Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
| Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods |
| Autore | Kim Cheonshik |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
| Descrizione fisica | 1 online resource (196 p.) |
| Soggetto topico |
History of engineering & technology
Technology: general issues |
| Soggetto non controllato |
AMBTC
BTC channel estimation error CNN-features compressed sensing connected autonomous cars constant pairing computations constant-size private key constrained backtracking matching pursuit data complexity data hiding deep learning digital signature efficient decryption fragile watermarking greedy pursuit algorithm Hamming code handwritten text recognition image processing inner product encryption latency optimization Log-mel LSB MFCC mobile edge cloud n/a named entity recognition neural network object detection physical layer security power allocation pre-trained models predicate encryption Residual Network scalograms secrecy capacity secrecy capacity optimization artificial noise secure transmission seismic patch classification self-embedding smart city sparse reconstruction transfer learning Transformer model video surveillance visual surveillance watermarking |
| ISBN | 3-0365-5394-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910619469803321 |
Kim Cheonshik
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
| Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography |
| Autore | Djordjevic Ivan B |
| Descrizione fisica | 1 online resource (210 p.) |
| Soggetto topico |
History of engineering and technology
Technology: general issues |
| Soggetto non controllato |
algorithm
amplification Bayesian statistics clock synchronization conclusive exclusion continuous variable (CV)-QKD continuous-variable quantum key distribution detection probability discrete phase randomization discrete variable (DV)-QKD distillation entanglement EPR pairs geometrical optics restricted eavesdropping information disturbance theorem injection attacks intrinsic bit error rate jamming attacks mean multi-kings' problem mean-king's problem measurement device independent measurement-device-independent n/a oblivious transfer phase-matching physical layer security pilot randomization post-quantum cryptography postquantum cryptography (PQC) private equality tests QKD quantum communications quantum communications networks (QCNs) quantum cryptography quantum entanglement quantum identity authentication quantum information theory quantum key distribution quantum key distribution (QKD) quantum network reconciliation satellite-to-satellite secret key distillation secret key generation single-photon mode surface codes synchronization the Bernstein-Vazirani algorithm twin-field quantum key distribution underwater channel universal composability vulnerability zero-photon catalysis |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910595075303321 |
Djordjevic Ivan B
|
||
| Lo trovi qui: Univ. Federico II | ||
| ||