Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Audio Content Security
  • Language: en

Audio Content Security

  • Type: Book
  • -
  • Published: 2016-07-19
  • -
  • Publisher: Syngress

Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Theoretical and Experimental Methods for Defending Against DDoS Attacks
  • Language: en
  • Pages: 76

Theoretical and Experimental Methods for Defending Against DDoS Attacks

  • Type: Book
  • -
  • Published: 2015-11-10
  • -
  • Publisher: Syngress

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amp...

A Machine-Learning Approach to Phishing Detection and Defense
  • Language: en
  • Pages: 101

A Machine-Learning Approach to Phishing Detection and Defense

  • Type: Book
  • -
  • Published: 2014-12-05
  • -
  • Publisher: Syngress

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats

A Study of Black Hole Attack Solutions
  • Language: en
  • Pages: 124

A Study of Black Hole Attack Solutions

  • Type: Book
  • -
  • Published: 2015-11-03
  • -
  • Publisher: Syngress

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sop...

Optimizing IEEE 802.11i Resource and Security Essentials
  • Language: en
  • Pages: 69

Optimizing IEEE 802.11i Resource and Security Essentials

  • Type: Book
  • -
  • Published: 2014-12-05
  • -
  • Publisher: Syngress

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the cur...

Optical Soliton Communication Using Ultra-Short Pulses
  • Language: en
  • Pages: 51

Optical Soliton Communication Using Ultra-Short Pulses

  • Type: Book
  • -
  • Published: 2015-05-07
  • -
  • Publisher: Springer

This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.

Integrated Micro-Ring Photonics
  • Language: en
  • Pages: 174

Integrated Micro-Ring Photonics

  • Type: Book
  • -
  • Published: 2016-12-08
  • -
  • Publisher: CRC Press

Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fib...

Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton
  • Language: en
  • Pages: 76

Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton

  • Type: Book
  • -
  • Published: 2014-08-27
  • -
  • Publisher: Springer

The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.

Soliton Coding for Secured Optical Communication Link
  • Language: en
  • Pages: 66

Soliton Coding for Secured Optical Communication Link

  • Type: Book
  • -
  • Published: 2014-07-24
  • -
  • Publisher: Springer

Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0–100 GHz. The soliton signals are multiplexed and modulated with the logic codes to transmit the data via a network system. The soliton carriers play critical roles to transmit the data via an optical communication link and provide many applications in secured optical communications. Therefore, transmission of data information can be performed via a communication network using soliton pulse carriers. A system known as optical multiplexer can be used to increase the channel capacity and security of the signals.

Introducing CTS (Copper-Tin-Sulphide) as a Solar Cell by Using Solar Cell Capacitance Simulator (SCAPS)
  • Language: en
  • Pages: 67

Introducing CTS (Copper-Tin-Sulphide) as a Solar Cell by Using Solar Cell Capacitance Simulator (SCAPS)

  • Type: Book
  • -
  • Published: 2019-05-31
  • -
  • Publisher: Springer

This book discusses the enhancement of efficiency in currently used solar cells. The authors have characterized different structures of the solar cell system to optimize system parameters, particularly the performance of the Copper-Tin-Sulphide solar cell using Solar Cell Capacitance Simulator (SCAPS). This research can help scientist to overcome the current limitations and build up new designs of the system with higher efficiency and greater functionality. The authors have investigated the corresponding samples from various viewpoints, including structural (crystallinity, composition and surface morphology), optical (UV–vis–near-IR transmittance/reflectance spectra) and electrical resistivity properties. Describes investigations on Cu2SnS3 solar cells and prospective low cost absorber layer of thin film solar cells; Discusses the potential device structure of Copper-Tin-Sulphide based on thin film technologies; Explains solar cell structure optimization to perform a higher conversion efficiency of Copper-Tin-Sulphide.