New advancement in FPGA-DSP technology demands a new number system as well as a new data treatment that best utilizes the strengths and avoid the shortcomings of the new technology. To achieve this goal, here we intro...
详细信息
ISBN:
(纸本)0769521088
New advancement in FPGA-DSP technology demands a new number system as well as a new data treatment that best utilizes the strengths and avoid the shortcomings of the new technology. To achieve this goal, here we introduce a customized floating-point number system that it can be reformatted as a fixed-point number when needed. In addition, a scheme is, proposed for the use of both formats in DSP applications, such as in digital filter design.
The paper discusses a technique for on-line compression of ASCII files. There is a need for fast compression technique that can also produce no overhead data, and with a set amount of. memory. Current text compression...
详细信息
ISBN:
(纸本)0769521088
The paper discusses a technique for on-line compression of ASCII files. There is a need for fast compression technique that can also produce no overhead data, and with a set amount of. memory. Current text compression methods are possibly far superior with some of the characteristics, but none meet all of these needs. The proposed compression scheme uses multiple static dictionaries and a pre-generated variable length code. The method compresses text files of various sizes to approximately 60 percent of their original size.
AI techniques have been applied in games since the beginning of the field. Fuzzy measures and fuzzy integrals, a powerful tool for decision making, have potentiality in games for the evaluation of strategies. In this ...
详细信息
ISBN:
(纸本)0769521088
AI techniques have been applied in games since the beginning of the field. Fuzzy measures and fuzzy integrals, a powerful tool for decision making, have potentiality in games for the evaluation of strategies. In this paper we will explore the use of such soft computing techniques and show their interest in decision making and modeling auctions. The paper describes the role of fuzzy measures and integrals in decision making and reviews some computational aspects that are important for the application of such methods in real applications. The paper also gives a short overview on the methods for learning the parameters for these integrals from examples.
This paper makes recommendations about teaching online professional courses to students lacking relevant professional experience. The course was on ethics and professional writing. Students substituted personal ethics...
详细信息
ISBN:
(纸本)0769521088
This paper makes recommendations about teaching online professional courses to students lacking relevant professional experience. The course was on ethics and professional writing. Students substituted personal ethics for professional ethics and relied on the skills they had in textual explication and narrative development to defend personal judgments. Instead of putting greater emphasis on theory and formal analysis, the author recommends simulating the experience of professional writing by relying on case study methods, peer critiques, and Internet resources, such as discussion boards where professional writers gossip, complain, and argue about their professional experience.
Current business presentations are commonly multimedia-based and with the realization of the mobile enterprise, accessing of such presentations stored on servers from mobile devices will become increasingly common. Ho...
详细信息
ISBN:
(纸本)0769521088
Current business presentations are commonly multimedia-based and with the realization of the mobile enterprise, accessing of such presentations stored on servers from mobile devices will become increasingly common. However as a roaming mobile device user moves, factors that change include the local wireless network technology, the available bandwidth, the currently closest source of the media files and even the continuity of wireless access. The XML-based standard, Synchronized Multimedia Integration Language (SMIL), provides a format to specify the display sequence and layout of media files in a multimedia presentation. In this paper we present a SMIL-based system for mobile devices that is able to dynamically adapt presentations in response to such changing mobile computing-related factors as those given above.
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Mi...
详细信息
ISBN:
(纸本)0769521088
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Microsoft Corp. recently offered a completely new development platform, named .NET Framework, which contains new and innovative idea considering software security issues and easy-to-use toolset to build highly customized and secure distributed business applications. As .NET Framework reliefs developers from writing huge lines of code and making complicated security decisions, it can be the best and intelligent choice for the software engineers and architects of Bangladesh.
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establis...
详细信息
ISBN:
(纸本)0769521088
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establish such properties for a composed application in a ubiquitous environment. The framework accounts for the need to establish the properties of individual components, and draws on composition results in order to establish overall properties for composed applications. The framework utilises XML composition templates to provide extensibility, so that new composition results will further enhance its effectiveness.
The application of information technologies (IT) to government services is termed electronic government (e-government). The drive to implement e-government is a global phenomenon. This research is concerned about the ...
详细信息
ISBN:
(纸本)0769521088
The application of information technologies (IT) to government services is termed electronic government (e-government). The drive to implement e-government is a global phenomenon. This research is concerned about the application of IT for online education and training (also known as, e-learning) for government employees and citizens. A summary review of the latest technological developments and practices in e-learning have been provided to help the professionals, managers, and policy makers of both profit and nonprofit organizations to identify the areas of IT they can invest to bring about efficiency and cost savings in continuous education and training. The research also identifies several research projects within the area to further advance the field.
A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data colle...
详细信息
ISBN:
(纸本)0769521088
A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data collected from various ubiquitous sensors are used in recognizing and defining contexts, and association rules determine the routines. The focus is on testing the suitability of the Apriori algorithm for this application area. Several useful routines were derived from the user data, and the results show that data mining can be utilized in pervasive computing.
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrat...
详细信息
ISBN:
(纸本)0769521088
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrates them into an autonomic middleware component. Agents grouped into distributed communities act as mediators between users, devices, and network resources. Communicating between each other they make decisions on whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.
暂无评论