Cargando…

Recent Advances in Computational Intelligence in Defense and Security

This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Abielmona, Rami (Editor ), Falcon, Rafael (Editor ), Zincir-Heywood, Nur (Editor ), Abbass, Hussein A. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Studies in Computational Intelligence, 621
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-26450-9
003 DE-He213
005 20220113024355.0
007 cr nn 008mamaa
008 151221s2016 sz | s |||| 0|eng d
020 |a 9783319264509  |9 978-3-319-26450-9 
024 7 |a 10.1007/978-3-319-26450-9  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a Recent Advances in Computational Intelligence in Defense and Security  |h [electronic resource] /  |c edited by Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XI, 752 p. 236 illus., 72 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Computational Intelligence,  |x 1860-9503 ;  |v 621 
505 0 |a Part I Physical Security and Surveillance -- Part II: Cyber Security and Intrusion Detection Systems -- Part III: Biometric Security and Authentication Systems -- Part IV: Situational Awareness and Threat Assessment -- Part V: Strategic/Mission Planning and Resource Management. 
520 |a This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors. 
650 0 |a Computational intelligence. 
650 0 |a Artificial intelligence. 
650 0 |a Security systems. 
650 1 4 |a Computational Intelligence. 
650 2 4 |a Artificial Intelligence. 
650 2 4 |a Security Science and Technology. 
700 1 |a Abielmona, Rami.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Falcon, Rafael.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Zincir-Heywood, Nur.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Abbass, Hussein A.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319264486 
776 0 8 |i Printed edition:  |z 9783319264493 
776 0 8 |i Printed edition:  |z 9783319799568 
830 0 |a Studies in Computational Intelligence,  |x 1860-9503 ;  |v 621 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-26450-9  |z Texto Completo 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)