Author: Jan Awrejcewicz
Publisher: Springer Nature
ISBN: 3031564960
Category :
Languages : en
Pages : 800
Book Description
Perspectives in Dynamical Systems II — Numerical and Analytical Approaches
Author: Jan Awrejcewicz
Publisher: Springer Nature
ISBN: 3031564960
Category :
Languages : en
Pages : 800
Book Description
Publisher: Springer Nature
ISBN: 3031564960
Category :
Languages : en
Pages : 800
Book Description
Security without Obscurity
Author: J.J. Stapleton
Publisher: CRC Press
ISBN: 1040073557
Category : Business & Economics
Languages : en
Pages : 360
Book Description
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit
Publisher: CRC Press
ISBN: 1040073557
Category : Business & Economics
Languages : en
Pages : 360
Book Description
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit
Advances in Artificial Intelligence
Author: Enrique Alba
Publisher: Springer Nature
ISBN: 3030857131
Category : Computers
Languages : en
Pages : 280
Book Description
This book constitutes the refereed proceedings of the 19th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2020, which was cancelled due to the COVID-19 pandemic, amalgamated with CAEPIA 2021, and held in Malaga, Spain, during September 2021. The 25 full papers presented were carefully selected from 40 submissions. The Conference of the Spanish Association of Artificial Intelligence (CAEPIA) is a biennial forum open to researchers from all over the world to present and discuss their latest scientific and technological advances in Antificial Intelligence (AI). The book is subdivided into the following topical headings: machine learning, optimization and search, and real-world applications. It covers such themes as ambient intelligence and smart environments; computer vision and robotics; constraints, search and planning; creativity and A.I.; education and A.I.; explainable and responsible A.I.; foundation, models and applications of A.I, and others.
Publisher: Springer Nature
ISBN: 3030857131
Category : Computers
Languages : en
Pages : 280
Book Description
This book constitutes the refereed proceedings of the 19th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2020, which was cancelled due to the COVID-19 pandemic, amalgamated with CAEPIA 2021, and held in Malaga, Spain, during September 2021. The 25 full papers presented were carefully selected from 40 submissions. The Conference of the Spanish Association of Artificial Intelligence (CAEPIA) is a biennial forum open to researchers from all over the world to present and discuss their latest scientific and technological advances in Antificial Intelligence (AI). The book is subdivided into the following topical headings: machine learning, optimization and search, and real-world applications. It covers such themes as ambient intelligence and smart environments; computer vision and robotics; constraints, search and planning; creativity and A.I.; education and A.I.; explainable and responsible A.I.; foundation, models and applications of A.I, and others.
Security without Obscurity
Author: Jeff Stapleton
Publisher: CRC Press
ISBN: 1000349535
Category : Computers
Languages : en
Pages : 253
Book Description
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Publisher: CRC Press
ISBN: 1000349535
Category : Computers
Languages : en
Pages : 253
Book Description
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Advances in Multiuser Detection
Author: Michael L. Honig
Publisher: John Wiley & Sons
ISBN: 9780470473801
Category : Technology & Engineering
Languages : en
Pages : 512
Book Description
A Timely Exploration of Multiuser Detection in Wireless Networks During the past decade, the design and development of current and emerging wireless systems have motivated many important advances in multiuser detection. This book fills an important need by providing a comprehensive overview of crucial recent developments that have occurred in this active research area. Each chapter is contributed by noted experts and is meant to serve as a self-contained treatment of the topic. Coverage includes: Linear and decision feedback methods Iterative multiuser detection and decoding Multiuser detection in the presence of channel impairments Performance analysis with random signatures and channels Joint detection methods for MIMO channels Interference avoidance methods at the transmitter Transmitter precoding methods for the MIMO downlink This book is an ideal entry point for exploring ongoing research in multiuser detection and for learning about the field's existing unsolved problems and issues. It is a valuable resource for researchers, engineers, and graduate students who are involved in the area of digital communications.
Publisher: John Wiley & Sons
ISBN: 9780470473801
Category : Technology & Engineering
Languages : en
Pages : 512
Book Description
A Timely Exploration of Multiuser Detection in Wireless Networks During the past decade, the design and development of current and emerging wireless systems have motivated many important advances in multiuser detection. This book fills an important need by providing a comprehensive overview of crucial recent developments that have occurred in this active research area. Each chapter is contributed by noted experts and is meant to serve as a self-contained treatment of the topic. Coverage includes: Linear and decision feedback methods Iterative multiuser detection and decoding Multiuser detection in the presence of channel impairments Performance analysis with random signatures and channels Joint detection methods for MIMO channels Interference avoidance methods at the transmitter Transmitter precoding methods for the MIMO downlink This book is an ideal entry point for exploring ongoing research in multiuser detection and for learning about the field's existing unsolved problems and issues. It is a valuable resource for researchers, engineers, and graduate students who are involved in the area of digital communications.
Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications
Author: Al-Haj, Ali Mohammad
Publisher: IGI Global
ISBN: 1615209042
Category : Education
Languages : en
Pages : 565
Book Description
"This book introduces readers to state-of-art research in multimedia watermarking in the different disciplines of watermarking, addressing the different aspects of advanced watermarking research; modeling and theoretical analysis, advanced embedding and extraction techniques, software and hardware implementations, and performance evaluations of watermarking systems"--Provided by publisher.
Publisher: IGI Global
ISBN: 1615209042
Category : Education
Languages : en
Pages : 565
Book Description
"This book introduces readers to state-of-art research in multimedia watermarking in the different disciplines of watermarking, addressing the different aspects of advanced watermarking research; modeling and theoretical analysis, advanced embedding and extraction techniques, software and hardware implementations, and performance evaluations of watermarking systems"--Provided by publisher.
Innovative Testing and Measurement Solutions for Smart Grid
Author: Qi Huang
Publisher: John Wiley & Sons
ISBN: 1118889924
Category : Technology & Engineering
Languages : en
Pages : 300
Book Description
Focuses on sensor applications and smart meters in the newly developing interconnected smart grid • Focuses on sensor applications and smart meters in the newly developing interconnected smart grid • Presents the most updated technological developments in the measurement and testing of power systems within the smart grid environment • Reflects the modernization of electric utility power systems with the extensive use of computer, sensor, and data communications technologies, providing benefits to energy consumers and utility companies alike • The leading author heads a group of researchers focusing on the construction of smart grid and smart substation for Sichuan Power Grid, one of the largest in China’s power system
Publisher: John Wiley & Sons
ISBN: 1118889924
Category : Technology & Engineering
Languages : en
Pages : 300
Book Description
Focuses on sensor applications and smart meters in the newly developing interconnected smart grid • Focuses on sensor applications and smart meters in the newly developing interconnected smart grid • Presents the most updated technological developments in the measurement and testing of power systems within the smart grid environment • Reflects the modernization of electric utility power systems with the extensive use of computer, sensor, and data communications technologies, providing benefits to energy consumers and utility companies alike • The leading author heads a group of researchers focusing on the construction of smart grid and smart substation for Sichuan Power Grid, one of the largest in China’s power system
Resilient Power Electronic Systems
Author: Shahriyar Kaboli
Publisher: John Wiley & Sons
ISBN: 1119772184
Category : Technology & Engineering
Languages : en
Pages : 388
Book Description
Resilient Power Electronic Systems Discover an advanced reference offering a powerful novel approach to the design and use of reliable and fault-tolerant power electronic systems In Resilient Power Electronic Systems, a team of accomplished researchers deliver an insightful treatment of the challenges faced by practitioners and researchers working with power electronic converters and attempting to analyze internal and external failure mechanisms. The authors expertly present advanced techniques for reducing noise effects on fault detection and prognosis. Comprised of thirteen chapters, the authors discuss the concepts of resilience and effective operative life in the context of power electronics. The differences between reliable and efficient systems are discussed, as well as the nature of these differences in complex systems. Finally, the book explores various methods to improve the resilience of power converters. Resilient Power Electronic Systems is packed with features, including illustrations, practice problems, and PowerPoint presentations. The book also includes: A thorough introduction to the application of power electronics in various industries, as well as the concept of resilience in a power converter Comprehensive explorations of resilience against fault tolerance, including fault-tolerant power converters and resilient power converters Practical discussions of the state-of-the-art in resilient power converters, including examinations of mission-critical applications In-depth examinations of internal and external fault in power converters with mission-critical applications Resilient Power Electronic Systems is an indispensable resource for researchers, professionals, and postgraduate students studying power electronics. It’s also an ideal reference for research and development engineers working with the design and development of power electronic converters.
Publisher: John Wiley & Sons
ISBN: 1119772184
Category : Technology & Engineering
Languages : en
Pages : 388
Book Description
Resilient Power Electronic Systems Discover an advanced reference offering a powerful novel approach to the design and use of reliable and fault-tolerant power electronic systems In Resilient Power Electronic Systems, a team of accomplished researchers deliver an insightful treatment of the challenges faced by practitioners and researchers working with power electronic converters and attempting to analyze internal and external failure mechanisms. The authors expertly present advanced techniques for reducing noise effects on fault detection and prognosis. Comprised of thirteen chapters, the authors discuss the concepts of resilience and effective operative life in the context of power electronics. The differences between reliable and efficient systems are discussed, as well as the nature of these differences in complex systems. Finally, the book explores various methods to improve the resilience of power converters. Resilient Power Electronic Systems is packed with features, including illustrations, practice problems, and PowerPoint presentations. The book also includes: A thorough introduction to the application of power electronics in various industries, as well as the concept of resilience in a power converter Comprehensive explorations of resilience against fault tolerance, including fault-tolerant power converters and resilient power converters Practical discussions of the state-of-the-art in resilient power converters, including examinations of mission-critical applications In-depth examinations of internal and external fault in power converters with mission-critical applications Resilient Power Electronic Systems is an indispensable resource for researchers, professionals, and postgraduate students studying power electronics. It’s also an ideal reference for research and development engineers working with the design and development of power electronic converters.
Encyclopedia of Information Science and Technology
Author: Mehdi Khosrow-Pour
Publisher: IGI Global Snippet
ISBN: 9781605660264
Category : Computers
Languages : en
Pages : 4292
Book Description
"This set of books represents a detailed compendium of authoritative, research-based entries that define the contemporary state of knowledge on technology"--Provided by publisher.
Publisher: IGI Global Snippet
ISBN: 9781605660264
Category : Computers
Languages : en
Pages : 4292
Book Description
"This set of books represents a detailed compendium of authoritative, research-based entries that define the contemporary state of knowledge on technology"--Provided by publisher.
Hybrid Encryption Algorithms over Wireless Communication Channels
Author: Mai Helmy Shaheen
Publisher: CRC Press
ISBN: 1000325989
Category : Technology & Engineering
Languages : en
Pages : 269
Book Description
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik’s cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today’s communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB® codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Publisher: CRC Press
ISBN: 1000325989
Category : Technology & Engineering
Languages : en
Pages : 269
Book Description
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik’s cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today’s communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB® codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.