0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (38)
  • R500+ (3,161)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Telecommunications Cost Management (Hardcover): Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr. Telecommunications Cost Management (Hardcover)
Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr.
R5,097 Discovery Miles 50 970 Ships in 12 - 19 working days

Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting, network address translation, and configuring workstations, servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis, wherever possible each chapter was written to be independent, making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing, the end results are not very efficient. And in the quickly changing global business environment, inefficiency wastes your time and money, both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively.

Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback): Mohamed Ibnkahla Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback)
Mohamed Ibnkahla
R2,893 Discovery Miles 28 930 Ships in 12 - 19 working days

Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Written in a tutorial style with several illustrative examples, this comprehensive book: Gives an overview of cognitive radio systems and explains the different components of the spectrum cycle Features step-by-step analyses of the different algorithms and systems, supported by extensive computer simulations, figures, tables, and references Fulfills the need for a single source of information on all aspects of the spectrum cycle, including the physical, link, medium access, network, and application layers Offering a unifying view of the various approaches and methodologies, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle presents the state of the art of cognitive radio technology, addressing all phases of the spectrum access cycle.

Introduction to Scientific and Technical Computing (Hardcover): Frank T. Willmore, Eric Jankowski, Coray Colina Introduction to Scientific and Technical Computing (Hardcover)
Frank T. Willmore, Eric Jankowski, Coray Colina
R5,691 Discovery Miles 56 910 Ships in 12 - 19 working days

Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. This book contains chapters summarizing the most important topics that computational researchers need to know about. It leverages the viewpoints of passionate experts involved with scientific computing courses around the globe and aims to be a starting point for new computational scientists and a reference for the experienced. Each contributed chapter focuses on a specific tool or skill, providing the content needed to provide a working knowledge of the topic in about one day. While many individual books on specific computing topics exist, none is explicitly focused on getting technical professionals and students up and running immediately across a variety of computational areas.

Digital Image Processing Methods (Hardcover): Edward R. Dougherty Digital Image Processing Methods (Hardcover)
Edward R. Dougherty
R9,912 Discovery Miles 99 120 Ships in 12 - 19 working days

This unique reference presents in-depth coverage of the latest methods and applications of digital image processing describing various computer architectures ideal for satisfying specific image processing demands.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R5,152 Discovery Miles 51 520 Ships in 12 - 19 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,857 Discovery Miles 58 570 Ships in 12 - 19 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R5,094 Discovery Miles 50 940 Ships in 12 - 19 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,827 Discovery Miles 58 270 Ships in 12 - 19 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R5,085 Discovery Miles 50 850 Ships in 12 - 19 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

The End of Error - Unum Computing (Hardcover): John L. Gustafson The End of Error - Unum Computing (Hardcover)
John L. Gustafson
R5,860 Discovery Miles 58 600 Ships in 12 - 19 working days

The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.

Broadband RF and Microwave Amplifiers (Paperback): Andrei Grebennikov, Narendra Kumar, Binboga S Yarman Broadband RF and Microwave Amplifiers (Paperback)
Andrei Grebennikov, Narendra Kumar, Binboga S Yarman
R2,652 Discovery Miles 26 520 Ships in 12 - 19 working days

Broadband RF and Microwave Amplifiers provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text begins by introducing two-port networks to illustrate the behavior of linear and nonlinear circuits, explaining the basic principles of power amplifier design, and discussing impedance matching and broadband power amplifier design using lumped and distributed parameters. The book then: Shows how dissipative or lossy gain-compensation-matching circuits can offer an important trade-off between power gain, reflection coefficient, and operating frequency bandwidth Describes the design of broadband RF and microwave amplifiers using real frequency techniques (RFTs), supplying numerous examples based on the MATLAB (R) programming process Examines Class-E power amplifiers, Doherty amplifiers, low-noise amplifiers, microwave gallium arsenide field-effect transistor (GaAs FET)-distributed amplifiers, and complementary metal-oxide semiconductor (CMOS) amplifiers for ultra-wideband (UWB) applications Broadband RF and Microwave Amplifiers combines theoretical analysis with practical design to create a solid foundation for innovative ideas and circuit design techniques.

Encyclopedia of Microcomputers - Volume 12 - Multistrategy Learning to Operations Research: Microcomputer Applications... Encyclopedia of Microcomputers - Volume 12 - Multistrategy Learning to Operations Research: Microcomputer Applications (Hardcover)
Allen Kent, James G. Williams
R7,844 R6,616 Discovery Miles 66 160 Save R1,228 (16%) Ships in 12 - 19 working days

"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology."

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,387 Discovery Miles 53 870 Ships in 12 - 19 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Network and Application Security - Fundamentals and Practices (Hardcover): Debashis Ganguly Network and Application Security - Fundamentals and Practices (Hardcover)
Debashis Ganguly
R5,820 Discovery Miles 58 200 Ships in 12 - 19 working days

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security

Microprogrammed State Machine Design (Hardcover, New): Michel A. Lynch Microprogrammed State Machine Design (Hardcover, New)
Michel A. Lynch
R5,871 Discovery Miles 58 710 Ships in 12 - 19 working days

Microprogrammed State Machine Design is a digital computer architecture text that builds systematically from basic concepts to complex state-machine design. It provides practical techniques and alternatives for designing solutions to data processing problems both in commerce and in research purposes. It offers an excellent introduction to the tools and elements of design used in microprogrammed state machines, and incoporates the necessary background in number systems, hardware building blocks, assemblers for use in preparing control programs, and tools and components for assemblers . The author conducts an in-depth examination of first- and second-level microprogrammed state machines. He promotes a top-down approach that examines algorithms mathematically to exploit the simplifications resulting from choosing the proper representation and application of algebraic manipulation. The steps involved in the cycle of design and simulation steps are demonstrated through an example of running a computer through a simulation. Other topics covered in Microprogrammed State Machine Design include a discussion of simulation methods, the development and use of assembler language processors, and comparisons among various hardware implementations, such as the Reduced Instruction Set Computer (RISC) and the Digital Signal Processor (DSP). As a text and guide, Microprogrammed State Machine Design will interest students in the computer sciences, computer architectects and engineers, systems programmers and analysts, and electrical engineers.

Synchronization and Control of Multiagent Systems (Paperback): Dong Sun Synchronization and Control of Multiagent Systems (Paperback)
Dong Sun
R2,428 Discovery Miles 24 280 Ships in 12 - 19 working days

Multiple intelligent agent systems are commonly used in research requiring complex behavior. Synchronization control provides an advantage in solving the problem of multi-agent coordination. This book focuses on the use of synchronization control to coordinate the group behavior of multiple agents. The author includes numerous real-world application examples from robotics, automation, and advanced manufacturing. Giving a detailed look at cross-coupling based synchronization control, the text covers such topics as adaptive synchronization control, synchronous tracking control of parallel manipulators, and minimization of contouring errors of CNC machine tools with synchronization controls.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,307 Discovery Miles 23 070 Ships in 12 - 19 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback): Jingzhao Ou, Viktor K. Prasanna Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback)
Jingzhao Ou, Viktor K. Prasanna
R2,367 Discovery Miles 23 670 Ships in 12 - 19 working days

Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.

Design of Low Power Integrated Radios for Emerging Standards (Hardcover, 1st ed. 2020): Mustafijur Rahman, Ramesh Harjani Design of Low Power Integrated Radios for Emerging Standards (Hardcover, 1st ed. 2020)
Mustafijur Rahman, Ramesh Harjani
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

This book describes novel and disruptive architecture and circuit design techniques, toward the realization of low-power, standard-compliant radio architectures and silicon implementation of the circuits required for a variety of leading-edge applications. Readers will gain an understanding of the circuit level challenges that exist for low power radios, compatible with the IEEE 802.15.6 standard. The authors discuss current techniques to address some of these challenges, helping readers to understand the state-of-the-art, and to address the various, open research problems that exist with respect to realizing low power radios. Enables readers to face challenging bottleneck in low power radio design, with state-of-the-art, circuit-level design techniques; Provides readers with basic knowledge of circuits suitable for low power radio circuits compatible with the IEEE 802.15.6 standard; Discusses new and emerging architectures and circuit techniques, enabling applications such as body area networks and internet of things.

Modern Digital Design and Switching Theory (Hardcover): Eugene D. Fabricius Modern Digital Design and Switching Theory (Hardcover)
Eugene D. Fabricius
R3,766 Discovery Miles 37 660 Ships in 12 - 19 working days

Modern Digital Design and Switching Theory is an important text that focuses on promoting an understanding of digital logic and the computer programs used in the minimization of logic expressions. Several computer approaches are explained at an elementary level, including the Quine-McCluskey method as applied to single and multiple output functions, the Shannon expansion approach to multilevel logic, the Directed Search Algorithm, and the method of Consensus. Chapters 9 and 10 offer an introduction to current research in field programmable devices and multilevel logic synthesis. Chapter 9 covers more advanced topics in programmed logic devices, including techniques for input decoding and Field-Programmable Gate Arrays (FPGAs). Chapter 10 includes a discussion of boolean division, kernels and factoring, boolean tree structures, rectangle covering, binary decision diagrams, and if-then-else operators. Computer algorithms covered in these two chapters include weak division, iterative weak division, and kernel extraction by tabular methods and by rectangle covering theory. Modern Digital Design and Switching Theory is an excellent textbook for electrical and computer engineering students, in addition to a worthwhile reference for professionals working with integrated circuits.

Hybrid Architectures for Intelligent Systems (Hardcover): Abraham Kandel, Gideon Langholz Hybrid Architectures for Intelligent Systems (Hardcover)
Abraham Kandel, Gideon Langholz
R5,864 Discovery Miles 58 640 Ships in 12 - 19 working days

Hybrid architecture for intelligent systems is a new field of artificial intelligence concerned with the development of the next generation of intelligent systems. This volume is the first book to delineate current research interests in hybrid architectures for intelligent systems.
The book is divided into two parts. The first part is devoted to the theory, methodologies, and algorithms of intelligent hybrid systems. The second part examines current applications of intelligent hybrid systems in areas such as data analysis, pattern classification and recognition, intelligent robot control, medical diagnosis, architecture, wastewater treatment, and flexible manufacturing systems.
Hybrid Architectures for Intelligent Systems is an important reference for computer scientists and electrical engineers involved with artificial intelligence, neural networks, parallel processing, robotics, and systems architecture.

Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback): K.C. Raveendranathan Neuro-Fuzzy Equalizers for Mobile Cellular Channels (Paperback)
K.C. Raveendranathan
R1,856 Discovery Miles 18 560 Ships in 12 - 19 working days

Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases

Parallel Processing in Computational Mechanics (Hardcover): Hojjat Adeli Parallel Processing in Computational Mechanics (Hardcover)
Hojjat Adeli
R5,384 Discovery Miles 53 840 Ships in 12 - 19 working days

Introduces mechanical engineers to high-performance computing using the new generation of computers with vector and parallel processing capabilities that allow the solution to problems beyond the ken of traditional computers. The chapters present an introduction and overview, explain several methodo

High-Speed Photonics Interconnects (Paperback): Lukas Chrostowski, Krzysztof Iniewski High-Speed Photonics Interconnects (Paperback)
Lukas Chrostowski, Krzysztof Iniewski
R2,664 Discovery Miles 26 640 Ships in 12 - 19 working days

Dramatic increases in processing power have rapidly scaled on-chip aggregate bandwidths into the Tb/s range. This necessitates a corresponding increase in the amount of data communicated between chips, so as not to limit overall system performance. To meet the increasing demand for interchip communication bandwidth, researchers are investigating the use of high-speed optical interconnect architectures. Unlike their electrical counterparts, optical interconnects offer high bandwidth and negligible frequency-dependent loss, making possible per-channel data rates of more than 10 Gb/s. High-Speed Photonics Interconnects explores some of the groundbreaking technologies and applications that are based on photonics interconnects. From the Evolution of High-Speed I/O Circuits to the Latest in Photonics Interconnects Packaging and Lasers Featuring contributions by experts from academia and industry, the book brings together in one volume cutting-edge research on various aspects of high-speed photonics interconnects. Contributors delve into a wide range of technologies, from the evolution of high-speed input/output (I/O) circuits to recent trends in photonics interconnects packaging. The book discusses the challenges associated with scaling I/O data rates and current design techniques. It also describes the major high-speed components, channel properties, and performance metrics. The book exposes readers to a myriad of applications enabled by photonics interconnects technology. Learn about Optical Interconnect Technologies Suitable for High-Density Integration with CMOS Chips This richly illustrated work details how optical interchip communication links have the potential to fully leverage increased data rates provided through complementary metal-oxide semiconductor (CMOS) technology scaling at suitable power-efficiency levels. Keeping the mathematics to a minimum, it gives engineers, researchers, graduate students, and entrepreneurs a comprehensive overview of the dynamic landscape of high-speed photonics interconnects.

TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Paperback): Rashid Abdelhaleem Saeed, Stephen... TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Paperback)
Rashid Abdelhaleem Saeed, Stephen J. Shellhammer
R2,346 Discovery Miles 23 460 Ships in 12 - 19 working days

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pyomo - Optimization Modeling in Python
Michael L. Bynum, Gabriel A. Hackebeil, … Hardcover R1,906 Discovery Miles 19 060
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,242 Discovery Miles 12 420
Advanced Classification Techniques for…
Chinmay Chakraborty Hardcover R7,673 Discovery Miles 76 730
Advances in Time Series Analysis and…
Ignacio Rojas, Hector Pomares, … Hardcover R2,944 Discovery Miles 29 440
Roman's Data Science How to monetize…
Roman Zykov Hardcover R1,184 R997 Discovery Miles 9 970
Evolutionary Statistical Procedures - An…
Roberto Baragona, Francesco Battaglia, … Hardcover R2,912 Discovery Miles 29 120
Blockchain Cybersecurity, Trust and…
Kim-Kwang Raymond Choo, Ali Dehghantanha, … Hardcover R4,931 Discovery Miles 49 310
Functional Aesthetics for Data…
V Setlur Paperback R825 R760 Discovery Miles 7 600
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
Information and On-Line Data in…
Daniel Egret, Miguel A. Albrecht Hardcover R2,605 Discovery Miles 26 050

 

Partners