Search results:
Found 3
Listing 1  3 of 3 
Sort by

Choose an application
Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.
image retrieval  multifeature fusion  entropy  relevance feedback  chaotic system  image encryption  permutationdiffusion  SHA256 hash value  dynamic index  entropy  keyframes  Shannon’s entropy  sign languages  video summarization  video skimming  image encryption  multipleimage encryption  twodimensional chaotic economic map  security analysis  image encryption  chaotic cryptography  cryptanalysis  chosenplaintext attack  image information entropy  blind image quality assessment (BIQA)  information entropy, natural scene statistics (NSS)  Weibull statistics  discrete cosine transform (DCT)  ultrasound  hepatic steatosis  Shannon entropy  fatty liver  metabolic syndrome  multiexposure image fusion  texture information entropy  adaptive selection  patch structure decomposition  image encryption  timedelay  random insertion  information entropy  chaotic map  uncertainty assessment  deep neural network  random forest  Shannon entropy  positron emission tomography  reconstruction  field of experts  additive manufacturing  3D prints  3D scanning  image entropy  depth maps  surface quality assessment  machine vision  image analysis  Arimoto entropy  freeform deformations  normalized divergence measure  gradient distributions  nonextensive entropy  nonrigid registration  pavement  macrotexture  3D digital imaging  entropy  decay trend  discrete entropy  infrared images  low contrast  multiscale tophat transform  image encryption  DNA encoding  chaotic cryptography  cryptanalysis  image privacy  computer aided diagnostics  colonoscopy  Rényi entropies  structural entropy  spatial filling factor  binary image  Cantor set  Hénon map  Minkowski island  primeindexed primes  Ramanujan primes  Kapur’s entropy  color image segmentation  whale optimization algorithm  differential evolution  hybrid algorithm  Otsu method  image encryption  dynamic filtering  DNA computing  3D Latin cube  permutation  diffusion  fuzzy entropy  electromagnetic field optimization  chaotic strategy  color image segmentation  multilevel thresholding  contrast enhancement  sigmoid  Tsallis statistics  qexponential  qsigmoid  qGaussian  ultrasound images  person reidentification  image analysis  hash layer  quantization loss  Hamming distance  crossentropy loss  image entropy  Shannon entropy  generalized entropies  image processing  image segmentation  medical imaging  remote sensing  security
Choose an application
This Special Issue provides an opportunity for researchers in the area of sidechannel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cachebased timing attacks, systemlevel countermeasures, and so on.
cache attack  cache sidechannel attack  constanttime cryptographic algorithm  rsa cryptosystem  scattergather implementation  modular exponentiation  postquantum cryptography  latticebased cryptography  Gaussian sampling  CDT sampling  sidechannel attack  single trace analysis  mobile ads  software development kit (SDK), android package (APK), ad lib  ad libraries  ad networks  graph  graph similarity  sidechannel authentication  leakage model  AES  FPGA  unified point addition  binary Huff curve  recovery of secret exponent by triangular trace analysis  horizontal collision correlation analysis  side channel analysis  single trace analysis  post quantum cryptography  NTRU  sidechannel analysis  elliptic curve cryptography  singletrace attack  key bitdependent attack  countermeasure  side channel analysis  financial IC card  firstorder analysis  secondorder analysis  data outsourcing  integrity  online authentication  Merkle (hash) tree  data loss  information leakage  reliability  sidechannel analysis  poweranalysis attack  embedded system security  machinelearning classification  sidechannel cache attacks  cache misses  AES  cloud computing  physically unclonable function  chaos theory  chaotic circuit  FPGA  CPLD  challengeresponse authentication  hardware security  sidechannel attacks  cryptographic keys  side channel attack  rekeying  tweakable block cipher  provable security  n/a
Choose an application
Researches and investigations involving the theory and applications of integral transforms and operational calculus are remarkably widespread in many diverse areas of the mathematical, physical, chemical, engineering and statistical sciences.
highly oscillatory  convolution quadrature rule  volterra integral equation  Bessel kernel  convergence  higher order Schwarzian derivatives  Janowski starlike function  Janowski convex function  bound on derivatives  tangent numbers  tangent polynomials  Carlitztype qtangent numbers  Carlitztype qtangent polynomials  (p,q)analogue of tangent numbers and polynomials  (p,q)analogue of tangent zeta function  symmetric identities  zeros  Lommel functions  univalent functions  starlike functions  convex functions  inclusion relationships  analytic function  Hankel determinant  exponential function  upper bound  nonlinear boundary value problems  fractionalorder differential equations  RiemannStieltjes functional integral  LiouvilleCaputo fractional derivative  infinitepoint boundary conditions  advanced and deviated arguments  existence of at least one solution  Fredholm integral equation  Schauder fixed point theorem  Hölder condition  generalized Kuramoto–Sivashinsky equation  modified Kudryashov method  exact solutions  Maple graphs  analytic function  Hadamard product (convolution)  partial sum  Srivastava–Tomovski generalization of Mittag–Leffler function  subordination  differential equation  differential inclusion  Liouville–Caputotype fractional derivative  fractional integral  existence  fixed point  Bernoulli spiral  Grandi curves  Chebyshev polynomials  pseudoChebyshev polynomials  orthogonality property  symmetric  encryption  password  hash  cryptography  PBKDF  q–Bleimann–Butzer–Hahn operators  (p,q)integers  (p,q)Bernstein operators  (p,q)Bleimann–Butzer–Hahn operators  modulus of continuity  rate of approximation  Kfunctional  HurwitzLerch zeta function  generalized functions  analytic number theory  ?generalized HurwitzLerch zeta functions  derivative properties  series representation  basic hypergeometric functions  generating functions  qpolynomials  analytic functions  Mittag–Leffler functions  starlike functions  convex functions  Hardy space  vibrating string equation  initial conditions  spectral decomposition  regular solution  the uniqueness of the solution  the existence of a solution  analytic  ?convex function  starlike function  stronglystarlike function  subordination  q Sheffer–Appell polynomials  generating relations  determinant definition  recurrence relation  q Hermite–Bernoulli polynomials  q Hermite–Euler polynomials  q Hermite–Genocchi polynomials  Volterra integral equations  highly oscillatory Bessel kernel  Hermite interpolation  direct Hermite collocation method  piecewise Hermite collocation method  differential operator  qhypergeometric functions  meromorphic function  Mittag–Leffler function  Hadamard product  differential subordination  starlike functions  Bell numbers  radius estimate  (p, q)integers  Dunkl analogue  generating functions  generalization of exponential function  Szász operator  modulus of continuity  function spaces and their duals  distributions  tempered distributions  Schwartz testing function space  generalized functions  distribution space  wavelet transform of generalized functions  Fourier transform  analytic function  subordination  Dziok–Srivastava operator  nonlinear boundary value problem  nonlocal  multipoint  multistrip  existence  Ulam stability  functions of bounded boundary and bounded radius rotations  subordination  functions with positive real part  uniformly starlike and convex functions  analytic functions  univalent functions  starlike and qstarlike functions  qderivative (or qdifference) operator  sufficient conditions  distortion theorems  Janowski functions  analytic number theory  ?generalized Hurwitz–Lerch zeta functions  derivative properties  recurrence relations  integral representations  Mellin transform  natural transform  Adomian decomposition method  Caputo fractional derivative  generalized mittagleffler function  analytic functions  Hadamard product  starlike functions  qderivative (or qdifference) operator  Hankel determinant  qstarlike functions  fuzzy volterra integrodifferential equations  fuzzy general linear method  fuzzy differential equations  generalized Hukuhara differentiability  spectrum symmetry  DCT  MFCC  audio features  anuran calls  analytic functions  convex functions  starlike functions  strongly convex functions  strongly starlike functions  uniformly convex functions  Struve functions  truncatedexponential polynomials  monomiality principle  generating functions  Apostoltype polynomials and Apostoltype numbers  Bernoulli, Euler and Genocchi polynomials  Bernoulli, Euler, and Genocchi numbers  operational methods  summation formulas  symmetric identities  Euler numbers and polynomials  qEuler numbers and polynomials  HurwitzEuler eta function  multiple HurwitzEuler eta function  higher order qEuler numbers and polynomials  (p, q)Euler numbers and polynomials of higher order  symmetric identities  symmetry of the zero
Listing 1  3 of 3 
Sort by

2019 (3)