ТОП просматриваемых книг сайта:
Программирование
Различные книги в жанре Программирование, доступные для чтения и скачиванияАннотация
The topic of this book is proportionate-type normalized least mean squares (PtNLMS) adaptive filtering algorithms, which attempt to estimate an unknown impulse response by adaptively giving gains proportionate to an estimate of the impulse response and the current measured error. These algorithms offer low computational complexity and fast convergence times for sparse impulse responses in network and acoustic echo cancellation applications. New PtNLMS algorithms are developed by choosing gains that optimize user-defined criteria, such as mean square error, at all times. PtNLMS algorithms are extended from real-valued signals to complex-valued signals. The computational complexity of the presented algorithms is examined. Contents 1. Introduction to PtNLMS Algorithms 2. LMS Analysis Techniques 3. PtNLMS Analysis Techniques 4. Algorithms Designed Based on Minimization of User Defined Criteria 5. Probability Density of WD for PtLMS Algorithms 6. Adaptive Step-size PtNLMS Algorithms 7. Complex PtNLMS Algorithms 8. Computational Complexity for PtNLMS Algorithms About the Authors Kevin Wagner has been a physicist with the Radar Division of the Naval Research Laboratory, Washington, DC, USA since 2001. His research interests are in the area of adaptive signal processing and non-convex optimization. Milos Doroslovacki has been with the Department of Electrical and Computer Engineering at George Washington University, USA since 1995, where he is now an Associate Professor. His main research interests are in the fields of adaptive signal processing, communication signals and systems, discrete-time signal and system theory, and wavelets and their applications.
Аннотация
Provides students and engineers with the fundamental developments and common practices of software evolution and maintenance Software Evolution and Maintenance: A Practitioner’s Approach introduces readers to a set of well-rounded educational materials, covering the fundamental developments in software evolution and common maintenance practices in the industry. Each chapter gives a clear understanding of a particular topic in software evolution, and discusses the main ideas with detailed examples. The authors first explain the basic concepts and then drill deeper into the important aspects of software evolution. While designed as a text in an undergraduate course in software evolution and maintenance, the book is also a great resource forsoftware engineers, information technology professionals, and graduate students in software engineering. Based on the IEEE SWEBOK (Software Engineering Body of Knowledge) Explains two maintenance standards: IEEE/EIA 1219 and ISO/IEC14764 Discusses several commercial reverse and domain engineering toolkits Slides for instructors are available online Software Evolution and Maintenance: A Practitioner’s Approach equips readers with a solid understanding of the laws of software engineering, evolution and maintenance models, reengineering techniques, legacy information systems, impact analysis, refactoring, program comprehension, and reuse.
Аннотация
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, and networks. Each chapter is divided into a number of sections based on the bioinformatics topics and related mathematical theory and methods. Each topic of the section is comprised of the following three parts: an introduction to the biological problems in bioinformatics; a presentation of relevant topics of mathematical theory and methods to the bioinformatics problems introduced in the first part; an integrative overview that draws the connections and interfaces between bioinformatics problems/issues and mathematical theory/methods/applications.
Аннотация
A comprehensive guide to computer assisted exercises Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large civilian organizations that are looking to teach and test their strategies and procedures without the added cost of manpower. Divided into two clear parts, the book covers: Fundamentals and Theory—conflict and warfare; probability and statistics; simulation; distributed simulation; and experimentation and analysis Combat Modeling, Computer Assisted Exercises, and Practice—CAX architectures; CAX process; combat modeling; CAX support tools; communications/information system issues, technical risks, and risk miti-gation; and exercise centers and facilities Computer Assisted Exercises and Training: A Reference Guide is indispensable reading for research engineers, computer scientists, software engineers working with modeling and simulation, homeland security specialists, staff in simulation training centers, military strategists and commanders, and many others. It also serves as a valuable textbook for modeling and simulation courses at the upper-undergraduate and graduate levels.
Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems - Ledley Robert S.
Аннотация
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates
Аннотация
This book is not only of practical value. It's also a lot of fun to read. Michael Jackson, The Open University. Do you need to know how to create good requirements? Discovering Requirements offers a set of simple, robust, and effective cognitive tools for building requirements. Using worked examples throughout the text, it shows you how to develop an understanding of any problem, leading to questions such as: What are you trying to achieve? Who is involved, and how? What do those people want? Do they agree? How do you envisage this working? What could go wrong? Why are you making these decisions? What are you assuming? The established author team of Ian Alexander and Ljerka Beus-Dukic answer these and related questions, using a set of complementary techniques, including stakeholder analysis, goal modelling, context modelling, storytelling and scenario modelling, identifying risks and threats, describing rationales, defining terms in a project dictionary, and prioritizing. This easy to read guide is full of carefully-checked tips and tricks. Illustrated with worked examples, checklists, summaries, keywords and exercises, this book will encourage you to move closer to the real problems you're trying to solve. Guest boxes from other experts give you additional hints for your projects. Invaluable for anyone specifying requirements including IT practitioners, engineers, developers, business analysts, test engineers, configuration managers, quality engineers and project managers. A practical sourcebook for lecturers as well as students studying software engineering who want to learn about requirements work in industry. Once you've read this book you will be ready to create good requirements!
Аннотация
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optimize the cost, performance and other attributes to meet application requirements. This book provides a new treatment of computer system design, particularly for System-on-Chip (SOC), which addresses the issues mentioned above. It begins with a global introduction, from the high-level view to the lowest common denominator (the chip itself), then moves on to the three main building blocks of an SOC (processor, memory, and interconnect). Next is an overview of what makes SOC unique (its customization ability and the applications that drive it). The final chapter presents future challenges for system design and SOC possibilities.
Аннотация
This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application. In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A, focusing not only on the standards themselves, but specifically upon their application (e.g. for broadcasting media, personalised advertising and news, multimedia collaboration, digital rights management, resource adaptation, digital home systems, and so on); including MPEG cross-breed applications. In the evolving digital multimedia landscape, this book provides comprehensive coverage of the key MPEG standards used for generation and storage, distribution and dissemination, and delivery of multimedia data to various platforms within a wide variety of application domains. It considers how these MPEG standards may be used, the context of their use, and how supporting and complementary technologies and the standards interact and add value to each other. Key Features: Integrates the application of five popular MPEG standards (MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A) into one single volume, including MPEG cross-breed applications Up-to-date coverage of the field based on the latest versions of the five MPEG standards Opening chapter provides overviews of each of the five MPEG standards Contributions from leading MPEG experts worldwide Includes an accompanying website with supporting material (www.wiley.com/go/angelides_mpeg) This book provides an invaluable reference for researchers, practitioners, CTOs, design engineers, and developers. Postgraduate students taking MSc, MRes, MPhil and PhD courses in computer science and engineering, IT consultants, and system developers in the telecoms, broadcasting and publishing sectors will also find this book of interest.
Аннотация
This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and creating the illusion of a single repository for users. It also includes three sample frameworks—implemented using J2SE with JMS, J2EE, and Microsoft .Net—that readers can use to learn how to implement a distributed database management system. IT and development groups and computer sciences/software engineering graduates will find this guide invaluable.
Interoperability for Enterprise Software and Applications. Proceedings of the Workshops and the Doctorial Symposium of the I-ESA International Conference 2010 - Panetto Herve
Аннотация
Within the framework of the Sixth I-ESA International Conference, supported by the INTEROP VLab (International Virtual Laboratory on Enterprise Interoperability, http://www.interop-vlab.eu), three workshops and a Doctoral Symposium have been organized in order to strengthen some key topics related to interoperability for enterprise applications and software. The workshops were selected to complement the conference topics, leaving more time to researchers for brainstorming and then coming up, at the end of the workshops, with new research directions for the future. The goal of the workshop “Standards – a Foundation for Interoperability” is to increase awareness and understanding of interoperability standards as a fundamental need. The workshop “Use of MDI/SOA Concepts in Industry” promotes the application of MDI (Model-Driven Interoperability) combined with SOA (Services Oriented Architecture) and the associated technology (BPM, Enterprise Modeling, ontology, mediation, model transformation, etc.) in industry. The workshop on “Dynamic Management across Interoperating Enterprises” investigates the need for enhancements to current business management systems and processes to address the needs of global trading across enterprises utilizing the new service-oriented Internet. Finally, the Doctoral Symposium has given the opportunity for students involved in the preparation of their PhDs in this emerging area to present and discuss their research issues and ideas with senior researchers.