Multi-Sensor Imaging and Fusion: Methods, Evaluations, and Applications, volume II

Multi-Sensor Imaging and Fusion: Methods, Evaluations, and Applications, volume II

Author: Zhiqin Zhu

Publisher: Frontiers Media SA

Published: 2024-07-24

Total Pages: 208

ISBN-13: 2832552005

DOWNLOAD EBOOK

Multi-sensor image fusion focuses on processing images of the same object or scene acquired by multiple sensors, in which various sensors with multi-level and multi-spatial information are complemented and combined to ultimately yield a consistent interpretation of the observed environment. In recent years, multi-sensor image fusion has become a highly active topic, and various fusion methods have been proposed. Many effective processing methods, including multi-scale transformation, fuzzy inference, and deep learning, have been introduced to design fusion algorithms. Despite the great progress, there are still some noteworthy challenges in the field, such as the lack of unified fusion theories and methods for effective generalized fusion, the lack of fault tolerance and robustness, the lack of benchmarks for performance evaluation, the lack of work on specific applications of multi-sensor image fusion, and so on.


Handbook of Information and Communication Security

Handbook of Information and Communication Security

Author: Peter Stavroulakis

Publisher: Springer Science & Business Media

Published: 2010-02-23

Total Pages: 863

ISBN-13: 3642041175

DOWNLOAD EBOOK

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.