Advances in Intelligent Systems and Applications - Volume 2 (Record no. 51433)

000 -LEADER
fixed length control field 03928nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-642-35473-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200420220213.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121215s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783642354731
-- 978-3-642-35473-1
082 04 - CLASSIFICATION NUMBER
Call Number 006.3
245 10 - TITLE STATEMENT
Title Advances in Intelligent Systems and Applications - Volume 2
Sub Title Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12-14, 2012 /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXIV, 811 p. 505 illus.
490 1# - SERIES STATEMENT
Series statement Smart Innovation, Systems and Technologies,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Authentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.
520 ## - SUMMARY, ETC.
Summary, etc The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:  l   Authentication, Identification, and Signature l   Intrusion Detection l   Steganography, Data Hiding, and Watermarking l   Database, System, and Communication Security l   Computer Vision, Object Tracking, and Pattern Recognition l   Image Processing, Medical Image Processing, and Video Coding l   Digital Content, Digital Life, and Human Computer Interaction l   Parallel, Peer-to-peer, Distributed, and Cloud Computing l   Software Engineering and Programming Language  This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find  this book interesting.
700 1# - AUTHOR 2
Author 2 Pan, Jeng-Shyang.
700 1# - AUTHOR 2
Author 2 Yang, Ching-Nung.
700 1# - AUTHOR 2
Author 2 Lin, Chia-Chen.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-35473-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational intelligence.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence (incl. Robotics).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2190-3018 ;
912 ## -
-- ZDB-2-ENG

No items available.