Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio,...

Full description

Saved in:
Bibliographic Details
Sonstige:
Year of Publication:2022
Language:English
Physical Description:1 electronic resource (196 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993562968904498
ctrlnum (CKB)5670000000391576
(oapen)https://directory.doabooks.org/handle/20.500.12854/93228
(EXLCZ)995670000000391576
collection bib_alma
record_format marc
spelling Kim, Cheonshik edt
Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
MDPI - Multidisciplinary Digital Publishing Institute 2022
1 electronic resource (196 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Open access Unrestricted online access star
This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read.
English
Technology: general issues bicssc
History of engineering & technology bicssc
data hiding
AMBTC
BTC
Hamming code
LSB
predicate encryption
inner product encryption
constant-size private key
efficient decryption
constant pairing computations
watermarking
self-embedding
digital signature
fragile watermarking
constrained backtracking matching pursuit
sparse reconstruction
compressed sensing
greedy pursuit algorithm
image processing
visual surveillance
deep learning
object detection
latency optimization
mobile edge cloud
connected autonomous cars
smart city
video surveillance
physical layer security
secure transmission
secrecy capacity
secrecy capacity optimization artificial noise
power allocation
channel estimation error
neural network
transfer learning
scalograms
MFCC
Log-mel
pre-trained models
seismic patch classification
CNN-features
data complexity
handwritten text recognition
Residual Network
Transformer model
named entity recognition
3-0365-5393-2
Kim, Cheonshik oth
language English
format eBook
author2 Kim, Cheonshik
author_facet Kim, Cheonshik
author2_variant c k ck
author2_role Sonstige
title Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
spellingShingle Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_full Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_fullStr Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_full_unstemmed Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_auth Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_new Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
title_sort application and theory of multimedia signal processing using machine learning or advanced methods
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2022
physical 1 electronic resource (196 p.)
isbn 3-0365-5394-0
3-0365-5393-2
illustrated Not Illustrated
work_keys_str_mv AT kimcheonshik applicationandtheoryofmultimediasignalprocessingusingmachinelearningoradvancedmethods
status_str n
ids_txt_mv (CKB)5670000000391576
(oapen)https://directory.doabooks.org/handle/20.500.12854/93228
(EXLCZ)995670000000391576
carrierType_str_mv cr
is_hierarchy_title Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
author2_original_writing_str_mv noLinkedField
_version_ 1796649042564874240
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03284nam-a2200865z--4500</leader><controlfield tag="001">993562968904498</controlfield><controlfield tag="005">20240130161918.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202210s2022 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-0365-5394-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5670000000391576</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/93228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995670000000391576</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kim, Cheonshik</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (196 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering &amp; technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data hiding</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">AMBTC</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">BTC</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hamming code</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">LSB</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">predicate encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">inner product encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">constant-size private key</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">efficient decryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">constant pairing computations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">watermarking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">self-embedding</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital signature</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fragile watermarking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">constrained backtracking matching pursuit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sparse reconstruction</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">compressed sensing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">greedy pursuit algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">image processing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">visual surveillance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">object detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">latency optimization</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mobile edge cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">connected autonomous cars</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart city</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">video surveillance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">physical layer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure transmission</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secrecy capacity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secrecy capacity optimization artificial noise</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power allocation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">channel estimation error</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">neural network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transfer learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">scalograms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MFCC</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Log-mel</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">pre-trained models</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">seismic patch classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CNN-features</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data complexity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">handwritten text recognition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Residual Network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Transformer model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">named entity recognition</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-5393-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Cheonshik</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-02-02 00:38:41 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-11-05 21:33:14 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5340570280004498&amp;Force_direct=true</subfield><subfield code="Z">5340570280004498</subfield><subfield code="b">Available</subfield><subfield code="8">5340570280004498</subfield></datafield></record></collection>