Navigation bar
  Start Previous page
 37 of 106 
Next page End 32 33 34 35 36 37 38 39 40 41 42  

Artech House Publishers | ISBN 1580537936 | 2005 Year | PDF | 3,46 Mb | 340
Pages
“ This authoritative book gives you new perspective on the RF and analog
hardware and systems design aspects of software defined radio. It delves into
the architecture of transmitters and receivers that make software-defined radio
a reality. Covering both the practical aspects and underpinnings of these
architectures, the book details all key RF and analog baseband components and
sub-systems, from the converters that interface with DSPs and ASICs through to
the duplexer feeding the antenna. It enables you to select the right technique
for any application by providing alternatives for implementing the main system
components.
The book places emphasis on broadband and multi-band techniques, including
broadband quadrature techniques, methods of dealing with the diplexer issue in
transceivers, high-dynamic range and general coverage receiver techniques, and
linearization applied to LNAs, receiver front-ends, transmitters and PAs. This
practical resource looks at the cost factors of using particular techniques to
ensure that you are creating communications devices that can compete
successfully in the marketplace. Moreover, the book includes a survey of current
technology that guides you in identifying future trends, so that current designs
can be adapted to ever-changing technology and market demands.
Password: www.AvaxHome.ru
Rita S. Brause, "Writing Your Doctoral Dissertation: Invisible Rules for
Success"
Falmer Press | ISBN 0750707445 | 1999 Year | PDF | 1,57 Mb | 184 Pages
“ — A practical guide for students with help on planning, writing and defending
a dissertation
— Provides samples of accepted proposals and dissertations
Increasing numbers of adults are enrolling in doctoral programs, but their
earlier college lives often do not prepare them for the rules of academic game.
Many have no idea what a dissertation proposal or an accepted dissertation looks
like, how it gets that way, or what options are available to them. There is a
real need for explicit information on what this highly complex and interactive,
social and political process involves.
The book is a practical guide for students who need help in progressing from the
decision to write a dissertation to the planning, writing and defending of it.
It includes samples of proposals and dissertations that have been accepted and
data drawn from a number of source, including focus groups with doctoral
students and graduates and responses to an open-ended questionnaire from
doctoral students across the United States.
Password: www.AvaxHome.ru
Thomas Hardjono, Lakshminath R. Dondeti, "Security In Wireless LANs And MANs"
Artech House Publishers | ISBN 1580537553 | 2005 Year | PDF | 1,4 Mb | 243 Pages
“ With the popularity of the Wireless Local Area Network (WLAN) standard 802.11
WiFi® and the growing interest in the next generation Wireless Metropolitan Area
Network (WMAN) standard 802.16 WiMax®, the need for effective solutions to the
inherent security weaknesses of these networking technologies has become of
critical importance. Thoroughly explaining the risks associated with deploying
WLAN and WMAN networks, this groundbreaking book offers you practical insight
into identifying and overcoming these security issues.
Including detailed descriptions of possible solutions to a number of specific
security problems, the book gives you the hands-on techniques that you need to
secure wireless networks in the enterprise and the home. This handy reference
also defines key security terms to help you fully understand concepts and
evaluate security products on the market today. Moreover, the book discusses the
future direction of the WLAN and WMAN industry, allowing you to plan ahead for
emerging technologies in the field.
Password: www.AvaxHome.ru
Steve Mann, "Intelligent Image Processing"
Wiley-IEEE Press | ISBN 0471406376 | 2001 Year | DjVu | 4,11 Mb | 240 Pages
“ Intelligent Image Processing describes the EyeTap technology that allows non-
invasive tapping into the human eye through devices built into eyeglass frames.
This isn't merely about a computer screen inside eyeglasses, but rather the
ability to have a shared telepathic experience among viewers. Written by the
developer of the EyeTap principle, this work explores the practical application
and far-reaching implications this new technology has for human
telecommunications.
Password: www.AvaxHome.ru
Egon Boerger, Robert Staerk, "Abstract State Machines: A Method for High-Level
System Design and Analysis"
Springer | ISBN 3540007024 | 2003 Year | PDF | 2 Mb | 438 Pages
“ The systems engineering method proposed in this book, which is based on
Abstract State Machines (ASMs), guides the development of software and embedded
hardware-software systems seamlessly from requirements capture to actual
implementation and documentation. The method bridges the gap between the human
understanding and formulation of real-world problems and the deployment of their
algorithmic solutions by code-executing machines. Within a single conceptual
framework it covers design, verification by reasoning techniques, and validation
by simulation and testing. ASMs improve current industrial practice by using
accurate high-level modeling and by linking the descriptions at the successive
stages of system development in an organic and efficiently maintainable chain of
rigorous and coherent system models at stepwise-refined abstraction levels. In
several industrial projects the ASM method has proven its superiority compared
to the popular UML methodology when designing complex parallel or dynamic
systems. This book combines the features of a textbook and a handbook: the
reader will find detailed explanations, proofs, and exercises as well as
numerous examples and real-world case studies. Researchers will find here the
most comprehensive description of ASMs available today and professionals will
use it as a "modeling handbook for the working software engineer." As a textbook
it supports self-study or it can form the basis of a lecture course. The book is
complemented by a CD containing the whole book text, additional course material,
solutions to exercises, and additional examples. Even more information can be
found on the related website maintained by the authors:
Password: www.AvaxHome.ru
Thomas Lengauer, et al, "Bioinformatics: From Genomes to Drugs"
Wiley-VCH | ISBN 3527299882 | 2001 Year | PDF | 7,9 Mb | 648 Pages
“ Bioinformatics - the use of computers to retrieve, process, analyze and
simulate biological information - promises to revolutionize the process of drug
discovery and development. This book provides a broad, application-oriented
overview of this technology. Contributions by internationally renowned
specialists in the field afford a detailed insight into single bioinformatics
components and algorithmic methods. In addition, the state-of-the-art in
bioinformatics is evaluated equally from a global view by introducing real
application scenarios such as genome projects that require the use of a whole
set of bioinformatics tools.
The profound knowledge on bioinformatics presented here not only enables readers
to go beyond a mere push-button approach to using bioinformatics software and
interpreting the data generated appropriately. It is also essential to assess
the potential and limitations of today's bioinformatics software and future
challenges. Directed to all those involved in the use or development of new
bioinformatics tools - scientists and managers from the fields of molecular
biotechnology, pharmaceutics, and medicinal chemistry - this book will lead one
step further on the way to rational drug design.
Password: www.AvaxHome.ru
Bhuvan Unhelkar, "Verification and Validation for Quality of UML 2.0 Models"
Wiley-Interscience | ISBN 0471727830 | 2005 Year | PDF | 1,28 Mb | 312 Pages
“ A practical approach to enhancing quality in software models using UML Version
2.0
"Despite its increasing usage, many companies are not taking the best advantage
of UML and, occasionally, individuals have experienced frustration in applying
its standards. Perhaps this is because they have not yet read this book!"
-From the Foreword by Prof. Brian Henderson-Sellers
This book presents a practical checklist approach to enhancing the quality of
software models created with the Unified Modeling Language (UML) Version 2.0.
The foundation for quality is set by the discussion on the nature and creation
of UML models. This is followed by a demonstration of how to apply verification
and validation checks to these models with three foci: syntactical correctness,
semantic meaningfulness, and aesthetic symmetry. The quality work is carried out
within three distinct yet related modeling spaces:
Model of problem space (MOPS)
Model of solution space (MOSS)
Model of background space (MOBS)
Readers can then choose a specific quality approach according to their roles in
their projects.
Verification and validation checks are also organized according to these three
modeling spaces, making it easier for the reader to focus on the appropriate
diagrams and quality checks corresponding to their modeling space. In addition,
a major element of this publication is the Strengths, Weaknesses, Objectives,
and Traps (SWOT) analysis. This analysis is performed on each UML diagram,
enabling readers to fully comprehend these diagrams, their advantages and
limitations, and the way in which they can be used in practical projects for
modeling.
A consistent case study of the Lucky Insurance System is provided throughout the
chapters to illustrate the creation of good quality UML diagrams, followed by
Previous page Top Next page