You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Heuristic Search is an important sub-discipline of optimization theory and finds applications in a vast variety of fields, including life science and engineering. Search methods have been useful in solving tough engineering-oriented problems that either could not be solved any other way or solutions take a very long time to be computed. This book explores a variety of applications for search methods and techniques in different fields of electrical engineering. By organizing relevant results and applications, this book will serve as a useful resource for students, researchers and practitioners to further exploit the potential of search methods in solving hard optimization problems that arise in advanced engineering technologies, such as image and video processing issues, detection and resource allocation in telecommunication systems, security and harmonic reduction in power generation systems, as well as redundancy optimization problem and search-fuzzy learning mechanisms in industrial applications.
This book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 23 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 218 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
Electromyography (EMG) is a technique for evaluating and recording the electrical activity produced by skeletal muscles. EMG may be used clinically for the diagnosis of neuromuscular problems and for assessing biomechanical and motor control deficits and other functional disorders. Furthermore, it can be used as a control signal for interfacing with orthotic and/or prosthetic devices or other rehabilitation assists. This book presents an updated overview of signal processing applications and recent developments in EMG from a number of diverse aspects and various applications in clinical and experimental research. It will provide readers with a detailed introduction to EMG signal processing techniques and applications, while presenting several new results and explanation of existing algorithms. This book is organized into 18 chapters, covering the current theoretical and practical approaches of EMG research.
This proceedings volume collects the most up-to-date, comprehensive and state-of-the-art knowledge on wireless communication, sensor network, network technologies, services and application.Written by world renowned researchers, each chapter is original in content, featuring high-impact presentations and late-breaking contributions.Researchers and practitioners will find this edition a useful resource material and an inspirational read.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation. The book focuses on the benefits related to the emerging applications such as machine learning, blockchain and cyber security. Key Features: Introduces the latest trends in the fields of machine learning, blockchain and cyber security Discusses the fundamentals, challenges and architectural overviews with concepts Explores recent advancements in machine learning, blockchain, and cyber security Examines recent trends in emerging technologies This book is primarily aimed at graduates, researchers, and professionals working in the areas of machine learning, blockchain, and cyber security.
Although the information and communication technology (ICT) industry accounted for only 2 percent of global greenhouse gas emissions in 2007, the explosive increase in data traffic brought about by a rapidly growing user base of more than a billion wireless subscribers is expected to nearly double that number by 2020. It is clear that now is the ti
This volume explores diverse applications for automated machine learning and predictive analytics. The content provides use cases for machine learning in different industries such as healthcare, agriculture, cybersecurity, computing and transportation. Key highlights of this volume include topics on engineering for underwater navigation, and computer vision for healthcare and biometric applications. Chapters 1-4 delve into innovative signal detection, biometric authentication, underwater AUV localization, and COVID-19 face mask detection. Chapters 5-9 focus on wireless pH sensing, differential pattern identification, economic considerations in off-grid hybrid power, high optimization of imag...
Search algorithms aim to find solutions or objects with specified properties and constraints in a large solution search space or among a collection of objects. A solution can be a set of value assignments to variables that will satisfy the constraints or a sub-structure of a given discrete structure. In addition, there are search algorithms, mostly probabilistic, that are designed for the prospective quantum computer. This book demonstrates the wide applicability of search algorithms for the purpose of developing useful and practical solutions to problems that arise in a variety of problem domains. Although it is targeted to a wide group of readers: researchers, graduate students, and practitioners, it does not offer an exhaustive coverage of search algorithms and applications. The chapters are organized into three parts: Population-based and quantum search algorithms, Search algorithms for image and video processing, and Search algorithms for engineering applications.
Authoritative resource discussing the development of advanced massive multiple input multiple output (MIMO) techniques and algorithms for application in 6G Massive MIMO for Future Wireless Communication Systems analyzes applications and technology trends for massive multiple input multiple output (MIMO) in 6G and beyond, presenting a unified theoretical framework for analyzing the fundamental limits of massive MIMO that considers several practical constraints. In addition, this book develops advanced signal-processing algorithms to enable massive MIMO applications in realistic environments. The book looks closer at applying techniques to massive MIMO in order to meet practical network constr...
This book constitutes the refereed proceedings of the 4th International Symposium on Ubiquitous Networking, UNet 2018, held in Hammamet, Morocco, in May 2018. The 35 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 87 submissions. The focus of UNet is on technical challenges and solutions related to such a widespread adoption of networking technologies, including broadband multimedia, machine-to-machine applications, Internet of things, security and privacy, data engineering, sensor networks and RFID technologies.