Browse Results

Showing 34,051 through 34,075 of 53,398 results

MySpace for Moms and Dads: A Guide to Understanding the Risks and the Rewards

by Connie Neal

You can't ignore MySpace if you're a parent-but you don't have to be intimidated by it. This simple, step-by-step exploration of what MySpace means in your teen's life helps even computer-challenged parents and grandparents understand this communication revolution and make informed, confident decisions about their teen's use of MySpace.

Measuring Shape

by F. Brent Neal John C. Russ

"John Russ is the master of explaining how image processing gets applied to real-world situations. With Brent Neal, he’s done it again in Measuring Shape, this time explaining an expanded toolbox of techniques that includes useful, state-of-the-art methods that can be applied to the broad problem of understanding, characterizing, and measuring shape. He has a gift for finding the kernel of a particular algorithm, explaining it in simple terms, then giving concrete examples that are easily understood. His perspective comes from solving real-world problems and separating out what works in practice from what is just an abstract curiosity." —Tom Malzbender, Hewlett-Packard Laboratories, Palo Alto, California, USA Useful for those working in fields including industrial quality control, research, and security applications, Measuring Shape is a handbook for the practical application of shape measurement. Covering a wide range of shape measurements likely to be encountered in the literature and in software packages, this book presents an intentionally diverse set of examples that illustrate and enable readers to compare methods used for measurement and quantitative description of 2D and 3D shapes. It stands apart through its focus on examples and applications, which help readers quickly grasp the usefulness of presented techniques without having to approach them through the underlying mathematics. An elusive concept, shape is a principal governing factor in determining the behavior of objects and structures. Essential to recognizing and classifying objects, it is the central link in manmade and natural processes. Shape dictates everything from the stiffness of a construction beam, to the ability of a leaf to catch water, to the marketing and packaging of consumer products. This book emphasizes techniques that are quantitative and produce a meaningful yet compact set of numerical values that can be used for statistical analysis, comparison, correlation, classification, and identification. Written by two renowned authors from both industry and academia, this resource explains why users should select a particular method, rather than simply discussing how to use it. Showcasing each process in a clear, accessible, and well-organized way, they explore why a particular one might be appropriate in a given situation, yet a poor choice in another. Providing extensive examples, plus full mathematical descriptions of the various measurements involved, they detail the advantages and limitations of each method and explain the ways they can be implemented to discover important correlations between shape and object history or behavior. This uncommon assembly of information also includes sets of data on real-world objects that are used to compare the performance and utility of the various presented approaches.

Field-Coupled Nanocomputing: Paradigms, Progress, and Perspectives (Lecture Notes in Computer Science #8280)

by Neal G. Anderson and Sanjukta Bhanja

Field-coupled nanocomputing (FCN) paradigms offer fundamentally new approaches to digital information processing that do not utilize transistors or require charge transport. Information transfer and computation are achieved in FCN via local field interactions between nanoscale building blocks that are organized in patterned arrays. Several FCN paradigms are currently under active investigation, including quantum-dot cellular automata (QCA), molecular quantum cellular automata (MQCA), nanomagnetic logic (NML), and atomic quantum cellular automata (AQCA). Each of these paradigms has a number of unique features that make it attractive as a candidate for post-CMOS nanocomputing, and each faces critical challenges to realization.This State-of-the-Art-Survey provides a snapshot of the current developments and novel research directions in the area of FCN. The book is divided into five sections. The first part, Field-Coupled Nanocomputing Paradigms, provides valuable background information and perspectives on the QDCA, MQCA, NML, and AQCA paradigms and their evolution. The second section, Circuits and Architectures, addresses a wide variety of current research on FCN clocking strategies, logic synthesis, circuit design and test, logic-in-memory, hardware security, and architecture. The third section, Modeling and Simulation, considers the theoretical modeling and computer simulation of large FCN circuits, as well as the use of simulations for gleaning physical insight into elementary FCN building blocks. The fourth section, Irreversibility and Dissipation, considers the dissipative consequences of irreversible information loss in FCN circuits, their quantification, and their connection to circuit structure. The fifth section, The Road Ahead: Opportunities and Challenges, includes an edited transcript of the panel discussion that concluded the FCN 13 workshop.

Contemporary Artificial Intelligence (Chapman And Hall/crc Artificial Intelligence And Robotics Ser.)

by Richard E. Neapolitan

The notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures

Artificial Intelligence: With an Introduction to Machine Learning (Second Edition) (Chapman & Hall/CRC Artificial Intelligence and Robotics Series)

by Richard E. Neapolitan Xia Jiang

The first edition of this popular textbook, Contemporary Artificial Intelligence, provided an accessible and student friendly introduction to AI. This fully revised and expanded update, Artificial Intelligence: With an Introduction to Machine Learning, Second Edition, retains the same accessibility and problem-solving approach, while providing new material and methods. The book is divided into five sections that focus on the most useful techniques that have emerged from AI. The first section of the book covers logic-based methods, while the second section focuses on probability-based methods. Emergent intelligence is featured in the third section and explores evolutionary computation and methods based on swarm intelligence. The newest section comes next and provides a detailed overview of neural networks and deep learning. The final section of the book focuses on natural language understanding. Suitable for undergraduate and beginning graduate students, this class-tested textbook provides students and other readers with key AI methods and algorithms for solving challenging problems involving systems that behave intelligently in specialized domains such as medical and software diagnostics, financial decision making, speech and text recognition, genetic analysis, and more.

Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

by Nearchos Nearchou

Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threatsKey FeaturesGet up to speed with the ins and outs of cybercriminal activity on the dark webBecome familiar with the tools and techniques that are used to fight serious crimeGain a keen understanding of the crime ecosystem on the dark web and the best practices to keep it in checkBook DescriptionIn today's world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you.Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you'll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist.This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you'll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you'll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you'll be well prepared to begin your pushback against the criminal elements of the dark web.What you will learnUnderstand the history of cybercrime, the dark web, and the use of TorDiscover the ecosystem of dark web drug marketsBecome familiar with the methods law enforcement use to stop child abusersDive deep into real-life human trafficking cases and how they were tackledExplore sting operations, honeypots, and cybercrime prevention methodologiesGain expertise in Pipl Search, MEMEX, BITCRIME, and other anti-crime toolsInvestigate open-source intelligence and intelligence-led policingSet up a framework for disrupting organized crime on the dark webWho this book is forThis book is for aspiring cybercrime investigators, cybersecurity enthusiasts, and anyone else who is interested in learning about this dark side of the internet. The book mainly focuses on preventing crimes on the dark web and is written in a simple way so that you can understand it with ease.

Grundkurs Künstliche Intelligenz: Eine praxisorientierte Einführung

by Bernhard Nebel Wolfgang Ertel Wolfgang Bibel Rudolf Kruse

Alle Teilgebiete der KI werden mit dieser Einführung kompakt, leicht verständlich und anwendungsbezogen dargestellt. Hier schreibt jemand, der das Gebiet nicht nur bestens kennt, sondern auch in der Lehre engagiert und erfolgreich vertritt. Von der klassischen Logik über das Schließen mit Unsicherheit und maschinelles Lernen bis hin zu Anwendungen wie Expertensysteme oder lernfähige Roboter. Neben dem umfassenden Einblick in dieses faszinierende Teilgebiet der Informatik gewinnen Sie vertiefte Kenntnisse, z. B. hinsichtlich wichtiger Verfahren zur Repräsentation und Verarbeitung von Wissen. Der Anwendungsbezug steht im Fokus der Darstellung. Viele Übungsaufgaben mit Lösungen sowie strukturierte Verweise auf Literatur und Ressourcen im Web ermöglichen ein effektives und kurzweiliges Selbststudium. Für die 3. Auflage ...

Persönlichkeitsschutz in Social Networks: Technische Unterstützung eines grundrechtskonformen Angebots von Social Networks (DuD-Fachbeiträge)

by Maxi Nebel

Dieses Buch befasst sich mit dem Schutz der Persönlichkeitsrechte der Nutzer von Social Networks. Es werden die Vorgaben der Datenschutz-Grundverordnung dezidiert auf Social Networks angewendet. Diese haben auf unionsrechtlicher Ebene mit dem Wirksamwerden der Datenschutz-Grundverordnung wichtige Veränderungen erfahren. Besondere Beachtung findet dabei die Verteilung der Verantwortlichkeit auf Anbieter und Nutzer, die durch die komplexen Datenverarbeitungsvorgänge in Social Networks in der Praxis sehr vielschichtig sind. Außerdem werden mithilfe der interdisziplinären Methode KORA aus verfassungsrechtlichen Vorgaben und Anforderungen rechtliche Kriterien identifiziert und organisatorische und technische Gestaltungsziele entwickelt, um eine rechtsverträgliche Systemgestaltung von Social Networks anzustoßen.Maxi Nebel ist wissenschaftliche Mitarbeiterin in der Projektgruppe verfassungsverträgliche Technikgestaltung (provet) unter der Leitung von Prof. Dr. Alexander Roßnagel am Wissenschaftlichen Zentrum für Informationstechnik-Gestaltung (ITeG) an der Universität Kassel. Sie ist Mitglied im Forum Privatheit.

Information Technologies in the Design of Aerospace Engineering (Studies in Systems, Decision and Control #507)

by Mykola Nechyporuk Volodymyr Pavlikov Dmytro Krytskyi

This book proposes a solution to the problem of incorrect use of automation tools to perform complex design work. Currently, a large number of start-up projects are non-professional design bureaus that show a huge amount of their achievements. In reality, most of these achievements burst like soap bubbles. This is due to the low-quality and inefficient use of information technology in this industry. The book highlights advanced information technologies in the fields of design, machine learning, and computer vision.

Nginx HTTP Server

by Clement Nedelcu

The book includes detailed instructions for each of the processes it describes: downloading and installing the application, configuring and using modules, and much more. It provides a step-by-step tutorial to replace your existing web server with Nginx. With commented configuration sections and in-depth module descriptions, you will be able to make the most of the performance potential offered by Nginx. By covering both early setup stages and advanced topics, this book will suit web administrators interested in solutions to optimize their infrastructure, whether they are looking into replacing existing web server software or integrating a new tool cooperating with applications already up and running. If you, your visitors, and your operating system have been disappointed by Apache, this book is exactly what you need.

Nginx HTTP Server Second Edition

by Clement Nedelcu

This tutorial book includes detailed instructions for each of the processes it describes: downloading and installing the application, configuring and using modules, and much more. It provides a step-by-step tutorial to replace your existing web server with Nginx. With commented configuration sections and in-depth module descriptions, you will be able to make the most of the performance potential offered by Nginx.By covering both early setup stages and advanced topics this book will suit web administrators interested in solutions to optimize their infrastructure, whether they are looking into replacing existing web server software or integrating a new tool cooperating with applications already up and running. If you, your visitors and your operating system have been disappointed by Apache, this book is exactly what you need.

Nginx HTTP Server - Third Edition

by Clement Nedelcu

Harness the power of Nginx to make the most of your infrastructure and serve pages faster than ever About This Book * Discover possible interactions between Nginx and Apache to get the best of both worlds * Learn to exploit the features offered by NGinx for your web applications * Get the newest techniques available, designed with the latest version in mind Who This Book Is For By covering both the early setup stages and advanced topics, this book suits web administrators who interested in solutions to optimize their infrastructure, whether you are looking into replacing your existing web server software or integrating a new tool to cooperate with applications that are already up and running. If you, your visitors, and your operating system have been disappointed by Apache, this book is exactly what you need. What You Will Learn * Get to know the basics of the Nginx configuration: syntax, structure, and semantics * Understand the advanced load balancing functionality of Nginx and the newest innovative IO mechanisms * Create virtual host configurations effortlessly * Discover all the first-party modules: how to enable, configure, and use them * Establish advanced rewrite rules with the Nginx Rewrite module * Set up Nginx to work with PHP, Python, and more via FastCGI * Configure Nginx to work as frontend for your existing HTTP server * Manipulate configuration files with ease and adapt them to various situations * Discover the common pitfalls and find out how to avoid them In Detail Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache, or stand in front of your existing infrastructure to improve its overall speed. This book is a detailed guide to setting up Nginx in different ways that correspond to actual production situations: as a standalone server, as a reverse proxy, interacting with applications via FastCGI, and more. In addition, this complete directive reference will be your best friend at all stages of the configuration and maintenance processes. This book is the perfect companion for both Nginx beginners and experienced administrators. For beginners, it will take you through the complete process of setting up this lightweight HTTP server on your system and configuring its various modules so it does exactly what you need quickly and securely. For more experienced administrators, this book provides different approaches that can help you make the most of your current infrastructure. Nginx can be employed in many situations, whether you are looking to construct an entirely new web-serving architecture or simply want to integrate an efficient tool to optimize your site loading speeds. Style and approach This tutorial-style book includes detailed instructions on each of the processes it describes, as well as step-by-step tutorials, commented configuration sections, and in-depth module descriptions, so you can make the most of the performance potential offered by Nginx.

Multi-agent Optimization: Cetraro, Italy 2014 (Lecture Notes in Mathematics #2224)

by Angelia Nedić Jong-Shi Pang Gesualdo Scutari Ying Sun Francisco Facchinei

This book contains three well-written research tutorials that inform the graduate reader about the forefront of current research in multi-agent optimization. These tutorials cover topics that have not yet found their way in standard books and offer the reader the unique opportunity to be guided by major researchers in the respective fields. Multi-agent optimization, lying at the intersection of classical optimization, game theory, and variational inequality theory, is at the forefront of modern optimization and has recently undergone a dramatic development. It seems timely to provide an overview that describes in detail ongoing research and important trends. This book concentrates on Distributed Optimization over Networks; Differential Variational Inequalities; and Advanced Decomposition Algorithms for Multi-agent Systems. This book will appeal to both mathematicians and mathematically oriented engineers and will be the source of inspiration for PhD students and researchers.

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence #1030)

by Nadia Nedjah Ahmed A. Abd El-Latif Brij B. Gupta Luiza M. Mourelle

This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!

Customizable and Adaptive Quantum Processors: Theory and Applications

by Nadia Nedjah Luiza De Macedo Mourelle

The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.

Designing with Computational Intelligence

by Nadia Nedjah Heitor Silvério Lopes Luiza de Macedo Mourelle

This book discusses a number of real-world applications of computational intelligence approaches. Using various examples, it demonstrates that computational intelligence has become a consolidated methodology for automatically creating new competitive solutions to complex real-world problems. It also presents a concise and efficient synthesis of different systems using computationally intelligent techniques.

International Conference on Cyber Security, Privacy and Networking (Lecture Notes in Networks and Systems #599)

by Nadia Nedjah Gregorio Martínez Pérez B. B. Gupta

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09–11, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Stochastic Approaches to Electron Transport in Micro- and Nanostructures (Modeling and Simulation in Science, Engineering and Technology)

by Mihail Nedjalkov Ivan Dimov Siegfried Selberherr

The book serves as a synergistic link between the development of mathematical models and the emergence of stochastic (Monte Carlo) methods applied for the simulation of current transport in electronic devices. Regarding the models, the historical evolution path, beginning from the classical charge carrier transport models for microelectronics to current quantum-based nanoelectronics, is explicatively followed. Accordingly, the solution methods are elucidated from the early phenomenological single particle algorithms applicable for stationary homogeneous physical conditions up to the complex algorithms required for quantum transport, based on particle generation and annihilation. The book fills the gap between monographs focusing on the development of the theory and the physical aspects of models, their application, and their solution methods and monographs dealing with the purely theoretical approaches for finding stochastic solutions of Fredholm integral equations.

Power Up: Making the Shift to 1:1 Teaching and Learning

by Diana Neebe Jen Roberts

Wherever you are on the path to 1:1 teaching and learning, you need a guide that can help you make the best use of the powerful technology available in today's classrooms. In Power Up: Making the Shift to 1:1 Teaching and Learning, Diana Neebe and Jen Roberts draw on research and their extensive experience working with teachers across subject areas and grade levels to share the keys to success when teaching with a computer or tablet for every student. This is the book secondary teachers need to understand the changes in pedagogy, planning, classroom organization, time management, and collaboration that will help them be successful in a 1:1 environment. Whether providing immediate and detailed feedback to student writers, giving voice to quiet learners, or creating more time for actual work in a jam-packed school day, Neebe and Roberts show teachers how communication, differentiation, and other effective practices can be powered up with personalized technology. Throughout the book, Neebe and Roberts coach teachers through their initial concerns about technology integration, offer advice about avoiding common problems, and encourage innovation. Using detailed classroom examples, questions, and suggestions, they provide a framework for shaping the transformation of a traditional classroom into a student-centered, technology-rich learning environment. Readers will come away with a clear sense of how a fully implemented 1:1 classroom operates. Power Up makes the transition to 1:1 a manageable and exciting journey. It's a key part of supporting teachers and ensuring the success of your 1:1 program.

Disruptive Possibilities: How Big Data Changes Everything

by Jeffrey Needham

In Disruptive Possibilities: How Big Data Changes Everything i>, Jeff enlightens Fortune 500 enterprises about the Big Data ecosystem as they begin to channel their data from stranded silos into an accessible reservoir of possibility and discovery. Jeff explains where commercial supercomputing came from, where it is and its impact on the future of computing.

Building Real-Time Analytics Systems

by Mark Needham

Gain deep insight into real-time analytics, including the features of these systems and the problems they solve. With this practical book, data engineers at organizations that use event-processing systems such as Kafka, Google Pub/Sub, and AWS Kinesis will learn how to analyze data streams in real time. The faster you derive insights, the quicker you can spot changes in your business and act accordingly.Author Mark Needham from StarTree provides an overview of the real-time analytics space and an understanding of what goes into building real-time applications. The book's second part offers a series of hands-on tutorials that show you how to combine multiple software products to build real-time analytics applications for an imaginary pizza delivery service.You will:Learn common architectures for real-time analyticsDiscover how event processing differs from real-time analyticsIngest event data from Apache Kafka into Apache PinotCombine event streams with OLTP data using Debezium and Kafka StreamsWrite real-time queries against event data stored in Apache PinotBuild a real-time dashboard and order tracking appLearn how Uber, Stripe, and Just Eat use real-time analytics

Graph Algorithms: Practical Examples in Apache Spark and Neo4j

by Mark Needham Amy E. Hodler

Discover how graph algorithms can help you leverage the relationships within your data to develop more intelligent solutions and enhance your machine learning models. You’ll learn how graph analytics are uniquely suited to unfold complex structures and reveal difficult-to-find patterns lurking in your data. Whether you are trying to build dynamic network models or forecast real-world behavior, this book illustrates how graph algorithms deliver value—from finding vulnerabilities and bottlenecks to detecting communities and improving machine learning predictions.This practical book walks you through hands-on examples of how to use graph algorithms in Apache Spark and Neo4j—two of the most common choices for graph analytics. Also included: sample code and tips for over 20 practical graph algorithms that cover optimal pathfinding, importance through centrality, and community detection.Learn how graph analytics vary from conventional statistical analysisUnderstand how classic graph algorithms work, and how they are appliedGet guidance on which algorithms to use for different types of questionsExplore algorithm examples with working code and sample datasets from Spark and Neo4jSee how connected feature extraction can increase machine learning accuracy and precisionWalk through creating an ML workflow for link prediction combining Neo4j and Spark

Tiny Worlds

by Charles Needle

Successful nature photographer and lecturer Charles Needle often asks students in his workshops if they understand the difference between "looking" and "seeing". The difference he is pointing out is that while we are constantly "looking" at countless people, places and things, we might not be actually seeing what is right in front of us. Being tuned into this difference can elevate your art as a photographer, allowing you to be more in tune with your surroundings. Needle has applied this concept to his work and it shows. Utilizing macro photography to capture the nuances of the nature all around us. In this extensive handbook, Needle covers not only his philosophy for seeing and capturing nature photography but delves into the equipment he uses. Needle covers composition, flash techniques, the fundamentals of macro photography and so much more. The book features many set-up shots, equipment shots and sequential shots detailing the progression towards creating the final images. This essential text provides both the inspiration and the technique required to beautifully capture the wonders of nature.

Information-Theoretic Aspects of Neural Networks

by P. S. Neelakanta

Information theoretics vis-a-vis neural networks generally embodies parametric entities and conceptual bases pertinent to memory considerations and information storage, information-theoretic based cost-functions, and neurocybernetics and self-organization. Existing studies only sparsely cover the entropy and/or cybernetic aspects of neural information.Information-Theoretic Aspects of Neural Networks cohesively explores this burgeoning discipline, covering topics such as:Shannon information and information dynamicsneural complexity as an information processing systemmemory and information storage in the interconnected neural webextremum (maximum and minimum) information entropyneural network trainingnon-conventional, statistical distance-measures for neural network optimizationssymmetric and asymmetric characteristics of information-theoretic error-metricsalgorithmic complexity based representation of neural information-theoretic parametersgenetic algorithms versus neural informationdynamics of neurocybernetics viewed in the information-theoretic planenonlinear, information-theoretic transfer function of the neural cellular unitsstatistical mechanics, neural networks, and information theorysemiotic framework of neural information processing and neural information flowfuzzy information and neural networksneural dynamics conceived through fuzzy information parametersneural information flow dynamicsinformatics of neural stochastic resonanceInformation-Theoretic Aspects of Neural Networks acts as an exceptional resource for engineers, scientists, and computer scientists working in the field of artificial neural networks as well as biologists applying the concepts of communication theory and protocols to the functioning of the brain. The information in this book explores new avenues in the field and creates a common platform for analyzing the neural complex as well as artificial neural networks.

A Textbook on ATM Telecommunications: Principles and Implementation

by P. S. Neelakanta

With quantum leaps in science and technology occurring at breakneck speed, professionals in virtually every field face a daunting task-practicing their discipline while keeping abreast of new advances and applications in their filed. In no field is this more applicable than in the rapidly growing field of telecommunications engineering. Practicing engineers who work with ATM technology on a daily basis must not only keep their skill sharp in areas such as ATM network interfaces, protocols, and standards, but they must also stay informed, about new classes of ATM applications.A Textbook on ATM Telecommunications gives active telecommunications engineers the advantage they need to stay sharp in their field. From the very basics of ATM to state-of-the-art applications, it covers the gamut of topics related to this intriguing switching and multiplexing strategy. Starting with an introduction to telecommunications, this text combines the theory underlying broadband communications technology with applied practical instruction and lessons gleaned from industry. The author covers fundamental communications and network theory, followed by applied ATM networking. Each chapter includes design exercises as well as worked examples .A Textbook on ATM Telecommunications includes examples of design and implementation-making it an ideal took for both aspiring and practicing telecommunication professionals.Features

Refine Search

Showing 34,051 through 34,075 of 53,398 results