Search results: Found 3

Listing 1 - 3 of 3
Sort by
Wearable Wireless Devices

Authors: --- ---
ISBN: 9783039284429 9783039284436 Year: Pages: 176 DOI: 10.3390/books978-3-03928-443-6 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2020-04-07 23:07:09
License:

Loading...
Export citation

Choose an application

Abstract

With the growing interest in the use of technology in daily life, the potential for using wearable wireless devices across multiple segments, e.g., healthcare, sports, child monitoring, military, emergency, consumer electronics, etc., is rapidly increasing. Multibillion wearable sensors are predicted to be in use by 2025, with over 30% of them being new types of sensors that are only beginning to emerge. This book will focus on wireless wearable and implantable systems, flexible textile-based electronics, bio-electromagnetics, antennas and propagation, radio frequency (RF) circuits, sensors, security of wearables and implantable systems, nano-bio communication, and electromagnetic sensing

Interactions between Group Theory, Symmetry and Cryptology

Author:
ISBN: 9783039288021 / 9783039288038 Year: Pages: 164 DOI: 10.3390/books978-3-03928-803-8 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Science (General) --- Mathematics
Added to DOAB on : 2020-06-09 16:38:57
License:

Loading...
Export citation

Choose an application

Abstract

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.

Entropy in Image Analysis

Author:
ISBN: 9783039210923 9783039210930 Year: Pages: 456 DOI: 10.3390/books978-3-03921-093-0 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.

Keywords

image retrieval --- multi-feature fusion --- entropy --- relevance feedback --- chaotic system --- image encryption --- permutation-diffusion --- SHA-256 hash value --- dynamic index --- entropy --- keyframes --- Shannon’s entropy --- sign languages --- video summarization --- video skimming --- image encryption --- multiple-image encryption --- two-dimensional chaotic economic map --- security analysis --- image encryption --- chaotic cryptography --- cryptanalysis --- chosen-plaintext attack --- image information entropy --- blind image quality assessment (BIQA) --- information entropy, natural scene statistics (NSS) --- Weibull statistics --- discrete cosine transform (DCT) --- ultrasound --- hepatic steatosis --- Shannon entropy --- fatty liver --- metabolic syndrome --- multi-exposure image fusion --- texture information entropy --- adaptive selection --- patch structure decomposition --- image encryption --- time-delay --- random insertion --- information entropy --- chaotic map --- uncertainty assessment --- deep neural network --- random forest --- Shannon entropy --- positron emission tomography --- reconstruction --- field of experts --- additive manufacturing --- 3D prints --- 3D scanning --- image entropy --- depth maps --- surface quality assessment --- machine vision --- image analysis --- Arimoto entropy --- free-form deformations --- normalized divergence measure --- gradient distributions --- nonextensive entropy --- non-rigid registration --- pavement --- macrotexture --- 3-D digital imaging --- entropy --- decay trend --- discrete entropy --- infrared images --- low contrast --- multiscale top-hat transform --- image encryption --- DNA encoding --- chaotic cryptography --- cryptanalysis --- image privacy --- computer aided diagnostics --- colonoscopy --- Rényi entropies --- structural entropy --- spatial filling factor --- binary image --- Cantor set --- Hénon map --- Minkowski island --- prime-indexed primes --- Ramanujan primes --- Kapur’s entropy --- color image segmentation --- whale optimization algorithm --- differential evolution --- hybrid algorithm --- Otsu method --- image encryption --- dynamic filtering --- DNA computing --- 3D Latin cube --- permutation --- diffusion --- fuzzy entropy --- electromagnetic field optimization --- chaotic strategy --- color image segmentation --- multilevel thresholding --- contrast enhancement --- sigmoid --- Tsallis statistics --- q-exponential --- q-sigmoid --- q-Gaussian --- ultra-sound images --- person re-identification --- image analysis --- hash layer --- quantization loss --- Hamming distance --- cross-entropy loss --- image entropy --- Shannon entropy --- generalized entropies --- image processing --- image segmentation --- medical imaging --- remote sensing --- security

Listing 1 - 3 of 3
Sort by
Narrow your search

Publisher

MDPI - Multidisciplinary Digital Publishing Institute (3)


License

CC by-nc-nd (3)


Language

english (2)

eng (1)


Year
From To Submit

2020 (2)

2019 (1)