|
![]() |
|||
|
||||
OverviewThis volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors. Full Product DetailsAuthor: Rami Abielmona , Rafael Falcon , Nur Zincir-Heywood , Hussein A. AbbassPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: Softcover reprint of the original 1st ed. 2016 Volume: 621 Dimensions: Width: 15.50cm , Height: 3.90cm , Length: 23.50cm Weight: 1.151kg ISBN: 9783319799568ISBN 10: 3319799568 Pages: 752 Publication Date: 30 March 2018 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPart I Physical Security and Surveillance.- Part II: Cyber Security and Intrusion Detection Systems.- Part III: Biometric Security and Authentication Systems.- Part IV: Situational Awareness and Threat Assessment.- Part V: Strategic/Mission Planning and Resource Management.ReviewsI found the chapters to be readable, at sufficient depth, and generally well referenced. ... I recommend the book to readers in the security and defense field, as well as CI practitioners interested in these critical application areas. (Creed Jones, Computing Reviews, computingreviews.com, July, 2016) I found the chapters to be readable, at sufficient depth, and generally well referenced. I recommend the book to readers in the security and defense field, as well as CI practitioners interested in these critical application areas. (Creed Jones, Computing Reviews, computingreviews.com, July, 2016) Author InformationTab Content 6Author Website:Countries AvailableAll regions |