Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book presents the proceedings of the 5th International Conference on Signal Processing and Information Communications (ICSPIC)), which was held in Paris, France on March 14-16, 2022. The conference solicits papers on all aspects of signal processing and information communications, which includes mixed signal processing, multimedia signal processing, nonlinear signal processing, communication theory and techniques, optical communications, and wireless networks. The conference is made up of theorists and experts in advanced characterization techniques in the fields of signal processing and information communications, which brings researchers, practitioners, and scientists in discussion of the latest methods, research developments, and future opportunities.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
The book presents the proceedings of the 30th Biennial Symposium on Communications 2021 (BSC21), a prestigious international research conference in communications, information theory, and signal processing. Started in 1962 by Queen's University, Canada, the Symposium is now presented by the Canadian Society of Information Theory. Its 30th edition was hosted virtually by The University of Saskatchewan and held in Saskatoon from June 28 to 30, 2021. Topics include Communication and Information Theory, Coding and Signal Processing for Communications, and Multiple Antenna Systems and Cooperative Communications.
This book presents state-of-the-art trends in reconfigurable active and passive planar antennas and their applications in wireless communication systems operating in the frequency band 5-6 GHz. Due to various key features such as multifunction antenna design, compactness, planar nature, and low cost, these technologies are becoming popular for current and future wireless applications. This book discusses different novel antenna designs and their working principles in detail. The modern and future wireless systems require wideband antennas to accommodate various channels in a single band or in separate bands. The carrier aggregation (CA) has been introduced in the modern wireless systems such as LTE-advanced systems and 5G./6G. In CA, a device can use several channels for transmission and reception. The used channels can exist in the same frequency band (intra-band CA) or in distinct bands (inter-band CA). To accommodate more channels, more bandwidth is required within the operating band. For portable devices, circularly polarized (CP) antennas are more advantageous over linearly polarized antennas since in CP antennas, there is low risk of misalignment and, hence encountering interference. Circularly polarized antenna also provides higher link reliability for the portable devices. To provide high data rates, more bandwidth is needed to accommodate more channels. Various multifunction, compact, and wideband antennas for plethora of applications are addressed in detail in this book. The scope of developing reconfigurable active antennas for application in beam switching, beam steering, wireless charging, security systems, etc., is described. This book concludes by giving glimpses of antenna requirements for future wireless communication systems.
This book first details a proposed Stationary Bionic Wavelet Transform (SBWT) for use in speech processing. The author then details the proposed techniques based on SBWT. These techniques are relevant to speech enhancement, speech recognition, and ECG de-noising. The techniques are then evaluated by comparing them to a number of methods existing in literature. For evaluating the proposed techniques, results are applied to different speech and ECG signals and their performances are justified from the results obtained from using objective criterion such as SNR, SSNR, PSNR, PESQ , MAE, MSE and more.
This book presents recent advances in NLP and speech technology, a topic attracting increasing interest in a variety of fields through its myriad applications, such as the demand for speech guided touchless technology during the Covid-19 pandemic. The authors present results of recent experimental research that provides contributions and solutions to different issues related to speech technology and speech in industry. Technologies include natural language processing, automatic speech recognition (for under-resourced dialects) and speech synthesis that are useful for applications such as intelligent virtual assistants, among others. Applications cover areas such as sentiment analysis and opinion mining, Arabic named entity recognition, and language modelling. This book is relevant for anyone interested in the latest in language and speech technology.
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
This book introduces the basic principles underlying the design and analysis of the digital communication systems that have heralded the information revolution. One major goal of the book is to demonstrate the role of the digital communication principles in a wide variety of data science applications, including community detection, computational biology, speech recognition and machine learning. One defining feature of this book is to make an explicit connection between the communication principles and data science problems, as well as to succinctly deliver the ¿story¿ of how the communication principles play a role for trending data science applications. All the key ¿plots¿ involved in the story are coherently developed with the help of tightly coupled exercise problem sets, and the associated fundamentals are explored mostly from first principles. Another key feature is that it includes programming implementation of a variety of algorithms inspired by fundamentals, together with a brief tutorial of the used programming tools. The implementation is based on Python and TensorFlow. This book does not follow a traditional book-style organization, but is streamlined via a series of lecture notes that are intimately related, centered around coherent storylines and themes. It serves as a textbook mainly for a junior- or senior-level undergraduate course, yet is also suitable for a first-year graduate course. Readers benefit from having a good background in probability and random processes, and basic familiarity with Python. But the background can be supplemented by almost self-contained materials, as well as by numerous exercise problems intended for elaborating on non-trivial concepts. In addition, Part III for data science applications should provide motivation and insights to students and even professional scientists who are interested in the field.
This book presents applicable guidance into sensor system hardware and software design, extensions, and integration aimed at utilization of 1-wire networks. The content is structured from the design of the sensor system architecture¿hardware and software¿through the implementation and optimization of the solution to the practical verification. The hardware part consists of the design of specific solutions for sensor data collection and the design and integration of standard and special sensors into these solutions. The development of the hardware solutions is focused on integration with 32-bit microcontrollers with ARM Cortex M0 to Cortex M4 cores. For the sensor solutions, the focus is on design versatility and miniaturization of dimensions with respect to the availability of the technology in the physical design. The focus is on minimizing power consumption to the design of power independent modules. The presented solution includes the design and implementation of the software layer,which includes control software for direct communication with the sensor modules as well as an information system for continuous data storage and remote access. The book presents an extensive case study that describes the design and development of a 1-wire bus controller hardware module solution with proprietary modifications that achieve improvements to the maximum 1-wire bus length. The study also includes the design and implementation of a universal and power independent 1-wire bus device. Using this module, almost any sensor can be connected to the 1-wire bus.
This book provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision. The book presents a system-level and technology-level description of future space networking and communications. The authors also expand the vision to interplanetary networks. The book spans hardware and software technologies for future space communication networks, also considering very modern paradigms like quantum technologies and Softwarization. In the book, the word ¿space¿ is intended in a wider sense than the usual ¿satellite communications¿, including new and partially unexplored fields like quantum space communications, interplanetary communications, and extra-terrestrial Radio Access Networks (RANs). The book includes applications including Internet of Space Things, Tactile Internet/Digital twins for Space and discusses future challenges like those involved by the concept of ¿sustainable Space¿.Provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision;Considers visions and perspectives of space technology, including a through overview of satellite communications;Presents a system-level overview of future space networking and communications.
This book presents some of the most advanced leading-edge technology for the fourth Industrial Revolution -- known as ¿Industry 4.0.¿ The book provides a comprehensive understanding of the interconnections of AI, IoT, big data and cloud computing as integral to the technologies that revolutionize the way companies produce and distribute products and the way local governments deliver their services. The book emphasizes that at every phase of the supply chain, manufactures are found to be interweaving AI, robotics, IoT, big data/machine learning, and cloud computing into their production facilities and throughout their distribution networks. Equally important, the authors show how their research can be applied to computer vision, cyber security, database and compiler theory, natural language processing, healthcare, education and agriculture.Presents the fundamentals of AI, IoT, and cloud computing and how they can be incorporatedin Industry 4.0 applicationsMotivates readers to address challenges in the areas of speech communication and signal processingProvides numerous examples, case studies, technical descriptions, and approaches of AI/ML
This textbook covers fundamental topics in Telecommunication including Channel Modeling, Modulation/Demodulation, Channel Coding/Decoding, Multicarrier, Capacity, Antenna Arrays, Diversity, and 4G/5G. It will also cover advanced topics such as High-Resolution Spectral Estimation, Reconfigurable Intelligent Surfaces, Index Modulation, Full-Duplex, and Millimeter Wave. This book will mainly target engineering students (both graduate and advanced undergraduate) who are new to the fields of Communication and Signal Processing and are struggling to understand the fundamental concepts. This book will help the students step by step by introducing the concepts first in their most basic form and then providing the code that the students can experiment with. It contains pedagogical elements such as chapter introductions, end-of-chapter questions and numerical problems, MATLAB/Octave/Python code, figures and tables, and a website (raymaps.com) for feedback and interaction. It will not only be helpful for undergraduate and graduate students but also for professional engineers and hobbyists.
This book provides an insight on the importance that the Internet of Things (IoT) and Information and Communication Technology (ICT) solutions can offer towards smart city and healthcare applications. The book features include elaboration of recent and emerging developments in various specializations of curing health problems; smart transportation systems, traffic management for smart cities; energy management, deep learning and machine learning techniques for smart health and smart cities; and concepts that incorporate the Internet of Everything (IoE). The book discusses useful IoE applications and architectures that cater to critical knowledge creation towards developing new capacities and outstanding economic opportunities for businesses and the society.
This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern industries and societies. Building a new network, upgrading an existing network, or planning to use a public network requires integrating various network mechanisms and technologies in a cohesive fashion. This demands a deep understanding of the concepts, principles, processes, approaches, and good practices of advanced network planning. More specifically, emphasizing service-based networking, the book introduces structured processes for network planning, provides systematic approaches for network analysis and architecture, develops network planning specifications, and discusses high-level network architectural models from various perspectives. It also offers detailed discussions on component-based architecture about addressing, routing, performance, management, and security and privacy. Recent developments in data centers, virtualization,and cloud are also embedded into the network architecture. Moreover, the book includes a comprehensive introduction to building practical TCP/IP network communications via sockets with practical examples. The book is suitable for use as a textbook for senior undergraduate and postgraduate students or as a reference book for network practitioners looking to develop or enhance their skills in network planning.
This book presents the proceedings of the 6th International Conference on Signal Processing and Information Communications (ICSPIC 2023), which was held in Singapore, on February 25-27, 2023. The conference aims to provide a leading international forum for researchers, practitioners, and professionals from the industry, academia and government to share their new ideas, progresses and achievements in signal processing and information communications. The contributions focus on the latest advances, trends and future challenges in analog and mixed signal processing, design and implementation of signal processing systems, compressive sensing, machine learning methods for communications and signal processing, multimedia signal processing, natural language processing, next generation mobile communications, nonlinear signal processing, optical communications, parallel and distributed processing, and more.
This book gives readers the tools to craft AI systems that don't just thrive today, but endure sustainably into the future. Whether a trailblazer or an aspiring innovator, this book enables readers to resonate with the ambitions of software developers, data scientists, and AI practitioners. The author covers the latest techniques and best practices for energy efficiency, reducing carbon footprints, and ensuring fair and ethical AI. The book also addresses important issues such as AI governance, managing risks, and ensuring transparency. Topics covered include understanding the relationship between AI and sustainable development, strategies for building efficient AI systems, and ethical considerations in AI development, among others. The author includes case studies of companies and organizations that have successfully implemented sustainable AI software development practices. Therefore, this book will be of interest to AI practitioners, academics, researchers, and lecturers in computer science, artificial intelligence, machine learning and data sciences.
This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law throughinternational laws; and understanding digital violence.
This book discusses different aspects of group recommender systems, which are systems that help to identify recommendations for groups instead of single users. In this context, the authors present different related techniques and applications. The book includes in-depth summaries of group recommendation algorithms, related industrial applications, different aspects of preference construction and explanations, user interface aspects of group recommender systems, and related psychological aspects that play a crucial role in group decision scenarios.
This book begins with a historical overview of the evolution of mobile technologies and addresses two key questions: why do we need 6G? and what will 6G be? The remaining chapters of this book are organized into three parts: Part I covers the foundation of an end-to-end 6G system by presenting 6G vision, driving forces, key performance indicators, and societal requirements on digital inclusion, sustainability, and intelligence. Part II presents key radio technology components for the 6G communications to deliver extreme performance, including new radio access technologies at high frequencies, joint communications and sensing, AI-driven air interface, among others. Part III describes key enablers for intelligent 6G networking, including network disaggregation, edge computing, data-driven management and orchestration, network security and trustworthiness, among others. This book is relevant to researchers, professionals, and academics working in 5G/6G and beyond.
This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.
This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields of cloud computing and computer networks. Topics covered in this book contain cloud computing and semantic web technologies, cloud applications in vertical industries, cloud computing architecture and systems, cloud computing models, simulations and designs among others. The content is relevant to academics, researchers, students, and professionals in cloud computing and computer networks.
This book provides a guide for those looking to understand the potential of blockchain technology and its impact on various industries. The book provides an in-depth exploration of blockchain technology, its use cases, and the opportunities and challenges it presents. From digital currencies and smart contracts to supply chain management and decentralized finance, the book covers all the key aspects of blockchain technology. The authors also go beyond the technical details, providing valuable insights and practical advice on how to navigate this new era of decentralization and trustless transactions. The book is an ideal read for researchers, entrepreneurs, investors, or anyone looking to stay ahead of the curve and stay informed about the future of blockchain technology.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.