You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.
Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fib...
This book demonstrates the implementation of an automated measuring system for very efficient measurement of chromatic dispersion, which uses a modulation phase shift method over long haul of optical single mode fiber. The authors show how a new scheme for measuring chromatic dispersion is adopted in conjunction with a tunable laser (TLS), providing the optical power at required wavelength and digital oscilloscope (DOSC) for measuring the phase difference between microwave signals from transmitter and microwave signals at the receiver. This is a novel approach for real-time chromatic dispersion in optical systems such as optical fibers. The setup used is very simple, accurate and cost effective, compared to other methods such as direct measurement, differential mode delay, polarization mode dispersion measurement and phase delay method.
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field.
This Brief highlights different approaches used to create stable cellulase and its use in different fields. Cellulase is an industrial enzyme with a broad range of significant applications in biofuel production and cellulosic waste management. Cellulase 7a from Trichoderma reesei is the most efficient enzyme in the bio hydrolysis of cellulose. In order to improve its thermal stability, it can be engineered using a variety of approaches, such as hydrophobic interactions, aromatic interactions, hydrogen bonds, ion pairs and disulfide bridge creation.
This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.
Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0–100 GHz. The soliton signals are multiplexed and modulated with the logic codes to transmit the data via a network system. The soliton carriers play critical roles to transmit the data via an optical communication link and provide many applications in secured optical communications. Therefore, transmission of data information can be performed via a communication network using soliton pulse carriers. A system known as optical multiplexer can be used to increase the channel capacity and security of the signals.
Microtechnology has changed our world since the last century, when silicon microelectronics revolutionized sensor, control and communication areas, with applications extending from domotics to automotive, and from security to biomedicine. The present century, however, is also seeing an accelerating pace of innovation in glassy materials; as an example, glass-ceramics, which successfully combine the properties of an amorphous matrix with those of micro- or nano-crystals, offer a very high flexibility of design to chemists, physicists and engineers, who can conceive and implement advanced microdevices. In a very similar way, the synthesis of glassy polymers in a very wide range of chemical str...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. - Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks - Help your business or organization avoid costly damage from phishing sources - Gain insight into machine-learning strategies for facing a variety of information security threats