Springer.Com

Total Page:16

File Type:pdf, Size:1020Kb

Springer.Com AB2009 ABCD springer.com Springer NEWS Apress AIP Press American Institute of Physics Birkhäuser Copernicus Current Medicine Friends of ED Want this by e-mail? Humana Press Subscribe now to the monthly Lars Müller Library Books E-Newsletter: Lavoisier-Intercept springer.com/librarybooks Physica Verlag Get all the content of this catalog in PDF, Excel, and HTML. Springer-Praxis 10 The Royal Society of Chemistry OCTOBER Springer Wien NewYork Steinkopff Verlag 2009 Vieweg ABCD springer.com Notice of Price Changes Springer announces that as of April 15, 2009 a new price list for print books will take effect. The list of price changes will be posted for download from springer.com/booksellers new price list ANNOUNCEMENT 014161x springer.com/librarybooks Contents I Author Index . II Title Index . VII Proceedings . 113 Apress . .36 Arts/Design . 112 Biomedicine . .16 Business/Economics . .93 Chemistry . .48 Computer Science . .44 Earth Sciences/Geography . .80 Education . 105 Engineering . .51 Environmental Sciences . .82 General Science . 104 Law . 101 Life Sciences . .85 Management/Business for Professionals . .99 Materials Science . .76 Mathematics . .24 Medicine . 1 Philosophy . 109 Physics/Astronomy . .68 Psychology . .23 Social Sciences . 107 Statistics . .35 New in the NEWS! Each eBook subject collection (12 collections for English-language/ International titles) is designated by its own icon. The icon appears next to each title, indicating its subject group. II Author Index Springer News 10/2009 springer.com/booksellers A 93 Bischi et al., Nonlinear Oligopolies 25 Chriss/Ginzburg, Representation Theory and 1 Blair (Eds), Imaging of Gynecological Disor- Complex Geometry (Modern Birkhäuser 1 Athanasiou (Eds), Key Topics in Surgical ders in Infants and Children (Med. Radiol.) Classics) Research and Methodology 54 Bockhorn (Ed), Macro- and Micromixing 36 Coles/Luetkehoelter, Expert SQL Server 2008 44 Abraham (Eds), Computational Social (Heat/Mass Transfer) Encryption Network Analysis (Communicat./Networks) 55 Bohlinger, Planning Traffic Management 36 Collins, Beginning WF 44 Albers (Eds), Efficient Algorithms (LNCS 5760) 86 Boller (Eds), Fodder Crops and Amenity 80 Comiso, Polar Oceans from Space (Atmosph. 51 Albertos/Mareels, Feedback and Control for Grasses (Handbook of Plant Breeding 5) Oceanogr. Libr. 41) Everyone 16 Borea (Ed), A3 Adenosine Receptors from Cell 26 Constanda (Eds), Integral Methods in Science 44 Aldini (Eds), Foundations of Security Analysis Biology to Pharmacology and Therapeutics and Engineering, Volume 1 and Design V - FOSAD 2008/2009 35 Boreux/Parent, Pratique du calcul bayésien 26 Constanda (Eds), Integral Methods in Science (LNCS 5705) (Statistique et probabilités) and Engineering, Volume 2 36 Allen et al., Oracle SQL Recipes 24 Borovik/Borovik, Mirrors and Reflections 17 Current Topics in Microbiology and 51 Alonso et al., Geomechanics of Failures. (Universitext) Immunology 340 Advanced Topics 55 Bosio et al., Advanced Test Methods for 37 Czernicki, Next-Generation Business Intel- 24 Alonso Rodriguez/Valli, Time-harmonic eddy SRAMs ligence Software with Silverlight 3 current problems (MS&A 4) 45 Bove (Eds), Language Engineering and 85 Ammann, Sorghum Biology Rigourous Software Development - ALFA D 51 Annaratone, Engineering Heat Transfer Summer School 2008 (LNCS 5520) Brian, Comment tremble la main invisible 52 Ao (Eds), Intelligent Automation and 26 Dafermos, Hyberbolic Conservation Laws in 1 Bronner (Eds), Bone and Development Computer Engineering (Lecture Notes in Continuum Physics (Grundl. math. Wiss. 325) (Topics in Bone Biology, Vol. 6) Electrical Engineering 52) 3rd ed. 2 Brugada (Ed), Clinical Approach to Sudden 52 Apikyan (Eds), Nuclear Power and Energy 3 Dancygier, Clinical Hepatology <Set> Cardiac Death Syndromes Security (NATO Science B) <hard> 37 Dannen, iPhone Design Award Winning 86 Bundesamt für Verbraucherschutz (Ed), 52 Apikyan (Eds), Nuclear Power and Energy Projects Berichte der Nationalen Referenzlaboratorien Security (NATO Science B) <soft> 56 Daradoumis (Eds), Intelligent Collaborative e- 2008 (BVL-Reporte) 52 Asay (Ed), Non-Shock Initiation of Explosives Learning Systems and Applications (SCI 246) 107 Butcher (Ed), Mexican Solidarity 53 Azad, Visual Perception for Manipulation and 45 De Virgilio (Eds), Semantic Web Information Imitation in Humanoid Robots (COSMOS 4) Management C 3 Denaro, Pitfalls in Cervical Spine Surgery B 87 Dessaux (Eds), Rhizosphere: Achievements 25 Callegaro, Cohomology of Finite and Affine and Challenges 53 Bailey/Martin, ESL Models and their Type Artin Groups over Abelian Representa- 45 “Devedžic (Eds), Web 2.0 &amp; Semantic Application (Embedded Systems) tion (TSNS 13) Web (Annals of Information Systems 6) “ 53 Barbakh et al., Non-Standard Parameter 17 Campbell (Eds), Natural Killer Cell Protocols 27 Deza/Laurent, Geometry of Cuts Adaptation for Exploratory Data Analysis (Methods in Molecular Biology) 2nd ed. (Algorithms/Comb. 15) (SCI 249) 109 Canale (Eds), A Treatise of Legal Philosophy 48 Dragutan (Eds), Green Metathesis Chemistry 54 Barkalov/Titarenko, Logic Synthesis for FSM- and General Jurisprudence (NATO Science A) <hard> Based Control Units (LNEE 53) 77 Caneba, Free-Radical Retrograde-Precipita- 48 Dragutan (Eds), Green Metathesis Chemistry 101 Basedow (Eds), The Hamburg Lectures on tion Polymerization (FRRPP) (NATO Science A) <soft> Maritime Affairs 2007 & 2008 (Maritime 93 Caroleo (Eds), The Labour Market Impact of Droz (Eds), Tumeurs malignes rares Affairs 16) the EU Enlargement (AIEL Series in Labour 18 Duan (Ed), Muscle Gene Therapy 85 Bationo (Eds), Innovations as Key to the Economics) 27 Duistermaat/Kolk, Distributions Green Revolution in Africa 86 Carugo (Eds), Data Mining Techniques for the (Cornerstones) 16 Baumann (Ed), G-Quadruplex DNA (Methods Life Sciences (Methods in Molecular Biology) 68 Dvorak (Eds), Dynamics of the Small Bodies in Molecular Biology) 55 Chakraborty (Ed), Microfluidics and of the Solar System and of the Exoplanets 76 Bavykin/Walsh, Titanate and Titania Nano- Microfabrication (LN Physics 790) tubes (RSC Nanoscience and 2 Chen (Ed), Illustrative Handbook of General Nanotechnology) Surgery E 85 Becker (et al.), Mosquitoes and Their Control. 2 Chen et al., Infectious Disease Informatics (ISIS 21) 2nd ed. 105 Ehlers (Eds), Changing Cultures in Higher 93 Cheng (Eds), Innovative Quick Response 68 Belloni (Ed), The Jet Paradigm Education Programs in Logistics and Supply Chain (LN Physics 9022) 94 Eilenberger (Eds), Current Challenges for Management (Information Systems) 107 Belur, Permission to Shoot? Corporate Finance 56 Chiong (Eds), Natural Intelligence for Sched- 16 Berezin (Ed), Structure and Function of the 3 Elzouki et al., Textbook of Clinical Pediatrics uling, Planning and Packing Problems Neural Cell Adhesion Molecule NCAM <hard> <Set> (SCI 250) (Advs. Exp. Med. Bio. 663) 3 Elzouki et al., Textbook of Clinical Pediatrics. 25 Chlouveraki, Blocks and Families for Cyclo- 24 Betounes, Differential Equations: Theory and 2nd ed. <eRef> tomic Hecke Algebras (LN Math 1981) Applications <with CD-ROM> 2nd ed. 3 Elzouki et al., Textbook of Clinical Pediatrics. 17 Cho (Ed), An Omics Perspective of Cancer 54 Bianchini (Eds), Innovations in Neural Infor- 2nd ed. <print+eRef> <Set> mation Paradigms and Applications (SCI 247) springer.com/librarybooks Springer News 10/2009 Author Index III F 23 Gregerson (Ed), The Cinematic Mirror for I Psychology and Life Coaching 94 Falkenreck, Reputation Transfer to Enter New 69 Grieder, Extensive Air Showers 48 Ilich, Selected Problems in Physical B-to-B Markets (Management Sc.) 77 Groysman, Corrosion for Everybody Chemistry 82 Fatta-Kassinos (Eds), Xenobiotics in the 4 Gupta (Eds) Pediatric CNS Tumors Urban Water Cycle (Envir. Pollution 16) (Pediatric Oncology) 2nd ed. J 82 Filar/Haurie, Uncertainty and Environmental 109 Gurwitsch, The Collected Works of Aron Decision Making (ISORMS 138) Gurwitsch (1901-1973) 6 Jatoi (Eds), Management of Breast Diseases 4 Fine (Eds), Minimally Invasive Ophthalmic (Phaenomenologica 193) 58 Jespers, The gm/ID Design Methodology for Surgery <with DVD> 110 Gurwitsch, The Collected Works of Aron CMOS Analog Low Power Integrated Circuits 68 Fitzgibbon (Eds), Applied and Numerical Gurwitsch (1901-1973) (Analog Circuits and Signal Processing) Partial Differential Equations (Phaenomenologica 194) <with CD-ROM> (CM Appl. Sc. 15) 28 Gusak et al., Theory of Stochastic Processes 30 Jünger (Eds), 50 Years of Integer Program- 87 Fox (Ed), Drug-DNA Interaction Protocols (Problem Books Math.) ming 1958-2008 <with DVD-ROM> (Methods in Molecular Biology) 2nd ed. 4 Guthoff (Eds), Oculoplastics and Orbit 56 Franco (Eds), Constructive Neural Networks (Essent. Ophthalmology) (SCI 258) 19 Guzmán (Eds), Pharmaceutical Biotechnology K 18 Freye, Pharmacology and Abuse of Cocaine, (Advs Exp. Medicine. Biology 655) Amphetamines, Ecstasy and Related 95 Kaas et al., Modern Actuarial Risk Theory. Designer Drugs H 2nd ed. Corr. print. 57 Fulde, Variation Aware Analog and Mixed- 6 Kaga, Central Auditory Pathway Disorders Signal Circuit Design in Emerging Multi-Gate 94 Hanna, Enabling Enterprise Transformation 19 Kalueff (Eds), Transgenic and Mutant Tools to CMOS Technologies (Spr. Ser. Adv. (Innovation, Technology, and Knowledge Model Brain Disorders (Neuromethods 44) Microelectr. 28) Management) 70 Kamal, 1000 Solved Problems in Modern 29 Hartshorne, Deformation Theory (GTM 257) Physics G 5 Haustein/Groneberg, Tobacco or Health? 20 Kamkin (Eds), Mechanosensitivity of the 2nd ed. Heart (Mechanosensitivity
Recommended publications
  • A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes Yves Van Gennip, Prashant Athavale, Jer´ Omeˆ Gilles, and Rustum Choksi
    IEEE TRANSACTIONS ON IMAGE PROCESSING ******** 1 A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes Yves van Gennip, Prashant Athavale, Jer´ omeˆ Gilles, and Rustum Choksi Abstract—Using only regularization-based methods, analyzed by a programmed processor ([2], [4]). Key we provide an ansatz-free algorithm for blind deblur- to this detection are a set of required patterns, so- ring of QR bar codes in the presence of noise. The called finder patterns, which consist of three fixed algorithm exploits the fact that QR bar codes are prototypical images for which part of the image is a squares at the top and bottom left corners of the priori known (finder patterns). The method has four image, a smaller square near the bottom right corner steps: (i) denoising of the entire image via a suitably for alignment and two lines of pixels connecting the weighted TV flow; (ii) using a priori knowledge of one two top corners at their bottoms and the two left of the finder corners to apply a higher-order smooth corners at their right sides. Figure2 shows gives a regularization to estimate the unknown point spread function (PSF) associated with the blurring; (iii) schematic of a QR bar code, in particular showing applying an appropriately regularized deconvolution these required squares. using the PSF of step (ii); (iv) thresholding the output. We assess our methods via the open source bar code reader software ZBar [1]. Index Terms—QR bar code, blind deblurring, TV regularization, TV flow. I. INTRODUCTION Fig. 1: A QR bar code (used as “Code 1” in the tests Invented in Japan by the Toyota subsidiary Denso described in this paper).
    [Show full text]
  • Computation Offloading of Augmented Reality in Warehouse Order Picking
    Computation Offloading Of Augmented Reality In Warehouse Order Picking Creative Technology Bachelor of Science Thesis Harald Eversmann July, 2019 UNIVERSITY OF TWENTE Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Supervisor Dr. Job Zwiers Critical observer Dr. Randy Klaassen Client Gerben Hillebrand CaptureTech Corporation B.V. [Page intentionally left blank] 1 ABSTRACT A novel method is proposed to implement computation offloading in augmented reality (AR) technology, such that said technology can be of more use for industrial purposes, and in this case specifically, warehouse order picking. The proposed method utilises a wireless connection between the AR device in question and a server and lets them communicate with each other via video and MJPEG live streams. Experiments show promising results for the prototype, but not yet in terms of fully offloading the AR devices workload. It is expected that rising technologies like faster Wi-Fi connection can help in the successful conclusion of fully offloading AR devices. 2 3 ACKNOWLEDGEMENTS The author would like to express his deep gratitude towards CaptureTech Corporation B.V. and in particular Gerben Hillebrand for the opportunity, knowledge, and resources to make this research project possible. The author thanks Dr. J. Zwiers for his continuous supervision and assistance throughout the entire graduation project in question. Additionally, the author would also like to ex- press his thanks to Dr. R. Klaassen for his role as critical observer during the process
    [Show full text]
  • CATS News, Fall 2015
    Newsletter for data prep engineers Issue 6 | Fall 2015 Dear CATS User: Mask manufacturing at technology nodes CATS news below 20nm presents new challenges for mask lithography and verification. Release An Abbreviated CPEC User Guide: K-2015.09 of CATS breaks new ground Simple Steps to Improve the Dose Correction in addressing these challenges with Alex Zepka, CATS CAE comprehensive support for multi beam mask CATS CPEC allows for the correction of e-beam proximity effects due to e-beam scattering. This writers. In addition, this correction is done via modulations on the exposed dose and can be applied to any lithographic process release delivers higher that involves the exposure of a material stack by an electron beam, e.g., mask manufacturing as well as fracture performance direct-write to wafer. and new capabilities The setup for CPEC can be a bit overwhelming as some settings are interdependent. This article to meet the throughput attempts to provide some guidance about typical cases and what types of parameters are most likely to requirements as mask require finer adjustments in order to improve the correction. It is not intended to be a complete manual data sets get larger and (that is provided in the CATS documentation) and it does not cover all CPEC settings. Instead, it is more complex. CATS meant to help the user in deciding which settings to use in most cases, and which settings are more is the most widely used likely to require fine-tuning in order to improve the quality of the correction or turnaround time. mask data prep solution and this is dependent on Minimum Settings (“Pipe-cleaning” Mode) our customers success When using CPEC for the first time, the user may merely be trying to obtain a simple correction to in using the product visually verify that CPEC is indeed assigning doses.
    [Show full text]
  • Manuscript Preparation Instruction for Publishing in Computer Modeling In
    Computers, Materials & Continua CMC, vol.64, no.3, pp.1885-1895, 2020 An Efficient Bar Code Image Recognition Algorithm for Sorting System Desheng Zheng1, *, Ziyong Ran1, Zhifeng Liu1, Liang Li2 and Lulu Tian3 Abstract: In the sorting system of the production line, the object movement, fixed angle of view, light intensity and other reasons lead to obscure blurred images. It results in bar code recognition rate being low and real time being poor. Aiming at the above problems, a progressive bar code compressed recognition algorithm is proposed. First, assuming that the source image is not tilted, use the direct recognition method to quickly identify the compressed source image. Failure indicates that the compression ratio is improper or the image is skewed. Then, the source image is enhanced to identify the source image directly. Finally, the inclination of the compressed image is detected by the barcode region recognition method and the source image is corrected to locate the barcode information in the barcode region recognition image. The results of multitype image experiments show that the proposed method is improved by 5+ times computational efficiency compared with the former methods, and can recognize fuzzy images better. Keywords: Bar code recognition, Hough transformation, binarization, image processing. 1 Introduction Bar code is a graphic recognizer [Hu (2011)] that arranges several black bars and white spaces of different widths according to certain coding rules to express a group of information. With the rapid development of science and technology, bar code technology is becoming more and more mature, and it has applications in all areas of commodity circulation.
    [Show full text]
  • Clickshare CSE-200
    ClickShare CSE-200 User guide ENABLING BRIGHT OUTCOMES Barco NV Beneluxpark 21, 8500 Kortrijk, Belgium www.barco.com/en/support www.barco.com Copyright © All rights reserved. No part of this document may be copied, reproduced or translated. It shall not otherwise be recorded, transmitted or stored in a retrieval system without the prior written consent of Barco. Trademarks USB Type-CTM and USB-CTM are trademarks of USB Implementers Forum. Trademarks Brand and product names mentioned in this manual may be trademarks, registered trademarks or copyrights of their respective holders. All brand and product names mentioned in this manual serve as comments or examples and are not to be understood as advertising for the products or their manufacturers. Product Security Incident Response As a global technology leader, Barco is committed to deliver secure solutions and services to our customers, while protecting Barco’s intellectual property. When product security concerns are received, the product security incident response process will be triggered immediately. To address specific security concerns or to report security issues with Barco products, please inform us via contact details mentioned on https://www.barco.com/psirt. To protect our customers, Barco does not publically disclose or confirm security vulnerabilities until Barco has conducted an analysis of the product and issued fixes and/or mitigations. Patent protection Please refer to www.barco.com/about-barco/legal/patents Guarantee and Compensation Barco provides a guarantee relating to perfect manufacturing as part of the legally stipulated terms of guarantee. On receipt, the purchaser must immediately inspect all delivered goods for damage incurred during transport, as well as for material and manufacturing faults Barco must be informed immediately in writing of any complaints.
    [Show full text]
  • Brno University of Technology Vysoké Učení Technické V Brně
    BRNO UNIVERSITY OF TECHNOLOGY VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ FACULTY OF MECHANICAL ENGINEERING FAKULTA STROJNÍHO INŽENÝRSTVÍ INSTITUTE OF SOLID MECHANICS, MECHATRONICS AND BIOMECHANICS ÚSTAV MECHANIKY TĚLES, MECHATRONIKY A BIOMECHANIKY QR CODE DETECTION UNDER ROS IMPLEMENTED ON THE GPU DETEKCE QR KÓDŮ NA GRAFICKÉ KARTĚ PRO PLATFORMU ROS MASTER'S THESIS DIPLOMOVÁ PRÁCE AUTHOR Bc. Milan Hurban AUTOR PRÁCE SUPERVISOR doc. Ing. Jiří Krejsa, Ph.D. VEDOUCÍ PRÁCE BRNO 2017 Master'sThesis Assignment Institut: Instituteof SolidMechanics. Mechatronics and Biomechanics Student: Bc. MilanHurban Degreeprogramm: AppliedSciences in Engineering Branch: Mechatronics Supervisor: doc. Ing.Jiii Krejsa,Ph.D. Academicyear: 2016t17 As providedfor bythe Act No. 111198Coll. on highereducation institutions and the BUTStudy and ExaminationRegulations, the directorof the Institutehereby assigns the followingtopic of Master's Thesis: QR code detectionunder ROSimplemented on the GPU Brief description: The thesisgoal is to implementa methodof imageprocessing capable of QR codedetection in an imageacquired by an onboardcamera of a mobilerobot. To reducethe work load on the onboard computer,the methodis implementedon the graphicalcard (GPU). Additionally, the methodshould be integratedinto the RoboticOperating System (ROS) platform. Maste/s Thesisgoals: 1. Researchthe algorithmsof QR codedetection in an image 2. Researchthe methodsfor the implementationof computationaltasks on the GPU 3. Selectan appropriatealgorithm, implement it andintegrate under the ROSplatform 4.
    [Show full text]
  • Active Recommendation Method Based Mobile Network Using Book Management Application
    International Journal of Machine Learning and Computing, Vol. 9, No. 2, April 2019 Active Recommendation Method Based Mobile Network Using Book Management Application M. B. Chung or enemies are displayed on the camera overlay through the Abstract—This paper suggests a mobile-based book marker recognition function, have emerged [1], [2]. recommendation method utilizing a book management Navigation apps (App: Application) based on AR can lead a application. It will help smart phones to recognize Barcodes and user to a destination by displaying the targeted destination and QR codes and collect information on books through the open APIs. Such information is divided into that of books already the distance to it on the camera overlay, utilizing the smart purchased and that of the books the user would like to buy. This phone‟s GPS and Mapkit framework [3], [4]. divided information is stored in an application, while the server Technology based on smart phone cameras has been measures the similarity among users in terms of their applied not just for AR games and navigation functions, but, information stored in the database created. Then, if it is found in many cases, also for the recognition of objects or markers. that users with similar preferences do not have certain books, One application, called Pudding Camera, provides a service recommendations for the books will be made through push notification; the users receiving the recommendations get the that uses Open CV to recognize a face and match a photo of book details directly from the server. To evaluate the the face to an entertainer with a similar image.
    [Show full text]
  • Technical Notes All Changes in Fedora 13
    Fedora 13 Technical Notes All changes in Fedora 13 Edited by The Fedora Docs Team Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. Abstract This document lists all changed packages between Fedora 12 and Fedora 13.
    [Show full text]
  • Monkeysign Documentation Release ???
    Monkeysign Documentation Release ??? Antoine Beaupré Oct 21, 2019 Contents 1 Features 3 2 Similar projects 5 2.1 Install...................................................5 2.2 Usage...................................................7 2.3 Support.................................................. 10 2.4 Contribute................................................ 12 2.5 History.................................................. 19 2.6 API documentation............................................ 27 2.7 UI mockups and design......................................... 32 2.8 Terminology............................................... 33 2.9 Credits.................................................. 33 Python Module Index 35 Index 37 i ii Monkeysign Documentation, Release ??? Monkeysign is a tool to overhaul the OpenPGP keysigning experience and bring it closer to something that most primates can understand. The project makes use of cheap digital cameras and the type of bar code known as a QRcode to provide a human- friendly yet still-secure keysigning experience. No more reciting tedious strings of hexadecimal characters. And, you can build a little rogue’s gallery of the people that you have met and exchanged keys with! (Well, not yet, but it’s part of the plan.) Monkeysign also features a user-friendly commandline tool, similar to caff, to sign OpenPGP keys following the current best practices. Monkeysign was written by Jerome Charaoui and Antoine Beaupre and is licensed under GPLv3. Contents 1 Monkeysign Documentation, Release ??? 2 Contents
    [Show full text]
  • Design Manual 2020-12-11
    SNOW CRASH Using QR codes as a means of cyber attack Design Manual 2020-12-11 Brendan D. Burke [email protected] Snow Crash – Design Manual | Brendan D. Burke Contents Introduction ............................................................................................................................................ 2 Technology Stack .................................................................................................................................... 2 Libqrencode ........................................................................................................................................ 2 ZBar Bar Code Reader ......................................................................................................................... 2 feh ....................................................................................................................................................... 2 Dialog .................................................................................................................................................. 2 GitHub ................................................................................................................................................. 2 Virtualbox ............................................................................................................................................ 3 Kali ....................................................................................................................................................... 3 Wifipumpkin3.....................................................................................................................................
    [Show full text]
  • Web-Based Paper Exam Grading System
    Zesje Web-based paper exam grading system Nick Cleintuar Justin van der Krieken Jamy Mahabier Zesje Web-based paper exam grading system by Nick Cleintuar Justin van der Krieken Jamy Mahabier to obtain the degree of Bachelor of Science at the Delft University of Technology, to be defended publicly on Tuesday July 3, 2018 at 11:00. Project duration: April 23, 2018 – July 3, 2018 Project committee: A.R. Akhmerov TU Delft, client M.F. Aniche TU Delft, coach H. Wang TU Delft, coordinator An electronic version of this thesis is available at https://repository.tudelft.nl/. Preface This document is the final report for our bachelor end project of the Bachelor of Science in Computer Science at the Delft University of Technology. The project consisted of a research phase of two weeks, followed by an implementation phase of eight weeks. The report includes various details about the development on the already existing system called Zesje, an online exam grading tool for paper-based exams. It details the various steps and decisions taken to add the functionality for teachers to create compatible exams using Zesje. We express our gratitude to a number of people for making this project possible and supporting us throughout: the Zesje team, consisting of Anton Akhmerov (our client), Thomas Roos and Joseph Weston (listed in alphabetical order); and our coach, Maurício Aniche. Nick Cleintuar Justin van der Krieken Jamy Mahabier Delft, June 2018 1 Summary Grading can be a very time-consuming activity for teachers. For this reason, numerous tools exist to aid teachers in grading.
    [Show full text]
  • A Study on Multiple Barcode Detection from an Image in Business System
    International Journal of Computer Applications (0975 – 8887) Volume 181 – No. 37, January 2019 A Study on Multiple Barcode Detection from an Image in Business System Atiqul Islam Chowdhury Mushfika Sharmin Rahman Nazmus Sakib Department of Computer Science Department of Computer Science Department of Computer Science & Engineering & Engineering & Engineering Ahsanullah University of Science Ahsanullah University of Science Ahsanullah University of Science and Technology and Technology and Technology Dhaka, Bangladesh Dhaka, Bangladesh Dhaka, Bangladesh ABSTRACT Code, PDF417, MaxiCode are some examples of 2-D The pillar of automatic identification is Barcode technology barcodes. But among these, EAN-13 [3], Code 128 and QR which is used comprehensively in real time applications with codes [4] are mostly used. Some of 1D and 2D barcodes are various types of codes. The different types of codes and shown in Fig.1. applications sometimes faces special problems, so the improvement of the effectiveness must be done persistently. This paper’s proposal mainly deals with multiple product’s barcode to be detected simultaneously. The proposed algorithm which will have implementation for supershop billing system and inventory management. The method will recognize the barcodes using image processing. Images will be taken using mobile camera sensor. It will detect 1D barcodes such as EAN-13 barcodes, Code-128 barcodes, 2D barcodes such as QR codes. Moreover, it will be angle invariant, requires less user interaction than usual and can be executed on available computers. This model helps consumers to minimize the time for the billing system in shopping. We Fig.1: Some 1D & 2D barcodes have implemented this in Python IDE using OpenCV library.
    [Show full text]