|
Showing 1 - 25 of
25 matches in All Departments
This book presents applications of machine learning techniques in
processing multimedia large-scale data. Multimedia such as text,
image, audio, video, and graphics stands as one of the most
demanding and exciting aspects of the information era. The book
discusses new challenges faced by researchers in dealing with these
large-scale data and also presents innovative solutions to address
several potential research problems, e.g., enabling comprehensive
visual classification to fill the semantic gap by exploring
large-scale data, offering a promising frontier for detailed
multimedia understanding, as well as extract patterns and making
effective decisions by analyzing the large collection of data.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
This book contains high-quality research articles and reviews that
promote research and reflect the most recent advances in
intelligent wavelet based techniques for advanced multimedia
applications as well as other emerging areas. In recent time,
wavelet transforms have become useful in many signal, image and
video processing applications, especially for multimedia security
and surveillance. A few applications of wavelets in security and
surveillance are watermarking, fusion, steganography, object
detection, tracking, motion recognition and intention recognition,
etc. Wavelets are well capable of analyzing signal, image and video
at different resolution levels, popularly known as multiresolution
analysis. The multiresolution analysis is advantageous in
multimedia security and surveillance applications. It provides
flexibility in selection of different resolution levels that leads
to better accuracy. Furthermore, recently sparse representation has
become an advancement to analyze wavelet coefficients. It is
observed that wavelet transforms possess the invariance property
which makes them suitable for many vision applications. This book
provides a concise overview of the current state of the art and
disseminates some of the novel and exciting ideas and techniques.
In addition, it is also helpful for the senior undergraduate and
graduate students, researcher, academicians, IT professional and
providers, citizens, customers as well as policy makers working in
this area as well as other emerging applications demanding
state-of-the-art wavelet based multimedia applications.
This book presents medical image watermarking techniques and
algorithms for telemedicine and other emerging applications. This
book emphasizes on medical image watermarking to ensure the
authenticity of transmitted medical information. It begins with an
introduction of digital watermarking, important characteristics,
novel applications, different watermarking attacks and standard
benchmark tools. This book also covers spatial and transform domain
medical image watermarking techniques and their merits and
limitations. The authors have developed improved/novel watermarking
techniques for telemedicine applications that offer higher
robustness, better perceptual quality and increased embedding
capacity and secure watermark. The suggested methods may find
potential applications in the prevention of patient identity theft
and health data management issues which is a growing concern in
telemedicine applications. This book provides a sound platform for
understanding the medical image watermarking paradigm for
researchers in the field and advanced-level students. Industry
professionals working in this field, as well as other emerging
applications demanding robust and secure watermarking will find
this book useful as a reference.
This book offers an essential guide to IoT Security, Smart Cities,
IoT Applications, etc. In addition, it presents a structured
introduction to the subject of destination marketing and an
exhaustive review on the challenges of information security in
smart and intelligent applications, especially for IoT and big data
contexts. Highlighting the latest research on security in smart
cities, it addresses essential models, applications, and
challenges. Written in plain and straightforward language, the book
offers a self-contained resource for readers with no prior
background in the field. Primarily intended for students in
Information Security and IoT applications (including smart cities
systems and data heterogeneity), it will also greatly benefit
academic researchers, IT professionals, policymakers and
legislators. It is well suited as a reference book for both
undergraduate and graduate courses on information security
approaches, the Internet of Things, and real-world intelligent
applications.
This book gathers high-quality research articles and reviews that
reflect the latest advances in the smart network-inspired paradigm
and address current issues in IoT applications as well as other
emerging areas. Featuring work from both academic and industry
researchers, the book provides a concise overview of the current
state of the art and highlights some of the most promising and
exciting new ideas and techniques. Accordingly, it offers a
valuable resource for senior undergraduate and graduate students,
researchers, policymakers, and IT professionals and providers
working in areas that call for state-of-the-art networks and IoT
applications.
This thesis proposes new power converter topologies suitable for
aircraft systems. It also proposes both AC-DC and DC-DC types of
converters for different electrical loads to improve the
performance these systems. To increase fuel efficiency and reduce
environmental impacts, less efficient non-electrical aircraft
systems are being replaced by electrical systems. However, more
electrical systems requires more electrical power to be generated
in the aircraft. The increased consumption of electrical power in
both civil and military aircrafts has necessitated the use of more
efficient electrical power conversion technologies. This book
presents acomprehensive mathematical analysis and the design and
digital simulation of the power converters. Subsequently it
discusses the construction of the hardware prototypes of each
converter and the experimental tests carried out to verify the
benefits of the proposed solutions in comparison to the existing
solutions.
Smart healthcare systems, made up of advanced wearable devices,
internet of things (IoT) technologies and mobile internet
connectivity, allow significant medical information to be easily
and regularly transmitted over public networks. Personal patient
information and clinical records are stored on hospitals and
healthcare centres and can be accessed remotely by healthcare
workers. Due to the widespread increase in the sheer volume of
medical data being collected and created all the time, it has never
been more important to ensure that such information is collected,
stored and processed in a reliable and secure manner. This edited
book covers the recent trends in the field of medical information
processing, including prediction of complications using machine
learning and trends in visualization and image analysis. Further
chapters focus on information security and privacy solutions for
smart healthcare applications, including encryption of medical
information, privacy in smart IoT environments, medical image
watermarking and secure communication systems. Medical Information
Processing and Security: Techniques and applications can be used as
a reference book for practicing engineers, researchers and
scientists. It will also be useful for senior undergraduate and
graduate students, and practitioners from government and industry
as well as healthcare technology professionals working on
state-of-the-art security solutions for smart healthcare
applications.
The availability of many-core computing platforms enables a wide
variety of technical solutions for systems across the embedded,
high-performance and cloud computing domains. However, large scale
manycore systems are notoriously hard to optimise. Choices
regarding resource allocation alone can account for wide
variability in timeliness and energy dissipation (up to several
orders of magnitude). Dynamic Resource Allocation in Embedded,
High-Performance and Cloud Computing covers dynamic resource
allocation heuristics for manycore systems, aiming to provide
appropriate guarantees on performance and energy efficiency. It
addresses different types of systems, aiming to harmonise the
approaches to dynamic allocation across the complete spectrum
between systems with little flexibility and strict real-time
guarantees all the way to highly dynamic systems with soft
performance requirements. Technical topics presented in the book
include: * Load and Resource Models* Admission Control*
Feedback-based Allocation and Optimisation* Search-based Allocation
Heuristics* Distributed Allocation based on Swarm Intelligence*
Value-Based AllocationEach of the topics is illustrated with
examples based on realistic computational platforms such as
Network-on-Chip manycore processors, grids and private cloud
environments.
This book presents applications of machine learning techniques in
processing multimedia large-scale data. Multimedia such as text,
image, audio, video, and graphics stands as one of the most
demanding and exciting aspects of the information era. The book
discusses new challenges faced by researchers in dealing with these
large-scale data and also presents innovative solutions to address
several potential research problems, e.g., enabling comprehensive
visual classification to fill the semantic gap by exploring
large-scale data, offering a promising frontier for detailed
multimedia understanding, as well as extract patterns and making
effective decisions by analyzing the large collection of data.
This book contains high-quality research articles and reviews that
promote research and reflect the most recent advances in
intelligent wavelet based techniques for advanced multimedia
applications as well as other emerging areas. In recent time,
wavelet transforms have become useful in many signal, image and
video processing applications, especially for multimedia security
and surveillance. A few applications of wavelets in security and
surveillance are watermarking, fusion, steganography, object
detection, tracking, motion recognition and intention recognition,
etc. Wavelets are well capable of analyzing signal, image and video
at different resolution levels, popularly known as multiresolution
analysis. The multiresolution analysis is advantageous in
multimedia security and surveillance applications. It provides
flexibility in selection of different resolution levels that leads
to better accuracy. Furthermore, recently sparse representation has
become an advancement to analyze wavelet coefficients. It is
observed that wavelet transforms possess the invariance property
which makes them suitable for many vision applications. This book
provides a concise overview of the current state of the art and
disseminates some of the novel and exciting ideas and techniques.
In addition, it is also helpful for the senior undergraduate and
graduate students, researcher, academicians, IT professional and
providers, citizens, customers as well as policy makers working in
this area as well as other emerging applications demanding
state-of-the-art wavelet based multimedia applications.
This thesis proposes new power converter topologies suitable for
aircraft systems. It also proposes both AC-DC and DC-DC types of
converters for different electrical loads to improve the
performance these systems. To increase fuel efficiency and reduce
environmental impacts, less efficient non-electrical aircraft
systems are being replaced by electrical systems. However, more
electrical systems requires more electrical power to be generated
in the aircraft. The increased consumption of electrical power in
both civil and military aircrafts has necessitated the use of more
efficient electrical power conversion technologies. This book
presents acomprehensive mathematical analysis and the design and
digital simulation of the power converters. Subsequently it
discusses the construction of the hardware prototypes of each
converter and the experimental tests carried out to verify the
benefits of the proposed solutions in comparison to the existing
solutions.
This book presents medical image watermarking techniques and
algorithms for telemedicine and other emerging applications. This
book emphasizes on medical image watermarking to ensure the
authenticity of transmitted medical information. It begins with an
introduction of digital watermarking, important characteristics,
novel applications, different watermarking attacks and standard
benchmark tools. This book also covers spatial and transform domain
medical image watermarking techniques and their merits and
limitations. The authors have developed improved/novel watermarking
techniques for telemedicine applications that offer higher
robustness, better perceptual quality and increased embedding
capacity and secure watermark. The suggested methods may find
potential applications in the prevention of patient identity theft
and health data management issues which is a growing concern in
telemedicine applications. This book provides a sound platform for
understanding the medical image watermarking paradigm for
researchers in the field and advanced-level students. Industry
professionals working in this field, as well as other emerging
applications demanding robust and secure watermarking will find
this book useful as a reference.
Internet of Multimedia Things (IoMT): Techniques and Applications
disseminates research efforts in the security and resilience of
intelligent data-centric critical systems to support advanced
research in this area. Sections cover the background of IoMT
Architectures and Technologies, describe the problems that arise in
IoMT Computing and protocols, and illustrate the application of
IoMT on Industrial applications. The book will be beneficial for
engineers, developers, solution designers, architects, system
engineers and specialists from professional environments interested
in the IoMT to seek appropriate solutions to their specific
problems.
Digital Image Enhancement and Reconstruction: Techniques and
Applications explores different concepts and techniques used for
the enhancement as well as reconstruction of low-quality images.
Most real-life applications require good quality images to gain
maximum performance, however, the quality of the images captured in
real-world scenarios is often very unsatisfactory. Most commonly,
images are noisy, blurry, hazy, tiny, and hence need to pass
through image enhancement and/or reconstruction algorithms before
they can be processed by image analysis applications. This book
comprehensively explores application-specific enhancement and
reconstruction techniques including satellite image enhancement,
face hallucination, low-resolution face recognition, medical image
enhancement and reconstruction, reconstruction of underwater
images, text image enhancement, biometrics, etc. Chapters will
present a detailed discussion of the challenges faced in handling
each particular kind of image, analysis of the best available
solutions, and an exploration of applications and future
directions. The book provides readers with a deep dive into
denoising, dehazing, super-resolution, and use of soft computing
across a range of engineering applications.
This book gathers high-quality research articles and reviews that
reflect the latest advances in the smart network-inspired paradigm
and address current issues in IoT applications as well as other
emerging areas. Featuring work from both academic and industry
researchers, the book provides a concise overview of the current
state of the art and highlights some of the most promising and
exciting new ideas and techniques. Accordingly, it offers a
valuable resource for senior undergraduate and graduate students,
researchers, policymakers, and IT professionals and providers
working in areas that call for state-of-the-art networks and IoT
applications.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
E-health applications such as tele-medicine, tele-radiology,
tele-ophthalmology, and tele-diagnosis are very promising and have
immense potential to improve global healthcare. They can improve
access, equity, and quality through the connection of healthcare
facilities and healthcare professionals, diminishing geographical
and physical barriers. One critical issue, however, is related to
the security of data transmission and access to the technologies of
medical information. Currently, medical-related identity theft
costs billions of dollars each year and altered medical information
can put a person's health at risk through misdiagnosis, delayed
treatment or incorrect prescriptions. Yet, the use of hand-held
devices for storing, accessing, and transmitting medical
information is outpacing the privacy and security protections on
those devices. Researchers are starting to develop some
imperceptible marks to ensure the tamper-proofing, cost effective,
and guaranteed originality of the medical records. However, the
robustness, security and efficient image archiving and retrieval of
medical data information against these cyberattacks is a
challenging area for researchers in the field of e-health
applications. Intelligent Data Security Solutions for e-Health
Applications focuses on cutting-edge academic and industry-related
research in this field, with particular emphasis on
interdisciplinary approaches and novel techniques to provide
security solutions for smart applications. The book provides an
overview of cutting-edge security techniques and ideas to help
graduate students, researchers, as well as IT professionals who
want to understand the opportunities and challenges of using
emerging techniques and algorithms for designing and developing
more secure systems and methods for e-health applications.
This book offers an essential guide to IoT Security, Smart Cities,
IoT Applications, etc. In addition, it presents a structured
introduction to the subject of destination marketing and an
exhaustive review on the challenges of information security in
smart and intelligent applications, especially for IoT and big data
contexts. Highlighting the latest research on security in smart
cities, it addresses essential models, applications, and
challenges. Written in plain and straightforward language, the book
offers a self-contained resource for readers with no prior
background in the field. Primarily intended for students in
Information Security and IoT applications (including smart cities
systems and data heterogeneity), it will also greatly benefit
academic researchers, IT professionals, policymakers and
legislators. It is well suited as a reference book for both
undergraduate and graduate courses on information security
approaches, the Internet of Things, and real-world intelligent
applications.
As an institutional embodiment of the international safeguards
regime, the IAEA has been central to the international diplomacy of
nuclear control and efforts to limit nuclear-weapons proliferation.
It has played an important role as a negotiator, facilitator and an
implementation agency; it has been the core of the regime in its
capacity as the role of nuclear watch-dog. This book traces the
evolution of the International Atomic Energy Agency (IAEA) as an
autonomous and an effective mechanism in facilitating international
cooperation in the peaceful uses of nuclear technology, application
of safeguards and the maintenance of safety standards of the
nuclear installations. The study explores the importance of IAEA's
role is in the nuclear technology cooperation for peaceful uses and
verifications. It also seeks to identify the special features in
structure, decision-making processes and work-culture within IAEA.
The work should generate sufficient interest among the scholars of
International Organization, International politics &
Multilateral Arms Control Verification regimes, as also, anyone
else who is keen to understand the functional dynamics of
International Organizations.
|
|