Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications


Book Description

For the first time, this highly interdisciplinary book covers the applications of neuro-fuzzy and fuzzy-neural scientific tools in a very wide area within the communications field. It deals with the important and modern areas of telecommunications amenable to such a treatment.




Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms


Book Description

Artificial neural networks can mimic the biological information-processing mechanism in - a very limited sense. Fuzzy logic provides a basis for representing uncertain and imprecise knowledge and forms a basis for human reasoning. Neural networks display genuine promise in solving problems, but a definitive theoretical basis does not yet exist for their design. Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms integrates neural net, fuzzy system, and evolutionary computing in system design that enables its readers to handle complexity - offsetting the demerits of one paradigm by the merits of another. This book presents specific projects where fusion techniques have been applied. The chapters start with the design of a new fuzzy-neural controller. Remaining chapters discuss the application of expert systems, neural networks, fuzzy control, and evolutionary computing techniques in modern engineering systems. These specific applications include: direct frequency converters electro-hydraulic systems motor control toaster control speech recognition vehicle routing fault diagnosis Asynchronous Transfer Mode (ATM) communications networks telephones for hard-of-hearing people control of gas turbine aero-engines telecommunications systems design Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms covers the spectrum of applications - comprehensively demonstrating the advantages of fusion techniques in industrial applications.




Wireless Network Security


Book Description

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.




Wireless Ad Hoc and Sensor Networks


Book Description

This book explores the optimization potential of cross-layer design approaches for wireless ad hoc and sensor network performance, covering both theory and practice. A theoretical section provides an overview of design issues in both strictly layered and cross-layer approaches. A practical section builds on these issues to explore three case studies of diverse ad hoc and sensor network applications and communication technologies.




Cryptographic Algorithms on Reconfigurable Hardware


Book Description

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.




Multimedia Database Retrieval:


Book Description

-Presents state-of-the-art in visual media retrieval. -Coverage of adaptive content-based retrieval systems and techniques in image and video database applications. -Includes a novel machine-controlled interactive retrieval (MCIR) method that optimizes image search in distributed digital libraries over the Internet.




Electronic Noise and Interfering Signals


Book Description

Electronic Noise and Interfering Signals is a comprehensive reference book on noise and interference in electronic circuits, with particular focus on low-noise design. The first part of the book deals with mechanisms, modelling, and computation of intrinsic noise which is generated in every electronic device. The second part analyzes the coupling mechanisms which can lead to a contamination of circuits by parasitic signals and provides appropriate solutions to this problem. The last part contains more than 100 practical, elaborate case studies. The book requires no advanced mathematical training as it introduces the fundamental methods. Moreover, it provides insight into computational noise analysis with SPICE and NOF, a software developed by the author. The book addresses designers of electronic circuits as well as researchers from electrical engineering, physics, and material science. It should also be of interest for undergraduate and graduate students.




Interactive Video


Book Description

This book is a groundbreaking resource that covers both algorithms and technologies of interactive videos. It presents recent research and application work for building and browsing interactive digital videos. The book deals mainly with low-level semi-automatic and full-automatic processing of the video content for intelligent human computer interaction. There is a special focus on eye tracking methods.




Algorithmic Information Theory


Book Description

Algorithmic Information Theory treats the mathematics of many important areas in digital information processing. It has been written as a read-and-learn book on concrete mathematics, for teachers, students and practitioners in electronic engineering, computer science and mathematics. The presentation is dense, and the examples and exercises are numerous. It is based on lectures on information technology (Data Compaction, Cryptography, Polynomial Coding) for engineers.




Acoustic MIMO Signal Processing


Book Description

Telecommunication systems and human-machine interfaces have begun using multiple microphones and loudspeakers to render interaction more lifelike, and more efficient. This raises acoustic signal processing problems under multiple-input multiple-output (MIMO) scenarios, encompassing distant speech acquisition, sound source localization and tracking, echo and noise control, source separation and speech dereverberation, and many others. The book opens with an acoustic MIMO paradigm, establishing fundamentals, and linking acoustic MIMO signal processing with classical signal processing and communication theories. The second part of the book presents a novel analysis of acoustic applications carried out in the paradigm to reinforce the fundamentals of acoustic MIMO signal processing.