Browse Results

Showing 29,001 through 29,025 of 34,087 results

sicher & mobil

by Wolfgang W. Osterhage

Die Verlinkung von Computern und ihren Komponenten hat mit den Möglichkeiten der drahtlosen Kommunikation eine neue Qualität erreicht. Die Frage, wie diese Entwicklung die IT-Sicherheit herausfordert, steht im Mittelpunkt des Buchs. Der Autor behandelt die gesamte Bandbreite der drahtlosen Kommunikation (WLAN, Bluetooth, Mobiltelefonie), liefert detaillierte Beschreibungen der Technologie, der Standards, der Verschlüsselung und Konfiguration. Der Band enthält eine Checkliste, die auf den neuesten Sicherheits- und Kommunikationsstandards basiert.

Sicherheit und Vertrauen im Internet: Eine technische Perspektive (essentials)

by Christoph Meinel Harald Sack

Das globale Internet ist ein offenes Netz, das heißt nicht begrenzt und für jedermann zugänglich. Allerdings hat diese Offenheit ihren Preis: Es gibt keine zentrale Kontrolle, die z. B. Unbefugten Einblick in die Kommunikation und damit in die Privatsphäre anderer Internetnutzer verwehren würde. Um dennoch einen ausreichenden Schutz der Vertraulichkeit und Privatsphäre zu gewährleisten, müssen in eigener Verantwortung Techniken und Tools aus der Kryptografie eingesetzt werden, die Nachrichten verschlüsseln oder deren Unversehrtheit sicherstellen helfen. Die Autoren zeigen unterschiedliche Wege auf, wie der Schutz der Privatsphäre im Internet wiederhergestellt werden kann.

Sicherheit von Webanwendungen in der Praxis: Wie Sich Unternehmen Schu?tzen Ko?nnen -- Hintergru?nde, Maßnahmen, Pru?fverfahren Und Prozesse (Edition Kes Ser.)

by Matthias Rohr

Webanwendungen bilden in Unternehmen zahlreiche sensible Geschäftsprozesse ab – ob mit Kunden, mit Mitarbeitern, Partnern und Zulieferern. Daher sind Webapplikationen ein Sicherheitsrisiko für Unternehmen und ihr Schutz von entscheidender Bedeutung. In dem Buch beleuchtet der Autor die wichtigsten Aspekte der Webanwendungssicherheit und stützt sich dabei auf seine langjährige Erfahrung als IT-Security-Berater für Webanwendungen und Entwicklungsprozesse.Der Band bietet neben einem allgemeinen Überblick zum Thema Sicherheit von Webanwendungen ausführliche und praxisorientierte Darstellungen zu wichtigen Einzelfragen: Was sind die häufigsten Schwachstellen und mit welchen Maßnahmen lassen sich Webanwendungen am effektivsten gegen Angriffe absichern? Ein eigenes Kapitel befasst sich mit den Verfahren, die eingesetzt werden, um die Sicherheit von Anwendungen bereits im Entwicklungsprozess zu bewerten und zu überprüfen. Der Autor erläutert zudem, wie sich die Sicherheit in selbst entwickelten und zugekauften Webanwendungen durch organisatorische Prozesse nachhaltig verbessern lässt.Die zweite Auflage des 2014 erstmals erschienen Buchs wurde vor dem Hintergrund neuer Techniken zur Abwehr von Angriffen und neuer Prüfverfahren vollständig überarbeitet und aktualisiert. Auch aktuelle Beratungsprojekte des Autors haben Eingang in die Neuauflage gefunden – insbesondere dort, wo es um organisatorische Aspekte von Webanwendungssicherheit geht.Der Band richtet sich an Entwickler von Webanwendungen, IT-Security- und Qualitätsmanager genauso wie an Leser, die sich in das Thema Webanwendungssicherheit einarbeiten wollen.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema Sicherheit bei elektronischen Systemen. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und quantitativ bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt, so u.a. inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation sowie unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme. Das Buch wurde für die 2. Auflage gründlich überarbeitet und um die Darstellung neuer Patente erweitert.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema funktionale Sicherheit programmierbarer elektronischer Systeme. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt wie inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation oder unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme.Das Buch wurde für die 3. Auflage gründlich überarbeitet und um die Darstellung neuer Patente und Normen erweitert. Die ZielgruppenStudierende der Automatisierungstechnik und der Informatik sowie Systemarchitekten und Entwickler.

Sicherheitskonzepte in der mobilen Kommunikation: Drahtlose Kommunikation – Protokolle und Gefahren

by Wolfgang W. Osterhage

Erfahren Sie in diesem Buch alles über IT-Sicherheit in der drahtlosen KommunikationDurch Computer, das Internet und die digitale Vernetzung hat die drahtlose Kommunikation eine neue Qualität erreicht – sowohl für private Nutzer als auch für Unternehmen und Organisationen. Diese Entwicklung führt zu neuen Herausforderungen für die Sicherheit im Bereich der Kommunikationstechnik. In seinem ausführlichen Buch über IT-Sicherheit gibt Wolfgang Osterhage einen umfassenden Überblick über aktuelle Sicherheitsrisiken in der Kommunikationstechnologie. Er hilft IT-Sicherheitsverantwortlichen und Praktikern dabei, sicherzustellen, dass mögliche Eindringlinge keinen Zugriff auf sensible Daten oder Systemfunktionalitäten erhalten. Sein Buch über IT-Sicherheit in der mobilen Kommunikation unterstützt optimal dabei, zuverlässige Komplettchecks aller drahtlosen Anwendungen von Organisationen und Unternehmen oder auch im privaten Bereich durchzuführen.Behandelte Themenkomplexe und Aufbau der einzelnen KapitelIn seinem Buch „Sicherheit in der mobilen Kommunikation“ gibt Wolfgang Osterhage den aktuellen Stand der drahtlosen Kommunikationstechnologie wieder und beleuchtet verschiedene Sicherheitskonzepte. Er behandelt folgende Themenkomplexe:• WLAN• Mobiltelefonie• Bluetooth• Infrarot• NFCNach diesen Technologien hat er sein Buch über IT-Security in einzelne Kapitel untergliedert. Jedes dieser Kapitel folgt wiederum einem festen Aufbau:1. Technologische Grundlagen2. Mögliche Bedrohungsszenarien3. Organisatorische und technische GegenmaßnahmenSomit bietet das Werk praktische Lösungsansätze für die zuvor beschriebenen Sicherheitsprobleme. Da jedes Kapitel in sich abgeschlossen ist, eignet sich das Buch über drahtlose IT-Sicherheitsarchitekturen optimal zum Querlesen.Bedrohungsszenarien aus dem Unternehmensalltag und ausführliche ChecklistenOsterhages Buch über IT-Sicherheit im Bereich der mobilen Kommunikation liefert zusätzlich zu jeder behandelten Technologie eine umfangreiche Checkliste, welche grundsätzlich als zweispaltige Tabelle aufgebaut ist. Darin beantwortet Osterhage detailliert wichtige Fragen zum Thema Kommunikationssicherheit. Er beleuchtet in seinem Buch außerdem strategische Ansätze und geht genauer auf technische Details ein. Weiterhin liefert das Buch über IT-Sicherheit in der drahtlosen Kommunikation Warnhinweise, falls in einem bestimmten Bereich Bedrohungen vorliegen. Somit deckt es alle wesentlichen Aspekte drahtloser Sicherheit optimal ab.

Sidemen: The Book

by The Sidemen

Billions of you have watched their videos and millions of you have followed them on social media.So here we go; it's time to back up because YouTube superstars, The Sidemen, are finally here in book form and they're dishing the dirt on each other as well as the YouTube universe. There's nowhere to hide as KSI, Miniminter, Behzinga, Zerkaa,Vikkstar123, Wroetoshaw and Tobjizzle go in hard on their living habits, their football ability, and their dodgy clobber, while also talking Fifa, Vegas and superheroes. They'll also give you their grand house tour, letting you in on a few secrets, before showing you their hall of fame, as well as revealing some of their greatest shames.Along the way you'll learn how seven of the world's biggest YouTube stars started off with nothing more than a computer console, a PC and a bad haircut before joining forces to crush the internet. And they'll tell you just how they did it (because they're nice like that) with their ultimate guide to YouTube while also sharing their memories of recording their favourite videos as well as a typical day in the life of The Sidemen.You'll feel like you're with them every step of the way, smelling the 'sweet' aroma of the boys' favourite dishes in the kitchen, stamping your passport as you follow them on their trips around the world and kicking every ball as the boys gear up for the biggest football match of their lives. It's going to get personal. It's going to get intense, and JJ is going to have lots of tantrums, so take a moment to prepare yourself, because this is The Sidemen book you've been waiting for!

Sidesplitting Jokes for Minecrafters: Ghastly Golems and Ghoulish Ghasts (Jokes For Minecrafters #4)

by Brian Boone

Sidesplitting Jokes for Minecrafters: Ghastly Golems and Ghoulish Ghasts is the fourth book in the Jokes for Minecrafters series, which has more than 800 belly laughs waiting for you! This laugh-a-minute book leaves no enderman or zombie unscathed, and comes complete with silly illustrations for even more fun! <p><p> For kids ages 5 and up, this book of jokes will have all your friends and family doubling over! Bust out the funniest of these Minecrafter jokes at home or school for endless jokes and fun! <p> This adventure series is created especially for readers who love the fight of good vs. evil, magical academies like Hogwarts in the Harry Potter saga, and games like Minecraft, Terraria, and Pokemon GO.

Sieci Linux. Receptury

by Carla Schroder

Jak stworzy? sie? opart? o serwery pracuj?ce pod kontrol? Linuksa?Jak uruchomi? serwer VoIP i sie? VPN? Jak zapewni? bezawaryjn?, wydajn? i bezpieczn? prac? sieci?Mog?oby si? wydawa?, ?e o Linuksie napisano ju? wszystko. Jednak do tej pory nie by?o ksi??ki, która w kompleksowy sposób omawia?aby wszystkie zagadnienia, dotycz?ce spraw sieciowych w tym systemie operacyjnym. A? do teraz! Autor tej ksi??ki przedstawia poszczególne kwestie w sprawdzony w tej serii sposób: problem - rozwi?zanie - dyskusja. Dzi?ki podr?cznikowi "Sieci Linux. Receptury" dowiesz si?, w jaki sposób przygotowa? router, jak skonfigurowa? firewall przy u?yciu pakietu iptables oraz jak stworzy? punkt dost?pu do sieci bezprzewodowej i serwer VoIP, korzystaj?cy z popularnego rozwi?zania Asterisk. Poznasz zaawansowane mo?liwo?ci pakietu OpenSSH oraz sposoby bezpiecznego, zdalnego administrowania serwerem. Dodatkowo nauczysz si? u?ywa? graficznych pulpitów, ??czy? w bezpieczny sposób odleg?e sieci za pomoc? pakietu OpenVPN czy te? udost?pnia? w sieci pliki przy u?yciu serwera Samba. Twoj? ciekawo?? zaspokoi z pewno?ci? opis zastosowania Samby w roli kontrolera domeny. Po lekturze tej ksi??ki nie b?d? Ci obce sposoby monitorowania pracy sieci i us?ug, tworzenia wykresów wykorzystania zasobów czy te? u?ycia adresów IP w wersji szóstej. Jedno jest pewne: je?eli jeste? administratorem sieciowym lub masz ambicj? nim zosta?, ta ksi??ka musi znale?? si? na Twojej pó?ce!Tworzenie bramy opartej o system LinuxBudowa firewalla opartego o iptablesPrzygotowanie punktu dost?pu do sieci bezprzewodowejPrzydzielanie adresów IP za pomoc? serwera DHCPKonfiguracja serwera VoIP - AsteriskZaawansowane tematy, zwi?zane z routingiemZdalna i bezpieczna administracja z wykorzystaniem protoko?u SSHU?ywanie zdalnych pulpitów graficznychTworzenie wirtualnych sieci przy u?yciu pakietu OpenVPNWykorzystanie Linuksa w roli kontrolera domeny WindowsUdost?pnianie plików za pomoc? pakietu SambaUs?ugi katalogowe LDAPMonitorowanie i wizualizacja parametrów pracy sieci i us?ug Zastosowanie protoko?u IPv6Przygotowanie do bezobs?ugowej, sieciowej instalacji nowych systemówAdministrowanie serwerem za pomoc? konsoli pod??czonej przez port szeregowyUruchomienie serwera dial-upAnaliza, diagnoza i rozwi?zywanie problemów sieciowychOdpowiedzi na wszystkie Twoje pytania w jednym miejscu!

Sierra: A Take Control Crash Course

by Scholle Mcfarland

Learn macOS 10.12 Sierra with Mac expert and former Macworld editor Scholle McFarland!Head into the wilds of Sierra with confidence with the detailed "What's New in Sierra" list found this this Crash Course. You'll also learn about big new Sierra features like Siri, app tabs, Desktop and Documents folder syncing, Universal Clipboard, and Apple Pay in Safari. Particularly important is the book's discussion of Optimized Storage, which can save a lot of space on a Mac with a small drive, but should be enabled only when you understand its implications.Our favorite chapter is "Discover the Little Things in Sierra," which explains keeping folders on top of file listings, new text shortcut features, link and video previews in Messages, Picture in Picture, and the somewhat involved steps for setting up Auto Unlock with an Apple Watch. Also, don't miss Scholle's troubleshooting advice, which covers a wide range of misbehavior, from a frozen app to a frozen Mac.You'll also benefit from the book's coverage of core Mac topics. Thanks to a magazine-like layout with lots of steps, lists, and screenshots, you can find just the info you need, whether it involves understanding iCloud Drive, managing your menu bar effectively, configuring Notification Center to be useful, getting the most out of your Finder window's sidebar, dealing with the Dock, pinning tabs in Safari, or any of a myriad of other helpful subjects.Whether you want to browse for a few tips or go deep, you'll learn about...The hidden trick to getting your Mac to respond to "Hey, Siri!"All the things Siri can do for you on the MacImproving your writing with Sierra's new text shortcutsHow to watch a video--even from YouTube!--while you pretend to get work doneThe steps necessary to set your Apple Watch up to unlock your Mac automaticallyUsing Apple Pay with an iPhone--while shopping online in Safari on your MacHow to sort folders on top of files in Finder windows... Or not.The best ways to work with Sierra's new tabs in apps beyond Safari and the FinderUsing Handoff to move a task from your Mac to your iPhone, or vice-versaMoving data between your Apple devices with Universal ClipboardUnderstanding where your Desktop and Documents folders go when syncedHow you access synced Desktop and Documents folders from other devices and older MacsHow to set up Finder window sidebar favorites, and where to find those same favorites in a Save dialogWhat to do if your Mac won't turn on, if you get the spinning beachball of death, or if you need to repair your disk--and how to easily find out if your Mac still has AppleCareAnd much more!

Los siete clics mortales

by Margo Strupeck

Lectura obligada para evitar los problemas más comunes en el uso de redes sociales. En la actualidad, el uso de redes sociales se ha convertido en parte de la vida cotidiana de todos los adolescentes. De esta manera, los límites entre las relaciones del mundo real y las relaciones virtuales son cada vez menos claros. Esta nueva forma de comunicarse requiere de un diálogo constante con padres de familia y profesores, y sobre todo estar alerta ante los riesgos que enfrentan los jóvenes diariamente en internet. Los siete clics mortales es un libro que permite crear conciencia de los peligros que implica la web y presenta de manera simple el mejor uso que puede darse en familia a las redes sociales. English Description Pulling examples from high-profile pop culture cases, Seven Deadly Clicks explains the very real dangers behind common online activities. The book covers everything from over-sharing to sexting, online addiction, and more. Teens and parents will not only learn how to identify and prevent falling into these digital traps, but also how to recover if they do happen to make a mistake. This ebook exclusive acts as an internet safety net, giving teens an entertaining, yet informative, resource to help navigate potential pitfalls and still live fulfilling lives online.

Los siete hábitos de la gente desinformada: Cómo informarse y tomar decisiones en las redes sociales

by Marc Argemí Ballbé

Vivimos el espejismo de creer que, como hemos consultado internet, estamos lo suficientemente informados para tomar buenas decisiones. Sin embargo, esta idea es errónea. Este libro permite identificar los hábitos que nos hacen más vulnerables a la desinformación en el entorno digital y ofrece las herramientas para decidir por nosotros mismos tanto en el terreno personal como profesional. Estar bien informado significa contar con suficientes datos para, de entre todas las decisiones posibles, poder elegir una. Sin embargo, la experiencia nos demuestra que muchas decisiones tomadas con seguridad están lejos de sustentarse en los datos, circunstancia que explica que podamos parecer al mismo tiempo unos perfectos ignorantes y muy decididos. Internet y las redes sociales han llevado esta problemática hasta el extremo. Nunca antes habíamos tenido acceso a tanta información, aunque esto no implica que seamos capaces de escoger mejor. Los algoritmos del entorno digital (donde conviven webs, Facebook, Instagram, Twitter o WhatsApp) no siempre están programados para ayudarnos a elegir de forma adecuada. Tenemos la engañosa percepción de que estamos bien informados y, por ello, decidimos correctamente. No obstante, la desinformación nos afecta en nuestra vida personal y profesional. ¿Soy víctima de este fenómeno? La respuesta, con toda probabilidad, sería afirmativa porque nos desinformamos con facilidad y de modos muy diversos. El objetivo de este libro es ayudar a identificar los hábitos que nos hacen más vulnerables: el cuñadismo, la incredulidad crédula, la indecisión crónica, la ansiedad, el confusionismo relacional, el activismo visceral y la precariedad informativa. Y, con sus herramientas prácticas para contrarrestar la desinformación, será de utilidad tanto para los expertos en redes sociales y profesionales de la gestión de cuentas en Twitter como para aquellas personas que solo visitan las páginas web de los periódicos de toda la vida.

Sign of the Apocalypse: Ruminations and Wit from an American Roadside Prophet

by John Getchell

Friends, neighbors, and passersby from all over the country can’t fail to miss “The Sign’s constantly changing humor and insight. On occasion, The Sign of the Apocalypse (SOTA) traffics in the earnest, but at its heart is rooted in a deep-seated desire to express the sarcastic and snort-worthy. This, and a love of haiku, pizza, Latin, double entendre, and the worst puns ever crafted. Two years in the making, the message on “The Sign” is changed on a daily basis, with the primary benefit of slowing passing traffic to a honking crawl. It was designed to convey pithy tidbits of thought and wordplay. In its conception, SOTA was perpetrated in spite of the objection of the author's girlfriend, and with hopes of creating controversy and dismay in the local community. The girlfriend packed up and left, and the community and town fathers were surprisingly gruntled by the proceedings. Punny and sarcastic signs include: • When attacked by a gang of clowns, go for the juggler • What if doing the hokey pokey really is what it’s all about? • Legalize marinara • A penny saved is ridiculous • Wendy, please take me back / I’m so miserable / it’s almost like / you’re still here

The Signal: The History of Signal Processing and How We Communicate

by Ted Lewis

Computers are the foundation of the information age, but communication technology is the foundation of the foundation. Without the theories and practical applications of theory brought to us by the pioneers of communication, the computer age would perhaps have remained in the back office, hidden away as infrastructure like electricity or running water – critical to modern life, but not as transforming as the combination of communications and computing. The information age exploded once machines were endowed with the ability to talk among themselves. The Signal connects everything to everything else, in both communication, and in the metaphorical sense as the link between and among people. Features Identifies the key ideas underlying modern communications technology, and documents the contributions of its inventors Explores the signal in communication, and also in the metaphorical sense as the link between and among people Leads the reader through a journey from ancient number systems to Voyager II to radio and MP3s to quantum cryptography Includes coverage of "Signals from Hell," including memes and "fake news" on the Internet Looks to the future of communication, with emergent 5G

Signal and Image Analysis for Biomedical and Life Sciences

by Changming Sun Tomasz Bednarz Tuan D. Pham Pascal Vallotton Dadong Wang

With an emphasis on applications of computational models for solving modern challenging problems in biomedical and life sciences, this book aims to bring collections of articles from biologists, medical/biomedical and health science researchers together with computational scientists to focus on problems at the frontier of biomedical and life sciences. The goals of this book are to build interactions of scientists across several disciplines and to help industrial users apply advanced computational techniques for solving practical biomedical and life science problems. This book is for users in the fields of biomedical and life sciences who wish to keep abreast with the latest techniques in signal and image analysis. The book presents a detailed description to each of the applications. It can be used by those both at graduate and specialist levels.

Signal and Image Processing for Biometrics

by Jacob Scharcanski Hugo Proença Eliza Du

This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

Signal and Image Processing in Medical Applications

by Amit Kumar Fahimuddin Shaik B Abdul Rahim D. Sravan Kumar

This book highlights recentfindings on and analysesconducted on signalsand images in the area of medicine. The experimental investigations involve a variety of signalsand images and theirmethodologies range from very basic to sophisticated methods. The bookexplains how signal and image processing methods can be used to detect andforecast abnormalities in an easy-to-followmanner, offering a valuable resource for researchers, engineers,physicians and bioinformatics researchers alike.

Signal and Information Processing, Networking and Computers: Proceedings Of The 3rd International Conference On Signal And Information Processing, Networking And Computers (icsinc) (Lecture Notes In Electrical Engineering #473)

by Songlin Sun

This proceedings book presents selected papers from the 4th Conference on Signal and Information Processing, Networking and Computers (ICSINC) held in Qingdao, China on May 23–25, 2018. It focuses on the current research in a wide range of areas related to information theory, communication systems, computer science, signal processing, aerospace technologies, and other related technologies. With contributions from experts from both academia and industry, it is a valuable resource anyone interested in this field.

Signal and Information Processing, Networking and Computers

by Songlin Sun Na Chen Tao Tian

This proceedings book presents the latest research in the fields of information theory, communication system, computer science and signal processing, as well as other related technologies. Collecting selected papers from the 3rd Conference on Signal and Information Processing, Networking and Computers (ICSINC), held in Chongqing, China on September 13-15, 2017, it is of interest to professionals from academia and industry alike.

Signal and Information Processing, Networking and Computers: Proceedings of the 5th International Conference on Signal and Information Processing, Networking and Computers (ICSINC) (Lecture Notes in Electrical Engineering #550)

by Songlin Sun Meixia Fu Lexi Xu

This proceedings book presents selected papers from the 5th Conference on Signal and Information Processing, Networking and Computers (ICSINC), held in Yuzhou, China, from November 29 to December 1, 2018. It focuses on the current research in a wide range of areas in the fields of information theory, communication systems, computer science, signal processing, aerospace technologies, and other related technologies. With contributions from experts from both academia and industry, it is a valuable resource for anyone who is interested in this field.

Signal and Information Processing, Networking and Computers: Proceedings of the 6th International Conference on Signal and Information Processing, Networking and Computers (ICSINC) (Lecture Notes in Electrical Engineering #628)

by Yue Wang Meixia Fu Lexi Xu Jiaqi Zou

This book collects selected papers from the 6th Conference on Signal and Information Processing, Networking and Computers, held in Guiyang, China, on August 13 - 16, 2019. Focusing on the latest advances in information theory, communication systems, computer science, aerospace technologies, big data and other related technologies, it offers a valuable resource for researchers and industrial practitioners alike.

Signal Interference in WiFi and ZigBee Networks

by Keqiu Li Gaotao Shi

This book systematically summarizes the fundamentals of WiFi and ZigBee from different levels and provides the detailed theoretical and experimental results for signal interference between these two wireless data transmission technologies. The existing mechanisms and methods of interference mitigation, avoidance and co-existence are carefully explored. Both collaboration and cross-technology communication between WiFi and ZigBee are also introduced as key research trends. Due to the popularity of WiFi and ZigBee, which share the same ISM frequency band, interference is a common problem and addressed in a wide range of literature. This book condenses the newest research results into an approachable format. This is an essential resource for professionals and students in wireless networks as well as network engineers, designers, or planners seeking a backbone of knowledge in WiFi and ZigBee networks.

Signal Processing and Image Processing for Acoustical Imaging

by Woon Siong Gan

This book discusses the applications of signal and image processing in acoustical imaging. It first describes the basic tools involved – the 2D transform, fast Fourier transform (FFT) and applications, and deconvolution – before introducing readers to higher-order statistics, wavelets, and neural networks. It also addresses the important topic of digital signal processing, focusing on the example of homomorphic signal processing. The book then details the design of digital filters and array signal processing, and lastly examines applications in image processing: image enhancement and optimization, image restoration, and image compression.

Signal Processing Applications Using Multidimensional Polynomial Splines (SpringerBriefs in Applied Sciences and Technology)

by Madhusudan Singh Dhananjay Singh Zaynidinov Hakimjon

This book highlights new methods, algorithms and software for the digital processing and recovery of signals. In addition, it describes a new method for modeling one dimensional and multidimensional signals as successions of local polynomial splines and their spectral characteristics. It provides examples of how the proposed methods can be applied in specific cases, together with signal processing software examples in the MATLAB environment, and models of special processes in the Simulink environment. The book’s goal is to make it easier for beginners to understand the subject matter; it is intended for engineers, undergraduate and graduate students engaged in research or the evaluation and design of hardware and software for the digital processing and recovery of signals.

Signal Processing for Intelligent Sensor Systems with MATLAB

by David C. Swanson

Signal Processing for Intelligent Sensors with MATLAB®, Second Edition once again presents the key topics and salient information required for sensor design and application. Organized to make it accessible to engineers in school as well as those practicing in the field, this reference explores a broad array of subjects and is divided into sections: Fundamentals of Digital Signal Processing, Frequency Domain Processing, Adaptive System Identification and Filtering, Wavenumber Sensor Systems, and Signal Processing Applications. <p> Taking an informal, application-based approach and using a tone that is more engineer-to-engineer than professor-to-student, this revamped second edition enhances many of the features that made the original so popular. This includes retention of key algorithms and development methodologies and applications, which are creatively grouped in a way that differs from most comparable texts, to optimize their use.

Refine Search

Showing 29,001 through 29,025 of 34,087 results