Search results:
Found 3
Listing 1 - 3 of 3 |
Sort by
|
Choose an application
With the growing interest in the use of technology in daily life, the potential for using wearable wireless devices across multiple segments, e.g., healthcare, sports, child monitoring, military, emergency, consumer electronics, etc., is rapidly increasing. Multibillion wearable sensors are predicted to be in use by 2025, with over 30% of them being new types of sensors that are only beginning to emerge. This book will focus on wireless wearable and implantable systems, flexible textile-based electronics, bio-electromagnetics, antennas and propagation, radio frequency (RF) circuits, sensors, security of wearables and implantable systems, nano-bio communication, and electromagnetic sensing
multiuser --- OFDMA --- Virtual Reality --- wireless LAN --- wireless VR --- wireless body area networks --- medium access control --- energy-balanced model --- energy efficiency --- Quality of Service --- Internet of Things --- S-band sensing --- smart devices --- S-Band sensing --- wireless channel information --- hyperthyreosis/sleep apnea disease monitoring --- security --- anonymity --- WBAN --- wearable sensors --- cryptanalysis --- SDPPG --- movement noise --- wavelet transform --- diversity combining --- C-Band --- Chronic Obstructive Pulmonary Disease (COPD) --- wireless channel information --- IMU --- inertial sensor --- gyroscope --- accelerometer --- rehabilitation --- ankle sprain --- wearable electronic device --- Unity --- Arduino --- telerehabilitation --- electrocardiography (ECG) --- patch ECG monitor --- reservoir computing --- echo state networks --- bio signals, bio sensors --- heart beat classification --- medical internet of things --- medical wearable wireless devices --- n/a
Choose an application
Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.
cryptography --- non-commutative cryptography --- one-way functions --- NP-Completeness --- key agreement protocol --- group theory --- symmetry --- Engel words --- alternating group --- WalnutDSA --- digital signatures --- post-quantum cryptography --- cryptanalysis --- braid groups --- algorithms in groups --- group-based cryptography --- Reed–Solomon codes --- key equation --- Berlekamp–Massey algorithm --- Sugiyama et al. algorithm --- euclidean algorithm --- numerical semigroup --- Weierstrass semigroup --- semigroup ideal --- error-correcting code --- algebraic-geometry code --- lightweight cryptography --- permutation group --- block cipher --- generalized self-shrinking generator --- t-modified self-shrinking generator --- pseudo-random number generator --- statistical randomness tests --- cryptography --- pseudorandom permutation --- block cipher --- ideal cipher model --- beyond birthday bound --- provable security --- group key establishment --- group theory --- provable security --- protocol compiler
Choose an application
Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.
image retrieval --- multi-feature fusion --- entropy --- relevance feedback --- chaotic system --- image encryption --- permutation-diffusion --- SHA-256 hash value --- dynamic index --- entropy --- keyframes --- Shannon’s entropy --- sign languages --- video summarization --- video skimming --- image encryption --- multiple-image encryption --- two-dimensional chaotic economic map --- security analysis --- image encryption --- chaotic cryptography --- cryptanalysis --- chosen-plaintext attack --- image information entropy --- blind image quality assessment (BIQA) --- information entropy, natural scene statistics (NSS) --- Weibull statistics --- discrete cosine transform (DCT) --- ultrasound --- hepatic steatosis --- Shannon entropy --- fatty liver --- metabolic syndrome --- multi-exposure image fusion --- texture information entropy --- adaptive selection --- patch structure decomposition --- image encryption --- time-delay --- random insertion --- information entropy --- chaotic map --- uncertainty assessment --- deep neural network --- random forest --- Shannon entropy --- positron emission tomography --- reconstruction --- field of experts --- additive manufacturing --- 3D prints --- 3D scanning --- image entropy --- depth maps --- surface quality assessment --- machine vision --- image analysis --- Arimoto entropy --- free-form deformations --- normalized divergence measure --- gradient distributions --- nonextensive entropy --- non-rigid registration --- pavement --- macrotexture --- 3-D digital imaging --- entropy --- decay trend --- discrete entropy --- infrared images --- low contrast --- multiscale top-hat transform --- image encryption --- DNA encoding --- chaotic cryptography --- cryptanalysis --- image privacy --- computer aided diagnostics --- colonoscopy --- Rényi entropies --- structural entropy --- spatial filling factor --- binary image --- Cantor set --- Hénon map --- Minkowski island --- prime-indexed primes --- Ramanujan primes --- Kapur’s entropy --- color image segmentation --- whale optimization algorithm --- differential evolution --- hybrid algorithm --- Otsu method --- image encryption --- dynamic filtering --- DNA computing --- 3D Latin cube --- permutation --- diffusion --- fuzzy entropy --- electromagnetic field optimization --- chaotic strategy --- color image segmentation --- multilevel thresholding --- contrast enhancement --- sigmoid --- Tsallis statistics --- q-exponential --- q-sigmoid --- q-Gaussian --- ultra-sound images --- person re-identification --- image analysis --- hash layer --- quantization loss --- Hamming distance --- cross-entropy loss --- image entropy --- Shannon entropy --- generalized entropies --- image processing --- image segmentation --- medical imaging --- remote sensing --- security
Listing 1 - 3 of 3 |
Sort by
|