Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Written for students, remote sensing specialists, researchers and SAR system designers, Processing of SAR Data shows how to produce quality SAR images.
For the first time, a reference on the most relevant applications of adaptive filtering techniques. Top researchers in the field contributed chapters addressing applications in acoustics, speech, wireless and networking, where research is still very active and open.
This book offers a hands-on review of speech intelligibility measurement methods that helps readers quickly measure or estimate speech intelligibility in their own systems. Introduces speech quality measures, and details intelligibility measurement methods.
This book reviews acoustic MIMO scenarios for improving human-machine interaction. The book establishes an acoustic MIMO paradigm, linking MIMO signal processing with classical signal processing. Also presented is a novel analysis of acoustic applications to reinforce the fundamentals of acoustic MIMO signal processing.
This is the only book of its scope to comprehensively investigate the performance and problems of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack. It is an ideal reference work giving valuable advice on protocols, transmission modes, and coding schemes.
This book is intended for students and professionals who are interested in the field of digital signal processing of delta-sigma modulated sequences. The overall focus is on the development of algorithms and circuits for linear, non-linear, and mixed mode processing of delta-sigma modulated pulse streams.
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems.
This work offers students at all levels a description of linear, nonlinear, time-invariant, and time-varying electronic continuous-time systems.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services.
This book treats important topics in "Acoustic Echo and Noise Control" and reports the latest developments. This book, written by an international team of highly qualified experts, concentrates on the modern and advanced methods.
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives.
Today's wireless services have come a long way since the roll out of the conventional voice-centric cellular systems. This book discusses the cognitive radio, software defined radio, and adaptive radio concepts from several perspectives.
This is the world's first edited book on independent component analysis (ICA)-based blind source separation (BSS) of convolutive mixtures of speech.
This book explores the optimization potential of cross-layer design approaches for wireless ad hoc and sensor network performance, covering both theory and practice. A practical section builds on these issues to explore three case studies of diverse ad hoc and sensor network applications and communication technologies.
This book offers an extended description of continuous-time signals related to signals and systems. Presenting bandlimited and analytic signals, the book reviews the methods of their description, transformation (by Hilbert transform), and sampling.
A crucial reference tool for the increasing number of scientists who depend upon sensor networks in a widening variety of ways. Coverage includes network design and modeling, network management, data management, security and applications.
Grid architectures, which are viewed as tools for the integration of distributed resources, play a significant role as managers of computational resources, but also as aggregators of measurement instrumentation and pervasive large-scale data acquisition platforms.
Algorithmic Information Theory treats the mathematics of many important areas in digital information processing. It has been written as a read-and-learn book on concrete mathematics, for teachers, students and practitioners in electronic engineering, computer science and mathematics.
From the usage of mobile phones - either as simple telephone or for data transmissions - over the new form of telephone service Voice over IP (VoIP), up to the widely used Internet at the users own PC, in all instances the transmission of the information, encoded in a digital form, relies on the Internet Protocol (IP).
Before designing a speech application system, three key questions have to be answered: who will use it, why and how often? This book focuses on these high-level questions and gives a criteria of when and how to design speech systems. The book goes on to evolve criteria for designing and evaluating successful voice user interfaces.
This book gives a detailed description of the handover issues in DVB-H networks, in converged DVB-H/UMTS networks and in hybrid DVB-H/DMB-T networks. The current status and the future research directions of DVB-H and DVB-H handover are also presented.
Discusses the information model that describes the purpose, structure, and behavior of a network. This title presents an added-value modeling language that called AMLn (Abstract Modeling Language, network view), which is an attempt to create a modeling language for network systems.
In addition the test cases specified in the standard are described together with their implications on any practical front-end design. Additional explanations of the standard and especially the test cases will help to better understand the effects on any front-end system design.
For the first time, this highly interdisciplinary book covers the applications of neuro-fuzzy and fuzzy-neural scientific tools in a very wide area within the communications field. It deals with the important and modern areas of telecommunications amenable to such a treatment.
Multimedia Content Analysis: Theory and Applications covers the latest in multimedia content analysis and applications based on such analysis.
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security.
This introductory volume provides a systematic overview of WiMAX technology, demystifing the technology and providing technical advice on various system trade-offs. Coverage includes the IEEE 802.16 standard, a tutorial on implementation and tips on controlling cost of WiMAX network ownership.
Direct solution to real-data DFT methods are presented in this volume, which are targeted at real-world applications, like mobile communications. The methods discussed offer simple design variations that optimize resources for the best results.
The importance of this book is not only related to being the first work on personal networks. It also gives an overview of the operation of big projects such as MAGNET, while the organization of the book itself mirrors the way the project has been structured.
This illuminating book presents the theory and application of the philosophy of Digital Communication systems. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.