Account
Orders
Advanced search
The book presents the proceedings of the International Conference on Innovation, Sustainability and Applied Sciences (ICISAS 2023), which took place in Dubai, UAE, on 09-11 December 2023.The conference is a unique opportunity to learn from leading researchers and...
The book consists of peer reviewed and presented papers of the 2nd International Conference on Cloud Computing and Computer Network (CCCN 2024), which took place in Singapore during April 19-21, 2024.The conference is held annually to gather scholars, researchers and...
This book offers a comprehensive guide to reinforcement learning (RL) and bandits methods, specifically tailored for advancements in speech and language technology. Starting with a foundational overview of RL and bandit methods, the book dives into their practical...
This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern industries and societies. Building a new network, upgrading an existing network, or planning to use a public network requires...
This book provides an insight on the importance that the Internet of Things (IoT) and Information and Communication Technology (ICT) solutions can offer towards smart city and healthcare applications. The book features include elaboration of recent and emerging...
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed...
This book presents the proceedings of the 5th International Conference on Signal Processing and Information Communications (ICSPIC)), which was held in Paris, France on March 14-16, 2022. The conference solicits papers on all aspects of signal processing and information...
The book presents the proceedings of the 30th Biennial Symposium on Communications 2021 (BSC21), a prestigious international research conference in communications, information theory, and signal processing. Started in 1962 by Queen’s University, Canada, the Symposium is...
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text....
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment....
This book first details a proposed Stationary Bionic Wavelet Transform (SBWT) for use in speech processing. The author then details the proposed techniques based on SBWT. These techniques are relevant to speech enhancement, speech recognition, and ECG de-noising. The...
This book presents the design requirements of antenna integration for modern commercial devices such as smartphones, dongles, and access points. Practical use-case scenarios of smartphone and the design process of the antenna system for the same are highlighted. The...
This book provides insights into how deep learning techniques impact language and speech processing applications. The authors discuss the promise, limits and the new challenges in deep learning. The book covers the major differences between the various applications of...
The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication.The book also covers recent wireless...
This book is about improving prohibited substances detection using the nuclear quadrupole resonance (NQR) technique at security checkpoints. The book proposes multiple signal processing and analysis techniques for improving detection of dangerous or contraband...
This book presents prospective, industrially proven methods and software solutions for storing, processing, and viewing multimedia content on digital cameras, camcorders, TV, and mobile devices. Most of the algorithms described here are implemented as systems on chip...
This book focuses on information-geometric manifolds of structured data and models and related applied mathematics. It features new and fruitful interactions between several branches of science: Advanced Signal/Image/Video Processing, Complex Data Modeling and Analysis,...
This state-of-the-art book deals with advanced spatial modulation (ASM), which are a special class of recent Multiple-Input Multiple-Output MIMO techniques, for various applications like radio frequency (RF) based body area network (BAN) communication, free-space...
This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time...
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers