Listing 1 - 10 of 415 | << page >> |
Sort by
|
Choose an application
Computer science --- Computers --- Computer systems --- Data transmission systems
Choose an application
Data acquisition systems have numerous applications. This book has a total of 13 chapters and is divided into three sections: Industrial applications, Medical applications and Scientific experiments. The chapters are written by experts from around the world, while the targeted audience for this book includes professionals who are designers or researchers in the field of data acquisition systems. Faculty members and graduate students could also benefit from the book.
Automatic data collection systems. --- Data collection systems, Automatic --- Factory data acquisition systems, Automatic --- Factory monitoring systems, Automatic --- In-plant data collection systems, Automatic --- Automation --- Communication in management --- Data transmission systems --- Cybernetics & systems theory
Choose an application
Panorama théorique et pratique du codage réseau : network coding, codes fontaines pour les réseaux de capteurs, switched code, sécurité par et pour le codage réseau, codage réseau aléatoire et matroïdes, codage réseau robuste, etc.
Computer networks --- Coding theory --- Data transmission systems --- Signal processing --- Packet switching (Data transmission) --- Réseaux d'ordinateurs --- Codage --- Données --- Traitement du signal --- Commutation de paquets (Transmission de données) --- Transmission
Choose an application
The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. The Second International Conference on Computer Science, Engineering & Applications (ICCSEA-2012), held in Delhi, India, during May 25-27, 2012 attracted many local and international delegates, presenting a balanced mixture of intellect and research both from the East and from the West. Upon a strenuous peer-review process the best submissions were selected leading to an exciting, rich and a high quality technical conference program, which featured high-impact presentations in the latest developments of various areas of computer science, engineering and applications research.
Computer science -- Congresses. --- Computer science. --- Pattern perception -- Congresses. --- Software engineering. --- Engineering & Applied Sciences --- Computer Science --- Computer network protocols --- Flow control (Data transmission systems) --- Control of data flow --- Engineering. --- Data mining. --- Computational intelligence. --- Electrical engineering. --- Computational Intelligence. --- Communications Engineering, Networks. --- Software Engineering/Programming and Operating Systems. --- Data Mining and Knowledge Discovery. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer software engineering --- Construction --- Industrial arts --- Technology --- Automatic control --- Data transmission systems --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
Each edition of Introduction to Data Compression has widely been considered the best introduction and reference text on the art and science of data compression, and the fourth edition continues in this tradition. Data compression techniques and technology are ever-evolving with new applications in image, speech, text, audio, and video. The fourth edition includes all the cutting edge updates the reader will need during the work day and in class. Khalid Sayood provides an extensive introduction to the theory underlying today’s compression techniques with detailed instruction for their applications using several examples to explain the concepts. Encompassing the entire field of data compression, Introduction to Data Compression includes lossless and lossy compression, Huffman coding, arithmetic coding, dictionary techniques, context based compression, scalar and vector quantization. Khalid Sayood provides a working knowledge of data compression, giving the reader the tools to develop a complete and concise compression package upon completion of his book. New content added to include a more detailed description of the JPEG 2000 standard New content includes speech coding for internet applications Explains established and emerging standards in depth including JPEG 2000, JPEG-LS, MPEG-2, H.264, JBIG 2, ADPCM, LPC, CELP, MELP, and iLBC Source code provided via companion web site that gives readers the opportunity to build their own algorithms, choose and implement techniques in their own applications
Data compression (Telecommunication) --- Coding theory --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Coding theory. --- Information Technology --- General and Others --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Compression of data (Telecommunication) --- Data compression (Computer science) --- Data transmission systems
Choose an application
Computer networks --- Military & Naval Science --- Law, Politics & Government --- Naval Science - General --- Security measures --- Planning --- Access control --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- United States. --- Computer networks. --- Procurement. --- U.S. Navy
Choose an application
Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the
Penetration testing (Computer security) --- Computer networks --- Security measures --- Testing. --- Information Technology --- General and Others --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Ethical hacking (Computer security) --- Computer security --- Distributed processing
Choose an application
Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and re
Coding theory. --- Computer networks --- Mathematical models. --- Information Technology --- General and Others --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Distributed processing
Choose an application
Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. --
Computer networks --- Government information --- Computer crimes --- Security measures --- Government policy. --- Security measures. --- Prevention. --- Information, Government --- Freedom of information --- Public records --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
E-Business - Applications and Global Acceptance is a collection of well-written papers that employ empirical and theoretical/conceptual approaches to highlight insights on the global acceptance of electronic business (e-business) and other useful applications and conceptualizations in the area. As our knowledge of the e-business phenomenon continues to mature and evolve, it is pertinent that new insights and information be made available. This edited book is published against such a backdrop. In essence, this book seeks to provide value to both e-business researchers and practitioners, with information sourced from differing regions of the world. The diversity in the sources of insights is welcome and this edited book covers a wide range of interesting, topical, and timely issues dealing with the acceptance of e-business applications or systems, business processes integration and management, the extension of e-business concepts to not-for-profit (nonprofit) organizations, and the construction of a service innovation model. Without a doubt, this book will be a comprehensive reference point for knowledge seekers who want to understand emerging conceptualizations, processes, and behaviors in the e-business domain.
Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- EDI (electronic data interchange)
Listing 1 - 10 of 415 | << page >> |
Sort by
|