Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book presents the proceedings of the 5th International Conference on Signal Processing and Information Communications (ICSPIC)), which was held in Paris, France on March 14-16, 2022. The conference solicits papers on all aspects of signal processing and information communications, which includes mixed signal processing, multimedia signal processing, nonlinear signal processing, communication theory and techniques, optical communications, and wireless networks. The conference is made up of theorists and experts in advanced characterization techniques in the fields of signal processing and information communications, which brings researchers, practitioners, and scientists in discussion of the latest methods, research developments, and future opportunities.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
The book presents the proceedings of the 30th Biennial Symposium on Communications 2021 (BSC21), a prestigious international research conference in communications, information theory, and signal processing. Started in 1962 by Queen's University, Canada, the Symposium is now presented by the Canadian Society of Information Theory. Its 30th edition was hosted virtually by The University of Saskatchewan and held in Saskatoon from June 28 to 30, 2021. Topics include Communication and Information Theory, Coding and Signal Processing for Communications, and Multiple Antenna Systems and Cooperative Communications.
This book presents state-of-the-art trends in reconfigurable active and passive planar antennas and their applications in wireless communication systems operating in the frequency band 5-6 GHz. Due to various key features such as multifunction antenna design, compactness, planar nature, and low cost, these technologies are becoming popular for current and future wireless applications. This book discusses different novel antenna designs and their working principles in detail. The modern and future wireless systems require wideband antennas to accommodate various channels in a single band or in separate bands. The carrier aggregation (CA) has been introduced in the modern wireless systems such as LTE-advanced systems and 5G./6G. In CA, a device can use several channels for transmission and reception. The used channels can exist in the same frequency band (intra-band CA) or in distinct bands (inter-band CA). To accommodate more channels, more bandwidth is required within the operating band. For portable devices, circularly polarized (CP) antennas are more advantageous over linearly polarized antennas since in CP antennas, there is low risk of misalignment and, hence encountering interference. Circularly polarized antenna also provides higher link reliability for the portable devices. To provide high data rates, more bandwidth is needed to accommodate more channels. Various multifunction, compact, and wideband antennas for plethora of applications are addressed in detail in this book. The scope of developing reconfigurable active antennas for application in beam switching, beam steering, wireless charging, security systems, etc., is described. This book concludes by giving glimpses of antenna requirements for future wireless communication systems.
This book first details a proposed Stationary Bionic Wavelet Transform (SBWT) for use in speech processing. The author then details the proposed techniques based on SBWT. These techniques are relevant to speech enhancement, speech recognition, and ECG de-noising. The techniques are then evaluated by comparing them to a number of methods existing in literature. For evaluating the proposed techniques, results are applied to different speech and ECG signals and their performances are justified from the results obtained from using objective criterion such as SNR, SSNR, PSNR, PESQ , MAE, MSE and more.
This book presents recent advances in NLP and speech technology, a topic attracting increasing interest in a variety of fields through its myriad applications, such as the demand for speech guided touchless technology during the Covid-19 pandemic. The authors present results of recent experimental research that provides contributions and solutions to different issues related to speech technology and speech in industry. Technologies include natural language processing, automatic speech recognition (for under-resourced dialects) and speech synthesis that are useful for applications such as intelligent virtual assistants, among others. Applications cover areas such as sentiment analysis and opinion mining, Arabic named entity recognition, and language modelling. This book is relevant for anyone interested in the latest in language and speech technology.
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
This book introduces the basic principles underlying the design and analysis of the digital communication systems that have heralded the information revolution. One major goal of the book is to demonstrate the role of the digital communication principles in a wide variety of data science applications, including community detection, computational biology, speech recognition and machine learning. One defining feature of this book is to make an explicit connection between the communication principles and data science problems, as well as to succinctly deliver the ¿story¿ of how the communication principles play a role for trending data science applications. All the key ¿plots¿ involved in the story are coherently developed with the help of tightly coupled exercise problem sets, and the associated fundamentals are explored mostly from first principles. Another key feature is that it includes programming implementation of a variety of algorithms inspired by fundamentals, together with a brief tutorial of the used programming tools. The implementation is based on Python and TensorFlow. This book does not follow a traditional book-style organization, but is streamlined via a series of lecture notes that are intimately related, centered around coherent storylines and themes. It serves as a textbook mainly for a junior- or senior-level undergraduate course, yet is also suitable for a first-year graduate course. Readers benefit from having a good background in probability and random processes, and basic familiarity with Python. But the background can be supplemented by almost self-contained materials, as well as by numerous exercise problems intended for elaborating on non-trivial concepts. In addition, Part III for data science applications should provide motivation and insights to students and even professional scientists who are interested in the field.
This book presents applicable guidance into sensor system hardware and software design, extensions, and integration aimed at utilization of 1-wire networks. The content is structured from the design of the sensor system architecture¿hardware and software¿through the implementation and optimization of the solution to the practical verification. The hardware part consists of the design of specific solutions for sensor data collection and the design and integration of standard and special sensors into these solutions. The development of the hardware solutions is focused on integration with 32-bit microcontrollers with ARM Cortex M0 to Cortex M4 cores. For the sensor solutions, the focus is on design versatility and miniaturization of dimensions with respect to the availability of the technology in the physical design. The focus is on minimizing power consumption to the design of power independent modules. The presented solution includes the design and implementation of the software layer,which includes control software for direct communication with the sensor modules as well as an information system for continuous data storage and remote access. The book presents an extensive case study that describes the design and development of a 1-wire bus controller hardware module solution with proprietary modifications that achieve improvements to the maximum 1-wire bus length. The study also includes the design and implementation of a universal and power independent 1-wire bus device. Using this module, almost any sensor can be connected to the 1-wire bus.
This book provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision. The book presents a system-level and technology-level description of future space networking and communications. The authors also expand the vision to interplanetary networks. The book spans hardware and software technologies for future space communication networks, also considering very modern paradigms like quantum technologies and Softwarization. In the book, the word ¿space¿ is intended in a wider sense than the usual ¿satellite communications¿, including new and partially unexplored fields like quantum space communications, interplanetary communications, and extra-terrestrial Radio Access Networks (RANs). The book includes applications including Internet of Space Things, Tactile Internet/Digital twins for Space and discusses future challenges like those involved by the concept of ¿sustainable Space¿.Provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision;Considers visions and perspectives of space technology, including a through overview of satellite communications;Presents a system-level overview of future space networking and communications.
This textbook covers fundamental topics in Telecommunication including Channel Modeling, Modulation/Demodulation, Channel Coding/Decoding, Multicarrier, Capacity, Antenna Arrays, Diversity, and 4G/5G. It will also cover advanced topics such as High-Resolution Spectral Estimation, Reconfigurable Intelligent Surfaces, Index Modulation, Full-Duplex, and Millimeter Wave. This book will mainly target engineering students (both graduate and advanced undergraduate) who are new to the fields of Communication and Signal Processing and are struggling to understand the fundamental concepts. This book will help the students step by step by introducing the concepts first in their most basic form and then providing the code that the students can experiment with. It contains pedagogical elements such as chapter introductions, end-of-chapter questions and numerical problems, MATLAB/Octave/Python code, figures and tables, and a website (raymaps.com) for feedback and interaction. It will not only be helpful for undergraduate and graduate students but also for professional engineers and hobbyists.
This book provides an insight on the importance that the Internet of Things (IoT) and Information and Communication Technology (ICT) solutions can offer towards smart city and healthcare applications. The book features include elaboration of recent and emerging developments in various specializations of curing health problems; smart transportation systems, traffic management for smart cities; energy management, deep learning and machine learning techniques for smart health and smart cities; and concepts that incorporate the Internet of Everything (IoE). The book discusses useful IoE applications and architectures that cater to critical knowledge creation towards developing new capacities and outstanding economic opportunities for businesses and the society.
This book gives readers the tools to craft AI systems that don't just thrive today, but endure sustainably into the future. Whether a trailblazer or an aspiring innovator, this book enables readers to resonate with the ambitions of software developers, data scientists, and AI practitioners. The author covers the latest techniques and best practices for energy efficiency, reducing carbon footprints, and ensuring fair and ethical AI. The book also addresses important issues such as AI governance, managing risks, and ensuring transparency. Topics covered include understanding the relationship between AI and sustainable development, strategies for building efficient AI systems, and ethical considerations in AI development, among others. The author includes case studies of companies and organizations that have successfully implemented sustainable AI software development practices. Therefore, this book will be of interest to AI practitioners, academics, researchers, and lecturers in computer science, artificial intelligence, machine learning and data sciences.
This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law throughinternational laws; and understanding digital violence.
This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.
This book provides a guide for those looking to understand the potential of blockchain technology and its impact on various industries. The book provides an in-depth exploration of blockchain technology, its use cases, and the opportunities and challenges it presents. From digital currencies and smart contracts to supply chain management and decentralized finance, the book covers all the key aspects of blockchain technology. The authors also go beyond the technical details, providing valuable insights and practical advice on how to navigate this new era of decentralization and trustless transactions. The book is an ideal read for researchers, entrepreneurs, investors, or anyone looking to stay ahead of the curve and stay informed about the future of blockchain technology.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.