206 research outputs found

    ResearchNews, Issue 4, March 2010

    Get PDF

    Multimedia

    Get PDF
    The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives. Advances in Multimedia provides readers with an overview of the ever-growing field of multimedia by bringing together various research studies and surveys from different subfields that point out such important aspects. Some of the main topics that this book deals with include: multimedia management in peer-to-peer structures & wireless networks, security characteristics in multimedia, semantic gap bridging for multimedia content and novel multimedia applications

    An efficient sound and data steganography based secure authentication system

    Get PDF
    The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication orQR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into a wave file, after which it gets transmitted in a short burst via the device’s speakers. Subsequently, the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing. Besides, this model requires two devices/gadgets with speakers and a microphone, and no extra hardware such as a camera, for reading the QR code is required. The first module is tested with real-time data and generates high scores for the widely accepted accuracy metrics, including precision, Recall, F1 score, entropy, and mutual information (MI). Additionally, this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files. This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file. Several encryption algorithms and their combinations are taken for this system to compare the resultant file size. Both these systems engender high accuracies and provide secure connectivity, leading to a sustainable communication ecosystem.peer-reviewe

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    From Digital Twins to Digital Selves and Beyond

    Get PDF
    This open access book aims at deepening the understanding of the relation between cyber-physical systems (CPSs) as socio-technical systems and their digital representations with intertwined artificial intelligence (AI). The authors describe why it is crucial for digital selves to be able to develop emotional behavior and why a humanity-inspired AI is necessary so that humans and humanoids can coexist. The introductory chapter describes major milestones in computer science which form the basis for the implementation of digital twins and digital selves. The subsequent Part I then lays the foundation to develop a socio-technical understanding of the nature of digital twins as representations and trans-human development objects. Following the conceptual understanding of digital twins and how they could be engineered according to cognitive and organizational structures, Part II forms the groundwork for understanding social behavior and its modeling. It discusses various perception-based socio-emotional approaches before sketching behavior-relevant models and their simulation capabilities. In particular, it is shown how emotions can substantially influence the collective behavior of artificial actors. Part III eventually presents a symbiosis showing under which preconditions digital selves might construct and produce digital twins as integrated design elements in trans-human ecosystems. The chapters in this part are dedicated to opportunities and modes of co-creating reflective socio-trans-human systems based on digital twin models, exploring mutual control and continuous development. The final epilog is congenitally speculative in its nature by presenting thoughts on future developments of artificial life in computational substrates. The book is written for researchers and professionals in areas like cyber-physical systems, robotics, social simulation or systems engineering, interested to take a speculative look into the future of digital twins and autonomous agents. It also touches upon philosophical aspects of digital twins, digital selves and humanoids

    Deep learning for procedural content generation

    Get PDF
    Summarization: Procedural content generation in video games has a long history. Existing procedural content generation methods, such as search-based, solver-based, rule-based and grammar-based methods have been applied to various content types such as levels, maps, character models, and textures. A research field centered on content generation in games has existed for more than a decade. More recently, deep learning has powered a remarkable range of inventions in content production, which are applicable to games. While some cutting-edge deep learning methods are applied on their own, others are applied in combination with more traditional methods, or in an interactive setting. This article surveys the various deep learning methods that have been applied to generate game content directly or indirectly, discusses deep learning methods that could be used for content generation purposes but are rarely used today, and envisages some limitations and potential future directions of deep learning for procedural content generation.Presented on: Neural Computing and Application

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    From Digital Twins to Digital Selves and Beyond

    Get PDF
    This open access book aims at deepening the understanding of the relation between cyber-physical systems (CPSs) as socio-technical systems and their digital representations with intertwined artificial intelligence (AI). The authors describe why it is crucial for digital selves to be able to develop emotional behavior and why a humanity-inspired AI is necessary so that humans and humanoids can coexist. The introductory chapter describes major milestones in computer science which form the basis for the implementation of digital twins and digital selves. The subsequent Part I then lays the foundation to develop a socio-technical understanding of the nature of digital twins as representations and trans-human development objects. Following the conceptual understanding of digital twins and how they could be engineered according to cognitive and organizational structures, Part II forms the groundwork for understanding social behavior and its modeling. It discusses various perception-based socio-emotional approaches before sketching behavior-relevant models and their simulation capabilities. In particular, it is shown how emotions can substantially influence the collective behavior of artificial actors. Part III eventually presents a symbiosis showing under which preconditions digital selves might construct and produce digital twins as integrated design elements in trans-human ecosystems. The chapters in this part are dedicated to opportunities and modes of co-creating reflective socio-trans-human systems based on digital twin models, exploring mutual control and continuous development. The final epilog is congenitally speculative in its nature by presenting thoughts on future developments of artificial life in computational substrates. The book is written for researchers and professionals in areas like cyber-physical systems, robotics, social simulation or systems engineering, interested to take a speculative look into the future of digital twins and autonomous agents. It also touches upon philosophical aspects of digital twins, digital selves and humanoids

    Cyber Security and Critical Infrastructures 2nd Volume

    Get PDF
    The second volume of the book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles, including an editorial that explains the current challenges, innovative solutions and real-world experiences that include critical infrastructure and 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems
    corecore