Author: Deepak Gupta
Publisher: Springer Nature
ISBN: 9811915202
Category : Technology & Engineering
Languages : en
Pages : 816
Book Description
This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).
Pattern Recognition and Data Analysis with Applications
Author: Deepak Gupta
Publisher: Springer Nature
ISBN: 9811915202
Category : Technology & Engineering
Languages : en
Pages : 816
Book Description
This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).
Publisher: Springer Nature
ISBN: 9811915202
Category : Technology & Engineering
Languages : en
Pages : 816
Book Description
This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).
Redefining Virtual Teaching Learning Pedagogy
Author: Rohit Bansal
Publisher: John Wiley & Sons
ISBN: 1119867622
Category : Education
Languages : en
Pages : 468
Book Description
Redefining Virtual Teaching Learning Pedagogy Online education is now a growing and critical piece of modern-day infrastructure and this book details how virtual teaching and learning can continue to be transformed through leveraging digital platforms. In the current technology-driven era, education systems are undergoing major changes by adopting advanced digital education strategies. Schools, colleges, and universities around the world have swiftly switched to online delivery modes. Students are learning via new platforms and the use of narrated lectures, podcasts, online quizzes, and other e-learning materials has increased. Virtual learning improves the educational experience, transforms teaching and learning, and provides rich, diverse, and flexible learning opportunities for the digital generation. It also makes students able to gain, share and verify knowledge through different sources such as social media communities, blogging, web-based content writing, video-based learning, etc. The main focus of “Redefining Virtual Teaching Learning Pedagogy” is to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and results on all aspects of virtual learning and teaching. The chapters mainly focus on 6 critical areas of virtual teaching and learning: Curriculum and learning objectives Learning materials Pedagogic processes Classroom assessment frameworks Teacher support in the classrooms School leadership and management development. Audience Educators, researchers, academicians, entrepreneurs, and corporate professionals will gain knowledge and be updated about the role & future of virtual teaching and learning and the latest digital tools used for that purpose.
Publisher: John Wiley & Sons
ISBN: 1119867622
Category : Education
Languages : en
Pages : 468
Book Description
Redefining Virtual Teaching Learning Pedagogy Online education is now a growing and critical piece of modern-day infrastructure and this book details how virtual teaching and learning can continue to be transformed through leveraging digital platforms. In the current technology-driven era, education systems are undergoing major changes by adopting advanced digital education strategies. Schools, colleges, and universities around the world have swiftly switched to online delivery modes. Students are learning via new platforms and the use of narrated lectures, podcasts, online quizzes, and other e-learning materials has increased. Virtual learning improves the educational experience, transforms teaching and learning, and provides rich, diverse, and flexible learning opportunities for the digital generation. It also makes students able to gain, share and verify knowledge through different sources such as social media communities, blogging, web-based content writing, video-based learning, etc. The main focus of “Redefining Virtual Teaching Learning Pedagogy” is to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and results on all aspects of virtual learning and teaching. The chapters mainly focus on 6 critical areas of virtual teaching and learning: Curriculum and learning objectives Learning materials Pedagogic processes Classroom assessment frameworks Teacher support in the classrooms School leadership and management development. Audience Educators, researchers, academicians, entrepreneurs, and corporate professionals will gain knowledge and be updated about the role & future of virtual teaching and learning and the latest digital tools used for that purpose.
Advances of DNA Computing in Cryptography
Author: Suyel Namasudra
Publisher: CRC Press
ISBN: 1351011391
Category : Computers
Languages : en
Pages : 176
Book Description
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.
Publisher: CRC Press
ISBN: 1351011391
Category : Computers
Languages : en
Pages : 176
Book Description
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.
Proceedings of 3rd International Conference on Artificial Intelligence: Advances and Applications
Author: Garima Mathur
Publisher: Springer Nature
ISBN: 9811970416
Category : Technology & Engineering
Languages : en
Pages : 652
Book Description
This book gathers outstanding research papers presented in the 3rd International Conference on Artificial Intelligence: Advances and Application (ICAIAA 2022), held in Poornima College of Engineering, Jaipur, India, during April 23–24, 2022. This book covers research works carried out by various students such as bachelor, master and doctoral scholars, faculty and industry persons in the area of artificial intelligence, machine learning, deep learning applications in health care, agriculture, and business, security. It also covers research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN, NFV, etc.
Publisher: Springer Nature
ISBN: 9811970416
Category : Technology & Engineering
Languages : en
Pages : 652
Book Description
This book gathers outstanding research papers presented in the 3rd International Conference on Artificial Intelligence: Advances and Application (ICAIAA 2022), held in Poornima College of Engineering, Jaipur, India, during April 23–24, 2022. This book covers research works carried out by various students such as bachelor, master and doctoral scholars, faculty and industry persons in the area of artificial intelligence, machine learning, deep learning applications in health care, agriculture, and business, security. It also covers research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN, NFV, etc.
Multidisciplinary Approach to Modern Digital Steganography
Author: Pramanik, Sabyasachi
Publisher: IGI Global
ISBN: 1799871622
Category : Computers
Languages : en
Pages : 380
Book Description
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
Publisher: IGI Global
ISBN: 1799871622
Category : Computers
Languages : en
Pages : 380
Book Description
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
Applied Cryptography
Author: Bruce Schneier
Publisher: John Wiley & Sons
ISBN: 1119439027
Category : Computers
Languages : en
Pages : 926
Book Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
Publisher: John Wiley & Sons
ISBN: 1119439027
Category : Computers
Languages : en
Pages : 926
Book Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
Information and Decision Sciences
Author: Suresh Chandra Satapathy
Publisher: Springer
ISBN: 9811075638
Category : Technology & Engineering
Languages : en
Pages : 566
Book Description
This book presents the proceedings of the 6th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA-2017), held in Bhubaneswar, Odisha. The event brought together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. The book is divided into two volumes: Information and Decision Sciences, and Intelligent Engineering Informatics. This volume covers broad areas of Information and Decision Sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management & networks, sensor networks, signal processing, wireless networks, protocols & architectures etc. The book also offers a valuable resource for students at the post-graduate level in various engineering disciplines.
Publisher: Springer
ISBN: 9811075638
Category : Technology & Engineering
Languages : en
Pages : 566
Book Description
This book presents the proceedings of the 6th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA-2017), held in Bhubaneswar, Odisha. The event brought together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. The book is divided into two volumes: Information and Decision Sciences, and Intelligent Engineering Informatics. This volume covers broad areas of Information and Decision Sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management & networks, sensor networks, signal processing, wireless networks, protocols & architectures etc. The book also offers a valuable resource for students at the post-graduate level in various engineering disciplines.
Recent Advances in Cryptography and Network Security
Author: Pinaki Mitra
Publisher: BoD – Books on Demand
ISBN: 1789843456
Category : Computers
Languages : en
Pages : 70
Book Description
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
Publisher: BoD – Books on Demand
ISBN: 1789843456
Category : Computers
Languages : en
Pages : 70
Book Description
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
Information Hiding
Author: Fabien A. P. Petitcolas
Publisher: Springer Science & Business Media
ISBN: 3540004211
Category : Business & Economics
Languages : en
Pages : 438
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.
Publisher: Springer Science & Business Media
ISBN: 3540004211
Category : Business & Economics
Languages : en
Pages : 438
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.
Image Encryption
Author: Fathi E. Abd El-Samie
Publisher: CRC Press
ISBN: 1466576987
Category : Technology & Engineering
Languages : en
Pages : 420
Book Description
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.
Publisher: CRC Press
ISBN: 1466576987
Category : Technology & Engineering
Languages : en
Pages : 420
Book Description
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.