03573 am 22006013u 450 991034295060332120170822104946.00-429-15871-81-4822-4185-410.1201/b17672 (CKB)2670000000567680(EBL)1718098(SSID)ssj0001368789(PQKBManifestationID)11710371(PQKBTitleCode)TC0001368789(PQKBWorkID)11279907(PQKB)11040146(MiAaPQ)EBC1718098(OCoLC)894169875(ScCtBLL)c9f86657-886b-4de2-9ff9-3345dcfbd8f1(EXLCZ)99267000000056768020180331h20152015 uy 0engur|n|---|||||txtccrSignal processing a mathematical approach /Charles L. Byrne, University of Massachusetts Lowell, Lowell, Massachusetts, USA2nd ed.Boca Raton :CRC Press, Taylor & Francis Group,[2015]©20151 online resource (436 p.)Monographs and research notes in mathematicsA Chapman and Hall book.1-4398-6567-1 1-322-63845-4 1-4822-4184-6 Includes bibliographical references and index.Front Cover; Signal Processing: A Mathematical Approach, Second Edition; MONOGRAPHS AND RESEARCH NOTES IN MATHEMATICS; Dedication; Contents; Preface; Chapter 1 Introduction; Chapter 2 Fourier Series and Fourier Transforms; Chapter 3 Remote Sensing; Chapter 4 Finite-Parameter Models; Chapter 5 Transmission and Remote Sensing; Chapter 6 The Fourier Transform and Convolution Filtering; Chapter 7 Infinite Sequences and Discrete Filters; Chapter 8 Convolution and the Vector DFT; Chapter 9 Plane-Wave Propagation; Chapter 10 The Phase Problem; Chapter 11 Transmission TomographyChapter 12 Random SequencesChapter 13 Nonlinear Methods; Chapter 14 Discrete Entropy Maximization; Chapter 15 Analysis and Synthesis; Chapter 16 Wavelets; Chapter 17 The BLUE and the Kalman Filter; Chapter 18 Signal Detection and Estimation; Chapter 19 Inner Products; Chapter 20 Wiener Filtering; Chapter 21 Matrix Theory; Chapter 22 Compressed Sensing; Chapter 23 Probability; Chapter 24 Using the Wave Equation; Chapter 25 Reconstruction in Hilbert Space; Chapter 26 Some Theory of Fourier Analysis; Chapter 27 Reverberation and Echo Cancellation; Bibliography; Back CoverSignal Processing: A Mathematical Approach is designed to show how many of the mathematical tools the reader knows can be used to understand and employ signal processing techniques in an applied environment. Assuming an advanced undergraduate- or graduate-level understanding of mathematics-including familiarity with Fourier series, matrices, probability, and statistics-this Second Edition: Contains new chapters on convolution and the vector DFT, plane-wave propagation, and the BLUE and Kalman filtersExpands the material on Fourier analysis to three new chapters to provide additional backgroundMonographs and research notes in mathematics.Signal processingMathematicsElectronic books.Signal processingMathematics.621.38220151Byrne Charles L.1947,972870FlBoTFGFlBoTFGBOOK9910342950603321Signal processing2213201UNINA07764nam 2200637 450 99646609740331620220420122049.03-540-75101-710.1007/978-3-540-75101-4(CKB)1000000000490430(SSID)ssj0000316887(PQKBManifestationID)11238017(PQKBTitleCode)TC0000316887(PQKBWorkID)10292677(PQKB)10944630(DE-He213)978-3-540-75101-4(MiAaPQ)EBC3062798(MiAaPQ)EBC6691600(Au-PeEL)EBL6691600(PPN)123165202(EXLCZ)99100000000049043020220420d2007 uy 0engurnn|008mamaatxtccrComputer safety, reliability, and security 26th international conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007 : proceedings /Francesca Saglietti, Norbert Oster (editors)1st ed. 2007.Berlin, Germany ;New York, New York :Springer,[2007]©20071 online resource (XV, 548 p.) Programming and Software Engineering ;4680Bibliographic Level Mode of Issuance: Monograph3-540-75100-9 Includes bibliographical references and index.Safety Cases -- Establishing Evidence for Safety Cases in Automotive Systems – A Case Study -- Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety -- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety -- Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessment -- Modelling Interdependencies Between the Electricity and Information Infrastructures -- Poster Session 1 -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security Environments -- Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems -- RAMSS Analysis for a Co-operative Integrated Traffic Management System -- Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake System -- Compositional Temporal Fault Tree Analysis -- Representing Parameterised Fault Trees Using Bayesian Networks -- Human Error Analysis Based on a Semantically Defined Cognitive Pilot Model -- Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About Safety -- Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial Automation -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches -- Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case Study -- A Concept for a Safe Realization of a State Machine in Embedded Automotive Applications -- Safety Demonstration and Software Development -- Improving Test Coverage for UML State Machines Using Transition Instrumentation -- Verification of Distributed Applications -- Analysis of Combinations of CRC in Industrial Communication -- A Comparison of Partitioning Operating Systems for Integrated Systems -- Software Encoded Processing: Building Dependable Systems with Commodity Hardware -- Reliability Modeling for the Advanced Electric Power Grid -- Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection Relay -- A Reliability Evaluation of a Group Membership Protocol -- Poster Session 3 -- Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity -- A Tool for Network Reliability Analysis -- DFT and DRBD in Computing Systems Dependability Analysis -- Development of Model Based Tools to Support the Design of Railway Control Applications -- Formal Specification and Analysis of AFDX Redundancy Management Algorithms -- Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts -- Using Deductive Cause-Consequence Analysis (DCCA) with SCADE -- Experimental Assessment of Astrée on Safety-Critical Avionics Software -- Detection of Runtime Errors in MISRA C Programs: A Deductive Approach -- A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety Requirements -- Controller Architecture for Safe Cognitive Technical Systems -- Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical Software.Since 1979, when it was ?rst established by the Technical Committee on Re- ability, Safety and Security of the European Workshop on Industrial Computer Systems (EWICS TC7), the SAFECOMP Conference series has regularly and continuously contributed to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied to safety-relevant industrial domains. Inthisexpandingtechnical?eldSAFECOMPo?ersaplatformforknowledge andtechnologytransferbetweenacademia,industry,researchandlicensingins- tutions, providing ample opportunities for exchanging insights, experiences and trends in the areas of safety, reliability and security regarding critical computer applications. In accordance with the growing spread of critical infrastructures involving both safety and security threats, this year’s SAFECOMP program included a considerable number of contributions addressing technical problems and engineering solutions across the border between safety-related and securi- related concerns. Thereactiontoourcallforpaperswasparticularlygratifyingandimpressive, including 136 full papers submitted by authors representing 29 countries from Europe,Asia, North and South America aswell asAustralia. The selection of 33 fullpapersand16shortpapersforpresentationandpublicationwasachallenging task requiring a huge amount of reviewing and organizational e?ort. In view of the particularly high number of articles submitted, obvious practical constraints led – to our regret – to the rejection of a considerable amount of high-quality work. To all authors, invited speakers, members of the International Program Committee and external reviewers go our heartfelt thanks! The local organization of SAFECOMP 2007, hosted in Nuremberg, is also gratefully acknowledged.Programming and Software Engineering ;4680Computer softwareReliabilityCongressesIndustrial safetyCongressesComputer securityCongressesComputer softwareReliabilityIndustrial safetyComputer security005.8Oster NorbertSaglietti F(Francesca),SAFECOMP 2007MiAaPQMiAaPQMiAaPQBOOK996466097403316Computer Safety, Reliability, and Security2175020UNISA