Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This book provides information about wireless systems and WIMAX modeling. The authors provide various techniques for the WiMAX systems such as antenna diversity and Alamouti coding. The performance of these systems is tested using various types of data and the results of systems are presented and discussed. Additional topics include WiMAX simulation using diversity techniques and real time WiMAX system modeling. The book pertains to researchers, academics, students, and professionals. Provides information about wireless system modeling and WiMAX systems; Presents WiMAX system modeling using antenna diversity techniques and the Alamouti coding scheme; Includes real time WiMAX system modeling for speech signal and digital images.
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
This book provides various speech enhancement algorithms for digital hearing aids. It covers information on noise signals extracted from silences of speech signal. The description of the algorithm used for this purpose is also provided. Different types of adaptive filters such as Least Mean Squares (LMS), Normalized LMS (NLMS) and Recursive Lease Squares (RLS) are described for noise reduction in the speech signals. Different types of noises are taken to generate noisy speech signals, and therefore information on various noises signals is provided. The comparative performance of various adaptive filters for noise reduction in speech signals is also described. In addition, the book provides a speech enhancement technique using adaptive filtering and necessary frequency strength enhancement using wavelet transform as per the requirement of audiogram for digital hearing aids. Presents speech enhancement techniques for improving performance of digital hearing aids; Covers various types of adaptive filters and their advantages and limitations; Provides a hybrid speech enhancement technique using wavelet transform and adaptive filters.
This book provides information about wireless systems and WIMAX modeling. The authors provide various techniques for the WiMAX systems such as antenna diversity and Alamouti coding. The performance of these systems is tested using various types of data and the results of systems are presented and discussed. Additional topics include WiMAX simulation using diversity techniques and real time WiMAX system modeling. The book pertains to researchers, academics, students, and professionals. Provides information about wireless system modeling and WiMAX systems; Presents WiMAX system modeling using antenna diversity techniques and the Alamouti coding scheme; Includes real time WiMAX system modeling for speech signal and digital images.
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
|
You may like...
|