Entropy in Image Analysis |
Autore | Sparavigna Amelia Carolina |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
Descrizione fisica | 1 electronic resource (456 p.) |
Soggetto non controllato |
keyframes
time-delay whale optimization algorithm multilevel thresholding multi-exposure image fusion additive manufacturing patch structure decomposition ultra-sound images 3D scanning Arimoto entropy contrast enhancement spatial filling factor depth maps image processing 3D prints differential evolution field of experts normalized divergence measure image privacy multiscale top-hat transform q-exponential texture information entropy diffusion hybrid algorithm Weibull statistics adaptive selection nonextensive entropy computer aided diagnostics fatty liver random forest DNA encoding low contrast entropy Minkowski island fuzzy entropy free-form deformations person re-identification chaotic system DNA computing pavement information entropy discrete entropy Tsallis statistics video skimming prime-indexed primes natural scene statistics (NSS) Hénon map q-sigmoid image entropy Shannon entropy macrotexture Shannon’s entropy binary image multi-feature fusion image analysis uncertainty assessment non-rigid registration hash layer Cantor set dynamic filtering deep neural network security analysis multiple-image encryption Hamming distance blind image quality assessment (BIQA) q-Gaussian remote sensing decay trend chaotic cryptography chaotic strategy cross-entropy loss random insertion metabolic syndrome sign languages generalized entropies relevance feedback image retrieval two-dimensional chaotic economic map cryptanalysis infrared images 3D Latin cube SHA-256 hash value gradient distributions structural entropy discrete cosine transform (DCT) chaotic map hepatic steatosis machine vision electromagnetic field optimization security image segmentation quantization loss colonoscopy video summarization permutation Kapur’s entropy surface quality assessment permutation-diffusion Ramanujan primes Rényi entropies chosen-plaintext attack image encryption dynamic index color image segmentation ultrasound Otsu method sigmoid reconstruction image information entropy 3-D digital imaging positron emission tomography medical imaging |
ISBN | 3-03921-093-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910346845003321 |
Sparavigna Amelia Carolina
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Entropy in Image Analysis II |
Autore | Sparavigna Amelia Carolina |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
Descrizione fisica | 1 electronic resource (394 p.) |
Soggetto topico | History of engineering & technology |
Soggetto non controllato |
image binarization
optical character recognition local entropy filter thresholding image preprocessing image entropy image encryption medical color images RGB chaotic system crowd behavior analysis salient crowd motion detection repulsive force direction entropy node strength Pompe disease children quantitative muscle ultrasound texture-feature parametric imaging compound chaotic system S-box image information entropy image chaotic encryption cryptography Latin cube bit cube chosen plaintext attack atmosphere background engine flame infrared radiation detectability image quality evaluation image retrieval pooling method convolutional neural network feature distribution entropy lossless compression pattern classification machine learning malaria infection entropy Golomb–Rice codes image processing image segmentation weld segmentation weld evaluation convolution neural network Python Keras RSNNS MXNet brain-computer interface (BCI) electroencephalography (EEG) motor imagery (MI) continuous wavelet transform (CWT) convolutional neural network (CNN) hyperchaotic system filtering DNA computing diffusion deep neural network data expansion blind image quality assessment saliency and distortion human visual system declining quality data hiding AMBTC steganography stego image dictionary-based coding pixel value adjusting neuroaesthetics symmetry balance complexity chiaroscuro normalized entropy renaissance portrait paintings art history art statistics chaotic systems DNA coding security analysis magnetic resonance images non-maximum suppression object detection key-point detection IoU feature fusion quasi-resonant Rossby/drift wave triads Mordell elliptic curve pseudo-random numbers substitution box nuclear spin generator medical image peak signal-to-noise ratio key space calculation Duchenne muscular dystrophy ultrasound backscattered signals medical imaging neural engineering computer vision crowd motion detection security |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557433403321 |
Sparavigna Amelia Carolina
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Entropy in Image Analysis III |
Autore | Sparavigna Amelia Carolina |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (230 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
Newton-Raphson's method
chaos image encryption/decryption security analysis image encryption cryptanalysis hyper-chaotic ribonucleic acid color image encryption transformed Zigzag image segmentation computer-assisted diagnosis machine learning spleen injury detection hyperchaotic permutation diffusion multiple bit operation circular-step wedge contrast-detail mutual information visible ratio anode heel effect prior information entropy fwi regularization inverse problems bat optimization human crowd behavior (HCB) improved entropy (IE) Jaccard similarity multi-person counting particles gradient motion (PGM) speeded up robust features (SURF) Retinex image enhancement gamma correction low-light image HSV color space scan route Hilbert curve run-length-based entropy coding image and video compression secure communication cellular neural network power-divergence measure computed tomography iterative reconstruction maximum-likelihood expectation-maximization method continuous-time image reconstruction |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910566462103321 |
Sparavigna Amelia Carolina
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Natural security [[electronic resource] ] : a Darwinian approach to a dangerous world / / edited by Raphael D. Sagarin, Terence Taylor |
Pubbl/distr/stampa | Berkeley, : University of California Press, 2008 |
Descrizione fisica | 1 online resource (300 p.) |
Disciplina | 576.8/2 |
Altri autori (Persone) |
SagarinRaphael D
TaylorTerence |
Soggetto topico |
Adaptation (Biology)
Natural selection |
Soggetto non controllato |
anthropology
darwinian ecology evolution and adaptation evolutionary adaptation evolutionary biology global terrorism immune system infectious disease invertebrate multidisciplinary group national security natural disaster paleobiologist psychologist risk assessment security analysis theory of evolution |
ISBN |
1-282-35936-3
9786612359361 0-520-93431-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ; The origins of natural security / Raphael D. Sagarin -- Living with risk / Terence Taylor -- Security, unpredictability, and evolution: policy and the history of life / Geerat J. Vermeij -- From bacteria to belief: immunity and security / Luis P. Villarreal -- Corporations and bureaucracies under a biological lens / Elizabeth M. Prescott -- Selection, security, and evolutionary international relations / Gregory P. Dietl -- Militants and martyrs: evolutionary perspectives on religion and terrorism / Richard Sosis, Candace S. Alcorta -- Causes of and solutions of Islamic fundamentalist terrorism / Bradley A. Thayer -- ; The power of moral belief / Scott Atran -- Fourteen security lessons from antipredator behavior / Daniel T. Blumstein -- Population models and counterinsurgency strategies / Dominic D. P. Johnson, Joshua S. Madin -- ; The infectiousness of terrorist ideology: insights from ecology and epidemiology / Kevin D. Lafferty, Katherine F. Smith, Elizabeth M. P. Madin -- Paradigm shifts in security strategy: why does it take disasters to trigger change? / Dominic D. P. Johnson, Elizabeth M. P. Madin -- Network analysis links parts to the whole / Ferenc Jordán -- ; A holistic view of natural security / Raphael D. Sagarin. |
Record Nr. | UNINA-9910777955703321 |
Berkeley, : University of California Press, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Natural security : a Darwinian approach to a dangerous world / / edited by Raphael D. Sagarin, Terence Taylor |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Berkeley, : University of California Press, 2008 |
Descrizione fisica | 1 online resource (300 p.) |
Disciplina | 576.8/2 |
Altri autori (Persone) |
SagarinRaphael D
TaylorTerence |
Soggetto topico |
Adaptation (Biology)
Natural selection |
Soggetto non controllato |
anthropology
darwinian ecology evolution and adaptation evolutionary adaptation evolutionary biology global terrorism immune system infectious disease invertebrate multidisciplinary group national security natural disaster paleobiologist psychologist risk assessment security analysis theory of evolution |
ISBN |
1-282-35936-3
9786612359361 0-520-93431-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ; The origins of natural security / Raphael D. Sagarin -- Living with risk / Terence Taylor -- Security, unpredictability, and evolution: policy and the history of life / Geerat J. Vermeij -- From bacteria to belief: immunity and security / Luis P. Villarreal -- Corporations and bureaucracies under a biological lens / Elizabeth M. Prescott -- Selection, security, and evolutionary international relations / Gregory P. Dietl -- Militants and martyrs: evolutionary perspectives on religion and terrorism / Richard Sosis, Candace S. Alcorta -- Causes of and solutions of Islamic fundamentalist terrorism / Bradley A. Thayer -- ; The power of moral belief / Scott Atran -- Fourteen security lessons from antipredator behavior / Daniel T. Blumstein -- Population models and counterinsurgency strategies / Dominic D. P. Johnson, Joshua S. Madin -- ; The infectiousness of terrorist ideology: insights from ecology and epidemiology / Kevin D. Lafferty, Katherine F. Smith, Elizabeth M. P. Madin -- Paradigm shifts in security strategy: why does it take disasters to trigger change? / Dominic D. P. Johnson, Elizabeth M. P. Madin -- Network analysis links parts to the whole / Ferenc Jordán -- ; A holistic view of natural security / Raphael D. Sagarin. |
Record Nr. | UNINA-9910819735803321 |
Berkeley, : University of California Press, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNINA-9910293140103321 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNISA-996465583103316 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|