Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book presents a survey of the state-of-the art in the exciting and timely topic of compressed sensing for distributed systems. To help the reader become familiar with the theory and algorithms presented, accompanying software is made available on the authors' web site, implementing several of the algorithms described in the book.
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems.
This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books.
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing.
The book covers the design formulations for broadband beamformer targeting nearfield and farfield sources. Subsequently it introduces design formulation for nearfield, farfield and mixed nearfield-farfield beamformers and extends the design formulation into electronically steerable beamformers.
This book first introduces the background of spatial audio reproduction, with different types of audio content and for different types of playback systems.
This book presents an overview of speaker recognition technologies with an emphasis on dealing with robustness issues. Secondly, with regard to robustness issues, the book presents three categories, including environment-related issues, speaker-related issues and application-oriented issues.
This book offers an overview of traditional big visual data analysis approaches and provides state-of-the-art solutions for several scene comprehension problems, indoor/outdoor classification, outdoorscene classification, and outdoor scene layout estimation.
The book encompasses the state-of-the-art visual quality assessment (VQA) and learning based visual quality assessment (LB-VQA) by providing a comprehensive overview of the existing relevant methods.
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency.
This book will provide a comprehensive overview on human action analysis with randomized trees. We describe how the randomized trees can be used for action classification, action detection, action search, and action prediction.
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
This book offers comprehensive coverage on the most important aspects of audio watermarking, from classic techniques to the latest advances, from commonly investigated topics to emerging research subdomains, and from the research and development achievements to date, to current limitations, challenges, and future directions.
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT).
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths.
This book presents a novel non-intrusive infrastructure monitoring technique based on the detection and tracking of scattering centers in spaceborne SAR images.
This book provides readers a complete and self-contained set of knowledge about dependent source separation, including the latest development in this field. The book further focuses on the non-negativity based methods, the time-frequency analysis based methods, and the pre-coding based methods, respectively.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.