Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 9 of 9 matches in All Departments
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication with SC-FDMA and how it can improve the physical layer security. It considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. Supplying you with the required foundation in cooperative communication and cooperative diversity, it presents an improved Discrete Cosine Transform (DCT)-based SC-FDMA system. It introduces a distributed space-time coding scheme and evaluates its performance and studies distributed SFC for broadband relay channels. Presents relay selection schemes for improving the physical layer Introduces a new transceiver scheme for the SC-FDMA system Describes space-time/frequency coding schemes for SC-FDMA Includes MATLAB (R) codes for all simulation experiments The book investigates Carrier Frequency Offsets (CFO) for the Single-Input Single-Output (SISO) SC-FDMA system, and Multiple-Input Multiple-Output (MIMO) SC-FDMA system simulation software. Covering the design of cooperative diversity schemes for the SC-FDMA system in the uplink direction, it also introduces and studies a new transceiver scheme for the SC-FDMA system.
This book is devoted to the issue of image super-resolution-obtaining high-resolution images from single or multiple low-resolution images. Although there are numerous algorithms available for image interpolation and super-resolution, there's been a need for a book that establishes a common thread between the two processes. Filling this need, Image Super-Resolution and Applications presents image interpolation as a building block in the super-resolution reconstruction process. Instead of approaching image interpolation as either a polynomial-based problem or an inverse problem, this book breaks the mold and compares and contrasts the two approaches. It presents two directions for image super-resolution: super-resolution with a priori information and blind super-resolution reconstruction of images. It also devotes chapters to the two complementary steps used to obtain high-resolution images: image registration and image fusion. Details techniques for color image interpolation and interpolation for pattern recognition Analyzes image interpolation as an inverse problem Presents image registration methodologies Considers image fusion and its application in image super resolution Includes simulation experiments along with the required MATLAB (R) code Supplying complete coverage of image-super resolution and its applications, the book illustrates applications for image interpolation and super-resolution in medical and satellite image processing. It uses MATLAB (R) programs to present various techniques, including polynomial image interpolation and adaptive polynomial image interpolation. MATLAB codes for most of the simulation experiments supplied in the book are included in the appendix.
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.
SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication with SC-FDMA and how it can improve the physical layer security. It considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. Supplying you with the required foundation in cooperative communication and cooperative diversity, it presents an improved Discrete Cosine Transform (DCT)-based SC-FDMA system. It introduces a distributed space-time coding scheme and evaluates its performance and studies distributed SFC for broadband relay channels. Presents relay selection schemes for improving the physical layer Introduces a new transceiver scheme for the SC-FDMA system Describes space-time/frequency coding schemes for SC-FDMA Includes MATLAB (R) codes for all simulation experiments The book investigates Carrier Frequency Offsets (CFO) for the Single-Input Single-Output (SISO) SC-FDMA system, and Multiple-Input Multiple-Output (MIMO) SC-FDMA system simulation software. Covering the design of cooperative diversity schemes for the SC-FDMA system in the uplink direction, it also introduces and studies a new transceiver scheme for the SC-FDMA system.
The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.
This book is devoted to the issue of image super-resolution-obtaining high-resolution images from single or multiple low-resolution images. Although there are numerous algorithms available for image interpolation and super-resolution, there's been a need for a book that establishes a common thread between the two processes. Filling this need, Image Super-Resolution and Applications presents image interpolation as a building block in the super-resolution reconstruction process. Instead of approaching image interpolation as either a polynomial-based problem or an inverse problem, this book breaks the mold and compares and contrasts the two approaches. It presents two directions for image super-resolution: super-resolution with a priori information and blind super-resolution reconstruction of images. It also devotes chapters to the two complementary steps used to obtain high-resolution images: image registration and image fusion. Details techniques for color image interpolation and interpolation for pattern recognition Analyzes image interpolation as an inverse problem Presents image registration methodologies Considers image fusion and its application in image super resolution Includes simulation experiments along with the required MATLAB (R) code Supplying complete coverage of image-super resolution and its applications, the book illustrates applications for image interpolation and super-resolution in medical and satellite image processing. It uses MATLAB (R) programs to present various techniques, including polynomial image interpolation and adaptive polynomial image interpolation. MATLAB codes for most of the simulation experiments supplied in the book are included in the appendix.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
|
You may like...
|