Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
https://canv.ai/
The picture is generated by canv.ai

We are excited to announce that Canv.ai now features a built-in translator, allowing you to communicate in your native language. You can write prompts in your language, and they will be automatically translated into English, facilitating communication and the exchange of ideas!

We value freedom of speech and guarantee the absence of censorship on Canv.ai. At the same time, we hope and believe in the high moral standards of our users, which will help maintain a respectful and constructive atmosphere.


👉 Check for yourself!

Information Theory (IT) as a basis for Machine Learning (ML)

Posted By: IrGens
Information Theory (IT) as a basis for Machine Learning (ML)

Information Theory (IT) as a basis for Machine Learning (ML)
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 8m | 1.15 GB
Instructor: Stephen Rayward

New Directions in Cognitive Information Retrieval

Posted By: viserion
New Directions in Cognitive Information Retrieval

Amanda Spink, Charles Cole, "New Directions in Cognitive Information Retrieval (The Information Retrieval Series)"
English | ISBN: 140204013X, 9048170125 | 2005 | PDF | 260 pages | 2 MB

New Directions in Wireless Communications Research

Posted By: AvaxGenius
New Directions in Wireless Communications Research

New Directions in Wireless Communications Research by Vahid Tarokh
English | PDF (True) | 2009 | 483 Pages | ISBN : 144190672X | 10.2 MB

New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis of current and future wireless system design. Intended for use by system designers and academic researchers, the contributions are by acknowledged international leaders in their field.

ICCS 2007

Posted By: AvaxGenius
ICCS 2007

ICCS 2007: Proceedings of the 15th International Workshops on Conceptual Structures by Babak Akhgar
English | PDF (True) | 2007 | 237 Pages | ISBN : 1846289904 | 13.8 MB

The 15th International Workshop on Conceptual Structures ICCS 2007 brings together numerous discussions between international groups of researchers from the field of Information and Communications Technology (ICT). At ICCS 2007 some of the world’s best minds in information technology, arts, humanities and social science will meet to explore novel ways that ICT can augment human intelligence.

Introduction to Cryptography: Principles and Applications

Posted By: AvaxGenius
Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications by Hans Delfs , Helmut Knebl
English | PDF | 2007 | 371 Pages | ISBN : 3642080405 | 3.5 MB

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

Information Theory and Network Coding

Posted By: AvaxGenius
Information Theory and Network Coding

Information Theory and Network Coding by Raymond W. Yeung
English | PDF (True) | 2008 | 592 Pages | ISBN : 0387792333 | 9.3 MB

This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications,distributeddatastorage,cryptography,andoptimizationtheory. While new applications of network coding keep emerging, the fundamental - sults that lay the foundation of the subject are more or less mature. One of the main goals of this book therefore is to present these results in a unifying and coherent manner. While the previous book focused only on information theory for discrete random variables, the current book contains two new chapters on information theory for continuous random variables, namely the chapter on di?erential entropy and the chapter on continuous-valued channels. With these topics included, the book becomes more comprehensive and is more suitable to be used as a textbook for a course in an electrical engineering department.

A Classical Introduction to Cryptography: Applications for Communications Security

Posted By: AvaxGenius
A Classical Introduction to Cryptography: Applications for Communications Security

A Classical Introduction to Cryptography: Applications for Communications Security by Serge Vaudenay
English | PDF (True) | 2006 | 344 Pages | ISBN : 0387254641 | 2.3 MB

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

Progress in Cryptology – Mycrypt 2005 (Repost)

Posted By: AvaxGenius
Progress in Cryptology – Mycrypt 2005 (Repost)

Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings by Ed Dawson, Serge Vaudenay
English | PDF (True) | 2005 | 338 Pages | ISBN : 3540289380 | 4.3 MB

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005.

Advances in Cryptology – EUROCRYPT 2005 (Repost)

Posted By: AvaxGenius
Advances in Cryptology – EUROCRYPT 2005 (Repost)

Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings by Ronald Cramer
English | PDF (True) | 2005 | 589 Pages | ISBN : 3540259104 | 5.1 MB

These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research.

Optical Communication Theory and Techniques

Posted By: AvaxGenius
Optical Communication Theory and Techniques

Optical Communication Theory and Techniques by Enrico Forestieri
English | PDF | 2005 | 213 Pages | ISBN : 0387231323 | 7.8 MB

Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds of channels can be simultaneously amplified by optical amplifiers. Nevertheless, despite such a pace in technological progress, optical c- munications are still in a primitive stage if compared, for instance, to radio communications: the widely spread on-off keying (OOK) modulation format is equivalent to the rough amplitude modulation (AM) format, whereas the DWDM technique is nothing more than the optical version of the frequency - vision multiplexing (FDM) technique. Moreover, adaptive equalization, ch- nel coding or maximum likelihood detection are still considered something “exotic” in the optical world. This is mainly due to the favourable char- teristics of the fiber optic channel (large bandwidth, low attenuation, channel stability, …), which so far allowed us to use very simple transmission and detection techniques.

Multimedia Data Hiding

Posted By: AvaxGenius
Multimedia Data Hiding

Multimedia Data Hiding by Min Wu , Bede Liu
English | PDF (True) | 2003 | 228 Pages | ISBN : 0387954260 | 21.7 MB

The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur­ poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be­ comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con­ trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im­ perceptibility, robustness against moderate processing such as compression is also an important consideration.

Fundamentals of Computer Security

Posted By: AvaxGenius
Fundamentals of Computer Security

Fundamentals of Computer Security by Josef Pieprzyk , Thomas Hardjono , Jennifer Seberry
English | PDF | 2003 | 686 Pages | ISBN : 3540431012 | 3.9 MB

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.

Data Privacy and Security

Posted By: AvaxGenius
Data Privacy and Security

Data Privacy and Security by David Salomon
English | PDF (True) | 2003 | 461 Pages | ISBN : 0387003118 | 48.1 MB

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation

Posted By: AvaxGenius
Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation

Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation by F. C. M. Lau , C. K. Tse
English | PDF | 2003 | 236 Pages | ISBN : 3540006028 | 16.4 MB

In the 1970's and 1980's, we saw phenomenal advancement in nonlinear sci­ ence, which had led to many important discoveries that greatly improve our understanding of the physical world. Among them, the discovery of chaos in deterministic systems is unarguably one of the most revolutionary scientific findings. We are now able to explain the apparent complexity and subtle or­ der exhibited by many physical systems under the unified framework of chaos theory. The past decade has seen heightened interest in the exploitation of chaos for useful applications in engineering systems. One application area that has attracted a great deal of attention is communications. Chaotic signals, by virtue of their wide band characteristic, are natural candidates for carrying information in a spread-spectrum communication environment.

Codes, Systems, and Graphical Models

Posted By: AvaxGenius
Codes, Systems, and Graphical Models

Codes, Systems, and Graphical Models by Brian Marcus, Joachim Rosenthal
English | PDF | 2001 | 520 Pages | ISBN : 0387951733 | 43.7 MB

Coding theory, system theory, and symbolic dynamics have much in common. Among the central themes in each of these subjects are the construction of state space representations, understanding of fundamental structural properties of sequence spaces, construction of input/output systems, and understanding the special role played by algebraic structure. A major new theme in this area of research is that of codes and systems based on graphical models.