INFORMATION TECHNOLOGY: PRINCIPLES AND APPLICATIONSPHI Learning Pvt. Ltd., 2004 M01 1 - 628 pages This comprehensive yet accessible text provides a good introduction to the fundamental concepts of Information Technology and skillfully elaborates on their applications, covering in the process the entire spectrum of IT related topics. Organized into three parts, the book offers an insightful analysis of the subject, explaining the concepts through suitable illustrations. Part I covers basic issues and concepts of Internet and the techniques of acquiring, storing, structuring and managing information that may involve images, text files and video data. The reader is exposed to both centralized and distributed database systems. Part II deals with the core topics in developing information systems which are based on audio and speech compression, multimedia communication techniques, and soft computing for analysis and interpretation of data. Part III focusses on a number of application areas-as remote sensing, telemedicine, e-commerce, cybermediary and rural development-besides the traditional engineering disciplines, highlighting their social impacts. The book is intended for undergraduate and postgraduate students of information technology, computer science as well as electronics and electrical communication engineering. It should also serve as an excellent reference for professionals in the IT field. Key Features: Discusses in detail the theoretical basis behind a web graph. Deals with security issues of computer networks and their implications in an easy-to-understand manner. Contains more than 30 projects (with useful hints) that students of various IT courses would find interesting to work on. Three chapters are exclusively devoted to different aspects of database management and data mining systems. |
Contents
3 | |
11 | |
References | 46 |
References | 72 |
Overview of Present Day Networking Technologies 91118 | 91 |
References | 118 |
Information Technology for Multimedia Communication 151166 | 151 |
References | 166 |
Principles and Applications of Soft Computing 336358 | 336 |
An Introduction to Clustering Techniques 359366 | 359 |
Issues and Challenges 369384 | 369 |
Information Technology in Healthcare | 385 |
An Overview of Remote Sensing and GIS Techniques 409436 | 409 |
A Source of Competitive Advantage | 437 |
An Investigation into the Emerging | 455 |
References | 470 |
GraphTheoretic Structure of the World Wide Web 169203 | 169 |
Principles of Image Compression 204221 | 204 |
Text Compression 222232 | 222 |
Contentbased Multimedia Analysis and Retrieval 233259 | 233 |
Speech and Audio Compression 260296 | 260 |
AllOptical Networking and Evolution of Network | 297 |
Computer Security Threats and Countermeasures 310326 | 310 |
References | 326 |
Fluted Ingots | 482 |
Colour Image Processing and Analysis 487502 | 487 |
References | 501 |
References | 521 |
Information Technology for Rural Development 548577 | 548 |
References | 577 |
Index 587602 | 587 |
Common terms and phrases
algorithm analysis applications attack attributes audio B-tree bandwidth block browser CELP channel classification cluster codebook coder coding colour image communication components compression cybermediaries data compression data mining database developed distribution document image domain e-commerce electronic encoded entropy encoding error example filter frame frequency function fuzzy fuzzy set graph histogram host human IEEE IIT Kharagpur image processing industrial information technology input interface Internet IP address kbits/s large number layer machine maps match methods modulation multimedia neural network nodes object optical output packet parameters pattern pixels prediction problem quantization query regions relation remote sensing retrieval router sample satellite scheme search engine segment selected sequence server shown in Fig signal spatial speech standard structure subband techniques telemedicine texture transaction transform transmitted types values vector video shot visual VSELP web graph
Popular passages
Page 37 - The rule X => Y holds in the transaction set D with confidence c if c% of transactions in D that contain X also contain Y. The rule X=> Khas support s in the transaction set D if s% of transactions in D contain X u Y.
Page 37 - Let 2 = {11,1*2, . . • ,»m} be a set of literals, called items. Let ~D be a set of transactions, where each transaction T is a set of items such that TC I.
Page 161 - The MPEG4 algorithm is based on the philosophy of object-based coding which treats any audio-visual information as a collection of objects rather than sampled signals or pixels and the generated code-stream is highly scalable. It provides an abstract approach to multimedia coding. In contrast to the conventional video coding techniques, a scene in MPEG4 standard is viewed as a composition of video objects (VO) with intrinsic object properties such as shape, texture and motion.
Page 34 - It means a process of nontrivial extraction of implicit, previously unknown and potentially useful information (such as knowledge rules, constraints, regularities) from data in databases [10].
Page 291 - Recommendation G.729 - Coding of speech at 8 kbit/s using conjugate-structure algebraiccode-excited linear-prediction (CS-ACELP).
Page 114 - This group discovers hosts on the network by keeping a list of source and destination MAC Addresses seen in good packets promiscuously received from the network.
Page 229 - Compression of individual sequences via variablerate coding," IEEE Transactions on Information Theory, vol.
Page 256 - Visualseek: a fully automated content-based image query system," in ACM Multimedia Conference, November 1996.