|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-26450-9 |
003 |
DE-He213 |
005 |
20220113024355.0 |
007 |
cr nn 008mamaa |
008 |
151221s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319264509
|9 978-3-319-26450-9
|
024 |
7 |
|
|a 10.1007/978-3-319-26450-9
|2 doi
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Recent Advances in Computational Intelligence in Defense and Security
|h [electronic resource] /
|c edited by Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XI, 752 p. 236 illus., 72 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 621
|
505 |
0 |
|
|a Part I Physical Security and Surveillance -- Part II: Cyber Security and Intrusion Detection Systems -- Part III: Biometric Security and Authentication Systems -- Part IV: Situational Awareness and Threat Assessment -- Part V: Strategic/Mission Planning and Resource Management.
|
520 |
|
|
|a This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Security systems.
|
650 |
1 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Abielmona, Rami.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Falcon, Rafael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zincir-Heywood, Nur.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Abbass, Hussein A.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319264486
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319264493
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319799568
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 621
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-26450-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|