The advent of the internet age has produced enormous demand for in creased storage capacity and for the consequent increases in the amount of information that can be stored in a small space. While physical and m...
详细信息
ISBN:
(数字)9781461545651
ISBN:
(纸本)9780792377177;9781461370611
The advent of the internet age has produced enormous demand for in creased storage capacity and for the consequent increases in the amount of information that can be stored in a small space. While physical and media improvements have driven the majority of improvement in modern storage systems, signal processing and coding methods have increasing ly been used to augment those improvements. Run-length-limited codes and partial-response detection methods have come to be the norm in an industry that once rejected any sophistication in the read or write pro cessing circuits. VLSI advances now enable increasingly sophisticated signal processing methods for negligible cost and complexity, a trend sure to continue even as disk access speeds progress to billions of bits per second and terabits per square inch in the new millennium of the in formation age. This new book representing the Ph. D. dissertation work of Stanford's recent graduate Dr. Zining Wu is an up-to-date and fo cused review of the area that should be of value to those just starting in this area and as well those with considerable expertise. The use of saturation recording, i. e. the mandated restriction of two-level inputs, creates interesting twists on the use of communica tion/transmission methods in recording.
provides a link between the technology and the application worlds. As speech recognition technology is now good enough for a number of applications and the core technology is well established around hidden Markov m...
详细信息
ISBN:
(数字)9780306470271
ISBN:
(纸本)9780792378730;9781475773408
provides a link between the technology and the application worlds. As speech recognition technology is now good enough for a number of applications and the core technology is well established around hidden Markov models many of the differences between systems found in the field are related to implementation variants. We distinguish between embedded systems and PC-based applications. Embedded applications are usually cost sensitive and require very simple and optimized methods to be viable.;reviews the problems of robust speech recognition, summarizes the current state of the art of robust speech recognition while providing some perspectives, and goes over the complementary technologies that are necessary to build an application, such as dialog and user interface technologies.;is divided into five chapters. The first one reviews the main difficulties encountered in automatic speech recognition when the type of communication is unknown. The second chapter focuses on environment-independent/adaptive speech recognition approaches and on the mainstream methods applicable to noise robust speech recognition. The third chapter discusses several critical technologies that contribute to making an application usable. It also provides some design recommendations on how to design prompts, generate user feedback and develop speech user interfaces. The fourth chapter reviews several techniques that are particularly useful for embedded systems or to decrease computational complexity. It also presents some case studies for embedded applications and PC-based systems. Finally, the fifth chapter provides a future outlook for robust speech recognition, emphasizing the areas that the author sees as the most promising for the future.;serves as a valuable reference and although not intended as a formal University textbook, contains some material that can be used for a course at the graduate or undergraduate level. It is a good complement for the book entitled;co
Current database technology and computer hardware allow us to gather, store, access, and manipulate massive volumes of raw data in an efficient and inexpensive manner. In addition, the amount of data collected and ...
ISBN:
(数字)9780306469916
ISBN:
(纸本)9780792372431
Current database technology and computer hardware allow us to gather, store, access, and manipulate massive volumes of raw data in an efficient and inexpensive manner. In addition, the amount of data collected and warehoused in all industries is growing every year at a phenomenal rate. Nevertheless, our ability to discover critical, non-obvious nuggets of useful information in data that could influence or help in the decision making process, is still limited. Knowledge discovery (KDD) and Data Mining (DM) is a new, multidisciplinary field that focuses on the overall process of information discovery from large volumes of data. The field combines database concepts and theory, machine learning, pattern recognition, statistics, artificial intelligence, uncertainty management, and high-performance computing. To remain competitive, businesses must apply data mining techniques such as classification, prediction, and clustering using tools such as neural networks, fuzzy logic, and decision trees to facilitate making strategic decisions on a daily basis. Knowledge Discovery for Business Information Systems contains a collection of 16 high quality articles written by experts in the KDD and DM field from the following countries: Austria, Australia, Bulgaria, Canada, China (Hong Kong), Estonia, Denmark, Germany, Italy, Poland, Singapore and USA.
From the Publisher: Architecture and CAD for Deep-Submicron FPGAs addresses several key issues in the design of high-performance FPGA architectures and CAD tools, with particular emphasis on issues that are important ...
ISBN:
(纸本)0792384601;9780792384601
From the Publisher: Architecture and CAD for Deep-Submicron FPGAs addresses several key issues in the design of high-performance FPGA architectures and CAD tools, with particular emphasis on issues that are important for FPGAs implemented in deep-submicron processes. Three factors combine to determine the performance of an FPGA: the quality of the CAD tools used to map circuits into the FPGA, the quality of the FPGA architecture, and the electrical (i.e. transistor-level) design of the FPGA. Architecture and CAD for Deep-Submicron FPGAs examines all three of these issues in concert.
From the Publisher: The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connec...
ISBN:
(纸本)0792386752;9780792386759
From the Publisher: The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g. adding a signature to an electronic document. Cryptology addresses the above issues -- it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. Basic Concepts in Cryptology serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers. The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure. Basic Concepts in Cryptology is an updated and improved version of An Introduction to Cryptology , originally published in 1988. Apartfrom a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. In addition, the book is accompanied by a full text electronic version on CD-ROM as an interactive Mathematica manuscript. Basic Concepts
From the Publisher: Wireless Location in CDMA Cellular Radio Systems investigates methods for wireless location in CDMA networks and analyzes their performances. Techniques for measuring location parameters (AoAs, ToA...
ISBN:
(纸本)9780792377030;0792377036
From the Publisher: Wireless Location in CDMA Cellular Radio Systems investigates methods for wireless location in CDMA networks and analyzes their performances. Techniques for measuring location parameters (AoAs, ToAs, etc.) are presented along with algorithms for calculating position from those parameters. Several impairments to accurate location are covered and analyzed including multipath propagation, non-line-of-sight propagation, and multiple-access interference. Many of the topics in this book are also applicable to FDMA- and TDMA-based communication networks.
暂无评论