1.

Record Nr.

UNISA996465454603316

Autore

Di Martino Ferdinando

Titolo

Fuzzy Transforms for Image Processing and Data Analysis [[electronic resource] ] : Core Concepts, Processes and Applications / / by Ferdinando Di Martino, Salvatore Sessa

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020

ISBN

3-030-44613-1

Edizione

[1st ed. 2020.]

Descrizione fisica

1 online resource (220 pages)

Disciplina

511.322

Soggetti

Optical data processing

Data mining

Computer science—Mathematics

Artificial intelligence

Image Processing and Computer Vision

Data Mining and Knowledge Discovery

Math Applications in Computer Science

Artificial Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

1. Fuzzy Transform Concepts -- 2. Multi-dimensional High Degree Fuzzy Transform -- 3. Fuzzy Transform for Image and Video Compression -- 4. Fuzzy Transform Technique for Image Auto Focus -- 5. Fuzzy Transform for Image Fusion and Edge Detection.

Sommario/riassunto

This book analyzes techniques that use the direct and inverse fuzzy transform for image processing and data analysis. The book is divided into two parts, the first of which describes methods and techniques that use the bi-dimensional fuzzy transform method in image analysis. In turn, the second describes approaches that use the multidimensional fuzzy transform method in data analysis. An F-transform in one variable is defined as an operator which transforms a continuous function f on the real interval [a,b] in an n-dimensional vector by using n-assigned fuzzy sets A1, … , An which constitute a fuzzy partition of [a,b]. Then, an inverse F-transform is defined in order to convert the n-



dimensional vector output in a continuous function that equals f up to an arbitrary quantity ε. We may limit this concept to the finite case by defining the discrete F-transform of a function f in one variable, even if it is not known a priori. A simple extension of this concept to functions in two variables allows it to be used for the coding/decoding and processing of images. Moreover, an extended version with multidimensional functions can be used to address a host of topics in data analysis, including the analysis of large and very large datasets. Over the past decade, many researchers have proposed applications of fuzzy transform techniques for various image processing topics, such as image coding/decoding, image reduction, image segmentation, image watermarking and image fusion; and for such data analysis problems as regression analysis, classification, association rule extraction, time series analysis, forecasting, and spatial data analysis. The robustness, ease of use, and low computational complexity of fuzzy transforms make them a powerful fuzzy approximation tool suitable for many computer science applications. This book presents methods and techniques based on the use of fuzzy transforms in various applications of image processing and data analysis, including image segmentation, image tamper detection, forecasting, and classification, highlighting the benefits they offer compared with traditional methods. Emphasis is placed on applications of fuzzy transforms to innovative problems, such as massive data mining, and image and video security in social networks based on the application of advanced fragile watermarking systems. This book is aimed at researchers, students, computer scientists and IT developers to acquire the knowledge and skills necessary to apply and implement fuzzy transforms-based techniques in image and data analysis applications.



2.

Record Nr.

UNISA996464394103316

Autore

Gao Longxiang

Titolo

Privacy-preserving in edge computing / / Longxiang Gao [and four others]

Pubbl/distr/stampa

Gateway East, Singapore : , : Springer, , [2021]

©2021

ISBN

981-16-2199-3

Edizione

[1st ed. 2021.]

Descrizione fisica

1 online resource (XII, 113 p. 59 illus., 39 illus. in color.)

Collana

Wireless Networks, , 2366-1186

Disciplina

005.365

Soggetti

Application software

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Chapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing -- Chapter 6 Conclusion and Future Research Issues.

Sommario/riassunto

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge



computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. .