Kirjojen hintavertailu. Mukana 11 342 296 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

191 tulosta hakusanalla Behroz Behnejad

Tidsvandrare

Tidsvandrare

Behroz Behnejad

Vulkan
2020
nidottu
Den kända författaren David Hamilton har tillsammans med sin älskade Lisa precis köpt sitt drömhus och ser fram emot ett lugnt liv på landet. Men köpekontraktet har ett villkor: ett av rummen får inte beträdas, någonsin.Davids nyfi kenhet och längtan efter att skriva en ny roman tar dock överhanden och de bestämmer sig för att närmare undersöka det hemliga rummet och husets historia. Vem är Alice, den unga kvinnan som spårlöst försvann för sjuttio år sedan, och vad var hennes öde? Vem är mannen med hunden som visar sig för dem och vilka är det egentligen som sålt huset till dem?När David och Lisa hittar en tidsmaskin ser de sin chans att äntligen få svar på sina frågor. De påbörjar en resa bakåt i tiden men inser snart att deras avtryck i historien får oanade följder.Vad är egentligen tid? Är det bara en illusion för vår godtrogna blick? Har vårt förfl utna inte passerat och framtiden redan existerat?Med Tidsvandrare har Behroz Behnejad skrivit en roman som tar med läsaren på en svindlande resa där den trygga tidsordningen omkullkastas och frågor om möjligheterna – och rättigheterna – att påverka historien väcks.
The Solstice Gift: Behrouz and Lucky on the Longest Night
The Solstice Gift is a warm, queer romp brimming with threesomes, waffles, snow, and lots of hot butch-on-butch shenanigans. Behrouz and Lucky are the hottest and the wittiest butch/butch lesbian couple in the Pioneer Valley. One cold winter night, in a peaceful post-coital haze, the kinky couple decides to give each other a threesome every winter solstice, spending the longest night of the year in a frisky erotic daze with a delectable new pal. Let Behrouz and Lucky take you on a sexy, light-hearted gambol though Northampton, the dyke capital of the world
Escape from Behruz

Escape from Behruz

Judy Meadows

Wild Rose Press
2017
pokkari
Rashid will help Olivia and the baby she's been caring for escape the violence in Behruz, but he must guard his heart. He can't risk being hurt by her again. Olivia has her own reasons for keeping her distance from Rashid. If Rashid learns that the baby is actually hers-and his-the sultan of Behruz will make sure she loses everything that matters to her. Their escape involves traveling with a group of nomads across the mountains into Iran. As they trek together by day and sleep beside each other in a nomad tent at night, the attraction that has always drawn them to each other grows ever stronger, Can Olivia survive the trip without revealing her secrets and without losing her heart to Rashid once again?
TCP/IP Protocol Suite

TCP/IP Protocol Suite

Behrouz A. Forouzan

McGraw-Hill Professional
2009
sidottu
In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp as well as many examples which help tie the material to the real-world. The fourth edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Additionally, out-of-date material has been overhauled to reflect recent changes in technology.
Data Communications and Networking

Data Communications and Networking

Behrouz A. Forouzan

McGraw-Hill Professional
2012
sidottu
Data Communications and Networking is designed to help students understand the basics of data communications and networking, and the protocols used in the Internet in particular by using the protocol layering of the Internet and TCP/IP protocol suite. Technologies related to data communication and networking may be the fastest growing in today's culture. The appearance of some new social networking applications is a testimony to this claim. In this Internet-oriented society, specialists need to be trained to run and manage the Internet, part of the Internet, or an organization's network that is connected to the Internet. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field.Using a bottom-up approach, Data Communications and Networking presents this highly technical subject matter without relying on complex formulas by using a strong pedagogical approach supported by more than 830 figures.Now in its Fifth Edition, this textbook brings the beginning student right to the forefront of the latest advances in the field, while presenting the fundamentals in a clear, straightforward manner. Students will find better coverage, improved figures and better explanations on cutting-edge material. The "bottom-up" approach allows instructors to cover the material in one course, rather than having separate courses on data communications and networking.
Computer Networks: A Top Down Approach

Computer Networks: A Top Down Approach

Behrouz A. Forouzan; Firouz Mosharraf

McGraw-Hill Professional
2011
sidottu
This new networking text follows a top-down approach. The presentation begins with an explanation of the application layer, which makes it easier for students to understand how network devices work, and then, with the students fully engaged, the authors move on to discuss the other layers, ending with the physical layer. With this top-down approach, its thorough treatment of the topic, and a host of pedagogical features, this new networking book offers the market something it hasn't had for many years- a well-crafted, modern text that places the student at the center of the learning experience. Forouzan's Computer Networks presents a complex topic in an accessible, student-friendly way that makes learning the material not only manageable but fun as well. The appealing visual layout combines with numerous figures and examples to provide multiple routes to understanding. Students are presented with the most up-to-date material currently available and are encouraged to view what they are learning in a real-world context. This approach is both motivating and practical in that students begin to see themselves as the professionals they will soon become.
C++ Programming: An Object-Oriented Approach

C++ Programming: An Object-Oriented Approach

Behrouz A. Forouzan; Richard Gilberg

McGraw-Hill Professional
2019
nidottu
C++ Programming: An Object-Oriented Approach has two primary objectives: Teach the basic principles of programming as outlined in the ACM curriculum for a CS1 class and teach the basic constructs of the C++ language. While C++ is a complex and professional language, experience shows that beginning students can easily understand and use C++.C++ Programming: An Object-Oriented Approach uses a combination of thorough, well-ordered explanations and a strong visual framework to make programming concepts accessible to students. The authors stress incremental program development, wherein program analysis is followed by building a structure chart, constructing UML flow diagrams, writing algorithms, undertaking program design, and finally testing. This foundation, combined with a focus on the benefits of a consistent and well-documented programming style, prepares students to tackle the academic and professional programming challenges they will encounter down the road with confidence.
Data Communications and Networking with TCP/IP Protocol Suite

Data Communications and Networking with TCP/IP Protocol Suite

Behrouz A. Forouzan

MCGRAW-HILL EDUCATION - EUROPE
2021
sidottu
Data Communications and Networking, 6th Edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.
Computer Architecture

Computer Architecture

Behrooz Parhami

Oxford University Press Inc
2005
sidottu
PART I: sets the stage, provides context, reviews some of the prerequisite topics and gives a taste of what is to come in the rest of the book. Included are two refresher-type chapters on digital circuits and components, a discussion of types of computer systems, an overview of digital computer technology, and a detailed perspective on computer system 3erformance. PART II:lays out the user's interface to computer hardware known as the instruction-set architechture (ISA). For better understanding, the instruction set of MiniMIPS (a simplified, yet very realistic, machine for which open reference material and simulation tools exist) is described. Included is a chapter on variations in ISA (e.g. RISC vs CISC) and associated cost performace tradeoffs. The next two parts cover the central processing unit (CPU). PART III: describes the structure of arithmetic/logic units (ALUs) in some detail. Included are discussions of fixed- and floating-point number representations, design of high-speed adders, shift and logical operations, and hardware multipliers/dividers. Implementation aspects and pitfalls of floating-point arthimetic are also discussed. PART IV: is devoted to data path and control circuits comprising the CPU. Beginning with instruction execution steps, the needed components and control mechanisms are derived. These are followed by an exposition of control design strategies, use of a pipelined data path for performance enhancement, and various limitations of pipelining due to data and control dependencies. PART V: concerned with the memory system. The technologies in use for primary and secondary memories are described, along with their strengths and limitations. It is shown how the use of cache memories effectively bridges the speed gap between CPU and main memory. Similarly, the use of virtual memory to provide the illusion of a vast main memory is explained. PART VI: deals with input/output and interfacing topics. A discussion of I/O device technologies is followed by methods of I/O programming and the roles of buses and links (including standards) in I/O communication and interfacing. Elements of processes and context switching, for exception handling or multireaded computation, are also covered. PART VII: introduces advanced architectures. An overview of performance enhancement strategies, beyond simple pipelining, is presented and examples of applications requiring higher performance are cited. These are followed by design strategies and example architectures based on vector or array proccessing, multiprocessing, and multicomputing.
Computer Arithmetic

Computer Arithmetic

Behrooz Parhami

Oxford University Press Inc
2009
sidottu
Ideal for graduate and senior undergraduate courses in computer arithmetic and advanced digital design, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition, provides a balanced, comprehensive treatment of computer arithmetic. It covers topics in arithmetic unit design and circuit implementation that complement the architectural and algorithmic speedup techniques used in high-performance computer architecture and parallel processing. Using a unified and consistent framework, the text begins with number representation and proceeds through basic arithmetic operations, floating-point arithmetic, and function evaluation methods. Later chapters cover broad design and implementation topics-including techniques for high-throughput, low-power, fault-tolerant, and reconfigurable arithmetic. An appendix provides a historical view of the field and speculates on its future. An indispensable resource for instruction, professional development, and research, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition, combines broad coverage of the underlying theories of computer arithmetic with numerous examples of practical designs, worked-out examples, and a large collection of meaningful problems. This second edition includes a new chapter on reconfigurable arithmetic, in order to address the fact that arithmetic functions are increasingly being implemented on field-programmable gate arrays (FPGAs) and FPGA-like configurable devices. Updated and thoroughly revised, the book offers new and expanded coverage of saturating adders and multipliers, truncated multipliers, fused multiply-add units, overlapped quotient digit selection, bipartite and multipartite tables, reversible logic, dot notation, modular arithmetic, Montgomery modular reduction, division by constants, IEEE floating-point standard formats, and interval arithmetic. Features: * Divided into 28 lecture-size chapters * Emphasizes both the underlying theories of computer arithmetic and actual hardware designs * Carefully links computer arithmetic to other subfields of computer engineering * Includes 717 end-of-chapter problems ranging in complexity from simple exercises to mini-projects * Incorporates many examples of practical designs * Uses consistent standardized notation throughout * Instructor's manual includes solutions to text problems * An author-maintained website http://www.ece.ucsb.edu/~parhami/text comp arit.htm contains instructor resources, including complete lecture slides
Computer Arithmetic

Computer Arithmetic

Behrooz Parhami

Oxford University Press Inc
2011
nidottu
Ideal for graduate and senior undergraduate courses in computer arithmetic and advanced digital design, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition, provides a balanced, comprehensive treatment of computer arithmetic. It covers topics in arithmetic unit design and circuit implementation that complement the architectural and algorithmic speedup techniques used in high-performance computer architecture and parallel processing. Using a unified and consistent framework, the text begins with number representation and proceeds through basic arithmetic operations, floating-point arithmetic, and function evaluation methods. Later chapters cover broad design and implementation topics-including techniques for high-throughput, low-power, fault-tolerant, and reconfigurable arithmetic. An appendix provides a historical view of the field and speculates on its future. An indispensable resource for instruction, professional development, and research, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition, combines broad coverage of the underlying theories of computer arithmetic with numerous examples of practical designs, worked-out examples, and a large collection of meaningful problems. This second edition includes a new chapter on reconfigurable arithmetic, in order to address the fact that arithmetic functions are increasingly being implemented on field-programmable gate arrays (FPGAs) and FPGA-like configurable devices. Updated and thoroughly revised, the book offers new and expanded coverage of saturating adders and multipliers, truncated multipliers, fused multiply-add units, overlapped quotient digit selection, bipartite and multipartite tables, reversible logic, dot notation, modular arithmetic, Montgomery modular reduction, division by constants, IEEE floating-point standard formats, and interval arithmetic.
Introduction to Parallel Processing

Introduction to Parallel Processing

Behrooz Parhami

Kluwer Academic/Plenum Publishers
1999
sidottu
THE CONTEXT OF PARALLEL PROCESSING The field of digital computer architecture has grown explosively in the past two decades. Through a steady stream of experimental research, tool-building efforts, and theoretical studies, the design of an instruction-set architecture, once considered an art, has been transformed into one of the most quantitative branches of computer technology. At the same time, better understanding of various forms of concurrency, from standard pipelining to massive parallelism, and invention of architectural structures to support a reasonably efficient and user-friendly programming model for such systems, has allowed hardware performance to continue its exponential growth. This trend is expected to continue in the near future. This explosive growth, linked with the expectation that performance will continue its exponential rise with each new generation of hardware and that (in stark contrast to software) computer hardware will function correctly as soon as it comes off the assembly line, has its down side. It has led to unprecedented hardware complexity and almost intolerable dev- opment costs. The challenge facing current and future computer designers is to institute simplicity where we now have complexity; to use fundamental theories being developed in this area to gain performance and ease-of-use benefits from simpler circuits; to understand the interplay between technological capabilities and limitations, on the one hand, and design decisions based on user and application requirements on the other.
Biographical Dictionary of Public Administration

Biographical Dictionary of Public Administration

Behrooz Kalantari; Patricia M. Wigfall

Greenwood Press
2000
sidottu
Complementing texts that introduce students to the major theories of public administration, this biographical dictionary introduces the reader to the individuals who originated or had a significant impact on those theories. Including subjects from a spectrum of disciplines and from such diverse areas as organizational theory, personnel, and budgeting, the book covers the original pioneers and their contemporaries. A distinct crystallization covering the subject's personal, social, educational, and philosophical dimensions, each entry includes a short personal history followed by the subject's major contribution to the discipline and a bibliography of his or her works on the subject.By providing information on the individuals who developed the major theories in the field, this book will introduce readers to ideas from a variety of disciplines and thus enable students to consider public administration theories in context. This compact reference fills a serious gap in the field.
Computer Science

Computer Science

Behrouz Forouzan

CENGAGE Learning Custom Publishing
2023
nidottu
Ideal for a first course in the C programming language, Afyouni/Forouzan's COMPUTER SCIENCE: A STRUCTURED PROGRAMMING APPROACH IN C, 4th edition, introduces you to both computer science theory and C-language syntax using a principle-before-implementation approach. Combining a clear organizational structure with easy-to-follow figures, charts and tables, the text helps you sharpen your logic, problem-solving skills and understanding of fundamental CS concepts and software engineering through hands-on programming assignments and applications. In addition, two all-new chapters are devoted to Pointers and Recursion.
Statistical Trend Analysis of Physically Unclonable Functions

Statistical Trend Analysis of Physically Unclonable Functions

Behrouz Zolfaghari; Khodakhast Bibak; Takeshi Koshiba; Hamid R. Nemati; Pinaki Mitra

CRC Press
2021
sidottu
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book).This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.
Statistical Trend Analysis of Physically Unclonable Functions

Statistical Trend Analysis of Physically Unclonable Functions

Behrouz Zolfaghari; Khodakhast Bibak; Takeshi Koshiba; Hamid R. Nemati; Pinaki Mitra

TAYLOR FRANCIS LTD
2024
nidottu
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book).This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.
Real-time and Embedded Systems

Real-time and Embedded Systems

Behrouz Zolfaghari; Khodakhast Bibak

Elsevier - Health Sciences Division
2024
nidottu
Real-time and Embedded Systems: Life Cycle, Ecosystem and Scheduling Trends establishes life cycles and ecosystems for real-time and embedded systems, highlighting design, implementation and test objectives challenges, approaches, and trends. The book outlines applications and supporting computing platforms, as well as enabling sciences and technologies. It examines the latest studies in real-time and embedded scheduling and presents a roadmap for future research on these topics. Technologies for managing real-time and embedded systems play a key role in areas such as aviation and industrial engineering, where missing a safety-critical real-time system deadline can lead to a human catastrophe. A real-time system is a system in which the notions of correctness and performance are joined together and defined as timeliness, which is described in terms of well-defined real time constraints. An embedded system is a computer system with limited processing power, memory and I/O resources that appears as a fabricated part of another system that can be mechanical, electrical, etc. Real-time and embedded systems serve to a variety of technological, medical and scientific applications. Task scheduling plays a significant role in meeting time constraints in real-time systems as well as resource constraints in embedded systems.
A Letter From Manus Island

A Letter From Manus Island

Behrouz Boochani

Borderstream Books
2023
pokkari
Behrouz Boochani, author, filmmaker and journalist wrote his profound and powerful poetic political manifesto A Letter From Manus Island after four years incarceration as a stateless refugee on Manus in Australian-run camps. His letter, a humanitarian message, translated by Omid Tofighian, is published with a preface by Ruth Skilbeck in this pamphlet. First published in 2018. This edition, published in 2023, has the addition of biographical notes.