By Зайдлер Ежи, Перевод с польского А.С.Трусова и А.И.Юдицкого. Под редакцией Б.Р.Левина.
ISBN-10: 9048194849
ISBN-13: 9789048194841
ISBN-10: 9048194857
ISBN-13: 9789048194858
КРАТКОЕ ОГЛАВЛЕНИЕ: Из предисловия автора к первому изданию (3). Предисловие автора ко второму изданию (6). Предисловие автора к русскому переводу (8). Глава 1. Системы передачи дискретной информации (10). Глава 2. Оптимизация систем передачи дискретной информации (73). Глава three. Общие свойства линейных кодов (107). Глава four. Циклические коды (133). Глава five. Мажоритарное декодирование (165). Глава 6. Рекуррентные коды (179). Глава 7. Общие свойства систем с непрерывными каналами (209). Глава eight. Оптимальные системы с непрерывными каналами (239). Глава nine. Системы с решающей обратной связью (291). Глава 10. Системы с информационной обратной связью (358). Глава eleven. Системы со многими доступами (408). Список литературы (492). Список принятых обозначений (496). Приложение (499). Предметный указатель (502). Аннотация издательства: Монография посвящена вопросам теории систем передачи дискретной информации, которые приобретают все большее практическое значение в связи с возрастающим использованием цифровых электронных вычислительных машин. Рассматриваются принципы функционирования таких систем, вопросы оптимизации процессов передачи и приема сообщений. Дано систематическое изложение теории линейных, циклических и рекуррентных кодов, ортогональных, трансортогональных и биортогональных сигналов. Рассмотрены вопросы теории оптимального и субоптимального приема с простой реализацией, а также теории систем с обратной связью и систем со многими доступами. Книга предназначена для научных работников, а также для инженеров-разработчиков систем связи.
Read Online or Download Системы передачи дискретной информации. (Systemy przesylania informacji cyfrowych, 1976) PDF
Best computers books
New PDF release: Applied Network Security Monitoring: Collection, Detection,
Utilized community safety Monitoring is the fundamental consultant to changing into an NSM analyst from the floor up. This publication takes a primary method, entire with real-world examples that train you the most important ideas of NSM.
community safety tracking relies at the precept that prevention ultimately fails. within the present hazard panorama, regardless of how a lot you are trying, influenced attackers will finally locate their method into your community. At that time, your skill to become aware of and reply to that intrusion may be the adaptation among a small incident and a huge disaster.
The booklet follows the 3 levels of the NSM cycle: assortment, detection, and research. As you move via each one part, you've got entry to insights from professional NSM pros whereas being brought to correct, functional wisdom that you should observe immediately.
• Discusses the correct tools for making plans and executing an NSM info assortment method
• presents thorough hands-on assurance of chuckle, Suricata, Bro-IDS, SiLK, PRADS, and extra
• the 1st booklet to outline a number of research frameworks that may be used for acting NSM investigations in a based and systematic demeanour
• Loaded with functional examples that utilize the protection Onion Linux distribution
• spouse site comprises up to date blogs from the authors in regards to the most recent advancements in NSM, whole with supplementary ebook fabrics
If you've by no means played NSM analysis, Applied community defense Monitoring will assist you grab the middle recommendations had to turn into an efficient analyst. while you are already operating in an research position, this publication will let you refine your analytic approach and raise your effectiveness.
you'll get stuck off protect, you can be blind sided, and infrequently you are going to lose the struggle to avoid attackers from having access to your community. This ebook is set equipping you with the appropriate instruments for amassing the information you would like, detecting malicious job, and performing the research to help you comprehend the character of an intrusion. even supposing prevention can ultimately fail, NSM doesn't have to.
** word: All writer royalties from the sale of utilized NSM are being donated to a few charities chosen by means of the authors.
New PDF release: TCP/IP Foundations
The area of it really is consistently evolving, yet in each quarter there are sturdy, center recommendations that anybody simply starting off had to be aware of final yr, must understand this 12 months, and should nonetheless want to know subsequent yr. the aim of the rules sequence is to spot those recommendations and current them in a manner that offers you the most powerful attainable start line, it doesn't matter what your exercise.
Read e-book online The Metafontbook PDF
METAFONT is a process for the layout of symbols and alphabetic characters suited for raster-based units that print or reveal textual content. the development of a typeface is an artwork shape and this guide is written for those that desire to improve the standard of mathematical typesetting. The METAFONTbook permits readers, with purely minimum machine technological know-how or be aware processing adventure, to grasp the fundamental in addition to the extra complicated beneficial properties of METAFONT programming.
New PDF release: Computer Science Logic: 18th International Workshop, CSL
This ebook constitutes the refereed court cases of the 18th foreign Workshop on desktop technology good judgment, CSL 2004, held because the thirteenth Annual convention of the EACSL in Karpacz, Poland, in September 2004. The 33 revised complete papers offered including five invited contributions have been rigorously reviewed and chosen from 88 papers submitted.
- Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks
- Good Faith Collaboration: The Culture of Wikipedia (History and Foundations of Information Science)
- Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
- Believable Bots: Can Computers Play Like People?
- Transactions on Rough Sets IV
- Flex & Bison: Text Processing Tools
Extra resources for Системы передачи дискретной информации. (Systemy przesylania informacji cyfrowych, 1976)
Sample text
This international conference, the first meeting of the Association of Internet Researchers, will focus on the internet as a distinct interdisciplinary field for research. A very common part of this process of academic formalization rests in simply demarcating your particular areas of specialization – saying what it is that you are mainly interested in. The truth of the matter is that no one can do everything – even though some try hard to. This is why we’ve spent some time defining CMC in this first unit.
G. g. Flash) are used to write (or ‘build’) much more elaborate webpages which contain graphic, audio and video files adding movement and sound to written text. Importantly – and this has been stressed time and again by CMC scholars – the internet and the web are not technically synonymous. Strictly speaking, the web is a technology within a technology; it is just one part of the internet which also hosts the transfer of other types of documents or files, the best examples of which are emails and discussion group postings.
Almost everything nowadays involves computers in some way or other, and, consequently, almost everything we do is in some way or other mediated by computers. Think, for example, of the digital technology which drives our telephone exchanges, brings television channels into our homes, tells us the time, and so on. What’s more, with such things as video conferencing, webcams and voice recognition, technological changes are taking us nearer and nearer to the kind of face-to-face (or just FtF) communication we’ve been used to all along.
Системы передачи дискретной информации. (Systemy przesylania informacji cyfrowych, 1976) by Зайдлер Ежи, Перевод с польского А.С.Трусова и А.И.Юдицкого. Под редакцией Б.Р.Левина.
by Charles
4.4