LEADER 04347nam 2200613 450 001 9910788731003321 005 20170821171900.0 010 $a1-4704-0178-9 035 $a(CKB)3360000000464777 035 $a(EBL)3113781 035 $a(SSID)ssj0000888839 035 $a(PQKBManifestationID)11465743 035 $a(PQKBTitleCode)TC0000888839 035 $a(PQKBWorkID)10867688 035 $a(PQKB)10519417 035 $a(MiAaPQ)EBC3113781 035 $a(RPAM)1635415 035 $a(PPN)195414756 035 $a(EXLCZ)993360000000464777 100 $a20140903h19961996 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCompletely positive hypergroup actions /$fAjit Iqbal Singh 210 1$aProvidence, Rhode Island :$cAmerican Mathematical Society,$d1996. 210 4$d©1996 215 $a1 online resource (87 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vVolume 124, Number 593 300 $a"November 1996, volume 124, number 593 (fourth of 5 numbers)." 311 $a0-8218-0539-8 320 $aIncludes bibliographical references. 327 $a""Contents""; ""Introduction""; ""Chapter 1. Presentations""; ""1.1. Admissible pairs of normed linear spaces and compatible pairs of Banach spaces""; ""1.2. Admissible pairs of spaces of operators""; ""1.3. A compatible pair of spaces of functions and measures""; ""1.4. Presentations and opresentations""; ""1.5. Actions and opactions""; ""Chapter 2. Complete Positivity and Other Properties for Presentations and Opresentations""; ""2.1. The C*a???algebra M[sub(n)](A) and completely positive maps""; ""2.2. Matrix ordered and matricially normed spaces"" 327 $a""2.3. Matrix ordered and matricially normed spaces of linear maps""""2.4. Interconnections amongst different notions of positivity and complete positivity""; ""2.5. Matricially order or norm admissible and compatible pairs""; ""2.6. Examples of matricially norm admissible and compatible pairs""; ""2.7. Matricially order or norm admissible and compatible pairs of spaces of linear maps""; ""2.8. Completely positive and completely bounded presentations and opresentations""; ""2.9. Topological structures on spaces of presentations"" 327 $a""2.10. Properties of the dual presentation and opresentation""""2.11. Completely positive and completely bounded actions and opactions""; ""2.12. Examples and remarks""; ""Chapter 3. Presentations of Hypergroups and Associated Actions""; ""3.1. (M(K), C[sub(b)]K)) as a natural matricially order compatible pair""; ""3.2. Matricially order compatible structures on (M(K), C[sub(b)]K)) through representations""; ""3.3. Special matrix orders on M(K) for commutative K""; ""3.4. Role of conjugate representations in Fourier transform"" 327 $a""3.5. Positive definite presentations and completely positive opresentations of hypergroups""""3.6. The spectral subspaces of a presentation of a hypergroup""; ""3.7. Quantized positivea???definite presentations and opresentations of hypergroups""; ""3.8. Completely positive instruments with values in K and their characteristic functions""; ""3.9. Completely positive hypergroup actions and opactions""; ""Chapter 4. Some Concrete Presentations and Actions of Hypergroups""; ""4.1. Presentations and opresentations arising from the left regular representation"" 327 $a""4.2. The situation in 2a???fold absolutely continuous hypergroups""""4.3. Amenability for hypergroups""; ""4.4. Folner hypergroups""; ""4.5. Isometry condition on I??(I??)""; ""4.6. Actions and opactions arising from the left regular representation""; ""4.7. The special case X = L[sup(2)](K) = X[sub(*)]""; ""References"" 410 0$aMemoirs of the American Mathematical Society ;$vVolume 124, Number 593. 606 $aHypergroups 606 $aRepresentations of groups 606 $aMeasure algebras 615 0$aHypergroups. 615 0$aRepresentations of groups. 615 0$aMeasure algebras. 676 $a512/.55 700 $aSingh$b Ajit Iqbal$f1944-$01580663 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788731003321 996 $aCompletely positive hypergroup actions$93861751 997 $aUNINA LEADER 01298nam0 22003131i 450 001 UON00301242 005 20231205104005.613 100 $a20070927d1959 |0itac50 ba 101 $ager 102 $aDE 105 $a|||| 1|||| 200 1 $aˆL'‰adultera$aCécile ; Die Poggenpuhls$fTheodor Fontane$g[hrsg. von Edgar Gross] 210 $aMünchen$cNymphenburger$dc1959 215 $a397 p.$d20 cm. 410 1$1001UON00301234$12001 $aTheodor Fontane$eSämtliche Werke$1210 $aMünchen$cNymphenburger$vBd. 4 464 1$1001UON00301243$12001 $aCécile$fTheodor Fontane 464 1$1001UON00301244$12001 $aˆDie ‰Poggenpuhls$fTheodor Fontane 620 $aDE$dMünchen$3UONL003025 676 $a830.8$cLetteratura tedesca. 1856-1899$v21 700 1$aFONTANE$bTheodor$3UONV112619$0131693 702 1$aGROSS$bEdgar$3UONV173228 712 $aNymphenburger Verlagshandlung$3UONV266667$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00301242 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI TED 23 I FON 05 d $eSI LO 70953 5 05 d 996 $aCécile ; Die Poggenpuhls$91378507 996 $aAdultera$91378506 997 $aUNIOR LEADER 05286nam 22007215 450 001 9910842298403321 005 20251113175207.0 010 $a3-031-49803-8 024 7 $a10.1007/978-3-031-49803-9 035 $a(CKB)30764024900041 035 $a(MiAaPQ)EBC31200922 035 $a(Au-PeEL)EBL31200922 035 $a(DE-He213)978-3-031-49803-9 035 $a(EXLCZ)9930764024900041 100 $a20240304d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdversarial Multimedia Forensics /$fedited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (298 pages) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v104 311 08$a3-031-49802-X 320 $aIncludes bibliographical references and index. 327 $aChapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection?s Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection. 330 $aThis book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book?s content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs. The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy. Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource. 410 0$aAdvances in Information Security,$x2512-2193 ;$v104 606 $aMachine learning 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aComputer crimes 606 $aSignal processing 606 $aArtificial intelligence 606 $aMachine Learning 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aComputer Crime 606 $aSignal, Speech and Image Processing 606 $aArtificial Intelligence 615 0$aMachine learning. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aComputer crimes. 615 0$aSignal processing. 615 0$aArtificial intelligence. 615 14$aMachine Learning. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputer Crime. 615 24$aSignal, Speech and Image Processing. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aNowroozi$b Ehsan 702 $aKallas$b Kassem 702 $aJolfaei$b Alireza 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910842298403321 996 $aAdversarial Multimedia Forensics$94145607 997 $aUNINA