCA) -- 5. Runtime Application Self-protection (RASP) -- 6. IaC Scanning -- 7. Infrastructure Scanning -- 8. Compliance Check -- Security Testing with Shift-Left Approach -- Benefits of Shift-Left Strategy -- Infrastructure as Code (IaC) and Security -- Role of IaC in Cloud Native -- Security Strategy Using IaC for Organizations -- Tools for IaC Security -- IaC with Terraform -- Terraform Working -- Terraform Architecture -- IaC Tools -- Value Proposition of IaC Tools -- Best Practices for IaC -- Securing API in Early Stages -- Common API Risk Factors -- What Is API Security Testing? -- Securing API Using Pynt -- Working of Pynt -- Pynt Setup -- Pynt Security Testing -- Summary -- Chapter 4: CI/CD Pipeline in Cloud-Native DevOps -- Overview of CI/CD -- C1/CD Principles. , Principles of Continuous Integration -- Principles of Continuous Delivery -- CI/CD Pipeline Stages -- Source Stage -- Build Stage -- Test Stage -- Deploy Stage -- CI/CD Best Practices in Cloud Native -- Benefits of CI/CD in Cloud-Native DevOps -- Integration of Version Control -- Version Control Overview -- CI/CD Build Tool Implementation -- Cloud-Agnostic in CI/CD Pipeline -- CI/CD Pipeline Using Jenkins -- Security in CI/CD -- Threats in CI/CD -- Automated Tools for Securing CI/CD Pipeline -- Static Application Security Testing (SAST) -- Dynamic Application Security Testing (DAST) -- Interactive Application Security Testing (IAST) -- Securing a CI/CD Pipeline: Recommended Approaches -- Summary -- Chapter 5: Open-Source Tools for Cloud-Native DevOps -- Overview of Open-Source Tools in Cloud Native -- Argo Streamlining Workflows -- Getting Started with Argo -- Concepts of Argo CD -- Application -- Target State -- Argo Controller -- Sync -- Live State -- Refresh -- Implementation of Argo Workflows Using Custom Kubernetes Resources -- Implementation of CI/CD Through Argo Workflows -- Integration of Argo CD and Kubernetes -- Kubeflow Pipelines -- Kubeflow Overview -- Problem Identification -- Source, Prepare, and Analyze Data -- Kubeflow Principles -- Kubeflow Pipelines -- Kubeflow in Cloud Native Applications -- Future Trends in Cloud-Native DevOps Tools -- DataOps -- AIOps (Artificial Intelligence for IT Operations) -- Hyperautomation -- Adoption of Cloud-Native Technologies -- Infrastructure as Code (IaC) Management -- Artificial Intelligence (AI) Evolution -- Security and Compliance -- Collaboration Between DevOps Teams -- Fresh Dimension in Quantum Computing -- Adapting to Change -- Artificial Intelligence for IT Operations (AIOps) -- ChatOps -- GitOps -- No Operations (NoOps) -- Summary -- Chapter 6: Scalability and Autoscaling Strategies. , Scaling Principles in Cloud-Native Applications -- Utilizing Automation in Cloud-Native Architecture -- Several Key Areas Within Cloud-Native ­Architecture Are Ripe for Automation -- Infrastructure Provisioning and Management -- Monitoring and Remediation -- Continuous Integration/Continuous Delivery (CI/CD) -- Dynamic Scaling -- Multi-cloud Strategies -- Reactive and Preemptive Scaling -- Reactive Scaling -- Preemptive Scaling -- Cloud Native for Edge Computing -- Autoscaling Implementation in AWS -- Benefits of Autoscaling -- Steps to Create Autoscaling -- Future Trends in Scalability and Autoscaling -- Machine Learning-Driven Autoscaling -- Serverless Architectures and Event-Driven Scaling -- Edge Computing and Distributed Scaling -- Hybrid and Multi-cloud Scalability -- Cost-Efficient Autoscaling Strategies -- Summary -- Chapter 7: Collaborative Development in the Cloud Native -- Enabling Collaboration Between Developers and Operations -- DevOps Culture -- Agile and Scrum Methodology in Cloud Native -- Benefits of Agile Methodology -- Roles in Scrum -- Artifacts in Scrum -- Optimizing Cloud-Based Data Flow -- Data Pipeline Architecture Factors -- Prioritize Compliance in the Initial Stage -- Best Practices in Data Pipeline Architecture -- Consider Future Growth When Planning for Performance and Scalability -- ETL Processes and Supply Chain Management -- Transition from on-prem to ETL -- Securing Cloud-Integrated Logistics Operations -- Capabilities of Cloud Computing in Supply Chain Management -- Summary -- Chapter 8: IAM Security in Cloud- Native Environment -- IAM Fundamentals in Cloud-Native Environments -- Foundational Elements of Cloud-Native IAM Infrastructure -- Fundamental Pillars of IAM -- IAM Components -- Least Privileges Principles -- Implementation of Least Privileges -- IAM Best Practices for Service Accounts and API Access. , Key Components of User Management in Cloud-Native Applications -- Implementation of User Management in Cloud Native -- Secure Handling of API Keys -- Least Privilege for Service Accounts -- Difficulties Associated with Service Accounts -- Best Practices for Managing Service Accounts -- IAM Governance and Policy Management in Cloud Native -- Governance -- Risk Management -- Compliance -- IAM Standards -- Building Concrete IAM -- Summary -- Chapter 9: Threat Analysis for Cloud-Native Deployments -- Understanding Cloud-Native Security Challenges -- Type of Threats in Cloud Native -- Challenges in Cloud-Native Security -- 3R's of Cloud-Native Security -- Security Controls in Cloud Native -- Threat Vectors in Microservices Architectures -- Threat Modeling with STRIDE -- Security Testing and Validation -- Red Teaming in Cloud Native -- Implementation Steps -- Best Practices in Cloud-Native Security -- Conduct Due Diligence -- Audit and Improve Configurations -- Security Controls and Countermeasures -- Key Management in Cloud Native -- Summary -- Chapter 10: Future Trends in Cloud Native -- Serverless Computing and Function as a Service (FaaS) -- Benefits of Serverless Computing -- Function as a Service (FaaS) -- Benefits of FaaS -- Best Practices for FaaS -- Key Challenges in Serverless Computing -- AI and Machine Learning Integration Intersection in Cloud Native -- Challenges and Considerations Implementing AI in Cloud Native -- Challenges in Security and Compliance -- Complexity in Deployment and Model Training -- Obstacles in Data Integration -- Scalability Management -- Best Practices of Integrating AI/ML in Cloud Native -- Evolution of Containerization Technologies Beyond Docker and Kubernetes -- The Rise of No-Code/Low-Code Platforms in DevOps Workflows -- Benefits of No Code and Low Code -- Use of No Code and Low Code -- Summary -- Index.
    Additional Edition: Print version: Ahmed, Mohammed Ilyas Cloud-Native DevOps Berkeley, CA : Apress L. P.,c2024 ISBN 9798868804069
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages