Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Signal Processing Using MATLAB and Wavelets (Electrical Engineering)

Buy
Although DSP has long been considered an EE topic, recent developments have also generated significant interest from the computer science community. DSP applications in the consumer market, such as bioinformatics, the MP3 audio format, and MPEG-based cable/satellite television have fueled a desire to understand this technology outside of hardware circles. Designed for upper division engineering and computer science students as well as practicing engineers, Digital Signal Processing Using Matlab and Wavelets emphasizes the practical applications of signal processing. Over 100 Matlab projects and wavelet techniques provide the latest applications of DSP, including image processing, games, filters, transforms, networking, parallel processing, and sound. The book also provides the mathematical processes and techniques needed to ensure an understanding of DSP theory. Designed to be incremental in difficulty, the book will benefit readers who are unfamiliar with complex mathematical topics or those limited in programming experience. Beginning with an introduction to Matlab programming, it moves through filters, sinusoids, sampling, the Fourier transform, the Z transform and other key topics. An entire chapter is dedicated to the discussion of wavelets and their applications. A CD-ROM (platform independent) accompanies the book and contains source code, projects, and Microsoft® PowerPoint slides.

About the Author

Michael Weeks is an associate professor at Georgia State University where he teaches courses in Digital Signal Processing. He holds a PhD in computer engineering from University of Louisiana and has authored or co-authored numerous journal and conference papers
(HTML tags aren't allowed.)

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Foundations in Evolutionary Cognitive Neuroscience
Foundations in Evolutionary Cognitive Neuroscience
This book is an introduction to the emerging field of evolutionary cognitive neuroscience, a branch of neuroscience that combines the disciplines of evolutionary psychology and cognitive neuroscience. It outlines the application of cognitive neuroscientific methods (e.g., functional magnetic resonance imaging, transcranial magnetic stimulation,...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...

VMware vSphere Performance: Designing CPU, Memory, Storage, and Networking for Performance-Intensive Workloads
VMware vSphere Performance: Designing CPU, Memory, Storage, and Networking for Performance-Intensive Workloads

Covering the latest VMware vSphere software, an essential book aimed at solving vSphere performance problems before they happen

VMware vSphere is the industry's most widely deployed virtualization solution. However, if you improperly deploy vSphere, performance problems occur. Aimed at VMware administrators and engineers...

Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Windows 95 System Programming Secrets
Windows 95 System Programming Secrets
This is no mere "How do I write a Windows 95 app?" manual. Windows 95 System Programming SECRETS reveals the hard-core technical information you need to know in order to tap the true power of 32-bit programming for Windows 95. Written for the programmer who's done at least some Windows 3.x programming,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy