by Reza Adhami, Peter M. Meenen, III, and Dennis Hite


In many cases, the beginning engineering student is thrown into upper-level engineering courses without an adequate introduction to the basic material. This, at best, causes undue stress on the student as they feel unprepared when faced with unfamiliar material, and at worst, results in students dropping out of the program or changing majors when they discover that their chosen field of engineering is not what they thought it was. The purpose of this text is to introduce the student to a general cross-section of the field of electrical and computer engineering. The text is aimed at incoming freshmen, and as such, assumes that the reader has a limited to nonexistent background in electrical engineering and knowledge of no more than pre-calculus in the field of mathematics. By exposing s...

BASCOM Programming of Microcontrollers with Ease

An Introduction by Program Examples

by Claus Kuhnel


BASCOM-8051 and BASCOM-AVR are development environments built around a powerful BASIC compiler. Both are suited for project handling and program development for the 8051 family and its derivatives as well as for the AVR microcontrollers from Atmel. Click here to preview the first 25 pages in Acrobat PDF format.

TCP/IP - The Ultimate Protocol Guide

Complete 2 Volume Set

by Philip M. Miller


This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Sectio...

TCP/IP - The Ultimate Protocol Guide

Volume 1 - Data Delivery and Routing

by Philip M. Miller


The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section C: Reliable and Unreliable Data Delivery Section D: Quality of Service ...

TCP/IP - The Ultimate Protocol Guide

Volume 2 - Applications, Access and Data Security

by Philip M. Miller


The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section C: Reliable and Unreliable Data Delivery Section D: Quality of Service S...

by Derman Akgol & Mehmet Fatih Akay (advisor)


The purpose of this thesis is to forecast the amount of network traffic in Transmission Control Protocol/Internet Protocol (TCP/IP) -based networks by using different time lags and various machine learning methods including Support Vector Machines (SVM), Multilayer Perceptron (MLP), Radial Basis Function (RBF) Neural Network, M5P (a decision tree with linear regression functions at the nodes), Random Forest (RF), Random Tree (RT), and Reduced Error Prunning Error (REPTree), and statistical regression methods including Multiple Linear Regression (MLR) and Holt-Winters and compare the performance of statistical and machine learning methods. Two different Internet Service Providers' (ISPs) traffic data have been utilized to build traffic forecasting models. The first 66% of the data sets has ...


How to Avoid Becoming a Victim

by H. Thomas Milhorn, MD, PhD


Cybercrime: How to Avoid Becoming a Victim is a nuts and bolts, how-to guide for the typical home-computer user. It addresses the various crimes being committed via the Internet and gives instructions on how to avoid becoming a victim of each. The chapters dealing with individual cybercrimes are laid out in a format consisting of a discussion of the basics of the crime, followed by real-life examples of the particular crime, and then things computer users can do to avoid becoming a victim of the crime. Also included in the book is a chapter on the role of organized crime in Internet fraud and another chapter on Internet hoaxes. In addition, an appendix gives information on where to report various cybercrimes and another appendix gives definitions of cybercrime terms. To illustrate specific...

Vision-based Robot Navigation

Quest for Intelligent Approaches Using a Sparse Distributed Memory

by Mateus Mendes, A. Paulo Coimbra, & Manuel M. Crisostomo


Starting with a summary of the history of Artificial Intelligence, this book makes the bridge to the modern debate on the definition of Intelligence and the path to building Intelligent Machines. Since the definition of Intelligence is itself subject to open debate, the quest for Intelligent machines is pursuing a moving target. Apparently, intelligent behaviour is, to a great extent, the result of using a sophisticated associative memory, more than the result of heavy processing. The book describes theories on how the brain works, associative memory models and how a particular model - the Sparse Distributed Memory (SDM) - can be used to navigate a robot based on visual memories. Other robot navigation methods are also comprehensively revised and compared to the method proposed. The per...

The 8051/8052 Microcontroller

Architecture, Assembly Language, and Hardware Interfacing

by Craig Steiner


This book was written with the novice or intermediate 8052 developer in mind. Assuming no prior knowledge of the 8052, it takes the reader step-by-step through the architecture including discussions and explanations of concepts such as internal RAM, external RAM, Special Function Registers (SFRs), addressing modes, timers, serial I/O, and interrupts. This is followed by an in-depth section on assembly language which explains each instruction in the 8052 instruction set as well as related concepts such as assembly language syntax, expressions, assembly language directives, and how to implement 16-bit mathematical functions. The book continues with a thorough explanation of the 8052 hardware itself, reviewing the function of each pin on the microcontroller and follows this with the design ...

by Nikos B. Troullinos


The operational aspects of Lambda Calculus are studied as a fundamental basis for high-order functional computation. We consider systems having full reduction semantics, i.e., equivalence-preserving transformations of functions. The historic lineage from Eval-Apply to SECD to RTNF/RTLF culminates in the techniques of normal-order graph Head Order Reduction (HOR). By using a scalar mechanism to artificially bind relatively free variables, HOR makes it relatively effortless to reduce expressions beyond weak normal form and to allow expression-level results while exhibiting a well-behaved linear self-modifying code structure. Several variations of HOR are presented and compared to other efficient reducers, with and without sharing, including a conservative breadth-first one which mechanically...

by Mahendra Gunathilaka Samarawickrama


The modern FPGAs enable system designers to develop high-performance computing (HPC) applications with a large amount of parallelism. Real-time image processing is such a requirement that demands much more processing power than a conventional processor can deliver. In this research, we implemented software and hardware based architectures on FPGA to achieve real-time image processing. Furthermore, we benchmark and compare our implemented architectures with existing architectures. The operational structures of those systems consist of on-chip processors or custom vision coprocessors implemented in a parallel manner with efficient memory and bus architectures. The performance properties such as the accuracy, throughput and efficiency are measured and presented. According to results, FPGA ...

Arduino for the Cloud

Arduino Yun and Dragino Yun Shield

by Claus Kuhnel


Arduino for the Cloud considers the Arduino Yun and the Dragino Yun Shield as components closing the gap between a typical microcontroller application and connection to the cloud. Arduino Yun combines the classic Arduino with an Atheros AR9331 system-on-a-chip (SoC) for wireless access points and routers platforms, which uses the Linux distribution Linino (OpenWRT) operating system. The Dragino Yun Shield expands any Arduino with network capabilities by the Atheros AR9331.The combination of microcontroller and Linux device supports the whole chain from sensor to software applications in the cloud by hardware and software. This book deals with the Arduino and the Linux device and their interaction, without the need of detailed Linux knowledge.

by Dinesh S. Katre


This book presents a comprehensive process for visualization of interface metaphor for software. It is helpful in designing interactive user interfaces with magical super-affordances and definitive user experiences. As per the ancient Indian Vedic literature, metaphors are always conceived out of Vastu (entities having existence in our world). The visualization process given in the book shows how metaphorization could help in innovating highly experiential user interfaces, as one can create Avastu (non entities) by combining different objects and imaginative properties together. The main highlights of this process are selection and dissection of interface metaphor, pre-facto analysis, qualitative and quantitative evaluation, mapping between user and application domain lexicons, specialized...

by Ruth Shrairman


This research is dedicated to two main problems in finding shortest paths in the graphs. The first problem is to find shortest paths from an origin to all other vertices in non-negatively weighted graph. The second problem is the same, except it is allowed that some edges are negative. This is a more difficult problem that can be solved by relatively complicated algorithms. We attack the first problem by introducing a new data structure - Relaxed Heaps that implements efficiently two main operations critical for the improvement of Dijkstra's shortest path algorithm. R²-heaps with suspended relaxation proposed in this research gives the best known worst-case time bounds of O(1) for a decrease_key operation and O(logn) for a delete_min operation. That results in the best worst-case runni...

Acquisition and Reproduction of Color Images

Colorimetric and Multispectral Approaches

by Jon Hardeberg


The goal of the work reported in this dissertation is to develop methods for the acquisition and reproduction of high quality digital color images. To reach this goal it is necessary to understand and control the way in which the different devices involved in the entire color imaging chain treat colors. Therefore we addressed the problem of colorimetric characterization of scanners and printers, providing efficient and colorimetrically accurate means of conversion between a device-independent color space such as the CIELAB space, and the device-dependent color spaces of a scanner and a printer. First, we propose a new method for the colorimetric characterization of color scanners. It consists of applying a non-linear correction to the scanner RGB values followed by a 3rd order 3D polynom...

The ALISA Shape Module

Adaptive Shape Recognition using a Radial Feature Token

by Glenn C. Becker


Shape classification is a challenging image processing problem because shapes can occur in any position, at any orientation, and at any scale in an image. Shapes can also be obscured by gaps in their boundaries, occlusions, and noise. General shape classifiers often suffer from low precision, and specialized shape classifiers rely on specific features, like vertices or connected boundaries, making them difficult to generalize. The objective of this research is to design, implement, and test a general, high-precision two-dimensional shape classifier that is invariant to translation, scale, and rotation, as well as robust to gaps in the shape boundary, occlusions, and noise. To achieve this objective, the radial feature token (RFT) is implemented as the ALISA Shape Module, which learns to cl...

Oracle DBA 101

A Beginner’s Guide

by Rao R. Uppaluri


There is a dearth of Oracle Database Administrators inspite of having a large number of Oracle Programmers/Analysts. It is not difficult to rationalise the reason for this. Oracle Database Administration (DBA) is relatively harder to grasp and the concepts are subtle. There are a handful of books, all exhaustive treatises, on this topic, in addition to those by Oracle Corporation. There are no elementary books to smoothly introduce this fascinating topic. The present book, "Oracle DBA 101: A Beginner’s Guide" is expected to fill this vital gap. At the beginner’s level, it deals with all important aspects of Oracle DBA in a simplified manner. This is a Teacher’s as well as Student’s tool for an introductory course on the topic.

2020 Web Vision

How the Internet will Revolutionize Future Homes, Business and Society

by Robert D. Oberst


At the dawn of a new millennium, faith in technology soared following the successful eradication of the potentially paralyzing Y2K bug. Young dot-coms with little experience and possessing few assets other than a concept, flourished boasting market values in the millions and even billions of dollars. Then reality settled in as the market crashed and over a hundred dot-coms perished. The highflying NASDAQ dropped over 60% and the longest economic expansion teetered on the brink of recession. Despite the disconcerting scenario, this was not the demise of the Web, but merely the conclusion of its innocent childhood or the first stage of meteoric growth. After all, the Web was only 10 years old. There were still trillions of dollars worth of opportunities, as the more rigorous applicatio...

by Busaba Siriamonthep


Dreamweaver 4 is the HTML editor and you can create web graphics using Fireworks 4. Both applications can be integrated together. You will enjoy creating your own images, animated graphics, and rollover images in Fireworks 4 to insert into Dreamweaver 4. You can learn to create easy web pages using the same applications as professional web designers. This book is suitable for persons who are new to Dreamweaver 4 and Fireworks 4, HTML novices, and intermediate users. You will learn fast from the illustration in this book. This book consists of three sections:1) Web management: teach how to manage a web site and pages; 2) Dreamweaver 4: teach how to design and create web pages, layouts, layers, tables, and frames. You will learn to operate menu, functions, and tools; 3) Fireworks ...

Create Web Content that Sells!

Wow your market with writing strategies, search engine hints, and graphic tips that work

by Renee Kennedy


Are you ready to build an effective Web site that sells? One that brings in serious prospects? Then Create Web Content That Sells! is for you. It's a tutorial about writing effectively for Web visitors, creating a useable site structure, getting a marketing mind-set, and choosing practical graphics for your Web site.Whether your site sells wrenches to left-handed mechanics, offers landscaping services, or strives to cultivate loyalty in the hearts of your existing customers, the basic tenet of great Web content is universal: speak to your audience. And Create Web Content That Sells! shows you how to get down and dirty, one-to-one, with your audience, through writing, structure, and graphics.Small business people need every edge they can get, so we designed our marketing section to fit ...

Medical Informatics Around The World

An International Perspective Focusing On Training Issues

by Andrew Steele


In the last ten years there has been an explosion in the use of computer technology in many facets of our lives. Many industries such as finance, manufacturing, and retail have embraced modern technological advances through the use of advanced computer and telecommunication technology. Unfortunately, the international health care community has been quite slow to effectively integrate new computer technology into the daily care of patients. Nevertheless, governments across the world are developing strategic plans and allocating financial resources to support the use of technology in healthcare. Medical Informatics Around The World: An International Perspective Focusing On Training Issues provides a global snapshot into such activities in 13 different countries (Australia, China, Hong Ko...

by Paul E. Konschak


The purpose of this study was to examine two instructional methods for delivering a radar operators training class for members of a municipal police department. The first method examined was the traditional classroom-based training with a certified radar instructor. The second method was a computer-based training (CBT) course based on the instructional material from the classroom-based course. The CBT course was administered on CD-ROM using the police department s Windows© based computers. This study compared the two methods of delivery to determine if the CBT course was as effective as the traditional classroom-based course.Effectiveness was measured by the completion times of the two courses, examination scores, and overall participant satisfaction levels. These measures were conducted ...

Gesture Generation by Imitation

From Human Behavior to Computer Character Animation

by Michael Kipp


In an effort to extend traditional human-computer interfaces research has introduced embodied agents to utilize the modalities of everyday human-human communication, like facial expression, gestures and body postures. However, giving computer agents a human-like body introduces new challenges. Since human users are very sensitive and critical concerning bodily behavior the agents must act naturally and individually in order to be believable. This dissertation focuses on conversational gestures. It shows how to generate conversational gestures for an animated embodied agent based on annotated text input. The central idea is to imitate the gestural behavior of a human individual. Using TV show recordings as empirical data, gestural key parameters are extracte...

by Paula B. Doherty


Little is known about student success in online learning environments, especially how the predisposing characteristics that the learner brings to the learning environment may differentially affect student outcomes. This study explored the question of whether a student's "readiness" to be a self-directed learner is a predictor of student success in an online community college curriculum. The specific goal of this investigation was to determine whether there was a significant relationship between self-directed learning readiness-as measured by Guglielmino's (1977) Self-Directed Learning Readiness Scale (SDLRS)- and student success-as measured by course completion, grade point average (GPA) and student satisfaction, the latter assessed by student responses to an opinion poll. The subject...

by Steven Poris


This study was designed to determine if sixth-grade students' problem solving skills were improved by means of their experience with a computer-based logical puzzle game designed to increase reasoning skills, and, in turn, problem solving ability. Students worked on this game either in cooperative learning pairs or alone. Baseline and post-experimental problem-solving ability was measured through the administration of a Problem Solving Test; Form A was utilized as a pretest for this purpose, Form B was used as a post-test. Comparisons of problem-solving ability based upon post-test scores (Form B) were made among four groups of students (N = 106): Group 1: Students (n = 26) who worked on the computer-based puzzle game in cooperative learning pairs Group 2: Students (n = 27) ...

by Michael C. Doggett


This dissertation introduces new hardware architectures for more realistic surface rendering of three dimensional objects and the rendering of volumetric datasets. Surface rendering is dealt with in the first part of the dissertation where the architectures for displacement map rendering in hardware are proposed. This work represents the first to appear in scientific literature on displacement map hardware rendering. Where possible these architectures propose components that integrate into currently available pipelines and make use of existing units in those pipelines. Displacement map rendering in hardware is a desired feature currently under development by most graphics hardware vendors. The first architecture is scan-line based and works just before rasterization and the second adaptiv...

by Sylvain R Y Louboutin


Comprehensive global garbage detection (GGD) in object-oriented distributed systems, i.e., GGD intrinsically able to detect distributed cycles of garbage, has mostly been addressed via graph tracing algorithms. Graph tracing algorithms must account for every live object in the system before any resource can actually be reclaimed which compromises both their scalability and robustness in a distributed environment. Alternative non-comprehensive approaches trade-off comprehensiveness for scalability and robustness under the assumptions that distributed cycles of garbage are rare and that all comprehensive algorithms are necessarily unscalable. This thesis contends instead that distributed cycles of garbage are as likely to occur as local cycles and that a comprehensive alternative to g...

Software-Agents and Liberal Order

An Inquiry along the Borderline between Economics and Computer Science

by Dirk N Wagner


"Liberal order and software-agents" - long-established ideas and modern technology are bridged. The impulse for undertaking this effort comes from the observation that it becomes difficult for computer science alone to create order for and within machines. The growing complexity of computer systems, open networks like the Internet, and the increasingly social role of software entities push the traditional quest for total global control out of reach. Economic theory of social order offers extensive experience with such conditions, so that it can complement and guide research in computer science. It is shown that a common understanding between economics and computer science's sub-field of distributed artificial intelligence is possible on the level of software-agents. On this basis, four fun...

On Perl

Perl for Students and Professionals

by Jugal K. Kalita


The book has an introductory chapter that gets the reader started quickly with programming in Perl. The initial part of the book discusses Perl expressions, statements, control flow, built-in data types such as arrays and hashes, and complex data structures built using references. The chapter on regular expressions is exemplary with about fifty well-motivated example programs that make this useful topic particularly accessible. The book has an excellent chapter on modules and object-oriented programming. On Perl has several chapters covering specialized topics. The chapter on socket-based network programming deals with forking and using fork to write complex interactive client-server programs. There is a chapter with in-depth discussion of CGI programming including error-ha...

Separating Data from Instructions

Investigating a New Programming Paradigm

by Yasushi Kambayashi


We have experienced different theories of software construction paradigms in the last few decades; such as "structured programming" in the 1970's and "object-oriented programming" in the 1980's. The object-oriented paradigm is considered a standard for many software development activities, from the analysis phase to various support phases. There is little quantitative research, however, regarding the question whether object-oriented programming improves productivity. Many assume that object-oriented programming is more productive than traditional structured programming. This assumption lacks concrete, empirical data that support such belief. This dissertation identifies problems in the current object-oriented programming practice, and then presents an alternative paradigm to help overcome ...