|
Showing 1 - 5 of
5 matches in All Departments
This book provides information about wireless systems and WIMAX
modeling. The authors provide various techniques for the WiMAX
systems such as antenna diversity and Alamouti coding. The
performance of these systems is tested using various types of data
and the results of systems are presented and discussed. Additional
topics include WiMAX simulation using diversity techniques and real
time WiMAX system modeling. The book pertains to researchers,
academics, students, and professionals. Provides information about
wireless system modeling and WiMAX systems; Presents WiMAX system
modeling using antenna diversity techniques and the Alamouti coding
scheme; Includes real time WiMAX system modeling for speech signal
and digital images.
This book provides information about wireless systems and WIMAX
modeling. The authors provide various techniques for the WiMAX
systems such as antenna diversity and Alamouti coding. The
performance of these systems is tested using various types of data
and the results of systems are presented and discussed. Additional
topics include WiMAX simulation using diversity techniques and real
time WiMAX system modeling. The book pertains to researchers,
academics, students, and professionals. Provides information about
wireless system modeling and WiMAX systems; Presents WiMAX system
modeling using antenna diversity techniques and the Alamouti coding
scheme; Includes real time WiMAX system modeling for speech signal
and digital images.
This book presents multibiometric watermarking techniques for
security of biometric data. This book also covers transform domain
multibiometric watermarking techniques and their advantages and
limitations. The authors have developed novel watermarking
techniques with a combination of Compressive Sensing (CS) theory
for the security of biometric data at the system database of the
biometric system. The authors show how these techniques offer
higher robustness, authenticity, better imperceptibility, increased
payload capacity, and secure biometric watermarks. They show how to
use the CS theory for the security of biometric watermarks before
embedding into the host biometric data. The suggested methods may
find potential applications in the security of biometric data at
various banking applications, access control of laboratories,
nuclear power stations, military base, and airports.
This book provides various speech enhancement algorithms for
digital hearing aids. It covers information on noise signals
extracted from silences of speech signal. The description of the
algorithm used for this purpose is also provided. Different types
of adaptive filters such as Least Mean Squares (LMS), Normalized
LMS (NLMS) and Recursive Lease Squares (RLS) are described for
noise reduction in the speech signals. Different types of noises
are taken to generate noisy speech signals, and therefore
information on various noises signals is provided. The comparative
performance of various adaptive filters for noise reduction in
speech signals is also described. In addition, the book provides a
speech enhancement technique using adaptive filtering and necessary
frequency strength enhancement using wavelet transform as per the
requirement of audiogram for digital hearing aids. Presents speech
enhancement techniques for improving performance of digital hearing
aids; Covers various types of adaptive filters and their advantages
and limitations; Provides a hybrid speech enhancement technique
using wavelet transform and adaptive filters.
This book presents multibiometric watermarking techniques for
security of biometric data. This book also covers transform domain
multibiometric watermarking techniques and their advantages and
limitations. The authors have developed novel watermarking
techniques with a combination of Compressive Sensing (CS) theory
for the security of biometric data at the system database of the
biometric system. The authors show how these techniques offer
higher robustness, authenticity, better imperceptibility, increased
payload capacity, and secure biometric watermarks. They show how to
use the CS theory for the security of biometric watermarks before
embedding into the host biometric data. The suggested methods may
find potential applications in the security of biometric data at
various banking applications, access control of laboratories,
nuclear power stations, military base, and airports.
|
You may like...
Celebrations
Jan Kohler
Hardcover
R450
R351
Discovery Miles 3 510
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|