Forthcoming Books


Book Description




Frontiers of Remote Sensing Information Processing


Book Description

... This book covers the frontiers of remote sensors, especially with effective algorithms for signal/image processing and pattern recognition with remote sensing data. Sensor and data fusion issues, SAR images, hyperspectral images, and related special topics are also examined. Techniques making use of neural networks, wavelet transforms, and knowledge-based systems are emphasized. A special set of three chapters is devoted to seismic analysis and discrimination.




Image and Video Compression for Multimedia Engineering


Book Description

Multimedia hardware still cannot accommodate the demand for large amounts of visual data. Without the generation of high-quality video bitstreams, limited hardware capabilities will continue to stifle the advancement of multimedia technologies. Thorough grounding in coding is needed so that applications such as MPEG-4 and JPEG 2000 may come to fruition. Image and Video Compression for Multimedia Engineering provides a solid, comprehensive understanding of the fundamentals and algorithms that lead to the creation of new methods for generating high quality video bit streams. The authors present a number of relevant advances along with international standards. New to the Second Edition · A chapter describing the recently developed video coding standard, MPEG-Part 10 Advances Video Coding also known as H.264 · Fundamental concepts and algorithms of JPEG2000 · Color systems of digital video · Up-to-date video coding standards and profiles Visual data, image, and video coding will continue to enable the creation of advanced hardware, suitable to the demands of new applications. Covering both image and video compression, this book yields a unique, self-contained reference for practitioners tobuild a basis for future study, research, and development.




Physical and Data-Link Security Techniques for Future Communication Systems


Book Description

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.




Applied Cryptography


Book Description

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.




Life and Motion of Socio-Economic Units


Book Description

One of the ongoing problems researchers in geography and GIS have is studying data that is inherently spatial over a long period of time. One of the main hurdles they have to overcome is the study of groups of people classified by their socio-economic status (one of the main means for governments, companies and research organisations to group together segments of the population). The amount of data collected by governments, business and research organisations has increased markedly in recent years. Geographic Information Systems have been more widely used than ever before for the storage and analysis of this information. Most GIS can handle this information spatially rather than temporally, and have difficulty with the management of socio-economic time series, which relate to spatial units. Accordingly, this book covers the issues ranging from the formal model to differentiate aspects of spatio-temporal data, through philosophical and fundamental reconsideration of time and space to the development of practical solutions to the problem. This book draws together an interdisciplinary group of scientists in the field of geography, computing, surveying and philosophy. It presents the definitive sourcebook on temporal GIS as applied to socio-economic units.




Cooperative Communications and Networking


Book Description

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications. Cooperative Communications and Networking: Technologies and System Design provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area. Cooperative Communications and Networking: Technologies and System Design provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.




Guide to Wireless Sensor Networks


Book Description

Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.