This book provides a comprehensive overview of how fractal analytics can lead to the extraction of interesting features from the complex electroencephalograph (EEG) signals generated by Hindustani classical music.
ISBN:
(数字)9789811065118
ISBN:
(纸本)9789811065101
This book provides a comprehensive overview of how fractal analytics can lead to the extraction of interesting features from the complex electroencephalograph (EEG) signals generated by Hindustani classical music.
This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers worki...
详细信息
ISBN:
(数字)9789811084324
ISBN:
(纸本)9789811084317
This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers working on communication subjects. The book especially focuses on the understandability of the topics, and accordingly uses simple and detailed mathematics, together with a wealth of solved examples. The book consists of four chapters, the first of which explains the entropy and mutual information concept for discrete random variables. Chapter 2 introduces the concepts of entropy and mutual information for continuous random variables, along with the channel capacity. In turn, Chapter 3 is devoted to the typical sequences and data compression. One of Shannons most important discoveries is the channel coding theorem, and it is critical for electrical and communication engineers to fully comprehend the theorem. As such, Chapter 4 solely focuses on it. To gain the most from the book, readers should have a fundamental grasp of probability and random variables; otherwise, they will find it nearly impossible to understand the topics discussed.
This open access book brings out the state of the art on how informatics-based tools are used and expected to be used in nanomaterials research. There has been great progress in the area in which “big-data” generate...
详细信息
ISBN:
(数字)9789811076176
ISBN:
(纸本)9789811076169
This open access book brings out the state of the art on how informatics-based tools are used and expected to be used in nanomaterials research. There has been great progress in the area in which “big-data” generated by experiments or computations are fully utilized to accelerate discovery of new materials, key factors, and design rules. Data-intensive approaches play indispensable roles in advanced materials characterization. 'materials informatics' is the central paradigm in the new trend. 'nanoinformatics' is its essential subset, which focuses on nanostructures of materials such as surfaces, interfaces, dopants, and point defects, playing a critical role in determining materials properties. There have been significant advances in experimental and computational techniques to characterize individual atoms in nanostructures and to gain quantitative information.
This book offers a detailed description of the histogram probabilistic multi-hypothesis tracker (H-PMHT), providing an accessible and intuitive introduction to the mathematical mechanics of H-PMHT as well as a definit...
ISBN:
(数字)9789811075933
ISBN:
(纸本)9789811075926
This book offers a detailed description of the histogram probabilistic multi-hypothesis tracker (H-PMHT), providing an accessible and intuitive introduction to the mathematical mechanics of H-PMHT as well as a definitive reference source for the existing literature on the method. Beginning with basic concepts, the authors then move on to address extensions of the method to a broad class of tracking problems. The latter chapters present applications using recorded data from experimental radar, sonar and video sensor systems. The book is supplemented with software that both furthers readers understanding and acts as a toolkit for those who wish to apply the methods to their own problems.
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms for wired devices are not suf...
ISBN:
(数字)9783319789422
ISBN:
(纸本)9783319789415
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms for wired devices are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors...
ISBN:
(数字)9783319731834
ISBN:
(纸本)9783319731827
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
暂无评论